[sr-dev] [tracker] Comment added: Bug in tm with topoh modules - segfault on callid comparison.

sip-router bugtracker at sip-router.org
Mon Feb 3 14:28:42 CET 2014


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

The following task has a new comment added:

FS#390 - Bug in tm with topoh modules - segfault on callid comparison.
User who did this - Nick Altmann (nikbyte)

----------
Missing separate debuginfos, use: debuginfo-install glibc-2.12-1.132.el6.x86_64
(gdb) bt full
#0  0x00007f8ad98aac6b in t_reply_matching (p_msg=0x7f8adaca2f20,
    p_branch=0x7fff352a8380) at t_lookup.c:987
        p_cell = 0x7f8ad7b0dcb8
        hash_index = 40642
        entry_label = 0
        branch_id = 0
        hashi = 0x92362d "2ce9.682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1>;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCa"...
        branchi = 0x923653 "0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1>;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCall-ID: 1b0ba56b55c2286d-30157 at 127.0.0."...
        p = 0x923653 "0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1>;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCall-ID: 1b0ba56b55c2286d-30157 at 127.0.0."...
        n = 0x923654 ";rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1>;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCall-ID: 1b0ba56b55c2286d-30157 at 127.0.0.1"...
        hash_bucket = 0x7f8ad7a2f8e8
        hashl = 4
        branchl = 1
        scan_space = 1
        cseq_method = {
          s = 0x9236ec "INVIE\r\nCall-ID: 1b0ba56b55c2286d-30157 at 127.0.0.1\r\nContent-Length: 0\r\nTH: uch\r\n\r\n", len = 5}
        req_method = {
          s = 0x7f8ad7b0f2f8 "INVIE sip:127.0.0.1:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 127.0.0.1;branch=z9hG4bK2ce9.682f8ec6", '0' <repeats 24 times>, ".0\r\nTo: <sip:@127.0.0.1>\r\nFrom: <sip:@127.0.0.1>;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae"..., len = 5}
        loopi = 0x923632 "682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1>;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCall-ID"...
        loopl = 32
        is_cancel = 0
        __FUNCTION__ = "t_reply_matching"
#1  0x00007f8ad98ac43c in t_check_msg (p_msg=0x7f8adaca2f20,
    param_branch=0x7fff352a8380) at t_lookup.c:1129
        local_branch = 6477824
        canceled = 4
        ret = 0
        __FUNCTION__ = "t_check_msg"
#2  0x00007f8ad98ac917 in t_check (p_msg=0x7f8adaca2f20,
    param_branch=0x7fff352a8380) at t_lookup.c:1171
        ret = 0
#3  0x00007f8ad98ca196 in reply_received (p_msg=0x7f8adaca2f20)
    at t_reply.c:2188
        msg_status = 9582177
        last_uac_status = 0
        ack = 0x40 <Address 0x40 out of bounds>
        ack_len = 0
        branch = 6417986
        reply_status = -624285616
        onreply_route = 32650
        cancel_data = {cancel_bitmap = 9582396, reason = {cause = 13821, u = {
              text = {s = 0xa00000141 <Address 0xa00000141 out of bounds>,
                len = 9582076}, e2e_cancel = 0xa00000141, packed_hdrs = {
                s = 0xa00000141 <Address 0xa00000141 out of bounds>,
                len = 9582076}}}}
        uac = 0x800000001
        t = 0x7f8adac7a200
        lack_dst = {send_sock = 0x0, to = {s = {sa_family = 0,
              sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0,
              sin_port = 0, sin_addr = {s_addr = 0},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {
                __in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
                  __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0,
                    0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 48 '0',
          send_flags = {f = 162 '\242', blst_imask = 199 '\307'}}
        backup_user_from = 0x40092373c
        backup_user_to = 0x61d080
        backup_domain_from = 0x414cc0
        backup_domain_to = 0x3352a8a10
        backup_uri_from = 0x0
        backup_uri_to = 0x7f8adaca3118
        backup_xavps = 0x7fff352a8480
        replies_locked = 5581672
        branch_ret = 0
        prev_branch = 0
        blst_503_timeout = 0
        hf = 0x7f8adaca2f40
        onsend_params = {req = 0x7fff352a83e0, rpl = 0x550580,
          param = 0x6a7e0, code = 0, flags = 3, branch = 0,
          t_rbuf = 0x7f8adac39380, dst = 0x7f8adac7a200, send_buf = {
            s = 0x7fff352a83e0 "\200\204*5\377\177", len = 5536481}}
        ctx = {rec_lev = 9582175, run_flags = 0, last_retcode = -624454040,
          jmp_env = {{__jmpbuf = {20850121736, 6477824, 4279488, 13776882192,
                0, 9582396, 140734085366512, 5791708}, __mask_was_saved = 0,
              __saved_mask = {__val = {0, 0, 0, 0, 140234352896080, 9582396,
                  9582082, 361695345073193192, 9582177, 9582165, 3670681632,
                  140234352896080, 140234352727704, 140234352898328, 4279488,
                  140734085368336}}}}}
        __FUNCTION__ = "reply_received"
#4  0x000000000045d66f in do_forward_reply (msg=0x7f8adaca2f20, mode=0)
    at forward.c:777
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0,
              sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0,
              sin_port = 0, sin_addr = {s_addr = 0},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {
                __in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
                  __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0,
                    0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000',
          send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        new_len = 32650
        r = 0
        s = 0x15cdaca2f28 <Address 0x15cdaca2f28 out of bounds>
        len = 0
        __FUNCTION__ = "do_forward_reply"
#5  0x000000000045df30 in forward_reply (msg=0x7f8adaca2f20) at forward.c:860
No locals.
#6  0x00000000004a558f in receive_msg (
    buf=0x9235e0 "SIP/2.0 408 Request Timeout\r\nVia: SIP/2.0/UDP 127.0.0.1;TH=ucv;branch=z9hG4bK2ce9.682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <"...,
    len=348, rcv_info=0x7fff352a86e0) at receive.c:273
        msg = 0x7f8adaca2f20
        ctx = {rec_lev = 8864888, run_flags = 0, last_retcode = 0, jmp_env = {{
              __jmpbuf = {0, 0, 0, 140234364788720, 1, 0, 140234352464456, 1},
              __mask_was_saved = -678816384, __saved_mask = {__val = {
                  140234300901204, 891979408, 1024, 5186946624,
                  140234298365312, 140734085367360, 5473105, 0,
                  140234298365312, 50195, 140234298365312, 140734085367624,
                  7913654952, 140734085367440, 5473233, 7}}}}}
        ret = 32650
        inb = {
          s = 0x9235e0 "SIP/2.0 408 Request Timeout\r\nVia: SIP/2.0/UDP 127.0.0.1;TH=ucv;branch=z9hG4bK2ce9.682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <"..., len = 348}
        __FUNCTION__ = "receive_msg"
#7  0x000000000053c394 in udp_rcv_loop () at udp_server.c:536
        len = 332
        buf = "SIP/2.0 408 Request Timeout\r\nVia: SIP/2.0/UDP 127.0.0.1;TH=ucv;branch=z9hG4bK2ce9.682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: <sip:@127.0.0.1>;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1"...
        tmp = 0x7fff352a8a10 "\006"
        from = 0x7f8adac93ac8
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {16777343,
                140734085368336}, addr32 = {16777343, 0, 891980304, 32767},
              addr16 = {127, 256, 0, 0, 35344, 13610, 32767, 0},
              addr = "\177\000\000\001\000\000\000\000\020\212*5\377\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0,
                0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0},
              addr = "\177\000\000\001", '\000' <repeats 11 times>}},
          src_port = 5060, dst_port = 5060, proto_reserved1 = 0,
          proto_reserved2 = 0, src_su = {s = {sa_family = 2,
              sa_data = "\023\304\177\000\000\001\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 16777343},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 16777343,
              sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
                  __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0,
                    0, 0}}}, sin6_scope_id = 0}},
         bind_address = 0x7f8adac9b930, proto = 1 '\001'}
        __FUNCTION__ = "udp_rcv_loop"
#8  0x000000000046c698 in main_loop () at main.c:1428
        i = 9676896
        pid = 30158
        si = 0x4dac81728
        si_desc = "\300LA\000\000\000\000\000P\030\310ڊ\177", '\000' <repeats 14 times>, "\001\000\000\000\210\060\311ڊ\177\000\000\256\bI\000\000\000\000\000\001\000\000\000z\000\000\000~}^\000\000\000\000\000`o^\000\000\000\000\000\340\n^\000\000\000\000\000\300LA\000\000\000\000\000\020\212*5\377\177", '\000' <repeats 18 times>, "P\210*5\377\177\000\000.\241K\000\000\000\000"
        nrprocs = 0
        __FUNCTION__ = "main_loop"
#9  0x000000000047030b in main (argc=6, argv=0x7fff352a8a18) at main.c:2533
        cfg_stream = 0x226e010
        c = -1
        r = 0
        tmp = 0x7f8adb0ca918 "H\205\300uCD9t$\fv\034A\203\306\001\353\210f\017\037D"
        tmp_len = 0
        port = 0
        proto = 0
        options = 0x5e02b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A
        ret = -1
        seed = 2437127770
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 1
        n_lst = 0x7f8adb049ba0
        p = 0x5ca3e0 "H\211l$\330L\211d$\340H\215-\017\234*"
        __FUNCTION__ = "main"

----------

More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=390#comment1284

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the sr-dev mailing list