Hi all

A customer of mine has some crashes every week. We installed the dbg and
finally generated a core. 

Bt full attached.

Kamailio installed from kamailio deb 5.1 repos

 kamailio -V
version: kamailio 5.1.7 (x86_64/linux) 
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS,
 DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC,
 Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX,
 FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR,
 USE_DST_BLACKLIST, HAVE_RESOLV_RES ADAPTIVE_WAIT_LOOPS=1024,
 MAX_RECV_BUFFER_SIZE 262144 MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT
 PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
 id: unknown compiled with gcc 6.3.0


Any hints?


thanks,

Jon



-- 
https://pekepbx.com
https://www.issabel.com/multitenant
root@tlv-kam02-new:/var/cores# gdb /usr/sbin/kamailio 
core-kamailio-11-107-111-648-1552740502
GNU gdb (Debian 7.12-6) 7.12.0.20161007-git
Copyright (C) 2016 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from 
/usr/lib/debug/.build-id/eb/181e1d1015154e0e5a4c44e5964881071e54c3.debug...done.
done.
[New LWP 648]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f 
/etc/kamailio/kamailio.'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007fec4b65ecfa in t_should_relay_response (Trans=0x7fec09448478, 
new_code=200, branch=0, should_store=0x7ffd77df2744, 
should_relay=0x7ffd77df2740, cancel_data=0x7ffd77df2930, reply=0x7fec4c371bb8)
    at t_reply.c:1282
1282    t_reply.c: No such file or directory.
(gdb) bt full
#0  0x00007fec4b65ecfa in t_should_relay_response (Trans=0x7fec09448478, 
new_code=200, branch=0, should_store=0x7ffd77df2744, 
should_relay=0x7ffd77df2740, cancel_data=0x7ffd77df2930, reply=0x7fec4c371bb8)
    at t_reply.c:1282
        branch_cnt = 32765
        picked_code = 32765
        new_branch = 16663
        inv_through = 0
        extra_flags = 2011113200
        i = 0
        replies_dropped = 0
        __func__ = "t_should_relay_response"
#1  0x00007fec4b6634e3 in relay_reply (t=0x7fec09448478, p_msg=0x7fec4c371bb8, 
branch=0, msg_status=200, cancel_data=0x7ffd77df2930, do_put_on_wait=1) at 
t_reply.c:1786
        relay = 1023064
        save_clone = 0
        buf = 0x0
        res_len = 0
        relayed_code = 0
        relayed_msg = 0x0
        reply_bak = 0x55c54931b2a2 <qm_malloc+2331>
        bm = {to_tag_val = {s = 0x1 <error: Cannot access memory at address 
0x1>, len = 155485760}}
        totag_retr = 0
        reply_status = 32748
        uas_rb = 0x7ffd77df2840
        to_tag = 0x15cfe71d00000000
        reason = {s = 0x55c5494a4550 "core", len = 1210007808}
        onsend_params = {req = 0x7ffd77df2800, rpl = 0x7fec4b64dc39 
<futex_get+40>, param = 0x30, code = 155485760, flags = 32748, branch = 0, 
t_rbuf = 0x600000000, dst = 0x481f4100, send_buf = {
            s = 0x7ffd77df28b0 "\001", len = 381479945}}
        ip = {af = 2011113504, len = 32765, u = {addrl = {140652853918523, 0}, 
addr32 = {1264909115, 32748, 0, 0}, addr16 = {64315, 19300, 32748, 0, 0, 0, 0, 
0}, 
            addr = ";\373dK\354\177\000\000\000\000\000\000\000\000\000"}}
        __func__ = "relay_reply"
#2  0x00007fec4b669430 in reply_received (p_msg=0x7fec4c371bb8) at 
t_reply.c:2513
        msg_status = 200
        last_uac_status = 200
        ack = 0x7fec4c27a010 "\001"
        ack_len = 21957
        branch = 0
        reply_status = 1225326400
        onreply_route = 1
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 
0x0, len = 8}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 8}}}}
        uac = 0x7fec09448688
        t = 0x7fec09448478
        lack_dst = {send_sock = 0x55c54908ff40 <_start>, to = {s = {sa_family = 
13712, sa_data = "\337w\375\177\000\000\317FpI\305U\000"}, sin = {sin_family = 
13712, sin_port = 30687, sin_addr = {
                s_addr = 32765}, sin_zero = "\317FpI\305U\000"}, sin6 = 
{sin6_family = 13712, sin6_port = 30687, sin6_flowinfo = 32765, sin6_addr = 
{__in6_u = {
                  __u6_addr8 = "\317FpI\305U\000\000\203FpI\305U\000", 
__u6_addr16 = {18127, 18800, 21957, 0, 18051, 18800, 21957, 0}, __u6_addr32 = 
{1232094927, 21957, 1232094851, 21957}}}, 
              sin6_scope_id = 2011114048}}, id = 32765, proto = 26 '\032', 
send_flags = {f = 18740, blst_imask = 21957}}
        backup_user_from = 0x55c5497b8950 <def_list+16>
        backup_user_to = 0x55c5497b8958 <def_list+24>
        backup_domain_from = 0x55c5497b8960 <def_list+32>
        backup_domain_to = 0x55c5497b8968 <def_list+40>
        backup_uri_from = 0x55c5497b8940 <def_list>
        backup_uri_to = 0x55c5497b8948 <def_list+8>
        backup_xavps = 0x55c549703b18 <_xavp_list_head>
        replies_locked = 1
        branch_ret = 331989552
        prev_branch = 13
        blst_503_timeout = 29
        hf = 0x54948e2c0
        onsend_params = {req = 0x6a, rpl = 0x55c54939599c 
<parse_method_name+2712>, param = 0x7fec4c350af8, code = 1278544616, flags = 
32748, branch = 0, t_rbuf = 0x0, dst = 0x54948e2c0, send_buf = {
            s = 0x7ffd77df2a40 "P+\337w\375\177", len = 381479945}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = 
{{__jmpbuf = {381479945, 7379563515610244877, 94305822244672, 140726614570384, 
0, 0, 7379563515622827789, 3609921287363733261}, 
              __mask_was_saved = 0, __saved_mask = {__val = {381479945, 
18405195584, 140652867689400, 0, 1571728907925668096, 140726614567760, 
94305825319499, 1023064, 8, 107, 1571728907925668096, 
                  140726614567584, 140652867544912, 94305829013199, 
94305829013101, 140726614567760}}}}}
---Type <return> to continue, or q <return> to quit---
        bctx = 0xb07f30
        keng = 0x0
        __func__ = "reply_received"
#3  0x000055c5491d2d0b in do_forward_reply (msg=0x7fec4c371bb8, mode=0) at 
core/forward.c:747
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' 
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 
0}, sin_zero = "\000\000\000\000\000\000\000"}, 
            sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, 
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = 
{0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, 
              sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 
0, blst_imask = 0}}
        new_len = 1278544592
        r = 1
        ip = {af = 1275517517, len = 32748, u = {addrl = {4294967296, 31}, 
addr32 = {0, 1, 31, 0}, addr16 = {0, 0, 1, 0, 31, 0, 0, 0}, addr = 
"\000\000\000\000\001\000\000\000\037\000\000\000\000\000\000"}}
        s = 0x7ffd77df2b68 ""
        len = 32748
        __func__ = "do_forward_reply"
#4  0x000055c5491d4b28 in forward_reply (msg=0x7fec4c371bb8) at 
core/forward.c:852
No locals.
#5  0x000055c549220643 in receive_msg (
    buf=0x55c549704520 <buf> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 
185.229.226.129;branch=z9hG4bK8705.cb96b3e28527b9d40ae8be2cb28254b8.0\r\nVia: 
SIP/2.0/UDP 
185.229.226.124:5065;received=185.229.226.124;rport=5065;branch=z9hG4bK3UXD0gjc"...,
 len=431, rcv_info=0x7ffd77df2ee0) at core/receive.c:364
        msg = 0x7fec4c371bb8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = 
{{__jmpbuf = {0, 0, 0, 0, 167503724544, 94305829078304, 140726614568680, 0}, 
__mask_was_saved = 12, __saved_mask = {__val = {381479945, 
                  94305822244672, 140726614570384, 140726614568464, 
94305822874864, 0, 167503724544, 94305829078304, 140726614568672, 
140726614568448, 94305822870102, 119, 94305822870238, 140652867531000, 
                  140652867531000, 0}}}}}
        bctx = 0x0
        ret = 0
        stats_on = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        diff = 0
        inb = {
          s = 0x55c549704520 <buf> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 
185.229.226.129;branch=z9hG4bK8705.cb96b3e28527b9d40ae8be2cb28254b8.0\r\nVia: 
SIP/2.0/UDP 
185.229.226.124:5065;received=185.229.226.124;rport=5065;branch=z9hG4bK3UXD0gjc"...,
 len = 431}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffd77df2ce0, rcv = 0x7ffd77df2ee0, dst = 0x0}
        errsipmsg = 0
        __func__ = "receive_msg"
#6  0x000055c549131626 in udp_rcv_loop () at core/udp_server.c:554
        len = 431
        buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 
185.229.226.129;branch=z9hG4bK8705.cb96b3e28527b9d40ae8be2cb28254b8.0\r\nVia: 
SIP/2.0/UDP 
185.229.226.124:5065;received=185.229.226.124;rport=5065;branch=z9hG4bK3UXD0gjcc"...
        tmp = 0x55c549714520 <buff> "79.176.51.21"
        from = 0x7fec4c34b0f8
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {5263983340904337490, 
8424}, addr32 = {1915572306, 1225616629, 8424, 0}, addr16 = {20562, 29229, 
27893, 18701, 8424, 0, 0, 0}, 
              addr = "RP-r\365l\rI\350 \000\000\000\000\000"}}, dst_ip = {af = 
2, len = 4, u = {addrl = {2179130809, 0}, addr32 = {2179130809, 0, 0, 0}, 
addr16 = {58809, 33250, 0, 0, 0, 0, 0, 0}, 
              addr = "\271\345\342\201", '\000' <repeats 11 times>}}, src_port 
= 60417, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s 
= {sa_family = 2, 
              sa_data = "\354\001RP-r\000\000\000\000\000\000\000"}, sin = 
{sin_family = 2, sin_port = 492, sin_addr = {s_addr = 1915572306}, sin_zero = 
"\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 2, sin6_port = 492, sin6_flowinfo = 1915572306, 
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = 
{0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 
                    0}}}, sin6_scope_id = 0}}, bind_address = 0x7fec4c30a5a0, 
proto = 1 '\001'}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        printbuf = 
"02\337w\375\177\000\000\211\256\356L\354\177\000\000\001\200\255\373\000\000\000\000\060\062\337w\375\177\000\000\060\062\337w\002\000\000\000(\335\061L\354\177\000\000\060\062\337w\375\177\000\000\000A\037H\035\347\317\025\257\062\337w\375\177\000\000@\205\366\a\354\177\000\000@\377\bI\305U\000\000\220\065\337w\375\177",
 '\000' <repeats 18 times>, "@0\337w\375\177\000\000\341\357\035I\305U", '\000' 
<repeats 38 times>, 
"\002\000\000\000\350\344\061L\002\000\000\000\377\377\377\377\377\377\377\377",
 '\000' <repeats 16 times>...
        i = 0
        j = 0
        l = 2
        __func__ = "udp_rcv_loop"
#7  0x000055c54909d1ad in main_loop () at main.c:1619
        i = 1
---Type <return> to continue, or q <return> to quit---
        pid = 0
        si = 0x7fec4c30a5a0
        si_desc = "udp receiver child=1 sock=185.229.226.129:5060\000\000 
%CI\305U\000\000\000A\037H\035\347\317\025\004\000\000\000\000\000\000\000\t\354\274\026\000\000\000\000@\377\bI\305U\000\000\220\065\337w\375\177",
 '\000' <repeats 18 times>, "\320\062\337w\375\177\000\000\305\b*I\305U\000"
        nrprocs = 4
        woneinit = 1
        __func__ = "main_loop"
#8  0x000055c5490a52e6 in main (argc=13, argv=0x7ffd77df3598) at main.c:2642
        cfg_stream = 0x55c54a8e1010
        c = -1
        r = 0
        tmp = 0x7ffd77df4eb0 ""
        tmp_len = 2011116656
        port = 32765
        proto = 2011116752
        options = 0x55c54940d8f8 
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 617811268
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0xffffffff <error: Cannot access memory at address 0xffffffff>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, 
st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 
0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {
            tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, 
__glibc_reserved = {0, 0, 0}}
        __func__ = "main"

Attachment: pgpMSwz6hYCn6.pgp
Description: Firma digital OpenPGP

_______________________________________________
Kamailio (SER) - Users Mailing List
[email protected]
https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users

Reply via email to