[SR-Users] Segmentaion fault in Kamailio 4.0.3
Daniel-Constantin Mierla
miconda at gmail.com
Mon Nov 4 23:52:20 CET 2013
Hello,
it might be related to the malloc of a size 0 done for one of the cseq
value (which doesn't exist at the respective time). I need to
investigate a bit more, I will come with updates as I get.
Cheers,
Daniel
On 10/29/13 10:33 AM, Morten Isaksen wrote:
> Hi Daniel,
>
> I still have the core file. You can find the output of p *shm_block
> here http://pastebin.com/mgh4ed44 - it was too big to poste on the list.
>
> /Morten
>
>
> On Tue, Oct 29, 2013 at 9:56 AM, Daniel-Constantin Mierla
> <miconda at gmail.com <mailto:miconda at gmail.com>> wrote:
>
> Hello,
>
> going to look over it. Do you still have the core file? If yes,
> provide the output of:
>
> p *shm_block
>
> from inside gdb.
>
> Cheers,
> Daniel
>
>
> On 10/28/13 1:00 PM, Morten Isaksen wrote:
>> Hi,
>>
>> We upgraded to 4.0.4 and now we got a new core dump in
>> q_malloc.c:269. It has been stable for about 5 days after the
>> upgrade.
>>
>> /Morten
>>
>> The full backtrace is here:
>>
>> Loaded symbols for /lib64/libnss_files.so.2
>> Core was generated by `/usr/local/sbin/kamailio -P
>> /var/run/kamailio/kamailio.pid -m 256 -M 8 -u kamai'.
>> Program terminated with signal 11, Segmentation fault.
>> #0 qm_detach_free (qm=0x7f5394de9000, size=0) at mem/q_malloc.c:269
>> 269 FRAG_END(next)->prev_free=prev;
>> Missing separate debuginfos, use: debuginfo-install
>> glibc-2.12-1.107.el6.x86_64 hiredis-0.10.1-3.el6.x86_64
>> keyutils-libs-1.4-4.el6.x86_64 krb5-libs-1.10.3-10.el6.x86_64
>> libcom_err-1.41.12-14.el6.x86_64 libselinux-2.0.94-5.3.el6.x86_64
>> libxml2-2.7.6-12.el6_4.1.x86_64 mysql-libs-5.1.67-1.el6_3.x86_64
>> nss-softokn-freebl-3.12.9-11.el6.x86_64
>> openssl-1.0.0-27.el6_4.2.x86_64 zlib-1.2.3-29.el6.x86_64
>> (gdb) bt full
>> #0 qm_detach_free (qm=0x7f5394de9000, size=0) at mem/q_malloc.c:269
>> prev = 0x7f539524ed60
>> next = 0x0
>> #1 qm_malloc (qm=0x7f5394de9000, size=0) at mem/q_malloc.c:386
>> f = 0x7f539524ed60
>> hash = 0
>> #2 0x00007f53a5662950 in shm_malloc (size=0) at
>> ../../mem/shm_mem.h:262
>> p = <value optimized out>
>> #3 0x00007f53a566b49b in dlg_set_leg_info (dlg=<value optimized
>> out>, tag=0x7ffff680b9a0, rr=0x7ffff680b860,
>> contact=0x7ffff680b870, cseq=0x7ffff680b880, leg=1) at dlg_hash.c:498
>> p = <value optimized out>
>> __FUNCTION__ = "dlg_set_leg_info"
>> #4 0x00007f53a5659e88 in populate_leg_info (dlg=0x7f53952312b0,
>> msg=<value optimized out>, t=<value optimized out>, leg=1,
>> tag=0x7ffff680b9a0) at dlg_handlers.c:276
>> skip_recs = 4
>> cseq = {s = 0x0, len = 0}
>> contact = {
>> s = 0x8da2c0 "sip:65993777 at 178.21.249.22:5060
>> <http://sip:65993777@178.21.249.22:5060>>\r\nContent-Type:
>> application/sdp\r\nRequire: timer\r\nContent-Length:
>> 252\r\n\r\nv=0\r\no=- 2042480911 <tel:2042480911> 2042480911
>> <tel:2042480911> IN IP4 178.21.249.22\r\ns=Hosted PBX\r\nc=IN IP4
>> 178.21.249.22\r\nt=0 0"..., len = 31}
>> rr_set = {s = 0x7f53ab927c20 <incomplete sequence
>> \361\237\215>, len = 0}
>> __FUNCTION__ = "populate_leg_info"
>> #5 0x00007f53a565b949 in dlg_onreply (t=0x7f5395245030,
>> type=<value optimized out>, param=<value optimized out>) at
>> dlg_handlers.c:500
>> dlg = 0x7f53952312b0
>> iuid = <value optimized out>
>> new_state = 3
>> old_state = 1
>> unref = 0
>> event = 3
>> tag = {
>> s = 0x8da1bc "as77c791c9\r\nCall-ID:
>> 0dd71e51-ba5d-1231-c79f-00095200eb1e\r\nCSeq: 1206140
>> INVITE\r\nServer: one-connect\r\nAllow: INVITE, ACK, CANCEL,
>> OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO,
>> PUBLISH\r\nSupported: repl"..., len = 10}
>> req = 0x7f5395640090
>> rpl = 0x7f53ab8cd7a0
>> __FUNCTION__ = "dlg_onreply"
>> #6 0x00007f53aa1f58ad in run_trans_callbacks_internal
>> (cb_lst=<value optimized out>, type=1048576,
>> trans=0x7f5395245030, params=0x7ffff680baa0) at t_hooks.c:290
>> cbp = 0x7f5395311260
>> backup_from = 0x8e9ed0
>> backup_to = 0x8e9ed8
>> backup_dom_from = 0x8e9ee0
>> backup_dom_to = 0x8e9ee8
>> backup_uri_from = 0x8e9ec0
>> backup_uri_to = 0x8e9ec8
>> backup_xavps = 0x8e9fd0
>> __FUNCTION__ = "run_trans_callbacks_internal"
>> #7 0x00007f53aa1f5a94 in run_trans_callbacks_with_buf
>> (type=<value optimized out>, rbuf=0x7f53952450f0, req=<value
>> optimized out>, repl=<value optimized out>, flags=<value
>> optimized out>) at t_hooks.c:336
>> params = {req = 0x7f5395640090, rpl = 0x7f53ab8cd7a0,
>> param = 0x7f5395311270, code = 200, flags = 200, branch = 0,
>> t_rbuf = 0x7f53952450f0, dst = 0x7f5395245140, send_buf = {
>> s = 0x7f53953ac460 "SIP/2.0 200 OK\r\nVia:
>> SIP/2.0/UDP
>> 178.21.248.30;rport=5060;branch=z9hG4bKd24f.32134635.0\r\nVia:
>> SIP/2.0/UDP
>> 178.21.248.8;rport=5060;branch=z9hG4bKd24f.b20f4bb3.0\r\nVia:
>> SIP/2.0/UDP 178.21.248.20;branch=z"..., len = 1341}}
>> trans = <value optimized out>
>> #8 0x00007f53aa22728c in relay_reply (t=<value optimized out>,
>> p_msg=<value optimized out>, branch=0, msg_status=200,
>> cancel_data=0x7ffff680be40, do_put_on_wait=1) at t_reply.c:1867
>> relay = 0
>> save_clone = 0
>> buf = 0x7f53ab9361a0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
>> 178.21.248.30;rport=5060;branch=z9hG4bKd24f.32134635.0\r\nVia:
>> SIP/2.0/UDP
>> 178.21.248.8;rport=5060;branch=z9hG4bKd24f.b20f4bb3.0\r\nVia:
>> SIP/2.0/UDP 178.21.248.20;branch=z"...
>> res_len = 1341
>> relayed_code = 200
>> relayed_msg = 0x7f53ab8cd7a0
>> reply_bak = <value optimized out>
>> bm = {to_tag_val = {s = 0x7f5395600c50
>> "P\233\365\224S\177", len = -1440728525}}
>> totag_retr = 0
>> reply_status = RPS_COMPLETED
>> uas_rb = <value optimized out>
>> to_tag = <value optimized out>
>> reason = {s = 0x3 <Address 0x3 out of bounds>, len =
>> -159334788}
>> onsend_params = {req = 0x7f53aa45e594, rpl =
>> 0x7ffff680be78, param = 0x0, code = 0, flags = 0, branch = 0,
>> t_rbuf = 0x10, dst = 0x7f53aa200a91, send_buf = {s =
>> 0x7f5395601f38 "", len = -1440601726}}
>> ---Type <return> to continue, or q <return> to quit---
>> __FUNCTION__ = "relay_reply"
>> #9 0x00007f53aa227da6 in reply_received (p_msg=0x7f53ab8cd7a0)
>> at t_reply.c:2374
>> msg_status = 200
>> last_uac_status = 100
>> ack = 0x1 <Address 0x1 out of bounds>
>> ack_len = 0
>> branch = 0
>> reply_status = <value optimized out>
>> onreply_route = <value optimized out>
>> cancel_data = {cancel_bitmap = 0, reason = {cause = 200,
>> u = {text = {s = 0x0, len = -1416571248}, e2e_cancel = 0x0,
>> packed_hdrs = {s = 0x0, len = -1416571248}}}}
>> uac = 0x7f5395245198
>> t = 0x7f5395245030
>> lack_dst = {send_sock = 0x0, to = {s = {sa_family =
>> 48720, sa_data =
>> "\200\366\377\177\000\000\000\000\000\000\000\000\000"}, sin =
>> {sin_family = 48720, sin_port = 63104, sin_addr = {
>> s_addr = 32767}, sin_zero =
>> "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 48720,
>> sin6_port = 63104, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {
>> __u6_addr8 =
>> "\000\000\000\000\000\000\000\000\260kq\253S\177\000",
>> __u6_addr16 = {0, 0, 0, 0, 27568, 43889, 32595, 0}, __u6_addr32 =
>> {0, 0, 2876337072, 32595}}},
>> sin6_scope_id = 2878134176}}, id = 32595, proto =
>> -76 '\264', send_flags = {f = 5 '\005', blst_imask = 0 '\000'}}
>> backup_user_from = <value optimized out>
>> backup_user_to = <value optimized out>
>> backup_domain_from = <value optimized out>
>> backup_domain_to = <value optimized out>
>> backup_uri_from = <value optimized out>
>> backup_uri_to = <value optimized out>
>> backup_xavps = <value optimized out>
>> replies_locked = <value optimized out>
>> branch_ret = <value optimized out>
>> prev_branch = <value optimized out>
>> blst_503_timeout = <value optimized out>
>> hf = <value optimized out>
>> onsend_params = {req = 0x8da424, rpl = 0x543274, param =
>> 0x10, code = -1416833120, flags = 32595, branch = 0, t_rbuf =
>> 0x7ffff680be50, dst = 0x7f53a566690b, send_buf = {
>> s = 0x4ff1e7b00000000 <Address 0x4ff1e7b00000000 out
>> of bounds>, len = 0}}
>> ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1,
>> jmp_env = {{__jmpbuf = {140737329020144, -5577311537021373234,
>> 139997336902320, 139997337147296, 200, 139996961202968,
>> 5577292203380126926,
>> -5577312076254333746}, __mask_was_saved = 0,
>> __saved_mask = {__val = {139997337420128, 9281488,
>> 139997335445253, 1, 140737329020496, 6191275, 5978073, 8591616,
>> 9281252, 68728758110,
>> 5548121, 9281656, 9281173, 139997337409168,
>> 9282596, 139997337519904}}}}}
>> __FUNCTION__ = "reply_received"
>> #10 0x0000000000456d54 in do_forward_reply (msg=0x7f53ab8cd7a0,
>> mode=<value optimized out>) at forward.c:799
>> new_buf = 0x0
>> dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data
>> = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port =
>> 0, sin_addr = {s_addr = 0}, sin_zero =
>> "\000\000\000\000\000\000\000"},
>> sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo
>> = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15
>> times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0,
>> 0, 0, 0}}},
>> sin6_scope_id = 0}}, id = 0, proto = 0 '\000',
>> send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
>> new_len = <value optimized out>
>> r = <value optimized out>
>> s = <value optimized out>
>> len = <value optimized out>
>> __FUNCTION__ = "do_forward_reply"
>> #11 0x000000000049f4be in receive_msg (
>> buf=0x8d9e80 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
>> 178.21.249.20;branch=z9hG4bKd24f.20eeb764.0;received=178.21.249.20;rport=5060\r\nVia:
>> SIP/2.0/UDP
>> 178.21.248.30;rport=5060;branch=z9hG4bKd24f.32134635.0\r\nVia:
>> SIP/2.0/UD"..., len=<value optimized out>,
>> rcv_info=0x7ffff680c100) at receive.c:272
>> msg = 0x7f53ab8cd7a0
>> ctx = {rec_lev = 12, run_flags = 0, last_retcode =
>> -1517756399, jmp_env = {{__jmpbuf = {139996960369776, 12,
>> 219309716216, 139997343567872, 140737329021424, 4294967295,
>> 140737329021551, 1},
>> __mask_was_saved = 8581896, __saved_mask = {__val =
>> {0, 28, 16, 0, 219305533392, 1, 0, 139997335309296, 219309716216,
>> 139996960369776, 139997337398864, 139997343565480, 139997337398872,
>> 140737329021320, 219305559701, 140737329021192}}}}}
>> ret = <value optimized out>
>> inb = {
>> s = 0x8d9e80 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
>> 178.21.249.20;branch=z9hG4bKd24f.20eeb764.0;received=178.21.249.20;rport=5060\r\nVia:
>> SIP/2.0/UDP
>> 178.21.248.30;rport=5060;branch=z9hG4bKd24f.32134635.0\r\nVia:
>> SIP/2.0/UD"..., len = 1444}
>> __FUNCTION__ = "receive_msg"
>> #12 0x0000000000532306 in udp_rcv_loop () at udp_server.c:557
>> len = 1444
>> buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
>> 178.21.249.20;branch=z9hG4bKd24f.20eeb764.0;received=178.21.249.20;rport=5060\r\nVia:
>> SIP/2.0/UDP
>> 178.21.248.30;rport=5060;branch=z9hG4bKd24f.32134635.0\r\nVia:
>> SIP/2.0/UD"...
>> from = 0x7f53ab90ae50
>> fromlen = 16
>> ri = {src_ip = {af = 2, len = 4, u = {addrl = {385422770,
>> 0}, addr32 = {385422770, 0, 0, 0}, addr16 = {5554, 5881, 0, 0, 0,
>> 0, 0, 0}, addr = "\262\025\371\026", '\000' <repeats 11 times>}},
>> ---Type <return> to continue, or q <return> to quit---
>> dst_ip = {af = 2, len = 4, u = {addrl = {351868338, 0},
>> addr32 = {351868338, 0, 0, 0}, addr16 = {5554, 5369, 0, 0, 0, 0,
>> 0, 0}, addr = "\262\025\371\024", '\000' <repeats 11 times>}},
>> src_port = 5060, dst_port = 5060, proto_reserved1 = 0,
>> proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data =
>> "\023IJ\025\371\026\000\000\000\000\000\000\000"}, sin =
>> {sin_family = 2,
>> sin_port = 50195, sin_addr = {s_addr = 385422770},
>> sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family =
>> 2, sin6_port = 50195, sin6_flowinfo = 385422770, sin6_addr =
>> {__in6_u = {
>> __u6_addr8 = '\000' <repeats 15 times>,
>> __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0,
>> 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f53ab8cec10, proto =
>> 1 '\001'}
>> __FUNCTION__ = "udp_rcv_loop"
>> #13 0x0000000000467a7a in main_loop () at main.c:1638
>> i = <value optimized out>
>> pid = <value optimized out>
>> si = <value optimized out>
>> si_desc = "udp receiver child=3 sock=178.21.249.20:5060
>> <http://178.21.249.20:5060>\000\000\000\000@\\\220\253S\177\000\000\000\000\000\000\000\000\000\000\003\000\000\000\000\000\000\000\001\000\000\000\001\000\000\000\300\375\216\000\000\000\000\000\001\000\000\000\000\000\000\000\000\376\216\000\000\000\000\000\000\000\200\020",
>> '\000' <repeats 12 times>, "\005\000\000\000\000\000\000"
>> nrprocs = <value optimized out>
>> __FUNCTION__ = "main_loop"
>> #14 0x000000000046a912 in main (argc=<value optimized out>,
>> argv=<value optimized out>) at main.c:2566
>> cfg_stream = <value optimized out>
>> c = <value optimized out>
>> r = <value optimized out>
>> tmp = 0x7ffff680d89a ""
>> tmp_len = 0
>> options = 0x5c1de8
>> ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
>> ret = -1
>> seed = 1043769636
>> rfd = <value optimized out>
>> debug_save = <value optimized out>
>> debug_flag = <value optimized out>
>> dont_fork_cnt = <value optimized out>
>> n_lst = <value optimized out>
>> p = <value optimized out>
>> __FUNCTION__ = "main"
>>
>>
>>
>> On Mon, Oct 21, 2013 at 8:15 PM, Daniel-Constantin Mierla
>> <miconda at gmail.com <mailto:miconda at gmail.com>> wrote:
>>
>> Hello,
>>
>> can you upgrade to 4.0.4? there were some fixes related to
>> new fields in sip message structure that resulted in some out
>> bound memory inside transactions.
>>
>> The config file and database is the same, so just re-install
>> over the previous installation.
>>
>> Cheers,
>> Daniel
>>
>>
>> On 10/21/13 11:10 AM, Morten Isaksen wrote:
>>> Hi,
>>>
>>> Our Kamailio has stopped with a segmentation fault 4 times
>>> the last week.
>>>
>>> There has been no changes to the configuration file the last
>>> 15 days, so I suspect a SIP phone is sending a SIP packet
>>> that Kamailio does not like.
>>>
>>> We have a core dump file but I cannot read anything usefull
>>> from the backtrace. Can you see what is wrong from the
>>> backtrace?
>>>
>>> Regards
>>> Morten
>>>
>>> The output from gdb (bt full):
>>>
>>> Core was generated by `/usr/local/sbin/kamailio -P
>>> /var/run/kamailio/kamailio.pid -m 256 -M 8 -u kamai'.
>>> Program terminated with signal 11, Segmentation fault.
>>> #0 0x00007f0e10de17b2 in cancel_branch (t=0x7f0dfbf38e10,
>>> branch=0, reason=<value optimized out>, flags=4) at
>>> t_cancel.c:284
>>> 284 if (cfg_get(tm, tm_cfg, reparse_invite) ||
>>> Missing separate debuginfos, use: debuginfo-install
>>> glibc-2.12-1.107.el6.x86_64 hiredis-0.10.1-3.el6.x86_64
>>> keyutils-libs-1.4-4.el6.x86_64
>>> krb5-libs-1.10.3-10.el6.x86_64
>>> libcom_err-1.41.12-14.el6.x86_64
>>> libselinux-2.0.94-5.3.el6.x86_64
>>> libxml2-2.7.6-12.el6_4.1.x86_64
>>> mysql-libs-5.1.67-1.el6_3.x86_64
>>> nss-softokn-freebl-3.12.9-11.el6.x86_64
>>> openssl-1.0.0-27.el6_4.2.x86_64 zlib-1.2.3-29.el6.x86_64
>>> (gdb) bt full
>>> #0 0x00007f0e10de17b2 in cancel_branch (t=0x7f0dfbf38e10,
>>> branch=0, reason=<value optimized out>, flags=4) at
>>> t_cancel.c:284
>>> cancel = <value optimized out>
>>> len = <value optimized out>
>>> crb = 0x7f0dfbf39008
>>> irb = 0x7f0dfbf38f80
>>> ret = 1
>>> tmp_cd = {cancel_bitmap = 0, reason = {cause = 0, u
>>> = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs
>>> = {s = 0x0, len = 0}}}}
>>> pcbuf = <value optimized out>
>>> __FUNCTION__ = "cancel_branch"
>>> #1 0x00007f0e10e298ab in reply_received
>>> (p_msg=0x7f0e124ce760) at t_reply.c:2194
>>> msg_status = <value optimized out>
>>> last_uac_status = 408
>>> ack = 0x7f0dfbf38e10 "Ð
>>> \267\373\r\177"
>>> ack_len = <value optimized out>
>>> branch = 0
>>> reply_status = <value optimized out>
>>> onreply_route = <value optimized out>
>>> cancel_data = {cancel_bitmap = 0, reason = {cause =
>>> 408, u = {text = {s = 0x0, len = 307468800}, e2e_cancel =
>>> 0x0, packed_hdrs = {s = 0x0, len = 307468800}}}}
>>> uac = <value optimized out>
>>> t = 0x7f0dfbf38e10
>>> lack_dst = {send_sock = 0x0, to = {s = {sa_family =
>>> 6704, sa_data =
>>> "\\#\377\177\000\000\000\000\000\000\000\000\000"}, sin =
>>> {sin_family = 6704, sin_port = 9052, sin_addr = {s_addr =
>>> 32767},
>>> sin_zero = "\000\000\000\000\000\000\000"},
>>> sin6 = {sin6_family = 6704, sin6_port = 9052, sin6_flowinfo
>>> = 32767, sin6_addr = {__in6_u = {
>>> __u6_addr8 =
>>> "\000\000\000\000\000\000\000\000p{1\022\016\177\000",
>>> __u6_addr16 = {0, 0, 0, 0, 31600, 4657, 32526, 0},
>>> __u6_addr32 = {0, 0, 305232752, 32526}}},
>>> sin6_scope_id = 307029856}}, id = 32526, proto
>>> = 28 '\034', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
>>> backup_user_from = <value optimized out>
>>> backup_user_to = <value optimized out>
>>> backup_domain_from = <value optimized out>
>>> backup_domain_to = <value optimized out>
>>> backup_uri_from = <value optimized out>
>>> backup_uri_to = <value optimized out>
>>> backup_xavps = <value optimized out>
>>> replies_locked = 0
>>> branch_ret = <value optimized out>
>>> prev_branch = <value optimized out>
>>> blst_503_timeout = <value optimized out>
>>> hf = <value optimized out>
>>> onsend_params = {req = 0x8d8a39, rpl = 0x541db4,
>>> param = 0x7f0e1253e528, code = 307029856, flags = 32526,
>>> branch = 0, t_rbuf = 0x7fff235c1a30, dst = 0x7f0e12317b70,
>>> send_buf = {
>>> s = 0x375311000000000 <Address 0x375311000000000
>>> out of bounds>, len = 0}}
>>> ctx = {rec_lev = 307491008, run_flags = 32526,
>>> last_retcode = 5674412, jmp_env = {{__jmpbuf =
>>> {140733786626256, 63331951475841423, 139698413054576,
>>> 139698413299552, 9276465, 139698039855608,
>>> -63254168797292145, 63332490682325391},
>>> __mask_was_saved = 0, __saved_mask = {__val =
>>> {139698413734928, 0, 139698411522821, 1, 140733786626608,
>>> 6185835, 5972697, 8586176, 9275699,
>>> 69026945952, 3, 9276465, 9275673,
>>> 139698413738496, 9275961, 139698413760704}}}}}
>>> __FUNCTION__ = "reply_received"
>>> #2 0x0000000000456444 in do_forward_reply
>>> (msg=0x7f0e124ce760, mode=<value optimized out>) at
>>> forward.c:799
>>> new_buf = 0x0
>>> dst = {send_sock = 0x0, to = {s = {sa_family = 0,
>>> sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0,
>>> sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
>>> "\000\000\000\000\000\000\000"},
>>> sin6 = {sin6_family = 0, sin6_port = 0,
>>> sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
>>> '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0,
>>> 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
>>> sin6_scope_id = 0}}, id = 0, proto = 0 '\000',
>>> send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
>>> new_len = <value optimized out>
>>> r = <value optimized out>
>>> s = <value optimized out>
>>> len = <value optimized out>
>>> __FUNCTION__ = "do_forward_reply"
>>> #3 0x000000000049e15e in receive_msg (buf=<value optimized
>>> out>, len=313, rcv_info=0x7fff235c1cd0) at receive.c:270
>>> msg = 0x7f0e124ce760
>>> ctx = {rec_lev = 11, run_flags = 0, last_retcode =
>>> 206110737, jmp_env = {{__jmpbuf = {139698036884436, 11,
>>> 219309716216, 139698419720192, 140733786627520, 4294967295,
>>> 140733786627647, 1},
>>> __mask_was_saved = 8576456, __saved_mask =
>>> {__val = {0, 28, 16, 0, 219305533392, 1, 0, 139698411461552,
>>> 219309716216, 139698036884436, 139698413732672,
>>> 139698419717800, 139698413732680,
>>> 140733786627416, 219305559701,
>>> 140733786627288}}}}}
>>> ret = <value optimized out>
>>> inb = {
>>> s = 0x8d8900 "SIP/2.0 100 Trying\r\nVia:
>>> SIP/2.0/UDP
>>> 178.21.249.20;branch=z9hG4bK8149.c6575a95.0\r\nTo:
>>> sip:201 at 78799865.pbx.one-connect.dk
>>> <mailto:sip%3A201 at 78799865.pbx.one-connect.dk>;tag=07c44e68\r\nFrom:
>>> sip:201 at 78799865.pbx.one-connect.dk
>>> <mailto:sip%3A201 at 78799865.pbx.one-connect.dk>;tag=a6a1c5f60faecf035a"...,
>>> len = 313}
>>> __FUNCTION__ = "receive_msg"
>>> #4 0x0000000000530e46 in udp_rcv_loop () at udp_server.c:557
>>> ---Type <return> to continue, or q <return> to quit---
>>> len = 313
>>> buf = "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP
>>> 178.21.249.20;branch=z9hG4bK8149.c6575a95.0\r\nTo:
>>> sip:201 at 78799865.pbx.one-connect.dk
>>> <mailto:sip%3A201 at 78799865.pbx.one-connect.dk>;tag=07c44e68\r\nFrom:
>>> sip:201 at 78799865.pbx.one-connect.dk
>>> <mailto:sip%3A201 at 78799865.pbx.one-connect.dk>;tag=a6a1c5f60faecf035a"...
>>> from = 0x7f0e12538340
>>> fromlen = 16
>>> ri = {src_ip = {af = 2, len = 4, u = {addrl =
>>> {2993962576, 0}, addr32 = {2993962576, 0, 0, 0}, addr16 =
>>> {15952, 45684, 0, 0, 0, 0, 0, 0}, addr = "P>t\262", '\000'
>>> <repeats 11 times>}}, dst_ip = {
>>> af = 2, len = 4, u = {addrl = {351868338, 0},
>>> addr32 = {351868338, 0, 0, 0}, addr16 = {5554, 5369, 0, 0,
>>> 0, 0, 0, 0}, addr = "\262\025\371\024", '\000' <repeats 11
>>> times>}}, src_port = 35754,
>>> dst_port = 5060, proto_reserved1 = 0,
>>> proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data =
>>> "\213\252P>t\262\000\000\000\000\000\000\000"}, sin =
>>> {sin_family = 2, sin_port = 43659,
>>> sin_addr = {s_addr = 2993962576}, sin_zero =
>>> "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2,
>>> sin6_port = 43659, sin6_flowinfo = 2993962576, sin6_addr =
>>> {__in6_u = {
>>> __u6_addr8 = '\000' <repeats 15 times>,
>>> __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0,
>>> 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f0e124cfbd0,
>>> proto = 1 '\001'}
>>> __FUNCTION__ = "udp_rcv_loop"
>>> #5 0x000000000046716a in main_loop () at main.c:1638
>>> i = <value optimized out>
>>> pid = <value optimized out>
>>> si = <value optimized out>
>>> si_desc = "udp receiver child=2
>>> sock=178.21.249.20:5060
>>> <http://178.21.249.20:5060>\000\000\000\000\200\303P\022\016\177\000\000\000\000\000\000\000\000\000\000\003\000\000\000\000\000\000\000\001\000\000\000\001\000\000\000@\350\216\000\000\000\000\000\001\000\000\000\000\000\000\000\200\350\216\000\000\000\000\000\000\000\200\020",
>>> '\000' <repeats 12 times>, "\005\000\000\000\000\000\000"
>>> nrprocs = <value optimized out>
>>> __FUNCTION__ = "main_loop"
>>> #6 0x000000000046a002 in main (argc=<value optimized out>,
>>> argv=<value optimized out>) at main.c:2566
>>> cfg_stream = <value optimized out>
>>> c = <value optimized out>
>>> r = <value optimized out>
>>> tmp = 0x7fff235c377f ""
>>> tmp_len = 0
>>> options = 0x5c08c8
>>> ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
>>> ret = -1
>>> seed = 1722854551
>>> rfd = <value optimized out>
>>> debug_save = <value optimized out>
>>> debug_flag = <value optimized out>
>>> dont_fork_cnt = <value optimized out>
>>> n_lst = <value optimized out>
>>> p = <value optimized out>
>>> __FUNCTION__ = "main"
>>> (gdb)
>>>
>>>
>>>
>>>
>>>
>>> --
>>> Morten Isaksen
>>>
>>>
>>> _______________________________________________
>>> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
>>> sr-users at lists.sip-router.org <mailto:sr-users at lists.sip-router.org>
>>> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>>
>> --
>> Daniel-Constantin Mierla -http://www.asipto.com
>> http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
>> Kamailio Advanced Trainings - Berlin, Nov 25-28; Miami, Nov 18-20, 2013
>> - more details about Kamailio trainings athttp://www.asipto.com -
>>
>>
>> _______________________________________________
>> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users
>> mailing list
>> sr-users at lists.sip-router.org
>> <mailto:sr-users at lists.sip-router.org>
>> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>>
>>
>>
>>
>> --
>> Morten Isaksen
>>
>>
>> _______________________________________________
>> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
>> sr-users at lists.sip-router.org <mailto:sr-users at lists.sip-router.org>
>> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>
> --
> Daniel-Constantin Mierla -http://www.asipto.com
> http://twitter.com/#!/miconda <http://twitter.com/#%21/miconda> -http://www.linkedin.com/in/miconda
> Kamailio Advanced Trainings - Berlin, Nov 25-28
> - more details about Kamailio trainings athttp://www.asipto.com -
>
>
> _______________________________________________
> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing
> list
> sr-users at lists.sip-router.org <mailto:sr-users at lists.sip-router.org>
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>
>
>
>
> --
> Morten Isaksen
>
>
> _______________________________________________
> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
> sr-users at lists.sip-router.org
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
--
Daniel-Constantin Mierla - http://www.asipto.com
http://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
Kamailio Advanced Trainings - Berlin, Nov 25-28
- more details about Kamailio trainings at http://www.asipto.com -
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-users/attachments/20131104/f6839026/attachment-0001.html>
More information about the sr-users
mailing list