[SR-Users] Kamailio 5.3.2 crashing continuously

harneet singh hbilling at gmail.com
Fri Apr 10 10:19:51 CEST 2020


Hi Daniel,

Please see the requested details below:

SETUP: Kamailio Version 5.3.3 being used. Similar issues were seen in
Kamailio 5.3.2 as well so we upgraded anyhow.
       Kamailio is acting as a Call Stateful Proxy with Dispatcher module
enabled with Algorith-10 being used(Call Load based Routing) though there
is only one UAS in our case for now.
  The load is a very simple one.

  UAC(Sipp)  --------- Kamailio ----------- UAS(Sipp)

  Initial INVITE-- 200OK -- ACK happens properly. Then UAS sends an UPDATE
after 1 minute which is passed properly to UAC which sends a 200OK and that
reaches UAS. After another minute, the UAS sends another refresh UPDATE to
Kamailio and at the same time UAC sends BYE for the call. Please note that
this is a very time sensitive issue and happens only when such a glare
happens at Kamailio. Crash is not seen with a single call. However, at 50
cps, the crashes appears at a regular interval of 4-5 minutes.

Crash-1 and Crash-2 are seen almost at the same timestamp whereas the
Crash-3 is seen on the new restarted kamailio instance that is handling
calls and the in-dialog messages of the prevoious kamailio instance.

[root at localhost tmp]# ll
total 3161744
-rw------- 1 kamailio kamailio 1111052288 Apr  9 18:57
core.kamailio.995.1586438821.869  ----> CRASH-1
-rw------- 1 kamailio kamailio 1110773760 Apr  9 18:57
core.kamailio.995.1586438824.867  ----> CRASH-2
-rw------- 1 kamailio kamailio 1111052288 Apr  9 18:59
core.kamailio.995.1586438991.3775 ----> CRASH-3

CRASH-1:
---------

Logs:

Apr  9 18:57:01 localhost /usr/local/sbin/kamailio[869]: CRITICAL: {1 10648
INVITE NbfWyDfdCt6TCoZbZw.78R.f7gh-HCND} <core> [core/mem/q_malloc.c:150]:
qm_debug_check_frag(): BUG: qm: prev. fragm. tail overwritten(78,
abcdefed)[0x7f7a5bd1e5d8:0x7f7a5bd1e610]! Memory allocator was called from
dialog: dlg_hash.c:544. Fragment marked by dialog: dlg_handlers.c:308. Exec
from core/mem/q_malloc.c:391.
Apr  9 18:57:01 localhost /usr/local/sbin/kamailio[869]: CRITICAL: {1 10648
INVITE NbfWyDfdCt6TCoZbZw.78R.f7gh-HCND} <core> [core/mem/q_malloc.c:155]:
qm_debug_check_frag(): BUG: qm: prev. fragm. tail overwritten
[0x7f7a5bd1e568:0x7f7a5bd1e5a0] - fragment marked by dialog:
dlg_handlers.c:308
Apr  9 18:57:03 localhost mysqld: 2020-04-09 18:57:03 276 [Warning] Aborted
connection 276 to db: 'kamailio' user: 'kamailio' host: 'localhost' (Got an
error reading communication packets)
Apr  9 18:57:03 localhost /usr/local/sbin/kamailio[867]: ALERT: <core>
[main.c:767]: handle_sigs(): child process 869 exited by a signal 6
Apr  9 18:57:03 localhost /usr/local/sbin/kamailio[867]: ALERT: <core>
[main.c:770]: handle_sigs(): core was generated

Full BackTrace:

[root at localhost tmp]# /opt/rh/devtoolset-7/root/bin/gdb
/usr/local/sbin/kamailio core.kamailio.995.1586438821.869
GNU gdb (GDB) Red Hat Enterprise Linux 8.0.1-36.el7
Copyright (C) 2017 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html
>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/local/sbin/kamailio...done.
[New LWP 869]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/libthread_db.so.1".
Core was generated by `/usr/local/sbin/kamailio -P
/var/run/kamailio/kamailio.pid -f /usr/local/etc/ka'.
Program terminated with signal SIGABRT, Aborted.
#0  0x00007f7aa3a29337 in __GI_raise (sig=sig at entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:55
55        return INLINE_SYSCALL (tgkill, 3, pid, selftid, sig);
(gdb) bt full
#0  0x00007f7aa3a29337 in __GI_raise (sig=sig at entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:55
        resultvar = 0
        pid = 869
        selftid = 869
#1  0x00007f7aa3a2aa28 in __GI_abort () at abort.c:90
        save_stage = 2
        act = {__sigaction_handler = {sa_handler = 0x7cafe4, sa_sigaction =
0x7cafe4}, sa_mask = {__val = {50, 11474112, 0, 851352, 1301680, 1304944,
8, 2,
              21474836483, 140163493761024, 9015141347359, 98784247808,
140163493996064, 32252848, 140164708874416, 8171492}}, sa_flags = 50,
          sa_restorer = 0x7f7aa3aeb8b0 <__syslog>}
        sigs = {__val = {32, 0 <repeats 15 times>}}
#2  0x000000000069deac in qm_debug_check_frag (qm=0x7f7a5b419000,
f=0x7f7a5bd1e5d8, file=0x7f7a9b8e2187 "dialog: dlg_hash.c", line=544,
    efile=0x8094ff "core/mem/q_malloc.c", eline=391) at
core/mem/q_malloc.c:158
        p = 0x7f7a5bd1e568
        __FUNCTION__ = "qm_debug_check_frag"
#3  0x000000000069f9b9 in qm_malloc (qmp=0x7f7a5b419000, size=8,
file=0x7f7a9b8e2187 "dialog: dlg_hash.c",
    func=0x7f7a9b8e4f30 <__FUNCTION__.13318> "dlg_set_leg_info", line=544,
mname=0x7f7a9b8e2180 "dialog") at core/mem/q_malloc.c:391
        qm = 0x7f7a5b419000
        f = 0x7f7a5bd1e5d8
        hash = 2
        list_cntr = 1
        __FUNCTION__ = "qm_malloc"
#4  0x00000000006aaa6d in qm_shm_malloc (qmp=0x7f7a5b419000, size=5,
file=0x7f7a9b8e2187 "dialog: dlg_hash.c",
    func=0x7f7a9b8e4f30 <__FUNCTION__.13318> "dlg_set_leg_info", line=544,
mname=0x7f7a9b8e2180 "dialog") at core/mem/q_malloc.c:1226
        r = 0x7f7a5b9b7050
#5  0x00007f7a9b850fcd in dlg_set_leg_info (dlg=0x7f7a5b9ba288,
tag=0x7f7aa1b2f210, rr=0x7ffc64edf810, contact=0x7ffc64edf820,
cseq=0x7ffc64edf830, leg=0)
    at dlg_hash.c:544
        cs = {
          s = 0xa955fc <buf+348> "10648 INVITE\r\nAllow: PRACK, INVITE,
ACK, BYE, CANCEL, UPDATE, INFO, SUBSCRIBE, NOTIFY, REFER, MESSAGE,
OPTIONS\r\nSupported: replaces, 100rel, timer,
norefersub\r\nSession-Expires: 120\r\nMin-SE: 120\r\nUser-"..., len = 5}
        __FUNCTION__ = "dlg_set_leg_info"
#6  0x00007f7a9b87bd78 in populate_leg_info (dlg=0x7f7a5b9ba288,
msg=0x7f7aa1b2df10, t=0x0, leg=0, tag=0x7f7aa1b2f210) at dlg_handlers.c:266
        skip_recs = 0
        own_rr = 0
---Type <return> to continue, or q <return> to quit---
        cseq = {
          s = 0xa955fc <buf+348> "10648 INVITE\r\nAllow: PRACK, INVITE,
ACK, BYE, CANCEL, UPDATE, INFO, SUBSCRIBE, NOTIFY, REFER, MESSAGE,
OPTIONS\r\nSupported: replaces, 100rel, timer,
norefersub\r\nSession-Expires: 120\r\nMin-SE: 120\r\nUser-"..., len = 5}
        contact = {
          s = 0xa955b2 <buf+274> "sip:10.201.8.5:5060;ob>\r\nCall-ID:
NbfWyDfdCt6TCoZbZw.78R.f7gh-HCND\r\nCSeq: 10648 INVITE\r\nAllow: PRACK,
INVITE, ACK, BYE, CANCEL, UPDATE, INFO, SUBSCRIBE, NOTIFY, REFER, MESSAGE,
OPTIONS\r\nSupported: rep"..., len = 22}
        rr_set = {s = 0x0, len = 0}
        __FUNCTION__ = "populate_leg_info"
#7  0x00007f7a9b883f38 in dlg_new_dialog (req=0x7f7aa1b2df10, t=0x0,
run_initial_cbs=1) at dlg_handlers.c:949
        dlg = 0x7f7a5b9ba288
        s = {s = 0xf614f80000000000 <error: Cannot access memory at address
0xf614f80000000000>, len = -1582559920}
        callid = {
          s = 0xa955d4 <buf+308> "NbfWyDfdCt6TCoZbZw.78R.f7gh-HCND\r\nCSeq:
10648 INVITE\r\nAllow: PRACK, INVITE, ACK, BYE, CANCEL, UPDATE, INFO,
SUBSCRIBE, NOTIFY, REFER, MESSAGE, OPTIONS\r\nSupported: replaces, 100rel,
timer, norefersub\r\n"..., len = 32}
        ftag = {
          s = 0xa95564 <buf+196> "9s2l4B7KJz0pm8tKXwR39PGRVnJm8sK3\r\nTo:
sip:+918123088839 at 172.27.6.5\r\nContact: <sip:10.201.8.5:5060;ob>\r\nCall-ID:
NbfWyDfdCt6TCoZbZw.78R.f7gh-HCND\r\nCSeq: 10648 INVITE\r\nAllow: PRACK,
INVITE, ACK, BYE, CA"..., len = 32}
        ttag = {s = 0x0, len = 0}
        req_uri = {s = 0x7f7aa1a5d910
"sip:+918123088839 at 172.27.6.5:5060;transport=udp",
len = 47}
        dir = 0
        __FUNCTION__ = "dlg_new_dialog"
#8  0x00007f7a9b890325 in dlg_manage (msg=0x7f7aa1b2df10) at
dlg_handlers.c:1864
        tag = {s = 0x0, len = 0}
        backup_mode = 0
        dlg = 0x0
        t = 0x0
        __FUNCTION__ = "dlg_manage"
#9  0x00007f7a9b8c869c in w_dlg_manage (msg=0x7f7aa1b2df10, s1=0x0, s2=0x0)
at dialog.c:1094
No locals.
#10 0x0000000000458b36 in do_action (h=0x7ffc64ee10b0, a=0x7f7aa1ac3fb0,
msg=0x7f7aa1b2df10) at core/action.c:1071
        ret = -5
        v = 1
        dst = {send_sock = 0x419210 <_start>, to = {s = {sa_family = 7776,
sa_data = "\356d\374\177\000\000\000\000\000\000\000\000\000"}, sin =
{sin_family = 7776,
---Type <return> to continue, or q <return> to quit---
              sin_port = 25838, sin_addr = {s_addr = 32764}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 7776, sin6_port =
25838,
              sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0,
                    0}}}, sin6_scope_id = 1693319264}}, id = 32764,
send_flags = {f = 56144, blst_imask = 102}, proto = 0 '\000', proto_pad0 =
0 '\000',
          proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x0
        end = 0x7f7a00000000 <error: Cannot access memory at address
0x7f7a00000000>
        crt = 0x0
        cmd = 0x7f7aa1a9a230
        len = 32634
        user = -1638375131
        uri = {user = {s = 0x419210 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200\237w", len =
1693326944}, passwd = {s = 0x0, len = 0}, host = {
            s = 0x7ffc64edfee0 "`", len = 6739658}, port = {s = 0x2 <error:
Cannot access memory at address 0x2>, len = 1300448}, params = {
            s = 0x7ffc64edfdb0 "\310\375\253\241z\177", len = 4993055},
sip_params = {s = 0x0, len = -1583406912}, headers = {
            s = 0x100000000 <error: Cannot access memory at address
0x100000000>, len = -1582113008}, port_no = 64968, proto = 41387, type =
32634,
          flags = (unknown: 1693318768), transport = {s = 0x7d4950 "core",
len = 1}, ttl = {s = 0x7ffc64edfee0 "`", len = 6721818}, user_param = {
            s = 0x7f7aa1ac2938 "\001", len = 1693319192}, maddr = {s =
0x7f7aa1b2df10 ">\330\001", len = 1693323440}, method = {
            s = 0x1000cf960 <error: Cannot access memory at address
0x1000cf960>, len = 0}, lr = {s = 0x13e970 <error: Cannot access memory at
address 0x13e970>,
            len = 0}, r2 = {s = 0x7f7aa1ac1fb8 "\004", len = 1693319576},
gr = {s = 0x7f7aa1b2df10 ">\330\001", len = 1693323440}, transport_val = {
            s = 0x7ffc64edff50 "`", len = 4611518}, ttl_val = {s =
0x7ffc64edfed0 "", len = -1582113008}, user_param_val = {s = 0x7f7aa1abfdc8
"\316\002",
            len = 1693323440}, maddr_val = {s = 0x0, len = 1}, method_val =
{s = 0x60bb3a29 <error: Cannot access memory at address 0x60bb3a29>, len =
-1251003067},
          lr_val = {s = 0x400000000 <error: Cannot access memory at address
