Hi all,
I have kamailio running in GKE (Google Kubernetes) and recently seeing kamailio crashes frequently and I couldn't find the reason for the crash
kamailio version
version: kamailio 5.4.9 (x86_64/linux) 7d022d flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 7d022d compiled on 14:26:30 Jul 10 2024 with gcc 8.3.0
kamailio core generation:
Core was generated by `kamailio -e -E -DD -M 128 -m 2048'. Program terminated with signal SIGSEGV, Segmentation fault. #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) {
bt:
(gdb) bt #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 #9 0x00005745eb3a85bd in main_loop () at main.c:1765 #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942
bt full:
(gdb) bt full #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 res = 0x7ca4f636a4a8 row = 0x7ca4f642a7f8 i = 0 j = 110 ret = 56 tmp_carrier_data = 0x7ca479ff5068 query_str = {s = 0x7ca474cdd800 <query> "SELECT DISTINCT domain FROM carrierroute WHERE carrier=8", len = 56} tmp_scan_prefix = {s = 0x5745ed889f68 "13235791374", len = 11} tmp_rewrite_host = {s = 0x5745ed889f7a "sip.telnyx.com;transport=TLS", len = 28} tmp_rewrite_prefix = {s = 0x5745ed889f99 "", len = 0} tmp_rewrite_suffix = {s = 0x5745ed889f9a "", len = 0} tmp_host_name = {s = 0x40 <error: Cannot access memory at address 0x40>, len = 1965559808} tmp_reply_code = {s = 0x7ca474ccf2b0 <__func__.5843> "reload_route_data", len = 1959587872} tmp_comment = {s = 0x5745ed889f9b "IMPORTED - WTJHSX", len = 18} p_tmp_comment = 0x7ffd774f30b0 __func__ = "load_route_data_db" n = 0 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 old_data = 0x5745ed850150 new_data = 0x7ca482a48840 i = 22341 __func__ = "reload_route_data" #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 __func__ = "cr_rpc_reload_routes" #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 rpce = 0x7ca4f6425fb8 ctx = 0x7ca4f5a329c0 <_jsonrpc_ctx_global> ret = -1 nj = 0x0 val = {s = 0x5745ed845010 "cr.reload_routes", len = 16} scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec_ex" #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec" #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 41744, sa_data = "6\366\244|\000\000\035u\271t\244|\000"}, sin = {sin_family = 41744, sin_port = 63030, sin_addr = {s_addr = 31908}, sin_zero = "\035u\271t\244|\000"}, sin6 = {sin6_family = 41744, sin6_port = 63030, sin6_flowinfo = 31908, sin6_addr = {__in6_u = {__u6_addr8 = "\035u\271t\244|\000\000\005u\271t\244|\000", __u6_addr16 = {29981, 29881, 31908, 0, 29957, 29881, 31908, 0}, __u6_addr32 = {1958311197, 31908, 1958311173, 31908}}}, sin6_scope_id = 2001680800}, sas = {ss_family = 41744, __ss_padding = "6\366\244|\000\000\035u\271t\244|\000\000\005u\271t\244|\000\000\240\071Ow\375\177\000\000/.:\365\244|\000\000\320:Ow\375\177\000\000\327\337j\353EW\000\000\320\071Ow\375\177\000\000\020@ \016\366\244|\000\000\030\245\066\366\244|\000\000\020@\016\366\244|\000\000\020:Ow\375\177\000\000\356u\236\365\244|\000\000\030\245\066\366\244|\000\000\000\000\000\000\000\000\000", __ss_align = 134217728}}, id = 130848392, send_flags = {f = 0, blst_imask = 0}, proto = 56 '8', proto_pad0 = 5 '\005', proto_pad1 = 36} tmp = 0x7ca4f641a9f8 "\344\032" new_uri = 0xed3 <error: Cannot access memory at address 0xed3> end = 0x7ca474b9751b "\r\n" crt = 0x2 <error: Cannot access memory at address 0x2> cmd = 0x7ca4f617b7d8 len = 0 user = 15 uri = {user = {s = 0x9774f3800 <error: Cannot access memory at address 0x9774f3800>, len = 621}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1721781302}, host = {s = 0x0, len = -2147483648}, port = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, params = {s = 0x7ffd774f38e0 "09Ow\375\177", len = -167557169}, sip_params = { s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, headers = {s = 0x1700000000 <error: Cannot access memory at address 0x1700000000>, len = 2001681040}, port_no = 14800, proto = 30543, type = 32765, flags = (unknown: 4130775280), transport = {s = 0x0, len = 2009201968}, ttl = {s = 0x6774f3a50 <error: Cannot access memory at address 0x6774f3a50>, len = -181058744}, user_param = { s = 0x17200000000 <error: Cannot access memory at address 0x17200000000>, len = 2099608304}, maddr = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -344235896}, method = {s = 0x0, len = -2147483648}, lr = { --Type <RET> for more, q to quit, c to continue without paging-- s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, r2 = {s = 0x7ffd774f38d0 "`9Ow\375\177", len = -166931844}, gr = {s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, transport_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -181636538}, ttl_val = {s = 0x7ffd774f3930 "`9Ow\375\177", len = -167555326}, user_param_val = {s = 0x0, len = 2}, maddr_val = { s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, method_val = {s = 0x177d6038c8 <error: Cannot access memory at address 0x177d6038c8>, len = 2001681040}, lr_val = {s = 0xe00000000 <error: Cannot access memory at address 0xe00000000>, len = 1958311183}, r2_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -164191464}, gr_val = { s = 0x7ffd774f39f0 "\373\377\377\377", len = -344973614}} next_hop = {user = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, passwd = {s = 0x7ffd774f3720 "\020\070Ow\375\177", len = -166975523}, host = { s = 0x7ffd774f3740 "\020\070Ow\375\177", len = -166887566}, port = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, params = {s = 0x7ffd774f3d50 "", len = -164192016}, sip_params = {s = 0x0, len = -30810208}, headers = {s = 0x0, len = -181051830}, port_no = 8055, proto = 62988, type = 31908, flags = (unknown: 4128077712), transport = { s = 0x4774f37d0 <error: Cannot access memory at address 0x4774f37d0>, len = 2001680544}, ttl = {s = 0x669fa379 <error: Cannot access memory at address 0x669fa379>, len = -164192016}, user_param = { s = 0x5745ed7743b0 "'sip:+13194676789@us.test.com',NULL,0)", len = 1721781302}, maddr = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -167513741}, method = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, lr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -167567737}, r2 = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, gr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -166977673}, transport_val = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, ttl_val = {s = 0x7ffd774f3a90 "\330\267\027\366\244|", len = 23}, user_param_val = { s = 0x5745ed77417a "3071,3795,'6e1a9c34-cec5-4ebb-bcd9-3356d80bcf9e',' sip:+13194004696@sip.telnyx.com','c5SS3F27B8rDN',' sip:+13194676789@us.test.com','f9b9b2c48ef41ef90eb05056b0a794','tls: 10.16.0.74:520"..., len = -164192016}, maddr_val = {s = 0x7ca4f60dcf18 "`", len = -31060352}, method_val = {s = 0x0, len = -180627954}, lr_val = {s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7ca4f5817bc8 port = 0 dst_host = 0x7ca474b9751d i = -344941541 flags = 0 avp = 0x7ffd774f3c40 st = {flags = 3984015424, id = 22341, name = {n = -310010607, s = {s = 0x5745ed859d11 "", len = 2001679968}, re = 0x5745ed859d11}, avp = 0x66a04c36} sct = 0x60f60e6120 sjt = 0x5f60e6a50 rve = 0x8000000 mct = 0x0 rv = 0xffffffff rv1 = 0x5745eb7fc993 c1 = {cache_type = 10, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 2001679912, flags = 32765}}, i2s = "`6Ow\375\177\000\000\031\241\a\366\244|\000\000\250\003\000\000\000"} s = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -164179120} srevp = {0x3, 0x64870454268b4200} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 t = 0x7ca4f61f1a50 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 60, tz_dsttime = 0} tdiff = 4131498432 __func__ = "run_actions" #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 msg = 0x7ca4f641a9f8 a = 0x7ca47b2f7868 ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {95957815091336, 8333654393230933038, 0, 2147483648, 134217728, 95957815380371, 8333654393012829230, 2510245087605373998}, __mask_was_saved = 0, __saved_mask = {__val = {137047930071236, 0, 25985340079663656, 140726605135616, 137045787154760, 70721158768, 137045787160648, 140726605135472, 137045776334895, 1095350878208, 137045782276504, 140735195070144, 140726605135504, 137045776144708, 0, 140726605135552}}}}} keng = 0x0 evname = {s = 0x7ca474b9715a "timer", len = 5} __func__ = "timer_handler" --Type <RET> for more, q to quit, c to continue without paging-- #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 n = 12 ret = 4294967295 tl = 0x7ca47b2f7950 i = 1010 __func__ = "slow_timer_main" #9 0x00005745eb3a85bd in main_loop () at main.c:1765 i = 16 pid = 0 si = 0x0 si_desc = "udp receiver child=15 sock=10.16.0.74:5101 ( 35.202.133.184:5101)\000AOw\375\177\000\000d\366\023\376\244|\000\000 \000\000\000\060\000\000\000@AOw\375\177\000\000\200@Ow \375\177\000\000\000B\213&T\004\207d\223\311\177\353EW\000\000\240\274\065\366\244|\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942 cfg_stream = 0x5745ed74d2a0 c = -1 r = 0 tmp = 0x7ffd774f5d9f "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x5745eb7b8d78 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1555962608 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x7ffd77580248 p = 0x7ca4fe189995 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} tbuf = "\b\000\000\000\000\000\000\000\210FOw\375\177\000\000\320FOw\375\177\000\000\330+,\376\244|\000\000\000\000\000\000\000\000\000\000\020\vH\376\244|\000\000\001", '\000' <repeats 19 times>, " \000\000\000(&G\376\244|\000\000\320EOw\375\177\000\000\312tH\376\244|\000\000\000\000\000\000\000\000\000\000@e*\376\244|\000\000\320\263+\376\244|\000\000\364EOw\375\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 186 times>... option_index = 0 long_options = {{name = 0x5745eb7baf46 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5745eb7b6524 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x5745eb7baf4b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x5745eb7baf51 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x5745eb7baf57 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x5745eb7baf60 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x5745eb7baf6a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5745eb7baf74 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5745eb7baf7f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5745eb7baf88 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5745eb7baf93 "debug", has_arg = 1, flag = 0x0, val = 1032}, { name = 0x5745eb7baf99 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main"
(gdb) list 411 } 412 } while(RES_ROW_N(res) > 0); 413 414 for (i = 0; i < rd->carrier_num; ++i) { 415 for (j = 0; j < rd->carriers[i]->domain_num; ++j) { 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) { 417 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d (%.*s) have probability 0.\n", 418 rd->carriers[i]->id, rd->carriers[i]->name->len, rd->carriers[i]->name->s, 419 rd->carriers[i]->domains[j]->id, rd->carriers[i]->domains[j]->name->len, rd->carriers[i]->domains[j]->name->s); 420 }
Please help to understand the reason for the crash and how to fix the problem.
Thank you in advance.
Regards
*Maharaja Azhagiah*
Hello,
my suggestion would be to do an update to e.g. 5.8.2, as the version 5.4.9 is long end of life. It crashed during a routing reload for carrierroute module. If you are still seeing crashes after the update, please let us know.
Cheers,
Henning
-- Henning Westerholt – https://skalatan.de/blog/ Kamailio services – https://gilawa.comhttps://gilawa.com/
From: Maharaja Azhagiah via sr-users sr-users@lists.kamailio.org Sent: Dienstag, 23. Juli 2024 21:50 To: Kamailio (SER) - Users Mailing List sr-users@lists.kamailio.org Cc: Maharaja Azhagiah er.maharaja@gmail.com Subject: [SR-Users] kamailio randomly crashes
Hi all,
I have kamailio running in GKE (Google Kubernetes) and recently seeing kamailio crashes frequently and I couldn't find the reason for the crash
kamailio version
version: kamailio 5.4.9 (x86_64/linux) 7d022d flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 7d022d compiled on 14:26:30 Jul 10 2024 with gcc 8.3.0
kamailio core generation:
Core was generated by `kamailio -e -E -DD -M 128 -m 2048'. Program terminated with signal SIGSEGV, Segmentation fault. #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) {
bt:
(gdb) bt #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 #9 0x00005745eb3a85bd in main_loop () at main.c:1765 #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942
bt full:
(gdb) bt full #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 res = 0x7ca4f636a4a8 row = 0x7ca4f642a7f8 i = 0 j = 110 ret = 56 tmp_carrier_data = 0x7ca479ff5068 query_str = {s = 0x7ca474cdd800 <query> "SELECT DISTINCT domain FROM carrierroute WHERE carrier=8", len = 56} tmp_scan_prefix = {s = 0x5745ed889f68 "13235791374", len = 11} tmp_rewrite_host = {s = 0x5745ed889f7a "sip.telnyx.comhttp://sip.telnyx.com/;transport=TLS", len = 28} tmp_rewrite_prefix = {s = 0x5745ed889f99 "", len = 0} tmp_rewrite_suffix = {s = 0x5745ed889f9a "", len = 0} tmp_host_name = {s = 0x40 <error: Cannot access memory at address 0x40>, len = 1965559808} tmp_reply_code = {s = 0x7ca474ccf2b0 <__func__.5843> "reload_route_data", len = 1959587872} tmp_comment = {s = 0x5745ed889f9b "IMPORTED - WTJHSX", len = 18} p_tmp_comment = 0x7ffd774f30b0 __func__ = "load_route_data_db" n = 0 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 old_data = 0x5745ed850150 new_data = 0x7ca482a48840 i = 22341 __func__ = "reload_route_data" #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 __func__ = "cr_rpc_reload_routes" #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 rpce = 0x7ca4f6425fb8 ctx = 0x7ca4f5a329c0 <_jsonrpc_ctx_global> ret = -1 nj = 0x0 val = {s = 0x5745ed845010 "cr.reload_routes", len = 16} scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec_ex" #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec" #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 41744, sa_data = "6\366\244|\000\000\035u\271t\244|\000"}, sin = {sin_family = 41744, sin_port = 63030, sin_addr = {s_addr = 31908}, sin_zero = "\035u\271t\244|\000"}, sin6 = {sin6_family = 41744, sin6_port = 63030, sin6_flowinfo = 31908, sin6_addr = {__in6_u = {__u6_addr8 = "\035u\271t\244|\000\000\005u\271t\244|\000", __u6_addr16 = {29981, 29881, 31908, 0, 29957, 29881, 31908, 0}, __u6_addr32 = {1958311197, 31908, 1958311173, 31908}}}, sin6_scope_id = 2001680800}, sas = {ss_family = 41744, __ss_padding = "6\366\244|\000\000\035u\271t\244|\000\000\005u\271t\244|\000\000\240\071Ow\375\177\000\000/.:\365\244|\000\000\320:Ow\375\177\000\000\327\337j\353EW\000\000\320\071Ow\375\177\000\000\020@\016\366\244|\000\000\030\245\066\366\244|\000\000\020@\016\366\244|\000\000\020:Ow\375\177\000\000\356u\236\365\244|\000\000\030\245\066\366\244|\000\000\000\000\000\000\000\000\000", __ss_align = 134217728}}, id = 130848392, send_flags = {f = 0, blst_imask = 0}, proto = 56 '8', proto_pad0 = 5 '\005', proto_pad1 = 36} tmp = 0x7ca4f641a9f8 "\344\032" new_uri = 0xed3 <error: Cannot access memory at address 0xed3> end = 0x7ca474b9751b "\r\n" crt = 0x2 <error: Cannot access memory at address 0x2> cmd = 0x7ca4f617b7d8 len = 0 user = 15 uri = {user = {s = 0x9774f3800 <error: Cannot access memory at address 0x9774f3800>, len = 621}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1721781302}, host = {s = 0x0, len = -2147483648}, port = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, params = {s = 0x7ffd774f38e0 "09Ow\375\177", len = -167557169}, sip_params = { s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, headers = {s = 0x1700000000 <error: Cannot access memory at address 0x1700000000>, len = 2001681040}, port_no = 14800, proto = 30543, type = 32765, flags = (unknown: 4130775280), transport = {s = 0x0, len = 2009201968}, ttl = {s = 0x6774f3a50 <error: Cannot access memory at address 0x6774f3a50>, len = -181058744}, user_param = { s = 0x17200000000 <error: Cannot access memory at address 0x17200000000>, len = 2099608304}, maddr = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -344235896}, method = {s = 0x0, len = -2147483648}, lr = { --Type <RET> for more, q to quit, c to continue without paging-- s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, r2 = {s = 0x7ffd774f38d0 "`9Ow\375\177", len = -166931844}, gr = {s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, transport_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -181636538}, ttl_val = {s = 0x7ffd774f3930 "`9Ow\375\177", len = -167555326}, user_param_val = {s = 0x0, len = 2}, maddr_val = { s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, method_val = {s = 0x177d6038c8 <error: Cannot access memory at address 0x177d6038c8>, len = 2001681040}, lr_val = {s = 0xe00000000 <error: Cannot access memory at address 0xe00000000>, len = 1958311183}, r2_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -164191464}, gr_val = { s = 0x7ffd774f39f0 "\373\377\377\377", len = -344973614}} next_hop = {user = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, passwd = {s = 0x7ffd774f3720 "\020\070Ow\375\177", len = -166975523}, host = { s = 0x7ffd774f3740 "\020\070Ow\375\177", len = -166887566}, port = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, params = {s = 0x7ffd774f3d50 "", len = -164192016}, sip_params = {s = 0x0, len = -30810208}, headers = {s = 0x0, len = -181051830}, port_no = 8055, proto = 62988, type = 31908, flags = (unknown: 4128077712), transport = { s = 0x4774f37d0 <error: Cannot access memory at address 0x4774f37d0>, len = 2001680544}, ttl = {s = 0x669fa379 <error: Cannot access memory at address 0x669fa379>, len = -164192016}, user_param = { s = 0x5745ed7743b0 "'sip:+13194676789@us.test.commailto:sip%3A%2B13194676789@us.test.com',NULL,0)", len = 1721781302}, maddr = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -167513741}, method = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, lr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -167567737}, r2 = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, gr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -166977673}, transport_val = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, ttl_val = {s = 0x7ffd774f3a90 "\330\267\027\366\244|", len = 23}, user_param_val = { s = 0x5745ed77417a "3071,3795,'6e1a9c34-cec5-4ebb-bcd9-3356d80bcf9e','sip:+13194004696@sip.telnyx.commailto:sip%3A%2B13194004696@sip.telnyx.com','c5SS3F27B8rDN','sip:+13194676789@us.test.commailto:sip%3A%2B13194676789@us.test.com','f9b9b2c48ef41ef90eb05056b0a794','tls:10.16.0.74:520http://10.16.0.74:520/"..., len = -164192016}, maddr_val = {s = 0x7ca4f60dcf18 "`", len = -31060352}, method_val = {s = 0x0, len = -180627954}, lr_val = {s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7ca4f5817bc8 port = 0 dst_host = 0x7ca474b9751d i = -344941541 flags = 0 avp = 0x7ffd774f3c40 st = {flags = 3984015424, id = 22341, name = {n = -310010607, s = {s = 0x5745ed859d11 "", len = 2001679968}, re = 0x5745ed859d11}, avp = 0x66a04c36} sct = 0x60f60e6120 sjt = 0x5f60e6a50 rve = 0x8000000 mct = 0x0 rv = 0xffffffff rv1 = 0x5745eb7fc993 c1 = {cache_type = 10, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 2001679912, flags = 32765}}, i2s = "`6Ow\375\177\000\000\031\241\a\366\244|\000\000\250\003\000\000\000"} s = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -164179120} srevp = {0x3, 0x64870454268b4200} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 t = 0x7ca4f61f1a50 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 60, tz_dsttime = 0} tdiff = 4131498432 __func__ = "run_actions" #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 msg = 0x7ca4f641a9f8 a = 0x7ca47b2f7868 ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {95957815091336, 8333654393230933038, 0, 2147483648, 134217728, 95957815380371, 8333654393012829230, 2510245087605373998}, __mask_was_saved = 0, __saved_mask = {__val = {137047930071236, 0, 25985340079663656, 140726605135616, 137045787154760, 70721158768, 137045787160648, 140726605135472, 137045776334895, 1095350878208, 137045782276504, 140735195070144, 140726605135504, 137045776144708, 0, 140726605135552}}}}} keng = 0x0 evname = {s = 0x7ca474b9715a "timer", len = 5} __func__ = "timer_handler" --Type <RET> for more, q to quit, c to continue without paging-- #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 n = 12 ret = 4294967295 tl = 0x7ca47b2f7950 i = 1010 __func__ = "slow_timer_main" #9 0x00005745eb3a85bd in main_loop () at main.c:1765 i = 16 pid = 0 si = 0x0 si_desc = "udp receiver child=15 sock=10.16.0.74:5101http://10.16.0.74:5101/ (35.202.133.184:5101http://35.202.133.184:5101/)\000AOw\375\177\000\000d\366\023\376\244|\000\000 \000\000\000\060\000\000\000@AOw\375\177\000\000\200@Ow\375\177\000\000\000B\213&T\004\207d\223\311\177\353EW\000\000\240\274\065\366\244|\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942 cfg_stream = 0x5745ed74d2a0 c = -1 r = 0 tmp = 0x7ffd774f5d9f "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x5745eb7b8d78 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1555962608 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x7ffd77580248 p = 0x7ca4fe189995 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} tbuf = "\b\000\000\000\000\000\000\000\210FOw\375\177\000\000\320FOw\375\177\000\000\330+,\376\244|\000\000\000\000\000\000\000\000\000\000\020\vH\376\244|\000\000\001", '\000' <repeats 19 times>, " \000\000\000(&G\376\244|\000\000\320EOw\375\177\000\000\312tH\376\244|\000\000\000\000\000\000\000\000\000\000@e*\376\244|\000\000\320\263+\376\244|\000\000\364EOw\375\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 186 times>... option_index = 0 long_options = {{name = 0x5745eb7baf46 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5745eb7b6524 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x5745eb7baf4b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x5745eb7baf51 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x5745eb7baf57 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x5745eb7baf60 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x5745eb7baf6a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5745eb7baf74 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5745eb7baf7f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5745eb7baf88 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5745eb7baf93 "debug", has_arg = 1, flag = 0x0, val = 1032}, { name = 0x5745eb7baf99 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main"
(gdb) list 411 } 412 } while(RES_ROW_N(res) > 0); 413 414 for (i = 0; i < rd->carrier_num; ++i) { 415 for (j = 0; j < rd->carriers[i]->domain_num; ++j) { 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) { 417 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d (%.*s) have probability 0.\n", 418 rd->carriers[i]->id, rd->carriers[i]->name->len, rd->carriers[i]->name->s, 419 rd->carriers[i]->domains[j]->id, rd->carriers[i]->domains[j]->name->len, rd->carriers[i]->domains[j]->name->s); 420 }
Please help to understand the reason for the crash and how to fix the problem.
Thank you in advance.
Regards
Maharaja Azhagiah
Hi Henning, Hello all
I have updated kamailio to 5.8.2 and I still see the crash during reload of carrierroute module.
kamailio version:
version: kamailio 5.8.2 (x86_64/linux) 164d1e flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, MEM_JOIN_FREE, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_SEND_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 164d1e compiled on 17:00:04 Aug 8 2024 with gcc 8.3.0
core dump backtrace:
Program terminated with signal SIGSEGV, Segmentation fault. #0 load_route_data_db (rd=0x789fcce42c20) at cr_db.c:432 432 if(rd->carriers[i]->domains[j]->sum_prob == 0.0) { (gdb) bt full #0 load_route_data_db (rd=0x789fcce42c20) at cr_db.c:432 res = 0x78a049e3e4a0 row = 0x78a049e43070 i = 0 j = 109 ret = 59 tmp_carrier_data = 0x789fd380f9a0 query_str = {s = 0x789fc84fda40 <query> "SELECT DISTINCT domain FROM carrierroute WHERE carrier=1000", len = 59} tmp_scan_prefix = {s = 0x5ba512e96630 "12345", len = 5} tmp_rewrite_host = {s = 0x5ba512e9663c "127.0.0.100:9000;transport=udp", len = 30} tmp_rewrite_prefix = {s = 0x5ba512e9665d "444", len = 3} tmp_rewrite_suffix = {s = 0x5ba512e96661 "555", len = 3} tmp_host_name = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -928288768} tmp_reply_code = {s = 0x789fc84ee1c0 <__func__.5976> "reload_route_data", len = -934355152} tmp_comment = {s = 0x5ba512e96665 "IMPORTED - kanchan_route_rule", len = 30} p_tmp_comment = 0x7fff3d14f8b0 __func__ = "load_route_data_db" n = 0 #1 0x0000789fc84aaccd in reload_route_data () at cr_data.c:187 old_data = 0x5ba512e4d010 new_data = 0x789fcce42c20 i = 23461 __func__ = "reload_route_data" #2 0x0000789fc84ca080 in cr_rpc_reload_routes (rpc=0x78a049326c80 <func_param>, c=0x78a049326ba0 <_jsonrpc_ctx_global>) at cr_rpc.c:64 __func__ = "cr_rpc_reload_routes" #3 0x000078a049306e08 in jsonrpc_exec_ex (cmd=0x7fff3d14fce0, rpath=0x0, spath=0x0) at jsonrpcs_mod.c:1588 rpce = 0x78a049e3d6f0 ctx = 0x78a049326ba0 <_jsonrpc_ctx_global> ret = -1 nj = 0x0 val = {s = 0x5ba512cfcc10 "cr.reload_routes", len = 16} scmd = {s = 0x78a049bb09e0 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} rdata = 0 mode = 1234975676 __func__ = "jsonrpc_exec_ex" #4 0x000078a049307244 in jsonrpc_exec (msg=0x78a049e2d200, cmd=0x78a049be54f0 "\340\t\273I\240x", s2=0x0) at jsonrpcs_mod.c:1609 scmd = {s = 0x78a049bb09e0 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec" #5 0x00005ba511455344 in do_action (h=0x7fff3d150610, a=0x78a049be52a0, msg=0x78a049e2d200) at core/action.c:1127 ret = -5 li = 5010672 v = 4526144 dst = {send_sock = 0x20, to = {s = {sa_family = 28672, sa_data = "\253\310\237x\000\000Vw#I\240x\000"}, sin = {sin_family = 28672, sin_port = 51371, sin_addr = {s_addr = 30879}, sin_zero = "Vw#I\240x\000"}, sin6 = {sin6_family = 28672, sin6_port = 51371, sin6_flowinfo = 30879, sin6_addr = {__in6_u = {__u6_addr8 = "Vw#I\240x\000\000\000\001\000\000\000\000\000", __u6_addr16 = {30550, 18723, 30880, 0, 256, 0, 0, 0}, __u6_addr32 = {1227061078, 30880, 256, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 28672, __ss_padding = "\253\310\237x\000\000Vw#I\240x\000\000\000\001", '\000' <repeats 22 times>, "\002\000\000\000D\000\000\000eWr\021\245[\000\000\020\002\025=\377\177\000\000\020\220\235I\240x\000\000\020\345\343I\240x\000\000\020\220\235I\240x\000\000P\002\025=\377\177\000\000`\357+I\240x\000\000\020\345\343I\240x\000\000\000\000\000\000\000\000\000", __ss_align = 134217728}}, id = 129691584, send_flags = {f = 0, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -14 '\362', proto_pad1 = 51} tmp = 0x7fff3d150400 "\220\005\025=\377\177" new_uri = 0x0 end = 0x789fc8ab7000 "" crt = 0x78a00000000f "" cmd = 0x78a049b686f8 len = 30880 user = 1225632696 uri = {user = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 294227363}, passwd = {s = 0x7fff3d150070 "", len = 292717502}, host = {s = 0x78a04925aa30 "tm", len = 292815521}, port = {s = 0x7fff3d150080 "\240\344\343I\b", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x789fd380fa70 "\300\300\300\300", len = 0}, headers = {s = 0x0, len = 0}, port_no = 58528, proto = 18915, type = 8, flags = (unknown: 3548445248), transport = {s = 0x0, len = 0}, ttl = { s = 0x789fd380fa70 "\300\300\300\300", len = -746522648}, user_param = {s = 0x7fff3d1502a0 "\353[\214\021\245[", len = 289836420}, maddr = {s = 0x16e00000000 <error: Cannot access memory at address 0x16e00000000>, len = -746514208}, method = { s = 0x789fd380fa70 "\300\300\300\300", len = -746513728}, lr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 293855368}, r2 = {s = 0x0, len = -2147483648}, gr = {s = 0x408000000 <error: Cannot access memory at address 0x408000000>, len = 294409814}, transport_val = {s = 0x7fff3d150140 "\360\001\025=\377\177", len = 290331077}, ttl_val = {s = 0x7fff3d150200 "\020\345\343I\240x", len = 293063450}, user_param_val = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 293855368}, maddr_val = {s = 0x7fff3d1501f0 "P\002\025=\377\177", len = 290351217}, method_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1238894608}, lr_val = {s = 0x789fc839852d "", len = -935754475}, r2_val = { s = 0x7fff3d1503e0 "", len = 1024787904}, gr_val = {s = 0x78a049237748 <__func__.10408> "str_duplicate", len = 1227061078}} next_hop = {user = {s = 0x78a049e3e7f0 "P", len = 1239671616}, passwd = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 293855368}, host = {s = 0x0, len = 1235062800}, port = {s = 0x320 <error: Cannot access memory at address 0x320>, len = 1239671904}, params = {s = 0x7fff3d14ff00 "\360\001\025=\377\177", len = 293855368}, sip_params = {s = 0x0, len = -2147483648}, headers = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 294227363}, port_no = 496, proto = 15637, type = 32767, flags = (unknown: 1226855508), transport = {s = 0x4d38129f0 <error: Cannot access memory at address 0x4d38129f0>, len = 294334100}, ttl = {s = 0x7fff3d150020 "p", len = 0}, user_param = {s = 0x789fd38118e0 "\vPH\310\237x", len = -746522000}, maddr = {s = 0x78a049e3e980 "\020", len = 1235062800}, method = {s = 0x78a04925aa30 "tm", len = 1227616096}, lr = {s = 0x78a04925ab48 <__func__.11229> "insert_tmcb", len = 1227205171}, r2 = { s = 0x30 <error: Cannot access memory at address 0x30>, len = -928288768}, gr = {s = 0x33e9d0 <error: Cannot access memory at address 0x33e9d0>, len = 4523904}, transport_val = {s = 0x4c74f0 <error: Cannot access memory at address 0x4c74f0>, len = 16}, ttl_val = {s = 0x21 <error: Cannot access memory at address 0x21>, len = 1235062800}, user_param_val = {s = 0x7fff3d14ffe0 " ", len = 290364176}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1}, method_val = { s = 0x6a499dba50 <error: Cannot access memory at address 0x6a499dba50>, len = -746509952}, lr_val = {s = 0x13d150020 <error: Cannot access memory at address 0x13d150020>, len = -928020096}, r2_val = {s = 0x7fff3d150020 "p", len = 292648555}, gr_val = { --Type <RET> for more, q to quit, c to continue without paging--c s = 0x0, len = -928020096}} u = 0xc8af8980 port = 0 dst_host = 0x78a049e2d200 i = 0 flags = 0 avp = 0x5ba5117835c4 <parse_headers+2253> st = {flags = 1, id = 0, name = {n = -3961760297202483200, s = {s = 0xc905000000000000 <error: Cannot access memory at address 0xc905000000000000>, len = 1024786096}, re = 0xc905000000000000}, avp = 0x7fff3d1500b0} sct = 0x499da950 sjt = 0x32499da3d0 rve = 0x5ba511898da3 mct = 0x5499da950 rv = 0x0 rv1 = 0x7fff3d150490 c1 = {cache_type = 1227194491, val_type = 30880, c = {avp_val = {n = 1447403978752, s = {s = 0x15100000000 <error: Cannot access memory at address 0x15100000000>, len = 1227194784}, re = 0x15100000000}, pval = {rs = {s = 0x15100000000 <error: Cannot access memory at address 0x15100000000>, len = 1227194784}, ri = 132629817295280, flags = 1239671968}}, i2s = "\020\220\235I\240x", '\000' <repeats 15 times>} s = {s = 0x0, len = 0} srevp = {0x7fff3d14ff00, 0x5ba51171d15c <qm_free+7904>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x00005ba511463ab9 in run_actions (h=0x7fff3d150610, a=0x78a049be4420, msg=0x78a049e2d200) at core/action.c:1618 t = 0x78a049be52a0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 1220678640, tz_dsttime = 30880} tdiff = 1239601600 __func__ = "run_actions" #7 0x0000789fc8393faa in timer_handler (ticks=558041136, tl=0x789fcf665990, data=0x789fcf6658a0) at timer.c:216 msg = 0x78a049e2d200 a = 0x789fcf6658a0 ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {100764521586824, 5537789872794009978, 0, 2147483648, 134217728, 100764521958819, 5537789872844341626, 319322550229959034}, __mask_was_saved = 0, __saved_mask = {__val = {100764521958819, 140734218176272, 132629810783733, 0, 149798025884812256, 6872972461760, 132627664605952, 140734218176192, 132627656018865, 1095216660481, 132627662081200, 140734218176272, 140734218176224, 132627655829876, 0, 140734218176272}}}}} keng = 0x0 evname = {s = 0x789fc839816a "timer", len = 5} __func__ = "timer_handler" #8 0x00005ba5114e8c93 in slow_timer_main () at core/timer.c:1103 n = 12 ret = 4294967295 tl = 0x789fcf665990 i = 7 __func__ = "slow_timer_main" #9 0x00005ba5113e4aff in main_loop () at main.c:1915 i = 16 pid = 0 si = 0x0 si_desc = "udp receiver child=15 sock=10.9.0.28:5101 ( 35.227.52.202:5101)\000\000\000\000\000\b\000\000\000\000\320\334\332I\240x", '\000' <repeats 13 times>, "\200\000\000\000\000\000\000\000\b\000\000\000\000\243\215\211\021\245[\000\000\340\t\025=\377\177\000\000d\026\245Q\240x\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x00005ba5113f02d3 in main (argc=8, argv=0x7fff3d150f18) at main.c:3256 cfg_stream = 0x5ba512ce2260 c = -1 r = 0 tmp = 0x7fff3d152d84 "" tmp_len = 0 port = 5060 proto = 0 aproto = 0 ahost = 0x0 aport = 0 options = 0x5ba511841378 ":f:cm:M:dVIhEeb:B:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3317072467 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x0 p = 0x78a051a9b995 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} l1 = 2048 tbuf = "`\017\025=\377\177\000\000\330K\275Q\240x\000\000\000\000\000\000\000\000\000\000\020+\331Q\240x\000\000\001", '\000' <repeats 15 times>, "\214#\241Q\240x\000\000(F\330Q\240x\000\000`\016\025=\377\177\000\000\312\224\331Q\240x\000\000\000\000\000\000\000\000\000\000@\205\273Q\240x\000\000\320\323\274Q\240x\000\000\204\016\025=\377\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>... option_index = 0 long_options = {{name = 0x5ba5118436d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5ba51183e55c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x5ba5118436db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x5ba5118436e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x5ba5118436e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x5ba5118436f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x5ba5118436fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5ba511843704 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5ba51184370f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5ba511843718 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5ba511843723 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x5ba511843729 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x5ba511843733 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x5ba51184373a "all-errors", has_arg = 0, flag = 0x0, val = 1035}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" (gdb) list 427 } 428 } while(RES_ROW_N(res) > 0); 429 430 for(i = 0; i < rd->carrier_num; ++i) { 431 for(j = 0; j < rd->carriers[i]->domain_num; ++j) { 432 if(rd->carriers[i]->domains[j]->sum_prob == 0.0) { 433 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d " 434 "(%.*s) have probability 0.\n", 435 rd->carriers[i]->id, rd->carriers[i]->name->len, 436 rd->carriers[i]->name->s, (gdb)
I couldn't understand what exactly is wrong with the carrierroute module.
Thank you for your help in advance.
Regards
*Maharaja Azhagiah*
On Wed, Jul 24, 2024 at 3:28 AM Henning Westerholt hw@gilawa.com wrote:
Hello,
my suggestion would be to do an update to e.g. 5.8.2, as the version 5.4.9 is long end of life. It crashed during a routing reload for carrierroute module.
If you are still seeing crashes after the update, please let us know.
Cheers,
Henning
--
Henning Westerholt – https://skalatan.de/blog/
Kamailio services – https://gilawa.com
*From:* Maharaja Azhagiah via sr-users sr-users@lists.kamailio.org *Sent:* Dienstag, 23. Juli 2024 21:50 *To:* Kamailio (SER) - Users Mailing List sr-users@lists.kamailio.org *Cc:* Maharaja Azhagiah er.maharaja@gmail.com *Subject:* [SR-Users] kamailio randomly crashes
Hi all,
I have kamailio running in GKE (Google Kubernetes) and recently seeing kamailio crashes frequently and I couldn't find the reason for the crash
kamailio version
version: kamailio 5.4.9 (x86_64/linux) 7d022d flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 7d022d compiled on 14:26:30 Jul 10 2024 with gcc 8.3.0
kamailio core generation:
Core was generated by `kamailio -e -E -DD -M 128 -m 2048'. Program terminated with signal SIGSEGV, Segmentation fault. #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) {
bt:
(gdb) bt #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 #9 0x00005745eb3a85bd in main_loop () at main.c:1765 #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942
bt full:
(gdb) bt full #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 res = 0x7ca4f636a4a8 row = 0x7ca4f642a7f8 i = 0 j = 110 ret = 56 tmp_carrier_data = 0x7ca479ff5068 query_str = {s = 0x7ca474cdd800 <query> "SELECT DISTINCT domain FROM carrierroute WHERE carrier=8", len = 56} tmp_scan_prefix = {s = 0x5745ed889f68 "13235791374", len = 11} tmp_rewrite_host = {s = 0x5745ed889f7a "sip.telnyx.com;transport=TLS", len = 28} tmp_rewrite_prefix = {s = 0x5745ed889f99 "", len = 0} tmp_rewrite_suffix = {s = 0x5745ed889f9a "", len = 0} tmp_host_name = {s = 0x40 <error: Cannot access memory at address 0x40>, len = 1965559808} tmp_reply_code = {s = 0x7ca474ccf2b0 <__func__.5843> "reload_route_data", len = 1959587872} tmp_comment = {s = 0x5745ed889f9b "IMPORTED - WTJHSX", len = 18} p_tmp_comment = 0x7ffd774f30b0 __func__ = "load_route_data_db" n = 0 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 old_data = 0x5745ed850150 new_data = 0x7ca482a48840 i = 22341 __func__ = "reload_route_data" #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 __func__ = "cr_rpc_reload_routes" #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 rpce = 0x7ca4f6425fb8 ctx = 0x7ca4f5a329c0 <_jsonrpc_ctx_global> ret = -1 nj = 0x0 val = {s = 0x5745ed845010 "cr.reload_routes", len = 16} scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec_ex" #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec" #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 41744, sa_data = "6\366\244|\000\000\035u\271t\244|\000"}, sin = {sin_family = 41744, sin_port = 63030, sin_addr = {s_addr = 31908}, sin_zero = "\035u\271t\244|\000"}, sin6 = {sin6_family = 41744, sin6_port = 63030, sin6_flowinfo = 31908, sin6_addr = {__in6_u = {__u6_addr8 = "\035u\271t\244|\000\000\005u\271t\244|\000", __u6_addr16 = {29981, 29881, 31908, 0, 29957, 29881, 31908, 0}, __u6_addr32 = {1958311197, 31908, 1958311173, 31908}}}, sin6_scope_id = 2001680800}, sas = {ss_family = 41744, __ss_padding = "6\366\244|\000\000\035u\271t\244|\000\000\005u\271t\244|\000\000\240\071Ow\375\177\000\000/.:\365\244|\000\000\320:Ow\375\177\000\000\327\337j\353EW\000\000\320\071Ow\375\177\000\000\020@ \016\366\244|\000\000\030\245\066\366\244|\000\000\020@\016\366\244|\000\000\020:Ow\375\177\000\000\356u\236\365\244|\000\000\030\245\066\366\244|\000\000\000\000\000\000\000\000\000", __ss_align = 134217728}}, id = 130848392, send_flags = {f = 0, blst_imask = 0}, proto = 56 '8', proto_pad0 = 5 '\005', proto_pad1 = 36} tmp = 0x7ca4f641a9f8 "\344\032" new_uri = 0xed3 <error: Cannot access memory at address 0xed3> end = 0x7ca474b9751b "\r\n" crt = 0x2 <error: Cannot access memory at address 0x2> cmd = 0x7ca4f617b7d8 len = 0 user = 15 uri = {user = {s = 0x9774f3800 <error: Cannot access memory at address 0x9774f3800>, len = 621}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1721781302}, host = {s = 0x0, len = -2147483648}, port = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, params = {s = 0x7ffd774f38e0 "09Ow\375\177", len = -167557169}, sip_params = { s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, headers = {s = 0x1700000000 <error: Cannot access memory at address 0x1700000000>, len = 2001681040}, port_no = 14800, proto = 30543, type = 32765, flags = (unknown: 4130775280), transport = {s = 0x0, len = 2009201968}, ttl = {s = 0x6774f3a50 <error: Cannot access memory at address 0x6774f3a50>, len = -181058744}, user_param = { s = 0x17200000000 <error: Cannot access memory at address 0x17200000000>, len = 2099608304}, maddr = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -344235896}, method = {s = 0x0, len = -2147483648}, lr = { --Type <RET> for more, q to quit, c to continue without paging-- s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, r2 = {s = 0x7ffd774f38d0 "`9Ow\375\177", len = -166931844}, gr = {s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, transport_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -181636538}, ttl_val = {s = 0x7ffd774f3930 "`9Ow\375\177", len = -167555326}, user_param_val = {s = 0x0, len = 2}, maddr_val = { s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, method_val = {s = 0x177d6038c8 <error: Cannot access memory at address 0x177d6038c8>, len = 2001681040}, lr_val = {s = 0xe00000000 <error: Cannot access memory at address 0xe00000000>, len = 1958311183}, r2_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -164191464}, gr_val = { s = 0x7ffd774f39f0 "\373\377\377\377", len = -344973614}} next_hop = {user = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, passwd = {s = 0x7ffd774f3720 "\020\070Ow\375\177", len = -166975523}, host = { s = 0x7ffd774f3740 "\020\070Ow\375\177", len = -166887566}, port = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, params = {s = 0x7ffd774f3d50 "", len = -164192016}, sip_params = {s = 0x0, len = -30810208}, headers = {s = 0x0, len = -181051830}, port_no = 8055, proto = 62988, type = 31908, flags = (unknown: 4128077712), transport = { s = 0x4774f37d0 <error: Cannot access memory at address 0x4774f37d0>, len = 2001680544}, ttl = {s = 0x669fa379 <error: Cannot access memory at address 0x669fa379>, len = -164192016}, user_param = { s = 0x5745ed7743b0 "'sip:+13194676789@us.test.com',NULL,0)", len = 1721781302}, maddr = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -167513741}, method = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, lr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -167567737}, r2 = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, gr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -166977673}, transport_val = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, ttl_val = {s = 0x7ffd774f3a90 "\330\267\027\366\244|", len = 23}, user_param_val = { s = 0x5745ed77417a "3071,3795,'6e1a9c34-cec5-4ebb-bcd9-3356d80bcf9e',' sip:+13194004696@sip.telnyx.com','c5SS3F27B8rDN',' sip:+13194676789@us.test.com','f9b9b2c48ef41ef90eb05056b0a794','tls: 10.16.0.74:520"..., len = -164192016}, maddr_val = {s = 0x7ca4f60dcf18 "`", len = -31060352}, method_val = {s = 0x0, len = -180627954}, lr_val = {s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7ca4f5817bc8 port = 0 dst_host = 0x7ca474b9751d i = -344941541 flags = 0 avp = 0x7ffd774f3c40 st = {flags = 3984015424, id = 22341, name = {n = -310010607, s = {s = 0x5745ed859d11 "", len = 2001679968}, re = 0x5745ed859d11}, avp = 0x66a04c36} sct = 0x60f60e6120 sjt = 0x5f60e6a50 rve = 0x8000000 mct = 0x0 rv = 0xffffffff rv1 = 0x5745eb7fc993 c1 = {cache_type = 10, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 2001679912, flags = 32765}}, i2s = "`6Ow\375\177\000\000\031\241\a\366\244|\000\000\250\003\000\000\000"} s = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -164179120} srevp = {0x3, 0x64870454268b4200} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 t = 0x7ca4f61f1a50 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 60, tz_dsttime = 0} tdiff = 4131498432 __func__ = "run_actions" #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 msg = 0x7ca4f641a9f8 a = 0x7ca47b2f7868 ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {95957815091336, 8333654393230933038, 0, 2147483648, 134217728, 95957815380371, 8333654393012829230, 2510245087605373998}, __mask_was_saved = 0, __saved_mask = {__val = {137047930071236, 0, 25985340079663656, 140726605135616, 137045787154760, 70721158768, 137045787160648, 140726605135472, 137045776334895, 1095350878208, 137045782276504, 140735195070144, 140726605135504, 137045776144708, 0, 140726605135552}}}}} keng = 0x0 evname = {s = 0x7ca474b9715a "timer", len = 5} __func__ = "timer_handler" --Type <RET> for more, q to quit, c to continue without paging-- #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 n = 12 ret = 4294967295 tl = 0x7ca47b2f7950 i = 1010 __func__ = "slow_timer_main" #9 0x00005745eb3a85bd in main_loop () at main.c:1765 i = 16 pid = 0 si = 0x0 si_desc = "udp receiver child=15 sock=10.16.0.74:5101 ( 35.202.133.184:5101)\000AOw\375\177\000\000d\366\023\376\244|\000\000 \000\000\000\060\000\000\000@AOw\375\177\000\000\200@Ow \375\177\000\000\000B\213&T\004\207d\223\311\177\353EW\000\000\240\274\065\366\244|\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942 cfg_stream = 0x5745ed74d2a0 c = -1 r = 0 tmp = 0x7ffd774f5d9f "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x5745eb7b8d78 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1555962608 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x7ffd77580248 p = 0x7ca4fe189995 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} tbuf = "\b\000\000\000\000\000\000\000\210FOw\375\177\000\000\320FOw\375\177\000\000\330+,\376\244|\000\000\000\000\000\000\000\000\000\000\020\vH\376\244|\000\000\001", '\000' <repeats 19 times>, " \000\000\000(&G\376\244|\000\000\320EOw\375\177\000\000\312tH\376\244|\000\000\000\000\000\000\000\000\000\000@e*\376\244|\000\000\320\263+\376\244|\000\000\364EOw\375\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 186 times>... option_index = 0 long_options = {{name = 0x5745eb7baf46 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5745eb7b6524 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x5745eb7baf4b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x5745eb7baf51 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x5745eb7baf57 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x5745eb7baf60 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x5745eb7baf6a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5745eb7baf74 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5745eb7baf7f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5745eb7baf88 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5745eb7baf93 "debug", has_arg = 1, flag = 0x0, val = 1032}, { name = 0x5745eb7baf99 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main"
(gdb) list 411 } 412 } while(RES_ROW_N(res) > 0); 413 414 for (i = 0; i < rd->carrier_num; ++i) { 415 for (j = 0; j < rd->carriers[i]->domain_num; ++j) { 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) { 417 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d (%.*s) have probability 0.\n", 418 rd->carriers[i]->id, rd->carriers[i]->name->len, rd->carriers[i]->name->s, 419 rd->carriers[i]->domains[j]->id, rd->carriers[i]->domains[j]->name->len, rd->carriers[i]->domains[j]->name->s); 420 }
Please help to understand the reason for the crash and how to fix the problem.
Thank you in advance.
Regards
*Maharaja Azhagiah*
Hi! just a long shot, but I see a lot of these errors in the dump you shared: error: Cannot access memory at address
wondering if the fact you're using Kamailio and Kubernetes is related to the issue.... Did you try Kamailio running as a standard linux service, without kubernetes?
Sérgio
On Wed, Aug 14, 2024 at 4:23 AM Maharaja Azhagiah via sr-users < sr-users@lists.kamailio.org> wrote:
Hi all
Could you please help with this core dump? Kamailio crashes frequently after the upgrade. Atleast once a day. Maharaja Azhagiah
Sent from my iPhone
On Aug 9, 2024, at 14:27, Maharaja Azhagiah er.maharaja@gmail.com wrote:
Hi Henning, Hello all
I have updated kamailio to 5.8.2 and I still see the crash during reload of carrierroute module.
kamailio version:
version: kamailio 5.8.2 (x86_64/linux) 164d1e flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, MEM_JOIN_FREE, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_SEND_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 164d1e compiled on 17:00:04 Aug 8 2024 with gcc 8.3.0
core dump backtrace:
Program terminated with signal SIGSEGV, Segmentation fault. #0 load_route_data_db (rd=0x789fcce42c20) at cr_db.c:432 432 if(rd->carriers[i]->domains[j]->sum_prob == 0.0) { (gdb) bt full #0 load_route_data_db (rd=0x789fcce42c20) at cr_db.c:432 res = 0x78a049e3e4a0 row = 0x78a049e43070 i = 0 j = 109 ret = 59 tmp_carrier_data = 0x789fd380f9a0 query_str = {s = 0x789fc84fda40 <query> "SELECT DISTINCT domain FROM carrierroute WHERE carrier=1000", len = 59} tmp_scan_prefix = {s = 0x5ba512e96630 "12345", len = 5} tmp_rewrite_host = {s = 0x5ba512e9663c "127.0.0.100:9000;transport=udp", len = 30} tmp_rewrite_prefix = {s = 0x5ba512e9665d "444", len = 3} tmp_rewrite_suffix = {s = 0x5ba512e96661 "555", len = 3} tmp_host_name = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -928288768} tmp_reply_code = {s = 0x789fc84ee1c0 <__func__.5976> "reload_route_data", len = -934355152} tmp_comment = {s = 0x5ba512e96665 "IMPORTED - kanchan_route_rule", len = 30} p_tmp_comment = 0x7fff3d14f8b0 __func__ = "load_route_data_db" n = 0 #1 0x0000789fc84aaccd in reload_route_data () at cr_data.c:187 old_data = 0x5ba512e4d010 new_data = 0x789fcce42c20 i = 23461 __func__ = "reload_route_data" #2 0x0000789fc84ca080 in cr_rpc_reload_routes (rpc=0x78a049326c80 <func_param>, c=0x78a049326ba0 <_jsonrpc_ctx_global>) at cr_rpc.c:64 __func__ = "cr_rpc_reload_routes" #3 0x000078a049306e08 in jsonrpc_exec_ex (cmd=0x7fff3d14fce0, rpath=0x0, spath=0x0) at jsonrpcs_mod.c:1588 rpce = 0x78a049e3d6f0 ctx = 0x78a049326ba0 <_jsonrpc_ctx_global> ret = -1 nj = 0x0 val = {s = 0x5ba512cfcc10 "cr.reload_routes", len = 16} scmd = {s = 0x78a049bb09e0 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} rdata = 0 mode = 1234975676 __func__ = "jsonrpc_exec_ex" #4 0x000078a049307244 in jsonrpc_exec (msg=0x78a049e2d200, cmd=0x78a049be54f0 "\340\t\273I\240x", s2=0x0) at jsonrpcs_mod.c:1609 scmd = {s = 0x78a049bb09e0 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec" #5 0x00005ba511455344 in do_action (h=0x7fff3d150610, a=0x78a049be52a0, msg=0x78a049e2d200) at core/action.c:1127 ret = -5 li = 5010672 v = 4526144 dst = {send_sock = 0x20, to = {s = {sa_family = 28672, sa_data = "\253\310\237x\000\000Vw#I\240x\000"}, sin = {sin_family = 28672, sin_port = 51371, sin_addr = {s_addr = 30879}, sin_zero = "Vw#I\240x\000"}, sin6 = {sin6_family = 28672, sin6_port = 51371, sin6_flowinfo = 30879, sin6_addr = {__in6_u = {__u6_addr8 = "Vw#I\240x\000\000\000\001\000\000\000\000\000", __u6_addr16 = {30550, 18723, 30880, 0, 256, 0, 0, 0}, __u6_addr32 = {1227061078, 30880, 256, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 28672, __ss_padding = "\253\310\237x\000\000Vw#I\240x\000\000\000\001", '\000' <repeats 22 times>, "\002\000\000\000D\000\000\000eWr\021\245[\000\000\020\002\025=\377\177\000\000\020\220\235I\240x\000\000\020\345\343I\240x\000\000\020\220\235I\240x\000\000P\002\025=\377\177\000\000`\357+I\240x\000\000\020\345\343I\240x\000\000\000\000\000\000\000\000\000", __ss_align = 134217728}}, id = 129691584, send_flags = {f = 0, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -14 '\362', proto_pad1 = 51} tmp = 0x7fff3d150400 "\220\005\025=\377\177" new_uri = 0x0 end = 0x789fc8ab7000 "" crt = 0x78a00000000f "" cmd = 0x78a049b686f8 len = 30880 user = 1225632696 uri = {user = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 294227363}, passwd = {s = 0x7fff3d150070 "", len = 292717502}, host = {s = 0x78a04925aa30 "tm", len = 292815521}, port = {s = 0x7fff3d150080 "\240\344\343I\b", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x789fd380fa70 "\300\300\300\300", len = 0}, headers = {s = 0x0, len = 0}, port_no = 58528, proto = 18915, type = 8, flags = (unknown: 3548445248), transport = {s = 0x0, len = 0}, ttl = { s = 0x789fd380fa70 "\300\300\300\300", len = -746522648}, user_param = {s = 0x7fff3d1502a0 "\353[\214\021\245[", len = 289836420}, maddr = {s = 0x16e00000000 <error: Cannot access memory at address 0x16e00000000>, len = -746514208}, method = { s = 0x789fd380fa70 "\300\300\300\300", len = -746513728}, lr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 293855368}, r2 = {s = 0x0, len = -2147483648}, gr = {s = 0x408000000 <error: Cannot access memory at address 0x408000000>, len = 294409814}, transport_val = {s = 0x7fff3d150140 "\360\001\025=\377\177", len = 290331077}, ttl_val = {s = 0x7fff3d150200 "\020\345\343I\240x", len = 293063450}, user_param_val = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 293855368}, maddr_val = {s = 0x7fff3d1501f0 "P\002\025=\377\177", len = 290351217}, method_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1238894608}, lr_val = {s = 0x789fc839852d "", len = -935754475}, r2_val = { s = 0x7fff3d1503e0 "", len = 1024787904}, gr_val = {s = 0x78a049237748 <__func__.10408> "str_duplicate", len = 1227061078}} next_hop = {user = {s = 0x78a049e3e7f0 "P", len = 1239671616}, passwd = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 293855368}, host = {s = 0x0, len = 1235062800}, port = {s = 0x320 <error: Cannot access memory at address 0x320>, len = 1239671904}, params = {s = 0x7fff3d14ff00 "\360\001\025=\377\177", len = 293855368}, sip_params = {s = 0x0, len = -2147483648}, headers = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 294227363}, port_no = 496, proto = 15637, type = 32767, flags = (unknown: 1226855508), transport = {s = 0x4d38129f0 <error: Cannot access memory at address 0x4d38129f0>, len = 294334100}, ttl = {s = 0x7fff3d150020 "p", len = 0}, user_param = {s = 0x789fd38118e0 "\vPH\310\237x", len = -746522000}, maddr = {s = 0x78a049e3e980 "\020", len = 1235062800}, method = {s = 0x78a04925aa30 "tm", len = 1227616096}, lr = {s = 0x78a04925ab48 <__func__.11229> "insert_tmcb", len = 1227205171}, r2 = { s = 0x30 <error: Cannot access memory at address 0x30>, len = -928288768}, gr = {s = 0x33e9d0 <error: Cannot access memory at address 0x33e9d0>, len = 4523904}, transport_val = {s = 0x4c74f0 <error: Cannot access memory at address 0x4c74f0>, len = 16}, ttl_val = {s = 0x21 <error: Cannot access memory at address 0x21>, len = 1235062800}, user_param_val = {s = 0x7fff3d14ffe0 " ", len = 290364176}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1}, method_val = { s = 0x6a499dba50 <error: Cannot access memory at address 0x6a499dba50>, len = -746509952}, lr_val = {s = 0x13d150020 <error: Cannot access memory at address 0x13d150020>, len = -928020096}, r2_val = {s = 0x7fff3d150020 "p", len = 292648555}, gr_val = { --Type <RET> for more, q to quit, c to continue without paging--c s = 0x0, len = -928020096}} u = 0xc8af8980 port = 0 dst_host = 0x78a049e2d200 i = 0 flags = 0 avp = 0x5ba5117835c4 <parse_headers+2253> st = {flags = 1, id = 0, name = {n = -3961760297202483200, s = {s = 0xc905000000000000 <error: Cannot access memory at address 0xc905000000000000>, len = 1024786096}, re = 0xc905000000000000}, avp = 0x7fff3d1500b0} sct = 0x499da950 sjt = 0x32499da3d0 rve = 0x5ba511898da3 mct = 0x5499da950 rv = 0x0 rv1 = 0x7fff3d150490 c1 = {cache_type = 1227194491, val_type = 30880, c = {avp_val = {n = 1447403978752, s = {s = 0x15100000000 <error: Cannot access memory at address 0x15100000000>, len = 1227194784}, re = 0x15100000000}, pval = {rs = {s = 0x15100000000 <error: Cannot access memory at address 0x15100000000>, len = 1227194784}, ri = 132629817295280, flags = 1239671968}}, i2s = "\020\220\235I\240x", '\000' <repeats 15 times>} s = {s = 0x0, len = 0} srevp = {0x7fff3d14ff00, 0x5ba51171d15c <qm_free+7904>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x00005ba511463ab9 in run_actions (h=0x7fff3d150610, a=0x78a049be4420, msg=0x78a049e2d200) at core/action.c:1618 t = 0x78a049be52a0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 1220678640, tz_dsttime = 30880} tdiff = 1239601600 __func__ = "run_actions" #7 0x0000789fc8393faa in timer_handler (ticks=558041136, tl=0x789fcf665990, data=0x789fcf6658a0) at timer.c:216 msg = 0x78a049e2d200 a = 0x789fcf6658a0 ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {100764521586824, 5537789872794009978, 0, 2147483648, 134217728, 100764521958819, 5537789872844341626, 319322550229959034}, __mask_was_saved = 0, __saved_mask = {__val = {100764521958819, 140734218176272, 132629810783733, 0, 149798025884812256, 6872972461760, 132627664605952, 140734218176192, 132627656018865, 1095216660481, 132627662081200, 140734218176272, 140734218176224, 132627655829876, 0, 140734218176272}}}}} keng = 0x0 evname = {s = 0x789fc839816a "timer", len = 5} __func__ = "timer_handler" #8 0x00005ba5114e8c93 in slow_timer_main () at core/timer.c:1103 n = 12 ret = 4294967295 tl = 0x789fcf665990 i = 7 __func__ = "slow_timer_main" #9 0x00005ba5113e4aff in main_loop () at main.c:1915 i = 16 pid = 0 si = 0x0 si_desc = "udp receiver child=15 sock=10.9.0.28:5101 ( 35.227.52.202:5101)\000\000\000\000\000\b\000\000\000\000\320\334\332I\240x", '\000' <repeats 13 times>, "\200\000\000\000\000\000\000\000\b\000\000\000\000\243\215\211\021\245[\000\000\340\t\025=\377\177\000\000d\026\245Q\240x\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x00005ba5113f02d3 in main (argc=8, argv=0x7fff3d150f18) at main.c:3256 cfg_stream = 0x5ba512ce2260 c = -1 r = 0 tmp = 0x7fff3d152d84 "" tmp_len = 0 port = 5060 proto = 0 aproto = 0 ahost = 0x0 aport = 0 options = 0x5ba511841378 ":f:cm:M:dVIhEeb:B:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3317072467 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x0 p = 0x78a051a9b995 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} l1 = 2048 tbuf = "`\017\025=\377\177\000\000\330K\275Q\240x\000\000\000\000\000\000\000\000\000\000\020+\331Q\240x\000\000\001", '\000' <repeats 15 times>, "\214#\241Q\240x\000\000(F\330Q\240x\000\000`\016\025=\377\177\000\000\312\224\331Q\240x\000\000\000\000\000\000\000\000\000\000@\205\273Q\240x\000\000\320\323\274Q\240x\000\000\204\016\025=\377\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>... option_index = 0 long_options = {{name = 0x5ba5118436d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5ba51183e55c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x5ba5118436db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x5ba5118436e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x5ba5118436e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x5ba5118436f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x5ba5118436fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5ba511843704 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5ba51184370f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5ba511843718 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5ba511843723 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x5ba511843729 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x5ba511843733 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x5ba51184373a "all-errors", has_arg = 0, flag = 0x0, val = 1035}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" (gdb) list 427 } 428 } while(RES_ROW_N(res) > 0); 429 430 for(i = 0; i < rd->carrier_num; ++i) { 431 for(j = 0; j < rd->carriers[i]->domain_num; ++j) { 432 if(rd->carriers[i]->domains[j]->sum_prob == 0.0) { 433 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d " 434 "(%.*s) have probability 0.\n", 435 rd->carriers[i]->id, rd->carriers[i]->name->len, 436 rd->carriers[i]->name->s, (gdb)
I couldn't understand what exactly is wrong with the carrierroute module.
Thank you for your help in advance.
Regards
*Maharaja Azhagiah*
On Wed, Jul 24, 2024 at 3:28 AM Henning Westerholt hw@gilawa.com wrote:
Hello,
my suggestion would be to do an update to e.g. 5.8.2, as the version 5.4.9 is long end of life. It crashed during a routing reload for carrierroute module.
If you are still seeing crashes after the update, please let us know.
Cheers,
Henning
--
Henning Westerholt – https://skalatan.de/blog/
Kamailio services – https://gilawa.com
*From:* Maharaja Azhagiah via sr-users sr-users@lists.kamailio.org *Sent:* Dienstag, 23. Juli 2024 21:50 *To:* Kamailio (SER) - Users Mailing List sr-users@lists.kamailio.org *Cc:* Maharaja Azhagiah er.maharaja@gmail.com *Subject:* [SR-Users] kamailio randomly crashes
Hi all,
I have kamailio running in GKE (Google Kubernetes) and recently seeing kamailio crashes frequently and I couldn't find the reason for the crash
kamailio version
version: kamailio 5.4.9 (x86_64/linux) 7d022d flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 7d022d compiled on 14:26:30 Jul 10 2024 with gcc 8.3.0
kamailio core generation:
Core was generated by `kamailio -e -E -DD -M 128 -m 2048'. Program terminated with signal SIGSEGV, Segmentation fault. #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) {
bt:
(gdb) bt #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 #9 0x00005745eb3a85bd in main_loop () at main.c:1765 #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942
bt full:
(gdb) bt full #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 res = 0x7ca4f636a4a8 row = 0x7ca4f642a7f8 i = 0 j = 110 ret = 56 tmp_carrier_data = 0x7ca479ff5068 query_str = {s = 0x7ca474cdd800 <query> "SELECT DISTINCT domain FROM carrierroute WHERE carrier=8", len = 56} tmp_scan_prefix = {s = 0x5745ed889f68 "13235791374", len = 11} tmp_rewrite_host = {s = 0x5745ed889f7a "sip.telnyx.com;transport=TLS", len = 28} tmp_rewrite_prefix = {s = 0x5745ed889f99 "", len = 0} tmp_rewrite_suffix = {s = 0x5745ed889f9a "", len = 0} tmp_host_name = {s = 0x40 <error: Cannot access memory at address 0x40>, len = 1965559808} tmp_reply_code = {s = 0x7ca474ccf2b0 <__func__.5843> "reload_route_data", len = 1959587872} tmp_comment = {s = 0x5745ed889f9b "IMPORTED - WTJHSX", len = 18} p_tmp_comment = 0x7ffd774f30b0 __func__ = "load_route_data_db" n = 0 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 old_data = 0x5745ed850150 new_data = 0x7ca482a48840 i = 22341 __func__ = "reload_route_data" #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 __func__ = "cr_rpc_reload_routes" #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 rpce = 0x7ca4f6425fb8 ctx = 0x7ca4f5a329c0 <_jsonrpc_ctx_global> ret = -1 nj = 0x0 val = {s = 0x5745ed845010 "cr.reload_routes", len = 16} scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec_ex" #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec" #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 41744, sa_data = "6\366\244|\000\000\035u\271t\244|\000"}, sin = {sin_family = 41744, sin_port = 63030, sin_addr = {s_addr = 31908}, sin_zero = "\035u\271t\244|\000"}, sin6 = {sin6_family = 41744, sin6_port = 63030, sin6_flowinfo = 31908, sin6_addr = {__in6_u = {__u6_addr8 = "\035u\271t\244|\000\000\005u\271t\244|\000", __u6_addr16 = {29981, 29881, 31908, 0, 29957, 29881, 31908, 0}, __u6_addr32 = {1958311197, 31908, 1958311173, 31908}}}, sin6_scope_id = 2001680800}, sas = {ss_family = 41744, __ss_padding = "6\366\244|\000\000\035u\271t\244|\000\000\005u\271t\244|\000\000\240\071Ow\375\177\000\000/.:\365\244|\000\000\320:Ow\375\177\000\000\327\337j\353EW\000\000\320\071Ow\375\177\000\000\020@ \016\366\244|\000\000\030\245\066\366\244|\000\000\020@\016\366\244|\000\000\020:Ow\375\177\000\000\356u\236\365\244|\000\000\030\245\066\366\244|\000\000\000\000\000\000\000\000\000", __ss_align = 134217728}}, id = 130848392, send_flags = {f = 0, blst_imask = 0}, proto = 56 '8', proto_pad0 = 5 '\005', proto_pad1 = 36} tmp = 0x7ca4f641a9f8 "\344\032" new_uri = 0xed3 <error: Cannot access memory at address 0xed3> end = 0x7ca474b9751b "\r\n" crt = 0x2 <error: Cannot access memory at address 0x2> cmd = 0x7ca4f617b7d8 len = 0 user = 15 uri = {user = {s = 0x9774f3800 <error: Cannot access memory at address 0x9774f3800>, len = 621}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1721781302}, host = {s = 0x0, len = -2147483648}, port = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, params = {s = 0x7ffd774f38e0 "09Ow\375\177", len = -167557169}, sip_params = { s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, headers = {s = 0x1700000000 <error: Cannot access memory at address 0x1700000000>, len = 2001681040}, port_no = 14800, proto = 30543, type = 32765, flags = (unknown: 4130775280), transport = {s = 0x0, len = 2009201968}, ttl = {s = 0x6774f3a50 <error: Cannot access memory at address 0x6774f3a50>, len = -181058744}, user_param = { s = 0x17200000000 <error: Cannot access memory at address 0x17200000000>, len = 2099608304}, maddr = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -344235896}, method = {s = 0x0, len = -2147483648}, lr = { --Type <RET> for more, q to quit, c to continue without paging-- s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, r2 = {s = 0x7ffd774f38d0 "`9Ow\375\177", len = -166931844}, gr = {s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, transport_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -181636538}, ttl_val = {s = 0x7ffd774f3930 "`9Ow\375\177", len = -167555326}, user_param_val = {s = 0x0, len = 2}, maddr_val = { s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, method_val = {s = 0x177d6038c8 <error: Cannot access memory at address 0x177d6038c8>, len = 2001681040}, lr_val = {s = 0xe00000000 <error: Cannot access memory at address 0xe00000000>, len = 1958311183}, r2_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -164191464}, gr_val = { s = 0x7ffd774f39f0 "\373\377\377\377", len = -344973614}} next_hop = {user = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, passwd = {s = 0x7ffd774f3720 "\020\070Ow\375\177", len = -166975523}, host = { s = 0x7ffd774f3740 "\020\070Ow\375\177", len = -166887566}, port = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, params = {s = 0x7ffd774f3d50 "", len = -164192016}, sip_params = {s = 0x0, len = -30810208}, headers = {s = 0x0, len = -181051830}, port_no = 8055, proto = 62988, type = 31908, flags = (unknown: 4128077712), transport = { s = 0x4774f37d0 <error: Cannot access memory at address 0x4774f37d0>, len = 2001680544}, ttl = {s = 0x669fa379 <error: Cannot access memory at address 0x669fa379>, len = -164192016}, user_param = { s = 0x5745ed7743b0 "'sip:+13194676789@us.test.com',NULL,0)", len = 1721781302}, maddr = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -167513741}, method = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, lr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -167567737}, r2 = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, gr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -166977673}, transport_val = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, ttl_val = {s = 0x7ffd774f3a90 "\330\267\027\366\244|", len = 23}, user_param_val = { s = 0x5745ed77417a "3071,3795,'6e1a9c34-cec5-4ebb-bcd9-3356d80bcf9e',' sip:+13194004696@sip.telnyx.com','c5SS3F27B8rDN',' sip:+13194676789@us.test.com','f9b9b2c48ef41ef90eb05056b0a794','tls: 10.16.0.74:520"..., len = -164192016}, maddr_val = {s = 0x7ca4f60dcf18 "`", len = -31060352}, method_val = {s = 0x0, len = -180627954}, lr_val = {s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7ca4f5817bc8 port = 0 dst_host = 0x7ca474b9751d i = -344941541 flags = 0 avp = 0x7ffd774f3c40 st = {flags = 3984015424, id = 22341, name = {n = -310010607, s = {s = 0x5745ed859d11 "", len = 2001679968}, re = 0x5745ed859d11}, avp = 0x66a04c36} sct = 0x60f60e6120 sjt = 0x5f60e6a50 rve = 0x8000000 mct = 0x0 rv = 0xffffffff rv1 = 0x5745eb7fc993 c1 = {cache_type = 10, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 2001679912, flags = 32765}}, i2s = "`6Ow\375\177\000\000\031\241\a\366\244|\000\000\250\003\000\000\000"} s = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -164179120} srevp = {0x3, 0x64870454268b4200} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 t = 0x7ca4f61f1a50 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 60, tz_dsttime = 0} tdiff = 4131498432 __func__ = "run_actions" #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 msg = 0x7ca4f641a9f8 a = 0x7ca47b2f7868 ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {95957815091336, 8333654393230933038, 0, 2147483648, 134217728, 95957815380371, 8333654393012829230, 2510245087605373998}, __mask_was_saved = 0, __saved_mask = {__val = {137047930071236, 0, 25985340079663656, 140726605135616, 137045787154760, 70721158768, 137045787160648, 140726605135472, 137045776334895, 1095350878208, 137045782276504, 140735195070144, 140726605135504, 137045776144708, 0, 140726605135552}}}}} keng = 0x0 evname = {s = 0x7ca474b9715a "timer", len = 5} __func__ = "timer_handler" --Type <RET> for more, q to quit, c to continue without paging-- #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 n = 12 ret = 4294967295 tl = 0x7ca47b2f7950 i = 1010 __func__ = "slow_timer_main" #9 0x00005745eb3a85bd in main_loop () at main.c:1765 i = 16 pid = 0 si = 0x0 si_desc = "udp receiver child=15 sock=10.16.0.74:5101 ( 35.202.133.184:5101)\000AOw\375\177\000\000d\366\023\376\244|\000\000 \000\000\000\060\000\000\000@AOw\375\177\000\000\200@Ow \375\177\000\000\000B\213&T\004\207d\223\311\177\353EW\000\000\240\274\065\366\244|\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942 cfg_stream = 0x5745ed74d2a0 c = -1 r = 0 tmp = 0x7ffd774f5d9f "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x5745eb7b8d78 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1555962608 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x7ffd77580248 p = 0x7ca4fe189995 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} tbuf = "\b\000\000\000\000\000\000\000\210FOw\375\177\000\000\320FOw\375\177\000\000\330+,\376\244|\000\000\000\000\000\000\000\000\000\000\020\vH\376\244|\000\000\001", '\000' <repeats 19 times>, " \000\000\000(&G\376\244|\000\000\320EOw\375\177\000\000\312tH\376\244|\000\000\000\000\000\000\000\000\000\000@e*\376\244|\000\000\320\263+\376\244|\000\000\364EOw\375\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 186 times>... option_index = 0 long_options = {{name = 0x5745eb7baf46 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5745eb7b6524 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x5745eb7baf4b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x5745eb7baf51 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x5745eb7baf57 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x5745eb7baf60 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x5745eb7baf6a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5745eb7baf74 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5745eb7baf7f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5745eb7baf88 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5745eb7baf93 "debug", has_arg = 1, flag = 0x0, val = 1032}, { name = 0x5745eb7baf99 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main"
(gdb) list 411 } 412 } while(RES_ROW_N(res) > 0); 413 414 for (i = 0; i < rd->carrier_num; ++i) { 415 for (j = 0; j < rd->carriers[i]->domain_num; ++j) { 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) { 417 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d (%.*s) have probability 0.\n", 418 rd->carriers[i]->id, rd->carriers[i]->name->len, rd->carriers[i]->name->s, 419 rd->carriers[i]->domains[j]->id, rd->carriers[i]->domains[j]->name->len, rd->carriers[i]->domains[j]->name->s); 420 }
Please help to understand the reason for the crash and how to fix the problem.
Thank you in advance.
Regards
*Maharaja Azhagiah*
Kamailio - Users Mailing List - Non Commercial Discussions To unsubscribe send an email to sr-users-leave@lists.kamailio.org Important: keep the mailing list in the recipients, do not reply only to the sender! Edit mailing list options or unsubscribe:
Hello,
thanks for reproducing it with a recent version. Could you maybe share (privately by e-mail) the routing data SQL dump that we reproduce it? Feel free to remove any private information like host names etc.., as long as it keeps crashing its fine.
Cheers,
Henning
-- Henning Westerholt – https://skalatan.de/blog/ Kamailio services – https://gilawa.comhttps://gilawa.com/
From: Maharaja Azhagiah er.maharaja@gmail.com Sent: Mittwoch, 14. August 2024 03:50 To: Henning Westerholt hw@gilawa.com Cc: Kamailio (SER) - Users Mailing List sr-users@lists.kamailio.org Subject: Re: [SR-Users] kamailio randomly crashes
Hi all
Could you please help with this core dump? Kamailio crashes frequently after the upgrade. Atleast once a day. Maharaja Azhagiah
Sent from my iPhone
On Aug 9, 2024, at 14:27, Maharaja Azhagiah <er.maharaja@gmail.commailto:er.maharaja@gmail.com> wrote: Hi Henning, Hello all
I have updated kamailio to 5.8.2 and I still see the crash during reload of carrierroute module.
kamailio version:
version: kamailio 5.8.2 (x86_64/linux) 164d1e flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, MEM_JOIN_FREE, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_SEND_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 164d1e compiled on 17:00:04 Aug 8 2024 with gcc 8.3.0
core dump backtrace:
Program terminated with signal SIGSEGV, Segmentation fault. #0 load_route_data_db (rd=0x789fcce42c20) at cr_db.c:432 432 if(rd->carriers[i]->domains[j]->sum_prob == 0.0) { (gdb) bt full #0 load_route_data_db (rd=0x789fcce42c20) at cr_db.c:432 res = 0x78a049e3e4a0 row = 0x78a049e43070 i = 0 j = 109 ret = 59 tmp_carrier_data = 0x789fd380f9a0 query_str = {s = 0x789fc84fda40 <query> "SELECT DISTINCT domain FROM carrierroute WHERE carrier=1000", len = 59} tmp_scan_prefix = {s = 0x5ba512e96630 "12345", len = 5} tmp_rewrite_host = {s = 0x5ba512e9663c "127.0.0.100:9000;transport=udp", len = 30} tmp_rewrite_prefix = {s = 0x5ba512e9665d "444", len = 3} tmp_rewrite_suffix = {s = 0x5ba512e96661 "555", len = 3} tmp_host_name = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -928288768} tmp_reply_code = {s = 0x789fc84ee1c0 <__func__.5976> "reload_route_data", len = -934355152} tmp_comment = {s = 0x5ba512e96665 "IMPORTED - kanchan_route_rule", len = 30} p_tmp_comment = 0x7fff3d14f8b0 __func__ = "load_route_data_db" n = 0 #1 0x0000789fc84aaccd in reload_route_data () at cr_data.c:187 old_data = 0x5ba512e4d010 new_data = 0x789fcce42c20 i = 23461 __func__ = "reload_route_data" #2 0x0000789fc84ca080 in cr_rpc_reload_routes (rpc=0x78a049326c80 <func_param>, c=0x78a049326ba0 <_jsonrpc_ctx_global>) at cr_rpc.c:64 __func__ = "cr_rpc_reload_routes" #3 0x000078a049306e08 in jsonrpc_exec_ex (cmd=0x7fff3d14fce0, rpath=0x0, spath=0x0) at jsonrpcs_mod.c:1588 rpce = 0x78a049e3d6f0 ctx = 0x78a049326ba0 <_jsonrpc_ctx_global> ret = -1 nj = 0x0 val = {s = 0x5ba512cfcc10 "cr.reload_routes", len = 16} scmd = {s = 0x78a049bb09e0 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} rdata = 0 mode = 1234975676 __func__ = "jsonrpc_exec_ex" #4 0x000078a049307244 in jsonrpc_exec (msg=0x78a049e2d200, cmd=0x78a049be54f0 "\340\t\273I\240x", s2=0x0) at jsonrpcs_mod.c:1609 scmd = {s = 0x78a049bb09e0 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec" #5 0x00005ba511455344 in do_action (h=0x7fff3d150610, a=0x78a049be52a0, msg=0x78a049e2d200) at core/action.c:1127 ret = -5 li = 5010672 v = 4526144 dst = {send_sock = 0x20, to = {s = {sa_family = 28672, sa_data = "\253\310\237x\000\000Vw#I\240x\000"}, sin = {sin_family = 28672, sin_port = 51371, sin_addr = {s_addr = 30879}, sin_zero = "Vw#I\240x\000"}, sin6 = {sin6_family = 28672, sin6_port = 51371, sin6_flowinfo = 30879, sin6_addr = {__in6_u = {__u6_addr8 = "Vw#I\240x\000\000\000\001\000\000\000\000\000", __u6_addr16 = {30550, 18723, 30880, 0, 256, 0, 0, 0}, __u6_addr32 = {1227061078, 30880, 256, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 28672, __ss_padding = "\253\310\237x\000\000Vw#I\240x\000\000\000\001", '\000' <repeats 22 times>, "\002\000\000\000D\000\000\000eWr\021\245[\000\000\020\002\025=\377\177\000\000\020\220\235I\240x\000\000\020\345\343I\240x\000\000\020\220\235I\240x\000\000P\002\025=\377\177\000\000`\357+I\240x\000\000\020\345\343I\240x\000\000\000\000\000\000\000\000\000", __ss_align = 134217728}}, id = 129691584, send_flags = {f = 0, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -14 '\362', proto_pad1 = 51} tmp = 0x7fff3d150400 "\220\005\025=\377\177" new_uri = 0x0 end = 0x789fc8ab7000 "" crt = 0x78a00000000f "" cmd = 0x78a049b686f8 len = 30880 user = 1225632696 uri = {user = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 294227363}, passwd = {s = 0x7fff3d150070 "", len = 292717502}, host = {s = 0x78a04925aa30 "tm", len = 292815521}, port = {s = 0x7fff3d150080 "\240\344\343I\b", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x789fd380fa70 "\300\300\300\300", len = 0}, headers = {s = 0x0, len = 0}, port_no = 58528, proto = 18915, type = 8, flags = (unknown: 3548445248), transport = {s = 0x0, len = 0}, ttl = { s = 0x789fd380fa70 "\300\300\300\300", len = -746522648}, user_param = {s = 0x7fff3d1502a0 "\353[\214\021\245[", len = 289836420}, maddr = {s = 0x16e00000000 <error: Cannot access memory at address 0x16e00000000>, len = -746514208}, method = { s = 0x789fd380fa70 "\300\300\300\300", len = -746513728}, lr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 293855368}, r2 = {s = 0x0, len = -2147483648}, gr = {s = 0x408000000 <error: Cannot access memory at address 0x408000000>, len = 294409814}, transport_val = {s = 0x7fff3d150140 "\360\001\025=\377\177", len = 290331077}, ttl_val = {s = 0x7fff3d150200 "\020\345\343I\240x", len = 293063450}, user_param_val = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 293855368}, maddr_val = {s = 0x7fff3d1501f0 "P\002\025=\377\177", len = 290351217}, method_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1238894608}, lr_val = {s = 0x789fc839852d "", len = -935754475}, r2_val = { s = 0x7fff3d1503e0 "", len = 1024787904}, gr_val = {s = 0x78a049237748 <__func__.10408> "str_duplicate", len = 1227061078}} next_hop = {user = {s = 0x78a049e3e7f0 "P", len = 1239671616}, passwd = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 293855368}, host = {s = 0x0, len = 1235062800}, port = {s = 0x320 <error: Cannot access memory at address 0x320>, len = 1239671904}, params = {s = 0x7fff3d14ff00 "\360\001\025=\377\177", len = 293855368}, sip_params = {s = 0x0, len = -2147483648}, headers = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 294227363}, port_no = 496, proto = 15637, type = 32767, flags = (unknown: 1226855508), transport = {s = 0x4d38129f0 <error: Cannot access memory at address 0x4d38129f0>, len = 294334100}, ttl = {s = 0x7fff3d150020 "p", len = 0}, user_param = {s = 0x789fd38118e0 "\vPH\310\237x", len = -746522000}, maddr = {s = 0x78a049e3e980 "\020", len = 1235062800}, method = {s = 0x78a04925aa30 "tm", len = 1227616096}, lr = {s = 0x78a04925ab48 <__func__.11229> "insert_tmcb", len = 1227205171}, r2 = { s = 0x30 <error: Cannot access memory at address 0x30>, len = -928288768}, gr = {s = 0x33e9d0 <error: Cannot access memory at address 0x33e9d0>, len = 4523904}, transport_val = {s = 0x4c74f0 <error: Cannot access memory at address 0x4c74f0>, len = 16}, ttl_val = {s = 0x21 <error: Cannot access memory at address 0x21>, len = 1235062800}, user_param_val = {s = 0x7fff3d14ffe0 " ", len = 290364176}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1}, method_val = { s = 0x6a499dba50 <error: Cannot access memory at address 0x6a499dba50>, len = -746509952}, lr_val = {s = 0x13d150020 <error: Cannot access memory at address 0x13d150020>, len = -928020096}, r2_val = {s = 0x7fff3d150020 "p", len = 292648555}, gr_val = { --Type <RET> for more, q to quit, c to continue without paging--c s = 0x0, len = -928020096}} u = 0xc8af8980 port = 0 dst_host = 0x78a049e2d200 i = 0 flags = 0 avp = 0x5ba5117835c4 <parse_headers+2253> st = {flags = 1, id = 0, name = {n = -3961760297202483200, s = {s = 0xc905000000000000 <error: Cannot access memory at address 0xc905000000000000>, len = 1024786096}, re = 0xc905000000000000}, avp = 0x7fff3d1500b0} sct = 0x499da950 sjt = 0x32499da3d0 rve = 0x5ba511898da3 mct = 0x5499da950 rv = 0x0 rv1 = 0x7fff3d150490 c1 = {cache_type = 1227194491, val_type = 30880, c = {avp_val = {n = 1447403978752, s = {s = 0x15100000000 <error: Cannot access memory at address 0x15100000000>, len = 1227194784}, re = 0x15100000000}, pval = {rs = {s = 0x15100000000 <error: Cannot access memory at address 0x15100000000>, len = 1227194784}, ri = 132629817295280, flags = 1239671968}}, i2s = "\020\220\235I\240x", '\000' <repeats 15 times>} s = {s = 0x0, len = 0} srevp = {0x7fff3d14ff00, 0x5ba51171d15c <qm_free+7904>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x00005ba511463ab9 in run_actions (h=0x7fff3d150610, a=0x78a049be4420, msg=0x78a049e2d200) at core/action.c:1618 t = 0x78a049be52a0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 1220678640, tz_dsttime = 30880} tdiff = 1239601600 __func__ = "run_actions" #7 0x0000789fc8393faa in timer_handler (ticks=558041136, tl=0x789fcf665990, data=0x789fcf6658a0) at timer.c:216 msg = 0x78a049e2d200 a = 0x789fcf6658a0 ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {100764521586824, 5537789872794009978, 0, 2147483648, 134217728, 100764521958819, 5537789872844341626, 319322550229959034}, __mask_was_saved = 0, __saved_mask = {__val = {100764521958819, 140734218176272, 132629810783733, 0, 149798025884812256, 6872972461760, 132627664605952, 140734218176192, 132627656018865, 1095216660481, 132627662081200, 140734218176272, 140734218176224, 132627655829876, 0, 140734218176272}}}}} keng = 0x0 evname = {s = 0x789fc839816a "timer", len = 5} __func__ = "timer_handler" #8 0x00005ba5114e8c93 in slow_timer_main () at core/timer.c:1103 n = 12 ret = 4294967295 tl = 0x789fcf665990 i = 7 __func__ = "slow_timer_main" #9 0x00005ba5113e4aff in main_loop () at main.c:1915 i = 16 pid = 0 si = 0x0 si_desc = "udp receiver child=15 sock=10.9.0.28:5101http://10.9.0.28:5101 (35.227.52.202:5101http://35.227.52.202:5101)\000\000\000\000\000\b\000\000\000\000\320\334\332I\240x", '\000' <repeats 13 times>, "\200\000\000\000\000\000\000\000\b\000\000\000\000\243\215\211\021\245[\000\000\340\t\025=\377\177\000\000d\026\245Q\240x\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x00005ba5113f02d3 in main (argc=8, argv=0x7fff3d150f18) at main.c:3256 cfg_stream = 0x5ba512ce2260 c = -1 r = 0 tmp = 0x7fff3d152d84 "" tmp_len = 0 port = 5060 proto = 0 aproto = 0 ahost = 0x0 aport = 0 options = 0x5ba511841378 ":f:cm:M:dVIhEeb:B:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3317072467 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x0 p = 0x78a051a9b995 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} l1 = 2048 tbuf = "`\017\025=\377\177\000\000\330K\275Q\240x\000\000\000\000\000\000\000\000\000\000\020+\331Q\240x\000\000\001", '\000' <repeats 15 times>, "\214#\241Q\240x\000\000(F\330Q\240x\000\000`\016\025=\377\177\000\000\312\224\331Q\240x\000\000\000\000\000\000\000\000\000\000@\205\273Q\240x\000\000\320\323\274Q\240x\000\000\204\016\025=\377\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>... option_index = 0 long_options = {{name = 0x5ba5118436d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5ba51183e55c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x5ba5118436db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x5ba5118436e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x5ba5118436e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x5ba5118436f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x5ba5118436fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5ba511843704 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5ba51184370f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5ba511843718 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5ba511843723 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x5ba511843729 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x5ba511843733 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x5ba51184373a "all-errors", has_arg = 0, flag = 0x0, val = 1035}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" (gdb) list 427 } 428 } while(RES_ROW_N(res) > 0); 429 430 for(i = 0; i < rd->carrier_num; ++i) { 431 for(j = 0; j < rd->carriers[i]->domain_num; ++j) { 432 if(rd->carriers[i]->domains[j]->sum_prob == 0.0) { 433 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d " 434 "(%.*s) have probability 0.\n", 435 rd->carriers[i]->id, rd->carriers[i]->name->len, 436 rd->carriers[i]->name->s, (gdb)
I couldn't understand what exactly is wrong with the carrierroute module.
Thank you for your help in advance.
Regards
Maharaja Azhagiah
On Wed, Jul 24, 2024 at 3:28 AM Henning Westerholt <hw@gilawa.commailto:hw@gilawa.com> wrote: Hello,
my suggestion would be to do an update to e.g. 5.8.2, as the version 5.4.9 is long end of life. It crashed during a routing reload for carrierroute module. If you are still seeing crashes after the update, please let us know.
Cheers,
Henning
-- Henning Westerholt – https://skalatan.de/blog/ Kamailio services – https://gilawa.comhttps://gilawa.com/
From: Maharaja Azhagiah via sr-users <sr-users@lists.kamailio.orgmailto:sr-users@lists.kamailio.org> Sent: Dienstag, 23. Juli 2024 21:50 To: Kamailio (SER) - Users Mailing List <sr-users@lists.kamailio.orgmailto:sr-users@lists.kamailio.org> Cc: Maharaja Azhagiah <er.maharaja@gmail.commailto:er.maharaja@gmail.com> Subject: [SR-Users] kamailio randomly crashes
Hi all,
I have kamailio running in GKE (Google Kubernetes) and recently seeing kamailio crashes frequently and I couldn't find the reason for the crash
kamailio version
version: kamailio 5.4.9 (x86_64/linux) 7d022d flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 7d022d compiled on 14:26:30 Jul 10 2024 with gcc 8.3.0
kamailio core generation:
Core was generated by `kamailio -e -E -DD -M 128 -m 2048'. Program terminated with signal SIGSEGV, Segmentation fault. #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) {
bt:
(gdb) bt #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 #9 0x00005745eb3a85bd in main_loop () at main.c:1765 #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942
bt full:
(gdb) bt full #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 res = 0x7ca4f636a4a8 row = 0x7ca4f642a7f8 i = 0 j = 110 ret = 56 tmp_carrier_data = 0x7ca479ff5068 query_str = {s = 0x7ca474cdd800 <query> "SELECT DISTINCT domain FROM carrierroute WHERE carrier=8", len = 56} tmp_scan_prefix = {s = 0x5745ed889f68 "13235791374", len = 11} tmp_rewrite_host = {s = 0x5745ed889f7a "sip.telnyx.comhttp://sip.telnyx.com/;transport=TLS", len = 28} tmp_rewrite_prefix = {s = 0x5745ed889f99 "", len = 0} tmp_rewrite_suffix = {s = 0x5745ed889f9a "", len = 0} tmp_host_name = {s = 0x40 <error: Cannot access memory at address 0x40>, len = 1965559808} tmp_reply_code = {s = 0x7ca474ccf2b0 <__func__.5843> "reload_route_data", len = 1959587872} tmp_comment = {s = 0x5745ed889f9b "IMPORTED - WTJHSX", len = 18} p_tmp_comment = 0x7ffd774f30b0 __func__ = "load_route_data_db" n = 0 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 old_data = 0x5745ed850150 new_data = 0x7ca482a48840 i = 22341 __func__ = "reload_route_data" #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 __func__ = "cr_rpc_reload_routes" #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 rpce = 0x7ca4f6425fb8 ctx = 0x7ca4f5a329c0 <_jsonrpc_ctx_global> ret = -1 nj = 0x0 val = {s = 0x5745ed845010 "cr.reload_routes", len = 16} scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec_ex" #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec" #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 41744, sa_data = "6\366\244|\000\000\035u\271t\244|\000"}, sin = {sin_family = 41744, sin_port = 63030, sin_addr = {s_addr = 31908}, sin_zero = "\035u\271t\244|\000"}, sin6 = {sin6_family = 41744, sin6_port = 63030, sin6_flowinfo = 31908, sin6_addr = {__in6_u = {__u6_addr8 = "\035u\271t\244|\000\000\005u\271t\244|\000", __u6_addr16 = {29981, 29881, 31908, 0, 29957, 29881, 31908, 0}, __u6_addr32 = {1958311197, 31908, 1958311173, 31908}}}, sin6_scope_id = 2001680800}, sas = {ss_family = 41744, __ss_padding = "6\366\244|\000\000\035u\271t\244|\000\000\005u\271t\244|\000\000\240\071Ow\375\177\000\000/.:\365\244|\000\000\320:Ow\375\177\000\000\327\337j\353EW\000\000\320\071Ow\375\177\000\000\020@\016\366\244|\000\000\030\245\066\366\244|\000\000\020@\016\366\244|\000\000\020:Ow\375\177\000\000\356u\236\365\244|\000\000\030\245\066\366\244|\000\000\000\000\000\000\000\000\000", __ss_align = 134217728}}, id = 130848392, send_flags = {f = 0, blst_imask = 0}, proto = 56 '8', proto_pad0 = 5 '\005', proto_pad1 = 36} tmp = 0x7ca4f641a9f8 "\344\032" new_uri = 0xed3 <error: Cannot access memory at address 0xed3> end = 0x7ca474b9751b "\r\n" crt = 0x2 <error: Cannot access memory at address 0x2> cmd = 0x7ca4f617b7d8 len = 0 user = 15 uri = {user = {s = 0x9774f3800 <error: Cannot access memory at address 0x9774f3800>, len = 621}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1721781302}, host = {s = 0x0, len = -2147483648}, port = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, params = {s = 0x7ffd774f38e0 "09Ow\375\177", len = -167557169}, sip_params = { s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, headers = {s = 0x1700000000 <error: Cannot access memory at address 0x1700000000>, len = 2001681040}, port_no = 14800, proto = 30543, type = 32765, flags = (unknown: 4130775280), transport = {s = 0x0, len = 2009201968}, ttl = {s = 0x6774f3a50 <error: Cannot access memory at address 0x6774f3a50>, len = -181058744}, user_param = { s = 0x17200000000 <error: Cannot access memory at address 0x17200000000>, len = 2099608304}, maddr = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -344235896}, method = {s = 0x0, len = -2147483648}, lr = { --Type <RET> for more, q to quit, c to continue without paging-- s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, r2 = {s = 0x7ffd774f38d0 "`9Ow\375\177", len = -166931844}, gr = {s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, transport_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -181636538}, ttl_val = {s = 0x7ffd774f3930 "`9Ow\375\177", len = -167555326}, user_param_val = {s = 0x0, len = 2}, maddr_val = { s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, method_val = {s = 0x177d6038c8 <error: Cannot access memory at address 0x177d6038c8>, len = 2001681040}, lr_val = {s = 0xe00000000 <error: Cannot access memory at address 0xe00000000>, len = 1958311183}, r2_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -164191464}, gr_val = { s = 0x7ffd774f39f0 "\373\377\377\377", len = -344973614}} next_hop = {user = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, passwd = {s = 0x7ffd774f3720 "\020\070Ow\375\177", len = -166975523}, host = { s = 0x7ffd774f3740 "\020\070Ow\375\177", len = -166887566}, port = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, params = {s = 0x7ffd774f3d50 "", len = -164192016}, sip_params = {s = 0x0, len = -30810208}, headers = {s = 0x0, len = -181051830}, port_no = 8055, proto = 62988, type = 31908, flags = (unknown: 4128077712), transport = { s = 0x4774f37d0 <error: Cannot access memory at address 0x4774f37d0>, len = 2001680544}, ttl = {s = 0x669fa379 <error: Cannot access memory at address 0x669fa379>, len = -164192016}, user_param = { s = 0x5745ed7743b0 "'sip:+13194676789@us.test.commailto:sip%3A%2B13194676789@us.test.com',NULL,0)", len = 1721781302}, maddr = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -167513741}, method = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, lr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -167567737}, r2 = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, gr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -166977673}, transport_val = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, ttl_val = {s = 0x7ffd774f3a90 "\330\267\027\366\244|", len = 23}, user_param_val = { s = 0x5745ed77417a "3071,3795,'6e1a9c34-cec5-4ebb-bcd9-3356d80bcf9e','sip:+13194004696@sip.telnyx.commailto:sip%3A%2B13194004696@sip.telnyx.com','c5SS3F27B8rDN','sip:+13194676789@us.test.commailto:sip%3A%2B13194676789@us.test.com','f9b9b2c48ef41ef90eb05056b0a794','tls:10.16.0.74:520http://10.16.0.74:520/"..., len = -164192016}, maddr_val = {s = 0x7ca4f60dcf18 "`", len = -31060352}, method_val = {s = 0x0, len = -180627954}, lr_val = {s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7ca4f5817bc8 port = 0 dst_host = 0x7ca474b9751d i = -344941541 flags = 0 avp = 0x7ffd774f3c40 st = {flags = 3984015424, id = 22341, name = {n = -310010607, s = {s = 0x5745ed859d11 "", len = 2001679968}, re = 0x5745ed859d11}, avp = 0x66a04c36} sct = 0x60f60e6120 sjt = 0x5f60e6a50 rve = 0x8000000 mct = 0x0 rv = 0xffffffff rv1 = 0x5745eb7fc993 c1 = {cache_type = 10, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 2001679912, flags = 32765}}, i2s = "`6Ow\375\177\000\000\031\241\a\366\244|\000\000\250\003\000\000\000"} s = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -164179120} srevp = {0x3, 0x64870454268b4200} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 t = 0x7ca4f61f1a50 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 60, tz_dsttime = 0} tdiff = 4131498432 __func__ = "run_actions" #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 msg = 0x7ca4f641a9f8 a = 0x7ca47b2f7868 ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {95957815091336, 8333654393230933038, 0, 2147483648, 134217728, 95957815380371, 8333654393012829230, 2510245087605373998}, __mask_was_saved = 0, __saved_mask = {__val = {137047930071236, 0, 25985340079663656, 140726605135616, 137045787154760, 70721158768, 137045787160648, 140726605135472, 137045776334895, 1095350878208, 137045782276504, 140735195070144, 140726605135504, 137045776144708, 0, 140726605135552}}}}} keng = 0x0 evname = {s = 0x7ca474b9715a "timer", len = 5} __func__ = "timer_handler" --Type <RET> for more, q to quit, c to continue without paging-- #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 n = 12 ret = 4294967295 tl = 0x7ca47b2f7950 i = 1010 __func__ = "slow_timer_main" #9 0x00005745eb3a85bd in main_loop () at main.c:1765 i = 16 pid = 0 si = 0x0 si_desc = "udp receiver child=15 sock=10.16.0.74:5101http://10.16.0.74:5101/ (35.202.133.184:5101http://35.202.133.184:5101/)\000AOw\375\177\000\000d\366\023\376\244|\000\000 \000\000\000\060\000\000\000@AOw\375\177\000\000\200@Ow\375\177\000\000\000B\213&T\004\207d\223\311\177\353EW\000\000\240\274\065\366\244|\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942 cfg_stream = 0x5745ed74d2a0 c = -1 r = 0 tmp = 0x7ffd774f5d9f "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x5745eb7b8d78 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1555962608 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x7ffd77580248 p = 0x7ca4fe189995 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} tbuf = "\b\000\000\000\000\000\000\000\210FOw\375\177\000\000\320FOw\375\177\000\000\330+,\376\244|\000\000\000\000\000\000\000\000\000\000\020\vH\376\244|\000\000\001", '\000' <repeats 19 times>, " \000\000\000(&G\376\244|\000\000\320EOw\375\177\000\000\312tH\376\244|\000\000\000\000\000\000\000\000\000\000@e*\376\244|\000\000\320\263+\376\244|\000\000\364EOw\375\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 186 times>... option_index = 0 long_options = {{name = 0x5745eb7baf46 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5745eb7b6524 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x5745eb7baf4b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x5745eb7baf51 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x5745eb7baf57 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x5745eb7baf60 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x5745eb7baf6a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5745eb7baf74 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5745eb7baf7f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5745eb7baf88 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5745eb7baf93 "debug", has_arg = 1, flag = 0x0, val = 1032}, { name = 0x5745eb7baf99 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main"
(gdb) list 411 } 412 } while(RES_ROW_N(res) > 0); 413 414 for (i = 0; i < rd->carrier_num; ++i) { 415 for (j = 0; j < rd->carriers[i]->domain_num; ++j) { 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) { 417 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d (%.*s) have probability 0.\n", 418 rd->carriers[i]->id, rd->carriers[i]->name->len, rd->carriers[i]->name->s, 419 rd->carriers[i]->domains[j]->id, rd->carriers[i]->domains[j]->name->len, rd->carriers[i]->domains[j]->name->s); 420 }
Please help to understand the reason for the crash and how to fix the problem.
