[sr-dev] [kamailio] kamailio 4.3 crash at run_trans_callbacks_internal (#322)

zxcpoiu notifications at github.com
Thu Sep 10 10:16:58 CEST 2015


I have two kamailio servers which is in staging area, so there are few of users on it. say 2 or 3 making some testing calls.

The only difference between staging area and production area is that staging area enabled "ASYNC PUSH WAKE", similar concept and logic introduced by Danail at Kamailio World 2014. [Aynchronous Processing in Kamailio Configuration File](http://www.slideshare.net/miconda/26-danielconstantinmierlakamailiocfgasync)

These days, I experienced some crash at staging area and I can't reproduce it.
But productions which has tens of thousands of users did not have this issue.

Since I've tested the ASYNC PUSH WAKE and all it works well, I believed (guess) the problem may caused by two factors:

1. There are some bugs hidden in PUSH WAKE algorithm that suspend a transaction by tm module, stores it to htable, then resume when matched some conditions.

2. sip client ( compromised Linphone ) used by my client.
    ( Note: I've tested all official CSipSimple / Bria / Linphone and all works well )

But totally no ideas till now.

I've turn on debug mode with:

```
debug=3
memlog=4
memdbg=4
corelog=3
```

kamailio version is:
```
root at sip1:/home/pkg/kamailio/etc/kamailio# kamcmd core.info
{
	version: kamailio 4.3.1
	id: f38e67 
	compiler: gcc 4.7.2
	compiled: 13:18:05 Aug 11 2015
	flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, F_MALLOC, DBG_F_MALLOC, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
}
```

Before I catch the crash till it happens again, below is what I can give right now:
4 back traces and syslog indicate crash address

all corefiles are kept, I will feedback if I get another clues.

