# svn info Path: . URL: https://opensips.svn.sourceforge.net/svnroot/opensips/branches/1.6 Repository Root: https://opensips.svn.sourceforge.net/svnroot/opensips Repository UUID: 689a6050-402a-0410-94f2-e92a70836424 Revision: 7904 Node Kind: directory Schedule: normal Last Changed Author: vladut-paiu Last Changed Rev: 7892 Last Changed Date: 2011-04-20 14:34:15 +0000 (Wed, 20 Apr 2011) Core was generated by `/usr/local/sbin/opensips -P /var/run/opensips/opensips.pid -m 1024 -u root -g r'. Program terminated with signal 11, Segmentation fault. [New process 20872] #0 0x00007f429c91c14d in entity_add_dlginfo (entity=0x7f425c429838, dlginfo=0x7fffa1f53c80) at logic.c:85 85 memset(new_dlginfo, 0, size); (gdb) bt #0 0x00007f429c91c14d in entity_add_dlginfo (entity=0x7f425c429838, dlginfo=0x7fffa1f53c80) at logic.c:85 #1 0x00007f429c920f60 in b2b_add_dlginfo (key=, entity_key=0x783338, src=, dlginfo=0x7fffa1f53c80) at logic.c:136 #2 0x00007f429cb522fa in b2b_tm_cback (t=0x7f4298f1f6c8, htable=0x7f425c22e440, ps=) at dlg.c:2252 #3 0x00007f429d9d898f in run_trans_callbacks (type=512, trans=0x7f4298f1f6c8, req=0x0, rpl=, code=) at t_hooks.c:212 #4 0x00007f429d9f69bc in local_reply (t=0x7f4298f1f6c8, p_msg=0x7ba778, branch=-1577763000, msg_status=, cancel_bitmap=0x7fffa1f53f48) at t_reply.c:1355 #5 0x00007f429d9f80a6 in reply_received (p_msg=0x7ba778) at t_reply.c:1500 #6 0x000000000042673d in forward_reply (msg=0x7ba778) at forward.c:559 #7 0x0000000000469d2d in receive_msg ( buf=0x773300 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 216.139.221.199;branch=z9hG4bK685f.2180555.0\r\nFrom: ;tag=c4220007433c4fe238ce1ebc27d2897b\r\nTo: sip:17047824256@68.68.122.41;tag="..., len=892, rcv_info=0x7fffa1f54040) at receive.c:200 #8 0x00000000004b9f6a in udp_rcv_loop () at udp_server.c:492 #9 0x000000000042d7df in main (argc=, argv=0x7fffa1f54218) at main.c:824 (gdb) bt full #0 0x00007f429c91c14d in entity_add_dlginfo (entity=0x7f425c429838, dlginfo=0x7fffa1f53c80) at logic.c:85 new_dlginfo = (b2b_dlginfo_t *) 0x0 size = 107 __FUNCTION__ = "entity_add_dlginfo" #1 0x00007f429c920f60 in b2b_add_dlginfo (key=, entity_key=0x783338, src=, dlginfo=0x7fffa1f53c80) at logic.c:136 tuple = entity = (b2bl_entity_id_t *) 0x7f425c429838 hash_index = 1831 local_index = 0 __FUNCTION__ = "b2b_add_dlginfo" #2 0x00007f429cb522fa in b2b_tm_cback (t=0x7f4298f1f6c8, htable=0x7f425c22e440, ps=) at dlg.c:2252 dlginfo = {callid = { s = 0x7f425c403660 "tgw4.1831.7474335sip:18778093323@starviewsolutions.comsip:17047824256@68.68.122.41c4220007433c4fe238ce1ebc27d2897bgK0cca7a15sip:216.139.221.199:5060;transport=udpsip:17047824256@68.68.122.41:50601831."..., len = 17}, fromtag = { s = 0x7733c8 "gK0cca7a15\r\nCall-ID: tgw4.1831.7474335\r\nCSeq: 103 INVITE\r\nAccept: application/sdp, application/isup, application/dtmf, application/dtmf-relay, multipart/mixed\r\nContact: msg = (struct sip_msg *) 0x7ba778 b2b_key = (str *) 0x7f425fca07e8 hash_index = 0 local_index = 7474335 b2b_cback = (b2b_notify_t) 0x7f429c92af23 dlg = (b2b_dlg_t *) 0x7f425c403508 param = {s = 0x7bbbe8 "1831.0", len = 6} statuscode = leg = pto = TO = {error = -1622537760, body = {s = 0xffffff01
, len = 0}, uri = {s = 0x7fffa1f53bd0 "\200##", len = -1650460917}, display = { s = 0x7f429f1c9ad8 "H\205##\211##4\203=A#-", len = 15}, tag_value = {s = 0x7f429f26d07a "/etc/localtime", len = -255}, parsed_uri = {user = {s = 0x0, len = -1577763888}, passwd = { s = 0x7f429d9ff70b "ERROR:tm:%s: new_t failed\n", len = 20572640}, host = {s = 0x13aeba0 "t enough free memory, will atempt defragmenation\n", len = 132192}, port = { s = 0x13aebb0 "mory, will atempt defragmenation\n", len = 20646736}, params = {s = 0x7f429f4a09e0 "", len = 7811887}, headers = {s = 0xd
, len = 0}, port_no = 2896, proto = 315, type = ERROR_URI_T, transport = {s = 0x3b
, len = 7812290}, ttl = {s = 0x3b
, len = 5088359}, user_param = {s = 0x7bcfe0 "\n", len = 1}, maddr = {s = 0x0, len = 8017656}, method = {s = 0x2
, len = 0}, lr = {s = 0x7ba778 "\0372\025", len = 8103800}, r2 = {s = 0x7fffa1f53f60 "@@####177", len = 4708829}, transport_val = {s = 0x2
, len = 8017736}, ttl_val = {s = 0x4
, len = 0}, user_param_val = {s = 0x7ba778 "\0372\025", len = 4708789}, maddr_val = {s = 0x2
, len = 8017816}, method_val = {s = 0x3
, len = 0}, lr_val = {s = 0x7ba778 "\0372\025", len = 4708748}, r2_val = {s = 0x2
, len = 7997976}}, param_lst = 0x7a5bc0, last_param = 0xe} to_tag = { s = 0x7733c8 "gK0cca7a15\r\nCall-ID: tgw4.1831.7474335\r\nCSeq: 103 INVITE\r\nAccept: application/sdp, application/isup, application/dtmf, application/dtmf-relay, multipart/mixed\r\nContact: \r\nAllow: INVITE,"..., len = 17} from_tag = { s = 0x773381 "c4220007433c4fe238ce1ebc27d2897b\r\nTo: sip:17047824256@68.68.122.41;tag=gK0cca7a15\r\nCall-ID: tgw4.1831.7474335\r\nCSeq: 103 INVITE\r\nAccept: application/sdp, application/isup, application/dtmf, applicatio"..., len = 32} hdr = method_id = 1 dummy_msg = {id = 20638562, first_line = {type = -1577766666, len = 0, u = {request = {method = {s = 0x7fffa1f530f6 "", len = -1577766688}, uri = { s = 0x3000000010
, len = -1577766320}, version = {s = 0x7fffa1f53190 "@###001", len = 8180}, method_value = -1622551808}, reply = {version = { s = 0x7fffa1f530f6 "", len = -1577766688}, status = {s = 0x3000000010
, len = -1577766320}, reason = {s = 0x7fffa1f53190 "@###001", len = 8180}, statuscode = 2672415488}}}, via1 = 0x200002010, via2 = 0x139e9d0, headers = 0x0, last_header = 0x7f429f4a09e0, parsed_flag = 4294967041, h_via1 = 0x0, h_via2 = 0x7fffa1f53350, callid = 0x7f429c931a68, to = 0x7f429f1c9ad8, cseq = 0xf, from = 0x7f429f26d07a, contact = 0xffffff01, maxforwards = 0x0, route = 0x3733a1f53350, record_route = 0x7f429c931a68, path = 0x139e9e0, content_type = 0x13aebe0, content_length = 0x20420, authorization = 0x13aebf0, expires = 0x13b0b50, proxy_auth = 0x7f429f4a09e0, supported = 0x1e4b0, proxy_require = 0x7f429f1c7768, unsupported = 0x3000000010, allow = 0x13b0b50, event = 0x13b0b50, accept = 0x2010, accept_language = 0x7f429f4a09e0, organization = 0x2010, priority = 0x13aeb50, subject = 0x7f429f1c948f, user_agent = 0x7fffa1f53190, content_disposition = 0x1ffb, accept_disposition = 0x13aeb40, diversion = 0x91, rpid = 0x13aeb50, refer_to = 0x7f429f4a09e0, session_expires = 0x1, min_se = 0x2010, ppi = 0x0, pai = 0x7f429f1ca01f, privacy = 0x7fffa1f5322c, call_info = 0x7fffa1f53300, sdp = 0x139f040, multi = 0x7f429f4a09e0, eoh = 0x139f040 "@\nJ\237B\177", unparsed = 0x0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {139924116998624, 139924116998624}, addr32 = {2672429536, 32578, 2672429536, 32578}, addr16 = {2528, 40778, 32578, 0, 2528, 40778, 32578, 0}, addr = "###J\237B\177\000\000###J\237B\177\000"}}, dst_ip = {af = 20574272, len = 0, u = {addrl = {21, 0}, addr32 = {21, 0, 0, 0}, addr16 = {21, 0, 0, 0, 0, 0, 0, 0}, addr = "\025", '\0' }}, src_port = 13136, dst_port = 41461, proto = 32767, proto_reserved1 = -1625523530, proto_reserved2 = 32578, src_su = {s = {sa_family = 21, sa_data = "\000\000\000\000\000\000####237B\177\000"}, sin = {sin_family = 21, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "####237B\177\000"}, sin6 = {sin6_family = 21, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {in6_u = {u6_addr8 = "####237B\177\000\000%\000\000\000\003\000\000", u6_addr16 = {56818, 40737, 32578, 0, 37, 0, 3, 0}, u6_addr32 = {2669796850, 32578, 37, 3}}}, sin6_scope_id = 14}}, bind_address = 0x6f00000003}, buf = 0x7600000005
, len = 0, new_uri = {s = 0x0, len = 20572624}, dst_uri = { s = 0x7fffa1f53360 "p3####177", len = -1577766240}, parsed_uri_ok = 1543091176, parsed_uri = {user = {s = 0x2525252525252525
, len = 38}, passwd = { s = 0x7f429c936380 "b2bl_insert_new", len = 0}, host = {s = 0x7f429bf93000
, len = 0}, port = { s = 0x13aeb50 "<132>Apr 29 14:03:37 /usr/local/sbin/opensips[20872]: WARNING:core:fm_malloc: Not enough free memory, will atempt defragmenation\n", len = 0}, params = { s = 0xd
, len = 7811887}, headers = {s = 0x0, len = 144}, port_no = 60240, proto = 314, type = ERROR_URI_T, transport = {s = 0x4dbac539
, len = 7812384}, ttl = {s = 0x754aa8 "###[B\177", len = 0}, user_param = {s = 0x7ba778 "\0372\025", len = 7686832}, maddr = {s = 0xb76
, len = 1543091176}, method = { s = 0x7f429f21e240 "H\201##", len = 24}, lr = {s = 0x7fffa1f53430 " ", len = -1577766032}, r2 = {s = 0x0, len = 8103800}, transport_val = {s = 0x7f429c91eb22 "\211##\213\204$\220", len = -1668064496}, ttl_val = {s = 0x13aebc0 "t defragmenation\n", len = 20638544}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 13}, method_val = {s = 0x7ba778 "\0372\025", len = 0}, lr_val = {s = 0x269f26d8f6
, len = 0}, r2_val = {s = 0x0, len = -1577765504}}, parsed_orig_ruri_ok = 8103800, parsed_orig_ruri = {user = {s = 0x0, ---Type to continue, or q to quit--- len = 4096}, passwd = {s = 0x0, len = 8103800}, host = {s = 0x0, len = 2934}, port = {s = 0x754aa8 "###[B\177", len = -1668149978}, params = {s = 0x20
, len = -1577763888}, headers = {s = 0x7f429d9ff70b "ERROR:tm:%s: new_t failed\n", len = -1577765504}, port_no = 13056, proto = 119, type = ERROR_URI_T, transport = { s = 0x6
, len = -9}, ttl = {s = 0x25
, len = -1577764744}, user_param = {s = 0x0, len = 7811847}, maddr = {s = 0x0, len = -1}, method = { s = 0x2100000000
, len = -1650460907}, lr = {s = 0x7f429d9ff714 "%s: new_t failed\n", len = 0}, r2 = {s = 0x7fffa1f53998 "####001", len = 0}, transport_val = { s = 0x0, len = -1577765488}, ttl_val = {s = 0x7f429a92c070 "sip:216.139.221.199:5060;transport=udp80#", len = 38}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0xf
, len = 32}, lr_val = {s = 0x0, len = -1577765552}, r2_val = {s = 0x7f4200000020
, len = -1701658105}}, add_rm = 0x2e, body_lumps = 0x7f429a92c1fd, reply_lump = 0xa, add_to_branch_s = "890a6ebed992b37afabd69b28c7a6f18\2344w\000\000\000\000\000%\000\000\000\000\000\000\000\220##\000\000\000\000\0005", add_to_branch_len = 0, hash_index = 2717202840, flags = 32767, msg_flags = 32, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, path_vec = { s = 0x7f429a92c168 "x##222\232B\177", len = 0}} cb = {error = 59, number = {s = 0x4da467 "H\211D$HH\205##\213T$ L\213\\$\030\017\204\227\a", len = -1577762640}, method = {s = 0x4e1bcc "\205##1##205X\002", len = 8103800}, method_id = 7812732} cseq = {type = 8104544, name = {s = 0x7baad0 "", len = 8104576}, body = {s = 0x7baaf0 "", len = 8104560}, len = 8104672, parsed = 0x7baa90, next = 0x7bab00, sibling = 0x7baaa0} etype = B2B_CLIENT callid_hdr = {type = 7988888, name = { s = 0x773763 "243\r\n\r\nv=0\r\no=msc2 1304065380 1304065381 IN IP4 98.158.146.111\r\ns=sip call\r\nc=IN IP4 208.54.233.250\r\nt=0 0\r\nm=audio 20432 RTP/AVP 0 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp"..., len = 13}, body = { s = 0x773317 "P/2.0/UDP 216.139.221.199;branch=z9hG4bK685f.2180555.0\r\nFrom: ;tag=c4220007433c4fe238ce1ebc27d2897b\r\nTo: sip:17047824256@68.68.122.41;tag=gK0cca7a15\r\nCall-ID: tg"..., len = -1650460702}, len = 7811900, parsed = 0x7baa40, next = 0x7baab0, sibling = 0x7baa50} from_hdr = {type = 7812736, name = {s = 0x7bae90 "### len = 8103800}, body = {s = 0x754ab0 "", len = -2}, len = 1547362760, parsed = 0x0, next = 0x79e698, sibling = 0x7bd580} to_hdr = {type = 59, name = {s = 0x4da467 "H\211D$HH\205##\213T$ L\213\\$\030\017\204\227\a", len = 20638544}, body = {s = 0x0, len = 7686824}, len = 0, parsed = 0x6, next = 0x7be178, sibling = 0x77385d} to_hdr_parsed = {error = 118, body = {s = 0x7f429f1e743c "L\213\\$\bL\213T$\020#####\017\037D", len = 838860808}, uri = {s = 0x6
, len = 20638562}, display = { s = 0xa1f53856
, len = -1577764778}, tag_value = {s = 0x7fffa1f53840 "x#{", len = 16}, parsed_uri = {user = {s = 0x7a56f8 "\002", len = 0}, passwd = { s = 0x5
, len = 8103800}, host = {s = 0x7ba778 "\0372\025", len = -1577762976}, port = {s = 0x47c33b "\211########13K \213S\004H\213s(A\017######1", len = -1577764832}, params = {s = 0x410242 "A\211##205##\a\203\r8r4", len = 4}, headers = {s = 0x14
, len = 0}, port_no = 21960, proto = 122, type = ERROR_URI_T, transport = {s = 0x0, len = 13}, ttl = {s = 0x7ba778 "\0372\025", len = 8103800}, user_param = {s = 0x7fffa1f53f60 "@@####177", len = 4702276}, maddr = {s = 0x7a45c0 "\002", len = 0}, method = { s = 0x13
, len = 8103800}, lr = {s = 0x14
, len = 4702544}, r2 = {s = 0x0, len = 0}, transport_val = {s = 0x76
, len = -1625394116}, ttl_val = {s = 0x3237383032000008
, len = 6}, user_param_val = { s = 0x13aeb62 "37 /usr/local/sbin/opensips[20872]: WARNING:core:fm_malloc: Not enough free memory, will atempt defragmenation\n", len = -1577764490}, maddr_val = {s = 0x7fffa1f53976 "", len = -1577764512}, method_val = {s = 0x3000000010
, len = -1577764144}, lr_val = {s = 0x7fffa1f53a10 "\002", len = 8180}, r2_val = { s = 0x7f429f49d300 "O##\237B\177", len = -1622537760}}, param_lst = 0x139e9d0, last_param = 0x0} from_hdr_parsed = {error = 0, body = {s = 0x0, len = 0}, uri = {s = 0x7fffa1f53650 "", len = 8103800}, display = {s = 0x7f429c924040 "H\211##N#########A\211##Dz##H\211##\215\rH\032\001", len = 8117633}, tag_value = {s = 0x25
, len = 0}, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x7f429c924150 "H\203#####\031##203##001H\203##[]A\\A]A^A_##\2130H\213P\bH\213\005z5!", len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, headers = { s = 0x7f429dc1c037 "H\203##030[]A\\A]##\211########05##,#####H\203##030[]A\\A]##\211###211###211###004#####05####213t$\b\205####7####\213T$\bE\205####\213<$\017#\027\215B##\tw#H\211#E1####\215Z#A\211##\203###03tsD\017####215L$###\001", len = 8007272}, port_no = 2584, proto = 122, type = ERROR_URI_T, transport = {s = 0x7a5bc0 "\017", len = 15}, ttl = {s = 0xfffffffb
, len = 8103800}, user_param = {s = 0x7fffa1f53af0 "x#{", len = 4266227}, maddr = {s = 0x0, len = 20563792}, method = { s = 0x13aeb50 "<132>Apr 29 14:03:37 /usr/local/sbin/opensips[20872]: WARNING:core:fm_malloc: Not enough free memory, will atempt defragmenation\n", len = 0}, lr = {s = 0x7939bf "", len = -1625414522}, r2 = {s = 0x7
, len = 115}, transport_val = { s = 0x13aeb50 "<132>Apr 29 14:03:37 /usr/local/sbin/opensips[20872]: WARNING:core:fm_malloc: Not enough free memory, will atempt defragmenation\n", len = 0}, ttl_val = {s = 0x0, len = 8019616}, user_param_val = {s = 0x7a5ea0 "H", len = 18}, maddr_val = {s = 0x1
, len = 8103800}, method_val = {s = 0x7fffa1f53c80 "`6@\\B\177", len = -1625169344}, lr_val = { s = 0x803
, len = 6325217}, r2_val = {s = 0x1
, len = 33188}}, param_lst = 0x0, last_param = 0x0} __FUNCTION__ = "b2b_tm_cback" #3 0x00007f429d9d898f in run_trans_callbacks (type=512, trans=0x7f4298f1f6c8, req=0x0, rpl=, code=) at t_hooks.c:212 params = {req = 0x0, rpl = 0x7ba778, code = 200, param = 0x7f425c35c9a8, extra1 = 0x0, extra2 = 0x0} cbp = (struct tm_callback *) 0x7f425c35c998 backup = (struct usr_avp **) 0x783308 trans_backup = (struct cell *) 0x7f4298f1f6c8 __FUNCTION__ = "run_trans_callbacks" #4 0x00007f429d9f69bc in local_reply (t=0x7f4298f1f6c8, p_msg=0x7ba778, branch=-1577763000, msg_status=, cancel_bitmap=0x7fffa1f53f48) at t_reply.c:1355 local_store = 0 local_winner = 0 reply_status = RPS_COMPLETED winning_msg = (struct sip_msg *) 0x7ba778 winning_code = 200 totag_retr = 0 __FUNCTION__ = "local_reply" #5 0x00007f429d9f80a6 in reply_received (p_msg=0x7ba778) at t_reply.c:1500 last_uac_status = branch = 0 reply_status = timer = cancel_bitmap = 0 t = (struct cell *) 0x7f4298f1f6c8 backup_list = has_reply_route = 0 __FUNCTION__ = "reply_received" #6 0x000000000042673d in forward_reply (msg=0x7ba778) at forward.c:559 new_buf = to = new_len = ---Type to continue, or q to quit--- mod = (struct sr_module *) 0x79f1f8 proto = id = send_sock = len = __FUNCTION__ = "forward_reply" #7 0x0000000000469d2d in receive_msg ( buf=0x773300 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 216.139.221.199;branch=z9hG4bK685f.2180555.0\r\nFrom: ;tag=c4220007433c4fe238ce1ebc27d2897b\r\nTo: sip:17047824256@68.68.122.41;tag="..., len=892, rcv_info=0x7fffa1f54040) at receive.c:200 msg = (struct sip_msg *) 0x7ba778 __FUNCTION__ = "receive_msg" #8 0x00000000004b9f6a in udp_rcv_loop () at udp_server.c:492 len = 892 tmp = from = (union sockaddr_union *) 0x7ba740 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {695878724, 7}, addr32 = {695878724, 0, 7, 0}, addr16 = {17476, 10618, 0, 0, 7, 0, 0, 0}, addr = "DDz)\000\000\000\000\a\000\000\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {3353185240, 0}, addr32 = {3353185240, 0, 0, 0}, addr16 = {35800, 51165, 0, 0, 0, 0, 0, 0}, addr = "##213##", '\0' }}, src_port = 5060, dst_port = 5060, proto = 1, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023##Dz)\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 695878724}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 695878724, sin6_addr = {in6_u = { u6_addr8 = '\0' , u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x79ed28} p = (callback_list *) 0x7fffa1f54048 buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 216.139.221.199;branch=z9hG4bK685f.2180555.0\r\nFrom: ;tag=c4220007433c4fe238ce1ebc27d2897b\r\nTo: sip:17047824256@68.68.122.41;tag="... __FUNCTION__ = "udp_rcv_loop" #9 0x000000000042d7df in main (argc=, argv=0x7fffa1f54218) at main.c:824 cfg_log_stderr = cfg_stream = c = r = tmp = 0x7fffa1f55ea4 "" tmp_len = port = proto = ret = seed = 858743121 rfd = __FUNCTION__ = "main" (gdb) quit t4:/usr/local/src# vim /tmp/core t4:/usr/local/src# cd opensips_1_6/ t4:/usr/local/src/opensips_1_6# svn info Path: . URL: https://opensips.svn.sourceforge.net/svnroot/opensips/branches/1.6 Repository Root: https://opensips.svn.sourceforge.net/svnroot/opensips Repository UUID: 689a6050-402a-0410-94f2-e92a70836424 Revision: 7904 Node Kind: directory Schedule: normal Last Changed Author: vladut-paiu Last Changed Rev: 7892 Last Changed Date: 2011-04-20 14:34:15 +0000 (Wed, 20 Apr 2011) t4:/usr/local/src/opensips_1_6# cat /tmp/core Core was generated by `/usr/local/sbin/opensips -P /var/run/opensips/opensips.pid -m 1024 -u root -g r'. Program terminated with signal 11, Segmentation fault. [New process 20872] #0 0x00007f429c91c14d in entity_add_dlginfo (entity=0x7f425c429838, dlginfo=0x7fffa1f53c80) at logic.c:85 85 memset(new_dlginfo, 0, size); (gdb) bt #0 0x00007f429c91c14d in entity_add_dlginfo (entity=0x7f425c429838, dlginfo=0x7fffa1f53c80) at logic.c:85 #1 0x00007f429c920f60 in b2b_add_dlginfo (key=, entity_key=0x783338, src=, dlginfo=0x7fffa1f53c80) at logic.c:136 #2 0x00007f429cb522fa in b2b_tm_cback (t=0x7f4298f1f6c8, htable=0x7f425c22e440, ps=) at dlg.c:2252 #3 0x00007f429d9d898f in run_trans_callbacks (type=512, trans=0x7f4298f1f6c8, req=0x0, rpl=, code=) at t_hooks.c:212 #4 0x00007f429d9f69bc in local_reply (t=0x7f4298f1f6c8, p_msg=0x7ba778, branch=-1577763000, msg_status=, cancel_bitmap=0x7fffa1f53f48) at t_reply.c:1355 #5 0x00007f429d9f80a6 in reply_received (p_msg=0x7ba778) at t_reply.c:1500 #6 0x000000000042673d in forward_reply (msg=0x7ba778) at forward.c:559 #7 0x0000000000469d2d in receive_msg ( buf=0x773300 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 216.139.221.199;branch=z9hG4bK685f.2180555.0\r\nFrom: ;tag=c4220007433c4fe238ce1ebc27d2897b\r\nTo: sip:17047824256@68.68.122.41;tag="..., len=892, rcv_info=0x7fffa1f54040) at receive.c:200 #8 0x00000000004b9f6a in udp_rcv_loop () at udp_server.c:492 #9 0x000000000042d7df in main (argc=, argv=0x7fffa1f54218) at main.c:824 (gdb) bt full #0 0x00007f429c91c14d in entity_add_dlginfo (entity=0x7f425c429838, dlginfo=0x7fffa1f53c80) at logic.c:85 new_dlginfo = (b2b_dlginfo_t *) 0x0 size = 107 __FUNCTION__ = "entity_add_dlginfo" #1 0x00007f429c920f60 in b2b_add_dlginfo (key=, entity_key=0x783338, src=, dlginfo=0x7fffa1f53c80) at logic.c:136 tuple = entity = (b2bl_entity_id_t *) 0x7f425c429838 hash_index = 1831 local_index = 0 __FUNCTION__ = "b2b_add_dlginfo" #2 0x00007f429cb522fa in b2b_tm_cback (t=0x7f4298f1f6c8, htable=0x7f425c22e440, ps=) at dlg.c:2252 dlginfo = {callid = { s = 0x7f425c403660 "tgw4.1831.7474335sip:18778093323@sipvoice.comsip:17047824256@68.68.122.41c4220007433c4fe238ce1ebc27d2897bgK0cca7a15sip:216.139.221.199:5060;transport=udpsip:17047824256@68.68.122.41:50601831."..., len = 17}, fromtag = { s = 0x7733c8 "gK0cca7a15\r\nCall-ID: tgw4.1831.7474335\r\nCSeq: 103 INVITE\r\nAccept: application/sdp, application/isup, application/dtmf, application/dtmf-relay, multipart/mixed\r\nContact: msg = (struct sip_msg *) 0x7ba778 b2b_key = (str *) 0x7f425fca07e8 hash_index = 0 local_index = 7474335 b2b_cback = (b2b_notify_t) 0x7f429c92af23 dlg = (b2b_dlg_t *) 0x7f425c403508 param = {s = 0x7bbbe8 "1831.0", len = 6} statuscode = leg = pto = TO = {error = -1622537760, body = {s = 0xffffff01
, len = 0}, uri = {s = 0x7fffa1f53bd0 "\200##", len = -1650460917}, display = { s = 0x7f429f1c9ad8 "H\205##\211##4\203=A#-", len = 15}, tag_value = {s = 0x7f429f26d07a "/etc/localtime", len = -255}, parsed_uri = {user = {s = 0x0, len = -1577763888}, passwd = { s = 0x7f429d9ff70b "ERROR:tm:%s: new_t failed\n", len = 20572640}, host = {s = 0x13aeba0 "t enough free memory, will atempt defragmenation\n", len = 132192}, port = { s = 0x13aebb0 "mory, will atempt defragmenation\n", len = 20646736}, params = {s = 0x7f429f4a09e0 "", len = 7811887}, headers = {s = 0xd
, len = 0}, port_no = 2896, proto = 315, type = ERROR_URI_T, transport = {s = 0x3b
, len = 7812290}, ttl = {s = 0x3b
, len = 5088359}, user_param = {s = 0x7bcfe0 "\n", len = 1}, maddr = {s = 0x0, len = 8017656}, method = {s = 0x2
, len = 0}, lr = {s = 0x7ba778 "\0372\025", len = 8103800}, r2 = {s = 0x7fffa1f53f60 "@@####177", len = 4708829}, transport_val = {s = 0x2
, len = 8017736}, ttl_val = {s = 0x4
, len = 0}, user_param_val = {s = 0x7ba778 "\0372\025", len = 4708789}, maddr_val = {s = 0x2
, len = 8017816}, method_val = {s = 0x3
, len = 0}, lr_val = {s = 0x7ba778 "\0372\025", len = 4708748}, r2_val = {s = 0x2
, len = 7997976}}, param_lst = 0x7a5bc0, last_param = 0xe} to_tag = { s = 0x7733c8 "gK0cca7a15\r\nCall-ID: tgw4.1831.7474335\r\nCSeq: 103 INVITE\r\nAccept: application/sdp, application/isup, application/dtmf, application/dtmf-relay, multipart/mixed\r\nContact: \r\nAllow: INVITE,"..., len = 17} from_tag = { s = 0x773381 "c4220007433c4fe238ce1ebc27d2897b\r\nTo: sip:17047824256@68.68.122.41;tag=gK0cca7a15\r\nCall-ID: tgw4.1831.7474335\r\nCSeq: 103 INVITE\r\nAccept: application/sdp, application/isup, application/dtmf, applicatio"..., len = 32} hdr = method_id = 1 dummy_msg = {id = 20638562, first_line = {type = -1577766666, len = 0, u = {request = {method = {s = 0x7fffa1f530f6 "", len = -1577766688}, uri = { s = 0x3000000010
, len = -1577766320}, version = {s = 0x7fffa1f53190 "@###001", len = 8180}, method_value = -1622551808}, reply = {version = { s = 0x7fffa1f530f6 "", len = -1577766688}, status = {s = 0x3000000010
, len = -1577766320}, reason = {s = 0x7fffa1f53190 "@###001", len = 8180}, statuscode = 2672415488}}}, via1 = 0x200002010, via2 = 0x139e9d0, headers = 0x0, last_header = 0x7f429f4a09e0, parsed_flag = 4294967041, h_via1 = 0x0, h_via2 = 0x7fffa1f53350, callid = 0x7f429c931a68, to = 0x7f429f1c9ad8, cseq = 0xf, from = 0x7f429f26d07a, contact = 0xffffff01, maxforwards = 0x0, route = 0x3733a1f53350, record_route = 0x7f429c931a68, path = 0x139e9e0, content_type = 0x13aebe0, content_length = 0x20420, authorization = 0x13aebf0, expires = 0x13b0b50, proxy_auth = 0x7f429f4a09e0, supported = 0x1e4b0, proxy_require = 0x7f429f1c7768, unsupported = 0x3000000010, allow = 0x13b0b50, event = 0x13b0b50, accept = 0x2010, accept_language = 0x7f429f4a09e0, organization = 0x2010, priority = 0x13aeb50, subject = 0x7f429f1c948f, user_agent = 0x7fffa1f53190, content_disposition = 0x1ffb, accept_disposition = 0x13aeb40, diversion = 0x91, rpid = 0x13aeb50, refer_to = 0x7f429f4a09e0, session_expires = 0x1, min_se = 0x2010, ppi = 0x0, pai = 0x7f429f1ca01f, privacy = 0x7fffa1f5322c, call_info = 0x7fffa1f53300, sdp = 0x139f040, multi = 0x7f429f4a09e0, eoh = 0x139f040 "@\nJ\237B\177", unparsed = 0x0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {139924116998624, 139924116998624}, addr32 = {2672429536, 32578, 2672429536, 32578}, addr16 = {2528, 40778, 32578, 0, 2528, 40778, 32578, 0}, addr = "###J\237B\177\000\000###J\237B\177\000"}}, dst_ip = {af = 20574272, len = 0, u = {addrl = {21, 0}, addr32 = {21, 0, 0, 0}, addr16 = {21, 0, 0, 0, 0, 0, 0, 0}, addr = "\025", '\0' }}, src_port = 13136, dst_port = 41461, proto = 32767, proto_reserved1 = -1625523530, proto_reserved2 = 32578, src_su = {s = {sa_family = 21, sa_data = "\000\000\000\000\000\000####237B\177\000"}, sin = {sin_family = 21, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "####237B\177\000"}, sin6 = {sin6_family = 21, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {in6_u = {u6_addr8 = "####237B\177\000\000%\000\000\000\003\000\000", u6_addr16 = {56818, 40737, 32578, 0, 37, 0, 3, 0}, u6_addr32 = {2669796850, 32578, 37, 3}}}, sin6_scope_id = 14}}, bind_address = 0x6f00000003}, buf = 0x7600000005
, len = 0, new_uri = {s = 0x0, len = 20572624}, dst_uri = { s = 0x7fffa1f53360 "p3####177", len = -1577766240}, parsed_uri_ok = 1543091176, parsed_uri = {user = {s = 0x2525252525252525
, len = 38}, passwd = { s = 0x7f429c936380 "b2bl_insert_new", len = 0}, host = {s = 0x7f429bf93000
, len = 0}, port = { s = 0x13aeb50 "<132>Apr 29 14:03:37 /usr/local/sbin/opensips[20872]: WARNING:core:fm_malloc: Not enough free memory, will atempt defragmenation\n", len = 0}, params = { s = 0xd
, len = 7811887}, headers = {s = 0x0, len = 144}, port_no = 60240, proto = 314, type = ERROR_URI_T, transport = {s = 0x4dbac539
, len = 7812384}, ttl = {s = 0x754aa8 "###[B\177", len = 0}, user_param = {s = 0x7ba778 "\0372\025", len = 7686832}, maddr = {s = 0xb76
, len = 1543091176}, method = { s = 0x7f429f21e240 "H\201##", len = 24}, lr = {s = 0x7fffa1f53430 " ", len = -1577766032}, r2 = {s = 0x0, len = 8103800}, transport_val = {s = 0x7f429c91eb22 "\211##\213\204$\220", len = -1668064496}, ttl_val = {s = 0x13aebc0 "t defragmenation\n", len = 20638544}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 13}, method_val = {s = 0x7ba778 "\0372\025", len = 0}, lr_val = {s = 0x269f26d8f6
, len = 0}, r2_val = {s = 0x0, len = -1577765504}}, parsed_orig_ruri_ok = 8103800, parsed_orig_ruri = {user = {s = 0x0, len = 4096}, passwd = {s = 0x0, len = 8103800}, host = {s = 0x0, len = 2934}, port = {s = 0x754aa8 "###[B\177", len = -1668149978}, params = {s = 0x20
, len = -1577763888}, headers = {s = 0x7f429d9ff70b "ERROR:tm:%s: new_t failed\n", len = -1577765504}, port_no = 13056, proto = 119, type = ERROR_URI_T, transport = { s = 0x6
, len = -9}, ttl = {s = 0x25
, len = -1577764744}, user_param = {s = 0x0, len = 7811847}, maddr = {s = 0x0, len = -1}, method = { s = 0x2100000000
, len = -1650460907}, lr = {s = 0x7f429d9ff714 "%s: new_t failed\n", len = 0}, r2 = {s = 0x7fffa1f53998 "####001", len = 0}, transport_val = { s = 0x0, len = -1577765488}, ttl_val = {s = 0x7f429a92c070 "sip:216.139.221.199:5060;transport=udp80#", len = 38}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0xf
, len = 32}, lr_val = {s = 0x0, len = -1577765552}, r2_val = {s = 0x7f4200000020
, len = -1701658105}}, add_rm = 0x2e, body_lumps = 0x7f429a92c1fd, reply_lump = 0xa, add_to_branch_s = "890a6ebed992b37afabd69b28c7a6f18\2344w\000\000\000\000\000%\000\000\000\000\000\000\000\220##\000\000\000\000\0005", add_to_branch_len = 0, hash_index = 2717202840, flags = 32767, msg_flags = 32, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, path_vec = { s = 0x7f429a92c168 "x##222\232B\177", len = 0}} cb = {error = 59, number = {s = 0x4da467 "H\211D$HH\205##\213T$ L\213\\$\030\017\204\227\a", len = -1577762640}, method = {s = 0x4e1bcc "\205##1##205X\002", len = 8103800}, method_id = 7812732} cseq = {type = 8104544, name = {s = 0x7baad0 "", len = 8104576}, body = {s = 0x7baaf0 "", len = 8104560}, len = 8104672, parsed = 0x7baa90, next = 0x7bab00, sibling = 0x7baaa0} etype = B2B_CLIENT callid_hdr = {type = 7988888, name = { s = 0x773763 "243\r\n\r\nv=0\r\no=msc2 1304065380 1304065381 IN IP4 98.158.146.111\r\ns=sip call\r\nc=IN IP4 208.54.233.250\r\nt=0 0\r\nm=audio 20432 RTP/AVP 0 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmtp"..., len = 13}, body = { s = 0x773317 "P/2.0/UDP 216.139.221.199;branch=z9hG4bK685f.2180555.0\r\nFrom: ;tag=c4220007433c4fe238ce1ebc27d2897b\r\nTo: sip:17047824256@68.68.122.41;tag=gK0cca7a15\r\nCall-ID: tg"..., len = -1650460702}, len = 7811900, parsed = 0x7baa40, next = 0x7baab0, sibling = 0x7baa50} from_hdr = {type = 7812736, name = {s = 0x7bae90 "### len = 8103800}, body = {s = 0x754ab0 "", len = -2}, len = 1547362760, parsed = 0x0, next = 0x79e698, sibling = 0x7bd580} to_hdr = {type = 59, name = {s = 0x4da467 "H\211D$HH\205##\213T$ L\213\\$\030\017\204\227\a", len = 20638544}, body = {s = 0x0, len = 7686824}, len = 0, parsed = 0x6, next = 0x7be178, sibling = 0x77385d} to_hdr_parsed = {error = 118, body = {s = 0x7f429f1e743c "L\213\\$\bL\213T$\020#####\017\037D", len = 838860808}, uri = {s = 0x6
, len = 20638562}, display = { s = 0xa1f53856
, len = -1577764778}, tag_value = {s = 0x7fffa1f53840 "x#{", len = 16}, parsed_uri = {user = {s = 0x7a56f8 "\002", len = 0}, passwd = { s = 0x5
, len = 8103800}, host = {s = 0x7ba778 "\0372\025", len = -1577762976}, port = {s = 0x47c33b "\211########13K \213S\004H\213s(A\017######1", len = -1577764832}, params = {s = 0x410242 "A\211##205##\a\203\r8r4", len = 4}, headers = {s = 0x14
, len = 0}, port_no = 21960, proto = 122, type = ERROR_URI_T, transport = {s = 0x0, len = 13}, ttl = {s = 0x7ba778 "\0372\025", len = 8103800}, user_param = {s = 0x7fffa1f53f60 "@@####177", len = 4702276}, maddr = {s = 0x7a45c0 "\002", len = 0}, method = { s = 0x13
, len = 8103800}, lr = {s = 0x14
, len = 4702544}, r2 = {s = 0x0, len = 0}, transport_val = {s = 0x76
, len = -1625394116}, ttl_val = {s = 0x3237383032000008
, len = 6}, user_param_val = { s = 0x13aeb62 "37 /usr/local/sbin/opensips[20872]: WARNING:core:fm_malloc: Not enough free memory, will atempt defragmenation\n", len = -1577764490}, maddr_val = {s = 0x7fffa1f53976 "", len = -1577764512}, method_val = {s = 0x3000000010
, len = -1577764144}, lr_val = {s = 0x7fffa1f53a10 "\002", len = 8180}, r2_val = { s = 0x7f429f49d300 "O##\237B\177", len = -1622537760}}, param_lst = 0x139e9d0, last_param = 0x0} from_hdr_parsed = {error = 0, body = {s = 0x0, len = 0}, uri = {s = 0x7fffa1f53650 "", len = 8103800}, display = {s = 0x7f429c924040 "H\211##N#########A\211##Dz##H\211##\215\rH\032\001", len = 8117633}, tag_value = {s = 0x25
, len = 0}, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x7f429c924150 "H\203#####\031##203##001H\203##[]A\\A]A^A_##\2130H\213P\bH\213\005z5!", len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, headers = { s = 0x7f429dc1c037 "H\203##030[]A\\A]##\211########05##,#####H\203##030[]A\\A]##\211###211###211###004#####05####213t$\b\205####7####\213T$\bE\205####\213<$\017#\027\215B##\tw#H\211#E1####\215Z#A\211##\203###03tsD\017####215L$###\001", len = 8007272}, port_no = 2584, proto = 122, type = ERROR_URI_T, transport = {s = 0x7a5bc0 "\017", len = 15}, ttl = {s = 0xfffffffb
, len = 8103800}, user_param = {s = 0x7fffa1f53af0 "x#{", len = 4266227}, maddr = {s = 0x0, len = 20563792}, method = { s = 0x13aeb50 "<132>Apr 29 14:03:37 /usr/local/sbin/opensips[20872]: WARNING:core:fm_malloc: Not enough free memory, will atempt defragmenation\n", len = 0}, lr = {s = 0x7939bf "", len = -1625414522}, r2 = {s = 0x7
, len = 115}, transport_val = { s = 0x13aeb50 "<132>Apr 29 14:03:37 /usr/local/sbin/opensips[20872]: WARNING:core:fm_malloc: Not enough free memory, will atempt defragmenation\n", len = 0}, ttl_val = {s = 0x0, len = 8019616}, user_param_val = {s = 0x7a5ea0 "H", len = 18}, maddr_val = {s = 0x1
, len = 8103800}, method_val = {s = 0x7fffa1f53c80 "`6@\\B\177", len = -1625169344}, lr_val = { s = 0x803
, len = 6325217}, r2_val = {s = 0x1
, len = 33188}}, param_lst = 0x0, last_param = 0x0} __FUNCTION__ = "b2b_tm_cback" #3 0x00007f429d9d898f in run_trans_callbacks (type=512, trans=0x7f4298f1f6c8, req=0x0, rpl=, code=) at t_hooks.c:212 params = {req = 0x0, rpl = 0x7ba778, code = 200, param = 0x7f425c35c9a8, extra1 = 0x0, extra2 = 0x0} cbp = (struct tm_callback *) 0x7f425c35c998 backup = (struct usr_avp **) 0x783308 trans_backup = (struct cell *) 0x7f4298f1f6c8 __FUNCTION__ = "run_trans_callbacks" #4 0x00007f429d9f69bc in local_reply (t=0x7f4298f1f6c8, p_msg=0x7ba778, branch=-1577763000, msg_status=, cancel_bitmap=0x7fffa1f53f48) at t_reply.c:1355 local_store = 0 local_winner = 0 reply_status = RPS_COMPLETED winning_msg = (struct sip_msg *) 0x7ba778 winning_code = 200 totag_retr = 0 __FUNCTION__ = "local_reply" #5 0x00007f429d9f80a6 in reply_received (p_msg=0x7ba778) at t_reply.c:1500 last_uac_status = branch = 0 reply_status = timer = cancel_bitmap = 0 t = (struct cell *) 0x7f4298f1f6c8 backup_list = has_reply_route = 0 __FUNCTION__ = "reply_received" #6 0x000000000042673d in forward_reply (msg=0x7ba778) at forward.c:559 new_buf = to = new_len = mod = (struct sr_module *) 0x79f1f8 proto = id = send_sock = len = __FUNCTION__ = "forward_reply" #7 0x0000000000469d2d in receive_msg ( buf=0x773300 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 216.139.221.199;branch=z9hG4bK685f.2180555.0\r\nFrom: ;tag=c4220007433c4fe238ce1ebc27d2897b\r\nTo: sip:17047824256@68.68.122.41;tag="..., len=892, rcv_info=0x7fffa1f54040) at receive.c:200 msg = (struct sip_msg *) 0x7ba778 __FUNCTION__ = "receive_msg" #8 0x00000000004b9f6a in udp_rcv_loop () at udp_server.c:492 len = 892 tmp = from = (union sockaddr_union *) 0x7ba740 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {695878724, 7}, addr32 = {695878724, 0, 7, 0}, addr16 = {17476, 10618, 0, 0, 7, 0, 0, 0}, addr = "DDz)\000\000\000\000\a\000\000\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {3353185240, 0}, addr32 = {3353185240, 0, 0, 0}, addr16 = {35800, 51165, 0, 0, 0, 0, 0, 0}, addr = "##213##", '\0' }}, src_port = 5060, dst_port = 5060, proto = 1, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023##Dz)\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 695878724}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 695878724, sin6_addr = {in6_u = { u6_addr8 = '\0' , u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x79ed28} p = (callback_list *) 0x7fffa1f54048 buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 216.139.221.199;branch=z9hG4bK685f.2180555.0\r\nFrom: ;tag=c4220007433c4fe238ce1ebc27d2897b\r\nTo: sip:17047824256@68.68.122.41;tag="... __FUNCTION__ = "udp_rcv_loop" #9 0x000000000042d7df in main (argc=, argv=0x7fffa1f54218) at main.c:824 cfg_log_stderr = cfg_stream = c = r = tmp = 0x7fffa1f55ea4 "" tmp_len = port = proto = ret = seed = 858743121 rfd = __FUNCTION__ = "main"