[SR-Users] rare crash at kamailio 5.0.1

David Escartin descartin at bts.io
Wed Apr 25 18:48:53 CEST 2018


hello Daniel

sorry for the delay
i'm afraid i couldn't, since the pcap were captured on the ISP link, so 
only got the interface between the proxy and the carrier.

I also couldnt experience more crashes like those to active a better 
trace debug to have the other side of the trace.
HOwever, i suspect (with no real basis :) ) that crashes maybe were 
related with some http post request me made to an external app to send 
some call data to be processed, and some nodes where the http req were 
sent to, were down or missconfigured in the app, so maybe that had 
relation. (we were using async relay involved for that too).
I have no basis  for that, only guessing, but when kamailio run on a 
server with remote nodes of the app well configured, no crash at all, 
and all crashes started to happen when the kamailio instance was running 
on a server which had those issue to send the http requests

anycase, if i have any more info about i will let you know

best regards
david


On 11/04/18 17:45, Daniel-Constantin Mierla wrote:
>
> Hello,
>
> the sip trace (pcap) I got has the sip traffic in one side only, can 
> you get both sides (what kamailio receives and also what it sends out)?
>
> Cheers,
> Daniel
>
>
> On 30.03.18 09:14, David Escartin wrote:
>>
>> Hello all
>>
>> last March 26th we experienced a crash on a 5.0.1 kamailio server and 
>> a core was generated.
>> Seems that the call involved in the core generated was doing several 
>> retransmisions of a request (expected) and when it finally forwarded 
>> the request upstream, seems fter receiving a 481 from a-side, it crashed.
>>
>> here you have the backtrace
>>
>> <154>Mar 26 19:54:03 mad-proxy-inout-1 
>> /usr/local/kamailio/sbin/kamailio[24992]: : <core> 
>> [core/mem/q_malloc.c:469]: qm_free(): BUG: qm_free: bad pointer 
>> 0x7f247acb5878 (out of memory block!) called from tm: h_table.c: 
>> free_cell_helper(187) - aborting
>>
>> (gdb) bt
>> #0 0x00000036e8a32925 in raise () from /lib64/libc.so.6
>> #1 0x00000036e8a34105 in abort () from /lib64/libc.so.6
>> #2 0x0000000000654c24 in qm_free (qmp=0x7f23b9cba000, 
>> p=0x7f247acb5878, file=0x7f2479e3cd86 "tm: h_table.c", 
>> func=0x7f2479e3d070 "free_cell_helper", line=187,
>> mname=0x7f2479e3c780 "tm") at core/mem/q_malloc.c:471
>> #3 0x00007f2479d6bf16 in free_cell_helper (dead_cell=0x7f23c54fea50, 
>> silent=0, fname=0x7f2479e4da80 "timer.c", fline=651) at h_table.c:187
>> #4 0x00007f2479db8148 in wait_handler (ti=1503818844, 
>> wait_tl=0x7f23c54fead0, data=0x7f23c54fea50) at timer.c:651
>> #5 0x0000000000629578 in timer_list_expire (t=1503818844, 
>> h=0x7f23b9d38dc0, slow_l=0x7f23b9d3b0c8, slow_mark=43533) at 
>> core/timer.c:874
>> #6 0x00000000006299d4 in timer_handler () at core/timer.c:939
>> #7 0x0000000000629e73 in timer_main () at core/timer.c:978
>> #8 0x0000000000422d4e in main_loop () at main.c:1690
>> #9 0x0000000000429732 in main (argc=13, argv=0x7fff2b9f8088) at 
>> main.c:2639
>>
>>
>> (gdb) frame 4
>> #4 0x00007f2479db8148 in wait_handler (ti=1503818844, 
>> wait_tl=0x7f23c54fead0, data=0x7f23c54fea50) at timer.c:651
>> 651 UNREF_FREE(p_cell);
>>
>> (gdb) info locals
>> p_cell = 0x7f23c54fea50
>> ret = 1
>>
>> (gdb) p *p_cell
>> $1 = {next_c = 0x0, prev_c = 0x0, hash_index = 28196, label = 
>> 341555146, flags = 4132, nr_of_outgoings = 2, ref_count = {val = 0}, 
>> from = {
>> s = 0x7f23c87c79ed "From: 
>> <sip:932687220 at 100.100.100.177;user=phone;noa=national>;tag=50aa4a46-co11146-INS002\r\nCall-ID: 
>> b8997821-2814-46d3-b8f7-cf690f50f640\r\nCSeq: 1114601 
>> BYE\r\nUser-Agent: ENSR3.0.67.10-IS2-RMRG1119-RG2040"..., len = 89}, 
>> callid = {
>> s = 0x7f23c87c7a46 "Call-ID: 
>> b8997821-2814-46d3-b8f7-cf690f50f640\r\nCSeq: 1114601 
>> BYE\r\nUser-Agent: 
>> ENSR3.0.67.10-IS2-RMRG1119-RG2040-CPI1-CPO2612\r\nContent-Length: 
>> 0\r\n\r\n", len = 47}, cseq_n = {
>> s = 0x7f23c87c7a75 "CSeq: 1114601 BYE\r\nUser-Agent: 
>> ENSR3.0.67.10-IS2-RMRG1119-RG2040-CPI1-CPO2612\r\nContent-Length: 
>> 0\r\n\r\n", len = 13}, to = {
>> s = 0x7f23c87c799e "To: 
>> \"34676893111\"<sip:34676893111 at 100.100.100.134;user=phone>;tag=64jNUpSZK8mSp\r\nFrom: 
>> <sip:932687220 at 100.100.100.177;user=phone;noa=national>;tag=50aa4a46-co11146-INS002\r\nCall-ID: 
>> b8997821-2814-46d3-b8f7"..., len = 79}, method = {
>> s = 0x7f23c87c78c8 "BYE sip:34676893111 at 100.100.100.134:5080 
>> SIP/2.0\r\nVia: SIP/2.0/UDP 
>> 200.200.200.78:5060;branch=z9hG4bK2d5c0cb4e11bb1503BYE50aa466c2b8a\r\nMax-Forwards: 
>> 34\r\nRoute: <sip:100.100.100.177;lr;ftag=64jNUpSZK8mSp;d"..., len = 
>> 3}, tmcb_hl = {first = 0x7f23bd9f7818, reg_types = 131714}, 
>> wait_timer = {
>> next = 0x0, prev = 0x0, expire = 1503818844, initial_timeout = 80, 
>> data = 0x7f23c54fea50, f = 0x7f2479db8097 <wait_handler>, flags = 
>> 513, slow_idx = 0},
>> uas = {request = 0x7f23c87c71d8, end_request = 0x7f23c87c8288 
>> "\300\300\300\300", response = {activ_type = 481, flags = 128, 
>> t_active = 0 '\000', branch = 0,
>> buffer_len = 526,
>> buffer = 0x7f23bef07b18 "SIP/2.0 481 Call Does Not Exist\r\nVia: 
>> SIP/2.0/UDP 
>> 200.200.200.78:5060;branch=z9hG4bK2d5c0cb4e11bb1503BYE50aa466c2b8a\r\nFrom: 
>> <sip:932687220 at 100.100.100.177;user=phone;noa=national>;tag=50aa4a46-co11146-I"..., 
>> my_T = 0x7f23c54fea50, timer = {next = 0x0, prev = 0x0, expire = 0,
>> initial_timeout = 0, data = 0x0, f = 0x7f2479db7b4b 
>> <retr_buf_handler>, flags = 0, slow_idx = 0}, dst = {send_sock = 
>> 0x7f247a95be78, to = {s = {
>> sa_family = 2, sa_data = 
>> "\023\304\325\300\313N\000\000\000\000\000\000\000"}, sin = 
>> {sin_family = 2, sin_port = 50195, sin_addr = {
>> s_addr = 1321976021}, sin_zero = "\000\000\000\000\000\000\000"}, 
>> sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1321976021,
>> sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, 
>> __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
>> sin6_scope_id = 0}}, id = 0, proto = 1 '\001', send_flags = {f = 0 
>> '\000', blst_imask = 0 '\000'}}, retr_expire = 0, fr_expire = 0}, 
>> local_totag = {
>> s = 0x0, len = 0}, cancel_reas = 0x0, status = 481}, uac = 
>> 0x7f23c54fec58, async_backup = {backup_route = 1, backup_branch = 
>> 4294967295, blind_uac = 0,
>> ruri_new = 1}, fwded_totags = 0x0, uri_avps_from = 0x0, uri_avps_to = 
>> 0x0, user_avps_from = 0x0, user_avps_to = 0x0, domain_avps_from = 0x0,
>> domain_avps_to = 0x0, xavps_list = 0x0, reply_mutex = {val = 0}, 
>> reply_locker_pid = {val = 0}, reply_rec_lock_level = 0, fr_timeout = 
>> 480,
>> fr_inv_timeout = 1920, rt_t1_timeout_ms = 650, rt_t2_timeout_ms = 
>> 4000, end_of_life = 1503819200, relayed_reply_branch = 1, on_failure 
>> = 0,
>> on_branch_failure = 0, on_reply = 0, on_branch = 0, on_branch_delayed 
>> = 0, md5 = 0x7f23c54fea50 ""}
>>
>> (gdb) frame 3
>> #3 0x00007f2479d6bf16 in free_cell_helper (dead_cell=0x7f23c54fea50, 
>> silent=0, fname=0x7f2479e4da80 "timer.c", fline=651) at h_table.c:187
>> 187 sip_msg_free_unsafe(rpl);
>>
>> (gdb) info locals
>> b = 0x0
>> i = 1
>> rpl = 0x7f247acb4fc0
>> tt = 0x0
>> foo = 0x7f23b9e2bd90
>> cbs = 0x0
>> cbs_tmp = 0x7f23c60c16b0
>> __FUNCTION__ = "free_cell_helper"
>>
>> (gdb) p *rpl
>> $3 = {id = 2060145040, pid = 32548, tval = {tv_sec = 72, tv_usec = 
>> 139794652378712}, fwd_send_flags = {f = 1 '\001', blst_imask = 0 
>> '\000'}, rpl_send_flags = {
>> f = 0 '\000', blst_imask = 0 '\000'}, first_line = {type = -347, 
>> flags = 30263, len = 32548, u = {request = {method = {s = 0x2 
>> <Address 0x2 out of bounds>,
>> len = 1983381159}, uri = {s = 0x5 <Address 0x5 out of bounds>, len = 
>> 2}, version = {s = 0x2b <Address 0x2b out of bounds>, len = 2057435688},
>> method_value = 0}, reply = {version = {s = 0x2 <Address 0x2 out of 
>> bounds>, len = 1983381159}, status = {s = 0x5 <Address 0x5 out of 
>> bounds>, len = 2},
>> reason = {s = 0x2b <Address 0x2b out of bounds>, len = 2057435688}, 
>> statuscode = 0}}}, via1 = 0x0, via2 = 0x7f247acb5038, headers = 
>> 0x7fff2b9f3e50,
>> last_header = 0x4, parsed_flag = 139794576763810, h_via1 = 0x1, 
>> h_via2 = 0x7f247616eba0, callid = 0x1, to = 0x270000000b, cseq = 0x1, 
>> from = 0x7f247aa1fa28,
