@dbeskoek , I sent you on last Friday, by email, a patch to be tested. Any luck
with that ?
---
Reply to this email directly or view it on GitHub:
https://github.com/OpenSIPS/opensips/issues/589#issuecomment-129476611___
Devel mailing list
sorry, for the delay. I did several tests with the patch, all of them were
fine, no crash appears. I reverted to GIT-version and the crash occurs again.
Patch is working :-)
---
Reply to this email directly or view it on GitHub:
Great @dbeskoek , especially that the faulty line was the log line itself, not
the useful code. I will commit and backport asap
Thanks and regards, Bogdan
---
Reply to this email directly or view it on GitHub:
Closed #589.
---
Reply to this email directly or view it on GitHub:
https://github.com/OpenSIPS/opensips/issues/589#event-378117425___
Devel mailing list
Devel@lists.opensips.org
http://lists.opensips.org/cgi-bin/mailman/listinfo/devel
@dbeskoek , could you do a list in gdb, to see what is your line 766 ? In my
case it is a LM_WARN :
LM_WARN(alias already present and points to another connection
(%d : %d and %d : %d)\n, a-parent-id, port, c-id, port);
Is this correct ?
---
Reply to this email directly or
thats correct:
```
761 LM_ERR(no connection found for id %d\n,id);
762 return -1;
763 error_sec:
764 TCPCONN_UNLOCK(id);
765 LM_WARN(possible port hijack attempt\n);
766 LM_WARN(alias already present and points to another connection
Is there any chance to get direct access to the corefile (ssh?) the debugging
gets a bit more complex at this stage.
---
Reply to this email directly or view it on GitHub:
https://github.com/OpenSIPS/opensips/issues/589#issuecomment-128424797___
Devel
ok, try printing in gdb the vars: a, a-parent, c
---
Reply to this email directly or view it on GitHub:
https://github.com/OpenSIPS/opensips/issues/589#issuecomment-128418538___
Devel mailing list
Devel@lists.opensips.org
```
(gdb) p a
$1 = (struct tcp_conn_alias *) 0x7f31115f35d8
(gdb) p a-parent
$2 = (struct tcp_connection *) 0x0
(gdb) p c
$3 = (struct tcp_connection *) 0x7f311a308470
```
---
Reply to this email directly or view it on GitHub:
During running a sipp-scenario against an opensips2.1 doing tls-udp
traversing we are able to easily crash this opensips within seconds. As soon as
we disable tcp_accept_aliases the crashes are gone. We are heavily generating
new tls-sessions (around 1000 per second), so we will reuse
Hi Bogdan, yes, latest 2.1code from GIT was used. requested output:
```
#0 0x0052247a in tcpconn_add_alias (id=1358, port=5063, proto=3) at
net/net_tcp.c:766
c = 0x7f311a308470
hash = 938
a = 0x7f31115f35d8
__FUNCTION__ = tcpconn_add_alias
```
---
Reply
11 matches
Mail list logo