THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
The following task has a new comment added:
FS#390 - Bug in tm with topoh modules - segfault on callid comparison. User who did this - Nick Altmann (nikbyte)
---------- Missing separate debuginfos, use: debuginfo-install glibc-2.12-1.132.el6.x86_64 (gdb) bt full #0 0x00007f8ad98aac6b in t_reply_matching (p_msg=0x7f8adaca2f20, p_branch=0x7fff352a8380) at t_lookup.c:987 p_cell = 0x7f8ad7b0dcb8 hash_index = 40642 entry_label = 0 branch_id = 0 hashi = 0x92362d "2ce9.682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: sip:@127.0.0.1;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: sip:@127.0.0.1;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCa"... branchi = 0x923653 "0;rport=5060\r\nTo: sip:@127.0.0.1;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: sip:@127.0.0.1;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCall-ID: 1b0ba56b55c2286d-30157@127.0.0."... p = 0x923653 "0;rport=5060\r\nTo: sip:@127.0.0.1;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: sip:@127.0.0.1;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCall-ID: 1b0ba56b55c2286d-30157@127.0.0."... n = 0x923654 ";rport=5060\r\nTo: sip:@127.0.0.1;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: sip:@127.0.0.1;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCall-ID: 1b0ba56b55c2286d-30157@127.0.0.1"... hash_bucket = 0x7f8ad7a2f8e8 hashl = 4 branchl = 1 scan_space = 1 cseq_method = { s = 0x9236ec "INVIE\r\nCall-ID: 1b0ba56b55c2286d-30157@127.0.0.1\r\nContent-Length: 0\r\nTH: uch\r\n\r\n", len = 5} req_method = { s = 0x7f8ad7b0f2f8 "INVIE sip:127.0.0.1:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 127.0.0.1;branch=z9hG4bK2ce9.682f8ec6", '0' <repeats 24 times>, ".0\r\nTo: sip:@127.0.0.1\r\nFrom: sip:@127.0.0.1;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae"..., len = 5} loopi = 0x923632 "682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: sip:@127.0.0.1;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: sip:@127.0.0.1;tag=533cb9e91f4b999cf76861cbb9ed54ed-ae15\r\nCSeq: 10 INVIE\r\nCall-ID"... loopl = 32 is_cancel = 0 __FUNCTION__ = "t_reply_matching" #1 0x00007f8ad98ac43c in t_check_msg (p_msg=0x7f8adaca2f20, param_branch=0x7fff352a8380) at t_lookup.c:1129 local_branch = 6477824 canceled = 4 ret = 0 __FUNCTION__ = "t_check_msg" #2 0x00007f8ad98ac917 in t_check (p_msg=0x7f8adaca2f20, param_branch=0x7fff352a8380) at t_lookup.c:1171 ret = 0 #3 0x00007f8ad98ca196 in reply_received (p_msg=0x7f8adaca2f20) at t_reply.c:2188 msg_status = 9582177 last_uac_status = 0 ack = 0x40 <Address 0x40 out of bounds> ack_len = 0 branch = 6417986 reply_status = -624285616 onreply_route = 32650 cancel_data = {cancel_bitmap = 9582396, reason = {cause = 13821, u = { text = {s = 0xa00000141 <Address 0xa00000141 out of bounds>, len = 9582076}, e2e_cancel = 0xa00000141, packed_hdrs = { s = 0xa00000141 <Address 0xa00000141 out of bounds>, len = 9582076}}}} uac = 0x800000001 t = 0x7f8adac7a200 lack_dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = { __in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 48 '0', send_flags = {f = 162 '\242', blst_imask = 199 '\307'}} backup_user_from = 0x40092373c backup_user_to = 0x61d080 backup_domain_from = 0x414cc0 backup_domain_to = 0x3352a8a10 backup_uri_from = 0x0 backup_uri_to = 0x7f8adaca3118 backup_xavps = 0x7fff352a8480 replies_locked = 5581672 branch_ret = 0 prev_branch = 0 blst_503_timeout = 0 hf = 0x7f8adaca2f40 onsend_params = {req = 0x7fff352a83e0, rpl = 0x550580, param = 0x6a7e0, code = 0, flags = 3, branch = 0, t_rbuf = 0x7f8adac39380, dst = 0x7f8adac7a200, send_buf = { s = 0x7fff352a83e0 "\200\204*5\377\177", len = 5536481}} ctx = {rec_lev = 9582175, run_flags = 0, last_retcode = -624454040, jmp_env = {{__jmpbuf = {20850121736, 6477824, 4279488, 13776882192, 0, 9582396, 140734085366512, 5791708}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 0, 140234352896080, 9582396, 9582082, 361695345073193192, 9582177, 9582165, 3670681632, 140234352896080, 140234352727704, 140234352898328, 4279488, 140734085368336}}}}} __FUNCTION__ = "reply_received" #4 0x000000000045d66f in do_forward_reply (msg=0x7f8adaca2f20, mode=0) at forward.c:777 new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = { __in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} new_len = 32650 r = 0 s = 0x15cdaca2f28 <Address 0x15cdaca2f28 out of bounds> len = 0 __FUNCTION__ = "do_forward_reply" #5 0x000000000045df30 in forward_reply (msg=0x7f8adaca2f20) at forward.c:860 No locals. #6 0x00000000004a558f in receive_msg ( buf=0x9235e0 "SIP/2.0 408 Request Timeout\r\nVia: SIP/2.0/UDP 127.0.0.1;TH=ucv;branch=z9hG4bK2ce9.682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: sip:@127.0.0.1;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <"..., len=348, rcv_info=0x7fff352a86e0) at receive.c:273 msg = 0x7f8adaca2f20 ctx = {rec_lev = 8864888, run_flags = 0, last_retcode = 0, jmp_env = {{ __jmpbuf = {0, 0, 0, 140234364788720, 1, 0, 140234352464456, 1}, __mask_was_saved = -678816384, __saved_mask = {__val = { 140234300901204, 891979408, 1024, 5186946624, 140234298365312, 140734085367360, 5473105, 0, 140234298365312, 50195, 140234298365312, 140734085367624, 7913654952, 140734085367440, 5473233, 7}}}}} ret = 32650 inb = { s = 0x9235e0 "SIP/2.0 408 Request Timeout\r\nVia: SIP/2.0/UDP 127.0.0.1;TH=ucv;branch=z9hG4bK2ce9.682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: sip:@127.0.0.1;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <"..., len = 348} __FUNCTION__ = "receive_msg" #7 0x000000000053c394 in udp_rcv_loop () at udp_server.c:536 len = 332 buf = "SIP/2.0 408 Request Timeout\r\nVia: SIP/2.0/UDP 127.0.0.1;TH=ucv;branch=z9hG4bK2ce9.682f8ec6", '0' <repeats 24 times>, ".0;rport=5060\r\nTo: sip:@127.0.0.1;tag=a6a1c5f60faecf035a1ae5b6e96e979a-4118\r\nFrom: <sip:@127.0.0.1"... tmp = 0x7fff352a8a10 "\006" from = 0x7f8adac93ac8 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {16777343, 140734085368336}, addr32 = {16777343, 0, 891980304, 32767}, addr16 = {127, 256, 0, 0, 35344, 13610, 32767, 0}, addr = "\177\000\000\001\000\000\000\000\020\212*5\377\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0, 0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0}, addr = "\177\000\000\001", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\177\000\000\001\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 16777343}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 16777343, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f8adac9b930, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #8 0x000000000046c698 in main_loop () at main.c:1428 i = 9676896 pid = 30158 si = 0x4dac81728 si_desc = "\300LA\000\000\000\000\000P\030\310ڊ\177", '\000' <repeats 14 times>, "\001\000\000\000\210\060\311ڊ\177\000\000\256\bI\000\000\000\000\000\001\000\000\000z\000\000\000~}^\000\000\000\000\000`o^\000\000\000\000\000\340\n^\000\000\000\000\000\300LA\000\000\000\000\000\020\212*5\377\177", '\000' <repeats 18 times>, "P\210*5\377\177\000\000.\241K\000\000\000\000" nrprocs = 0 __FUNCTION__ = "main_loop" #9 0x000000000047030b in main (argc=6, argv=0x7fff352a8a18) at main.c:2533 cfg_stream = 0x226e010 c = -1 r = 0 tmp = 0x7f8adb0ca918 "H\205\300uCD9t$\fv\034A\203\306\001\353\210f\017\037D" tmp_len = 0 port = 0 proto = 0 options = 0x5e02b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A ret = -1 seed = 2437127770 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 1 n_lst = 0x7f8adb049ba0 p = 0x5ca3e0 "H\211l$\330L\211d$\340H\215-\017\234*" __FUNCTION__ = "main"
----------
More information can be found at the following URL: http://sip-router.org/tracker/index.php?do=details&task_id=390#comment12...
You are receiving this message because you have requested it from the Flyspray bugtracking system. If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.