[SR-Users] Kamailio 5.5.0 | CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 26

Daniel-Constantin Mierla miconda at gmail.com
Mon Jun 14 10:19:18 CEST 2021


Hello,

if you are using libmysql from MySQL project (not MariaDB), there were
similar issues reported which indicates some conflict/issue with libssl
on Ubuntu 18.04. Try to upgrade to Ubuntu 20.04.

Also, you can try with --atexit=no in case you are still facing startup
issues on newer OS versions.

Cheers,
Daniel

On 12.06.21 00:25, Laurent Schweizer wrote:
>
> Hello,
>
>  
>
> Sorry, idea was to test the 5.6.0 and not the 5.5.0, so I will try
> again 😊
>
>  
>
> BR
>
>  
>
> Laurent
>
>  
>
> *From:*Laurent Schweizer
> *Sent:* vendredi, 11 juin 2021 23:49
> *To:* Kamailio (SER) - Users Mailing List <sr-users at lists.sip-router.org>
> *Subject:* Kamailio 5.5.0 | CRITICAL: <core> [core/pass_fd.c:277]:
> receive_fd(): EOF on 26
>
>  
>
>  
>
> Dear all,
>
>  
>
> I setup a Kamailio 5.5.0 (from GIT)  on a ubuntu Ubuntu 18.04.5 LTS
>  and I have some error with the  libssl/ libmysql, seems not happening
> every time.
>
> Regarding the config file, it’s a config running correctly on a
> Kamailio 5.3.x on a centos 7
>
>  
>
> I have attached the returned error and the result of  the core file.
>
> Any idea ?
>
>  
>
> BR
>
>  
>
> Laurent
>
>  
>
> version: kamailio 5.5.0 (x86_64/linux) 66370c
>
> flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS,
> DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC,
> F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX,
> FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR,
> USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
>
> ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE
> 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
>
> poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
>
> id: 66370c
>
> compiled on 07:23:15 Jun 11 2021 with gcc 7.5.0
>
>  
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]: loading modules under
> config path: /usr/local/lib64/kamailio/modules/
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]: Listening on
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]:              udp:
> 80.132.9.112:5060
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]:              udp:
> 80.132.9.112:6000
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]:              tcp:
> 80.132.9.112:5060
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]:              tcp:
> 80.132.9.112:6000
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]:              tls:
> 80.132.9.112:5061
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]: Aliases:
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]:              tls:
> zrh02-srv03:5061
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]:              tcp:
> zrh02-srv03:6000
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]:              tcp:
> zrh02-srv03:5060
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]:              udp:
> zrh02-srv03:6000
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]:              udp:
> zrh02-srv03:5060
>
> Jun 11 21:35:45 zrh02-srv03 kamailio[7129]:              *:
> sipbkp.demo.ch:*
>
> Jun 11 21:35:45 zrh02-srv03 /usr/local/sbin/kamailio[7135]: WARNING:
> tls [tls_init.c:793]: tls_h_mod_init_f(): openssl bug #1491 (crash/mem
> leaks on low memory) workaround enabled (on low memory tls operations
> will fail preemptively) with free memory thresholds 13107200 and
> 6553600 bytes
>
> Jun 11 21:35:45 zrh02-srv03 /usr/local/sbin/kamailio[7135]: NOTICE:
> tls [tls_domain.c:1136]: ksr_tls_fix_domain(): registered server_name
> callback handler for socket [:0], server_name='<default>' ...
>
> Jun 11 21:35:46 zrh02-srv03 kernel: [304361.950608] traps:
> kamailio[7147] general protection ip:7f5d209a344b sp:7ffe6ae5adb8
> error:0 in libcrypto.so.1.1[7f5d207b5000+29b000]
>
> Jun 11 21:35:46 zrh02-srv03 systemd[1]: Started Kamailio SIP Server.
>
>  
>
> Jun 11 21:35:54 zrh02-srv03 /usr/local/sbin/kamailio[7161]: CRITICAL:
> <core> [core/pass_fd.c:277]: receive_fd(): EOF on 26
>
> Jun 11 21:35:54 zrh02-srv03 /usr/local/sbin/kamailio[7135]: ALERT:
> <core> [main.c:788]: handle_sigs(): child process 7147 exited by a
> signal 11
>
> Jun 11 21:35:54 zrh02-srv03 /usr/local/sbin/kamailio[7135]: ALERT:
> <core> [main.c:791]: handle_sigs(): core was generated
>
> Jun 11 21:35:54 zrh02-srv03 systemd[1]: kamailio.service: Main process
> exited, code=exited, status=1/FAILURE
>
> Jun 11 21:35:54 zrh02-srv03 systemd[1]: kamailio.service: Failed with
> result 'exit-code'.
>
>  
>
>  
>
> This GDB was configured as "x86_64-linux-gnu".
>
> Type "show configuration" for configuration details.
>
> For bug reporting instructions, please see:
>
> http://www.gnu.org/software/gdb/bugs/
> <http://www.gnu.org/software/gdb/bugs/>.
>
> Find the GDB manual and other documentation resources online at:
>
> http://www.gnu.org/software/gdb/documentation/
> <http://www.gnu.org/software/gdb/documentation/>.
>
> For help, type "help".
>
> Type "apropos word" to search for commands related to "word"...
>
> Reading symbols from /usr/local/sbin/kamailio...done.
>
> [New LWP 7147]
>
> [Thread debugging using libthread_db enabled]
