backtrace for https://github.com/airtame/airtame-cli/issues/7

raw

backtrace.txt

[New Thread 0x7ffff70e2700 (LWP 10698)]
Searching for device: airtame-cweiske

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 0x7ffff70e2700 (LWP 10698)]
0x000000000040606c in channel_multicast_monitor_ifs (channel=0x7ffff70e1d90, changed=0x7ffff70df794)
    at /home/cweiske/compilethings/airtame-cli/src/channel.c:370
370	        if (cursor->ifa_addr->sa_family != AF_INET
(gdb) bt full
#0  0x000000000040606c in channel_multicast_monitor_ifs (channel=0x7ffff70e1d90, changed=0x7ffff70df794)
    at /home/cweiske/compilethings/airtame-cli/src/channel.c:370
        match = 1
        prev_addrs = 0x7ffff0002250
        cursor = 0x7ffff0002ef0
        prev_cursor = 0x7ffff0002250
#1  0x00000000004057fa in ssdp_handle (ssdp=0x7ffff70e13b0) at /home/cweiske/compilethings/airtame-cli/src/ssdp.c:225
        rc = 0
        curr_sock = -1
        ifs_changed = 0
        buff = '\000' <repeats 1500 times>
        o = {req = 0 '\000', ip = 0x0, port = 0, 
          cache = '\000' <repeats 38 times>, "\064\000\000\000\000\000\000\000\301\001\362\b\000\200\377\377\004\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\061\000\000\000\000\000\000\000@\376\r\367\377\177", '\000' <repeats 14 times>, "[", '\000' <repeats 19 times>, "n\000\000\000w", '\000' <repeats 11 times>, "?\376\r\367\377\177", '\000' <repeats 18 times>, "|", '\000' <repeats 55 times>..., 
          location = "\002\000\254\021*\001\f\000\003\000docker0\000\b\000\b\000\200\000\000\000\024\000\006\000\377\377\377\377\377\377\377\377\200\a\000\000\200\a\000\000X\000\000\000\024\000\002\000<\"lU\306)\000\000\002\024\200\000\b\000\000\000\b\000\001\000\nXq|\b\000\002\000\nXq|\b\000\004\000\nX\177\377\t\000\003\000vpn0\000\000\000\000\b\000\b\000\200\000\000\000\024\000\006\000\377\377\377\377\377\377\377\377t\"\217\000t\"\217", '\000' <repeats 149 times>..., server = "\000\000\200:\t\000\200Q\001\000\003\000\000\000X\002\000\000\020\000\000\000\000\000\000\000\001\000\000\000\001\000\000\000\001\000\000\000`\352", '\000' <repeats 26 times>, "\001", '\000' <repeats 11 times>, "\020'\000\000\350\003\000\000\001\000\000\000\000\000\000\000$\001\003\000$", '\000' <repeats 287 times>..., 
          usn = "\003\000vpn0\000\000\000\000\b\000\r\000\364\001\000\000\005\000\020\000\006\000\000\000\005\000\021\000\000\000\000\000\b\000\004\000~\005\000\000\b\000\033\000\000\000\000\000\b\000\036\000\000\000\000\000\b\000\037\000\001\000\000\000\b\000 \000\001\000\000\000\005\000!\000\001\000\000\000\017\000\006\000pfifo_fast\000\000\b\000#\000\002\000\000\000$\000\016", '\000' <repeats 33 times>, "`\000\a\000\001\000\000\000I\000\000\000\200\000\000\000\255\062", '\000' <repeats 78 times>..., 
          nts = "\016\367\377\177", '\000' <repeats 18 times>, "@\006\016\367\377\177", '\000' <repeats 30 times>, "\377\377\377\377", '\000' <repeats 16 times>, "\377\377\000\000t\"\217", '\000' <repeats 21 times>, "\377\177\000\000\f", '\000' <repeats 11 times>, "\001", '\000' <repeats 27 times>, "\003\000\000\000X\002\000\000\377\377\377\377\377\377\377\377\f\000\000\000\000\000\000\000\003\000\000\000`\352 ", '\000' <repeats 17 times>, "\063~"..., 
          nt = '\000' <repeats 26 times>, "\064\000\006\000\006", '\000' <repeats 47 times>, "\024\000\a", '\000' <repeats 17 times>, "\005\000\b\000\000\000\000\000;\"lU\306)\000\000\000\000\001\000\003\000\000\000\002\020\000\000\000\000\000\000\n\000\003\000wlan0\000\000\000\b\000\r\000\350\003\000\000\005\000\020\000\002\000\000\000\005\000\021\000\000\000\000\000\b\000\004\000\334\005\000\000\b\000\033\000\000\000\000\000\b\000\036\000\000\000\000\000\b\000\037\000\004\000\000\000\b\000"..., 
          st = '\000' <repeats 78 times>, "\234\002\032\000x\000\002\000t\000\001\000\001", '\000' <repeats 11 times>, "\001\000\000\000\001\000\000\000\001\000\000\000\001\000\000\000\001\000\000\000\001", '\000' <repeats 71 times>, "\020'\000\000\350\003"..., 
          man = "\000\000\001\000\000\000\377\177\000\000\310\341\377\367\377\177\000\000\377\377\377\377\377\377\377\377@\r\016\367\377\177\000\000\377\377\377\377\377\377\377\377", '\000' <repeats 16 times>, " \345\377\367\377\177\000\000\260\v\016\367\377\177\000\000\240\v\016\367\377\177\000\000r\372\201\033\000\000\000\000~\030@\000\000\000\000\000\377\377\377\377", '\000' <repeats 12 times>, "\200Y\233\367\377\177\000\000\030z\377\367\377\177\000\000\377\377\377\377\377\377\377\377", '\000' <repeats 24 times>, "\377\377\377\377\064\000\006\000\006", '\000' <repeats 15 times>, "`gz\367\377\177", '\000' <repeats 18 times---Type <return> to continue, or q <return> to quit---
>..., 
          name = "?\367\377\177\000\000[\230\327\003\005\000\000\000M-SEARCH * HTTP/1.1\r\nHOST: 239.255.255.250:1900\r\nMAN: \"ssdp:discover\"\r\nMX: 5\r\nST: airtame:recv\r\nUSER-AGENT: Dummy/1.0 UPnP/1.1 AirTame-SSDP/1.0\r\n\r\n\000\000\000\000\000\210\025\375\367\377\177\000\000\005\000\000\000\000\000\000\000\234>\336\367\377\177\000\000\001\000\000\000\377\177\000\000\221\t"..., 
          security = "\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\310\341\377\367\377\177\000\000p\017\016\367\377\177\000\000`\017\016\367\377\177\000\000\221\t\a\020\000\000\000\000:\032@", '\000' <repeats 13 times>, " \345\377\367\377\177\000\000\240\017\016\367\377\177\000\000\220\017\016\367\377\177\000\000/\275\256\261\000\000\000\000\233\031@\000\000\000\000\000\377\377\377\377\000\000\000\000\264\t\000\000\000\000\000\000\300\061?\367\377\177\000\000\350$\375\367\377\177\000\000\272)\000\360\377\177\000\000\306)\000\000\377\177\000\000\340\035\016\367\377\177\000\000P!\000\360\377\177\000\000H\000\000\000\000\000\000\000\220\241`", '\000' <repeats 21 times>...}
#2  0x00000000004033b4 in ssdp_main_thread (user=0x0) at /home/cweiske/compilethings/airtame-cli/src/main.c:176
        ssdp = {notify_callback = 0x403109 <ssdp_notify_callback>, resp_callback = 0x40318c <ssdp_resp_callback>, network_notify_callback = 0x0, 
          service = '\000' <repeats 499 times>, location = '\000' <repeats 499 times>, usn = '\000' <repeats 499 times>, name = '\000' <repeats 499 times>, 
          security = '\000' <repeats 144 times>, "\234>\336\367\377\177\000\000\000\000\000\000\000\000\000\000\227\201B\250\000\000\000\000\004\000\000\000\000\000\000\000\a\000\000\000\000\000\000\000@\020\375\367\377\177\000\000\026H\336\367\377\177\000\000\000\000\000\000\000\000\000\000"..., sockets = {{
              id = 0, fd = 4, fds = {4, 5, 0 <repeats 14 times>}, used_fds = 2, addrs = 0x7ffff0002c10, addr = {sin_family = 2, sin_port = 27655, 
                sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, client = {sin_family = 2, sin_port = 27655, sin_addr = {
                  s_addr = 4211081199}, sin_zero = "\000\000\000\000\000\000\000"}, port = 0, msg_id = 0, maxfd = 4}, {id = 0, fd = 6, fds = {
                0 <repeats 16 times>}, used_fds = 0, addrs = 0x0, addr = {sin_family = 2, sin_port = 27911, sin_addr = {s_addr = 0}, 
                sin_zero = "\000\000\000\000\000\000\000"}, client = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, 
                sin_zero = "\000\000\000\000\000\000\000"}, port = 1901, msg_id = 0, maxfd = 6}}, last_multicast_msg = 1433150011, last_monitor_handle = 24, 
          broadcast_enabled = 0 '\000', user = 0x0}
        ssdp_last_announce = 0
        usn = "uuid:", '\000' <repeats 194 times>
        uuid = '\000' <repeats 99 times>
        len = 0
        r = 0
#3  0x00007ffff79bb182 in start_thread (arg=0x7ffff70e2700) at pthread_create.c:312
        __res = <optimized out>
        pd = 0x7ffff70e2700
        now = <optimized out>
        unwind_buf = {cancel_jmp_buf = {{jmp_buf = {140737338287872, -7922955034130786723, 1, 0, 140737338288576, 140737338287872, 7922935946259846749, 
                7922937203119347293}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}}
        not_first_call = <optimized out>
        pagesize_m1 = <optimized out>
        sp = <optimized out>
        freesize = <optimized out>
        __PRETTY_FUNCTION__ = "start_thread"
#4  0x00007ffff74e347d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:111
---Type <return> to continue, or q <return> to quit---
No locals.
Christian Weiske Christian Weiske
owner

History