Advertisement
gkorlekar

kam_crash_dalecv2

Aug 2nd, 2017
688
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
GDB 7.80 KB | None | 0 0
  1. Core was generated by `/usr/local/kamailio/sbin/kamailio_edge -f /usr/local/kamailio/etc/kamailio_edge'.
  2. Program terminated with signal SIGSEGV, Segmentation fault.
  3. #0  0x0000000000606acc in tcp_read_headers (c=0x7f0d1444e8e8, read_flags=0x7fffda3e2778) at tcp_read.c:628
  4. 628                 switch (*p){
  5. (gdb) bt
  6. #0  0x0000000000606acc in tcp_read_headers (c=0x7f0d1444e8e8, read_flags=0x7fffda3e2778) at tcp_read.c:628
  7. #1  0x000000000060a33c in tcp_read_req (con=0x7f0d1444e8e8, bytes_read=0x7fffda3e2780, read_flags=0x7fffda3e2778) at tcp_read.c:1314
  8. #2  0x000000000060f926 in handle_io (fm=0x7f10995ef0c0, events=1, idx=-1) at tcp_read.c:1677
  9. #3  0x00000000006012c4 in io_wait_loop_epoll (h=0xa63840 <io_w>, t=2, repeat=0) at io_wait.h:1065
  10. #4  0x0000000000610b92 in tcp_receive_loop (unix_sock=80) at tcp_read.c:1789
  11. #5  0x00000000004dac91 in tcp_init_children () at tcp_main.c:4796
  12. #6  0x0000000000505dd4 in main_loop () at main.c:1704
  13. #7  0x000000000050c3bc in main (argc=13, argv=0x7fffda3e2dd8) at main.c:2631
  14. (gdb) frame 0
  15. #0  0x0000000000606acc in tcp_read_headers (c=0x7f0d1444e8e8, read_flags=0x7fffda3e2778) at tcp_read.c:628
  16. 628                 switch (*p){
  17. (gdb) print *c
  18. $1 = {s = 25528, fd = 24, write_lock = {val = 0}, id = 51600, reader_pid = 17983, rcv = {src_ip = {af = 2, len = 4, u = {addrl = {572711474, 0}, addr32 = {572711474, 0, 0, 0}, addr16 = {57906, 8738, 0, 0, 0, 0, 0, 0},
  19.         addr = "2\342\"\"", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1779129273, 0}, addr32 = {1779129273, 0, 0, 0}, addr16 = {23481, 27147, 0, 0, 0, 0, 0, 0}, addr = "\271[\vj", '\000' <repeats 11 times>}},
  20.     src_port = 4704, dst_port = 7060, proto_reserved1 = 51600, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\022`2\342\"\"\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 24594, sin_addr = {
  21.           s_addr = 572711474}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 24594, sin6_flowinfo = 572711474, sin6_addr = {__in6_u = {
  22.             __u6_addr8 = "\000\000\000\000\000\000\000\000\377\377\377\377\001\000\000", __u6_addr16 = {0, 0, 0, 0, 65535, 65535, 1, 0}, __u6_addr32 = {0, 0, 4294967295, 1}}}, sin6_scope_id = 4140774688}}, bind_address = 0x7f10974c1260,
  23.     proto = 2 '\002'}, req = {next = 0x0,
  24.     buf = 0x7f0d1444ebd8 "REGISTER sip:ubervoice.ubervoip.net:7060 SIP/2.0\r\nCall-ID: a4a0167fba0d3a3a@10.130.41.50\r\nContent-Length: 0\r\nCSeq: 7166 REGISTER\r\nFrom: <sip:+13172793350-user-6384178717523968-obi-hex_40ae5d7da8@uberv"...,
  25.     start = 0x7f0d1444ebd8 "REGISTER sip:ubervoice.ubervoip.net:7060 SIP/2.0\r\nCall-ID: a4a0167fba0d3a3a@10.130.41.50\r\nContent-Length: 0\r\nCSeq: 7166 REGISTER\r\nFrom: <sip:+13172793350-user-6384178717523968-obi-hex_40ae5d7da8@uberv"..., pos = 0x7f0d1444ebd8 "REGISTER sip:ubervoice.ubervoip.net:7060 SIP/2.0\r\nCall-ID: a4a0167fba0d3a3a@10.130.41.50\r\nContent-Length: 0\r\nCSeq: 7166 REGISTER\r\nFrom: <sip:+13172793350-user-6384178717523968-obi-hex_40ae5d7da8@uberv"...,
  26.     parsed = 0x7f0c1444ebd8 <error: Cannot access memory at address 0x7f0c1444ebd8>, body = 0x0, b_size = 16383, content_len = 0, chunk_size = 0, flags = 0, bytes_to_go = 0, error = TCP_REQ_OK, state = H_SKIP_EMPTY}, refcnt = {val = 2},
  27.   type = PROTO_TCP, flags = 16408, send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, state = S_CONN_OK, extra_data = 0x0, timer = {next = 0xa6ab78 <tcp_reader_ltimer+29048>, prev = 0x7f0cb7a61cd0, expire = 732006167,
  28.     initial_timeout = 80, data = 0x7f0d1444e8e8, f = 0x60d0a6 <tcpconn_read_timeout>, flags = 512, slow_idx = 0}, timeout = 732006167, lifetime = 57680, id_hash = 400, id_next = 0x7f0cf51822f8, id_prev = 0x0, c_next = 0x7f0cb7a61be8,
  29.   c_prev = 0x7f0d555d48b0, con_aliases = {{parent = 0x7f0d1444e8e8, next = 0x7f0d967230a8, prev = 0x7f0cde10b688, port = 4704, hash = 1153}, {parent = 0x7f0d1444e8e8, next = 0x7f0d96723088, prev = 0x0, port = 4704, hash = 3296}, {
  30.       parent = 0x7f0d1444e8e8, next = 0x7f0cf7a8d4b8, prev = 0x0, port = 4704, hash = 1859}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0,
  31.       next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {
  32.       parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}, {parent = 0x0, next = 0x0, prev = 0x0, port = 0, hash = 0}}, aliases = 3, wbuf_q = {first = 0x0, last = 0x0,
  33.     wr_timeout = 0, queued = 0, offset = 0, last_used = 0}}
  34. (gdb) info locals
  35. bytes = 0
  36. remaining = -633461056
  37. p = 0x7f0c1444ebd8 <error: Cannot access memory at address 0x7f0c1444ebd8>
  38. r = 0x7f0d1444e968
  39. mc = 0
  40. body_len = 0
  41. mfline = 0x0
  42. mtransid = {s = 0x400000002 <error: Cannot access memory at address 0x400000002>, len = 2}
  43. __FUNCTION__ = "tcp_read_headers"
  44. (gdb) print *r
  45. $2 = {next = 0x0,
  46.   buf = 0x7f0d1444ebd8 "REGISTER sip:ubervoice.ubervoip.net:7060 SIP/2.0\r\nCall-ID: a4a0167fba0d3a3a@10.130.41.50\r\nContent-Length: 0\r\nCSeq: 7166 REGISTER\r\nFrom: <sip:+13172793350-user-6384178717523968-obi-hex_40ae5d7da8@uberv"..., start = 0x7f0d1444ebd8 "REGISTER sip:ubervoice.ubervoip.net:7060 SIP/2.0\r\nCall-ID: a4a0167fba0d3a3a@10.130.41.50\r\nContent-Length: 0\r\nCSeq: 7166 REGISTER\r\nFrom: <sip:+13172793350-user-6384178717523968-obi-hex_40ae5d7da8@uberv"..., pos = 0x7f0d1444ebd8 "REGISTER sip:ubervoice.ubervoip.net:7060 SIP/2.0\r\nCall-ID: a4a0167fba0d3a3a@10.130.41.50\r\nContent-Length: 0\r\nCSeq: 7166 REGISTER\r\nFrom: <sip:+13172793350-user-6384178717523968-obi-hex_40ae5d7da8@uberv"...,
