[SR-Users] Segmentaion fault in Kamailio 4.0.3
Morten Isaksen
misak at misak.dk
Mon Oct 28 13:00:34 CET 2013
Hi,
We upgraded to 4.0.4 and now we got a new core dump in q_malloc.c:269. It
has been stable for about 5 days after the upgrade.
/Morten
The full backtrace is here:
Loaded symbols for /lib64/libnss_files.so.2
Core was generated by `/usr/local/sbin/kamailio -P
/var/run/kamailio/kamailio.pid -m 256 -M 8 -u kamai'.
Program terminated with signal 11, Segmentation fault.
#0 qm_detach_free (qm=0x7f5394de9000, size=0) at mem/q_malloc.c:269
269 FRAG_END(next)->prev_free=prev;
Missing separate debuginfos, use: debuginfo-install
glibc-2.12-1.107.el6.x86_64 hiredis-0.10.1-3.el6.x86_64
keyutils-libs-1.4-4.el6.x86_64 krb5-libs-1.10.3-10.el6.x86_64
libcom_err-1.41.12-14.el6.x86_64 libselinux-2.0.94-5.3.el6.x86_64
libxml2-2.7.6-12.el6_4.1.x86_64 mysql-libs-5.1.67-1.el6_3.x86_64
nss-softokn-freebl-3.12.9-11.el6.x86_64 openssl-1.0.0-27.el6_4.2.x86_64
zlib-1.2.3-29.el6.x86_64
(gdb) bt full
#0 qm_detach_free (qm=0x7f5394de9000, size=0) at mem/q_malloc.c:269
prev = 0x7f539524ed60
next = 0x0
#1 qm_malloc (qm=0x7f5394de9000, size=0) at mem/q_malloc.c:386
f = 0x7f539524ed60
hash = 0
#2 0x00007f53a5662950 in shm_malloc (size=0) at ../../mem/shm_mem.h:262
p = <value optimized out>
#3 0x00007f53a566b49b in dlg_set_leg_info (dlg=<value optimized out>,
tag=0x7ffff680b9a0, rr=0x7ffff680b860, contact=0x7ffff680b870,
cseq=0x7ffff680b880, leg=1) at dlg_hash.c:498
p = <value optimized out>
__FUNCTION__ = "dlg_set_leg_info"
#4 0x00007f53a5659e88 in populate_leg_info (dlg=0x7f53952312b0, msg=<value
optimized out>, t=<value optimized out>, leg=1, tag=0x7ffff680b9a0) at
dlg_handlers.c:276
skip_recs = 4
cseq = {s = 0x0, len = 0}
contact = {
s = 0x8da2c0 "sip:65993777 at 178.21.249.22:5060>\r\nContent-Type:
application/sdp\r\nRequire: timer\r\nContent-Length: 252\r\n\r\nv=0\r\no=-
2042480911 2042480911 IN IP4 178.21.249.22\r\ns=Hosted PBX\r\nc=IN IP4
178.21.249.22\r\nt=0 0"..., len = 31}
rr_set = {s = 0x7f53ab927c20 <incomplete sequence \361\237\215>,
len = 0}
__FUNCTION__ = "populate_leg_info"
#5 0x00007f53a565b949 in dlg_onreply (t=0x7f5395245030, type=<value
optimized out>, param=<value optimized out>) at dlg_handlers.c:500
dlg = 0x7f53952312b0
iuid = <value optimized out>
new_state = 3
old_state = 1
unref = 0
event = 3
tag = {
s = 0x8da1bc "as77c791c9\r\nCall-ID:
0dd71e51-ba5d-1231-c79f-00095200eb1e\r\nCSeq: 1206140 INVITE\r\nServer:
one-connect\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE,
NOTIFY, INFO, PUBLISH\r\nSupported: repl"..., len = 10}
req = 0x7f5395640090
rpl = 0x7f53ab8cd7a0
__FUNCTION__ = "dlg_onreply"
#6 0x00007f53aa1f58ad in run_trans_callbacks_internal (cb_lst=<value
optimized out>, type=1048576, trans=0x7f5395245030, params=0x7ffff680baa0)
at t_hooks.c:290
cbp = 0x7f5395311260
backup_from = 0x8e9ed0
backup_to = 0x8e9ed8
backup_dom_from = 0x8e9ee0
backup_dom_to = 0x8e9ee8
backup_uri_from = 0x8e9ec0
backup_uri_to = 0x8e9ec8
backup_xavps = 0x8e9fd0
__FUNCTION__ = "run_trans_callbacks_internal"
#7 0x00007f53aa1f5a94 in run_trans_callbacks_with_buf (type=<value
optimized out>, rbuf=0x7f53952450f0, req=<value optimized out>, repl=<value
optimized out>, flags=<value optimized out>) at t_hooks.c:336
params = {req = 0x7f5395640090, rpl = 0x7f53ab8cd7a0, param =
0x7f5395311270, code = 200, flags = 200, branch = 0, t_rbuf =
0x7f53952450f0, dst = 0x7f5395245140, send_buf = {
s = 0x7f53953ac460 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
178.21.248.30;rport=5060;branch=z9hG4bKd24f.32134635.0\r\nVia: SIP/2.0/UDP
178.21.248.8;rport=5060;branch=z9hG4bKd24f.b20f4bb3.0\r\nVia: SIP/2.0/UDP
178.21.248.20;branch=z"..., len = 1341}}
trans = <value optimized out>
#8 0x00007f53aa22728c in relay_reply (t=<value optimized out>,
p_msg=<value optimized out>, branch=0, msg_status=200,
cancel_data=0x7ffff680be40, do_put_on_wait=1) at t_reply.c:1867
relay = 0
save_clone = 0
buf = 0x7f53ab9361a0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
178.21.248.30;rport=5060;branch=z9hG4bKd24f.32134635.0\r\nVia: SIP/2.0/UDP
178.21.248.8;rport=5060;branch=z9hG4bKd24f.b20f4bb3.0\r\nVia: SIP/2.0/UDP
178.21.248.20;branch=z"...
res_len = 1341
relayed_code = 200
relayed_msg = 0x7f53ab8cd7a0
reply_bak = <value optimized out>
bm = {to_tag_val = {s = 0x7f5395600c50 "P\233\365\224S\177", len =
-1440728525}}
totag_retr = 0
reply_status = RPS_COMPLETED
uas_rb = <value optimized out>
to_tag = <value optimized out>
reason = {s = 0x3 <Address 0x3 out of bounds>, len = -159334788}
onsend_params = {req = 0x7f53aa45e594, rpl = 0x7ffff680be78, param
= 0x0, code = 0, flags = 0, branch = 0, t_rbuf = 0x10, dst =
0x7f53aa200a91, send_buf = {s = 0x7f5395601f38 "", len = -1440601726}}
---Type <return> to continue, or q <return> to quit---
__FUNCTION__ = "relay_reply"
#9 0x00007f53aa227da6 in reply_received (p_msg=0x7f53ab8cd7a0) at
t_reply.c:2374
msg_status = 200
last_uac_status = 100
ack = 0x1 <Address 0x1 out of bounds>
ack_len = 0
branch = 0
reply_status = <value optimized out>
onreply_route = <value optimized out>
cancel_data = {cancel_bitmap = 0, reason = {cause = 200, u = {text
= {s = 0x0, len = -1416571248}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0,
len = -1416571248}}}}
uac = 0x7f5395245198
t = 0x7f5395245030
lack_dst = {send_sock = 0x0, to = {s = {sa_family = 48720, sa_data
= "\200\366\377\177\000\000\000\000\000\000\000\000\000"}, sin =
{sin_family = 48720, sin_port = 63104, sin_addr = {
s_addr = 32767}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 48720, sin6_port =
63104, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {
__u6_addr8 =
"\000\000\000\000\000\000\000\000\260kq\253S\177\000", __u6_addr16 = {0, 0,
0, 0, 27568, 43889, 32595, 0}, __u6_addr32 = {0, 0, 2876337072, 32595}}},
sin6_scope_id = 2878134176}}, id = 32595, proto = -76 '\264',
send_flags = {f = 5 '\005', blst_imask = 0 '\000'}}
backup_user_from = <value optimized out>
backup_user_to = <value optimized out>
backup_domain_from = <value optimized out>
backup_domain_to = <value optimized out>
backup_uri_from = <value optimized out>
backup_uri_to = <value optimized out>
backup_xavps = <value optimized out>
replies_locked = <value optimized out>
branch_ret = <value optimized out>
prev_branch = <value optimized out>
blst_503_timeout = <value optimized out>
hf = <value optimized out>
onsend_params = {req = 0x8da424, rpl = 0x543274, param = 0x10, code
= -1416833120, flags = 32595, branch = 0, t_rbuf = 0x7ffff680be50, dst =
0x7f53a566690b, send_buf = {
s = 0x4ff1e7b00000000 <Address 0x4ff1e7b00000000 out of
bounds>, len = 0}}
ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env =
{{__jmpbuf = {140737329020144, -5577311537021373234, 139997336902320,
139997337147296, 200, 139996961202968, 5577292203380126926,
-5577312076254333746}, __mask_was_saved = 0, __saved_mask =
{__val = {139997337420128, 9281488, 139997335445253, 1, 140737329020496,
6191275, 5978073, 8591616, 9281252, 68728758110,
5548121, 9281656, 9281173, 139997337409168, 9282596,
139997337519904}}}}}
__FUNCTION__ = "reply_received"
#10 0x0000000000456d54 in do_forward_reply (msg=0x7f53ab8cd7a0, mode=<value
optimized out>) at forward.c:799
new_buf = 0x0
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000'
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr =
{s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"},
sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16
= {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags =
{f = 0 '\000', blst_imask = 0 '\000'}}
new_len = <value optimized out>
r = <value optimized out>
s = <value optimized out>
len = <value optimized out>
__FUNCTION__ = "do_forward_reply"
#11 0x000000000049f4be in receive_msg (
buf=0x8d9e80 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
178.21.249.20;branch=z9hG4bKd24f.20eeb764.0;received=178.21.249.20;rport=5060\r\nVia:
SIP/2.0/UDP 178.21.248.30;rport=5060;branch=z9hG4bKd24f.32134635.0\r\nVia:
SIP/2.0/UD"..., len=<value optimized out>, rcv_info=0x7ffff680c100) at
receive.c:272
msg = 0x7f53ab8cd7a0
ctx = {rec_lev = 12, run_flags = 0, last_retcode = -1517756399,
jmp_env = {{__jmpbuf = {139996960369776, 12, 219309716216, 139997343567872,
140737329021424, 4294967295, 140737329021551, 1},
__mask_was_saved = 8581896, __saved_mask = {__val = {0, 28,
16, 0, 219305533392, 1, 0, 139997335309296, 219309716216, 139996960369776,
139997337398864, 139997343565480, 139997337398872,
140737329021320, 219305559701, 140737329021192}}}}}
ret = <value optimized out>
inb = {
s = 0x8d9e80 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
178.21.249.20;branch=z9hG4bKd24f.20eeb764.0;received=178.21.249.20;rport=5060\r\nVia:
SIP/2.0/UDP 178.21.248.30;rport=5060;branch=z9hG4bKd24f.32134635.0\r\nVia:
SIP/2.0/UD"..., len = 1444}
__FUNCTION__ = "receive_msg"
#12 0x0000000000532306 in udp_rcv_loop () at udp_server.c:557
len = 1444
buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
178.21.249.20;branch=z9hG4bKd24f.20eeb764.0;received=178.21.249.20;rport=5060\r\nVia:
SIP/2.0/UDP 178.21.248.30;rport=5060;branch=z9hG4bKd24f.32134635.0\r\nVia:
SIP/2.0/UD"...
from = 0x7f53ab90ae50
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {385422770, 0},
addr32 = {385422770, 0, 0, 0}, addr16 = {5554, 5881, 0, 0, 0, 0, 0, 0},
addr = "\262\025\371\026", '\000' <repeats 11 times>}},
---Type <return> to continue, or q <return> to quit---
dst_ip = {af = 2, len = 4, u = {addrl = {351868338, 0}, addr32 =
{351868338, 0, 0, 0}, addr16 = {5554, 5369, 0, 0, 0, 0, 0, 0}, addr =
"\262\025\371\024", '\000' <repeats 11 times>}},
src_port = 5060, dst_port = 5060, proto_reserved1 = 0,
proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data =
"\023IJ\025\371\026\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
sin_port = 50195, sin_addr = {s_addr = 385422770}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port =
50195, sin6_flowinfo = 385422770, sin6_addr = {__in6_u = {
__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0,
0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}},
bind_address = 0x7f53ab8cec10, proto = 1 '\001'}
__FUNCTION__ = "udp_rcv_loop"
#13 0x0000000000467a7a in main_loop () at main.c:1638
i = <value optimized out>
pid = <value optimized out>
si = <value optimized out>
si_desc = "udp receiver child=3 sock=178.21.249.20:5060
\000\000\000\000@\\\220\253S\177\000\000\000\000\000\000\000\000\000\000\003\000\000\000\000\000\000\000\001\000\000\000\001\000\000\000\300\375\216\000\000\000\000\000\001\000\000\000\000\000\000\000\000\376\216\000\000\000\000\000\000\000\200\020",
'\000' <repeats 12 times>, "\005\000\000\000\000\000\000"
nrprocs = <value optimized out>
__FUNCTION__ = "main_loop"
#14 0x000000000046a912 in main (argc=<value optimized out>, argv=<value
optimized out>) at main.c:2566
cfg_stream = <value optimized out>
c = <value optimized out>
r = <value optimized out>
tmp = 0x7ffff680d89a ""
tmp_len = 0
options = 0x5c1de8
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
ret = -1
seed = 1043769636
rfd = <value optimized out>
debug_save = <value optimized out>
debug_flag = <value optimized out>
dont_fork_cnt = <value optimized out>
n_lst = <value optimized out>
p = <value optimized out>
__FUNCTION__ = "main"
On Mon, Oct 21, 2013 at 8:15 PM, Daniel-Constantin Mierla <miconda at gmail.com
> wrote:
> Hello,
>
> can you upgrade to 4.0.4? there were some fixes related to new fields in
> sip message structure that resulted in some out bound memory inside
> transactions.
>
> The config file and database is the same, so just re-install over the
> previous installation.
>
> Cheers,
> Daniel
>
>
> On 10/21/13 11:10 AM, Morten Isaksen wrote:
>
> Hi,
>
> Our Kamailio has stopped with a segmentation fault 4 times the last week.
>
> There has been no changes to the configuration file the last 15 days, so
> I suspect a SIP phone is sending a SIP packet that Kamailio does not like.
>
> We have a core dump file but I cannot read anything usefull from the
> backtrace. Can you see what is wrong from the backtrace?
>
> Regards
> Morten
>
> The output from gdb (bt full):
>
> Core was generated by `/usr/local/sbin/kamailio -P
> /var/run/kamailio/kamailio.pid -m 256 -M 8 -u kamai'.
> Program terminated with signal 11, Segmentation fault.
> #0 0x00007f0e10de17b2 in cancel_branch (t=0x7f0dfbf38e10, branch=0,
> reason=<value optimized out>, flags=4) at t_cancel.c:284
> 284 if (cfg_get(tm, tm_cfg, reparse_invite) ||
> Missing separate debuginfos, use: debuginfo-install
> glibc-2.12-1.107.el6.x86_64 hiredis-0.10.1-3.el6.x86_64
> keyutils-libs-1.4-4.el6.x86_64 krb5-libs-1.10.3-10.el6.x86_64
> libcom_err-1.41.12-14.el6.x86_64 libselinux-2.0.94-5.3.el6.x86_64
> libxml2-2.7.6-12.el6_4.1.x86_64 mysql-libs-5.1.67-1.el6_3.x86_64
> nss-softokn-freebl-3.12.9-11.el6.x86_64 openssl-1.0.0-27.el6_4.2.x86_64
> zlib-1.2.3-29.el6.x86_64
> (gdb) bt full
> #0 0x00007f0e10de17b2 in cancel_branch (t=0x7f0dfbf38e10, branch=0,
> reason=<value optimized out>, flags=4) at t_cancel.c:284
> cancel = <value optimized out>
> len = <value optimized out>
> crb = 0x7f0dfbf39008
> irb = 0x7f0dfbf38f80
> ret = 1
> tmp_cd = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s =
> 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}}
> pcbuf = <value optimized out>
> __FUNCTION__ = "cancel_branch"
> #1 0x00007f0e10e298ab in reply_received (p_msg=0x7f0e124ce760) at
> t_reply.c:2194
> msg_status = <value optimized out>
> last_uac_status = 408
> ack = 0x7f0dfbf38e10 "Ð
> \267\373\r\177"
> ack_len = <value optimized out>
> branch = 0
> reply_status = <value optimized out>
> onreply_route = <value optimized out>
> cancel_data = {cancel_bitmap = 0, reason = {cause = 408, u = {text
> = {s = 0x0, len = 307468800}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len
> = 307468800}}}}
> uac = <value optimized out>
> t = 0x7f0dfbf38e10
> lack_dst = {send_sock = 0x0, to = {s = {sa_family = 6704, sa_data
> = "\\#\377\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family =
> 6704, sin_port = 9052, sin_addr = {s_addr = 32767},
> sin_zero = "\000\000\000\000\000\000\000"}, sin6 =
> {sin6_family = 6704, sin6_port = 9052, sin6_flowinfo = 32767, sin6_addr =
> {__in6_u = {
> __u6_addr8 =
> "\000\000\000\000\000\000\000\000p{1\022\016\177\000", __u6_addr16 = {0, 0,
> 0, 0, 31600, 4657, 32526, 0}, __u6_addr32 = {0, 0, 305232752, 32526}}},
> sin6_scope_id = 307029856}}, id = 32526, proto = 28 '\034',
> send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
> backup_user_from = <value optimized out>
> backup_user_to = <value optimized out>
> backup_domain_from = <value optimized out>
> backup_domain_to = <value optimized out>
> backup_uri_from = <value optimized out>
> backup_uri_to = <value optimized out>
> backup_xavps = <value optimized out>
> replies_locked = 0
> branch_ret = <value optimized out>
> prev_branch = <value optimized out>
> blst_503_timeout = <value optimized out>
> hf = <value optimized out>
> onsend_params = {req = 0x8d8a39, rpl = 0x541db4, param =
> 0x7f0e1253e528, code = 307029856, flags = 32526, branch = 0, t_rbuf =
> 0x7fff235c1a30, dst = 0x7f0e12317b70, send_buf = {
> s = 0x375311000000000 <Address 0x375311000000000 out of
> bounds>, len = 0}}
> ctx = {rec_lev = 307491008, run_flags = 32526, last_retcode =
> 5674412, jmp_env = {{__jmpbuf = {140733786626256, 63331951475841423,
> 139698413054576, 139698413299552, 9276465, 139698039855608,
> -63254168797292145, 63332490682325391}, __mask_was_saved =
> 0, __saved_mask = {__val = {139698413734928, 0, 139698411522821, 1,
> 140733786626608, 6185835, 5972697, 8586176, 9275699,
> 69026945952, 3, 9276465, 9275673, 139698413738496,
> 9275961, 139698413760704}}}}}
> __FUNCTION__ = "reply_received"
> #2 0x0000000000456444 in do_forward_reply (msg=0x7f0e124ce760,
> mode=<value optimized out>) at forward.c:799
> new_buf = 0x0
> dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000'
> <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr =
> {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"},
> sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
> sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16
> = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
> sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags =
> {f = 0 '\000', blst_imask = 0 '\000'}}
> new_len = <value optimized out>
> r = <value optimized out>
> s = <value optimized out>
> len = <value optimized out>
> __FUNCTION__ = "do_forward_reply"
> #3 0x000000000049e15e in receive_msg (buf=<value optimized out>, len=313,
> rcv_info=0x7fff235c1cd0) at receive.c:270
> msg = 0x7f0e124ce760
> ctx = {rec_lev = 11, run_flags = 0, last_retcode = 206110737,
> jmp_env = {{__jmpbuf = {139698036884436, 11, 219309716216, 139698419720192,
> 140733786627520, 4294967295, 140733786627647, 1},
> __mask_was_saved = 8576456, __saved_mask = {__val = {0, 28,
> 16, 0, 219305533392, 1, 0, 139698411461552, 219309716216, 139698036884436,
> 139698413732672, 139698419717800, 139698413732680,
> 140733786627416, 219305559701, 140733786627288}}}}}
> ret = <value optimized out>
> inb = {
> s = 0x8d8900 "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP
> 178.21.249.20;branch=z9hG4bK8149.c6575a95.0\r\nTo:
> sip:201 at 78799865.pbx.one-connect.dk;tag=07c44e68\r\nFrom:
> sip:201 at 78799865.pbx.one-connect.dk;tag=a6a1c5f60faecf035a"..., len = 313}
> __FUNCTION__ = "receive_msg"
> #4 0x0000000000530e46 in udp_rcv_loop () at udp_server.c:557
> ---Type <return> to continue, or q <return> to quit---
> len = 313
> buf = "SIP/2.0 100 Trying\r\nVia: SIP/2.0/UDP
> 178.21.249.20;branch=z9hG4bK8149.c6575a95.0\r\nTo:
> sip:201 at 78799865.pbx.one-connect.dk;tag=07c44e68\r\nFrom:
> sip:201 at 78799865.pbx.one-connect.dk;tag=a6a1c5f60faecf035a"...
> from = 0x7f0e12538340
> fromlen = 16
> ri = {src_ip = {af = 2, len = 4, u = {addrl = {2993962576, 0},
> addr32 = {2993962576, 0, 0, 0}, addr16 = {15952, 45684, 0, 0, 0, 0, 0, 0},
> addr = "P>t\262", '\000' <repeats 11 times>}}, dst_ip = {
> af = 2, len = 4, u = {addrl = {351868338, 0}, addr32 =
> {351868338, 0, 0, 0}, addr16 = {5554, 5369, 0, 0, 0, 0, 0, 0}, addr =
> "\262\025\371\024", '\000' <repeats 11 times>}}, src_port = 35754,
> dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0,
> src_su = {s = {sa_family = 2, sa_data =
> "\213\252P>t\262\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
> sin_port = 43659,
> sin_addr = {s_addr = 2993962576}, sin_zero =
> "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port =
> 43659, sin6_flowinfo = 2993962576, sin6_addr = {__in6_u = {
> __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 =
> {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id =
> 0}}, bind_address = 0x7f0e124cfbd0, proto = 1 '\001'}
> __FUNCTION__ = "udp_rcv_loop"
> #5 0x000000000046716a in main_loop () at main.c:1638
> i = <value optimized out>
> pid = <value optimized out>
> si = <value optimized out>
> si_desc = "udp receiver child=2 sock=178.21.249.20:5060
> \000\000\000\000\200\303P\022\016\177\000\000\000\000\000\000\000\000\000\000\003\000\000\000\000\000\000\000\001\000\000\000\001\000\000\000@\350\216\000\000\000\000\000\001\000\000\000\000\000\000\000\200\350\216\000\000\000\000\000\000\000\200\020",
> '\000' <repeats 12 times>, "\005\000\000\000\000\000\000"
> nrprocs = <value optimized out>
> __FUNCTION__ = "main_loop"
> #6 0x000000000046a002 in main (argc=<value optimized out>, argv=<value
> optimized out>) at main.c:2566
> cfg_stream = <value optimized out>
> c = <value optimized out>
> r = <value optimized out>
> tmp = 0x7fff235c377f ""
> tmp_len = 0
> options = 0x5c08c8
> ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
> ret = -1
> seed = 1722854551
> rfd = <value optimized out>
> debug_save = <value optimized out>
> debug_flag = <value optimized out>
> dont_fork_cnt = <value optimized out>
> n_lst = <value optimized out>
> p = <value optimized out>
> __FUNCTION__ = "main"
> (gdb)
>
>
>
>
>
> --
> Morten Isaksen
>
>
> _______________________________________________
> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing listsr-users at lists.sip-router.orghttp://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>
>
> --
> Daniel-Constantin Mierla - http://www.asipto.comhttp://twitter.com/#!/miconda - http://www.linkedin.com/in/miconda
> Kamailio Advanced Trainings - Berlin, Nov 25-28; Miami, Nov 18-20, 2013
> - more details about Kamailio trainings at http://www.asipto.com -
>
>
> _______________________________________________
> SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
> sr-users at lists.sip-router.org
> http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
>
>
--
Morten Isaksen
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-users/attachments/20131028/12c739ea/attachment-0001.html>
More information about the sr-users
mailing list