On 25 November 2010 11:00, marius zbihlei <marius.zbihlei@1and1.ro> wrote:
On 11/25/2010 12:07 PM, marius zbihlei wrote:
On 11/25/2010 12:00 PM, dotnetdub wrote:


On 24 November 2010 07:10, Daniel-Constantin Mierla <miconda@gmail.com> wrote:
If you don't have the mask ip to your host ip (kamailio listening ip) like Alex pointed, do you have a core dump from where you can send the backtrace?

Cheers,
Daniel



Hi Alex/Daniel,

so THe IP of this SIP proxy is x.x.x.11 and I am using x.x.x.10 for the Mask IP.

I see the coredump in the root of the server..

ls /core -lah
-rw------- 1 root root 134M 2010-11-20 19:48 /core

which is the date it crashed.

gdb /sbin/kamailio /core

This GDB was configured as "i486-linux-gnu"...
Cannot access memory at address 0xb75f3fb0


I am running gdb from debian repo on 5.04 maybe I need to compile gdb?

Hello,

No, the problem is with the coredump AFAIK. Try looking thru /var/log/messages and dmesg for any indication of a coredump and the module that generated it. Please email those lines as well.

Hello
I see that the interesting line is already in the first mail . Please try this

readelf -S /path/to/topoh.so


There are 36 section headers, starting at offset 0x17b34:

Section Headers:
  [Nr] Name              Type            Addr     Off    Size   ES Flg Lk Inf Al
  [ 0]                   NULL            00000000 000000 000000 00      0   0  0
  [ 1] .hash             HASH            000000b4 0000b4 000498 04   A  3   0  4
  [ 2] .gnu.hash         GNU_HASH        0000054c 00054c 0002d8 04   A  3   0  4
  [ 3] .dynsym           DYNSYM          00000824 000824 000650 10   A  4   1  4
  [ 4] .dynstr           STRTAB          00000e74 000e74 000581 00   A  0   0  1
  [ 5] .gnu.version      VERSYM          000013f6 0013f6 0000ca 02   A  3   0  2
  [ 6] .gnu.version_r    VERNEED         000014c0 0014c0 000030 00   A  4   1  4
  [ 7] .rel.dyn          REL             000014f0 0014f0 0001d0 08   A  3   0  4
  [ 8] .rel.plt          REL             000016c0 0016c0 000210 08   A  3  10  4
  [ 9] .init             PROGBITS        000018d0 0018d0 000030 00  AX  0   0  4
  [10] .plt              PROGBITS        00001900 001900 000430 04  AX  0   0  4
  [11] .text             PROGBITS        00001d30 001d30 0080d8 00  AX  0   0 16
  [12] .fini             PROGBITS        00009e08 009e08 00001c 00  AX  0   0  4
  [13] .rodata           PROGBITS        00009e24 009e24 001618 01 AMS  0   0  4
  [14] .eh_frame         PROGBITS        0000b43c 00b43c 000004 00   A  0   0  4
  [15] .ctors            PROGBITS        0000c440 00b440 000008 00  WA  0   0  4
  [16] .dtors            PROGBITS        0000c448 00b448 000008 00  WA  0   0  4
  [17] .jcr              PROGBITS        0000c450 00b450 000004 00  WA  0   0  4
  [18] .dynamic          DYNAMIC         0000c454 00b454 0000c8 08  WA  4   0  4
  [19] .got              PROGBITS        0000c51c 00b51c 00006c 04  WA  0   0  4
  [20] .got.plt          PROGBITS        0000c588 00b588 000114 04  WA  0   0  4
  [21] .data             PROGBITS        0000c6a0 00b6a0 00012c 00  WA  0   0 32
  [22] .bss              NOBITS          0000c7e0 00b7cc 0004a0 00  WA  0   0 32
  [23] .comment          PROGBITS        00000000 00b7cc 0000d9 00      0   0  1
  [24] .debug_aranges    PROGBITS        00000000 00b8a8 0000b0 00      0   0  8
  [25] .debug_pubnames   PROGBITS        00000000 00b958 000448 00      0   0  1
  [26] .debug_info       PROGBITS        00000000 00bda0 005dd1 00      0   0  1
  [27] .debug_abbrev     PROGBITS        00000000 011b71 0007a8 00      0   0  1
  [28] .debug_line       PROGBITS        00000000 012319 0014b9 00      0   0  1
  [29] .debug_frame      PROGBITS        00000000 0137d4 0004b0 00      0   0  4
  [30] .debug_str        PROGBITS        00000000 013c84 001d76 01  MS  0   0  1
  [31] .debug_loc        PROGBITS        00000000 0159fa 001ebe 00      0   0  1
  [32] .debug_ranges     PROGBITS        00000000 0178b8 000140 00      0   0  8
  [33] .shstrtab         STRTAB          00000000 0179f8 00013b 00      0   0  1
  [34] .symtab           SYMTAB          00000000 0180d4 0009e0 10     35  58  4
  [35] .strtab           STRTAB          00000000 018ab4 0006ec 00      0   0  1
Key to Flags:
  W (write), A (alloc), X (execute), M (merge), S (strings)
  I (info), L (link order), G (group), x (unknown)
  O (extra OS processing required) o (OS specific), p (processor specific)



You should have somethink like this

  [Nr] Name              Type            Addr     Off    Size   ES Flg Lk Inf Al
  [ 0]                   NULL            00000000 000000 000000 00      0   0  0
.....
  [10] .init             PROGBITS        00001914 001914 000030 00  AX  0   0  4
  [11] .plt              PROGBITS        00001944 001944 000430 04  AX  0   0  4
  [12] .text             PROGBITS        00001d80 001d80 008008 00  AX  0   0 16

Note the address of the .text segment (in my case is 0x00001d80)

Then

gdb /path/to/kamailio core.dump


All ok

 
in the gdb console load the topoh.so

add-symbol-file /path/to/topoh.so 0xb7004000 + 0x<offset of .text segment found as above>


Ok.

 
then check the value of the Instruction pointer IP (0xb70070d9) Still in the gdb console

x/s 0xb70070d9



x/s 0xb70070d9
0xb70070d9: <Address 0xb70070d9 out of bounds>


(gdb) x/s 0x00001d30
0x1d30 <__do_global_dtors_aux>: <Address 0x1d30 out of bounds>
(gdb) x/s 0xb700400
0xb700400 <__do_global_dtors_aux>: <Address 0xb700400 out of bounds>




Brian





 
You will get an offset relative to a function where the crashed happened. This would be very helpful so please share the finding. Also do a info registers (in the gdb console) and paste the content of the registers as well.

Marius

Marius
Thanks
Brian








_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users