[sr-dev] [tracker] Comment added: Bug in tm with topoh modules - segfault on callid comparison.
sip-router
bugtracker at sip-router.org
Mon Feb 3 14:28:42 CET 2014
THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
The following task has a new comment added:
FS#390 - Bug in tm with topoh modules - segfault on callid comparison.
User who did this - Nick Altmann (nikbyte)
----------
Missing separate debuginfos, use: debuginfo-install glibc-2.12-1.132.el6.x86_64
(gdb) bt full
#0 0x00007f8ad98aac6b in t_reply_matching (p_msg=0x7f8adaca2f20,
p_branch=0x7fff352a8380) at t_lookup.c:987
p_cell = 0x7f8ad7b0dcb8
hash_index = 40642
entry_label = 0
branch_id = 0
hashi = 0x92362d "2ce9.682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1>;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCa"...
branchi = 0x923653 "0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1>;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCall-ID: 1b0ba56b55c2286d-30157 at 127.0.0."...
p = 0x923653 "0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1>;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCall-ID: 1b0ba56b55c2286d-30157 at 127.0.0."...
n = 0x923654 ";rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1>;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCall-ID: 1b0ba56b55c2286d-30157 at 127.0.0.1"...
hash_bucket = 0x7f8ad7a2f8e8
hashl = 4
branchl = 1
scan_space = 1
cseq_method = {
s = 0x9236ec "INVIE\r\nCall-ID: 1b0ba56b55c2286d-30157 at 127.0.0.1\r\nContent-Length: 0\r\nTH: uch\r\n\r\n", len = 5}
req_method = {
s = 0x7f8ad7b0f2f8 "INVIE sip:127.0.0.1:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 127.0.0.1;branch=z9hG4bK2ce9.682f8ec6", '0' <repeats 24 times>, ".0\r\nTo: <sip:@127.0.0.1>\r\nFrom: <sip:@127.0.0.1>;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae"..., len = 5}
loopi = 0x923632 "682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1>;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCall-ID"...
loopl = 32
is_cancel = 0
__FUNCTION__ = "t_reply_matching"
#1 0x00007f8ad98ac43c in t_check_msg (p_msg=0x7f8adaca2f20,
param_branch=0x7fff352a8380) at t_lookup.c:1129
local_branch = 6477824
canceled = 4
ret = 0
__FUNCTION__ = "t_check_msg"
#2 0x00007f8ad98ac917 in t_check (p_msg=0x7f8adaca2f20,
param_branch=0x7fff352a8380) at t_lookup.c:1171
ret = 0
#3 0x00007f8ad98ca196 in reply_received (p_msg=0x7f8adaca2f20)
at t_reply.c:2188
msg_status = 9582177
last_uac_status = 0
ack = 0x40 <Address 0x40 out of bounds>
ack_len = 0
branch = 6417986
reply_status = -624285616
onreply_route = 32650
cancel_data = {cancel_bitmap = 9582396, reason = {cause = 13821, u = {
text = {s = 0xa00000141 <Address 0xa00000141 out of bounds>,
len = 9582076}, e2e_cancel = 0xa00000141, packed_hdrs = {
s = 0xa00000141 <Address 0xa00000141 out of bounds>,
len = 9582076}}}}
uac = 0x800000001
t = 0x7f8adac7a200
lack_dst = {send_sock = 0x0, to = {s = {sa_family = 0,
sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0,
sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {
__in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0,
0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 48 '0',
send_flags = {f = 162 '\242', blst_imask = 199 '\307'}}
backup_user_from = 0x40092373c
backup_user_to = 0x61d080
backup_domain_from = 0x414cc0
backup_domain_to = 0x3352a8a10
backup_uri_from = 0x0
backup_uri_to = 0x7f8adaca3118
backup_xavps = 0x7fff352a8480
replies_locked = 5581672
branch_ret = 0
prev_branch = 0
blst_503_timeout = 0
hf = 0x7f8adaca2f40
onsend_params = {req = 0x7fff352a83e0, rpl = 0x550580,
param = 0x6a7e0, code = 0, flags = 3, branch = 0,
t_rbuf = 0x7f8adac39380, dst = 0x7f8adac7a200, send_buf = {
s = 0x7fff352a83e0 "\200\204*5\377\177", len = 5536481}}
ctx = {rec_lev = 9582175, run_flags = 0, last_retcode = -624454040,
jmp_env = {{__jmpbuf = {20850121736, 6477824, 4279488, 13776882192,
0, 9582396, 140734085366512, 5791708}, __mask_was_saved = 0,
__saved_mask = {__val = {0, 0, 0, 0, 140234352896080, 9582396,
9582082, 361695345073193192, 9582177, 9582165, 3670681632,
140234352896080, 140234352727704, 140234352898328, 4279488,
140734085368336}}}}}
__FUNCTION__ = "reply_received"
#4 0x000000000045d66f in do_forward_reply (msg=0x7f8adaca2f20, mode=0)
at forward.c:777
new_buf = 0x0
dst = {send_sock = 0x0, to = {s = {sa_family = 0,
sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0,
sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {
__in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0,
0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000',
send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
new_len = 32650
r = 0
s = 0x15cdaca2f28 <Address 0x15cdaca2f28 out of bounds>
len = 0
__FUNCTION__ = "do_forward_reply"
#5 0x000000000045df30 in forward_reply (msg=0x7f8adaca2f20) at forward.c:860
No locals.
#6 0x00000000004a558f in receive_msg (
buf=0x9235e0 "SIP/2.0 408 Request Timeout\r\nVia: SIP/2.0/UDP 127.0.0.1;TH=ucv;branch=z9hG4bK2ce9.682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <"...,
len=348, rcv_info=0x7fff352a86e0) at receive.c:273
msg = 0x7f8adaca2f20
ctx = {rec_lev = 8864888, run_flags = 0, last_retcode = 0, jmp_env = {{
__jmpbuf = {0, 0, 0, 140234364788720, 1, 0, 140234352464456, 1},
__mask_was_saved = -678816384, __saved_mask = {__val = {
140234300901204, 891979408, 1024, 5186946624,
140234298365312, 140734085367360, 5473105, 0,
140234298365312, 50195, 140234298365312, 140734085367624,
7913654952, 140734085367440, 5473233, 7}}}}}
ret = 32650
inb = {
s = 0x9235e0 "SIP/2.0 408 Request Timeout\r\nVia: SIP/2.0/UDP 127.0.0.1;TH=ucv;branch=z9hG4bK2ce9.682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <"..., len = 348}
__FUNCTION__ = "receive_msg"
#7 0x000000000053c394 in udp_rcv_loop () at udp_server.c:536
len = 332
buf = "SIP/2.0 408 Request Timeout\r\nVia: SIP/2.0/UDP 127.0.0.1;TH=ucv;branch=z9hG4bK2ce9.682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1"...
tmp = 0x7fff352a8a10 "\006"
from = 0x7f8adac93ac8
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {16777343,
140734085368336}, addr32 = {16777343, 0, 891980304, 32767},
addr16 = {127, 256, 0, 0, 35344, 13610, 32767, 0},
addr = "\177\000\000\001\000\000\000\000\020\212*5\377\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0,
0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0},
addr = "\177\000\000\001", '\000' <repeats 11 times>}},
src_port = 5060, dst_port = 5060, proto_reserved1 = 0,
proto_reserved2 = 0, src_su = {s = {sa_family = 2,
sa_data = "\023\304\177\000\000\001\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 16777343},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 16777343,
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0,
0, 0}}}, sin6_scope_id = 0}},
bind_address = 0x7f8adac9b930, proto = 1 '\001'}
__FUNCTION__ = "udp_rcv_loop"
#8 0x000000000046c698 in main_loop () at main.c:1428
i = 9676896
pid = 30158
si = 0x4dac81728
si_desc = "\300LA\000\000\000\000\000P\030\310ڊ\177", '\000' <repeats 14 times>, "\001\000\000\000\210\060\311ڊ\177\000\000\256\bI\000\000\000\000\000\001\000\000\000z\000\000\000~}^\000\000\000\000\000`o^\000\000\000\000\000\340\n^\000\000\000\000\000\300LA\000\000\000\000\000\020\212*5\377\177", '\000' <repeats 18 times>, "P\210*5\377\177\000\000.\241K\000\000\000\000"
nrprocs = 0
__FUNCTION__ = "main_loop"
#9 0x000000000047030b in main (argc=6, argv=0x7fff352a8a18) at main.c:2533
cfg_stream = 0x226e010
c = -1
r = 0
tmp = 0x7f8adb0ca918 "H\205\300uCD9t$\fv\034A\203\306\001\353\210f\017\037D"
tmp_len = 0
port = 0
proto = 0
options = 0x5e02b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A
ret = -1
seed = 2437127770
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 1
n_lst = 0x7f8adb049ba0
p = 0x5ca3e0 "H\211l$\330L\211d$\340H\215-\017\234*"
__FUNCTION__ = "main"
----------
More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=390#comment1284
You are receiving this message because you have requested it from the Flyspray bugtracking system. If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.
More information about the sr-dev
mailing list