Hello list, We've got an Asterisk crash in one of our servers and the core dump showed following call tree. Is this anyhow helpful to someone? Seems like a regular RTP / RTCP handling that lead to a malloc crash.... Grateful for any help! Cheers, Patrick Thread 1 (Thread 0x7f8d6b023700 (LWP 14915)): #0 0x00007f8ead2d9252 in _int_malloc () from /lib64/libc.so.6 #1 0x00007f8ead2da6b1 in malloc () from /lib64/libc.so.6 #2 0x00007f8ead36f902 in make_request () from /lib64/libc.so.6 #3 0x00007f8ead36fa5a in __check_pf () from /lib64/libc.so.6 #4 0x00007f8ead332d17 in getaddrinfo () from /lib64/libc.so.6 #5 0x00000000005435f5 in ast_sockaddr_resolve (addrs=0x7f8d6b01fee8, str=0x7f8d6b01ffb0 "*<server_hostname>*", flags=768, family=0) at netsock2.c:304 #6 0x000000000043484d in resolve_first (addr=0x7f8d6b022250, name=0x7f8d6b01ffb0 "*<server_hostname>*", family=<value optimized out>, flag=768) at acl.c:792 #7 0x0000000000434ce6 in ast_find_ourip (ourip=0x7f8d6b022250, bindaddr=<value optimized out>, family=0) at acl.c:970 #8 0x00007f8e504f4d37 in ast_rtcp_read (instance=0x7f8e293df0f8) at res_rtp_asterisk.c:4077 #9 0x00007f8e504f5a45 in ast_rtp_read (instance=0x7f8e293df0f8, rtcp=<value optimized out>) at res_rtp_asterisk.c:4233 #10 0x00007f8dfecdc7e1 in sip_rtp_read (ast=0x7f8e290f57c8) at chan_sip.c:8298 #11 sip_read (ast=0x7f8e290f57c8) at chan_sip.c:8401 #12 0x00000000004b44c5 in __ast_read (chan=0x7f8e290f57c8, dropaudio=0) at channel.c:3874 #13 0x0000000000476655 in bridge_handle_trip (bridge_channel=0x7f8e28d669f8) at bridge_channel.c:2272 #14 bridge_channel_wait (bridge_channel=0x7f8e28d669f8) at bridge_channel.c:2442 #15 0x0000000000477658 in bridge_channel_internal_join (bridge_channel=0x7f8e28d669f8) at bridge_channel.c:2587 #16 0x0000000000468610 in bridge_channel_ind_thread (data=0x7f8e28d669f8) at bridge.c:1690 #17 0x00000000005bdbbb in dummy_start (data=<value optimized out>) at utils.c:1232 #18 0x00007f8eae18d9d1 in start_thread () from /lib64/libpthread.so.0 #19 0x00007f8ead3488fd in clone () from /lib64/libc.so.6 Core was generated by `/usr/sbin/asterisk -f -vvvg -c'. Program terminated with signal 11, Segmentation fault. #0 0x00007f8ead2d9252 in _int_malloc () from /lib64/libc.so.6 #0 0x00007f8ead2d9252 in _int_malloc () from /lib64/libc.so.6 No symbol table info available. #1 0x00007f8ead2da6b1 in malloc () from /lib64/libc.so.6 No symbol table info available. #2 0x00007f8ead36f902 in make_request () from /lib64/libc.so.6 No symbol table info available. #3 0x00007f8ead36fa5a in __check_pf () from /lib64/libc.so.6 No symbol table info available. #4 0x00007f8ead332d17 in getaddrinfo () from /lib64/libc.so.6 No symbol table info available. #5 0x00000000005435f5 in ast_sockaddr_resolve (addrs=0x7f8d6b01fee8, str=0x7f8d6b01ffb0 "*<server_hostname>*", flags=768, family=0) at netsock2.c:304 hints = {ai_flags = 0, ai_family = 0, ai_socktype = 2, ai_protocol = 0, ai_addrlen = 0, ai_addr = 0x0, ai_canonname = 0x0, ai_next = 0x0} res = <value optimized out> ai = <value optimized out> s = 0x7f8d6b01fe00 "*<server_hostname>*" host = 0x7f8d6b01fe00 "*<server_hostname>*" port = 0x0 e = <value optimized out> i = <value optimized out> res_cnt = <value optimized out> __PRETTY_FUNCTION__ = "ast_sockaddr_resolve" #6 0x000000000043484d in resolve_first (addr=0x7f8d6b022250, name=0x7f8d6b01ffb0 "*<server_hostname>*", family=<value optimized out>, flag=768) at acl.c:792 addrs = <value optimized out> addrs_cnt = <value optimized out> #7 0x0000000000434ce6 in ast_find_ourip (ourip=0x7f8d6b022250, bindaddr=<value optimized out>, family=0) at acl.c:970 ourhost = "*<server_hostname>*", '\000' <repeats 29 times> root = {ss = {ss_family = 1384, __ss_align = 56, __ss_padding "\320\302\000\000\000\000\000\000\060M\177)\000\000\000\000\n\000\000\000\000\000\000\000\002", '\000' <repeats 15 times>"\300, ", '\000' <repeats 31 times>, "\n\000\000\000\062\000\000\000[\000\000\00 0|\000\000\000w\000\000\000n", '\000' <repeats 11 times>, "8\000\000\000\000\000\000"}, len = 49872} res = 1795293104 port = 0 __PRETTY_FUNCTION__ = "ast_find_ourip" #8 0x00007f8e504f4d37 in ast_rtcp_read (instance=0x7f8e293df0f8) at res_rtp_asterisk.c:4077 i = <value optimized out> pt = <value optimized out> length = <value optimized out> rc = <value optimized out> message_blob = <value optimized out> rtcp_report = 0x7f8e2812c198 rtp = 0x7f8e285da140 addr = {ss = {ss_family = 2, __ss_align = 0, __ss_padding "0\000\000\000\060\000\000\000\220)\002k\215\177\000\000\320(\002k\215\177\000\000\340\323[\000\000\000\000\000H\360p(\216\177\000\000\021\260Q\000\000\000\000\000\245\006\000\000\216\177\000\000\356O0\255\216\177\000\000\020]\022)\216\177\000\000\000\000\000\000\000\000\000\000\245$\002k\215\177\000\000\000\000\000\000\216\177\000\000H\360p(\216\177\000\000\001\000\000\000\000\000\000"}, len = 16} rtcpdata = '\000' <repeats 24 times>, "\001", '\000' <repeats 32 times>"\323, [\000\000\000\000\000\201\310\000\fMm\216\347\334lf\256?g\205Ms_\205\000\000\003\253\000\002J\340b{\370\363\000\000\000\000\000\000\225\310\000\000\000\017\000\000\000\000\000\000\000\000\201\312\000\aMm\216\347\001\023\065\065\063\067\ 066 at 10.247.146.68\000\000\000\000\000\000\000\320%^\001\000\000\000\000\060\003\002k\215\177\000\000\220\352\b\224\215\177\000\000\320%^\001\000\000\000\000\060\003\002k\215\177\000\000\220\352\b\224\215\177\000\000 vE\000\000\000\000\000?\000(\216\177\000\000h\033L(\216\177\000\000\000\000\000\000\000\000\000\000?\000(\216\177\000\000\000\000\000\000\000\000\000\000\320\003\002k\215\177", '\000' <repeats 58 times>"\260, \253\340(\216\177\000\000\360\005\002k\215\177\000\000(\254"... rtcpheader = 0x7f8d6b020130 res = <value optimized out> packetwords = 21 position = <value optimized out> report_counter = 1 report_block = <value optimized out> f = <value optimized out> str_local_address = <value optimized out> str_remote_address = <value optimized out> local_address = {ss = {ss_family = 2, __ss_align = 0, __ss_padding = '\000' <repeats 111 times>}, len = 16} real_local_address = {ss = {ss_family = 0, __ss_align = 0, __ss_padding = '\000' <repeats 111 times>}, len = 0} real_remote_address = {ss = {ss_family = 0, __ss_align = 0, __ss_padding = '\000' <repeats 111 times>}, len = 0} __PRETTY_FUNCTION__ = "ast_rtcp_read" #9 0x00007f8e504f5a45 in ast_rtp_read (instance=0x7f8e293df0f8, rtcp=<value optimized out>) at res_rtp_asterisk.c:4233 rtp = 0x7f8e285da140 addr = {ss = {ss_family = 2, __ss_align = 0, __ss_padding = " \000\000\000\000\000\000\000 \000\000(\216\177\000\000\200\376^\255\216\177\000\000F\243-\255\216\177\000\000\260}^\001\000\000\000\000(\n`\001\000\000\000\000 at uY\000\000\000\000\000x[\346(\216\177\000\000\000\000\000\000\000\000\000\000x[\346(\216\177\000\000\330f^\001\000\000\000\000A\266Z\000\000\000\000\000(\n`\001\000\000\000\000\244\256Z\000\000\000\000"}, len = 16} res = <value optimized out> hdrlen = 12 version = <value optimized out> payloadtype = <value optimized out> padding = <value optimized out> mark = <value optimized out> ext = <value optimized out> cc = <value optimized out> prev_seqno = <value optimized out> rtpheader = 0x7f8e285da210 seqno = <value optimized out> ssrc = <value optimized out> timestamp = <value optimized out> payload = 0x0 remote_address = {ss = {ss_family = 0, __ss_align = 0, __ss_padding = '\000' <repeats 111 times>}, len = 0} frames = <value optimized out> __PRETTY_FUNCTION__ = "ast_rtp_read" #10 0x00007f8dfecdc7e1 in sip_rtp_read (ast=0x7f8e290f57c8) at chan_sip.c:8298 f = <value optimized out> #11 sip_read (ast=0x7f8e290f57c8) at chan_sip.c:8401 fr = <value optimized out> p = 0x7f8e284ae4d8 faxdetected = 0 __PRETTY_FUNCTION__ = "sip_read" #12 0x00000000004b44c5 in __ast_read (chan=0x7f8e290f57c8, dropaudio=0) at channel.c:3874 f = 0x0 prestate = 6 cause = 0 __PRETTY_FUNCTION__ = "__ast_read" #13 0x0000000000476655 in bridge_handle_trip (bridge_channel=0x7f8e28d669f8) at bridge_channel.c:2272 frame = <value optimized out> #14 bridge_channel_wait (bridge_channel=0x7f8e28d669f8) at bridge_channel.c:2442 ms = -1 outfd = -99999 chan = 0x7f8e290f57c8 __PRETTY_FUNCTION__ = "bridge_channel_wait" #15 0x0000000000477658 in bridge_channel_internal_join (bridge_channel=0x7f8e28d669f8) at bridge_channel.c:2587 res = 0 channel_features = <value optimized out> swap = 0x0 __PRETTY_FUNCTION__ = "bridge_channel_internal_join" #16 0x0000000000468610 in bridge_channel_ind_thread (data=0x7f8e28d669f8) at bridge.c:1690 bridge_channel = 0x7f8e28d669f8 chan = <value optimized out> __PRETTY_FUNCTION__ = "bridge_channel_ind_thread" #17 0x00000000005bdbbb in dummy_start (data=<value optimized out>) at utils.c:1232 __cancel_buf = {__cancel_jmp_buf = {{__cancel_jmp_buf {140248548002032, 3149010738102813782, 140245449766464, 140245362424256, 4, 7, -3122860888141183914, 3149010247054541910}, __mask_was_saved = 0}}, __pad = {0x7f8d6b022e30, 0x0, 0x7f8ead5ea850, 0x7f8ead5ea858}} __cancel_arg = 0x7f8d6b023700 not_first_call = <value optimized out> ret = <value optimized out> a = {start_routine = 0x4685f0 <bridge_channel_ind_thread>, data 0x7f8e28d669f8, name = 0x7f8d6b022d10 "\360H\342(\216\177"} #18 0x00007f8eae18d9d1 in start_thread () from /lib64/libpthread.so.0 No symbol table info available. #19 0x00007f8ead3488fd in clone () from /lib64/libc.so.6 No symbol table info available. -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.digium.com/pipermail/asterisk-users/attachments/20170315/cb801631/attachment-0001.html>