-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Possible memory leak in [1.2] #3408
Comments
I see references to incoming requests, which makes me think there were still active connections to Janus when you shut it down. |
Ok i will check it again, but first vacation;) |
I repeated the same steps, and killed all sessions (made sure that session_list admin request return empty list) and got same leaks from incoming request, can it be that session recovery timer keeps it in memory for that amount of time till it is fully cleared? |
Just test by terminating after the session reclaim timeout. E.g. if it's 30 seconds wait 60 seconds since the last destroy, then kill the server. |
I have 120sec reclame, and waited +3 min but same libasan output |
You can try uncommenting the |
I suspect that |
@do-not-set-2fa are you able to repro with one of the stock lua plugins? |
I was trying to repro with
This is a leak for sure, since for any echotest session started and closed, the amount of leaked bytes grows. Wondering if the root cause might be similar. |
#3409 should fix the leak mentioned in the message above |
With #3409 I can't reproduce memory leaks anymore with |
Great thanks,
I will test too in a week or so, after vacation.
Regards,
Mirko
…On Wed, 24 Jul 2024, 12:18 Alessandro Toppi, ***@***.***> wrote:
With #3409 <#3409> I can't
reproduce memory leaks anymore with echotest.lua
—
Reply to this email directly, view it on GitHub
<#3408 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/BIALZIKJVPTUHM4EYCTGLA3ZN55OPAVCNFSM6AAAAABLEUTVWSVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDENBXGUYTCOBUGQ>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
@atoppi what transport plugin fif you use? Have you tried with http? |
@do-not-set-2fa it's the same with both ws and http. No leak when using this patch and the official |
Ok this would explain the slow leak that i am experiencing over the long period of time (even though i can't seem to get the same libasan report as you do, probably doing something wrong :) I'll wait for the merge and new tag and then start to deploy it to see the effect over time. |
@do-not-set-2fa the PR has been merged and will soon be backported to 0.x too. |
Great thanks
…On Wed, 4 Sept 2024, 11:37 Alessandro Toppi, ***@***.***> wrote:
@do-not-set-2fa <https://github.com/do-not-set-2fa> the PR has been
merged and will soon be backported to 0.x too.
—
Reply to this email directly, view it on GitHub
<#3408 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/BIALZIKU27UOXI6SWMQZTZ3ZU3IFJAVCNFSM6AAAAABLEUTVWSVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGMRYGM4DIMJYGY>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
@do-not-set-2fa any update on this? Can the issue be closed? |
What version of Janus is this happening on?
master (from 2024-07-18)
const char *janus_version_string = "1.2.4";
Have you tested a more recent version of Janus too?
Yes
Was this working before?
Yes
Is there a gdb or libasan trace of the issue?
libasan report
Additional context
Simple Peer connection via lua plugin, cleanup of all sessions and shutdown of janus
The text was updated successfully, but these errors were encountered: