Guest User

OpenSIPS 3.6 $sdp+rtpengine_offer() crush

a guest
Jun 29th, 2025
6
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 14.63 KB | None | 0 0
  1. #0  __pthread_kill_implementation (threadid=281473240669920, signo=signo@entry=6, no_tid=no_tid@entry=0) at ./nptl/pthread_kill.c:44
  2.         tid = 25127
  3.         ret = 0
  4.         pd = 0xffff98861ee0
  5.         old_mask = {__val = {281473238791052}}
  6.         ret = <optimized out>
  7. #1  0x0000ffff986f0ab4 in __pthread_kill_internal (signo=6, threadid=<optimized out>) at ./nptl/pthread_kill.c:78
  8. No locals.
  9. #2  0x0000ffff986aa72c in __GI_raise (sig=sig@entry=6) at ../sysdeps/posix/raise.c:26
  10.         ret = <optimized out>
  11. #3  0x0000ffff9869747c in __GI_abort () at ./stdlib/abort.c:79
  12.         save_stage = 1
  13.         act = {__sigaction_handler = {sa_handler = 0x20, sa_sigaction = 0x20}, sa_mask = {__val = {3, 2676586395008836901, 2676586395008836901, 11193459566446, 2332130293653205797, 4294967295, 0, 18446462598732840960, 1095216660735, 4222193353359360,
  14.               0, 3547266839205735485, 7236833196856379917, 7152929116648727406, 7651715184376049519, 5300974575771207758}}, sa_flags = 1856391493, sa_restorer = 0xaaaab1c80330 <abort@got[plt]>}
  15. #4  0x0000aaaab18f8a90 in del_lump (msg=0xffff96b486e0, offset=3839458264, len=328, type=HDR_OTHER_T) at data_lump.c:341
  16.         tmp = 0xffff96b486e0
  17.         prev = 0xffff96b50df8
  18.         t = 0xffff66298840
  19.         list = 0xffffca1185c8
  20.         __FUNCTION__ = "del_lump"
  21. #5  0x0000ffff6628ae90 in rtpengine_offer_answer_body (msg=0xffff96b486e0, flags=0xffffca1187a0, node=0x0, spvar=0x0, body=0x0, outbody=0x0, set=0x0, op=1) at rtpengine.c:3978
  22.         bencbuf = {pieces = 0xffff96b51038, free_list = 0x0, error = 0}
  23.         dict = 0xffff96b50df8
  24.         oldbody = {
  25.           s = 0xffff96b4fdb0 "v=0\r\no=- 4249935498 1959544550 IN IP4 172.18.0.60\r\ns=-\r\nc=IN IP4 172.18.0.60\r\nt=0 0\r\nm=audio 12110 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmt"..., len = 328}
  26.         newbody = {
  27.           s = 0xffff96b51290 "v=0\r\no=- 4249935498 1959544550 IN IP4 172.18.0.60\r\ns=-\r\nt=0 0\r\nm=audio 35736 RTP/AVP 0 8 101\r\nc=IN IP4 172.18.0.19\r\na=mid:0\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/80"..., len = 342}
  28.         anchor = 0xff00000000ff0000
  29.         __FUNCTION__ = "rtpengine_offer_answer_body"
  30. #6  0x0000ffff6628b15c in rtpengine_offer_answer (msg=0xffff96b486e0, flags=0xffffca1187a0, node=0x0, spvar=0x0, bpvar=0x0, body=0x0, op=1) at rtpengine.c:4008
  31.         newbody = {s = 0xffffca118788 "h/\263e", len = -904820664}
  32.         val = {rs = {s = 0x0, len = -1766553888}, ri = -1, flags = 0}
  33.         ret = 65535
  34.         __FUNCTION__ = "rtpengine_offer_answer"
  35. #7  0x0000ffff6628aba0 in rtpengine_offer_f (msg=0xffff96b486e0, flags=0xffffca1187a0, spvar=0x0, bpvar=0x0, body=0x0) at rtpengine.c:3929
  36. No locals.
  37. #8  0x0000aaaab18cc4b8 in do_action (a=0xffff9669d6b8, msg=0xffff96b486e0) at action.c:1061
  38.         ret = 0
  39.         v = 65535
  40.         i = 0
  41.         len = 0
  42.         cmatch = 128
  43.         aitem = 0xaaaab198b178 <run_post_raw_processing_cb+52>
  44.         adefault = 0xffffca118950
  45.         spec = 0x1b222b0
  46.         val = {rs = {s = 0x18 <error: Cannot access memory at address 0x18>, len = -1766548136}, ri = -1771638768, flags = 65535}
  47.         start = {tv_sec = 187650102794784, tv_usec = 187650102777064}
  48.         end_time = 65535
  49.         cmd = 0xffff662b98a0 <cmds+960>
  50.         acmd = 0x18
  51.         cmdp = {0xffffca1187a0, 0x0, 0x0, 0x0, 0xaaaab1b29a4c <proto_udp_send+124>, 0xffffca118900, 0xaaaab1982c40 <script_return_push+104>, 0x86eb1c4bbb0}
  52.         tmp_vals = {{rs = {s = 0x65b32f68 <error: Cannot access memory at address 0x65b32f68>, len = 1726331672}, ri = 0, flags = -1108377408}, {rs = {s = 0xffff9669d5f8 "in-iface=internal out-iface=internal", len = 36}, ri = -904820768,
  53.             flags = 65535}, {rs = {s = 0xaaaab1a03170 <fm_split_frag+188> "\037 \003\325\375{Ũ\300\003_\326\377\303\002\321\375{\004\251\375\003\001\221\363S\005\251\340G", len = 1726680912}, ri = 1718022144, flags = 65535}, {rs = {
  54.               s = 0xffff66677140 "p\021\353f\377\377", len = 40}, ri = -904820624, flags = 65535}, {rs = {s = 0xaaaab1a03248 <fm_malloc+204> <incomplete sequence \306>, len = 796649104}, ri = -1313190040, flags = 43690}, {rs = {s = 0xffffca118870 "",
  55.               len = -1314900576}, ri = 1726679280, flags = 65535}, {rs = {s = 0xffff6666f000 "pʻ\261\252\252", len = 1726680912}, ri = 0, flags = -1108379584}, {rs = {s = 0x2f7bde10 <error: Cannot access memory at address 0x2f7bde10>,
  56.               len = 1718022144}, ri = -904820624, flags = 65535}}
  57.         route_p = 0x2f7bde50
  58.         sval = {s = 0x2f7c0358 <error: Cannot access memory at address 0x2f7c0358>, len = 0}
  59.         __FUNCTION__ = "do_action"
  60. #9  0x0000aaaab18c7eb4 in run_action_list (a=0xffff9669c388, msg=0xffff96b486e0) at action.c:194
  61.         ret = 1
  62.         t = 0xffff9669d6b8
  63. #10 0x0000aaaab18c7c74 in run_actions (a=0xffff9669c388, msg=0xffff96b486e0) at action.c:138
  64.         ret = 43690
  65.         _ = 65535
  66.         ret_lvl = 2
  67.         top_route = {s = 0xffffca118a04 "", len = -904820216}
  68.         __FUNCTION__ = "run_actions"
  69. #11 0x0000aaaab18c81f8 in run_top_route (sr=..., msg=0xffff96b486e0) at action.c:254
  70.         recursing = 1
  71.         bk_action_flags = 0
  72.         route_stack_start_bkp = 0
  73.         route_stack_size_bkp = 2
  74.         ret = 1726671840
  75.         ctx = 0x0
  76.         __FUNCTION__ = "run_top_route"
  77. #12 0x0000ffff6657ea24 in pre_print_uac_request (t=0xffff66ead0e0, branch=0, request=0xffff96b486e0, body_clone=0xffffca118b58) at t_fwd.c:194
  78.         backup_route_type = 1
  79.         backup_list = 0xffff66eaebe0
  80.         p = 0xffff96b4cca0 "sip:[email protected]"
  81.         __FUNCTION__ = "pre_print_uac_request"
  82. #13 0x0000ffff6657f698 in add_uac (t=0xffff66ead0e0, request=0xffff96b486e0, uri=0xffffca118bf8, next_hop=0xffffca118c08, bflags=0, path=0xffff96b48980, q=-1, attrs=0x0, proxy=0x0) at t_fwd.c:440
  83.         branch = 0
  84.         body_clone = 0x0
  85.         do_free_proxy = 0
  86.         ret = 0
  87.         __FUNCTION__ = "add_uac"
  88. #14 0x0000ffff66580adc in t_forward_nonack (t=0xffff66ead0e0, p_msg=0xffff96b486e0, proxy=0x0, reset_bcounter=0, locked=0) at t_fwd.c:782
  89.         reply_reason_487 = {s = 0xffff665c2658 "Request Terminated", len = 18}
  90.         backup_uri = {s = 0x0, len = 0}
  91.         backup_dst = {s = 0xffff96b4cc48 "sip:172.18.0.22:5060", len = 20}
  92.         branch_ret = 128
  93.         lowest_ret = -5
  94.         current_uri = {
  95.           s = 0xaaaab1db81df <buf+7> "sip:200@localcore SIP/2.0\r\nVia: SIP/2.0/UDP 172.18.0.60:50588;branch=z9hG4bKc59208682afff310;rport\r\nContact: <sip:[email protected]:50588>\r\nMax-Forwards: 69\r\nProxy-Authorization: Digest u"...,
  96.           len = 17}
  97.         added_branches = 0
  98.         t_invite = 0x1fffff000
  99.         i = 65535
  100.         success_branch = -1766548048
  101.         bk_sock = 0x0
  102.         bk_bflags = 0
  103.         branch = 0xffff6657903c <t_relay_to+44>
  104.         idx = 65535
  105.         bk_path = {s = 0x0, len = 0}
  106.         __FUNCTION__ = "t_forward_nonack"
  107. #15 0x0000ffff66579300 in t_relay_to (p_msg=0xffff96b486e0, proxy=0x0, flags=0) at t_funcs.c:260
  108.         ret = 0
  109.         new_tran = 1
  110.         reply_ret = 43690
  111.         t = 0xffff66ead0e0
  112.         __FUNCTION__ = "t_relay_to"
  113. #16 0x0000ffff6659856c in w_t_relay (p_msg=0xffff96b486e0, flags=0x0, proxy=0x0) at tm.c:1382
  114.         p = 0x0
  115.         t = 0x0
  116.         ret = 65535
  117.         __FUNCTION__ = "w_t_relay"
  118. #17 0x0000aaaab18cc4b8 in do_action (a=0xffff96694c80, msg=0xffff96b486e0) at action.c:1061
  119.         ret = 0
  120.         v = 43690
  121.         i = -1771484848
  122.         len = 65535
  123.         cmatch = -1766553888
  124.         aitem = 0x1b1c85cb4
  125.         adefault = 0xaaaab1c4bbb0
  126.         spec = 0xffffca119100
  127.         val = {rs = {s = 0xffff96691fb8 "\002", len = -1766536560}, ri = 17, flags = 0}
  128.         start = {tv_sec = 11118348000, tv_usec = 281473210156768}
  129.         end_time = 4
  130.         cmd = 0xffff665e8530 <cmds+720>
  131.         aitem = 0xaaaab1db81fa <buf+34>
  132.         adefault = 0xaaaab1db8631 <buf+1113>
  133.         spec = 0xffffca119610
  134.         val = {rs = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, ri = -1771638768, flags = 65535}
  135.         start = {tv_sec = 187650102794784, tv_usec = 187650102777064}
  136.         end_time = 65535
  137.         cmd = 0x0
  138.         acmd = 0x439ca119610
  139.         cmdp = {0xffff9666f010, 0xc0, 0x19666f010, 0xffffca1196c0, 0xffff96b4b530, 0xffffca1195f0, 0xaaaab1982c40 <script_return_push+104>, 0x86e96b49690}
  140.         tmp_vals = {{rs = {s = 0xaaaab1ba4f68 "fm_malloc frag", len = -904817424}, ri = -1314900576, flags = 43690}, {rs = {s = 0xffff96b4b530 "\b", len = -1771638768}, ri = -1766547912, flags = 1}, {rs = {s = 0x0, len = -904816936}, ri = 0,
  141.             flags = 0}, {rs = {s = 0xffffca119550 "\300\226\021\312\377\377", len = -1314591272}, ri = 128, flags = 0}, {rs = {s = 0xaaaab1c85cb4 <ctime_buf+4> "Jun 29 08:19:18", len = -1312506960}, ri = -1766549672, flags = 65535}, {rs = {
  142.               s = 0xffffca119560 "\360\225\021\312\377\377", len = -1314898728}, ri = 128, flags = 0}, {rs = {s = 0xaaaab1c85cb4 <ctime_buf+4> "Jun 29 08:19:18", len = -1766549672}, ri = -1771638768, flags = 2158}, {rs = {
  143.               s = 0xaaaab1b81a20 <__FUNCTION__.3> "script_return_push", len = -1313352472}, ri = 8, flags = 0}}
  144.         route_p = 0xaaaab1db8631 <buf+1113>
  145.         sval = {s = 0xaaaab1b403f8 "unknown", len = 7}
  146.         __FUNCTION__ = "do_action"
  147. #26 0x0000aaaab18c7eb4 in run_action_list (a=0xffff966863c8, msg=0xffff96b486e0) at action.c:194
  148.         ret = 1
  149.         t = 0xffff96693d38
  150. #27 0x0000aaaab18c7c74 in run_actions (a=0xffff966863c8, msg=0xffff96b486e0) at action.c:138
  151.         ret = 43690
  152.         _ = 65535
  153.         ret_lvl = 0
  154.         top_route = {s = 0xffffca1196c0 "", len = 1717133664}
  155.         __FUNCTION__ = "run_actions"
  156. #28 0x0000aaaab18c81f8 in run_top_route (sr=..., msg=0xffff96b486e0) at action.c:254
  157.         recursing = 1
  158.         bk_action_flags = 0
  159.         route_stack_start_bkp = -1
  160.         route_stack_size_bkp = -1766553888
  161.         ret = -1315521676
  162.         ctx = 0x0
  163.         __FUNCTION__ = "run_top_route"
  164. #29 0x0000aaaab196bbe8 in receive_msg (
  165.     buf=0xaaaab1db81d8 <buf> "INVITE sip:200@localcore SIP/2.0\r\nVia: SIP/2.0/UDP 172.18.0.60:50588;branch=z9hG4bKc59208682afff310;rport\r\nContact: <sip:[email protected]:50588>\r\nMax-Forwards: 69\r\nProxy-Authorization: D"...,
  166.     len=1113, rcv_info=0xffffca119880, existing_context=0x0, msg_flags=0) at receive.c:225
  167.         ctx = 0xffff96b49db0
  168.         msg = 0xffff96b486e0
  169.         start = {tv_sec = 281474071894032, tv_usec = 187650102433772}
  170.         rc = 3
  171.         old_route_type = -904816448
  172.         tmp = 0x80 <error: Cannot access memory at address 0x80>
  173.         in_buff = {
  174.           s = 0xaaaab1db81d8 <buf> "INVITE sip:200@localcore SIP/2.0\r\nVia: SIP/2.0/UDP 172.18.0.60:50588;branch=z9hG4bKc59208682afff310;rport\r\nContact: <sip:[email protected]:50588>\r\nMax-Forwards: 69\r\nProxy-Authorization: D"...,
  175.           len = 1113}
  176.         __FUNCTION__ = "receive_msg"
  177. #30 0x0000aaaab1b299b4 in udp_read_req (si=0xffff9667a450, bytes_read=0xffffca119958) at net/proto_udp/proto_udp.c:192
  178.         ri = {src_ip = {af = 2, len = 4, u = {addrl = {15312935583920165548, 4770618492597871678}, addr32 = {1006637740, 3565320648, 1110746174, 1110746174}, addr16 = {4780, 15360, 31176, 54402, 42046, 16948, 42046, 16948},
  179.               addr = "\254\022\000<\310y\202\324>\2444B>\2444B"}}, dst_ip = {af = 2, len = 4, u = {addrl = {1073746604, 0}, addr32 = {1073746604, 0, 0, 0}, addr16 = {4780, 16384, 0, 0, 0, 0, 0, 0}, addr = "\254\022\000@", '\000' <repeats 11 times>}},
  180.           src_port = 50588, dst_port = 5060, proto = 1, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "Ŝ\254\022\000<\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 40133, sin_addr = {
  181.                 s_addr = 1006637740}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 40133, sin6_flowinfo = 1006637740, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000(\236\021\312\377\377\000",
  182.                   __u6_addr16 = {0, 0, 0, 0, 40488, 51729, 65535, 0}, __u6_addr32 = {0, 0, 3390152232, 65535}}}, sin6_scope_id = 1751213958}}, bind_address = 0xffff9667a450}
  183.         len = 1113
  184.         buf = "INVITE sip:200@localcore SIP/2.0\r\nVia: SIP/2.0/UDP 172.18.0.60:50588;branch=z9hG4bKc59208682afff310;rport\r\nContact: <sip:[email protected]:50588>\r\nMax-Forwards: 69\r\nProxy-Authorization: D"...
  185.         tmp = 0x22e0000022e <error: Cannot access memory at address 0x22e0000022e>
  186.         fromlen = 16
  187.         p = 0x200ffffffff
  188.         msg = {
  189.           s = 0xaaaab1db81d8 <buf> "INVITE sip:200@localcore SIP/2.0\r\nVia: SIP/2.0/UDP 172.18.0.60:50588;branch=z9hG4bKc59208682afff310;rport\r\nContact: <sip:[email protected]:50588>\r\nMax-Forwards: 69\r\nProxy-Authorization: D"...,
  190.           len = 1113}
  191.         __FUNCTION__ = "udp_read_req"
  192. #31 0x0000aaaab1b1570c in handle_io (fm=0xffff966ce328, idx=0, event_type=1) at net/net_udp.c:313
  193.         n = 0
  194.         read = -1313788496
  195.         __FUNCTION__ = "handle_io"
  196. #32 0x0000aaaab1b13ae0 in io_wait_loop_epoll (h=0xaaaab1c875a0 <_worker_io>, t=1, repeat=0) at net/../io_wait_loop.h:305
  197.         ret = 1
  198.         n = 1
  199.         r = 0
  200.         i = -1313772316
  201.         e = 0xffff966ce328
  202.         ep_event = {events = 2979075268, data = {ptr = 0xffffca119a50, fd = -904816048, u32 = 3390151248, u64 = 281474071894608}}
  203.         fd = 43690
  204.         curr_time = 11
  205.         __FUNCTION__ = "io_wait_loop_epoll"
  206. #33 0x0000aaaab1b16d7c in udp_start_processes (chd_rank=0xaaaab1c868c0 <chd_rank>, startup_done=0x0) at net/net_udp.c:547
  207.         si = 0xffff9667a450
  208.         sif = 0xffff9667a450
  209.         p_id = 0
  210.         i = 2
  211.         p = 1
  212.         ifp_udp_rcv = {proc_desc = 0xaaaab1bff3d0 "UDP receiver", flags = 4, type = TYPE_UDP}
  213.         __FUNCTION__ = "udp_start_processes"
  214. #34 0x0000aaaab1910bb8 in main_loop () at main.c:284
  215.         chd_rank = 3
  216.         startup_done = 0x0
  217.         last_check = 0
  218.         rc = 43690
  219.         profiling_handler = {desc = 0xaaaab1b5f480 "_ProfilerStart_child()", post_fork = {in_child = 0xaaaab19105e4 <_ProfilerStart_child>, in_parent = 0xaaaab19105f8 <_ProfilerStart_parent>}, _next = 0x0}
  220.         __FUNCTION__ = "main_loop"
  221. #35 0x0000aaaab19147c4 in main (argc=13, argv=0xffffca119db8) at main.c:888
  222.         c = -1
  223.         n = 26
  224.         tmp = 0xffffca11ae8a ""
  225.         tmp_len = 65535
  226.         port = -904815176
  227.         proto = 65535
  228.         protos_no = 2
  229.         options = 0xaaaab1b5ce10 "A:f:cCm:M:b:l:n:N:rRvdDFEVhw:t:u:g:p:P:G:W:o:a:k:s:"
  230.         ret = -1
  231.         seed = 4252529017
  232.         rfd = 3
  233.         procs_no = -904815552
  234.         __FUNCTION__ = "main"
Advertisement
Add Comment
Please, Sign In to add comment