THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
A new Flyspray task has been opened. Details are below.
User who did this - Ovidiu Sas (osas)
Attached to Project - sip-router
Summary - kamailio 3.0.x: segfault in carrierroute
Task Type - Bug Report
Category - Module
Status - Unconfirmed
Assigned To -
Operating System - All
Severity - Critical
Priority - Normal
Reported Version - Development
Due in Version - Undecided
Due Date - Undecided
Details - If a cr_route is called via PVs and the carrier pv is pointing to a non existing
carrier, it segfaults.
from the config file:
xlog("L_INFO","[$mi] cr_route(\"$avp(i:707)\",
\"$var(domain)\");\n");
if (cr_route("$avp(i:707)", "$var(domain)", "$rU",
"$rU", "call_id")) {
And the logs shows:
INFO: <script>: [1] cr_route("3", "1");
ALERT: <core> [main.c:722]: child process 4152 exited by a signal 11
There's no carrier 3 in my routes, but this should not crash the server.
Here's the backtrace:
(gdb) bt
#0 0x00a0c16a in strnlen () from /lib/libc.so.6
#1 0x009dba0d in vfprintf () from /lib/libc.so.6
#2 0x00a6a236 in __vsyslog_chk () from /lib/libc.so.6
#3 0x00a6a43a in syslog () from /lib/libc.so.6
#4 0x0051d917 in cr_do_route (_msg=0x82a74d0, _carrier=0x82a16a0, _domain=0x82a2968,
_prefix_matching=0x82a29f0, _rewrite_user=0x82a2a58, _hsrc=shs_call_id, _halg=alg_crc32,
_dstavp=0x0) at cr_func.c:102
#5 0x0051e5c0 in cr_route5 (_msg=0x82a74d0, _carrier=0x82a16a0, _domain=0x82a2968,
_prefix_matching=0x82a29f0, _rewrite_user=0x82a2a58, _hsrc=shs_call_id) at cr_func.c:684
#6 0x08057d81 in do_action (h=0xbfb38fe8, a=0x8288d00, msg=0x82a74d0) at action.c:911
#7 0x0805a8bd in run_actions (h=0xbfb38fe8, a=0x8288d00, msg=0x82a74d0) at action.c:1293
#8 0x080dad54 in rval_get_int (h=0xbfb38fe8, msg=0x947368, i=0xbfb38954, rv=0x94762b,
cache=0x0) at rvalue.c:897
#9 0x080dfcfb in rval_expr_eval_int (h=0xbfb38fe8, msg=0x82a74d0, res=0xbfb38954,
rve=0x8289028) at rvalue.c:1837
#10 0x08056db7 in do_action (h=0xbfb38fe8, a=0x828bd60, msg=0x82a74d0) at action.c:834
#11 0x0805a8bd in run_actions (h=0xbfb38fe8, a=0x82889e0, msg=0x82a74d0) at action.c:1293
#12 0x08057340 in do_action (h=0xbfb38fe8, a=0x828ca88, msg=0x82a74d0) at action.c:1131
#13 0x0805a8bd in run_actions (h=0xbfb38fe8, a=0x8287868, msg=0x82a74d0) at action.c:1293
#14 0x08056e15 in do_action (h=0xbfb38fe8, a=0x828e960, msg=0x82a74d0) at action.c:849
#15 0x0805a8bd in run_actions (h=0xbfb38fe8, a=0x827e5e0, msg=0x82a74d0) at action.c:1293
#16 0x0805ac24 in run_top_route (a=0x827e5e0, msg=0x82a74d0, c=0x0) at action.c:1341
#17 0x080c4072 in receive_msg (
buf=0x825c4e0 "INVITE sip:123@192.168.2.108 SIP/2.0\r\nVia: SIP/2.0/UDP
192.168.2.105:62392;branch=z9hG4bK-d8754z-a372283e165cdf75-1---d8754z-;rport\r\nMax-Forwards:
69\r\nContact: <sip:282@192.168.2.105:62392>\r\nTo: \"123\""...,
len=751, rcv_info=0xbfb391f8) at receive.c:196
#18 0x0814e031 in udp_rcv_loop () at udp_server.c:520
#19 0x0809a9a1 in main_loop () at main.c:1447
#20 0x0809bc02 in main (argc=1, argv=0xbfb39484) at main.c:2251
More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=60
You are receiving this message because you have requested it from the Flyspray bugtracking
system. If you did not expect this message or don't want to receive mails in future,
you can change your notification settings at the URL shown above.