[SR-Users] DMQ Module Crash

Ilie Soltanici iliusha.md at gmail.com
Fri May 8 21:13:15 CEST 2020


Daniel,

There are 2 core dump files. Please see attached full back trace from both
files.
Thanks

În vin., 8 mai 2020 la 19:53, Daniel-Constantin Mierla <miconda at gmail.com>
a scris:

> Hello,
>
> you have to provide the full output of gdb command from the core file:
>
> bt full
>
> To see the entire execution stack that cause the crash.
>
> Cheers,
> Daniel
> On 08.05.20 19:09, Ilie Soltanici wrote:
>
> Hello,
> I'm trying to replicate a hash table to another 2 nodes by using DMQ
> Module. That's the related configuration:
>
> loadmodule  "tm.so"
> loadmodule  "tmx.so"
> loadmodule  "dialog.so"
> loadmodule  "dmq.so"
> loadmodule  "htable.so"
>
> modparam("dmq", "server_address", "sip:MY_INTERNAL_IP_ADDR:5062")
> modparam("dmq", "notification_address", "sip:dmq.domain.local:5062")
> modparam("dmq", "multi_notify", 1)
> modparam("dmq", "num_workers", 4)
> modparam("dmq", "ping_interval", 90)
>
> modparam("htable", "enable_dmq", 1)
> modparam("htable", "dmq_init_sync", 1)
> modparam("htable", "htable", "test=>size=10;initval=0;dmqreplicate=1;")
>
>   if(is_method("KDMQ")) {
>     dmq_handle_message();
>     exit;
>   }
>
> After starting Kamailio - everything seems to be working fine, Kamailio is
> able to discover other nodes and replications is working fine, until after
> a few minutes I'm getting such errors in the Kamailio Log file:
>
> May  8 17:14:26 kamailio kamailio[28064]: CRITICAL: <core>
> [core/mem/q_malloc.c:521]: qm_free(): BUG: freeing already freed pointer
> (0x7f0ac62493e0), called from dialog: dlg_var.c: free_local_varlist(145),
> first free dialog: dlg_var.c: set_dlg_variable_unsafe(205) - ignoring
>
> Then, if I'm getting any SIP messages from any Device - Kamailio is
> crashing with the following info in the log file:
>
> May  8 16:03:19 kamailio kam[10963]: CRITICAL: {REGISTER (1) | Seq=45534 |
> Source IP=192.168.1.5 (tcp) | Call ID=Kyb-KJjf.U9ttdOwQNYu6mUWCKb2bvk7}
> <core> [core/mem/q_malloc.c:150]: qm_debug_check_frag(): BUG: qm: prev.
> fragm. tail overwritten(0, 0)[0x7f62cc746a10:0x7f62cc746a48]!
>  Memory allocator was called from dialog: dlg_var.c:147. Fragment marked
> by dialog: dlg_var.c:108. Exec from core/mem/q_malloc.c:511.
> May  8 16:03:21 kamailio kam[10966]: CRITICAL: <core>
> [core/pass_fd.c:277]: receive_fd(): EOF on 59
> May  8 16:03:21 kamailio kam[10966]: DEBUG: <core> [core/tcp_main.c:3825]:
> handle_ser_child(): dead child 37, pid 10963 (shutting down?)
> May  8 16:03:21 kamailio kam[10966]: DEBUG: <core> [core/io_wait.h:599]:
> io_watch_del(): DBG: io_watch_del (0xa9e1c0, 59, -1, 0x0) fd_no=48 called
> May  8 16:03:21 kamailio kam[10966]: DEBUG: <core> [core/tcp_main.c:3593]:
> handle_tcp_child(): dead tcp child 1 (pid 10963, no 37) (shutting down?)
> May  8 16:03:21 kamailio kam[10966]: DEBUG: <core> [core/io_wait.h:599]:
> io_watch_del(): DBG: io_watch_del (0xa9e1c0, 62, -1, 0x0) fd_no=47 called
> May  8 16:03:21 kamailio kam[10919]: ALERT: <core> [main.c:767]:
> handle_sigs(): child process 10963 exited by a signal 6
> May  8 16:03:21 kamailio kam[10919]: ALERT: <core> [main.c:770]:
> handle_sigs(): core was generated
> May  8 16:03:21 kamailio kam[10919]: INFO: <core> [main.c:792]:
> handle_sigs(): terminating due to SIGCHLD
> May  8 16:03:21 kamailio kam[10919]: DEBUG: <core> [main.c:794]:
> handle_sigs(): terminating due to SIGCHLD
> May  8 16:03:21 kamailio kam[10966]: INFO: <core> [main.c:847]: sig_usr():
> signal 15 received
>
>
> This is what i got from the dump core file:
>
> uri = {user = {s = 0x3 <Address 0x3 out of bounds>, len = -264573566},
> passwd = {s = 0x788 <Address 0x788 out of bounds>, len = 8208}, host = {s =
> 0x393100000000 <Address 0x393100000000 out of bounds>, len = 1588950199},
> port = {s = 0x2 <Address 0x2 out of bounds>,
>             len = 24086112}, params = {s = 0x7ffcbb1600c0 "\200", len =
> -261173312}, sip_params = {s = 0x7ffcbb1601a8 "\300\317n\360b\177", len =
