THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
A new Flyspray task has been opened. Details are below.
User who did this - avangard solutions (avangardsolutions)
Attached to Project - sip-router
Summary - Crash in cancel_branch on Kamailio 4.0.3
Task Type - Bug Report
Category - Core
Status - Unconfirmed
Assigned To -
Operating System - Linux
Severity - High
Priority - Normal
Reported Version - 4.0
Due in Version - Undecided
Due Date - Undecided
Details - Our Kamailio has stopped with a segmentation fault this happens randomly,
sometimes several times a day.
Segmentaion fault in Kamailio 4.0.3
from core dump
Program terminated with signal 11, Segmentation fault.
#0 0x00007f3cf4a0f7b2 in cancel_branch (t=0x7f3cd2d39220, branch=0, reason=<value
optimized out>, flags=4) at t_cancel.c:284
284 if (cfg_get(tm, tm_cfg, reparse_invite) ||
#0 0x00007f3cf4a0f7b2 in cancel_branch (t=0x7f3cd2d39220, branch=0, reason=<value
optimized out>, flags=4) at t_cancel.c:284
284 if (cfg_get(tm, tm_cfg, reparse_invite) ||
(gdb) bt full
#0 0x00007f3cf4a0f7b2 in cancel_branch (t=0x7f3cd2d39220, branch=0, reason=<value
optimized out>, flags=4) at t_cancel.c:284
cancel = <value optimized out>
len = <value optimized out>
crb = 0x7f3cd2d39418
irb = 0x7f3cd2d39390
ret = 1
tmp_cd = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0},
e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}}
pcbuf = <value optimized out>
__FUNCTION__ = "cancel_branch"
0000001 0x00007f3cf4a4b19b in reply_received (p_msg=0x7f3cf5968270) at t_reply.c:2194
msg_status = <value optimized out>
last_uac_status = 408
ack = 0x7f3cd2d39220 "`\347\306\322<\177"
ack_len = <value optimized out>
branch = 0
reply_status = <value optimized out>
onreply_route = <value optimized out>
cancel_data = {cancel_bitmap = 0, reason = {cause = 408, u = {text = {s = 0x0, len
= -174615312}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0,
len = -174615312}}}}
uac = <value optimized out>
t = 0x7f3cd2d39220
lack_dst = {send_sock = 0x0, to = {s = {sa_family = 37824, sa_data =
"\227\365<\177\000\000p\202\226\365<\177\000"}, sin = {sin_family =
37824,
sin_port = 62871, sin_addr = {s_addr = 32572}, sin_zero =
"p\202\226\365<\177\000"}, sin6 = {sin6_family = 37824, sin6_port = 62871,
sin6_flowinfo = 32572, sin6_addr = {__in6_u = {__u6_addr8 =
"p\202\226\365<\177\000\000\300\223\227\365<\177\000", __u6_addr16 =
{33392, 62870, 32572,
0, 37824, 62871, 32572, 0}, __u6_addr32 = {4120281712, 32572,
4120351680, 32572}}}, sin6_scope_id = 4120281712}}, id = 32572, proto = -2
'\376',
send_flags = {f = 137 '\211', blst_imask = 141 '\215'}}
backup_user_from = <value optimized out>
backup_user_to = <value optimized out>
backup_domain_from = <value optimized out>
backup_domain_to = <value optimized out>
backup_uri_from = <value optimized out>
backup_uri_to = <value optimized out>
backup_xavps = <value optimized out>
replies_locked = 0
branch_ret = <value optimized out>
---Type <return> to continue, or q <return> to quit---
prev_branch = <value optimized out>
blst_503_timeout = <value optimized out>
hf = <value optimized out>
onsend_params = {req = 0x8d8a00, rpl = 0x541db4, param = 0x7f3cf59796f8, code =
4482677, flags = 0, branch = 0, t_rbuf = 0x7f3cf595ce10,
dst = 0x7f3cf533397d, send_buf = {s = 0x7f3cf594c010 "", len =
5500024}}
ctx = {rec_lev = -174592224, run_flags = 32572, last_retcode = 5674140, jmp_env =
{{__jmpbuf = {139899795117744, 5628326, 4, 140735819000640, 9276147,
139899795050944, 139899795136192, 139899807274645}, __mask_was_saved = 0,
__saved_mask = {__val = {139899795059392, 0, 139899795073285, 345,
140733193388048, 6185803, 9275883, 4120351984, 9275666, 72839828720,
5510132, 139899795136192, 9275609, 139899795117296, 9275904,
139899795140384}}}}}
__FUNCTION__ = "reply_received"
0000002 0x0000000000456444 in do_forward_reply (msg=0x7f3cf5968270, mode=<value
optimized out>) at forward.c:799
new_buf = 0x0
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000'
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family =
0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0,
0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0,
proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0
'\000'}}
new_len = <value optimized out>
r = <value optimized out>
s = <value optimized out>
len = <value optimized out>
__FUNCTION__ = "do_forward_reply"
0000003 0x000000000049e15e in receive_msg (buf=<value optimized out>, len=320,
rcv_info=0x7fff9c7fade0) at receive.c:270
msg = 0x7f3cf5968270
ctx = {rec_lev = 0, run_flags = 0, last_retcode = -758143620, jmp_env = {{__jmpbuf
= {1, 1, 139899799175928, 139899809382400, 140735819001552, 4294967295, 0,
1}, __mask_was_saved = 8576424, __saved_mask = {__val = {0, 28, 16, 0,
139899807248336, 1, 0, 1, 139899799175928, 1, 139899795166208,
139899809380008, 139899795166216, 140735819001448, 139899807274645,
140735819001320}}}}}
ret = <value optimized out>
inb = {
s = 0x8d88c0 "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP
124.248.203.51;branch=z9hG4bKe4ab.d39089f4.0;received=124.248.203.51\r\nFrom:
sip:dispatcher@localhost;tag=cb55100cf2f7b8ecef9f1913b54cc8ee-b977\r\nTo:
sip:124.248.203"..., len = 320}
__FUNCTION__ = "receive_msg"
0000004 0x0000000000530e46 in udp_rcv_loop () at udp_server.c:557
len = 320
buf = "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP
124.248.203.51;branch=z9hG4bKe4ab.d39089f4.0;received=124.248.203.51\r\nFrom:
sip:dispatcher@localhost;tag=cb55100cf2f7b8ecef9f1913b54cc8ee-b977\r\nTo:
sip:124.248.203"...
---Type <return> to continue, or q <return> to quit---
from = 0x7f3cf5985400
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {869005436, 0}, addr32 = {869005436,
0, 0, 0}, addr16 = {63612, 13259, 0, 0, 0, 0, 0, 0},
addr = "|\370\313\063", '\000' <repeats 11 times>}},
dst_ip = {af = 2, len = 4, u = {addrl = {869005436, 0}, addr32 = {869005436, 0, 0, 0},
addr16 = {
63612, 13259, 0, 0, 0, 0, 0, 0}, addr = "|\370\313\063",
'\000' <repeats 11 times>}}, src_port = 5090, dst_port = 5060,
proto_reserved1 = 0,
proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data =
"\023\342|\370\313\063\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
sin_port = 57875,
sin_addr = {s_addr = 869005436}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 57875,
sin6_flowinfo = 869005436,
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15
times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}}, bind_address = 0x7f3cf595ce10, proto = 1
'\001'}
__FUNCTION__ = "udp_rcv_loop"
0000005 0x000000000046716a in main_loop () at main.c:1638
i = <value optimized out>
pid = <value optimized out>
si = <value optimized out>
si_desc = "udp receiver child=0
sock=124.248.203.51:5060\000\000\000\060\203\227\365<\177\000\000\n\000\000\000\377\177\000\000\003",
'\000' <repeats 16 times>"\242,
\317\322<\177\000\000\001\000\000\000\001\000\000\000\370\260\177\234\377\177\000\000\001",
'\000' <repeats 17 times>, "@ \000\000\000"
nrprocs = <value optimized out>
__FUNCTION__ = "main_loop"
0000006 0x000000000046a002 in main (argc=<value optimized out>, argv=<value
optimized out>) at main.c:2566
cfg_stream = <value optimized out>
c = <value optimized out>
r = <value optimized out>
tmp = 0x7fff9c7fcf5c ""
tmp_len = 0
options = 0x5c08b0
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
ret = -1
seed = 263013530
rfd = <value optimized out>
debug_save = <value optimized out>
debug_flag = <value optimized out>
dont_fork_cnt = <value optimized out>
n_lst = <value optimized out>
p = <value optimized out>
__FUNCTION__ = "main"
More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=369
You are receiving this message because you have requested it from the Flyspray bugtracking
system. If you did not expect this message or don't want to receive mails in future,
you can change your notification settings at the URL shown above.