<!--
Kamailio Project uses GitHub Issues only for bugs in the code or feature requests.
If you have questions about using Kamailio or related to its configuration file,
ask on sr-users mailing list:
*
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
If you have questions about developing extensions to Kamailio or its existing
C code, ask on sr-dev mailing list
*
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
Please try to fill this template as much as possible for any issue. It helps the
developers to troubleshoot the issue.
If you submit a feature request (or enhancement), you can delete the text of
the template and only add the description of what you would like to be added.
If there is no content to be filled in a section, the entire section can be removed.
You can delete the comments from the template sections when filling.
You can delete next line and everything above before submitting (it is a comment).
-->
### Description
<!--
Explain what you did, what you expected to happen, and what actually happened.
-->
Kamailio gives segfault due to SIGCHLD when a websocket client tries to connect to it.
The problem seems to happen due to following global parameter,
http_reply_parse=yes
Along with following dialog module parameter,
modparam("dialog",
"track_cseq_updates", 1)
### Troubleshooting
Disabling dialog parameter track_cseq_updates fixes the problem but in my setup i need
this to be set since i use uac_auth() method in failure routes.
modparam("dialog",
"track_cseq_updates", 0)
#### Reproduction
<!--
If the issue can be reproduced, describe how it can be done.
-->
The issue is reproducible by setting following in kamailio.cfg
http_reply_parse=yes
modparam("dialog",
"track_cseq_updates", 1)
#### Debugging Data
<!--
If you got a core dump, use gdb to extract troubleshooting data - full backtrace,
local variables and the list of the code at the issue location.
gdb /path/to/kamailio /path/to/corefile
bt full
info locals
list
If you are familiar with gdb, feel free to attach more of what you consider to
be relevant.
-->
```
webrtc-as:/tmp# gdb /usr/local/adx-webrtc/sbin/kamailio
core.kamailio.14045.webrtc-as.1508598510
...
Reading symbols from /usr/local/adx-webrtc/sbin/kamailio...done.
[New LWP 14045]
warning: Can't read pathname for load map: Input/output error.
[Thread debugging using libthread_db enabled]
Using host libthread_db library
"/lib/i386-linux-gnu/i686/cmov/libthread_db.so.1".
Core was generated by `/usr/local/adx-webrtc/sbin/kamailio -f
/usr/local/adx-webrtc/etc/kamailio/kamai'.
Program terminated with signal 11, Segmentation fault.
#0 0xb58a41a6 in dlg_cseq_prepare_msg (msg=0xbfab2cc4) at dlg_cseq.c:81
81 if(get_cseq(msg)->method_id != METHOD_CANCEL) {
(gdb) bt full
#0 0xb58a41a6 in dlg_cseq_prepare_msg (msg=0xbfab2cc4) at dlg_cseq.c:81
__FUNCTION__ = "dlg_cseq_prepare_msg"
#1 0xb58a53a0 in dlg_cseq_prepare_new_msg (msg=0xbfab2cc4) at dlg_cseq.c:116
__FUNCTION__ = "dlg_cseq_prepare_new_msg"
#2 0xb58a99b6 in dlg_cseq_msg_sent (data=0xbfab333c) at dlg_cseq.c:369
msg = {id = 0, pid = 0, tval = {tv_sec = 0, tv_usec = 0}, fwd_send_flags = {f = 0
'\000', blst_imask = 0 '\000'}, rpl_send_flags = {f = 0 '\000',
blst_imask = 0 '\000'}, first_line = {type = 2,
flags = 2, len = 34, u = {request = {method = {
s = 0xb6959fe8 "HTTP/1.1 101 Switching Protocols\r\nSia:
SIP/2.0/TLS x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin:
https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade:
websocket\r\nConne"..., len = 8}, uri = {
s = 0xb6959ff1 "101 Switching Protocols\r\nSia: SIP/2.0/TLS
x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin:
https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade:
websocket\r\nConnection: up"..., len = 3}, version = {
s = 0xb6959ff5 "Switching Protocols\r\nSia: SIP/2.0/TLS
x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin:
https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade:
websocket\r\nConnection: upgrad"..., len = 19}, method_value = 101}, reply = {version
= {
s = 0xb6959fe8 "HTTP/1.1 101 Switching Protocols\r\nSia:
SIP/2.0/TLS x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin:
https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade:
websocket\r\nConne"..., len = 8}, status = {
s = 0xb6959ff1 "101 Switching Protocols\r\nSia: SIP/2.0/TLS
x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin:
https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade:
websocket\r\nConnection: up"..., len = 3}, reason = {
s = 0xb6959ff5 "Switching Protocols\r\nSia: SIP/2.0/TLS
x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin:
https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade:
websocket\r\nConnection: upgrad"..., len = 19}, statuscode = 101}}}, via1 = 0x0, via2
= 0x0, headers = 0xb695c554, last_header = 0xb695a1a0, parsed_flag = 18446744073709551615,
h_via1 = 0x0, h_via2 = 0x0,
callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0, contact = 0x0, maxforwards =
0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0xb695a1a0,
authorization = 0x0, expires = 0x0,
proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0,
unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0, accept_language = 0x0,
organization = 0x0, priority = 0x0,
subject = 0x0, user_agent = 0x0, server = 0xb695a15c, content_disposition = 0x0,
diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0, min_se = 0x0,
sipifmatch = 0x0,
subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai =
0x0, ppi = 0x0, path = 0x0, privacy = 0x0, body = 0x0, eoh = 0xb695a135 "\r\n",
unparsed = 0xb695a135 "\r\n", rcv = {
src_ip = {af = 0, len = 0, u = {addrl = {0, 0, 0, 0}, addr32 = {0, 0, 0, 0},
addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}},
dst_ip = {af = 0, len = 0, u = {addrl = {0, 0, 0,
0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr =
'\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 =
0, proto_reserved2 = 0, src_su = {s = {
sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin =
{sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0,
sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}},
bind_address = 0x0, proto = 0 '\000'},
buf = 0xb6959fe8 "HTTP/1.1 101 Switching Protocols\r\nSia: SIP/2.0/TLS
x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin:
https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade:
websocket\r\nConne"..., len = 335, new_uri = {s = 0x0, len = 0}, dst_uri = {s = 0x0,
len = 0}, parsed_uri_ok = 0, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0,
len = 0}, host = {s = 0x0,
len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params
= {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type =
ERROR_URI_T, flags = 0,
transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s =
0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len
= 0}, r2 = {s = 0x0, len = 0},
gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s =
0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
method_val = {s = 0x0, len = 0},
lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0,
len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd
= {s = 0x0, len = 0}, host = {
s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0},
sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0,
type = ERROR_URI_T, flags = 0,
transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s =
0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len
= 0}, r2 = {s = 0x0, len = 0},
gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s =
0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
method_val = {s = 0x0, len = 0},
lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0,
len = 0}}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s =
'\000' <repeats 57 times>,
add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 0,
set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0},
force_send_socket = 0x0, path_vec = {s = 0x0, len = 0},
instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0},
location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 0, len
= 0, u = {addrl = {0, 0, 0, 0},
addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr =
'\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0,
0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0,
0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}},
src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s =
{sa_family = 0,
sa_data = '\000' <repeats 13 times>}, sin = {sin_family
= 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000'
<repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0,
0}}}, sin6_scope_id = 0}},
bind_address = 0x0, proto = 0 '\000'}}}}
obuf = 0xbfab333c
direction = 0
dlg = 0x0
nval = {s = 0x0, len = 0}
tbuf = '\000' <repeats 19103 times>,
"\027\003\003\002\070\000\000\000\000\000\000\000\001\213I\377\277\315\036\037\313\216\060OW\016\373\034\366\226\332\322\212}5\244a\311\277s\\\340\212B^\022\372\v\372\342L0d\257e6\341\236\343d\000\220\v\354\364\205\023G\245\333dN1\336\261r3\346\203\312,x\226>\310\263h\241\257\264\203<\301\244@R\326\370\063[^J
\357\232\203\177\\\376\273\001{\311\004
\261\306G\371\bUe\027\065)\001\221)\364\316\037\r\326N\213\266d\252\214d\032\265\273\303\344\325\203\363\300\362\365\351_\221\273:r\223\251\277+\v\212~\234\301\345&\a\300F\207\236\274\035\366\f\001\217\033k\375%1b\237\001.\030\221\211X\244a<\252\276\223}\202\000\033\237\177\v\276>K5;\036\370&\330@\031\355\240-\376\026<s\211\246\235k\001\260`\211\333\270:mg\311\341`\037\065\313\244\"s\233\365?\233\331\035\242\262\217\061\240\004\370\001u\215\003\306\331>\255\025\324V\f\236\240\256\251o\343j\262\217\263qJ\367\333\314\004\263\023B\311W\240\034U|I\v\366\060\211\244$\277\177
\213\377\376\064#z\222y'5\236\365\355}\273\005\336/\254m\022\034\312\272\025\035\307d\223\361\214\004l\tq\f4\313\346\302:I\210\351\300W\024#\033}\022\343\322\362\214\226\n1\254\321\362\210Z%\352"...
tbuf_len = 0
via = 0xa50c6b8c
hfk = 0x0
cenv = 0x8430bc4
__FUNCTION__ = "dlg_cseq_msg_sent"
#3 0x080c5ca9 in sr_event_exec (type=2, data=0xbfab333c) at events.c:231
ret = 0
i = 2
#4 0xb5e520cc in msg_send_buffer (dst=0xbfab3964,
buf=0xb6959fe8 "HTTP/1.1 101 Switching Protocols\r\nSia: SIP/2.0/TLS
x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin:
https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade:
websocket\r\nConne"..., len=335, flags=0) at ../../forward.h:138
new_dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
"\000\000\000\000\000\000\f\000\000\000\000\000\000"}, sin = {sin_family = 0,
sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "\f\000\000\000\000\000\000"}, sin6 = {sin6_family = 0,
sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"\f\000\000\000\000\000\000\000\210\063\253\277K]\f\b",
__u6_addr16 = {12, 0, 0, 0, 13192, 49067, 23883, 2060}, __u6_addr32 =
{12, 0, 3215668104, 135028043}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000',
send_flags = {f = 0 '\000',
blst_imask = 0 '\000'}}
outb = {
s = 0xb6959fe8 "HTTP/1.1 101 Switching Protocols\r\nSia: SIP/2.0/TLS
x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin:
https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade:
websocket\r\nConne"..., len = 335}
netinfo = {data = {s = 0xb5e58f55 "\213E\344\213@\f\211E\344\203}\344",
len = -1079299188}, dst = 0x2, rcv = 0xb5e5f19c}
port = -1079297644
ip = {af = 168079844, len = 3215668056, u = {addrl = {3051745692, 2769070720,
2769054604, 3215668168}, addr32 = {3051745692, 2769070720, 2769054604, 3215668168}, addr16
= {61852, 46565, 43648, 42252,
27532, 42252, 13256, 49067}, addr =
"\234\361\345\265\200\252\f\245\214k\f\245\310\063\253\277"}}
from = 0x0
local_addr = {s = {sa_family = 0, sa_data = '\000' <repeats 13
times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u =
{__u6_addr8 = '\000' <repeats 12 times>, "xq\253\277", __u6_addr16
= {0, 0, 0, 0, 0, 0, 29048, 49067}, __u6_addr32 = {0, 0,
0, 3215683960}}}, sin6_scope_id = 3078193140}}
con = 0x0
wsev = {type = 0, buf = 0x0, len = 0, id = 0}
ret = 0
__FUNCTION__ = "msg_send_buffer"
#5 0xb5e55fb7 in sl_reply_helper (msg=0xbfab7178, code=101, reason=0xb695c598
"Switching Protocols", tag=0x0) at sl_funcs.c:202
buf = {
s = 0xb6959fe8 "HTTP/1.1 101 Switching Protocols\r\nSia: SIP/2.0/TLS
x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin:
https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade:
websocket\r\nConne"..., len = 335}
dset = {s = 0x0, len = 0}
dst = {send_sock = 0xb6653088, to = {s = {sa_family = 2, sa_data =
"z\206\262\313\353\225\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
sin_port = 34426, sin_addr = {s_addr = 2515258290},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family =
2, sin6_port = 34426, sin6_flowinfo = 2515258290, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>, __u6_addr16 = {
0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id =
0}}, id = 1, proto = 3 '\003', send_flags = {f = 1 '\001', blst_imask = 0
'\000'}}
dummy_bm = {to_tag_val = {s = 0x82646aa
"\213\025\214XA\b\213R\b9\320\017\214\300\002", len = 138042733}}
backup_mhomed = 0
ret = -1525898716
text = {s = 0xb695c598 "Switching Protocols", len = 19}
backup_rt = 136692883
ctx = {rec_lev = 224423841, run_flags = 518, last_retcode = 32, jmp_env =
{{__jmpbuf = {7, 0, -1525896576, 8, -1079297640, 136726975}, __mask_was_saved = 5,
__saved_mask = {__val = {0, 20, 138035965,
138037119, 161, 138035960, 6846744, 7557840, 7558196, 4, 121,
2769068580, 2769070720, 3215669560, 135028043, 0, 2769054604, 3215669560, 136719511,
3059949576, 3063269120, 118, 0, 3063269120,
272, 3215669768, 136726975, 5, 0, 200, 137638064, 137638524}}}}}
pmsg = {id = 2769057578, pid = 2, tval = {tv_sec = -1079298356, tv_usec = 2},
fwd_send_flags = {f = 2 '\002', blst_imask = 0 '\000'}, rpl_send_flags =
{f = 0 '\000', blst_imask = 0 '\000'},
first_line = {type = -14952, flags = -18795, len = -1227359856, u = {request =
{method = {s = 0xbfab72e0 "PV\226\266H\002", len = -1079298280}, uri = {s =
0x818b3a5 "\213E\344\351\211\002",
len = -1079298364}, version = {s = 0x50 <Address 0x50 out of
bounds>, len = -1079298372}, method_value = -1231752376}, reply = {version = {s =
0xbfab72e0 "PV\226\266H\002",
len = -1079298280}, status = {s = 0x818b3a5
"\213E\344\351\211\002", len = -1079298364}, reason = {s = 0x50 <Address 0x50
out of bounds>, len = -1079298372}, statuscode = 3063214920}}},
via1 = 0x0, via2 = 0xbfab36c4, headers = 0xbfab35a8, last_header = 0x8188cb5,
parsed_flag = 13163490031275437096, h_via1 = 0xbfab3518, h_via2 = 0xd606fa1, callid = 0x0,
to = 0x0, cseq = 0x0,
from = 0x0, contact = 0x0, maxforwards = 0xb691c4b0, route = 0x0, record_route =
0x0, content_type = 0xbfab3d20, content_length = 0x1c0, authorization = 0xbfab35f8,
expires = 0x82649bf,
proxy_auth = 0x5, supported = 0x0, require = 0x0, proxy_require = 0x0,
unsupported = 0x0, allow = 0x0, event = 0xbfab3bac, accept = 0xffffffe4, accept_language =
0x0, organization = 0x1,
priority = 0x5, subject = 0x8188c14, user_agent = 0x1c, server = 0xffffffff,
content_disposition = 0x0, diversion = 0x73, rpid = 0x0, refer_to = 0x0, session_expires =
0xbfab3598, min_se = 0x8188bff,
sipifmatch = 0xb6ae0ff0, subscription_state = 0x0, date = 0x2, identity =
0xbfab39a0, identity_info = 0x18, pai = 0xa50c7729, ppi = 0x0, path = 0xb7677d44, privacy
= 0x0, body = 0xa50c7708,
eoh = 0x0, unparsed = 0xbfab3ba8 "\200\252\f\245\002", rcv = {src_ip =
{af = 93, len = 2769057544, u = {addrl = {3215670764, 224423841, 0, 3215689468}, addr32 =
{3215670764, 224423841, 0,
3215689468}, addr16 = {15852, 49067, 28577, 3424, 0, 0, 34556, 49067},
addr = "\354=\253\277\241o`\r\000\000\000\000\374\206\253\277"}}, dst_ip = {af =
3215671656, len = 135931595, u = {
addrl = {3063006384, 0, 3215670604, 3215670600}, addr32 = {3063006384, 0,
3215670604, 3215670600}, addr16 = {50352, 46737, 0, 0, 15692, 49067, 15688, 49067},
addr = "\260\304\221\266\000\000\000\000L=\253\277H=\253\277"}},
src_port = 15684, dst_port = 49067, proto_reserved1 = 262144, proto_reserved2 =
-1079298552, src_su = {s = {sa_family = 35860,
sa_data = "\030\bD\f\256\266\300\001\000\000\310\066\253\277"},
sin = {sin_family = 35860, sin_port = 2072, sin_addr = {s_addr = 3064859716}, sin_zero =
"\300\001\000\000\310\066\253\277"},
sin6 = {sin6_family = 35860, sin6_port = 2072, sin6_flowinfo = 3064859716,
sin6_addr = {__in6_u = {__u6_addr8 =
"\300\001\000\000\310\066\253\277\277I&\b\002\000\000", __u6_addr16 = {448,
0,