0x400000000>, len = 1693319572}, r2_val = {s = 0x0, len = 0}, gr_val = {
            s = 0x46dc132b38f3545 <error: Cannot access memory at address
0x46dc132b38f3545>, len = 1622882857}}
        next_hop = {user = {s = 0x0, len = 1693319040}, passwd = {s =
0x7ffc64ee0000 "`", len = 6729767}, host = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len =
45273232}, port = {s = 0x7ffc64edfdd0 "\340\376\355d\374\177", len = 4},
params = {
            s = 0x7f7aa1a934e0 "\364.7\235z\177", len = -1548974973},
sip_params = {s = 0x7f7aa1ac5320 "\002", len = 1}, headers = {
            s = 0x7f7a00000000 <error: Cannot access memory at address
0x7f7a00000000>, len = -1582113008}, port_no = 6760, proto = 41388, type =
32634,
          flags = (unknown: 1693318384), transport = {s = 0x7f7aa1b2df10
">\330\001", len = -1}, ttl = {s = 0x7ffc64edfd60 "\340\376\355d\374\177",
len = 6721818},
          user_param = {s = 0x0, len = 0}, maddr = {s = 0x7f7aa1aa62b8 "",
len = -1582113008}, method = {
            s = 0x1ffffffff <error: Cannot access memory at address
0x1ffffffff>, len = 0}, lr = {
            s = 0xf612d00000000000 <error: Cannot access memory at address
0xf612d00000000000>, len = 0}, r2 = {s = 0x7f7aa1ac2940 "\004", len =
1693319192}, gr = {
            s = 0x7f7aa1b2df10 ">\330\001", len = 1693323440},
transport_val = {s = 0x7ffc64edfdd0 "\340\376\355d\374\177", len =
4611518}, ttl_val = {
            s = 0x7f7aa1a2a520 "", len = -1582113008}, user_param_val = {s
= 0x7f7aa1ac1a68 "\333\002", len = 1693323440}, maddr_val = {s = 0x0, len =
1},
---Type <return> to continue, or q <return> to quit---
          method_val = {s = 0x60bb3a29 <error: Cannot access memory at
address 0x60bb3a29>, len = -1334889147}, lr_val = {
            s = 0x419210 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200\237w", len =
1693326944}, r2_val = {s = 0x0, len = 0}, gr_val = {
            s = 0x46dc132be8f3545 <error: Cannot access memory at address
0x46dc132be8f3545>, len = 1622882857}}
        u = 0x7f7aa1b2f4b0
        port = 0
        dst_host = 0x0
        i = 6741152
        flags = -74119067
        avp = 0x7ffc64ee01e0
        st = {flags = 4297232, id = 0, name = {n = 1693326944, s = {s =
0x7ffc64ee1e60 "\r", len = 0}, re = 0x7ffc64ee1e60}, avp = 0x0}
        sct = 0x0
        sjt = 0x7f7aa1b2df10
        rve = 0x0
        mct = 0x4000000000
        rv = 0x46dc132bf6f3545
        rv1 = 0x0
        c1 = {cache_type = 1693319040, val_type = 32764, c = {avp_val = {n
= -1582113008, s = {s = 0x7f7aa1b2df10 ">\330\001", len = -1582553112},
              re = 0x7f7aa1b2df10}, pval = {rs = {s = 0x7f7aa1b2df10
">\330\001", len = -1582553112}, ri = 1693323440, flags = 32764}},
          i2s =
"\000\000\000\000\000\000\000\000\377\377\377\377\000\000\000\000):\273`\000"}
        s = {s = 0x7ffc64edfc50 "`\375\355d\374\177", len = 4611518}
        srevp = {0x0, 0x0}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number =
0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s =
0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u
= {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str
= {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#11 0x00000000004656fd in run_actions (h=0x7ffc64ee10b0, a=0x7f7aa1ac3fb0,
msg=0x7f7aa1b2df10) at core/action.c:1576
        t = 0x7f7aa1ac3fb0
        ret = -1
---Type <return> to continue, or q <return> to quit---
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 4}
        tdiff = 1
        __FUNCTION__ = "run_actions"
#12 0x0000000000458aa5 in do_action (h=0x7ffc64ee10b0, a=0x7f7aa1ac4100,
msg=0x7f7aa1b2df10) at core/action.c:1062
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 1856, sa_data =
"\356d\374\177\000\000\360\026\253\241z\177\000"}, sin = {sin_family =
1856, sin_port = 25838,
              sin_addr = {s_addr = 32764}, sin_zero =
"\360\026\253\241z\177\000"}, sin6 = {sin6_family = 1856, sin6_port =
25838, sin6_flowinfo = 32764, sin6_addr = {
                __in6_u = {__u6_addr8 =
"\360\026\253\241z\177\000\000\020\337\262\241z\177\000", __u6_addr16 =
{5872, 41387, 32634, 0, 57104, 41394, 32634, 0},
                  __u6_addr32 = {2712344304, 32634, 2712854288, 32634}}},
sin6_scope_id = 1693321136}}, id = 32764, send_flags = {f = 54986,
blst_imask = 102},
          proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7f7a9c5ecc83 <acc_log_request+8047> "\270\001"
        new_uri = 0x7f7aa1b2df10 ">\330\001"
        end = 0x7f7aa1ab16d0 "\a"
        crt = 0x7ffc64ee08e0 "\300\t\356d\374\177"
        cmd = 0x7f7aa1a949c8
        len = 0
        user = 0
        uri = {user = {s = 0x0, len = 1559864800}, passwd = {s =
0x2f00000000 <error: Cannot access memory at address 0x2f00000000>, len =
1536887583}, host = {
            s = 0x0, len = 0}, port = {s = 0x419210 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200\237w", len =
1693326944}, params = {s = 0x0,
            len = 0}, sip_params = {s = 0x7ffc64ee0550
"\360\026\253\241z\177", len = 7393852}, headers = {s = 0x7f7a5b41bb90 "",
len = -1582113008}, port_no = 43232,
          proto = 41386, type = 32634, flags = (unknown: 1693320640),
transport = {s = 0x100000000 <error: Cannot access memory at address
0x100000000>, len = -1},
          ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr
= {s = 0x7f7aa1b2e1b0 "\253T\251", len = 1693321024}, method = {s =
0x7f7aa1ab16f0 "",
            len = -1582113008}, lr = {s = 0x7ffc64ee05f0
"p\006\356d\374\177", len = -1647784851}, r2 = {
            s = 0x419210 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200\237w", len =
1693326944}, gr = {s = 0x0, len = 0}, transport_val = {
            s = 0x7ffc64ee0740 "", len = -1582622992}, ttl_val = {s =
0x7f7aa1b2e1b0 "\253T\251", len = -1582113008}, user_param_val = {s =
0x7f7aa1aaa8e0 "q\002",
            len = 1693323440}, maddr_val = {s = 0x0, len = 1622882857},
method_val = {
            s = 0x419210 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200\237w", len =
1693326944}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0x7ffc64ee0670 "\360\006\356d\374\177", len = -1647782719},
gr_val = {
            s = 0x46dc13540ef3545 <error: Cannot access memory at address
0x46dc13540ef3545>, len = -282512059}}
        next_hop = {user = {s = 0xa8428197 <error: Cannot access memory at
address 0xa8428197>, len = -1541505685}, passwd = {
---Type <return> to continue, or q <return> to quit---
            s = 0x19 <error: Cannot access memory at address 0x19>, len =
1693320032}, host = {
            s = 0xf611b40000000000 <error: Cannot access memory at address
0xf611b40000000000>, len = 6982157}, port = {s = 0x7ffc64ee0380
"\310i\252\241z\177",
            len = -1583407088}, params = {s = 0x7f7aa1a934e0
"\364.7\235z\177", len = -1583407088}, sip_params = {s = 0x7ffc64ee03c0
"\360\003\356d\374\177",
            len = 6995517}, headers = {s = 0x7f7aa1a2a520 "", len =
-1582113008}, port_no = 27080, proto = 41386, type = 32634, flags =
(unknown: 1693320256),
          transport = {s = 0xcfff0 <error: Cannot access memory at address
0xcfff0>, len = 1301656}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0,
len = 0},
          maddr = {s = 0x7ffc64ee03f0 "\020\222A", len = 4993055}, method =
{s = 0xffffffff00000000 <error: Cannot access memory at address
0xffffffff00000000>,
            len = 0}, lr = {s = 0x1ec23d0 <error: Cannot access memory at
address 0x1ec23d0>, len = 1622882857}, r2 = {
            s = 0x419210 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200\237w", len =
1693326944}, gr = {s = 0x0, len = 0}, transport_val = {
            s = 0x7ffc64ee0520 "", len = 4611518}, ttl_val = {s =
0x7ffc64ee0520 "", len = -1582113008}, user_param_val = {s = 0x7f7aa1aa69c8
"X\002",
            len = 1693323440}, maddr_val = {s = 0x0, len = 1622882857},
method_val = {
            s = 0x419210 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200\237w", len =
1693326944}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0x7ffc64ee0590 "@\a\356d\374\177", len = 4609789}, gr_val =
{s = 0x46dc1354fef3545 <error: Cannot access memory at address
0x46dc1354fef3545>,
            len = -282512059}}
        u = 0x0
        port = 0
        dst_host = 0x7ffc64ee07b0
        i = 6744853
        flags = 0
        avp = 0x7ffc64ee0930
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len =
1693320208}, re = 0x0}, avp = 0x4656fd <run_actions+1860>}
        sct = 0x7f7a9c616b90 <__FUNCTION__.11588>
        sjt = 0x419c61f7fc
        rve = 0x7f7aa1ac3798
        mct = 0x7f7a9c615c60
        rv = 0x7ffc64ee1e60
        rv1 = 0x7ffc64ee10b0
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val
= {n = 0, s = {s = 0x0, len = 1}, re = 0x0}, pval = {rs = {s = 0x0, len =
1}, ri = 0,
              flags = 0}}, i2s =
"\260Q\260\241z\177\000\000):\273`\000\000\000\000\020\222A\000\000"}
        s = {s = 0x0, len = 0}
        srevp = {0x7ffc64ee0860, 0x7ffc64ee0418}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {
---Type <return> to continue, or q <return> to quit---
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number =
0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s =
0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u
= {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str
= {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#13 0x00000000004656fd in run_actions (h=0x7ffc64ee10b0, a=0x7f7aa1abd308,
msg=0x7f7aa1b2df10) at core/action.c:1576
        t = 0x7f7aa1ac4100
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1671324464, tz_dsttime = 32634}
        tdiff = 2712291872
        __FUNCTION__ = "run_actions"
#14 0x000000000045555c in do_action (h=0x7ffc64ee10b0, a=0x7f7aa1ab2d40,
msg=0x7f7aa1b2df10) at core/action.c:695
        ret = -5
        v = 0
        dst = {send_sock = 0x823590, to = {s = {sa_family = 33536, sa_data
= "\200\000V\001\000\000\260d\202\000\000\000\000"}, sin = {sin_family =
33536,
              sin_port = 128, sin_addr = {s_addr = 342}, sin_zero =
"\260d\202\000\000\000\000"}, sin6 = {sin6_family = 33536, sin6_port = 128,
sin6_flowinfo = 342,
              sin6_addr = {__in6_u = {__u6_addr8 =
"\260d\202\000\000\000\000\000\030:\202\000\000\000\000", __u6_addr16 =
{25776, 130, 0, 0, 14872, 130, 0, 0},
                  __u6_addr32 = {8545456, 0, 8534552, 0}}}, sin6_scope_id =
2712859096}}, id = 32634, send_flags = {f = 8208, blst_imask = 41375},
proto = 122 'z',
          proto_pad0 = 127 '\177', proto_pad1 = 0}
        tmp = 0x7ffc64ee10d0 "\020\222A"
        new_uri = 0x7ffc64ee0f64 "\374\177"
        end = 0x1ec3308 <error: Cannot access memory at address 0x1ec3308>
        crt = 0x419210 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200\237w"
        cmd = 0x7f7aa1a931d0
        len = 0
        user = 1622882857
        uri = {user = {s = 0x8163a0 "core", len = 0}, passwd = {s = 0x0,
len = 0}, host = {s = 0xc300000000 <error: Cannot access memory at address
0xc300000000>,
            len = 11097831}, port = {s = 0x164ee0c50 <error: Cannot access
memory at address 0x164ee0c50>, len = 11098026}, params = {s =
0x7ffc64ee0cb0 "\001",
            len = 7299836}, sip_params = {s = 0x7ffc64ee0d42 "\251", len =
6982157}, headers = {s = 0x7ffc64ee0c80 "", len = -1583407088}, port_no =
0, proto = 0,
          type = 4128681984, flags = (unknown: 2711560208), transport = {s
= 0x7ffc64ee0cc0 "\360\f\356d\374\177", len = -1632797901}, ttl = {
---Type <return> to continue, or q <return> to quit---
            s = 0x69def9 <qm_insert_free+59> "\005\363\a", len = 0},
user_param = {s = 0x2000000 <error: Cannot access memory at address
0x2000000>, len = 32255496},
          maddr = {s = 0xcf960 <error: Cannot access memory at address
0xcf960>, len = 1298936}, method = {
            s = 0x13e970 <error: Cannot access memory at address 0x13e970>,
len = 8}, lr = {s = 0x1 <error: Cannot access memory at address 0x1>, len =
6938361},
          r2 = {s = 0x7ffc64ee0cf0 "\020\016\356d\374\177", len = 4993055},
gr = {s = 0x0, len = -1583176416}, transport_val = {
            s = 0x80ba1a2a520 <error: Cannot access memory at address
0x80ba1a2a520>, len = -1583176416}, ttl_val = {s = 0x7ffc64ee0e10
"\340\016\356d\374\177",
            len = 6955649}, user_param_val = {s = 0x1ec2dc8 <error: Cannot
access memory at address 0x1ec2dc8>, len = 1622882857}, maddr_val = {
            s = 0x7ffc64ee0e10 "\340\016\356d\374\177", len = 6946539},
method_val = {s = 0x823590 "core", len = 11097317}, lr_val = {
            s = 0x13e970 <error: Cannot access memory at address 0x13e970>,
len = -1582108200}, r2_val = {s = 0xa957aa <buf+778> "", len = 11097873},
gr_val = {
            s = 0x7ffc64ee0d80 "\330\361\262\241z\177", len = 4993055}}
        next_hop = {user = {s = 0x2 <error: Cannot access memory at address
0x2>, len = 4959780}, passwd = {s = 0x7ffc64ee0aa0 "\300\v\356d\374\177",
len = 4993055},
          host = {s = 0x0, len = -1583397840}, port = {s = 0x5200000000
<error: Cannot access memory at address 0x5200000000>, len = -1583397840},
params = {
            s = 0x7ffc64ee0bc0 "H", len = 6955649}, sip_params = {s =
0x2009e6676b0 <error: Cannot access memory at address 0x2009e6676b0>, len =
1548742352},
          headers = {s = 0x7f7a9e66e830 <__FUNCTION__.12289>
"update_totag_set", len = -1637445885}, port_no = 4976, proto = 175, type =
ERROR_URI_T,
          flags = (unknown: 11475272), transport = {s = 0xaf1940
<def_list+32> "", len = 11475256}, ttl = {
            s = 0x5000af1930 <error: Cannot access memory at address
0x5000af1930>, len = 1548742368}, user_param = {s = 0xaf1920 <def_list>
"@t\233[z\177", len = 0},
          maddr = {s = 0x7f7a9e6676b0 "tm", len = 6982157}, method = {s =
0x7ffc64ee0b60 "", len = -1583407088}, lr = {s = 0x7f7aa1b2f780 "\300
\237\241z\177",
            len = -1583407088}, r2 = {s = 0x7ffc64ee0ba0
"\320\f\356d\374\177", len = -1632797901}, gr = {s = 0x7f7aa19f27c0 "", len
= 0}, transport_val = {
            s = 0x2000000 <error: Cannot access memory at address
0x2000000>, len = 32258408}, ttl_val = {
            s = 0xcf418 <error: Cannot access memory at address 0xcf418>,
len = 1296024}, user_param_val = {
            s = 0x40013e970 <error: Cannot access memory at address
0x40013e970>, len = 8479648}, maddr_val = {s = 0x1 <error: Cannot access
memory at address 0x1>,
            len = -1582235496}, method_val = {s = 0x7ffc64ee0cd0 "", len =
7110832}, lr_val = {s = 0x0, len = 8422144}, r2_val = {
            s = 0x48 <error: Cannot access memory at address 0x48>, len =
1622882857}, gr_val = {s = 0x7ffc64ee0cd0 "", len = 6946539}}
        u = 0xf6199c0000000000
        port = 0
        dst_host = 0x0
        i = 2
        flags = 0
        avp = 0xa957aa <buf+778>
        st = {flags = 33554432, id = 0, name = {n = 32253432, s = {s =
0x1ec25f8 <error: Cannot access memory at address 0x1ec25f8>, len =
851296}, re = 0x1ec25f8},
          avp = 0x13da08}
        sct = 0x7ffc64ee0e40
        sjt = 0x7f7aa1b2f1a0
        rve = 0x7f7aa1ab2528
---Type <return> to continue, or q <return> to quit---
        mct = 0x1ec2e08
        rv = 0x0
        rv1 = 0x0
        c1 = {cache_type = 1693321776, val_type = 32764, c = {avp_val = {n
= -1583407088, s = {s = 0x7f7aa19f2010 "\001", len = 391}, re =
0x7f7aa19f2010}, pval = {
              rs = {s = 0x7f7aa19f2010 "\001", len = 391}, ri =
-1583407088, flags = 32634}}, i2s =
"p\n\356d\374\177\000\000\063{\255\236z\177\000\000HF\267\\z\177"}
        s = {s = 0x300000002 <error: Cannot access memory at address
0x300000002>, len = 6982157}
        srevp = {0x0, 0x8094ff}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number =
0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s =
0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u
= {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str
= {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#15 0x00000000004656fd in run_actions (h=0x7ffc64ee10b0, a=0x7f7aa1aa48d0,
msg=0x7f7aa1b2df10) at core/action.c:1576
        t = 0x7f7aa1ab2d40
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 11098026, tz_dsttime = 0}
        tdiff = 1622882857
        __FUNCTION__ = "run_actions"
#16 0x0000000000465e86 in run_top_route (a=0x7f7aa1aa48d0,
msg=0x7f7aa1b2df10, c=0x0) at core/action.c:1661
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env =
{{__jmpbuf = {1622882857, 319123583751107909, 4297232, 140722001813088, 0,
0,
                319123583451215173, -318338964762577595}, __mask_was_saved
= 0, __saved_mask = {__val = {0, 4611686022722355200, 140164675591952,
140722001809824,
                  5326593, 4297232, 140722001813088, 0, 0, 5988290944,
140164675591952, 1073741825, 0, 140164675389112, 1622882857, 4297232}}}}}
        p = 0x7ffc64ee10b0
        ret = 0
        sfbk = 0
#17 0x000000000059344c in receive_msg (
    buf=0xa954a0 <buf> "INVITE sip:+918123088839 at 172.27.6.5:5060;transport=udp
SIP/2.0\r\nVia: SIP/2.0/UDP
10.201.8.5:5060;rport;branch=z9hG4bKPjWG-1KGYBTODST0R7xuJoWbZ---Type
<return> to continue, or q <return> to quit---
H0UFZ5Xj2\r\nMax-Forwards: 69\r\nFrom: sip:10.201.8.5;tag=9s2l"...,
len=778, rcv_info=0x7ffc64ee16f0) at core/receive.c:424
        msg = 0x7f7aa1b2df10
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env =
{{__jmpbuf = {1622882857, 319123583751107909, 4297232, 140722001813088, 0,
0,
                319123583451215173, -318338964762577595}, __mask_was_saved
= 0, __saved_mask = {__val = {8, 2, 140164675468656, 140722001810256,
4993055, 0,
                  21483258624, 912, 1622882857, 140722001810512, 6946539,
7946256, 8589934592, 140722001810480, 5483931, 0}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 140722001810144, tv_usec = 140164674297872}
        tve = {tv_sec = 4297232, tv_usec = 6982157}
        tz = {tz_minuteswest = 0, tz_dsttime = -127}
        diff = 0
        inb = {
          s = 0xa954a0 <buf> "INVITE
sip:+918123088839 at 172.27.6.5:5060;transport=udp
SIP/2.0\r\nVia: SIP/2.0/UDP
10.201.8.5:5060;rport;branch=z9hG4bKPjWG-1KGYBTODST0R7xuJoWbZH0UFZ5Xj2\r\nMax-Forwards:
69\r\nFrom: sip:10.201.8.5;tag=9s2l"..., len = 778}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffc64ee1270, rcv = 0x7ffc64ee16f0, dst = 0x0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __FUNCTION__ = "receive_msg"
#18 0x0000000000498ca7 in udp_rcv_loop () at core/udp_server.c:548
        len = 778
        buf = "INVITE sip:+918123088839 at 172.27.6.5:5060;transport=udp
SIP/2.0\r\nVia: SIP/2.0/UDP
10.201.8.5:5060;rport;branch=z9hG4bKPjWG-1KGYBTODST0R7xuJoWbZH0UFZ5Xj2\r\nMax-Forwards:
69\r\nFrom: sip:10.201.8.5;tag=9s2l"...
        tmp = 0x0
        from = 0x7f7aa1b0fda8
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {84461834,
140722001811280}, addr32 = {84461834, 0, 1693325136, 32764}, addr16 =
{51466, 1288, 0, 0, 5968,
                25838, 32764, 0}, addr =
"\n\311\b\005\000\000\000\000P\027\356d\374\177\000"}}, dst_ip = {af = 2,
len = 4, u = {addrl = {84286380, 0}, addr32 = {
                84286380, 0, 0, 0}, addr16 = {7084, 1286, 0, 0, 0, 0, 0,
0}, addr = "\254\033\006\005", '\000' <repeats 11 times>}}, src_port =
5060, dst_port = 5060,
          proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s =
{sa_family = 2, sa_data =
"\023\304\n\311\b\005\000\000\000\000\000\000\000"}, sin = {
---Type <return> to continue, or q <return> to quit---
              sin_family = 2, sin_port = 50195, sin_addr = {s_addr =
84461834}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family
= 2,
              sin6_port = 50195, sin6_flowinfo = 84461834, sin6_addr =
{__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0,
0, 0, 0, 0, 0},
                  __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}},
bind_address = 0x7f7aa1a83510, proto = 1 '\001', proto_pad0 = 24 '\030',
proto_pad1 = 25838}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        printbuf = "\020\222A\000\000\000\000\000`\036\356d\374\177",
'\000' <repeats 18 times>, "\260\025\356d\374\177\000\000\233\255S", '\000'
<repeats 21 times>,
"\320\025\356d\374\177\000\000\233\255S\000\000\000\000\000\023\225\200\000\000\000\000\000\bz}\000\000\000\000\000
", '\000' <repeats 13 times>,
"\200\300\000\000\000\000@~J\377\037\060L\000\017\000\000\000\000\026\356d\035\000\000\061\240\025\356d\374\177\000\000
\030\356d\002\000\000\000`\241\251\241z\177\000\000\000\325w\000\000\000\000\000\b\027\356d\374\177\000\000\177\000\000\000\000\000\000\000\060\nm[z\177\000\000\020\222A\000\000\000\000\000"...
        i = -1
        j = 49280
        l = 1194642238
        __FUNCTION__ = "udp_rcv_loop"
#19 0x0000000000425f31 in main_loop () at main.c:1673
        i = 1
        pid = 0
        si = 0x7f7aa1a83510
        si_desc = "udp receiver child=1 sock=172.27.6.5:5060 (
172.27.6.5:5060)\000\000\000\000\000\020\222A\000\000\000\000\000\310&E[z\177",
'\000' <repeats 14 times>,
"\001\000\000\000\320\030\356d\374\177\000\000\200\252j\000\000\000\000\000`\342y\000\000\000\000\000X\352\260\241z\177\000"
        nrprocs = 8
        woneinit = 1
        __FUNCTION__ = "main_loop"
#20 0x000000000042e63a in main (argc=13, argv=0x7ffc64ee1e68) at main.c:2802
        cfg_stream = 0x2a68010
        c = -1
        r = 0
        tmp = 0x7ffc64ee2ed8 ""
        tmp_len = 2496
        port = 2496
        proto = 2496
        ahost = 0x0
        aport = 0
        options = 0x77db90
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
---Type <return> to continue, or q <return> to quit---
        seed = 2887616840
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x4000000100
        p = 0xf0b5ff <error: Cannot access memory at address 0xf0b5ff>
        st = {st_dev = 20, st_ino = 16135899, st_nlink = 2, st_mode =
16832, st_uid = 995, st_gid = 992, __pad0 = 0, st_rdev = 0, st_size = 40,
st_blksize = 4096,
          st_blocks = 0, st_atim = {tv_sec = 1586172064, tv_nsec =
629166543}, st_mtim = {tv_sec = 1586435764, tv_nsec = 286216393}, st_ctim =
{tv_sec = 1586435764,
            tv_nsec = 286216393}, __unused = {0, 0, 0}}
        tbuf = '\000' <repeats 376 times>...
        option_index = 0
        long_options = {{name = 0x78070a "help", has_arg = 0, flag = 0x0,
val = 104}, {name = 0x77a42c "version", has_arg = 0, flag = 0x0, val =
118}, {
            name = 0x78070f "alias", has_arg = 1, flag = 0x0, val = 1024},
{name = 0x780715 "subst", has_arg = 1, flag = 0x0, val = 1025}, {
            name = 0x78071b "substdef", has_arg = 1, flag = 0x0, val =
1026}, {name = 0x780724 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
            name = 0x78072e "server-id", has_arg = 1, flag = 0x0, val =
1028}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __FUNCTION__ = "main"
(gdb)

==========================================================================================================================================
CRASH-2:
-------
Logs:

Apr  9 18:57:03 localhost /usr/local/sbin/kamailio[867]: CRITICAL: <core>
[core/mem/q_malloc.c:150]: qm_debug_check_frag(): BUG: qm: prev. fragm.
tail overwritten(78, abcdefed)[0x7f7a5bd1e5d8:0x7f7a5bd1e610]! Memory
allocator was called from dialog: dlg_hash.c:392. Fragment marked by
dialog: dlg_handlers.c:308. Exec from core/mem/q_malloc.c:566.
Apr  9 18:57:03 localhost /usr/local/sbin/kamailio[867]: CRITICAL: <core>
[core/mem/q_malloc.c:155]: qm_debug_check_frag(): BUG: qm: prev. fragm.
tail overwritten [0x7f7a5bd1e568:0x7f7a5bd1e5a0] - fragment marked by
dialog: dlg_handlers.c:308
Apr  9 18:57:06 localhost systemd: kamailio.service: main process exited,
code=dumped, status=6/ABRT


Full BackTrace:

[root at localhost tmp]# /opt/rh/devtoolset-7/root/bin/gdb
/usr/local/sbin/kamailio core.kamailio.995.1586438824.867
GNU gdb (GDB) Red Hat Enterprise Linux 8.0.1-36.el7
Copyright (C) 2017 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html
>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/local/sbin/kamailio...done.
[New LWP 867]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/libthread_db.so.1".
Core was generated by `/usr/local/sbin/kamailio -P
/var/run/kamailio/kamailio.pid -f /usr/local/etc/ka'.
Program terminated with signal SIGABRT, Aborted.
#0  0x00007f7aa3a29337 in __GI_raise (sig=sig at entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:55
55        return INLINE_SYSCALL (tgkill, 3, pid, selftid, sig);
(gdb) bt full
#0  0x00007f7aa3a29337 in __GI_raise (sig=sig at entry=6) at
../nptl/sysdeps/unix/sysv/linux/raise.c:55
        resultvar = 0
        pid = 867
        selftid = 867
#1  0x00007f7aa3a2aa28 in __GI_abort () at abort.c:90
        save_stage = 2
        act = {__sigaction_handler = {sa_handler = 0x7cafe4, sa_sigaction =
0x7cafe4}, sa_mask = {__val = {8424376, 8442432, 140161962737664, 0, 0, 0,
0, 0,
              21474836483, 140163493761024, 9015136354304, 64355789963264,
140163493996064, 0, 140164708874416, 8171492}}, sa_flags = -1685147642,
          sa_restorer = 0x7f7aa3aeb8b0 <__syslog>}
        sigs = {__val = {32, 0 <repeats 15 times>}}
#2  0x000000000069deac in qm_debug_check_frag (qm=0x7f7a5b419000,
f=0x7f7a5bd1e5d8, file=0x7f7a9b8e2187 "dialog: dlg_hash.c", line=392,
    efile=0x8094ff "core/mem/q_malloc.c", eline=566) at
core/mem/q_malloc.c:158
        p = 0x7f7a5bd1e568
        __FUNCTION__ = "qm_debug_check_frag"
#3  0x00000000006a2119 in qm_free (qmp=0x7f7a5b419000, p=0x7f7a5bd1e688,
file=0x7f7a9b8e2187 "dialog: dlg_hash.c",
    func=0x7f7a9b8e4ef9 <__FUNCTION__.13276> "destroy_dlg", line=392,
mname=0x7f7a9b8e2180 "dialog") at core/mem/q_malloc.c:566
        qm = 0x7f7a5b419000
        f = 0x7f7a5bd1e650
        size = 24
        next = 0x7f7a5bd1e6d0
        prev = 0x7f7a5bd1e5d8
        __FUNCTION__ = "qm_free"
#4  0x00000000006aacba in qm_shm_free (qmp=0x7f7a5b419000,
p=0x7f7a5bd1e688, file=0x7f7a9b8e2187 "dialog: dlg_hash.c",
    func=0x7f7a9b8e4ef9 <__FUNCTION__.13276> "destroy_dlg", line=392,
mname=0x7f7a9b8e2180 "dialog") at core/mem/q_malloc.c:1275
No locals.
#5  0x00007f7a9b84fe73 in destroy_dlg (dlg=0x7f7a5b9c3f80) at dlg_hash.c:392
        ret = 0
        var = 0x7f7aa1b2a4f8
        __FUNCTION__ = "destroy_dlg"
#6  0x00007f7a9b850162 in destroy_dlg_table () at dlg_hash.c:438
        dlg = 0x7f7a5b747498
        l_dlg = 0x7f7a5b9c3f80
        i = 3854
---Type <return> to continue, or q <return> to quit---
        __FUNCTION__ = "destroy_dlg_table"
#7  0x00007f7a9b8c4f17 in mod_destroy () at dialog.c:806
No locals.
#8  0x000000000053a94a in destroy_modules () at core/sr_module.c:746
        t = 0x7f7aa1a9a160
        foo = 0x7f7aa1a99c40
        __FUNCTION__ = "destroy_modules"
#9  0x000000000041a0c7 in cleanup (show_status=1) at main.c:555
        memlog = 0
        __FUNCTION__ = "cleanup"
#10 0x000000000041b7f6 in shutdown_children (sig=15, show_status=1) at
main.c:696
        __FUNCTION__ = "shutdown_children"
#11 0x000000000041e422 in handle_sigs () at main.c:796
        chld = 0
        chld_status = 134
        any_chld_stopped = 1
        memlog = 1533928056
        __FUNCTION__ = "handle_sigs"
#12 0x0000000000427814 in main_loop () at main.c:1806
        i = 8
        pid = 901
        si = 0x0
        si_desc = "udp receiver child=7 sock=172.27.6.5:5090\000(
172.27.6.5:5060)\000\000\000\000\000\020\222A\000\000\000\000\000\310&E[z\177",
'\000' <repeats 14 times>,
"\001\000\000\000\320\030\356d\374\177\000\000\200\252j\000\000\000\000\000`\342y\000\000\000\000\000X\352\260\241z\177\000"
        nrprocs = 8
        woneinit = 1
        __FUNCTION__ = "main_loop"
#13 0x000000000042e63a in main (argc=13, argv=0x7ffc64ee1e68) at main.c:2802
        cfg_stream = 0x2a68010
        c = -1
        r = 0
        tmp = 0x7ffc64ee2ed8 ""
        tmp_len = 2496
---Type <return> to continue, or q <return> to quit---
        port = 2496
        proto = 2496
        ahost = 0x0
        aport = 0
        options = 0x77db90
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 2887616840
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x4000000100
        p = 0xf0b5ff <error: Cannot access memory at address 0xf0b5ff>
        st = {st_dev = 20, st_ino = 16135899, st_nlink = 2, st_mode =
16832, st_uid = 995, st_gid = 992, __pad0 = 0, st_rdev = 0, st_size = 40,
st_blksize = 4096,
          st_blocks = 0, st_atim = {tv_sec = 1586172064, tv_nsec =
629166543}, st_mtim = {tv_sec = 1586435764, tv_nsec = 286216393}, st_ctim =
{tv_sec = 1586435764,
            tv_nsec = 286216393}, __unused = {0, 0, 0}}
        tbuf = '\000' <repeats 376 times>...
        option_index = 0
        long_options = {{name = 0x78070a "help", has_arg = 0, flag = 0x0,
val = 104}, {name = 0x77a42c "version", has_arg = 0, flag = 0x0, val =
118}, {
            name = 0x78070f "alias", has_arg = 1, flag = 0x0, val = 1024},
{name = 0x780715 "subst", has_arg = 1, flag = 0x0, val = 1025}, {
            name = 0x78071b "substdef", has_arg = 1, flag = 0x0, val =
1026}, {name = 0x780724 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
            name = 0x78072e "server-id", has_arg = 1, flag = 0x0, val =
1028}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __FUNCTION__ = "main"
(gdb)

===========================================================================================================================================
CRASH-3:
---------
Secnario:

This crash is seen after the previous crashes happened and kamailio
restarted quickly and was handling new calls and the in-dialog messages
from prior to the restart.

Logs:

Apr  9 18:59:51 localhost kernel: kamailio[3775]: segfault at 7f4500000078
ip 00007f4500000078 sp 00007ffcd4255688 error 14 in
libbz2.so.1.0.6[7f452f812000+f000]
Apr  9 18:59:53 localhost mysqld: 2020-04-09 18:59:53 308 [Warning] Aborted
connection 308 to db: 'kamailio' user: 'kamailio' host: 'localhost' (Got an
error reading communication packets)
Apr  9 18:59:53 localhost /usr/local/sbin/kamailio[3774]: ALERT: <core>
[main.c:767]: handle_sigs(): child process 3775 exited by a signal 11
Apr  9 18:59:53 localhost /usr/local/sbin/kamailio[3774]: ALERT: <core>
[main.c:770]: handle_sigs(): core was generated
Apr  9 18:59:53 localhost /usr/local/sbin/kamailio[3808]: CRITICAL: <core>
[core/pass_fd.c:277]: receive_fd(): EOF on 13

Full BackTrace:

[root at localhost tmp]# /opt/rh/devtoolset-7/root/bin/gdb
/usr/local/sbin/kamailio core.kamailio.995.1586438991.3775
GNU gdb (GDB) Red Hat Enterprise Linux 8.0.1-36.el7
Copyright (C) 2017 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html
>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/local/sbin/kamailio...done.
[New LWP 3775]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/libthread_db.so.1".
Core was generated by `/usr/local/sbin/kamailio -P
/var/run/kamailio/kamailio.pid -f /usr/local/etc/ka'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007f4500000078 in ?? ()
(gdb) bt full
#0  0x00007f4500000078 in ?? ()
No symbol table info available.
#1  0x00007f4573f11d7b in run_trans_callbacks_internal
(cb_lst=0x7f45329421e0, type=512, trans=0x7f4532942168,
params=0x7ffcd4255790) at t_hooks.c:254
        cbp = 0x7f45322f9b40
        backup_from = 0xaf1930 <def_list+16>
        backup_to = 0xaf1938 <def_list+24>
        backup_dom_from = 0xaf1940 <def_list+32>
        backup_dom_to = 0xaf1948 <def_list+40>
        backup_uri_from = 0xaf1920 <def_list>
        backup_uri_to = 0xaf1928 <def_list+8>
        backup_xavps = 0xaf1370 <_xavp_list_head>
        __FUNCTION__ = "run_trans_callbacks_internal"
#2  0x00007f4573f11f7b in run_trans_callbacks_with_buf (type=512,
rbuf=0x7f4532942238, req=0x7f4532a03d88, repl=0x7f4577407f10, flags=0) at
t_hooks.c:297
        params = {req = 0x7f4532a03d88, rpl = 0x7f4577407f10, param =
0x7f45322f9b50, code = 200, flags = 0, branch = 0, t_rbuf = 0x7f4532942238,
          dst = 0x7f4532942288, send_buf = {
            s = 0x7f45318d3f00 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
10.201.8.5:5060;received=10.201.8.5;rport=5060;branch=z9hG4bKPj6P--gitumZddIspOER91hCISeVu.MVjk\r\nFrom:
sip:10.201.8.5;tag=9CgNCj5xs3ih1R-o4eMnHS3RcqY2k0P-\r\nTo: sip:+91"..., len
= 376}}
        trans = 0x7f4532942168
#3  0x00007f4573eaabe1 in relay_reply (t=0x7f4532942168,
p_msg=0x7f4577407f10, branch=0, msg_status=200, cancel_data=0x7ffcd4255b60,
do_put_on_wait=1)
    at t_reply.c:2021
        relay = 0
        save_clone = 0
        buf = 0x7f4577409540 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
10.201.8.5:5060;received=10.201.8.5;rport=5060;branch=z9hG4bKPj6P--gitumZddIspOER91hCISeVu.MVjk\r\nFrom:
sip:10.201.8.5;tag=9CgNCj5xs3ih1R-o4eMnHS3RcqY2k0P-\r\nTo: sip:+91"...
        res_len = 376
        relayed_code = 200
        relayed_msg = 0x7f4577407f10
        reply_bak = 0x1ec2dd8
        bm = {to_tag_val = {s = 0x7ffcd4255910 "\220Y%\324\374\177", len =
4959780}}
        totag_retr = 0
        reply_status = RPS_COMPLETED
        uas_rb = 0x7f4532942238
        to_tag = 0x4b77854c
---Type <return> to continue, or q <return> to quit---
        reason = {s = 0x1d4255910 <error: Cannot access memory at address
0x1d4255910>, len = 819120656}
        onsend_params = {req = 0x69def9 <qm_insert_free+59>, rpl = 0x0,
param = 0x2000000, code = 32255512, flags = 0, branch = 0, t_rbuf = 0x1,
dst = 0x7f4530d2ca10,
          send_buf = {s = 0x13eac0 <error: Cannot access memory at address
0x13eac0>, len = 8}}
        ip = {af = 0, len = 4128684032, u = {addrl = {139936328892432,
140723867703520}, addr32 = {1999421456, 32581, 3559217376, 32764}, addr16 =
{49168, 30508,
              32581, 0, 22752, 54309, 32764, 0}, addr =
"\020\300,wE\177\000\000\340X%\324\374\177\000"}}
        __FUNCTION__ = "relay_reply"
#4  0x00007f4573eaf0c0 in reply_received (p_msg=0x7f4577407f10) at
t_reply.c:2540
        msg_status = 200
        last_uac_status = 0
        ack = 0x0
        ack_len = 3559218416
        branch = 0
        reply_status = 0
        onreply_route = 0
        cancel_data = {cancel_bitmap = 0, reason = {cause = 200, u = {text
= {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}}
        uac = 0x7f4532942380
        t = 0x7f4532942168
        lack_dst = {send_sock = 0xf618000000000000, to = {s = {sa_family =
34124, sa_data = "wK\000\000\000\000\020\222A\000\000\000\000"}, sin =
{sin_family = 34124,
              sin_port = 19319, sin_addr = {s_addr = 0}, sin_zero =
"\020\222A\000\000\000\000"}, sin6 = {sin6_family = 34124, sin6_port =
19319, sin6_flowinfo = 0,
              sin6_addr = {__in6_u = {__u6_addr8 =
"\020\222A\000\000\000\000\000\360\\%\324\374\177\000", __u6_addr16 =
{37392, 65, 0, 0, 23792, 54309, 32764, 0},
                  __u6_addr32 = {4297232, 0, 3559218416, 32764}}},
sin6_scope_id = 2000513248}}, id = 32581, send_flags = {f = 34124,
blst_imask = 19319},
          proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        backup_user_from = 0x0
        backup_user_to = 0x7f4577408f38
        backup_domain_from = 0x7ffcd4255c00
        backup_domain_to = 0x7f4577407f10
        backup_uri_from = 0x419210 <_start>
        backup_uri_to = 0x4b77854c
        backup_xavps = 0x7f4577389c38
        replies_locked = 1
        branch_ret = 0
        prev_branch = 0
        blst_503_timeout = 0
---Type <return> to continue, or q <return> to quit---
        hf = 0x0
        onsend_params = {req = 0x0, rpl = 0x0, param = 0x7ffcd4255c00, code
= 1935113626, flags = 32581, branch = 0, t_rbuf = 0x7f45773d71c8, dst =
0x0, send_buf = {
            s = 0xa9566b <buf+459> "", len = 11097626}}
        ctx = {rec_lev = 4297232, run_flags = 0, last_retcode = -735745408,
jmp_env = {{__jmpbuf = {0, 0, 140723867704064, 7325262, 1305280, 8, 1,
139936330190760},
              __mask_was_saved = -735749488, __saved_mask = {__val =
{4993055, 18446744073709551615, 139936330186512, 32255952, 1266124108,
140723867704196,
                  140723867704200, 139936329984224, 139936330186512,
139936330191304, 11097707, 0, 11097705, 4297232, 1266124108, 4297232}}}}}
        bctx = 0x7ffcd4255cf0
        keng = 0x0
        ret = 32764
        evname = {s = 0x7f4573f46ee2 "on_sl_reply", len = 11}
        __FUNCTION__ = "reply_received"
#5  0x000000000052edf7 in do_forward_reply (msg=0x7f4577407f10, mode=0) at
core/forward.c:745
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000'
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr =
{s_addr = 0},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 =
{sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                  __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0,
0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id
= 0,
          send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000',
proto_pad0 = 0 '\000', proto_pad1 = 0}
        new_len = 0
        r = 0
        ip = {af = 3559218448, len = 32764, u = {addrl = {139936279475385,
4306042945}, addr32 = {1950004409, 32581, 11075649, 1}, addr16 = {46265,
29754, 32581, 0,
              65, 169, 1, 0}, addr =
"\271\264:tE\177\000\000A\000\251\000\001\000\000"}}
        s = 0x419210 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200\237w"
        len = 0
        __FUNCTION__ = "do_forward_reply"
#6  0x000000000053096f in forward_reply (msg=0x7f4577407f10) at
core/forward.c:846
No locals.
#7  0x000000000059444d in receive_msg (
    buf=0xa954a0 <buf> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
172.27.6.5:5060;branch=z9hG4bK8eec.864091e3a052fee70fca6fca9405f4bb.0,
SIP/2.0/UDP 10.201.8.5:5060;received=10.201.8.5;rport=5060;branch=z9hG4bKPj6P--gitumZddIspOER91h"...,
len=459, rcv_info=0x7ffcd4256310) at core/receive.c:510
        msg = 0x7f4577407f10
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env =
{{__jmpbuf = {1266124108, 3199900600670044426, 4297232, 140723867708032, 0,
0,
                3199900600563089674, -3201500360552660726},
__mask_was_saved = 0, __saved_mask = {__val = {8, 2, 139936330063368,
140723867705200, 4993055, 0,
                  21483258624, 760, 1266124108, 140723867705456, 6946539,
7946256, 4294967296, 140723867705424, 5483931, 0}}}}}
---Type <return> to continue, or q <return> to quit---
        bctx = 0x0
        ret = 1
        tvb = {tv_sec = 140723867705088, tv_usec = 139936328892432}
        tve = {tv_sec = 4297232, tv_usec = 6982157}
        tz = {tz_minuteswest = 0, tz_dsttime = -127}
        diff = 0
        inb = {
          s = 0xa954a0 <buf> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
172.27.6.5:5060;branch=z9hG4bK8eec.864091e3a052fee70fca6fca9405f4bb.0,
SIP/2.0/UDP 10.201.8.5:5060;received=10.201.8.5;rport=5060;branch=z9hG4bKPj6P--gitumZddIspOER91h"...,
len = 459}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcd4255e90, rcv = 0x7ffcd4256310, dst = 0x0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __FUNCTION__ = "receive_msg"
#8  0x0000000000498ca7 in udp_rcv_loop () at core/udp_server.c:548
        len = 459
        buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
172.27.6.5:5060;branch=z9hG4bK8eec.864091e3a052fee70fca6fca9405f4bb.0,
SIP/2.0/UDP 10.201.8.5:5060
;received=10.201.8.5;rport=5060;branch=z9hG4bKPj6P--gitumZddIspOER91h"...
        tmp = 0x0
        from = 0x7f45773e9e40
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {2032933804,
140723867706224}, addr32 = {2032933804, 0, 3559220080, 32764}, addr16 =
{7084, 31020, 0, 0, 25456,
                54309, 32764, 0}, addr =
"\254\033,y\000\000\000\000pc%\324\374\177\000"}}, dst_ip = {af = 2, len =
4, u = {addrl = {84286380, 0}, addr32 = {84286380,
                0, 0, 0}, addr16 = {7084, 1286, 0, 0, 0, 0, 0, 0}, addr =
"\254\033\006\005", '\000' <repeats 11 times>}}, src_port = 5090, dst_port
= 5060,
          proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s =
{sa_family = 2, sa_data =
"\023\342\254\033,y\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
              sin_port = 57875, sin_addr = {s_addr = 2032933804}, sin_zero
= "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port =
57875,
              sin6_flowinfo = 2032933804, sin6_addr = {__in6_u =
{__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0,
0, 0}, __u6_addr32 = {0, 0,
                    0, 0}}}, sin6_scope_id = 0}}, bind_address =
0x7f457735d510, proto = 1 '\001', proto_pad0 = 100 'd', proto_pad1 = -11227}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        printbuf =
"\020\222A\000\000\000\000\000\200j%\324\374\177\000\000\060\004~\000\000\000\000\000\000\000\000\000|\000\000\000Dg~\000\000\000\000\000\275\006~\00---Type
<return> to continue, or q <return> to quit---
0\000\000\000\000\060\000\000\000\000\000\000\000\020\300,wE\177\000\000\360a%\324\024\000\000\000\060\262x\000\000\000\000\000\023\225\200\000\000\000\000\000D\262x\000\000\000\000\000L\205wK\000\000\000\000\020\222A\000\000\000\000\000\220a%\324\374\177\000\000\032\204_\000\000\000\000\000\250\235>wE\177\000\000\060z\265",
'\000' <repeats 17 times>,
"\004\000\000\000\060b%\324\374\177\000\000~\214_\000\000\000\000\000\177\000\000\000\000\000\000\000\234\251\372\060E\177\000\000\020\222A\000\000\000\000\000"...
        i = 6
        j = 49280
        l = 1242268245
        __FUNCTION__ = "udp_rcv_loop"
#9  0x0000000000425f31 in main_loop () at main.c:1673
        i = 0
        pid = 0
        si = 0x7f457735d510
        si_desc = "udp receiver child=0 sock=172.27.6.5:5060 (
172.27.6.5:5060)\000\000\000\000\000\020\222A\000\000\000\000\000\310\306\322\060E\177",
'\000' <repeats 14 times>,
"\001\000\000\000\360d%\324\374\177\000\000\200\252j\000\000\000\000\000`\342y\000\000\000\000\000X\212>wE\177\000"
        nrprocs = 8
        woneinit = 0
        __FUNCTION__ = "main_loop"
#10 0x000000000042e63a in main (argc=13, argv=0x7ffcd4256a88) at main.c:2802
        cfg_stream = 0x16dd010
        c = -1
        r = 0
        tmp = 0x7ffcd4257ed8 ""
        tmp_len = 2496
        port = 2496
        proto = 2496
        ahost = 0x0
        aport = 0
        options = 0x77db90
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 637115892
        rfd = 4
        debug_save = 0
        debug_flag = 0
---Type <return> to continue, or q <return> to quit---
        dont_fork_cnt = 0
        n_lst = 0x4000000100
        p = 0xf0b5ff <error: Cannot access memory at address 0xf0b5ff>
        st = {st_dev = 20, st_ino = 16135899, st_nlink = 2, st_mode =
16832, st_uid = 995, st_gid = 992, __pad0 = 0, st_rdev = 0, st_size = 100,
st_blksize = 4096,
          st_blocks = 0, st_atim = {tv_sec = 1586172064, tv_nsec =
629166543}, st_mtim = {tv_sec = 1586438826, tv_nsec = 779661371}, st_ctim =
{tv_sec = 1586438826,
            tv_nsec = 779661371}, __unused = {0, 0, 0}}
        tbuf = '\000' <repeats 376 times>...
        option_index = 0
        long_options = {{name = 0x78070a "help", has_arg = 0, flag = 0x0,
val = 104}, {name = 0x77a42c "version", has_arg = 0, flag = 0x0, val =
118}, {
            name = 0x78070f "alias", has_arg = 1, flag = 0x0, val = 1024},
{name = 0x780715 "subst", has_arg = 1, flag = 0x0, val = 1025}, {
            name = 0x78071b "substdef", has_arg = 1, flag = 0x0, val =
1026}, {name = 0x780724 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
            name = 0x78072e "server-id", has_arg = 1, flag = 0x0, val =
1028}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __FUNCTION__ = "main"
(gdb)

