<!-- Kamailio Project uses GitHub Issues only for bugs in the code or feature requests.
If you have questions about using Kamailio or related to its configuration file, ask on sr-users mailing list:
* http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
If you have questions about developing extensions to Kamailio or its existing C code, ask on sr-dev mailing list
* http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
Please try to fill this template as much as possible for any issue. It helps the developers to troubleshoot the issue.
If you submit a feature request (or enhancement), you can delete the text of the template and only add the description of what you would like to be added.
If there is no content to be filled in a section, the entire section can be removed.
You can delete the comments from the template sections when filling.
You can delete next line and everything above before submitting (it is a comment). -->
### Description
<!-- Explain what you did, what you expected to happen, and what actually happened. --> Segmentation fault when sip_trace method is called with less then 2 arguments.
### Troubleshooting The problem does not happen if either "xheaders_write" module param is set to zero or we provide both arguments to sip_trace method.
#### Reproduction
<!-- If the issue can be reproduced, describe how it can be done. -->
<pre> .. # ----- siptrace params ----- modparam("siptrace", "trace_on", 1) modparam("siptrace", "hep_mode_on", 0) modparam("siptrace", "xheaders_write", 1) modparam("siptrace", "trace_to_database", 0) modparam("siptrace", "trace_flag", FLT_SIP_TRACE) modparam("siptrace", "traced_user_avp", "$avp(traced_user)") modparam("siptrace", "duplicate_uri", "WEBRTC_SIP_TRACE_ADDRESS")` ..
request_route { .. sip_trace("WEBRTC_SIP_TRACE_ADDRESS"); setflag(FLT_SIP_TRACE); .. } .. </pre>
#### Debugging Data
<!-- If you got a core dump, use gdb to extract troubleshooting data - full backtrace, local variables and the list of the code at the issue location.
gdb /path/to/kamailio /path/to/corefile bt full info locals list
If you are familiar with gdb, feel free to attach more of what you consider to be relevant. -->
``` #0 0xb766b417 in _IO_vfprintf_internal (s=0xbfedc5e0, format=0xb19c7a28 "X-Siptrace-Fromip: %.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n", ap=0xbfedc6fc "\025") at vfprintf.c:1629 len = <optimized out> string_malloced = <optimized out> step0_jumps = {0, -13653, -13579, -13501, -13418, -13344, -13248, -13024, -12733, -12367, -12140, -11875, -11660, -3450, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, -3593, -11660, -13100} space = 0 is_short = 0 use_outdigits = 0 step1_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, -12367, -12140, -11875, -11660, -3450, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, -3593, -11660, 0} group = 0 prec = -1 step2_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -12140, -11875, -11660, -3450, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, -3593, -11660, 0} string = 0x9 <Address 0x9 out of bounds> left = 0 is_long_double = -1074936024 width = <optimized out> step3a_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -11961, 0, 0, 0, -3880, -3819, -3480, -3465, -9946, 0, 0, 0, 0, -3349, 0, 0, 0, 0, 0, 0} alt = 0 showsign = 0 is_long = 0 is_char = 0 pad = <optimized out> step3b_jumps = {0 <repeats 11 times>, -11660, 0, 0, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, 0, 0, 0} step4_jumps = {0 <repeats 14 times>, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, 0, 0, 0} is_negative = -1074936028 base = 0 the_arg = {pa_wchar = -1074927268 L'\xbfede95c', pa_int = -1074927268, pa_long_int = -1074927268, pa_long_long_int = -4616814309237986980, pa_u_int = 3220040028, pa_u_long_int = 3220040028, pa_u_long_long_int = 13829929764471564636, pa_double = -0.93064534650992981, pa_long_double = 3.3942842958442789709117117072106753e-4719, pa_string = 0xbfede95c "s\351\316", <incomplete sequence \370>, pa_wstring = 0xbfede95c L"\xf8cee973", pa_pointer = 0xbfede95c, pa_user = 0xbfede95c} spec = <optimized out> _buffer = {__routine = 0xbfede95c, __arg = 0xbfedc5d8, __canceltype = -1217805458, __prev = 0x0} _avail = 0 thousands_sep = 0x0 grouping = 0xffffffff <Address 0xffffffff out of bounds> f = <optimized out> lead_str_end = 0xb19c7a3b "%.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n" work_buffer = "_\262f\267 \307\355\277\242u\201\266\000\000\000\000\000\000\000\000h.~\266h.~\266|.~\266\252.~\266h.~\266\252.~\266\000\000\000\000\242u\201\266 ", '\000' <repeats 12 times>"\370, \201\202\266\000\000\000\000\304\301\355\277", '\000' <repeats 20 times>"\334, \307\355\277\000\000\000\000\000\000\000\000\004\000\000\000\377\377\377\377\355G\202\266\bp\342\266\304\301\355\277\304i\202\266-i\001\262", '\000' <repeats 20 times>"\340, \326x\267\000\000\000\000\000\000\000\000 \201\202\266\000\000\000\000h\302\355\277\215\034\202\266\002", '\000' <repeats 23 times>, "L\310\355\277\000\000\000\000\000\000\000\000\004\000\000\000\003\000\000\000\020\310\355\277\377\377\377\377\377\377\377\377\034'4\267c\302\355\277\000<g\267h.~\266C\000\000\000̥z\266\\302\355\277h\023~\266\030\303\355\277`\306\355\277\250\242z\266\241u\201\266\000\000\000\000D\335f\267\000\000\000\000\232u\201\266\000\000\000\000H\310\355\277\016\000\000\000\232u\201\266\063\204i\267\261Q'\b,\;\b\004\000\000\000\000*\000\000\001\000\000\000$\311\355\277\001\000\000\000\364"... workstart = 0x0 workend = 0xbfedc520 "\250\205 \267\260\205 \267" ap_save = 0xbfedc6fc "\025" nspecs_done = 5 save_errno = 0 readonly_format = 0 args_malloced = 0x0 specs = <optimized out> specs_malloced = false jump_table = "\001\000\000\004\000\016\000\006\000\000\a\002\000\003\t\000\005\b\b\b\b\b\b\b\b\b\000\000\000\000\000\000\000\032\000\031\000\023\023\023\000\035\000\000\f\000\000\000\000\000\000\025\000\000\000\000\022\000\r\000\000\000\000\000\000\032\000\024\017\023\023\023\n\017\034\000\v\030\027\021\026\f\000\025\033\020\000\000\022\000\r" __PRETTY_FUNCTION__ = "_IO_vfprintf_internal" #1 0xb768ede0 in _IO_vsnprintf ( string=0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", maxlen=512, format=0xb19c7a28 "X-Siptrace-Fromip: %.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n", args=0xbfedc6fc "\025") at vsnprintf.c:120 sf = {f = {_sbf = {_f = {_flags = -72515583, _IO_read_ptr = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", _IO_read_end = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", _IO_read_base = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", _IO_write_base = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", _IO_write_ptr = 0xb716a82a "", _IO_write_end = 0xb716a986 "", _IO_buf_base = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", _IO_buf_end = 0xb716a986 "", _IO_save_base = 0x0, _IO_backup_base = 0x0, _IO_save_end = 0x0, _markers = 0x0, _chain = 0x0, _fileno = -1074936088, _flags2 = 0, _old_offset = 5, _cur_column = 0, _vtable_offset = 0 '\000', _shortbuf = "", _lock = 0x0, _offset = 593186573409608927, _codecvt = 0x23e, _wide_data = 0xb19c47b0, _freeres_list = 0x0, _freeres_buf = 0x5, _freeres_size = 0, _mode = -1, _unused2 = "`b<\b\vl;\b?\000\000\000ha<\b\224\066*\267\\344\355\277\364\066*\267H\320\355\277\375x\234\261\204\065*\267"}, vtable = 0xb778d6e0}, _s = {_allocate_buffer = 0, _free_buffer = 0xffffffff}}, overflow_buf = "\000\000\000\000\004\000\000\000\375x\234\261a\245\026\267)\002\000\000<\270j\267\210\247\026\267\000\000\000\000\001\000\000\000\000y\234\261\004\000\000\000\000\000\000\000`\245\026\267\000\000\000\000\002\000\000\000\375x\234\261"} ret = 0 #2 0xb7673cf2 in __snprintf ( s=0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", maxlen=512, format=0xb19c7a28 "X-Siptrace-Fromip: %.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n") at snprintf.c:35 done = 0 #3 0xb19ae7c3 in sip_trace_xheaders_write (sto=0xbfedc924) at siptrace.c:594 buf = 0xb716a548 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"... bytes_written = 0 eoh = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: " eoh_offset = 0 new_eoh = 0x0 __FUNCTION__ = "sip_trace_xheaders_write" #4 0xb19b01fe in sip_trace_store (sto=0xbfedc924, dst=0x0, correlation_id_str=0x0) at siptrace.c:750 __FUNCTION__ = "sip_trace_store" ret = -1 #5 0xb19b64bd in sip_trace (msg=0xb72a3584, dst=0x0, correlation_id_str=0x0, dir=0x9 <Address 0x9 out of bounds>) at siptrace.c:1151 sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state = {flags = 257, id = 75, name = {n = -1226220299, s = { s = 0xb6e95cf5 "traced_user)", len = 11}, re = 0xb6e95cf5}, avp = 0x0}, body = { s = 0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len = 577}, callid = { s = 0x848866f "0b5l88q765nk5ahdvqqd1a\r\nCSeq: 202 REGISTER\r\nWWW-Authenticate: Digest realm="acs.dummy.com", nonce="5a24acbba41b8f45ded1be19fc13951d5438c8e0"\r\nServer: OpenSER (1.3.4-notls (i386/linux))\r\nContent-Len"..., len = 22}, method = { s = 0x8488691 "REGISTER\r\nWWW-Authenticate: Digest realm="acs.dummy.com", nonce="5a24acbba41b8f45ded1be19fc13951d5438c8e0"\r\nServer: OpenSER (1.3.4-notls (i386/linux))\r\nContent-Length: 0\r\n\r\n", len = 8}, status = { s = 0x8488508 "401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK3573981\r\nT"..., len = 3}, dir = 0x9 <Address 0x9 out of bounds>, fromtag = { s = 0x848865a "coqoo7bgrr\r\nCall-ID: 0b5l88q765nk5ahdvqqd1a\r\nCSeq: 202 REGISTER\r\nWWW-Authenticate: Digest realm="acs.dummy.com", nonce="5a24acbba41b8f45ded1be19fc13951d5438c8e0"\r\nServer: OpenSER (1.3.4-notls (i386"..., len = 10}, fromip = {s = 0xbfedc9bc "udp:185.18.45.53:5060", len = 21}, totag = { s = 0x84885f8 "f585cd8bc1f6d3796bfeb421b703352f.8488\r\nFrom: "James Howlett" sip:998100601189@172.16.171.60;tag=coqoo7bgrr\r\nCall-ID: 0b5l88q765nk5ahdvqqd1a\r\nCSeq: 202 REGISTER\r\nWWW-Authenticate: Digest realm="acs.a"..., len = 37}, toip = {s = 0xbfedc988 "udp:185.18.45.115:5060", len = 22}, toip_buff = "udp:185.18.45.115:5060", '\000' <repeats 29 times>, fromip_buff = "udp:185.18.45.53:5060", '\000' <repeats 30 times>, tv = { tv_sec = 1512352655, tv_usec = 48676}, stat = 0x70} snd_inf = 0x0 __FUNCTION__ = "sip_trace" #6 0x08078b06 in do_action (h=0xbfede244, a=0xb712fe5c, msg=0xb72a3584) at core/action.c:1054 ret = -5 v = 2 dst = {send_sock = 0x9cf, to = {s = {sa_family = 65456, sa_data = "<\b\372\317'\b\304\322\355\277\000\000\000"}, sin = {sin_family = 65456, sin_port = 2108, sin_addr = {s_addr = 136826874}, sin_zero = "\304\322\355\277\000\000\000"}, sin6 = {sin6_family = 65456, sin6_port = 2108, sin6_flowinfo = 136826874, sin6_addr = {__in6_u = {__u6_addr8 = "\304\322\355\277\000\000\000\000\034\000\000\000\U\002\266", __u6_addr16 = {53956, 49133, 0, 0, 28, 0, 21852, 46594}, __u6_addr32 = {3220034244, 0, 28, 3053606236}}}, sin6_scope_id = 0}}, id = -1074927268, proto = -88 '\250', send_flags = {f = 49133, blst_imask = 28680}} tmp = 0x8274cdd "\270" new_uri = 0xb72a3a18 "\200" end = 0x8274cdd "\270" crt = 0xbfedd408 "\b\325\355\277\371C\b\bD\342\355\277\\376\022\267\204\065*\267\220\032=\b\vl;\b\317\t" cmd = 0xb6e8ab64 len = 0 user = 0 uri = {user = {s = 0xb23c3d00 "", len = 8388608}, passwd = {s = 0x285e8c <Address 0x285e8c out of bounds>, len = 4531876}, host = { s = 0x57a174 <Address 0x57a174 out of bounds>, len = 5755668}, port = {s = 0x4 <Address 0x4 out of bounds>, len = 8}, params = {s = 0x0, len = -1226674168}, sip_params = {s = 0xbfedd208 "\001", len = 135116871}, headers = {s = 0x0, len = 0}, port_no = 53768, proto = 49133, type = 136793309, flags = 3068293128, transport = {s = 0xb71997d4 " ", len = -1217821645}, ttl = {s = 0x0, len = -1223059524}, user_param = { s = 0x3c0 <Address 0x3c0 out of bounds>, len = 1}, maddr = {s = 0x0, len = 5}, method = {s = 0x0, len = -1074932984}, lr = { s = 0x8197d1c "\205\300\017\237\300\017\266ЋE\020\211\020\213E\b\213@\004\211\302\203\342\371\213E\b\211P\004\351\341\004", len = -1074929084}, r2 = { s = 0xb712f764 "\255\r", len = -1221970556}, gr = {s = 0x80db847 "\211E\364\213E\364\351\373\001", len = 0}, transport_val = {s = 0x0, len = -1074933160}, ttl_val = {s = 0x8274cdd "\270", len = -1226674168}, user_param_val = {s = 0xb71caee4 "l", len = -1245326265}, maddr_val = {s = 0x0, len = -1222857012}, method_val = {s = 0xa0 <Address 0xa0 out of bounds>, len = -1074932952}, lr_val = {s = 0x8275535 "\213E܃\300\034\351\a\003", len = 5}, r2_val = {s = 0x0, len = 32}, gr_val = {s = 0x83d1a90 "core: core/parser/parse_via.c", len = 138112011}} next_hop = {user = {s = 0xb6dfb1d5 "U\211\345S\203\354\024\350\372\343\377\377\201ÿ\263\002", len = -1226848018}, passwd = {s = 0x0, len = -1074932385}, host = {s = 0xa <Address 0xa out of bounds>, len = 0}, port = {s = 0x0, len = -1074931896}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 2}, headers = {s = 0xb73a2138 "h\037:\267\006", len = 0}, port_no = 65535, proto = 65535, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = -1074927268}, ttl = {s = 0xbfedd158 "\204\065*\267\240\070*\267", len = -1221970284}, user_param = {s = 0xbfede45c "\020", len = -1221970188}, maddr = { s = 0xbfedd218 "\b\323\355\277\034}\031\bD\342\355\277d\367\022\267\204\065*\267G\270\r\b", len = 134761067}, method = {s = 0xbfedd160 "", len = -1223493788}, lr = {s = 0xb72a3584 "\001", len = -1221969760}, r2 = {s = 0x0, len = 0}, gr = {s = 0x1 <Address 0x1 out of bounds>, len = -1221970284}, transport_val = {s = 0xbfede45c "\020", len = -1221970188}, ttl_val = { s = 0xbfedd148 "\030\322\355\277kJ\b\b`\321\355\277d\367\022\267\204\065*\267\240\070*\267", len = -1281299135}, user_param_val = { s = 0x7881ec2e <Address 0x7881ec2e out of bounds>, len = 0}, maddr_val = {s = 0xb72a377c "", len = -1226674168}, method_val = {s = 0xbfedd3c0 "\260\237W", len = -1226183112}, lr_val = {s = 0xbfedd1d8 "\b\322\355\277G\270\r\b", len = -1232975437}, r2_val = {s = 0xb6e27008 "\001", len = -1074933324}, gr_val = { s = 0xbfedd278 "\260\377<\b\372\317'\b\304\322", <incomplete sequence \355\277>, len = -1313472512}} u = 0x80db847 port = 49133 dst_host = 0xfa20d i = -1226674168 flags = 0 avp = 0x0 st = {flags = 3220033768, id = 0, name = {n = 0, s = {s = 0x0, len = -1226821088}, re = 0x0}, avp = 0xb6dfb190} sct = 0xb72a3694 sjt = 0xb774731f rve = 0x4 mct = 0xbfede45c rv = 0x0 rv1 = 0x8 c1 = {cache_type = RV_CACHE_EMPTY, val_type = 3078153004, c = {avp_val = {n = -1074933548, s = {s = 0xbfedd0d4 "\350\320", <incomplete sequence \355\277>, len = -1218077169}, re = 0xbfedd0d4}, pval = {rs = {s = 0xbfedd0d4 "\350\320", <incomplete sequence \355\277>, len = -1218077169}, ri = -1216814292, flags = -1074933564}}, i2s = ",\343x\267D\340x\267\304\320\355\277\377\377\377\377\000\000\000\000\000"} s = {s = 0xb778e0bc "\303~6\033\b", len = -1216815116} srevp = {0xb7659c74, 0xb778e0c0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #7 0x080843f9 in run_actions (h=0xbfede244, a=0xb712fe5c, msg=0xb72a3584) at core/action.c:1552 t = 0xb712fe5c ret = -1 mod = 0x4 ms = 0 __FUNCTION__ = "run_actions" #8 0x08078a8a in do_action (h=0xbfede244, a=0xb712ff08, msg=0xb72a3584) at core/action.c:1045 ret = 1 v = 1 dst = {send_sock = 0xbfedddd4, to = {s = {sa_family = 13301, sa_data = "|\267\000\000\000\000\270\230\031\267\304\002\000"}, sin = {sin_family = 13301, sin_port = 46972, sin_addr = {s_addr = 0}, sin_zero = "\270\230\031\267\304\002\000"}, sin6 = {sin6_family = 13301, sin6_port = 46972, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\270\230\031\267\304\002\000\000\070\336\355\277\065U'\b", __u6_addr16 = {39096, 46873, 708, 0, 56888, 49133, 21813, 2087}, __u6_addr32 = {3071908024, 708, 3220037176, 136795445}}}, sin6_scope_id = 5}}, id = 0, proto = 4 '\004', send_flags = { f = 46946, blst_imask = 11736}} tmp = 0xb72a36f4 "" new_uri = 0xb77d7908 "" end = 0xbfedde84 "\377\377\377\377\364o}\267<Y\005\b\005" crt = 0xbfede45c "\020" cmd = 0xbfede45c len = -1221970284 user = -1218240796 uri = {user = {s = 0x83bd30c "core", len = 4}, passwd = {s = 0xb71cadb0 "\001", len = 138149819}, host = {s = 0x2000007e <Address 0x2000007e out of bounds>, len = 4096}, port = {s = 0x0, len = -1222857296}, params = {s = 0xb71caf00 "\001", len = -1221969600}, sip_params = {s = 0xb72a3728 "", len = -1221969516}, headers = {s = 0xb72a38ec "", len = -1217109483}, port_no = 33272, proto = 46722, type = 136826874, flags = 3220036884, transport = { s = 0x0, len = 28}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0xb6e27008 "\001", len = 0}, method = {s = 0x0, len = -1074930376}, lr = {s = 0xb68249b3 "\213\223\324\a", len = -1226674168}, r2 = { s = 0xbfeddd14 "\344\036c\267\020ii\rT\335\355\277v-|\267\060\312c\267\262\300\005\b", len = 0}, gr = {s = 0x0, len = 0}, transport_val = { s = 0xb7631ee4 "\032L", len = 225011984}, ttl_val = {s = 0xbfeddd54 "\324\335\355\277\365\063|\267", len = -1216598666}, user_param_val = { s = 0xb763ca30 "GLIBC_2.0", len = 134594738}, maddr_val = {s = 0x1000 <Address 0x1000 out of bounds>, len = 134567646}, method_val = { s = 0xb7629020 "\262\300\005\b\020ii\r", len = -1074987006}, lr_val = {s = 0xb77c8ab0 "\205\300u\344\203\304\b\270\001", len = 134567646}, r2_val = { s = 0xb77b7c30 "libresolv.so.2", len = -1216516108}, gr_val = { s = 0xb762c9a8 "\227\201B\250|`\234|\374Qcq\zy\360\003\346`\033|\231/\310Km\301\243\353\372\266=/\222\210\353", <incomplete sequence \352>, len = 3}} next_hop = {user = {s = 0xffffffff <Address 0xffffffff out of bounds>, len = 138138380}, passwd = {s = 0x4 <Address 0x4 out of bounds>, len = -1223059220}, host = {s = 0x83bffc9 "get_hdr_field", len = 135}, port = {s = 0x83bd30c "core", len = -1074930680}, params = {s = 0x8274cdd "\270", len = -1226674168}, sip_params = {s = 0xb71cab74 "\b", len = 35}, headers = {s = 0x0, len = -1222857892}, port_no = 1040, proto = 0, type = 3220036824, flags = 136795445, transport = {s = 0x5 <Address 0x5 out of bounds>, len = 1}, ttl = {s = 0xb8 <Address 0xb8 out of bounds>, len = -1230656743}, user_param = { s = 0x83b6c0b "fragm. from qm_malloc", len = -1222857616}, maddr = {s = 0xc9 <Address 0xc9 out of bounds>, len = -1226674168}, method = { s = 0xb73a2298 "", len = -1222857684}, lr = {s = 0xb68281f8 <incomplete sequence \320>, len = -1230628236}, r2 = {s = 0xb6a5ab19 "core: db_id.c", len = -1217105105}, gr = {s = 0xb6a61a74 "@\331\002", len = -1230774707}, transport_val = { s = 0x848856c ".0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK3573981\r\nTo: sip:998100601189@172.16.171.60;tag=f585cd8bc1f6d3796bfeb421b703352f.8488\r\nFrom: "James Howlett""..., len = 1}, ttl_val = {s = 0x6f <Address 0x6f out of bounds>, len = -1222857212}, user_param_val = {s = 0x0, len = -1222857324}, maddr_val = {s = 0x0, len = 138970480}, method_val = {s = 0x10002 <Address 0x10002 out of bounds>, len = 26}, lr_val = { s = 0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len = 0}, r2_val = {s = 0xbfede45c "\020", len = -1221970188}, gr_val = { s = 0xbfeddf18 "h\340\355\277P\230\031\267\204\065*\267\002", len = 136893382}} u = 0x0 port = 2114 dst_host = 0x5 i = 134567476 flags = -1 avp = 0x5 st = {flags = 138970945, id = 38528, name = {n = -1221970284, s = {s = 0xb72a3694 "\002", len = -1074928548}, re = 0xb72a3694}, avp = 0xb72a36f4} sct = 0x805593c sjt = 0xb77b7c98 rve = 0xb712faa0 mct = 0xb7629020 rv = 0x84885d3 rv1 = 0x0 c1 = {cache_type = RV_CACHE_EMPTY, val_type = 3072997108, c = {avp_val = {n = -1074930152, s = {s = 0xbfedde18 "\210\337\355\277PY<\266", len = 136889644}, re = 0xbfedde18}, pval = {rs = {s = 0xbfedde18 "\210\337\355\277PY<\266", len = 136889644}, ri = -1226674168, flags = -1223058892}}, i2s = "`\327;\b\273\377;\bO\001\000\000\f\323;\b\221\206H\b\231\206"} s = {s = 0x4 <Address 0x4 out of bounds>, len = 126} srevp = {0x579ca4, 0x57d314} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #9 0x080843f9 in run_actions (h=0xbfede244, a=0xb712ff08, msg=0xb72a3584) at core/action.c:1552 t = 0xb712ff08 ret = -1 mod = 0x0 ms = 0 __FUNCTION__ = "run_actions" #10 0x08084b03 in run_top_route (a=0xb712ff08, msg=0xb72a3584, c=0xbfede244) at core/action.c:1641 ctx = {rec_lev = 0, run_flags = 126, last_retcode = 0, jmp_env = {{__jmpbuf = {14, 0, 0, 0, 94, 0}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 0, 0, 0, 0, 0, 0, 3061963914, 3062006264, 3220038748, 3220037764, 3061964261, 35, 1, 4, 3072110084, 3220038180, 2310458, 3220037784, 3061965435, 35, 1, 4, 3220037832, 136011880, 3072996740, 1073741828, 0, 135068986, 3072996740}}}}} p = 0xbfede244 ret = -1222607340 sfbk = 0 #11 0x0815f9ce in receive_msg ( buf=0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len=577, rcv_info=0xbfede3fc) at core/receive.c:327 msg = 0xb72a3584 ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {-1221970284, -1074928548, -1221970188, -1074929688, -1279414975, 2021780526}, __mask_was_saved = 0, __saved_mask = {__val = {3078323352, 3078453512, 4294967295, 3078451188, 134568902, 5, 3220038336, 3078388710, 3078453952, 3076689952, 1, 5, 0, 5, 134567476, 138561348, 0, 3076746516, 1546143882, 0, 3220040028, 3220038488, 3078412688, 3220038664, 3077676560, 50195, 3078453512, 1104, 136655121, 0, 1546143882, 3220038424}}}}} bctx = 0x80559e6 ret = 1 stats_on = 0 tvb = {tv_sec = -1074928848, tv_usec = -1216513344} tve = {tv_sec = 134568902, tv_usec = -1216516108} tz = {tz_minuteswest = -1218219948, tz_dsttime = 134538164} diff = 0 inb = { s = 0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len = 577} netinfo = {data = {s = 0xbfede2b0 "\024mc\267\212H(\", len = -1074929048}, dst = 0xbfede274, rcv = 0xb7629020} keng = 0x0 __FUNCTION__ = "receive_msg" #12 0x0825a456 in udp_rcv_loop () at core/udp_server.c:515 len = 577 buf = "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"... tmp = 0x834e413 "counters_prefork_init" from = 0xb71cad60 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {892171861, 4, 1546143882, 1}, addr32 = {892171861, 4, 1546143882, 1}, addr16 = {30293, 13613, 4, 0, 18570, 23592, 1, 0}, addr = "Uv-5\004\000\000\000\212H(\\001\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {1932359253, 0, 0, 0}, addr32 = { 1932359253, 0, 0, 0}, addr16 = {30293, 29485, 0, 0, 0, 0, 0, 0}, addr = "Uv-s", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304Uv-5\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 892171861}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 892171861, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0xb6e7896c, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #13 0x080693c6 in main_loop () at main.c:1623 i = 1 pid = 0 si = 0xb6e7896c si_desc = "udp receiver child=1 sock=185.18.45.115:5060\000\000\000\000\004\000\000\000\b\347\355\277\212H(\\001\000\000\000\212H(\\210\346\355\277L\343'\bd\204\271\261\004\000\000\000\031\251\066\b\350\272\066\bq\000\000\000\264\247\066\b\b\020\000\000y\221f\266\070\200 \267\277\064\300\265\230\061\301\265\f\200\001\262\f\034\300\265" nrprocs = 4 woneinit = 1 __FUNCTION__ = "main_loop" #14 0x080708ac in main (argc=13, argv=0xbfedead4) at main.c:2643 cfg_stream = 0x8e7a008 c = -1 r = 0 tmp = 0xbfee090d "" tmp_len = 1 port = 0 proto = 0 options = 0x83422fc ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 4174309747 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0xbfedea00 p = 0x805d5ec "[\201\303$o<" st = {st_dev = 14, __pad1 = 0, st_ino = 6140, st_mode = 16832, st_nlink = 2, st_uid = 0, st_gid = 0, st_rdev = 0, __pad2 = 0, st_size = 60, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1510541218, tv_nsec = 950311164}, st_mtim = {tv_sec = 1512352641, tv_nsec = 828578904}, st_ctim = {tv_sec = 1512352652, tv_nsec = 920812953}, __unused4 = 0, __unused5 = 0} __FUNCTION__ = "main" ```
#### Log Messages
<!-- Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
``` Dec 4 02:57:35 webrtc-as-rct kernel: [1811495.918954] kamailio[15829] segfault at 9 ip b766b417 sp bfedbffc error 4 in libc-2.13.so[b762a000+161000] Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15901]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 24 Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15826]: ALERT: <core> [main.c:743]: handle_sigs(): child process 15829 exited by a signal 11 Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15826]: ALERT: <core> [main.c:746]: handle_sigs(): core was generated Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15826]: INFO: <core> [main.c:768]: handle_sigs(): terminating due to SIGCHLD Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15899]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15897]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15895]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15893]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15891]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15888]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15887]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15885]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15865]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15861]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15871]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15867]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15873]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15875]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15881]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15877]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15879]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15883]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15901]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15846]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15849]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15840]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15844]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15848]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15842]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15856]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15860]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15854]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15858]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15852]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15834]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15835]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15830]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15836]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15828]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15831]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15837]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15832]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15833]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15869]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15826]: INFO: <core> [core/sctp_core.c:53]: sctp_core_destroy(): SCTP API not initialized ```
#### SIP Traffic
<!-- If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
``` N/A ```
### Possible Solutions
<!-- If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix. -->
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
``` version: kamailio 5.0.4 (i386/linux) flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, select. id: unknown compiled on 11:05:34 Dec 1 2017 with gcc 4.7.2 ```
* **Operating System**:
<!-- Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...; Kernel details (output of `uname -a`) -->
``` Linux webrtc-as-rct 3.10-0.bpo.2-686-pae #1 SMP Debian 3.10.5-1~bpo70+1 (2013-08-11) i686 GNU/Linux ```