THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
A new Flyspray task has been opened. Details are below.
User who did this - Kevin Scott Adams (TheGrandWazoo)
Attached to Project - sip-router Summary - SegFault in parse_avp_db Task Type - Bug Report Category - Module Status - Unconfirmed Assigned To - Operating System - Linux Severity - Critical Priority - Normal Reported Version - 4.1 Due in Version - Undecided Due Date - Undecided Details - Upgraded to 4.1 to fix a SegFault with t_load_contacts and now have this SegFault on startup.
Core was generated by `kamailio'. Program terminated with signal 11, Segmentation fault. #0 0x00002b359c9b4d9d in parse_avp_db (s=0x2b35985f2788 "*", dbp=0x2b35986963c8, allow_scheme=1) at avpops_parse.c:132 132 dbp->a.u.sval->pvp.pvn.u.isname.type |= (flags<<8)&0xff00; (gdb) bt full #0 0x00002b359c9b4d9d in parse_avp_db (s=0x2b35985f2788 "*", dbp=0x2b35986963c8, allow_scheme=1) at avpops_parse.c:132 ul = 47509190304664 tmp = {s = 0x2b35985f2788 "*", len = -1739042800} s0 = {s = 0x2b359c9b9eea "fixup_db_avp", len = -1667522637} have_scheme = 0 '\000' p0 = 0x0 flags = 0 __FUNCTION__ = "parse_avp_db" #1 0x00002b359c99e731 in fixup_db_avp (param=0x2b35985f21b8, param_no=2, allow_scheme=1) at avpops.c:295 sp = 0x2b3598696348 dbp = 0x2b35986963c8 flags = 0 s = {s = 0x2b35985f2788 "*", len = 3} p = 0x0 __FUNCTION__ = "fixup_db_avp" #2 0x00002b359c99e8c0 in fixup_db_load_avp (param=0x2b35985f21b8, param_no=2) at avpops.c:309 No locals. #3 0x00000000004b1f0d in fix_actions (a=0x2b35985f2148) at route.c:975 t = 0x2b35985f2148 p = 0x5f8c59 tmp = 0x2b35985ec7c8 "SETPAI with fU as: $fU" tmp_p = 0x2b35985f2788 ret = 0 i = 1 cmd = 0x2b35985d5b98 s = {s = 0x2b3598696660 "\310\307^\230\065+", len = 0} he = 0x2b35985ec7c8 ip = {af = 48, len = 48, u = {addrl = {140733577136352, 140733577136144}, addr32 = {383748320, 32767, 383748112, 32767}, addr16 = {35040, 5855, 32767, 0, 34832, 5855, 32767, 0}, addr = "\340\210\337\026\377\177\000\000\020\210\337\026\377\177\000"}} si = 0x2b3500000016 lval = 0x2b359b6d853d rve = 0x2b3598693700 err_rve = 0x324b84cf08 rve_type = 32767 err_type = 383748352 expected_type = RV_NONE rv = 0x10 rve_param_no = 0 __FUNCTION__ = "fix_actions" #4 0x00000000004cc862 in fix_rval (rv=0x2b35985f2870) at rvalue.c:2883 __FUNCTION__ = "fix_rval" #5 0x00000000004d4c70 in fix_rval_expr (p=0x2b35985f2868) at rvalue.c:3804 rve = 0x2b35985f2868 ret = 32767 __FUNCTION__ = "fix_rval_expr" #6 0x00000000004aff2d in fix_actions (a=0x2b35985f1528) at route.c:750 t = 0x2b35985f3f08 p = 0x4cc862 tmp = 0x5f8c50 "fix_rval" tmp_p = 0x2b35985ec7c8 ret = 0 i = 2 cmd = 0x2b35985d1b90 ---Type <return> to continue, or q <return> to quit--- s = {s = 0x5d8e18 "DEBUG", len = 383750288} he = 0x2b359b6d853d ip = {af = 16, len = 0, u = {addrl = {6131224, 4294967300}, addr32 = {6131224, 0, 4, 1}, addr16 = {36376, 93, 0, 0, 4, 0, 1, 0}, addr = "\030\216]\000\000\000\000\000\004\000\000\000\001\000\000"}} si = 0x5d8e18 lval = 0x7fff16df8b90 rve = 0x2b35985f2868 err_rve = 0x0 rve_type = RV_INT err_type = 2607646013 expected_type = 11061 rv = 0x7fff16df8cf4 rve_param_no = 0 __FUNCTION__ = "fix_actions" #7 0x00000000004aff6c in fix_actions (a=0x2b35985f0598) at route.c:754 t = 0x2b35985f4048 p = 0x0 tmp = 0x7fff16df8fb0 "" tmp_p = 0x2b35985ec518 ret = 0 i = 2 cmd = 0x2b35985d1b90 s = {s = 0x2b35985e0b58 "Route", len = 5} he = 0x7fff16df8d80 ip = {af = 383749552, len = 32767, u = {addrl = {5533488, 17179869188}, addr32 = {5533488, 0, 4, 4}, addr16 = { 28464, 84, 0, 0, 4, 0, 4, 0}, addr = "0oT\000\000\000\000\000\004\000\000\000\004\000\000"}} si = 0x2b359dad3518 lval = 0x2b35985e25d0 rve = 0x2b35985f08e0 err_rve = 0x0 rve_type = RV_INT err_type = 2648027208 expected_type = RV_NONE rv = 0x2b35985e5a50 rve_param_no = 0 __FUNCTION__ = "fix_actions" #8 0x00000000004b9efb in fix_rl (rt=0x939b80) at route.c:2162 i = 1 ret = 0 #9 0x00000000004b9f39 in fix_rls () at route.c:2178 ret = 4985 #10 0x0000000000470507 in main (argc=1, argv=0x7fff16df9098) at main.c:2522 cfg_stream = 0xefc9010 c = -1 r = 50 tmp = 0x7fff16df8f87 "" tmp_len = 32767 port = 383750022 proto = 0 options = 0x5e2318 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 3011491440 rfd = 4 debug_save = 0 ---Type <return> to continue, or q <return> to quit--- debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x0 p = 0x324b61cbc0 "" __FUNCTION__ = "main"
Thanks
More information can be found at the following URL: http://sip-router.org/tracker/index.php?do=details&task_id=381
You are receiving this message because you have requested it from the Flyspray bugtracking system. If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.