[sr-dev] [tracker] Task opened: SegFault in parse_avp_db

sip-router bugtracker at sip-router.org
Wed Dec 11 18:56:58 CET 2013


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

A new Flyspray task has been opened.  Details are below. 

User who did this - Kevin Scott Adams (TheGrandWazoo) 

Attached to Project - sip-router
Summary - SegFault in parse_avp_db
Task Type - Bug Report
Category - Module
Status - Unconfirmed
Assigned To - 
Operating System - Linux
Severity - Critical
Priority - Normal
Reported Version - 4.1
Due in Version - Undecided
Due Date - Undecided
Details - Upgraded to 4.1 to fix a SegFault with t_load_contacts and now have this SegFault on startup.

Core was generated by `kamailio'.
Program terminated with signal 11, Segmentation fault.
#0  0x00002b359c9b4d9d in parse_avp_db (s=0x2b35985f2788 "*", dbp=0x2b35986963c8, allow_scheme=1) at avpops_parse.c:132
132                     dbp->a.u.sval->pvp.pvn.u.isname.type |= (flags<<8)&0xff00;
(gdb) bt full
#0  0x00002b359c9b4d9d in parse_avp_db (s=0x2b35985f2788 "*", dbp=0x2b35986963c8, allow_scheme=1) at avpops_parse.c:132
        ul = 47509190304664
        tmp = {s = 0x2b35985f2788 "*", len = -1739042800}
        s0 = {s = 0x2b359c9b9eea "fixup_db_avp", len = -1667522637}
        have_scheme = 0 '\000'
        p0 = 0x0
        flags = 0
        __FUNCTION__ = "parse_avp_db"
#1  0x00002b359c99e731 in fixup_db_avp (param=0x2b35985f21b8, param_no=2, allow_scheme=1) at avpops.c:295
        sp = 0x2b3598696348
        dbp = 0x2b35986963c8
        flags = 0
        s = {s = 0x2b35985f2788 "*", len = 3}
        p = 0x0
        __FUNCTION__ = "fixup_db_avp"
#2  0x00002b359c99e8c0 in fixup_db_load_avp (param=0x2b35985f21b8, param_no=2) at avpops.c:309
No locals.
#3  0x00000000004b1f0d in fix_actions (a=0x2b35985f2148) at route.c:975
        t = 0x2b35985f2148
        p = 0x5f8c59
        tmp = 0x2b35985ec7c8 "SETPAI with fU as: $fU"
        tmp_p = 0x2b35985f2788
        ret = 0
        i = 1
        cmd = 0x2b35985d5b98
        s = {s = 0x2b3598696660 "\310\307^\230\065+", len = 0}
        he = 0x2b35985ec7c8
        ip = {af = 48, len = 48, u = {addrl = {140733577136352, 140733577136144}, addr32 = {383748320, 32767, 383748112,
              32767}, addr16 = {35040, 5855, 32767, 0, 34832, 5855, 32767, 0},
            addr = "\340\210\337\026\377\177\000\000\020\210\337\026\377\177\000"}}
        si = 0x2b3500000016
        lval = 0x2b359b6d853d
        rve = 0x2b3598693700
        err_rve = 0x324b84cf08
        rve_type = 32767
        err_type = 383748352
        expected_type = RV_NONE
        rv = 0x10
        rve_param_no = 0
        __FUNCTION__ = "fix_actions"
#4  0x00000000004cc862 in fix_rval (rv=0x2b35985f2870) at rvalue.c:2883
        __FUNCTION__ = "fix_rval"
#5  0x00000000004d4c70 in fix_rval_expr (p=0x2b35985f2868) at rvalue.c:3804
        rve = 0x2b35985f2868
        ret = 32767
        __FUNCTION__ = "fix_rval_expr"
#6  0x00000000004aff2d in fix_actions (a=0x2b35985f1528) at route.c:750
        t = 0x2b35985f3f08
        p = 0x4cc862
        tmp = 0x5f8c50 "fix_rval"
        tmp_p = 0x2b35985ec7c8
        ret = 0
        i = 2
        cmd = 0x2b35985d1b90
---Type <return> to continue, or q <return> to quit---
        s = {s = 0x5d8e18 "DEBUG", len = 383750288}
        he = 0x2b359b6d853d
        ip = {af = 16, len = 0, u = {addrl = {6131224, 4294967300}, addr32 = {6131224, 0, 4, 1}, addr16 = {36376, 93, 0, 0,
              4, 0, 1, 0}, addr = "\030\216]\000\000\000\000\000\004\000\000\000\001\000\000"}}
        si = 0x5d8e18
        lval = 0x7fff16df8b90
        rve = 0x2b35985f2868
        err_rve = 0x0
        rve_type = RV_INT
        err_type = 2607646013
        expected_type = 11061
        rv = 0x7fff16df8cf4
        rve_param_no = 0
        __FUNCTION__ = "fix_actions"
#7  0x00000000004aff6c in fix_actions (a=0x2b35985f0598) at route.c:754
        t = 0x2b35985f4048
        p = 0x0
        tmp = 0x7fff16df8fb0 ""
        tmp_p = 0x2b35985ec518
        ret = 0
        i = 2
        cmd = 0x2b35985d1b90
        s = {s = 0x2b35985e0b58 "Route", len = 5}
        he = 0x7fff16df8d80
        ip = {af = 383749552, len = 32767, u = {addrl = {5533488, 17179869188}, addr32 = {5533488, 0, 4, 4}, addr16 = {
              28464, 84, 0, 0, 4, 0, 4, 0}, addr = "0oT\000\000\000\000\000\004\000\000\000\004\000\000"}}
        si = 0x2b359dad3518
        lval = 0x2b35985e25d0
        rve = 0x2b35985f08e0
        err_rve = 0x0
        rve_type = RV_INT
        err_type = 2648027208
        expected_type = RV_NONE
        rv = 0x2b35985e5a50
        rve_param_no = 0
        __FUNCTION__ = "fix_actions"
#8  0x00000000004b9efb in fix_rl (rt=0x939b80) at route.c:2162
        i = 1
        ret = 0
#9  0x00000000004b9f39 in fix_rls () at route.c:2178
        ret = 4985
#10 0x0000000000470507 in main (argc=1, argv=0x7fff16df9098) at main.c:2522
        cfg_stream = 0xefc9010
        c = -1
        r = 50
        tmp = 0x7fff16df8f87 ""
        tmp_len = 32767
        port = 383750022
        proto = 0
        options = 0x5e2318 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
        ret = -1
        seed = 3011491440
        rfd = 4
        debug_save = 0
---Type <return> to continue, or q <return> to quit---
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0x324b61cbc0 ""
        __FUNCTION__ = "main"


Thanks

More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=381

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the sr-dev mailing list