Want more features on Pastebin? Sign Up, it's FREE!
Guest

Untitled

By: a guest on Apr 4th, 2011  |  syntax: None  |  size: 17.09 KB  |  views: 41  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. Core was generated by `/usr/local/sbin/opensips -P /var/run/opensips/opensips.pid -m 1024 -u root -g r'.
  2. Program terminated with signal 11, Segmentation fault.
  3. [New process 26773]
  4. #0  t_uac (method=0x7f9eeb595990, headers=0x0, body=0x0, dialog=0x7c8a98, cb=0, cbp=0x0, release_func=0) at ../../mem/../hash_func.h:56
  5. 56                      v=(*p<<24)+(p[1]<<16)+(p[2]<<8)+p[3];
  6. (gdb) bt
  7. #0  t_uac (method=0x7f9eeb595990, headers=0x0, body=0x0, dialog=0x7c8a98, cb=0, cbp=0x0, release_func=0) at ../../mem/../hash_func.h:56
  8. #1  0x00007f9eeb3874fd in b2b_send_req (dlg=0x7f9eb4fda0b0, etype=B2B_CLIENT, leg=0x7ea888, method=0x7f9eeb595990, extra_headers=0x0,
  9.     body=<value optimized out>) at dlg.c:1751
  10. #2  0x00007f9eeb38ec6d in b2b_tm_cback (t=<value optimized out>, htable=0x7f9eaaa6b440, ps=<value optimized out>) at dlg.c:1921
  11. #3  0x00007f9eec21591f in run_trans_callbacks (type=512, trans=0x7f9ed57c4178, req=0x0, rpl=<value optimized out>,
  12.     code=<value optimized out>) at t_hooks.c:212
  13. #4  0x00007f9eec23393c in local_reply (t=0x7f9ed57c4178, p_msg=0x7ab0c8, branch=-1135380680, msg_status=<value optimized out>,
  14.     cancel_bitmap=0x7fffbc537738) at t_reply.c:1350
  15. #5  0x00007f9eec235026 in reply_received (p_msg=0x7ab0c8) at t_reply.c:1495
  16. #6  0x000000000042673d in forward_reply (msg=0x7ab0c8) at forward.c:559
  17. #7  0x0000000000469c3d in receive_msg (
  18.     buf=0x773300 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 226.159.221.199;branch=z9hG4bK4faf.3733bb56.0\r\nFrom: <sip:18133051459@example.com>;tag=fa9d31cc422caecd039fab84bae59c55\r\nTo: sip:18136757050@268.243.166.62;ta"..., len=1262, rcv_info=0x7fffbc537830)
  19.     at receive.c:200
  20. #8  0x00000000004b9eaa in udp_rcv_loop () at udp_server.c:492
  21. #9  0x000000000042d7df in main (argc=<value optimized out>, argv=0x7fffbc537a08) at main.c:824
  22. (gdb) bt full
  23. #0  t_uac (method=0x7f9eeb595990, headers=0x0, body=0x0, dialog=0x7c8a98, cb=0, cbp=0x0, release_func=0) at ../../mem/../hash_func.h:56
  24.         to_su = {s = {sa_family = 2, sa_data = "\023#####\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195,
  25.     sin_addr = {s_addr = 1051126084}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195,
  26.     sin6_flowinfo = 1051126084, sin6_addr = {in6_u = {u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
  27.         u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}
  28.         new_cell = (struct cell *) 0x7f9ed5532838
  29.         backup = <value optimized out>
  30.         buf = <value optimized out>
  31.         buf1 = <value optimized out>
  32.         buf_len = <value optimized out>
  33.         buf_len1 = <value optimized out>
  34.         ret = <value optimized out>
  35.         flags = 512
  36.         backup_route_type = <value optimized out>
  37.         hi = <value optimized out>
  38.         send_sock = <value optimized out>
  39.         req = (struct sip_msg *) 0x0
  40.         __FUNCTION__ = "t_uac"
  41. #1  0x00007f9eeb3874fd in b2b_send_req (dlg=0x7f9eb4fda0b0, etype=B2B_CLIENT, leg=0x7ea888, method=0x7f9eeb595990, extra_headers=0x0,
  42.     body=<value optimized out>) at dlg.c:1751
  43.         td = (dlg_t *) 0x7c8a98
  44.         result = <value optimized out>
  45.         __FUNCTION__ = "b2b_send_req"
  46. #2  0x00007f9eeb38ec6d in b2b_tm_cback (t=<value optimized out>, htable=0x7f9eaaa6b440, ps=<value optimized out>) at dlg.c:1921
  47.         msg = (struct sip_msg *) 0x7ab0c8
  48.         b2b_key = (str *) 0x7f9eac3d3c18
  49.         hash_index = 2348
  50.         local_index = 2956054
  51.         b2b_cback = <value optimized out>
  52.         dlg = (b2b_dlg_t *) 0x7f9eb4fda0b0
  53.         param = {s = 0x0, len = 0}
  54.         statuscode = 200
  55.         leg = (dlg_leg_t *) 0x7ea888
  56.         pto = <value optimized out>
  57.         TO = {error = 2, body = {s = 0x0, len = -1135381408}, uri = {s = 0x1007ab0c8 <Address 0x1007ab0c8 out of bounds>,
  58.     len = 8297544}, display = {s = 0x47d8ed "\017\037", len = 2}, tag_value = {s = 0x7a5620 "\001", len = 4}, parsed_uri = {user = {
  59.       s = 0x7f9eeb387760 "\205##\213T$\bu#I\213\234$@\001", len = 1024}, passwd = {s = 0x7f9eeb38289c "I\213\027##002",
  60.       len = -1266915792}, host = {s = 0x7f9eb47c64f0 "9Lx", len = -1383799720}, port = {s = 0x7f9eaaa7a528 "", len = -1266916112},
  61.     params = {s = 0x783338 "\210\203}#\236\177", len = 1024}, headers = {s = 0x7f9eeb386f95 "M\213&A##004$", len = 8018584},
  62.     port_no = 25840, proto = 46204, type = 32670, transport = {s = 0x7f9ead84e458 "####04#\236\177", len = -1431853784}, ttl = {
  63.       s = 0x1 <Address 0x1 out of bounds>, len = 1}, user_param = {s = 0x7f9eaaa6b440 "", len = -348601658}, maddr = {
  64.       s = 0x7ab0c8 "##6", len = 7997680}, method = {s = 0xf0e00784c39 <Address 0xf0e00784c39 out of bounds>, len = -348693728}, lr = {
  65.       s = 0x7f9eae25a540 "", len = -1434614904}, r2 = {s = 0x7f9eadb2c448 "", len = 1}, transport_val = {
  66.       s = 0x400 <Address 0x400 out of bounds>, len = -350834492}, ttl_val = {
  67.       s = 0x7f9eadd66cd8 "612e8b1dfe50f4494b9ab554a84c6b92gK02a9de68tgw4.3218.5029426102d7### len = 32}, user_param_val = {
  68.       s = 0x7f9eeb595ce0 "Content-Type: application/sdp\r\nSupported: replaces\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY\r\nMax-Forwards: 66\r\nContact: <sip:226.159.221.199:5060;transport=udp>\r\n", len = -350893374}, maddr_val = {
  69.       s = 0x7e5be8 "\001", len = 3854}, method_val = {s = 0x10 <Address 0x10 out of bounds>, len = -333343664}, lr_val = {
  70.       s = 0x77386c "", len = 7811840}, r2_val = {s = 0x1 <Address 0x1 out of bounds>, len = -348693664}}, param_lst = 0x1,
  71.   last_param = 0x7f9eae25a540}
  72.         to_tag = {
  73.   s = 0x7733ca "gK06c2664f\r\nCall-ID: tgw4.2348.2956054\r\nCSeq: 2 INVITE\r\nRecord-Route: <sip:10.0.0.1;line=sr-Q0CL8ZbVaZvIEhttaZkB8Z9LYZAy5nvyoc7RoIPDb4CGEI.ZbIiqEDYRoMYGEpEBoD.W8p7WbM9P8MEPYi**>\r\nRecord-Route: <sip:10"..., len = 10}
  74.         callid = {
  75.   s = 0x7733df "tgw4.2348.2956054\r\nCSeq: 2 INVITE\r\nRecord-Route: <sip:10.0.0.1;line=sr-Q0CL8ZbVaZvIEhttaZkB8Z9LYZAy5nvyoc7RoIPDb4CGEI.ZbIiqEDYRoMYGEpEBoD.W8p7WbM9P8MEPYi**>\r\nRecord-Route: <sip:10.0.0.1;line=sr-Q0CL8Z"..., len = 17}
  76.         from_tag = {
  77.   s = 0x773382 "fa9d31cc422caecd039fab84bae59c55\r\nTo: sip:18136757050@268.243.166.62;tag=gK06c2664f\r\nCall-ID: tgw4.2348.2956054\r\nCSeq: 2 INVITE\r\nRecord-Route: <sip:10.0.0.1;line=sr-Q0CL8ZbVaZvIEhttaZkB8Z9LYZAy5nvyoc7R"..., len = 32}
  78.         hdr = <value optimized out>
  79.         method_id = 1
  80.         dummy_msg = {id = 3159584128, first_line = {type = 8180, len = 0, u = {request = {method = {s = 0x7f9eedcda300 "O#####36\177",
  81.           len = 28}, uri = {s = 0x22cf3b0 "GMT", len = 0}, version = {s = 0x7f9eedcdd9e0 "", len = -255}, method_value = 0}, reply = {
  82.         version = {s = 0x7f9eedcda300 "O#####36\177", len = 28}, status = {s = 0x22cf3b0 "GMT", len = 0}, reason = {
  83.           s = 0x7f9eedcdd9e0 "", len = -255}, statuscode = 0}}}, via1 = 0x7fffbc536f40, via2 = 0x539ea3, headers = 0x7f9eeda06ad8,
  84.   last_header = 0xf, parsed_flag = 140320568942714, h_via1 = 0xffffff01, h_via2 = 0x0, callid = 0x3333bc536f40, to = 0x539ea3,
  85.   cseq = 0x22cf380, from = 0x22e2bc0, contact = 0x1d440, maxforwards = 0x22e2bd0, route = 0x22e4b50, record_route = 0x7f9eedcdd9e0,
  86.   path = 0x1b4b0, content_type = 0x7f9eeda04768, content_length = 0x3000000010, authorization = 0x22e4b50, expires = 0x2010,
  87.   proxy_auth = 0x7f9eedcdd9e0, supported = 0x2010, proxy_require = 0x22e2b50, unsupported = 0x80, allow = 0x7f9eeda0648f,
  88.   event = 0x7fffbc536d80, accept = 0x1ffb, accept_language = 0x22e2b40, organization = 0x74, priority = 0x22e2b50,
  89.   subject = 0x7f9eedcdd9e0, user_agent = 0x1, content_disposition = 0x2010, accept_disposition = 0x0, diversion = 0x7f9eeda0701f,
  90.   rpid = 0x7fffbc536e1c, refer_to = 0x7fffbc536ef0, session_expires = 0x22cf120, min_se = 0x7f9eedcdd9e0, ppi = 0x22cf120, pai = 0x0,
  91.   privacy = 0x0, call_info = 0x7f9eedcdd9e0, sdp = 0x22cf120, multi = 0x15, eoh = 0x0, unparsed = 0x7fffbc536f40 " ", rcv = {src_ip = {
  92.       af = 5480099, len = 0, u = {addrl = {140320568265398, 21}, addr32 = {3986705078, 32670, 21, 0}, addr16 = {19126, 60832, 32670,
  93.           0, 21, 0, 0, 0}, addr = "#J####36\177\000\000\025\000\000\000\000\000\000"}}, dst_ip = {af = 3987058162, len = 32670, u = {
  94.         addrl = {236223201313, 17179869198}, addr32 = {33, 55, 14, 4}, addr16 = {33, 0, 55, 0, 14, 0, 4, 0},
  95.         addr = "!\000\000\0007\000\000\000\016\000\000\000\004\000\000"}}, src_port = 3, dst_port = 0, proto = 111,
  96.     proto_reserved1 = 1, proto_reserved2 = 93, src_su = {s = {sa_family = 0, sa_data = '\0' <repeats 13 times>}, sin = {
  97.         sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0,
  98.         sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {in6_u = {u6_addr8 = "\000\000\000\000\000\000\000\000#####02\000\000\000",
  99.             u6_addr16 = {0, 0, 0, 0, 62384, 556, 0, 0}, u6_addr32 = {0, 0, 36500400, 0}}}, sin6_scope_id = 7997680}},
  100.     bind_address = 0x7a5a98}, buf = 0xf <Address 0xf out of bounds>, len = 4294967291, new_uri = {s = 0x7ab0c8 "##6",
  101.     len = -1135381792}, dst_uri = {s = 0x4118f3 "A\211##\213E", len = 0}, parsed_uri_ok = 7879209, parsed_uri = {user = {
  102.       s = 0x22e2b50 "<131>Apr  4 14:55:33 /usr/local/sbin/opensips[26773]: b2b_request (4108ba9f3ddfd4577a7259bf6e8ea399@cf-dialer.com)\n", len = 0}, passwd = {s = 0x7939bf "", len = 0}, host = {s = 0x0, len = 115}, port = {
  103.       s = 0x22e2b50 "<131>Apr  4 14:55:33 /usr/local/sbin/opensips[26773]: b2b_request (4108ba9f3ddfd4577a7259bf6e8ea399@cf-dialer.com)\n", len = 1301928933}, params = {s = 0xfbad8001 <Address 0xfbad8001 out of bounds>, len = 8019320}, headers = {s = 0x7a5d78 "H",
  104.       len = 18}, port_no = 65535, proto = 65535, type = ERROR_URI_T, transport = {s = 0x7ab0c8 "##6", len = -1135381392}, ttl = {
  105.       s = 0x7f9eeda5b240 "H\201##", len = 32}, user_param = {s = 0x7fffbc537020 "", len = -1135382688}, maddr = {
  106.       s = 0x20 <Address 0x20 out of bounds>, len = -1135382476}, method = {
  107.       s = 0x7ac00d "4108ba9f3ddfd4577a7259bf6e8ea399@cf-dialer.com)\n", len = 61}, lr = {
  108.       s = 0x7ac000 "b2b_request (4108ba9f3ddfd4577a7259bf6e8ea399@cf-dialer.com)\n", len = 2}, r2 = {
  109.       s = 0x29 <Address 0x29 out of bounds>, len = 0}, transport_val = {s = 0x7a8a48 " ####02", len = 8030792}, ttl_val = {
  110.       s = 0x7a5d78 "H", len = -1135382476}, user_param_val = {s = 0x12 <Address 0x12 out of bounds>, len = 8030048}, maddr_val = {
  111.       s = 0x7ab0c8 "##6", len = -1135381392}, method_val = {s = 0x4bf3a0 "H\203##020[]A\\A]A^##\213\005####, len = -1135380656},
  112.     lr_val = {s = 0x47c24b "\211########13K \213S\004H\213s(A\017######1", len = 8019320}, r2_val = {s = 0x7a5d78 "H", len = 18}},
  113.   parsed_orig_ruri_ok = -1, parsed_orig_ruri = {user = {s = 0x7ab0c8 "##6", len = 4978218}, passwd = {s = 0x0, len = 13}, host = {
  114.       s = 0x3d007ab0c8 <Address 0x3d007ab0c8 out of bounds>, len = 4273773}, port = {s = 0x7fffbc537750 "0xS##\177", len = 4702036},
  115.     params = {s = 0x7a4498 "\002", len = 0}, headers = {s = 0x13 <Address 0x13 out of bounds>, len = 8040648}, port_no = 20,
  116.     proto = 0, type = ERROR_URI_T, transport = {s = 0x47c060 "\205##017\205#\r", len = 8030696}, ttl = {
  117.       s = 0x79e4d0 "\220VY###36\177", len = 65512}, user_param = {s = 0x7f9eed3e97ce "\017###211####f.\017\037\204", len = 31},
  118.     maddr = {s = 0x7f9eed7781b7 "A\211##205##017\205]\001", len = 74}, method = {s = 0x3 <Address 0x3 out of bounds>, len = 7879135},
  119.     lr = {s = 0x4fea5f "\205##4\003\\$4#####\213=B`%", len = -1135382272}, r2 = {s = 0x300000000 <Address 0x300000000 out of bounds>,
  120.       len = 7879072}, transport_val = {s = 0x79e4d0 "\220VY###36\177", len = 7988432}, ttl_val = {s = 0x0, len = 0}, user_param_val = {
  121.       s = 0x1f <Address 0x1f out of bounds>, len = -310924494}, maddr_val = {s = 0x79e4d0 "\220VY###36\177", len = 65512},
  122.     method_val = {s = 0x4 <Address 0x4 out of bounds>, len = 65505}, lr_val = {s = 0x4fcb81 "\205##\a1###########H\2135\020\177%",
  123.       len = 4}, r2_val = {
  124.       s = 0x7f9eed77ab32 "AUATSH\203###20I\211#####1####11##\211##\205#t\036H\205####31H\205##\024H\205##017\037\200",
  125.       len = -1135382000}}, add_rm = 0x0, body_lumps = 0x7f9eeb595a40, reply_lump = 0x0,
  126.   add_to_branch_s = "\000\000\000\000\000\000\000\000##y\000\000\000\000\000\004\000\000\000\000\000\000\000\020rS##\177\000\000\000\000\000\000\000\000\000\000@ZY###36\177\000\000\0273w\000\000\000\000\000\f", add_to_branch_len = 0, hash_index = 0, flags = 4,
  127.   msg_flags = 0, set_global_address = {s = 0x12 <Address 0x12 out of bounds>, len = 7812553}, set_global_port = {
  128.     s = 0x3b <Address 0x3b out of bounds>, len = 5088297}, force_send_socket = 0x7fffbc537220, path_vec = {
  129.     s = 0x1 <Address 0x1 out of bounds>, len = 1}}
  130.         cb = {error = 59, number = {s = 0x4da429 "H\211D$@H\205##\213T$\030L\213\\$\020\017\204###", len = 8040648}, method = {
  131.     s = 0x30 <Address 0x30 out of bounds>, len = 7812037}, method_id = 7813102}
  132.         cseq = {type = HDR_OTHER_T, name = {s = 0x7a5d78 "H", len = 8019320}, body = {s = 0x7ab0c8 "##6", len = -1}, len = 8040648,
  133.   parsed = 0x7fffbc537470, next = 0x410242, sibling = 0x7add98}
  134.         etype = B2B_CLIENT
  135.         __FUNCTION__ = "b2b_tm_cback"
  136. #3  0x00007f9eec21591f in run_trans_callbacks (type=512, trans=0x7f9ed57c4178, req=0x0, rpl=<value optimized out>,
  137.     code=<value optimized out>) at t_hooks.c:212
  138.         params = {req = 0x0, rpl = 0x7ab0c8, code = 200, param = 0x7f9ead75f0c8, extra1 = 0x0, extra2 = 0x0}
  139.         cbp = (struct tm_callback *) 0x7f9ead75f0b8
  140.         backup = (struct usr_avp **) 0x783308
  141.         trans_backup = (struct cell *) 0x7f9ed57c4178
  142.         __FUNCTION__ = "run_trans_callbacks"
  143. #4  0x00007f9eec23393c in local_reply (t=0x7f9ed57c4178, p_msg=0x7ab0c8, branch=-1135380680, msg_status=<value optimized out>,
  144.     cancel_bitmap=0x7fffbc537738) at t_reply.c:1350
  145.         local_store = 0
  146.         local_winner = 0
  147.         reply_status = RPS_PUSHED_AFTER_COMPLETION
  148.         winning_msg = (struct sip_msg *) 0x7ab0c8
  149.         winning_code = 200
  150.         totag_retr = 0
  151.         __FUNCTION__ = "local_reply"
  152. #5  0x00007f9eec235026 in reply_received (p_msg=0x7ab0c8) at t_reply.c:1495
  153.         last_uac_status = <value optimized out>
  154.         branch = 0
  155.         reply_status = <value optimized out>
  156.         timer = <value optimized out>
  157.         cancel_bitmap = 0
  158.         t = (struct cell *) 0x7f9ed57c4178
  159.         backup_list = <value optimized out>
  160.         has_reply_route = 0
  161.         __FUNCTION__ = "reply_received"
  162. #6  0x000000000042673d in forward_reply (msg=0x7ab0c8) at forward.c:559
  163.         new_buf = <value optimized out>
  164.         to = <value optimized out>
  165.         new_len = <value optimized out>
  166.         mod = (struct sr_module *) 0x79f0d0
  167.         proto = <value optimized out>
  168.         id = <value optimized out>
  169.         send_sock = <value optimized out>
  170.         len = <value optimized out>
  171.         __FUNCTION__ = "forward_reply"
  172. #7  0x0000000000469c3d in receive_msg (
  173.     buf=0x773300 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 226.159.221.199;branch=z9hG4bK4faf.3733bb56.0\r\nFrom: <sip:18133051459@example.com>;tag=fa9d31cc422caecd039fab84bae59c55\r\nTo: sip:18136757050@268.243.166.62;ta"..., len=1262, rcv_info=0x7fffbc537830)
  174.     at receive.c:200
  175.         msg = (struct sip_msg *) 0x7ab0c8
  176.         __FUNCTION__ = "receive_msg"
  177. #8  0x00000000004b9eaa in udp_rcv_loop () at udp_server.c:492
  178.         len = 1262
  179.         tmp = <value optimized out>
  180.         from = (union sockaddr_union *) 0x7ab090
  181.         fromlen = 16
  182.         ri = {src_ip = {af = 2, len = 4, u = {addrl = {1051126084, 6}, addr32 = {1051126084, 0, 6, 0}, addr16 = {59716, 16038, 0, 0,
  183.         6, 0, 0, 0}, addr = "D###\000\000\000\000\006\000\000\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {3353185240,
  184.         0}, addr32 = {3353185240, 0, 0, 0}, addr16 = {35800, 51165, 0, 0, 0, 0, 0, 0}, addr = "##213##", '\0' <repeats 11 times>}},
  185.   src_port = 5060, dst_port = 5060, proto = 1, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2,
  186.       sa_data = "\023#####\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1051126084},
  187.       sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1051126084, sin6_addr = {
  188.         in6_u = {u6_addr8 = '\0' <repeats 15 times>, u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}},
  189.       sin6_scope_id = 0}}, bind_address = 0x79ec00}
  190.         p = (callback_list *) 0x7fffbc537838
  191.         buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 226.159.221.199;branch=z9hG4bK4faf.3733bb56.0\r\nFrom: <sip:18133051459@example.com>;tag=fa9d31cc422caecd039fab84bae59c55\r\nTo: sip:18136757050@268.243.166.62;ta"...
  192.         __FUNCTION__ = "udp_rcv_loop"
  193. #9  0x000000000042d7df in main (argc=<value optimized out>, argv=0x7fffbc537a08) at main.c:824
  194.         cfg_log_stderr = <value optimized out>
  195.         cfg_stream = <value optimized out>
  196.         c = <value optimized out>
  197.         r = <value optimized out>
  198.         tmp = 0x7fffbc538ea1 ""
  199.         tmp_len = <value optimized out>
  200.         port = <value optimized out>
  201.         proto = <value optimized out>
  202.         ret = <value optimized out>
  203.         seed = 4137350711
  204.         rfd = <value optimized out>
  205.         __FUNCTION__ = "main"
  206. (gdb)
clone this paste RAW Paste Data