Advertisement
gkorlekar

kam_crash_sjcecv1

Aug 2nd, 2017
330
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
GDB 6.58 KB | None | 0 0
  1. Core was generated by `/usr/local/kamailio/sbin/kamailio_edge -f /usr/local/kamailio/etc/kamailio_edge'.
  2. Program terminated with signal SIGSEGV, Segmentation fault.
  3. #0  0x0000000000601c36 in tcp_read_headers (c=0x7f9da5143448, read_flags=0x7fffe1876ae8) at tcp_read.c:628
  4. 628                 switch (*p){
  5. (gdb) bt
  6. #0  0x0000000000601c36 in tcp_read_headers (c=0x7f9da5143448, read_flags=0x7fffe1876ae8) at tcp_read.c:628
  7. #1  0x00000000006054a6 in tcp_read_req (con=0x7f9da5143448, bytes_read=0x7fffe1876af0, read_flags=0x7fffe1876ae8) at tcp_read.c:1314
  8. #2  0x000000000060aa90 in handle_io (fm=0x7fa0c58aef30, events=1, idx=-1) at tcp_read.c:1677
  9. #3  0x00000000005fc42e in io_wait_loop_epoll (h=0xa63700 <io_w>, t=2, repeat=0) at io_wait.h:1065
  10. #4  0x000000000060bcfc in tcp_receive_loop (unix_sock=64) at tcp_read.c:1789
  11. #5  0x00000000004cebf4 in tcp_init_children () at tcp_main.c:4796
  12. #6  0x000000000051513d in main_loop () at main.c:1704
  13. #7  0x000000000051b725 in main (argc=13, argv=0x7fffe1877148) at main.c:2631
  14. (gdb) frame 0
  15. #0  0x0000000000601c36 in tcp_read_headers (c=0x7f9da5143448, read_flags=0x7fffe1876ae8) at tcp_read.c:628
  16. 628                 switch (*p){
  17. (gdb) print *c
  18. $1 = {s = 41935, fd = 178, write_lock = {val = 0}, id = 58658, reader_pid = 10395, rcv = {src_ip = {af = 2, len = 4, u = {addrl = {107123148, 0}, addr32 = {107123148, 0, 0, 0}, addr16 = {37324, 1634, 0, 0, 0, 0, 0, 0},
  19.         addr = "̑b\006", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1812487097, 0}, addr32 = {1812487097, 0, 0, 0}, addr16 = {23481, 27656, 0, 0, 0, 0, 0, 0}, addr = "\271[\bl", '\000' <repeats 11 times>}},
  20.     src_port = 36766, dst_port = 443, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\217\236̑b\006\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 40591, sin_addr = {
  21.           s_addr = 107123148}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 40591, sin6_flowinfo = 107123148, sin6_addr = {__in6_u = {
  22.             __u6_addr8 = "\000\000\000\000\000\000\000\000\377\377\377\377\001\000\000", __u6_addr16 = {0, 0, 0, 0, 65535, 65535, 1, 0}, __u6_addr32 = {0, 0, 4294967295, 1}}}, sin6_scope_id = 9600}}, bind_address = 0x7fa0c377fff0,
  23.     proto = 3 '\003'}, req = {next = 0x0, buf = 0x7f9da5143738 "", start = 0x7f9da5143738 "", pos = 0x7f9da5143738 "", parsed = 0x7f9ca5143738 <error: Cannot access memory at address 0x7f9ca5143738>, body = 0x0, b_size = 16383,
  24.     content_len = 0, chunk_size = 0, flags = 0, bytes_to_go = 0, error = TCP_REQ_OK, state = H_SKIP_EMPTY}, refcnt = {val = 2}, type = PROTO_TLS, flags = 16408, send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, state = S_CONN_OK,
  25.   extra_data = 0x7f9d814a6838, timer = {next = 0xa892f8 <tcp_reader_ltimer+154168>, prev = 0x7f9dabba8b08, expire = 1894606243, initial_timeout = 80, data = 0x7f9da5143448, f = 0x608210 <tcpconn_read_timeout>, flags = 512,
  26.     slow_idx = 0}, timeout = 1894606243, lifetime = 9600, id_hash = 290, id_next = 0x7f9e400dcd50, id_prev = 0x0, c_next = 0x7f9dabba8a20, c_prev = 0x7f9dbb675af0, con_aliases = {{parent = 0x7f9da5143448, next = 0x7f9cc8244ac0,
  27.       prev = 0x0, port = 36766, hash = 2393}, {parent = 0x7f9da5143448, next = 0x7f9cc8244aa0, prev = 0x0, port = 36766, hash = 1087}, {parent = 0x7f9da5143448, next = 0x7f9e27fe5650, prev = 0x7f9e5eaca028, port = 36766, hash = 1415}, {
  28.       parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0,
  29.       hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0,
  30.       port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}}, aliases = 3, wbuf_q = {first = 0x0, last = 0x0, wr_timeout = 0, queued = 0, offset = 0, last_used = 0}}
  31. (gdb) info locals
  32. bytes = 0
  33. remaining = 1488417672
  34. p = 0x7f9ca5143738 <error: Cannot access memory at address 0x7f9ca5143738>
  35. r = 0x7f9da51434c8
  36. mc = 0
  37. body_len = 0
  38. mfline = 0x0
  39. mtransid = {s = 0x7fa0bd1c03e6 "TLS read:", len = 2}
  40. __FUNCTION__ = "tcp_read_headers"
  41. (gdb) print *r
  42. $2 = {next = 0x0, buf = 0x7f9da5143738 "", start = 0x7f9da5143738 "", pos = 0x7f9da5143738 "", parsed = 0x7f9ca5143738 <error: Cannot access memory at address 0x7f9ca5143738>, body = 0x0, b_size = 16383, content_len = 0, chunk_size = 0,
  43.   flags = 0, bytes_to_go = 0, error = TCP_REQ_OK, state = H_SKIP_EMPTY}
  44. (gdb) frame 1
  45. #1  0x00000000006054a6 in tcp_read_req (con=0x7f9da5143448, bytes_read=0x7fffe1876af0, read_flags=0x7fffe1876ae8) at tcp_read.c:1314
  46. 1314                    bytes=tcp_read_headers(con, read_flags);
  47. (gdb) info locals
  48. bytes = -1
  49. total_bytes = 0
  50. resp = 1
  51. size = 0
  52. req = 0x7f9da51434c8
  53. dst = {send_sock = 0x7fffe1876ae0, to = {s = {sa_family = 2, sa_data = "\000\000\000\000\000\000\020oA\000\000\000\000"}, sin = {sin_family = 2, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\020oA\000\000\000\000"}, sin6 = {
  54.       sin6_family = 2, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\020oA\000\000\000\000\000@q\207\341\377\177\000", __u6_addr16 = {28432, 65, 0, 0, 28992, 57735, 32767, 0}, __u6_addr32 = {4288272, 0,
  55.             3783749952, 32767}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
  56. c = 56 '8'
  57. ret = 0
  58. __FUNCTION__ = "tcp_read_req"
  59. (gdb) p r->buf[0]
  60. Attempt to extract a component of a value that is not a structure pointer.
  61. (gdb) frame 0
  62. #0  0x0000000000601c36 in tcp_read_headers (c=0x7f9da5143448, read_flags=0x7fffe1876ae8) at tcp_read.c:628
  63. 628                 switch (*p){
  64. (gdb) p r->buf[0]
  65. $3 = 0 '\000'
  66. (gdb) p r->buf[1]
  67. $4 = 0 '\000'
  68. (gdb) p r->buf[2]
  69. $5 = 0 '\000'
  70. (gdb) p r->buf[3]
  71. $6 = 0 '\000'
  72. (gdb) frame 3
  73. #3  0x00000000005fc42e in io_wait_loop_epoll (h=0xa63700 <io_w>, t=2, repeat=0) at io_wait.h:1065
  74. 1065                            (handle_io(fm, revents, -1)>0) && repeat);
  75. (gdb) info locals
  76. n = 1
  77. r = 0
  78. fm = 0x7fa0c58aef30
  79. revents = 1
  80. __FUNCTION__ = "io_wait_loop_epoll"
  81. (gdb) p *h
  82. $7 = {poll_method = POLL_EPOLL_LT, flags = 0, fd_hash = 0x7fa0c58ade80, fd_no = 256, max_fd_no = 65794, fd_array = 0x0, crt_fd_array_idx = 0, epfd = 8, ep_array = 0x7fa0c5a2f6f8, sset = {__val = {0 <repeats 16 times>}}, signo = 0,
  83.   master_rset = {__fds_bits = {0 <repeats 16 times>}}, master_wset = {__fds_bits = {0 <repeats 16 times>}}, max_fd_select = 0}
  84. (gdb) p *fm
  85. $8 = {fd = 178, type = 2, data = 0x7f9da5143448, events = 1}
  86. (gdb)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement