[OpenSIPS-Users] running sip tls on 443

Bogdan-Andrei Iancu bogdan at opensips.org
Mon Jul 4 11:54:35 CEST 2016


Thank you Tito,

It looks like a crash in the memory manager, while trying to allocate a 
new structure. Do debug such problems there is no other way than 
enabling debugging for the memory manager (QM_MALLOC + DBG_MALLOC flags) 
- is this a production system with considerable load on it ?

Regards,

Bogdan-Andrei Iancu
OpenSIPS Founder and Developer
http://www.opensips-solutions.com

On 01.07.2016 18:44, Tito Cumpen wrote:
> Bogdan,
>
>
> Correction I was using :
>
> version: opensips 2.2.0 (x86_64/linux)
>
> flags: STATS: On, DISABLE_NAGLE, USE_MCAST, SHM_MMAP, PKG_MALLOC, 
> F_MALLOC, FAST_LOCK-ADAPTIVE_WAIT
>
> ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, 
> MAX_URI_SIZE 1024, BUF_SIZE 65535
>
> poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
>
> git revision: d835721
>
> main.c compiled on 15:24:26 Jun 28 2016 with gcc 4.8.5
>
>
>
>
>
> On Fri, Jul 1, 2016 at 9:23 AM, Tito Cumpen <tito at xsvoce.com 
> <mailto:tito at xsvoce.com>> wrote:
>
>     Bogdan,
>
>     Here is the backtrace:
>
>
>     Reading symbols from /usr/sbin/opensips...done.
>
>     [New LWP 2648]
>
>     [Thread debugging using libthread_db enabled]
>
>     Using host libthread_db library "/lib64/libthread_db.so.1".
>
>     Core was generated by `/sbin/opensips -P /var/run/opensips.pid -u
>     opensips -g opensips -M 1024 -f /etc'.
>
>     Program terminated with signal 11, Segmentation fault.
>
>     #0  0x0000000000512782 in fm_remove_free (n=0x7fadc0898210,
>     qm=0x7fadc0809010) at mem/f_malloc.c:187
>
>     187*pf=n->u.nxt_free;
>
>     Missing separate debuginfos, use: debuginfo-install
>     cyrus-sasl-lib-2.1.26-20.el7_2.x86_64
>     glibc-2.17-106.el7_2.4.x86_64 gmp-6.0.0-12.el7_1.x86_64
>     gnutls-3.3.8-14.el7_2.x86_64 keyutils-libs-1.5.8-3.el7.x86_64
>     krb5-libs-1.13.2-12.el7_2.x86_64 libcom_err-1.42.9-7.el7.x86_64
>     libcurl-7.29.0-25.el7.centos.x86_64 libffi-3.0.13-16.el7.x86_64
>     libgcc-4.8.5-4.el7.x86_64 libgcrypt-1.5.3-12.el7_1.1.x86_64
>     libgpg-error-1.12-3.el7.x86_64 libidn-1.28-4.el7.x86_64
>     libmicrohttpd-0.9.33-2.el7.x86_64 librabbitmq-0.5.2-1.el7.x86_64
>     libselinux-2.2.2-6.el7.x86_64 libssh2-1.4.3-10.el7_2.1.x86_64
>     libstdc++-4.8.5-4.el7.x86_64 libtasn1-3.8-2.el7.x86_64
>     nettle-2.7.1-4.el7.x86_64 nspr-4.11.0-1.el7_2.x86_64
>     nss-3.21.0-9.el7_2.x86_64
>     nss-softokn-freebl-3.16.2.3-14.2.el7_2.x86_64
>     nss-util-3.21.0-2.2.el7_2.x86_64 openldap-2.4.40-9.el7_2.x86_64
>     openssl-libs-1.0.1e-51.el7_2.4.x86_64 p11-kit-0.20.7-3.el7.x86_64
>     pcre-8.32-15.el7.x86_64 trousers-0.3.13-1.el7.x86_64
>     xz-libs-5.1.2-12alpha.el7.x86_64 zlib-1.2.7-15.el7.x86_64
>
>     (gdb) bt full
>
>     #0  0x0000000000512782 in fm_remove_free (n=0x7fadc0898210,
>     qm=0x7fadc0809010) at mem/f_malloc.c:187
>
>             pf = 0x0
>
>             hash = 2051
>
>     #1  fm_malloc (qm=0x7fadc0809010, size=size at entry=65608) at
>     mem/f_malloc.c:415
>
>             frag = 0x7fadc0898210
>
>             n = <optimized out>
>
>             hash = 2051
>
>             __FUNCTION__ = "fm_malloc"
>
>     #2  0x00007fadb4615091 in ws_process (con=0x7fadbeb3f718) at
>     ../proto_ws/ws_common.h:576
>
>             size = <optimized out>
>
>             req = <optimized out>
>
>             ret_code = WS_ERR_NONE
>
>             bk = <optimized out>
>
>             msg_len = <optimized out>
>
>             local_rcv = {src_ip = {af = 3082146304 <tel:3082146304>,
>     len = 32685, u = {addrl = {34359801655, 140720703251544}, addr32 =
>     {63287, 8, 394765400, 32764}, addr16 = {63287, 0, 8, 0, 42072,
>     6023, 32764, 0},
>
>                   addr =
>     "7\367\000\000\b\000\000\000X\244\207\027\374\177\000"}}, dst_ip =
>     {af = 3080002780, len = 32685, u = {addrl = {4, 63119970000},
>     addr32 = {4, 0, 2990427856, 14}, addr16 = {4, 0, 0,
>
>                     0, 20176, 45630, 14, 0}, addr =
>     "\004\000\000\000\000\000\000\000\320N>\262\016\000\000"}},
>     src_port = 52976, dst_port = 49287, proto = 32685, proto_reserved1
>     = -1214962633,
>
>               proto_reserved2 = 32685, src_su = {s = {sa_family = 2,
>     sa_data = ")\350n\343\276C\360#%\275\016\000\000"}, sin =
>     {sin_family = 2, sin_port = 59433, sin_addr = {s_addr = 1136583534},
>
>                   sin_zero = "\360#%\275\016\000\000"}, sin6 =
>     {sin6_family = 2, sin6_port = 59433, sin6_flowinfo = 1136583534,
>     sin6_addr = {__in6_u = {
>
>                       __u6_addr8 =
>     "\360#%\275\016\000\000\000\360·\300\255\177\000", __u6_addr16 =
>     {9200, 48421, 14, 0, 52976, 49287, 32685, 0}, __u6_addr32 =
>     {3173327856, 14, 3230125808, 32685}}},
>
>                   sin6_scope_id = 1}}, bind_address = 0x7fadc0882ea8}
>
>             newreq = <optimized out>
>
>             msg_buf = <optimized out>
>
>     #3  wss_read_req (con=0x7fadbeb3f718, bytes_read=<optimized out>)
>     at proto_wss.c:428
>
>             size = <optimized out>
>
>             __FUNCTION__ = "wss_read_req"
>
>     #4  0x000000000059c374 in handle_io (fm=<optimized out>,
>     idx=idx at entry=0, event_type=event_type at entry=1) at
>     net/net_tcp_proc.c:205
>
>             ret = 0
>
>             n = <optimized out>
>
>             con = 0x7fadbeb3f718
>
>             s = 57
>
>             rw = <optimized out>
>
>             resp = <optimized out>
>
>             response = {140384203757736, 1}
>
>             __FUNCTION__ = "handle_io"
>
>     #5  0x000000000059d914 in io_wait_loop_epoll (h=<optimized out>,
>     t=<optimized out>, repeat=<optimized out>) at
>     net/../io_wait_loop.h:221
>
>             ret = <optimized out>
>
>             e = <optimized out>
>
>             n = 1
>
>             r = 0
>
>     #6  tcp_worker_proc (unix_sock=<optimized out>) at
>     net/net_tcp_proc.c:312
>
>             __FUNCTION__ = "tcp_worker_proc"
>
>     #7  0x00000000005a7fc9 in tcp_start_processes
>     (chd_rank=chd_rank at entry=0x8417e0 <chd_rank.11018>,
>     startup_done=startup_done at entry=0x7fadbe978738) at net/net_tcp.c:1761
>
>             r = 5
>
>             reader_fd = {50, 52}
>
>             pid = 0
>
>             load_p = 0x7fadbe979398
>
>             __FUNCTION__ = "tcp_start_processes"
>
>     #8  0x0000000000419ef5 in main_loop () at main.c:677
>
>             startup_done = 0x7fadbe978738
>
>             chd_rank = 18
>
>     #9  main (argc=<optimized out>, argv=<optimized out>) at main.c:1249
>
>             cfg_stream = <optimized out>
>
>             c = <optimized out>
>
>             r = <optimized out>
>
>             tmp = 0x7ffc1787bf65 ""
>
>             tmp_len = <optimized out>
>
>             port = <optimized out>
>
>             proto = <optimized out>
>
>             protos_no = <optimized out>
>
>             options = 0x5dae60
>     "f:cCm:M:b:l:n:N:rRvdDFETSVhw:t:u:g:P:G:W:o:"
>
>     ---Type <return> to continue, or q <return> to quit---
>
>             ret = -1
>
>             seed = 995413301
>
>             rfd = <optimized out>
>
>             __FUNCTION__ = "main"
>
>
>
>     currently using version: opensips 2.3.0-dev (x86_64/linux)
>
>     flags: STATS: On, DISABLE_NAGLE, USE_MCAST, SHM_MMAP, PKG_MALLOC,
>     QM_MALLOC, DBG_MALLOC, FAST_LOCK-ADAPTIVE_WAIT
>
>     ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN
>     16, MAX_URI_SIZE 1024, BUF_SIZE 65535
>
>     poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
>
>     git revision: 92434ef
>
>     main.c compiled on 15:05:06 Jun 28 2016 with gcc 4.8.5
>
>
>     On Tue, Jun 28, 2016 at 8:26 AM, Bogdan-Andrei Iancu
>     <bogdan at opensips.org <mailto:bogdan at opensips.org>> wrote:
>
>         Hi Tito,
>
>         If opensips crashes, were you able to extract a backtrace from
>         the core file(s) ?
>
>         Thanks and regards,
>
>         Bogdan-Andrei Iancu
>         OpenSIPS Founder and Developer
>         http://www.opensips-solutions.com
>
>         On 27.06.2016 21:20, Tito Cumpen wrote:
>>         Group,
>>
>>
>>         I am experiencing strange behavior when configuring sip tls
>>         on port 443. At time opensips crashes or stops accepting new
>>         connections. Here are the tcp configs I am using:
>>
>>         #disable_tcp=no
>>
>>         tcp_connection_lifetime=3600
>>
>>         tcp_connect_timeout=3
>>
>>         tcp_keepidle = 30
>>
>>         tcp_keepinterval = 5
>>
>>         tcp_keepalive = 1
>>
>>         tcp_keepcount = 5
>>
>>         tcp_max_msg_time = 8
>>
>>         tcp_children=10
>>
>>
>>         Any idea what would case this? I am assuming there are probes
>>         out in the internet that eventually make opensips crash?
>>
>>         Thanks,
>>         Tito
>>
>>
>>         _______________________________________________
>>         Users mailing list
>>         Users at lists.opensips.org <mailto:Users at lists.opensips.org>
>>         http://lists.opensips.org/cgi-bin/mailman/listinfo/users
>
>
>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opensips.org/pipermail/users/attachments/20160704/f12cfb5e/attachment-0001.htm>


More information about the Users mailing list