Hi
Here is the output:
gdb)
(gdb) frame 0
#0 qm_detach_free
(qm=0x7fd96175e010, size=112) at mem/q_malloc.c:266
266 in
mem/q_malloc.c
(gdb)
#0 qm_detach_free
(qm=0x7fd96175e010, size=112) at mem/q_malloc.c:266
266 in
mem/q_malloc.c
(gdb) p *frag
$1 = {size =
7599108840079127868, u = {nxt_free = 0x3965663931343a64,
is_free = 4135824228634344036}}
(gdb)
$2 = {size =
7599108840079127868, u = {nxt_free = 0x3965663931343a64,
is_free = 4135824228634344036}}
(gdb)
$3 = {size =
7599108840079127868, u = {nxt_free = 0x3965663931343a64,
is_free = 4135824228634344036}}
(gdb) p
*((char*)frag + sizeof(struct qm_frag))
$4 = 99 'c'
Is it okay to run with MEMDBG=1 in
production ? Wouldn't it make it a little slow ?
Just let me know if u want so see something else with gdb.
Unfortunally I do not have SIP traces, but I have the core
file and some logs.
Regards,
Dragos
Hello,
can you provde the output in gdb for:
frame 0
p *frag
p *((char*)frag + sizeof(struct qm_frag))
There were similar reports, so apparently there is a
buffer overflow somewhere.
You should update to latest git branch 4.0, because
there were some other fixes from 4.0.3. With this
occasion, you should set MEMDBG=1 in Makefile.defs
before recompiling the new version to be able to
catch easier the overwrites of memory.
Cheers,
Daniel
On 11/21/13 6:36 PM, Dragos Oancea wrote:
Hello
We had this crash today
with kamailio 4.0.3 .
It ran stable for few
weeks until this crash.
GDB here:
Regards,
Dragos