THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
A new Flyspray task has been opened. Details are below.
User who did this - avangard solutions (avangardsolutions)
Attached to Project - sip-router Summary - Crash in cancel_branch on Kamailio 4.0.3 Task Type - Bug Report Category - Core Status - Unconfirmed Assigned To - Operating System - Linux Severity - High Priority - Normal Reported Version - 4.0 Due in Version - Undecided Due Date - Undecided Details - Our Kamailio has stopped with a segmentation fault this happens randomly, sometimes several times a day.
Segmentaion fault in Kamailio 4.0.3
from core dump
Program terminated with signal 11, Segmentation fault. #0 0x00007f3cf4a0f7b2 in cancel_branch (t=0x7f3cd2d39220, branch=0, reason=<value optimized out>, flags=4) at t_cancel.c:284 284 if (cfg_get(tm, tm_cfg, reparse_invite) ||
#0 0x00007f3cf4a0f7b2 in cancel_branch (t=0x7f3cd2d39220, branch=0, reason=<value optimized out>, flags=4) at t_cancel.c:284 284 if (cfg_get(tm, tm_cfg, reparse_invite) || (gdb) bt full #0 0x00007f3cf4a0f7b2 in cancel_branch (t=0x7f3cd2d39220, branch=0, reason=<value optimized out>, flags=4) at t_cancel.c:284 cancel = <value optimized out> len = <value optimized out> crb = 0x7f3cd2d39418 irb = 0x7f3cd2d39390 ret = 1 tmp_cd = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}} pcbuf = <value optimized out> __FUNCTION__ = "cancel_branch" 0000001 0x00007f3cf4a4b19b in reply_received (p_msg=0x7f3cf5968270) at t_reply.c:2194 msg_status = <value optimized out> last_uac_status = 408 ack = 0x7f3cd2d39220 "`\347\306\322<\177" ack_len = <value optimized out> branch = 0 reply_status = <value optimized out> onreply_route = <value optimized out> cancel_data = {cancel_bitmap = 0, reason = {cause = 408, u = {text = {s = 0x0, len = -174615312}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = -174615312}}}} uac = <value optimized out> t = 0x7f3cd2d39220 lack_dst = {send_sock = 0x0, to = {s = {sa_family = 37824, sa_data = "\227\365<\177\000\000p\202\226\365<\177\000"}, sin = {sin_family = 37824, sin_port = 62871, sin_addr = {s_addr = 32572}, sin_zero = "p\202\226\365<\177\000"}, sin6 = {sin6_family = 37824, sin6_port = 62871, sin6_flowinfo = 32572, sin6_addr = {__in6_u = {__u6_addr8 = "p\202\226\365<\177\000\000\300\223\227\365<\177\000", __u6_addr16 = {33392, 62870, 32572, 0, 37824, 62871, 32572, 0}, __u6_addr32 = {4120281712, 32572, 4120351680, 32572}}}, sin6_scope_id = 4120281712}}, id = 32572, proto = -2 '\376', send_flags = {f = 137 '\211', blst_imask = 141 '\215'}} backup_user_from = <value optimized out> backup_user_to = <value optimized out> backup_domain_from = <value optimized out> backup_domain_to = <value optimized out> backup_uri_from = <value optimized out> backup_uri_to = <value optimized out> backup_xavps = <value optimized out> replies_locked = 0 branch_ret = <value optimized out> ---Type <return> to continue, or q <return> to quit--- prev_branch = <value optimized out> blst_503_timeout = <value optimized out> hf = <value optimized out> onsend_params = {req = 0x8d8a00, rpl = 0x541db4, param = 0x7f3cf59796f8, code = 4482677, flags = 0, branch = 0, t_rbuf = 0x7f3cf595ce10, dst = 0x7f3cf533397d, send_buf = {s = 0x7f3cf594c010 "", len = 5500024}} ctx = {rec_lev = -174592224, run_flags = 32572, last_retcode = 5674140, jmp_env = {{__jmpbuf = {139899795117744, 5628326, 4, 140735819000640, 9276147, 139899795050944, 139899795136192, 139899807274645}, __mask_was_saved = 0, __saved_mask = {__val = {139899795059392, 0, 139899795073285, 345, 140733193388048, 6185803, 9275883, 4120351984, 9275666, 72839828720, 5510132, 139899795136192, 9275609, 139899795117296, 9275904, 139899795140384}}}}} __FUNCTION__ = "reply_received" 0000002 0x0000000000456444 in do_forward_reply (msg=0x7f3cf5968270, mode=<value optimized out>) at forward.c:799 new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} new_len = <value optimized out> r = <value optimized out> s = <value optimized out> len = <value optimized out> __FUNCTION__ = "do_forward_reply" 0000003 0x000000000049e15e in receive_msg (buf=<value optimized out>, len=320, rcv_info=0x7fff9c7fade0) at receive.c:270 msg = 0x7f3cf5968270 ctx = {rec_lev = 0, run_flags = 0, last_retcode = -758143620, jmp_env = {{__jmpbuf = {1, 1, 139899799175928, 139899809382400, 140735819001552, 4294967295, 0, 1}, __mask_was_saved = 8576424, __saved_mask = {__val = {0, 28, 16, 0, 139899807248336, 1, 0, 1, 139899799175928, 1, 139899795166208, 139899809380008, 139899795166216, 140735819001448, 139899807274645, 140735819001320}}}}} ret = <value optimized out> inb = { s = 0x8d88c0 "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 124.248.203.51;branch=z9hG4bKe4ab.d39089f4.0;received=124.248.203.51\r\nFrom: sip:dispatcher@localhost;tag=cb55100cf2f7b8ecef9f1913b54cc8ee-b977\r\nTo: sip:124.248.203"..., len = 320} __FUNCTION__ = "receive_msg" 0000004 0x0000000000530e46 in udp_rcv_loop () at udp_server.c:557 len = 320 buf = "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP 124.248.203.51;branch=z9hG4bKe4ab.d39089f4.0;received=124.248.203.51\r\nFrom: sip:dispatcher@localhost;tag=cb55100cf2f7b8ecef9f1913b54cc8ee-b977\r\nTo: sip:124.248.203"... ---Type <return> to continue, or q <return> to quit--- from = 0x7f3cf5985400 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {869005436, 0}, addr32 = {869005436, 0, 0, 0}, addr16 = {63612, 13259, 0, 0, 0, 0, 0, 0}, addr = "|\370\313\063", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {869005436, 0}, addr32 = {869005436, 0, 0, 0}, addr16 = { 63612, 13259, 0, 0, 0, 0, 0, 0}, addr = "|\370\313\063", '\000' <repeats 11 times>}}, src_port = 5090, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\342|\370\313\063\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 57875, sin_addr = {s_addr = 869005436}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 57875, sin6_flowinfo = 869005436, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f3cf595ce10, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" 0000005 0x000000000046716a in main_loop () at main.c:1638 i = <value optimized out> pid = <value optimized out> si = <value optimized out> si_desc = "udp receiver child=0 sock=124.248.203.51:5060\000\000\000\060\203\227\365<\177\000\000\n\000\000\000\377\177\000\000\003", '\000' <repeats 16 times>"\242, \317\322<\177\000\000\001\000\000\000\001\000\000\000\370\260\177\234\377\177\000\000\001", '\000' <repeats 17 times>, "@ \000\000\000" nrprocs = <value optimized out> __FUNCTION__ = "main_loop" 0000006 0x000000000046a002 in main (argc=<value optimized out>, argv=<value optimized out>) at main.c:2566 cfg_stream = <value optimized out> c = <value optimized out> r = <value optimized out> tmp = 0x7fff9c7fcf5c "" tmp_len = 0 options = 0x5c08b0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 263013530 rfd = <value optimized out> debug_save = <value optimized out> debug_flag = <value optimized out> dont_fork_cnt = <value optimized out> n_lst = <value optimized out> p = <value optimized out> __FUNCTION__ = "main"
More information can be found at the following URL: http://sip-router.org/tracker/index.php?do=details&task_id=369
You are receiving this message because you have requested it from the Flyspray bugtracking system. If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.