> 24086112}, headers = {s = 0x0, len = -261173312}, port_no = 424, proto =
> 47894, type = 32764,
>           flags = (URI_SIP_USER_PHONE | unknown: 4031456108), transport = {
>             s = 0x16f88cc "16:03:19 kamailio[10963]: CRITICAL: {REGISTER
> (1) | Seq=45534 | Source IP=192.168.1.5 (tcp) | Call
> ID=Kyb-KJjf.U9ttdOwQNYu6mUWCKb2bvk7} <core> [core/mem/q_malloc.c:150]:
> qm_debug_check_frag(): BUG: qm: pr"..., len = -261163168}, ttl = {
>             s = 0x8 <Address 0x8 out of bounds>, len = -263517049},
> user_param = {
>             s = 0x16f88cc "16:03:19 kamailio[10963]: CRITICAL: {REGISTER
> (1) | Seq=45534 | Source IP=192.168.1.5 (tcp) | Call
> ID=Kyb-KJjf.U9ttdOwQNYu6mUWCKb2bvk7} <core> [core/mem/q_malloc.c:150]:
> qm_debug_check_frag(): BUG: qm: pr"..., len = -264350686}, maddr = {
>             s = 0x3336393031000080 <Address 0x3336393031000080 out of
> bounds>, len = 8187}, method = {s = 0x0, len = 24086112}, lr = {s =
> 0x820ce8 "%s: %s%s(): cseq <%.*s>: <%.*s> <%.*s>\n", len = -1156185384}, r2
> = {s = 0xb <Address 0xb out of bounds>, len = 21}, gr = {
>             s = 0xffffffff <Address 0xffffffff out of bounds>, len =
> -264780793}, transport_val = {s = 0x1ff4 <Address 0x1ff4 out of bounds>,
> len = 24086720}, ttl_val = {s = 0x7f62f06f0760 <main_arena> "", len = 128},
> user_param_val = {s = 0x16f88b0 "`\002", len = 144},
>           maddr_val = {s = 0x15 <Address 0x15 out of bounds>, len =
> -264573566}, method_val = {s = 0x788 <Address 0x788 out of bounds>, len =
> 8208}, lr_val = {s = 0x0, len = 1588950199}, r2_val = {s = 0x2 <Address 0x2
> out of bounds>, len = 24086112}, gr_val = {
>             s = 0x7ffcbb1601f0 "\006", len = -261173312}}
>         next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len =
> 0}, host = {s = 0x7f62f06eef20 <_nl_C_LC_NUMERIC+32> "", len = 0}, port =
> {s = 0x0, len = 0}, params = {s = 0x7f620000000b <Address 0x7f620000000b
> out of bounds>, len = 0}, sip_params = {
>             s = 0x7f62f03762cd <vfprintf+19661>
> "\200\275\360\372\377\377", len = 0}, headers = {s = 0x0, len = -1},
> port_no = 25293, proto = 61495, type = 32610, flags = (URI_USER_NORMALIZE |
> URI_SIP_USER_PHONE), transport = {s = 0x7ffcbb160038 "\267t\265^", len =
> 24086112},
>           ttl = {s = 0xffffffff <Address 0xffffffff out of bounds>, len =
> 0}, user_param = {s = 0x7d62e8 "%s: %.*s%s%s(): preparing to run routing
> scripts...\n", len = 11}, maddr = {s = 0xbd <Address 0xbd out of bounds>,
> len = 3440}, method = {s = 0x7d631c "", len = -263511186},
>           lr = {s = 0x16f88cc "16:03:19 kamailio[10963]: CRITICAL:
> {REGISTER (1) | Seq=45534 | Source IP=192.168.1.5 (tcp) | Call
> ID=Kyb-KJjf.U9ttdOwQNYu6mUWCKb2bvk7} <core> [core/mem/q_malloc.c:150]:
> qm_debug_check_frag(): BUG: qm: pr"..., len = -261163168}, r2 = {
>             s = 0x8 <Address 0x8 out of bounds>, len = -263517049}, gr = {
>             s = 0x16f88cc "16:03:19 kamailio[10963]: CRITICAL: {REGISTER
> (1) | Seq=45534 | Source IP=192.168.1.5 (tcp) | Call
> ID=Kyb-KJjf.U9ttdOwQNYu6mUWCKb2bvk7} <core> [core/mem/q_malloc.c:150]:
> qm_debug_check_frag(): BUG: qm: pr"..., len = -264350686}, transport_val = {
>             s = 0x7d62ef "s%s%s(): preparing to run routing scripts...\n",
> len = 8187}, ttl_val = {s = 0x0, len = -264345823}, user_param_val = {s =
> 0x3000000010 <Address 0x3000000010 out of bounds>, len = -1156184608},
> maddr_val = {
>             s = 0x7ffcbb160520 "\341+:\213'H\027\203\341+\342ޙ>\356|", len
> = 21}, method_val = {s = 0x7ffcbb160250 "\023", len = -1156186080}, lr_val
> = {s = 0x7f62f06eef80 <_nl_C_LC_TIME> "r\036K\360b\177", len =
> -1156185648}, r2_val = {s = 0x17ff710 "IST", len = -1156186048},
>           gr_val = {s = 0x0, len = -1156186058}}
>         u = 0x400001ff4
>
> By disabling DMQ Module i haven't noticed any crashes or issues like that,
> so i suppose that Kamailio is crashing because of this module, but i can be
> wrong. I've tried with 2 versions of Kamailio (5.2.6 and 5.3.4), both of
> them having the same issue.
>
> Thanks
>
>
> _______________________________________________
> Kamailio (SER) - Users Mailing Listsr-users at lists.kamailio.orghttps://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users
>
> --
> Daniel-Constantin Mierla -- www.asipto.comwww.twitter.com/miconda -- www.linkedin.com/in/miconda
> Funding: https://www.paypal.me/dcmierla
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-users/attachments/20200508/3ff5342f/attachment.html>
-------------- next part --------------
Currently logging to "gdb.txt".
Logs will be appended to the log file.
Output is being logged and displayed.
#0  0x00007f62f035f387 in raise () from /lib64/libc.so.6
No symbol table info available.
#1  0x00007f62f0360a78 in abort () from /lib64/libc.so.6
No symbol table info available.
#2  0x000000000068bbbc in qm_debug_check_frag (qm=0x7f62cbafb000, f=0x7f62cc746a10, file=0x7f62c8a15249 "dialog: dlg_var.c", line=147, efile=0x8052df "core/mem/q_malloc.c", eline=511) at core/mem/q_malloc.c:158
        p = 0x6f13f56e0000000e
        __FUNCTION__ = "qm_debug_check_frag"
#3  0x000000000068ed80 in qm_free (qmp=0x7f62cbafb000, p=0x7f62cc746a48, file=0x7f62c8a15249 "dialog: dlg_var.c", func=0x7f62c8a15e30 <__FUNCTION__.10780> "free_local_varlist", line=147, mname=0x7f62c8a14da0 "dialog") at core/mem/q_malloc.c:511
        qm = 0x7f62cbafb000
        f = 0x7f62cc746a10
        size = 140723447264032
        next = 0x7ffcbb15f390
        prev = 0x7f62c899c64a <dlg_lookup_msg_dialog+1204>
        __FUNCTION__ = "qm_free"
#4  0x00000000006989ca in qm_shm_free (qmp=0x7f62cbafb000, p=0x7f62cc746a48, file=0x7f62c8a15249 "dialog: dlg_var.c", func=0x7f62c8a15e30 <__FUNCTION__.10780> "free_local_varlist", line=147, mname=0x7f62c8a14da0 "dialog") at core/mem/q_malloc.c:1275
No locals.
#5  0x00007f62c89f1060 in free_local_varlist () at dlg_var.c:147
        var = 0x7f62cc746a48
        __FUNCTION__ = "free_local_varlist"
#6  0x00007f62c89f10a9 in get_local_varlist_pointer (msg=0x7f62efb13488, clear_pointer=0) at dlg_var.c:157
        var = 0x7f62efb13488
#7  0x00007f62c89f4184 in pv_set_dlg_variable (msg=0x7f62efb13488, param=0x7f62efac7c28, op=254, val=0x7ffcbb15f4b0) at dlg_var.c:404
        dlg = 0x0
        ret = -1
        __FUNCTION__ = "pv_set_dlg_variable"
#8  0x00000000004a313c in lval_pvar_assign (h=0x7ffcbb1604e0, msg=0x7f62efb13488, lv=0x7f62efac7e30, rv=0x7f62efac8678) at core/lvalue.c:352
        pvar = 0x7f62efac7c10
        pval = {rs = {s = 0x7f62efabc7d8 "2.1.1.1", len = 7}, ri = 0, flags = 4}
        r_avp = 0x7ffcbb15fb00
        avp_val = {n = 0, s = {s = 0x7f6200000000 <Address 0x7f6200000000 out of bounds>, len = -5}, re = 0x7f6200000000}
        ret = 1
        v = -1156187584
        destroy_pval = 0
        __FUNCTION__ = "lval_pvar_assign"
#9  0x00000000004a3b62 in lval_assign (h=0x7ffcbb1604e0, msg=0x7f62efb13488, lv=0x7f62efac7e30, rve=0x7f62efac8670) at core/lvalue.c:400
        rv = 0x7f62efac8678
        ret = 0
        __FUNCTION__ = "lval_assign"
#10 0x000000000049115a in do_action (h=0x7ffcbb1604e0, a=0x7f62efac7fa8, msg=0x7f62efb13488) at core/action.c:1450
        ret = -5
        v = 0
        dst = {send_sock = 0x1bb15fa80, to = {s = {sa_family = 8768, sa_data = "\300\313b\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 8768, sin_port = 52160, sin_addr = {s_addr = 32610}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 8768, 
              sin6_port = 52160, sin6_flowinfo = 32610, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\373\377\377\377\377\377\377\377", __u6_addr16 = {0, 0, 0, 0, 65531, 65535, 65535, 65535}, __u6_addr32 = {0, 0, 4294967291, 4294967295}}}, 
              sin6_scope_id = 0}}, id = 10, send_flags = {f = 24540, blst_imask = 61498}, proto = 98 'b', proto_pad0 = 127 '\177', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x7ffcbb160120 "`\ao\360b\177"
        end = 0xa00000000 <Address 0xa00000000 out of bounds>
        crt = 0x6f13f56e0000000e <Address 0x6f13f56e0000000e out of bounds>
        cmd = 0x7ffcbb15fb80
        len = 0
        user = 7950944
        uri = {user = {s = 0x7ffcbb15f9e0 " \372\025\273\001", len = -264805683}, passwd = {s = 0x7ffcbb15fdd6 "", len = 0}, host = {s = 0x7f6200000000 <Address 0x7f6200000000 out of bounds>, len = -5}, port = {s = 0xa00000000 <Address 0xa00000000 out of bounds>, 
            len = -264609828}, params = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, sip_params = {s = 0x0, len = 8497403}, headers = {s = 0x7ffcbb15ff40 "\275", len = -261173312}, port_no = 56, proto = 47894, type = 32764, flags = (unknown: 8497360), transport = {
            s = 0x16f8660 "\270\ao\360b\177", len = -264825029}, ttl = {s = 0x7f62f03762cd <vfprintf+19661> "\200\275\360\372\377\377", len = 0}, user_param = {s = 0x6f13f56e0000000e <Address 0x6f13f56e0000000e out of bounds>, len = 0}, maddr = {
            s = 0x7ffcbb15f9a0 "\300\372\025\273\374\177", len = 0}, method = {s = 0x7f62f04b2372 "%d]", len = 11}, lr = {s = 0x1 <Address 0x1 out of bounds>, len = 3440}, r2 = {s = 0x7ffcbb15fac0 "\001", len = -263511180}, gr = {s = 0x7ffcbb15ffd0 "P\002\026\273\374\177", 
            len = -261173312}, transport_val = {s = 0x7ffcbb15ffe8 "\320\001\026\273\374\177", len = -263511183}, ttl_val = {s = 0x16f8660 "\270\ao\360b\177", len = -264825029}, user_param_val = {s = 0x1bb15fa20 <Address 0x1bb15fa20 out of bounds>, len = 0}, maddr_val = {
            s = 0x7ffc00000000 <Address 0x7ffc00000000 out of bounds>, len = 0}, method_val = {s = 0x7ffcbb15ff07 "", len = 0}, lr_val = {s = 0x7f6200000000 <Address 0x7f6200000000 out of bounds>, len = 0}, r2_val = {s = 0x0, len = -1}, gr_val = {
            s = 0x7ffcbb15fb50 " \001\026\273\374\177", len = -264805683}}
        next_hop = {user = {s = 0x17ff710 "IST", len = -1156188272}, passwd = {s = 0x0, len = -1156188282}, host = {s = 0x3 <Address 0x3 out of bounds>, len = 1588950199}, port = {s = 0x2 <Address 0x2 out of bounds>, len = 24086112}, params = {
            s = 0x3931bb15f7f0 <Address 0x3931bb15f7f0 out of bounds>, len = -261173312}, sip_params = {s = 0x7ffcbb15f8b0 " ", len = -264805683}, headers = {s = 0x0, len = -261173312}, port_no = 0, proto = 0, type = 32764, 
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 4294967288), transport = {s = 0xa00000000 <Address 0xa00000000 out of bounds>, len = -264609828}, ttl = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, user_param = {s = 0x0, len = 8489098}, maddr = {
            s = 0x7ffcbb15fe10 "`\206o\001", len = -261173312}, method = {s = 0x7ffcbb15ff08 "\003", len = 8489040}, lr = {s = 0x16f8660 "\270\ao\360b\177", len = -264825029}, r2 = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, gr = {
            s = 0x8273f0 "%s: %s%s(): end of header reached, state=%d\n", len = -263511180}, transport_val = {s = 0x7ffcbb15fe60 "\a", len = -261173312}, ttl_val = {s = 0x7ffcbb15fe78 "P\377\025\273\374\177", len = -263511183}, user_param_val = {s = 0x16f8660 "\270\ao\360b\177", 
            len = -264825029}, maddr_val = {s = 0x7ffcbb15f990 "\001", len = -264805683}, method_val = {s = 0x16f88b0 "`\002", len = 144}, lr_val = {s = 0x0, len = -2}, r2_val = {s = 0xa00000000 <Address 0xa00000000 out of bounds>, len = 16}, gr_val = {
            s = 0x20 <Address 0x20 out of bounds>, len = 0}}
        u = 0x4f03762cd
        port = 0
        dst_host = 0x795264
        i = -1156187076
        flags = 32610
        avp = 0x16f8660
        st = {flags = 3138780464, id = 32764, name = {n = -261173312, s = {s = 0x7f62f06ecfc0 <_IO_mem_jumps> "", len = -1156186808}, re = 0x7f62f06ecfc0 <_IO_mem_jumps>}, avp = 0x7f62f04b2371}
        sct = 0x1
        sjt = 0x7f62f037173b <vfprintf+315>
        rve = 0x7ffcbb15fc10
        mct = 0x16f8660
        rv = 0x7f62f04b2374
        rv1 = 0x7f62cac60b5f <dbg_get_mod_debug_level+412>
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 24086112, s = {s = 0x16f8660 "\270\ao\360b\177", len = 8543584}, re = 0x16f8660}, pval = {rs = {s = 0x16f8660 "\270\ao\360b\177", len = 8543584}, ri = -1156187944, flags = 32764}}, 
          i2s = "\001\000\000\000\000\000\000\000!g>\360b\177\000\000\377\377\377\377\000"}
        s = {s = 0x3336393031000080 <Address 0x3336393031000080 out of bounds>, len = 8187}
        srevp = {0x7f62efac7fa8, 0x7f62efb13488}
        evp = {data = 0x7ffcbb15f6b0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#11 0x0000000000492ce6 in run_actions (h=0x7ffcbb1604e0, a=0x7f62efac7fa8, msg=0x7f62efb13488) at core/action.c:1576
        t = 0x7f62efac7fa8
        ret = -1
        tvb = {tv_sec = 1588950199, tv_usec = 653826}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 102
        __FUNCTION__ = "run_actions"
#12 0x0000000000482b45 in do_action (h=0x7ffcbb1604e0, a=0x7f62ef7fd8e0, msg=0x7f62efb13488) at core/action.c:695
        ret = -5
        v = 0
        dst = {send_sock = 0x7ffcbb1602d8, to = {s = {sa_family = 34400, sa_data = "o\001", '\000' <repeats 11 times>}, sin = {sin_family = 34400, sin_port = 367, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 34400, sin6_port = 367, 
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\300\317n\360b\177\000", __u6_addr16 = {0, 0, 0, 0, 53184, 61550, 32610, 0}, __u6_addr32 = {0, 0, 4033793984, 32610}}}, sin6_scope_id = 3138781912}}, id = 32764, send_flags = {
            f = 34400, blst_imask = 367}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x7ffcbb160500 "\250z}"
        end = 0x148 <Address 0x148 out of bounds>
        crt = 0x6f13f56e0000000e <Address 0x6f13f56e0000000e out of bounds>
        cmd = 0x7ffc00000001
        len = 0
        user = 7950944
        uri = {user = {s = 0x3 <Address 0x3 out of bounds>, len = -264573566}, passwd = {s = 0x788 <Address 0x788 out of bounds>, len = 8208}, host = {s = 0x393100000000 <Address 0x393100000000 out of bounds>, len = 1588950199}, port = {s = 0x2 <Address 0x2 out of bounds>, 
            len = 24086112}, params = {s = 0x7ffcbb1600c0 "\200", len = -261173312}, sip_params = {s = 0x7ffcbb1601a8 "\300\317n\360b\177", len = 24086112}, headers = {s = 0x0, len = -261173312}, port_no = 424, proto = 47894, type = 32764, 
          flags = (URI_SIP_USER_PHONE | unknown: 4031456108), transport = {
            s = 0x16f88cc "16:03:19 kamailio[10963]: CRITICAL: {REGISTER (1) | Seq=45534 | Source IP=192.168.1.5 (tcp) | Call ID=Kyb-KJjf.U9ttdOwQNYu6mUWCKb2bvk7} <core> [core/mem/q_malloc.c:150]: qm_debug_check_frag(): BUG: qm: pr"..., len = -261163168}, ttl = {
            s = 0x8 <Address 0x8 out of bounds>, len = -263517049}, user_param = {
            s = 0x16f88cc "16:03:19 kamailio[10963]: CRITICAL: {REGISTER (1) | Seq=45534 | Source IP=192.168.1.5 (tcp) | Call ID=Kyb-KJjf.U9ttdOwQNYu6mUWCKb2bvk7} <core> [core/mem/q_malloc.c:150]: qm_debug_check_frag(): BUG: qm: pr"..., len = -264350686}, maddr = {
            s = 0x3336393031000080 <Address 0x3336393031000080 out of bounds>, len = 8187}, method = {s = 0x0, len = 24086112}, lr = {s = 0x820ce8 "%s: %s%s(): cseq <%.*s>: <%.*s> <%.*s>\n", len = -1156185384}, r2 = {s = 0xb <Address 0xb out of bounds>, len = 21}, gr = {
            s = 0xffffffff <Address 0xffffffff out of bounds>, len = -264780793}, transport_val = {s = 0x1ff4 <Address 0x1ff4 out of bounds>, len = 24086720}, ttl_val = {s = 0x7f62f06f0760 <main_arena> "", len = 128}, user_param_val = {s = 0x16f88b0 "`\002", len = 144}, 
          maddr_val = {s = 0x15 <Address 0x15 out of bounds>, len = -264573566}, method_val = {s = 0x788 <Address 0x788 out of bounds>, len = 8208}, lr_val = {s = 0x0, len = 1588950199}, r2_val = {s = 0x2 <Address 0x2 out of bounds>, len = 24086112}, gr_val = {
            s = 0x7ffcbb1601f0 "\006", len = -261173312}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x7f62f06eef20 <_nl_C_LC_NUMERIC+32> "", len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x7f620000000b <Address 0x7f620000000b out of bounds>, len = 0}, sip_params = {
            s = 0x7f62f03762cd <vfprintf+19661> "\200\275\360\372\377\377", len = 0}, headers = {s = 0x0, len = -1}, port_no = 25293, proto = 61495, type = 32610, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = {s = 0x7ffcbb160038 "\267t\265^", len = 24086112}, 
          ttl = {s = 0xffffffff <Address 0xffffffff out of bounds>, len = 0}, user_param = {s = 0x7d62e8 "%s: %.*s%s%s(): preparing to run routing scripts...\n", len = 11}, maddr = {s = 0xbd <Address 0xbd out of bounds>, len = 3440}, method = {s = 0x7d631c "", len = -263511186}, 
          lr = {s = 0x16f88cc "16:03:19 kamailio[10963]: CRITICAL: {REGISTER (1) | Seq=45534 | Source IP=192.168.1.5 (tcp) | Call ID=Kyb-KJjf.U9ttdOwQNYu6mUWCKb2bvk7} <core> [core/mem/q_malloc.c:150]: qm_debug_check_frag(): BUG: qm: pr"..., len = -261163168}, r2 = {
            s = 0x8 <Address 0x8 out of bounds>, len = -263517049}, gr = {
            s = 0x16f88cc "16:03:19 kamailio[10963]: CRITICAL: {REGISTER (1) | Seq=45534 | Source IP=192.168.1.5 (tcp) | Call ID=Kyb-KJjf.U9ttdOwQNYu6mUWCKb2bvk7} <core> [core/mem/q_malloc.c:150]: qm_debug_check_frag(): BUG: qm: pr"..., len = -264350686}, transport_val = {
            s = 0x7d62ef "s%s%s(): preparing to run routing scripts...\n", len = 8187}, ttl_val = {s = 0x0, len = -264345823}, user_param_val = {s = 0x3000000010 <Address 0x3000000010 out of bounds>, len = -1156184608}, maddr_val = {
            s = 0x7ffcbb160520 "\341+:\213'H\027\203\341+\342ޙ>\356|", len = 21}, method_val = {s = 0x7ffcbb160250 "\023", len = -1156186080}, lr_val = {s = 0x7f62f06eef80 <_nl_C_LC_TIME> "r\036K\360b\177", len = -1156185648}, r2_val = {s = 0x17ff710 "IST", len = -1156186048}, 
          gr_val = {s = 0x0, len = -1156186058}}
        u = 0x400001ff4
        port = 0
        dst_host = 0x795264
        i = 32
        flags = 0
        avp = 0xffffffff
        st = {flags = 7, id = 0, name = {n = 3440, s = {s = 0xd70 <Address 0xd70 out of bounds>, len = -1156186224}, re = 0xd70}, avp = 0x7ffcbb15ff50}
        sct = 0x7f62f06eef80 <_nl_C_LC_TIME>
        sjt = 0x7ffcbb160250
        rve = 0x7ffcbb160360
        mct = 0x7ffcbb160480
        rv = 0xb
        rv1 = 0x7f62cac60b5f <dbg_get_mod_debug_level+412>
        c1 = {cache_type = 4030161613, val_type = 32610, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 24086112, flags = 0}}, i2s = "Ш\201", '\000' <repeats 13 times>, "r#K\360b\177"}
        s = {s = 0x16f8660 "\270\ao\360b\177", len = -264825029}
        srevp = {0x7f62ef7fd8e0, 0x7f62efb13488}
        evp = {data = 0x7ffcbb15fe00, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#13 0x0000000000492ce6 in run_actions (h=0x7ffcbb1604e0, a=0x7f62ef7fd8e0, msg=0x7f62efb13488) at core/action.c:1576
        t = 0x7f62ef7fd8e0
        ret = -1
        tvb = {tv_sec = 1588950199, tv_usec = 653802}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 0
        __FUNCTION__ = "run_actions"
#14 0x000000000049346f in run_top_route (a=0x7f62ef7fd8e0, msg=0x7f62efb13488, c=0x0) at core/action.c:1661
        ctx = {rec_lev = 2, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140062914386176, -9000645995702637599, 8223400, 102, 11482080, 7, -9000645995599877151, 9002201535750482913}, __mask_was_saved = 0, __saved_mask = {__val = {0, 4611686022733837280, 
                  140062904890504, 140723447268816, 5610143, 140723447268768, 140062285499231, 24021019, 140723447268812, 7433749936, 140062904890504, 8004010816636452865, 0, 140723447268816, 140062914386176, 8223400}}}}}
        p = 0x7ffcbb1604e0
        ret = 11482080
        sfbk = 0
#15 0x00000000005c05b9 in receive_msg (buf=0x16e8650 "REGISTER sip:192.168.1.1 SIP/2.0\r\nVia: SIP/2.0/TCP 192.168.1.5:23924;rport;branch=z9hG4bKPjLaHRqD3QVuIgkAAsT9OqG3YR9E8dyoq.;alias\r\nRoute: <sip:192.168.1.1"..., len=750, 
    rcv_info=0x7f62cc74c628) at core/receive.c:423
        msg = 0x7f62efb13488
        ctx = {rec_lev = 2, run_flags = 0, last_retcode = -261158992, jmp_env = {{__jmpbuf = {-140723447269151, 140723447269152, 140723447269151, 24020560, 0, 140062917316544, 140723447269432, 24020560}, __mask_was_saved = -1, __saved_mask = {__val = {8375336, 140723447269432, 
                  11, 21, 140062917330784, 140062917330784, 8223400, 0, 65552, 8, 140062913900709, 18446603350262282241, 4097, 1024, 128, 940597838896}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 1588950199, tv_usec = 653694}
        tve = {tv_sec = 1928, tv_usec = 8208}
        diff = 0
        inb = {s = 0x16e8650 "REGISTER sip:192.168.1.1 SIP/2.0\r\nVia: SIP/2.0/TCP 192.168.1.5:23924;rport;branch=z9hG4bKPjLaHRqD3QVuIgkAAsT9OqG3YR9E8dyoq.;alias\r\nRoute: <sip:192.168.1.1"..., len = 750}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcbb1606a0, rcv = 0x7f62cc74c628, dst = 0x0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 1
        __FUNCTION__ = "receive_msg"
#16 0x000000000065f223 in receive_tcp_msg (tcpbuf=0x7f62cc74c908 "REGISTER sip:192.168.1.1 SIP/2.0\r\nVia: SIP/2.0/TCP 192.168.1.5:23924;rport;branch=z9hG4bKPjLaHRqD3QVuIgkAAsT9OqG3YR9E8dyoq.;alias\r\nRoute: <sip:192.168.1.1"..., 
    len=750, rcv_info=0x7f62cc74c628, con=0x7f62cc74c610) at core/tcp_read.c:1448
        buf = 0x16e8650 "REGISTER sip:192.168.1.1 SIP/2.0\r\nVia: SIP/2.0/TCP 192.168.1.5:23924;rport;branch=z9hG4bKPjLaHRqD3QVuIgkAAsT9OqG3YR9E8dyoq.;alias\r\nRoute: <sip:192.168.1.1"...
        bsize = 65535
        blen = 65535
        __FUNCTION__ = "receive_tcp_msg"
#17 0x00000000006612e3 in tcp_read_req (con=0x7f62cc74c610, bytes_read=0x7ffcbb160b4c, read_flags=0x7ffcbb160b48) at core/tcp_read.c:1631
        bytes = 750
        total_bytes = 750
        resp = 1
        size = 4294967298
        req = 0x7f62cc74c690
        dst = {send_sock = 0x1bb1609e0, to = {s = {sa_family = 8768, sa_data = "\300\313b\177\000\000\250z}\000\000\000\000"}, sin = {sin_family = 8768, sin_port = 52160, sin_addr = {s_addr = 32610}, sin_zero = "\250z}\000\000\000\000"}, sin6 = {sin6_family = 8768, 
              sin6_port = 52160, sin6_flowinfo = 32610, sin6_addr = {__in6_u = {__u6_addr8 = "\250z}\000\000\000\000\000(\325\177\000\000\000\000", __u6_addr16 = {31400, 125, 0, 0, 54568, 127, 0, 0}, __u6_addr32 = {8223400, 0, 8377640, 0}}}, sin6_scope_id = 8382270}}, id = 0, 
          send_flags = {f = 8, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        c = 117 'u'
        ret = 14
        __FUNCTION__ = "tcp_read_req"
#18 0x0000000000664086 in handle_io (fm=0x7f62efb3c2f8, events=1, idx=-1) at core/tcp_read.c:1804
        ret = 8
        n = 8
        read_flags = 1
        con = 0x7f62cc74c610
        s = 10
        resp = 140062301889088
        t = 3418366528
        __FUNCTION__ = "handle_io"
#19 0x0000000000652927 in io_wait_loop_epoll (h=0xb09e20 <io_w>, t=2, repeat=0) at core/io_wait.h:1062
        n = 1
        r = 0
        fm = 0x7f62efb3c2f8
        revents = 1
        __FUNCTION__ = "io_wait_loop_epoll"
#20 0x00000000006660e3 in tcp_receive_loop (unix_sock=63) at core/tcp_read.c:1974
        __FUNCTION__ = "tcp_receive_loop"
#21 0x000000000053c177 in tcp_init_children () at core/tcp_main.c:5174
        r = 1
        i = 3
        reader_fd_1 = 63
        pid = 0
        si_desc = "tcp receiver (generic)\000o\000\000\000\000\004\000\000\000\300\r\026\273\374\177\000\000\336\067\365\355\000\000\000\000\260\222A\000\000\000\000\000\320\024\026\273\374\177", '\000' <repeats 18 times>, "@\016\026\273\374\177\000\000\276\027X\000\000\000\000\000@\016\026\273\374\177\000\000\341\234`", '\000' <repeats 13 times>, "\240u\345˽*\000"
        si = 0x0
        __FUNCTION__ = "tcp_init_children"
#22 0x0000000000427354 in main_loop () at main.c:1761
        i = 4
        pid = 10941
        si = 0x0
        si_desc = "udp receiver child=3 sock=10.1.50.13:5060\000\066\060\000\177\000\000\360\016\026\273\374\177\000\000\366\250h\000\000\000\000\000\260\222A\000\000\000\000\000\310F\263\313b\177", '\000' <repeats 14 times>, "\001\000\000\000@\017\026\273\374\177\000\000\060\261\344\313b\177\000\000\060m\327\353b\177\000\000Xk\254\357b\177\000"
        nrprocs = 4
        woneinit = 1
        __FUNCTION__ = "main_loop"
#23 0x000000000042eb28 in main (argc=13, argv=0x7ffcbb1614d8) at main.c:2802
        cfg_stream = 0x155c010
        c = -1
        r = 0
        tmp = 0x7ffcbb162f11 ""
        tmp_len = 0
        port = 0
        proto = 0
        ahost = 0x0
        aport = 0
        options = 0x77f920 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 3744967108
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x2f2f2f2f2f2f2f2f
        p = 0x0
        st = {st_dev = 19, st_ino = 27610, st_nlink = 2, st_mode = 16872, st_uid = 1001, st_gid = 1001, __pad0 = 0, st_rdev = 0, st_size = 60, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1588263505, tv_nsec = 503330450}, st_mtim = {tv_sec = 1588950065, 
            tv_nsec = 492995402}, st_ctim = {tv_sec = 1588950065, tv_nsec = 492995402}, __unused = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000\200\020\026\273\374\177\000\000\210\313\062\360b\177\000\000\350\223\063\360b\177\000\000\220\021\026\273\374\177\000\000\200\021\026\273\374\177\000\000.", '\000' <repeats 23 times>, "\300e\322\360b\177\000\000\000`\322\360b\177\000\000\230\367@\000\000\000\000\000П3\360b\177\000\000\270=@\000\000\000\000\000\000\000\000\000\001\000\000\000D\b\000\000\001", '\000' <repeats 11 times>, "H\022\026\273\374\177\000\000 \022\026\273\374\177\000\000\001\000\000\000\000\000\000\000\300e\322\360b\177\000\000\250\204\323\360b\177\000\000P\201\323\360b\177\000\000\217\360\261\360b\177\000\000\000\000\000\000\000\000\000\000\300"...
        option_index = 0
        long_options = {{name = 0x78249a "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x77c1bc "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x78249f "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x7824a5 "subst", has_arg = 1, flag = 0x0, val = 1025}, {
            name = 0x7824ab "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x7824b4 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x7824be "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __FUNCTION__ = "main"
-------------- next part --------------
#0  0x00007f62f035f387 in raise () from /lib64/libc.so.6
No symbol table info available.
#1  0x00007f62f0360a78 in abort () from /lib64/libc.so.6
No symbol table info available.
#2  0x000000000041b9fe in sig_alarm_abort (signo=14) at main.c:679
        __FUNCTION__ = "sig_alarm_abort"
#3  <signal handler called>
No symbol table info available.
#4  0x00007f62f0421bf7 in syscall () from /lib64/libc.so.6
No symbol table info available.
#5  0x00007f62c872efe1 in futex_get (lock=0x7f62cbe35760) at ../../core/parser/../mem/../futexlock.h:121
        v = 1
        i = 0
#6  0x00007f62c87358d6 in build_notification_body () at notification_peer.c:536
        slen = -264103537
        clen = 0
        cur_node = 0x0
        body = 0x7f62ef7bd3b8
        __FUNCTION__ = "build_notification_body"
#7  0x00007f62c873608e in request_nodelist (node=0x7f62cc6bb0e0, forward=1) at notification_peer.c:570
        body = 0x0
        ret = 2
        __FUNCTION__ = "request_nodelist"
#8  0x00007f62c873cde5 in destroy () at dmq.c:339
        __FUNCTION__ = "destroy"
#9  0x0000000000580c23 in destroy_modules () at core/sr_module.c:746
        t = 0x7f62ef7de518
        foo = 0x7f62ef7dd748
        __FUNCTION__ = "destroy_modules"
#10 0x000000000041a5b5 in cleanup (show_status=1) at main.c:555
        memlog = 538976288
        __FUNCTION__ = "cleanup"
#11 0x000000000041bce4 in shutdown_children (sig=15, show_status=1) at main.c:696
        __FUNCTION__ = "shutdown_children"
#12 0x000000000041e910 in handle_sigs () at main.c:796
        chld = 0
        chld_status = 134
        any_chld_stopped = 1
        memlog = -874154592
        __FUNCTION__ = "handle_sigs"
#13 0x0000000000427d02 in main_loop () at main.c:1806
        i = 4
        pid = 10966
        si = 0x0
        si_desc = "udp receiver child=3 sock=10.1.50.13:5060\000\066\060\000\177\000\000\360\016\026\273\374\177\000\000\366\250h\000\000\000\000\000\260\222A\000\000\000\000\000\310F\263\313b\177", '\000' <repeats 14 times>, "\001\000\000\000@\017\026\273\374\177\000\000\060\261\344\313b\177\000\000\060m\327\353b\177\000\000Xk\254\357b\177\000"
        nrprocs = 4
        woneinit = 1
        __FUNCTION__ = "main_loop"
#14 0x000000000042eb28 in main (argc=13, argv=0x7ffcbb1614d8) at main.c:2802
        cfg_stream = 0x155c010
        c = -1
        r = 0
        tmp = 0x7ffcbb162f11 ""
        tmp_len = 0
        port = 0
        proto = 0
        ahost = 0x0
        aport = 0
        options = 0x77f920 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 3744967108
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x2f2f2f2f2f2f2f2f
        p = 0x0
        st = {st_dev = 19, st_ino = 27610, st_nlink = 2, st_mode = 16872, st_uid = 1001, st_gid = 1001, __pad0 = 0, st_rdev = 0, st_size = 60, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1588263505, tv_nsec = 503330450}, st_mtim = {tv_sec = 1588950065, 
            tv_nsec = 492995402}, st_ctim = {tv_sec = 1588950065, tv_nsec = 492995402}, __unused = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000\200\020\026\273\374\177\000\000\210\313\062\360b\177\000\000\350\223\063\360b\177\000\000\220\021\026\273\374\177\000\000\200\021\026\273\374\177\000\000.", '\000' <repeats 23 times>, "\300e\322\360b\177\000\000\000`\322\360b\177\000\000\230\367@\000\000\000\000\000П3\360b\177\000\000\270=@\000\000\000\000\000\000\000\000\000\001\000\000\000D\b\000\000\001", '\000' <repeats 11 times>, "H\022\026\273\374\177\000\000 \022\026\273\374\177\000\000\001\000\000\000\000\000\000\000\300e\322\360b\177\000\000\250\204\323\360b\177\000\000P\201\323\360b\177\000\000\217\360\261\360b\177\000\000\000\000\000\000\000\000\000\000\300"...
        option_index = 0
        long_options = {{name = 0x78249a "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x77c1bc "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x78249f "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x7824a5 "subst", has_arg = 1, flag = 0x0, val = 1025}, {
            name = 0x7824ab "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x7824b4 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x7824be "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __FUNCTION__ = "main"


More information about the sr-users mailing list