=================================================================================================================================================

Regards,
Harneet

On Fri, Apr 3, 2020 at 11:06 PM Daniel-Constantin Mierla <miconda at gmail.com>
wrote:

> Hello,
>
> If it is something that it repeats, try to get the core file, the log
> message says core was not generated.
>
> You have to start kamailio as user root in order to have all privileges,
> then before starting kamailio, in the terminal, run:
>
> ulimit -c unlimited
>
> Now start kamailio and then reproduce the case. From the corefile using
> gdb get the output of "bt full". The corefile can be located in / folder or
> where you set the working directory via kamailio's -w command line options.
> It would be good to enable core file per process as well.
>
> Cheers,
> Daniel
> On 03.04.20 16:42, harneet singh wrote:
>
> Hi All,
>
> As part of our very low cps load at 50 calls per second through Kamailio
> Version 5.3.2 (Dispatcher Module used with Call Load based Routing -
> Algorithm 10. Machine is a Centos: 7.7 with kernel version 3.10), we are
> seeing the kamailio continuously crashing. Please see the data below for 3
> types of segfaults seen:
>
> Crash-1:
> --------
> Apr  3 19:32:25 FE-A07-34-VM6 kernel: kamailio[10382]: segfault at
> 7ff300000078 ip 00007ff300000078 sp 00007ffe5f2eafc8 error 14 in
> libbz2.so.1.0.6[7ff331582000+f000]
> Apr  3 19:32:25 FE-A07-34-VM6 mysqld: 2020-04-03 19:32:25 6131 [Warning]
> Aborted connection 6131 to db: 'kamailio' user: 'kamailio' host:
> 'localhost' (Got an error reading communication packets)
> Apr  3 19:32:25 FE-A07-34-VM6 /usr/sbin/kamailio[10423]: CRITICAL: <core>
> [core/pass_fd.c:277]: receive_fd(): EOF on 13
> Apr  3 19:32:25 FE-A07-34-VM6 /usr/sbin/kamailio[10381]: ALERT: <core>
> [main.c:767]: handle_sigs(): child process 10382 exited by a signal 11
> Apr  3 19:32:25 FE-A07-34-VM6 /usr/sbin/kamailio[10381]: ALERT: <core>
> [main.c:770]: handle_sigs(): core was not generated
> ===============================
> Crash-2:
> -------
> Apr  3 19:36:11 FE-A07-34-VM6 kernel: kamailio[12838]: segfault at
> 7efe00000078 ip 00007efe00000078 sp 00007ffdc876b868 error 15 in zero
> (deleted)[7efdc407f000+40000000]
> Apr  3 19:36:11 FE-A07-34-VM6 mysqld: 2020-04-03 19:36:11 6175 [Warning]
> Aborted connection 6175 to db: 'kamailio' user: 'kamailio' host:
> 'localhost' (Got an error reading communication packets)
> Apr  3 19:36:11 FE-A07-34-VM6 /usr/sbin/kamailio[12874]: CRITICAL: <core>
> [core/pass_fd.c:277]: receive_fd(): EOF on 18
> Apr  3 19:36:11 FE-A07-34-VM6 /usr/sbin/kamailio[12826]: ALERT: <core>
> [main.c:767]: handle_sigs(): child process 12838 exited by a signal 11
> Apr  3 19:36:11 FE-A07-34-VM6 /usr/sbin/kamailio[12826]: ALERT: <core>
> [main.c:770]: handle_sigs(): core was not generated
> ============================
> Crash-3:
> --------
> Apr  3 19:40:53 FE-A07-34-VM6 kernel: kamailio[13542]: segfault at 80 ip
> 000000000065e193 sp 00007ffdae10c1f0 error 4 in kamailio[400000+476000]
> Apr  3 19:40:53 FE-A07-34-VM6 mysqld: 2020-04-03 19:40:53 6222 [Warning]
> Aborted connection 6222 to db: 'kamailio' user: 'kamailio' host:
> 'localhost' (Got an error reading communication packets)
> Apr  3 19:40:53 FE-A07-34-VM6 /usr/sbin/kamailio[13516]: ALERT: <core>
> [main.c:767]: handle_sigs(): child process 13542 exited by a signal 11
> Apr  3 19:40:53 FE-A07-34-VM6 /usr/sbin/kamailio[13558]: CRITICAL: <core>
> [core/pass_fd.c:277]: receive_fd(): EOF on 38
> Apr  3 19:40:53 FE-A07-34-VM6 /usr/sbin/kamailio[13516]: ALERT: <core>
> [main.c:770]: handle_sigs(): core was not generated
>
> Any pointers for resolution are most welcome as we need to quickly resolve
> this.
>
> Regards,
> Harneet Singh
> --
> "Once you eliminate the impossible, whatever remains, no matter how
> improbable, must be the truth" - Sir Arthur Conan Doyle
>
> _______________________________________________
> Kamailio (SER) - Users Mailing Listsr-users at lists.kamailio.orghttps://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
>
> --
> Daniel-Constantin Mierla -- www.asipto.comwww.twitter.com/miconda -- www.linkedin.com/in/miconda
>
>

-- 
"Once you eliminate the impossible, whatever remains, no matter how
improbable, must be the truth" - Sir Arthur Conan Doyle
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-users/attachments/20200410/a55b435d/attachment.html>


More information about the sr-users mailing list