Hi all A customer of mine has some crashes every week. We installed the dbg and finally generated a core.
Bt full attached. Kamailio installed from kamailio deb 5.1 repos kamailio -V version: kamailio 5.1.7 (x86_64/linux) flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144 MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: unknown compiled with gcc 6.3.0 Any hints? thanks, Jon -- https://pekepbx.com https://www.issabel.com/multitenant
root@tlv-kam02-new:/var/cores# gdb /usr/sbin/kamailio core-kamailio-11-107-111-648-1552740502 GNU gdb (Debian 7.12-6) 7.12.0.20161007-git Copyright (C) 2016 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: <http://www.gnu.org/software/gdb/bugs/>. Find the GDB manual and other documentation resources online at: <http://www.gnu.org/software/gdb/documentation/>. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/eb/181e1d1015154e0e5a4c44e5964881071e54c3.debug...done. done. [New LWP 648] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/kamailio.'. Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007fec4b65ecfa in t_should_relay_response (Trans=0x7fec09448478, new_code=200, branch=0, should_store=0x7ffd77df2744, should_relay=0x7ffd77df2740, cancel_data=0x7ffd77df2930, reply=0x7fec4c371bb8) at t_reply.c:1282 1282 t_reply.c: No such file or directory. (gdb) bt full #0 0x00007fec4b65ecfa in t_should_relay_response (Trans=0x7fec09448478, new_code=200, branch=0, should_store=0x7ffd77df2744, should_relay=0x7ffd77df2740, cancel_data=0x7ffd77df2930, reply=0x7fec4c371bb8) at t_reply.c:1282 branch_cnt = 32765 picked_code = 32765 new_branch = 16663 inv_through = 0 extra_flags = 2011113200 i = 0 replies_dropped = 0 __func__ = "t_should_relay_response" #1 0x00007fec4b6634e3 in relay_reply (t=0x7fec09448478, p_msg=0x7fec4c371bb8, branch=0, msg_status=200, cancel_data=0x7ffd77df2930, do_put_on_wait=1) at t_reply.c:1786 relay = 1023064 save_clone = 0 buf = 0x0 res_len = 0 relayed_code = 0 relayed_msg = 0x0 reply_bak = 0x55c54931b2a2 <qm_malloc+2331> bm = {to_tag_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 155485760}} totag_retr = 0 reply_status = 32748 uas_rb = 0x7ffd77df2840 to_tag = 0x15cfe71d00000000 reason = {s = 0x55c5494a4550 "core", len = 1210007808} onsend_params = {req = 0x7ffd77df2800, rpl = 0x7fec4b64dc39 <futex_get+40>, param = 0x30, code = 155485760, flags = 32748, branch = 0, t_rbuf = 0x600000000, dst = 0x481f4100, send_buf = { s = 0x7ffd77df28b0 "\001", len = 381479945}} ip = {af = 2011113504, len = 32765, u = {addrl = {140652853918523, 0}, addr32 = {1264909115, 32748, 0, 0}, addr16 = {64315, 19300, 32748, 0, 0, 0, 0, 0}, addr = ";\373dK\354\177\000\000\000\000\000\000\000\000\000"}} __func__ = "relay_reply" #2 0x00007fec4b669430 in reply_received (p_msg=0x7fec4c371bb8) at t_reply.c:2513 msg_status = 200 last_uac_status = 200 ack = 0x7fec4c27a010 "\001" ack_len = 21957 branch = 0 reply_status = 1225326400 onreply_route = 1 cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 8}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 8}}}} uac = 0x7fec09448688 t = 0x7fec09448478 lack_dst = {send_sock = 0x55c54908ff40 <_start>, to = {s = {sa_family = 13712, sa_data = "\337w\375\177\000\000\317FpI\305U\000"}, sin = {sin_family = 13712, sin_port = 30687, sin_addr = { s_addr = 32765}, sin_zero = "\317FpI\305U\000"}, sin6 = {sin6_family = 13712, sin6_port = 30687, sin6_flowinfo = 32765, sin6_addr = {__in6_u = { __u6_addr8 = "\317FpI\305U\000\000\203FpI\305U\000", __u6_addr16 = {18127, 18800, 21957, 0, 18051, 18800, 21957, 0}, __u6_addr32 = {1232094927, 21957, 1232094851, 21957}}}, sin6_scope_id = 2011114048}}, id = 32765, proto = 26 '\032', send_flags = {f = 18740, blst_imask = 21957}} backup_user_from = 0x55c5497b8950 <def_list+16> backup_user_to = 0x55c5497b8958 <def_list+24> backup_domain_from = 0x55c5497b8960 <def_list+32> backup_domain_to = 0x55c5497b8968 <def_list+40> backup_uri_from = 0x55c5497b8940 <def_list> backup_uri_to = 0x55c5497b8948 <def_list+8> backup_xavps = 0x55c549703b18 <_xavp_list_head> replies_locked = 1 branch_ret = 331989552 prev_branch = 13 blst_503_timeout = 29 hf = 0x54948e2c0 onsend_params = {req = 0x6a, rpl = 0x55c54939599c <parse_method_name+2712>, param = 0x7fec4c350af8, code = 1278544616, flags = 32748, branch = 0, t_rbuf = 0x0, dst = 0x54948e2c0, send_buf = { s = 0x7ffd77df2a40 "P+\337w\375\177", len = 381479945}} ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {381479945, 7379563515610244877, 94305822244672, 140726614570384, 0, 0, 7379563515622827789, 3609921287363733261}, __mask_was_saved = 0, __saved_mask = {__val = {381479945, 18405195584, 140652867689400, 0, 1571728907925668096, 140726614567760, 94305825319499, 1023064, 8, 107, 1571728907925668096, 140726614567584, 140652867544912, 94305829013199, 94305829013101, 140726614567760}}}}} ---Type <return> to continue, or q <return> to quit--- bctx = 0xb07f30 keng = 0x0 __func__ = "reply_received" #3 0x000055c5491d2d0b in do_forward_reply (msg=0x7fec4c371bb8, mode=0) at core/forward.c:747 new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0, blst_imask = 0}} new_len = 1278544592 r = 1 ip = {af = 1275517517, len = 32748, u = {addrl = {4294967296, 31}, addr32 = {0, 1, 31, 0}, addr16 = {0, 0, 1, 0, 31, 0, 0, 0}, addr = "\000\000\000\000\001\000\000\000\037\000\000\000\000\000\000"}} s = 0x7ffd77df2b68 "" len = 32748 __func__ = "do_forward_reply" #4 0x000055c5491d4b28 in forward_reply (msg=0x7fec4c371bb8) at core/forward.c:852 No locals. #5 0x000055c549220643 in receive_msg ( buf=0x55c549704520 <buf> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.229.226.129;branch=z9hG4bK8705.cb96b3e28527b9d40ae8be2cb28254b8.0\r\nVia: SIP/2.0/UDP 185.229.226.124:5065;received=185.229.226.124;rport=5065;branch=z9hG4bK3UXD0gjc"..., len=431, rcv_info=0x7ffd77df2ee0) at core/receive.c:364 msg = 0x7fec4c371bb8 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {0, 0, 0, 0, 167503724544, 94305829078304, 140726614568680, 0}, __mask_was_saved = 12, __saved_mask = {__val = {381479945, 94305822244672, 140726614570384, 140726614568464, 94305822874864, 0, 167503724544, 94305829078304, 140726614568672, 140726614568448, 94305822870102, 119, 94305822870238, 140652867531000, 140652867531000, 0}}}}} bctx = 0x0 ret = 0 stats_on = 0 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 0, tz_dsttime = 0} diff = 0 inb = { s = 0x55c549704520 <buf> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.229.226.129;branch=z9hG4bK8705.cb96b3e28527b9d40ae8be2cb28254b8.0\r\nVia: SIP/2.0/UDP 185.229.226.124:5065;received=185.229.226.124;rport=5065;branch=z9hG4bK3UXD0gjc"..., len = 431} netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0} keng = 0x0 evp = {data = 0x7ffd77df2ce0, rcv = 0x7ffd77df2ee0, dst = 0x0} errsipmsg = 0 __func__ = "receive_msg" #6 0x000055c549131626 in udp_rcv_loop () at core/udp_server.c:554 len = 431 buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.229.226.129;branch=z9hG4bK8705.cb96b3e28527b9d40ae8be2cb28254b8.0\r\nVia: SIP/2.0/UDP 185.229.226.124:5065;received=185.229.226.124;rport=5065;branch=z9hG4bK3UXD0gjcc"... tmp = 0x55c549714520 <buff> "79.176.51.21" from = 0x7fec4c34b0f8 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {5263983340904337490, 8424}, addr32 = {1915572306, 1225616629, 8424, 0}, addr16 = {20562, 29229, 27893, 18701, 8424, 0, 0, 0}, addr = "RP-r\365l\rI\350 \000\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {2179130809, 0}, addr32 = {2179130809, 0, 0, 0}, addr16 = {58809, 33250, 0, 0, 0, 0, 0, 0}, addr = "\271\345\342\201", '\000' <repeats 11 times>}}, src_port = 60417, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\354\001RP-r\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 492, sin_addr = {s_addr = 1915572306}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 2, sin6_port = 492, sin6_flowinfo = 1915572306, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7fec4c30a5a0, proto = 1 '\001'} evp = {data = 0x0, rcv = 0x0, dst = 0x0} printbuf = "02\337w\375\177\000\000\211\256\356L\354\177\000\000\001\200\255\373\000\000\000\000\060\062\337w\375\177\000\000\060\062\337w\002\000\000\000(\335\061L\354\177\000\000\060\062\337w\375\177\000\000\000A\037H\035\347\317\025\257\062\337w\375\177\000\000@\205\366\a\354\177\000\000@\377\bI\305U\000\000\220\065\337w\375\177", '\000' <repeats 18 times>, "@0\337w\375\177\000\000\341\357\035I\305U", '\000' <repeats 38 times>, "\002\000\000\000\350\344\061L\002\000\000\000\377\377\377\377\377\377\377\377", '\000' <repeats 16 times>... i = 0 j = 0 l = 2 __func__ = "udp_rcv_loop" #7 0x000055c54909d1ad in main_loop () at main.c:1619 i = 1 ---Type <return> to continue, or q <return> to quit--- pid = 0 si = 0x7fec4c30a5a0 si_desc = "udp receiver child=1 sock=185.229.226.129:5060\000\000 %CI\305U\000\000\000A\037H\035\347\317\025\004\000\000\000\000\000\000\000\t\354\274\026\000\000\000\000@\377\bI\305U\000\000\220\065\337w\375\177", '\000' <repeats 18 times>, "\320\062\337w\375\177\000\000\305\b*I\305U\000" nrprocs = 4 woneinit = 1 __func__ = "main_loop" #8 0x000055c5490a52e6 in main (argc=13, argv=0x7ffd77df3598) at main.c:2642 cfg_stream = 0x55c54a8e1010 c = -1 r = 0 tmp = 0x7ffd77df4eb0 "" tmp_len = 2011116656 port = 32765 proto = 2011116752 options = 0x55c54940d8f8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 617811268 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x0 p = 0xffffffff <error: Cannot access memory at address 0xffffffff> st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = { tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} __func__ = "main"
pgpMSwz6hYCn6.pgp
Description: Firma digital OpenPGP
_______________________________________________ Kamailio (SER) - Users Mailing List [email protected] https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
