[OpenSIPS-Users] Strange segfault when calling check_fraud

Jim DeVito jim at devito.cc
Fri Nov 4 16:34:25 CET 2016


Thanks for the tip Liviu!

I was able to get the full core file and paseted below is the back 
trace. Let me know if this can help track down what is going on.

http://pastebin.com/m7LfVHqJ

Thanks!!

---
Jim DeVito

On 2016-11-04 08:08, Liviu Chircu wrote:
> Hi, Jim!
> 
> It appears that OpenSIPS is either getting restarted too quickly or
> runs out of disk space before it is able to fully write the 3 GB
> corefile. If the size of your drouting data allows it, you could
> reduce the corefile size by shrinking the shared memory pool OpenSIPS
> starts with.
> 
> Regards,
> 
> Liviu Chircu
> OpenSIPS Developer
> http://www.opensips-solutions.com
> 
> On 04.11.2016 16:15, Jim DeVito wrote:
>> Hi All,
>> 
>> Wondering if you have seen something like this. It happens when 
>> calling check_fraud() like this...
>> 
>> check_fraud("$fU", "$rU", "1");
>> 
>> I can reproduce it on 2 of my 3 servers. Let me know if there is other 
>> debugging info that may be needed.
>> 
>> Thanks!!
>> 
>> Nov  4 13:55:17 sip-proxy02 kernel: opensips[5257]: segfault at 0 ip 
>> 00007f619d94ff2e sp 00007ffee6ccd718 error 4 in 
>> drouting.so[7f619d947000+38000]
>> Nov  4 13:55:17 sip-proxy02 kernel: opensips[5256]: segfault at 0 ip 
>> 00007f619d94ff2e sp 00007ffee6ccd718 error 4 in 
>> drouting.so[7f619d947000+38000]
>> Nov  4 13:55:18 sip-proxy02 kernel: opensips[5260]: segfault at 0 ip 
>> 00007f619d94ff2e sp 00007ffee6ccd718 error 4 in 
>> drouting.so[7f619d947000+38000]
>> Nov  4 13:55:18 sip-proxy02 kernel: opensips[5254]: segfault at 0 ip 
>> 00007f619d94ff2e sp 00007ffee6ccd718 error 4 in 
>> drouting.so[7f619d947000+38000]
>> Nov  4 13:55:18 sip-proxy02 kernel: opensips[5259]: segfault at 0 ip 
>> 00007f619d94ff2e sp 00007ffee6ccd718 error 4 in 
>> drouting.so[7f619d947000+38000]
>> 
>> [root at sip-proxy02 ~]# gdb /var/tmp/core.5257
>> GNU gdb (GDB) Red Hat Enterprise Linux 7.6.1-80.el7
>> 
>> This GDB was configured as "x86_64-redhat-linux-gnu".
>> 
>> BFD: Warning: /var/tmp/core.5257 is truncated: expected core file size 
>> >= 3226677248, found: 1183989760.
>> BFD: Warning: /var/tmp/core.5257 is truncated: expected core file size 
>> >= 3226677248, found: 1183989760.
>> [New LWP 5257]
>> Reading symbols from /usr/sbin/opensips...Reading symbols from 
>> /usr/lib/debug/usr/sbin/opensips.debug...done.
>> done.
>> Cannot access memory at address 0x7f62635a71e8
>> Cannot access memory at address 0x7f62635a71e0
>> (gdb) bt full
>> Python Exception <class 'gdb.MemoryError'> Cannot access memory at 
>> address 0x7ffee6ccd718:
>> 
>> [root at sip-proxy02 ~]# yum list installed | grep opensips
>> opensips.x86_64 2.2.2-1.el7                    @opensips
>> opensips-db_mysql.x86_64 2.2.2-1.el7                    @opensips
>> opensips-debuginfo.x86_64 2.2.2-1.el7                    @opensips
>> opensips-event_route.x86_64 2.2.2-1.el7                    @opensips
>> opensips-fraud_detection.x86_64 2.2.2-1.el7                    
>> @opensips
>> opensips-rest_client.x86_64 2.2.2-1.el7                    @opensips
>> opensips-yum-releases.noarch 2.2-3.el7 
>> @/opensips-yum-releases-2.2-3.el7.noarch
>> 
> 
> 
> _______________________________________________
> Users mailing list
> Users at lists.opensips.org
> http://lists.opensips.org/cgi-bin/mailman/listinfo/users



More information about the Users mailing list