[OpenSIPS-Users] Strange segfault when calling check_fraud
Liviu Chircu
liviu at opensips.org
Fri Nov 4 17:30:51 CET 2016
Thank you, Jim! The backtrace is very helpful.
Could you give a bit more details about how you are triggering this bug?
Could it be right after you are starting OpenSIPS?
Also, pasting the output of `opensips -V` could help as well.
Regards,
Liviu Chircu
OpenSIPS Developer
http://www.opensips-solutions.com
On 04.11.2016 17:34, Jim DeVito wrote:
> Thanks for the tip Liviu!
>
> I was able to get the full core file and paseted below is the back
> trace. Let me know if this can help track down what is going on.
>
> http://pastebin.com/m7LfVHqJ
>
> Thanks!!
>
> ---
> Jim DeVito
>
> On 2016-11-04 08:08, Liviu Chircu wrote:
>> Hi, Jim!
>>
>> It appears that OpenSIPS is either getting restarted too quickly or
>> runs out of disk space before it is able to fully write the 3 GB
>> corefile. If the size of your drouting data allows it, you could
>> reduce the corefile size by shrinking the shared memory pool OpenSIPS
>> starts with.
>>
>> Regards,
>>
>> Liviu Chircu
>> OpenSIPS Developer
>> http://www.opensips-solutions.com
>>
>> On 04.11.2016 16:15, Jim DeVito wrote:
>>> Hi All,
>>>
>>> Wondering if you have seen something like this. It happens when
>>> calling check_fraud() like this...
>>>
>>> check_fraud("$fU", "$rU", "1");
>>>
>>> I can reproduce it on 2 of my 3 servers. Let me know if there is
>>> other debugging info that may be needed.
>>>
>>> Thanks!!
>>>
>>> Nov 4 13:55:17 sip-proxy02 kernel: opensips[5257]: segfault at 0 ip
>>> 00007f619d94ff2e sp 00007ffee6ccd718 error 4 in
>>> drouting.so[7f619d947000+38000]
>>> Nov 4 13:55:17 sip-proxy02 kernel: opensips[5256]: segfault at 0 ip
>>> 00007f619d94ff2e sp 00007ffee6ccd718 error 4 in
>>> drouting.so[7f619d947000+38000]
>>> Nov 4 13:55:18 sip-proxy02 kernel: opensips[5260]: segfault at 0 ip
>>> 00007f619d94ff2e sp 00007ffee6ccd718 error 4 in
>>> drouting.so[7f619d947000+38000]
>>> Nov 4 13:55:18 sip-proxy02 kernel: opensips[5254]: segfault at 0 ip
>>> 00007f619d94ff2e sp 00007ffee6ccd718 error 4 in
>>> drouting.so[7f619d947000+38000]
>>> Nov 4 13:55:18 sip-proxy02 kernel: opensips[5259]: segfault at 0 ip
>>> 00007f619d94ff2e sp 00007ffee6ccd718 error 4 in
>>> drouting.so[7f619d947000+38000]
>>>
>>> [root at sip-proxy02 ~]# gdb /var/tmp/core.5257
>>> GNU gdb (GDB) Red Hat Enterprise Linux 7.6.1-80.el7
>>>
>>> This GDB was configured as "x86_64-redhat-linux-gnu".
>>>
>>> BFD: Warning: /var/tmp/core.5257 is truncated: expected core file
>>> size >= 3226677248, found: 1183989760.
>>> BFD: Warning: /var/tmp/core.5257 is truncated: expected core file
>>> size >= 3226677248, found: 1183989760.
>>> [New LWP 5257]
>>> Reading symbols from /usr/sbin/opensips...Reading symbols from
>>> /usr/lib/debug/usr/sbin/opensips.debug...done.
>>> done.
>>> Cannot access memory at address 0x7f62635a71e8
>>> Cannot access memory at address 0x7f62635a71e0
>>> (gdb) bt full
>>> Python Exception <class 'gdb.MemoryError'> Cannot access memory at
>>> address 0x7ffee6ccd718:
>>>
>>> [root at sip-proxy02 ~]# yum list installed | grep opensips
>>> opensips.x86_64 2.2.2-1.el7 @opensips
>>> opensips-db_mysql.x86_64 2.2.2-1.el7 @opensips
>>> opensips-debuginfo.x86_64 2.2.2-1.el7 @opensips
>>> opensips-event_route.x86_64 2.2.2-1.el7 @opensips
>>> opensips-fraud_detection.x86_64 2.2.2-1.el7 @opensips
>>> opensips-rest_client.x86_64 2.2.2-1.el7 @opensips
>>> opensips-yum-releases.noarch 2.2-3.el7
>>> @/opensips-yum-releases-2.2-3.el7.noarch
>>>
>>
>>
>> _______________________________________________
>> Users mailing list
>> Users at lists.opensips.org
>> http://lists.opensips.org/cgi-bin/mailman/listinfo/users
More information about the Users
mailing list