Well -- I realized it is going to be a differnt thing. Upgrade from CVS,
it is a bug in xlog module which has been fixed quite a while ago.
-jiri
At 11:43 AM 2/2/2005, markus monka wrote:
This morning we found a strange behavior.
Everytime, a user sends an wrong Contact Header Field ser segfauled .
Running Ser:
version: 0.8.14 (i386/linux)
flags: STATS:Off, USE_IPV6, USE_TCP, DISABLE_NAGLE, DNS_IP_HACK,
SHM_MEM, SHM_MMAP, PKG_MALLOC, F_MALLOC, FAST_LOCK-ADAPTIVE_WAIT
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16,
MAX_URI_SIZE 1024, BUF_SIZE 65535
@(#) $Id: main.c,v 1.168.4.3 2004/06/28 15:41:21 andrei Exp $
main.c compiled on 02:18:40 Sep 11 2004 with gcc 2.95
SIP Request:
-------------------------------------------------------------------------------------------
REGISTER
sip:voiceoverip.com SIP/2.0.
Content-Length: 0.
Contact: <sip:%201838622@192.168.168.2:5060>;events="message-summary".
Call-ID: 87BD6EE5-7507-11D9-9335-004063C7E008(a)192.168.168.2.
SIP/2.0 401 Unauthorized.
Call-ID: 87BD6EE5-7507-11D9-9335-004063C7E008(a)192.168.168.2.
From: <sip:%201838622@voiceoverip.com>;tag=769507929833.
CSeq: 56 REGISTER.
To:
<sip:%201838622@voiceoverip.com>;tag=b11cb9bb270104b49a99a995b8c68544.b86b.
Found To / Contact Field
-------------------------------------------------------------------------------------------
DEBUG: get_hdr_field: <To> [29]; uri=[sip:%201838622@voiceoverip.com]
0(1683) check_self - checking if port 5060 matches port 5060
0(1683) parse_headers: flags=64
0(1683) check_nonce(): comparing
[4200ae1175f148a85cefb9c422f41f713276dd93] and
[4200ae1175f148a85cefb9c422f41f713276dd93]
0(1683) query="select password from subscriber where username='1838622'
AND domain='voiceoverip.com'"
0(1683) HA1 string calculated: 169a2df95866ea31a6fb8cc1bd8ca0ed
0(1683) check_response(): Our result =
'0ea312ddbf4ba6caef1e2a388683251e'
0(1683) check_response(): Authorization is OK
0(1683) save_rpid(): rpid value is ''
0(1683) check_username(): Digest username and URI username do NOT match
0(1683) XLOG: xl_print_log: final buffer length 103
0(1683) Segmentation fault
2(1685) ERROR: fifo_server fgets failed: Illegal seek
2(1685) ERROR: fifo_server fgets failed: Illegal seek
2(1685) ERROR: fifo_server fgets failed: Illegal seek
2(1685) ERROR: fifo_server fgets failed: Illegal seek
1(1684) INFO: signal 15 received
Memory status (pkg):
2(1685) 1(1684) Memory status (pkg):
fm_status (0x80d9820):
2(1685) 1(1684) fm_status (0x80d9820):
heap size= 20970384
2(1685) 1(1684) dumping free list:
heap size= 20970384
1(1684) 2(1685) hash = 1 fragments no.: 47,
bucket size: 8 - 8 (first 8)
1(1684) hash = 2 fragments no.: 1,
bucket size: 16 - 16 (first 16)
dumping free list:
2(1685) hash = 1 fragments no.: 47,
bucket size: 8 - 8 (first 8)
2(1685) hash = 5 fragments no.: 1,
bucket size: 40 - 40 (first 40)
1(1684) hash = 20 fragments no.: 17403,
bucket size: 160 - 160 (first 160)
1(1684) hash = 263 fragments no.: 1,
bucket size: 131072 - 262144 (first 137584)
1(1684) hash = 266 fragments no.: 1,
bucket size: 1048576 - 2097152 (first 1840744)
1(1684) hash = 269 fragments no.: 1,
bucket size: 8388608 - 16777216 (first 16028680)
1(1684) TOTAL: 17454 free fragments = 20791880 free bytes
1(1684) -----------------------------
2(1685) hash = 20 fragments no.: 17403,
bucket size: 160 - 160 (first 160)
2(1685) hash = 263 fragments no.: 1,
bucket size: 131072 - 262144 (first 137584)
2(1685) hash = 270 fragments no.: 1,
bucket size: 16777216 - 33554432 (first 17869432)
2(1685) TOTAL: 17453 free fragments = 20791912 free bytes
2(1685) -----------------------------
Is this a known Problem which is fixed in an
new Ser Version?
Greets
Markus
--
[netzquadrat]GmbH fon 0211.30 20 33 0
Ronsdorfer Str. 74 fax 0211.30 20 33 22
40233 Düsseldorf mobil 0163 7777 923
weitere Info unter:
http://www.netzquadrat.de
** NEU von [NQ] -
http://www.VOICEMEETING.de **
** die supergünstige Sofort-Telefonkonferenz **
_______________________________________________
Serusers mailing list
serusers(a)lists.iptel.org
http://lists.iptel.org/mailman/listinfo/serusers