  47.   parsed = 0x7f0c1444ebd8 <error: Cannot access memory at address 0x7f0c1444ebd8>, body = 0x0, b_size = 16383, content_len = 0, chunk_size = 0, flags = 0, bytes_to_go = 0, error = TCP_REQ_OK, state = H_SKIP_EMPTY}
  48. (gdb) frame 1
  49. #1  0x000000000060a33c in tcp_read_req (con=0x7f0d1444e8e8, bytes_read=0x7fffda3e2780, read_flags=0x7fffda3e2778) at tcp_read.c:1314
  50. 1314                    bytes=tcp_read_headers(con, read_flags);
  51. (gdb) info locals
  52. bytes = -1
  53. total_bytes = 0
  54. resp = 1
  55. size = 0
  56. req = 0x7f0d1444e968
  57. dst = {send_sock = 0x7fffda3e2770, to = {s = {sa_family = 63672, sa_data = "\345k\r\177\000\000\001 \000\000x\360^\231"}, sin = {sin_family = 63672, sin_port = 27621, sin_addr = {s_addr = 32525}, sin_zero = "\001 \000\000x\360^\231"},
  58.     sin6 = {sin6_family = 63672, sin6_port = 27621, sin6_flowinfo = 32525, sin6_addr = {__in6_u = {__u6_addr8 = "\001 \000\000x\360^\231\020\177\000\000\000\000\000", __u6_addr16 = {8193, 0, 61560, 39262, 32528, 0, 0, 0}, __u6_addr32 = {
  59.             8193, 2573135992, 32528, 0}}}, sin6_scope_id = 3661506112}}, id = 32767, proto = 1 '\001', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
  60. c = 0 '\000'
  61. ret = 0
  62. __FUNCTION__ = "tcp_read_req"
  63. (gdb) frame 0
  64. #0  0x0000000000606acc in tcp_read_headers (c=0x7f0d1444e8e8, read_flags=0x7fffda3e2778) at tcp_read.c:628
  65. 628                 switch (*p){
  66. (gdb) p r->buf[0]
  67. $3 = 82 'R'
  68. (gdb) p r->buf[1]
  69. $4 = 69 'E'
  70. (gdb) p r->buf[2]
  71. $5 = 71 'G'
  72. (gdb) p r->buf[3]
  73. $6 = 73 'I'
  74. (gdb) frame 3
  75. #3  0x00000000006012c4 in io_wait_loop_epoll (h=0xa63840 <io_w>, t=2, repeat=0) at io_wait.h:1065
  76. 1065                            (handle_io(fm, revents, -1)>0) && repeat);
  77. (gdb) info locals
  78. n = 1
  79. r = 0
  80. fm = 0x7f10995ef0c0
  81. revents = 1
  82. __FUNCTION__ = "io_wait_loop_epoll"
  83. (gdb) p *h
  84. $7 = {poll_method = POLL_EPOLL_LT, flags = 0, fd_hash = 0x7f10995eee80, fd_no = 36, max_fd_no = 65794, fd_array = 0x0, crt_fd_array_idx = 0, epfd = 8, ep_array = 0x7f10997706f8, sset = {__val = {0 <repeats 16 times>}}, signo = 0,
  85.   master_rset = {__fds_bits = {0 <repeats 16 times>}}, master_wset = {__fds_bits = {0 <repeats 16 times>}}, max_fd_select = 0}
  86. (gdb) p *fm
  87. $8 = {fd = 24, type = 2, data = 0x7f0d1444e8e8, events = 1}
  88. (gdb)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement