Hi Opensips Team,

I am attaching a core dump here for reference, kindly help us out in this
matter.

Waiting for an early response.

Best Regards
Saurabh Chopra
+918861979979


On Mon, Sep 20, 2021 at 2:14 PM Saurabh Chopra <[email protected]> wrote:

> Hi Opensips Team,
>
> We recently attended the opensips summit 2021 and found this new media
> anchoring functionality quite good. But whenever we are using the 
> *rtp_relay_engage("rtpengine")
> *function our opensips is crashing continuously. We are getting below
> memory error while taking core dump.
>
> *<error: Cannot access memory at address 0x83>*
>
> *Opensips version*:-
> version: opensips 3.2.1 (x86_64/linux)
> flags: STATS: On, DISABLE_NAGLE, USE_MCAST, SHM_MMAP, PKG_MALLOC,
> Q_MALLOC, F_MALLOC, HP_MALLOC, DBG_MALLOC, FAST_LOCK-ADAPTIVE_WAIT
> ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16,
> MAX_URI_SIZE 1024, BUF_SIZE 65535
> poll method support: poll, epoll, sigio_rt, select.
> git revision: e082381
> main.c compiled on 07:49:50 Aug 19 2021 with gcc 4.8.5
>
>
> Best Regards
> Saurabh Chopra
> +918861979979
>
[root@ip-20-0-65-208 core]# gdb /usr/local/sbin/opensips 
/home/centos/core/core.15107
GNU gdb (GDB) Red Hat Enterprise Linux 8.0.1-36.el7
Copyright (C) 2017 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/local/sbin/opensips...done.
[New LWP 15107]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/libthread_db.so.1".
Core was generated by `/usr/local/sbin/opensips -f 
/usr/local/etc/opensips/rtp-relay.cfg -w /home/cent'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  tsl (lock=0x10) at ../../fastlock.h:104
104             asm volatile(
Missing separate debuginfos, use: debuginfo-install glibc-2.17-324.el7_9.x86_64 
keyutils-libs-1.5.8-3.el7.x86_64 krb5-libs-1.15.1-50.el7.x86_64 
libcom_err-1.42.9-19.el7.x86_64 libgcc-4.8.5-44.el7.x86_64 
libselinux-2.5-15.el7.x86_64 libstdc++-4.8.5-44.el7.x86_64 
openssl-libs-1.0.2k-21.el7_9.x86_64 pcre-8.32-17.el7.x86_64 
zlib-1.2.7-19.el7_9.x86_64
(gdb)
(gdb)
(gdb)
(gdb)
(gdb)
(gdb)
(gdb)
(gdb) bt full
#0  tsl (lock=0x10) at ../../fastlock.h:104
        val = <optimized out>
#1  get_lock (lock=0x10) at ../../fastlock.h:226
        i = 1024
#2  rtp_relay_indlg (dlg=0x7f2ab67c6088, type=<optimized out>, 
params=<optimized out>) at rtp_relay_ctx.c:733
        info = {msg = 0x7ffc4066e120, branch = 1080483936, callid = 0x18, 
from_tag = 0x10150e9e0, to_tag = 0x7f2ab40a1098 <__FUNCTION__.14146>, body = 
0x1}
        msg = 0x7f2ab847f020
        ctx = <optimized out>
        body = 0x0
        ret = <optimized out>
        __FUNCTION__ = "rtp_relay_indlg"
#3  0x00007f2ab4031a22 in run_dlg_callbacks (type=type@entry=16, 
dlg=dlg@entry=0x7f2ab67c6088, msg=msg@entry=0x7f2ab847f020, dir=<optimized out>,
    dlg_data=dlg_data@entry=0x0, locked=locked@entry=0, 
is_active=is_active@entry=1) at dlg_cb.c:255
        cb = 0x7f2ab67ca960
        __FUNCTION__ = "run_dlg_callbacks"
#4  0x00007f2ab4063cb4 in dlg_onroute (req=<optimized out>, 
route_params=<optimized out>, param=<optimized out>) at dlg_handlers.c:2013
        dlg = <optimized out>
        val = {
          s = 0xa0f491 <buf+209> "d6b.aae1e7c>\r\nContact: 
<sip:[email protected]:27270;transport=UDP;rinstance=5fbc68c362278e7c>\r\nTo:
 
