[OpenSIPS-Users] opensips 2.4.6 TLS crash
Carlos Oliva
carlos.oliva at invoxcontact.com
Tue Jul 2 18:57:52 EDT 2019
Hello opensips devels:
I have a crash in last 2.4 version (installed by oficial packages) related
to tls module.
I made some stress tests and everything works fine, but when I tried to use
this version in production I had a crash. I think is TLS related, but he
generated core does not provide many information (or I can not see any
clear information). Is there any way to get more debug information? if you
need something more to see what´s happening please let me know.
This is the information of my system and from the generated core:
Ubuntu 18.04.2 LTS
version: opensips 2.4.6 (x86_64/linux)
flags: STATS: On, DISABLE_NAGLE, USE_MCAST, SHM_MMAP, PKG_MALLOC, F_MALLOC,
FAST_LOCK-ADAPTIVE_WAIT
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16,
MAX_URI_SIZE 1024, BUF_SIZE 65535
poll method support: poll, epoll, sigio_rt, select.
main.c compiled on with gcc 7
and from the core file:
(gdb) bt full
#0 0x0000000000000000 in ?? ()
No symbol table info available.
#1 0x00007f62615b3726 in ?? () from
/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#2 0x00007f62615c212b in EVP_EncryptUpdate () from
/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#3 0x00007f62615f462d in ?? () from
/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#4 0x00007f62615f4bfd in ?? () from
/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#5 0x00007f62615f5a1f in RAND_DRBG_generate () from
/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#6 0x00007f62615f5cbe in RAND_DRBG_bytes () from
/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#7 0x00007f626195f95b in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#8 0x00007f626195fd3e in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#9 0x00007f6261960462 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#10 0x00007f626197dd37 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#11 0x00007f626196d4b2 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#12 0x00007f62619594c4 in SSL_do_handshake () from
/usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#13 0x00007f6261bb38ed in tls_accept (c=0x7f62642b93b8, poll_events=0x0) at
../tls_mgm/tls_conn_server.h:242
ret = <optimized out>
err = <optimized out>
cert = <optimized out>
tls_err_s = {
s = 0x7f6261dc4400 <tls_current_req> "REGISTER
sip:DOMAIN_OFUSCATED:5061 SIP/2.0\r\nVia: SIP/2.0/TLS
192.168.41.65:27247;branch=z9hG4bK1781560244;rport;alias\r\nFrom:
<sip:USER_OFUSCATED at DOMAIN_OFUSCATED:5061>;tag=368886374\r\nTo:
<sip:XXXXXXX"..., len = 1681009568}
ssl = <optimized out>
poll_events = 0x0
c = 0x7f62642b93b8
ret = <optimized out>
---Type <return> to continue, or q <return> to quit---
err = <optimized out>
cert = <optimized out>
tls_err_s = <optimized out>
ssl = <optimized out>
ret = <optimized out>
err = <optimized out>
ssl = <optimized out>
cert = <optimized out>
tls_err_s = <optimized out>
#14 0x00007f6261bbc421 in tls_fix_read_conn (t_dst=0x0, c=0x7f62642b93b8)
at ../tls_mgm/tls_conn_server.h:501
ret = <optimized out>
ret = <optimized out>
#15 tls_read_req (con=0x7f62642b93b8, bytes_read=0x7ffd688d4cd0) at
proto_tls.c:526
ret = <optimized out>
bytes = -1
total_bytes = 0
req = 0x7f6261dc4400 <tls_current_req>
data = <optimized out>
__FUNCTION__ = "tls_read_req"
#16 0x000055aa02b78591 in handle_io (event_type=1, idx=14, fm=<optimized
out>) at net/net_tcp_proc.c:241
con = <optimized out>
ret = 4
n = <optimized out>
rw = <optimized out>
response = {94188681382760, 94188677401791}
s = 0
resp = <optimized out>
ret = <optimized out>
n = <optimized out>
con = <optimized out>
s = <optimized out>
rw = <optimized out>
resp = <optimized out>
response = <optimized out>
_timeout = <optimized out>
#17 io_wait_loop_epoll (h=<optimized out>, t=<optimized out>,
repeat=<optimized out>) at net/../io_wait_loop.h:280
ret = <optimized out>
---Type <return> to continue, or q <return> to quit---
i = <optimized out>
e = <optimized out>
ep_event = {events = 2045224136, data = {ptr = 0x5721d5eb00007f62,
fd = 32610, u32 = 32610, u64 = 6278534560825245538}}
fd = <optimized out>
n = 1
r = 14
ret = <optimized out>
n = <optimized out>
r = <optimized out>
i = <optimized out>
e = <optimized out>
ep_event = <optimized out>
fd = <optimized out>
#18 tcp_worker_proc_loop () at net/net_tcp_proc.c:386
__FUNCTION__ = "tcp_worker_proc_loop"
#19 0x000055aa02b8463d in tcp_start_processes (chd_rank=0x55aa02e54b68
<chd_rank>, startup_done=0x7f62623c3db0) at net/net_tcp.c:1902
r = <optimized out>
n = <optimized out>
reader_fd = {80, 82}
pid = <optimized out>
si = <optimized out>
__FUNCTION__ = "tcp_start_processes"
#20 0x000055aa02a443a7 in main_loop () at main.c:788
startup_done = 0x7f62623c3db0
rc = <optimized out>
chd_rank = 13
startup_done = <optimized out>
rc = <optimized out>
#21 main (argc=<optimized out>, argv=<optimized out>) at main.c:1439
cfg_stream = <optimized out>
c = <optimized out>
r = <optimized out>
tmp = 0x7ffd688d5ebd ""
tmp_len = <optimized out>
port = <optimized out>
proto = <optimized out>
protos_no = <optimized out>
---Type <return> to continue, or q <return> to quit---
options = 0x55aa02bb7df0 "f:cCm:M:b:l:n:N:rRvdDFEVhw:t:u:g:P:G:W:o:"
ret = -1
seed = 715055224
rfd = <optimized out>
__FUNCTION__ = "main"
thanks and regards,
Carlos Oliva
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opensips.org/pipermail/users/attachments/20190703/9c9a0b0e/attachment-0001.html>
More information about the Users
mailing list