>> contact = 0x7f247acb5258, maxforwards = 0x7f247acb54d8, route = 0x0, 
>> record_route = 0x7fff2b9f3e50, content_type = 0x7f247acb5318, 
>> content_length = 0x0,
>> authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 
>> 0x0, require = 0x0, proxy_require = 0x0, unsupported = 
>> 0x7f247acb5258, allow = 0x0,
>> event = 0x7f247acb53d8, accept = 0x0, accept_language = 0x0, 
>> organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x0, 
>> server = 0x0,
>> content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 
>> 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, 
>> subscription_state = 0x0,
>> date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 
>> 0x0, path = 0x7f247a98b6d0, privacy = 0x0, min_expires = 0x0, body = 
>> 0x7f247acb5258,
>> eoh = 0x7fff2b9f3e50 "@f\313z$\177", unparsed = 0x0, rcv = {src_ip = 
>> {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 
>> = {0, 0, 0, 0, 0,
>> 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 
>> 3233857728, len = 0, u = {addrl = {2882400237, 0}, addr32 = 
>> {2882400237, 0, 0, 0},
>> addr16 = {61421, 43981, 0, 0, 0, 0, 0, 0}, addr = "\355\357ͫ", '\000' 
>> <repeats 11 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0,
>> proto_reserved2 = 536, src_su = {s = {sa_family = 0, sa_data = 
>> "\000\000 \266\230z$\177\000\000\030\002\000"}, sin = {sin_family = 
>> 0, sin_port = 0,
>> sin_addr = {s_addr = 2056828448}, sin_zero = 
>> "$\177\000\000\030\002\000"}, sin6 = {sin6_family = 0, sin6_port = 0, 
>> sin6_flowinfo = 2056828448,
>> sin6_addr = {__in6_u = {__u6_addr8 = 
>> "$\177\000\000\030\002\000\000\000\000\000\000\210T\313z", 
>> __u6_addr16 = {32548, 0, 536, 0, 0, 0, 21640, 31435},
>> __u6_addr32 = {32548, 536, 0, 2060145800}}}, sin6_scope_id = 32548}}, 
>> bind_address = 0x7f247616ebb0, proto = 32 ' '},
>> buf = 0x7f247616eba6 "rtpengine", len = 139, new_uri = {s = 
>> 0xf0f0f0f0 <Address 0xf0f0f0f0 out of bounds>, len = 2060145720}, 
>> dst_uri = {
>> s = 0x20 <Address 0x20 out of bounds>, len = 2060144576}, 
>> parsed_uri_ok = 1, parsed_uri = {user = {
>> s = 0x7f247637fead 
>> "7:packetsi32e5:bytesi1896e6:errorsi0eeee5:flagsl11:initialized4:send4:recveeeee6:totalsd3:RTPd7:packetsi4951e5:bytesi158432e6:errorsi0ee4:RTCPd7:packetsi32e5:bytesi1896e6:errorsi0eee6:result2:oke", 
>> len = 2}, passwd = {
>> s = 0x7f247637feaf 
>> "packetsi32e5:bytesi1896e6:errorsi0eeee5:flagsl11:initialized4:send4:recveeeee6:totalsd3:RTPd7:packetsi4951e5:bytesi158432e6:errorsi0ee4:RTCPd7:packetsi32e5:bytesi1896e6:errorsi0eee6:result2:oke", 
>> len = 7}, host = {s = 0x900000002 <Address 0x900000002 out of 
>> bounds>, len = 1}, port = {
>> s = 0x7f247acb5038 "\004", len = 0}, params = {s = 0x0, len = 
>> 2060145336}, sip_params = {s = 0x7fff2b9f3e50 "@f\313z$\177", len = 
>> 2}, headers = {
>> s = 0x7f247637feb6 
>> "i32e5:bytesi1896e6:errorsi0eeee5:flagsl11:initialized4:send4:recveeeee6:totalsd3:RTPd7:packetsi4951e5:bytesi158432e6:errorsi0ee4:RTCPd7:packetsi32e5:bytesi1896e6:errorsi0eee6:result2:oke", 
>> len = 4}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, 
>> transport = {
>> s = 0x400000001 <Address 0x400000001 out of bounds>, len = 32}, ttl = 
>> {s = 0x7f247acb5038 "\004", len = 0}, user_param = {s = 0x0, len = 
>> 2060145432},
>> maddr = {s = 0x7fff2b9f3e50 "@f\313z$\177", len = 1}, method = {
>> s = 0x7f247637feba 
>> "5:bytesi1896e6:errorsi0eeee5:flagsl11:initialized4:send4:recveeeee6:totalsd3:RTPd7:packetsi4951e5:bytesi158432e6:errorsi0ee4:RTCPd7:packetsi32e5:bytesi1896e6:errorsi0eee6:result2:oke", 
>> len = 2}, lr = {
>> s = 0x7f247637febc 
>> "bytesi1896e6:errorsi0eeee5:flagsl11:initialized4:send4:recveeeee6:totalsd3:RTPd7:packetsi4951e5:bytesi158432e6:errorsi0ee4:RTCPd7:packetsi32e5:bytesi1896e6:errorsi0eee6:result2:oke", 
>> len = 5}, r2 = {s = 0x700000002 <Address 0x700000002 out of bounds>, 
>> len = 1522079939}, gr = {
>> s = 0x7f247acb5038 "\004", len = 0}, transport_val = {s = 0x0, len = 
>> 2060145528}, ttl_val = {s = 0x7fff2b9f3e50 "@f\313z$\177", len = 2},
>> user_param_val = {
>> s = 0x7f247637fec1 
>> "i1896e6:errorsi0eeee5:flagsl11:initialized4:send4:recveeeee6:totalsd3:RTPd7:packetsi4951e5:bytesi158432e6:errorsi0ee4:RTCPd7:packetsi32e5:bytesi1896e6:errorsi0eee6:result2:oke", 
>> len = 6}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 
>> 0x600000001 <Address 0x600000001 out of bounds>,
>> len = 1896}, lr_val = {s = 0x7f247acb5038 "\004", len = 0}, r2_val = 
>> {s = 0x0, len = 2060145624}, gr_val = {s = 0x7fff2b9f3e50 
>> "@f\313z$\177", len = 1}},
>> parsed_orig_ruri_ok = 1983381191, parsed_orig_ruri = {user = {s = 0x2 
>> <Address 0x2 out of bounds>, len = 1983381193}, passwd = {
>> s = 0x6 <Address 0x6 out of bounds>, len = 2}, host = {s = 0x0, len = 
>> 2060144696}, port = {s = 0x0, len = 0}, params = {s = 0x7f247acb54d8 
>> "\002",
>> ---Type <return> to continue, or q <return> to quit---
>> len = 731856464}, sip_params = {s = 0x0, len = 0}, headers = {s = 
>> 0x0, len = 0}, port_no = 49344, proto = 49344, type = ERROR_URI_T, 
>> flags = 2882400237,
>> transport = {s = 0x0, len = 0}, ttl = {s = 0x218 <Address 0x218 out 
>> of bounds>, len = 2060144520}, user_param = {s = 0x218 <Address 0x218 
>> out of bounds>,
>> len = 2060146440}, maddr = {s = 0x7f247616ebb0 "rtpengine: 
>> bencode.c", len = 1981214752}, method = {s = 0x7f247616eba6 
>> "rtpengine", len = 139}, lr = {
>> s = 0xf0f0f0f0 <Address 0xf0f0f0f0 out of bounds>, len = 2060146360}, 
>> r2 = {s = 0x20 <Address 0x20 out of bounds>, len = 2060145216}, gr = {
>> s = 0x2 <Address 0x2 out of bounds>, len = 1983381199}, transport_val 
>> = {s = 0x3 <Address 0x3 out of bounds>, len = 0}, ttl_val = {s = 0x0, 
>> len = 1},
>> user_param_val = {s = 0x0, len = 2060144696}, maddr_val = {s = 0x0, 
>> len = 0}, method_val = {s = 0x0, len = 731856464}, lr_val = {
>> s = 0x1 <Address 0x1 out of bounds>, len = 1983381205}, r2_val = {s = 
>> 0x2 <Address 0x2 out of bounds>, len = 1983381207}, gr_val = {
>> s = 0x5 <Address 0x5 out of bounds>, len = 2}}, add_rm = 
>> 0x7f247acb5878, body_lumps = 0x7f247aa43300, reply_lump = 0x0,
>> add_to_branch_s = 
>> "\000\000\000\000\000\000\000\000\230U\313z$\177\000\000P>\237+\377\177\000\000\003\000\000\000\000\000\000\000\244\353\026v$\177\000\000\001\000\000\000\000\000\000\000\240\353\026v$\177\000\000\001", 
>> add_to_branch_len = 0, hash_index = 8, msg_flags = 28, flags = 
>> 2060162240, set_global_address = {
>> s = 0x7f247aa43300 "\004", len = 2060146168}, set_global_port = {s = 
>> 0x7f247acb5758 "\001", len = 0}, force_send_socket = 0x7fff2b9f3e50, 
>> path_vec = {
>> s = 0x1 <Address 0x1 out of bounds>, len = 1983381213}, instance = {s 
>> = 0x3 <Address 0x3 out of bounds>, len = 1983381216}, reg_id = 11, 
>> ruid = {
>> s = 0xe00000002 <Address 0xe00000002 out of bounds>, len = 0}, 
>> location_ua = {s = 0x7f247acb5598 "\003", len = 0}, ldv = {flow = 
>> {decoded = 0, rcv = {
>> src_ip = {af = 2060146264, len = 32548, u = {addrl = 
>> {140733925244496, 30064771073}, addr32 = {731856464, 32767, 1, 7}, 
>> addr16 = {15952, 11167, 32767,
>> 0, 1, 0, 7, 0}, addr = 
>> "P>\237+\377\177\000\000\001\000\000\000\a\000\000"}}, dst_ip = {af = 
>> 1983381227, len = 32548, u = {addrl = {2,
>> 139794578931437}, addr32 = {2, 0, 1983381229, 32548}, addr16 = {2, 0, 
>> 0, 0, 65261, 30263, 32548, 0},
>> addr = "\002\000\000\000\000\000\000\000\355\376\067v$\177\000"}}, 
>> src_port = 4, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 2, 
>> src_su = {
>> s = {sa_family = 6, sa_data = 
>> "\000\000P>\237+\377\177\000\000\230U\313z"}, sin = {sin_family = 6, 
>> sin_port = 0, sin_addr = {s_addr = 731856464},
>> sin_zero = "\377\177\000\000\230U\313z"}, sin6 = {sin6_family = 6, 
>> sin6_port = 0, sin6_flowinfo = 731856464, sin6_addr = {__in6_u = {
>> __u6_addr8 = "\377\177\000\000\230U\313z$\177\000\000\000\000\000", 
>> __u6_addr16 = {32767, 0, 21912, 31435, 32548, 0, 0, 0}, __u6_addr32 = {
>> 32767, 2060146072, 32548, 0}}}, sin6_scope_id = 0}}, bind_address = 
>> 0x0, proto = 88 'X'}}}}
>> (gdb)
>>
>> (gdb) bt full
>> #0 0x00000036e8a32925 in raise () from /lib64/libc.so.6
>> No symbol table info available.
>> #1 0x00000036e8a34105 in abort () from /lib64/libc.so.6
>> No symbol table info available.
