[OpenSER-Users] OpenSER-1.1.1 crashes

Elena-Ramona Modroiu ramona at rosdev.ro
Wed Jun 11 15:04:00 CEST 2008


Hello Dilip,

wow, nice that you made it working!

Please send me the output of the backtrace from gdb. It will show the 
execution track and I can follow it to troubleshoot the crash.

If you did some changes in the code, please send me the patch.

Best regards,
Ramona


dilip.m at renovau.com wrote:
> Hello Everyone,
> I have inlcude auth_diameter module in the openser.cfg.
> It works fine with DISC. I can authorize the user with same.
> When i increase the call rate using sipp tool at that time the openser  
> going to crash. It disconnect the connection.
>
>
> The openser shows me this output.
>
>   1(19698) SIP Request:
>   1(19698)  method:  <REGISTER>
>   1(19698)  uri:     <sip:192.168.1.66>
>   1(19698)  version: <SIP/2.0>
>   1(19698) parse_headers: flags=2
>   1(19698) end of header reached, state=5
>   1(19698) parse_headers: Via found, flags=2
>   1(19698) parse_headers: this is the first via
>   1(19698) After parse_msg...
>   1(19698) preparing to run routing scripts...
>   1(19698) parse_headers: flags=100
>   1(19698) DEBUG:parse_to:end of header reached, state=10
>   1(19698) DBUG:parse_to: display={1113}, ruri={sip:1113 at 192.168.1.66:5060}
>   1(19698) DEBUG: get_hdr_field: <To> [35]; uri=[sip:1113 at 192.168.1.66:5060]
>   1(19698) DEBUG: to body [1113 <sip:1113 at 192.168.1.66:5060>
> ]
>   1(19698) get_hdr_field: cseq <CSeq>: <1> <REGISTER>
>   1(19698) DEBUG:maxfwd:is_maxfwd_present: value = 70
>   1(19698) parse_headers: flags=200
>   1(19698) DEBUG: get_hdr_body : content_length=0
>   1(19698) found end of header
>   1(19698) find_first_route: No Route headers found
>   1(19698) loose_route: There is no Route HF
>   1(19698) grep_sock_info - checking if host==us: 12==12 &&   
> [192.168.1.66] == [192.168.1.66]
>   1(19698) grep_sock_info - checking if port 5060 matches port 5060
>   1(19698) grep_sock_info - checking if host==us: 12==12 &&   
> [192.168.1.66] == [192.168.1.66]
>   1(19698) grep_sock_info - checking if port 5060 matches port 5060
>   1(19698) parse_headers: flags=4000
>   1(19698) auth_diameter:pre_auth(): Credentials with given realm not found
>   1(19698) ******* m_id=3
>   1(19698) DEBUG:do_read (sock=8): whole message read (len=304)!
>   1(19698) ######## m_id=3
>   1(19698) parse_headers: flags=ffffffffffffffff
>   1(19698) check_via_address(192.168.1.1, 192.168.1.1, 0)
>   1(19698) build_auth_hf(): 'WWW-Authenticate: Digest  
> realm="192.168.1.66",  
> nonce="484e1d9a81643c688e09493c7b615dacbc004e81", qop="auth"
> '
>   1(19698) parse_headers: flags=ffffffffffffffff
>   1(19698) check_via_address(192.168.1.1, 192.168.1.1, 0)
>   1(19698) DEBUG:destroy_avp_list: destroying list (nil)
>   1(19698) receive_msg: cleaning up
>   4(19703) SIP Request:
>   4(19703)  method:  <ACK>
>   4(19703)  uri:     <sip:192.168.1.66>
>   4(19703)  version: <SIP/2.0>
>   4(19703) parse_headers: flags=2
>   4(19703) end of header reached, state=5
>   4(19703) parse_headers: Via found, flags=2
>   4(19703) parse_headers: this is the first via
>   4(19703) After parse_msg...
>   4(19703) preparing to run routing scripts...
>   4(19703) parse_headers: flags=8
>   4(19703) DEBUG: add_param: tag=71db33f84c952ca903e2273ad59f1848.3074
>   4(19703) DEBUG:parse_to:end of header reached, state=29
>   4(19703) DBUG:parse_to: display={sut}, ruri={sip:1113 at 192.168.1.66:5060}
>   4(19703) DEBUG: get_hdr_field: <To> [76]; uri=[sip:1113 at 192.168.1.66:5060]
>   4(19703) DEBUG: to body [sut <sip:1113 at 192.168.1.66:5060>]
>   4(19703) DEBUG: sl_filter_ACK : local ACK found -> dropping it!
>   4(19703) DEBUG:destroy_avp_list: destroying list (nil)
>   4(19703) receive_msg: cleaning up
>   2(19699) SIP Request:
>   2(19699)  method:  <REGISTER>
>   2(19699)  uri:     <sip:192.168.1.66>
>   2(19699)  version: <SIP/2.0>
>   2(19699) parse_headers: flags=2
>   2(19699) end of header reached, state=5
>   2(19699) parse_headers: Via found, flags=2
>   2(19699) parse_headers: this is the first via
>   2(19699) After parse_msg...
>   2(19699) preparing to run routing scripts...
>   2(19699) parse_headers: flags=100
>   2(19699) DEBUG:parse_to:end of header reached, state=10
>   2(19699) DBUG:parse_to: display={1113}, ruri={sip:1113 at 192.168.1.66:5060}
>   2(19699) DEBUG: get_hdr_field: <To> [35]; uri=[sip:1113 at 192.168.1.66:5060]
>   2(19699) DEBUG: to body [1113 <sip:1113 at 192.168.1.66:5060>
> ]
>   2(19699) get_hdr_field: cseq <CSeq>: <2> <REGISTER>
>   2(19699) DEBUG:maxfwd:is_maxfwd_present: value = 70
>   2(19699) parse_headers: flags=200
>   2(19699) DEBUG: get_hdr_body : content_length=0
>   2(19699) found end of header
>   2(19699) find_first_route: No Route headers found
>   2(19699) loose_route: There is no Route HF
>   2(19699) grep_sock_info - checking if host==us: 12==12 &&   
> [192.168.1.66] == [192.168.1.66]
>   2(19699) grep_sock_info - checking if port 5060 matches port 5060
>   2(19699) grep_sock_info - checking if host==us: 12==12 &&   
> [192.168.1.66] == [192.168.1.66]
>   2(19699) grep_sock_info - checking if port 5060 matches port 5060
>   2(19699) ******* m_id=3
>   2(19699) DEBUG:do_read (sock=9): whole message read (len=208)!
>   2(19699) ######## m_id=3
>   2(19699) parse_headers: flags=ffffffffffffffff
>   2(19699) parse_headers: flags=8000000
>   2(19699) parse_headers: flags=ffffffffffffffff
>   2(19699) build_contact(): Created Contact HF: Contact:  
> <sip:1113 at 192.168.1.5:5060>;expires=27,  
> <sip:1113 at 192.168.1.1:5060>;expires=3600
>
>   2(19699) parse_headers: flags=ffffffffffffffff
>   2(19699) check_via_address(192.168.1.1, 192.168.1.1, 0)
>   2(19699) DEBUG:destroy_avp_list: destroying list (nil)
>   2(19699) receive_msg: cleaning up
>   4(19703) SIP Request:
>   4(19703)  method:  <ACK>
>   4(19703)  uri:     <sip:192.168.1.66>
>   4(19703)  version: <SIP/2.0>
>   4(19703) parse_headers: flags=2
>   4(19703) end of header reached, state=5
>   4(19703) parse_headers: Via found, flags=2
>   4(19703) parse_headers: this is the first via
>   4(19703) After parse_msg...
>   4(19703) preparing to run routing scripts...
>   4(19703) parse_headers: flags=8
>   4(19703) DEBUG: add_param: tag=71db33f84c952ca903e2273ad59f1848.3074
>   4(19703) DEBUG:parse_to:end of header reached, state=29
>   4(19703) DBUG:parse_to: display={sut}, ruri={sip:1113 at 192.168.1.66:5060}
>   4(19703) DEBUG: get_hdr_field: <To> [76]; uri=[sip:1113 at 192.168.1.66:5060]
>   4(19703) DEBUG: to body [sut <sip:1113 at 192.168.1.66:5060>]
>   4(19703) DEBUG: sl_filter_ACK : local ACK found -> dropping it!
>   4(19703) DEBUG:destroy_avp_list: destroying list (nil)
>   4(19703) receive_msg: cleaning up
> 10(19717) ERROR: receive_fd: EOF on 8
> 10(19717) DBG: handle_ser_child: dead child 3, pid 19701 (shutting down?)
> 10(19717) DBG: io_watch_del (0x6d31a0, 8, -1, 0x0) fd_no=14 called
>   0(19695) child process 19701 exited by a signal 11
>   0(19695) core was generated
>   0(19695) INFO: terminating due to SIGCHLD
>   8(19712) INFO: signal 15 received
>   8(19712)  4(19703)  7(19710) Memory status (pkg):
>   2(19699) INFO: signal 15 received
>   2(19699) Memory status (pkg):
>   2(19699) fm_status (0x705700):
>   2(19699)  heap size= 1048576
>   2(19699)  used= 18682, used+overhead=56810, free=991766
>   2(19699)  max used (+overhead)= 61502
>   2(19699) dumping free list:
>   2(19699) hash =   1 fragments no.:     2, unused:     0
>                   bucket size:         8 -         8 (first         8)
>   2(19699) hash =   2 fragments no.:     3, unused:     0
>                   bucket size:        16 -        16 (first        16)
>   2(19699) INFO: signal 15 received
> INFO: signal 15 received
>   8(19712) fm_status (0x705700):
>   8(19712)  heap size= 1048576
>   8(19712)  used= 75736, used+overhead=113464, free=935112
>   8(19712)  6(19708) hash =   3 fragments no.:     1, unused:     0
>                   bucket size:        24 -        24 (first        30)
>   2(19699) hash =   6 fragments no.:     1, unused:     0
>                   bucket size:        48 -        48 (first        48)
>   2(19699) hash =   8 fragments no.:     5, unused:     0
>                   bucket size:        64 -        64 (first        64)
>   2(19699)  4(19703)  7(19710) INFO: signal 15 received
>   6(19708) Memory status (pkg):
>   6(19708) fm_status (0x705700):
>   6(19708)  heap size= 1048576
>   6(19708)  used= 75736, used+overhead=113464, free=935112
>   6(19708)  max used (+overhead)= 113464
>   6(19708) dumping free list:
>   6(19708) hash =  27 fragments no.:     1, unused:     0
>                   bucket size:       216 -       216 (first       216)
>   6(19708) hash =  39 fragments no.:    11, unused:     0
>                   bucket size:       312 -       312 (first       312)
>   6(19708) hash =  73 fragments no.:     1, unused:     0
>                   bucket size:       584 -       584 (first       584)
>   6(19708) hash = 192 fragments no.:     1, unused:     0
>                   bucket size:      1536 -      1536 (first      1536)
>   6(19708) hash = 2054 fragments no.:     1, unused:     0
>                   bucket size:    524288 -   1048576 (first    929344)
>   6(19708) TOTAL:     15 free fragments = 935112 free bytes
>   6(19708) -----------------------------
>   1(19698) INFO: signal 15 received
>   1(19698) Memory status (pkg):
>   1(19698) fm_status (0x705700):
>   1(19698)  heap size= 1048576
>   1(19698)  used= 20040, used+overhead=58424, free=990152
>   1(19698)  max used (+overhead)= 62264
>   1(19698) dumping free list:
>   1(19698) hash =   1 fragments no.:     2, unused:     0
>                   bucket size:         8 -         8 (first         8)
>   1(19698) hash =   2 fragments no.:     3, unused:     0
>                   bucket size:        16 -        16 (first        16)
>   1(19698) hash =   3 fragments no.:     1, unused:     0
>                   bucket size:        24 -        24 (first        30)
>   1(19698) hash =   6 fragments no.:     1, unused:     0
>                   bucket size:        48 -        48 (first        48)
>   1(19698) hash =   8 fragments no.:     5, unused:     0
>                   bucket size:        64 -        64 (first        64)
>   1(19698) hash =   9 fragments no.:     9, unused:     0
>                   bucket size:        72 -        72 (first        72)
>   1(19698) hash =  10 fragments no.:     1, unused:     0
>                   bucket size:        80 -        80 (first        80)
>   1(19698) hash =  11 fragments no.:     1, unused:     0
>                   bucket size:        88 -        88 (first        88)
>   1(19698) hash =  15 fragments no.:     1, unused:     0
>                   bucket size:       120 -       120 (first       120)
> 10(19717) INFO: signal 15 received
> 10(19717) Memory status (pkg):
> 10(19717) fm_status (0x705700):
>
>
>
> I have also try with to solve it with gdb,but cant help.
>
>
> The gdb output as follows,
>
> (gdb) Loaded symbols for /usr/local/lib64/openser/modules/auth_diameter.so
> Reading symbols from /usr/local/lib64/openser/modules/domain.so...done.
> Loaded symbols for /usr/local/lib64/openser/modules/domain.so
> Reading symbols from /lib64/libnss_files.so.2...done.
> Loaded symbols for /lib64/libnss_files.so.2
> Core was generated by `openser'.
> Program terminated with signal 11, Segmentation fault.
> #0  0x00002aaaabfa2b72 in AAAAddAVPToMessage (msg=0x713cd8,  
> avp=0x713330, position=0x713b08) at avp.c:178
> 178                     
> for(avp_t=msg->avpList.head;avp_t&&avp_t!=position;avp_t=avp_t->next);
> (gdb)
>
>
>
>
> What was the problem ??
> Please explain me.
>
> Thanks in advance.
>
> Regards,
> Dilip Modi
>
> _______________________________________________
> Users mailing list
> Users at lists.openser.org
> http://lists.openser.org/cgi-bin/mailman/listinfo/users
>
>   





More information about the Users mailing list