Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SipTrace module core dump on startup #262

Closed
00Asgaroth00 opened this issue Jul 24, 2015 · 3 comments
Closed

SipTrace module core dump on startup #262

00Asgaroth00 opened this issue Jul 24, 2015 · 3 comments

Comments

@00Asgaroth00
Copy link

When I attempt to enable the siptrace module in my configuration, I am presented with the following error and the core dump:

/usr/sbin/kamailio[9782]: INFO: rr [../outbound/api.h:54]: ob_load_api(): Failed to import bind_ob
/usr/sbin/kamailio[9782]: INFO: rr [rr_mod.c:174]: mod_init(): outbound module not available
/usr/sbin/kamailio[9782]: INFO: path [../outbound/api.h:54]: ob_load_api(): Failed to import bind_ob
/usr/sbin/kamailio[9782]: INFO: path [path_mod.c:147]: mod_init(): outbound module not available
/usr/sbin/kamailio[9782]: INFO: permissions [permissions.c:608]: mod_init(): default allow file (/shared/kamailio/etc/permissions.allow) not found => empty rule set
/usr/sbin/kamailio[9782]: INFO: permissions [permissions.c:617]: mod_init(): default deny file (/shared/kamailio/etc/permissions.deny) not found => empty rule set
/usr/sbin/kamailio[9782]: INFO: pua [pua.c:447]: db_restore(): the query returned no result
/usr/sbin/kamailio[9782]: WARNING: pua_dialoginfo [pua_dialoginfo.c:627]: mod_init(): pubruri_caller_dlg_var is not set - restore on restart disabled
/usr/sbin/kamailio[9782]: WARNING: pua_dialoginfo [pua_dialoginfo.c:630]: mod_init(): pubruri_callee_dlg_var is not set - restore on restart disabled
/usr/sbin/kamailio[9782]: ERROR: dispatcher [dispatcher.c:768]: ds_warn_fixup(): failover functions used, but required AVP parameters are NULL -- feature disabled
/usr/sbin/kamailio[9782]: ERROR: dispatcher [dispatcher.c:768]: ds_warn_fixup(): failover functions used, but required AVP parameters are NULL -- feature disabled
/usr/sbin/kamailio[9782]: INFO: <core> [udp_server.c:150]: probe_max_receive_buffer(): SO_RCVBUF is initially 124928
/usr/sbin/kamailio[9782]: INFO: <core> [udp_server.c:200]: probe_max_receive_buffer(): SO_RCVBUF is finally 249856
/usr/sbin/kamailio[9782]: INFO: <core> [udp_server.c:150]: probe_max_receive_buffer(): SO_RCVBUF is initially 124928
/usr/sbin/kamailio[9782]: INFO: <core> [udp_server.c:200]: probe_max_receive_buffer(): SO_RCVBUF is finally 249856
/usr/sbin/kamailio[9782]: INFO: <core> [udp_server.c:150]: probe_max_receive_buffer(): SO_RCVBUF is initially 124928
/usr/sbin/kamailio[9782]: INFO: <core> [udp_server.c:200]: probe_max_receive_buffer(): SO_RCVBUF is finally 249856
/usr/sbin/kamailio[9790]: INFO: ctl [io_listener.c:214]: io_listen_loop(): io_listen_loop:  using epoll_lt io watch method (config)
/usr/sbin/kamailio[9791]: ERROR: <core> [db.c:448]: db_use_table(): invalid parameter value
/usr/sbin/kamailio[9791]: ERROR: <core> [db_query.c:203]: db_do_insert_cmd(): invalid parameter value
/usr/sbin/kamailio[9792]: ERROR: <core> [db.c:448]: db_use_table(): invalid parameter value
/usr/sbin/kamailio[9792]: ERROR: <core> [db_query.c:203]: db_do_insert_cmd(): invalid parameter value
/usr/sbin/kamailio[9793]: ERROR: <core> [db.c:448]: db_use_table(): invalid parameter value
/usr/sbin/kamailio[9793]: ERROR: <core> [db_query.c:203]: db_do_insert_cmd(): invalid parameter value
/usr/sbin/kamailio[9794]: ERROR: <core> [db.c:448]: db_use_table(): invalid parameter value
/usr/sbin/kamailio[9794]: ERROR: <core> [db_query.c:203]: db_do_insert_cmd(): invalid parameter value
/usr/sbin/kamailio[9782]: ALERT: <core> [main.c:728]: handle_sigs(): child process 9792 exited by a signal 11
/usr/sbin/kamailio[9782]: ALERT: <core> [main.c:731]: handle_sigs(): core was generated
/usr/sbin/kamailio[9782]: INFO: <core> [main.c:743]: handle_sigs(): terminating due to SIGCHLD
/usr/sbin/kamailio[9795]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
/usr/sbin/kamailio[9783]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
/usr/sbin/kamailio[9789]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
/usr/sbin/kamailio[9796]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
/usr/sbin/kamailio[9787]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
/usr/sbin/kamailio[9790]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
/usr/sbin/kamailio[9785]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
/usr/sbin/kamailio[9784]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
/usr/sbin/kamailio[9788]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
/usr/sbin/kamailio[9786]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received

The associate "thread apply all bt full" of the core file is as follows:

(gdb) thread apply all bt full

Thread 1 (Thread 0x7fceace32700 (LWP 9792)):
#0  0x00007fcea8237173 in db_postgres_store_result () from /usr/lib64/kamailio/modules/db_postgres.so
No symbol table info available.
#1  0x00007fcea8238898 in db_postgres_insert () from /usr/lib64/kamailio/modules/db_postgres.so
No symbol table info available.
#2  0x00007fce9ebd9ee6 in ?? () from /usr/lib64/kamailio/modules/siptrace.so
No symbol table info available.
#3  0x00007fce9ebd94dd in ?? () from /usr/lib64/kamailio/modules/siptrace.so
No symbol table info available.
#4  0x00007fce9ebe3223 in ?? () from /usr/lib64/kamailio/modules/siptrace.so
No symbol table info available.
#5  0x00007fcea3759735 in sl_run_callbacks () from /usr/lib64/kamailio/modules/sl.so
No symbol table info available.
#6  0x00007fcea3756835 in sl_reply_helper () from /usr/lib64/kamailio/modules/sl.so
No symbol table info available.
#7  0x00007fcea37575d2 in sl_send_reply () from /usr/lib64/kamailio/modules/sl.so
No symbol table info available.
#8  0x00007fcea374e7c5 in send_reply () from /usr/lib64/kamailio/modules/sl.so
No symbol table info available.
#9  0x00007fcea15cfaab in worker_loop () from /usr/lib64/kamailio/modules/dmq.so
No symbol table info available.
#10 0x00007fcea15b432c in ?? () from /usr/lib64/kamailio/modules/dmq.so
No symbol table info available.
#11 0x0000000000594031 in ?? ()
No symbol table info available.
#12 0x0000000000593d6c in ?? ()
No symbol table info available.
#13 0x0000000000593d6c in ?? ()
No symbol table info available.
#14 0x0000000000593d6c in ?? ()
No symbol table info available.
#15 0x0000000000593d6c in ?? ()
No symbol table info available.
#16 0x0000000000593d6c in ?? ()
No symbol table info available.
#17 0x0000000000593d6c in ?? ()
No symbol table info available.
#18 0x0000000000593d6c in ?? ()
No symbol table info available.
#19 0x0000000000593d6c in ?? ()
No symbol table info available.
#20 0x0000000000593d6c in ?? ()
No symbol table info available.
#21 0x0000000000593d6c in ?? ()
No symbol table info available.
#22 0x0000000000593d6c in ?? ()
No symbol table info available.
#23 0x0000000000593d6c in ?? ()
No symbol table info available.
#24 0x0000000000593d6c in ?? ()
No symbol table info available.
#25 0x0000000000593d6c in ?? ()
No symbol table info available.
#26 0x0000000000593d6c in ?? ()
No symbol table info available.
#27 0x0000000000593d6c in ?? ()
No symbol table info available.
#28 0x000000000059433b in init_child ()
No symbol table info available.
#29 0x00000000004a8880 in main_loop ()
No symbol table info available.
#30 0x00000000004ae2d2 in main ()
No symbol table info available.

Kamailio version is 4.3.1:

# kamailio -V
version: kamailio 4.3.1 (x86_64/linux) f38e67
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, F_MALLOC, DBG_F_MALLOC, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: f38e67 
compiled on 18:15:23 Jul 20 2015 with gcc 4.4.7

Siptrace parameters set are:

modparam("siptrace", "db_url", DBURL)
modparam("siptrace", "hep_mode_on", 1)
modparam("siptrace", "trace_to_database", 1)
modparam("siptrace", "trace_flag", 22)
modparam("siptrace", "trace_on", 1)

I came accross the following archive mail thread where it mentioned that there may be some issues with the mi module when loading siptrace:

http://lists.sip-router.org/pipermail/sr-dev/2011-June/011417.html

I'm not sure if it is in any way related, but if it is, I am loading the mi_rpc module as well, however, I did not issue any commands over rpc to activate the above crash.

Let me know if you need any additional info from me to debug this further.

@miconda
Copy link
Member

miconda commented Jul 24, 2015

Install debug symbols (kamailio dbg package) and then re-take the backtrace in gdb. Right now is no useful information in the backtrace.

