Core was generated by `/usr/local/sbin/opensips -P /var/run/opensips/opensips.pid -m 1024 -u root -g r'. Program terminated with signal 11, Segmentation fault. [New process 22526] #0 0x00000000004c0e46 in fm_malloc (qm=0x795f00, size=0) at mem/f_malloc.c:172 172 *pf=n->u.nxt_free; (gdb) bt #0 0x00000000004c0e46 in fm_malloc (qm=0x795f00, size=0) at mem/f_malloc.c:172 #1 0x0000000000466782 in subst_run (se=0x7f4c30, input=, msg=0x805118, count=0x7fffa9ff1c48) at re.c:480 #2 0x0000000000466ff9 in subst_str (input=0x7f7cf89e9466 "30230#+52223710400077", msg=, se=0x1195d00, count=0x7fffa9ff1c48) at re.c:599 #3 0x00007f7d32557c38 in ops_subst (msg=0x805118, src=0x7f1360, se=0x7f4c30) at avpops_impl.c:1404 #4 0x00000000004118f3 in do_action (a=0x7b46f8, msg=0x805118) at action.c:1195 #5 0x0000000000410242 in run_action_list (a=, msg=0x805118) at action.c:140 #6 0x00000000004135d8 in do_action (a=0x7c24b0, msg=0x805118) at action.c:819 #7 0x0000000000410242 in run_action_list (a=, msg=0x805118) at action.c:140 #8 0x00000000004135d8 in do_action (a=0x7c2588, msg=0x805118) at action.c:819 #9 0x0000000000410242 in run_action_list (a=, msg=0x805118) at action.c:140 #10 0x00000000004151a4 in run_top_route (a=0x7a3e20, msg=0x805118) at action.c:120 #11 0x0000000000469ba0 in receive_msg ( buf=0x773300 "INVITE sip:30230#+52223710400077@74.121.80.38 SIP/2.0\r\nRecord-Route: \r\nFrom: ;ta"..., len=989, rcv_info=0x7fffa9ff2a80) at receive.c:162 #12 0x00000000004b9eaa in udp_rcv_loop () at udp_server.c:492 #13 0x000000000042d7df in main (argc=, argv=0x7fffa9ff2c58) at main.c:824 (gdb) bt full #0 0x00000000004c0e46 in fm_malloc (qm=0x795f00, size=0) at mem/f_malloc.c:172 frag = (struct fm_frag *) 0x1195d00 n = hash = __FUNCTION__ = "fm_malloc" #1 0x0000000000466782 in subst_run (se=0x7f4c30, input=, msg=0x805118, count=0x7fffa9ff1c48) at re.c:480 head = (struct replace_lst *) 0x1195e58 crt = (struct replace_lst **) 0x7fffa9ff1b68 p = r = pmatch = (regmatch_t *) 0x1193b20 nmatch = 3 eflags = 0 cnt = 0 __FUNCTION__ = "subst_run" #2 0x0000000000466ff9 in subst_str (input=0x7f7cf89e9466 "30230#+52223710400077", msg=, se=0x1195d00, count=0x7fffa9ff1c48) at re.c:599 res = lst = l = len = size = p = dest = __FUNCTION__ = "subst_str" #3 0x00007f7d32557c38 in ops_subst (msg=0x805118, src=0x7f1360, se=0x7f4c30) at avpops_impl.c:1404 avp = (struct usr_avp *) 0x7f7cf89e9430 avp_val = {n = -123825050, s = {s = 0x7f7cf89e9466 "30230#+52223710400077", len = 21}} name_type1 = 1 name_type2 = avp_name1 = {n = 8078799, s = {s = 0x7b45cf "r_user)", len = 6}} avp_name2 = {n = 846600608, s = {s = 0x7f7d327619a0 "r_user", len = 6}} n = 0 nmatches = 0 result = (str *) 0xf __FUNCTION__ = "ops_subst" #4 0x00000000004118f3 in do_action (a=0x7b46f8, msg=0x805118) at action.c:1195 val_s = {s = 0xa9ff2530
, len = 0} aux = {s = 0x7ae087 "r_user)", len = 6} ret = v = to = p = tmp = new_uri = end = crt = len = user = vals = {{s = 0x1
, len = 4959972}, {s = 0x1007ae087
, len = 18430752}, {s = 0x15
, len = 8052871}, {s = 0x6
, len = 8053040}, { s = 0x7fffa9ff20b0 "\004", len = 8409368}} result = {s = 0x7fffa9ff20b0 "\004", len = 8409368} uri = {user = { s = 0x77330b "30230#+52223710400077@74.121.80.38 SIP/2.0\r\nRecord-Route: \r\nFrom: ;tag=22791d28-"..., len = 8076400}, passwd = {s = 0x0, len = 13}, host = {s = 0x805118 "²/ ", len = 8409368}, port = {s = 0x7fffa9ff2530 "\030Q\200", len = 4702036}, params = {s = 0x2edbd10 "À©í\002", len = 919415264}, headers = {s = 0x2edbd10 "À©í\002", len = 0}, port_no = 111, proto = 0, type = ERROR_URI_T, transport = { s = 0x7f7d36cd29e0 "", len = 49134864}, ttl = {s = 0x15
, len = 111}, user_param = { s = 0x7fffa9ff1fd0 "0%ÿ©ÿ\177", len = 5324424}, maddr = {s = 0x7f7d369f9ab6 "\203=kÅ-", len = 21}, method = { s = 0x7f7d36a4fdf2 "H\213\234$È", len = 40}, lr = {s = 0x500000012
, len = 1}, r2 = { s = 0x2300000006
, len = 0}, transport_val = {s = 0x0, len = 48637024}, ttl_val = { s = 0x7f7d36a9f8f6 "%d]", len = 0}, user_param_val = {s = 0xb00a9ff23f8
, len = -1442896520}, maddr_val = {s = 0x7fffa9ff2598 "p&ÿ©ÿ\177", len = -1442897096}, method_val = {s = 0x0, len = 10}, lr_val = { s = 0xffffffff
, len = 49144848}, r2_val = {s = 0x0, len = 1024}} next_hop = {user = {s = 0x7fffa9ff1d76 "", len = -1442898592}, passwd = {s = 0x3000000010
, len = -1442898224}, host = {s = 0x7fffa9ff1e10 "°âz", len = 8180}, port = {s = 0x7f7d36ccf300 "Oð©6}\177", len = -1442898464}, params = {s = 0x2e62460 "GMT", len = 0}, headers = {s = 0x7f7d36cd29e0 "", len = -255}, port_no = 111, proto = 0, type = ERROR_URI_T, transport = {s = 0x7fffa9ff1fd0 "0%ÿ©ÿ\177", len = 5324424}, ttl = {s = 0x7f7d369fbad8 "H\205ÀI\211Ät4\203=A¥-", len = 15}, user_param = {s = 0x7f7d36a9f07a "/etc/localtime", len = -255}, maddr = {s = 0x6f
, len = -1442897968}, method = {s = 0x513e88 "ERROR:core:%s: error at line: %d\n", len = 48629408}, lr = {s = 0x2ede470 "t or missing FROM hdr :-/\n", len = 125840}, r2 = {s = 0x2ede480 "M hdr :-/\n", len = 49153040}, transport_val = {s = 0x7f7d36cd29e0 "", len = 117744}, ttl_val = { s = 0x7f7d369f9768 "é\226üÿÿH\2155\224\177\n", len = 16}, user_param_val = {s = 0x2ee0410 "", len = 8208}, maddr_val = { s = 0x7b3c70 "\002", len = 8076184}, method_val = {s = 0xd
, len = -1}, lr_val = {s = 0x805118 "²/ ", len = -1442898400}, r2_val = {s = 0x410242 "A\211Å\205Àu\a\203\r8r4", len = 8053424}} u = port = cmatch = aitem = adefault = spec = model = val = {rs = {s = 0x34
, len = 8409368}, ri = -1442896592, flags = 32767} pve = name_s = {s = 0x0, len = 8053016} __FUNCTION__ = "do_action" #5 0x0000000000410242 in run_action_list (a=, msg=0x805118) at action.c:140 ret = -5 t = (struct action *) 0x7b46f8 __FUNCTION__ = "run_action_list" #6 0x00000000004135d8 in do_action (a=0x7c24b0, msg=0x805118) at action.c:819 val_s = {s = 0x7fffa9ff29a0 "\030Q\200", len = 8040160} aux = {s = 0x805118 "²/ ", len = 8409368} ret = v = 1 to = p = tmp = new_uri = end = crt = len = user = vals = {{s = 0xfffffffb
, len = 8409368}, {s = 0x0, len = 15}, {s = 0x0, len = 7686832}, { s = 0x7fffa9ff29a0 "\030Q\200", len = 916783680}, {s = 0x3000000018
, len = -1442896640}} result = {s = 0x0, len = 0} uri = {user = {s = 0x0, len = 8047136}, passwd = {s = 0x0, len = 13}, host = {s = 0x805118 "²/ ", len = 8409368}, port = { s = 0x7fffa9ff29a0 "\030Q\200", len = 4702036}, params = {s = 0x6f
, len = 919415264}, headers = { s = 0x2edbd10 "À©í\002", len = 21}, port_no = 111, proto = 0, type = ERROR_URI_T, transport = {s = 0x7fffa9ff2420 "\030", len = 859866064}, ttl = {s = 0x7f7d369f9ab6 "\203=kÅ-", len = 21}, user_param = {s = 0x7f7d36a4fdf2 "H\213\234$È", len = 40}, maddr = { s = 0x500000012
, len = 1}, method = {s = 0x2300000006
, len = 0}, lr = {s = 0x0, len = 48637024}, r2 = {s = 0x805118 "²/ ", len = 49144848}, transport_val = {s = 0x0, len = 8409368}, ttl_val = { s = 0x773426 "36>\r\nCall-ID: 24362a60-cf56a26d-13c4-50029-3e739-65ea80a7-3e739\r\nCSeq: 1 INVITE\r\nVia: SIP/2.0/UDP 74.121.80.36;branch=z9hG4bKddaf.4f204aa3.0\r\nVia: SIP/2.0/UDP 207.86.162.109:5060;branch=z9hG4bK-3e739-"..., len = 49144848}, user_param_val = {s = 0x0, len = 49144848}, maddr_val = {s = 0x4d4d9354
, len = 49144848}, method_val = {s = 0x0, len = 49144848}, lr_val = {s = 0x4d4d9354
, len = -5}, r2_val = { s = 0x61
, len = 49144848}} next_hop = {user = {s = 0x7fffa9ff2260 "ÿÿÿÿ", len = 8180}, passwd = {s = 0x7f7d36ccf300 "Oð©6}\177", len = 4748990}, host = { s = 0x2e62460 "GMT", len = 0}, port = {s = 0x7f7d36cd29e0 "", len = 7811884}, params = { s = 0x13c40000006f
, len = 12}, headers = { s = 0x2633400000
, len = 0}, port_no = 15, proto = 0, type = ERROR_URI_T, transport = { s = 0x13c400000077332d
, len = 8410008}, ttl = { s = 0x773321 "74.121.80.38 SIP/2.0\r\nRecord-Route: \r\nFrom: ;tag=22791d28-cf56a26d-13c4-50029-3e"..., len = 8388609}, user_param = {s = 0x805460 "", len = 8410112}, maddr = {s = 0x805470 "", len = 8410144}, method = {s = 0x805490 "", len = 8410128}, lr = {s = 0x805398 "!3w", len = 20}, r2 = {s = 0x2
, len = 0}, transport_val = {s = 0x13c4
, len = 5060}, ttl_val = {s = 0x4238e6 "H\205Àt\024¸\001", len = 8208}, user_param_val = {s = 0x7aaee0 "\002", len = 8409368}, maddr_val = {s = 0x7aca20 "\002", len = 8046920}, method_val = {s = 0xd
, len = -1}, lr_val = { s = 0x805118 "²/ ", len = -1442897264}, r2_val = {s = 0x410242 "A\211Å\205Àu\a\203\r8r4", len = -1442896816}} u = port = cmatch = aitem = adefault = spec = model = val = {rs = {s = 0x7fffa9ff2440 "", len = 0}, ri = 18439936, flags = 0} pve = name_s = {s = 0x0, len = 0} __FUNCTION__ = "do_action" #7 0x0000000000410242 in run_action_list (a=, msg=0x805118) at action.c:140 ret = 1 t = (struct action *) 0x7c24b0 __FUNCTION__ = "run_action_list" #8 0x00000000004135d8 in do_action (a=0x7c2588, msg=0x805118) at action.c:819 val_s = {s = 0x2a0000003d
, len = 4} aux = {s = 0x7fffa9ff2910 "=", len = 18412952} ret = v = 1 to = p = tmp = new_uri = end = crt = len = user = vals = {{s = 0x7736dd "", len = 7812220}, { s = 0x773495 "branch=z9hG4bKddaf.4f204aa3.0\r\nVia: SIP/2.0/UDP 207.86.162.109:5060;branch=z9hG4bK-3e739-f3f38e7-658d3382\r\nAllow: OPTIONS\r\nMax-Forwards: 68\r\nSupported: Early-session\r\nContact: , len = 5013141}, { s = 0x1
, len = 989}} result = {s = 0x11903c0 "\001", len = 5} uri = {user = {s = 0xf10c53e8
, len = 0}, passwd = { s = 0x3000000018
, len = -1442895984}, host = {s = 0x1f4
, len = -202366288}, port = {s = 0x7fffa9ff2870 "s\202e3}\177", len = 0}, params = {s = 0x7f7cf73e4ec0 "", len = 862238869}, headers = { s = 0x0, len = -1442895984}, port_no = 0, proto = 0, type = ERROR_URI_T, transport = {s = 0x805118 "²/ ", len = 223}, ttl = { s = 0x44adaf "ééýÿÿO\213<\020K\213T\020\bO\213t\020\020O\213d\020\030O\211<\021K\211T\021\bO\211t\021\020O\211d\021\030M\215z K\213\0048K\213L8\bK\213t8\020K\213|8\030K\211\0049K\211L9\bK\211t9\020K\211|9\030M\215z@K\213\0248O\213t8\bO\213d8\020K\213D8\030K\211\0249O\211t9\bO\211d9\020K\211D9\030M\215b`K\213< K\213L \bK\213t \020O\213t \030K\211, len = 0}, transport_val = {s = 0x805118 "²/ ", len = -250850328}, ttl_val = { s = 0x7f7d3364e346 "L\213d$(I\201ÄX\030", len = 989}, user_param_val = { s = 0x773495 "branch=z9hG4bKddaf.4f204aa3.0\r\nVia: SIP/2.0/UDP 207.86.162.109:5060;branch=z9hG4bK-3e739-f3f38e7-658d3382\r\nAllow: OPTIONS\r\nMax-Forwards: 68\r\nSupported: Early-session\r\nContact: , len = 8409368}, r2_val = {s = 0x0, len = 8293638}} next_hop = {user = {s = 0x2
, len = 0}, passwd = {s = 0x51c7f0 "build_res_buf_from_sip_req", len = 438}, host = {s = 0x1195f00 "", len = 0}, port = {s = 0x6f
, len = -1442896112}, params = { s = 0x7f7d33658a80 "ERROR:tm:%s: no mem for outbound reply buffer\n", len = 4659886}, headers = { s = 0x15
, len = 916782578}, port_no = 40, proto = 0, type = ERROR_URI_T, transport = { s = 0x7f7cf3f03128 "\003*ðó|\177", len = 1}, ttl = {s = 0x2300000006
, len = 0}, user_param = { s = 0x7fffa9ff2790 "¼(ÿ©ÿ\177", len = -202366288}, maddr = {s = 0x4c1087 "é\235ûÿÿ1ÀéÐþÿÿº2\b", len = 1024}, method = { s = 0x7f7d3363056d "\211ÀL\213l$\020J\2154(I\211w\030H\211ëHÁã\004H\211éHÁá\aH)ÙI\215\024\016I\211W AÇG(", len = -202366288}, lr = { s = 0x43c5f7 "éµÚÿÿA\211öE1íé-ÑÿÿL\211ÓH\203ãàH\215{ÿHÁï\005\203ç\003M\2138M\213`\bI\213H\020I\213p\030M\211;M\211c\bI\211K\020I\211s\030A¹ ", len = 5}, r2 = {s = 0xdf
, len = 8409368}, transport_val = {s = 0x7fffa9ff2790 "¼(ÿ©ÿ\177", len = -1442895956}, ttl_val = {s = 0x7fffa9ff2790 "¼(ÿ©ÿ\177", len = -146911552}, user_param_val = {s = 0x7f7cf3f022b0 ";\024 ", len = -1442895760}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x7f7d3364a934 "¸ÿÿÿÿH\203ÄH[]A\\A]A^A_ÃH\215t$, len = 0}} u = port = cmatch = aitem = adefault = spec = model = val = {rs = {s = 0x11903c0 "\001", len = 7812220}, ri = 18434472, flags = 0} pve = name_s = {s = 0x7fffa9ff2978 "\030Q\200", len = 989} __FUNCTION__ = "do_action" #9 0x0000000000410242 in run_action_list (a=, msg=0x805118) at action.c:140 ret = 1 t = (struct action *) 0x7c2588 __FUNCTION__ = "run_action_list" #10 0x00000000004151a4 in run_top_route (a=0x7a3e20, msg=0x805118) at action.c:120 bk_action_flags = 0 bk_rec_lev = 0 ret = #11 0x0000000000469ba0 in receive_msg ( buf=0x773300 "INVITE sip:30230#+52223710400077@74.121.80.38 SIP/2.0\r\nRecord-Route: \r\nFrom: ;ta"..., len=989, rcv_info=0x7fffa9ff2a80) at receive.c:162 msg = (struct sip_msg *) 0x805118 __FUNCTION__ = "receive_msg" #12 0x00000000004b9eaa in udp_rcv_loop () at udp_server.c:492 len = 989 tmp = from = (union sockaddr_union *) 0x8050e0 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {6988106447709043018, 0}, addr32 = {609253706, 1627045322, 0, 0}, addr16 = {31050, 9296, 48586, 24826, 0, 0, 0, 0}, addr = "JyP$ʽú`\000\000\000\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = { 642808138, 0}, addr32 = {642808138, 0, 0, 0}, addr16 = {31050, 9808, 0, 0, 0, 0, 0, 0}, addr = "JyP&", '\0' }}, src_port = 5060, dst_port = 5060, proto = 1, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023ÄJyP$\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 609253706}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 609253706, sin6_addr = { in6_u = {u6_addr8 = '\0' , u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x79ec00} p = (callback_list *) 0x7fffa9ff2a88 buf = "INVITE sip:30230#+52223710400077@74.121.80.38 SIP/2.0\r\nRecord-Route: \r\nFrom: ;ta"... __FUNCTION__ = "udp_rcv_loop" #13 0x000000000042d7df in main (argc=, argv=0x7fffa9ff2c58) at main.c:824 cfg_log_stderr = cfg_stream = c = r = tmp = 0x7fffa9ff3ea6 "" tmp_len = port = proto = ret = seed = 4176472429 rfd = __FUNCTION__ = "main"