Thank you in advance.
Regards
Maharaja Azhagiah
Hi Henning
Since you have mentioned the crash was due to carrierroute, I checked our carrierroute table and noticed we are importing carrierroute from another DB in intervals. Due to a bug we are trying to import carrierroute records for domains that were deleted though they are marked as deleted in our DB as well. After fixing those imports, I don't see any crashes related to carrierroute but still had one crash last week. I couldn't find any details in the core dump. Hence monitoring the servers for now. I will update if kamailio crashes again.
Thank you again for pointing to the right direction.
Regards
*Maharaja Azhagiah*
On Wed, Aug 14, 2024 at 4:21 AM Henning Westerholt hw@gilawa.com wrote:
Hello,
thanks for reproducing it with a recent version. Could you maybe share (privately by e-mail) the routing data SQL dump that we reproduce it? Feel free to remove any private information like host names etc.., as long as it keeps crashing its fine.
Cheers,
Henning
--
Henning Westerholt – https://skalatan.de/blog/
Kamailio services – https://gilawa.com
*From:* Maharaja Azhagiah er.maharaja@gmail.com *Sent:* Mittwoch, 14. August 2024 03:50 *To:* Henning Westerholt hw@gilawa.com *Cc:* Kamailio (SER) - Users Mailing List sr-users@lists.kamailio.org *Subject:* Re: [SR-Users] kamailio randomly crashes
Hi all
Could you please help with this core dump? Kamailio crashes frequently after the upgrade. Atleast once a day.
Maharaja Azhagiah
Sent from my iPhone
On Aug 9, 2024, at 14:27, Maharaja Azhagiah er.maharaja@gmail.com wrote:
Hi Henning, Hello all
I have updated kamailio to 5.8.2 and I still see the crash during reload of carrierroute module.
kamailio version:
version: kamailio 5.8.2 (x86_64/linux) 164d1e flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, MEM_JOIN_FREE, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_SEND_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 164d1e compiled on 17:00:04 Aug 8 2024 with gcc 8.3.0
core dump backtrace:
Program terminated with signal SIGSEGV, Segmentation fault. #0 load_route_data_db (rd=0x789fcce42c20) at cr_db.c:432 432 if(rd->carriers[i]->domains[j]->sum_prob == 0.0) { (gdb) bt full #0 load_route_data_db (rd=0x789fcce42c20) at cr_db.c:432 res = 0x78a049e3e4a0 row = 0x78a049e43070 i = 0 j = 109 ret = 59 tmp_carrier_data = 0x789fd380f9a0 query_str = {s = 0x789fc84fda40 <query> "SELECT DISTINCT domain FROM carrierroute WHERE carrier=1000", len = 59} tmp_scan_prefix = {s = 0x5ba512e96630 "12345", len = 5} tmp_rewrite_host = {s = 0x5ba512e9663c "127.0.0.100:9000;transport=udp", len = 30} tmp_rewrite_prefix = {s = 0x5ba512e9665d "444", len = 3} tmp_rewrite_suffix = {s = 0x5ba512e96661 "555", len = 3} tmp_host_name = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -928288768} tmp_reply_code = {s = 0x789fc84ee1c0 <__func__.5976> "reload_route_data", len = -934355152} tmp_comment = {s = 0x5ba512e96665 "IMPORTED - kanchan_route_rule", len = 30} p_tmp_comment = 0x7fff3d14f8b0 __func__ = "load_route_data_db" n = 0 #1 0x0000789fc84aaccd in reload_route_data () at cr_data.c:187 old_data = 0x5ba512e4d010 new_data = 0x789fcce42c20 i = 23461 __func__ = "reload_route_data" #2 0x0000789fc84ca080 in cr_rpc_reload_routes (rpc=0x78a049326c80 <func_param>, c=0x78a049326ba0 <_jsonrpc_ctx_global>) at cr_rpc.c:64 __func__ = "cr_rpc_reload_routes" #3 0x000078a049306e08 in jsonrpc_exec_ex (cmd=0x7fff3d14fce0, rpath=0x0, spath=0x0) at jsonrpcs_mod.c:1588 rpce = 0x78a049e3d6f0 ctx = 0x78a049326ba0 <_jsonrpc_ctx_global> ret = -1 nj = 0x0 val = {s = 0x5ba512cfcc10 "cr.reload_routes", len = 16} scmd = {s = 0x78a049bb09e0 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} rdata = 0 mode = 1234975676 __func__ = "jsonrpc_exec_ex" #4 0x000078a049307244 in jsonrpc_exec (msg=0x78a049e2d200, cmd=0x78a049be54f0 "\340\t\273I\240x", s2=0x0) at jsonrpcs_mod.c:1609 scmd = {s = 0x78a049bb09e0 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec" #5 0x00005ba511455344 in do_action (h=0x7fff3d150610, a=0x78a049be52a0, msg=0x78a049e2d200) at core/action.c:1127 ret = -5 li = 5010672 v = 4526144 dst = {send_sock = 0x20, to = {s = {sa_family = 28672, sa_data = "\253\310\237x\000\000Vw#I\240x\000"}, sin = {sin_family = 28672, sin_port = 51371, sin_addr = {s_addr = 30879}, sin_zero = "Vw#I\240x\000"}, sin6 = {sin6_family = 28672, sin6_port = 51371, sin6_flowinfo = 30879, sin6_addr = {__in6_u = {__u6_addr8 = "Vw#I\240x\000\000\000\001\000\000\000\000\000", __u6_addr16 = {30550, 18723, 30880, 0, 256, 0, 0, 0}, __u6_addr32 = {1227061078, 30880, 256, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 28672, __ss_padding = "\253\310\237x\000\000Vw#I\240x\000\000\000\001", '\000' <repeats 22 times>, "\002\000\000\000D\000\000\000eWr\021\245[\000\000\020\002\025=\377\177\000\000\020\220\235I\240x\000\000\020\345\343I\240x\000\000\020\220\235I\240x\000\000P\002\025=\377\177\000\000`\357+I\240x\000\000\020\345\343I\240x\000\000\000\000\000\000\000\000\000", __ss_align = 134217728}}, id = 129691584, send_flags = {f = 0, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -14 '\362', proto_pad1 = 51} tmp = 0x7fff3d150400 "\220\005\025=\377\177" new_uri = 0x0 end = 0x789fc8ab7000 "" crt = 0x78a00000000f "" cmd = 0x78a049b686f8 len = 30880 user = 1225632696 uri = {user = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 294227363}, passwd = {s = 0x7fff3d150070 "", len = 292717502}, host = {s = 0x78a04925aa30 "tm", len = 292815521}, port = {s = 0x7fff3d150080 "\240\344\343I\b", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x789fd380fa70 "\300\300\300\300", len = 0}, headers = {s = 0x0, len = 0}, port_no = 58528, proto = 18915, type = 8, flags = (unknown: 3548445248), transport = {s = 0x0, len = 0}, ttl = { s = 0x789fd380fa70 "\300\300\300\300", len = -746522648}, user_param = {s = 0x7fff3d1502a0 "\353[\214\021\245[", len = 289836420}, maddr = {s = 0x16e00000000 <error: Cannot access memory at address 0x16e00000000>, len = -746514208}, method = { s = 0x789fd380fa70 "\300\300\300\300", len = -746513728}, lr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 293855368}, r2 = {s = 0x0, len = -2147483648}, gr = {s = 0x408000000 <error: Cannot access memory at address 0x408000000>, len = 294409814}, transport_val = {s = 0x7fff3d150140 "\360\001\025=\377\177", len = 290331077}, ttl_val = {s = 0x7fff3d150200 "\020\345\343I\240x", len = 293063450}, user_param_val = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 293855368}, maddr_val = {s = 0x7fff3d1501f0 "P\002\025=\377\177", len = 290351217}, method_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1238894608}, lr_val = {s = 0x789fc839852d "", len = -935754475}, r2_val = { s = 0x7fff3d1503e0 "", len = 1024787904}, gr_val = {s = 0x78a049237748 <__func__.10408> "str_duplicate", len = 1227061078}} next_hop = {user = {s = 0x78a049e3e7f0 "P", len = 1239671616}, passwd = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 293855368}, host = {s = 0x0, len = 1235062800}, port = {s = 0x320 <error: Cannot access memory at address 0x320>, len = 1239671904}, params = {s = 0x7fff3d14ff00 "\360\001\025=\377\177", len = 293855368}, sip_params = {s = 0x0, len = -2147483648}, headers = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 294227363}, port_no = 496, proto = 15637, type = 32767, flags = (unknown: 1226855508), transport = {s = 0x4d38129f0 <error: Cannot access memory at address 0x4d38129f0>, len = 294334100}, ttl = {s = 0x7fff3d150020 "p", len = 0}, user_param = {s = 0x789fd38118e0 "\vPH\310\237x", len = -746522000}, maddr = {s = 0x78a049e3e980 "\020", len = 1235062800}, method = {s = 0x78a04925aa30 "tm", len = 1227616096}, lr = {s = 0x78a04925ab48 <__func__.11229> "insert_tmcb", len = 1227205171}, r2 = { s = 0x30 <error: Cannot access memory at address 0x30>, len = -928288768}, gr = {s = 0x33e9d0 <error: Cannot access memory at address 0x33e9d0>, len = 4523904}, transport_val = {s = 0x4c74f0 <error: Cannot access memory at address 0x4c74f0>, len = 16}, ttl_val = {s = 0x21 <error: Cannot access memory at address 0x21>, len = 1235062800}, user_param_val = {s = 0x7fff3d14ffe0 " ", len = 290364176}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1}, method_val = { s = 0x6a499dba50 <error: Cannot access memory at address 0x6a499dba50>, len = -746509952}, lr_val = {s = 0x13d150020 <error: Cannot access memory at address 0x13d150020>, len = -928020096}, r2_val = {s = 0x7fff3d150020 "p", len = 292648555}, gr_val = { --Type <RET> for more, q to quit, c to continue without paging--c s = 0x0, len = -928020096}} u = 0xc8af8980 port = 0 dst_host = 0x78a049e2d200 i = 0 flags = 0 avp = 0x5ba5117835c4 <parse_headers+2253> st = {flags = 1, id = 0, name = {n = -3961760297202483200, s = {s = 0xc905000000000000 <error: Cannot access memory at address 0xc905000000000000>, len = 1024786096}, re = 0xc905000000000000}, avp = 0x7fff3d1500b0} sct = 0x499da950 sjt = 0x32499da3d0 rve = 0x5ba511898da3 mct = 0x5499da950 rv = 0x0 rv1 = 0x7fff3d150490 c1 = {cache_type = 1227194491, val_type = 30880, c = {avp_val = {n = 1447403978752, s = {s = 0x15100000000 <error: Cannot access memory at address 0x15100000000>, len = 1227194784}, re = 0x15100000000}, pval = {rs = {s = 0x15100000000 <error: Cannot access memory at address 0x15100000000>, len = 1227194784}, ri = 132629817295280, flags = 1239671968}}, i2s = "\020\220\235I\240x", '\000' <repeats 15 times>} s = {s = 0x0, len = 0} srevp = {0x7fff3d14ff00, 0x5ba51171d15c <qm_free+7904>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x00005ba511463ab9 in run_actions (h=0x7fff3d150610, a=0x78a049be4420, msg=0x78a049e2d200) at core/action.c:1618 t = 0x78a049be52a0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 1220678640, tz_dsttime = 30880} tdiff = 1239601600 __func__ = "run_actions" #7 0x0000789fc8393faa in timer_handler (ticks=558041136, tl=0x789fcf665990, data=0x789fcf6658a0) at timer.c:216 msg = 0x78a049e2d200 a = 0x789fcf6658a0 ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {100764521586824, 5537789872794009978, 0, 2147483648, 134217728, 100764521958819, 5537789872844341626, 319322550229959034}, __mask_was_saved = 0, __saved_mask = {__val = {100764521958819, 140734218176272, 132629810783733, 0, 149798025884812256, 6872972461760, 132627664605952, 140734218176192, 132627656018865, 1095216660481, 132627662081200, 140734218176272, 140734218176224, 132627655829876, 0, 140734218176272}}}}} keng = 0x0 evname = {s = 0x789fc839816a "timer", len = 5} __func__ = "timer_handler" #8 0x00005ba5114e8c93 in slow_timer_main () at core/timer.c:1103 n = 12 ret = 4294967295 tl = 0x789fcf665990 i = 7 __func__ = "slow_timer_main" #9 0x00005ba5113e4aff in main_loop () at main.c:1915 i = 16 pid = 0 si = 0x0 si_desc = "udp receiver child=15 sock=10.9.0.28:5101 ( 35.227.52.202:5101)\000\000\000\000\000\b\000\000\000\000\320\334\332I\240x", '\000' <repeats 13 times>, "\200\000\000\000\000\000\000\000\b\000\000\000\000\243\215\211\021\245[\000\000\340\t\025=\377\177\000\000d\026\245Q\240x\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x00005ba5113f02d3 in main (argc=8, argv=0x7fff3d150f18) at main.c:3256 cfg_stream = 0x5ba512ce2260 c = -1 r = 0 tmp = 0x7fff3d152d84 "" tmp_len = 0 port = 5060 proto = 0 aproto = 0 ahost = 0x0 aport = 0 options = 0x5ba511841378 ":f:cm:M:dVIhEeb:B:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3317072467 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x0 p = 0x78a051a9b995 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} l1 = 2048 tbuf = "`\017\025=\377\177\000\000\330K\275Q\240x\000\000\000\000\000\000\000\000\000\000\020+\331Q\240x\000\000\001", '\000' <repeats 15 times>, "\214#\241Q\240x\000\000(F\330Q\240x\000\000`\016\025=\377\177\000\000\312\224\331Q\240x\000\000\000\000\000\000\000\000\000\000@\205\273Q\240x\000\000\320\323\274Q\240x\000\000\204\016\025=\377\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>... option_index = 0 long_options = {{name = 0x5ba5118436d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5ba51183e55c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x5ba5118436db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x5ba5118436e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x5ba5118436e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x5ba5118436f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x5ba5118436fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5ba511843704 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5ba51184370f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5ba511843718 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5ba511843723 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x5ba511843729 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x5ba511843733 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x5ba51184373a "all-errors", has_arg = 0, flag = 0x0, val = 1035}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" (gdb) list 427 } 428 } while(RES_ROW_N(res) > 0); 429 430 for(i = 0; i < rd->carrier_num; ++i) { 431 for(j = 0; j < rd->carriers[i]->domain_num; ++j) { 432 if(rd->carriers[i]->domains[j]->sum_prob == 0.0) { 433 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d " 434 "(%.*s) have probability 0.\n", 435 rd->carriers[i]->id, rd->carriers[i]->name->len, 436 rd->carriers[i]->name->s, (gdb)
I couldn't understand what exactly is wrong with the carrierroute module.
Thank you for your help in advance.
Regards
*Maharaja Azhagiah*
On Wed, Jul 24, 2024 at 3:28 AM Henning Westerholt hw@gilawa.com wrote:
Hello,
my suggestion would be to do an update to e.g. 5.8.2, as the version 5.4.9 is long end of life. It crashed during a routing reload for carrierroute module.
If you are still seeing crashes after the update, please let us know.
Cheers,
Henning
--
Henning Westerholt – https://skalatan.de/blog/
Kamailio services – https://gilawa.com
*From:* Maharaja Azhagiah via sr-users sr-users@lists.kamailio.org *Sent:* Dienstag, 23. Juli 2024 21:50 *To:* Kamailio (SER) - Users Mailing List sr-users@lists.kamailio.org *Cc:* Maharaja Azhagiah er.maharaja@gmail.com *Subject:* [SR-Users] kamailio randomly crashes
Hi all,
I have kamailio running in GKE (Google Kubernetes) and recently seeing kamailio crashes frequently and I couldn't find the reason for the crash
kamailio version
version: kamailio 5.4.9 (x86_64/linux) 7d022d flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 7d022d compiled on 14:26:30 Jul 10 2024 with gcc 8.3.0
kamailio core generation:
Core was generated by `kamailio -e -E -DD -M 128 -m 2048'. Program terminated with signal SIGSEGV, Segmentation fault. #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) {
bt:
(gdb) bt #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 #9 0x00005745eb3a85bd in main_loop () at main.c:1765 #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942
bt full:
(gdb) bt full #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 res = 0x7ca4f636a4a8 row = 0x7ca4f642a7f8 i = 0 j = 110 ret = 56 tmp_carrier_data = 0x7ca479ff5068 query_str = {s = 0x7ca474cdd800 <query> "SELECT DISTINCT domain FROM carrierroute WHERE carrier=8", len = 56} tmp_scan_prefix = {s = 0x5745ed889f68 "13235791374", len = 11} tmp_rewrite_host = {s = 0x5745ed889f7a "sip.telnyx.com;transport=TLS", len = 28} tmp_rewrite_prefix = {s = 0x5745ed889f99 "", len = 0} tmp_rewrite_suffix = {s = 0x5745ed889f9a "", len = 0} tmp_host_name = {s = 0x40 <error: Cannot access memory at address 0x40>, len = 1965559808} tmp_reply_code = {s = 0x7ca474ccf2b0 <__func__.5843> "reload_route_data", len = 1959587872} tmp_comment = {s = 0x5745ed889f9b "IMPORTED - WTJHSX", len = 18} p_tmp_comment = 0x7ffd774f30b0 __func__ = "load_route_data_db" n = 0 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 old_data = 0x5745ed850150 new_data = 0x7ca482a48840 i = 22341 __func__ = "reload_route_data" #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 __func__ = "cr_rpc_reload_routes" #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 rpce = 0x7ca4f6425fb8 ctx = 0x7ca4f5a329c0 <_jsonrpc_ctx_global> ret = -1 nj = 0x0 val = {s = 0x5745ed845010 "cr.reload_routes", len = 16} scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec_ex" #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec" #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 41744, sa_data = "6\366\244|\000\000\035u\271t\244|\000"}, sin = {sin_family = 41744, sin_port = 63030, sin_addr = {s_addr = 31908}, sin_zero = "\035u\271t\244|\000"}, sin6 = {sin6_family = 41744, sin6_port = 63030, sin6_flowinfo = 31908, sin6_addr = {__in6_u = {__u6_addr8 = "\035u\271t\244|\000\000\005u\271t\244|\000", __u6_addr16 = {29981, 29881, 31908, 0, 29957, 29881, 31908, 0}, __u6_addr32 = {1958311197, 31908, 1958311173, 31908}}}, sin6_scope_id = 2001680800}, sas = {ss_family = 41744, __ss_padding = "6\366\244|\000\000\035u\271t\244|\000\000\005u\271t\244|\000\000\240\071Ow\375\177\000\000/.:\365\244|\000\000\320:Ow\375\177\000\000\327\337j\353EW\000\000\320\071Ow\375\177\000\000\020@ \016\366\244|\000\000\030\245\066\366\244|\000\000\020@\016\366\244|\000\000\020:Ow\375\177\000\000\356u\236\365\244|\000\000\030\245\066\366\244|\000\000\000\000\000\000\000\000\000", __ss_align = 134217728}}, id = 130848392, send_flags = {f = 0, blst_imask = 0}, proto = 56 '8', proto_pad0 = 5 '\005', proto_pad1 = 36} tmp = 0x7ca4f641a9f8 "\344\032" new_uri = 0xed3 <error: Cannot access memory at address 0xed3> end = 0x7ca474b9751b "\r\n" crt = 0x2 <error: Cannot access memory at address 0x2> cmd = 0x7ca4f617b7d8 len = 0 user = 15 uri = {user = {s = 0x9774f3800 <error: Cannot access memory at address 0x9774f3800>, len = 621}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1721781302}, host = {s = 0x0, len = -2147483648}, port = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, params = {s = 0x7ffd774f38e0 "09Ow\375\177", len = -167557169}, sip_params = { s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, headers = {s = 0x1700000000 <error: Cannot access memory at address 0x1700000000>, len = 2001681040}, port_no = 14800, proto = 30543, type = 32765, flags = (unknown: 4130775280), transport = {s = 0x0, len = 2009201968}, ttl = {s = 0x6774f3a50 <error: Cannot access memory at address 0x6774f3a50>, len = -181058744}, user_param = { s = 0x17200000000 <error: Cannot access memory at address 0x17200000000>, len = 2099608304}, maddr = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -344235896}, method = {s = 0x0, len = -2147483648}, lr = { --Type <RET> for more, q to quit, c to continue without paging-- s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, r2 = {s = 0x7ffd774f38d0 "`9Ow\375\177", len = -166931844}, gr = {s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, transport_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -181636538}, ttl_val = {s = 0x7ffd774f3930 "`9Ow\375\177", len = -167555326}, user_param_val = {s = 0x0, len = 2}, maddr_val = { s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, method_val = {s = 0x177d6038c8 <error: Cannot access memory at address 0x177d6038c8>, len = 2001681040}, lr_val = {s = 0xe00000000 <error: Cannot access memory at address 0xe00000000>, len = 1958311183}, r2_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -164191464}, gr_val = { s = 0x7ffd774f39f0 "\373\377\377\377", len = -344973614}} next_hop = {user = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, passwd = {s = 0x7ffd774f3720 "\020\070Ow\375\177", len = -166975523}, host = { s = 0x7ffd774f3740 "\020\070Ow\375\177", len = -166887566}, port = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, params = {s = 0x7ffd774f3d50 "", len = -164192016}, sip_params = {s = 0x0, len = -30810208}, headers = {s = 0x0, len = -181051830}, port_no = 8055, proto = 62988, type = 31908, flags = (unknown: 4128077712), transport = { s = 0x4774f37d0 <error: Cannot access memory at address 0x4774f37d0>, len = 2001680544}, ttl = {s = 0x669fa379 <error: Cannot access memory at address 0x669fa379>, len = -164192016}, user_param = { s = 0x5745ed7743b0 "'sip:+13194676789@us.test.com',NULL,0)", len = 1721781302}, maddr = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -167513741}, method = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, lr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -167567737}, r2 = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, gr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -166977673}, transport_val = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, ttl_val = {s = 0x7ffd774f3a90 "\330\267\027\366\244|", len = 23}, user_param_val = { s = 0x5745ed77417a "3071,3795,'6e1a9c34-cec5-4ebb-bcd9-3356d80bcf9e',' sip:+13194004696@sip.telnyx.com','c5SS3F27B8rDN',' sip:+13194676789@us.test.com','f9b9b2c48ef41ef90eb05056b0a794','tls: 10.16.0.74:520"..., len = -164192016}, maddr_val = {s = 0x7ca4f60dcf18 "`", len = -31060352}, method_val = {s = 0x0, len = -180627954}, lr_val = {s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7ca4f5817bc8 port = 0 dst_host = 0x7ca474b9751d i = -344941541 flags = 0 avp = 0x7ffd774f3c40 st = {flags = 3984015424, id = 22341, name = {n = -310010607, s = {s = 0x5745ed859d11 "", len = 2001679968}, re = 0x5745ed859d11}, avp = 0x66a04c36} sct = 0x60f60e6120 sjt = 0x5f60e6a50 rve = 0x8000000 mct = 0x0 rv = 0xffffffff rv1 = 0x5745eb7fc993 c1 = {cache_type = 10, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 2001679912, flags = 32765}}, i2s = "`6Ow\375\177\000\000\031\241\a\366\244|\000\000\250\003\000\000\000"} s = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -164179120} srevp = {0x3, 0x64870454268b4200} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 t = 0x7ca4f61f1a50 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 60, tz_dsttime = 0} tdiff = 4131498432 __func__ = "run_actions" #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 msg = 0x7ca4f641a9f8 a = 0x7ca47b2f7868 ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {95957815091336, 8333654393230933038, 0, 2147483648, 134217728, 95957815380371, 8333654393012829230, 2510245087605373998}, __mask_was_saved = 0, __saved_mask = {__val = {137047930071236, 0, 25985340079663656, 140726605135616, 137045787154760, 70721158768, 137045787160648, 140726605135472, 137045776334895, 1095350878208, 137045782276504, 140735195070144, 140726605135504, 137045776144708, 0, 140726605135552}}}}} keng = 0x0 evname = {s = 0x7ca474b9715a "timer", len = 5} __func__ = "timer_handler" --Type <RET> for more, q to quit, c to continue without paging-- #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 n = 12 ret = 4294967295 tl = 0x7ca47b2f7950 i = 1010 __func__ = "slow_timer_main" #9 0x00005745eb3a85bd in main_loop () at main.c:1765 i = 16 pid = 0 si = 0x0 si_desc = "udp receiver child=15 sock=10.16.0.74:5101 ( 35.202.133.184:5101)\000AOw\375\177\000\000d\366\023\376\244|\000\000 \000\000\000\060\000\000\000@AOw\375\177\000\000\200@Ow \375\177\000\000\000B\213&T\004\207d\223\311\177\353EW\000\000\240\274\065\366\244|\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942 cfg_stream = 0x5745ed74d2a0 c = -1 r = 0 tmp = 0x7ffd774f5d9f "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x5745eb7b8d78 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1555962608 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x7ffd77580248 p = 0x7ca4fe189995 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} tbuf = "\b\000\000\000\000\000\000\000\210FOw\375\177\000\000\320FOw\375\177\000\000\330+,\376\244|\000\000\000\000\000\000\000\000\000\000\020\vH\376\244|\000\000\001", '\000' <repeats 19 times>, " \000\000\000(&G\376\244|\000\000\320EOw\375\177\000\000\312tH\376\244|\000\000\000\000\000\000\000\000\000\000@e*\376\244|\000\000\320\263+\376\244|\000\000\364EOw\375\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 186 times>... option_index = 0 long_options = {{name = 0x5745eb7baf46 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5745eb7b6524 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x5745eb7baf4b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x5745eb7baf51 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x5745eb7baf57 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x5745eb7baf60 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x5745eb7baf6a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5745eb7baf74 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5745eb7baf7f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5745eb7baf88 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5745eb7baf93 "debug", has_arg = 1, flag = 0x0, val = 1032}, { name = 0x5745eb7baf99 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main"
(gdb) list 411 } 412 } while(RES_ROW_N(res) > 0); 413 414 for (i = 0; i < rd->carrier_num; ++i) { 415 for (j = 0; j < rd->carriers[i]->domain_num; ++j) { 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) { 417 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d (%.*s) have probability 0.\n", 418 rd->carriers[i]->id, rd->carriers[i]->name->len, rd->carriers[i]->name->s, 419 rd->carriers[i]->domains[j]->id, rd->carriers[i]->domains[j]->name->len, rd->carriers[i]->domains[j]->name->s); 420 }
Please help to understand the reason for the crash and how to fix the problem.
Thank you in advance.
Regards
*Maharaja Azhagiah*
Thanks for reporting it back. It should not crash, but of course the DB situation could create some special error cases in the module.
Cheers,
Henning
From: Maharaja Azhagiah er.maharaja@gmail.com Sent: Dienstag, 27. August 2024 22:59 To: Henning Westerholt hw@gilawa.com Cc: Kamailio (SER) - Users Mailing List sr-users@lists.kamailio.org Subject: Re: [SR-Users] kamailio randomly crashes
Hi Henning
Since you have mentioned the crash was due to carrierroute, I checked our carrierroute table and noticed we are importing carrierroute from another DB in intervals. Due to a bug we are trying to import carrierroute records for domains that were deleted though they are marked as deleted in our DB as well. After fixing those imports, I don't see any crashes related to carrierroute but still had one crash last week. I couldn't find any details in the core dump. Hence monitoring the servers for now. I will update if kamailio crashes again.
Thank you again for pointing to the right direction.
Regards
Maharaja Azhagiah
On Wed, Aug 14, 2024 at 4:21 AM Henning Westerholt <hw@gilawa.commailto:hw@gilawa.com> wrote: Hello,
thanks for reproducing it with a recent version. Could you maybe share (privately by e-mail) the routing data SQL dump that we reproduce it? Feel free to remove any private information like host names etc.., as long as it keeps crashing its fine.
Cheers,
Henning
-- Henning Westerholt – https://skalatan.de/blog/ Kamailio services – https://gilawa.comhttps://gilawa.com/
From: Maharaja Azhagiah <er.maharaja@gmail.commailto:er.maharaja@gmail.com> Sent: Mittwoch, 14. August 2024 03:50 To: Henning Westerholt <hw@gilawa.commailto:hw@gilawa.com> Cc: Kamailio (SER) - Users Mailing List <sr-users@lists.kamailio.orgmailto:sr-users@lists.kamailio.org> Subject: Re: [SR-Users] kamailio randomly crashes
Hi all
Could you please help with this core dump? Kamailio crashes frequently after the upgrade. Atleast once a day. Maharaja Azhagiah
Sent from my iPhone
On Aug 9, 2024, at 14:27, Maharaja Azhagiah <er.maharaja@gmail.commailto:er.maharaja@gmail.com> wrote: Hi Henning, Hello all
I have updated kamailio to 5.8.2 and I still see the crash during reload of carrierroute module.
kamailio version:
version: kamailio 5.8.2 (x86_64/linux) 164d1e flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, MEM_JOIN_FREE, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_SEND_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 164d1e compiled on 17:00:04 Aug 8 2024 with gcc 8.3.0
core dump backtrace:
Program terminated with signal SIGSEGV, Segmentation fault. #0 load_route_data_db (rd=0x789fcce42c20) at cr_db.c:432 432 if(rd->carriers[i]->domains[j]->sum_prob == 0.0) { (gdb) bt full #0 load_route_data_db (rd=0x789fcce42c20) at cr_db.c:432 res = 0x78a049e3e4a0 row = 0x78a049e43070 i = 0 j = 109 ret = 59 tmp_carrier_data = 0x789fd380f9a0 query_str = {s = 0x789fc84fda40 <query> "SELECT DISTINCT domain FROM carrierroute WHERE carrier=1000", len = 59} tmp_scan_prefix = {s = 0x5ba512e96630 "12345", len = 5} tmp_rewrite_host = {s = 0x5ba512e9663c "127.0.0.100:9000;transport=udp", len = 30} tmp_rewrite_prefix = {s = 0x5ba512e9665d "444", len = 3} tmp_rewrite_suffix = {s = 0x5ba512e96661 "555", len = 3} tmp_host_name = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -928288768} tmp_reply_code = {s = 0x789fc84ee1c0 <__func__.5976> "reload_route_data", len = -934355152} tmp_comment = {s = 0x5ba512e96665 "IMPORTED - kanchan_route_rule", len = 30} p_tmp_comment = 0x7fff3d14f8b0 __func__ = "load_route_data_db" n = 0 #1 0x0000789fc84aaccd in reload_route_data () at cr_data.c:187 old_data = 0x5ba512e4d010 new_data = 0x789fcce42c20 i = 23461 __func__ = "reload_route_data" #2 0x0000789fc84ca080 in cr_rpc_reload_routes (rpc=0x78a049326c80 <func_param>, c=0x78a049326ba0 <_jsonrpc_ctx_global>) at cr_rpc.c:64 __func__ = "cr_rpc_reload_routes" #3 0x000078a049306e08 in jsonrpc_exec_ex (cmd=0x7fff3d14fce0, rpath=0x0, spath=0x0) at jsonrpcs_mod.c:1588 rpce = 0x78a049e3d6f0 ctx = 0x78a049326ba0 <_jsonrpc_ctx_global> ret = -1 nj = 0x0 val = {s = 0x5ba512cfcc10 "cr.reload_routes", len = 16} scmd = {s = 0x78a049bb09e0 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} rdata = 0 mode = 1234975676 __func__ = "jsonrpc_exec_ex" #4 0x000078a049307244 in jsonrpc_exec (msg=0x78a049e2d200, cmd=0x78a049be54f0 "\340\t\273I\240x", s2=0x0) at jsonrpcs_mod.c:1609 scmd = {s = 0x78a049bb09e0 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec" #5 0x00005ba511455344 in do_action (h=0x7fff3d150610, a=0x78a049be52a0, msg=0x78a049e2d200) at core/action.c:1127 ret = -5 li = 5010672 v = 4526144 dst = {send_sock = 0x20, to = {s = {sa_family = 28672, sa_data = "\253\310\237x\000\000Vw#I\240x\000"}, sin = {sin_family = 28672, sin_port = 51371, sin_addr = {s_addr = 30879}, sin_zero = "Vw#I\240x\000"}, sin6 = {sin6_family = 28672, sin6_port = 51371, sin6_flowinfo = 30879, sin6_addr = {__in6_u = {__u6_addr8 = "Vw#I\240x\000\000\000\001\000\000\000\000\000", __u6_addr16 = {30550, 18723, 30880, 0, 256, 0, 0, 0}, __u6_addr32 = {1227061078, 30880, 256, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 28672, __ss_padding = "\253\310\237x\000\000Vw#I\240x\000\000\000\001", '\000' <repeats 22 times>, "\002\000\000\000D\000\000\000eWr\021\245[\000\000\020\002\025=\377\177\000\000\020\220\235I\240x\000\000\020\345\343I\240x\000\000\020\220\235I\240x\000\000P\002\025=\377\177\000\000`\357+I\240x\000\000\020\345\343I\240x\000\000\000\000\000\000\000\000\000", __ss_align = 134217728}}, id = 129691584, send_flags = {f = 0, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -14 '\362', proto_pad1 = 51} tmp = 0x7fff3d150400 "\220\005\025=\377\177" new_uri = 0x0 end = 0x789fc8ab7000 "" crt = 0x78a00000000f "" cmd = 0x78a049b686f8 len = 30880 user = 1225632696 uri = {user = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 294227363}, passwd = {s = 0x7fff3d150070 "", len = 292717502}, host = {s = 0x78a04925aa30 "tm", len = 292815521}, port = {s = 0x7fff3d150080 "\240\344\343I\b", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x789fd380fa70 "\300\300\300\300", len = 0}, headers = {s = 0x0, len = 0}, port_no = 58528, proto = 18915, type = 8, flags = (unknown: 3548445248), transport = {s = 0x0, len = 0}, ttl = { s = 0x789fd380fa70 "\300\300\300\300", len = -746522648}, user_param = {s = 0x7fff3d1502a0 "\353[\214\021\245[", len = 289836420}, maddr = {s = 0x16e00000000 <error: Cannot access memory at address 0x16e00000000>, len = -746514208}, method = { s = 0x789fd380fa70 "\300\300\300\300", len = -746513728}, lr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 293855368}, r2 = {s = 0x0, len = -2147483648}, gr = {s = 0x408000000 <error: Cannot access memory at address 0x408000000>, len = 294409814}, transport_val = {s = 0x7fff3d150140 "\360\001\025=\377\177", len = 290331077}, ttl_val = {s = 0x7fff3d150200 "\020\345\343I\240x", len = 293063450}, user_param_val = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 293855368}, maddr_val = {s = 0x7fff3d1501f0 "P\002\025=\377\177", len = 290351217}, method_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1238894608}, lr_val = {s = 0x789fc839852d "", len = -935754475}, r2_val = { s = 0x7fff3d1503e0 "", len = 1024787904}, gr_val = {s = 0x78a049237748 <__func__.10408> "str_duplicate", len = 1227061078}} next_hop = {user = {s = 0x78a049e3e7f0 "P", len = 1239671616}, passwd = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 293855368}, host = {s = 0x0, len = 1235062800}, port = {s = 0x320 <error: Cannot access memory at address 0x320>, len = 1239671904}, params = {s = 0x7fff3d14ff00 "\360\001\025=\377\177", len = 293855368}, sip_params = {s = 0x0, len = -2147483648}, headers = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 294227363}, port_no = 496, proto = 15637, type = 32767, flags = (unknown: 1226855508), transport = {s = 0x4d38129f0 <error: Cannot access memory at address 0x4d38129f0>, len = 294334100}, ttl = {s = 0x7fff3d150020 "p", len = 0}, user_param = {s = 0x789fd38118e0 "\vPH\310\237x", len = -746522000}, maddr = {s = 0x78a049e3e980 "\020", len = 1235062800}, method = {s = 0x78a04925aa30 "tm", len = 1227616096}, lr = {s = 0x78a04925ab48 <__func__.11229> "insert_tmcb", len = 1227205171}, r2 = { s = 0x30 <error: Cannot access memory at address 0x30>, len = -928288768}, gr = {s = 0x33e9d0 <error: Cannot access memory at address 0x33e9d0>, len = 4523904}, transport_val = {s = 0x4c74f0 <error: Cannot access memory at address 0x4c74f0>, len = 16}, ttl_val = {s = 0x21 <error: Cannot access memory at address 0x21>, len = 1235062800}, user_param_val = {s = 0x7fff3d14ffe0 " ", len = 290364176}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1}, method_val = { s = 0x6a499dba50 <error: Cannot access memory at address 0x6a499dba50>, len = -746509952}, lr_val = {s = 0x13d150020 <error: Cannot access memory at address 0x13d150020>, len = -928020096}, r2_val = {s = 0x7fff3d150020 "p", len = 292648555}, gr_val = { --Type <RET> for more, q to quit, c to continue without paging--c s = 0x0, len = -928020096}} u = 0xc8af8980 port = 0 dst_host = 0x78a049e2d200 i = 0 flags = 0 avp = 0x5ba5117835c4 <parse_headers+2253> st = {flags = 1, id = 0, name = {n = -3961760297202483200, s = {s = 0xc905000000000000 <error: Cannot access memory at address 0xc905000000000000>, len = 1024786096}, re = 0xc905000000000000}, avp = 0x7fff3d1500b0} sct = 0x499da950 sjt = 0x32499da3d0 rve = 0x5ba511898da3 mct = 0x5499da950 rv = 0x0 rv1 = 0x7fff3d150490 c1 = {cache_type = 1227194491, val_type = 30880, c = {avp_val = {n = 1447403978752, s = {s = 0x15100000000 <error: Cannot access memory at address 0x15100000000>, len = 1227194784}, re = 0x15100000000}, pval = {rs = {s = 0x15100000000 <error: Cannot access memory at address 0x15100000000>, len = 1227194784}, ri = 132629817295280, flags = 1239671968}}, i2s = "\020\220\235I\240x", '\000' <repeats 15 times>} s = {s = 0x0, len = 0} srevp = {0x7fff3d14ff00, 0x5ba51171d15c <qm_free+7904>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x00005ba511463ab9 in run_actions (h=0x7fff3d150610, a=0x78a049be4420, msg=0x78a049e2d200) at core/action.c:1618 t = 0x78a049be52a0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 1220678640, tz_dsttime = 30880} tdiff = 1239601600 __func__ = "run_actions" #7 0x0000789fc8393faa in timer_handler (ticks=558041136, tl=0x789fcf665990, data=0x789fcf6658a0) at timer.c:216 msg = 0x78a049e2d200 a = 0x789fcf6658a0 ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {100764521586824, 5537789872794009978, 0, 2147483648, 134217728, 100764521958819, 5537789872844341626, 319322550229959034}, __mask_was_saved = 0, __saved_mask = {__val = {100764521958819, 140734218176272, 132629810783733, 0, 149798025884812256, 6872972461760, 132627664605952, 140734218176192, 132627656018865, 1095216660481, 132627662081200, 140734218176272, 140734218176224, 132627655829876, 0, 140734218176272}}}}} keng = 0x0 evname = {s = 0x789fc839816a "timer", len = 5} __func__ = "timer_handler" #8 0x00005ba5114e8c93 in slow_timer_main () at core/timer.c:1103 n = 12 ret = 4294967295 tl = 0x789fcf665990 i = 7 __func__ = "slow_timer_main" #9 0x00005ba5113e4aff in main_loop () at main.c:1915 i = 16 pid = 0 si = 0x0 si_desc = "udp receiver child=15 sock=10.9.0.28:5101http://10.9.0.28:5101 (35.227.52.202:5101http://35.227.52.202:5101)\000\000\000\000\000\b\000\000\000\000\320\334\332I\240x", '\000' <repeats 13 times>, "\200\000\000\000\000\000\000\000\b\000\000\000\000\243\215\211\021\245[\000\000\340\t\025=\377\177\000\000d\026\245Q\240x\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x00005ba5113f02d3 in main (argc=8, argv=0x7fff3d150f18) at main.c:3256 cfg_stream = 0x5ba512ce2260 c = -1 r = 0 tmp = 0x7fff3d152d84 "" tmp_len = 0 port = 5060 proto = 0 aproto = 0 ahost = 0x0 aport = 0 options = 0x5ba511841378 ":f:cm:M:dVIhEeb:B:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3317072467 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x0 p = 0x78a051a9b995 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} l1 = 2048 tbuf = "`\017\025=\377\177\000\000\330K\275Q\240x\000\000\000\000\000\000\000\000\000\000\020+\331Q\240x\000\000\001", '\000' <repeats 15 times>, "\214#\241Q\240x\000\000(F\330Q\240x\000\000`\016\025=\377\177\000\000\312\224\331Q\240x\000\000\000\000\000\000\000\000\000\000@\205\273Q\240x\000\000\320\323\274Q\240x\000\000\204\016\025=\377\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>... option_index = 0 long_options = {{name = 0x5ba5118436d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5ba51183e55c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x5ba5118436db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x5ba5118436e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x5ba5118436e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x5ba5118436f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x5ba5118436fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5ba511843704 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5ba51184370f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5ba511843718 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5ba511843723 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x5ba511843729 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x5ba511843733 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x5ba51184373a "all-errors", has_arg = 0, flag = 0x0, val = 1035}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" (gdb) list 427 } 428 } while(RES_ROW_N(res) > 0); 429 430 for(i = 0; i < rd->carrier_num; ++i) { 431 for(j = 0; j < rd->carriers[i]->domain_num; ++j) { 432 if(rd->carriers[i]->domains[j]->sum_prob == 0.0) { 433 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d " 434 "(%.*s) have probability 0.\n", 435 rd->carriers[i]->id, rd->carriers[i]->name->len, 436 rd->carriers[i]->name->s, (gdb)
I couldn't understand what exactly is wrong with the carrierroute module.
Thank you for your help in advance.
Regards
Maharaja Azhagiah
On Wed, Jul 24, 2024 at 3:28 AM Henning Westerholt <hw@gilawa.commailto:hw@gilawa.com> wrote: Hello,
my suggestion would be to do an update to e.g. 5.8.2, as the version 5.4.9 is long end of life. It crashed during a routing reload for carrierroute module. If you are still seeing crashes after the update, please let us know.
Cheers,
Henning
-- Henning Westerholt – https://skalatan.de/blog/ Kamailio services – https://gilawa.comhttps://gilawa.com/
From: Maharaja Azhagiah via sr-users <sr-users@lists.kamailio.orgmailto:sr-users@lists.kamailio.org> Sent: Dienstag, 23. Juli 2024 21:50 To: Kamailio (SER) - Users Mailing List <sr-users@lists.kamailio.orgmailto:sr-users@lists.kamailio.org> Cc: Maharaja Azhagiah <er.maharaja@gmail.commailto:er.maharaja@gmail.com> Subject: [SR-Users] kamailio randomly crashes
Hi all,
I have kamailio running in GKE (Google Kubernetes) and recently seeing kamailio crashes frequently and I couldn't find the reason for the crash
kamailio version
version: kamailio 5.4.9 (x86_64/linux) 7d022d flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 7d022d compiled on 14:26:30 Jul 10 2024 with gcc 8.3.0
kamailio core generation:
Core was generated by `kamailio -e -E -DD -M 128 -m 2048'. Program terminated with signal SIGSEGV, Segmentation fault. #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) {
bt:
(gdb) bt #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 #9 0x00005745eb3a85bd in main_loop () at main.c:1765 #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942
bt full:
(gdb) bt full #0 load_route_data_db (rd=0x7ca482a48840) at cr_db.c:416 res = 0x7ca4f636a4a8 row = 0x7ca4f642a7f8 i = 0 j = 110 ret = 56 tmp_carrier_data = 0x7ca479ff5068 query_str = {s = 0x7ca474cdd800 <query> "SELECT DISTINCT domain FROM carrierroute WHERE carrier=8", len = 56} tmp_scan_prefix = {s = 0x5745ed889f68 "13235791374", len = 11} tmp_rewrite_host = {s = 0x5745ed889f7a "sip.telnyx.comhttp://sip.telnyx.com/;transport=TLS", len = 28} tmp_rewrite_prefix = {s = 0x5745ed889f99 "", len = 0} tmp_rewrite_suffix = {s = 0x5745ed889f9a "", len = 0} tmp_host_name = {s = 0x40 <error: Cannot access memory at address 0x40>, len = 1965559808} tmp_reply_code = {s = 0x7ca474ccf2b0 <__func__.5843> "reload_route_data", len = 1959587872} tmp_comment = {s = 0x5745ed889f9b "IMPORTED - WTJHSX", len = 18} p_tmp_comment = 0x7ffd774f30b0 __func__ = "load_route_data_db" n = 0 #1 0x00007ca474c8cc50 in reload_route_data () at cr_data.c:178 old_data = 0x5745ed850150 new_data = 0x7ca482a48840 i = 22341 __func__ = "reload_route_data" #2 0x00007ca474cabfdc in cr_rpc_reload_routes (rpc=0x7ca4f5a32aa0 <func_param>, c=0x7ca4f5a329c0 <_jsonrpc_ctx_global>) at cr_rpc.c:59 __func__ = "cr_rpc_reload_routes" #3 0x00007ca4f5a158a1 in jsonrpc_exec_ex (cmd=0x7ffd774f34b0, rpath=0x0) at jsonrpcs_mod.c:1425 rpce = 0x7ca4f6425fb8 ctx = 0x7ca4f5a329c0 <_jsonrpc_ctx_global> ret = -1 nj = 0x0 val = {s = 0x5745ed845010 "cr.reload_routes", len = 16} scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec_ex" #4 0x00007ca4f5a15ccd in jsonrpc_exec (msg=0x7ca4f641a9f8, cmd=0x7ca4f61bde20 "x\335\033\366\244|", s2=0x0) at jsonrpcs_mod.c:1445 scmd = {s = 0x7ca4f61bdd78 "{"jsonrpc": "2.0", "method": "cr.reload_routes", "id": 2}", len = 57} __func__ = "jsonrpc_exec" #5 0x00005745eb3fcb19 in do_action (h=0x7ffd774f3dc0, a=0x7ca4f61f1a50, msg=0x7ca4f641a9f8) at core/action.c:1085 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 41744, sa_data = "6\366\244|\000\000\035u\271t\244|\000"}, sin = {sin_family = 41744, sin_port = 63030, sin_addr = {s_addr = 31908}, sin_zero = "\035u\271t\244|\000"}, sin6 = {sin6_family = 41744, sin6_port = 63030, sin6_flowinfo = 31908, sin6_addr = {__in6_u = {__u6_addr8 = "\035u\271t\244|\000\000\005u\271t\244|\000", __u6_addr16 = {29981, 29881, 31908, 0, 29957, 29881, 31908, 0}, __u6_addr32 = {1958311197, 31908, 1958311173, 31908}}}, sin6_scope_id = 2001680800}, sas = {ss_family = 41744, __ss_padding = "6\366\244|\000\000\035u\271t\244|\000\000\005u\271t\244|\000\000\240\071Ow\375\177\000\000/.:\365\244|\000\000\320:Ow\375\177\000\000\327\337j\353EW\000\000\320\071Ow\375\177\000\000\020@\016\366\244|\000\000\030\245\066\366\244|\000\000\020@\016\366\244|\000\000\020:Ow\375\177\000\000\356u\236\365\244|\000\000\030\245\066\366\244|\000\000\000\000\000\000\000\000\000", __ss_align = 134217728}}, id = 130848392, send_flags = {f = 0, blst_imask = 0}, proto = 56 '8', proto_pad0 = 5 '\005', proto_pad1 = 36} tmp = 0x7ca4f641a9f8 "\344\032" new_uri = 0xed3 <error: Cannot access memory at address 0xed3> end = 0x7ca474b9751b "\r\n" crt = 0x2 <error: Cannot access memory at address 0x2> cmd = 0x7ca4f617b7d8 len = 0 user = 15 uri = {user = {s = 0x9774f3800 <error: Cannot access memory at address 0x9774f3800>, len = 621}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1721781302}, host = {s = 0x0, len = -2147483648}, port = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, params = {s = 0x7ffd774f38e0 "09Ow\375\177", len = -167557169}, sip_params = { s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, headers = {s = 0x1700000000 <error: Cannot access memory at address 0x1700000000>, len = 2001681040}, port_no = 14800, proto = 30543, type = 32765, flags = (unknown: 4130775280), transport = {s = 0x0, len = 2009201968}, ttl = {s = 0x6774f3a50 <error: Cannot access memory at address 0x6774f3a50>, len = -181058744}, user_param = { s = 0x17200000000 <error: Cannot access memory at address 0x17200000000>, len = 2099608304}, maddr = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -344235896}, method = {s = 0x0, len = -2147483648}, lr = { --Type <RET> for more, q to quit, c to continue without paging-- s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, r2 = {s = 0x7ffd774f38d0 "`9Ow\375\177", len = -166931844}, gr = {s = 0x7ca4f53704f0 <dialog_table_name> "l^5\365\244|", len = -164192016}, transport_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -181636538}, ttl_val = {s = 0x7ffd774f3930 "`9Ow\375\177", len = -167555326}, user_param_val = {s = 0x0, len = 2}, maddr_val = { s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, method_val = {s = 0x177d6038c8 <error: Cannot access memory at address 0x177d6038c8>, len = 2001681040}, lr_val = {s = 0xe00000000 <error: Cannot access memory at address 0xe00000000>, len = 1958311183}, r2_val = {s = 0x7ffd774f3960 "\035u\271t\244|", len = -164191464}, gr_val = { s = 0x7ffd774f39f0 "\373\377\377\377", len = -344973614}} next_hop = {user = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, passwd = {s = 0x7ffd774f3720 "\020\070Ow\375\177", len = -166975523}, host = { s = 0x7ffd774f3740 "\020\070Ow\375\177", len = -166887566}, port = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, params = {s = 0x7ffd774f3d50 "", len = -164192016}, sip_params = {s = 0x0, len = -30810208}, headers = {s = 0x0, len = -181051830}, port_no = 8055, proto = 62988, type = 31908, flags = (unknown: 4128077712), transport = { s = 0x4774f37d0 <error: Cannot access memory at address 0x4774f37d0>, len = 2001680544}, ttl = {s = 0x669fa379 <error: Cannot access memory at address 0x669fa379>, len = -164192016}, user_param = { s = 0x5745ed7743b0 "'sip:+13194676789@us.test.commailto:sip%3A%2B13194676789@us.test.com',NULL,0)", len = 1721781302}, maddr = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -167513741}, method = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, lr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -167567737}, r2 = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = -343946861}, gr = {s = 0x7ffd774f3810 "\340\070Ow\375\177", len = -166977673}, transport_val = {s = 0x7ca4f60431d0 <sql_str> "@@w\355EW", len = -164192016}, ttl_val = {s = 0x7ffd774f3a90 "\330\267\027\366\244|", len = 23}, user_param_val = { s = 0x5745ed77417a "3071,3795,'6e1a9c34-cec5-4ebb-bcd9-3356d80bcf9e','sip:+13194004696@sip.telnyx.commailto:sip%3A%2B13194004696@sip.telnyx.com','c5SS3F27B8rDN','sip:+13194676789@us.test.commailto:sip%3A%2B13194676789@us.test.com','f9b9b2c48ef41ef90eb05056b0a794','tls:10.16.0.74:520http://10.16.0.74:520/"..., len = -164192016}, maddr_val = {s = 0x7ca4f60dcf18 "`", len = -31060352}, method_val = {s = 0x0, len = -180627954}, lr_val = {s = 0x7ca4f60c1f77 <db_mysql_submit_query> "UH\211\345AWAVAUATSH\201\354\210", len = -166889584}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7ca4f5817bc8 port = 0 dst_host = 0x7ca474b9751d i = -344941541 flags = 0 avp = 0x7ffd774f3c40 st = {flags = 3984015424, id = 22341, name = {n = -310010607, s = {s = 0x5745ed859d11 "", len = 2001679968}, re = 0x5745ed859d11}, avp = 0x66a04c36} sct = 0x60f60e6120 sjt = 0x5f60e6a50 rve = 0x8000000 mct = 0x0 rv = 0xffffffff rv1 = 0x5745eb7fc993 c1 = {cache_type = 10, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 2001679912, flags = 32765}}, i2s = "`6Ow\375\177\000\000\031\241\a\366\244|\000\000\250\003\000\000\000"} s = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -164179120} srevp = {0x3, 0x64870454268b4200} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x00005745eb40b35c in run_actions (h=0x7ffd774f3dc0, a=0x7ca4f61f0468, msg=0x7ca4f641a9f8) at core/action.c:1584 t = 0x7ca4f61f1a50 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 60, tz_dsttime = 0} tdiff = 4131498432 __func__ = "run_actions" #7 0x00007ca474b92f8d in timer_handler (ticks=96802941, tl=0x7ca47b2f7950, data=0x7ca47b2f7868) at timer.c:216 msg = 0x7ca4f641a9f8 a = 0x7ca47b2f7868 ra_ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {95957815091336, 8333654393230933038, 0, 2147483648, 134217728, 95957815380371, 8333654393012829230, 2510245087605373998}, __mask_was_saved = 0, __saved_mask = {__val = {137047930071236, 0, 25985340079663656, 140726605135616, 137045787154760, 70721158768, 137045787160648, 140726605135472, 137045776334895, 1095350878208, 137045782276504, 140735195070144, 140726605135504, 137045776144708, 0, 140726605135552}}}}} keng = 0x0 evname = {s = 0x7ca474b9715a "timer", len = 5} __func__ = "timer_handler" --Type <RET> for more, q to quit, c to continue without paging-- #8 0x00005745eb49e3c4 in slow_timer_main () at core/timer.c:1105 n = 12 ret = 4294967295 tl = 0x7ca47b2f7950 i = 1010 __func__ = "slow_timer_main" #9 0x00005745eb3a85bd in main_loop () at main.c:1765 i = 16 pid = 0 si = 0x0 si_desc = "udp receiver child=15 sock=10.16.0.74:5101http://10.16.0.74:5101/ (35.202.133.184:5101http://35.202.133.184:5101/)\000AOw\375\177\000\000d\366\023\376\244|\000\000 \000\000\000\060\000\000\000@AOw\375\177\000\000\200@Ow\375\177\000\000\000B\213&T\004\207d\223\311\177\353EW\000\000\240\274\065\366\244|\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x00005745eb3b34c3 in main (argc=8, argv=0x7ffd774f4688) at main.c:2942 cfg_stream = 0x5745ed74d2a0 c = -1 r = 0 tmp = 0x7ffd774f5d9f "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x5745eb7b8d78 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1555962608 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x7ffd77580248 p = 0x7ca4fe189995 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}} tbuf = "\b\000\000\000\000\000\000\000\210FOw\375\177\000\000\320FOw\375\177\000\000\330+,\376\244|\000\000\000\000\000\000\000\000\000\000\020\vH\376\244|\000\000\001", '\000' <repeats 19 times>, " \000\000\000(&G\376\244|\000\000\320EOw\375\177\000\000\312tH\376\244|\000\000\000\000\000\000\000\000\000\000@e*\376\244|\000\000\320\263+\376\244|\000\000\364EOw\375\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 186 times>... option_index = 0 long_options = {{name = 0x5745eb7baf46 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5745eb7b6524 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x5745eb7baf4b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x5745eb7baf51 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x5745eb7baf57 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x5745eb7baf60 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x5745eb7baf6a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x5745eb7baf74 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x5745eb7baf7f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x5745eb7baf88 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x5745eb7baf93 "debug", has_arg = 1, flag = 0x0, val = 1032}, { name = 0x5745eb7baf99 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main"
(gdb) list 411 } 412 } while(RES_ROW_N(res) > 0); 413 414 for (i = 0; i < rd->carrier_num; ++i) { 415 for (j = 0; j < rd->carriers[i]->domain_num; ++j) { 416 if (rd->carriers[i]->domains[j]->sum_prob == 0.0) { 417 LM_ERR("All routes with carrier id %d (%.*s) and domain id %d (%.*s) have probability 0.\n", 418 rd->carriers[i]->id, rd->carriers[i]->name->len, rd->carriers[i]->name->s, 419 rd->carriers[i]->domains[j]->id, rd->carriers[i]->domains[j]->name->len, rd->carriers[i]->domains[j]->name->s); 420 }
Please help to understand the reason for the crash and how to fix the problem.
Thank you in advance.
Regards
Maharaja Azhagiah