@00Asgaroth00
Copy link
Author

(gdb) thread apply all bt full

Thread 1 (Thread 0x7f8fba42b700 (LWP 3737)):
#0  0x00007f8fb5830173 in db_postgres_store_result (_con=0x0, _r=0x7ffd4c91b8b8) at km_dbase.c:549
        pqresult = 1284620032
        rc = 0
        __FUNCTION__ = "db_postgres_store_result"
#1  0x00007f8fb5831898 in db_postgres_insert (_h=0x0, _k=0x7ffd4c91baa0, _v=0x7ffd4c91b920, _n=12) at km_dbase.c:625
        _r = 0x7f8fb5afcd08
        ret = -1
        tmp = -1249686632
        __FUNCTION__ = "db_postgres_insert"
#2  0x00007f8fac1d2ee6 in sip_trace_store_db (sto=0x7ffd4c91bc10) at siptrace.c:839
        db_keys = {0x7f8fac3e85e0, 0x7f8fac3e85c0, 0x7f8fac3e85f0, 0x7f8fac3e8600, 0x7f8fac3e8610, 0x7f8fac3e8620, 0x7f8fac3e85b0, 0x7f8fac3e8640, 0x7f8fac3e8630, 0x7f8fac3e85d0, 0x7f8fac3e8650, 0x7f8fac3e8660}
        db_vals = {{type = DB1_BLOB, nul = 0, free = 1284619624, val = {int_val = -1246786728, ll_val = 140255205231448, double_val = 6.9295278555271937e-310, time_val = 140255205231448, 
              string_val = 0x7f8fb5af8b58 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 10.6.0.110;branch=z9hG4bK1b7c.8f500ae", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer@10.6.0.109:5060>;tag=4e609057d8b6808cffd08a2f84e8a189.1869\r\nFrom: <sip:not"..., str_val = {s = 0x7f8fb5af8b58 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 10.6.0.110;branch=z9hG4bK1b7c.8f500ae", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer@10.6.0.109:5060>;tag=4e609057d8b6808cffd08a2f84e8a189.1869\r\nFrom: <sip:not"..., 
                len = 512}, blob_val = {
                s = 0x7f8fb5af8b58 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 10.6.0.110;branch=z9hG4bK1b7c.8f500ae", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer@10.6.0.109:5060>;tag=4e609057d8b6808cffd08a2f84e8a189.1869\r\nFrom: <sip:not"..., 
                len = 512}, bitmap_val = 3048180568}}, {type = DB1_STR, nul = 0, free = 1284618784, val = {int_val = 1817756381, ll_val = 140253974807261, double_val = 6.9294670644951328e-310, time_val = 140253974807261, 
              string_val = 0x7f8f6c58c2dd "313d580314c50a71-28124@194.213.29.110\r\nContent-Length: 105\r\nUser-Agent: kamailio (bfievklb02)\r\nMax-Forwards: 1\r\nContent-Type: text/plain\r\n\r\nsip:10.6.0.109:5060;status=active\r\nsip:10.6.0.111:5060;statu"..., str_val = {
                s = 0x7f8f6c58c2dd "313d580314c50a71-28124@194.213.29.110\r\nContent-Length: 105\r\nUser-Agent: kamailio (bfievklb02)\r\nMax-Forwards: 1\r\nContent-Type: text/plain\r\n\r\nsip:10.6.0.109:5060;status=active\r\nsip:10.6.0.111:5060;statu"..., len = 37}, blob_val = {
                s = 0x7f8f6c58c2dd "313d580314c50a71-28124@194.213.29.110\r\nContent-Length: 105\r\nUser-Agent: kamailio (bfievklb02)\r\nMax-Forwards: 1\r\nContent-Type: text/plain\r\n\r\nsip:10.6.0.109:5060;status=active\r\nsip:10.6.0.111:5060;statu"..., len = 37}, bitmap_val = 1817756381}}, {type = DB1_STR, nul = 0, free = 2479, val = {int_val = 1817756088, ll_val = 140253974806968, double_val = 6.9294670644806567e-310, time_val = 140253974806968, 
              string_val = 0x7f8f6c58c1b8 "KDMQ sip:notification_peer@10.6.0.109:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.6.0.110;branch=z9hG4bK1b7c.8f500ae", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer@10.6.0.109:5060>\r\nFrom: <sip:notificat"..., str_val = {s = 0x7f8f6c58c1b8 "KDMQ sip:notification_peer@10.6.0.109:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.6.0.110;branch=z9hG4bK1b7c.8f500ae", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer@10.6.0.109:5060>\r\nFrom: <sip:notificat"..., 
                len = 4}, blob_val = {
                s = 0x7f8f6c58c1b8 "KDMQ sip:notification_peer@10.6.0.109:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.6.0.110;branch=z9hG4bK1b7c.8f500ae", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer@10.6.0.109:5060>\r\nFrom: <sip:notificat"..., 
                len = 4}, bitmap_val = 1817756088}}, {type = DB1_STR, nul = 0, free = 0, val = {int_val = 1284619232, ll_val = 140725888072672, double_val = 6.9527826777207666e-310, time_val = 140725888072672, string_val = 0x7ffd4c91bbe0 "200", 
              str_val = {s = 0x7ffd4c91bbe0 "200", len = 3}, blob_val = {s = 0x7ffd4c91bbe0 "200", len = 3}, bitmap_val = 1284619232}}, {type = DB1_STR, nul = 0, free = 1284619720, val = {int_val = 1284619524, ll_val = 140725888072964, 
              double_val = 6.9527826777351933e-310, time_val = 140725888072964, string_val = 0x7ffd4c91bd04 "udp:10.6.0.109:5060", str_val = {s = 0x7ffd4c91bd04 "udp:10.6.0.109:5060", len = 19}, blob_val = {s = 0x7ffd4c91bd04 "udp:10.6.0.109:5060", 
                len = 19}, bitmap_val = 1284619524}}, {type = DB1_STR, nul = 0, free = 0, val = {int_val = 1284619472, ll_val = 140725888072912, double_val = 6.9527826777326241e-310, time_val = 140725888072912, 
              string_val = 0x7ffd4c91bcd0 "udp:10.6.0.110:5060", str_val = {s = 0x7ffd4c91bcd0 "udp:10.6.0.110:5060", len = 19}, blob_val = {s = 0x7ffd4c91bcd0 "udp:10.6.0.110:5060", len = 19}, bitmap_val = 1284619472}}, {type = DB1_DATETIME, nul = 0, 
            free = -1246497552, val = {int_val = 1437720764, ll_val = 1437720764, double_val = 7.103284378050304e-315, time_val = 1437720764, string_val = 0x55b1e0bc <Address 0x55b1e0bc out of bounds>, str_val = {
                s = 0x55b1e0bc <Address 0x55b1e0bc out of bounds>, len = 1284619624}, blob_val = {s = 0x55b1e0bc <Address 0x55b1e0bc out of bounds>, len = 1284619624}, bitmap_val = 1437720764}}, {type = DB1_STRING, nul = 0, free = 1284619632, val = {
              int_val = -1407297701, ll_val = 140255044720475, double_val = 6.9295199252314397e-310, time_val = 140255044720475, string_val = 0x7f8fac1e575b "out", str_val = {s = 0x7f8fac1e575b "out", len = -1246497552}, blob_val = {
                s = 0x7f8fac1e575b "out", len = -1246497552}, bitmap_val = 2887669595}}, {type = DB1_STR, nul = 0, free = 16777216, val = {int_val = 1817756318, ll_val = 140253974807198, double_val = 6.9294670644920202e-310, time_val = 140253974807198, 
              string_val = 0x7f8f6c58c29e "0bf5ae8fa4b61d101f065fb7a4b916cd-137b\r\nCSeq: 10 KDMQ\r\nCall-ID: 313d580314c50a71-28124@194.213.29.110\r\nContent-Length: 105\r\nUser-Agent: kamailio (bfievklb02)\r\nMax-Forwards: 1\r\nContent-Type: text/plain\r"..., str_val = {
                s = 0x7f8f6c58c29e "0bf5ae8fa4b61d101f065fb7a4b916cd-137b\r\nCSeq: 10 KDMQ\r\nCall-ID: 313d580314c50a71-28124@194.213.29.110\r\nContent-Length: 105\r\nUser-Agent: kamailio (bfievklb02)\r\nMax-Forwards: 1\r\nContent-Type: text/plain\r"..., 
                len = 37}, blob_val = {
                s = 0x7f8f6c58c29e "0bf5ae8fa4b61d101f065fb7a4b916cd-137b\r\nCSeq: 10 KDMQ\r\nCall-ID: 313d580314c50a71-28124@194.213.29.110\r\nContent-Length: 105\r\nUser-Agent: kamailio (bfievklb02)\r\nMax-Forwards: 1\r\nContent-Type: text/plain\r"..., 
                len = 37}, bitmap_val = 1817756318}}, {type = DB1_STR, nul = 0, free = -1246493784, val = {int_val = -1407299985, ll_val = 140255044718191, double_val = 6.9295199251185951e-310, time_val = 140255044718191, string_val = 0x7f8fac1e4e6f "", 
              str_val = {s = 0x7f8fac1e4e6f "", len = 0}, blob_val = {s = 0x7f8fac1e4e6f "", len = 0}, bitmap_val = 2887667311}}, {type = DB1_INT, nul = 0, free = 5628049, val = {int_val = 458952, ll_val = 140724603912392, 
              double_val = 6.9527192317729564e-310, time_val = 140724603912392, string_val = 0x7ffd000700c8 <Address 0x7ffd000700c8 out of bounds>, str_val = {s = 0x7ffd000700c8 <Address 0x7ffd000700c8 out of bounds>, len = -1246887544}, blob_val = {
                s = 0x7ffd000700c8 <Address 0x7ffd000700c8 out of bounds>, len = -1246887544}, bitmap_val = 458952}}, {type = DB1_STR, nul = 0, free = -1246467344, val = {int_val = 0, ll_val = 0, double_val = 0, time_val = 0, string_val = 0x0, str_val = {
                s = 0x0, len = 0}, blob_val = {s = 0x0, len = 0}, bitmap_val = 0}}}
        __FUNCTION__ = "sip_trace_store_db"
#3  0x00007f8fac1d24dd in sip_trace_store (sto=0x7ffd4c91bc10, dst=0x0) at siptrace.c:744
        __FUNCTION__ = "sip_trace_store"
        ret = 5060
#4  0x00007f8fac1dc223 in trace_sl_onreply_out (slcbp=0x7ffd4c91bde0) at siptrace.c:1502
        req = 0x7f8f6c58bad0
        sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}, body = {
            s = 0x7f8fb5af8b58 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 10.6.0.110;branch=z9hG4bK1b7c.8f500ae", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer@10.6.0.109:5060>;tag=4e609057d8b6808cffd08a2f84e8a189.1869\r\nFrom: <sip:not"..., 
            len = 512}, callid = {
            s = 0x7f8f6c58c2dd "313d580314c50a71-28124@194.213.29.110\r\nContent-Length: 105\r\nUser-Agent: kamailio (bfievklb02)\r\nMax-Forwards: 1\r\nContent-Type: text/plain\r\n\r\nsip:10.6.0.109:5060;status=active\r\nsip:10.6.0.111:5060;statu"..., 
            len = 37}, method = {
            s = 0x7f8f6c58c1b8 "KDMQ sip:notification_peer@10.6.0.109:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.6.0.110;branch=z9hG4bK1b7c.8f500ae", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer@10.6.0.109:5060>\r\nFrom: <sip:notificat"..., 
            len = 4}, status = {s = 0x7ffd4c91bbe0 "200", len = 3}, dir = 0x7f8fac1e575b "out", fromtag = {
            s = 0x7f8f6c58c29e "0bf5ae8fa4b61d101f065fb7a4b916cd-137b\r\nCSeq: 10 KDMQ\r\nCall-ID: 313d580314c50a71-28124@194.213.29.110\r\nContent-Length: 105\r\nUser-Agent: kamailio (bfievklb02)\r\nMax-Forwards: 1\r\nContent-Type: text/plain\r"..., 
            len = 37}, fromip = {s = 0x7ffd4c91bd04 "udp:10.6.0.109:5060", len = 19}, totag = {s = 0x0, len = 0}, toip = {s = 0x7ffd4c91bcd0 "udp:10.6.0.110:5060", len = 19}, toip_buff = "udp:10.6.0.110:5060", '\000' <repeats 32 times>, 
          fromip_buff = "udp:10.6.0.109:5060", '\000' <repeats 32 times>, tv = {tv_sec = 1437720764, tv_usec = 458952}, stat = 0x48}
        msg = 0x7f8f6c58bad0
        to_ip = {af = 2, len = 4, u = {addrl = {1845495306, 0}, addr32 = {1845495306, 0, 0, 0}, addr16 = {1546, 28160, 0, 0, 0, 0, 0, 0}, addr = "\n\006\000n", '\000' <repeats 11 times>}}
        len = 4
        statusbuf = "200\000"
        __FUNCTION__ = "trace_sl_onreply_out"
---Type <return> to continue, or q <return> to quit--- 
#5  0x00007f8fb0d52735 in sl_run_callbacks (type=1, req=0x7f8f6c58bad0, code=200, reason=0x7f8fb5afcdb8 "OK", reply=0x7ffd4c91c6f0, dst=0x7ffd4c91c6b0) at sl_funcs.c:493
        param = {type = 1, req = 0x7f8f6c58bad0, code = 200, reason = 0x7f8fb0f59d70, reply = 0x7ffd4c91c6f0, dst = 0x7ffd4c91c6b0, cbp = 0x0}
        p1 = 0x7f8fb5b5f790
        sreason = {s = 0x7f8fb5afcdb8 "OK", len = 2}
        __FUNCTION__ = "sl_run_callbacks"
#6  0x00007f8fb0d4f835 in sl_reply_helper (msg=0x7f8f6c58bad0, code=200, reason=0x7f8fb5afcdb8 "OK", tag=0x0) at sl_funcs.c:183
        buf = {s = 0x7f8fb5af8b58 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 10.6.0.110;branch=z9hG4bK1b7c.8f500ae", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer@10.6.0.109:5060>;tag=4e609057d8b6808cffd08a2f84e8a189.1869\r\nFrom: <sip:not"..., 
          len = 512}
        dset = {s = 0x0, len = 0}
        dst = {send_sock = 0x0, to = {s = {sa_family = 2, sa_data = "\023\304\n\006\000n\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1845495306}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1845495306, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, 
          proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        dummy_bm = {to_tag_val = {
            s = 0x7f8fb5af8beb "4e609057d8b6808cffd08a2f84e8a189.1869\r\nFrom: <sip:notification_peer@10.6.0.110:5060>;tag=0bf5ae8fa4b61d101f065fb7a4b916cd-137b\r\nCSeq: 10 KDMQ\r\nCall-ID: 313d580314c50a71-28124@194.213.29.110\r\nContent-T"..., 
            len = 37}}
        backup_mhomed = 32655
        ret = -1247391384
        text = {s = 0x7f8fb5afcdb8 "OK", len = 2}
        backup_rt = 32655
        ctx = {rec_lev = 805528, run_flags = 0, last_retcode = 986384, jmp_env = {{__jmpbuf = {1034432, 8, 147, 6425939, 140725888075280, 140255204626448, 140725888075360, 140255109154522}, __mask_was_saved = 0, __saved_mask = {__val = {0, 67108864, 
                  66122472, 805536, 986392, 1034432, 8, 146, 140255204626448, 692774356672, 140255205248384, 140725888075408, 4714192, 0, 24522412048, 0}}}}}
        pmsg = {id = 3048271520, pid = 32655, tval = {tv_sec = 140725888073488, tv_usec = 140255133555952}, fwd_send_flags = {f = 0 '\000', blst_imask = 192 '\300'}, rpl_send_flags = {f = 145 '\221', blst_imask = 76 'L'}, first_line = {type = -9002, 
            flags = -20155, len = 32655, u = {request = {method = {s = 0x7ffd4c91c070 "0", len = 66}, uri = {s = 0x0, len = -1318462224}, version = {s = 0x7f8fb9ad5752 "H9\\$8t\bH\213T$(\306\002", len = -72515583}, method_value = -1318462224}, reply = {
                version = {s = 0x7ffd4c91c070 "0", len = 66}, status = {s = 0x0, len = -1318462224}, reason = {s = 0x7f8fb9ad5752 "H9\\$8t\bH\213T$(\306\002", len = -72515583}, statuscode = 2976505072}}}, via1 = 0x7f8fb169dcf0, via2 = 0x7f8fb169dcf0, 
          headers = 0x7f8fb169dcf0, last_header = 0x7f8fb169dd04, parsed_flag = 140255133556018, h_via1 = 0x7f8fb169dcf0, h_via2 = 0x7f8fb169dd32, callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0, contact = 0x0, maxforwards = 0xb5b0f640, 
          route = 0x7f8fb5b0efe8, record_route = 0x7f8fb1160000, content_type = 0x0, content_length = 0x0, authorization = 0x541b92, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require = 0x7ffd4c91d5c0, proxy_require = 0x7f8fffffffff, 
          unsupported = 0x7f8fb5b0f640, allow = 0x1, event = 0x7f8fb9df3440, accept = 0x0, accept_language = 0x7f8fb1166540, organization = 0x415d80, priority = 0x7ffd4c91d5c0, subject = 0x7ffd4c91c0f0, user_agent = 0x1, server = 0x7f8f6c575120, 
          content_disposition = 0x7f8fb9b12ca6, diversion = 0x7f8fb9df67c0, rpid = 0x7ffd4c91c050, refer_to = 0x7f8fb5b4abc0, session_expires = 0x7ffd4c91c1d0, min_se = 0xe, sipifmatch = 0x7ffd4c91d5c0, subscription_state = 0x0, date = 0x7f8fb9ab5223, 
          identity = 0x3000000030, identity_info = 0x7ffd4c91c158, pai = 0x7ffd4c91c090, ppi = 0x100000000, path = 0x3536656531623535, privacy = 0x4eabcc, body = 0x124c3d0, eoh = 0x2d <Address 0x2d out of bounds>, 
          unparsed = 0xe65 <Address 0xe65 out of bounds>, rcv = {src_ip = {af = 14, len = 0, u = {addrl = {206158430232, 140725888074784}, addr32 = {24, 48, 1284621344, 32765}, addr16 = {24, 0, 48, 0, 50208, 19601, 32765, 0}, 
                addr = "\030\000\000\000\060\000\000\000 Ä‘L\375\177\000"}}, dst_ip = {af = 1284621152, len = 32765, u = {addrl = {7212608812, 140255135864082}, addr32 = {2917641516, 1, 2978813202, 32655}, addr16 = {44332, 44519, 1, 0, 5394, 45453, 
                  32655, 0}, addr = ",\255\347\255\001\000\000\000\022\025\215\261\217\177\000"}}, src_port = 0, dst_port = 0, proto_reserved1 = -128, proto_reserved2 = 19, src_su = {s = {sa_family = 20, 
                sa_data = "\000\000\224\016\000\000\006\000\000\000\224\016\000"}, sin = {sin_family = 20, sin_port = 0, sin_addr = {s_addr = 3732}, sin_zero = "\006\000\000\000\224\016\000"}, sin6 = {sin6_family = 20, sin6_port = 0, 
                sin6_flowinfo = 3732, sin6_addr = {__in6_u = {__u6_addr8 = "\006\000\000\000\224\016\000\000\335\017\206x\216\342=&", __u6_addr16 = {6, 0, 3732, 0, 4061, 30854, 57998, 9789}, __u6_addr32 = {6, 3732, 2022051805, 641589902}}}, 
                sin6_scope_id = 0}}, bind_address = 0x2b5b52fd0, proto = -32 '\340'}, buf = 0x7ffd4c91d5c0 "\030", len = 3048550352, new_uri = {s = 0x415d80 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = -1246450752}, dst_uri = {
            s = 0x7ffd4c91c1d0 "\305\316\025\260\217\177", len = -1321633373}, parsed_uri_ok = -1246450752, parsed_uri = {user = {s = 0x7f8fb18c8d8d "\211E\350\203}", <incomplete sequence \350>, len = 19186640}, passwd = {s = 0x0, len = 1284620784}, 
            host = {s = 0x7f8fb5a891a0 "8\221\250\265\217\177", len = 2064}, port = {s = 0x734230 "core", len = -1246416944}, params = {s = 0x7ffd4c91c1e0 "\001\200\255\373\001", len = -1340748091}, sip_params = {s = 0x7ffd4c91c2d0 "\300gß¹\217\177", 
              len = -1335363190}, headers = {s = 0x7ffd4c91c340 "0", len = 26}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 2954219205, transport = {s = 0x7f8fb9ad5752 "H9\\$8t\bH\213T$(\306\002", len = -72515583}, ttl = {
              s = 0x7f8fb015cec5 "55b1e0bb-e65-", len = -1340748091}, user_param = {s = 0x7f8fb015cec5 "55b1e0bb-e65-", len = -1340748091}, maddr = {s = 0x7f8fb015ced2 "", len = -1340748065}, method = {s = 0x7f8fb015cec5 "55b1e0bb-e65-", 
              len = -1340748065}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 1284620976}, transport_val = {s = 0x7f8fb1177344 "\203\370\002\017\216\303\002", len = 19136512}, ttl_val = {s = 0x0, len = 19186640}, 
            user_param_val = {s = 0x7f8fb5a899e0 "\200\231\250\265\217\177", len = -1170032976}, maddr_val = {s = 0x0, len = -1246416944}, method_val = {s = 0x300415d80 <Address 0x300415d80 out of bounds>, len = -1}, lr_val = {
              s = 0x415d80 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 1284621104}, r2_val = {s = 0x7f8fb9df3440 "", len = 0}, gr_val = {s = 0x7f8fb9b12ca6 "H\213\003\360\377H(\017\224\302\204\322t\037\213P,\205\322t\030\272\001", 
              len = -1176541248}}, parsed_orig_ruri_ok = 1284621040, parsed_orig_ruri = {user = {s = 0x14c91c2f0 <Address 0x14c91c2f0 out of bounds>, len = 1817661728}, passwd = {s = 0x7ffd4c91c330 "", len = 5148155}, host = {
              s = 0x44c91c570 <Address 0x44c91c570 out of bounds>, len = -1180056734}, port = {s = 0x2d <Address 0x2d out of bounds>, len = 1284621520}, params = {s = 0x2d <Address 0x2d out of bounds>, len = 3685}, sip_params = {s = 0x0, 
              len = -1179954653}, headers = {s = 0x3000000030 <Address 0x3000000030 out of bounds>, len = 1284621352}, port_no = 50016, proto = 19601, type = 32765, flags = 1284622384, transport = {s = 0x7ffd4c91c830 "\262k\324\260\217\177", 
              len = 6425939}, ttl = {s = 0x7ffd4c91c3a0 "", len = -1247391728}, user_param = {s = 0x7ffd4c91c3f0 " Ä‘L\375\177", len = -1342863654}, maddr = {s = 0x1500000014 <Address 0x1500000014 out of bounds>, len = 0}, method = {
              s = 0x4000000 <Address 0x4000000 out of bounds>, len = 66123376}, lr = {s = 0xc4750 <Address 0xc4750 out of bounds>, len = 985488}, r2 = {s = 0x7f8fb5b0d420 "#ͯ\265\217\177", len = -1246416304}, gr = {s = 0x92 <Address 0x92 out of bounds>, 
              len = 6425939}, transport_val = {s = 0x7ffd4c91c450 "\340Ä‘L\375\177", len = 6647848}, ttl_val = {s = 0x7ffd4c91c420 "\b\324\260\265\217\177", len = 4714192}, user_param_val = {s = 0x0, len = -1247391728}, maddr_val = {
              s = 0x7f8fb5b0d408 "", len = 1284621840}, method_val = {s = 0x7f8fb5b0d408 "", len = -1246416304}, lr_val = {s = 0xfc8c0 <Address 0xfc8c0 out of bounds>, len = 4532986}, r2_val = {s = 0x0, len = -1246416304}, gr_val = {
              s = 0x7ffd4c91c4e0 "\020Å‘L\375\177", len = 6649357}}, add_rm = 0x7ffd4c91c490, body_lumps = 0x47eed0, reply_lump = 0x0, 
          add_to_branch_s = "\220Å‘L\375\177", '\000' <repeats 18 times>, "\b\324\260\265\217\177", '\000' <repeats 18 times>, "S\rb\000\000\000\000\000\340", <incomplete sequence \304>, add_to_branch_len = 32765, hash_index = 3047575568, 
          msg_flags = 32655, flags = 1284621616, set_global_address = {s = 0x7f8faff586da "H\213\025\207H ", len = -1361228918}, set_global_port = {s = 0x620d53 "H\213E\370H\213P\bH\213E\360H\211\020H\213E\360H\307@(\b", len = 1284621584}, 
          force_send_socket = 0x7f8fb5a65010, path_vec = {s = 0x7ffd4c91c560 "\220Å‘L\375\177", len = -1342863654}, instance = {s = 0xfc8c0 <Address 0xfc8c0 out of bounds>, len = 0}, reg_id = 67108864, ruid = {
            s = 0x3f0f6e0 <Address 0x3f0f6e0 out of bounds>, len = 804576}, location_ua = {s = 0xf0920 <Address 0xf0920 out of bounds>, len = 1034432}, ldv = {flow = {decoded = 8, rcv = {src_ip = {af = 148, len = 0, u = {addrl = {140255204626888, 
                      33112968456}, addr32 = {3047576008, 32655, 3048197384, 7}, addr16 = {20936, 46502, 32655, 0, 52488, 46511, 7, 0}, addr = "\310Q\246\265\217\177\000\000\bͯ\265\a\000\000"}}, dst_ip = {af = 3048550904, len = 32655, u = {addrl = {
                      140725888075152, 6425939}, addr32 = {1284621712, 32765, 6425939, 0}, addr16 = {50576, 19601, 32765, 0, 3411, 98, 0, 0}, addr = "\220Å‘L\375\177\000\000S\rb\000\000\000\000"}}, src_port = 50592, dst_port = 19601, 
                proto_reserved1 = 32765, proto_reserved2 = -1247391728, src_su = {s = {sa_family = 32655, sa_data = "\000\000\360Å‘L\375\177\000\000Ú†", <incomplete sequence \365\257>}, sin = {sin_family = 32655, sin_port = 0, sin_addr = {
                      s_addr = 1284621808}, sin_zero = "\375\177\000\000Ú†", <incomplete sequence \365\257>}, sin6 = {sin6_family = 32655, sin6_port = 0, sin6_flowinfo = 1284621808, sin6_addr = {__in6_u = {
                        __u6_addr8 = "\375\177\000\000Ú†\365\257\217\177\000\000`Æ‘L", __u6_addr16 = {32765, 0, 34522, 45045, 32655, 0, 50784, 19601}, __u6_addr32 = {32765, 2952103642, 32655, 1284621920}}}, sin6_scope_id = 32765}}, bind_address = 0x0, 
                proto = 0 '\000'}}}}
        __FUNCTION__ = "sl_reply_helper"
#7  0x00007f8fb0d505d2 in sl_send_reply (msg=0x7f8f6c58bad0, code=200, reason=0x7f8fb5afcdb8 "OK") at sl_funcs.c:303
No locals.
#8  0x00007f8fb0d477c5 in send_reply (msg=0x7f8f6c58bad0, code=200, reason=0x7ffd4c91c8a8) at sl.c:281
        r = 0x7f8fb5afcdb8 "OK"
        t = 0xffffffffffffffff
        ret = 1
        __FUNCTION__ = "send_reply"
#9  0x00007f8faebc8aab in worker_loop (id=2) at worker.c:119
---Type <return> to continue, or q <return> to quit---
        worker = 0x7f8f6c241620
