[SR-Users] rare crash at kamailio 5.0.1

David Escartin descartin at bts.io
Wed Apr 4 16:47:18 CEST 2018


hello Daniel


we have seen today another case, unfortunately i dont have the sip trace

but i have the core

hope it's useful, it seems the same type of call with the request 
retransmisions and crashing after a 481 to the last retransmitted 
request is received

(gdb) bt
#0  0x00000036e8a32925 in raise () from /lib64/libc.so.6
#1  0x00000036e8a34105 in abort () from /lib64/libc.so.6
#2  0x0000000000654c24 in qm_free (qmp=0x7fab0240a000, p=0x7fabc3405258, 
file=0x7fabc258cd86 "tm: h_table.c", func=0x7fabc258d070 
"free_cell_helper", line=187, mname=0x7fabc258c780 "tm") at 
core/mem/q_malloc.c:471
#3  0x00007fabc24bbf70 in free_cell_helper (dead_cell=0x7fab09d46d58, 
silent=0, fname=0x7fabc259da80 "timer.c", fline=651) at h_table.c:187
#4  0x00007fabc2508148 in wait_handler (ti=1191213061, 
wait_tl=0x7fab09d46dd8, data=0x7fab09d46d58) at timer.c:651
#5  0x0000000000629578 in timer_list_expire (t=1191213061, 
h=0x7fab02488dc0, slow_l=0x7fab0248a278, slow_mark=22824) at 
core/timer.c:874
#6  0x00000000006299d4 in timer_handler () at core/timer.c:939
#7  0x0000000000629e73 in timer_main () at core/timer.c:978
#8  0x0000000000422d4e in main_loop () at main.c:1690
#9  0x0000000000429732 in main (argc=13, argv=0x7fff08856238) at main.c:2639
(gdb) frame 4
#4  0x00007fabc2508148 in wait_handler (ti=1191213061, 
wait_tl=0x7fab09d46dd8, data=0x7fab09d46d58) at timer.c:651
651        UNREF_FREE(p_cell);
(gdb) info locals
p_cell = 0x7fab09d46d58
ret = 1
(gdb) p *p_cell
$1 = {next_c = 0x0, prev_c = 0x0, hash_index = 46289, label = 120110834, 
flags = 4132, nr_of_outgoings = 2, ref_count = {val = 0}, from = {
     s = 0x7fab0aeef8f9 "From: 
<sip:+2917120052 at 89.221.46.77;user=phone>;tag=SDee0r999-2aabeeae-001e-018f-0000-0000\r\nCall-ID: 
4d69d51a-4b78-412f-bd72-114e841a6773\r\nCSeq: 121082247 
BYE\r\nMax-Forwards: 68\r\nReason: Q.850; cause=1"..., len = 92}, callid = {
     s = 0x7fab0aeef955 "Call-ID: 
4d69d51a-4b78-412f-bd72-114e841a6773\r\nCSeq: 121082247 
BYE\r\nMax-Forwards: 68\r\nReason: Q.850; cause=16\r\nContent-Length: 
0\r\nRoute: 
<sip:200.200.200.176;lr=on;ftag=te9m1e81p4SQp;did=7cc.f229>\r\n\r\n", 
len = 47}, cseq_n = {s = 0x7fab0aeef984 "CSeq: 121082247 
BYE\r\nMax-Forwards: 68\r\nReason: Q.850; cause=16\r\nContent-Length: 
0\r\nRoute: 
<sip:200.200.200.176;lr=on;ftag=te9m1e81p4SQp;did=7cc.f229>\r\n\r\n", 
len = 15},
   to = {
     s = 0x7fab0aeef893 "To: \"+525768760155\" 
<sip:+525768760155 at 200.200.200.176;user=phone;noa=international>;tag=te9m1e81p4SQp\r\nFrom: 
<sip:+2917120052 at 89.221.46.77;user=phone>;tag=SDee0r999-2aabeeae-001e-018f-0000-0000\r\nCall-I"..., 
len = 102}, method = {
     s = 0x7fab0aeef810 "BYE sip:525768760155 at 100.100.100.166:5080 
SIP/2.0\r\nVia: SIP/2.0/UDP 
89.221.46.77:5060;branch=z9hG4bKdjs2la00d06jtanp6sp0sd7od2p32.1\r\nTo: 
\"+525768760155\" 
<sip:+525768760155 at 200.200.200.176;user=phone;noa=i"..., len = 3}, 
tmcb_hl = {first = 0x7fab028ecf60, reg_types = 131714}, wait_timer = 
{next = 0x0, prev = 0x0, expire = 1191213061, initial_timeout = 80, data 
= 0x7fab09d46d58, f = 0x7fabc2508097 <wait_handler>, flags = 513,
     slow_idx = 0}, uas = {request = 0x7fab0aeef120, end_request = 
0x7fab0aef01c8 "\300\300\300\300", response = {activ_type = 481, flags = 
128, t_active = 0 '\000', branch = 0, buffer_len = 551,
       buffer = 0x7fab095c41d0 "SIP/2.0 481 Call Does Not Exist\r\nVia: 
SIP/2.0/UDP 
89.221.46.77:5060;branch=z9hG4bKdjs2la00d06jtanp6sp0sd7od2p32.1\r\nFrom: 
<sip:+2917120052 at 89.221.46.77;user=phone>;tag=SDee0r999-2aabeeae-001e-018f-0000"..., 
my_T = 0x7fab09d46d58, timer = {next = 0x0, prev = 0x0, expire = 0, 
initial_timeout = 0, data = 0x0, f = 0x7fabc2507b4b <retr_buf_handler>, 
flags = 0, slow_idx = 0}, dst = {send_sock = 0x7fabc30abb78, to = {s = {
             sa_family = 2, sa_data = 
"\023\304Y\335.M\000\000\000\000\000\000\000"}, sin = {sin_family = 2, 
sin_port = 50195, sin_addr = {s_addr = 1294916953}, sin_zero = 
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2,
             sin6_port = 50195, sin6_flowinfo = 1294916953, sin6_addr = 
{__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 
0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id 
= 0,
         proto = 1 '\001', send_flags = {f = 0 '\000', blst_imask = 0 
'\000'}}, retr_expire = 0, fr_expire = 0}, local_totag = {s = 0x0, len = 
0}, cancel_reas = 0x0, status = 481}, uac = 0x7fab09d46f60, async_backup = {
     backup_route = 1, backup_branch = 4294967295, blind_uac = 0, 
ruri_new = 1}, fwded_totags = 0x0, uri_avps_from = 0x0, uri_avps_to = 
0x0, user_avps_from = 0x0, user_avps_to = 0x0, domain_avps_from = 0x0, 
domain_avps_to = 0x0,
   xavps_list = 0x0, reply_mutex = {val = 0}, reply_locker_pid = {val = 
0}, reply_rec_lock_level = 0, fr_timeout = 480, fr_inv_timeout = 1920, 
rt_t1_timeout_ms = 650, rt_t2_timeout_ms = 4000, end_of_life = 1191213094,
   relayed_reply_branch = 1, on_failure = 0, on_branch_failure = 0, 
on_reply = 0, on_branch = 0, on_branch_delayed = 0, md5 = 0x7fab09d46d58 ""}
(gdb) frame 3
#3  0x00007fabc24bbf70 in free_cell_helper (dead_cell=0x7fab09d46d58, 
silent=0, fname=0x7fabc259da80 "timer.c", fline=651) at h_table.c:187
187                sip_msg_free_unsafe(rpl);
(gdb) info locals
b = 0x0
i = 1
rpl = 0x7fabc3404fc0
tt = 0x0
foo = 0x7fab02609330
cbs = 0x0
cbs_tmp = 0x7fab02f8f160
__FUNCTION__ = "free_cell_helper"
(gdb) p *rpl
$2 = {id = 3275772056, pid = 32683, tval = {tv_sec = 320, tv_usec = 
140375688591576}, fwd_send_flags = {f = 2 '\002', blst_imask = 0 
'\000'}, rpl_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, 
first_line = {type = 2116,
     flags = -16723, len = 32683, u = {request = {method = {s = 0x7 
<Address 0x7 out of bounds>, len = 0}, uri = {s = 0x0, len = 1}, version 
= {s = 0x8381 <Address 0x8381 out of bounds>, len = -1022510864}, 
method_value = 0},
       reply = {version = {s = 0x7 <Address 0x7 out of bounds>, len = 
0}, status = {s = 0x0, len = 1}, reason = {s = 0x8381 <Address 0x8381 
out of bounds>, len = -1022510864}, statuscode = 0}}}, via1 = 0x0, via2 
= 0x7fabc3405038,
   headers = 0x7fff08852000, last_header = 0x1, parsed_flag = 
140375615146059, h_via1 = 0x2, h_via2 = 0x7fabbead084d, callid = 0x8, to 
= 0xa00000002, cseq = 0x0, from = 0x7fabc30db8f0, contact = 0x0, 
maxforwards = 0x0,
   route = 0x7fabc3405258, record_route = 0x7fff08852000, content_type = 
0x0, content_length = 0x0, authorization = 0x0, expires = 0x0, 
proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0, 
unsupported = 0x0,
   allow = 0x0, event = 0x0, accept = 0x0, accept_language = 0x0, 
organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x0, 
server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, 
refer_to = 0x0,
   session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, 
subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 
0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, min_expires = 0x0, 
body = 0x0, eoh = 0x0,
   unparsed = 0x0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 
0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = 
'\000' <repeats 15 times>}}, dst_ip = {af = 3233857728, len = 0, u = 
{addrl = {2882400237,
           0}, addr32 = {2882400237, 0, 0, 0}, addr16 = {61421, 43981, 
0, 0, 0, 0, 0, 0}, addr = "\355\357ͫ", '\000' <repeats 11 times>}}, 
src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 536, 
src_su = {s = {
         sa_family = 0, sa_data = "\000\000 
\266\rë\177\000\000\030\002\000"}, sin = {sin_family = 0, sin_port = 0, 
sin_addr = {s_addr = 3272455712}, sin_zero = 
"\253\177\000\000\030\002\000"}, sin6 = {sin6_family = 0,
         sin6_port = 0, sin6_flowinfo = 3272455712, sin6_addr = {__in6_u 
= {__u6_addr8 = 
"\253\177\000\000\030\002\000\000\000\000\000\000\210T@", <incomplete 
sequence \303>, __u6_addr16 = {32683, 0, 536, 0, 0, 0, 21640, 49984},
             __u6_addr32 = {32683, 536, 0, 3275773064}}}, sin6_scope_id 
= 32683}}, bind_address = 0x7fabbe8bebb0, proto = 32 ' '}, buf = 
0x7fabbe8beba6 "rtpengine", len = 139, new_uri = {
     s = 0xf0f0f0f0 <Address 0xf0f0f0f0 out of bounds>, len = 
-1019194352}, dst_uri = {s = 0x48 <Address 0x48 out of bounds>, len = 
-1019195456}, parsed_uri_ok = 4, parsed_uri = {user = {s = 
0x7fabbe8beba2 "d", len = 1},
     passwd = {s = 0x7fabbe8beba0 "e", len = 1}, host = {s = 
0x360000000d <Address 0x360000000d out of bounds>, len = 1}, port = {s = 
0x7fabc30db8f0 "\004", len = -1019194448}, params = {s = 0x7fabc3405658 
"\002",
       len = -1019193512}, sip_params = {s = 0x7fff08852000 
"\260\305@ë\177", len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, 
proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 
0}, ttl = {
       s = 0x7fabc3405538 "\001", len = 0}, user_param = {s = 0x0, len = 
0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 
0x7fabc34055f8 "\001", len = 0}, r2 = {s = 0x7fabc34053b0 "\001", len = 
0}, gr = {
       s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = 
{s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s 
= 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {
       s = 0x1 <Address 0x1 out of bounds>, len = -1095956394}, r2_val = 
{s = 0x2 <Address 0x2 out of bounds>, len = -1095956392}, gr_val = {s = 
0x6 <Address 0x6 out of bounds>, len = 2}}, parsed_orig_ruri_ok = 0,
   parsed_orig_ruri = {user = {s = 0x7fabc3405258 "\004", len = 0}, 
passwd = {s = 0x0, len = -1019194152}, host = {s = 0x7fff08852000 
"\260\305@ë\177", len = 0}, port = {s = 0x0, len = 0}, params = {s = 
0x0, len = 0},
     sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, 
port_no = 49344, proto = 49344, type = ERROR_URI_T, flags = 2882400237, 
transport = {s = 0x0, len = 0}, ttl = {s = 0x218 <Address 0x218 out of 
bounds>,
       len = -1019195512}, user_param = {s = 0x218 <Address 0x218 out of 
bounds>, len = -1019193592}, maddr = {s = 0x7fabbe8bebb0 "rtpengine: 
bencode.c", len = -1098125280}, method = {s = 0x7fabbe8beba6 
"rtpengine", len = 139},
     lr = {s = 0xf0f0f0f0 <Address 0xf0f0f0f0 out of bounds>, len = 
-1019193672}, r2 = {s = 0x20 <Address 0x20 out of bounds>, len = 
-1019194816}, gr = {s = 0x1 <Address 0x1 out of bounds>, len = 
-1095956386}, transport_val = {
       s = 0x2 <Address 0x2 out of bounds>, len = -1095956384}, ttl_val 
= {s = 0x4 <Address 0x4 out of bounds>, len = 2}, user_param_val = {s = 
0x0, len = -1019194792}, maddr_val = {s = 0x0, len = 0}, method_val = {
       s = 0x7fabc3405538 "\001", len = 142942208}, lr_val = {s = 0x1 
<Address 0x1 out of bounds>, len = -1095956380}, r2_val = {s = 0x2 
<Address 0x2 out of bounds>, len = -1095956378}, gr_val = {
       s = 0x7 <Address 0x7 out of bounds>, len = 2}}, add_rm = 0x0, 
body_lumps = 0x7fabc3405258, reply_lump = 0x0,
   add_to_branch_s = 
"\000\000\000\000\000\000\000\000\230U@ë\177\000\000\000 
\205\b\377\177\000\000\001\000\000\000\000\000\000\000m\b\255\276\253\177\000\000\003\000\000\000\000\000\000\000p\b\255\276\253\177\000\000\r", 

   add_to_branch_len = 0, hash_index = 2, msg_flags = 16, flags = 0, 
set_global_address = {s = 0x7fabc3405258 "\004", len = 0}, 
set_global_port = {s = 0x0, len = -1019193864}, force_send_socket = 
0x7fff08852000, path_vec = {
     s = 0x1 <Address 0x1 out of bounds>, len = -1095956355}, instance = 
{s = 0x2 <Address 0x2 out of bounds>, len = -1095956353}, reg_id = 4, 
ruid = {s = 0x600000002 <Address 0x600000002 out of bounds>, len = 0}, 
location_ua = {
     s = 0x7fabc3405258 "\004", len = 0}, ldv = {flow = {decoded = 0, 
rcv = {src_ip = {af = 3275773528, len = 32683, u = {addrl = 
{140733336330240, 2}, addr32 = {142942208, 32767, 2, 0}, addr16 = {8192, 
2181, 32767, 0, 2, 0, 0,
               0}, addr = "\000 
\205\b\377\177\000\000\002\000\000\000\000\000\000"}}, dst_ip = {af = 
3199010947, len = 32683, u = {addrl = {7, 0}, addr32 = {7, 0, 0, 0}, 
addr16 = {7, 0, 0, 0, 0, 0, 0, 0},
             addr = "\a", '\000' <repeats 14 times>}}, src_port = 0, 
dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 1, src_su = {s = 
{sa_family = 7,
             sa_data = "\000\000\273\203\000\000\000\000\000\000XR@", 
<incomplete sequence \303>}, sin = {sin_family = 7, sin_port = 0, 
sin_addr = {s_addr = 33723}, sin_zero = "\000\000\000\000XR@", 
<incomplete sequence \303>},
           sin6 = {sin6_family = 7, sin6_port = 0, sin6_flowinfo = 
33723, sin6_addr = {__in6_u = {__u6_addr8 = 
"\000\000\000\000XR@ë\177\000\000\000\000\000", __u6_addr16 = {0, 0, 
21080, 49984, 32683, 0, 0, 0}, __u6_addr32 = {0,
                   3275772504, 32683, 0}}}, sin6_scope_id = 0}}, 
bind_address = 0x0, proto = 0 '\000'}}}}

best regards

david


On 02/04/18 09:33, David Escartin wrote:
>
> hello Daniel
>
>
> here you have
>
>
> best regards
>
> david
>
>
> On 02/04/18 08:26, Daniel-Constantin Mierla wrote:
>>
>> Hello,
>>
>> do you have the pcap for such call?