#### BT 1
```
===syslog===

Sep  4 14:24:57 sip1 kernel: [41174906.447276] kamailio[50056]: segfault at 7f97b600676e ip 00007f97b600676e sp 00007fff6e141a28 error 14 in mi_rpc.so[7f97b5f3b000+200000]
Sep  4 14:25:17 sip1 media-dispatcher[76950]: debug: Connection to OpenSIPS lost: Connection was closed cleanly.
Sep  4 14:25:17 sip1 /home/pkg/kamailio/sbin/kamailio[49990]: ALERT: <core> [main.c:728]: handle_sigs(): child process 50056 exited by a signal 11
Sep  4 14:25:17 sip1 /home/pkg/kamailio/sbin/kamailio[49990]: ALERT: <core> [main.c:731]: handle_sigs(): core was generated

===backtrace===
#0  0x00007f97b600676e in ?? ()
No symbol table info available.
#1  0x00007f97b803db5e in run_trans_callbacks_internal (cb_lst=0x7f97b98e5900, type=32, trans=0x7f97b98e5890, params=0x7fff6e141b10) at t_hooks.c:268
        cbp = 0x7f97b98e7380
        backup_from = 0xa82430
        backup_to = 0xa82438
        backup_dom_from = 0xa82440
        backup_dom_to = 0xa82448
        backup_uri_from = 0xa82420
        backup_uri_to = 0xa82428
        backup_xavps = 0xa82560
        __FUNCTION__ = "run_trans_callbacks_internal"
#2  0x00007f97b803dc6f in run_trans_callbacks (type=32, trans=0x7f97b98e5890, req=0x7f97b98b38f8, rpl=0x7f98fb64e2b0, code=180) at t_hooks.c:295
        params = {req = 0x7f97b98b38f8, rpl = 0x7f98fb64e2b0, param = 0x7f97b98e7390, code = 180, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#3  0x00007f97b809382e in relay_reply (t=0x7f97b98e5890, p_msg=0x7f98fb64e2b0, branch=1, msg_status=180, cancel_data=0x7fff6e141e70, do_put_on_wait=1) at t_reply.c:1767
        relay = 1
        save_clone = 0
        buf = 0x0
        res_len = 0
        relayed_code = 0
        relayed_msg = 0x0
        reply_bak = 0x7fff05051cb0
        bm = {to_tag_val = {s = 0xffffffff01b46f02 <Address 0xffffffff01b46f02 out of bounds>, len = -77247288}}
        totag_retr = 0
        reply_status = RPS_PROVISIONAL
        uas_rb = 0x7f97b98e5950
        to_tag = 0x7f97b80837bf
        reason = {s = 0x7fff6e141c60 "\200\034\024n\005", len = -1207424906}
        onsend_params = {req = 0x7fff6e141c80, rpl = 0x7f97b804db23, param = 0x7fff6e141c10, code = 1, flags = 0, branch = 0, t_rbuf = 0x7f97b98e5a50, dst = 0x50075b821, send_buf = {
            s = 0xfab1b348 <Address 0xfab1b348 out of bounds>, len = 1024}}
        __FUNCTION__ = "relay_reply"
#4  0x00007f97b8097959 in reply_received (p_msg=0x7f98fb64e2b0) at t_reply.c:2429
        msg_status = 180
        last_uac_status = 100
        ack = 0x7fff6e141f60 "` \024n\377\177"
        ack_len = 32664
        branch = 1
        reply_status = 6440375
        onreply_route = 3
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 6682541}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 6682541}}}}
        uac = 0x7f97b98e5c48
        t = 0x7f97b98e5890
        lack_dst = {send_sock = 0x7fff6e141e70, to = {s = {sa_family = 17847, sa_data = "b\000\000\000\000\000\200\036\024n\377\177\000"}, sin = {sin_family = 17847, sin_port = 98, sin_addr = {
                s_addr = 0}, sin_zero = "\200\036\024n\377\177\000"}, sin6 = {sin6_family = 17847, sin6_port = 98, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\200\036\024n\377\177\000\000\020\260\261\372\230\177\000", __u6_addr16 = {7808, 28180, 32767, 0, 45072, 64177, 32664, 0}, __u6_addr32 = {1846812288, 32767, 4205948944,
                    32664}}}, sin6_scope_id = 778}}, id = 10, proto = 84 'T', send_flags = {f = 109 'm', blst_imask = 180 '\264'}}
        backup_user_from = 0xa82430
        backup_user_to = 0xa82438
        backup_domain_from = 0xa82440
        backup_domain_to = 0xa82448
        backup_uri_from = 0xa82420
        backup_uri_to = 0xa82428
        backup_xavps = 0xa82560
        replies_locked = 1
        branch_ret = 1846812496
        prev_branch = 32664
        blst_503_timeout = -77274448
        hf = 0xa96c10
        onsend_params = {req = 0x4004188b0, rpl = 0x75fc90, param = 0x0, code = 0, flags = 3, branch = 0, t_rbuf = 0x7fff6e141ee0, dst = 0x631363, send_buf = {s = 0x7fff6e141ee0 "`\037\024n\377\177",
            len = 6422143}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {797, -5029273663833343261, 4294832, 140735040203504, 0, 0, -5029273663808177437, 5029028274090965731},
              __mask_was_saved = 0, __saved_mask = {__val = {6422143, 140735040200416, 6475430, 140735040200128, 140295017705488, 140735040200192, 140289551658488, 140735040200160, 0, 1073741824,
                  1401221318984, 140295029470864, 7733692, 64, 28601913, 174}}}}}
        __FUNCTION__ = "reply_received"
#5  0x00000000004901cc in do_forward_reply (msg=0x7f98fb64e2b0, mode=0) at forward.c:747
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"},
            sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0,
                    0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        new_len = 0
        r = 2
        ip = {af = 0, len = 0, u = {addrl = {21482551329, 140295017709352}, addr32 = {7714849, 5, 4205952808, 32664}, addr16 = {47137, 117, 5, 0, 48936, 64177, 32664, 0},
            addr = "!\270u\000\005\000\000\000(\277\261\372\230\177\000"}}
        s = 0x7f98fb64e2b8 "99\351U"
        len = 32663
        __FUNCTION__ = "do_forward_reply"
#6  0x0000000000491856 in forward_reply (msg=0x7f98fb64e2b0) at forward.c:849
No locals.
#7  0x000000000050e062 in receive_msg (
    buf=0x1b46d40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bK60b8.17e8d16cb9ef6d39be60d4cc68762171.1;i=9e02;received=211.78.19.1;rport=57074\r\nVia: SIP/2.0/TCP 192.168.1.112:64044;received=218."..., len=797, rcv_info=0x7f97b98f1610) at receive.c:255
        msg = 0x7f98fb64e2b0
        ctx = {rec_lev = -1181805064, run_flags = 32663, last_retcode = 16383, jmp_env = {{__jmpbuf = {17179869186, 140289629072096, 4294832, 3424935750384, 0, 0, 4294832, 140735040203504},
              __mask_was_saved = 1846813104, __saved_mask = {__val = {6234849, 28601648, 140296091965321, 0, 140296091950726, 140735040201912, 140289629951480, 65552, 797, 42949672963, 140289629953026,
                  0, 140289629953029, 140735040201360, 6235333, 4294832}}}}}
        ret = 0
        inb = {
          s = 0x1b46d40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bK60b8.17e8d16cb9ef6d39be60d4cc68762171.1;i=9e02;received=211.78.19.1;rport=57074\r\nVia: SIP/2.0/TCP 192.168.1.112:64044;received=218."..., len = 797}
        __FUNCTION__ = "receive_msg"
#8  0x00000000005f65fc in receive_tcp_msg (
    tcpbuf=0x7f97b98f18e8 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bK60b8.17e8d16cb9ef6d39be60d4cc68762171.1;i=9e02;received=211.78.19.1;rport=57074\r\nVia: SIP/2.0/TCP 192.168.1.112:64044;received=218."..., len=797, rcv_info=0x7f97b98f1610, con=0x7f97b98f15f8) at tcp_read.c:1247
        buf = 0x1b46d40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bK60b8.17e8d16cb9ef6d39be60d4cc68762171.1;i=9e02;received=211.78.19.1;rport=57074\r\nVia: SIP/2.0/TCP 192.168.1.112:64044;received=218."...
        bsize = 65535
        blen = 65535
        __FUNCTION__ = "receive_tcp_msg"
#9  0x00000000005f7d9b in tcp_read_req (con=0x7f97b98f15f8, bytes_read=0x7fff6e1424c0, read_flags=0x7fff6e1424b8) at tcp_read.c:1401
        bytes = 797
        total_bytes = 797
        resp = 1
        size = 140735040201552
        req = 0x7f97b98f1678
        dst = {send_sock = 0x14, to = {s = {sa_family = 1, sa_data = "\000\000P\000\000\000\001 \000\200\370\320\366", <incomplete sequence \372>}, sin = {sin_family = 1, sin_port = 0, sin_addr = {
                s_addr = 80}, sin_zero = "\001 \000\200\370\320\366", <incomplete sequence \372>}, sin6 = {sin6_family = 1, sin6_port = 0, sin6_flowinfo = 80, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\001 \000\200\370\320\366\372\230\177\000\000\000\000\000", __u6_addr16 = {8193, 32768, 53496, 64246, 32664, 0, 0, 0}, __u6_addr32 = {2147491841, 4210479352, 32664, 0}}},
              sin6_scope_id = 1846813872}}, id = 32767, proto = 8 '\b', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        c = 0 '\000'
        ret = -1
        __FUNCTION__ = "tcp_read_req"
#10 0x00000000005fadab in handle_io (fm=0x7f98faf6d0f8, events=1, idx=-1) at tcp_read.c:1624
        ret = 0
        n = -1
        read_flags = 1
        con = 0x7f97b98f15f8
        s = 11
        resp = 1
        t = 381376958
        __FUNCTION__ = "handle_io"
#11 0x00000000005ee8c0 in io_wait_loop_epoll (h=0xa2dfe0, t=2, repeat=1) at io_wait.h:1061
        n = 1
        r = 0
        fm = 0x7f98faf6d0f8
        revents = 1
        __FUNCTION__ = "io_wait_loop_epoll"
#12 0x00000000005fbe1a in tcp_receive_loop (unix_sock=97) at tcp_read.c:1739
        __FUNCTION__ = "tcp_receive_loop"
#13 0x00000000005e54e1 in tcp_init_children () at tcp_main.c:4787
        r = 15
        i = 23
        reader_fd_1 = 97
        pid = 0
        si_desc = "tcp receiver (generic)\000\000ygY\000\000\000\000\000P'\024n\377\177\000\000R\342B\000\000\000\000\000\060'\024n\377\177\000\000\260ò:\231\177\000\000\220\023\364\372\230\177\000\000_\301\211T\000\000\000\000\217sp\000\000\000\000\000\020\021\265\372\230\177\000\000(\000\000\000)\000\000\000UZ-;a\303\000\000m\303\000\000Tb\214K_\301\211T\000\000\000"
        si = 0x0
        __FUNCTION__ = "tcp_init_children"
#14 0x00000000004ab258 in main_loop () at main.c:1658
        i = 24
        pid = 50017
        si = 0x0
        si_desc = "udp receiver child=23 sock=211.78.19.1:5003\000n\000\000\000~/q\000\001\000\000\000\260䕸\227\177\000\000\060(\024n\377\177\000\000\032\264N\000\000\000\000\000\200(\024n\377\177\000\000\260\000\364\372\230\177\000\000\350\327⸗\177\000\000\260䕸\227\177\000\000_\301\211T\000\000\000\000\260\210A\000\001\000\000"
        nrprocs = 24
        __FUNCTION__ = "main_loop"
#15 0x00000000004b0b5b in main (argc=13, argv=0x7fff6e142af8) at main.c:2533
        cfg_stream = 0x1a9a010
        c = -1
        r = 0
        tmp = 0x7fff6e144d59 ""
        tmp_len = 32665
        port = 994981744
        proto = 0
        options = 0x707db8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
        ret = -1
        seed = 1686944683
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x76
        p = 0x7fff6e1429fe ""
        __FUNCTION__ = "main"
```

#### BT 2
```
===syslog===
Sep  8 09:59:08 sip2 kernel: [58418949.036449] kamailio[145444]: segfault at 7fa6a900676e ip 00007fa6a900676e sp 00007fff6fed90a8 error 14 in textops.so[7fa6a8ec6000+200000]
Sep  8 09:59:38 sip2 media-dispatcher[98511]: debug: Connection to OpenSIPS lost: Connection was closed cleanly.
Sep  8 09:59:38 sip2 /home/pkg/kamailio/sbin/kamailio[145378]: ALERT: <core> [main.c:728]: handle_sigs(): child process 145444 exited by a signal 11
Sep  8 09:59:38 sip2 /home/pkg/kamailio/sbin/kamailio[145378]: ALERT: <core> [main.c:731]: handle_sigs(): core was generated


===backtrace===

#0  0x00007fa6a900676e in ?? ()
No symbol table info available.
#1  0x00007fa6ab3d9b5e in run_trans_callbacks_internal (cb_lst=0x7fa6acd75a88, type=32, trans=0x7fa6acd75a18, params=0x7fff6fed9190) at t_hooks.c:268
        cbp = 0x7fa6acd680f0
        backup_from = 0xa82430
        backup_to = 0xa82438
        backup_dom_from = 0xa82440
        backup_dom_to = 0xa82448
        backup_uri_from = 0xa82420
        backup_uri_to = 0xa82428
        backup_xavps = 0xa82560
        __FUNCTION__ = "run_trans_callbacks_internal"
#2  0x00007fa6ab3d9c6f in run_trans_callbacks (type=32, trans=0x7fa6acd75a18, req=0x7fa6acd6c828, rpl=0x7fa7ee9ea2b0, code=180) at t_hooks.c:295
        params = {req = 0x7fa6acd6c828, rpl = 0x7fa7ee9ea2b0, param = 0x7fa6acd68100, code = 180, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#3  0x00007fa6ab42f82e in relay_reply (t=0x7fa6acd75a18, p_msg=0x7fa7ee9ea2b0, branch=1, msg_status=180, cancel_data=0x7fff6fed94f0, do_put_on_wait=1) at t_reply.c:1767
        relay = 1
        save_clone = 0
        buf = 0x0
        res_len = 0
        relayed_code = 0
        relayed_msg = 0x0
        reply_bak = 0x7fff05059330
        bm = {to_tag_val = {s = 0xffffffff00c75ead <Address 0xffffffff00c75ead out of bounds>, len = -291574016}}
        totag_retr = 0
        reply_status = RPS_PROVISIONAL
        uas_rb = 0x7fa6acd75ad8
        to_tag = 0x7fa6ab41f7bf
        reason = {s = 0x7fff6fed92e0 "", len = -1421744010}
        onsend_params = {req = 0x7fff6fed9300, rpl = 0x7fa6ab3e9b23, param = 0x7fff6fed9290, code = 1, flags = 0, branch = 0, t_rbuf = 0x7fa6acd75bd8, dst = 0x50075b821, send_buf = {
            s = 0xedeb7328 <Address 0xedeb7328 out of bounds>, len = 1024}}
        __FUNCTION__ = "relay_reply"
#4  0x00007fa6ab433959 in reply_received (p_msg=0x7fa7ee9ea2b0) at t_reply.c:2429
        msg_status = 180
        last_uac_status = 100
        ack = 0x7fff6fed95e0 "\340\226\355o\377\177"
        ack_len = 32679
        branch = 1
        reply_status = 6440375
        onreply_route = 3
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 6682541}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 6682541}}}}
        uac = 0x7fa6acd75dd0
        t = 0x7fa6acd75a18
        lack_dst = {send_sock = 0x7fff6fed94f0, to = {s = {sa_family = 17847, sa_data = "b\000\000\000\000\000\000\225\355o\377\177\000"}, sin = {sin_family = 17847, sin_port = 98, sin_addr = {
                s_addr = 0}, sin_zero = "\000\225\355o\377\177\000"}, sin6 = {sin6_family = 17847, sin6_port = 98, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\000\225\355o\377\177\000\000\020p\353\355\247\177\000", __u6_addr16 = {38144, 28653, 32767, 0, 28688, 60907, 32679, 0}, __u6_addr32 = {1877841152, 32767, 3991629840,
                    32679}}}, sin6_scope_id = 778}}, id = 10, proto = 84 'T', send_flags = {f = 93 ']', blst_imask = 199 '\307'}}
        backup_user_from = 0xa82430
        backup_user_to = 0xa82438
        backup_domain_from = 0xa82440
        backup_domain_to = 0xa82448
        backup_uri_from = 0xa82420
        backup_uri_to = 0xa82428
        backup_xavps = 0xa82560
        replies_locked = 1
        branch_ret = 1877841360
        prev_branch = 32679
        blst_503_timeout = -291593552
        hf = 0xa96580
        onsend_params = {req = 0x4004188b0, rpl = 0x75fc90, param = 0x0, code = 0, flags = 3, branch = 0, t_rbuf = 0x7fff6fed9560, dst = 0x631363, send_buf = {s = 0x7fff6fed9560 "\340\225\355o\377\177",
            len = 6422143}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {797, -4883994847374486000, 4294832, 140735071232368, 0, 0, -4883994847399651824, 4883678595199653392},
              __mask_was_saved = 0, __saved_mask = {__val = {6422143, 140735071229280, 6475430, 140735071228992, 140359227895824, 140735071229056, 140353761848824, 140735071229024, 0, 1073741824,
                  1401221321056, 140359239663288, 7733692, 64, 13065785, 175}}}}}
        __FUNCTION__ = "reply_received"
#5  0x00000000004901cc in do_forward_reply (msg=0x7fa7ee9ea2b0, mode=0) at forward.c:747
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"},
            sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0,
                    0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        new_len = 0
        r = 2
        ip = {af = 0, len = 0, u = {addrl = {21482551329, 140359227899688}, addr32 = {7714849, 5, 3991633704, 32679}, addr16 = {47137, 117, 5, 0, 32552, 60907, 32679, 0},
            addr = "!\270u\000\005\000\000\000(\177\353\355\247\177\000"}}
        s = 0x7fa7ee9ea2b8 "\354@\356U"
        len = 32678
        __FUNCTION__ = "do_forward_reply"
#6  0x0000000000491856 in forward_reply (msg=0x7fa7ee9ea2b0) at forward.c:849
No locals.
#7  0x000000000050e062 in receive_msg (
    buf=0xc75d40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.2:5003;branch=z9hG4bKd59d.0efeaa2488813a7c1ff6cbb4fa19f351.1;i=6592;received=211.78.19.2;rport=22430\r\nVia: SIP/2.0/TCP 192.168.1.112:58885;received=218."..., len=797, rcv_info=0x7fa6acd7b088) at receive.c:255
        msg = 0x7fa7ee9ea2b0
        ctx = {rec_lev = -1395150736, run_flags = 32678, last_retcode = 16383, jmp_env = {{__jmpbuf = {17179869186, 140353840147104, 4294832, 3424966779248, 0, 0, 4294832, 140735071232368},
              __mask_was_saved = 1877841968, __saved_mask = {__val = {6234849, 13065520, 140360302155657, 0, 140360302141062, 140735071230776, 140353841115248, 65552, 797, 42949672963, 140353841116794,
                  0, 140353841116797, 140735071230224, 6235333, 4294832}}}}}
        ret = 0
        inb = {
          s = 0xc75d40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.2:5003;branch=z9hG4bKd59d.0efeaa2488813a7c1ff6cbb4fa19f351.1;i=6592;received=211.78.19.2;rport=22430\r\nVia: SIP/2.0/TCP 192.168.1.112:58885;received=218."..., len = 797}
        __FUNCTION__ = "receive_msg"
#8  0x00000000005f65fc in receive_tcp_msg (
    tcpbuf=0x7fa6acd7b360 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.2:5003;branch=z9hG4bKd59d.0efeaa2488813a7c1ff6cbb4fa19f351.1;i=6592;received=211.78.19.2;rport=22430\r\nVia: SIP/2.0/TCP 192.168.1.112:58885;received=218."..., len=797, rcv_info=0x7fa6acd7b088, con=0x7fa6acd7b070) at tcp_read.c:1247
        buf = 0xc75d40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.2:5003;branch=z9hG4bKd59d.0efeaa2488813a7c1ff6cbb4fa19f351.1;i=6592;received=211.78.19.2;rport=22430\r\nVia: SIP/2.0/TCP 192.168.1.112:58885;received=218."...
        bsize = 65535
        blen = 65535
        __FUNCTION__ = "receive_tcp_msg"
#9  0x00000000005f7d9b in tcp_read_req (con=0x7fa6acd7b070, bytes_read=0x7fff6fed9b40, read_flags=0x7fff6fed9b38) at tcp_read.c:1401
        bytes = 797
        total_bytes = 797
        resp = 1
        size = 140735071230416
        req = 0x7fa6acd7b0f0
        dst = {send_sock = 0x14, to = {s = {sa_family = 1, sa_data = "\000\000P\000\000\000\001 \000\200\370\220", <incomplete sequence \356>}, sin = {sin_family = 1, sin_port = 0, sin_addr = {
                s_addr = 80}, sin_zero = "\001 \000\200\370\220", <incomplete sequence \356>}, sin6 = {sin6_family = 1, sin6_port = 0, sin6_flowinfo = 80, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\001 \000\200\370\220\060\356\247\177\000\000\000\000\000", __u6_addr16 = {8193, 32768, 37112, 60976, 32679, 0, 0, 0}, __u6_addr32 = {2147491841, 3996160248, 32679, 0}}},
              sin6_scope_id = 1877842736}}, id = 32767, proto = 8 '\b', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        c = 0 '\000'
        ret = -1
        __FUNCTION__ = "tcp_read_req"
#10 0x00000000005fadab in handle_io (fm=0x7fa7ee3090f8, events=1, idx=-1) at tcp_read.c:1624
        ret = 0
        n = -1
        read_flags = 1
        con = 0x7fa6acd7b070
        s = 11
        resp = 1
        t = 1530467254
        __FUNCTION__ = "handle_io"
#11 0x00000000005ee8c0 in io_wait_loop_epoll (h=0xa2dfe0, t=2, repeat=1) at io_wait.h:1061
        n = 1
        r = 0
        fm = 0x7fa7ee3090f8
        revents = 1
        __FUNCTION__ = "io_wait_loop_epoll"
#12 0x00000000005fbe1a in tcp_receive_loop (unix_sock=97) at tcp_read.c:1739
        __FUNCTION__ = "tcp_receive_loop"
#13 0x00000000005e54e1 in tcp_init_children () at tcp_main.c:4787
        r = 15
        i = 23
        reader_fd_1 = 97
        pid = 0
        si_desc = "tcp receiver (generic)\000\000ygY\000\000\000\000\000Н\355o\377\177\000\000R\342B\000\000\000\000\000\260\235\355o\377\177\000\000\260\203\354-\250\177\000\000\220\323-\356\247\177\000\000\023\255\r\020\000\000\000\000\217sp\000\000\000\000\000\020\321\356\355\247\177\000\000(\000\000\000)\000\000\000U\032g.\375\067\002\000\t8\002\000\267̑`\023\255\r\020\000\000\000"
        si = 0x0
        __FUNCTION__ = "tcp_init_children"
#14 0x00000000004ab258 in main_loop () at main.c:1658
        i = 24
        pid = 145405
        si = 0x0
        si_desc = "udp receiver child=23 sock=211.78.19.2:5003\000n\000\000\000~/q\000\001\000\000\000\260\244ϫ\246\177\000\000\260\236\355o\377\177\000\000\032\264N\000\000\000\000\000\000\237\355o\377\177\000\000\260\300-\356\247\177\000\000\350\227\034\254\246\177\000\000\260\244ϫ\246\177\000\000\023\255\r\020\000\000\000\000\260\210A\000\001\000\000"
        nrprocs = 24
        __FUNCTION__ = "main_loop"
#15 0x00000000004b0b5b in main (argc=13, argv=0x7fff6feda178) at main.c:2533
        cfg_stream = 0xbc9010
        c = -1
        r = 0
        tmp = 0x7fff6fedad59 ""
        tmp_len = 32680
        port = 780662640
        proto = 0
        options = 0x707db8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
        ret = -1
        seed = 503368684
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x76
        p = 0x7fff6feda07e ""
        __FUNCTION__ = "main"
```

#### BT 3
it generates two core files  3 and 4 in 20 secs

```
===syslog===
Sep 10 14:39:29 sip1 kernel: [41693172.748753] kamailio[245950] general protection ip:602d43 sp:7fff185e8500 error:0 in kamailio[400000+3cb000]
Sep 10 14:39:47 sip1 /home/pkg/kamailio/sbin/kamailio[245999]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 39
Sep 10 14:39:47 sip1 /home/pkg/kamailio/sbin/kamailio[245924]: ALERT: <core> [main.c:728]: handle_sigs(): child process 245950 exited by a signal 11
Sep 10 14:39:47 sip1 /home/pkg/kamailio/sbin/kamailio[245924]: ALERT: <core> [main.c:731]: handle_sigs(): core was generated
Sep 10 14:39:47 sip1 kernel: [41693191.570265] kamailio[245924] general protection ip:7f1f2ba23800 sp:7fff185e7ff0 error:0 in tm.so[7f1f2b9c8000+114000]


===backtrace===

#0  0x0000000000602d43 in slow_timer_main () at timer.c:1130
        n = 12
        ret = 4294967295
        tl = 0x7f1f2cca64f0
        i = 957
        __FUNCTION__ = "slow_timer_main"
#1  0x00000000004aacf9 in main_loop () at main.c:1628
        i = 24
        pid = 0
        si = 0x0
        si_desc = "udp receiver child=23 sock=211.78.19.1:5003\000n\000\000\000~/q\000\001\000\000\000\260D4,\037\177\000\000\060\206^\030\377\177\000\000\032\264N\000\000\000\000\000\200\206^\030\377\177\000\000\260`\222n \177\000\000\350\067\201,\037\177\000\000\260D4,\037\177\000\000\224\321\306[\000\000\000\000\260\210A\000\001\000\000"
        nrprocs = 24
        __FUNCTION__ = "main_loop"
#2  0x00000000004b0b5b in main (argc=13, argv=0x7fff185e88f8) at main.c:2533
        cfg_stream = 0x27a6010
        c = -1
        r = 0
        tmp = 0x7fff185e8f32 ""
        tmp_len = 32544
        port = -1360226448
        proto = 0
        options = 0x707db8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
        ret = -1
        seed = 1739382561
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x76
        p = 0x7fff185e87fe ""
        __FUNCTION__ = "main"

