Hi Andrei,
below the info:
[root@spsexp ser]# ser -V version: ser 0.9.0 (i386/linux) flags: STATS: Off, EXTRA_DEBUG, USE_IPV6, USE_TCP, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, DBG_QM_MALLOC, FAST_LOCK-ADAPTIVE_WAIT ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535 @(#) $Id: main.c,v 1.197 2004/12/03 19:09:31 andrei Exp $ main.c compiled on 12:42:44 Jan 19 2005 with gcc 3.3
0(0) BUG: qm_*: prev. fragm. tail overwritten(c0c0c000, abcdefed)[0xbd6cee98:0xbd6ceeb0]! 0(0) qm_status (0xbd517000): 0(0) heap size= 33340380 0(0) used= 1586532, used+overhead=1801928, free=31538452 0(0) max used (+overhead)= 1801928 0(0) dumping all alloc'ed. fragments: 0(0) 0. N address=0xbd54b40c frag=0xbd54b3f4 size=4 used=1 0(0) alloc'd from mem/shm_mem.c: shm_mem_init_mallocs(192) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 1. N address=0xbd54b440 frag=0xbd54b428 size=4 used=1 0(0) alloc'd from timer.c: init_timer(57) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 2. N address=0xbd54b474 frag=0xbd54b45c size=4 used=1 0(0) alloc'd from tcp_main.c: init_tcp(1303) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 3. N address=0xbd54b4a8 frag=0xbd54b490 size=4 used=1 0(0) alloc'd from tcp_main.c: init_tcp(1315) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 4. N address=0xbd54b4dc frag=0xbd54b4c4 size=4096 used=1 0(0) alloc'd from tcp_main.c: init_tcp(1326) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 5. N address=0xbd54c50c frag=0xbd54c4f4 size=4096 used=1 0(0) alloc'd from tcp_main.c: init_tcp(1338) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 6. N address=0xbd54d53c frag=0xbd54d524 size=1680 used=1 0(0) alloc'd from main.c: main(1534) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 7. N address=0xbd54dbfc frag=0xbd54dbe4 size=1040 used=1 0(0) alloc'd from sl_stats.c: init_sl_stats(179) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 8. N address=0xbd54e03c frag=0xbd54e024 size=4 used=1 0(0) alloc'd from sl_funcs.c: sl_startup(82) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 9. N address=0xbd54e070 frag=0xbd54e058 size=1572864 used=1 0(0) alloc'd from h_table.c: init_hash_table(323) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 10. N address=0xbd6ce0a0 frag=0xbd6ce088 size=16 used=1 0(0) alloc'd from lock.c: lock_initialize(99) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 11. N address=0xbd6ce0e0 frag=0xbd6ce0c8 size=384 used=1 0(0) alloc'd from timer.c: tm_init_timers(515) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 12. N address=0xbd6ce290 frag=0xbd6ce278 size=40 used=1 0(0) alloc'd from t_stats.c: init_tm_stats(163) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 13. N address=0xbd6ce2e8 frag=0xbd6ce2d0 size=48 used=1 0(0) alloc'd from t_stats.c: init_tm_stats(171) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 14. N address=0xbd6ce348 frag=0xbd6ce330 size=48 used=1 0(0) alloc'd from t_stats.c: init_tm_stats(178) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 15. N address=0xbd6ce3a8 frag=0xbd6ce390 size=48 used=1 0(0) alloc'd from t_stats.c: init_tm_stats(185) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 16. N address=0xbd6ce408 frag=0xbd6ce3f0 size=8 used=1 0(0) alloc'd from t_hooks.c: init_tmcb_lists(58) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 17. N address=0xbd6ce440 frag=0xbd6ce428 size=8 used=1 0(0) alloc'd from ul_callback.c: init_ulcb_list(50) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 18. N address=0xbd6ce478 frag=0xbd6ce460 size=20 used=1 0(0) alloc'd from t_hooks.c: insert_tmcb(93) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 19. N address=0xbd6ce4bc frag=0xbd6ce4a4 size=512 used=1 0(0) alloc'd from domain_mod.c: mod_init(164) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 20. N address=0xbd6ce6ec frag=0xbd6ce6d4 size=512 used=1 0(0) alloc'd from domain_mod.c: mod_init(170) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 21. N address=0xbd6ce91c frag=0xbd6ce904 size=4 used=1 0(0) alloc'd from domain_mod.c: mod_init(179) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 22. N address=0xbd6ce950 frag=0xbd6ce938 size=512 used=1 0(0) alloc'd from hash.c: new_hash_table(44) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 23. N address=0xbd6ceb80 frag=0xbd6ceb68 size=512 used=1 0(0) alloc'd from hash.c: new_hash_table(44) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 24. N address=0xbd6cedb0 frag=0xbd6ced98 size=4 used=1 0(0) alloc'd from trusted.c: init_trusted(124) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 25. N address=0xbd6cede4 frag=0xbd6cedcc size=20 used=1 0(0) alloc'd from hash.c: hash_table_insert(98) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 26. N address=0xbd6cee28 frag=0xbd6cee10 size=16 used=1 0(0) alloc'd from hash.c: hash_table_insert(105) 0(0) start check=f0f0f0f0, end check= c0c0c0c0, abcdefed 0(0) 27. N address=0xbd6cee68 frag=0xbd6cee50 size=24 used=1 0(0) alloc'd from hash.c: hash_table_insert(129) 0(0) start check=f0f0f0f0, end check= c0c0c000, abcdefed 0(0) dumping free list stats : 0(0) hash= 4107. fragments no.: 1, unused: 0 bucket size: 16777216 - 33554432 (first 31752504) 0(0) -----------------------------
If you need other info, tell me, please.
Best Regards,
Verbal ----- Original Message ----- From: "Bogdan-Andrei IANCU" iancu@fokus.fraunhofer.de To: "Francesco Bottà" francesco.botta@eutelia.it Cc: serusers@lists.iptel.org; serdev@lists.iptel.org Sent: Wednesday, January 19, 2005 4:44 PM Subject: Re: [Serusers] Bug with allow_trusted ?
this is not a configuration error , but a memory bug in SER - somewhere is written more than allocated. Please post the whole SER output starting with the BUG message and what SER version you are using- I moved the mail on serdev.
bogdan
Francesco Bottà wrote:
Hi all,
maybe it's a bug in module permissions. I'm trying to use the allow_trusted function to trust my SIP/DSS-1 gateways. Below my conf regarding module permission:
modparam("permissions", "db_url", "mysql://ser:heslo@localhost/ser") modparam("permissions", "db_mode", 1) modparam("permissions", "trusted_table", "trusted")
[skip]
if (search("(User-Agent): Cisco-SIPGateway/IOS-12.x") && (allow_trusted())) { setflag(2); append_hf("P-hint:Trusted_GW\r\n"); route(2); break; };
but SER crashed and below the backtrace of the coredump:
#0 0x0026fc32 in _dl_sysinfo_int80 () from /lib/ld-linux.so.2 #1 0x002ae989 in raise () from /lib/tls/libc.so.6 #2 0x002b0342 in abort () from /lib/tls/libc.so.6 #3 0x08083039 in qm_debug_frag (qm=0xbd4fb000, f=0xbd6b2e98) at mem/q_malloc.c:156 #4 0x08083425 in qm_malloc (qm=0xbd4fb000, size=20, file=0xbf0dcf "hash.c", func=0xbf0e1c "hash_table_insert", line=98) at mem/q_malloc.c:379 #5 0x00beb8b3 in _shm_malloc (size=20, file=0xbf0dcf "hash.c", function=0xbf0e1c "hash_table_insert", line=98) at shm_mem.h:135 #6 0x00beb04d in hash_table_insert (hash_table=0xbd6b2b80, src_ip=0xa1b6c58 "X.X.X.X", proto=0xa1b6c66 "any", pattern=0xa1b6c6a "sip:[0-9]*@X.X.X.X") at hash.c:98 #7 0x00befb4a in reload_trusted_table () at trusted.c:400 #8 0x00beefd4 in init_trusted () at trusted.c:129 #9 0x00bedd33 in mod_init () at permissions.c:459 #10 0x08075260 in init_mod (m=0x8140ce4) at sr_module.c:474 #11 0x080751d8 in init_mod (m=0x8140dd4) at sr_module.c:471 #12 0x080751d8 in init_mod (m=0x8140ec4) at sr_module.c:471 #13 0x080751d8 in init_mod (m=0x8140fb4) at sr_module.c:471 #14 0x080751d8 in init_mod (m=0x81410a4) at sr_module.c:471 #15 0x080751d8 in init_mod (m=0x8141194) at sr_module.c:471 #16 0x080751d8 in init_mod (m=0x8141284) at sr_module.c:471 #17 0x080752f1 in init_modules () at sr_module.c:497 #18 0x0805d197 in main (argc=2, argv=0xbff219d4) at main.c:1553
and here other trace in debug mode:
0(0) Number of rows in trusted table: 2 0(0) qm_malloc(0xbd559000, 20) called from hash.c: hash_table_insert(98) 0(0) qm_malloc(0xbd559000, 20) returns address 0xbd710de4 frag. 0xbd710dcc (size=20) on 1 -th hit 0(0) qm_malloc(0xbd559000, 13) called from hash.c: hash_table_insert(105) 0(0) qm_malloc(0xbd559000, 16) returns address 0xbd710e28 frag. 0xbd710e10 (size=16) on 1 -th hit 0(0) qm_malloc(0xbd559000, 24) called from hash.c: hash_table_insert(129) 0(0) qm_malloc(0xbd559000, 24) returns address 0xbd710e68 frag. 0xbd710e50 (size=24) on 1 -th hit 0(0) Tuple <Y.Y.Y.Y, any, sip:[0-9]*@Y.Y.Y.Y> inserted into trusted hash table 0(0) qm_malloc(0xbd559000, 20) called from hash.c: hash_table_insert(98) 0(0) BUG: qm_*: prev. fragm. tail overwritten(c0c0c000, abcdefed)[0xbd710e98:0xbd710eb0]! 0(0) qm_status (0xbd559000): 0(0) heap size= 33340380 0(0) used= 1586532, used+overhead=1801928, free=31538452 0(0) max used (+overhead)= 1801928 0(0) dumping all alloc'ed. fragments:
If so, what I'm wrong with the conf?
Any suggestions??
Many thanx
Verbal
Serusers mailing list serusers@lists.iptel.org http://lists.iptel.org/mailman/listinfo/serusers