Hi Daniel,

 

As per your previous reply (sorry, I deleted it accidentally), please find
attached output of 'bt full' as requested.

 

Best regards and thanks again,

 

Charles

 

  _____  

From: Charles Chance [mailto:charles.cha...@sipcentric.com] 
Sent: 13 May 2012 11:21
To: 'SIP Router - Kamailio (OpenSER) and SIP Express Router (SER) -Users
Mailing List'
Subject: (Devel) Segmentation fault using pua_dialoginfo

 

Hi,

 

Currently testing devel version and experiencing the following when using
pua_dialoginfo:

 

-------------------------------------

Program terminated with signal 11, Segmentation fault.

#0  core_hash (t=0xb3d7e330, type=1024, ps=0xbfcc31c8) at ../../hashes.h:279

279                     v=(*p<<24)+(p[1]<<16)+(p[2]<<8)+p[3];

(gdb) bt

#0  core_hash (t=0xb3d7e330, type=1024, ps=0xbfcc31c8) at ../../hashes.h:279

#1  publ_cback_func (t=0xb3d7e330, type=1024, ps=0xbfcc31c8) at
send_publish.c:246

#2  0x002861d6 in run_trans_callbacks_internal (cb_lst=0xb3d7e370,
type=1024, trans=0xb3d7e330, params=0xbfcc31c8) at t_hooks.c:290

#3  0x002864d6 in run_trans_callbacks (type=1024, trans=0x200, req=0x0,
rpl=0xb7bea008, code=200) at t_hooks.c:317

#4  0x002afb28 in local_reply (t=0xb3d7e330, p_msg=0xb7bea008, branch=0,
msg_status=200, cancel_data=0xbfcc345c) at t_reply.c:2001

#5  0x002b2b45 in reply_received (p_msg=0xb7bea008) at t_reply.c:2350

#6  0x0809d5f4 in forward_reply (msg=0xb7bea008) at forward.c:790

#7  0x080e11a9 in receive_msg (

    buf=0x82c4fa0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
xx.xx.xx.xxx;branch=z9hG4bKc13b.25313b6.0\r\nTo:
sip:000...@xx.xx.xx.xxx;tag=03373b1b433b65504ea28bd3d9e6db76.d7f2\r\nFrom:
sip:000...@xx.xx.xx.xxx;tag=4cc17c2c75cb82fa"..., len=393,
rcv_info=0xbfcc3648) at receive.c:270

#8  0x0817801b in udp_rcv_loop () at udp_server.c:544

#9  0x080b0426 in main_loop () at main.c:1633

#10 0x080b3d02 in main (argc=11, argv=0xbfcc3924) at main.c:2546

(gdb) up

#1  publ_cback_func (t=0xb3d7e330, type=1024, ps=0xbfcc31c8) at
send_publish.c:246

246             hash_code= core_hash(hentity->pres_uri, NULL, HASH_SIZE);

(gdb) p hentity->pres_uri

Cannot access memory at address 0x8

(gdb) p *hentity

Cannot access memory at address 0x0

-------------------------------------

 

Your time is greatly appreciated.

 

Charles

 

#0  core_hash (t=0xb3d7e330, type=1024, ps=0xbfcc31c8) at ../../hashes.h:279
        p = 0x30340110 <Address 0x30340110 out of bounds>
        end = 0x30340220 <Address 0x30340220 out of bounds>
        v = <value optimized out>
        h = <value optimized out>
#1  publ_cback_func (t=0xb3d7e330, type=1024, ps=0xbfcc31c8) at 
send_publish.c:246
        hdr = <value optimized out>
        msg = 0xb7bea008
        presentity = <value optimized out>
        db_presentity = <value optimized out>
        hentity = <value optimized out>
        size = <value optimized out>
        lexpire = <value optimized t&", len = 135}
        hash_code = <value optimized out>
        res = 0x0
        dbpres = {id = {s = 0x0, len = 0}, pres_uri = 0xbfcc3118, event = 0, 
expires = 0, desired_expires = 0, flag = 0, db_flag = 0, cb_param = 0x0, next = 
0x0, ua_flag = 0,
          etag = {s = 0x0, len = 0}, tuple_id = {s = 0x0, len = 0}, body = 0x0, 
content_type = {s = 0x0, len = 0}, watcher_uri = 0xbfcc3110, call_id = {s = 
0x0, len = 0},
          to_tag = {s = 0x0, len = 0}, from_tag = {s = 0x0, len = 0}, cseq = 0, 
version = 0, outbound_proxy = 0x0, extra_headers = 0xbfcc3108, record_route = 
{s = 0x0,
            len = 0}, remote_contact = {s = 0x0, len = 0}, contact = {s = 0x0, 
len = 0}}
        pres_uri = {s = 0x0, len = 0}
        watcher_uri = {s = 0x0, len = 0}
        extra_headers = {s = 0x0, len = 0}
#2  0x002861d6 in run_trans_callbacks_internal (cb_lst=0xb3d7e370, type=1024, 
trans=0xb3d7e330, params=0xbfcc31c8) at t_hooks.c:290
        cbp = 0xb3d7f2a0
        backup_from = 0x82d4fc4
        backup_to = 0x82d4fc8
        backup_dom_from = 0x82d4fcc
        backup_dom_to = 0x82d4fd0
        backup_uri_from = 0x82d4fbc
        backup_uri_to = 0x82d4fc0
        backup_xavps = 0x82d5048
#3  0x002864d6 in run_trans_callbacks (type=1024, trans=0x200, req=0x0, 
rpl=0xb7bea008, code=200) at t_hooks.c:317
        params = {req = 0x0, rpl = 0xb7bea008, param = 0xb3d7f2ac, code = 200, 
flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#4  0x002afb28 in local_reply (t=0xb3d7e330, p_msg=0xb7bea008, branch=0, 
msg_status=200, cancel_data=0xbfcc345c) at t_reply.c:2001
        local_store = 0
        local_winner = 0
        reply_status = RPS_COMPLETED
        winning_msg = 0xb7bea008
        winning_code = <value optimized out>
        totag_retr = 0
#5  0x002b2b45 in reply_received (p_msg=0xb7bea008) at t_reply.c:2350
        msg_status = 200
        last_uac_status = 0
        ack = 0x3634d595 <Address 0x3634d595 out of bounds>
        ack_len = 2827518
        branch = 0
        reply_status = <value optimized out>
        cancel_data = {cancel_bitmap = 0, reason = {cause = 200, u = {text = {s 
= 0x0, len = 136370556}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 
136370556}}}}
        uac = 0xb3d7e40c
        t = 0xb3d7e330
        lack_dst = {send_sock = 0xa7825d, to = {s = {sa_family = 22632, sa_data 
= "4\n\000\000\000\000\364o\266\000\210\325\065\n"}, sin = {sin_family = 22632,
              sin_port = 2612, sin_addr = {s_addr = 0}, sin_zero = 
"\364o\266\000\210\325\065\n"}, sin6 = {sin6_family = 22632, sin6_port = 2612, 
sin6_flowinfo = 0,
              sin6_addr = {in6_u = {u6_addr8 = 
"\364o\266\000\210\325\065\n@\201\266\000D4Ì¿", u6_addr16 = {28660, 182, 54664, 
2613, 33088, 182, 13380, 49100}, u6_addr32 = {
                    11956212, 171300232, 11960640, 3217830980}}}, sin6_scope_id 
= 10992393}}, id = 0, proto = -12 '\364', send_flags = {f = 111 'o', blst_imask 
= 182 '\266'}}
        backup_user_from = 0xb66ff4
        backup_user_to = 0xa35d608
        backup_domain_from = 0x1c9f8
        backup_domain_to = 0xbfcc335c
        backup_uri_from = 0xa7b602
        backup_uri_to = 0xa3459d8
        backup_xavps = 0x1ba8
        replies_locked = 0
        branch_ret = <value optimized out>
        blst_503_timeout = <value optimized out>
        hf = <value optimized out>
        onsend_params = {req = 0x15, rpl = 0xa345868, param = 0xbfcc3444, code 
= 10919350, flags = 22632, branch = 2612, t_rbuf = 0x0, dst = 0xaf0e89, 
send_buf = {
            s = 0xb66ff4 "\234m\266", len = 21}}
        ctx = {rec_lev = 11764638, run_flags = -1077136316, last_retcode = 
11121748, jmp_env = {{__jmpbuf = {171300252, 8180, 11764638, -1077136268, 
11953184, 171300232},
              __mask_was_saved = 11961512, __saved_mask = {__val = {8216, 
11956212, 8072, 171300232, 3217830836, 11000111, 10989574, 8192, 8, 128, 16, 2, 
128, 171300232,
                  10989574, 11960688, 8200, 0, 11960640, 171203032, 7080, 
11776096, 1, 10970289, 11960640, 0, 11960640, 171300360, 117240, 11776064, 1, 
8}}}}}
#6  0x0809d5f4 in forward_reply (msg=0xb7bea008) at forward.c:790
        new_buf = <value optimized out>
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' 
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 
0},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 
0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {in6_u = {
                  u6_addr8 = '\000' <repeats 15 times>, u6_addr16 = {0, 0, 0, 
0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto 
= 0 '\000',
          send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        new_len = <value optimized out>
        r = 0
        len = <value optimized out>
#7  0x080e11a9 in receive_msg (
    buf=0x82c4fa0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 
xx.xx.xx.xxx;branch=z9hG4bKc13b.25313b6.0\r\nTo: 
sip:000...@xx.xx.xx.xxx;tag=03373b1b433b65504ea28bd3d9e6db76.d7f2\r\nFrom: 
sip:000...@xx.xx.xx.xxx;tag=4cc17c2c75cb82fa"..., len=393, rcv_info=0xbfcc3648) 
at receive.c:270
        msg = <value optimized out>
        ctx = {rec_lev = 171202664, run_flags = 0, last_retcode = 11472521, 
jmp_env = {{__jmpbuf = {11956212, 21, 171202664, -1077135860, 11405301, 
171300240},
              __mask_was_saved = 171300240, __saved_mask = {__val = {133, 
16384, 11953184, 3, 136466468, 136370556, 21, 0, 26, 10595796, 3086435656, 13, 
4294967295, 10530752,
                  134526028, 10532464, 3217831392, 10472920, 10532904, 
3086436456, 1, 5, 0, 134549081, 0, 136715300, 5, 10595796, 7, 3082730000, 
3217831604, 3217831624}}}}}
        ret = 808714780
        inb = {
          s = 0x82c4fa0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 
xx.xx.xx.xxx;branch=z9hG4bKc13b.25313b6.0\r\nTo: 
sip:000...@xx.xx.xx.xxx;tag=03373b1b433b65504ea28bd3d9e6db76.d7f2\r\nFrom: 
sip:000...@xx.xx.xx.xxx;tag=4cc17c2c75cb82fa"..., len = 393}
#8  0x0817801b in udp_rcv_loop () at udp_server.c:544
        len = 393
        tmp = <value optimized out>
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {2263951438, 3217831528, 
10741894, 2115555109}, addr32 = {2263951438, 3217831528, 10741894, 2115555109}, 
addr16 = {10318,
                34545, 13928, 49100, 59526, 163, 53029, 32280}, addr = 
"N(\361\206h6Ì¿\206\350\243\000%\317\030~"}}, dst_ip = {af = 2, len = 4, u = 
{addrl = {2263951438, 0, 0,
                0}, addr32 = {2263951438, 0, 0, 0}, addr16 = {10318, 34545, 0, 
0, 0, 0, 0, 0}, addr = "N(\361\206", '\000' <repeats 11 times>}}, src_port = 
5060,
          dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = 
{s = {sa_family = 2, sa_data = 
"\023\304N(\361\206\000\000\000\000\000\000\000"}, sin = {
              sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 
2263951438}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 
2, sin6_port = 50195,
              sin6_flowinfo = 2263951438, sin6_addr = {in6_u = {u6_addr8 = 
'\000' <repeats 15 times>, u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, u6_addr32 = 
{0, 0, 0, 0}}},
              sin6_scope_id = 0}}, bind_address = 0xb7b7ac68, proto = 1 '\001'}
        buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 
xx.xx.xx.xxx;branch=z9hG4bKc13b.25313b6.0\r\nTo: 
sip:000...@xx.xx.xx.xxx;tag=03373b1b433b65504ea28bd3d9e6db76.d7f2\r\nFrom: 
sip:000...@xx.xx.xx.xxx;tag=4cc17c2c75cb82faa"...
#9  0x080b0426 in main_loop () at main.c:1633
        i = 2
        pid = 808714780
        si = 0xb7b7ac68
        si_desc = "udp receiver child=2 
sock=xx.xx.xx.xxx:5060\000\067̿5I\030\b h \000 h \000\377\377\377\377\020\251 
\b\001\000\000\000\020 
\267\263\020\210׳p\031\064\n\000i\275\267\004\000\000\000p\031\064\n\362\202\257O\001\000\000\000\000\000\000\000\001\000\000\000\001",
 '\000' <repeats 11 times>"\230, \067Ì¿"
        nrprocs = 4
#10 0x080b3d02 in main (argc=11, argv=0xbfcc3924) at main.c:2546
        cfg_stream = 0xa2d0008
        c = <value optimized out>
        r = 808714780
        tmp = 0xbfcc4f3c ""
        tmp_len = 10739525
        port = 136337961
        proto = -1077135208
        ret = <value optimized out>
        seed = 1557959581
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0x0
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

Reply via email to