        current_job = 0x7f8f6c58cb88
        peer_response = {resp_code = 200, content_type = {s = 0x7f8faebd000e "text/plain", len = 10}, reason = {s = 0x7f8faebcf5c0 "OK", len = 2}, body = {
            s = 0x7f8fb5b0b338 "sip:10.6.0.111:5060;status=active\r\nsip:10.6.0.110:5060;status=active\r\nsip:10.6.0.109:5060;status=active\r\n\001", len = 105}}
        ret_value = 0
        not_parsed = 0
        dmq_node = 0x7f8f6c579fc0
        __FUNCTION__ = "worker_loop"
#10 0x00007f8faebad32c in child_init (rank=0) at dmq.c:293
        i = 2
        newpid = 0
        __FUNCTION__ = "child_init"
#11 0x0000000000594031 in init_mod_child (m=0x7f8fb5a962a0, rank=0) at sr_module.c:898
        __FUNCTION__ = "init_mod_child"
#12 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a966b8, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#13 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a97098, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#14 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a97608, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#15 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a97a28, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#16 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a97da0, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#17 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a981c0, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#18 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a98730, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#19 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a98b88, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#20 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a99150, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#21 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a99458, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#22 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a9a9d0, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#23 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a9aed0, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#24 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a9b210, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#25 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a9b4b0, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#26 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a9b6d8, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#27 0x0000000000593d6c in init_mod_child (m=0x7f8fb5a9be68, rank=0) at sr_module.c:895
        __FUNCTION__ = "init_mod_child"
#28 0x000000000059433b in init_child (rank=0) at sr_module.c:924
No locals.
#29 0x00000000004a8880 in main_loop () at main.c:1650
        i = 1
        pid = 3731
        si = 0x0
        si_desc = "udp receiver child=0 sock=10.6.0.109:5060\000\060\066\060\000\000\000\000Ó‘L\375\177\000\000\373\215N\000\000\000\000\000\020\b\000\000\375\177\000\000\260\264\373k\217\177\000\000\260Ó‘L\375\177\000\000\260\264\373k\217\177\000\000\200]A\000\000\000\000\000\300Õ‘L\001\000\000\000PÓ‘L\375\177\000\000\236\216N\000\000\000\000"
        nrprocs = 1
        __FUNCTION__ = "main_loop"
#30 0x00000000004ae2d2 in main (argc=24, argv=0x7ffd4c91d5c8) at main.c:2533
        cfg_stream = 0x11d5010
        c = -1
        r = 0
        tmp = 0x7ffd4c91eaaa "10.6.0.109:5060"
        tmp_len = 10
        port = 5060
        proto = 1
        options = 0x704fa8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
        ret = -1
        seed = 3023293173
        rfd = 4
        debug_save = 0
---Type <return> to continue, or q <return> to quit---
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7f8fb5b4abc0
        p = 0x0
        __FUNCTION__ = "main"

miconda added a commit that referenced this issue Jul 24, 2015
miconda added a commit that referenced this issue Jul 24, 2015
- reported in GH #262

(cherry picked from commit 740cfa0)
@miconda
Copy link
Member

miconda commented Jul 24, 2015

I pushed a patch to fix it in master and 4.3 branches. Reopen if the issue is still there.

@miconda miconda closed this as completed Jul 24, 2015
miconda added a commit that referenced this issue Jul 29, 2015
- reported in GH #262

(cherry picked from commit 740cfa0)
(cherry picked from commit ba7b0ea)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants