Hi Henning

Since you have mentioned the crash was due to carrierroute, I checked our
carrierroute table and noticed we are importing carrierroute from another
DB in intervals. Due to a bug we are trying to import carrierroute records
for domains that were deleted though they are marked as deleted in our DB
as well. After fixing those imports, I don't see any crashes related to
carrierroute but still had one crash last week. I couldn't find any details
in the core dump. Hence monitoring the servers for now. I will update if
kamailio crashes again.

Thank you again for pointing to the right direction.

Regards

*Maharaja Azhagiah*






On Wed, Aug 14, 2024 at 4:21 AM Henning Westerholt <[email protected]> wrote:

> Hello,
>
>
>
> thanks for reproducing it with a recent version. Could you maybe share
> (privately by e-mail) the routing data SQL dump that we reproduce it? Feel
> free to remove any private information like host names etc.., as long as it
> keeps crashing its fine.
>
>
>
> Cheers,
>
>
>
> Henning
>
>
>
> --
>
> Henning Westerholt – https://skalatan.de/blog/
>
> Kamailio services – https://gilawa.com
>
>
>
> *From:* Maharaja Azhagiah <[email protected]>
> *Sent:* Mittwoch, 14. August 2024 03:50
> *To:* Henning Westerholt <[email protected]>
> *Cc:* Kamailio (SER) - Users Mailing List <[email protected]>
> *Subject:* Re: [SR-Users] kamailio randomly crashes
>
>
>
> Hi all
>
>
>
> Could you please help with this core dump? Kamailio crashes frequently
> after the upgrade. Atleast once a day.
>
> Maharaja Azhagiah
>
>
>
> Sent from my iPhone
>
>
>
> On Aug 9, 2024, at 14:27, Maharaja Azhagiah <[email protected]> wrote:
>
> 
>
> Hi Henning, Hello all
>
>
>
> I have updated kamailio to 5.8.2 and I still see the crash during reload
> of carrierroute module.
>
>
>
> kamailio version:
>
>
>
> version: kamailio 5.8.2 (x86_64/linux) 164d1e
> flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS,
> DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, MEM_JOIN_FREE,
> Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX,
> FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR,
> USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
> ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144,
> MAX_SEND_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT
> PKG_SIZE 8MB
> poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
> id: 164d1e
> compiled on 17:00:04 Aug  8 2024 with gcc 8.3.0
>
>
>
>
>
> core dump backtrace:
>
>
>
> Program terminated with signal SIGSEGV, Segmentation fault.
> #0  load_route_data_db (rd=0x789fcce42c20) at cr_db.c:432
> 432 if(rd->carriers[i]->domains[j]->sum_prob == 0.0) {
> (gdb) bt full
> #0  load_route_data_db (rd=0x789fcce42c20) at cr_db.c:432
>         res = 0x78a049e3e4a0
>         row = 0x78a049e43070
>         i = 0
>         j = 109
>         ret = 59
>         tmp_carrier_data = 0x789fd380f9a0
>         query_str = {s = 0x789fc84fda40 <query> "SELECT DISTINCT domain
> FROM carrierroute WHERE carrier=1000", len = 59}
>         tmp_scan_prefix = {s = 0x5ba512e96630 "12345", len = 5}
>         tmp_rewrite_host = {s = 0x5ba512e9663c 
> "127.0.0.100:9000;transport=udp",
> len = 30}
>         tmp_rewrite_prefix = {s = 0x5ba512e9665d "444", len = 3}
>         tmp_rewrite_suffix = {s = 0x5ba512e96661 "555", len = 3}
>         tmp_host_name = {s = 0x40 <error: Cannot access memory at address
> 0x40>, len = -928288768}
>         tmp_reply_code = {s = 0x789fc84ee1c0 <__func__.5976>
> "reload_route_data", len = -934355152}
>         tmp_comment = {s = 0x5ba512e96665 "IMPORTED  -
> kanchan_route_rule", len = 30}
>         p_tmp_comment = 0x7fff3d14f8b0
>         __func__ = "load_route_data_db"
>         n = 0
> #1  0x0000789fc84aaccd in reload_route_data () at cr_data.c:187
>         old_data = 0x5ba512e4d010
>         new_data = 0x789fcce42c20
>         i = 23461
>         __func__ = "reload_route_data"
> #2  0x0000789fc84ca080 in cr_rpc_reload_routes (rpc=0x78a049326c80
> <func_param>, c=0x78a049326ba0 <_jsonrpc_ctx_global>) at cr_rpc.c:64
>         __func__ = "cr_rpc_reload_routes"
> #3  0x000078a049306e08 in jsonrpc_exec_ex (cmd=0x7fff3d14fce0, rpath=0x0,
> spath=0x0) at jsonrpcs_mod.c:1588
>         rpce = 0x78a049e3d6f0
>         ctx = 0x78a049326ba0 <_jsonrpc_ctx_global>
>         ret = -1
>         nj = 0x0
>         val = {s = 0x5ba512cfcc10 "cr.reload_routes", len = 16}
>         scmd = {s = 0x78a049bb09e0 "{\"jsonrpc\": \"2.0\", \"method\":
> \"cr.reload_routes\", \"id\": 2}", len = 57}
>         rdata = 0
>         mode = 1234975676
>         __func__ = "jsonrpc_exec_ex"
> #4  0x000078a049307244 in jsonrpc_exec (msg=0x78a049e2d200,
> cmd=0x78a049be54f0 "\340\t\273I\240x", s2=0x0) at jsonrpcs_mod.c:1609
>         scmd = {s = 0x78a049bb09e0 "{\"jsonrpc\": \"2.0\", \"method\":
> \"cr.reload_routes\", \"id\": 2}", len = 57}
>         __func__ = "jsonrpc_exec"
> #5  0x00005ba511455344 in do_action (h=0x7fff3d150610, a=0x78a049be52a0,
> msg=0x78a049e2d200) at core/action.c:1127
>         ret = -5
>         li = 5010672
>         v = 4526144
>         dst = {send_sock = 0x20, to = {s = {sa_family = 28672, sa_data =
> "\253\310\237x\000\000Vw#I\240x\000"}, sin = {sin_family = 28672, sin_port
> = 51371, sin_addr = {s_addr = 30879}, sin_zero = "Vw#I\240x\000"}, sin6 =
> {sin6_family = 28672, sin6_port = 51371,
>               sin6_flowinfo = 30879, sin6_addr = {__in6_u = {__u6_addr8 =
> "Vw#I\240x\000\000\000\001\000\000\000\000\000", __u6_addr16 = {30550,
> 18723, 30880, 0, 256, 0, 0, 0}, __u6_addr32 = {1227061078, 30880, 256,
> 0}}}, sin6_scope_id = 0}, sas = {ss_family = 28672,
>               __ss_padding =
> "\253\310\237x\000\000Vw#I\240x\000\000\000\001", '\000' <repeats 22
> times>,
> "\002\000\000\000D\000\000\000eWr\021\245[\000\000\020\002\025=\377\177\000\000\020\220\235I\240x\000\000\020\345\343I\240x\000\000\020\220\235I\240x\000\000P\002\025=\377\177\000\000`\357+I\240x\000\000\020\345\343I\240x\000\000\000\000\000\000\000\000\000",
> __ss_align = 134217728}}, id = 129691584, send_flags = {f = 0, blst_imask =
> 0}, proto = -112 '\220', proto_pad0 = -14 '\362', proto_pad1 = 51}
>         tmp = 0x7fff3d150400 "\220\005\025=\377\177"
>         new_uri = 0x0
>         end = 0x789fc8ab7000 ""
>         crt = 0x78a00000000f ""
>         cmd = 0x78a049b686f8
>         len = 30880
>         user = 1225632696
>         uri = {user = {s = 0x8000000 <error: Cannot access memory at
> address 0x8000000>, len = 294227363}, passwd = {s = 0x7fff3d150070 "", len
> = 292717502}, host = {s = 0x78a04925aa30 "tm", len = 292815521}, port = {s
> = 0x7fff3d150080 "\240\344\343I\b", len = 0},
>           params = {s = 0x0, len = 0}, sip_params = {s = 0x789fd380fa70
> "\300\300\300\300", len = 0}, headers = {s = 0x0, len = 0}, port_no =
> 58528, proto = 18915, type = 8, flags = (unknown: 3548445248), transport =
> {s = 0x0, len = 0}, ttl = {
>             s = 0x789fd380fa70 "\300\300\300\300", len = -746522648},
> user_param = {s = 0x7fff3d1502a0 "\353[\214\021\245[", len = 289836420},
> maddr = {s = 0x16e00000000 <error: Cannot access memory at address
> 0x16e00000000>, len = -746514208}, method = {
>             s = 0x789fd380fa70 "\300\300\300\300", len = -746513728}, lr =
> {s = 0x1 <error: Cannot access memory at address 0x1>, len = 293855368}, r2
> = {s = 0x0, len = -2147483648}, gr = {s = 0x408000000 <error: Cannot access
> memory at address 0x408000000>,
>             len = 294409814}, transport_val = {s = 0x7fff3d150140
> "\360\001\025=\377\177", len = 290331077}, ttl_val = {s = 0x7fff3d150200
> "\020\345\343I\240x", len = 293063450}, user_param_val = {s = 0x8000000
> <error: Cannot access memory at address 0x8000000>,
>             len = 293855368}, maddr_val = {s = 0x7fff3d1501f0
> "P\002\025=\377\177", len = 290351217}, method_val = {s = 0x1 <error:
> Cannot access memory at address 0x1>, len = 1238894608}, lr_val = {s =
> 0x789fc839852d "", len = -935754475}, r2_val = {
>             s = 0x7fff3d1503e0 "", len = 1024787904}, gr_val = {s =
> 0x78a049237748 <__func__.10408> "str_duplicate", len = 1227061078}}
>         next_hop = {user = {s = 0x78a049e3e7f0 "P", len = 1239671616},
> passwd = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>,
> len = 293855368}, host = {s = 0x0, len = 1235062800}, port = {s = 0x320
> <error: Cannot access memory at address 0x320>,
>             len = 1239671904}, params = {s = 0x7fff3d14ff00
> "\360\001\025=\377\177", len = 293855368}, sip_params = {s = 0x0, len =
> -2147483648}, headers = {s = 0x8000000 <error: Cannot access memory at
> address 0x8000000>, len = 294227363}, port_no = 496,
>           proto = 15637, type = 32767, flags = (unknown: 1226855508),
> transport = {s = 0x4d38129f0 <error: Cannot access memory at address
> 0x4d38129f0>, len = 294334100}, ttl = {s = 0x7fff3d150020 "p", len = 0},
> user_param = {s = 0x789fd38118e0 "\vPH\310\237x",
>             len = -746522000}, maddr = {s = 0x78a049e3e980 "\020", len =
> 1235062800}, method = {s = 0x78a04925aa30 "tm", len = 1227616096}, lr = {s
> = 0x78a04925ab48 <__func__.11229> "insert_tmcb", len = 1227205171}, r2 = {
>             s = 0x30 <error: Cannot access memory at address 0x30>, len =
> -928288768}, gr = {s = 0x33e9d0 <error: Cannot access memory at address
> 0x33e9d0>, len = 4523904}, transport_val = {s = 0x4c74f0 <error: Cannot
> access memory at address 0x4c74f0>, len = 16},
>           ttl_val = {s = 0x21 <error: Cannot access memory at address
> 0x21>, len = 1235062800}, user_param_val = {s = 0x7fff3d14ffe0 " ", len =
> 290364176}, maddr_val = {s = 0x1 <error: Cannot access memory at address
> 0x1>, len = 1}, method_val = {
>             s = 0x6a499dba50 <error: Cannot access memory at address
> 0x6a499dba50>, len = -746509952}, lr_val = {s = 0x13d150020 <error: Cannot
> access memory at address 0x13d150020>, len = -928020096}, r2_val = {s =
> 0x7fff3d150020 "p", len = 292648555}, gr_val = {
> --Type <RET> for more, q to quit, c to continue without paging--c
>             s = 0x0, len = -928020096}}
>         u = 0xc8af8980
>         port = 0
>         dst_host = 0x78a049e2d200
>         i = 0
>         flags = 0
>         avp = 0x5ba5117835c4 <parse_headers+2253>
>         st = {flags = 1, id = 0, name = {n = -3961760297202483200, s = {s
> = 0xc905000000000000 <error: Cannot access memory at address
> 0xc905000000000000>, len = 1024786096}, re = 0xc905000000000000}, avp =
> 0x7fff3d1500b0}
>         sct = 0x499da950
>         sjt = 0x32499da3d0
>         rve = 0x5ba511898da3
>         mct = 0x5499da950
>         rv = 0x0
>         rv1 = 0x7fff3d150490
>         c1 = {cache_type = 1227194491, val_type = 30880, c = {avp_val = {n
> = 1447403978752, s = {s = 0x15100000000 <error: Cannot access memory at
> address 0x15100000000>, len = 1227194784}, re = 0x15100000000}, pval = {rs
> = {s = 0x15100000000 <error: Cannot access memory at address
> 0x15100000000>, len = 1227194784}, ri = 132629817295280, flags =
> 1239671968}}, i2s = "\020\220\235I\240x", '\000' <repeats 15 times>}
>         s = {s = 0x0, len = 0}
>         srevp = {0x7fff3d14ff00, 0x5ba51171d15c <qm_free+7904>}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst =
> 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
> str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
> NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
> 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
> = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
> {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
> data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
> string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
> 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
> len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
> {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
> 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str
> = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #6  0x00005ba511463ab9 in run_actions (h=0x7fff3d150610, a=0x78a049be4420,
> msg=0x78a049e2d200) at core/action.c:1618
>         t = 0x78a049be52a0
>         ret = 1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 1220678640, tz_dsttime = 30880}
>         tdiff = 1239601600
>         __func__ = "run_actions"
> #7  0x0000789fc8393faa in timer_handler (ticks=558041136,
> tl=0x789fcf665990, data=0x789fcf6658a0) at timer.c:216
>         msg = 0x78a049e2d200
>         a = 0x789fcf6658a0
>         ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env =
> {{__jmpbuf = {100764521586824, 5537789872794009978, 0, 2147483648,
> 134217728, 100764521958819, 5537789872844341626, 319322550229959034},
> __mask_was_saved = 0, __saved_mask = {__val = {100764521958819,
> 140734218176272, 132629810783733, 0, 149798025884812256, 6872972461760,
> 132627664605952, 140734218176192, 132627656018865, 1095216660481,
> 132627662081200, 140734218176272, 140734218176224, 132627655829876, 0,
> 140734218176272}}}}}
>         keng = 0x0
>         evname = {s = 0x789fc839816a "timer", len = 5}
>         __func__ = "timer_handler"
> #8  0x00005ba5114e8c93 in slow_timer_main () at core/timer.c:1103
>         n = 12
>         ret = 4294967295
>         tl = 0x789fcf665990
>         i = 7
>         __func__ = "slow_timer_main"
> #9  0x00005ba5113e4aff in main_loop () at main.c:1915
>         i = 16
>         pid = 0
>         si = 0x0
>         si_desc = "udp receiver child=15 sock=10.9.0.28:5101 (
> 35.227.52.202:5101)\000\000\000\000\000\b\000\000\000\000\320\334\332I\240x",
> '\000' <repeats 13 times>,
> "\200\000\000\000\000\000\000\000\b\000\000\000\000\243\215\211\021\245[\000\000\340\t\025=\377\177\000\000d\026\245Q\240x\000"
>         nrprocs = 16
>         woneinit = 1
>         __func__ = "main_loop"
> #10 0x00005ba5113f02d3 in main (argc=8, argv=0x7fff3d150f18) at main.c:3256
>         cfg_stream = 0x5ba512ce2260
>         c = -1
>         r = 0
>         tmp = 0x7fff3d152d84 ""
>         tmp_len = 0
>         port = 5060
>         proto = 0
>         aproto = 0
>         ahost = 0x0
>         aport = 0
>         options = 0x5ba511841378
> ":f:cm:M:dVIhEeb:B:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
>         ret = -1
>         seed = 3317072467
>         rfd = 4
>         debug_save = 0
>         debug_flag = 0
>         dont_fork_cnt = 2
>         n_lst = 0x0
>         p = 0x78a051a9b995 <handle_intel+197>
> "H\205\300uf\213t$\004M\215\216\244"
>         st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid =
> 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0,
> st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0,
> tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0,
> 0, 0}}
>         l1 = 2048
>         tbuf =
> "`\017\025=\377\177\000\000\330K\275Q\240x\000\000\000\000\000\000\000\000\000\000\020+\331Q\240x\000\000\001",
> '\000' <repeats 15 times>,
> "\214#\241Q\240x\000\000(F\330Q\240x\000\000`\016\025=\377\177\000\000\312\224\331Q\240x\000\000\000\000\000\000\000\000\000\000@\205\273Q\240x\000\000\320\323\274Q\240x\000\000\204\016\025=\377\177\000\000\006",
> '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>,
> "\200\037\000\000\377\377", '\000' <repeats 202 times>...
>         option_index = 0
>         long_options = {{name = 0x5ba5118436d6 "help", has_arg = 0, flag =
> 0x0, val = 104}, {name = 0x5ba51183e55c "version", has_arg = 0, flag = 0x0,
> val = 118}, {name = 0x5ba5118436db "alias", has_arg = 1, flag = 0x0, val =
> 1024}, {name = 0x5ba5118436e1 "subst", has_arg = 1, flag = 0x0, val =
> 1025}, {name = 0x5ba5118436e7 "substdef", has_arg = 1, flag = 0x0, val =
> 1026}, {name = 0x5ba5118436f0 "substdefs", has_arg = 1, flag = 0x0, val =
> 1027}, {name = 0x5ba5118436fa "server-id", has_arg = 1, flag = 0x0, val =
> 1028}, {name = 0x5ba511843704 "loadmodule", has_arg = 1, flag = 0x0, val =
> 1029}, {name = 0x5ba51184370f "modparam", has_arg = 1, flag = 0x0, val =
> 1030}, {name = 0x5ba511843718 "log-engine", has_arg = 1, flag = 0x0, val =
> 1031}, {name = 0x5ba511843723 "debug", has_arg = 1, flag = 0x0, val =
> 1032}, {name = 0x5ba511843729 "cfg-print", has_arg = 0, flag = 0x0, val =
> 1033}, {name = 0x5ba511843733 "atexit", has_arg = 1, flag = 0x0, val =
> 1034}, {name = 0x5ba51184373a "all-errors", has_arg = 0, flag = 0x0, val =
> 1035}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
>         __func__ = "main"
> (gdb) list
> 427 }
> 428 } while(RES_ROW_N(res) > 0);
> 429
> 430 for(i = 0; i < rd->carrier_num; ++i) {
> 431 for(j = 0; j < rd->carriers[i]->domain_num; ++j) {
> 432 if(rd->carriers[i]->domains[j]->sum_prob == 0.0) {
> 433 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d "
> 434   "(%.*s) have probability 0.\n",
> 435 rd->carriers[i]->id, rd->carriers[i]->name->len,
> 436 rd->carriers[i]->name->s,
> (gdb)
>
>
>
> I couldn't understand what exactly is wrong with the carrierroute module.
>
>
>
> Thank you for your help in advance.
>
> Regards
>
> *Maharaja Azhagiah*
>
>
>
>
>
>
>
>
>
>
>
> On Wed, Jul 24, 2024 at 3:28 AM Henning Westerholt <[email protected]> wrote:
>
> Hello,
>
>
>
> my suggestion would be to do an update to e.g. 5.8.2, as the version 5.4.9
> is long end of life. It crashed during a routing reload for carrierroute
> module.
>
> If you are still seeing crashes after the update, please let us know.
>
>
>
> Cheers,
>
>
>
> Henning
>
>
>
> --
>
> Henning Westerholt – https://skalatan.de/blog/
>
> Kamailio services – https://gilawa.com
>
>
>
> *From:* Maharaja Azhagiah via sr-users <[email protected]>
> *Sent:* Dienstag, 23. Juli 2024 21:50
> *To:* Kamailio (SER) - Users Mailing List <[email protected]>
> *Cc:* Maharaja Azhagiah <[email protected]>
> *Subject:* [SR-Users] kamailio randomly crashes
>
>
>
> Hi all,
>
>
>
> I have kamailio running in GKE (Google Kubernetes) and recently seeing
> kamailio crashes frequently and I couldn't find the reason for the crash
>
>
>
> kamailio version
>
>
>
> version: kamailio 5.4.9 (x86_64/linux) 7d022d
> flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS,
> DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC,
> F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT,
> USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST,
> HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
> ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024,
> BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
> poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
> id: 7d022d
> compiled on 14:26:30 Jul 10 2024 with gcc 8.3.0
>
>
>
> kamailio core generation:
>
>
>
> Core was generated by `kamailio -e -E -DD -M 128 -m 2048'.
> Program terminated with signal SIGSEGV, Segmentation fault.
> #0  load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416
> 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) {
>
>
>
> bt:
>
>
>
> (gdb) bt
> #0  load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416
> #1  0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178
> #2  0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0
> <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59
> #3  0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0)
> at jsonrpcs_mod.c:1425
> #4  0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8,
> cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445
> #5  0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50,
> msg=0x7ca4f641a9f8) at core/action.c:1085
> #6  0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468,
> msg=0x7ca4f641a9f8) at core/action.c:1584
> #7  0x00007ca474b92f8d in timer_handler (ticks=96802941,
> tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216
> #8  0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105
> #9  0x00005745eb3a85bd in main_loop () at main.c:1765
> #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942
>
>
>
>
>
> bt full:
>
>
>
> (gdb) bt full
> #0  load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416
>         res = 0x7ca4f636a4a8
>         row = 0x7ca4f642a7f8
>         i = 0
>         j = 110
>         ret = 56
>         tmp_carrier_data = 0x7ca479ff5068
>         query_str = {s = 0x7ca474cdd800 <query> "SELECT DISTINCT domain
> FROM carrierroute WHERE carrier=8", len = 56}
>         tmp_scan_prefix = {s = 0x5745ed889f68 "13235791374", len = 11}
>         tmp_rewrite_host = {s = 0x5745ed889f7a "sip.telnyx.com;transport=TLS",
> len = 28}
>         tmp_rewrite_prefix = {s = 0x5745ed889f99 "", len = 0}
>         tmp_rewrite_suffix = {s = 0x5745ed889f9a "", len = 0}
>         tmp_host_name = {s = 0x40 <error: Cannot access memory at address
> 0x40>, len = 1965559808}
>         tmp_reply_code = {s = 0x7ca474ccf2b0 <__func__.5843>
> "reload_route_data", len = 1959587872}
>         tmp_comment = {s = 0x5745ed889f9b "IMPORTED  - WTJHSX", len = 18}
>         p_tmp_comment = 0x7ffd774f30b0
>         __func__ = "load_route_data_db"
>         n = 0
> #1  0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178
>         old_data = 0x5745ed850150
>         new_data = 0x7ca482a48840
>         i = 22341
>         __func__ = "reload_route_data"
> #2  0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0
> <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59
>         __func__ = "cr_rpc_reload_routes"
> #3  0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0)
> at jsonrpcs_mod.c:1425
>         rpce = 0x7ca4f6425fb8
>         ctx = 0x7ca4f5a329c0 <_jsonrpc_ctx_global>
>         ret = -1
>         nj = 0x0
>         val = {s = 0x5745ed845010 "cr.reload_routes", len = 16}
>         scmd = {s = 0x7ca4f61bdd78 "{\"jsonrpc\": \"2.0\", \"method\":
> \"cr.reload_routes\", \"id\": 2}", len = 57}
>         __func__ = "jsonrpc_exec_ex"
> #4  0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8,
> cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445
>         scmd = {s = 0x7ca4f61bdd78 "{\"jsonrpc\": \"2.0\", \"method\":
> \"cr.reload_routes\", \"id\": 2}", len = 57}
>         __func__ = "jsonrpc_exec"
> #5  0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50,
> msg=0x7ca4f641a9f8) at core/action.c:1085
>         ret = -5
>         v = 0
>         dst = {send_sock = 0x0, to = {s = {sa_family = 41744, sa_data =
> "6\366\244|\000\000\035u\271t\244|\000"}, sin = {sin_family = 41744,
> sin_port = 63030, sin_addr = {s_addr = 31908}, sin_zero =
> "\035u\271t\244|\000"},
>             sin6 = {sin6_family = 41744, sin6_port = 63030, sin6_flowinfo
> = 31908, sin6_addr = {__in6_u = {__u6_addr8 =
> "\035u\271t\244|\000\000\005u\271t\244|\000", __u6_addr16 = {29981, 29881,
> 31908, 0, 29957, 29881,
>                     31908, 0}, __u6_addr32 = {1958311197, 31908,
> 1958311173, 31908}}}, sin6_scope_id = 2001680800}, sas = {ss_family = 41744,
>               __ss_padding =
> "6\366\244|\000\000\035u\271t\244|\000\000\005u\271t\244|\000\000\240\071Ow\375\177\000\000/.:\365\244|\000\000\320:Ow\375\177\000\000\327\337j\353EW\000\000\320\071Ow\375\177\000\000\020@
> \016\366\244|\000\000\030\245\066\366\244|\000\000\020@\016\366\244|\000\000\020:Ow\375\177\000\000\356u\236\365\244|\000\000\030\245\066\366\244|\000\000\000\000\000\000\000\000\000",
> __ss_align = 134217728}}, id = 130848392,
>           send_flags = {f = 0, blst_imask = 0}, proto = 56 '8', proto_pad0
> = 5 '\005', proto_pad1 = 36}
>         tmp = 0x7ca4f641a9f8 "\344\032"
>         new_uri = 0xed3 <error: Cannot access memory at address 0xed3>
>         end = 0x7ca474b9751b "\r\n"
>         crt = 0x2 <error: Cannot access memory at address 0x2>
>         cmd = 0x7ca4f617b7d8
>         len = 0
>         user = 15
>         uri = {user = {s = 0x9774f3800 <error: Cannot access memory at
> address 0x9774f3800>, len = 621}, passwd = {s = 0x400000000 <error: Cannot
> access memory at address 0x400000000>, len = 1721781302}, host = {s = 0x0,
>             len = -2147483648}, port = {s = 0x8000000 <error: Cannot
> access memory at address 0x8000000>, len = -343946861}, params = {s =
> 0x7ffd774f38e0 "09Ow\375\177", len = -167557169}, sip_params = {
>             s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len =
> -164192016}, headers = {s = 0x1700000000 <error: Cannot access memory at
> address 0x1700000000>, len = 2001681040}, port_no = 14800, proto = 30543,
>           type = 32765, flags = (unknown: 4130775280), transport = {s =
> 0x0, len = 2009201968}, ttl = {s = 0x6774f3a50 <error: Cannot access memory
> at address 0x6774f3a50>, len = -181058744}, user_param = {
>             s = 0x17200000000 <error: Cannot access memory at address
> 0x17200000000>, len = 2099608304}, maddr = {s = 0x7ffd774f3960
> "\035u\271t\244|", len = -344235896}, method = {s = 0x0, len =
> -2147483648}, lr = {
> --Type <RET> for more, q to quit, c to continue without paging--
>             s = 0x8000000 <error: Cannot access memory at address
> 0x8000000>, len = -343946861}, r2 = {s = 0x7ffd774f38d0 "`9Ow\375\177", len
> = -166931844}, gr = {s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|",
>             len = -164192016}, transport_val = {s = 0x7ffd774f3960
> "\035u\271t\244|", len = -181636538}, ttl_val = {s = 0x7ffd774f3930
> "`9Ow\375\177", len = -167555326}, user_param_val = {s = 0x0, len = 2},
> maddr_val = {
>             s = 0x7ca4f60c1f77 <db_mysql_submit_query>
> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, method_val = {s =
> 0x177d6038c8 <error: Cannot access memory at address 0x177d6038c8>, len =
> 2001681040},
>           lr_val = {s = 0xe00000000 <error: Cannot access memory at
> address 0xe00000000>, len = 1958311183}, r2_val = {s = 0x7ffd774f3960
> "\035u\271t\244|", len = -164191464}, gr_val = {
>             s = 0x7ffd774f39f0 "\373\377\377\377", len = -344973614}}
>         next_hop = {user = {s = 0x8000000 <error: Cannot access memory at
> address 0x8000000>, len = -343946861}, passwd = {s = 0x7ffd774f3720
> "\020\070Ow\375\177", len = -166975523}, host = {
>             s = 0x7ffd774f3740 "\020\070Ow\375\177", len = -166887566},
> port = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, params
> = {s = 0x7ffd774f3d50 "", len = -164192016}, sip_params = {s = 0x0,
>             len = -30810208}, headers = {s = 0x0, len = -181051830},
> port_no = 8055, proto = 62988, type = 31908, flags = (unknown: 4128077712),
> transport = {
>             s = 0x4774f37d0 <error: Cannot access memory at address
> 0x4774f37d0>, len = 2001680544}, ttl = {s = 0x669fa379 <error: Cannot
> access memory at address 0x669fa379>, len = -164192016}, user_param = {
>             s = 0x5745ed7743b0 "'sip:[email protected]',NULL,0)",
> len = 1721781302}, maddr = {s = 0x400000000 <error: Cannot access memory at
> address 0x400000000>, len = -167513741}, method = {
>             s = 0x8000000 <error: Cannot access memory at address
> 0x8000000>, len = -343946861}, lr = {s = 0x7ffd774f3810
> "\340\070Ow\375\177", len = -167567737}, r2 = {
>             s = 0x8000000 <error: Cannot access memory at address
> 0x8000000>, len = -343946861}, gr = {s = 0x7ffd774f3810
> "\340\070Ow\375\177", len = -166977673}, transport_val = {s =
> 0x7ca4f60431d0 <sql_str> "@@w\355EW",
>             len = -164192016}, ttl_val = {s = 0x7ffd774f3a90
> "\330\267\027\366\244|", len = 23}, user_param_val = {
>             s = 0x5745ed77417a
> "3071,3795,'6e1a9c34-cec5-4ebb-bcd9-3356d80bcf9e','
> sip:[email protected]','c5SS3F27B8rDN','
> sip:[email protected]','f9b9b2c48ef41ef90eb05056b0a794','tls:
> 10.16.0.74:520"..., len = -164192016}, maddr_val = {s = 0x7ca4f60dcf18
> "`", len = -31060352}, method_val = {s = 0x0, len = -180627954}, lr_val =
> {s = 0x7ca4f60c1f77 <db_mysql_submit_query>
> "UH\211\345AWAVAUATSH\201\354\210",
>             len = -166889584}, r2_val = {s = 0x0, len = 0}, gr_val = {s =
> 0x0, len = 0}}
>         u = 0x7ca4f5817bc8
>         port = 0
>         dst_host = 0x7ca474b9751d
>         i = -344941541
>         flags = 0
>         avp = 0x7ffd774f3c40
>         st = {flags = 3984015424, id = 22341, name = {n = -310010607, s =
> {s = 0x5745ed859d11 "", len = 2001679968}, re = 0x5745ed859d11}, avp =
> 0x66a04c36}
>         sct = 0x60f60e6120
>         sjt = 0x5f60e6a50
>         rve = 0x8000000
>         mct = 0x0
>         rv = 0xffffffff
>         rv1 = 0x5745eb7fc993
>         c1 = {cache_type = 10, val_type = RV_NONE, c = {avp_val = {n = 0,
> s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri =
> 2001679912, flags = 32765}},
>           i2s =
> "`6Ow\375\177\000\000\031\241\a\366\244|\000\000\250\003\000\000\000"}
>         s = {s = 0xffffffff <error: Cannot access memory at address
> 0xffffffff>, len = -164179120}
>         srevp = {0x3, 0x64870454268b4200}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst =
> 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
> str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
> NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
>               data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u
> = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
> 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
>               str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
> 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
> len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
>               number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
> 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
> = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
>             type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s =
> 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #6  0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468,
> msg=0x7ca4f641a9f8) at core/action.c:1584
>         t = 0x7ca4f61f1a50
>         ret = 1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 60, tz_dsttime = 0}
>         tdiff = 4131498432
>         __func__ = "run_actions"
> #7  0x00007ca474b92f8d in timer_handler (ticks=96802941,
> tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216
>         msg = 0x7ca4f641a9f8
>         a = 0x7ca47b2f7868
>         ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env =
> {{__jmpbuf = {95957815091336, 8333654393230933038, 0, 2147483648,
> 134217728, 95957815380371, 8333654393012829230, 2510245087605373998},
>               __mask_was_saved = 0, __saved_mask = {__val =
> {137047930071236, 0, 25985340079663656, 140726605135616, 137045787154760,
> 70721158768, 137045787160648, 140726605135472, 137045776334895,
> 1095350878208,
>                   137045782276504, 140735195070144, 140726605135504,
> 137045776144708, 0, 140726605135552}}}}}
>         keng = 0x0
>         evname = {s = 0x7ca474b9715a "timer", len = 5}
>         __func__ = "timer_handler"
> --Type <RET> for more, q to quit, c to continue without paging--
> #8  0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105
>         n = 12
>         ret = 4294967295
>         tl = 0x7ca47b2f7950
>         i = 1010
>         __func__ = "slow_timer_main"
> #9  0x00005745eb3a85bd in main_loop () at main.c:1765
>         i = 16
>         pid = 0
>         si = 0x0
>         si_desc = "udp receiver child=15 sock=10.16.0.74:5101 (
> 35.202.133.184:5101)\000AOw\375\177\000\000d\366\023\376\244|\000\000
> \000\000\000\060\000\000\000@AOw\375\177\000\000\200@Ow
> \375\177\000\000\000B\213&T\004\207d\223\311\177\353EW\000\000\240\274\065\366\244|\000"
>         nrprocs = 16
>         woneinit = 1
>         __func__ = "main_loop"
> #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942
>         cfg_stream = 0x5745ed74d2a0
>         c = -1
>         r = 0
>         tmp = 0x7ffd774f5d9f ""
>         tmp_len = 0
>         port = 0
>         proto = 0
>         ahost = 0x0
>         aport = 0
>         options = 0x5745eb7b8d78
> ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
>         ret = -1
>         seed = 1555962608
>         rfd = 4
>         debug_save = 0
>         debug_flag = 0
>         dont_fork_cnt = 2
>         n_lst = 0x7ffd77580248
>         p = 0x7ca4fe189995 <handle_intel+197>
> "H\205\300uf\213t$\004M\215\216\244"
>         st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid =
> 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0,
> st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0,
>             tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0},
> __glibc_reserved = {0, 0, 0}}
>         tbuf =
> "\b\000\000\000\000\000\000\000\210FOw\375\177\000\000\320FOw\375\177\000\000\330+,\376\244|\000\000\000\000\000\000\000\000\000\000\020\vH\376\244|\000\000\001",
> '\000' <repeats 19 times>, "
> \000\000\000(&G\376\244|\000\000\320EOw\375\177\000\000\312tH\376\244|\000\000\000\000\000\000\000\000\000\000@e*\376\244|\000\000\320\263+\376\244|\000\000\364EOw\375\177\000\000\006",
> '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>,
> "\200\037\000\000\377\377", '\000' <repeats 186 times>...
>         option_index = 0
>         long_options = {{name = 0x5745eb7baf46 "help", has_arg = 0, flag =
> 0x0, val = 104}, {name = 0x5745eb7b6524 "version", has_arg = 0, flag = 0x0,
> val = 118}, {name = 0x5745eb7baf4b "alias", has_arg = 1, flag = 0x0,
>             val = 1024}, {name = 0x5745eb7baf51 "subst", has_arg = 1, flag
> = 0x0, val = 1025}, {name = 0x5745eb7baf57 "substdef", has_arg = 1, flag =
> 0x0, val = 1026}, {name = 0x5745eb7baf60 "substdefs", has_arg = 1,
>             flag = 0x0, val = 1027}, {name = 0x5745eb7baf6a "server-id",
> has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5745eb7baf74 "loadmodule",
> has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5745eb7baf7f "modparam",
>             has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5745eb7baf88
> "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5745eb7baf93
> "debug", has_arg = 1, flag = 0x0, val = 1032}, {
>             name = 0x5745eb7baf99 "atexit", has_arg = 1, flag = 0x0, val =
> 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
>         __func__ = "main"
>
>
>
>
>
> (gdb) list
> 411 }
> 412 } while(RES_ROW_N(res) > 0);
> 413
> 414 for (i = 0; i < rd->carrier_num; ++i) {
> 415 for (j = 0; j < rd->carriers[i]->domain_num; ++j) {
> 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) {
> 417 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d (%.*s)
> have probability 0.\n",
> 418 rd->carriers[i]->id, rd->carriers[i]->name->len,
> rd->carriers[i]->name->s,
> 419 rd->carriers[i]->domains[j]->id,
> rd->carriers[i]->domains[j]->name->len,
> rd->carriers[i]->domains[j]->name->s);
> 420 }
>
>
>
>
>
> Please help to understand the reason for the crash and how to fix the
> problem.
>
>
>
> Thank you in advance.
>
> Regards
>
> *Maharaja Azhagiah*
>
>
>
>
>
>
>
>
__________________________________________________________
Kamailio - Users Mailing List - Non Commercial Discussions
To unsubscribe send an email to [email protected]
Important: keep the mailing list in the recipients, do not reply only to the 
sender!
Edit mailing list options or unsubscribe:

Reply via email to