[asterisk-bugs] [JIRA] (ASTERISK-26706) Segfault in dial_target_free stasis_channels.c:1349
Ross Beer (JIRA)
noreply at issues.asterisk.org
Fri Jan 20 08:58:10 CST 2017
[ https://issues.asterisk.org/jira/browse/ASTERISK-26706?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Ross Beer updated ASTERISK-26706:
---------------------------------
Status: Waiting for Feedback (was: Waiting for Feedback)
Another Segfault, this looks to be memory related
{noformat}
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x000000000059aa0d in ast_rtp_codecs_payload_code (codecs=0x7ffb65757328, asterisk_format=1, format=0x1bc9858, code=0) at rtp_engine.c:944
944 if ((asterisk_format && format && ast_format_cmp(format, type->format) == AST_FORMAT_CMP_EQUAL)
[Current thread is 1 (Thread 0x7ffb0a179700 (LWP 13044))]
#0 0x000000000059aa0d in ast_rtp_codecs_payload_code (codecs=0x7ffb65757328, asterisk_format=1, format=0x1bc9858, code=0) at rtp_engine.c:944
type = 0x6f6e003930
i = 0
payload = -1
__PRETTY_FUNCTION__ = "ast_rtp_codecs_payload_code"
#1 0x00007ffb1bb76567 in ast_rtp_read (hdrlen=12, len=172, rtpheader=0x7ffba8b50220, instance=0x7ffba8899800) at res_rtp_asterisk.c:4388
rtp = <optimized out>
bridged = 0x7ffbb4310520
res = 0
payload = 8
mark = 0
reconstruct = <optimized out>
ice = 0
bridged_payload = 0
instance1 = <optimized out>
payload_type = 0x7ffb50a7a518
remote_address = {ss = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}, len = 0}
rtp = 0x7ffba8b50150
addr = {ss = {ss_family = 10, __ss_padding = "\267\234", '\000' <repeats 14 times>, "\377\377%\235\066\314\000\000\000\000\000\000\000\000\000[\234\000\000\000\000\000\300\017\257\001\000\000\000\000H\222k\000\000\000\000\000๚\250\373\177\000\000\060I\027\n\373\177\000\000}\355S\000\000\000\000\000\020\245'\250\373\177\000\000\000\017\257\001\000\000\000\000\205 at p\000\000\000\000\000`Dp\000\000\000\000\000\205 at p\000\204\003\000", __ss_align = 7355339}, len = 28}
res = <optimized out>
hdrlen = 12
version = 2
payloadtype = <optimized out>
padding = <optimized out>
mark = <optimized out>
ext = <optimized out>
cc = <optimized out>
prev_seqno = <optimized out>
rtpheader = 0x7ffba8b50220
seqno = <optimized out>
payload = 0x0
remote_address = {ss = {ss_family = 2, __ss_padding = "\267\234%\235\066\314", '\000' <repeats 111 times>, __ss_align = 0}, len = 16}
frames = <optimized out>
__PRETTY_FUNCTION__ = "ast_rtp_read"
#2 0x00007ffb1bb76567 in ast_rtp_read (instance=0x7ffba8899800, rtcp=<optimized out>) at res_rtp_asterisk.c:4605
rtp = 0x7ffba8b50150
addr = {ss = {ss_family = 10, __ss_padding = "\267\234", '\000' <repeats 14 times>, "\377\377%\235\066\314\000\000\000\000\000\000\000\000\000[\234\000\000\000\000\000\300\017\257\001\000\000\000\000H\222k\000\000\000\000\000๚\250\373\177\000\000\060I\027\n\373\177\000\000}\355S\000\000\000\000\000\020\245'\250\373\177\000\000\000\017\257\001\000\000\000\000\205 at p\000\000\000\000\000`Dp\000\000\000\000\000\205 at p\000\204\003\000", __ss_align = 7355339}, len = 28}
res = <optimized out>
hdrlen = 12
version = 2
payloadtype = <optimized out>
padding = <optimized out>
mark = <optimized out>
ext = <optimized out>
cc = <optimized out>
prev_seqno = <optimized out>
rtpheader = 0x7ffba8b50220
seqno = <optimized out>
payload = 0x0
remote_address = {ss = {ss_family = 2, __ss_padding = "\267\234%\235\066\314", '\000' <repeats 111 times>, __ss_align = 0}, len = 16}
frames = <optimized out>
__PRETTY_FUNCTION__ = "ast_rtp_read"
#3 0x00000000005990b7 in ast_rtp_instance_read (instance=0x7ffba8899800, rtcp=0) at rtp_engine.c:495
#4 0x00007ffb190c6b4f in chan_pjsip_read (ast=0x7ffba89ab9e0) at chan_pjsip.c:718
channel = 0x7ffba827a510
session = 0x7ffba827a510
pvt = <optimized out>
f = <optimized out>
media = 0x7ffba8953d30
rtcp = <optimized out>
fdno = <optimized out>
__PRETTY_FUNCTION__ = "chan_pjsip_read"
#5 0x00000000004b8ace in __ast_read (chan=0x7ffba89ab9e0, dropaudio=0) at channel.c:3964
f = 0x0
prestate = 6
cause = 0
__PRETTY_FUNCTION__ = "__ast_read"
#6 0x00000000004ba612 in ast_read (chan=0x7ffba89ab9e0) at channel.c:4389
#7 0x0000000000487151 in bridge_handle_trip (bridge_channel=0x7ffb5829c4d0) at bridge_channel.c:2416
frame = 0x7ffb5829c4d0
#8 0x00000000004875fc in bridge_channel_wait (bridge_channel=0x7ffb5829c4d0) at bridge_channel.c:2586
ms = -1
outfd = -99999
chan = 0x7ffba89ab9e0
__PRETTY_FUNCTION__ = "bridge_channel_wait"
#9 0x0000000000487ce7 in bridge_channel_internal_join (bridge_channel=0x7ffb5829c4d0) at bridge_channel.c:2732
res = 0
channel_features = 0x0
swap = 0x0
__PRETTY_FUNCTION__ = "bridge_channel_internal_join"
#10 0x000000000046e5c7 in ast_bridge_join (bridge=0x7ffb58281950, chan=0x7ffba89ab9e0, swap=0x0, features=0x7ffb0a174fc0, tech_args=0x0, flags=(AST_BRIDGE_JOIN_PASS_REFERENCE | AST_BRIDGE_JOIN_INHIBIT_JOIN_COLP)) at bridge.c:1712
bridge_channel = 0x7ffb5829c4d0
res = 0
__PRETTY_FUNCTION__ = "ast_bridge_join"
#11 0x000000000050fc7f in ast_bridge_call_with_flags (chan=0x7ffba89ab9e0, peer=0x7ffb58470f50, config=0x7ffb0a176000, flags=0) at features.c:672
res = 0
bridge = 0x7ffb58281950
chan_features = {dtmf_hooks = 0x7ffb58173850, other_hooks = 0x7ffb5835f2c0, interval_hooks = 0x7ffb582d0f40, feature_flags = {flags = 0}, interval_sequence = 0, usable = 0, mute = 0, dtmf_passthrough = 1}
peer_features = 0x7ffb58230630
__PRETTY_FUNCTION__ = "ast_bridge_call_with_flags"
#12 0x000000000050fd51 in ast_bridge_call (chan=0x7ffba89ab9e0, peer=0x7ffb58470f50, config=0x7ffb0a176000) at features.c:711
#13 0x00007ffb31aa07d8 in dial_exec_full (chan=0x7ffba89ab9e0, data=0x7ffb0a176540 "<<< PRIVATE INFORMATION REMOVED >>>", peerflags=0x7ffb0a176400, continue_exec=0x0) at app_dial.c:3201
number = 0x7ffb0a175040 "<<< PRIVATE INFORMATION REMOVED >>>"
dial_end_raised = 1
cause = -1
res = 0
rest = 0x0
cur = 0x0
out_chans = {first = 0x0, last = 0x0}
outgoing = 0x7ffb58423230
tmp = 0x0
peer = 0x7ffb58470f50
to = -1
num = {chan = 0x7ffba89ab9e0, busy = 0, congestion = 0, nochan = 0}
cause = 0
config = {features_caller = {flags = 0}, features_callee = {flags = 0}, start_time = {tv_sec = 0, tv_usec = 0}, nexteventts = {tv_sec = 0, tv_usec = 0}, feature_start_time = {tv_sec = 0, tv_usec = 0}, feature_timer = 0, timelimit = 0, play_warning = 0, warning_freq = 0, warning_sound = 0x0, end_sound = 0x0, start_sound = 0x0, flags = 0, end_bridge_callback = 0x7ffb31a9b0b0 <end_bridge_callback>, end_bridge_callback_data = 0x7ffba89ab9e0, end_bridge_callback_data_fixup = 0x7ffb31a9b1c5 <end_bridge_callback_data_fixup>}
calldurationlimit = {tv_sec = 0, tv_usec = 0}
dtmfcalled = 0x0
dtmfcalling = 0x0
dtmf_progress = 0x0
pa = {sentringing = 1, privdb_val = 0, privcid = '\000' <repeats 255 times>, privintro = '\000' <repeats 1023 times>, status = "ANSWER\000R\000GS", '\000' <repeats 244 times>}
sentringing = 0
moh = 0
outbound_group = 0x0
result = 0
parse = 0x7ffb0a1750a0 "PJSIP"
opermode = 0
delprivintro = 0
args = {argc = 3, argv = 0x7ffb0a1759b8, peers = 0x7ffb0a1750a0 "PJSIP", timeout = 0x7ffb0a1750b0 "", options = 0x7ffb0a1750b1 "b(vh-add-distinctivering-headers,1,1", url = 0x0}
opts = {flags = 2199023255552}
opt_args = {0x20 <error: Cannot access memory at address 0x20>, 0x7ffbc9331008 <vfprintf+1912> "H\213\225p\373\377\377H\213\215@\373\377\377H\211\326H)\316H9\360uJD\213\215\070\373\377\377\271\377\377\377\177D)\311Hc\311H9\310\177>A\001\301\200:", 0x701e10 <__PRETTY_FUNCTION__.15349> "ast_channel_snapshot_create", 0x7015eb "stasis_channels.c", 0xfd0 <error: Cannot access memory at address 0xfd0>, 0x7ffbc9331008 <vfprintf+1912> "H\213\225p\373\377\377H\213\215@\373\377\377H\211\326H)\316H9\360uJD\213\215\070\373\377\377\271\377\377\377\177D)\311Hc\311H9\310\177>A\001\301\200:", 0x0, 0x7ffbc9331008 <vfprintf+1912> "H\213\225p\373\377\377H\213\215@\373\377\377H\211\326H)\316H9\360uJD\213\215\070\373\377\377\271\377\377\377\177D)\311Hc\311H9\310\177>A\001\301\200:", 0x0, 0x7ffb0a175a08 "", 0x7ffb0a175a00 "", 0x7ffb0a175a18 "", 0x7ffb0a175a10 "", 0x7ffb00000000 <error: Cannot access memory at address 0x7ffb00000000>, 0x1ed100000000 <error: Cannot access memory at address 0x1ed100000000>, 0x7ffb0a175a20 "", 0x7ffb00000000 <error: Cannot access memory at address 0x7ffb00000000>, 0x7ffb0a1750b3 "<<< PRIVATE INFORMATION REMOVED >>>,1,1", 0x7ffb00000000 <error: Cannot access memory at address 0x7ffb00000000>, 0x7ffb00000020 <error: Cannot access memory at address 0x7ffb00000020>}
fulldial = 0
num_dialed = 1
ignore_cc = 1
device_name = "PJSIP/<<< PRIVATE INFORMATION REMOVED >>> \000\060\060\060\066\060def\000\214^\000\000\000\000\000\220\225^X\373\177\000\000\030\061p\000\000\000\000\000\000[\234\000B\000\000\000P0p\000\000\000\000\000\320\017\000\000\000\000\000\000\001\000\000\000\000\000\000"
forced_clid_name = "IDn\000\000\000\000\000\060\000\000\000\060\000\000\000\220b\027\n\373\177\000\000\060\000\000\000\060\000\000\000\240b\027\n\373\177\000\000\060\000\000\000\060\000\000\000\260b\027\n\373\177\000\000\360a\027\n\373\177\000\000\300b\027\n\373\177\000\000\000b\027\n\373\177\000"
stored_clid_name = "\000\000\000\000\000\000\000\000\260\000\000\000\001\000\000\000IDn\000\000\000\000\000\000\000\000\000\001\000\000\000\260X\027\n\373\177\000\000\000\000\000\000\000\000\000\000\377\377\377\377\377\377\377\377\000\000\000\000&\000\000\000IDn", '\000' <repeats 12 times>
force_forwards_only = 0
forced_clid = {name = {str = 0x0, char_set = 1, presentation = 0, valid = 0 '\000'}, number = {str = 0x0, plan = 0, presentation = 1, valid = 0 '\000'}, subaddress = {str = 0x0, type = 0, odd_even_indicator = 0 '\000', valid = 0 '\000'}, tag = 0x0}
stored_clid = {name = {str = 0x0, char_set = 1, presentation = 0, valid = 0 '\000'}, number = {str = 0x7ffb0a175080 "<<< PRIVATE INFORMATION REMOVED >>>", plan = 0, presentation = 0, valid = 1 '\001'}, subaddress = {str = 0x0, type = 0, odd_even_indicator = 0 '\000', valid = 0 '\000'}, tag = 0x0}
caller = {id = {name = {str = 0x0, char_set = 1, presentation = 0, valid = 1 '\001'}, number = {str = 0x0, plan = 0, presentation = 0, valid = 1 '\001'}, subaddress = {str = 0x0, type = 0, odd_even_indicator = 0 '\000', valid = 0 '\000'}, tag = 0x0}, ani = {name = {str = 0x0, char_set = 1, presentation = 0, valid = 1 '\001'}, number = {str = 0x0, plan = 0, presentation = 0, valid = 1 '\001'}, subaddress = {str = 0x0, type = 0, odd_even_indicator = 0 '\000', valid = 0 '\000'}, tag = 0x0}, priv = {name = {str = 0x0, char_set = 1, presentation = 0, valid = 0 '\000'}, number = {str = 0x0, plan = 0, presentation = 0, valid = 0 '\000'}, subaddress = {str = 0x0, type = 0, odd_even_indicator = 0 '\000', valid = 0 '\000'}, tag = 0x0}, ani2 = 0}
max_forwards = 20
__PRETTY_FUNCTION__ = "dial_exec_full"
#14 0x00007ffb31aa0b69 in dial_exec (chan=0x7ffba89ab9e0, data=0x7ffb0a176540 "PJSIP/<<< PRIVATE INFORMATION REMOVED >>>,,b(<<< PRIVATE INFORMATION REMOVED >>>^1^1)") at app_dial.c:3257
peerflags = {flags = 0}
#15 0x0000000000589ca2 in pbx_exec (c=0x7ffba89ab9e0, app=0x330e980, data=0x7ffb0a176540 "PJSIP/<<< PRIVATE INFORMATION REMOVED >>>,,b(<<< PRIVATE INFORMATION REMOVED >>>^1^1)") at pbx_app.c:485
res = 0
u = 0x7ffb584cc770
saved_c_appl = 0x0
saved_c_data = 0x0
__PRETTY_FUNCTION__ = "pbx_exec"
#16 0x00000000005776d7 in pbx_extension_helper (c=0x7ffba89ab9e0, con=0x0, context=0x7ffba89ac398 "<<< PRIVATE INFORMATION REMOVED >>>", exten=0x7ffba89ac3e8 "<<< PRIVATE INFORMATION REMOVED >>>", priority=18, label=0x0, callerid=0x7ffb584ca750 "01614166101", action=E_SPAWN, found=0x7ffb0a178be4, combined_find_spawn=1) at pbx.c:2884
e = 0x7ffb9c43b3a0
app = 0x330e980
substitute = 0x7ffb0a1764a0 "<<< PRIVATE INFORMATION REMOVED >>>,,b(<<< PRIVATE INFORMATION REMOVED >>>^1^1)"
res = 32763
q = {incstack = {0x0 <repeats 128 times>}, stacklen = 0, status = 5, swo = 0x0, data = 0x0, foundcontext = 0x7ffba89ac398 "<<< PRIVATE INFORMATION REMOVED >>>"}
passdata = "PJSIP/<<< PRIVATE INFORMATION REMOVED >>>,,<<< PRIVATE INFORMATION REMOVED >>>...
matching_action = 0
__PRETTY_FUNCTION__ = "pbx_extension_helper"
#17 0x000000000057ab9e in ast_spawn_extension (c=0x7ffba89ab9e0, context=0x7ffba89ac398 "<<< PRIVATE INFORMATION REMOVED >>>", exten=0x7ffba89ac3e8 "<<< PRIVATE INFORMATION REMOVED >>>", priority=18, callerid=0x7ffb584ca750 "01614166101", found=0x7ffb0a178be4, combined_find_spawn=1) at pbx.c:4110
#18 0x000000000057b807 in __ast_pbx_run (c=0x7ffba89ab9e0, args=0x0) at pbx.c:4285
digit = 0
invalid = 0
timeout = 0
dst_exten = "\000\213\027\n\373\177\000\000\371\342E\000\000\000\000\000\260 \312P\373\177\000\000]Vp\000\000\000\000\000\210$\257\001\236\003\000\000X[p\000\000\000\000\000`Vp\000\000\000\000\000\000\017\257\001\000\000\000\000\260\257eP\373\177\000\000\240$\257\001\000\000\000\000@[p\000\000\000\000\000\260\016\257\001\000\000\000\000\350\016\257\001\000\000\000\000\062\344^\000\000\000\000\000 \213\027\n\373\177\000\000[v_\000\000\000\000\000X\213\027\n\373\177\000\000p\312\023\004\000\000\000\000p\213\027\n\373\177\000\000p\312\023\004\000\000\000\000P\213\027\n\373\177\000\000\260\016t\254\373\177\000\000\031\202_\000\000\000\000\000}\355S\000\000\000\000\000p\213\027\n\373\177\000\000"...
pos = 0
found = 1
res = 0
autoloopflag = 0
error = 0
pbx = 0x7ffb584059d0
callid = 0x0
__PRETTY_FUNCTION__ = "__ast_pbx_run"
#19 0x000000000057cf33 in pbx_thread (data=0x7ffba89ab9e0) at pbx.c:4605
c = 0x7ffba89ab9e0
#20 0x0000000000603e35 in dummy_start (data=0x7ffba8abf170) at utils.c:1235
__cancel_buf = {__cancel_jmp_buf = {{__cancel_jmp_buf = {0, 3535623191221426431, 140716329183503, 140716182836992, 507904, 507904, 3535623191246592255, -3537829981782353665}, __mask_was_saved = 0}}, __pad = {0x7ffb0a178df0, 0x0, 0x1, 0x7ffbca2bd6e8 <__pthread_keys+1032>}}
__cancel_routine = 0x4527df <ast_unregister_thread>
__cancel_arg = 0x7ffb0a179700
__not_first_call = 0
ret = 0x7ffbc969c8d8
a = {start_routine = 0x57cf0e <pbx_thread>, data = 0x7ffba89ab9e0, name = 0x7ffba874b4a0 "pbx_thread", ' ' <repeats 11 times>, "started at [ 4631] pbx.c ast_pbx_start()"}
#21 0x00007ffbca0ab61a in start_thread () at /lib64/libpthread.so.0
#22 0x00007ffbc93e75fd in clone () at /lib64/libc.so.6
{noformat}
> Segfault in dial_target_free stasis_channels.c:1349
> ---------------------------------------------------
>
> Key: ASTERISK-26706
> URL: https://issues.asterisk.org/jira/browse/ASTERISK-26706
> Project: Asterisk
> Issue Type: Bug
> Security Level: None
> Components: Core/Stasis
> Affects Versions: 14.2.1
> Environment: Fedora 23
> Reporter: Ross Beer
> Assignee: Ross Beer
> Attachments: backtrace_20160109_clean.txt
>
>
> Segfault dial_target_free (doomed=0x7efd5c007c10) at stasis_channels.c:1349
--
This message was sent by Atlassian JIRA
(v6.2#6252)
More information about the asterisk-bugs
mailing list