[OpenSIPS-Users] opensips 2.3

Răzvan Crainea razvan at opensips.org
Tue Jan 9 03:57:45 EST 2018


Hi, Tito!

Can you try to compile with memory debugging (compiling with QM_MALLOC 
and DBG_MALOC macros)? You can do that either manually[1] or by using 
the menuconfig tool, where you should go to Compile Flags and enable the 
two macros, then recompile your sources.

[1] http://www.opensips.org/Documentation/TroubleShooting-OutOfMem

Best regards,

Răzvan Crainea
OpenSIPS Developer
www.opensips-solutions.com

On 01/09/2018 12:12 AM, Tito Cumpen wrote:
> Group,
>
> I've migrated to opensips 2.3.2 git revision a3b332c and I am 
> experiencing a crash
>
> I am using
> OpenSSL 1.0.2k-fips if that helps.
> gdb opensips core.11677
> GNU gdb (GDB) Red Hat Enterprise Linux 7.6.1-94.el7
> Copyright (C) 2013 Free Software Foundation, Inc.
> License GPLv3+: GNU GPL version 3 or later 
> <http://gnu.org/licenses/gpl.html>
> This is free software: you are free to change and redistribute it.
> There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
> and "show warranty" for details.
> This GDB was configured as "x86_64-redhat-linux-gnu".
> For bug reporting instructions, please see:
> <http://www.gnu.org/software/gdb/bugs/>...
> Reading symbols from /usr/sbin/opensips...done.
> [New LWP 11677]
> [Thread debugging using libthread_db enabled]
> Using host libthread_db library "/lib64/libthread_db.so.1".
> Core was generated by `/sbin/opensips -P /var/run/opensips.pid -u 
> opensips -g opensips -M 1024 -m 256'.
> Program terminated with signal 11, Segmentation fault.
> #0  0x00000000005313b2 in fm_remove_free (n=0x7f6a1fa7bb50, 
> qm=0x7f6a1f681000) at mem/f_malloc.c:200
> 200*pf=n->u.nxt_free;
> (gdb) bt full
> #0  0x00000000005313b2 in fm_remove_free (n=0x7f6a1fa7bb50, 
> qm=0x7f6a1f681000) at mem/f_malloc.c:200
>         pf = 0x0
>         hash = 10
> #1  fm_malloc (qm=0x7f6a1f681000, size=size at entry=80) at 
> mem/f_malloc.c:428
>         frag = 0x7f6a1fa7bb50
>         n = <optimized out>
>         hash = 10
>         __FUNCTION__ = "fm_malloc"
> #2  0x00007f6a1f2670d9 in shm_malloc (size=80) at ../../mem/shm_mem.h:437
>         p = <optimized out>
> #3  os_malloc (size=80) at tls.h:85
> No locals.
> #4  0x00007f6a1ebeb3b8 in CRYPTO_malloc (num=num at entry=80, 
> file=file at entry=0x7f6a1ed636fb "pmeth_lib.c", line=line at entry=292) at 
> mem.c:346
>         ret = 0x0
> #5  0x00007f6a1ecb55ec in EVP_PKEY_CTX_dup (pctx=0x7f6a1fa7bb68) at 
> pmeth_lib.c:292
>         rctx = <optimized out>
> #6  0x00007f6a1eca7160 in EVP_MD_CTX_copy_ex (out=0x7ffc9d7b5560, 
> in=0x7ffc9d7b5660) at digest.c:373
>         tmp_buf = 0x0
> #7  0x00007f6a1ecb6e0c in EVP_DigestSignFinal 
> (ctx=ctx at entry=0x7ffc9d7b5660, sigret=sigret at entry=0x7f6a1fb08022 
> "\256v?p\257\244", siglen=siglen at entry=0x7ffc9d7b5658) at m_sigver.c:153
>         tmp_ctx = {digest = 0x7f6a1efc5d80 <sha1_md>, engine = 0x0, 
> flags = 256, md_data = 0x0, pctx = 0x7f6a1fa7bb68, update = 
> 0x7f6a1ec12570 <int_update>}
>         md = 
> "\001\000\000\000\000\000\000\000\300C\246\037j\177\000\000@\342\256\037j\177\000\000\327'\301\036j\177\000\000\070\356\260\037j\177\000\000h\273\247\037j\177\000\000\000\000\000\000\000\000\000\000\213V\313\036j\177\000"
>         mdlen = 32618
>         sctx = 1
>         r = 0
>         pctx = <optimized out>
> #8  0x00007f6a1f016a9b in tls1_mac (ssl=0x7f6a1faed638, 
> md=0x7f6a1fb08022 "\256v?p\257\244", send=1) at t1_enc.c:1102
>         rec = 0x7f6a1fafa130
>         seq = 0x7f6a1fafa030 ""
>         hash = <optimized out>
>         md_size = 20
>         orig_len = 22
>         i = <optimized out>
>         hmac = {digest = 0x7f6a1efc5d80 <sha1_md>, engine = 0x0, flags 
> = 256, md_data = 0x0, pctx = 0x7f6a1fa7bb68, update = 0x7f6a1ec12570 
> <int_update>}
>         mac_ctx = 0x7ffc9d7b5660
>         header = "\000\000\000\000\000\000\000I\027\003\001\000\002"
>         stream_mac = 0
>         t = <optimized out>
> #9  0x00007f6a1f008bfd in do_ssl3_write (s=s at entry=0x7f6a1faed638, 
> type=type at entry=23, buf=buf at entry=0x7f6a15d2508f "\r\n", len=2, 
> create_empty_fragment=create_empty_fragment at entry=0) at s3_pkt.c:1030
>         p = 0x7f6a1fb08020 "\r\n\256v?p\257\244"
>         plen = 0x7f6a1fb0801e ""
>         i = <optimized out>
>         mac_size = 20
>         clear = <optimized out>
>         prefix_len = <optimized out>
>         eivlen = <optimized out>
>         align = <optimized out>
>         wr = 0x7f6a1fafa130
>         wb = 0x7f6a1fafa0e0
>         sess = <optimized out>
> #10 0x00007f6a1f008e36 in ssl3_write_bytes (s=0x7f6a1faed638, 
> type=<optimized out>, buf_=0x7f6a15d2508f, len=<optimized out>) at 
> s3_pkt.c:833
>         buf = 0x7f6a15d2508f "\r\n"
>         tot = 0
>         n = 2
>         nw = <optimized out>
>         max_send_fragment = <optimized out>
>         wb = 0x7f6a1fafa0e0
>         i = <optimized out>
> #11 0x00007f6a15d20f69 in tls_write (fd=<optimized out>, 
> poll_events=0x7ffc9d7b5844, len=2, buf=0x7f6a15d2508f, 
> c=0x7f6a1faee0b8) at ../tls_mgm/tls_conn_server.h:504
>         ret = <optimized out>
>         err = <optimized out>
> ---Type <return> to continue, or q <return> to quit---
>         ssl = 0x7f6a1faed638
> #12 tls_blocking_write (c=c at entry=0x7f6a1faee0b8, fd=<optimized out>, 
> buf=buf at entry=0x7f6a15d2508f "\r\n", len=len at entry=2, 
> api=0x7f6a15f397e0 <tls_mgm_api>, api=0x7f6a15f397e0 <tls_mgm_api>)
>     at ../tls_mgm/tls_conn_server.h:578
>         written = 0
>         n = 0
>         timeout = <optimized out>
>         retries = 0
>         pf = {fd = 11, events = 0, revents = 0}
> #13 0x00007f6a15d241bc in w_tls_blocking_write (buf=0x7f6a15d2508f 
> "\r\n", len=2, fd=<optimized out>, c=0x7f6a1faee0b8) at proto_tls.c:124
>         ret = <optimized out>
> #14 tcp_handle_req (_max_msg_chunks=<optimized out>, con=<optimized 
> out>, req=0x7f6a2f71b6d8) at ../../net/proto_tcp/tcp_common.h:386
>         local_rcv = {src_ip = {af = 2, len = 4, u = {addrl = {3070, 
> 0}, addr32 = {3070, 0, 0, 0}, addr16 = {3070, 0, 0, 0, 0, 0, 0, 0}, 
> addr = "\376\v", '\000' <repeats 13 times>}}, dst_ip = {af = 2,
>             len = 4, u = {addrl = {4, 0}, addr32 = {4, 0, 0, 0}, 
> addr16 = {4, 0, 0, 0, 0, 0, 0, 0}, addr = "\004", '\000' <repeats 14 
> times>}}, src_port = 0, dst_port = 0, proto = 0,
>           proto_reserved1 = 2087326500, proto_reserved2 = 0, src_su = 
> {s = {sa_family = 2, sa_data = "\333Yl# 
> \374\200\260\b\267\000\000\000"}, sin = {sin_family = 2, sin_port = 
> 23003, sin_addr = {
>                 s_addr = 4229964652}, sin_zero = 
> "\200\260\b\267\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 
> 23003, sin6_flowinfo = 4229964652, sin6_addr = {__in6_u = {
>                   __u6_addr8 = "\200\260\b\267\000\000\000\000 
> \000\000\000\000\000\000", __u6_addr16 = {45184, 46856, 0, 0, 32, 0, 
> 0, 0}, __u6_addr32 = {3070800000, 0, 32, 0}}},
>               sin6_scope_id = 4294967291}}, bind_address = 0x1}
>         msg_buf = <optimized out>
>         msg_len = <optimized out>
>         c = 0 '\000'
>         size = 0
> #15 tls_read_req (con=0x7f6a1faee0b8, bytes_read=0x7ffc9d7b5a20) at 
> proto_tls.c:616
>         ret = 0
>         bytes = <optimized out>
>         total_bytes = 3
>         req = 0x7f6a2f71b6d8
>         data = <optimized out>
>         __FUNCTION__ = "tls_read_req"
> #16 0x00000000005e4ba7 in handle_io (event_type=1, idx=1, 
> fm=<optimized out>) at net/net_tcp_proc.c:231
>         con = 0x7f6a1faee0b8
>         ret = 0
>         n = <optimized out>
>         rw = <optimized out>
>         response = {140093774569184, 1}
>         s = 13
>         resp = <optimized out>
> #17 io_wait_loop_epoll (repeat=<optimized out>, t=<optimized out>, 
> h=<optimized out>) at net/../io_wait_loop.h:280
>         ret = 1
>         n = 1
>         r = 1
>         i = <optimized out>
>         e = <optimized out>
>         ep_event = {events = 565320, data = {ptr = 0x531afb00000000, 
> fd = 0, u32 = 0, u64 = 23392088406097920}}
>         fd = <optimized out>
> #18 0x00000000005e665b in tcp_worker_proc_loop () at 
> net/net_tcp_proc.c:359
>         __FUNCTION__ = "tcp_worker_proc_loop"
> #19 0x00000000005f31ad in tcp_start_processes 
> (chd_rank=chd_rank at entry=0x89f3e0 <chd_rank.11332>, 
> startup_done=startup_done at entry=0x7f6a1fa4e870) at net/net_tcp.c:1837
>         r = 0
>         reader_fd = {90, 93}
>         pid = <optimized out>
>         load_p = 0x7f6a1fa4f638
>         __FUNCTION__ = "tcp_start_processes"
> #20 0x000000000041c704 in main_loop () at main.c:683
>         startup_done = 0x7f6a1fa4e870
>         chd_rank = 17
> #21 main (argc=<optimized out>, argv=<optimized out>) at main.c:1283
>         cfg_stream = <optimized out>
>         c = <optimized out>
>         r = <optimized out>
>         tmp = 0x7ffc9d7b6f65 ""
>         tmp_len = <optimized out>
> ---Type <return> to continue, or q <return> to quit---
>         port = <optimized out>
>         proto = <optimized out>
>         protos_no = <optimized out>
>         options = 0x632f18 "f:cCm:M:b:l:n:N:rRvdDFETSVhw:t:u:g:P:G:W:o:"
>         ret = -1
>         seed = 2706464427
>         rfd = <optimized out>
>         __FUNCTION__ = "main"
>
>
>
> _______________________________________________
> Users mailing list
> Users at lists.opensips.org
> http://lists.opensips.org/cgi-bin/mailman/listinfo/users

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opensips.org/pipermail/users/attachments/20180109/b6db75b4/attachment-0001.html>


More information about the Users mailing list