Hello,

I noticed a segmentation fault is caused by sst module :
Client B2BUA (UAC) invite has : Session-Expires: 1000 Min-SE: 90
Opensips SST min_se configured at 1800s, dialog has sst_flag.
This causes Opensips to crash :

opensips log :

Mar  3 13:06:10 test-boxopensips /usr/sbin/opensips[6088]: 
CRITICAL:core:sig_usr: segfault in process pid: 6088, id: 6
Mar  3 13:06:11 test-boxopensips /usr/sbin/opensips[6082]: 
INFO:core:handle_sigs: child process 6088 exited by a signal 11
Mar  3 13:06:11 test-boxopensips /usr/sbin/opensips[6082]: 
INFO:core:handle_sigs: core was not generated
Mar  3 13:06:11 test-boxopensips /usr/sbin/opensips[6082]: 
INFO:core:handle_sigs: terminating due to SIGCHLD

Sys log :

Mar  3 13:06:58 test-boxopensips kernel: [ 9969.171168] opensips[6185]: 
segfault at 968 ip 00007f3da464b901 sp 00007ffe8aec6f00 error 4 in 
tm.so[7f3da4617000+46000]
Mar  3 13:06:58 test-boxopensips kernel: [ 9969.173758] Code: 89 44 24 68 31 c0 
81 fa c7 00 00 00 0f 87 17 02 00 00 41 8d 84 24 d4 fe ff ff 83 f8 63 0f 86 0e 
01 00 00 48 8b 85 f0 00 00 00 <8b> 80 68 09 00 00 41 33 85 68 09 00 00 a8 01 0f 
85 39 01 00 00 4c

I have already solved the scripting problem by using sstCheckIn to adapt 
SessionExpire value to Opensips's min_se value.
Also, if the the UAC changes its session expires value to any value identical 
or higher than the one configured in OpenSIPS min_se value solves the problem.

My question : is this a normal behavior for opensips to completely crash ?

Opensips version :

version: opensips 3.2.11 (x86_64/linux)
flags: STATS: On, DISABLE_NAGLE, USE_MCAST, SHM_MMAP, PKG_MALLOC, Q_MALLOC, 
F_MALLOC, HP_MALLOC, DBG_MALLOC, FAST_LOCK-ADAPTIVE_WAIT
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, 
MAX_URI_SIZE 1024, BUF_SIZE 65535
poll method support: poll, epoll, sigio_rt, select.
main.c compiled on  with gcc 10

Thank you.


_______________________________________________
Users mailing list
Users@lists.opensips.org
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

Reply via email to