>
> Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
>
> Core was generated by `/usr/local/sbin/kamailio -m 5000 -M 128 -P
> /run/kamailio/kamailio.pid -f /confi'.
>
> Program terminated with signal SIGSEGV, Segmentation fault.
>
> #0  0x00007f5d209a344b in X509_LOOKUP_by_subject () from
> /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
>
> (gdb) bt
>
> #0  0x00007f5d209a344b in X509_LOOKUP_by_subject () from
> /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
>
> #1  0x00007f5d209a3a5b in X509_STORE_CTX_get_by_subject () from
> /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
>
> #2  0x00007f5d209a418d in X509_STORE_CTX_get1_issuer () from
> /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
>
> #3  0x00007f5d209a9207 in ?? () from
> /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
>
> #4  0x00007f5d209a9f96 in X509_verify_cert () from
> /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
>
> #5  0x00007f5d20caf337 in ?? () from
> /usr/lib/x86_64-linux-gnu/libssl.so.1.1
>
> #6  0x00007f5d20cd037b in ?? () from
> /usr/lib/x86_64-linux-gnu/libssl.so.1.1
>
> #7  0x00007f5d20cd2995 in ?? () from
> /usr/lib/x86_64-linux-gnu/libssl.so.1.1
>
> #8  0x00007f5d20ccc48c in ?? () from
> /usr/lib/x86_64-linux-gnu/libssl.so.1.1
>
> #9  0x00007f5d20cb84e4 in SSL_do_handshake () from
> /usr/lib/x86_64-linux-gnu/libssl.so.1.1
>
> #10 0x00007f5d215cbdb1 in ?? () from
> /usr/lib/x86_64-linux-gnu/libmysqlclient.so.20
>
> #11 0x00007f5d2159f4de in mysql_real_connect () from
> /usr/lib/x86_64-linux-gnu/libmysqlclient.so.20
>
> #12 0x00007f5d21b410b1 in db_mysql_new_connection (id=0x7f5d21ee2b30)
> at km_my_con.c:157
>
> #13 0x00007f5d211456dc in db_do_init2 (url=0x7f5d1e9dd4e0 <ul_db_url>,
> new_connection=0x7f5d21b3f6a4 <db_mysql_new_connection>,
> pooling=DB_POOLING_PERMITTED) at db.c:317
>
> #14 0x00007f5d211443f9 in db_do_init (url=0x7f5d1e9dd4e0 <ul_db_url>,
> new_connection=0x7f5d21b3f6a4 <db_mysql_new_connection>) at db.c:270
>
> #15 0x00007f5d21b3459e in db_mysql_init (_url=0x7f5d1e9dd4e0
> <ul_db_url>) at km_dbase.c:202
>
> #16 0x00007f5d1e7a1987 in child_init (_rank=-1) at usrloc_mod.c:471
>
> #17 0x000055ddd6c45602 in init_mod_child (m=0x7f5d21e03818, rank=-1)
> at core/sr_module.c:864
>
> #18 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e03bb8, rank=-1)
> at core/sr_module.c:860
>
> #19 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e04498, rank=-1)
> at core/sr_module.c:860
>
> #20 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e056a8, rank=-1)
> at core/sr_module.c:860
>
> #21 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e06390, rank=-1)
> at core/sr_module.c:860
>
> #22 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e06b38, rank=-1)
> at core/sr_module.c:860
>
> #23 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e06fb8, rank=-1)
> at core/sr_module.c:860
>
> #24 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e075f0, rank=-1)
> at core/sr_module.c:860
>
> #25 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e090c0, rank=-1)
> at core/sr_module.c:860
>
> #26 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e09500, rank=-1)
> at core/sr_module.c:860
>
> #27 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e0a400, rank=-1)
> at core/sr_module.c:860
>
> #28 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e0aa70, rank=-1)
> at core/sr_module.c:860
>
> #29 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e0b0b0, rank=-1)
> at core/sr_module.c:860
>
> #30 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e0b5d8, rank=-1)
> at core/sr_module.c:860
>
> #31 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e0bdd0, rank=-1)
> at core/sr_module.c:860
>
> #32 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e0c968, rank=-1)
> at core/sr_module.c:860
>
> #33 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e0f7f8, rank=-1)
> at core/sr_module.c:860
>
> #34 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e105d8, rank=-1)
> at core/sr_module.c:860
>
> #35 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e109b0, rank=-1)
> at core/sr_module.c:860
>
> #36 0x000055ddd6c4521d in init_mod_child (m=0x7f5d21e10ea0, rank=-1)
> at core/sr_module.c:860
>
> #37 0x000055ddd6c45ef9 in init_child (rank=-1) at core/sr_module.c:909
>
> #38 0x000055ddd6b9eebe in fork_process (child_id=-1,
> desc=0x55ddd6ee7847 "slow timer", make_sock=1) at core/pt.c:337
>
> #39 0x000055ddd6abaa62 in main_loop () at main.c:1814
>
> #40 0x000055ddd6ac6095 in main (argc=9, argv=0x7ffe6ae5d298) at
> main.c:3053
>
>  
>
>  
>
>  
>
>  
>
>
> __________________________________________________________
> Kamailio - Users Mailing List - Non Commercial Discussions
>   * sr-users at lists.kamailio.org
> Important: keep the mailing list in the recipients, do not reply only to the sender!
> Edit mailing list options or unsubscribe:
>   * https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users

-- 
Daniel-Constantin Mierla -- www.asipto.com
www.twitter.com/miconda -- www.linkedin.com/in/miconda

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-users/attachments/20210614/b54c60db/attachment-0001.htm>


More information about the sr-users mailing list