```
#### BT 4
it generates two core files  3 and 4 in 20 secs

```
===syslog===
Sep 10 14:39:29 sip1 kernel: [41693172.748753] kamailio[245950] general protection ip:602d43 sp:7fff185e8500 error:0 in kamailio[400000+3cb000]
Sep 10 14:39:47 sip1 /home/pkg/kamailio/sbin/kamailio[245999]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 39
Sep 10 14:39:47 sip1 /home/pkg/kamailio/sbin/kamailio[245924]: ALERT: <core> [main.c:728]: handle_sigs(): child process 245950 exited by a signal 11
Sep 10 14:39:47 sip1 /home/pkg/kamailio/sbin/kamailio[245924]: ALERT: <core> [main.c:731]: handle_sigs(): core was generated
Sep 10 14:39:47 sip1 kernel: [41693191.570265] kamailio[245924] general protection ip:7f1f2ba23800 sp:7fff185e7ff0 error:0 in tm.so[7f1f2b9c8000+114000]

===backtrace===


#0  0x00007f1f2ba23800 in run_trans_callbacks_internal (cb_lst=0x7f1f2c9ba700, type=131072, trans=0x7f1f2c9ba690, params=0x7fff185e80d0) at t_hooks.c:264
        cbp = 0x3c223d65636e6174
        backup_from = 0xa82430
        backup_to = 0xa82438
        backup_dom_from = 0xa82440
        backup_dom_to = 0xa82448
        backup_uri_from = 0xa82420
        backup_uri_to = 0xa82428
        backup_xavps = 0xa82560
        __FUNCTION__ = "run_trans_callbacks_internal"
#1  0x00007f1f2ba23c6f in run_trans_callbacks (type=131072, trans=0x7f1f2c9ba690, req=0x0, rpl=0x0, code=0) at t_hooks.c:295
        params = {req = 0x0, rpl = 0x0, param = 0x0, code = 0, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#2  0x00007f1f2b9e2aa1 in free_cell (dead_cell=0x7f1f2c9ba690) at h_table.c:128
        b = 0x621325 "\353\a\220\353\004\220\353\001\220H\201Đ"
        i = 0
        rpl = 0x7fff185e8270
        tt = 0x7fff185e8290
        foo = 0x7f1f2c33c1c8
        cbs = 0x621325
        cbs_tmp = 0x7fff185e8280
        __FUNCTION__ = "free_cell"
#3  0x00007f1f2b9e4779 in free_hash_table () at h_table.c:432
        p_cell = 0x7f1f2c9ba690
        tmp_cell = 0x3a2772657375277b
        i = 53971
        __FUNCTION__ = "free_hash_table"
#4  0x00007f1f2ba09733 in tm_shutdown () at t_funcs.c:90
        __FUNCTION__ = "tm_shutdown"
#5  0x000000000059669b in destroy_modules () at sr_module.c:788
        t = 0x7f206e524660
        foo = 0x7f206e5241f8
        __FUNCTION__ = "destroy_modules"
#6  0x00000000004a011a in cleanup (show_status=1) at main.c:513
        memlog = 32544
        __FUNCTION__ = "cleanup"
#7  0x00000000004a170e in shutdown_children (sig=15, show_status=1) at main.c:655
        __FUNCTION__ = "shutdown_children"
#8  0x00000000004a3c8d in handle_sigs () at main.c:746
        chld = 0
        chld_status = 139
        memlog = 0
        __FUNCTION__ = "handle_sigs"
#9  0x00000000004abb64 in main_loop () at main.c:1701
        i = 24
        pid = 245999
        si = 0x0
        si_desc = "udp receiver child=23 sock=211.78.19.1:5003\000n\000\000\000~/q\000\001\000\000\000\260D4,\037\177\000\000\060\206^\030\377\177\000\000\032\264N\000\000\000\000\000\200\206^\030\377\177\000\000\260`\222n \177\000\000\350\067\201,\037\177\000\000\260D4,\037\177\000\000\224\321\306[\000\000\000\000\260\210A\000\001\000\000"
        nrprocs = 24
        __FUNCTION__ = "main_loop"
#10 0x00000000004b0b5b in main (argc=13, argv=0x7fff185e88f8) at main.c:2533
        cfg_stream = 0x27a6010
        c = -1
        r = 0
        tmp = 0x7fff185e8f32 ""
        tmp_len = 32544
        port = -1360226448
        proto = 0
        options = 0x707db8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
        ret = -1
        seed = 1739382561
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x76
        p = 0x7fff185e87fe ""
        __FUNCTION__ = "main"
```



---
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/322
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-dev/attachments/20150910/136d3b82/attachment-0001.html>


More information about the sr-dev mailing list