<sip:[email protected]>;tag=77a4a8baa3d548dd9c436db00d38c1f2\r\nFrom:
 \"testing\"<sip:6"..., len = 11}
        callid = {
          s = 0xa0f593 <buf+467> 
"NmQ4YzgxZjVmYjliMTJkN2VhYTJkZGU2NzVhMjJlNjY.\r\nCSeq: 1 ACK\r\nUser-Agent: 
3CXPhone 6.0.26523.0\r\nContent-Length: 0\r\n\r\n",
          len = 44}
        ftag = {
          s = 0xa0f580 <buf+448> "80190c04\r\nCall-ID: 
NmQ4YzgxZjVmYjliMTJkN2VhYTJkZGU2NzVhMjJlNjY.\r\nCSeq: 1 ACK\r\nUser-Agent: 
3CXPhone 6.0.26523.0\r\nContent-Length: 0\r\n\r\n", len = 8}
        ttag = {
          s = 0xa0f522 <buf+354> "77a4a8baa3d548dd9c436db00d38c1f2\r\nFrom: 
\"testing\"<sip:[email protected]>;tag=80190c04\r\nCall-ID: 
NmQ4YzgxZjVmYjliMTJkN2VhYTJkZGU2NzVhMjJlNjY.\r\nCSeq: 1 ACK\r\nUser-Agent: 
3CXPhone 6.0.265"..., len = 32}
        h_entry = <optimized out>
        h_id = <optimized out>
        new_state = 4
        old_state = 3
        unref = 0
        event = <optimized out>
        update_val = <optimized out>
        dir = 1
        dst_leg = 1
        src_leg = <optimized out>
        ret = 0
        ok = 1
        d_entry = 0x7f2ab6787990
        msg_cseq = <optimized out>
---Type <return> to continue, or q <return> to quit---
        final_cseq = <optimized out>
        is_active = 1
        t = <optimized out>
        __FUNCTION__ = "dlg_onroute"
#5  0x00007f2ab44bf1f3 in run_rr_callbacks (req=req@entry=0x7f2ab847f020, 
rr_params=rr_params@entry=0x7ffc4066e3d0) at rr_cb.c:97
        l_param = {
          s = 0xa0f47c <buf+188> "lr;ftag=80190c04;did=d6b.aae1e7c>\r\nContact: 
<sip:[email protected]:27270;transport=UDP;rinstance=5fbc68c362278e7c>\r\nTo:
 
<sip:[email protected]>;tag=77a4a8baa3d548dd9c436db00d38c1f2\r\n"...,
 len = 32}
        cbp = 0x7f2ab84443a0
        __FUNCTION__ = "run_rr_callbacks"
#6  0x00007f2ab44c0fd8 in after_loose (_m=_m@entry=0x7f2ab847f020, 
preloaded=preloaded@entry=0) at loose.c:877
        hdr = <optimized out>
        puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
            s = 0xa0f46a <buf+170> 
"44.194.233.6:5508;lr;ftag=80190c04;did=d6b.aae1e7c>\r\nContact: 
<sip:[email protected]:27270;transport=UDP;rinstance=5fbc68c362278e7c>\r\nTo:
 <sip:[email protected]>;tag=77a4a8baa3d548dd"..., len = 12}, 
port = {
            s = 0xa0f477 <buf+183> 
"5508;lr;ftag=80190c04;did=d6b.aae1e7c>\r\nContact: 
<sip:[email protected]:27270;transport=UDP;rinstance=5fbc68c362278e7c>\r\nTo:
 <sip:[email protected]>;tag=77a4a8baa3d548dd9c436db00d38c"..., 
len = 4}, params = {
            s = 0xa0f47c <buf+188> 
"lr;ftag=80190c04;did=d6b.aae1e7c>\r\nContact: 
<sip:[email protected]:27270;transport=UDP;rinstance=5fbc68c362278e7c>\r\nTo:
 
<sip:[email protected]>;tag=77a4a8baa3d548dd9c436db00d38c1f2\r\n"...,
 len = 32}, headers = {s = 0x0, len = 0}, port_no = 5508, proto = 0, type = 
SIP_URI_T,
          transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param 
= {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, 
lr = {
            s = 0xa0f47c <buf+188> 
"lr;ftag=80190c04;did=d6b.aae1e7c>\r\nContact: 
<sip:[email protected]:27270;transport=UDP;rinstance=5fbc68c362278e7c>\r\nTo:
 
<sip:[email protected]>;tag=77a4a8baa3d548dd9c436db00d38c1f2\r\n"...,
 len = 2}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, pn_provider = {s = 
0x0,
            len = 0}, pn_prid = {s = 0x0, len = 0}, pn_param = {s = 0x0, len = 
0}, pn_purr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = 
{
            s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = 
{s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 
0},
          r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}, 
pn_provider_val = {s = 0x0, len = 0}, pn_prid_val = {s = 0x0, len = 0}, 
pn_param_val = {s = 0x0,
            len = 0}, pn_purr_val = {s = 0x0, len = 0}, u_name = {{
              s = 0xa0f47f <buf+191> 
"ftag=80190c04;did=d6b.aae1e7c>\r\nContact: 
<sip:[email protected]:27270;transport=UDP;rinstance=5fbc68c362278e7c>\r\nTo:
 
<sip:[email protected]>;tag=77a4a8baa3d548dd9c436db00d38c1f2\r\nFro"...,
 len = 4}, {
              s = 0xa0f48d <buf+205> "did=d6b.aae1e7c>\r\nContact: 
<sip:[email protected]:27270;transport=UDP;rinstance=5fbc68c362278e7c>\r\nTo:
 
<sip:[email protected]>;tag=77a4a8baa3d548dd9c436db00d38c1f2\r\nFrom:
 \"testing\"<s"..., len = 3}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, 
len = 0}, {s = 0x0,
              len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 
0}, {s = 0x0, len = 0}}, u_val = {{
              s = 0xa0f484 <buf+196> "80190c04;did=d6b.aae1e7c>\r\nContact: 
<sip:[email protected]:27270;transport=UDP;rinstance=5fbc68c362278e7c>\r\nTo:
 
<sip:[email protected]>;tag=77a4a8baa3d548dd9c436db00d38c1f2\r\nFrom:
 \"t"..., len = 8}, {
              s = 0xa0f491 <buf+209> "d6b.aae1e7c>\r\nContact: 
<sip:[email protected]:27270;transport=UDP;rinstance=5fbc68c362278e7c>\r\nTo:
 
<sip:[email protected]>;tag=77a4a8baa3d548dd9c436db00d38c1f2\r\nFrom:
 \"testing\"<sip:6"..., len = 11}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 
0x0, len = 0}, {s = 0x0,
              len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 0}, {s = 0x0, len = 
0}, {s = 0x0, len = 0}}, u_params_no = 2}
        puri2 = {user = {s = 0x3000000010 <error: Cannot access memory at 
address 0x3000000010>, len = 1080487152}, passwd = {s = 0x7ffc4066ec30 "",
            len = 1080487168}, host = {s = 0x7ffc4066ec40 " \205g", len = 0}, 
port = {s = 0x0, len = 5}, params = {
            s = 0xe10 <error: Cannot access memory at address 0xe10>, len = 
-1}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T,
          transport = {s = 0x7ffc4066e918 "`\351f@\374\177", len = 16}, ttl = 
{s = 0x7ffc4066ed60 "`!H\270*\177", len = 1080487072}, user_param = {
            s = 0x7f2ab9471447 <fprintf+135> "H\201\304", <incomplete sequence 
\330>, len = 8180}, maddr = {s = 0x1520d20 "", len = -1182902432}, method = {
            s = 0x83 <error: Cannot access memory at address 0x83>, len = 1}, 
lr = {s = 0x90 <error: Cannot access memory at address 0x90>, len = 1}, r2 = {
            s = 0x7f2ab95a749b "]", len = 1080487344}, gr = {s = 0x7f2ab95a749b 
"]", len = 1080487360}, pn_provider = {s = 0x7f2ab97e1fc0 <_IO_mem_jumps> "",
---Type <return> to continue, or q <return> to quit---
            len = 1080487384}, pn_prid = {s = 0x7f2ab95a7498 "[%d]", len = 
22079968}, pn_param = {s = 0x7f2ab946673b <vfprintf+315> "A\367\a", len = 
1080486168},
          pn_purr = {s = 0x150e9e0 "\270W~\271*\177", len = 0}, transport_val = 
{
            s = 0x7f2ab94db7b1 <__strftime_internal+5905> 
"L\213\\$\020\351\223\353\377\377\017\037D", len = 1080486168}, ttl_val = {
            s = 0x1ff4 <error: Cannot access memory at address 0x1ff4>, len = 
6}, user_param_val = {
            s = 0xa006a1230 <error: Cannot access memory at address 
0xa006a1230>, len = 1080486544}, maddr_val = {s = 0x7ffc4066e860 
"\340\352f@\374\177",
            len = -1182908544}, method_val = {s = 0x7ffc4066ea10 "", len = 
21897728}, lr_val = {
            s = 0x7f2ab94db7b1 <__strftime_internal+5905> 
"L\213\\$\020\351\223\353\377\377\017\037D", len = 0}, r2_val = {
            s = 0x1ff4 <error: Cannot access memory at address 0x1ff4>, len = 
6}, gr_val = {s = 0xa4066e890 <error: Cannot access memory at address 
0xa4066e890>,
            len = 1080486624}, pn_provider_val = {s = 0x7ffc4066e8b0 
"\337\350f@\374\177", len = -1182908544}, pn_prid_val = {s = 0x7ffc4066ea60 
"`W~\271*\177",
            len = 21897728}, pn_param_val = {s = 0x7ffc4066e8d0 "\006", len = 
1080487832}, pn_purr_val = {s = 0x7f2ab97e57b0 <main_arena+80> "", len = 
-1080486111},
          u_name = {{s = 0x7ffc4066e8e0 "`\353f@\374\177", len = 1080486111}, {
              s = 0x7f2ab94db7b1 <__strftime_internal+5905> 
"L\213\\$\020\351\223\353\377\377\017\037D", len = -1182902432}, {
              s = 0x1ff4 <error: Cannot access memory at address 0x1ff4>, len = 
6}, {s = 0xab97e4760 <error: Cannot access memory at address 0xab97e4760>,
              len = 1080486752}, {s = 0x7f2ab94db7b1 <__strftime_internal+5905> 
"L\213\\$\020\351\223\353\377\377\017\037D", len = -1182908544}, {
              s = 0x1ff4 <error: Cannot access memory at address 0x1ff4>, len = 
6}, {s = 0xab97e5760 <error: Cannot access memory at address 0xab97e5760>,
              len = 1080486800}, {s = 0x7ffc4066e960 "", len = -1182908544}, {s 
= 0x7ffc4066eb10 "\030\354f@\374\177", len = 21897728}, {s = 0x7ffc4066e980 
"\v",
              len = 22154540}}, u_val = {{s = 0x7f2ab94da4b2 
<__strftime_internal+1042> 
"D\213L$\020L\213\\$`O\215\024/L\003\\$XE\205\311\017\204\362\022",
              len = 822083712}, {s = 0x1ffb <error: Cannot access memory at 
address 0x1ffb>, len = 0}, {s = 0x150e9e0 "\270W~\271*\177", len = 6772016}, {
              s = 0x7ffc4066eb68 "\220\301y\266*\177", len = 11}, {s = 0x15 
<error: Cannot access memory at address 0x15>, len = -1}, {
              s = 0x7f2ab9471447 <fprintf+135> "H\201\304", <incomplete 
sequence \330>, len = 8180}, {s = 0x1520d20 "", len = -1182902432}, {
              s = 0x7d <error: Cannot access memory at address 0x7d>, len = 
22154512}, {s = 0x7f2ab95a7495 "T ", len = 22154540}, {
              s = 0x7f2ab97e4760 <_nl_C_locobj> "\300\071~\271*\177", len = 
8}}, u_params_no = 23975}
        rt = <optimized out>
        status = <optimized out>
        uri = {
          s = 0xa0f466 <buf+166> 
"sip:44.194.233.6:5508;lr;ftag=80190c04;did=d6b.aae1e7c>\r\nContact: 
<sip:[email protected]:27270;transport=UDP;rinstance=5fbc68c362278e7c>\r\nTo:
 <sip:[email protected]>;tag=77a4a8baa3d5"..., len = 54}
        si = <optimized out>
        force_ss = <optimized out>
        __FUNCTION__ = "after_loose"
#7  0x00007f2ab44c5b65 in loose_route (_m=0x7f2ab847f020) at loose.c:914
        __FUNCTION__ = "loose_route"
#8  0x0000000000465df6 in do_action (a=a@entry=0x7f2ab84337e8, 
msg=msg@entry=0x7f2ab847f020) at action.c:960
        ret = 0
        v = <optimized out>
        i = <optimized out>
        len = <optimized out>
        cmatch = <optimized out>
        aitem = <optimized out>
        adefault = <optimized out>
        spec = <optimized out>
        val = {rs = {s = 0x0, len = 0}, ri = 6, flags = 0}
        start = {tv_sec = 17, tv_usec = 139821457089744}
---Type <return> to continue, or q <return> to quit---
        cmd = 0x7f2ab46d03c0 <cmds>
        acmd = <optimized out>
        cmdp = {0x7f2ab46d01d0 <ctx_rrdone_idx>, 0x9f9f60 <type_sizes>, 
0x7f2ab46d04b0 <cmds+240>, 0x0, 0x7f2ab84334f0, 0x7f2ab44ccf80 
<w_record_route+65>,
          0x7f2ab847f020, 0x7f2ab84334e8}
        tmp_vals = {{rs = {s = 0x7f2ab847f020 "\003", len = -1267923776}, ri = 
-1267923792, flags = 32554}, {rs = {
              s = 0x465e0c <do_action+2803> "\205\300\017\210\344\033", len = 
-1203557768}, ri = -1203245024, flags = 32554}, {rs = {s = 0x7f2ab8432ba0 
"\002",
              len = 0}, ri = 2, flags = 0}, {rs = {s = 0x4cafdc <eval_expr+907> 
"H\205\333t\n\307C\024\030", len = 21897728}, ri = 1080487680, flags = 32764}, 
{rs = {
              s = 0x737069736e65706f <error: Cannot access memory at address 
0x737069736e65706f>, len = -1182902432}, ri = -1182902432, flags = 32554}, {rs 
= {
              s = 0x7f2ab95a7495 "T ", len = 22154540}, ri = -1182906528, flags 
= 32554}, {rs = {s = 0x8 <error: Cannot access memory at address 0x8>,
              len = -1185260121}, ri = 0, flags = 0}, {rs = {
              s = 0x7f2ab94da4b2 <__strftime_internal+1042> 
"D\213L$\020L\213\\$`O\215\024/L\003\\$XE\205\311\017\204\362\022", len = 
822083712}, ri = 8187,
            flags = 0}}
        sval = {s = 0x7f2ab97e5760 <main_arena> "", len = -1182902432}
        __FUNCTION__ = "do_action"
#9  0x000000000046887a in run_action_list (a=<optimized out>, 
msg=msg@entry=0x7f2ab847f020) at action.c:181
        ret = -1
        t = 0x7f2ab84337e8
#10 0x00000000004cafdc in eval_elem (val=0x0, msg=0x7f2ab847f020, 
e=0x7f2ab8433910) at route.c:613
        ret = -5
        ival = <optimized out>
        i = <optimized out>
        lval = {rs = {s = 0x0, len = -1182916672}, ri = 1080488232, flags = 
32764}
        rval = {rs = {s = 0x7f2ab847f020 "\003", len = 1}, ri = 0, flags = 0}
        p = <optimized out>
        n = <optimized out>
#11 eval_expr (e=0x7f2ab8433910, msg=msg@entry=0x7f2ab847f020, 
val=val@entry=0x0) at route.c:937
        rec_lev = 1
        ret = <optimized out>
        __FUNCTION__ = "eval_expr"
#12 0x0000000000465e56 in do_action (a=a@entry=0x7f2ab8433aa0, 
msg=msg@entry=0x7f2ab847f020) at action.c:724
        ret = -5
        v = <optimized out>
        i = <optimized out>
        len = <optimized out>
        cmatch = <optimized out>
        aitem = <optimized out>
        adefault = <optimized out>
        spec = <optimized out>
        val = {rs = {s = 0x14e2200 "UTC", len = 5841793}, ri = 1080488368, 
flags = 32764}
        start = {tv_sec = 77309411355, tv_usec = 73014444042}
        cmd = 0x0
        acmd = <optimized out>
        cmdp = {0x17, 0x7f2ab847f020, 0x0, 0x0, 0x7f2ab67a3628, 0x7f2ab9516aaf 
<syslog+143>, 0x7900000008, 0x3000000018}
---Type <return> to continue, or q <return> to quit---
        tmp_vals = {{rs = {s = 0x7ffc4066f200 " \360G\270*\177", len = 
1080488256}, ri = 21897728, flags = 0}, {rs = {
              s = 0x55acd1 <fm_free+253> "H\203\304\060[]A\\A]A^ú2\b", len = 
-1262991616}, ri = -1233504728, flags = 32554}, {rs = {s = 0x0, len = 9303468}, 
ri = 0,
            flags = 0}, {rs = {s = 0x0, len = -1233504728}, ri = -1185846609, 
flags = 32554}, {rs = {s = 0xa0f605 <buf+581> "", len = 24}, ri = 1080488560,
            flags = 32764}, {rs = {s = 0x7ffc4066f1b0 "", len = 0}, ri = 
10548300, flags = 0}, {rs = {s = 0x674ce5 <__FUNCTION__.10578> "receive_msg",
              len = -1236349000}, ri = -1203242504, flags = 32554}, {rs = {s = 
0x1 <error: Cannot access memory at address 0x1>, len = 581}, ri = -1203245024,
            flags = 32554}}
        sval = {s = 0x7900000008 <error: Cannot access memory at address 
0x7900000008>, len = 5}
        __FUNCTION__ = "do_action"
#13 0x0000000000468bc2 in run_action_list (msg=<optimized out>, 
a=0x7f2ab8433aa0) at action.c:181
        ret = -1
        t = 0x7f2ab8433aa0
#14 run_actions (msg=0x7f2ab847f020, a=<optimized out>) at action.c:128
        ret = 0
        ret = <optimized out>
#15 run_top_route (sr=..., msg=msg@entry=0x7f2ab847f020) at action.c:228
        bk_action_flags = 0
        ret = <optimized out>
        ctx = 0x0
        __FUNCTION__ = "run_top_route"
#16 0x000000000047b402 in receive_msg (
    buf=0xa0f3c0 <buf> "ACK sip:[email protected]:54181;ob SIP/2.0\r\nVia: 
SIP/2.0/UDP 
100.127.6.111:60274;branch=z9hG4bK-d8754z-0f4f992d6c445831-1---d8754z-;rport\r\nMax-Forwards:
 69\r\nRoute: <sip:44.194.233.6:5508;lr;ftag=8019"..., len=<optimized out>, 
rcv_info=rcv_info@entry=0x7ffc4066f350,
    existing_context=existing_context@entry=0x0, msg_flags=msg_flags@entry=0) 
at receive.c:213
        ctx = 0x7f2ab8480458
        msg = 0x7f2ab847f020
        start = {tv_sec = 0, tv_usec = 16790000}
        rc = 3
        old_route_type = <optimized out>
        in_buff = {
          s = 0xa0f3c0 <buf> "ACK sip:[email protected]:54181;ob 
SIP/2.0\r\nVia: SIP/2.0/UDP 
100.127.6.111:60274;branch=z9hG4bK-d8754z-0f4f992d6c445831-1---d8754z-;rport\r\nMax-Forwards:
 69\r\nRoute: <sip:44.194.233.6:5508;lr;ftag=8019"..., len = 581}
        __FUNCTION__ = "receive_msg"
#17 0x000000000064cdee in udp_read_req (si=<optimized out>, 
bytes_read=<optimized out>) at net/proto_udp/proto_udp.c:186
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {139820577350178, 0}, 
addr32 = {2211996194, 32554, 0, 0}, addr16 = {25122, 33752, 32554, 0, 0, 0, 0, 
0},
              addr = "\"b؃*\177\000\000\000\000\000\000\000\000\000"}}, dst_ip 
= {af = 2, len = 4, u = {addrl = {3493920788, 0}, addr32 = {3493920788, 0, 0, 
0},
              addr16 = {20, 53313, 0, 0, 0, 0, 0, 0}, addr = "\024\000A\320", 
'\000' <repeats 11 times>}}, src_port = 27270, dst_port = 5508, proto = 1,
          proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 
2, sa_data = "j\206\"b؃\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
              sin_port = 34410, sin_addr = {s_addr = 2211996194}, sin_zero = 
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 34410,
              sin6_flowinfo = 2211996194, sin6_addr = {__in6_u = {__u6_addr8 = 
"\000\000\000\000\000\000\000\000\377\377\377\377\000\000\000", __u6_addr16 = 
{0, 0, 0,
                    0, 65535, 65535, 0, 0}, __u6_addr32 = {0, 0, 4294967295, 
0}}}, sin6_scope_id = 0}}, bind_address = 0x7f2ab84280d8}
        len = <optimized out>
        buf = "ACK sip:[email protected]:54181;ob SIP/2.0\r\nVia: SIP/2.0/UDP 
100.127.6.111:60274;branch=z9hG4bK-d8754z-0f4f992d6c445831-1---d8754z-;rport\r\nMax-Forwards:
 69\r\nRoute: <sip:44.194.233.6:5508;lr;ftag=8019"...
---Type <return> to continue, or q <return> to quit---
        fromlen = 16
        p = <optimized out>
        msg = {
          s = 0xa0f3c0 <buf> "ACK sip:[email protected]:54181;ob 
SIP/2.0\r\nVia: SIP/2.0/UDP 
100.127.6.111:60274;branch=z9hG4bK-d8754z-0f4f992d6c445831-1---d8754z-;rport\r\nMax-Forwards:
 69\r\nRoute: <sip:44.194.233.6:5508;lr;ftag=8019"..., len = 581}
        __FUNCTION__ = "udp_read_req"
#18 0x0000000000626f27 in handle_io (idx=<optimized out>, event_type=<optimized 
out>, fm=<optimized out>) at net/net_udp.c:272
        n = <optimized out>
        read = 32554
#19 io_wait_loop_epoll (repeat=<optimized out>, t=<optimized out>, h=<optimized 
out>) at net/../io_wait_loop.h:311
        ret = 1
        n = 1
        r = 0
        i = <optimized out>
        e = <optimized out>
        ep_event = {events = 0, data = {ptr = 0x9f8fd000000000, fd = 0, u32 = 
0, u64 = 44912644812963840}}
        fd = <optimized out>
        curr_time = 31
#20 0x000000000062a487 in udp_start_processes (chd_rank=chd_rank@entry=0x9f8fd0 
<chd_rank>, startup_done=startup_done@entry=0x0) at net/net_udp.c:497
        si = <optimized out>
        p_id = <optimized out>
        i = <optimized out>
        __FUNCTION__ = "udp_start_processes"
#21 0x000000000041de74 in main_loop () at main.c:227
        startup_done = 0x0
        chd_rank = 3
        last_check = 0
        rc = <optimized out>
#22 main (argc=<optimized out>, argv=<optimized out>) at main.c:916
        c = <optimized out>
        r = 0
        tmp = 0x1 <error: Cannot access memory at address 0x1>
        tmp_len = <optimized out>
        port = <optimized out>
        proto = <optimized out>
        protos_no = <optimized out>
        options = 0x682c30 "f:cCm:M:b:l:n:N:rRvdDFEVhw:t:u:g:p:P:G:W:o:a:k:s:"
        ret = -1
        seed = 3915099852
        rfd = <optimized out>
        __FUNCTION__ = "main"
_______________________________________________
Users mailing list
[email protected]
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

Reply via email to