>>
>> Cheers,
>> Daniel
>>
>>
>> On 30.03.18 09:14, David Escartin wrote:
>>>
>>> Hello all
>>>
>>> last March 26th we experienced a crash on a 5.0.1 kamailio server 
>>> and a core was generated.
>>> Seems that the call involved in the core generated was doing several 
>>> retransmisions of a request (expected) and when it finally forwarded 
>>> the request upstream, seems fter receiving a 481 from a-side, it 
>>> crashed.
>>>
>>> here you have the backtrace
>>>
>>> <154>Mar 26 19:54:03 mad-proxy-inout-1 
>>> /usr/local/kamailio/sbin/kamailio[24992]: : <core> 
>>> [core/mem/q_malloc.c:469]: qm_free(): BUG: qm_free: bad pointer 
>>> 0x7f247acb5878 (out of memory block!) called from tm: h_table.c: 
>>> free_cell_helper(187) - aborting
>>>
>>> (gdb) bt
>>> #0 0x00000036e8a32925 in raise () from /lib64/libc.so.6
>>> #1 0x00000036e8a34105 in abort () from /lib64/libc.so.6
>>> #2 0x0000000000654c24 in qm_free (qmp=0x7f23b9cba000, 
>>> p=0x7f247acb5878, file=0x7f2479e3cd86 "tm: h_table.c", 
>>> func=0x7f2479e3d070 "free_cell_helper", line=187,
>>> mname=0x7f2479e3c780 "tm") at core/mem/q_malloc.c:471
>>> #3 0x00007f2479d6bf16 in free_cell_helper (dead_cell=0x7f23c54fea50, 
>>> silent=0, fname=0x7f2479e4da80 "timer.c", fline=651) at h_table.c:187
>>> #4 0x00007f2479db8148 in wait_handler (ti=1503818844, 
>>> wait_tl=0x7f23c54fead0, data=0x7f23c54fea50) at timer.c:651
>>> #5 0x0000000000629578 in timer_list_expire (t=1503818844, 
>>> h=0x7f23b9d38dc0, slow_l=0x7f23b9d3b0c8, slow_mark=43533) at 
>>> core/timer.c:874
>>> #6 0x00000000006299d4 in timer_handler () at core/timer.c:939
>>> #7 0x0000000000629e73 in timer_main () at core/timer.c:978
>>> #8 0x0000000000422d4e in main_loop () at main.c:1690
>>> #9 0x0000000000429732 in main (argc=13, argv=0x7fff2b9f8088) at 
>>> main.c:2639
>>>
>>>
>>> (gdb) frame 4
>>> #4 0x00007f2479db8148 in wait_handler (ti=1503818844, 
>>> wait_tl=0x7f23c54fead0, data=0x7f23c54fea50) at timer.c:651
>>> 651 UNREF_FREE(p_cell);
>>>
>>> (gdb) info locals
>>> p_cell = 0x7f23c54fea50
>>> ret = 1
>>>
>>> (gdb) p *p_cell
>>> $1 = {next_c = 0x0, prev_c = 0x0, hash_index = 28196, label = 
>>> 341555146, flags = 4132, nr_of_outgoings = 2, ref_count = {val = 0}, 
>>> from = {
>>> s = 0x7f23c87c79ed "From: 
>>> <sip:932687220 at 100.100.100.177;user=phone;noa=national>;tag=50aa4a46-co11146-INS002\r\nCall-ID: 
>>> b8997821-2814-46d3-b8f7-cf690f50f640\r\nCSeq: 1114601 
>>> BYE\r\nUser-Agent: ENSR3.0.67.10-IS2-RMRG1119-RG2040"..., len = 89}, 
>>> callid = {
>>> s = 0x7f23c87c7a46 "Call-ID: 
>>> b8997821-2814-46d3-b8f7-cf690f50f640\r\nCSeq: 1114601 
>>> BYE\r\nUser-Agent: 
>>> ENSR3.0.67.10-IS2-RMRG1119-RG2040-CPI1-CPO2612\r\nContent-Length: 
>>> 0\r\n\r\n", len = 47}, cseq_n = {
>>> s = 0x7f23c87c7a75 "CSeq: 1114601 BYE\r\nUser-Agent: 
>>> ENSR3.0.67.10-IS2-RMRG1119-RG2040-CPI1-CPO2612\r\nContent-Length: 
>>> 0\r\n\r\n", len = 13}, to = {
>>> s = 0x7f23c87c799e "To: 
>>> \"34676893111\"<sip:34676893111 at 100.100.100.134;user=phone>;tag=64jNUpSZK8mSp\r\nFrom: 
>>> <sip:932687220 at 100.100.100.177;user=phone;noa=national>;tag=50aa4a46-co11146-INS002\r\nCall-ID: 
>>> b8997821-2814-46d3-b8f7"..., len = 79}, method = {
>>> s = 0x7f23c87c78c8 "BYE sip:34676893111 at 100.100.100.134:5080 
>>> SIP/2.0\r\nVia: SIP/2.0/UDP 
>>> 200.200.200.78:5060;branch=z9hG4bK2d5c0cb4e11bb1503BYE50aa466c2b8a\r\nMax-Forwards: 
>>> 34\r\nRoute: <sip:100.100.100.177;lr;ftag=64jNUpSZK8mSp;d"..., len = 
>>> 3}, tmcb_hl = {first = 0x7f23bd9f7818, reg_types = 131714}, 
>>> wait_timer = {
>>> next = 0x0, prev = 0x0, expire = 1503818844, initial_timeout = 80, 
>>> data = 0x7f23c54fea50, f = 0x7f2479db8097 <wait_handler>, flags = 
>>> 513, slow_idx = 0},
>>> uas = {request = 0x7f23c87c71d8, end_request = 0x7f23c87c8288 
>>> "\300\300\300\300", response = {activ_type = 481, flags = 128, 
>>> t_active = 0 '\000', branch = 0,
>>> buffer_len = 526,
>>> buffer = 0x7f23bef07b18 "SIP/2.0 481 Call Does Not Exist\r\nVia: 
>>> SIP/2.0/UDP 
>>> 200.200.200.78:5060;branch=z9hG4bK2d5c0cb4e11bb1503BYE50aa466c2b8a\r\nFrom: 
>>> <sip:932687220 at 100.100.100.177;user=phone;noa=national>;tag=50aa4a46-co11146-I"..., 
>>> my_T = 0x7f23c54fea50, timer = {next = 0x0, prev = 0x0, expire = 0,
>>> initial_timeout = 0, data = 0x0, f = 0x7f2479db7b4b 
>>> <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 
>>> 0x7f247a95be78, to = {s = {
>>> sa_family = 2, sa_data = 
>>> "\023\304\325\300\313N\000\000\000\000\000\000\000"}, sin = 
>>> {sin_family = 2, sin_port = 50195, sin_addr = {
>>> s_addr = 1321976021}, sin_zero = "\000\000\000\000\000\000\000"}, 
>>> sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1321976021,
>>> sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, 
>>> __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
>>> sin6_scope_id = 0}}, id = 0, proto = 1 '\001', send_flags = {f = 0 
>>> '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, 
>>> local_totag = {
>>> s = 0x0, len = 0}, cancel_reas = 0x0, status = 481}, uac = 
>>> 0x7f23c54fec58, async_backup = {backup_route = 1, backup_branch = 
>>> 4294967295, blind_uac = 0,
>>> ruri_new = 1}, fwded_totags = 0x0, uri_avps_from = 0x0, uri_avps_to 
>>> = 0x0, user_avps_from = 0x0, user_avps_to = 0x0, domain_avps_from = 
>>> 0x0,
>>> domain_avps_to = 0x0, xavps_list = 0x0, reply_mutex = {val = 0}, 
>>> reply_locker_pid = {val = 0}, reply_rec_lock_level = 0, fr_timeout = 
>>> 480,
>>> fr_inv_timeout = 1920, rt_t1_timeout_ms = 650, rt_t2_timeout_ms = 
>>> 4000, end_of_life = 1503819200, relayed_reply_branch = 1, on_failure 
>>> = 0,
>>> on_branch_failure = 0, on_reply = 0, on_branch = 0, 
>>> on_branch_delayed = 0, md5 = 0x7f23c54fea50 ""}
>>>
>>> (gdb) frame 3
>>> #3 0x00007f2479d6bf16 in free_cell_helper (dead_cell=0x7f23c54fea50, 
>>> silent=0, fname=0x7f2479e4da80 "timer.c", fline=651) at h_table.c:187
>>> 187 sip_msg_free_unsafe(rpl);
>>>
>>> (gdb) info locals
>>> b = 0x0
>>> i = 1
>>> rpl = 0x7f247acb4fc0
>>> tt = 0x0
>>> foo = 0x7f23b9e2bd90
>>> cbs = 0x0
>>> cbs_tmp = 0x7f23c60c16b0
>>> __FUNCTION__ = "free_cell_helper"
>>>
>>> (gdb) p *rpl
>>> $3 = {id = 2060145040, pid = 32548, tval = {tv_sec = 72, tv_usec = 
>>> 139794652378712}, fwd_send_flags = {f = 1 '\001', blst_imask = 0 
>>> '\000'}, rpl_send_flags = {
>>> f = 0 '\000', blst_imask = 0 '\000'}, first_line = {type = -347, 
>>> flags = 30263, len = 32548, u = {request = {method = {s = 0x2 
>>> <Address 0x2 out of bounds>,
>>> len = 1983381159}, uri = {s = 0x5 <Address 0x5 out of bounds>, len = 
>>> 2}, version = {s = 0x2b <Address 0x2b out of bounds>, len = 
>>> 2057435688},
>>> method_value = 0}, reply = {version = {s = 0x2 <Address 0x2 out of 
>>> bounds>, len = 1983381159}, status = {s = 0x5 <Address 0x5 out of 
>>> bounds>, len = 2},
>>> reason = {s = 0x2b <Address 0x2b out of bounds>, len = 2057435688}, 
>>> statuscode = 0}}}, via1 = 0x0, via2 = 0x7f247acb5038, headers = 
>>> 0x7fff2b9f3e50,
>>> last_header = 0x4, parsed_flag = 139794576763810, h_via1 = 0x1, 
>>> h_via2 = 0x7f247616eba0, callid = 0x1, to = 0x270000000b, cseq = 
>>> 0x1, from = 0x7f247aa1fa28,
>>> contact = 0x7f247acb5258, maxforwards = 0x7f247acb54d8, route = 0x0, 
>>> record_route = 0x7fff2b9f3e50, content_type = 0x7f247acb5318, 
>>> content_length = 0x0,
>>> authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 
>>> 0x0, require = 0x0, proxy_require = 0x0, unsupported = 
>>> 0x7f247acb5258, allow = 0x0,
>>> event = 0x7f247acb53d8, accept = 0x0, accept_language = 0x0, 
>>> organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x0, 
>>> server = 0x0,
>>> content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 
>>> 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, 
>>> subscription_state = 0x0,
>>> date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 
>>> 0x0, path = 0x7f247a98b6d0, privacy = 0x0, min_expires = 0x0, body = 
>>> 0x7f247acb5258,
>>> eoh = 0x7fff2b9f3e50 "@f\313z$\177", unparsed = 0x0, rcv = {src_ip = 
>>> {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 
>>> = {0, 0, 0, 0, 0,
>>> 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 
>>> 3233857728, len = 0, u = {addrl = {2882400237, 0}, addr32 = 
>>> {2882400237, 0, 0, 0},
>>> addr16 = {61421, 43981, 0, 0, 0, 0, 0, 0}, addr = "\355\357ͫ", 
>>> '\000' <repeats 11 times>}}, src_port = 0, dst_port = 0, 
>>> proto_reserved1 = 0,
>>> proto_reserved2 = 536, src_su = {s = {sa_family = 0, sa_data = 
>>> "\000\000 \266\230z$\177\000\000\030\002\000"}, sin = {sin_family = 
>>> 0, sin_port = 0,
>>> sin_addr = {s_addr = 2056828448}, sin_zero = 
>>> "$\177\000\000\030\002\000"}, sin6 = {sin6_family = 0, sin6_port = 
>>> 0, sin6_flowinfo = 2056828448,
>>> sin6_addr = {__in6_u = {__u6_addr8 = 
>>> "$\177\000\000\030\002\000\000\000\000\000\000\210T\313z", 
>>> __u6_addr16 = {32548, 0, 536, 0, 0, 0, 21640, 31435},
>>> __u6_addr32 = {32548, 536, 0, 2060145800}}}, sin6_scope_id = 
>>> 32548}}, bind_address = 0x7f247616ebb0, proto = 32 ' '},
>>> buf = 0x7f247616eba6 "rtpengine", len = 139, new_uri = {s = 
>>> 0xf0f0f0f0 <Address 0xf0f0f0f0 out of bounds>, len = 2060145720}, 
>>> dst_uri = {
>>> s = 0x20 <Address 0x20 out of bounds>, len = 2060144576}, 
>>> parsed_uri_ok = 1, parsed_uri = {user = {
>>> s = 0x7f247637fead 
>>> "7:packetsi32e5:bytesi1896e6:errorsi0eeee5:flagsl11:initialized4:send4:recveeeee6:totalsd3:RTPd7:packetsi4951e5:bytesi158432e6:errorsi0ee4:RTCPd7:packetsi32e5:bytesi1896e6:errorsi0eee6:result2:oke", 
>>> len = 2}, passwd = {
>>> s = 0x7f247637feaf 
>>> "packetsi32e5:bytesi1896e6:errorsi0eeee5:flagsl11:initialized4:send4:recveeeee6:totalsd3:RTPd7:packetsi4951e5:bytesi158432e6:errorsi0ee4:RTCPd7:packetsi32e5:bytesi1896e6:errorsi0eee6:result2:oke", 
>>> len = 7}, host = {s = 0x900000002 <Address 0x900000002 out of 
>>> bounds>, len = 1}, port = {
>>> s = 0x7f247acb5038 "\004", len = 0}, params = {s = 0x0, len = 
>>> 2060145336}, sip_params = {s = 0x7fff2b9f3e50 "@f\313z$\177", len = 
>>> 2}, headers = {
>>> s = 0x7f247637feb6 
>>> "i32e5:bytesi1896e6:errorsi0eeee5:flagsl11:initialized4:send4:recveeeee6:totalsd3:RTPd7:packetsi4951e5:bytesi158432e6:errorsi0ee4:RTCPd7:packetsi32e5:bytesi1896e6:errorsi0eee6:result2:oke", 
>>> len = 4}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, 
>>> transport = {
>>> s = 0x400000001 <Address 0x400000001 out of bounds>, len = 32}, ttl 
>>> = {s = 0x7f247acb5038 "\004", len = 0}, user_param = {s = 0x0, len = 
>>> 2060145432},
>>> maddr = {s = 0x7fff2b9f3e50 "@f\313z$\177", len = 1}, method = {
>>> s = 0x7f247637feba 
>>> "5:bytesi1896e6:errorsi0eeee5:flagsl11:initialized4:send4:recveeeee6:totalsd3:RTPd7:packetsi4951e5:bytesi158432e6:errorsi0ee4:RTCPd7:packetsi32e5:bytesi1896e6:errorsi0eee6:result2:oke", 
>>> len = 2}, lr = {
>>> s = 0x7f247637febc 
>>> "bytesi1896e6:errorsi0eeee5:flagsl11:initialized4:send4:recveeeee6:totalsd3:RTPd7:packetsi4951e5:bytesi158432e6:errorsi0ee4:RTCPd7:packetsi32e5:bytesi1896e6:errorsi0eee6:result2:oke", 
>>> len = 5}, r2 = {s = 0x700000002 <Address 0x700000002 out of bounds>, 
>>> len = 1522079939}, gr = {
>>> s = 0x7f247acb5038 "\004", len = 0}, transport_val = {s = 0x0, len = 
>>> 2060145528}, ttl_val = {s = 0x7fff2b9f3e50 "@f\313z$\177", len = 2},
>>> user_param_val = {
>>> s = 0x7f247637fec1 
>>> "i1896e6:errorsi0eeee5:flagsl11:initialized4:send4:recveeeee6:totalsd3:RTPd7:packetsi4951e5:bytesi158432e6:errorsi0ee4:RTCPd7:packetsi32e5:bytesi1896e6:errorsi0eee6:result2:oke", 
>>> len = 6}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 
>>> 0x600000001 <Address 0x600000001 out of bounds>,
>>> len = 1896}, lr_val = {s = 0x7f247acb5038 "\004", len = 0}, r2_val = 
>>> {s = 0x0, len = 2060145624}, gr_val = {s = 0x7fff2b9f3e50 
>>> "@f\313z$\177", len = 1}},
>>> parsed_orig_ruri_ok = 1983381191, parsed_orig_ruri = {user = {s = 
>>> 0x2 <Address 0x2 out of bounds>, len = 1983381193}, passwd = {
>>> s = 0x6 <Address 0x6 out of bounds>, len = 2}, host = {s = 0x0, len 
>>> = 2060144696}, port = {s = 0x0, len = 0}, params = {s = 
>>> 0x7f247acb54d8 "\002",
>>> ---Type <return> to continue, or q <return> to quit---
>>> len = 731856464}, sip_params = {s = 0x0, len = 0}, headers = {s = 
>>> 0x0, len = 0}, port_no = 49344, proto = 49344, type = ERROR_URI_T, 
>>> flags = 2882400237,
>>> transport = {s = 0x0, len = 0}, ttl = {s = 0x218 <Address 0x218 out 
>>> of bounds>, len = 2060144520}, user_param = {s = 0x218 <Address 
>>> 0x218 out of bounds>,
>>> len = 2060146440}, maddr = {s = 0x7f247616ebb0 "rtpengine: 
>>> bencode.c", len = 1981214752}, method = {s = 0x7f247616eba6 
>>> "rtpengine", len = 139}, lr = {
>>> s = 0xf0f0f0f0 <Address 0xf0f0f0f0 out of bounds>, len = 
>>> 2060146360}, r2 = {s = 0x20 <Address 0x20 out of bounds>, len = 
>>> 2060145216}, gr = {
>>> s = 0x2 <Address 0x2 out of bounds>, len = 1983381199}, 
>>> transport_val = {s = 0x3 <Address 0x3 out of bounds>, len = 0}, 
>>> ttl_val = {s = 0x0, len = 1},
>>> user_param_val = {s = 0x0, len = 2060144696}, maddr_val = {s = 0x0, 
>>> len = 0}, method_val = {s = 0x0, len = 731856464}, lr_val = {
>>> s = 0x1 <Address 0x1 out of bounds>, len = 1983381205}, r2_val = {s 
>>> = 0x2 <Address 0x2 out of bounds>, len = 1983381207}, gr_val = {
>>> s = 0x5 <Address 0x5 out of bounds>, len = 2}}, add_rm = 
>>> 0x7f247acb5878, body_lumps = 0x7f247aa43300, reply_lump = 0x0,
>>> add_to_branch_s = 
>>> "\000\000\000\000\000\000\000\000\230U\313z$\177\000\000P>\237+\377\177\000\000\003\000\000\000\000\000\000\000\244\353\026v$\177\000\000\001\000\000\000\000\000\000\000\240\353\026v$\177\000\000\001", 
>>> add_to_branch_len = 0, hash_index = 8, msg_flags = 28, flags = 
>>> 2060162240, set_global_address = {
>>> s = 0x7f247aa43300 "\004", len = 2060146168}, set_global_port = {s = 
>>> 0x7f247acb5758 "\001", len = 0}, force_send_socket = 0x7fff2b9f3e50, 
>>> path_vec = {
>>> s = 0x1 <Address 0x1 out of bounds>, len = 1983381213}, instance = 
>>> {s = 0x3 <Address 0x3 out of bounds>, len = 1983381216}, reg_id = 
>>> 11, ruid = {
>>> s = 0xe00000002 <Address 0xe00000002 out of bounds>, len = 0}, 
>>> location_ua = {s = 0x7f247acb5598 "\003", len = 0}, ldv = {flow = 
>>> {decoded = 0, rcv = {
>>> src_ip = {af = 2060146264, len = 32548, u = {addrl = 
>>> {140733925244496, 30064771073}, addr32 = {731856464, 32767, 1, 7}, 
>>> addr16 = {15952, 11167, 32767,
>>> 0, 1, 0, 7, 0}, addr = 
>>> "P>\237+\377\177\000\000\001\000\000\000\a\000\000"}}, dst_ip = {af 
>>> = 1983381227, len = 32548, u = {addrl = {2,
>>> 139794578931437}, addr32 = {2, 0, 1983381229, 32548}, addr16 = {2, 
>>> 0, 0, 0, 65261, 30263, 32548, 0},
>>> addr = "\002\000\000\000\000\000\000\000\355\376\067v$\177\000"}}, 
>>> src_port = 4, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 
>>> 2, src_su = {
>>> s = {sa_family = 6, sa_data = 
>>> "\000\000P>\237+\377\177\000\000\230U\313z"}, sin = {sin_family = 6, 
>>> sin_port = 0, sin_addr = {s_addr = 731856464},
>>> sin_zero = "\377\177\000\000\230U\313z"}, sin6 = {sin6_family = 6, 
>>> sin6_port = 0, sin6_flowinfo = 731856464, sin6_addr = {__in6_u = {
>>> __u6_addr8 = "\377\177\000\000\230U\313z$\177\000\000\000\000\000", 
>>> __u6_addr16 = {32767, 0, 21912, 31435, 32548, 0, 0, 0}, __u6_addr32 = {
>>> 32767, 2060146072, 32548, 0}}}, sin6_scope_id = 0}}, bind_address = 
>>> 0x0, proto = 88 'X'}}}}
>>> (gdb)
>>>
>>> (gdb) bt full
>>> #0 0x00000036e8a32925 in raise () from /lib64/libc.so.6
>>> No symbol table info available.
