I did tow things on 2015-11-19 which seem to have (at least temporarily)
resolved this issue:
1. Upgraded to git master@b056aed
2. Commented out #modparam("usrloc", "close_expired_tcp", 1) based on
http://lists.sip-router.org/pipermail/sr-users/2015-November/090733.html
-A
On Wednesday, November 18, 2015 06:26:46 AM Anthony Messina wrote:
I was just letting you know how I build it, but yes, I
will test with just
the bare master branch this weekend. After a restart, this issue takes a
few hours to happen, making it difficult to reproduce in testing. -A
On Wednesday, November 18, 2015 10:30:16 AM Daniel-Constantin Mierla wrote:
> It is not clear how what sources you are using, what does it mean
> 'latest release tarball' -- version 4.3.3? Then did you take all the
> patches from master since version 4.3.0?
>
> I tested master with 20000 registrations over TLS sent by sipp, but I
> couldn't spot any leak there.
>
> Can you test with bare master branch?
>
> Cheers,
> Daniel
>
> On 18/11/15 02:16, Anthony Messina wrote:
> > Sorry for the delay, I just got home from my $PAYINGJOB. And thanks a
> > lot
> > for helping figure this out.
> >
> > I build Kamailio RPMs from the latest release tarball, with the changes
> > between the release and git master applied via patch, but here is the
> > version output:
> >
> > # kamailio -v
> > version: kamailio 4.4.0-dev6 (x86_64/linux) e275bc
> > flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS,
> > DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC,
> > Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-
> > ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR,
> > USE_DST_BLACKLIST, HAVE_RESOLV_RES
> > ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16,
> > MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
> > poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
> > id: e275bc
> > compiled on 22:23:43 Nov 13 2015 with gcc 5.1.1
> >
> > I am using tcpops functions as follows, though again, these were in use
> > for
> > quite some time before the issue appeared:
> >
> > To update the tcp connection lifetime after successful auth:
> > # User authenticated - update tcp_connection_lifetime
> > if(proto!=UDP)
> >
> > tcp_set_connection_lifetime("3605");
> >
> > and in the reply route:
> >
> > onreply_route[MANAGE_REPLY] {
> >
> > xdbg("incoming reply\n");
> >
> > if(status=~"[12][0-9][0-9]")
> >
> > route(NATMANAGE);
> >
> > #!ifdef WITH_TCPOPS
> >
> > if(proto!=UDP && status=="200") {
> >
> > if(is_method("INVITE")) {
> >
> > # enable on callee's connection
> > tcp_keepalive_enable("60", "5",
"5");
> > # enable on caller's connection
> > if($avp(caller_conid)!=$null)
> >
> > tcp_keepalive_enable("$avp(caller_conid)
> > ",
> >
> > "60", "5", "2");
> >
> > }
> > if(is_method("BYE")) {
> >
> > tcp_keepalive_disable();
> > tcp_keepalive_disable("$avp(bye_conid)");
> >
> > }
> >
> > }
--
Anthony -
https://messinet.com/ -
https://messinet.com/~amessina/gallery
8F89 5E72 8DF0 BCF0 10BE 9967 92DC 35DC B001 4A4E