<div dir="ltr"><div><div><div><div><div>Hello list,<br><br></div>We've got an Asterisk crash in one of our servers and the core dump showed following call tree.<br></div>Is this anyhow helpful to someone? Seems like a regular RTP / RTCP handling that lead to a malloc crash....<br><br></div>Grateful for any help!<br></div>Cheers,<br></div>Patrick<br><div><div><div><br>Thread 1 (Thread 0x7f8d6b023700 (LWP 14915)):<br>#0 0x00007f8ead2d9252 in _int_malloc () from /lib64/libc.so.6<br>#1 0x00007f8ead2da6b1 in malloc () from /lib64/libc.so.6<br>#2 0x00007f8ead36f902 in make_request () from /lib64/libc.so.6<br>#3 0x00007f8ead36fa5a in __check_pf () from /lib64/libc.so.6<br>#4 0x00007f8ead332d17 in getaddrinfo () from /lib64/libc.so.6<br>#5 0x00000000005435f5 in ast_sockaddr_resolve (addrs=0x7f8d6b01fee8, str=0x7f8d6b01ffb0 "<i><server_hostname></i>", flags=768, family=0) at netsock2.c:304<br>#6 0x000000000043484d in resolve_first (addr=0x7f8d6b022250, name=0x7f8d6b01ffb0 "<i><server_hostname></i>", family=<value optimized out>, flag=768) at acl.c:792<br>#7 0x0000000000434ce6 in ast_find_ourip (ourip=0x7f8d6b022250, bindaddr=<value optimized out>, family=0) at acl.c:970<br>#8 0x00007f8e504f4d37 in ast_rtcp_read (instance=0x7f8e293df0f8) at res_rtp_asterisk.c:4077<br>#9 0x00007f8e504f5a45 in ast_rtp_read (instance=0x7f8e293df0f8, rtcp=<value optimized out>) at res_rtp_asterisk.c:4233<br>#10 0x00007f8dfecdc7e1 in sip_rtp_read (ast=0x7f8e290f57c8) at chan_sip.c:8298<br>#11 sip_read (ast=0x7f8e290f57c8) at chan_sip.c:8401<br>#12 0x00000000004b44c5 in __ast_read (chan=0x7f8e290f57c8, dropaudio=0) at channel.c:3874<br>#13 0x0000000000476655 in bridge_handle_trip (bridge_channel=0x7f8e28d669f8) at bridge_channel.c:2272<br>#14 bridge_channel_wait (bridge_channel=0x7f8e28d669f8) at bridge_channel.c:2442<br>#15 0x0000000000477658 in bridge_channel_internal_join (bridge_channel=0x7f8e28d669f8) at bridge_channel.c:2587<br>#16 0x0000000000468610 in bridge_channel_ind_thread (data=0x7f8e28d669f8) at bridge.c:1690<br>#17 0x00000000005bdbbb in dummy_start (data=<value optimized out>) at utils.c:1232<br>#18 0x00007f8eae18d9d1 in start_thread () from /lib64/libpthread.so.0<br>#19 0x00007f8ead3488fd in clone () from /lib64/libc.so.6<br><br><br><br>Core was generated by `/usr/sbin/asterisk -f -vvvg -c'.<br>Program terminated with signal 11, Segmentation fault.<br>#0 0x00007f8ead2d9252 in _int_malloc () from /lib64/libc.so.6<br>#0 0x00007f8ead2d9252 in _int_malloc () from /lib64/libc.so.6<br>No symbol table info available.<br>#1 0x00007f8ead2da6b1 in malloc () from /lib64/libc.so.6<br>No symbol table info available.<br>#2 0x00007f8ead36f902 in make_request () from /lib64/libc.so.6<br>No symbol table info available.<br>#3 0x00007f8ead36fa5a in __check_pf () from /lib64/libc.so.6<br>No symbol table info available.<br>#4 0x00007f8ead332d17 in getaddrinfo () from /lib64/libc.so.6<br>No symbol table info available.<br>#5 0x00000000005435f5 in ast_sockaddr_resolve (addrs=0x7f8d6b01fee8, str=0x7f8d6b01ffb0 "<i><server_hostname></i>", flags=768, family=0) at netsock2.c:304<br>       hints = {ai_flags = 0, ai_family = 0, ai_socktype = 2, ai_protocol = 0, ai_addrlen = 0, ai_addr = 0x0, ai_canonname = 0x0, ai_next = 0x0}<br>       res = <value optimized out><br>       ai = <value optimized out><br>       s = 0x7f8d6b01fe00 "<i><server_hostname></i>"<br>       host = 0x7f8d6b01fe00 "<i><server_hostname></i>"<br>       port = 0x0<br>       e = <value optimized out><br>       i = <value optimized out><br>       res_cnt = <value optimized out><br>       __PRETTY_FUNCTION__ = "ast_sockaddr_resolve"<br>#6 0x000000000043484d in resolve_first (addr=0x7f8d6b022250, name=0x7f8d6b01ffb0 "<i><server_hostname></i>", family=<value optimized out>, flag=768) at acl.c:792<br>       addrs = <value optimized out><br>       addrs_cnt = <value optimized out><br>#7 0x0000000000434ce6 in ast_find_ourip (ourip=0x7f8d6b022250, bindaddr=<value optimized out>, family=0) at acl.c:970<br>       ourhost = "<i><server_hostname></i>", '\000' <repeats 29 times><br>       root = {ss = {ss_family = 1384, __ss_align = 56, __ss_padding = "\320\302\000\000\000\000\000\000\060M\177)\000\000\000\000\n\000\000\000\000\000\000\000\002", '\000' <repeats 15 times>"\300, ", '\000' <repeats 31 times>, "\n\000\000\000\062\000\000\000[\000\000\00<br>0|\000\000\000w\000\000\000n", '\000' <repeats 11 times>, "8\000\000\000\000\000\000"}, len = 49872}<br>       res = 1795293104<br>       port = 0<br>       __PRETTY_FUNCTION__ = "ast_find_ourip"<br>#8 0x00007f8e504f4d37 in ast_rtcp_read (instance=0x7f8e293df0f8) at res_rtp_asterisk.c:4077<br>       i = <value optimized out><br>       pt = <value optimized out><br>       length = <value optimized out><br>       rc = <value optimized out><br>       message_blob = <value optimized out><br>       rtcp_report = 0x7f8e2812c198<br>       rtp = 0x7f8e285da140<br>       addr = {ss = {ss_family = 2, __ss_align = 0, __ss_padding = "0\000\000\000\060\000\000\000\220)\002k\215\177\000\000\320(\002k\215\177\000\000\340\323[\000\000\000\000\000H\360p(\216\177\000\000\021\260Q\000\000\000\000\000\245\006\000\000\216\177\000\000\356O0\255\216\177\000\000\020]\022)\216\177\000\000\000\000\000\000\000\000\000\000\245$\002k\215\177\000\000\000\000\000\000\216\177\000\000H\360p(\216\177\000\000\001\000\000\000\000\000\000"}, len = 16}<br>       rtcpdata = '\000' <repeats 24 times>, "\001", '\000' <repeats 32 times>"\323, [\000\000\000\000\000\201\310\000\fMm\216\347\334lf\256͑g\205Ms_\205\000\000\003\253\000\002J\340b{\370\363\000\000\000\000\000\000\225\310\000\000\000\017\000\000\000\000\000\000\000\000\201\312\000\aMm\216\347\001\023\065\065\063\067\<a href="mailto:066@10.247.146.68">066@10.247.146.68</a>\000\000\000\000\000\000\000\320%^\001\000\000\000\000\060\003\002k\215\177\000\000\220\352\b\224\215\177\000\000\320%^\001\000\000\000\000\060\003\002k\215\177\000\000\220\352\b\224\215\177\000\000 vE\000\000\000\000\000ا\000(\216\177\000\000h\033L(\216\177\000\000\000\000\000\000\000\000\000\000ا\000(\216\177\000\000\000\000\000\000\000\000\000\000\320\003\002k\215\177", '\000' <repeats 58 times>"\260, \253\340(\216\177\000\000\360\005\002k\215\177\000\000(\254"...<br>       rtcpheader = 0x7f8d6b020130<br>       res = <value optimized out><br>       packetwords = 21<br>       position = <value optimized out><br>       report_counter = 1<br>       report_block = <value optimized out><br>       f = <value optimized out><br>       str_local_address = <value optimized out><br>       str_remote_address = <value optimized out><br>       local_address = {ss = {ss_family = 2, __ss_align = 0, __ss_padding = '\000' <repeats 111 times>}, len = 16}<br>       real_local_address = {ss = {ss_family = 0, __ss_align = 0, __ss_padding = '\000' <repeats 111 times>}, len = 0}<br>       real_remote_address = {ss = {ss_family = 0, __ss_align = 0, __ss_padding = '\000' <repeats 111 times>}, len = 0}<br>       __PRETTY_FUNCTION__ = "ast_rtcp_read"<br>#9 0x00007f8e504f5a45 in ast_rtp_read (instance=0x7f8e293df0f8, rtcp=<value optimized out>) at res_rtp_asterisk.c:4233<br>       rtp = 0x7f8e285da140<br>       addr = {ss = {ss_family = 2, __ss_align = 0, __ss_padding = " \000\000\000\000\000\000\000 \000\000(\216\177\000\000\200\376^\255\216\177\000\000F\243-\255\216\177\000\000\260}^\001\000\000\000\000(\n`\001\000\000\000\000@uY\000\000\000\000\000x[\346(\216\177\000\000\000\000\000\000\000\000\000\000x[\346(\216\177\000\000\330f^\001\000\000\000\000A\266Z\000\000\000\000\000(\n`\001\000\000\000\000\244\256Z\000\000\000\000"}, len = 16}<br>       res = <value optimized out><br>       hdrlen = 12<br>       version = <value optimized out><br>       payloadtype = <value optimized out><br>       padding = <value optimized out><br>       mark = <value optimized out><br>       ext = <value optimized out><br>       cc = <value optimized out><br>       prev_seqno = <value optimized out><br>       rtpheader = 0x7f8e285da210<br>       seqno = <value optimized out><br>       ssrc = <value optimized out><br>       timestamp = <value optimized out><br>       payload = 0x0<br>       remote_address = {ss = {ss_family = 0, __ss_align = 0, __ss_padding = '\000' <repeats 111 times>}, len = 0}<br>       frames = <value optimized out><br>       __PRETTY_FUNCTION__ = "ast_rtp_read"<br>#10 0x00007f8dfecdc7e1 in sip_rtp_read (ast=0x7f8e290f57c8) at chan_sip.c:8298<br>       f = <value optimized out><br>#11 sip_read (ast=0x7f8e290f57c8) at chan_sip.c:8401<br>       fr = <value optimized out><br>       p = 0x7f8e284ae4d8<br>       faxdetected = 0<br>       __PRETTY_FUNCTION__ = "sip_read"<br>#12 0x00000000004b44c5 in __ast_read (chan=0x7f8e290f57c8, dropaudio=0) at channel.c:3874<br>       f = 0x0<br>       prestate = 6<br>       cause = 0<br>       __PRETTY_FUNCTION__ = "__ast_read"<br>#13 0x0000000000476655 in bridge_handle_trip (bridge_channel=0x7f8e28d669f8) at bridge_channel.c:2272<br>       frame = <value optimized out><br>#14 bridge_channel_wait (bridge_channel=0x7f8e28d669f8) at bridge_channel.c:2442<br>       ms = -1<br>       outfd = -99999<br>       chan = 0x7f8e290f57c8<br>       __PRETTY_FUNCTION__ = "bridge_channel_wait"<br>#15 0x0000000000477658 in bridge_channel_internal_join (bridge_channel=0x7f8e28d669f8) at bridge_channel.c:2587<br>       res = 0<br>       channel_features = <value optimized out><br>       swap = 0x0<br>       __PRETTY_FUNCTION__ = "bridge_channel_internal_join"<br>#16 0x0000000000468610 in bridge_channel_ind_thread (data=0x7f8e28d669f8) at bridge.c:1690<br>       bridge_channel = 0x7f8e28d669f8<br>       chan = <value optimized out><br>       __PRETTY_FUNCTION__ = "bridge_channel_ind_thread"<br>#17 0x00000000005bdbbb in dummy_start (data=<value optimized out>) at utils.c:1232<br>       __cancel_buf = {__cancel_jmp_buf = {{__cancel_jmp_buf = {140248548002032, 3149010738102813782, 140245449766464, 140245362424256, 4, 7, -3122860888141183914, 3149010247054541910}, __mask_was_saved = 0}}, __pad = {0x7f8d6b022e30, 0x0, 0x7f8ead5ea850, 0x7f8ead5ea858}}<br>       __cancel_arg = 0x7f8d6b023700<br>       not_first_call = <value optimized out><br>       ret = <value optimized out><br>       a = {start_routine = 0x4685f0 <bridge_channel_ind_thread>, data = 0x7f8e28d669f8, name = 0x7f8d6b022d10 "\360H\342(\216\177"}<br>#18 0x00007f8eae18d9d1 in start_thread () from /lib64/libpthread.so.0<br>No symbol table info available.<br>#19 0x00007f8ead3488fd in clone () from /lib64/libc.so.6<br>No symbol table info available.<br><br></div></div></div></div>