[OpenSIPS-Users] core dump in b2b

Jeff Pyle jpyle at fidelityvoice.com
Tue May 18 19:01:40 CEST 2010


Hi Bogdan,

This is the first time I've tried this.  Let me know if I need to run anything else.

# gdb opensips core.32765
[ opening dribble ... ]

(gdb) print leg
$1 = (dlg_leg_t *) 0xb4153838
(gdb) print from_tag
$2 = (str *) 0x0
(gdb) print *leg
$3 = {id = 0, tag = {s = 0xb4153860 "43fd11f70ee25a382597ac560865d088.ccac94.4\001", len = 37}, cseq = 103, 
  route_set = {s = 0x0, len = 0}, contact = {s = 0x0, len = 0}, bind_addr = 0x81b820c, next = 0x0}
(gdb) print *from_tag
Cannot access memory at address 0x0


- Jeff



On May 18, 2010, at 12:49 PM, Bogdan-Andrei Iancu wrote:

> Hi Jeff,
> 
> in frame 0, could you print "leg" , "from_tag" and "*leg", "*from_tag" ?
> 
> Thanks and regards,
> Bogdan
> 
> Jeff Pyle wrote:
>> Hello,
>> 
>> I'm working through a top-hiding configuration from SVN.  I've got build 6877.  The configuration is very simple:  rewrite $rd with a value pulled from a custom header on the incoming request invite, and run b2b_init_request("top hiding").  The b2b_request and b2b_reply routes exist as well, only executing an xlog.
>> 
>> The scenario appears to work correctly, unless the upstream proxy returns a 403 Forbidden.  The SIP traffic appears to flow properly (the 403s and the ACKs) but the top-hiding proxy immediately core dumps after it receives the ACK from the UAC.
>> 
>> #0  0x006f7de0 in b2b_search_htable_dlg (table=0xb414b7d4, hash_index=366, local_index=7315224, to_tag=0xb41537f4, 
>>    from_tag=0x0, callid=0xb41537e4) at dlg.c:100
>> #1  0x006fcb8f in b2b_entity_delete (et=B2B_CLIENT, b2b_key=0xb4153750, dlginfo=0xb41537e4) at dlg.c:1039
>> #2  0x00865248 in b2bl_delete (tuple=0xb4150270, hash_index=366) at records.c:199
>> #3  0x00861e3b in b2b_logic_notify (src=0, msg=0x81bcf58, key=0xbfe894b8, type=0, param=0xbfe894b0) at logic.c:668
>> #4  0x008639c4 in b2b_server_notify (msg=0x81bcf58, key=0xbfe894b8, type=0, param=0xbfe894b0) at logic.c:1199
>> #5  0x006f9146 in b2b_prescript_f (msg=0x81bcf58, uparam=0x0) at dlg.c:583
>> #6  0x080b535a in exec_pre_req_cb (msg=0x81bcf58) at script_cb.c:155
>> #7  0x0809db74 in receive_msg (
>>    buf=0x81922c0 "ACK sip:1111111111 at domain.com;user=phone SIP/2.0\r\nVia: SIP/2.0/UDP 5.4.3.2:5060;branch=z9hG4bK2dc67df9\r\nFrom: \"Jeff Pyle\" <sip:0000000000 at 5.4.3.2>;tag=as4ded813f\r\nTo: <sip:2"..., 
>>    len=443, rcv_info=0xbfe89584) at receive.c:156
>> #8  0x080e5306 in udp_rcv_loop () at udp_server.c:492
>> #9  0x08070710 in main (argc=3, argv=0xbfe89784) at main.c:818
>> 
>> Headers manually modified here to protect the guilty.
>> 
>> I'm about to try the latest 1.6 build to see if it makes a difference.
>> 
>> 
>> 
>> - Jeff
>> 
>> 
>> _______________________________________________
>> Users mailing list
>> Users at lists.opensips.org
>> http://lists.opensips.org/cgi-bin/mailman/listinfo/users
>> 
>> 
> 
> 
> -- 
> Bogdan-Andrei Iancu
> www.voice-system.ro
> 
> 
> _______________________________________________
> Users mailing list
> Users at lists.opensips.org
> http://lists.opensips.org/cgi-bin/mailman/listinfo/users




More information about the Users mailing list