[sr-dev] Crash bug freeing To headers

Alex Balashov abalashov at evaristesys.com
Fri Sep 6 10:31:28 CEST 2013


Hello Daniel,

I sent you the ultra-high-verbosity memory log privately, since it's 95 
MB (uncompressed).  I also sent you the backtrace and the full 
backtrace, but here they are again for edification:

sasha at tambourine:~$ cat x2 | sed 's/208.94.159.10/192.13.219.87/g' | sed 
's/6789540671/6784841111/g' | sed 's/192.168.47.72/175.154.21.89/g' | 
sed 's/67.231.4.102/12.131.2.144/g' | sed 
's/65.254.44.194/55.177.31.199/g' | sed 's/9189211710/6504578199/g' | 
sed 's/184.178.234.121/195.105.225.111/g'
(gdb) where
#0  0x0000003dbae328a5 in raise () from /lib64/libc.so.6
#1  0x0000003dbae34085 in abort () from /lib64/libc.so.6
#2  0x000000000053c112 in qm_debug_frag (qm=0x7fa2e71d2010, 
f=0x7fa2e7484060)
     at mem/q_malloc.c:142
#3  0x000000000053de76 in qm_free (qm=0x7fa2e71d2010, p=0x7fa2e7484090,
     file=0x6165b1 "<core>: parser/parse_to.c", func=0x617e48 
"free_to_params",
     line=828) at mem/q_malloc.c:462
#4  0x0000000000565799 in free_to_params (tb=0x7fa2e7456b70)
     at parser/parse_to.c:828
#5  0x00000000005657d7 in free_to (tb=0x7fa2e7456b70) at 
parser/parse_to.c:838
#6  0x0000000000544fef in clean_hdr_field (hf=0x7fa2e723c030)
     at parser/hf.c:169
#7  0x000000000054515a in free_hdr_field_lst (hf=0x7fa2e723bbe0)
     at parser/hf.c:223
#8  0x00000000005499e5 in free_sip_msg (msg=0x7fa2e74824a8)
     at parser/msg_parser.c:729
#9  0x000000000049f89d in receive_msg (
     buf=0x910e20 "SIP/2.0 404 Not Found\r\nVia: SIP/2.0/UDP 
55.177.31.199;branch=z9hG4bK11f7.06fc4f95.0\r\nVia: SIP/2.0/UDP 
68.68.120.41:5060;branch=z9hG4bK04B41bd5b77895524b3\r\nRecord-Route: 
<sip:55.177.31.199;lr=on;ftag=g"..., len=716,
     rcv_info=0x7fffd0c14960) at receive.c:296
#10 0x0000000000532665 in udp_rcv_loop () at udp_server.c:557
#11 0x00000000004688a1 in main_loop () at main.c:1638
#12 0x000000000046b84a in main (argc=13, argv=0x7fffd0c14c98) at main.c:2566

#0  0x0000003dbae328a5 in raise () from /lib64/libc.so.6
No symbol table info available.
#1  0x0000003dbae34085 in abort () from /lib64/libc.so.6
No symbol table info available.
#2  0x000000000053c112 in qm_debug_frag (qm=0x7fa2e71d2010, 
f=0x7fa2e7484060)
     at mem/q_malloc.c:142
         __FUNCTION__ = "qm_debug_frag"
#3  0x000000000053de76 in qm_free (qm=0x7fa2e71d2010, p=0x7fa2e7484090,
     file=0x6165b1 "<core>: parser/parse_to.c", func=0x617e48 
"free_to_params",
     line=828) at mem/q_malloc.c:462
         f = 0x7fa2e7484060
         size = 2825200
         next = 0x7fa2e723ac58
         prev = 0x157
         __FUNCTION__ = "qm_free"
#4  0x0000000000565799 in free_to_params (tb=0x7fa2e7456b70)
     at parser/parse_to.c:828
         tp = 0x7fa2e7484090
         foo = 0x0
         __FUNCTION__ = "free_to_params"
#5  0x00000000005657d7 in free_to (tb=0x7fa2e7456b70) at 
parser/parse_to.c:838
         __FUNCTION__ = "free_to"
#6  0x0000000000544fef in clean_hdr_field (hf=0x7fa2e723c030)
     at parser/hf.c:169
         h_parsed = 0x7fa2e723c060
         __FUNCTION__ = "clean_hdr_field"
#7  0x000000000054515a in free_hdr_field_lst (hf=0x7fa2e723bbe0)
     at parser/hf.c:223
         foo = 0x7fa2e723c030
         __FUNCTION__ = "free_hdr_field_lst"
#8  0x00000000005499e5 in free_sip_msg (msg=0x7fa2e74824a8)
     at parser/msg_parser.c:729
         __FUNCTION__ = "free_sip_msg"
#9  0x000000000049f89d in receive_msg (
    buf=0x910e20 "SIP/2.0 404 Not Found\r\nVia: SIP/2.0/UDP 
55.177.31.199;branch=z9hG4bK11f7.06fc4f95.0\r\nVia: SIP/2.0/UDP 
68.68.120.41:5060;branch=z9hG4bK04B41bd5b77895524b3\r\nRecord-Route: 
<sip:55.177.31.199;lr=on;ftag=gK045cb2b5;vsf=", 'A' <repeats 38 times>, 
"--;dlgcor=48a.e5>\r\nFrom: 
<sip:16784841111 at 68.68.120.41>;tag=gK045cb2b5\r\nTo: 
<sip:12066513489 at 55.177.31.199>;tag=8200ff18e3\r\nCall-ID: 
184818744_124682822 at 68.68.120.41\r\nCSeq: 25781 INVITE\r\nContact: 
<sip:528---Type <return> to continue, or q <return> to quit---
2797646 at 195.105.225.111:5060;transport=udp>\r\nSupported: 100rel, 
replaces, norefersub\r\nAllow-Events: refer\r\nAllow: INVITE, ACK, 
CANCEL, BYE, REFER, PRACK, INFO, UPDATE\r\nAccept: 
application/sdp\r\nUser-Agent: snomONE/4.5.1.1107 Zeta 
Perseids\r\nContent-Length: 0\r\n\r\n", len=716, rcv_info=0x7fffd0c14960)
     at receive.c:296
         msg = 0x7fa2e74824a8
         ctx = {rec_lev = 8793288, run_flags = 0, last_retcode = 0, 
jmp_env = {{
               __jmpbuf = {0, 0, 0, 265124110288, 1, 0, 140337638875928, 
1},
               __mask_was_saved = -508184336, __saved_mask = {__val = {
                   140337641517152, 3502328080, 1024, 7797295296,
                   140333253245168, 140736695716032, 5433321, 0,
                   140333253245168, 44055, 140333253245168, 
140736695716296,
                   8093911720, 140736695716112, 5433449, 7}}}}}
         ret = 32674
         inb = {
           s = 0x910e20 "SIP/2.0 404 Not Found\r\nVia: SIP/2.0/UDP 
55.177.31.199;branch=z9hG4bK11f7.06fc4f95.0\r\nVia: SIP/2.0/UDP 
68.68.120.41:5060;branch=z9hG4bK04B41bd5b77895524b3\r\nRecord-Route: 
<sip:55.177.31.199;lr=on;ftag=gK045cb2b5;vsf=", 'A' <repeats 38 times>, 
"--;dlgcor=48a.e5>\r\nFrom: 
<sip:16784841111 at 68.68.120.41>;tag=gK045cb2b5\r\nTo: 
<sip:12066513489 at 55.177.31.199>;tag=8200ff18e3\r\nCall-ID: 
184818744_124682822 at 68.68.120.41\r\nCSeq: 25781 INVITE\r\nContact: 
<sip:5282797646 at 195.105.225.111:5060;transport=udp>\r\nSupported: 
100rel, replaces, norefersub\r\nAllow-Events: refer\r\nAllow: INVITE, 
ACK, CANCEL, BYE, REFER, PRACK, INFO, UPDATE\r\nAccept: 
application/sdp\r\nUser-Agent: snomONE/4.5.1.1107 Zeta 
Perseids\r\nContent-Length: 0\r\n\r\n", len = 716}
         __FUNCTION__ = "receive_msg"
#10 0x0000000000532665 in udp_rcv_loop () at udp_server.c:557
         len = 716
         buf = "SIP/2.0 404 Not Found\r\nVia: SIP/2.0/UDP 
55.177.31.199;branch=z9hG4bK11f7.06fc4f95.0\r\nVia: SIP/2.0/UDP 
68.68.120.41:5060;branch=z9hG4bK04B41bd5b77895524b3\r\nRecord-Route: 
<sip:55.177.31.199;lr=on;ftag=gK045cb2b5;vsf=", 'A' <repeats 38 times>, 
"--;dlgcor=48a.e5>\r\nFrom: 
<sip:16784841111 at 68.68.120.41>;tag=gK045cb2b5\r\nTo: 
<sip:12066513489 at 55.177.31.199>;tag=8200ff18e3\r\nCall-ID: 
184818744_124682822 at 68.68.120.41\r\nCSeq: 25781 INVITE\r\nContact: 
<sip:5282797646 at 195.105.225.111:5060;transport=udp>\r\nSupported: 
100rel, replaces, norefersub\r\nAllow-Events: refer\r\nAllow: INVITE, 
ACK, CANCEL, BYE, REFER, PRACK, INFO, UPDATE\r\nAccept: 
application/sdp\r\nUser-Agent: snomONE/4.5.1.1107 Zeta 
Perseids\r\nContent-Length: 0\r\n\r\n\000dp\r\n\r\nv=0\r\no=Sonus_UAC 
828 24583 IN IP4 68.68.120.41\r\ns=SIP Media Capabilities\r\nc=IN IP4 
68.68.120.35\r\nt=0 0\r\nm=audio 28632 RTP/AVP 0 8 101 13\r\na=rtpmap:0 
PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 
telephone-event/8000\r\na=fmtp:101 0-15\r\na=rtpmap:13 
CN/8000\r\na=sendrecv\r\na=ptime:20\r\na=rtcp:28633\n", '\000' <repeats 
64520 times>
         tmp = 0x5d0648 "udp receiver child=%d sock=%s:%s"
         from = 0x7fa2e7445908
         fromlen = 16
         ri = {src_ip = {af = 2, len = 4, u = {addrl = {2045424312,
                 140337641517152}, addr32 = {2045424312, 0, 3880087648, 
32674},
               addr16 = {45752, 31210, 0, 0, 28768, 59205, 32674, 0},
               addr = "\270\262\352y\000\000\000\000`pE\347\242\177\000"}},
           dst_ip = {af = 2, len = 4, u = {addrl = {3257728577, 0}, 
addr32 = {
                 3257728577, 0, 0, 0}, addr16 = {65089, 49708, 0, 0, 0, 
0, 0,
                 0}, addr = "A\376,\302", '\000' <repeats 11 times>}},
           src_port = 5060, dst_port = 5060, proto_reserved1 = 0,
           proto_reserved2 = 0, src_su = {s = {sa_family = 2,
               sa_data = "\023ĸ\262\352y\000\000\000\000\000\000\000"}, 
sin = {
               sin_family = 2, sin_port = 50195, sin_addr = {
                 s_addr = 2045424312},
               sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
               sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 
2045424312,
               sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 
times>,
                   __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = 
{0, 0,
                     0, 0}}}, sin6_scope_id = 0}},
           bind_address = 0x7fa2e7456ef8, proto = 1 '\001'}
         __FUNCTION__ = "udp_rcv_loop"
#11 0x00000000004688a1 in main_loop () at main.c:1638
         i = 7
         pid = 0
         si = 0x7fa2e7456ef8
         si_desc = "udp receiver child=7 
sock=55.177.31.199:5060\000\177\000\000\200\261D\347\242\177\000\000\026\000\000\000\000\000\000\000\360v]\000\000\000\000\000\207\000\000\000\000\000\000\000pDA\000\000\000\000\000\220L\301\320\377\177", 
'\000' <repeats 18 times>"\320, 
J\301\320\377\177\000\000d;K\000\000\000\000"
         nrprocs = 8
         __FUNCTION__ = "main_loop"
#12 0x000000000046b84a in main (argc=13, argv=0x7fffd0c14c98) at main.c:2566
         cfg_stream = 0x13b6010
         c = -1
         r = 0
         tmp_len = 0
         port = 0
         proto = 0
         options = 0x5d0a40 
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
         ret = -1
         seed = 3436287552
         rfd = 4
         debug_save = 0
         debug_flag = 0
         dont_fork_cnt = 0
         n_lst = 0x3dbae0fb88
         p = 0x5bb480 "H\211l$\330L\211d$\340H\215-\273s*"
         __FUNCTION__ = "main"

Here's the head/tail overwritten message:

Sep  6 04:09:28 gw1 /usr/local/sbin/kamailio[18694]: : <core> 
[mem/q_malloc.c:140]: qm_debug_frag(): BUG: qm_*: fragm. 0x7fa2e7484060 
(address 0x7fa2e7484090) beginning overwritten(6975753a6e72753c)!

Grepping for the fragment address:

Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 168) 
returns address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=320) on 1 -th hit
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:472]: qm_free(): qm_free: freeing frag. 0x7fa2e7484060 
alloc'ed from sqlops: sql_api.c: sql_do_query(315)
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 320) 
returns address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=320) on 1 -th hit
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:472]: qm_free(): qm_free: freeing frag. 0x7fa2e7484060 
alloc'ed from <core>: db_row.c: db_allocate_row(114)
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:472]: qm_free(): qm_free: freeing frag. 0x7fa2e7484060 
alloc'ed from <core>: db_res.c: db_allocate_rows(179)
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 24) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:472]: qm_free(): qm_free: freeing frag. 0x7fa2e7484060 
alloc'ed from <core>: db_val.c: db_str2val(122)
Sep  6 04:09:19 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:19 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:472]: qm_free(): qm_free: freeing frag. 0x7fa2e7484060 
alloc'ed from <core>: parser/msg_parser.c: get_hdr_field(152)
Sep  6 04:09:22 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:22 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:472]: qm_free(): qm_free: freeing frag. 0x7fa2e7484060 
alloc'ed from <core>: parser/msg_parser.c: get_hdr_field(152)
Sep  6 04:09:24 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:24 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:472]: qm_free(): qm_free: freeing frag. 0x7fa2e7484060 
alloc'ed from <core>: parser/msg_parser.c: get_hdr_field(152)
Sep  6 04:09:25 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:25 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:472]: qm_free(): qm_free: freeing frag. 0x7fa2e7484060 
alloc'ed from <core>: parser/msg_parser.c: get_hdr_field(152)
Sep  6 04:09:27 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:27 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:472]: qm_free(): qm_free: freeing frag. 0x7fa2e7484060 
alloc'ed from <core>: parser/msg_parser.c: get_hdr_field(152)
Sep  6 04:09:28 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:28 gw1 /usr/local/sbin/kamailio[18694]: : <core> 
[mem/q_malloc.c:140]: qm_debug_frag(): BUG: qm_*: fragm. 0x7fa2e7484060 
(address 0x7fa2e7484090) beginning overwritten(6975753a6e72753c)!
Sep  6 04:09:28 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: qm_status: 
   6781. N  address=0x7fa2e7484090 frag=0x7fa2e7484060 size=48 used=1

And for the address itself:

Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 168) 
returns address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=320) on 1 -th hit
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:437]: qm_free(): qm_free(0x7fa2e71d2010, 
0x7fa2e7484090), called from sqlops: sql_api.c: sql_reset_result(237)
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 320) 
returns address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=320) on 1 -th hit
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[db_row.c:119]: db_allocate_row(): allocate 320 bytes for row values at 
0x7fa2e7484090
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[db_row.c:97]: db_free_row(): freeing row values at 0x7fa2e7484090
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:437]: qm_free(): qm_free(0x7fa2e71d2010, 
0x7fa2e7484090), called from <core>: db_row.c: db_free_row(98)
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[db_res.c:184]: db_allocate_rows(): allocate 48 bytes for rows at 
0x7fa2e7484090
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[db_res.c:62]: db_free_rows(): freeing rows at 0x7fa2e7484090
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:437]: qm_free(): qm_free(0x7fa2e71d2010, 
0x7fa2e7484090), called from <core>: db_res.c: db_free_rows(63)
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 24) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[db_val.c:127]: db_str2val(): allocate 23 bytes memory for STRING at 
0x7fa2e7484090
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[db_row.c:68]: db_free_row(): free VAL_STRING[13] 
'uloc-5215a229-4e26-dc1' at 0x7fa2e7484090
Sep  6 04:09:18 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:437]: qm_free(): qm_free(0x7fa2e71d2010, 
0x7fa2e7484090), called from <core>: db_row.c: db_free_row(69)
Sep  6 04:09:19 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:19 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:437]: qm_free(): qm_free(0x7fa2e71d2010, 
0x7fa2e7484090), called from <core>: parser/parse_cseq.c: free_cseq(105)
Sep  6 04:09:22 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:22 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:437]: qm_free(): qm_free(0x7fa2e71d2010, 
0x7fa2e7484090), called from <core>: parser/parse_cseq.c: free_cseq(105)
Sep  6 04:09:24 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:24 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:437]: qm_free(): qm_free(0x7fa2e71d2010, 
0x7fa2e7484090), called from <core>: parser/parse_cseq.c: free_cseq(105)
Sep  6 04:09:25 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:25 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:437]: qm_free(): qm_free(0x7fa2e71d2010, 
0x7fa2e7484090), called from <core>: parser/parse_cseq.c: free_cseq(105)
Sep  6 04:09:27 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:27 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:437]: qm_free(): qm_free(0x7fa2e71d2010, 
0x7fa2e7484090), called from <core>: parser/parse_cseq.c: free_cseq(105)
Sep  6 04:09:28 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:413]: qm_malloc(): qm_malloc(0x7fa2e71d2010, 48) returns 
address 0x7fa2e7484090 frag. 0x7fa2e7484060 (size=48) on 1 -th hit
Sep  6 04:09:28 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: <core> 
[mem/q_malloc.c:437]: qm_free(): qm_free(0x7fa2e71d2010, 
0x7fa2e7484090), called from <core>: parser/parse_to.c: free_to_params(828)
Sep  6 04:09:28 gw1 /usr/local/sbin/kamailio[18694]: : <core> 
[mem/q_malloc.c:140]: qm_debug_frag(): BUG: qm_*: fragm. 0x7fa2e7484060 
(address 0x7fa2e7484090) beginning overwritten(6975753a6e72753c)!
Sep  6 04:09:28 gw1 /usr/local/sbin/kamailio[18694]: DEBUG: qm_status: 
   6781. N  address=0x7fa2e7484090 frag=0x7fa2e7484060 size=48 used=1

-- Alex

-- 
Alex Balashov - Principal
Evariste Systems LLC
235 E Ponce de Leon Ave
Suite 106
Decatur, GA 30030
United States
Tel: +1-678-954-0670
Web: http://www.evaristesys.com/, http://www.alexbalashov.com/



More information about the sr-dev mailing list