Advertisement
Guest User

Untitled

a guest
Sep 20th, 2016
121
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 13.09 KB | None | 0 0
  1. GNU gdb (GDB) Red Hat Enterprise Linux 7.6.1-80.el7
  2. Copyright (C) 2013 Free Software Foundation, Inc.
  3. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
  4. This is free software: you are free to change and redistribute it.
  5. There is NO WARRANTY, to the extent permitted by law. Type "show copying"
  6. and "show warranty" for details.
  7. This GDB was configured as "x86_64-redhat-linux-gnu".
  8. For bug reporting instructions, please see:
  9. <http://www.gnu.org/software/gdb/bugs/>...
  10. Reading symbols from /usr/sbin/opensips...done.
  11. [New LWP 11507]
  12. [Thread debugging using libthread_db enabled]
  13. Using host libthread_db library "/lib64/libthread_db.so.1".
  14. Core was generated by `/usr/sbin/opensips -P /var/run/opensips/opensips.pid -f /etc/opensips/opensips.'.
  15. Program terminated with signal 11, Segmentation fault.
  16. #0 0x00000000004d30b0 in hostent2su (port=<optimized out>, idx=<optimized out>, he=<optimized out>, su=0x7efc411b4678) at net/../ip_addr.h:378
  17. 378 memcpy(&su->sin.sin_addr, he->h_addr_list[idx], he->h_length);
  18. Missing separate debuginfos, use: debuginfo-install bzip2-libs-1.0.6-13.el7.x86_64 elfutils-libelf-0.163-3.el7.x86_64 freetds-0.95.81-1.el7.x86_64 glibc-2.17-106.el7_2.8.x86_64 gmp-6.0.0-12.el7_1.x86_64 gnutls-3.3.8-14.el7_2.x86_64 keyutils-libs-1.5.8-3.el7.x86_64 krb5-libs-1.13.2-12.el7_2.x86_64 libacl-2.2.51-12.el7.x86_64 libattr-2.4.46-12.el7.x86_64 libcap-2.22-8.el7.x86_64 libcom_err-1.42.9-7.el7.x86_64 libdb-5.3.21-19.el7.x86_64 libffi-3.0.13-16.el7.x86_64 libgcc-4.8.5-4.el7.x86_64 libgcrypt-1.5.3-12.el7_1.1.x86_64 libgpg-error-1.12-3.el7.x86_64 libselinux-2.2.2-6.el7.x86_64 libstdc++-4.8.5-4.el7.x86_64 libtasn1-3.8-2.el7.x86_64 libtool-ltdl-2.4.2-21.el7_2.x86_64 lm_sensors-libs-3.3.4-11.el7.x86_64 lua-5.1.4-14.el7.x86_64 mariadb-libs-5.5.50-1.el7_2.x86_64 net-snmp-agent-libs-5.7.2-24.el7_2.1.x86_64 net-snmp-libs-5.7.2-24.el7_2.1.x86_64 nettle-2.7.1-4.el7.x86_64 nspr-4.11.0-1.el7_2.x86_64 nss-3.21.0-9.el7_2.x86_64 nss-softokn-freebl-3.16.2.3-14.2.el7_2.x86_64 nss-util-3.21.0-2.2.el7_2.x86_64 openssl-libs-1.0.1e-51.el7_2.5.x86_64 p11-kit-0.20.7-3.el7.x86_64 pcre-8.32-15.el7_2.1.x86_64 perl-libs-5.16.3-286.el7.x86_64 popt-1.13-16.el7.x86_64 rpm-libs-4.11.3-17.el7.x86_64 tcp_wrappers-libs-7.6-77.el7.x86_64 trousers-0.3.13-1.el7.x86_64 unixODBC-2.3.1-11.el7.x86_64 xz-libs-5.1.2-12alpha.el7.x86_64 zlib-1.2.7-15.el7.x86_64
  19. (gdb) bt full
  20. #0 0x00000000004d30b0 in hostent2su (port=<optimized out>, idx=<optimized out>, he=<optimized out>, su=0x7efc411b4678) at net/../ip_addr.h:378
  21. port = <optimized out>
  22. he = <optimized out>
  23. su = 0x7efc411b4678
  24. #1 get_next_su (p=<optimized out>, su=su@entry=0x7efc411b4678, add_to_bl=add_to_bl@entry=1) at resolve.c:2024
  25. list = 0x7efc4126e8a0
  26. ip_net = {ip = {af = 4107337695, len = 32764, u = {addrl = {18, 139621861858816}, addr32 = {18, 0, 1065000448, 32508}, addr16 = {18, 0, 0, 0, 40448, 16250, 32508, 0},
  27. addr = "\022\000\000\000\000\000\000\000\000\236z?\374~\000"}}, mask = {af = 131072, len = 0, u = {addrl = {139621879899520, 18}, addr32 = {1083041152, 32508, 18, 0}, addr16 = {58752, 16525, 32508, 0, 18, 0, 0, 0},
  28. addr = "\200\345\215@\374~\000\000\022\000\000\000\000\000\000"}}}
  29. n = <optimized out>
  30. __FUNCTION__ = "get_next_su"
  31. #2 0x00007efc40669060 in do_dns_failover (t=t@entry=0x7efc411b4480) at t_reply.c:635
  32. faked_req = {id = 0, first_line = {type = 0, len = 0, u = {request = {method = {s = 0x0, len = 0}, uri = {s = 0x0, len = 0}, version = {s = 0x0, len = 0}, method_value = 0}, reply = {version = {s = 0x0, len = 0}, status = {
  33. s = 0x0, len = 0}, reason = {s = 0x0, len = 0}, statuscode = 0}}}, via1 = 0x0, via2 = 0x0, headers = 0x0, last_header = 0x0, parsed_flag = 0, h_via1 = 0x0, h_via2 = 0x0, callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0,
  34. contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, path = 0x0, content_type = 0x0, content_length = 0x0, authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x0, proxy_require = 0x0,
  35. unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x0, content_disposition = 0x0, accept_disposition = 0x0, diversion = 0x0,
  36. rpid = 0x0, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, ppi = 0x0, pai = 0x0, privacy = 0x0, call_info = 0x0, www_authenticate = 0x0, proxy_authenticate = 0x0, min_expires = 0x0, sdp = 0x0, multi = 0x0, eoh = 0x0,
  37. unparsed = 0x0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0,
  38. 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0,
  39. sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {
  40. __in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x0}, buf = 0x0, len = 0, new_uri = {s = 0x0, len = 0},
  41. dst_uri = {s = 0x0, len = 0}, ruri_q = 0, ruri_bflags = 0, force_send_socket = 0x0, path_vec = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0,
  42. len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0,
  43. len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0},
  44. user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}, u_name = {{s = 0x0, len = 0}, {
  45. s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}}, u_val = {{s = 0x0, len = 0}, {s = 0x0,
  46. len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}}, u_params_no = 0}, parsed_orig_ruri_ok = 0,
  47. parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0,
  48. type = ERROR_URI_T, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {
  49. s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0},
  50. r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}, u_name = {{s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0,
  51. len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}}, u_val = {{s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0},
  52. {s = 0x0, len = 0}, {s = 0x0, len = 0}}, u_params_no = 0}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = '\000' <repeats 57 times>, add_to_branch_len = 0, hash_index = 0, flags = 0, msg_flags = 0,
  53. set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, msg_cb = 0x0}
  54. shmem_msg = <optimized out>
  55. uac = 0x7efc411b4658
  56. dialog = {id = {call_id = {s = 0x7efc3f7ab320 <acc_env> "\230\001", len = -1}, rem_tag = {s = 0x0, len = 1062712186}, loc_tag = {s = 0x1d7c670 "", len = 1624580176}}, loc_seq = {value = 46, is_set = 0 '\000'}, rem_seq = {
  57. value = 0, is_set = 0 '\000'}, loc_uri = {s = 0x0, len = 1641360375}, rem_uri = {s = 0x1ff5 <Address 0x1ff5 out of bounds>, len = 30910064}, obp = {s = 0x7efc620bc760 <main_arena> "", len = 30910048}, forced_to_su = {s = {
  58. sa_family = 616, sa_data = "\321\364\374\177\000\000\000\244\327\001\000\000\000"}, sin = {sin_family = 616, sin_port = 62673, sin_addr = {s_addr = 32764}, sin_zero = "\000\244\327\001\000\000\000"}, sin6 = {
  59. sin6_family = 616, sin6_port = 62673, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 = "\000\244\327\001\000\000\000\000`\307\vb\374~\000", __u6_addr16 = {41984, 471, 0, 0, 51040, 25099, 32508, 0},
  60. __u6_addr32 = {30909440, 0, 1644939104, 32508}}}, sin6_scope_id = 134144}}, rem_target = {s = 0x0, len = 32}, loc_dname = {s = 0x7efc411adba0 "", len = -187629232}, rem_dname = {s = 0x7efc411adba0 "", len = 77900000},
  61. T_flags = 4, state = DLG_NEW, route_set = 0x7efc40f8a3f0, hooks = {ru = {s = 0x7efc411adce8 " \244\370@\374~", len = 1092264320}, nh = {s = 0x7efc408f4100 <detached_timer> "", len = 1080842932}, request_uri = 0x198,
  62. next_hop = 0x5, first_route = 0x7efc411adba0, last_route = 0x7efc4066897f <free_faked_req+557>}, send_sock = 0x0, dialog_ctx = 0x7efc411adba0, avps = 0xffffffff}
  63. ret = <optimized out>
  64. sip_msg_len = 1091601800
  65. __FUNCTION__ = "do_dns_failover"
  66. #3 0x00007efc4066ec49 in t_should_relay_response (reply=0xffffffffffffffff, cancel_bitmap=0x7ffcf4d102f0, should_relay=<synthetic pointer>, should_store=<synthetic pointer>, branch=0, new_code=408, Trans=0x7efc411b4480)
  67. at t_reply.c:901
  68. branch_cnt = 1
  69. inv_through = <optimized out>
  70. do_cancel = <optimized out>
  71. #4 relay_reply (t=t@entry=0x7efc411b4480, p_msg=p_msg@entry=0xffffffffffffffff, branch=0, msg_status=msg_status@entry=408, cancel_bitmap=cancel_bitmap@entry=0x7ffcf4d102f0) at t_reply.c:1125
  72. relay = <optimized out>
  73. save_clone = <optimized out>
  74. buf = 0x0
  75. res_len = 0
  76. relayed_code = 0
  77. relayed_msg = 0x0
  78. bm = {to_tag_val = {s = 0x1 <Address 0x1 out of bounds>, len = 0}}
  79. totag_retr = 0
  80. uas_rb = <optimized out>
  81. cb_s = {s = 0x7efc4145fd58 "@\243\370@\374~", len = 1080845880}
  82. text = {s = 0x2 <Address 0x2 out of bounds>, len = 1090036496}
  83. __FUNCTION__ = "relay_reply"
  84. #5 0x00007efc406c6eb1 in fake_reply (code=408, branch=<optimized out>, t=0x7efc411b4480) at timer.c:260
  85. ---Type <return> to continue, or q <return> to quit---
  86. cancel_bitmap = 0
  87. do_cancel_branch = <optimized out>
  88. reply_status = <optimized out>
  89. #6 final_response_handler (fr_tl=<optimized out>) at timer.c:391
  90. old_ctx = <optimized out>
  91. my_ctx = 0x7efc60d551d8
  92. r_buf = <optimized out>
  93. t = 0x7efc411b4480
  94. #7 timer_routine (ticks=<optimized out>, set=<optimized out>) at timer.c:1066
  95. tl = <optimized out>
  96. tmp_tl = 0x7efc412f1a08
  97. id = <optimized out>
  98. __FUNCTION__ = "timer_routine"
  99. #8 0x00000000004a050b in handle_timer_job () at timer.c:632
  100. t = 0x7efc40f8a610
  101. l = <optimized out>
  102. __FUNCTION__ = "handle_timer_job"
  103. #9 0x000000000059702f in handle_io (idx=<optimized out>, event_type=<optimized out>, fm=<optimized out>) at net/net_udp.c:264
  104. No locals.
  105. #10 io_wait_loop_epoll (h=<optimized out>, t=<optimized out>, repeat=<optimized out>) at net/../io_wait_loop.h:225
  106. ret = <optimized out>
  107. e = <optimized out>
  108. n = 2
  109. r = 1
  110. #11 udp_rcv_loop (si=si@entry=0x7efc60d08688) at net/net_udp.c:308
  111. __FUNCTION__ = "udp_rcv_loop"
  112. #12 0x00000000005985a8 in udp_start_processes (chd_rank=chd_rank@entry=0x8427a0 <chd_rank.11021>, startup_done=startup_done@entry=0x0) at net/net_udp.c:372
  113. si = 0x7efc60d08688
  114. load_p = 0x7efc41071cb0
  115. pid = <optimized out>
  116. i = <optimized out>
  117. __FUNCTION__ = "udp_start_processes"
  118. #13 0x0000000000419ee0 in main_loop () at main.c:671
  119. startup_done = 0x0
  120. chd_rank = 6
  121. #14 main (argc=<optimized out>, argv=<optimized out>) at main.c:1249
  122. cfg_stream = <optimized out>
  123. c = <optimized out>
  124. r = <optimized out>
  125. tmp = 0x7ffcf4d11f66 ""
  126. tmp_len = <optimized out>
  127. port = <optimized out>
  128. proto = <optimized out>
  129. protos_no = <optimized out>
  130. options = 0x5db090 "f:cCm:M:b:l:n:N:rRvdDFETSVhw:t:u:g:P:G:W:o:"
  131. ret = -1
  132. seed = 62181177
  133. rfd = <optimized out>
  134. __FUNCTION__ = "main"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement