sorry, for the delay. I did several tests with the patch, all of them were
fine, no crash appears. I reverted to GIT-version and the crash occurs again.
Patch is working :-)
---
Reply to this email directly or view it on GitHub:
thats correct:
```
761 LM_ERR(no connection found for id %d\n,id);
762 return -1;
763 error_sec:
764 TCPCONN_UNLOCK(id);
765 LM_WARN(possible port hijack attempt\n);
766 LM_WARN(alias already present and points to another connection
```
(gdb) p a
$1 = (struct tcp_conn_alias *) 0x7f31115f35d8
(gdb) p a-parent
$2 = (struct tcp_connection *) 0x0
(gdb) p c
$3 = (struct tcp_connection *) 0x7f311a308470
```
---
Reply to this email directly or view it on GitHub:
During running a sipp-scenario against an opensips2.1 doing tls-udp
traversing we are able to easily crash this opensips within seconds. As soon as
we disable tcp_accept_aliases the crashes are gone. We are heavily generating
new tls-sessions (around 1000 per second), so we will reuse
Hi Bogdan, yes, latest 2.1code from GIT was used. requested output:
```
#0 0x0052247a in tcpconn_add_alias (id=1358, port=5063, proto=3) at
net/net_tcp.c:766
c = 0x7f311a308470
hash = 938
a = 0x7f31115f35d8
__FUNCTION__ = tcpconn_add_alias
```
---
Reply