New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ims_charging unlink_unsafe_ro_session #1549
Comments
Sorry, previous supposed be as below.This must be first check
rest of the code .... |
Can you provide a patch with the changes? Eventually make it a pull request, to be easy to review and then just merge from the web interface if all ok. |
Also, maybe @ngvoice or @christoph-v can comment on this issue... |
Hi @miconda . So sorry, no experience with Ro Interface / charging yet on my side. |
Ok I'll do the pull request etc. Below is from modules/ims_charging/ro_session_hash.h function, I've just indicated patch changes as "+"
|
- issue reported and patch suggested by GH #1549
@christoph-v - no worries, I tried to approach those that I saw having activity with ims modules, thanks anyhow. @thulasizwe-n - I pushed the patch from your comment. |
Apologies if i have not kept with the reporting standard.
Insertion attempts of out-of-credit replies from resume_on_initial_ccr callback, are corrupting the ro_session list. i.e. they nullify the first and last fields, which under certain conditions the first entry gets restored but not the last.This then crashes the process at ro_session_hash.c (link_ro_session), where the first entry has a valid address but the last does not.
Solution: ro_session_hash.h - unlink_unsafe_ro_session - check if the session to be linked is actually part of list i.e
rest of the code ....
The text was updated successfully, but these errors were encountered: