<!--
Kamailio Project uses GitHub Issues only for bugs in the code or feature requests. Please
use this template only for bug reports.
If you have questions about using Kamailio or related to its configuration file, ask on
sr-users mailing list:
*
https://lists.kamailio.org/mailman3/postorius/lists/sr-users.lists.kamailio…
If you have questions about developing extensions to Kamailio or its existing C code, ask
on sr-dev mailing list:
*
https://lists.kamailio.org/mailman3/postorius/lists/sr-dev.lists.kamailio.o…
Please try to fill this template as much as possible for any issue. It helps the
developers to troubleshoot the issue.
Note that an issue report may be closed automatically after about 2 months
if there is no interest from developers or community users on pursuing it, being
considered expired. In such case, it can be reopened by writing a comment that includes
the token `/notexpired`. About two weeks before considered expired, the issue is
marked with the label `stale`, trying to notify the submitter and everyone else
that might be interested in it. To remove the label `stale`, write a comment that
includes the token `/notstale`. Also, any comment postpone the `expire` timeline,
being considered that there is interest in pursuing the issue.
If there is no content to be filled in a section, the entire section can be removed.
You can delete the comments from the template sections when filling.
You can delete next line and everything above before submitting (it is a comment).
-->
### Description
<!--
Explain what you did, what you expected to happen, and what actually happened.
-->
We have random kamailio crashes with Segmentation Fault. It happens when ACK for canceled
call is received by Kamailio SIP proxy and forwarded to trace server using siptrace
module.
### Troubleshooting
#### Reproduction
<!--
If the issue can be reproduced, describe how it can be done.
-->
So far the problem happens only in live environment, we are unable to reproduce it in our
Dev environment.
#### Debugging Data
<!--
If you got a core dump, use gdb to extract troubleshooting data - full backtrace,
local variables and the list of the code at the issue location.
gdb /path/to/kamailio /path/to/corefile
bt full
info locals
list
If you are familiar with gdb, feel free to attach more of what you consider to
be relevant.
-->
```
#0 0x00007f3a0fa747b4 in msg_send_buffer (dst=0x7f3924d6ba60,
buf=0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route:
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len=605, flags=1) at
../../core/forward.h:220
new_dst = {send_sock = 0x2000000, to = {s = {sa_family = 0, sa_data =
"\000\000\001\000\000\000\020\374 \004\000\000"}, sin = {sin_family = 0,
sin_port = 0, sin_addr = {s_addr = 1}, sin_zero = "\020\374 \004\000\000"},
sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 1, sin6_addr =
{__in6_u = {__u6_addr8 = "\020\374 \004\000\000\000\257\335\017\241\373U\000",
__u6_addr16 = {64528, 41154, 4, 0, 56751, 41231, 22011, 0},
__u6_addr32 = {2697133072, 4, 2702171567, 22011}}}, sin6_scope_id = 0},
sas = {ss_family = 0,
__ss_padding =
"\000\000\001\000\000\000\020\374 \004\000\000\000\257\335\017\241\373U",
'\000' <repeats 11 times>,
"\244\066\246\324.\301\351\300$}n\374\177\000\000\021\006\371\240\373U\000\000\360#}n\374\177\000\000\223\vΠ\373U\000\000\000\000\000\000\000\000\000\000@$}n\374\177\000\000\067(}n5060\000\244\066\246\324.\301\351\374'}n\374\177\000\000\000\000\000\000\000\000\000",
__ss_align = 140722162182140}}, id = 59, send_flags = {f = 0,
blst_imask = 0}, proto = 64 '@', proto_pad0 = 36 '$',
proto_pad1 = 28285}
outb = {
s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route:
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 605}
netinfo = {data = {s = 0xb000003a8 <error: Cannot access memory at address
0xb000003a8>, len = 29}, bufsize = 1853694672, rcv = 0x7c101230db, dst = 0x1}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
port = -1597834224
ip = {af = 2697133072, len = 0, u = {addrl = {3221225482794, 1512}, addr32 =
{10794, 750, 1512, 0}, addr16 = {10794, 0, 750, 0, 1512, 0, 0, 0}, addr =
"**\000\000\356\002\000\000\350\005\000\000\000\000\000"}}
from = 0x0
local_addr = {s = {sa_family = 18112, sa_data =
"\235\037\071\177\000\000\320[~\033\071\177\000"}, sin = {sin_family = 18112,
sin_port = 8093, sin_addr = {s_addr = 32569}, sin_zero =
"\320[~\033\071\177\000"}, sin6 = {
sin6_family = 18112, sin6_port = 8093, sin6_flowinfo = 32569, sin6_addr =
{__in6_u = {__u6_addr8 = "\320[~\033\071\177\000\000\210\006w\021:\177\000",
__u6_addr16 = {23504, 7038, 32569, 0, 1672, 4471, 32570, 0},
__u6_addr32 = {461265872, 32569, 293013128, 32570}}}, sin6_scope_id =
291708464}, sas = {ss_family = 18112,
__ss_padding =
"\235\037\071\177\000\000\320[~\033\071\177\000\000\210\006w\021:\177\000\000\060\036c\021:\177\000\000\000\000\000\000\000\000\000\000\005\304\"\241\373U\000\000\207\001\000\000?\000\000\000@\033\366\240\373U\000\000\200#}n\374\177\000\000\020\300\274\020:\177\000\000\330\001\000\000\000\000\000\000\060'}n\374\177\000\000\300#}n\374\177\000\000\324#V\020:\177\000\000\320$}n\374\177\000",
__ss_align = 16843795572198908928}}
con = 0x0
wsev = {type = 0, buf = 0xe9c12ed4a636a400 <error: Cannot access memory at
address 0xe9c12ed4a636a400>, len = 1853694896, id = 32764}
ret = 32764
__func__ = "msg_send_buffer"
#1 0x00007f3a0fa7ca80 in trace_send_duplicate (
buf=0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route:
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len=605, dst2=0x7f3924d6ba60) at
siptrace_send.c:356
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000'
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0,
sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0,
__ss_padding = '\000' <repeats 117 times>, __ss_align = 0}},
id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0
'\000', proto_pad1 = 0}
pdst = 0x7f3924d6ba60
p = 0x0
__func__ = "trace_send_duplicate"
#2 0x00007f3a0fa3f730 in sip_trace_store (sto=0x7ffc6e7d2730, dst=0x7f3924d6ba60,
correlation_id_str=0x0) at siptrace.c:593
ret = 1
__func__ = "sip_trace_store"
#3 0x00007f3a0fa49101 in sip_trace (msg=0x7f3a1189d500, dst=0x7f3924d6ba60,
correlation_id_str=0x0, dir=0x0) at siptrace.c:1303
sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state =
{flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}, body =
{
s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route:
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 605}, alloc_body = 0, callid = {s
= 0x55fba122c45d <buf+477> "19C4ED5E658858CF(a)ab.bc.cd.da\r\nCSeqnCSeq: 9
ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (May 8 2024)\r\nContent-Length:
0\r\n\r\n", len = 31},
method = {
s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route:
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 3}, status = {s = 0x7f3a0fa7d065
"", len = 0}, dir = 0x7f3a0fa7ffb5 "in", fromtag = {
s = 0x55fba122c3f4 <buf+372> "2041847FA948DA9D\r\nTo:
<sip:49yyyyyyyyyy@sip.proxy.de>;tag=8e46bdec-8fb1-4814-b516-575f5cd3315c\r\nCall-ID:
19C4ED5E658858CF(a)ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI)
154.07.59 (Ma"..., len = 16}, fromip = {s = 0x7ffc6e7d2838
"udp:aa.bb.cc.dd:5060", len = 24}, totag = {
s = 0x55fba122c42e <buf+430>
"8e46bdec-8fb1-4814-b516-575f5cd3315c\r\nCall-ID:
19C4ED5E658858CF(a)ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI)
154.07.59 (May 8 2024)\r\nContent-Length: 0\r\n\r\n",
len = 36}, toip = {s = 0x7ffc6e7d27fc "udp:aa.bb.cc.dd:5060", len =
23}, alloc_headers = 0, toip_buff = "udp:aa.bb.cc.dd:5060", '\000'
<repeats 36 times>,
fromip_buff = "udp:aa.bb.cc.dd:5060", '\000' <repeats 35
times>, tv = {tv_sec = 1725002318, tv_usec = 379190}, stat = 0x92}
snd_inf = 0x0
__func__ = "sip_trace"
#4 0x00007f3a0fa51497 in trace_tm_neg_ack_in (t=0x7f3921846038, type=4096,
ps=0x7ffc6e7d2ad0) at siptrace.c:1769
info = 0x7f3924d6ba50
__func__ = "trace_tm_neg_ack_in"
#5 0x00007f3a10659002 in run_trans_callbacks_internal (cb_lst=0x7f39218460b0, type=4096,
trans=0x7f3921846038, params=0x7ffc6e7d2ad0) at t_hooks.c:258
cbp = 0x7f39205f2fb8
backup_from = 0x55fba123c2b0 <def_list+16>
backup_to = 0x55fba123c2b8 <def_list+24>
backup_dom_from = 0x55fba123c2c0 <def_list+32>
backup_dom_to = 0x55fba123c2c8 <def_list+40>
backup_uri_from = 0x55fba123c2a0 <def_list>
backup_uri_to = 0x55fba123c2a8 <def_list+8>
backup_xavps = 0x55fba123c3f8 <_xavp_list_head>
backup_xavus = 0x55fba123c400 <_xavu_list_head>
backup_xavis = 0x55fba123c408 <_xavi_list_head>
__func__ = "run_trans_callbacks_internal"
#6 0x00007f3a10659179 in run_trans_callbacks (type=4096, trans=0x7f3921846038,
req=0x7f3a1189d500, rpl=0x0, code=4) at t_hooks.c:285
params = {req = 0x7f3a1189d500, rpl = 0x0, param = 0x7f39205f2fc8, code = 4, flags
= 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#7 0x00007f3a106ec1bb in t_check_trans (msg=0x7f3a1189d500) at tm.c:2488
t = 0x7f3921846038
branch = 292764808
ret = 32570
#8 0x00007f3a106ec257 in w_t_check_trans (msg=0x7f3a1189d500, foo=0x0, bar=0x0) at
tm.c:2509
No locals.
#9 0x000055fba0c58367 in do_action (h=0x7ffc6e7d3400, a=0x7f3a10d8e8d0,
msg=0x7f3a1189d500) at core/action.c:1079
ret = -5
v = 481060096
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
"\000\000\000\000\000\000 2}n\374\177\000"}, sin = {sin_family = 0, sin_port =
0, sin_addr = {s_addr = 0}, sin_zero = " 2}n\374\177\000"}, sin6 = {sin6_family
= 0,
sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
" 2}n\374\177\000\000ouڠ\373U\000", __u6_addr16 = {12832, 28285, 32764, 0,
30063, 41178, 22011, 0}, __u6_addr32 = {1853698592, 32764, 2698671471,
22011}}}, sin6_scope_id = 1853698656}, sas = {ss_family = 0,
__ss_padding = "\000\000\000\000\000\000
2}n\374\177\000\000ouڠ\373U\000\000`2}n\374\177\000\000P2}n\374\177\000\000pmN\021:\177\000\000\000Չ\021:\177\000\000\001",
'\000' <repeats 11 times>,
"\324.\301\351\060\214+\021:\177\000\000\000\000\000\000\001\000\000\000\020\374 \373U",
'\000' <repeats 25 times>, __ss_align = 140722162184688}}, id = 1853699008,
send_flags = {f = 32764, blst_imask = 0}, proto = 64 '@', proto_pad0 = 108
'l',
proto_pad1 = 4430}
tmp = 0xe9c12ed4a636a400 <error: Cannot access memory at address
0xe9c12ed4a636a400>
new_uri = 0x7f390fa416c8 ""
end = 0x7f3a1012a2eb "dialog"
crt = 0x7f391ff27010 "0"
cmd = 0x7f3a10c68118
len = 262176768
user = 32569
uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len =
461265892}, passwd = {s = 0x7ffc6e7d2f80 "", len = 536880704}, host = {s = 0x1
<error: Cannot access memory at address 0x1>, len = 461265892}, port = {
s = 0x7ffc6e7d2e60 "p/}n\006", len = 269282911}, params = {s =
0x16e7d2e80 <error: Cannot access memory at address 0x16e7d2e80>, len = 461265892},
sip_params = {s = 0x7ffc6e7d2e80 "@/}n\374\177", len = 269282911},
headers = {s = 0x66e7d2f70 <error: Cannot access memory at address
0x66e7d2f70>, len = 269627611}, port_no = 41707, proto = 4114, type = 32570, flags =
(unknown: 0xa636a400), transport = {s = 0x7ffc6e7d2f40 "`/}n\374\177",
len = 269321843}, ttl = {s = 0x1ff27048 <error: Cannot access memory at
address 0x1ff27048>, len = 10794}, user_param = {s = 0x7ffc000005e8 <error: Cannot
access memory at address 0x7ffc000005e8>, len = 269526667},
maddr = {s = 0x7f391f9d46c0 "\002", len = 461265872}, method = {s =
0x100000478 <error: Cannot access memory at address 0x100000478>, len = 530400960},
lr = {
s = 0x5e8112b6508 <error: Cannot access memory at address
0x5e8112b6508>, len = 530400960}, r2 = {s = 0x7ffc6e7d2f30 "", len =
461265872}, gr = {s = 0x1 <error: Cannot access memory at address 0x1>, len =
461265892},
transport_val = {s = 0x7f391d7ffc08 "\240\374\177\035\071\177", len =
-1506368512}, ttl_val = {s = 0x16e7d2f50 <error: Cannot access memory at address
0x16e7d2f50>, len = 461265892}, user_param_val = {
s = 0x7ffc6e7d2f50 "`0}n\374\177", len = 269282911}, maddr_val = {s
= 0x600000000 <error: Cannot access memory at address 0x600000000>, len =
461265892}, method_val = {s = 0x7ffc6e7d2f60 "p/}n\374\177", len =
-1506368512},
lr_val = {s = 0x7ffc6e7d3060 "\200\060}n\374\177", len = 269351486},
r2_val = {s = 0x7ffc6e7d2f70 "`0}n\374\177", len = 269554093}, gr_val = {s =
0x7ffc6e7d3060 "\200\060}n\374\177", len = 269242067}}
next_hop = {user = {s = 0x0, len = 530400960}, passwd = {s = 0x0, len =
294245632}, host = {s = 0x0, len = 269627637}, port = {s = 0x100000478 <error: Cannot
access memory at address 0x100000478>, len = 530400960}, params = {
s = 0x5e86e7d2ff0 <error: Cannot access memory at address
0x5e86e7d2ff0>, len = 269282911}, sip_params = {s = 0x608012157 <error: Cannot
access memory at address 0x608012157>, len = 461265872}, headers = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = -1506368512},
port_no = 12464, proto = 28285, type = 32764, flags = (URI_USER_NORMALIZE |
URI_SIP_USER_PHONE | unknown: 0x100d8670),
transport = {s = 0x3e0 <error: Cannot access memory at address 0x3e0>, len
= 10794}, ttl = {s = 0x7f3a000005e8 "", len = 0}, user_param = {s = 0x1
<error: Cannot access memory at address 0x1>, len = -1506368512}, maddr = {
s = 0x0, len = 0}, method = {s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, lr = {s = 0x0,
len = 0}, r2 = {s = 0x7ffc6e7d3080 "`1}n\374\177", len = 1853698640}, gr = {
s = 0x7f3a114e6d88 "", len = 294245632}, transport_val = {s =
0x7ffc6e7d3160 " 2}n\374\177", len = 269543303}, ttl_val = {s = 0x7ffc6e7d30c0
"\300F\235\037\071\177", len = 1853698640}, user_param_val = {
s = 0x7f3a114e6d88 "", len = 294245632}, maddr_val = {s =
0x5e86e7d30d0 <error: Cannot access memory at address 0x5e86e7d30d0>, len =
-1506368512}, method_val = {s = 0x7f391f9d46c0 "\002", len = 0}, lr_val = {s =
0x0,
len = 269554093}, r2_val = {s = 0x7ffc6e7d31d0 "\360\061}n\374\177",
len = 269242067}, gr_val = {s = 0x0, len = 0}}
u = 0x7f390fa08000
port = 4114
dst_host = 0xcfa0f542d7
i = 16
flags = 32569
avp = 0x4a0c2fc10
st = {flags = 48, id = 0, name = {n = 262176768, s = {s = 0x7f390fa08000
"", len = 535981944}, re = 0x7f390fa08000}, avp = 0x7f391ff270a8}
sct = 0x55fba0f5a088 <qm_free+8063>
sjt = 0x16e7d2d90
rve = 0x7f390fa082e0
mct = 0x7ffc6e7d2e60
rv = 0x7f390fa08000
rv1 = 0x6a10f4e54
c1 = {cache_type = 290, val_type = RV_NONE, c = {avp_val = {n = 269627637, s = {s
= 0x7f3a101230f5 "dlg_hash.c", len = 1144}, re = 0x7f3a101230f5}, pval = {rs =
{s = 0x7f3a101230f5 "dlg_hash.c", len = 1144}, ri = -1506368512,
flags = -373215532}}, i2s =
"\300YO\021\350\005\000\000\000\000\000\000\001\000\000\000\020\374 \373U"}
s = {s = 0x7f3a1012a770 <__func__.11> "set_dlg_variable_unsafe",
len = 269657780}
srevp = {0x0, 0x7f3a1189d500}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1,
string = 0x1 <error: Cannot access memory at address 0x1>,
str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__func__ = "do_action"
#10 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d3400, a=0x7f3a10d8e8d0,
msg=0x7f3a1189d500) at core/action.c:1584
t = 0x7f3a10d8e8d0
ret = -1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 294245632, tz_dsttime = 32570}
tdiff = 294245632
__func__ = "run_actions"
#11 0x000055fba0c67aff in run_actions_safe (h=0x7ffc6e7d5890, a=0x7f3a10d8e8d0,
msg=0x7f3a1189d500) at core/action.c:1648
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf =
{4294967296, 6741736921070007646, 94539222285328, 0, 0, 0, 6741736921084687710,
684806027146655070}, __mask_was_saved = 0, __saved_mask = {__val = {
139887379076352, 0, 0, 0, 0, 0, 0, 0, 0, 140722162185472,
139887358911444, 140722162185440, 0, 33554432, 20328504, 10576624}}}}}
ret = 32764
ign_on_break = 0
#12 0x000055fba0e1226d in rval_get_int (h=0x7ffc6e7d5890, msg=0x7f3a1189d500,
i=0x7ffc6e7d37e0, rv=0x7f3a10d8ea28, cache=0x0) at core/rvalue.c:949
r_avp = 0xf6a0c67aff
avp_val = {n = 281523440, s = {s = 0x7f3a10c7b4f0 "ou\003\020:\177", len
= -1593034239}, re = 0x7f3a10c7b4f0}
pval = {rs = {s = 0x7f3a10c6c4a0 "\346\024S\020:\177", len = 0}, ri = 1,
flags = 22011}
tmp = {s = 0x3a8 <error: Cannot access memory at address 0x3a8>, len =
280805392}
s = 0x0
r = 32764
ret = 0
destroy_pval = 0
__func__ = "rval_get_int"
#13 0x000055fba0e17841 in rval_expr_eval_int (h=0x7ffc6e7d5890, msg=0x7f3a1189d500,
res=0x7ffc6e7d37e0, rve=0x7f3a10d8ea20) at core/rvalue.c:1947
i1 = -1506368512
i2 = -373215532
ret = -1
c1 = {cache_type = 1853699856, val_type = 32764, c = {avp_val = {n = -1595865264,
s = {s = 0x55fba0e10750 <rval_new_str+136>
"H\213E\370H\213P\bH\213E\350\213@\bH\230H\001\320", <incomplete sequence
\306>, len = -1597834224},
re = 0x55fba0e10750 <rval_new_str+136>}, pval = {rs = {s =
0x55fba0e10750 <rval_new_str+136>
"H\213E\370H\213P\bH\213E\350\213@\bH\230H\001\320", <incomplete sequence
\306>, len = -1597834224}, ri = 1853699936,
flags = 32764}}, i2s =
"\001\000\000\000\000\000\000\000X\026s\021:\177\000\000\335\304\"\241\373U"}
c2 = {cache_type = 13, val_type = 17, c = {avp_val = {n = 0, s = {s = 0x0, len =
290409088}, re = 0x0}, pval = {rs = {s = 0x0, len = 290409088}, ri = 1853700172, flags =
32764}},
i2s =
"\335\304\"\241\373U\000\000\330\304\"\241\373U\000\000\000\000\000\000\001"}
rv1 = 0x0
rv2 = 0x0
__func__ = "rval_expr_eval_int"
#14 0x000055fba0c57dbd in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d925d8,
msg=0x7f3a1189d500) at core/action.c:1055
ret = -5
v = 14401040
dst = {send_sock = 0x7f3a1189d500, to = {s = {sa_family = 22672, sa_data =
"}n\374\177\000\000\000\000\000\000:\177\000"}, sin = {sin_family = 22672,
sin_port = 28285, sin_addr = {s_addr = 32764},
sin_zero = "\000\000\000\000:\177\000"}, sin6 = {sin6_family =
22672, sin6_port = 28285, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 =
"\000\000\000\000:\177\000\000\000\000\000\000\000\000\000",
__u6_addr16 = {0, 0, 32570, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 32570, 0,
0}}}, sin6_scope_id = 294245632}, sas = {ss_family = 22672,
__ss_padding = "}n\374\177\000\000\000\000\000\000:\177",
'\000' <repeats 11 times>,
"Չ\021:\177\000\000\240V}n\374\177\000\000\000\000\000\000\000\000\000\000<\310\"\241\373U\000\000XP\307\020:\177\000\000>\310\"\241\373U\000\000\000\000\000\000\000\000\000\000@\022\060\021\377\377\377\377pA}\021:\177\000\000\000\000\000\000\001",
'\000' <repeats 11 times>, "\020\274\241\242\373U\000", __ss_align
= 0}}, id = 0, send_flags = {f = 0, blst_imask = 0},
proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
tmp = 0x55fba0c67391 <run_actions+2339>
"\211\205\274\376\377\377H\307\005F\243P"
new_uri = 0x55fba0f78206 <parse_headers+2307> "\351\021\066"
end = 0x7ffc6e7d3990 ""
crt = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE"
cmd = 0x55fba0c2fc10 <_start>
len = 8
user = 0
uri = {user = {s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, passwd = {s =
0x0, len = -1506368512}, host = {s = 0x7f3a114f4a80 "\002", len = 0}, port = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, params = {s =
0x0, len = 0}, sip_params = {s = 0x7ffc6e7d3bf0 "\020=}n\374\177", len =
-1597607023}, headers = {
s = 0x7ffc6e7d3b10 "\300;}n\374\177", len = 272678193}, port_no =
15376, proto = 28285, type = 32764, flags = (unknown: 0x1189d500), transport = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 294245632}, ttl =
{s = 0x7f3a10d8db28 "\272\002", len = 1853701168}, user_param = {s =
0x7ffc6e7d3bc0 "\360;}n\374\177",
len = -1597605121}, maddr = {s = 0x7f3a114f9a60 "\b\021", len =
294245632}, method = {s = 0x0, len = 1853707936}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0,
len = 0}, gr = {
s = 0x2a0c2fc10 <error: Cannot access memory at address 0x2a0c2fc10>,
len = 272871469}, transport_val = {s = 0x0, len = -1506368512}, ttl_val = {s =
0x7ffc6e7d3bc0 "\360;}n\374\177", len = 272753303}, user_param_val = {
s = 0xb823755e <error: Cannot access memory at address 0xb823755e>, len
= 294245632}, maddr_val = {s = 0x7ffc00000000 <error: Cannot access memory at address
0x7ffc00000000>, len = -1506368512}, method_val = {
s = 0x1a113016f0 <error: Cannot access memory at address 0x1a113016f0>,
len = 0}, lr_val = {s = 0x7f3a118ba988 "", len = 294245632}, r2_val = {s = 0x0,
len = 294365576}, gr_val = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}}
next_hop = {user = {s = 0x0, len = -1506368512}, passwd = {s = 0x7ffc6e7d3d00
"p>}n\374\177", len = 0}, host = {s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port = {s =
0x0,
len = -1506368512}, params = {s = 0x7ffc6e7d3bf0 "\020=}n\374\177",
len = 0}, sip_params = {s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, headers = {s =
0x0, len = 0},
port_no = 15632, proto = 28285, type = 32764, flags = (URI_USER_NORMALIZE |
URI_SIP_USER_PHONE | unknown: 0xa0c67afc), transport = {s = 0x7f3a1189d500
">D%", len = 294245632}, ttl = {s = 0x7f3a10d8db28 "\272\002",
len = 1853708432}, user_param = {s = 0x7f3a10d27680 "\370\001", len
= 0}, maddr = {s = 0x0, len = 1}, method = {s = 0x100000000 <error: Cannot access
memory at address 0x100000000>, len = -1109166754}, lr = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, r2 = {s = 0x0,
len = 0}, gr = {s = 0x5d8f7602bec3755e <error: Cannot access memory at address
0x5d8f7602bec3755e>,
len = 337605982}, transport_val = {s = 0x0, len = 0}, ttl_val = {s =
0x5d8f7602bf03755e <error: Cannot access memory at address 0x5d8f7602bf03755e>, len
= 337605982}, user_param_val = {s = 0x0, len = 0}, maddr_val = {
s = 0x0, len = 0}, method_val = {s = 0x0, len = -1506368512}, lr_val = {s =
0x1 <error: Cannot access memory at address 0x1>, len = 0}, r2_val = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, gr_val = {s =
0x0, len = 0}}
u = 0xe9c12ed4a636a400
port = 201
dst_host = 0x10476dde
i = 298
flags = 0
avp = 0x0
st = {flags = 0, id = 0, name = {n = -1591556899, s = {s = 0x55fba122c4dd
<buf+605> "", len = 293390512}, re = 0x55fba122c4dd <buf+605>}, avp
= 0x55fba122c4db <buf+603>}
sct = 0x0
sjt = 0x7ffc6e7d3a60
rve = 0x7f3a10d8ea20
mct = 0x0
rv = 0x7ffc6e7d3aa0
rv1 = 0x100000000
c1 = {cache_type = 1853701712, val_type = 32764, c = {avp_val = {n = -1595858323,
s = {
s = 0x55fba0e1226d <rval_get_int+341>
"\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006",
len = 1853701712},
re = 0x55fba0e1226d <rval_get_int+341>}, pval = {rs = {
s = 0x55fba0e1226d <rval_get_int+341>
"\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006",
len = 1853701712},
ri = -1506368512, flags = -373215532}}, i2s =
"H\266O\021:\177\000\000\000\000\000\000\000\000\000\000\300\337\330\020:\177"}
s = {s = 0x200 <error: Cannot access memory at address 0x200>, len =
294245632}
srevp = {0x7ffc6e7d3e70, 0xe9c12ed4a636a400}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1,
string = 0x1 <error: Cannot access memory at address 0x1>,
str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__func__ = "do_action"
#15 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d925d8,
msg=0x7f3a1189d500) at core/action.c:1584
t = 0x7f3a10d925d8
ret = -1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 1853708432, tz_dsttime = 32764}
tdiff = 1853702160
__func__ = "run_actions"
#16 0x000055fba0c582d3 in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d95ce8,
msg=0x7f3a1189d500) at core/action.c:1070
ret = 1
v = 1
dst = {send_sock = 0x7f3a1189d500, to = {s = {sa_family = 22672, sa_data =
"}n\374\177\000\000\330S}\021:\177\000"}, sin = {sin_family = 22672, sin_port =
28285, sin_addr = {s_addr = 32764}, sin_zero = "\330S}\021:\177\000"},
sin6 = {sin6_family = 22672, sin6_port = 28285, sin6_flowinfo = 32764,
sin6_addr = {__in6_u = {__u6_addr8 =
"\330S}\021:\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {21464,
4477, 32570, 0, 0, 0, 0, 0},
__u6_addr32 = {293426136, 32570, 0, 0}}}, sin6_scope_id = 294245632},
sas = {ss_family = 22672,
__ss_padding = "}n\374\177\000\000\330S}\021:\177", '\000'
<repeats 11 times>, "Չ\021:\177\000\000\240V}n\374\177", '\000'
<repeats 11 times>,
"Չ\021:\177\000\000P\001\310\020:\177\000\000`G}n\374\177\000\000\000\000\000\000\000\000\000\000\240V}n\377\377\377\377\200\346\301\020:\177\000\000\000\000\000\000\001",
'\000' <repeats 11 times>, "\001\000\000\000\000\000\000",
__ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0},
proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
tmp = 0x7f3a1189d500 ">D%"
new_uri = 0x7ffc6e7d4310 ""
end = 0x7f3a1189d500 ">D%"
crt = 0x0
cmd = 0x55fba122c2c6 <buf+70>
len = 1853702572
user = 32764
uri = {user = {s = 0x7f3a1189d500 ">D%", len = 293462816}, passwd =
{s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = -1506368512}, host
= {s = 0x0, len = 0}, port = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, params = {s =
0x0, len = 0}, sip_params = {s = 0x7ffc6e7d4420 "@E}n\374\177", len =
-1597607023}, headers = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port_no = 0,
proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x7ffc6e7d4940
"\340J}n\374\177", len = 294245632},
ttl = {s = 0x7f3a10d27680 "\370\001", len = 1853703264}, user_param =
{s = 0x0, len = 294245632}, maddr = {s = 0x7f3a10d21f18 "\340\001", len =
1853704992}, method = {s = 0x0, len = 1853707936}, lr = {s = 0x0, len = 0},
r2 = {s = 0x0, len = 0}, gr = {s = 0x30 <error: Cannot access memory at
address 0x30>, len = -1506368512}, transport_val = {s = 0x7ffc6e7d43f0 "
D}n\374\177", len = 266269062}, ttl_val = {
s = 0x55fb00000000 <error: Cannot access memory at address
0x55fb00000000>, len = 294245632}, user_param_val = {s = 0x55fba10c3df8
<__func__.25> "rval_new_empty", len = -1593034239}, maddr_val = {
s = 0x55fba122c42e <buf+430>
"8e46bdec-8fb1-4814-b516-575f5cd3315c\r\nCall-ID:
19C4ED5E658858CF(a)ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI)
154.07.59 (May 8 2024)\r\nContent-Length: 0\r\n\r\n",
len = 36}, method_val = {s = 0x7f3a11866718 "\026", len = 0}, lr_val
= {s = 0x7f3a10d11f38 "", len = 294245632}, r2_val = {s = 0x0, len = 282140472},
gr_val = {s = 0x7ffc6e7d4510 "\200F}n\374\177", len = -1595836351}}
next_hop = {user = {s = 0x55fb000005e8 <error: Cannot access memory at address
0x55fb000005e8>, len = -1506368512}, passwd = {s = 0x7f391e380230 "\002", len
= 0}, host = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port = {s =
0x0, len = -1506368512}, params = {s = 0x7ffc6e7d4420 "@E}n\374\177", len = 0},
sip_params = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, headers = {s =
0x0, len = 0}, port_no = 17728, proto = 28285, type = 32764,
flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0xa0c67afc),
transport = {s = 0x0, len = 294245632}, ttl = {s = 0x7f3a10d27680 "\370\001",
len = 1853708432}, user_param = {s = 0x7f3a10d25078 "\354\001", len = 0},
maddr = {s = 0x0, len = -1}, method = {s = 0x100000000 <error: Cannot access
memory at address 0x100000000>, len = 1111717214}, lr = {s = 0x55fba0c2fc10
<_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE",
len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x5d8f76024f23755e <error:
Cannot access memory at address 0x5d8f76024f23755e>, len = 337605982}, transport_val =
{s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0},
user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val
= {s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, lr_val = {s =
0x0, len = 0}, r2_val = {
s = 0x7ffc6e7d4680 "\360G}n\374\177", len = -1595834862}, gr_val =
{s = 0x7f3a11866710 "\a", len = -1506368512}}
u = 0x1400000000
port = 42550
dst_host = 0x7ffc6e7d56a0
i = 294245632
flags = 32570
avp = 0x7ffc00000046
st = {flags = 1853702832, id = 32764, name = {n = 268744002, s = {s =
0x7f3a1004b542 <w_process_maxfwd_header+982> "H\213M\310dH+\f%(", len =
293462808}, re = 0x7f3a1004b542 <w_process_maxfwd_header+982>}, avp = 0x0}
sct = 0x1a636a400
sjt = 0x7f3a114fd540
rve = 0x7f3a10d8dfb8
mct = 0x7ffc6e7d41a0
rv = 0x14a0c2fc10
rv1 = 0x55fba0e17ea4 <rval_expr_eval_int+1806>
c1 = {cache_type = 1853703808, val_type = 32764, c = {avp_val = {n = -1595858323,
s = {
s = 0x55fba0e1226d <rval_get_int+341>
"\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006",
len = 0},
re = 0x55fba0e1226d <rval_get_int+341>}, pval = {rs = {
s = 0x55fba0e1226d <rval_get_int+341>
"\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006",
len = 0}, ri = 0,
flags = 1}}, i2s =
"\020\374 \373U\000\000\000\000\000\000\000\000\000\000\330w\322\020:\177"}
s = {s = 0x0, len = 1}
srevp = {0x7f3a1189d500, 0xe9c12ed4a636a400}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1,
string = 0x1 <error: Cannot access memory at address 0x1>,
str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__func__ = "do_action"
#17 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d95ce8,
msg=0x7f3a1189d500) at core/action.c:1584
t = 0x7f3a10d95ce8
ret = -1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 1853708432, tz_dsttime = 32764}
tdiff = 1853704256
__func__ = "run_actions"
#18 0x000055fba0c58329 in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d95e38,
msg=0x7f3a1189d500) at core/action.c:1074
ret = 1
v = 0
dst = {send_sock = 0x7f3a1189d500, to = {s = {sa_family = 22672, sa_data =
"}n\374\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 22672,
sin_port = 28285, sin_addr = {s_addr = 32764},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family =
22672, sin6_port = 28285, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 1853705952}, sas =
{ss_family = 22672,
__ss_padding = "}n\374\177", '\000' <repeats 18
times>, "\340N}n\374\177\000\000\006\202\367\240\373U", '\000'
<repeats 11 times>,
"\244\066\246\324.\301\351\377\377\377\377\006\000\000\000\000\000\000\000\001\000\000\000\020\374 \373U",
'\000' <repeats 26 times>,
"\060O}n\374\177\000\000\242lӠ\373U\000", __ss_align = 139887367046936}}, id =
282216064, send_flags = {f = 32570, blst_imask = 0}, proto = 0 '\000', proto_pad0
= -43 '\325',
proto_pad1 = 4489}
tmp = 0x180000000000 <error: Cannot access memory at address
0x180000000000>
new_uri = 0x101f0ccbd0 <error: Cannot access memory at address
0x101f0ccbd0>
end = 0x0
crt = 0x0
cmd = 0x7f391f0ccbd0
len = -1595858323
user = 22011
uri = {user = {s = 0x55fba10eec6a "core", len = 293419024}, passwd = {s
= 0x55fba10eed78 <__func__.17> "create_avp", len = -1506368512}, host = {s
= 0x48 <error: Cannot access memory at address 0x48>, len = 0}, port = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, params = {s =
0x0, len = 0}, sip_params = {s = 0x7ffc6e7d4c50 "pM}n\374\177", len =
-1597607023}, headers = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port_no = 0,
proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x7ffc6e7d4c00
"@M}n\374\177", len = 294245632}, ttl = {
s = 0x7f3a10d25078 "\354\001", len = 1853705360}, user_param = {s =
0x7f3a10d21f18 "\340\001", len = 1853708432}, maddr = {s = 0x7ffc6e7d4b40
"", len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {
s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s =
0x5d8f760258a3755e <error: Cannot access memory at address 0x5d8f760258a3755e>, len
= 337605982}, ttl_val = {s = 0x0, len = 1853705136}, user_param_val = {
s = 0x7f7ffc6e7d4c40 <error: Cannot access memory at address
0x7f7ffc6e7d4c40>, len = 282179676}, maddr_val = {s = 0x7ffc6e7d4c80
"\320L}n\374\177", len = -1594708756}, method_val = {s = 0x7f3a10d1c180
"", len = 0},
lr_val = {s = 0x7f3a10d1b85d "target_geo_number)", len = 17}, r2_val =
{s = 0x8 <error: Cannot access memory at address 0x8>, len = 280805392}, gr_val = {s
= 0x100000043 <error: Cannot access memory at address 0x100000043>,
len = 274080724}}
next_hop = {user = {s = 0x7f391f0ccc08 "\177", len = 520932376}, passwd
= {s = 0x7f3a10bcc010 "\001", len = -1506368512}, host = {s = 0x7ffc6e7d4d40
"\260N}n\374\177", len = -1595858323}, port = {
s = 0x14800000187 <error: Cannot access memory at address
0x14800000187>, len = -1506368512}, params = {s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, sip_params = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, headers = {s =
0x0, len = 0}, port_no = 19824, proto = 28285, type = 32764,
flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0xa0c67afc),
transport = {s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 294245632}, ttl =
{s = 0x7f3a10d25078 "\354\001",
len = 1853708432}, user_param = {s = 0x7ffc6e7d4cd0
"^u\203_\002v\217]^u\037\024t\353\200\t", len = 0}, maddr = {s = 0x0, len = 1},
method = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>,
len = 1386444126}, lr = {s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, r2 = {s = 0x0,
len = 0}, gr = {
s = 0x5d8f76025f83755e <error: Cannot access memory at address
0x5d8f76025f83755e>, len = 337605982}, transport_val = {s = 0x7f3a00000000
"", len = 0}, ttl_val = {s = 0x7f3a10d1b85d "target_geo_number)", len
= 17},
user_param_val = {s = 0x1a00000101 <error: Cannot access memory at address
0x1a00000101>, len = -1506368512}, maddr_val = {s = 0x10a0c2fc10 <error: Cannot
access memory at address 0x10a0c2fc10>, len = 0}, method_val = {
s = 0x55fba0c2fc10 <_start>
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, lr_val = {s =
0x0, len = 0}, r2_val = {s = 0x7ffc6e7d4eb0 " P}n\374\177", len = -1595836351},
gr_val = {s = 0x7f3a10d1b810 "",
len = 294245632}}
u = 0x7f3a1189d500
port = 42550
dst_host = 0x0
i = 294245632
flags = 32764
avp = 0x7f3a10d21f18
st = {flags = 520932432, id = 4, name = {n = -1592832428, s = {s = 0x55fba10f4e54
"core", len = 1853705024}, re = 0x55fba10f4e54}, avp = 0xe9c12ed4a636a400}
sct = 0x7f390fa08000
sjt = 0x0
rve = 0x7f3a10d277d0
mct = 0x7f391f0ccc80
rv = 0x55fba0c2fc10 <_start>
rv1 = 0x7ffc6e7d4b20
c1 = {cache_type = 1853705904, val_type = 32764, c = {avp_val = {n = -1595858323,
s = {
s = 0x55fba0e1226d <rval_get_int+341>
"\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006",
len = 282215880},
re = 0x55fba0e1226d <rval_get_int+341>}, pval = {rs = {
s = 0x55fba0e1226d <rval_get_int+341>
"\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006",
len = 282215880},
ri = 294245632, flags = 32570}}, i2s =
"\200\301\321\020:\177\000\000\000\000\000\000\000\000\000\000\320Q\322\020:\177"}
s = {s = 0x0, len = 0}
srevp = {0x400014e90, 0xe9c12ed4a636a400}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1,
string = 0x1 <error: Cannot access memory at address 0x1>,
str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__func__ = "do_action"
#19 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d27448,
msg=0x7f3a1189d500) at core/action.c:1584
t = 0x7f3a10d95e38
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 1853708432, tz_dsttime = 32764}
tdiff = 1853706352
__func__ = "run_actions"
#20 0x000055fba0c582d3 in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d9a5d0,
msg=0x7f3a1189d500) at core/action.c:1070
ret = 1
v = 1
dst = {send_sock = 0x0, to = {s = {sa_family = 41984, sa_data =
"6\246\324.\301\351\000W}n\374\177\000"}, sin = {sin_family = 41984, sin_port =
42550, sin_addr = {s_addr = 3921751764}, sin_zero = "\000W}n\374\177\000"},
sin6 = {sin6_family = 41984, sin6_port = 42550, sin6_flowinfo = 3921751764,
sin6_addr = {__in6_u = {__u6_addr8 =
"\000W}n\374\177\000\000\000\000\000\000\001\000\000", __u6_addr16 = {22272,
28285, 32764, 0, 0, 0, 1, 0},
__u6_addr32 = {1853708032, 32764, 0, 1}}}, sin6_scope_id = 2697133072},
sas = {ss_family = 41984,
__ss_padding =
"6\246\324.\301\351\000W}n\374\177\000\000\000\000\000\000\001\000\000\000\020\374 \373U\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\000Չ\021:\177\000\000\000W}n\374\177\000\000\234\236\371\240\373U\000\000\270\266\017\241\373U\000\000`cn\021:\177\000\000\335\304\"\241\373U\000\000\204\304\"\241\373U\000\000`W}n\374\177\000\000\213\304\"\241\373U\000",
__ss_align = 0}}, id = -1591556899, send_flags = {
f = 22011, blst_imask = 0}, proto = -122 '\206', proto_pad0 = -60
'\304', proto_pad1 = -24286}
tmp = 0x5a10f4e54 <error: Cannot access memory at address 0x5a10f4e54>
new_uri = 0x7f3a10721b45 "tm: t_reply.c"
end = 0x7f3a11629608 "SIP/2.0 181 Call Is Being Forwarded\r\nVia: SIP/2.0/UDP
212.227.124.146;branch=z9hG4bK5233.276159011cb03ac27a88b9214d0464e1.0\r\nVia: SIP/2.0/UDP
89.246.251.196:5060;branch=z9hG4bKobcj3a20101lnev2u0f0.1\r\n"...
crt = 0x7f3a116283e0 "8\a"
cmd = 0x55fba123c400 <_xavu_list_head>
len = 270422824
user = 32570
uri = {user = {s = 0x7ffc6e7d52d0 "0S}n\374\177", len = -1592832423},
passwd = {s = 0x12c00000187 <error: Cannot access memory at address 0x12c00000187>,
len = -1594483904}, host = {s = 0x7ffc6e7d52f0 "", len = 280805392},
port = {s = 0x30 <error: Cannot access memory at address 0x30>, len =
280805392}, params = {s = 0x7ffc6e7d5330 "`S}n\374\177", len = 274080724},
sip_params = {
s = 0x400a15238 <error: Cannot access memory at address 0x400a15238>,
len = 0}, headers = {s = 0x2000000 <error: Cannot access memory at address
0x2000000>, len = 20331672}, port_no = 22264, proto = 161,
type = ERROR_URI_T, flags = (unknown: 0xc9c368), transport = {s = 0xdbbe10
<error: Cannot access memory at address 0xdbbe10>, len = 8}, ttl = {s = 0x130
<error: Cannot access memory at address 0x130>, len = -1506368512},
user_param = {s = 0x7ffc6e7d5360 "`T}n\374\177", len = -1597109357},
maddr = {s = 0x0, len = -1592832428}, method = {s = 0x7ffc6e7d5460
"\300U}n\374\177", len = 0}, lr = {s = 0x7ffc6e7d5460
"\300U}n\374\177",
len = -1594524464}, r2 = {s = 0x55fba110b760 <__func__.3>
"parse_via", len = -1592832423}, gr = {s = 0x55fba10fddaf "core", len
= -1594483904}, transport_val = {s = 0x55fba10fdda0 <__func__.3>
"parse_to_param",
len = -1592794504}, ttl_val = {s = 0x30 <error: Cannot access memory at
address 0x30>, len = 280805392}, user_param_val = {s = 0x7ffc6e7d5410
"@T}n\374\177", len = 274080724}, maddr_val = {
s = 0x100000001 <error: Cannot access memory at address 0x100000001>,
len = 0}, method_val = {s = 0x7f3a10bcc010 "\001", len = 292437752}, lr_val = {s
= 0x400a15450 <error: Cannot access memory at address 0x400a15450>,
len = -1592742288}, r2_val = {s = 0xdbbe10 <error: Cannot access memory at
address 0xdbbe10>, len = -1506368512}, gr_val = {s = 0x7ffc6e7d5540
"\207\001", len = -1593999801}}
next_hop = {user = {s = 0x7ffc6e7d5440 "\020\374 \004", len =
-1597109357}, passwd = {s = 0x0, len = -1506368512}, host = {s = 0x7ffc6e7d5540
"\207\001", len = 0}, port = {
s = 0x4a0c2fc10 <error: Cannot access memory at address 0x4a0c2fc10>,
len = -1592795729}, params = {s = 0x0, len = -1506368512}, sip_params = {s =
0x7ffc6e7d55c0 "-\001", len = -1594334232}, headers = {
s = 0x55fba110b760 <__func__.3> "parse_via", len =
-1592736384}, port_no = 64, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x6e7d5608),
transport = {s = 0x2000000 <error: Cannot access memory at address 0x2000000>,
len = 291681256}, ttl = {s = 0x55fba122c4dd <buf+605> "", len
= -1591557079}, user_param = {s = 0xd10bcc010 <error: Cannot access memory at address
0xd10bcc010>, len = 29}, maddr = {
s = 0x13a <error: Cannot access memory at address 0x13a>, len =
-1506368512}, method = {s = 0x7ffc6e7d5500 "", len = -1597109357}, lr = {s =
0x0, len = -1592832428}, r2 = {s = 0x7ffc6e7d5600 "\020\374 \373U", len = 0},
gr = {s = 0x7ffc6e7d5600 "\020\374 \373U", len = 1853707636},
transport_val = {s = 0x400000001 <error: Cannot access memory at address
0x400000001>, len = -1591557245}, ttl_val = {
s = 0x4a0c2fc10 <error: Cannot access memory at address 0x4a0c2fc10>,
len = 292437808}, user_param_val = {s = 0x0, len = -1592832423}, maddr_val = {s =
0x8900000187 <error: Cannot access memory at address 0x8900000187>,
len = -1594483904}, method_val = {s = 0x7ffc6e7d5590 "", len =
280805392}, lr_val = {s = 0x30 <error: Cannot access memory at address 0x30>, len =
280805392}, r2_val = {s = 0x7ffc6e7d55d0 "", len = -1594175840}, gr_val = {
s = 0x7f3a116e6388 "\004", len = 292447096}}
u = 0x7f3a00000000
port = 0
dst_host = 0x7f3a10bcc010
i = 520577136
flags = 32764
avp = 0x7ffc6e7d52d0
st = {flags = 294245632, id = 1, name = {n = 520577432, s = {s = 0x7f391f076198
"\001", len = 1853706896}, re = 0x7f391f076198}, avp = 0x7f3a1068f69d
<futex_release+29>}
sct = 0x87ea636a400
sjt = 0x7f3a107244f0 <__func__.7>
rve = 0x7f3a10d251c8
mct = 0x7f3a10720a2b
rv = 0x0
rv1 = 0x55fba0f5a0a5 <qm_free+8092>
c1 = {cache_type = 10573800, val_type = RV_NONE, c = {avp_val = {n = 13223000, s =
{s = 0xc9c458 <error: Cannot access memory at address 0xc9c458>, len = 14401040}, re
= 0xc9c458}, pval = {rs = {
s = 0xc9c458 <error: Cannot access memory at address 0xc9c458>, len
= 14401040}, ri = 8, flags = 0}}, i2s =
"-\001\000\000\000\000\000\000\000\244\066\246\324.\301\351\000V}n\374\177"}
s = {s = 0x0, len = -1506368512}
srevp = {0x2000000, 0x1363ba8}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1,
string = 0x1 <error: Cannot access memory at address 0x1>,
str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__func__ = "do_action"
#21 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d103d8,
msg=0x7f3a1189d500) at core/action.c:1584
t = 0x7f3a10d9a5d0
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 294245632, tz_dsttime = 32570}
tdiff = 0
__func__ = "run_actions"
#22 0x000055fba0c67c0b in run_top_route (a=0x7f3a10d103d8, msg=0x7f3a1189d500, c=0x0) at
core/action.c:1669
ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf =
{4294967296, 6741736920216466782, 94539222285328, 0, 0, 0, 6741736919895602526,
684806027146655070}, __mask_was_saved = 0, __saved_mask = {__val = {0,
94539222285328, 0, 0, 0, 140722162194768, 94539222747906,
140722162194768, 139887376539184, 0, 16843795572198908928, 4294967296, 4294967296,
94539222285328, 0, 0}}}}}
p = 0x7ffc6e7d5890
ret = 0
sfbk = 0
#23 0x000055fba0dc51b2 in receive_msg (
buf=0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route:
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len=605, rcv_info=0x7ffc6e7d5d60) at
core/receive.c:515
msg = 0x7f3a1189d500
ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf =
{4294967296, 6741736920216466782, 94539222285328, 0, 0, 0, 6741736919895602526,
684806027146655070}, __mask_was_saved = 0, __saved_mask = {__val = {
139887403032960, 76, 94539225362399, 139887379090320, 139887379090320,
139887365636112, 294259544, 6148676624, 139883052278512, 140722162195472,
16843795572198908928, 0, 0, 94539222285328, 0, 0}}}}}
bctx = 0x0
ret = 0
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
diff = 0
inb = {
s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route:
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 605}
netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0}
keng = 0x0
evp = {data = 0x7ffc6e7d5a80, obuf = {s = 0x0, len = 0}, rcv = 0x7ffc6e7d5d60, dst
= 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
cidlockidx = 0
cidlockset = 0
errsipmsg = 0
exectime = 0
__func__ = "receive_msg"
#24 0x000055fba0f28a26 in udp_rcv_loop () at core/udp_server.c:544
len = 605
buf = "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards:
19\r\nRecord-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia:
SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"...
tmp = 0x55fba11871a0 <buff> "aa.bb.cc.dd"
fromaddr = 0x7f3a118a0b90
fromaddrlen = 16
rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {2189222868, 0}, addr32 =
{2189222868, 0, 0, 0}, addr16 = {58324, 33404, 0, 0, 0, 0, 0, 0}, addr =
"\324\343|\202", '\000' <repeats 11 times>}}, dst_ip = {af = 2,
len = 4, u = {
addrl = {3809666004, 0}, addr32 = {3809666004, 0, 0, 0}, addr16 = {58324,
58130, 0, 0, 0, 0, 0, 0}, addr = "\324\343\022\343", '\000' <repeats
11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0,
proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data =
"\023\304\324\343|\202\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
sin_port = 50195, sin_addr = {s_addr = 2189222868},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family =
2, sin6_port = 50195, sin6_flowinfo = 2189222868, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2,
__ss_padding = "\023\304\324\343|\202", '\000' <repeats 111
times>, __ss_align = 0}}, bind_address = 0x7f3a11892470, rflags = 0,
proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
printbuf = "
\b%\241<\000\000\000\030\204\310\020:\177\000\000\210\347p6\000\000\000\000\001\000\000\000
\000\000\000\000\376$\241\373U\000\000x\a%\241\373U\000\000\205\337X\341r\177\017Z\000\244\066\246\324.\301\351\240^}n\374\177\000\000\234\036\001\241\373U\000\000\200\a%\241\373U\000\000\200\b%\241\373U\000\000\300^}n\374\177\000\000\000\244\066\246\324.\301\351\300^}n\374\177\000\000\300\032\337\033\071\177\000\000\020\374 \373U",
'\000' <repeats 26 times>,
"\200_}n\374\177\000\000\315\336\347\240\373U\000\000
_}n\374\177\000\000H'\001\241<", '\000' <repeats 11 times>,
"J"...
i = 0
j = 0
l = 0
__func__ = "udp_rcv_loop"
#25 0x000055fba0c4109b in main_loop () at main.c:1722
i = 11
pid = 0
si = 0x7f3a11892470
si_desc = "udp receiver child=11
sock=aa.bb.cc.dd:5060\000\000\002\000\000\000I\000\000\000\000\244\066\246\324.\301\351\000\000\000\000\000\000\000\000\352\004\000\000\000\000\000\000\020\374 \373U",
'\000' <repeats 26 times>, "\060b}n\374\177\000\000sOߠ\373U\000"
nrprocs = 16
woneinit = 1
__func__ = "main_loop"
#26 0x000055fba0c4e20c in main (argc=10, argv=0x7ffc6e7d6788) at main.c:3078
cfg_stream = 0x55fba28dc2a0
c = -1
r = 0
tmp = 0x7ffc6e7d6e51 ""
tmp_len = 316488736
port = 32570
proto = 316400256
ahost = 0x0
aport = 0
options = 0x55fba1089258
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 3674059014
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x0
p = 0x0
st = {st_dev = 23, st_ino = 1615, st_nlink = 2, st_mode = 16888, st_uid = 5061,
st_gid = 5061, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0,
st_atim = {tv_sec = 1722351337, tv_nsec = 496334843},
st_mtim = {tv_sec = 1722351337, tv_nsec = 496334843}, st_ctim = {tv_sec =
1722351337, tv_nsec = 496334843}, __glibc_reserved = {0, 0, 0}}
tbuf = '\000' <repeats 20 times>, " ", '\000'
<repeats 35 times>, "\006\000\000\000\000\000\000\200", '\000'
<repeats 56 times>, "\006\000\000\000\000\000\000\200", '\000'
<repeats 168 times>...
option_index = 12
long_options = {{name = 0x55fba108b6c6 "help", has_arg = 0, flag = 0x0,
val = 104}, {name = 0x55fba108650c "version", has_arg = 0, flag = 0x0, val =
118}, {name = 0x55fba108b6cb "alias", has_arg = 1, flag = 0x0, val = 1024}, {
name = 0x55fba108b6d1 "subst", has_arg = 1, flag = 0x0, val = 1025},
{name = 0x55fba108b6d7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name =
0x55fba108b6e0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
name = 0x55fba108b6ea "server-id", has_arg = 1, flag = 0x0, val =
1028}, {name = 0x55fba108b6f4 "loadmodule", has_arg = 1, flag = 0x0, val =
1029}, {name = 0x55fba108b6ff "modparam", has_arg = 1, flag = 0x0, val = 1030},
{
name = 0x55fba108b708 "log-engine", has_arg = 1, flag = 0x0, val =
1031}, {name = 0x55fba108b713 "debug", has_arg = 1, flag = 0x0, val = 1032},
{name = 0x55fba108b719 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {
name = 0x55fba108b723 "atexit", has_arg = 1, flag = 0x0, val =
1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
__func__ = "main"
```
#### Log Messages
<!--
Check the syslog file and if there are relevant log messages printed by Kamailio, add them
next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->
```
Aug 30 09:18:53 proxy-kamailio[1276]: ALERT: <core> [main.c:774]: handle_sigs():
child process 1512 exited by a signal 11
Aug 30 09:18:53 proxy-kamailio[1276]: ALERT: <core> [main.c:777]: handle_sigs():
core was generated
```
#### SIP Traffic
<!--
If the issue is exposed by processing specific SIP messages, grab them with ngrep or save
in a pcap file, then add them next, or attach to issue, or provide a link to download them
(e.g., to a pastebin site).
-->
Full SIP trace is not available. I gathered following SIP message from core dump.
```
ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0
Max-Forwards: 19
Record-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>
Via: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00d1232a60e4be6125f6753a4.0
Via: SIP/2.0/UDP
ab.bc.cd.da:5060;received=ab.bc.cd.da;rport=5060;branch=z9hG4bK1086835C2F91ECAC
From: <sip:49xxxxxxxxxx@sip.proxy.de>;tag=2041847FA948DA9D
To: <sip:49yyyyyyyyyy@sip.proxy.de>;tag=8e46bdec-8fb1-4814-b516-575f5cd3315c
Call-ID: 19C4ED5E658858CF(a)ab.bc.cd.da
CSeq: 9 ACK
User-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (May 8 2024)
Content-Length: 0
```
### Possible Solutions
<!--
If you found a solution or workaround for the issue, describe it. Ideally, provide a pull
request with a fix.
-->
For the moment we have no solution except may be to remove the siptrace module and
relevant config. However, we can not do that either as sip trace is required for many
other reasons.
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
```
version: kamailio 5.6.4 (x86_64/linux)
flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST,
DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY,
USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR,
USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535,
DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id:
compiled with gcc 10.2.1
```
* **Operating System**:
<!--
Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04,
CentOS 7.1, ...), MacOS, xBSD, Solaris, ...;
Kernel details (output of `lsb_release -a` and `uname -a`)
-->
```
Linux sip-proxy 5.10.0-31-amd64 #1 SMP Debian 5.10.221-1 (2024-07-14) x86_64 GNU/Linux
```
--
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/3970
You are receiving this because you are subscribed to this thread.
Message ID: <kamailio/kamailio/issues/3970(a)github.com>