>> #2 0x0000000000654c24 in qm_free (qmp=0x7f23b9cba000, 
>> p=0x7f247acb5878, file=0x7f2479e3cd86 "tm: h_table.c", 
>> func=0x7f2479e3d070 "free_cell_helper", line=187,
>> mname=0x7f2479e3c780 "tm") at core/mem/q_malloc.c:471
>> qm = 0x7f23b9cba000
>> f = 0x7f23bc87a2c8
>> size = 528
>> next = 0x400
>> prev = 0x7fff2b9f7920
>> __FUNCTION__ = "qm_free"
>> #3 0x00007f2479d6bf16 in free_cell_helper (dead_cell=0x7f23c54fea50, 
>> silent=0, fname=0x7f2479e4da80 "timer.c", fline=651) at h_table.c:187
>> b = 0x0
>> i = 1
>> rpl = 0x7f247acb4fc0
>> tt = 0x0
>> foo = 0x7f23b9e2bd90
>> cbs = 0x0
>> cbs_tmp = 0x7f23c60c16b0
>> __FUNCTION__ = "free_cell_helper"
>> #4 0x00007f2479db8148 in wait_handler (ti=1503818844, 
>> wait_tl=0x7f23c54fead0, data=0x7f23c54fea50) at timer.c:651
>> p_cell = 0x7f23c54fea50
>> ret = 1
>> #5 0x0000000000629578 in timer_list_expire (t=1503818844, 
>> h=0x7f23b9d38dc0, slow_l=0x7f23b9d3b0c8, slow_mark=43533) at 
>> core/timer.c:874
>> tl = 0x7f23c54fead0
>> ret = 0
>> #6 0x00000000006299d4 in timer_handler () at core/timer.c:939
>> saved_ticks = 1503818844
>> run_slow_timer = 0
>> i = 525
>> __FUNCTION__ = "timer_handler"
>> #7 0x0000000000629e73 in timer_main () at core/timer.c:978
>> No locals.
>> #8 0x0000000000422d4e in main_loop () at main.c:1690
>> i = 1
>> pid = 0
>> si = 0x0
>> si_desc = "udp receiver child=0 sock=100.100.100.169:5060", '\000' 
>> <repeats 16 times>, 
>> "\001\000\000\000\340|\237+\377\177\000\000W\327e\000\000\000\000\000\200\335u\000\000\000\000\000\250\065\313zo\000\000\000\316\357u\000\000\000\000\000\205\335u\000\000\000\000\000\004\000\000\000\000\000\000\000\000\240˹#\177---Type 
>> <return> to continue, or q <return> to quit---
>> \000"
>> nrprocs = 1
>> woneinit = 1
>> __FUNCTION__ = "main_loop"
>> #9 0x0000000000429732 in main (argc=13, argv=0x7fff2b9f8088) at 
>> main.c:2639
>> cfg_stream = 0x1f8f010
>> c = -1
>> r = 0
>> tmp = 0x7fff2b9f8742 ""
>> tmp_len = 54
>> port = -398323320
>> proto = 54
>> options = 0x732e78 
>> ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
>> ret = -1
>> seed = 3083103015
>> rfd = 4
>> debug_save = 0
>> debug_flag = 0
>> dont_fork_cnt = 0
>> n_lst = 0x36e8a90687
>> p = 0x7fff2b9f7f88 "\200\200\237+\377\177"
>> st = {st_dev = 2307, st_ino = 9183277, st_nlink = 3, st_mode = 16832, 
>> st_uid = 522, st_gid = 501, __pad0 = 0, st_rdev = 0, st_size = 4096,
>> st_blksize = 4096, st_blocks = 8, st_atim = {tv_sec = 1496231473, 
>> tv_nsec = 0}, st_mtim = {tv_sec = 1520405673, tv_nsec = 0}, st_ctim = {
>> tv_sec = 1520405673, tv_nsec = 0}, __unused = {0, 0, 0}}
>> __FUNCTION__ = "main"
>> (gdb)
>>
>> i dont know if you can help us to know the reason of the crash, 
>> because the call trace seemed quite normal, and we don't know if the 
>> cause was from the rtpengine responses of the bye requests, or was 
>> caused by the request retransmisions, which would be rare because we 
>> sometimes have those type of calls.
>>
>> thanks a lot and regards
>>
>> david
>>
>>
>>
>> _______________________________________________
>> Kamailio (SER) - Users Mailing List
>> sr-users at lists.kamailio.org
>> https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
>
> -- 
> Daniel-Constantin Mierla
> www.twitter.com/miconda  --www.linkedin.com/in/miconda
> Kamailio Advanced Training - April 16-18, 2018, Berlin -www.asipto.com
> Kamailio World Conference - May 14-16, 2018 -www.kamailioworld.com

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-users/attachments/20180425/a0f4a17c/attachment.html>


More information about the sr-users mailing list