version: opensips 1.7.0-beta-notls (x86_64/linux) flags: STATS: Off, USE_IPV6, USE_TCP, DISABLE_NAGLE, USE_MCAST, SHM_MEM, SHM_MMAP, PKG_MALLOC, DBG_QM_MALLOC, FAST_LOCK-ADAPTIVE_WAIT ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535 poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. svnrevision: 2:8130M @(#) $Id: main.c 8043 2011-06-24 14:28:12Z vladut-paiu $ main.c compiled on 14:24:57 Jul 5 2011 with gcc 4.3.2 Core was generated by `/usr/local/sbin/opensips -P /var/run/opensips/opensips.pid -m 512 -u root -g ro'. Program terminated with signal 11, Segmentation fault. [New process 19335] #0 b2b_search_htable_next_dlg (start_dlg=0x0, table=0x7fe72280f3d8, hash_index=3089, local_index=3335, to_tag=0x7fffb33a43e0, from_tag=0x7fffb33a43f0, callid=0x7fffb33a43d0) at dlg.c:99 99 if(dlg->id != local_index) (gdb) bt #0 b2b_search_htable_next_dlg (start_dlg=0x0, table=0x7fe72280f3d8, hash_index=3089, local_index=3335, to_tag=0x7fffb33a43e0, from_tag=0x7fffb33a43f0, callid=0x7fffb33a43d0) at dlg.c:99 #1 0x00007fe7433355f4 in b2b_search_htable_dlg (table=, hash_index=, local_index=, to_tag=, from_tag=, callid=) at dlg.c:169 #2 0x00007fe743335bdb in b2b_prescript_f (msg=0x7fd140, uparam=) at dlg.c:707 #3 0x00000000004862aa in exec_pre_req_cb (msg=0x7fd140) at script_cb.c:188 #4 0x000000000046db86 in receive_msg ( buf=0x793120 "BYE sip:216.139.221.199:5060;transport=udp SIP/2.0\r\nVia: SIP/2.0/UDP 74.121.80.38;branch=z9hG4bK3614.7ee51417.0\r\nVia: SIP/2.0/UDP 74.121.80.36;branch=z9hG4bK3614.c81dd7e7.0\r\nVia: SIP/2.0/UDP 192.168.1"..., len=537, rcv_info=0x7fffb33a4530) at receive.c:159 #5 0x00000000004c2b83 in udp_rcv_loop () at udp_server.c:419 #6 0x00000000004303b3 in main (argc=, argv=0x7fffb33a4708) at main.c:879 (gdb) bt full #0 b2b_search_htable_next_dlg (start_dlg=0x0, table=0x7fe72280f3d8, hash_index=3089, local_index=3335, to_tag=0x7fffb33a43e0, from_tag=0x7fffb33a43f0, callid=0x7fffb33a43d0) at dlg.c:99 dlg = (b2b_dlg_t *) 0x6c3b38332e30382e leg = (dlg_leg_t *) 0x7fffb33a4410 __FUNCTION__ = "b2b_search_htable_next_dlg" #1 0x00007fe7433355f4 in b2b_search_htable_dlg (table=, hash_index=, local_index=, to_tag=, from_tag=, callid=) at dlg.c:169 No locals. #2 0x00007fe743335bdb in b2b_prescript_f (msg=0x7fd140, uparam=) at dlg.c:707 b2b_key = { s = 0x79329f "tgw4.3089.3335\r\nCall-ID: 310a9b6417f172f141c864413c593293@192.168.10.136\r\nCSeq: 103 BYE\r\nUser-Agent: Asterisk PBX\r\nMax-Forwards: 68\r\nContent-Length: 0\r\n\r\n", len = 14} dlg = aux_dlg = hash_index = 3089 local_index = 3335 b2b_cback = param = {s = 0x0, len = 0} table = (b2b_table) 0x7fe72280f3d8 method_value = 8 TO = {error = 29, body = {s = 0x4e5b7f "H\211D$HH\205##\213T$ L\213\\$\030\017\204\227\a", len = 1127487667}, uri = { s = 0x5
, len = 0}, display = {s = 0x0, len = 7942795}, tag_value = {s = 0x20
, len = 7942911}, parsed_uri = {user = {s = 0x10
, len = 7942868}, passwd = {s = 0x20
, len = 0}, host = { s = 0x6
, len = 6}, port = {s = 0x4d2a25 "H\205##017\204####1", len = 5539418}, params = {s = 0x7fda68 "@", len = 64}, headers = {s = 0x7b5da0 "", len = 1}, port_no = 8, proto = 0, type = ERROR_URI_T, transport = {s = 0x5519d2 "parser/parse_via.c", len = 5014482}, ttl = {s = 0x7fe7229bbb78 "", len = 1142730164}, user_param = {s = 0x1
, len = 9}, maddr = {s = 0x553c44 "parse_via", len = 7942514}, method = { s = 0x793172 "branch=z9hG4bK3614.7ee51417.0\r\nVia: SIP/2.0/UDP 74.121.80.36;branch=z9hG4bK3614.c81dd7e7.0\r\nVia: SIP/2.0/UDP 192.168.10.136:5060;received=66.29.230.234;branch=z9hG4bK7ab4b300;rport=5060\r\nFrom: \"256422"..., len = 98}, lr = {s = 0x32
, len = 7942489}, r2 = { s = 0x7fdbe0 "\001", len = 5195295}, transport_val = {s = 0x0, len = 8376640}, ttl_val = {s = 0xb4
, len = 579451696}, user_param_val = {s = 0x0, len = 8379142}, maddr_val = {s = 0x0, len = 8379360}, method_val = {s = 0x793339 "", len = 7942514}, lr_val = { s = 0x547dbf "parser/msg_parser.c", len = 8379032}, r2_val = {s = 0x774568 "##X\"###77", len = 580631416}, u_name = {{ s = 0xb4
, len = 1142851394}, {s = 0x54865a "get_hdr_field", len = 537}, {s = 0x7fe1b8 "\001", len = 7942489}, { s = 0x7fdbe0 "\001", len = 7942969}, { s = 0x793159 "SIP/2.0/UDP 74.121.80.38;branch=z9hG4bK3614.7ee51417.0\r\nVia: SIP/2.0/UDP 74.121.80.36;branch=z9hG4bK3614.c81dd7e7.0\r\nVia: SIP/2.0/UDP 192.168.10.136:5060;received=66.29.230.234;branch=z9hG4bK7ab4b300;"..., len = 5033813}}, u_val = {{s = 0x48
, len = 8084896}, {s = 0x1
, len = 9}, {s = 0x547dbf "parser/msg_parser.c", len = 5014482}, { s = 0x54864c "parse_headers", len = 8084896}, {s = 0x3d
, len = 8382120}}, u_params_no = 34380}, param_lst = 0x219, last_param = 0x7fe1b8} from_tag = { s = 0x79326c "as1b7821f3\r\nTo: ;tag=tgw4.3089.3335\r\nCall-ID: 310a9b6417f172f141c864413c593293@192.168.10.136\r\nCSeq: 103 BYE\r\nUser-Agent: Asterisk PBX\r\nMax-Forwards: 68\r\nContent-Length: "..., len = 10} to_tag = { s = 0x79329f "tgw4.3089.3335\r\nCall-ID: 310a9b6417f172f141c864413c593293@192.168.10.136\r\nCSeq: 103 BYE\r\nUser-Agent: Asterisk PBX\r\nMax-Forwards: 68\r\nContent-Length: 0\r\n\r\n", len = 14} callid = { s = 0x7932b8 "310a9b6417f172f141c864413c593293@192.168.10.136\r\nCSeq: 103 BYE\r\nUser-Agent: Asterisk PBX\r\nMax-Forwards: 68\r\nContent-Length: 0\r\n\r\n", len = 47} tm_tran = ret = sock_list = port = 5060 etype = dlg_state = reason = {s = 0x7fe7433418c2 "Trying", len = 6} __FUNCTION__ = "b2b_prescript_f" #3 0x00000000004862aa in exec_pre_req_cb (msg=0x7fd140) at script_cb.c:188 No locals. #4 0x000000000046db86 in receive_msg ( buf=0x793120 "BYE sip:216.139.221.199:5060;transport=udp SIP/2.0\r\nVia: SIP/2.0/UDP 74.121.80.38;branch=z9hG4bK3614.7ee51417.0\r\nVia: SIP/2.0/UDP 74.121.80.36;branch=z9hG4bK3614.c81dd7e7.0\r\nVia: SIP/2.0/UDP 192.168.1"..., len=537, rcv_info=0x7fffb33a4530) at receive.c:159 msg = (struct sip_msg *) 0x7fd140 start = {tv_sec = 28, tv_usec = 0} __FUNCTION__ = "receive_msg" #5 0x00000000004c2b83 in udp_rcv_loop () at udp_server.c:419 len = 537 tmp = from = (union sockaddr_union *) 0x7fd0c0 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {140733836196170, 8306904}, addr32 = {642808138, 32767, 8306904, 0}, addr16 = {31050, 9808, 32767, 0, 49368, 126, 0, 0}, addr = "JyP&#\177\000\000##~\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {3353185240, 0}, addr32 = { 3353185240, 0, 0, 0}, addr16 = {35800, 51165, 0, 0, 0, 0, 0, 0}, addr = "##213##", '\0' }}, src_port = 5060, dst_port = 5060, proto = 1, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023##yP&\000\000\000\000\000\000\000"}, sin = { sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 642808138}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 642808138, sin6_addr = {in6_u = {u6_addr8 = '\0' , u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7ec0d8} p = (callback_list *) 0x7fffb33a4538 buf = "BYE sip:216.139.221.199:5060;transport=udp SIP/2.0\r\nVia: SIP/2.0/UDP 74.121.80.38;branch=z9hG4bK3614.7ee51417.0\r\nVia: SIP/2.0/UDP 74.121.80.36;branch=z9hG4bK3614.c81dd7e7.0\r\nVia: SIP/2.0/UDP 192.168.1"... __FUNCTION__ = "udp_rcv_loop" #6 0x00000000004303b3 in main (argc=, argv=0x7fffb33a4708) at main.c:879 cfg_log_stderr = cfg_stream = c = r = tmp = 0x7fffb33a5e9f "" tmp_len = port = proto = ret = seed = 98187009 rfd = __FUNCTION__ = "main"