kamailio.org
Sign In
Sign Up
Sign In
Sign Up
Manage this list
×
Keyboard Shortcuts
Thread View
j
: Next unread message
k
: Previous unread message
j a
: Jump to all threads
j l
: Jump to MailingList overview
2025
June
May
April
March
February
January
2024
December
November
October
September
August
July
June
May
April
March
February
January
2023
December
November
October
September
August
July
June
May
April
March
February
January
2022
December
November
October
September
August
July
June
May
April
March
February
January
2021
December
November
October
September
August
July
June
May
April
March
February
January
2020
December
November
October
September
August
July
June
May
April
March
February
January
2019
December
November
October
September
August
July
June
May
April
March
February
January
2018
December
November
October
September
August
July
June
May
April
March
February
January
2017
December
November
October
September
August
July
June
May
April
March
February
January
2016
December
November
October
September
August
July
June
May
April
March
February
January
2015
December
November
October
September
August
July
June
May
April
March
February
January
2014
December
November
October
September
August
July
June
May
April
March
February
January
2013
December
November
October
September
August
July
June
May
April
March
February
January
2012
December
November
October
September
August
July
June
May
April
March
February
January
2011
December
November
October
September
August
July
June
May
April
March
February
January
2010
December
November
October
September
August
July
June
May
April
March
February
January
2009
December
November
October
September
August
July
June
May
April
March
February
January
2008
December
November
List overview
Download
sr-dev
May 2017
----- 2025 -----
June 2025
May 2025
April 2025
March 2025
February 2025
January 2025
----- 2024 -----
December 2024
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
May 2024
April 2024
March 2024
February 2024
January 2024
----- 2023 -----
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
----- 2022 -----
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
----- 2021 -----
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
----- 2020 -----
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
----- 2019 -----
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
----- 2018 -----
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
----- 2017 -----
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
----- 2016 -----
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
----- 2015 -----
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
----- 2014 -----
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
----- 2013 -----
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
----- 2012 -----
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
----- 2011 -----
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
----- 2010 -----
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
----- 2009 -----
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
----- 2008 -----
December 2008
November 2008
sr-dev@lists.kamailio.org
32 participants
299 discussions
Start a n
N
ew thread
[kamailio/kamailio] Segmentation fault on udp_rcv_loop (#1120)
by Pepelux
15 May '17
15 May '17
<!-- Kamailio Project uses GitHub Issues only for bugs in the code or feature requests. If you have questions about using Kamailio or related to its configuration file, ask on sr-users mailing list: *
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
If you have questions about developing extensions to Kamailio or its existing C code, ask on sr-dev mailing list *
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
Please try to fill this template as much as possible for any issue. It helps the developers to troubleshoot the issue. If you submit a feature request (or enhancement), you can delete the text of the template and only add the description of what you would like to be added. If there is no content to be filled in a section, the entire section can be removed. You can delete the comments from the template sections when filling. You can delete next line and everything above before submitting (it is a comment). --> ### Description <!-- Explain what you did, what you expected to happen, and what actually happened. --> ### Troubleshooting #### Reproduction <!-- If the issue can be reproduced, describe how it can be done. --> #### Debugging Data <!-- If you got a core dump, use gdb to extract troubleshooting data - full backtrace, local variables and the list of the code at the issue location. gdb /path/to/kamailio /path/to/corefile bt full info locals list If you are familiar with gdb, feel free to attach more of what you consider to be relevant. --> ``` # gdb kamailio /tmp/core GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <
http://gnu.org/licenses/gpl.html
> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: <
http://www.gnu.org/software/gdb/bugs/
>. Find the GDB manual and other documentation resources online at: <
http://www.gnu.org/software/gdb/documentation/
>. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from kamailio...Reading symbols from /usr/lib/debug/.build-id/4e/fae9c9a848e19a554209666ff42a678720280e.debug...done. done. [New LWP 32260] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/kamailio.'. Program terminated with signal SIGSEGV, Segmentation fault. #0 subst_run (se=0x7f8b8469eb50, input=0x4 <error: Cannot access memory at #address 0x4>, msg=0x7f8b8475de28, count=0x1) at re.c:453 453 re.c: No such file or directory. (gdb) bt full #0 subst_run (se=0x7f8b8469eb50, input=0x4 <error: Cannot access memory at #address 0x4>, msg=0x7f8b8475de28, count=0x1) at re.c:453 head = 0x7f8b847606a0 r = -2073697496 eflags = 2203912 __FUNCTION__ = "subst_run" #1 0x0000000000576037 in subst_str (input=0x7f8b402c5d00 <tr_txt_buf> "\"asterisk\"", msg=0x4, se=0x6acf73, count=0x7fff95b4590c) at re.c:503 res = 0x7f8b8475de28 dest = 0x7f8b847606a0 "" __FUNCTION__ = "subst_str" #2 0x00007f8b400b65d2 in tr_txt_eval_re (msg=0x7f8b8475de28, tp=0x7f8b8469ea60, subtype=8, val=0x7fff95b459e0) at txt_var.c:87 se = 0x7f8b8469eb50 nmatches = 32651 result = 0x7f8b8475de28 tr_txt_buf = "\"asterisk\"\000\000P201\000\"", '\000' <repeats 2029 times> v = {rs = {s = 0x7fff95b45a20 "", len = 1856138293}, ri = -2073783984, flags = 32651} __FUNCTION__ = "tr_txt_eval_re" #3 0x0000000000586a50 in tr_exec (msg=0x7f8b8475de28, t=0x7f8b8469dfc0, v=0x7fff95b459e0) at pvapi.c:1681 r = -2072639840 #4 0x000000000044e6a9 in lval_pvar_assign (lv=<optimized out>, rv=<optimized out>, msg=<optimized out>, h=<optimized out>) at lvalue.c:334 r_avp = 0x7f8b847606a0 destroy_pval = -1783339264 pvar = 0x7f8b847606b8 pval = {rs = { s = 0x9ab890 <buf+144> "\"asterisk\" <sip:asterisk@X.X.X.6:5080>;tag=as785f9e00\r\nTo: <sip:zs_pbx40_trunk@XXXXXXXXXX.com>\r\nContact: <sip:asterisk@X.X.X.6:5080>\r\nCall-ID: 7feae50257e62b06765f0a4c4d60650a@185"..., len = 10}, ri = 0, flags = 4} avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -2058051944}, re = 0x1} v = -2072639840 #5 lval_assign (h=0x7fff95b46700, msg=0x7f8b8475de28, lv=0x7f8b8469df50, rve=0x7f8b8469f6e0) at lvalue.c:399 rv = 0x7f8b8469f6e8 ret = -1783339264 __FUNCTION__ = "lval_assign" #6 0x00000000005414d3 in do_action (h=0x7fff95b46700, a=0x7f8b8469ec28, msg=0x7f8b8475de28) at action.c:1430 ret = -5 v = 1 dst = {send_sock = 0x7fff95b48bd0, to = {s = {sa_family = 4346, sa_data = "O\205\213\177\000\000\001\000\000\000\001\000\000"}, sin = {sin_family = 4346, sin_port = 34127, sin_addr = {s_addr = 32651}, sin_zero = "\001\000\000\000\001\000\000"}, sin6 = {sin6_family = 4346, sin6_port = 34127, sin6_flowinfo = 32651, sin6_addr = {__in6_u = { __u6_addr8 = "\001\000\000\000\001\000\000\000\340\370\220\002\000\000\000", __u6_addr16 = {1, 0, 1, 0, 63712, 656, 0, 0}, __u6_addr32 = {1, 1, 43055328, 0}}}, sin6_scope_id = 110}}, id = 119, proto = 0 '\000', send_flags = {f = 79 'O', blst_imask = 198 '\306'}} end = 0x7fff95b46700 "\002" uri = {user = {s = 0x7fff95b45c90 "\300\270\232", len = 1130964784}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 5615623}, host = {s = 0x0, len = 667307776}, port = {s = 0x0, len = 1036086182}, params = {s = 0x7fff95b45c80 "4\271\232", len = -1783341956}, sip_params = {s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = -1783342108}, headers = {s = 0x0, len = -1783341952}, port_no = 48, proto = 0, type = ERROR_URI_T, flags = (unknown: 10140004), transport = {s = 0x156673 <error: Cannot access memory at address 0x156673>, len = 1}, ttl = {s = 0x0, len = 5615623}, user_param = {s = 0x156673 <error: Cannot access memory at address 0x156673>, len = 667307776}, maddr = { s = 0x1ac00f <error: Cannot access memory at address 0x1ac00f>, len = -1783342012}, method = {s = 0xe5 <error: Cannot access memory at address 0xe5>, len = 0}, lr = {s = 0x7f8b8475de28 "\235\030", len = -1783341980}, r2 = {s = 0x0, len = 1138816376}, gr = {s = 0x7f8b8475de28 "\235\030", len = -1783341584}, transport_val = {s = 0x0, len = -1783341072}, ttl_val = { s = 0x7f8b43e0f588 "0@\236C\213\177", len = 5615623}, user_param_val = {s = 0x7fff95b46c50 "(\336u\204\213\177", len = 667307776}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1036492449}, method_val = { s = 0x9ab934 <buf+308> "7feae50257e62b06765f0a4c4d60650a@X.X.X.6:5080\r\nCSeq: 102 NOTIFY\r\nUser-Agent: ast.zs PBX\r\nEvent: message-summary\r\nContent-Type: application/simple-message-summary\r\nContent-Length: 97\r\n\r\nMessages-W"..., len = 50}, lr_val = { s = 0x9ab8c0 <buf+192> "as785f9e00\r\nTo: <sip:zs_pbx40_trunk@XXXXXXXXXX.com>\r\nContact: <sip:asterisk@X.X.X.6:5080>\r\nCall-ID: 7feae50257e62b06765f0a4c4d60650a@X.X.X.6:5080\r\nCSeq: 102 NOTIFY\r\nUser-Agent: as"..., len = 10}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 667307776}} ---Type <return> to continue, or q <return> to quit--- next_hop = {user = {s = 0x7fff95b45f50 "", len = -2073440000}, passwd = {s = 0x7f8b8475de28 "\235\030", len = -1783341584}, host = {s = 0x0, len = -1783341072}, port = { s = 0x7f8b43e0f588 "0@\236C\213\177", len = 1036498757}, params = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 0}, sip_params = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 42994560}, headers = {s = 0xe <error: Cannot access memory at address 0xe>, len = -2073418280}, port_no = 2320, proto = 33870, type = 32651, flags = URI_USER_NORMALIZE, transport = {s = 0x200000001 <error: Cannot access memory at address 0x200000001>, len = 667307776}, ttl = {s = 0x2900a70 "", len = -2073440024}, user_param = {s = 0x7fff95b45df0 "\020_\264\225\377\177", len = -2072650200}, maddr = {s = 0x7fff95b46700 "\002", len = -1783341072}, method = {s = 0x0, len = -2072650200}, lr = { s = 0x7fff95b45f10 "", len = -2073435824}, r2 = {s = 0x7fff95b46700 "\002", len = -1783341072}, gr = {s = 0x0, len = 1115878885}, transport_val = {s = 0x0, len = -2072641703}, ttl_val = {s = 0x0, len = 5717688}, user_param_val = {s = 0x7f8b84760cb0 "sip:s@185.99.186.218:5060", len = -2073435848}, maddr_val = {s = 0x7fff95b45f10 "", len = -2072650200}, method_val = { s = 0x7fff95b46700 "\002", len = -1783341072}, lr_val = {s = 0x0, len = 5795166}, r2_val = {s = 0x7f8b8469efd0 "!", len = -2073435864}, gr_val = {s = 0x7f8b8475de28 "\235\030", len = -1783339264}} u = 0x7fff95b46700 flags = 0 st = {flags = 2511626064, id = 32767, name = {n = -2073440000, s = {s = 0x7f8b8469d100 "", len = -2072650200}, re = 0x7f8b8469d100}, avp = 0x7fff95b45df0} sct = 0x7fff95b46700 sjt = 0x7fff95b46700 mct = 0x0 rv = 0x7f8b854f159d <build_trtable+2861> rv1 = 0x7f8b8475de28 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_INT, c = {avp_val = {n = -1783341788, s = {s = 0x7fff95b45d24 "", len = -1783337904}, re = 0x7fff95b45d24}, pval = {rs = {s = 0x7fff95b45d24 "", len = -1783337904}, ri = -1783342236, flags = 32767}}, i2s = "\370", '\000' <repeats 15 times>, "D'iC\213\177"} s = {s = 0x29214a0 "\300\v\222\002", len = 43127968} srevp = {0x7f8b8469ec28, 0x7f8b8475de28} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140237199485840, string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s = 0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90, attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #7 0x00000000005407b5 in run_actions (h=0x6acf73, a=0x4, msg=0x8) at action.c:1549 ret = -1783339264 mod = 0x7f8b8469ec28 __FUNCTION__ = "run_actions" #8 0x0000000000542218 in do_action (h=0x7fff95b46700, a=0x7f8b846a0630, msg=0x7f8b8475de28) at action.c:1049 ret = 1 v = 1 dst = {send_sock = 0x920610, to = {s = {sa_family = 20224, sa_data = "\306'\320xD\247l`\264\225\377\177\000"}, sin = {sin_family = 20224, sin_port = 10182, sin_addr = {s_addr = 2806282448}, sin_zero = "l`\264\225\377\177\000"}, sin6 = {sin6_family = 20224, sin6_port = 10182, sin6_flowinfo = 2806282448, sin6_addr = {__in6_u = { __u6_addr8 = "l`\264\225\377\177\000\000hnk\204\213\177\000", __u6_addr16 = {24684, 38324, 32767, 0, 28264, 33899, 32651, 0}, __u6_addr32 = {2511626348, 32767, 2221633128, 32651}}}, sin6_scope_id = 2511627712}}, id = 32767, proto = 40 '(', send_flags = {f = 222 '\336', blst_imask = 117 'u'}} end = 0x7f8b8469efd0 "!" uri = {user = {s = 0x7fff95b461e0 "`\271\232", len = 1130860144}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 5615623}, host = {s = 0x0, len = 667307776}, port = {s = 0x0, len = 1036086182}, params = {s = 0x7fff95b461d0 "๚", len = -1783340596}, sip_params = {s = 0x7f8b846b6e68 "\233\005", len = -2072650200}, headers = {s = 0x7fff95b463c4 "\377\177", len = -1783340592}, port_no = 71, proto = 0, type = ERROR_URI_T, flags = (unknown: 10140160), transport = {s = 0x194f15 <error: Cannot access memory at address 0x194f15>, len = 66}, ttl = {s = 0x0, len = 5615623}, user_param = {s = 0x194f15 <error: Cannot access memory at address 0x194f15>, len = 667307776}, maddr = {s = 0x1fa2da <error: Cannot access memory at address 0x1fa2da>, len = -1783340652}, method = {s = 0xee <error: Cannot access memory at address 0xee>, len = 10140069}, lr = {s = 0x7f8b8475de28 "\235\030", len = -1783340620}, r2 = {s = 0x0, len = 1134258072}, gr = {s = 0x7f8b8475de28 "\235\030", len = -1783340224}, transport_val = {s = 0x0, len = -1783339712}, ttl_val = {s = 0x7f8b439b67a8 "\300g\233C\213\177", len = 5615623}, user_param_val = { s = 0x7fff95b46c50 "(\336u\204\213\177", len = 667307776}, maddr_val = {s = 0x0, len = 1036492449}, method_val = { s = 0x9ab9e0 <buf+480> "ent-Length: 97\r\n\r\nMessages-Waiting: no\r\nMessage-Account: sip:asterisk@X.X.X.6:5080\r\nVoice-Message: 0/0 (0/0)\r\n", len = 35}, lr_val = { s = 0x9ab960 <buf+352> "6:5080\r\nCSeq: 102 NOTIFY\r\nUser-Agent: ast.zs PBX\r\nEvent: message-summary\r\nContent-Type: application/simple-message-summary\r\nContent-Length: 97\r\n\r\nMessages-Waiting: no\r\nMessage-Account: sip:asterisk@18"..., len = 10}, r2_val = { s = 0x9ab9a5 <buf+421> "ary\r\nContent-Type: application/simple-message-summary\r\nContent-Length: 97\r\n\r\nMessages-Waiting: no\r\nMessage-Account: sip:asterisk@X.X.X.6:5080\r\nVoice-Message: ---Type <return> to continue, or q <return> to quit--- 0/0 (0/0)\r\n", len = 0}, gr_val = {s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = -1783340460}} next_hop = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -2075194792}, passwd = {s = 0x7f8b8463c4a0 "\330\305c\204\213\177", len = 667307776}, host = { s = 0x7fff95b463c8 "(\336u\204\213\177", len = -2074998176}, port = {s = 0x7fff95b462c0 "|", len = -2072650200}, params = {s = 0x7fff95b463c8 "(\336u\204\213\177", len = 0}, sip_params = { s = 0x676e70 <select_cfg_var> "AWAVAUATUSH\211\363H\203\354XdH\213\004%(", len = 5636821}, headers = {s = 0x7f8b0000003d <error: Cannot access memory at address 0x7f8b0000003d>, len = 1008}, port_no = 15, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 60), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 92}, ttl = { s = 0x0, len = 0}, user_param = {s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, len = 0}, maddr = {s = 0x7c <error: Cannot access memory at address 0x7c>, len = 2698888}, method = {s = 0x293c48 <error: Cannot access memory at address 0x293c48>, len = -2054728160}, lr = {s = 0x3c8 <error: Cannot access memory at address 0x3c8>, len = -1783338992}, r2 = { s = 0x7fff95b46810 "\305\fv\204\213\177", len = 0}, gr = { s = 0x43b2fc <grp_hash_lookup+1420> "1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200", len = -2058043360}, transport_val = { s = 0x6aea19 <__FUNCTION__.8262> "rval_new_empty", len = 43099520}, ttl_val = {s = 0x291a590 "\001", len = -2057746175}, user_param_val = { s = 0x43b2fc <grp_hash_lookup+1420> "1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200", len = 43099536}, maddr_val = { s = 0x7fff95b46490 "", len = 4}, method_val = {s = 0x7fff95b46660 "\260\177\355C\213\177", len = -2057714242}, lr_val = {s = 0x7f8b846b8ce8 "\a", len = -2072650200}, r2_val = { s = 0x7fff95b46e30 "", len = -1783338768}, gr_val = {s = 0x291a510 "\001", len = -1783339456}} u = 0x7f8b8469efd0 flags = 2 st = {flags = 1, id = 0, name = {n = -2075194792, s = {s = 0x7f8b844f0a58 "\n", len = -2073836384}, re = 0x7f8b844f0a58}, avp = 0xa74478d027c64f00} sct = 0x7f8b8469efd0 sjt = 0x7f8b8469efd0 mct = 0x0 rv = 0x7fff95b46070 rv1 = 0x7f8b8475de28 c1 = {cache_type = 2511627712, val_type = 32767, c = {avp_val = {n = -2072650200, s = {s = 0x7f8b8475de28 "\235\030", len = 0}, re = -0x7f8b8475de28}, pval = {rs = {s = 0x7f8b8475de28 "\235\030", len = 0}, ri = 5512432, flags = 0}}, i2s = "\020\245\221\002", '\000' <repeats 12 times>, "\204\216gC\213\177"} s = {s = 0x291a400 "xV\207\205\213\177", len = 0} srevp = {0x7f8b846a0630, 0x7f8b8475de28} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140237199485840, string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s = 0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90, attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #9 0x00000000005407b5 in run_actions (h=0x6acf73, h@entry=0x7fff95b46700, a=0x4, a@entry=0x7f8b8469d9d8, msg=0x8, msg@entry=0x7f8b8475de28) at #action.c:1549 ret = 1 mod = 0x7f8b846a0630 __FUNCTION__ = "run_actions" #10 0x000000000054d225 in run_top_route (a=0x7f8b8469d9d8, msg=0x7f8b8475de28, c=<optimized out>) at action.c:1635 ctx = {rec_lev = 2203832, run_flags = 0, last_retcode = 2695376, jmp_env = {{__jmpbuf = {2702408, 8, 237, -6393852735543423232, 2695376, 6245668, 2203768, 6999923}, __mask_was_saved = 7467126, __saved_mask = {__val = {8, 239, 12052891338166128384, 2695312, 6245668, 9569808, 140236102870397, 140236102900704, 140237199498792, 140735705016048, 35, 140237199498792, 140236116819368, 140236116819984, 6597488, 43099408}}}}} p = <optimized out> ret = <optimized out> sfbk = 0 #11 0x00007f8b4315b8e6 in prepare_new_uac (t=0x7f8b43ed7da8, i_req=0x7f8b8475de28, branch=-2075185312, uri=0x7fff95b466a0, path=0x21a108, #next_hop=0x7f8b847606b8, fsocket=0x7f8b844f2f60, snd_flags=..., fproto=0, flags=2, instance=0x7f8b8475e468, ruid=0x7f8b8475e480, location_ua=0x7f8b8475e490) at t_fwd.c:343 shbuf = 0x7fff95b466a0 "\260\fv\204\213\177" parsed_uri_bak = {user = {s = 0x7f8b84760cb4 "s@185.99.186.218:5060", len = 1}, passwd = {s = 0x0, len = 0}, host = {s = 0x7f8b84760cb6 "185.99.186.218:5060", len = 14}, port = { s = 0x7f8b84760cc5 "5060", len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = (unknown: 0), ---Type <return> to continue, or q <return> to quit--- transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} ret = -2072649560 len = 0 msg_uri_bak = {s = 0x7f8b84760cb0 "sip:s@185.99.186.218:5060", len = 25} dst_uri_bak = {s = 0x0, len = 0} dst_uri_backed_up = -2075185312 path_bak = {s = 0x0, len = 0} instance_bak = {s = 0x0, len = 0} ruid_bak = {s = 0x7f8b84760640 "uloc-590b3d48-7288-95060 ", len = 20} ua_bak = {s = 0x7f8b84760d18 "Asterisk PBX SVN-branch-1.8-r434337slsda8", len = 35} force_send_socket_bak = 0x7f8b844f2f60 dst = 0x7f8b43ed8010 ctx = {rec_lev = 2, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140735705016064, 1818402078992133173, 140237198711256, 140237199498792, 140236116819368, 140236116819984, -1818495034028692427, 1818402731650608181}, __mask_was_saved -= 0, __saved_mask = {__val = {140235982654803, -140735705017568, 1, 140735705016736, 140237198820624, -140237198822632, 10132608, 3, 6158328, 140237198820112, 140236067782550, 16777216, 140735705016324, 2206096, 140236067782550, 16777216}}}}} __FUNCTION__ = "prepare_new_uac" #12 0x00007f8b4315de45 in add_uac (t=0x7f8b43ed7da8, request=0x7f8b8475de28, uri=0x8, next_hop=0x1, path=0x21a108, proxy=0x0, fsocket=0x7f8b844f2f60, #snd_flags=..., proto=0, flags=-2072639840, instance=0x7f8b8475e468, ruid=0x7f8b8475e480, location_ua=0x7f8b8475e490) at t_fwd.c:788 branch = 0 __FUNCTION__ = "add_uac" #13 0x00007f8b4316672a in t_forward_nonack (t=0x7f8b43ed7da8, p_msg=0x7f8b8475de28, proxy=0x8, proto=1) at t_fwd.c:1667 current_uri = {s = 0x0, len = -2072650200} q = 0 t_invite = 0x2 success_branch = -2072648560 lock_replies = 2 dst_uri = {s = 0x0, len = 10485676} path = {s = 0x7f8b433a71f0 <tm_cfg> "0OkC\213\177", len = 1127903728} instance = {s = 0x7f8b433baf30 <user_rt_t1_timeout_ms> "", len = 1124934652} ruid = {s = 0x7fff95b470e0 "", len = 1125417061} location_ua = {s = 0x7f8b845cbab8 "\207\003", len = 5512432} si = 0xa74478d027c64f00 backup_bflags = 0 bflags = 0 __FUNCTION__ = "t_forward_nonack" #14 0x00007f8b43137ba3 in t_relay_to (p_msg=0x7f8b8475de28, proxy=0x0, proto=0, replicate=0) at t_funcs.c:328 ret = 1 t = 0x7f8b43ed7da8 dst = {send_sock = 0x1ac00f, to = {s = {sa_family = 27748, sa_data = "\264\225\377\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 27748, sin_port = 38324, sin_addr = {s_addr = 32767}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 27748, sin6_port = 38324, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = { 0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 2222317096}}, id = 32651, proto = -124 '\204', send_flags = {f = 108 'l', blst_imask = 180 '\264'}} host = {s = 0x7f8b845cbab8 "\207\003", len = -2072650200} __FUNCTION__ = "t_relay_to" #15 0x0000000000541cf0 in do_action (h=0x7fff95b47360, a=0x7f8b845cd4c8, msg=0x7f8b8475de28) at action.c:1060 ret = -5 v = 0 dst = {send_sock = 0x1800000000, to = {s = {sa_family = 28388, sa_data = "\264\225\377\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 28388, sin_port = 38324, sin_addr = { s_addr = 32767}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 28388, sin6_port = 38324, sin6_flowinfo = 32767, sin6_addr = {__in6_u = { __u6_addr8 = "\000\000\000\000\000\000\000\000\240\\\215C\213\177\000", __u6_addr16 = {0, 0, 0, 0, 23712, 17293, 32651, 0}, __u6_addr32 = {0, 0, 1133337760, 32651}}}, sin6_scope_id = 94}}, ---Type <return> to continue, or q <return> to quit--- id = 0, proto = 21 '\025', send_flags = {f = 70 'F', blst_imask = 110 'n'}} end = 0x7fff95b47360 "\001" uri = {user = {s = 0x7f8b844f36b0 "\377\377\377\377", len = 6999923}, passwd = {s = 0x6e5602 <__FUNCTION__.4797> "xavp_new_value", len = 667307776}, host = { s = 0x50 <error: Cannot access memory at address 0x50>, len = -2074236072}, port = {s = 0x7f8b8475de28 "\235\030", len = -1783327504}, params = {s = 0x7fff95b494f0 "\006", len = -1783335964}, sip_params = {s = 0x0, len = 1128019136}, headers = {s = 0x7f8b433bb000 "", len = 70}, port_no = 17941, proto = 110, type = ERROR_URI_T, flags = (unknown: 667307776), transport = { s = 0x5e <error: Cannot access memory at address 0x5e>, len = -2074296968}, ttl = {s = 0x7fff95b494f0 "\006", len = 1125128152}, user_param = {s = 0x7f8b845cbd78 "\207\003", len = 1125415371}, maddr = {s = 0x0, len = 5512432}, method = {s = 0x0, len = 5506997}, lr = {s = 0x7fff95b470e0 "", len = 1132494968}, r2 = {s = 0x7f8b845cbab8 "\207\003", len = -2072650200}, gr = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 1132494976}, transport_val = {s = 0x7f8b43808078 "\023TP|", len = 0}, ttl_val = { s = 0x7f8b00000000 <error: Cannot access memory at address 0x7f8b00000000>, len = 5581401}, user_param_val = {s = 0x7f8b437fb3b8 "H\265\177C\213\177", len = 35}, maddr_val = { s = 0x7f8b845cbd78 "\207\003", len = -2072650200}, method_val = {s = 0x7f8b438d5ce8 "oV", <incomplete sequence \370>, len = 667307776}, lr_val = {s = 0x0, len = 1085918576}, r2_val = { s = 0x7f8b8475de28 "\235\030", len = 1131035264}, gr_val = {s = 0x7f8b8475de28 "\235\030", len = 1088236936}} next_hop = {user = {s = 0x7f8b40b9cc40 <ul> "\001", len = 1083664351}, passwd = {s = 0x7f8b436a3a80 "", len = -1783336688}, host = {s = 0x7f8b40b9cc40 <ul> "\001", len = 0}, port = { s = 0x7fff95b494f0 "\006", len = -2072650200}, params = {s = 0x7fff95b494f0 "\006", len = -1783335964}, sip_params = {s = 0x0, len = 5558663}, headers = {s = 0x0, len = -1}, port_no = 28896, proto = 38324, type = 32767, flags = (URI_USER_NORMALIZE | unknown: 1355312180), transport = {s = 0x7f8b8475de28 "\235\030", len = -1783327504}, ttl = {s = 0x7fff95b473e4 "\377\177", len = 0}, user_param = {s = 0xe6c36866a6886c35 <error: Cannot access memory at address 0xe6c36866a6886c35>, len = 1856138293}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = { s = 0x156673 <error: Cannot access memory at address 0x156673>, len = 667307776}, r2 = { s = 0x9ab80b <buf+11> "zs_pbx40_trunk(a)XXXXXXXXXX.com SIP/2.0\r\nVia: SIP/2.0/UDP X.X.X.6:5080;branch=z9hG4bK542e0106\r\nMax-Forwards: 69\r\nFrom: \"asterisk\" <sip:asterisk@X.X.X.6:5080>;tag=as785f9e00\r\nTo: <si"..., len = 14}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x9ab81a <buf+26> "
XXXXXXXXXX.com
SIP/2.0\r\nVia: SIP/2.0/UDP X.X.X.6:5080;branch=z9hG4bK542e0106\r\nMax-Forwards: 69\r\nFrom: \"asterisk\" <sip:asterisk@X.X.X.6:5080>;tag=as785f9e00\r\nTo: <sip:zs_pbx40_trun"..., len = 25}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 667307776}, method_val = {s = 0x0, len = -1783335964}, lr_val = {s = 0x7fff95b494f0 "\006", len = 4329872}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7fff95b47360 flags = 0 st = {flags = 1085918272, id = 32651, name = {n = 1083664351, s = {s = 0x7f8b409767df <lookup_helper+2607> "D\211\360H\213\214$\330\003", len = 1131035264}, re = 0x7f8b409767df <lookup_helper+2607>}, avp = 0x7fff95b47110} sct = 0x7fff95b47360 sjt = 0x7fff95b47360 mct = 0x0 rv = 0x426f1c <rval_expr_eval_int+684> rv1 = 0x7f8b8475de28 c1 = {cache_type = 1127985152, val_type = 32651, c = {avp_val = {n = 72, s = {s = 0x48 <error: Cannot access memory at address 0x48>, len = 362}, re = 0x48}, pval = {rs = { s = 0x48 <error: Cannot access memory at address 0x48>, len = 362}, ri = 5615623, flags = 0}}, i2s = "\000\000\000\000\000\000\000\000\000O\306'\320xD\247\000\000\000\000\000"} s = {s = 0x0, len = 1005473107} srevp = {0x7f8b845cd4c8, 0x7f8b8475de28} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140237199485840, string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s = 0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90, attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #16 0x00000000005407b5 in run_actions (h=0x6acf73, h@entry=0x7fff95b47360, a=0x4, msg=0x8) at action.c:1549 ret = -1783327504 mod = 0x7f8b845cd4c8 __FUNCTION__ = "run_actions" #17 0x000000000054d187 in run_actions_safe (h=0x7fff95b494f0, a=<optimized out>, msg=<optimized out>) at action.c:1614 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140735705019232, -1818495031581316043, 140237197857680, 140237199498792, 140237197860160, 0, -1818495034588632011, 1818402731650608181}, __mask_was_saved = 0, __saved_mask = {__val = {12052891338166128384, 140237197857400, 140235982654803, 140735705027824, 4294967291, 140735705027824, 140237199498792, 0, 5506997, 140735705027824, 25774158030, 140237197852024, 12052891338166128384, 30064771072, 140237197861968, 140735705027824}}}}} ret = <optimized out> ---Type <return> to continue, or q <return> to quit--- ign_on_break = 0 #18 0x000000000044e4fd in lval_pvar_assign (lv=<optimized out>, rv=<optimized out>, msg=<optimized out>, h=<optimized out>) at lvalue.c:282 r_avp = 0x7f8b847606a0 destroy_pval = -1783327504 pvar = 0x7f8b847606b8 pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 24} avp_val = {n = -1783327504, s = {s = 0x7fff95b494f0 "\006", len = -2072650200}, re = 0x7fff95b494f0} v = -2072639840 #19 lval_assign (h=0x7fff95b494f0, msg=0x7f8b8475de28, lv=0x7f8b845cd390, rve=0x7f8b845cdd40) at lvalue.c:399 rv = 0x7f8b845cdd48 ret = -1783327504 __FUNCTION__ = "lval_assign" #20 0x00000000005414d3 in do_action (h=0x7fff95b494f0, a=0x7f8b845ce450, msg=0x7f8b8475de28) at action.c:1430 ret = -5 v = 1 dst = {send_sock = 0x3a706973, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\330\023\000\000\036\000\000", __u6_addr16 = {0, 0, 0, 0, 5080, 0, 30, 0}, __u6_addr32 = {0, 0, 5080, 30}}}, sin6_scope_id = 10139691}}, id = 0, proto = -88 '\250', send_flags = {f = 232 '\350', blst_imask = 117 'u'}} end = 0x7fff95b494f0 "\006" uri = {user = {s = 0x7fff95b494f0 "\006", len = -2072650200}, passwd = {s = 0x7fff95b494f0 "\006", len = -1783334604}, host = {s = 0x0, len = 5558663}, port = {s = 0x0, len = 1}, params = { s = 0x7fff95b47630 "", len = 1355312181}, sip_params = {s = 0x7f8b8475de28 "\235\030", len = -1783327504}, headers = {s = 0x7fff95b47934 "\377\177", len = 0}, port_no = 27701, proto = 37736, type = 3871565926, flags = (URI_USER_NORMALIZE | unknown: 1856138292), transport = {s = 0x7f8b00000000 <error: Cannot access memory at address 0x7f8b00000000>, len = 944}, ttl = { s = 0x19 <error: Cannot access memory at address 0x19>, len = -2072650200}, user_param = {s = 0x7fff95b494f0 "\006", len = -1783333744}, maddr = {s = 0x0, len = 4326528}, method = { s = 0x7fff95b476e0 "\206\271\232", len = 4326591}, lr = {s = 0x7f8b847637e8 "\002", len = 4339131}, r2 = { s = 0x9ab986 <buf+390> "ast.zs PBX\r\nEvent: message-summary\r\nContent-Type: application/simple-message-summary\r\nContent-Length: 97\r\n\r\nMessages-Waiting: no\r\nMessage-Account: sip:asterisk@X.X.X.6:5080\r\nVoice-Message: 0/0 (0"..., len = 10}, gr = {s = 0x0, len = 5795166}, transport_val = {s = 0x7fff95b47934 "\377\177", len = 667307776}, ttl_val = {s = 0x7f8b8475de28 "\235\030", len = -1783334604}, user_param_val = {s = 0x7fff95b494f0 "\006", len = 4329872}, maddr_val = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 14080880}, method_val = { s = 0x21a478 <error: Cannot access memory at address 0x21a478>, len = 2696336}, lr_val = {s = 0x293c48 <error: Cannot access memory at address 0x293c48>, len = 8}, r2_val = { s = 0xf2 <error: Cannot access memory at address 0xf2>, len = 667307776}, gr_val = {s = 0x292490 <error: Cannot access memory at address 0x292490>, len = 667307776}} next_hop = {user = {s = 0x0, len = -2073959688}, passwd = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -2072650200}, host = {s = 0x7fff95b494f0 "\006", len = -1783334604}, port = {s = 0x0, len = 4353820}, params = {s = 0xe6c3686695c86c35 <error: Cannot access memory at address 0xe6c3686695c86c35>, len = 1856138293}, sip_params = {s = 0x0, len = 944}, headers = { s = 0x19 <error: Cannot access memory at address 0x19>, len = -2072650200}, port_no = 38128, proto = 38324, type = 32767, flags = (unknown: 2511633888), transport = {s = 0x0, len = 4326528}, ttl = { s = 0x7fff95b47830 "\206\271\232", len = 4326591}, user_param = {s = 0x7f8b847637e8 "\002", len = 4339131}, maddr = { s = 0x9ab986 <buf+390> "ast.zs PBX\r\nEvent: message-summary\r\nContent-Type: application/simple-message-summary\r\nContent-Length: 97\r\n\r\nMessages-Waiting: no\r\nMessage-Account: sip:asterisk@X.X.X.6:5080\r\nVoice-Message: 0/0 (0"..., len = 10}, method = {s = 0x0, len = 5795166}, lr = {s = 0x7fff95b47ab0 "", len = 667307776}, r2 = {s = 0x7f8b8475de28 "\235\030", len = -1783334732}, gr = { s = 0x7fff95b494f0 "\006", len = 1090600854}, transport_val = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 14080880}, ttl_val = { s = 0x21a478 <error: Cannot access memory at address 0x21a478>, len = 2696336}, user_param_val = {s = 0x293c48 <error: Cannot access memory at address 0x293c48>, len = 8}, maddr_val = { s = 0xf2 <error: Cannot access memory at address 0xf2>, len = 667307776}, method_val = {s = 0x292490 <error: Cannot access memory at address 0x292490>, len = 667307776}, lr_val = { s = 0x7f8b845cd390 "\002", len = -2073957880}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -2072650200}, gr_val = {s = 0x7fff95b494f0 "\006", len = -1783334224}} u = 0x7fff95b494f0 flags = 32651 st = {flags = 0, id = 0, name = {n = -2073959688, s = {s = 0x7f8b8461e2f8 "\001", len = -1}, re = 0x7f8b8461e2f8}, avp = 0x7f8b8475de28} sct = 0x7fff95b494f0 sjt = 0x7fff95b494f0 mct = 0x0 rv = 0x7fff95b475f0 rv1 = 0x7f8b8475de28 c1 = {cache_type = 2222319856, val_type = 32651, c = {avp_val = {n = -1783335404, s = {s = 0x7fff95b47614 "\377\177", len = -1783333680}, -re = 0x7fff95b47614}, pval = {rs = { s = 0x7fff95b47614 "\377\177", len = -1783333680}, ri = 1090600854, flags = 32651}}, i2s = "\000\000\000\001\000\000\000\000p\333\326\000\000\000\000\000x\244!\000\000"} s = {s = 0x31 <error: Cannot access memory at address 0x31>, len = 10139691} ---Type <return> to continue, or q <return> to quit--- srevp = {0x7f8b845ce450, 0x7f8b8475de28} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140237199485840, string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s = 0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90, attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #21 0x00000000005407b5 in run_actions (h=0x6acf73, a=0x4, msg=0x8) at action.c:1549 ret = 1 mod = 0x7f8b845ce450 __FUNCTION__ = "run_actions" #22 0x00000000005423e0 in do_action (h=0x7fff95b494f0, a=0x7f8b84624210, msg=0x7f8b8475de28) at action.c:678 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 16278, sa_data = "\001A\213\177\000\000\000\000\000\001\000\000\000"}, sin = {sin_family = 16278, sin_port = 16641, sin_addr = {s_addr = 32651}, sin_zero = "\000\000\000\001\000\000\000"}, sin6 = {sin6_family = 16278, sin6_port = 16641, sin6_flowinfo = 32651, sin6_addr = {__in6_u = { __u6_addr8 = "\000\000\000\001\000\000\000\000p\333\326\000\000\000\000", __u6_addr16 = {0, 256, 0, 0, 56176, 214, 0, 0}, __u6_addr32 = {16777216, 0, 14080880, 0}}}, sin6_scope_id = 2204792}}, id = 0, proto = 84 'T', send_flags = {f = 123 '{', blst_imask = 180 '\264'}} end = 0xa <error: Cannot access memory at address 0xa> uri = {user = {s = 0xf2 <error: Cannot access memory at address 0xf2>, len = 667307776}, passwd = {s = 0x2923b8 <error: Cannot access memory at address 0x2923b8>, len = 6245668}, host = { s = 0x28e886 <error: Cannot access memory at address 0x28e886>, len = 6999923}, port = {s = 0x6aea19 <__FUNCTION__.8262> "rval_new_empty", len = 1005473107}, params = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -2074167456}, sip_params = {s = 0x0, len = -2072650200}, headers = {s = 0x7fff95b47c10 "\200Av\204\213\177", len = 4326400}, port_no = 46944, proto = 33886, type = 32651, flags = (unknown: 936), transport = {s = 0x19 <error: Cannot access memory at address 0x19>, len = -2072650200}, ttl = { s = 0x7fff95b494f0 "\006", len = -1783332400}, user_param = {s = 0x0, len = 4326528}, maddr = {s = 0x7fff95b47c20 "\206\271\232", len = 4326591}, method = {s = 0x7f8b84764180 "\002", len = 4339131}, lr = { s = 0x9ab986 <buf+390> "ast.zs PBX\r\nEvent: message-summary\r\nContent-Type: application/simple-message-summary\r\nContent-Length: 97\r\n\r\nMessages-Waiting: no\r\nMessage-Account: sip:asterisk@X.X.X.6:5080\r\nVoice-Message: 0/0 (0"..., len = 6}, r2 = {s = 0x0, len = 1090600854}, gr = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 14080880}, transport_val = { s = 0x21a478 <error: Cannot access memory at address 0x21a478>, len = -1783333724}, ttl_val = {s = 0x293c48 <error: Cannot access memory at address 0x293c48>, len = 1090600854}, user_param_val = { s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 14080880}, maddr_val = {s = 0x21a478 <error: Cannot access memory at address 0x21a478>, len = 667307776}, method_val = { s = 0x293c48 <error: Cannot access memory at address 0x293c48>, len = -2074935496}, lr_val = {s = 0x7fff95b48220 "", len = -2072650200}, r2_val = {s = 0x7fff95b48220 "", len = -2072650200}, gr_val = {s = 0x0, len = 5512432}} next_hop = {user = {s = 0x6aea19 <__FUNCTION__.8262> "rval_new_empty", len = 667307776}, passwd = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -2074159736}, host = { s = 0x0, len = -2072650200}, port = {s = 0x7fff95b47d60 "\350\067v\204\213\177", len = 4326400}, params = {s = 0x7f8b845ed588 "\002", len = 944}, sip_params = { s = 0x19 <error: Cannot access memory at address 0x19>, len = -2072650200}, headers = {s = 0x7fff95b494f0 "\006", len = -1783332064}, port_no = 65336, proto = 33874, type = 32651, flags = (unknown: 2222317096), transport = {s = 0x7fff95b47d70 "\360߈\002", len = 4326591}, ttl = {s = 0x7f8b847637e8 "\002", len = 4339131}, user_param = { s = 0x288dff0 "ast.zs PBX4.7-a8462c9596cb38db32", len = 10}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff95b48008 "", len = -1783332888}, lr = {s = 0x7fff95b48008 "", len = -1783333388}, r2 = { s = 0x293c48 <error: Cannot access memory at address 0x293c48>, len = 1090600854}, gr = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 14080880}, transport_val = { s = 0x21a478 <error: Cannot access memory at address 0x21a478>, len = 2696336}, ttl_val = {s = 0x293c48 <error: Cannot access memory at address 0x293c48>, len = 8}, user_param_val = { s = 0xf2 <error: Cannot access memory at address 0xf2>, len = 667307776}, maddr_val = {s = 0x7fff95b47e98 "\265\aT", len = 47}, method_val = { s = 0x3a706973 <error: Cannot access memory at address 0x3a706973>, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 7}, gr_val = {s = 0x7f8b8475de28 "\235\030", len = 7}} u = 0xa flags = 32767 st = {flags = 7006745, id = 0, name = {n = 667307776, s = {s = 0xa74478d027c64f00 <error: Cannot access memory at address 0xa74478d027c64f00>, len = -1}, re = 0xa74478d027c64f00}, avp = 0x7f8b845ed588} sct = 0xa sjt = 0xa mct = 0x0 rv = 0x4204bf <rval_new_str+15> rv1 = 0x7f8b8475de28 c1 = {cache_type = 2702408, val_type = RV_NONE, c = {avp_val = {n = 1090600854, s = { ---Type <return> to continue, or q <return> to quit--- s = 0x7f8b41013f96 <pkg_proc_update_stats+70> "Hc\023H\213|$\b1\300L\213D$\020L\213L$\030L\213T$0H\215\064RH\301\346\004H\003\065\322\315 ", len = 16777216}, re = 0x7f8b41013f96 <pkg_proc_update_stats+70>}, pval = {rs = { s = 0x7f8b41013f96 <pkg_proc_update_stats+70> "Hc\023H\213|$\b1\300L\213D$\020L\213L$\030L\213T$0H\215\064RH\301\346\004H\003\065\322\315 ", len = 16777216}, ri = 14081096, flags = 0}}, i2s = "\240\243!\000\000\000\000\000\270#)\000\000\000\000\000H<)\000\000"} s = {s = 0x7f8b847637e8 "\002", len = 4339131} srevp = {0x7f8b84621018, 0x7f8b8475de28} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140237199485840, string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s = 0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90, attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #23 0x00000000005407b5 in run_actions (h=0x6acf73, a=0x4, msg=0x8) at action.c:1549 ret = 1 mod = 0x7f8b84621018 __FUNCTION__ = "run_actions" #24 0x00000000005423e0 in do_action (h=0x7fff95b494f0, a=0x7f8b84624210, msg=0x7f8b8475de28) at action.c:678 ret = -5 v = 0 dst = {send_sock = 0x7fff95b48620, to = {s = {sa_family = 56872, sa_data = "u\204\213\177\000\000 \206\264\225\377\177\000"}, sin = {sin_family = 56872, sin_port = 33909, sin_addr = {s_addr = 32651}, sin_zero = " \206\264\225\377\177\000"}, sin6 = {sin6_family = 56872, sin6_port = 33909, sin6_flowinfo = 32651, sin6_addr = {__in6_u = { __u6_addr8 = " \206\264\225\377\177\000\000(\336u\204\213\177\000", __u6_addr16 = {34336, 38324, 32767, 0, 56872, 33909, 32651, 0}, __u6_addr32 = {2511636000, 32767, 2222317096, 32651}}}, sin6_scope_id = 0}}, id = 0, proto = 7 '\a', send_flags = {f = 176 '\260', blst_imask = 85 'U'}} end = 0xf <error: Cannot access memory at address 0xf> uri = {user = {s = 0x7fff95b481f0 "\360\224\264\225\377\177", len = 1130964784}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 5615623}, host = {s = 0x0, len = 667307776}, port = {s = 0x7f8b8475e5a0 "N\270\232", len = -2074935496}, params = {s = 0x7fff95b494f0 "\006", len = -5}, sip_params = {s = 0x7fff95b48220 "", len = -2072650200}, headers = {s = 0x0, len = 5506997}, port_no = 33312, proto = 38324, type = 32767, flags = (unknown: 10140004), transport = {s = 0x7f8b8452ff38 "\331\001", len = -2072650200}, ttl = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 5615623}, user_param = {s = 0x156673 <error: Cannot access memory at address 0x156673>, len = 667307776}, maddr = { s = 0x1ac00f <error: Cannot access memory at address 0x1ac00f>, len = -1783332444}, method = {s = 0x7f8b845f4a70 "\001", len = 0}, lr = {s = 0x7f8b8475de28 "\235\030", len = -1783332412}, r2 = { s = 0x0, len = 1138816376}, gr = {s = 0x7f8b8475de28 "\235\030", len = -1783332016}, transport_val = {s = 0x0, len = -1783331504}, ttl_val = {s = 0x7f8b43e0f588 "0@\236C\213\177", len = 5615623}, user_param_val = {s = 0x0, len = 667307776}, maddr_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 667307776}, method_val = { s = 0x9ab934 <buf+308> "7feae50257e62b06765f0a4c4d60650a@X.X.X.6:5080\r\nCSeq: 102 NOTIFY\r\nUser-Agent: ast.zs PBX\r\nEvent: message-summary\r\nContent-Type: application/simple-message-summary\r\nContent-Length: 97\r\n\r\nMessages-W"..., len = 0}, lr_val = {s = 0x7fff95b494f0 "\006", len = -2072650200}, r2_val = {s = 0x7fff95b494f0 "\006", len = -1783331504}, gr_val = {s = 0x0, len = 5558663}} next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7fff95b48220 "", len = 1355312181}, host = {s = 0x7f8b8475de28 "\235\030", len = -1783327504}, port = {s = 0x7fff95b48550 "\001", len = 0}, params = {s = 0xe6c368677b086c35 <error: Cannot access memory at address 0xe6c368677b086c35>, len = 1856138293}, sip_params = {s = 0x0, len = 667307776}, headers = { s = 0xf1 <error: Cannot access memory at address 0xf1>, len = -2074129800}, port_no = 62232, proto = 33874, type = 32651, flags = (unknown: 2222317096), transport = {s = 0x0, len = 667307776}, ttl = {s = 0x0, len = -2074595816}, user_param = {s = 0x7fff95b48350 "", len = -2072650200}, maddr = {s = 0x7fff95b494f0 "\006", len = -1783331504}, method = {s = 0x0, len = 5795166}, lr = { s = 0x7fff95b48550 "\001", len = 667307776}, r2 = {s = 0x7f8b8475de28 "\235\030", len = -1783331504}, gr = {s = 0x7fff95b494f0 "\006", len = 4329872}, transport_val = {s = 0x0, len = -1783331980}, ttl_val = {s = 0xee <error: Cannot access memory at address 0xee>, len = -2072643184}, user_param_val = {s = 0xa49900 <_pkg_root> "\313\030p", len = -2074829352}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 667307776}, lr_val = {s = 0x7fff95b494f0 "\006", len = -2074934992}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -2072650200}, gr_val = {s = 0x7fff95b494f0 "\006", len = -1783331504}} u = 0xf flags = 0 st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x7f8b00000001 <error: Cannot access memory at address 0x7f8b00000001>, len = -1783332320}, re = 0x7f8b00000001}, avp = 0xe6c3686750c86c35} sct = 0xf sjt = 0xf mct = 0x0 rv = 0x0 rv1 = 0x7f8b8475de28 ---Type <return> to continue, or q <return> to quit--- c1 = {cache_type = 2220900400, val_type = 32651, c = {avp_val = {n = 667307776, s = {s = 0xa74478d027c64f00 <error: Cannot access memory at address 0xa74478d027c64f00>, len = -2072650200}, re = 0xa74478d027c64f00}, pval = {rs = {s = 0xa74478d027c64f00 <error: Cannot access memory at address 0xa74478d027c64f00>, len = -2072650200}, ri = -1783332668, flags = 32767}}, i2s = "\000\000\000\000\n", '\000' <repeats 11 times>, "D'iC\213\177"} s = {s = 0x66845f2c48 <error: Cannot access memory at address 0x66845f2c48>, len = -1783332764} srevp = {0x7f8b84530958, 0x7f8b8475de28} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140237199485840, string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s = 0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90, attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #25 0x00000000005407b5 in run_actions (h=0x6acf73, a=0x4, msg=0x8) at action.c:1549 ret = -1783327504 mod = 0x7f8b84530958 __FUNCTION__ = "run_actions" #26 0x0000000000542218 in do_action (h=0x7fff95b494f0, a=0x7f8b845317d0, msg=0x7f8b8475de28) at action.c:1049 ret = 1 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000(\336u\204\213\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "(\336u\204\213\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "(\336u\204\213\177\000\000P\207\264\225\377\177\000", __u6_addr16 = {56872, 33909, 32651, 0, 34640, 38324, 32767, 0}, __u6_addr32 = {2222317096, 32651, 2511636304, 32767}}}, sin6_scope_id = 0}}, id = 0, proto = -64 '\300', send_flags = { f = 137 '\211', blst_imask = 180 '\264'}} end = 0x7f8b84530130 "\001" uri = {user = {s = 0x7fff95b48b70 "", len = -2072650200}, passwd = {s = 0x7fff95b48b70 "", len = -2072650200}, host = {s = 0x0, len = 667307776}, port = {s = 0x0, len = -2074938600}, params = { s = 0x7fff95b494f0 "\006", len = -5}, sip_params = {s = 0x7fff95b48770 "", len = -2072650200}, headers = {s = 0x0, len = 5506997}, port_no = 34672, proto = 38324, type = 32767, flags = (unknown: 10140004), transport = {s = 0x7f8b8452f318 "\327\001", len = -2072650200}, ttl = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 5615623}, user_param = { s = 0x7f8b8452a4c8 "\307\001", len = -2072650200}, maddr = {s = 0x1ac00f <error: Cannot access memory at address 0x1ac00f>, len = -1783331084}, method = {s = 0x7f8b8464f330 "\001", len = -1783331068}, lr = {s = 0x7f8b8475de28 "\235\030", len = -2074969528}, r2 = {s = 0x7f8b8475de28 "\235\030", len = -2072650200}, gr = {s = 0x7fff95b48cc0 "", len = -2072650200}, transport_val = {s = 0x0, len = 5615623}, ttl_val = {s = 0x7f8b43e0f588 "0@\236C\213\177", len = 667307776}, user_param_val = {s = 0x7fff95b494f0 "\006", len = 1081383208}, maddr_val = { s = 0x156673 <error: Cannot access memory at address 0x156673>, len = 667307776}, method_val = { s = 0x9ab934 <buf+308> "7feae50257e62b06765f0a4c4d60650a@X.X.X.6:5080\r\nCSeq: 102 NOTIFY\r\nUser-Agent: ast.zs PBX\r\nEvent: message-summary\r\nContent-Type: application/simple-message-summary\r\nContent-Length: 97\r\n\r\nMessages-W"..., len = 0}, lr_val = {s = 0x7fff95b494f0 "\006", len = -2072650200}, r2_val = {s = 0x7fff95b494f0 "\006", len = -1783330144}, gr_val = {s = 0x0, len = 5558663}} next_hop = {user = {s = 0x0, len = -1}, passwd = {s = 0x7fff95b48770 "", len = 1355312181}, host = {s = 0x7f8b8475de28 "\235\030", len = -1783327504}, port = {s = 0x7fff95b48aa0 "", len = 0}, params = { s = 0xe6c3686775e86c35 <error: Cannot access memory at address 0xe6c3686775e86c35>, len = 1856138293}, sip_params = {s = 0x0, len = 50}, headers = { s = 0x9ab8c0 <buf+192> "as785f9e00\r\nTo: <sip:zs_pbx40_trunk@XXXXXXXXXX.com>\r\nContact: <sip:asterisk@X.X.X.6:5080>\r\nCall-ID: 7feae50257e62b06765f0a4c4d60650a@X.X.X.6:5080\r\nCSeq: 102 NOTIFY\r\nUser-Agent: as"..., len = 10}, port_no = 56848, proto = 33874, type = 32651, flags = (unknown: 2222317096), transport = {s = 0x0, len = 667307776}, ttl = { s = 0x30 <error: Cannot access memory at address 0x30>, len = -2073886456}, user_param = {s = 0x7fff95b488a0 "", len = -2072650200}, maddr = {s = 0x7fff95b494f0 "\006", len = -1783330144}, method = {s = 0x0, len = 5795166}, lr = {s = 0x7fff95b48aa0 "", len = 667307776}, r2 = {s = 0x7f8b8475de28 "\235\030", len = -1783330144}, gr = {s = 0x7fff95b494f0 "\006", len = 4329872}, transport_val = {s = 0x0, len = 1138816376}, ttl_val = {s = 0x7f8b8451f028 "", len = 667307776}, user_param_val = {s = 0x7fff95b489e0 "\310\003", len = -2073657864}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 667307776}, lr_val = {s = 0x0, len = -2074938096}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -2072650200}, gr_val = { s = 0x7fff95b494f0 "\006", len = -1783330144}} u = 0x7f8b84530130 flags = 0 st = {flags = 0, id = 0, name = {n = -1, s = {s = 0x7f8bffffffff <error: Cannot access memory at address 0x7f8bffffffff>, len = -1783330960}, re = 0x7f8bffffffff}, avp = 0xe6c3686750c86c35} sct = 0x7f8b84530130 sjt = 0x7f8b84530130 mct = 0x0 rv = 0x7fff95b485a4 rv1 = 0x7f8b8475de28 ---Type <return> to continue, or q <return> to quit--- c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 6779060, s = {s = 0x6770b4 <select_cfg_var+580> "\211E\bH\230ƀ\300¤", len = 0}, re = 0x6770b4 <select_cfg_var+580>}, pval = { rs = {s = 0x6770b4 <select_cfg_var+580> "\211E\bH\230ƀ\300¤", len = 0}, ri = -1783331308, flags = 32767}}, i2s = "\000\000\000\000\000\000\000\000\000O\306'\320xD\247D'iC\213\177"} s = {s = 0x0, len = 0} srevp = {0x7f8b845317d0, 0x7f8b8475de28} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140237199485840, string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s = 0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90, attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #27 0x00000000005407b5 in run_actions (h=0x6acf73, a=0x4, msg=0x8) at action.c:1549 ret = -1783327504 mod = 0x7f8b845317d0 __FUNCTION__ = "run_actions" #28 0x0000000000542218 in do_action (h=0x7fff95b494f0, a=0x7f8b84531900, msg=0x7f8b8475de28) at action.c:1049 ret = 1 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000O\302q\000\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "O\302q\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "O\302q\000\000\000\000\000\230\nO\205\213\177\000", __u6_addr16 = {49743, 113, 0, 0, 2712, 34127, 32651, 0}, __u6_addr32 = {7455311, 0, 2236549784, 32651}}}, sin6_scope_id = 720}}, id = 0, proto = -64 '\300', send_flags = {f = 90 'Z', blst_imask = 180 '\264'}} end = 0x7f8b8452f510 "\001" uri = {user = {s = 0x7fff95b48c90 "\360\224\264\225\377\177", len = 1130964784}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 5615623}, host = {s = 0x0, len = 667307776}, port = {s = 0x0, len = -2074943984}, params = {s = 0x7fff95b494f0 "\006", len = -5}, sip_params = {s = 0x7fff95b48cc0 "", len = -2072650200}, headers = {s = 0x0, len = 5506997}, port_no = 36032, proto = 38324, type = 32767, flags = (unknown: 10140004), transport = {s = 0x7f8b8452de10 "\325\001", len = -2072650200}, ttl = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 5615623}, user_param = {s = 0x156673 <error: Cannot access memory at address 0x156673>, len = 667307776}, maddr = {s = 0x1ac00f <error: Cannot access memory at address 0x1ac00f>, len = -1783329724}, method = {s = 0x291a500 "", len = 0}, lr = {s = 0x7f8b8475de28 "\235\030", len = -1783329692}, r2 = {s = 0x0, len = 1138816376}, gr = {s = 0x7f8b8475de28 "\235\030", len = -1783329296}, transport_val = {s = 0x0, len = -1783328784}, ttl_val = {s = 0x7f8b43e0f588 "0@\236C\213\177", len = 5615623}, user_param_val = {s = 0x7fff95b494f0 "\006", len = 667307776}, maddr_val = {s = 0x91a600 <error: Cannot access memory at address 0x91a600>, len = 1036492449}, method_val = { s = 0x9ab934 <buf+308> "7feae50257e62b06765f0a4c4d60650a@X.X.X.6:5080\r\nCSeq: 102 NOTIFY\r\nUser-Agent: ast.zs PBX\r\nEvent: message-summary\r\nContent-Type: application/simple-message-summary\r\nContent-Length: 97\r\n\r\nMessages-W"..., len = 0}, lr_val = {s = 0x7fff95b494f0 "\006", len = -2072650200}, r2_val = {s = 0x7fff95b494f0 "\006", len = -1783328784}, gr_val = {s = 0x0, len = 5558663}} next_hop = {user = {s = 0x0, len = -1}, passwd = {s = 0x7fff95b48cc0 "", len = 1355312181}, host = {s = 0x7f8b8475de28 "\235\030", len = -1783327504}, port = {s = 0x7fff95b48ff0 "", len = 0}, params = { s = 0xe6c368676e486c35 <error: Cannot access memory at address 0xe6c368676e486c35>, len = 1856138293}, sip_params = {s = 0x7f8b00000000 <error: Cannot access memory at address 0x7f8b00000000>, len = -2072648360}, headers = {s = 0x7f8b8475de28 "\235\030", len = 5615623}, port_no = 34800, proto = 33869, type = 32651, flags = URI_USER_NORMALIZE, transport = { s = 0x15ad0 <error: Cannot access memory at address 0x15ad0>, len = 667307776}, ttl = {s = 0x7f8b8475de28 "\235\030", len = -2074949176}, user_param = {s = 0x7fff95b48df0 "", len = -2072650200}, maddr = {s = 0x7fff95b494f0 "\006", len = -1783328784}, method = {s = 0x0, len = 5795166}, lr = {s = 0x7fff95b48ff0 "", len = 667307776}, r2 = {s = 0x7f8b8475de28 "\235\030", len = -1783328784}, gr = {s = 0x7fff95b494f0 "\006", len = 4329872}, transport_val = {s = 0x7f8b00000000 <error: Cannot access memory at address 0x7f8b00000000>, len = -2072648360}, ttl_val = { s = 0x7f8b8475de28 "\235\030", len = 5615623}, user_param_val = {s = 0x7f8b844f0b00 <incomplete sequence \350>, len = 667307776}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 667307776}, lr_val = {s = 0x0, len = -2074941200}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -2072650200}, gr_val = {s = 0x7fff95b494f0 "\006", len = -1783328784}} u = 0x7f8b8452f510 flags = 0 st = {flags = 0, id = 0, name = {n = -1, s = {s = 0x7f8bffffffff <error: Cannot access memory at address 0x7f8bffffffff>, len = -1783329600}, re = 0x7f8bffffffff}, avp = 0xe6c3686750c86c35} sct = 0x7f8b8452f510 sjt = 0x7f8b8452f510 mct = 0x0 rv = 0x7fff95b48d60 rv1 = 0x7f8b8475de28 c1 = {cache_type = 2511624888, val_type = 32767, c = {avp_val = {n = -1783338272, s = {s = 0x7fff95b46ae0 "", len = -1783342368}, re = -0x7fff95b46ae0}, pval = {rs = {s = 0x7fff95b46ae0 "", ---Type <return> to continue, or q <return> to quit--- len = -1783342368}, ri = -1783329948, flags = 32767}}, i2s = "\320\v\222\002", '\000' <repeats 12 times>, "D'iC\213\177"} s = { s = 0x43b2fc <grp_hash_lookup+1420> "1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200", len = -1783329476} srevp = {0x7f8b84531900, 0x7f8b8475de28} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140237199485840, string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s = 0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90, attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #29 0x00000000005407b5 in run_actions (h=0x6acf73, a=0x4, msg=0x8) at action.c:1549 ret = -1783327504 mod = 0x7f8b84531900 __FUNCTION__ = "run_actions" #30 0x0000000000542218 in do_action (h=0x7fff95b494f0, a=0x7f8b84531a30, msg=0x7f8b8475de28) at action.c:1049 ret = 1 v = 0 dst = {send_sock = 0x7f8b8475de28, to = {s = {sa_family = 52190, sa_data = "\020C\213\177\000\000\310\000\000\000\377\177\000"}, sin = {sin_family = 52190, sin_port = 17168, sin_addr = { s_addr = 32651}, sin_zero = "\310\000\000\000\377\177\000"}, sin6 = {sin6_family = 52190, sin6_port = 17168, sin6_flowinfo = 32651, sin6_addr = {__in6_u = { __u6_addr8 = "\310\000\000\000\377\177\000\000\300F\221C\213\177\000", __u6_addr16 = {200, 0, 32767, 0, 18112, 17297, 32651, 0}, __u6_addr32 = {200, 32767, 1133594304, 32651}}}, sin6_scope_id = 2222342528}}, id = 32651, proto = 40 '(', send_flags = {f = 222 '\336', blst_imask = 117 'u'}} end = 0x7f8b8452e8f0 "\001" uri = {user = {s = 0x7fff95b4929c "", len = -1783328540}, passwd = {s = 0x7f8b43944ca8 "\361\023", len = 1133554216}, host = {s = 0x8 <error: Cannot access memory at address 0x8>, len = -1783328508}, port = {s = 0x7f8b43551b50 "(\252\220C\213\177", len = 1133554216}, params = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len = -1783328252}, sip_params = {s = 0x7fff95b49200 "", len = 0}, headers = {s = 0x7f8b4390aa28 "P\033UC\213\177", len = 5615623}, port_no = 43560, proto = 17296, type = 32651, flags = (unknown: 200), transport = {s = 0x7fff95b492a0 "", len = 1125140923}, ttl = {s = 0x7f8b8475de28 "\235\030", len = -1783328096}, user_param = {s = 0x779800000000 <error: Cannot access memory at address 0x779800000000>, len = -1}, maddr = { s = 0x7fff95b49130 "", len = -1783328364}, method = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -1783328348}, lr = {s = 0x7f8b4390aa28 "P\033UC\213\177", len = 200}, r2 = { s = 0x7f8b4390aa28 "P\033UC\213\177", len = -2072650200}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 5615623}, ttl_val = { s = 0x7f8b4390aa28 "P\033UC\213\177", len = -1783328268}, user_param_val = {s = 0x7f8b8475de28 "\235\030", len = 1}, maddr_val = {s = 0x7f8b4390aa28 "P\033UC\213\177", len = 1133554216}, method_val = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -2072650200}, lr_val = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 1133554736}, r2_val = { s = 0x7f8b4390aa28 "P\033UC\213\177", len = 1124929466}, gr_val = {s = 0x0, len = 1125151101}} next_hop = {user = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len = -1783328096}, passwd = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -2072650200}, host = { s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 1133554736}, port = {s = 0x7f8b4390aa28 "P\033UC\213\177", len = 1125193098}, params = {s = 0x0, len = 10498080}, sip_params = { s = 0xa03028 <def_list+8> "", len = 10498096}, headers = {s = 0xa03038 <def_list+24> "", len = 10498120}, port_no = 10568, proto = 160, type = ERROR_URI_T, flags = (unknown: 0), transport = { s = 0x7f8b844bec80 <wr_buf> "\027\003\001\003\340k\r\203t\250\234\377\306\030\372\233\a\037\255\300[ \202\346\270\017\032Oά\362;\325Զ\227\027\t{\322_\034\336P>\001\341\327\062\027\243\211\326N\364H@d%\225s9勏\205!\342P0\370\267\070\377\247&\221i\377\206\246Aѻy\364\nrԑCH\370\v\356ǔ\255\032\064T\301\237\265\020Z)if\373\250\020u\275\202\310\031\205\224\246\303F\273\006pP\242#\305\022\022\272\324\a\217\065\200\036\033\003t\346n\250\005<\245\025\301\n\361s\236q\301G\231\267\325\354\256]]u@\021\212\375\313&7\313-\253\004\277n\275\033\216{\335\301\207ә\265\f;<\212\314rq6\305\024\253", <incomplete sequence \311>..., len = 14083112}, ttl = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1783365432}, user_param = {s = 0x0, len = 1090600854}, maddr = { s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 1005471026}, method = {s = 0x0, len = -1783327964}, lr = {s = 0x293020 <error: Cannot access memory at address 0x293020>, len = -1783327948}, r2 = {s = 0x7f8b8475de28 "\235\030", len = 1090600854}, gr = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 14083728}, transport_val = { s = 0x219958 <error: Cannot access memory at address 0x219958>, len = 2693488}, ttl_val = {s = 0x293c48 <error: Cannot access memory at address 0x293c48>, len = 8}, user_param_val = { s = 0x101 <error: Cannot access memory at address 0x101>, len = 667307776}, maddr_val = {s = 0x291970 <error: Cannot access memory at address 0x291970>, len = 6245668}, method_val = { s = 0x7f8b8467fc80 "\020\005", len = 6999923}, lr_val = {s = 0x715640 <__FUNCTION__.7459> "parse_via", len = 1133594024}, r2_val = { s = 0xe6c3686759486c35 <error: Cannot access memory at address 0xe6c3686759486c35>, len = -1783327804}, gr_val = {s = 0x0, len = 10139768}} u = 0x7f8b8452e8f0 flags = 32651 st = {flags = 200, id = 0, name = {n = -1783328096, s = {s = 0x7fff95b492a0 "", len = 4}, re = 0x7fff95b492a0}, avp = 0x7f8b8475de28} sct = 0x7f8b8452e8f0 ---Type <return> to continue, or q <return> to quit--- sjt = 0x7f8b8452e8f0 mct = 0x0 rv = 0x1 rv1 = 0x7f8b8475de28 c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val = {n = 1133594216, s = {s = 0x7f8b43914668 <incomplete sequence \310>, len = 10485504}, re = 0x7f8b43914668}, pval = {rs = { s = 0x7f8b43914668 <incomplete sequence \310>, len = 10485504}, ri = 4, flags = 1}}, i2s = "\000\222\264\225\377\177\000\000\000\347\001D\213\177\000\000\000\245aC\213\177"} s = {s = 0xa49900 <_pkg_root> "\313\030p", len = 4} srevp = {0x7f8b84531a30, 0x7f8b8475de28} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140237199485840, string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s = 0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90, attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #31 0x00000000005407b5 in run_actions (h=0x6acf73, h@entry=0x7fff95b494f0, a=0x4, a@entry=0x7f8b8451ee00, msg=0x8, msg@entry=0x7f8b8475de28) at #action.c:1549 ret = -1 mod = 0x7f8b84531a30 __FUNCTION__ = "run_actions" #32 0x000000000054d225 in run_top_route (a=0x7f8b8451ee00, msg=0x7f8b8475de28, c=<optimized out>) at action.c:1635 ctx = {rec_lev = 6, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140735705027824, 1818402078992133173, 140237197143552, 140237199498792, 0, 0, -1818495031344337867, 1818402731650608181}, __mask_was_saved = 0, __saved_mask = {__val = {10139768, 595, 140237199498792, 10139709, 10139648, 595, 140237199498792, 10139709, 10139648, 595, 12052891338166128384, 0, 140237199425776, 1073741825, 140236102683928, 140237199410640}}}}} p = <optimized out> ret = <optimized out> sfbk = 0 #33 0x000000000055501e in receive_msg (buf=0x0, len=2222317096, rcv_info=0x7fff95b497d0) at receive.c:240 msg = 0x7f8b8475de28 ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140735705028192, 1818402078992133173, 140237198564784, 140237199498792, 0, 0, -1818495031344337867, 1818402731650608181}, __mask_was_saved = 0, __saved_mask = {__val = {10109832, 0, 140735705028582, 4, 1, 140237196963680, 140237221805511, 140234977181701, 0, 7048948, 140237213644648, 140237198483864, 140735705028452, 140237223933584, 140237198483864, 12}}}}} inb = { s = 0x9ab800 <buf> "NOTIFY sip:zs_pbx40_trunk@XXXXXXXXXX.com SIP/2.0\r\nVia: SIP/2.0/UDP X.X.X.6:5080;branch=z9hG4bK542e0106\r\nMax-Forwards: 69\r\nFrom: \"asterisk\" <sip:asterisk@X.X.X.6:5080>;tag=as785f9e"..., len = 595} netinfo = {data = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 2}, dst = 0x7f8b854db768, rcv = 0x7f8b85eac000} __FUNCTION__ = "receive_msg" #34 0x0000000000467630 in udp_rcv_loop () at udp_server.c:495 len = 595 buf = "NOTIFY sip:zs_pbx40_trunk@XXXXXXXXXX.com SIP/2.0\r\nVia: SIP/2.0/UDP X.X.X.6:5080;branch=z9hG4bK542e0106\r\nMax-Forwards: 69\r\nFrom: \"asterisk\" <sip:asterisk@X.X.X.6:5080>;tag=as785f9e"... from = 0x7f8b84666198 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {940519353, 140236108241828}, addr32 = {940519353, 0, 1131060132, 32651}, addr16 = {12217, 14351, 0, 0, 39844, 17258, 32651, 0}, addr = "\271/\017\070\000\000\000\000\244\233jC\213\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {856633273, 0}, addr32 = {856633273, 0, 0, 0}, addr16 = {12217, 13071, 0, 0, 0, 0, 0, 0}, addr = "\271/\017\063", '\000' <repeats 11 times>}}, src_port = 5080, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023ع/\017\070\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 940519353}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 940519353, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f8b844f2f60, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #35 0x00000000004eec99 in main_loop () at main.c:1614 ---Type <return> to continue, or q <return> to quit--- si_desc = "udp receiver child=4 sock=X.X.X.1:5060\000\000\000\000\000\360\205\\\204\213\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000]o_", '\000' <repeats 14 times>, "O\306'\320xD\247\260\304)\204\213\177\000\000\000O\306'\320xD\247\b\022\245\000\000\000\000\000\004\000\000\000\000\000\000" woneinit = 1 __FUNCTION__ = "main_loop" #36 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631 cfg_stream = 0x0 r = -2072639840 tmp = 0x7fff95b4aee4 "" tmp_len = 0 port = 0 proto = -2048211504 ret = 0 seed = 2234431947 debug_save = 0 debug_flag = 8 dont_fork_cnt = 0 st = {st_dev = 15, st_ino = 13588, st_nlink = 2, st_mode = 16832, st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1493100498, tv_nsec = 744107611}, st_mtim = {tv_sec = 1493919466, tv_nsec = 395667252}, st_ctim = {tv_sec = 1493919466, tv_nsec = 395667252}, __glibc_reserved = {0, 0, 0}} __FUNCTION__ = "main" (gdb) ``` #### Log Messages <!-- Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). --> #### SIP Traffic <!-- If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). --> ### Possible Solutions <!-- If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix. --> ### Additional Information * **Kamailio Version** - output of `kamailio -v` ``` version: kamailio 4.4.5 (x86_64/linux) flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: unknown compiled with gcc 4.9.2 ``` * **Operating System**: <!-- Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...; Kernel details (output of `uname -a`) --> ``` Linux customers 3.16.0-4-amd64 #1 SMP Debian 3.16.39-1+deb8u2 (2017-03-07) x86_64 GNU/Linux ``` -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1120
2
4
0
0
git:master:7386b03b: Merge branch 'master' of https://github.com/kamailio/kamailio
by Juha Heinanen
15 May '17
15 May '17
Module: kamailio Branch: master Commit: 7386b03b5e70b9faf61d84bfabf88092afc65a8c URL:
https://github.com/kamailio/kamailio/commit/7386b03b5e70b9faf61d84bfabf8809…
Author: Juha Heinanen <jh(a)tutpro.com> Committer: Juha Heinanen <jh(a)tutpro.com> Date: 2017-05-15T19:04:48+03:00 Merge branch 'master' of
https://github.com/kamailio/kamailio
--- Modified: src/modules/lcr/README --- Diff:
https://github.com/kamailio/kamailio/commit/7386b03b5e70b9faf61d84bfabf8809…
Patch:
https://github.com/kamailio/kamailio/commit/7386b03b5e70b9faf61d84bfabf8809…
1
0
0
0
git:master:c4754f60: modules/lcr: forgot to copy new versions of lcr *.h files to k master
by Juha Heinanen
15 May '17
15 May '17
Module: kamailio Branch: master Commit: c4754f60f010b8ad55a3785ea362dfeeda008300 URL:
https://github.com/kamailio/kamailio/commit/c4754f60f010b8ad55a3785ea362dfe…
Author: Juha Heinanen <jh(a)tutpro.com> Committer: Juha Heinanen <jh(a)tutpro.com> Date: 2017-05-15T19:02:21+03:00 modules/lcr: forgot to copy new versions of lcr *.h files to k master - thanks to Travis CI --- Modified: src/modules/lcr/hash.h Modified: src/modules/lcr/lcr_mod.h --- Diff:
https://github.com/kamailio/kamailio/commit/c4754f60f010b8ad55a3785ea362dfe…
Patch:
https://github.com/kamailio/kamailio/commit/c4754f60f010b8ad55a3785ea362dfe…
--- diff --git a/src/modules/lcr/hash.h b/src/modules/lcr/hash.h index 33c8b58..f09e379 100644 --- a/src/modules/lcr/hash.h +++ b/src/modules/lcr/hash.h @@ -36,7 +36,8 @@ int rule_hash_table_insert(struct rule_info **hash_table, unsigned int lcr_id, unsigned int rule_id, unsigned short prefix_len, char *prefix, unsigned short from_uri_len, char *from_uri, - pcre *from_uri_re, unsigned short request_uri_len, + pcre *from_uri_re, unsigned short mt_tvalue_len, + char *mt_tvalue, unsigned short request_uri_len, char *request_uri, pcre *request_uri_re, unsigned short stopper); diff --git a/src/modules/lcr/lcr_mod.h b/src/modules/lcr/lcr_mod.h index 9d4e6f2..89e20ff 100644 --- a/src/modules/lcr/lcr_mod.h +++ b/src/modules/lcr/lcr_mod.h @@ -47,6 +47,7 @@ #define MAX_USER_LEN 64 #define MAX_PARAMS_LEN 64 #define MAX_NO_OF_REPLY_CODES 15 +#define MAX_MT_TVALUE_LEN 128 typedef enum sip_protos uri_transport; @@ -56,6 +57,8 @@ struct rule_info { unsigned short prefix_len; char from_uri[MAX_URI_LEN + 1]; unsigned short from_uri_len; + char mt_tvalue[MAX_MT_TVALUE_LEN + 1]; + unsigned short mt_tvalue_len; pcre *from_uri_re; char request_uri[MAX_URI_LEN + 1]; unsigned short request_uri_len;
1
0
0
0
wiki Log In link leads to unprotected (http) page
by Juha Heinanen
15 May '17
15 May '17
wiki Log In link leads to unprotected (http) page
2
1
0
0
Broken: kamailio/kamailio#4273 (master - c5127e6)
by Travis CI
15 May '17
15 May '17
Build Update for kamailio/kamailio ------------------------------------- Build: #4273 Status: Broken Duration: 5 minutes and 20 seconds Commit: c5127e6 (master) Author: Juha Heinanen Message: modules/lcr: added possibility to match caller URI userpart to a mtree tvalue View the changeset:
https://github.com/kamailio/kamailio/compare/dcd16ac30620...c5127e6d19c4
View the full build log and details:
https://travis-ci.org/kamailio/kamailio/builds/232479240?utm_source=email&u…
-- You can configure recipients for build notifications in your .travis.yml file. See
https://docs.travis-ci.com/user/notifications
1
0
0
0
git:master:76bf1a86: modules: readme files regenerated - lcr ... [skip ci]
by Kamailio Dev
15 May '17
15 May '17
Module: kamailio Branch: master Commit: 76bf1a8682b83c302be594b9d4d0e491f9350cae URL:
https://github.com/kamailio/kamailio/commit/76bf1a8682b83c302be594b9d4d0e49…
Author: Kamailio Dev <kamailio.dev(a)kamailio.org> Committer: Kamailio Dev <kamailio.dev(a)kamailio.org> Date: 2017-05-15T17:31:22+02:00 modules: readme files regenerated - lcr ... [skip ci] --- Modified: src/modules/lcr/README --- Diff:
https://github.com/kamailio/kamailio/commit/76bf1a8682b83c302be594b9d4d0e49…
Patch:
https://github.com/kamailio/kamailio/commit/76bf1a8682b83c302be594b9d4d0e49…
1
0
0
0
git:master:c5127e6d: modules/lcr: added possibility to match caller URI userpart to a mtree tvalue
by Juha Heinanen
15 May '17
15 May '17
Module: kamailio Branch: master Commit: c5127e6d19c4f30072d81213f5eb49e4a6306bb3 URL:
https://github.com/kamailio/kamailio/commit/c5127e6d19c4f30072d81213f5eb49e…
Author: Juha Heinanen <jh(a)tutpro.com> Committer: Juha Heinanen <jh(a)tutpro.com> Date: 2017-05-15T18:12:32+03:00 modules/lcr: added possibility to match caller URI userpart to a mtree tvalue --- Modified: src/lib/srdb1/schema/lcr_rule.xml Modified: src/modules/lcr/doc/lcr_admin.xml Modified: src/modules/lcr/hash.c Modified: src/modules/lcr/lcr_mod.c --- Diff:
https://github.com/kamailio/kamailio/commit/c5127e6d19c4f30072d81213f5eb49e…
Patch:
https://github.com/kamailio/kamailio/commit/c5127e6d19c4f30072d81213f5eb49e…
1
0
0
0
git:master:dcd16ac3: modules: readme files regenerated - mtree ... [skip ci]
by Kamailio Dev
15 May '17
15 May '17
Module: kamailio Branch: master Commit: dcd16ac3062028a0857510ccd3dc9ec2a06b01b5 URL:
https://github.com/kamailio/kamailio/commit/dcd16ac3062028a0857510ccd3dc9ec…
Author: Kamailio Dev <kamailio.dev(a)kamailio.org> Committer: Kamailio Dev <kamailio.dev(a)kamailio.org> Date: 2017-05-15T15:46:24+02:00 modules: readme files regenerated - mtree ... [skip ci] --- Modified: src/modules/mtree/README --- Diff:
https://github.com/kamailio/kamailio/commit/dcd16ac3062028a0857510ccd3dc9ec…
Patch:
https://github.com/kamailio/kamailio/commit/dcd16ac3062028a0857510ccd3dc9ec…
--- diff --git a/src/modules/mtree/README b/src/modules/mtree/README index 18f3386..685adad 100644 --- a/src/modules/mtree/README +++ b/src/modules/mtree/README @@ -62,6 +62,13 @@ Juha Heinanen 5.3. mtree.reload 5.4. mtree.match + 2. Developer Guide + + 1. Available Functions + + 1.1. mt_load_api(api) + 1.2. mt_match(msg, mtree, value, mode) + List of Examples 1.1. Set db_url parameter @@ -407,3 +414,36 @@ kamcmd mtree.list mytree - match prefix * _mode_ - matching mode + +Chapter 2. Developer Guide + + Table of Contents + + 1. Available Functions + + 1.1. mt_load_api(api) + 1.2. mt_match(msg, mtree, value, mode) + +1. Available Functions + + 1.1. mt_load_api(api) + 1.2. mt_match(msg, mtree, value, mode) + +1.1. mt_load_api(api) + + The function imports all API functions that are exported by the mtree + module (see sections below). + + Meaning of the parameters is as follows: + * mtree_api_t* api - mtree API + +1.2. mt_match(msg, mtree, value, mode) + + Match 'value' against 'mtree' using 'mode' (see mt_match function Admin + Guide documentation). + + Meaning of the parameters is as follows: + * sip_msg_t *msg - SIP Request + * str *mtree - Name of mtree + * str *value - Value to match + * int mode - Match mode
1
0
0
0
git:master:556fab89: modules/mtree: added mt_match API function
by Juha Heinanen
15 May '17
15 May '17
Module: kamailio Branch: master Commit: 556fab89cec8d1eda726f38f4ddf0477e97bb79d URL:
https://github.com/kamailio/kamailio/commit/556fab89cec8d1eda726f38f4ddf047…
Author: Juha Heinanen <jh(a)tutpro.com> Committer: Juha Heinanen <jh(a)tutpro.com> Date: 2017-05-15T16:40:28+03:00 modules/mtree: added mt_match API function --- Added: src/modules/mtree/api.h Added: src/modules/mtree/doc/mtree_devel.xml Modified: src/modules/mtree/doc/mtree.xml Modified: src/modules/mtree/mtree_mod.c --- Diff:
https://github.com/kamailio/kamailio/commit/556fab89cec8d1eda726f38f4ddf047…
Patch:
https://github.com/kamailio/kamailio/commit/556fab89cec8d1eda726f38f4ddf047…
1
0
0
0
git:master:9ff4dd36: tm: use a stack of structures for faked_env()
by Daniel-Constantin Mierla
15 May '17
15 May '17
Module: kamailio Branch: master Commit: 9ff4dd36ad63f60905a49f8c0e437f997e54ae70 URL:
https://github.com/kamailio/kamailio/commit/9ff4dd36ad63f60905a49f8c0e437f9…
Author: Daniel-Constantin Mierla <miconda(a)gmail.com> Committer: Daniel-Constantin Mierla <miconda(a)gmail.com> Date: 2017-05-15T14:58:03+02:00 tm: use a stack of structures for faked_env() - be safe if there is a new faked_env() inside another faked_env() --- Modified: src/modules/tm/t_reply.c Modified: src/modules/tm/t_reply.h --- Diff:
https://github.com/kamailio/kamailio/commit/9ff4dd36ad63f60905a49f8c0e437f9…
Patch:
https://github.com/kamailio/kamailio/commit/9ff4dd36ad63f60905a49f8c0e437f9…
1
0
0
0
← Newer
1
...
15
16
17
18
19
20
21
...
30
Older →
Jump to page:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Results per page:
10
25
50
100
200