THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
A new Flyspray task has been opened. Details are below.
User who did this - Kevin Scott Adams (TheGrandWazoo)
Attached to Project - sip-router
Summary - SegFault in parse_avp_db
Task Type - Bug Report
Category - Module
Status - Unconfirmed
Assigned To -
Operating System - Linux
Severity - Critical
Priority - Normal
Reported Version - 4.1
Due in Version - Undecided
Due Date - Undecided
Details - Upgraded to 4.1 to fix a SegFault with t_load_contacts and now have this
SegFault on startup.
Core was generated by `kamailio'.
Program terminated with signal 11, Segmentation fault.
#0 0x00002b359c9b4d9d in parse_avp_db (s=0x2b35985f2788 "*",
dbp=0x2b35986963c8, allow_scheme=1) at avpops_parse.c:132
132 dbp->a.u.sval->pvp.pvn.u.isname.type |=
(flags<<8)&0xff00;
(gdb) bt full
#0 0x00002b359c9b4d9d in parse_avp_db (s=0x2b35985f2788 "*",
dbp=0x2b35986963c8, allow_scheme=1) at avpops_parse.c:132
ul = 47509190304664
tmp = {s = 0x2b35985f2788 "*", len = -1739042800}
s0 = {s = 0x2b359c9b9eea "fixup_db_avp", len = -1667522637}
have_scheme = 0 '\000'
p0 = 0x0
flags = 0
__FUNCTION__ = "parse_avp_db"
#1 0x00002b359c99e731 in fixup_db_avp (param=0x2b35985f21b8, param_no=2, allow_scheme=1)
at avpops.c:295
sp = 0x2b3598696348
dbp = 0x2b35986963c8
flags = 0
s = {s = 0x2b35985f2788 "*", len = 3}
p = 0x0
__FUNCTION__ = "fixup_db_avp"
#2 0x00002b359c99e8c0 in fixup_db_load_avp (param=0x2b35985f21b8, param_no=2) at
avpops.c:309
No locals.
#3 0x00000000004b1f0d in fix_actions (a=0x2b35985f2148) at route.c:975
t = 0x2b35985f2148
p = 0x5f8c59
tmp = 0x2b35985ec7c8 "SETPAI with fU as: $fU"
tmp_p = 0x2b35985f2788
ret = 0
i = 1
cmd = 0x2b35985d5b98
s = {s = 0x2b3598696660 "\310\307^\230\065+", len = 0}
he = 0x2b35985ec7c8
ip = {af = 48, len = 48, u = {addrl = {140733577136352, 140733577136144}, addr32 =
{383748320, 32767, 383748112,
32767}, addr16 = {35040, 5855, 32767, 0, 34832, 5855, 32767, 0},
addr =
"\340\210\337\026\377\177\000\000\020\210\337\026\377\177\000"}}
si = 0x2b3500000016
lval = 0x2b359b6d853d
rve = 0x2b3598693700
err_rve = 0x324b84cf08
rve_type = 32767
err_type = 383748352
expected_type = RV_NONE
rv = 0x10
rve_param_no = 0
__FUNCTION__ = "fix_actions"
#4 0x00000000004cc862 in fix_rval (rv=0x2b35985f2870) at rvalue.c:2883
__FUNCTION__ = "fix_rval"
#5 0x00000000004d4c70 in fix_rval_expr (p=0x2b35985f2868) at rvalue.c:3804
rve = 0x2b35985f2868
ret = 32767
__FUNCTION__ = "fix_rval_expr"
#6 0x00000000004aff2d in fix_actions (a=0x2b35985f1528) at route.c:750
t = 0x2b35985f3f08
p = 0x4cc862
tmp = 0x5f8c50 "fix_rval"
tmp_p = 0x2b35985ec7c8
ret = 0
i = 2
cmd = 0x2b35985d1b90
---Type <return> to continue, or q <return> to quit---
s = {s = 0x5d8e18 "DEBUG", len = 383750288}
he = 0x2b359b6d853d
ip = {af = 16, len = 0, u = {addrl = {6131224, 4294967300}, addr32 = {6131224, 0,
4, 1}, addr16 = {36376, 93, 0, 0,
4, 0, 1, 0}, addr =
"\030\216]\000\000\000\000\000\004\000\000\000\001\000\000"}}
si = 0x5d8e18
lval = 0x7fff16df8b90
rve = 0x2b35985f2868
err_rve = 0x0
rve_type = RV_INT
err_type = 2607646013
expected_type = 11061
rv = 0x7fff16df8cf4
rve_param_no = 0
__FUNCTION__ = "fix_actions"
#7 0x00000000004aff6c in fix_actions (a=0x2b35985f0598) at route.c:754
t = 0x2b35985f4048
p = 0x0
tmp = 0x7fff16df8fb0 ""
tmp_p = 0x2b35985ec518
ret = 0
i = 2
cmd = 0x2b35985d1b90
s = {s = 0x2b35985e0b58 "Route", len = 5}
he = 0x7fff16df8d80
ip = {af = 383749552, len = 32767, u = {addrl = {5533488, 17179869188}, addr32 =
{5533488, 0, 4, 4}, addr16 = {
28464, 84, 0, 0, 4, 0, 4, 0}, addr =
"0oT\000\000\000\000\000\004\000\000\000\004\000\000"}}
si = 0x2b359dad3518
lval = 0x2b35985e25d0
rve = 0x2b35985f08e0
err_rve = 0x0
rve_type = RV_INT
err_type = 2648027208
expected_type = RV_NONE
rv = 0x2b35985e5a50
rve_param_no = 0
__FUNCTION__ = "fix_actions"
#8 0x00000000004b9efb in fix_rl (rt=0x939b80) at route.c:2162
i = 1
ret = 0
#9 0x00000000004b9f39 in fix_rls () at route.c:2178
ret = 4985
#10 0x0000000000470507 in main (argc=1, argv=0x7fff16df9098) at main.c:2522
cfg_stream = 0xefc9010
c = -1
r = 50
tmp = 0x7fff16df8f87 ""
tmp_len = 32767
port = 383750022
proto = 0
options = 0x5e2318
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
ret = -1
seed = 3011491440
rfd = 4
debug_save = 0
---Type <return> to continue, or q <return> to quit---
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x0
p = 0x324b61cbc0 ""
__FUNCTION__ = "main"
Thanks
More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=381
You are receiving this message because you have requested it from the Flyspray bugtracking
system. If you did not expect this message or don't want to receive mails in future,
you can change your notification settings at the URL shown above.