Segmentation fault when sip_trace method is called with less then 2 arguments.
The problem does not happen if either "xheaders_write" module param is set to zero or we provide both arguments to sip_trace method.
.. # ----- siptrace params ----- modparam("siptrace", "trace_on", 1) modparam("siptrace", "hep_mode_on", 0) modparam("siptrace", "xheaders_write", 1) modparam("siptrace", "trace_to_database", 0) modparam("siptrace", "trace_flag", FLT_SIP_TRACE) modparam("siptrace", "traced_user_avp", "$avp(traced_user)") modparam("siptrace", "duplicate_uri", "WEBRTC_SIP_TRACE_ADDRESS")` .. request_route { .. sip_trace("WEBRTC_SIP_TRACE_ADDRESS"); setflag(FLT_SIP_TRACE); .. } ..
#0 0xb766b417 in _IO_vfprintf_internal (s=0xbfedc5e0,
format=0xb19c7a28 "X-Siptrace-Fromip: %.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n",
ap=0xbfedc6fc "\025") at vfprintf.c:1629
len = <optimized out>
string_malloced = <optimized out>
step0_jumps = {0, -13653, -13579, -13501, -13418, -13344, -13248, -13024, -12733, -12367, -12140, -11875, -11660, -3450, -3880, -3819, -3480, -3465, -9946,
-2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, -3593, -11660, -13100}
space = 0
is_short = 0
use_outdigits = 0
step1_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, -12367, -12140, -11875, -11660, -3450, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058,
-1997, -3269, -3593, -11660, 0}
group = 0
prec = -1
step2_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -12140, -11875, -11660, -3450, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058,
-1997, -3269, -3593, -11660, 0}
string = 0x9 <Address 0x9 out of bounds>
left = 0
is_long_double = -1074936024
width = <optimized out>
step3a_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -11961, 0, 0, 0, -3880, -3819, -3480, -3465, -9946, 0, 0, 0, 0, -3349, 0, 0, 0, 0, 0, 0}
alt = 0
showsign = 0
is_long = 0
is_char = 0
pad = <optimized out>
step3b_jumps = {0 <repeats 11 times>, -11660, 0, 0, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, 0, 0, 0}
step4_jumps = {0 <repeats 14 times>, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, 0, 0, 0}
is_negative = -1074936028
base = 0
the_arg = {pa_wchar = -1074927268 L'\xbfede95c', pa_int = -1074927268, pa_long_int = -1074927268, pa_long_long_int = -4616814309237986980,
pa_u_int = 3220040028, pa_u_long_int = 3220040028, pa_u_long_long_int = 13829929764471564636, pa_double = -0.93064534650992981,
pa_long_double = 3.3942842958442789709117117072106753e-4719, pa_string = 0xbfede95c "s\351\316", <incomplete sequence \370>,
pa_wstring = 0xbfede95c L"\xf8cee973", pa_pointer = 0xbfede95c, pa_user = 0xbfede95c}
spec = <optimized out>
_buffer = {__routine = 0xbfede95c, __arg = 0xbfedc5d8, __canceltype = -1217805458, __prev = 0x0}
_avail = 0
thousands_sep = 0x0
grouping = 0xffffffff <Address 0xffffffff out of bounds>
f = <optimized out>
lead_str_end = 0xb19c7a3b "%.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n"
work_buffer = "_\262f\267 \307\355\277\242u\201\266\000\000\000\000\000\000\000\000h.~\266h.~\266|.~\266\252.~\266h.~\266\252.~\266\000\000\000\000\242u\201\266
", '\000' <repeats 12 times>"\370, \201\202\266\000\000\000\000\304\301\355\277", '\000' <repeats 20 times>"\334, \307\355\277\000\000\000\000\000\000\000\000\004\000\000\000\377\377\377\377\355G\202\266\bp\342\266\304\301\355\277\304i\202\266-i\001\262", '\000' <repeats 20 times>"\340, \326x\267\000\000\000\000\000\000\000\000 \201\202\266\000\000\000\000h\302\355\277\215\034\202\266\002", '\000' <repeats 23 times>, "L\310\355\277\000\000\000\000\000\000\000\000\004\000\000\000\003\000\000\000\020\310\355\277\377\377\377\377\377\377\377\377\034'4\267c\302\355\277\000<g\267h.~\266C\000\000\000̥z\266\\\302\355\277h\023~\266\030\303\355\277`\306\355\277\250\242z\266\241u\201\266\000\000\000\000D\335f\267\000\000\000\000\232u\201\266\000\000\000\000H\310\355\277\016\000\000\000\232u\201\266\063\204i\267\261Q'\b,\\;\b\004\000\000\000\000*\000\000\001\000\000\000$\311\355\277\001\000\000\000\364"...
workstart = 0x0
workend = 0xbfedc520 "\250\205 \267\260\205 \267"
ap_save = 0xbfedc6fc "\025"
nspecs_done = 5
save_errno = 0
readonly_format = 0
args_malloced = 0x0
specs = <optimized out>
specs_malloced = false
jump_table = "\001\000\000\004\000\016\000\006\000\000\a\002\000\003\t\000\005\b\b\b\b\b\b\b\b\b\000\000\000\000\000\000\000\032\000\031\000\023\023\023\000\035\000\000\f\000\000\000\000\000\000\025\000\000\000\000\022\000\r\000\000\000\000\000\000\032\000\024\017\023\023\023\n\017\034\000\v\030\027\021\026\f\000\025\033\020\000\000\022\000\r"
__PRETTY_FUNCTION__ = "_IO_vfprintf_internal"
#1 0xb768ede0 in _IO_vsnprintf (
string=0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", maxlen=512,
format=0xb19c7a28 "X-Siptrace-Fromip: %.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n",
args=0xbfedc6fc "\025") at vsnprintf.c:120
sf = {f = {_sbf = {_f = {_flags = -72515583,
_IO_read_ptr = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ",
_IO_read_end = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ",
_IO_read_base = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ",
_IO_write_base = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", _IO_write_ptr = 0xb716a82a "", _IO_write_end = 0xb716a986 "",
_IO_buf_base = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", _IO_buf_end = 0xb716a986 "", _IO_save_base = 0x0, _IO_backup_base = 0x0, _IO_save_end = 0x0, _markers = 0x0,
_chain = 0x0, _fileno = -1074936088, _flags2 = 0, _old_offset = 5, _cur_column = 0, _vtable_offset = 0 '\000', _shortbuf = "", _lock = 0x0,
_offset = 593186573409608927, _codecvt = 0x23e, _wide_data = 0xb19c47b0, _freeres_list = 0x0, _freeres_buf = 0x5, _freeres_size = 0, _mode = -1,
_unused2 = "`b<\b\vl;\b?\000\000\000ha<\b\224\066*\267\\\344\355\277\364\066*\267H\320\355\277\375x\234\261\204\065*\267"}, vtable = 0xb778d6e0},
_s = {_allocate_buffer = 0, _free_buffer = 0xffffffff}},
overflow_buf = "\000\000\000\000\004\000\000\000\375x\234\261a\245\026\267)\002\000\000<\270j\267\210\247\026\267\000\000\000\000\001\000\000\000\000y\234\261\004\000\000\000\000\000\000\000`\245\026\267\000\000\000\000\002\000\000\000\375x\234\261"}
ret = 0
#2 0xb7673cf2 in __snprintf (
s=0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", maxlen=512,
format=0xb19c7a28 "X-Siptrace-Fromip: %.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n")
at snprintf.c:35
done = 0
#3 0xb19ae7c3 in sip_trace_xheaders_write (sto=0xbfedc924) at siptrace.c:594
buf = 0xb716a548 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"...
bytes_written = 0
eoh = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: "
eoh_offset = 0
new_eoh = 0x0
__FUNCTION__ = "sip_trace_xheaders_write"
#4 0xb19b01fe in sip_trace_store (sto=0xbfedc924, dst=0x0, correlation_id_str=0x0) at siptrace.c:750
__FUNCTION__ = "sip_trace_store"
ret = -1
#5 0xb19b64bd in sip_trace (msg=0xb72a3584, dst=0x0, correlation_id_str=0x0, dir=0x9 <Address 0x9 out of bounds>) at siptrace.c:1151
sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state = {flags = 257, id = 75, name = {n = -1226220299, s = {
s = 0xb6e95cf5 "traced_user)", len = 11}, re = 0xb6e95cf5}, avp = 0x0}, body = {
s = 0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len = 577}, callid = {
s = 0x848866f "0b5l88q765nk5ahdvqqd1a\r\nCSeq: 202 REGISTER\r\nWWW-Authenticate: Digest realm=\"acs.dummy.com\", nonce=\"5a24acbba41b8f45ded1be19fc13951d5438c8e0\"\r\nServer: OpenSER (1.3.4-notls (i386/linux))\r\nContent-Len"..., len = 22}, method = {
s = 0x8488691 "REGISTER\r\nWWW-Authenticate: Digest realm=\"acs.dummy.com\", nonce=\"5a24acbba41b8f45ded1be19fc13951d5438c8e0\"\r\nServer: OpenSER (1.3.4-notls (i386/linux))\r\nContent-Length: 0\r\n\r\n", len = 8}, status = {
s = 0x8488508 "401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK3573981\r\nT"..., len = 3}, dir = 0x9 <Address 0x9 out of bounds>, fromtag = {
s = 0x848865a "coqoo7bgrr\r\nCall-ID: 0b5l88q765nk5ahdvqqd1a\r\nCSeq: 202 REGISTER\r\nWWW-Authenticate: Digest realm=\"acs.dummy.com\", nonce=\"5a24acbba41b8f45ded1be19fc13951d5438c8e0\"\r\nServer: OpenSER (1.3.4-notls (i386"..., len = 10}, fromip = {s = 0xbfedc9bc "udp:185.18.45.53:5060", len = 21}, totag = {
s = 0x84885f8 "f585cd8bc1f6d3796bfeb421b703352f.8488\r\nFrom: \"James Howlett\" <sip:998100601189@172.16.171.60>;tag=coqoo7bgrr\r\nCall-ID: 0b5l88q765nk5ahdvqqd1a\r\nCSeq: 202 REGISTER\r\nWWW-Authenticate: Digest realm=\"acs.a"..., len = 37}, toip = {s = 0xbfedc988 "udp:185.18.45.115:5060", len = 22},
toip_buff = "udp:185.18.45.115:5060", '\000' <repeats 29 times>, fromip_buff = "udp:185.18.45.53:5060", '\000' <repeats 30 times>, tv = {
tv_sec = 1512352655, tv_usec = 48676}, stat = 0x70}
snd_inf = 0x0
__FUNCTION__ = "sip_trace"
#6 0x08078b06 in do_action (h=0xbfede244, a=0xb712fe5c, msg=0xb72a3584) at core/action.c:1054
ret = -5
v = 2
dst = {send_sock = 0x9cf, to = {s = {sa_family = 65456, sa_data = "<\b\372\317'\b\304\322\355\277\000\000\000"}, sin = {sin_family = 65456, sin_port = 2108,
sin_addr = {s_addr = 136826874}, sin_zero = "\304\322\355\277\000\000\000"}, sin6 = {sin6_family = 65456, sin6_port = 2108, sin6_flowinfo = 136826874,
sin6_addr = {__in6_u = {__u6_addr8 = "\304\322\355\277\000\000\000\000\034\000\000\000\\U\002\266", __u6_addr16 = {53956, 49133, 0, 0, 28, 0, 21852,
46594}, __u6_addr32 = {3220034244, 0, 28, 3053606236}}}, sin6_scope_id = 0}}, id = -1074927268, proto = -88 '\250', send_flags = {f = 49133,
blst_imask = 28680}}
tmp = 0x8274cdd "\270"
new_uri = 0xb72a3a18 "\200"
end = 0x8274cdd "\270"
crt = 0xbfedd408 "\b\325\355\277\371C\b\bD\342\355\277\\\376\022\267\204\065*\267\220\032=\b\vl;\b\317\t"
cmd = 0xb6e8ab64
len = 0
user = 0
uri = {user = {s = 0xb23c3d00 "", len = 8388608}, passwd = {s = 0x285e8c <Address 0x285e8c out of bounds>, len = 4531876}, host = {
s = 0x57a174 <Address 0x57a174 out of bounds>, len = 5755668}, port = {s = 0x4 <Address 0x4 out of bounds>, len = 8}, params = {s = 0x0,
len = -1226674168}, sip_params = {s = 0xbfedd208 "\001", len = 135116871}, headers = {s = 0x0, len = 0}, port_no = 53768, proto = 49133, type = 136793309,
flags = 3068293128, transport = {s = 0xb71997d4 " ", len = -1217821645}, ttl = {s = 0x0, len = -1223059524}, user_param = {
s = 0x3c0 <Address 0x3c0 out of bounds>, len = 1}, maddr = {s = 0x0, len = 5}, method = {s = 0x0, len = -1074932984}, lr = {
s = 0x8197d1c "\205\300\017\237\300\017\266ЋE\020\211\020\213E\b\213@\004\211\302\203\342\371\213E\b\211P\004\351\341\004", len = -1074929084}, r2 = {
s = 0xb712f764 "\255\r", len = -1221970556}, gr = {s = 0x80db847 "\211E\364\213E\364\351\373\001", len = 0}, transport_val = {s = 0x0, len = -1074933160},
ttl_val = {s = 0x8274cdd "\270", len = -1226674168}, user_param_val = {s = 0xb71caee4 "l", len = -1245326265}, maddr_val = {s = 0x0, len = -1222857012},
method_val = {s = 0xa0 <Address 0xa0 out of bounds>, len = -1074932952}, lr_val = {s = 0x8275535 "\213E܃\300\034\351\a\003", len = 5}, r2_val = {s = 0x0,
len = 32}, gr_val = {s = 0x83d1a90 "core: core/parser/parse_via.c", len = 138112011}}
next_hop = {user = {s = 0xb6dfb1d5 "U\211\345S\203\354\024\350\372\343\377\377\201ÿ\263\002", len = -1226848018}, passwd = {s = 0x0, len = -1074932385},
host = {s = 0xa <Address 0xa out of bounds>, len = 0}, port = {s = 0x0, len = -1074931896}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 2},
headers = {s = 0xb73a2138 "h\037:\267\006", len = 0}, port_no = 65535, proto = 65535, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = -1074927268},
ttl = {s = 0xbfedd158 "\204\065*\267\240\070*\267", len = -1221970284}, user_param = {s = 0xbfede45c "\020", len = -1221970188}, maddr = {
s = 0xbfedd218 "\b\323\355\277\034}\031\bD\342\355\277d\367\022\267\204\065*\267G\270\r\b", len = 134761067}, method = {s = 0xbfedd160 "",
len = -1223493788}, lr = {s = 0xb72a3584 "\001", len = -1221969760}, r2 = {s = 0x0, len = 0}, gr = {s = 0x1 <Address 0x1 out of bounds>,
len = -1221970284}, transport_val = {s = 0xbfede45c "\020", len = -1221970188}, ttl_val = {
s = 0xbfedd148 "\030\322\355\277kJ\b\b`\321\355\277d\367\022\267\204\065*\267\240\070*\267", len = -1281299135}, user_param_val = {
s = 0x7881ec2e <Address 0x7881ec2e out of bounds>, len = 0}, maddr_val = {s = 0xb72a377c "", len = -1226674168}, method_val = {s = 0xbfedd3c0 "\260\237W",
len = -1226183112}, lr_val = {s = 0xbfedd1d8 "\b\322\355\277G\270\r\b", len = -1232975437}, r2_val = {s = 0xb6e27008 "\001", len = -1074933324}, gr_val = {
s = 0xbfedd278 "\260\377<\b\372\317'\b\304\322", <incomplete sequence \355\277>, len = -1313472512}}
u = 0x80db847
port = 49133
dst_host = 0xfa20d
i = -1226674168
flags = 0
avp = 0x0
st = {flags = 3220033768, id = 0, name = {n = 0, s = {s = 0x0, len = -1226821088}, re = 0x0}, avp = 0xb6dfb190}
sct = 0xb72a3694
sjt = 0xb774731f
rve = 0x4
mct = 0xbfede45c
rv = 0x0
rv1 = 0x8
c1 = {cache_type = RV_CACHE_EMPTY, val_type = 3078153004, c = {avp_val = {n = -1074933548, s = {s = 0xbfedd0d4 "\350\320", <incomplete sequence \355\277>,
len = -1218077169}, re = 0xbfedd0d4}, pval = {rs = {s = 0xbfedd0d4 "\350\320", <incomplete sequence \355\277>, len = -1218077169}, ri = -1216814292,
flags = -1074933564}}, i2s = ",\343x\267D\340x\267\304\320\355\277\377\377\377\377\000\000\000\000\000"}
s = {s = 0xb778e0bc "\303~6\033\b", len = -1216815116}
srevp = {0xb7659c74, 0xb778e0c0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#7 0x080843f9 in run_actions (h=0xbfede244, a=0xb712fe5c, msg=0xb72a3584) at core/action.c:1552
t = 0xb712fe5c
ret = -1
mod = 0x4
ms = 0
__FUNCTION__ = "run_actions"
#8 0x08078a8a in do_action (h=0xbfede244, a=0xb712ff08, msg=0xb72a3584) at core/action.c:1045
ret = 1
v = 1
dst = {send_sock = 0xbfedddd4, to = {s = {sa_family = 13301, sa_data = "|\267\000\000\000\000\270\230\031\267\304\002\000"}, sin = {sin_family = 13301,
sin_port = 46972, sin_addr = {s_addr = 0}, sin_zero = "\270\230\031\267\304\002\000"}, sin6 = {sin6_family = 13301, sin6_port = 46972,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\270\230\031\267\304\002\000\000\070\336\355\277\065U'\b", __u6_addr16 = {39096, 46873, 708, 0,
56888, 49133, 21813, 2087}, __u6_addr32 = {3071908024, 708, 3220037176, 136795445}}}, sin6_scope_id = 5}}, id = 0, proto = 4 '\004', send_flags = {
f = 46946, blst_imask = 11736}}
tmp = 0xb72a36f4 ""
new_uri = 0xb77d7908 ""
end = 0xbfedde84 "\377\377\377\377\364o}\267<Y\005\b\005"
crt = 0xbfede45c "\020"
cmd = 0xbfede45c
len = -1221970284
user = -1218240796
uri = {user = {s = 0x83bd30c "core", len = 4}, passwd = {s = 0xb71cadb0 "\001", len = 138149819}, host = {s = 0x2000007e <Address 0x2000007e out of bounds>,
len = 4096}, port = {s = 0x0, len = -1222857296}, params = {s = 0xb71caf00 "\001", len = -1221969600}, sip_params = {s = 0xb72a3728 "",
len = -1221969516}, headers = {s = 0xb72a38ec "", len = -1217109483}, port_no = 33272, proto = 46722, type = 136826874, flags = 3220036884, transport = {
s = 0x0, len = 28}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0xb6e27008 "\001", len = 0}, method = {s = 0x0,
len = -1074930376}, lr = {s = 0xb68249b3 "\213\223\324\a", len = -1226674168}, r2 = {
s = 0xbfeddd14 "\344\036c\267\020ii\rT\335\355\277v-|\267\060\312c\267\262\300\005\b", len = 0}, gr = {s = 0x0, len = 0}, transport_val = {
s = 0xb7631ee4 "\032L", len = 225011984}, ttl_val = {s = 0xbfeddd54 "\324\335\355\277\365\063|\267", len = -1216598666}, user_param_val = {
s = 0xb763ca30 "GLIBC_2.0", len = 134594738}, maddr_val = {s = 0x1000 <Address 0x1000 out of bounds>, len = 134567646}, method_val = {
s = 0xb7629020 "\262\300\005\b\020ii\r", len = -1074987006}, lr_val = {s = 0xb77c8ab0 "\205\300u\344\203\304\b\270\001", len = 134567646}, r2_val = {
s = 0xb77b7c30 "libresolv.so.2", len = -1216516108}, gr_val = {
s = 0xb762c9a8 "\227\201B\250|`\234|\374Qcq\\zy\360\003\346`\033|\231/\310Km\301\243\353\372\266=/\222\210\353", <incomplete sequence \352>, len = 3}}
next_hop = {user = {s = 0xffffffff <Address 0xffffffff out of bounds>, len = 138138380}, passwd = {s = 0x4 <Address 0x4 out of bounds>, len = -1223059220},
host = {s = 0x83bffc9 "get_hdr_field", len = 135}, port = {s = 0x83bd30c "core", len = -1074930680}, params = {s = 0x8274cdd "\270", len = -1226674168},
sip_params = {s = 0xb71cab74 "\b", len = 35}, headers = {s = 0x0, len = -1222857892}, port_no = 1040, proto = 0, type = 3220036824, flags = 136795445,
transport = {s = 0x5 <Address 0x5 out of bounds>, len = 1}, ttl = {s = 0xb8 <Address 0xb8 out of bounds>, len = -1230656743}, user_param = {
s = 0x83b6c0b "fragm. from qm_malloc", len = -1222857616}, maddr = {s = 0xc9 <Address 0xc9 out of bounds>, len = -1226674168}, method = {
s = 0xb73a2298 "", len = -1222857684}, lr = {s = 0xb68281f8 <incomplete sequence \320>, len = -1230628236}, r2 = {s = 0xb6a5ab19 "core: db_id.c",
len = -1217105105}, gr = {s = 0xb6a61a74 "@\331\002", len = -1230774707}, transport_val = {
s = 0x848856c ".0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK3573981\r\nTo: <sip:998100601189@172.16.171.60>;tag=f585cd8bc1f6d3796bfeb421b703352f.8488\r\nFrom: \"James Howlett\""..., len = 1}, ttl_val = {s = 0x6f <Address 0x6f out of bounds>, len = -1222857212},
user_param_val = {s = 0x0, len = -1222857324}, maddr_val = {s = 0x0, len = 138970480}, method_val = {s = 0x10002 <Address 0x10002 out of bounds>, len = 26},
lr_val = {
s = 0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len = 0}, r2_val = {s = 0xbfede45c "\020", len = -1221970188}, gr_val = {
s = 0xbfeddf18 "h\340\355\277P\230\031\267\204\065*\267\002", len = 136893382}}
u = 0x0
port = 2114
dst_host = 0x5
i = 134567476
flags = -1
avp = 0x5
st = {flags = 138970945, id = 38528, name = {n = -1221970284, s = {s = 0xb72a3694 "\002", len = -1074928548}, re = 0xb72a3694}, avp = 0xb72a36f4}
sct = 0x805593c
sjt = 0xb77b7c98
rve = 0xb712faa0
mct = 0xb7629020
rv = 0x84885d3
rv1 = 0x0
c1 = {cache_type = RV_CACHE_EMPTY, val_type = 3072997108, c = {avp_val = {n = -1074930152, s = {s = 0xbfedde18 "\210\337\355\277PY<\266", len = 136889644},
re = 0xbfedde18}, pval = {rs = {s = 0xbfedde18 "\210\337\355\277PY<\266", len = 136889644}, ri = -1226674168, flags = -1223058892}},
i2s = "`\327;\b\273\377;\bO\001\000\000\f\323;\b\221\206H\b\231\206"}
s = {s = 0x4 <Address 0x4 out of bounds>, len = 126}
srevp = {0x579ca4, 0x57d314}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#9 0x080843f9 in run_actions (h=0xbfede244, a=0xb712ff08, msg=0xb72a3584) at core/action.c:1552
t = 0xb712ff08
ret = -1
mod = 0x0
ms = 0
__FUNCTION__ = "run_actions"
#10 0x08084b03 in run_top_route (a=0xb712ff08, msg=0xb72a3584, c=0xbfede244) at core/action.c:1641
ctx = {rec_lev = 0, run_flags = 126, last_retcode = 0, jmp_env = {{__jmpbuf = {14, 0, 0, 0, 94, 0}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 0,
0, 0, 0, 0, 0, 3061963914, 3062006264, 3220038748, 3220037764, 3061964261, 35, 1, 4, 3072110084, 3220038180, 2310458, 3220037784, 3061965435, 35, 1,
4, 3220037832, 136011880, 3072996740, 1073741828, 0, 135068986, 3072996740}}}}}
p = 0xbfede244
ret = -1222607340
sfbk = 0
#11 0x0815f9ce in receive_msg (
buf=0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len=577, rcv_info=0xbfede3fc) at core/receive.c:327
msg = 0xb72a3584
ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {-1221970284, -1074928548, -1221970188, -1074929688, -1279414975, 2021780526},
__mask_was_saved = 0, __saved_mask = {__val = {3078323352, 3078453512, 4294967295, 3078451188, 134568902, 5, 3220038336, 3078388710, 3078453952,
3076689952, 1, 5, 0, 5, 134567476, 138561348, 0, 3076746516, 1546143882, 0, 3220040028, 3220038488, 3078412688, 3220038664, 3077676560, 50195,
3078453512, 1104, 136655121, 0, 1546143882, 3220038424}}}}}
bctx = 0x80559e6
ret = 1
stats_on = 0
tvb = {tv_sec = -1074928848, tv_usec = -1216513344}
tve = {tv_sec = 134568902, tv_usec = -1216516108}
tz = {tz_minuteswest = -1218219948, tz_dsttime = 134538164}
diff = 0
inb = {
s = 0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len = 577}
netinfo = {data = {s = 0xbfede2b0 "\024mc\267\212H(\\", len = -1074929048}, dst = 0xbfede274, rcv = 0xb7629020}
keng = 0x0
__FUNCTION__ = "receive_msg"
#12 0x0825a456 in udp_rcv_loop () at core/udp_server.c:515
len = 577
buf = "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"...
tmp = 0x834e413 "counters_prefork_init"
from = 0xb71cad60
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {892171861, 4, 1546143882, 1}, addr32 = {892171861, 4, 1546143882, 1}, addr16 = {30293, 13613, 4, 0, 18570,
23592, 1, 0}, addr = "Uv-5\004\000\000\000\212H(\\\001\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {1932359253, 0, 0, 0}, addr32 = {
1932359253, 0, 0, 0}, addr16 = {30293, 29485, 0, 0, 0, 0, 0, 0}, addr = "Uv-s", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060,
proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304Uv-5\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
sin_port = 50195, sin_addr = {s_addr = 892171861}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195,
sin6_flowinfo = 892171861, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0,
0, 0}}}, sin6_scope_id = 0}}, bind_address = 0xb6e7896c, proto = 1 '\001'}
__FUNCTION__ = "udp_rcv_loop"
#13 0x080693c6 in main_loop () at main.c:1623
i = 1
pid = 0
si = 0xb6e7896c
si_desc = "udp receiver child=1 sock=185.18.45.115:5060\000\000\000\000\004\000\000\000\b\347\355\277\212H(\\\001\000\000\000\212H(\\\210\346\355\277L\343'\bd\204\271\261\004\000\000\000\031\251\066\b\350\272\066\bq\000\000\000\264\247\066\b\b\020\000\000y\221f\266\070\200 \267\277\064\300\265\230\061\301\265\f\200\001\262\f\034\300\265"
nrprocs = 4
woneinit = 1
__FUNCTION__ = "main_loop"
#14 0x080708ac in main (argc=13, argv=0xbfedead4) at main.c:2643
cfg_stream = 0x8e7a008
c = -1
r = 0
tmp = 0xbfee090d ""
tmp_len = 1
port = 0
proto = 0
options = 0x83422fc ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 4174309747
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0xbfedea00
p = 0x805d5ec "[\201\303$o<"
st = {st_dev = 14, __pad1 = 0, st_ino = 6140, st_mode = 16832, st_nlink = 2, st_uid = 0, st_gid = 0, st_rdev = 0, __pad2 = 0, st_size = 60, st_blksize = 4096,
st_blocks = 0, st_atim = {tv_sec = 1510541218, tv_nsec = 950311164}, st_mtim = {tv_sec = 1512352641, tv_nsec = 828578904}, st_ctim = {tv_sec = 1512352652,
tv_nsec = 920812953}, __unused4 = 0, __unused5 = 0}
__FUNCTION__ = "main"
Dec 4 02:57:35 webrtc-as-rct kernel: [1811495.918954] kamailio[15829] segfault at 9 ip b766b417 sp bfedbffc error 4 in libc-2.13.so[b762a000+161000]
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15901]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 24
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15826]: ALERT: <core> [main.c:743]: handle_sigs(): child process 15829 exited by a signal 11
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15826]: ALERT: <core> [main.c:746]: handle_sigs(): core was generated
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15826]: INFO: <core> [main.c:768]: handle_sigs(): terminating due to SIGCHLD
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15899]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15897]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15895]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15893]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15891]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15888]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15887]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15885]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15865]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15861]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15871]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15867]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15873]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15875]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15881]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15877]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15879]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15883]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15901]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15846]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15849]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15840]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15844]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15848]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15842]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15856]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15860]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15854]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15858]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15852]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15834]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15835]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15830]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15836]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15828]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15831]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15837]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15832]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15833]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15869]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15826]: INFO: <core> [core/sctp_core.c:53]: sctp_core_destroy(): SCTP API not initialized
N/A
kamailio -v
version: kamailio 5.0.4 (i386/linux)
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, select.
id: unknown
compiled on 11:05:34 Dec 1 2017 with gcc 4.7.2
Linux webrtc-as-rct 3.10-0.bpo.2-686-pae #1 SMP Debian 3.10.5-1~bpo70+1 (2013-08-11) i686 GNU/Linux
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.