Ok cool Daniel, will do.
No, not stress testing at all.... I can't reproduce it on request - but let
me add the mem debugging and see how we go...
Cheers
Jason
On Tue, 6 Oct 2015 at 15:50 Daniel-Constantin Mierla <miconda(a)gmail.com>
wrote:
Can you try to run with '-x qm' -- maybe there
is a double free or a
buffer overflow, q_malloc is more suitable for debugging such cases.
Also, can you give some details on reproducing it? Are you stress testing
it?
Daniel
On 06/10/15 15:41, Jason Penton wrote:
I can confirm this is not related to TLS as I have recreated using TCP
only. Here is another BT (it seems the entire tcpconn structure is
corrupt)....
*(gdb) bt*
#0 local_timer_del (h=h@entry=0x99f3a0 <tcp_main_ltimer>,
tl=tl@entry=0x7ff3c82ce910)
at local_timer.c:178
#1 0x00000000005ad47c in handle_tcpconn_ev (tcpconn=0x7ff3c82ce828,
ev=<optimized out>, fd_i=-1) at tcp_main.c:4139
#2 0x00000000005c3e57 in io_wait_loop_epoll (h=<optimized out>,
t=<optimized out>, repeat=<optimized out>) at io_wait.h:1061
#3 tcp_main_loop () at tcp_main.c:4481
#4 0x00000000004ab79f in main_loop () at main.c:1672
#5 0x000000000042411e in main (argc=<optimized out>, argv=<optimized
out>) at main.c:2566
(gdb) frame 1
#1 0x00000000005ad47c in handle_tcpconn_ev (tcpconn=0x7ff3c82ce828,
ev=<optimized out>, fd_i=-1) at tcp_main.c:4139
4139 tcp_main.c: No such file or directory.
*(gdb) frame 0*
*(gdb) p *tl*
$3 = {next = 0x616a1a160109010d, prev = 0x746e65702e6e6f73, expire =
1933602415, initial_timeout = 1701603693, data = 0x6d6f632e736d6f63, f =
0x9060d3022018230, flags = 34346, slow_idx = 34376}
Looks like there is corruption....
*(gdb) frame 1*
*(gdb) print *tcpconn*
$11 = {s = 77, fd = -1, write_lock = {val = 14}, id = 16254464, reader_pid
= -2110739197, rcv = {src_ip = {af = 60854530, len = 33685762, u = {addrl =
{9667549471699894785, 363385298974377544}, addr32 = {
221250049, 2250901766, 234325576, 84607233}, addr16 = {513,
3376, 2310, 34346, 34376, 3575, 257, 1291}, addr =
"\001\002\060\r\006\t*\206H\206\367\r\001\001\v\005"}}, dst_ip = {af =
825700352,
len = 101265419, u = {addrl = {5140016830441870595,
312159073630948145}, addr32 = {100947203, 1196753427, 154143537, 72680198},
addr16 = {21763, 1540, 531, 18261, 2865, 2352, 774, 1109},
addr = "\003U\004\006\023\002UG1\v0\t\006\003U\004"}}, src_port =
3080, dst_port = 21762, proto_reserved1 = 806039879, proto_reserved2 =
1426261513, src_su = {s = {sa_family = 1796,
sa_data = "\f\002UG1\016\060\f\006\003U\004\n\f"}, sin =
{sin_family = 1796, sin_port = 524, sin_addr = {s_addr = 238110549},
sin_zero = "0\f\006\003U\004\n\f"}, sin6 = {sin6_family = 1796,
sin6_port = 524, sin6_flowinfo = 238110549, sin6_addr = {__in6_u =
{__u6_addr8 = "0\f\006\003U\004\n\f\005Smile0\036", __u6_addr16 = {3120,
774, 1109, 3082, 21253, 26989, 25964, 7728}, __u6_addr32 = {
50727984, 201983061, 1768772357, 506488172}}}, sin6_scope_id
= 892407063}}, bind_address = 0x3135393034323830, proto = 51 '3'}, req =
{next = 0x3331353930333238,
buf = 0x9300b317c305a34 <error: Cannot access memory at address
0x9300b317c305a34>, start = 0x5502130604550306 <error: Cannot access memory
at address 0x5502130604550306>,
pos = 0x55030609300b3147 <error: Cannot access memory at address
0x55030609300b3147>, parsed = 0xe314755020c0804 <error: Cannot access
memory at address 0xe314755020c0804>,
body = 0xc0a045503060c30 <error: Cannot access memory at address
0xc0a045503060c30>, b_size = 1768772357, content_len = 623994220,
chunk_size = 50733872, flags = 1109, bytes_to_go = 1935896604,
error = 1680762467, state = 1663989349}, refcnt = {val = 1818848627},
type = 1836016485, flags = 12155, send_flags = {f = 99 'c', blst_imask =
111 'o'}, state = 808005997, extra_data = 0xf78648862a090627,
timer = {next = 0x616a1a160109010d, prev = 0x746e65702e6e6f73, expire =
1933602415, initial_timeout = 1701603693, data = 0x6d6f632e736d6f63, f =
0x9060d3022018230, flags = 34346, slow_idx = 34376},
timeout = 50332929, lifetime = 983426, id_hash = 167871024, id_next =
0xab4698aaf4cd000, id_prev = 0x82f3bd212ad477e1, c_next =
0xfebfadf2e80d476b, c_prev = 0x542ad26c6fff5d01, con_aliases = {{
parent = 0x7ee7daa501f3ec2, next = 0x2564cfdb796faf0b, prev =
0x67075f982b68c22d, port = 26158, hash = 52278}, {parent =
0xa61ccf520173dbcf, next = 0xedfd914bd9290055, prev = 0x4c82e1be15c8e6bd,
port = 56482, hash = 35158}, {parent = 0x1dd62e187ab759f8, next =
0x5b9483e3bd60806b, prev = 0x3c0e501ef81ca353, port = 42794, hash = 37520},
{parent = 0xb6c3f82065f2d125, next = 0xa78be2be546e1fb7,
prev = 0x7a2f32985edb7215, port = 16490, hash = 49867}, {parent =
0x12bd4ff964ba4650, next = 0x7f071da522484c27, prev = 0x949f60e68638512f,
port = 26169, hash = 41924}, {parent = 0x60a5d1aac5486cb5,
next = 0xfa82965a57bf2ff6, prev = 0x7121974cf7f338d5, port = 64152,
hash = 31481}, {parent = 0xbe418ec01629988f, next = 0x57a216f873989cb5,
prev = 0x8dceabdc4ec9c171, port = 55564, hash = 38148}, {
parent = 0x7ba30100010302ef, next = 0x1d55030609307930, prev =
0x62c300030020413, port = 24585, hash = 18566}, {parent =
0x704f1d161f040d01, next = 0x6547204c53536e65, prev = 0x206465746172656e,
port = 25923, hash = 29810}, {parent = 0x5503061d30657461, next =
0xb4f5140416040e1d, prev = 0xb4484ad4fb6fc4a5, port = 45712, hash = 7028},
{parent = 0x1d5503061f30883e, next = 0xf714801630180423,
prev = 0xf2ba7396fd05170d, port = 24267, hash = 6103}, {parent =
0x2a09060d30f186cf, next = 0xb01010df7864886, prev = 0x8f00010182030005,
port = 51556, hash = 28499}}, aliases = 672183753, wbuf_q = {
first = 0x5b7bf0e590790cf6, last = 0x67d25b5f6e53d679, wr_timeout =
1518084272, queued = 3564629620, offset = 996062876, last_used = 950886522}}
On Mon, 5 Oct 2015 at 15:56 Jason Penton <jason.penton(a)gmail.com> wrote:
Hey Daniel
Using TLS only. not using tcpops nor websocket
On Mon, 5 Oct 2015 at 15:54 Daniel-Constantin Mierla <miconda(a)gmail.com>
wrote:
> It could be some other reason, I will investigate as well. Using any
> modules on top of tcp (like tcpops, tls or websocket)?
>
> Cheers,
> Daniel
>
>
> On 05/10/15 15:47, Jason Penton wrote:
>
> Hey Daniel,
>
> Got it once so far... I'll take a look at that commit and see what it
> did - but very strange indeed.
>
> Cheers
> Jason
>
> On Mon, 5 Oct 2015 at 15:42 Daniel-Constantin Mierla <miconda(a)gmail.com>
> wrote:
>
>> Hello,
>>
>> the only recent change in the tcp core was resetting a flag to avoid
>> infinite log messages (until connection was closed) via commit
>> d36734d658cd0bcfc8357c7e85ca32da0612aaee .
>>
>> Does it happen often, or you got it just once so far?
>>
>> Cheers,
>> Daniel
>>
>>
>> On 05/10/15 08:29, Jason Penton wrote:
>>
>> Hey guys,
>>
>> Not sure if there have been any changes but I have an interesting
>> problem here when using TCP:
>>
>> *The BT is as follows:*
>>
>> #0 local_timer_list_expire (h=0xa0f128 <tcp_reader_ltimer+178664>,
>> t=723807134, l=0x9e3740 <tcp_reader_ltimer>) at local_timer.c:198
>> #1 local_timer_expire (t=723807134, h=<optimized out>) at
>> local_timer.c:227
>> #2 local_timer_run (lt=lt@entry=0x9e3740 <tcp_reader_ltimer>,
>> saved_ticks=723807150) at local_timer.c:250
>> #3 0x00000000005d8417 in tcp_reader_timer_run () at tcp_read.c:1682
>> #4 tcp_receive_loop (unix_sock=<optimized out>) at tcp_read.c:1734
>> #5 0x00000000005c81c8 in tcp_init_children () at tcp_main.c:4788
>> #6 0x00000000004a9da3 in main_loop () at main.c:1664
>> #7 0x000000000042411e in main (argc=<optimized out>, argv=<optimized
>> out>) at main.c:2566
>>
>> This seems to be related to clearing timers for TCP connections. The
>> crash is related to the following code:
>>
>> *_timer_rm_list(tl)*
>>
>> where it does a null pointer deref on tl->next and tl->prev, which,
>> according to the bt, are null (see below).
>>
>> *(gdb) print *tl*
>> $14 = {next = 0x0, prev = 0x0, expire = 723807134, initial_timeout =
>> 32, data = 0x7fbbb05aa628, f = 0x5d02f0 <tcpconn_read_timeout>, flags =
>> 512, slow_idx = 0}
>>
>> Any ideas?
>>
>> Cheers
>> Jason
>>
>>
>>
>>
>>
>>
>> _______________________________________________
>> sr-dev mailing
listsr-dev@lists.sip-router.orghttp://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
>>
>>
>> --
>> Daniel-Constantin
Mierlahttp://twitter.com/#!/miconda -
http://www.linkedin.com/in/miconda
>> Book: SIP Routing With Kamailio -
http://www.asipto.com
>> Kamailio Advanced Training, Sep 28-30, 2015, in Berlin -
http://asipto.com/u/kat
>>
>> _______________________________________________
>> sr-dev mailing list
>> sr-dev(a)lists.sip-router.org
>>
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
>>
>
> --
> Daniel-Constantin
Mierlahttp://twitter.com/#!/miconda -
http://www.linkedin.com/in/miconda
> Book: SIP Routing With Kamailio -
http://www.asipto.com
> Kamailio Advanced Training, Sep 28-30, 2015, in Berlin -
http://asipto.com/u/kat
>
>
--
Daniel-Constantin
Mierlahttp://twitter.com/#!/miconda -
http://www.linkedin.com/in/miconda
Book: SIP Routing With Kamailio -
http://www.asipto.com