>>> #1 0x00000036e8a34105 in abort () from /lib64/libc.so.6
>>> No symbol table info available.
>>> #2 0x0000000000654c24 in qm_free (qmp=0x7f23b9cba000, 
>>> p=0x7f247acb5878, file=0x7f2479e3cd86 "tm: h_table.c", 
>>> func=0x7f2479e3d070 "free_cell_helper", line=187,
>>> mname=0x7f2479e3c780 "tm") at core/mem/q_malloc.c:471
>>> qm = 0x7f23b9cba000
>>> f = 0x7f23bc87a2c8
>>> size = 528
>>> next = 0x400
>>> prev = 0x7fff2b9f7920
>>> __FUNCTION__ = "qm_free"
>>> #3 0x00007f2479d6bf16 in free_cell_helper (dead_cell=0x7f23c54fea50, 
>>> silent=0, fname=0x7f2479e4da80 "timer.c", fline=651) at h_table.c:187
>>> b = 0x0
>>> i = 1
>>> rpl = 0x7f247acb4fc0
>>> tt = 0x0
>>> foo = 0x7f23b9e2bd90
>>> cbs = 0x0
>>> cbs_tmp = 0x7f23c60c16b0
>>> __FUNCTION__ = "free_cell_helper"
>>> #4 0x00007f2479db8148 in wait_handler (ti=1503818844, 
>>> wait_tl=0x7f23c54fead0, data=0x7f23c54fea50) at timer.c:651
>>> p_cell = 0x7f23c54fea50
>>> ret = 1
>>> #5 0x0000000000629578 in timer_list_expire (t=1503818844, 
>>> h=0x7f23b9d38dc0, slow_l=0x7f23b9d3b0c8, slow_mark=43533) at 
>>> core/timer.c:874
>>> tl = 0x7f23c54fead0
>>> ret = 0
>>> #6 0x00000000006299d4 in timer_handler () at core/timer.c:939
>>> saved_ticks = 1503818844
>>> run_slow_timer = 0
>>> i = 525
>>> __FUNCTION__ = "timer_handler"
>>> #7 0x0000000000629e73 in timer_main () at core/timer.c:978
>>> No locals.
>>> #8 0x0000000000422d4e in main_loop () at main.c:1690
>>> i = 1
>>> pid = 0
>>> si = 0x0
>>> si_desc = "udp receiver child=0 sock=100.100.100.169:5060", '\000' 
>>> <repeats 16 times>, 
>>> "\001\000\000\000\340|\237+\377\177\000\000W\327e\000\000\000\000\000\200\335u\000\000\000\000\000\250\065\313zo\000\000\000\316\357u\000\000\000\000\000\205\335u\000\000\000\000\000\004\000\000\000\000\000\000\000\000\240˹#\177---Type 
>>> <return> to continue, or q <return> to quit---
>>> \000"
>>> nrprocs = 1
>>> woneinit = 1
>>> __FUNCTION__ = "main_loop"
>>> #9 0x0000000000429732 in main (argc=13, argv=0x7fff2b9f8088) at 
>>> main.c:2639
>>> cfg_stream = 0x1f8f010
>>> c = -1
>>> r = 0
>>> tmp = 0x7fff2b9f8742 ""
>>> tmp_len = 54
>>> port = -398323320
>>> proto = 54
>>> options = 0x732e78 
>>> ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
>>> ret = -1
>>> seed = 3083103015
>>> rfd = 4
>>> debug_save = 0
>>> debug_flag = 0
>>> dont_fork_cnt = 0
>>> n_lst = 0x36e8a90687
>>> p = 0x7fff2b9f7f88 "\200\200\237+\377\177"
>>> st = {st_dev = 2307, st_ino = 9183277, st_nlink = 3, st_mode = 
>>> 16832, st_uid = 522, st_gid = 501, __pad0 = 0, st_rdev = 0, st_size 
>>> = 4096,
>>> st_blksize = 4096, st_blocks = 8, st_atim = {tv_sec = 1496231473, 
>>> tv_nsec = 0}, st_mtim = {tv_sec = 1520405673, tv_nsec = 0}, st_ctim = {
>>> tv_sec = 1520405673, tv_nsec = 0}, __unused = {0, 0, 0}}
>>> __FUNCTION__ = "main"
>>> (gdb)
>>>
>>> i dont know if you can help us to know the reason of the crash, 
>>> because the call trace seemed quite normal, and we don't know if the 
>>> cause was from the rtpengine responses of the bye requests, or was 
>>> caused by the request retransmisions, which would be rare because we 
>>> sometimes have those type of calls.
>>>
>>> thanks a lot and regards
>>>
>>> david
>>>
>>>
>>>
>>> _______________________________________________
>>> Kamailio (SER) - Users Mailing List
>>> sr-users at lists.kamailio.org
>>> https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
>>
>> -- 
>> Daniel-Constantin Mierla
>> www.twitter.com/miconda  --www.linkedin.com/in/miconda
>> Kamailio Advanced Training - April 16-18, 2018, Berlin -www.asipto.com
>> Kamailio World Conference - May 14-16, 2018 -www.kamailioworld.com
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-users/attachments/20180404/db8f03cd/attachment.html>


More information about the sr-users mailing list