14024, 49067, 18879, 2086, 2, 0}, __u6_addr32 = {448, 3215668936,
136726975, 2}}}, sin6_scope_id = 0}}, bind_address = 0xbfab3628, proto = -1
'\377'}, buf = 0xb6ae0ff0 "\033", len = 0,
new_uri = {s = 0xbfab3648
"\330g\221\266(l\221\266\330g\221\266\020\322\254\266\330\066\253\277\241o`\r",
len = 135028043}, dst_uri = {s = 0x0, len = 1}, parsed_uri_ok = -1079298488, parsed_uri =
{
user = {s = 0x8188c14 "\205\300t\a\270\001", len = 32}, passwd = {s
= 0x0, len = -1231979188}, host = {s = 0x1 <Address 0x1 out of bounds>, len = 1},
port = {s = 0x0, len = -1231984680}, params = {
s = 0xb6916c28 "\001", len = -1231984680}, sip_params = {s =
0xb6acd210 "\020", len = -1079298344}, headers = {s = 0xd606fa1 <Address
0xd606fa1 out of bounds>, len = 0}, port_no = 34556,
proto = 49067, type = 3215671816, flags = 135931595, transport = {s =
0xb6916c28 "\001", len = 1}, ttl = {s = 0xbfab3dec "\277I&\b\260",
len = -1079296536}, user_param = {s = 0xbfab3de4 "\314\001",
len = 0}, maddr = {s = 0x0, len = -1241607909}, method = {s = 0x1
<Address 0x1 out of bounds>, len = 0}, lr = {s = 0xbfab36c8 "", len = 2},
r2 = {s = 0xb6632008 "\001", len = 226}, gr = {
s = 0xb6acd210 "\020", len = -1230188016}, transport_val = {s =
0xb6ae0698 "\002", len = -1230109024}, ttl_val = {s = 0x0, len = -1231661426},
user_param_val = {
s = 0xf <Address 0xf out of bounds>, len = 0}, maddr_val = {s = 0x0,
len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = -1241607909}, r2_val =
{
s = 0xe0 <Address 0xe0 out of bounds>, len = 262144}, gr_val = {s =
0xae <Address 0xae out of bounds>, len = -1}}, parsed_orig_ruri_ok = 0,
parsed_orig_ruri = {user = {
s = 0xf0 <Address 0xf0 out of bounds>, len = -1079298104}, passwd = {s
= 0xb695c598 "Switching Protocols", len = 5}, host = {s = 0x0, len = 456}, port
= {s = 0x1b4 <Address 0x1b4 out of bounds>,
len = -1227359856}, params = {s = 0xbfab72e0 "PV\226\266H\002",
len = -1079298136}, sip_params = {
s = 0x818d27a
"\213E\340\353\"\220\353\004\220\353\001\220\213E\320\211\004$\350\263\242\377\377\213E\344\211\004$\350\250\242\377\377\270",
len = -1231698536}, headers = {s = 0xb694b754 "sip:",
len = 4}, port_no = 62280, proto = 46740, type = ERROR_URI_T, flags = 0,
transport = {s = 0x0, len = 224423841}, ttl = {s = 0x0, len = -1079277828}, user_param =
{
s = 0xbfab3828 "\270\321\376\265\255\216&\bt8\253\277", len =
136730906}, maddr = {s = 0xb6632008 "\001", len = -1231979088}, method = {s =
0x0, len = 0}, lr = {
s = 0xd606fa1 <Address 0xd606fa1 out of bounds>, len = 0}, r2 = {
s = 0xbfab3798
"h8\253\277\260\327\027\245\220\371\327\266\340r\253\277\350<\253\277/:\031\bH\363\224\266xq\253\277\234\357\224\266",
len = 135028043}, gr = {s = 0x0, len = 20}, transport_val = {
s = 0xb694ef9c "\002", len = 37147}, ttl_val = {s = 0xb695c5a0
"g Protocols", len = -1231753308}, user_param_val = {s = 0xb695c598
"Switching Protocols", len = -1231698536}, maddr_val = {s = 0x0,
len = 428}, method_val = {s = 0xbfab3868
"89\253\277\277I&\b\005", len = -1525164112}, lr_val = {s = 0xb6d7f990
"(J\005\n \002", len = -1079282976}, r2_val = {
s = 0xbfab3ce8 "\310F\253\277[k\006\b\b
c\266T\305\225\266\204p3\b\334\215\063\bY\004", len = 135871023}, gr_val = {s =
0xb694f348 "\a", len = -1079283336}}, add_rm = 0xb694ef9c,
body_lumps = 0x0, reply_lump = 0xb694f348,
add_to_branch_s =
"\273\003u\267X\305\225\266\205\266+\b\370;\253\277\000\000\000\000\304\000\000\000=\221\067\b\340\000\000\000\000\027\067\b\310\070\253\277\032Y&\b\b
c\266`d\220\266\324}\221\266\033\221", add_to_branch_len = -1231979088, hash_index =
3077903151, msg_flags = 224423841, flags = 3059949576, set_global_address = {s =
0xb6917f8a "7\b\350\004", len = -1231959972}, set_global_port = {
s = 0xe <Address 0xe out of bounds>, len = 224423841}, force_send_socket
= 0x0, path_vec = {s = 0xb7750215 "\201\303\213\265\002", len = -1241591368},
instance = {
s = 0x8268ead
"\213E\364\213P\004\213E\f\211\020\213E\f\307@\024\004", len = -1079297932},
reg_id = 0, ruid = {s = 0x1c <Address 0x1c out of bounds>, len = 136049093},
location_ua = {
s = 0xbfab38dc "\375B:\b\177G:\b\241", len = 0}, ldv = {flow =
{decoded = 16, rcv = {src_ip = {af = 3059949576, len = 3064788156, u = {addrl = {262144,
3215669400, 3053359487, 3059949576},
addr32 = {262144, 3215669400, 3053359487, 3059949576}, addr16 = {0, 4,
14488, 49067, 37247, 46590, 8200, 46691}, addr =
"\000\000\004\000\230\070\253\277\177\221\376\265\b c\266"}},
dst_ip = {af = 3215669364, len = 3215669560, u = {addrl = {136726975, 5,
16777216, 9219348}, addr32 = {136726975, 5, 16777216, 9219348}, addr16 = {18879, 2086, 5,
0, 0, 256, 44308, 140},
addr =
"\277I&\b\005\000\000\000\000\000\000\001\024\255\214"}}, src_port = 31028,
dst_port = 104, proto_reserved1 = 7557868, proto_reserved2 = 7558196, src_su = {s =
{sa_family = 4,
sa_data =
"\000\000x\000\000\000\234\361\345\265\200\252\f\245"}, sin = {sin_family = 4,
sin_port = 0, sin_addr = {s_addr = 120}, sin_zero =
"\234\361\345\265\200\252\f\245"}, sin6 = {
sin6_family = 4, sin6_port = 0, sin6_flowinfo = 120, sin6_addr =
{__in6_u = {__u6_addr8 = "\234\361\345\265\200\252\f\245\310\070\253\277K]\f\b",
__u6_addr16 = {61852, 46565, 43648, 42252,
14536, 49067, 23883, 2060}, __u6_addr32 = {3051745692,
2769070720, 3215669448, 135028043}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 28
'\034'}}}}
__FUNCTION__ = "sl_reply_helper"
#6 0xb5e56dcc in sl_send_reply (msg=0xbfab7178, code=101, reason=0xb695c598
"Switching Protocols") at sl_funcs.c:303
No locals.
#7 0xb5e4dde5 in send_reply (msg=0xbfab7178, code=101, reason=0xa50ca4ac) at sl.c:281
r = 0xb695c598 "Switching Protocols"
t = 0xffffffff
ret = 1
__FUNCTION__ = "send_reply"
#8 0xa50b953f in ws_send_reply (msg=0xbfab7178, code=101, reason=0xa50ca4ac,
hdrs=0xbfab4068) at ws_handshake.c:109
__FUNCTION__ = "ws_send_reply"
#9 0xa50be321 in ws_handle_handshake (msg=0xbfab7178) at ws_handshake.c:424
key = {s = 0xb6965819 "GVs/6jVe4SSceoeJGmIG0g==\r\nSec-WebSocket-Extensions:
permessage-deflate; client_max_window_bits\r\nSec-WebSocket-Protocol: sip\r\n\r\n",
len = 24}
headers = {
s = 0xa50ca880 "Access-Control-Allow-Origin:
https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade:
websocket\r\nConnection: upgrade\r\nSec-WebSocket-Accept:
y3st9Xv712JK2HJY6KDEx2nRd0w=\r\n", len = 182}
reply_key = {s = 0xa50caa80 "y3st9Xv712JK2HJY6KDEx2nRd0w=[", len = 28}
origin = {
s = 0xb69656fb "https://web.service.dummy.ok\r\nSec-WebSocket-Version:
13\r\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_0) AppleWebKit/537.36
(KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36\r\nDNT: 1\r"..., len = 29}
sha1 = "\313{-\365{\373\327bJ\330rX\350\240\304\307i\321wL"
hdr_flags = 123
sub_protocol = 1
version = 13
hdr = 0x0
con = 0xa5aedc90
wsc = 0xb691c4b0
__FUNCTION__ = "ws_handle_handshake"
#10 0x080655ce in do_action (h=0xbfab4be0, a=0xb6950d68, msg=0xbfab7178) at action.c:1054
ret = -5
v = 5
dst = {send_sock = 0xb692b968, to = {s = {sa_family = 37147, sa_data =
"\376\265\200\000\000\000\000\200\000\000\216\000\000"}, sin = {sin_family =
37147, sin_port = 46590, sin_addr = {s_addr = 128},
sin_zero = "\000\200\000\000\216\000\000"}, sin6 = {sin6_family =
37147, sin6_port = 46590, sin6_flowinfo = 128, sin6_addr = {__in6_u = {
__u6_addr8 =
"\000\200\000\000\216\000\000\000\377\377\377\377\000\000\000", __u6_addr16 =
{32768, 0, 142, 0, 65535, 65535, 0, 0}, __u6_addr32 = {32768, 142, 4294967295, 0}}},
sin6_scope_id = 124}}, id = -1079293400, proto = -65 '\277',
send_flags = {f = 73 'I', blst_imask = 38 '&'}}
tmp = 0xb5fe911b "\201\303\235@"
new_uri = 0x0
end = 0x837178c "core: rvalue.c"
crt = 0xb68ce36c " "
cmd = 0xb66643f8
len = 161
user = 0
uri = {user = {s = 0x80000 <Address 0x80000 out of bounds>, len = 176},
passwd = {s = 0xffffffff <Address 0xffffffff out of bounds>, len = 0}, host = {s =
0xf4 <Address 0xf4 out of bounds>, len = 1},
port = {s = 0x0, len = 32}, params = {s = 0x0, len = -1079293560}, sip_params =
{
s = 0x81897cc
"\205\300\017\237\300\017\266\320\213E\020\211\020\213E\b\213@\004\211\302\203\342\371\213E\b\211P\004\351\341\004",
len = -1079283504}, headers = {s = 0xb694e8e4 "]\017",
len = -1079283336}, port_no = 65535, proto = 65535, type = 3062691928, flags =
116, transport = {s = 0x0, len = -1241664416}, ttl = {s = 0xb6d7f990 "(J\005\n
\002", len = -1079282976},
user_param = {
s = 0xbfab48f8
"\030I\253\277\240\b\375\265\274\033\226\266$J\253\277\350I\253\277
\356\275\265\220\371\327\266\340r\253\277\210J\253\277\256\301\266\265xq\253\277\b\344\224\266\070J\253\277\064J\253\277",
len = -1241708491}, maddr = {
s = 0xb6965688 "Host: test.dummy.ok:8443\r\nConnection:
upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozilla/5.0
(Ma"..., len = -1231756347}, method = {s = 0x4 <Address 0x4 out of bounds>, len
= -1079291832}, lr = {s = 0xbfab5044 "", len = -1231898264}, r2 = {
s = 0x4 <Address 0x4 out of bounds>, len = 0}, gr = {s = 0x0, len =
-1241664416}, transport_val = {s = 0xbfab4918
"\210J\253\277\256\301\266\265xq\253\277\b\344\224\266\070J\253\277\064J\253\277",
len = -1241708384}, ttl_val = {s = 0xb6961bbc "\210V\226\266\004",
len = -1079293404}, user_param_val = {s = 0xbfab49e8 "\241", len = -1245843936},
maddr_val = {s = 0xb6d7f990 "(J\005\n \002",
len = -1079282976}, method_val = {s = 0xbfab4a88
"\370J\253\277\205\343\023\bxq\253\277\b\344\224\266\064K\253\277K]\f\b", len =
-1246314066}, lr_val = {s = 0xbfab7178 "\001", len = -1231756280},
r2_val = {s = 0xbfab4a38 "", len = -1079293388}, gr_val = {s = 0x0,
len = 176}}
next_hop = {user = {s = 0x2 <Address 0x2 out of bounds>, len = 0}, passwd =
{s = 0xbfab47e8 "\001", len = -1525164112}, host = {s = 0xb6d7f990
"(J\005\n \002", len = -1079282976}, port = {
s = 0xbfab4898
"\210I\253\277\314\227\030\b\320p\253\277\344\350\224\266xq\253\277\377\377\377\377X\370\214\266t",
len = 134681845}, params = {s = 0xbfab47e0 "", len = -1231755036}, sip_params =
{
s = 0xbfab7178 "\001", len = -1}, headers = {s = 0x0, len = 0},
port_no = 1, proto = 0, type = 2769803184, flags = 3067607440, transport = {s = 0xbfab72e0
"PV\226\266H\002", len = -1079294008},
ttl = {s = 0x9629dd1a <Address 0x9629dd1a out of bounds>, len =
-827108235}, user_param = {s = 0x0, len = -1079293752}, maddr = {s = 0x818919c
"\205\300\017\204S\005", len = -1079293788}, method = {
s = 0xb68cfc04 "\001", len = -1079291828}, lr = {s = 0xbfab5048
"\354\253\214", len = -1079291836}, r2 = {s = 0xbfab86fc
"\201T\232\236", len = -1079290936}, gr = {
s = 0x81a44f4 "\205\300\017\204^\036", len = -1231869952},
transport_val = {s = 0x2 <Address 0x2 out of bounds>, len = -1079291988}, ttl_val =
{s = 0xbfab4fa8 "xP\253\277\033\221\376\265\005",
len = -1079291996}, user_param_val = {s = 0xb6906460 "\020", len =
-1079293752}, maddr_val = {s = 0xb5fe911b "\201\303\235@", len = 224423841},
method_val = {s = 0x0, len = -1079293816}, lr_val = {
s = 0x80c5d4b "\211E\364\213E\364\351\373\001", len = 0}, r2_val =
{s = 0x8371700 "core", len = -1231326200}, gr_val = {s = 0xb5fe911b
"\201\303\235@", len = -1232235660}}
u = 0x80c5d4b
port = 49067
dst_host = 0x83b0000
i = -1231756280
flags = 0
avp = 0xbfab7178
st = {flags = 3215675148, id = 20232, name = {n = 0, s = {s = 0x0, len = 262144},
re = 0x0}, avp = 0x1}
sct = 0xbfab4d58
sjt = 0xbfab7178
rve = 0xbfab4af8
mct = 0xbfab70d0
rv = 0x2
rv1 = 0x813e385
c1 = {cache_type = 3215689468, val_type = 3215673384, c = {avp_val = {n =
135827584, s = {s = 0x8189080 "\205\300\017\204l\006", len = -1079293948}, re =
0x8189080}, pval = {rs = {
s = 0x8189080 "\205\300\017\204l\006", len = -1079293948}, ri =
-1231868804, flags = -1079291988}}, i2s =
"\250O\253\277\244O\253\277\374\206\253\277(S\253\277\024\070\032\b\033"}
s = {s = 0xd606fa1 <Address 0xd606fa1 out of bounds>, len = 0}
srevp = {0xbfab86fc, 0xbfab52f8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1,
string = 0x1 <Address 0x1 out of bounds>, str = {s = 0x1 <Address
0x1 out of bounds>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type =
RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 19}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}}
__FUNCTION__ = "do_action"
#11 0x08070ea0 in run_actions (h=0xbfab4be0, a=0xb6950d68, msg=0xbfab7178) at
action.c:1549
t = 0xb6950d68
ret = -1
mod = 0x1000000
ms = 0
__FUNCTION__ = "run_actions"
#12 0x080714f5 in run_actions_safe (h=0xbfab70d0, a=0xb6950d68, msg=0xbfab7178) at
action.c:1614
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf =
{-1525164112, -1227359856, -1079282976, -1079292984, -1775117030, -827108235},
__mask_was_saved = 0, __saved_mask = {__val = {
3215674584, 136726975, 5, 0, 32, 138085432, 138095523, 318, 138084352,
0, 3063092684, 3063090588, 3215676716, 2, 0, 3215689468, 3215674488, 135871193,
3063203816, 3063203824, 0, 135826431,
3062687824, 3215689468, 3063203816, 3063306390, 0, 3215689468,
3215676520, 135919377, 3062916228, 0}}}}}
ret = -1231763484
ign_on_break = 0
#13 0x081897cc in rval_get_int (h=0xbfab70d0, msg=0xbfab7178, i=0xbfab5800, rv=0xb6951848,
cache=0x0) at rvalue.c:912
r_avp = 0x2
avp_val = {n = 476, s = {s = 0x1dc <Address 0x1dc out of bounds>, len = 2},
re = 0x1dc}
pval = {rs = {s = 0xbfab4e08 "\002", len = 136726975}, ri = 5, flags =
0}
tmp = {s = 0x0, len = 428}
s = 0x0
r = 0
ret = 0
destroy_pval = 0
__FUNCTION__ = "rval_get_int"
#14 0x0818d6b6 in rval_expr_eval_int (h=0xbfab70d0, msg=0xbfab7178, res=0xbfab5800,
rve=0xb6951844) at rvalue.c:1910
i1 = 0
i2 = 0
ret = -1
c1 = {cache_type = RV_CACHE_SELECT, val_type = 10, c = {avp_val = {n = 0, s = {s =
0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = -1241664416, flags =
-1079292072}},
i2s = "\240\b\375\265\000\034\226\266dP\253\277\030P\253\277
\356\275\265\220\371"}
c2 = {cache_type = 110, val_type = RV_NONE, c = {avp_val = {n = -1241664416, s =
{s = 0xb5fdb460 "4\303", len = -1227359856}, re = 0xb5fdb460}, pval = {rs = {s =
0xb5fdb460 "4\303", len = -1227359856},
ri = -1079282976, flags = -1079292104}}, i2s =
"5\b\375\265\237V\226\266a\303\224\266\n\000\000\000K]\f\b\226X"}
rv1 = 0xb699c7ac
rv2 = 0xffffffff
__FUNCTION__ = "rval_expr_eval_int"
#15 0x080650b2 in do_action (h=0xbfab70d0, a=0xb6952088, msg=0xbfab7178) at action.c:1030
ret = -5
v = 0
dst = {send_sock = 0xb5f5895f, to = {s = {sa_family = 0, sa_data =
"\000\000\000\000\000\000\374\206\253\277\030X\253\277"}, sin = {sin_family = 0,
sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "\374\206\253\277\030X\253\277"}, sin6 = {sin6_family =
0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
__u6_addr8 =
"\374\206\253\277\030X\253\277\331:\031\b\004\261\231\266", __u6_addr16 =
{34556, 49067, 22552, 49067, 15065, 2073, 45316, 46745}, __u6_addr32 = {3215689468,
3215677464,
135871193, 3063525636}}}, sin6_scope_id = 3063525644}}, id = 0, proto
= -1 '\377', send_flags = {f = 139 '\213', blst_imask = 24
'\030'}}
tmp = 0x0
new_uri = 0x952 <Address 0x952 out of bounds>
end = 0x81a69ee "\270"
crt = 0x0
cmd = 0xd
len = 0
user = 0
uri = {user = {s = 0x0, len = -1079288484}, passwd = {s = 0x0, len = 0}, host = {s
= 0x0, len = 3}, port = {s = 0x2 <Address 0x2 out of bounds>, len = -1}, params = {
s = 0xffffffff <Address 0xffffffff out of bounds>, len = -1079289992},
sip_params = {s = 0x8188263
"\211\004$\350US\355\377\203\304\034[^_]\303U\211\345\203\354\070\213E\b\005\272\001",
len = -1235017728}, headers = {s = 0x1bc <Address 0x1bc out of bounds>,
len = 137828236}, port_no = 37181, proto = 2103, type = 224, flags = 137828096, transport
= {s = 0x0, len = -1079288976},
ttl = {s = 0x0, len = -1241729631}, user_param = {s = 0x0, len = -1217954492},
maddr = {s = 0x0, len = -1241729638}, method = {s = 0xb76a2433
"\201\303\301[\017", len = -1079288488}, lr = {
s = 0xe <Address 0xe out of bounds>, len = -1241729638}, r2 = {s = 0x1
<Address 0x1 out of bounds>, len = 13}, gr = {s = 0xbfab5e24
"T\346o\267a", len = 13}, transport_val = {
s = 0xb7797ff4 "|=\026", len = -1079288432}, ttl_val = {s =
0xb5f5895f "", len = -1079288472}, user_param_val = {
s = 0xb767525f
"\213\225t\372\377\377\071\302\017\205\362\361\377\377\270\377\377\377\177+\205x\373\377\377\071\302\017\207\337\361\377\377\001\225x\373\377\377\200?",
len = -1079288432},
maddr_val = {s = 0xb5f5895f "", len = 0}, method_val = {s = 0x0, len =
135821446}, lr_val = {s = 0xb6632008 "\001", len = 0}, r2_val = {s = 0x0, len =
-1231759392}, gr_val = {s = 0xb694d390 "\a",
len = 137828096}}
next_hop = {user = {s = 0xbfab580c "", len = 0}, passwd = {s =
0xb695c598 "Switching Protocols", len = -1525164112}, host = {s = 0xb6d7f990
"(J\005\n \002", len = -1079282976}, port = {
s = 0xbfab5868
"hZ\253\277P\334\030\b\320p\253\277xq\253\277\064Z\253\277\210\333\224\266", len
= 135850740}, params = {s = 0xb694d7e0 "\002", len = -1079283336}, sip_params =
{
s = 0xbfab5a34 "\001", len = 32}, headers = {s = 0xb694d390
"\a", len = 0}, port_no = 55264, proto = 46740, type = ERROR_URI_T, flags = 0,
transport = {s = 0x128 <Address 0x128 out of bounds>,
len = -1079290008}, ttl = {s = 0x82649bf
"\213E\340\203\300$\201\304\274", len = 184}, user_param = {s = 0x0, len = 0},
maddr = {s = 0x2 <Address 0x2 out of bounds>, len = 0}, method = {
s = 0xbfab86fc "\201T\232\236", len = -1079289960}, lr = {s =
0x826591a "\353\a\220\353\004\220\353\001\220\201\304\314", len = -1235017720},
r2 = {s = 0xb6994f3c "\020", len = -1079290104}, gr = {
s = 0x81882be "\211E\360\203}\360", len = -1231677704},
transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s =
0x8371700 "core", len = 0}, maddr_val = {s = 0x0,
len = 32}, method_val = {s = 0xbfab86fc "\201T\232\236", len =
-1079289992}, lr_val = {
s = 0x8187886
"\203\304l[^_]\303U\211\345\203\354\030\213E\b\213@\004\215P\377\213E\b\211P\004\213E\b\213@\004\205\300u\v\213E\b\211\004$\350\360\365\377\377\311\303U\211\345WVS\201\354\374",
len = -1235017720}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
u = 0x1
port = 49067
dst_host = 0xb699d424
i = -1231671128
flags = 0
avp = 0xb6966620
st = {flags = 3063268760, id = 55264, name = {n = 0, s = {s = 0x0, len = 0}, re =
0x0}, avp = 0x0}
sct = 0x1
sjt = 0x1
rve = 0xb6951844
mct = 0x0
rv = 0xbfab5a34
rv1 = 0x0
c1 = {cache_type = RV_CACHE_EMPTY, val_type = 3063207912, c = {avp_val = {n =
-1231698528, s = {s = 0xb695c5a0 "g Protocols", len = 0}, re = 0xb695c5a0}, pval
= {rs = {s = 0xb695c5a0 "g Protocols",
len = 0}, ri = -1217068523, flags = -1525164112}}, i2s =
"\260\327\027\245\220\371\327\266\340r\253\277hV\253\277^\323\030\b\340\327"}
s = {s = 0xb5fe911b "\201\303\235@", len = 213}
srevp = {0x19c, 0xbfab56c8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1,
string = 0x1 <Address 0x1 out of bounds>, str = {s = 0x1 <Address
0x1 out of bounds>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type =
RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 19}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}}
__FUNCTION__ = "do_action"
#16 0x08070ea0 in run_actions (h=0xbfab70d0, a=0xb6950c28, msg=0xbfab7178) at
action.c:1549
t = 0xb6952088
ret = 1
mod = 0xb6920320
ms = 0
__FUNCTION__ = "run_actions"
#17 0x08065552 in do_action (h=0xbfab70d0, a=0xb6952124, msg=0xbfab7178) at action.c:1045
ret = 1
v = 1
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000'
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u =
{__u6_addr8 = "\000\000\000\000\000\000\000\000\\c\253\277\005\000\000",
__u6_addr16 = {0, 0, 0, 0, 25436, 49067, 5, 0},
__u6_addr32 = {0, 0, 3215680348, 5}}}, sin6_scope_id = 7}}, id = 0,
proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0
'\000'}}
tmp = 0xb578cee7 "\211n\370)~\374\306\004."
new_uri = 0x128 <Address 0x128 out of bounds>
end = 0xb7773d4c "malloc.c"
crt = 0xb5792ff4 "\360\256"
cmd = 0xb665c1e4
len = -1217064161
user = -1250349068
uri = {user = {s = 0xbfe2bb61 <Address 0xbfe2bb61 out of bounds>, len =
1084160162}, passwd = {s = 0x153911c2 <Address 0x153911c2 out of bounds>, len =
1892152629}, host = {
s = 0x19945161 <Address 0x19945161 out of bounds>, len = 1918852815},
port = {s = 0xcb18b54e <Address 0xcb18b54e out of bounds>, len = -1526424657},
params = {s = 0xbfab6248 "", len = 0},
sip_params = {s = 0x1 <Address 0x1 out of bounds>, len = -1525164112},
headers = {s = 0xa04b0c0 "\350\267\004\n\032", len = -1231472044}, port_no =
25176, proto = 49067, type = 3077518168, flags = 0,
transport = {s = 0x0, len = 1}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0,
len = 0}, maddr = {s = 0xb6d7f990 "(J\005\n \002", len = -1079282976}, method =
{
s = 0xbfab6308
"Hc\253\277^\323\030\b\004{\223\266\300m\253\277\270\033\226\266\004{\223\266",
len = 135840547}, lr = {s = 0xb6961b94 " ", len = -1231676050}, r2 = {s = 0x0,
len = -1235017720},
gr = {s = 0x0, len = -1079287036}, transport_val = {s = 0xbfab62a8
"ph\253\277TV\226\266\001", len = -1525164112}, ttl_val = {s = 0xb6d7f990
"(J\005\n \002", len = -1079282976}, user_param_val = {
s = 0xbfab6308
"Hc\253\277^\323\030\b\004{\223\266\300m\253\277\270\033\226\266\004{\223\266",
len = 135821446}, maddr_val = {s = 0xb6632008 "\001", len = -1231676488},
method_val = {
s = 0x837178c "core: rvalue.c", len = 137859433}, lr_val = {s = 0x81
<Address 0x81 out of bounds>, len = 137828096}, r2_val = {s = 0xbfab6870
"", len = -1231661484}, gr_val = {
s = 0x1 <Address 0x1 out of bounds>, len = 0}}
next_hop = {user = {s = 0x0, len = 168079552}, passwd = {s = 0xbfab6178
"\250a\253\277K]\f\b", len = -1241607809}, host = {s = 0xb6632008
"\001", len = -1079287468}, port = {
s = 0xffffffff <Address 0xffffffff out of bounds>, len = -1079287272},
params = {s = 0xbfab6164 "\254Ps", len = 16777216}, sip_params = {s = 0x8caf54
<Address 0x8caf54 out of bounds>,
len = 6846808}, headers = {s = 0x7350ac <Address 0x7350ac out of
bounds>, len = 7557292}, port_no = 4, proto = 0, type = 118, flags = 2769803184,
transport = {s = 0xb6d7f990 "(J\005\n \002",
len = -1079287384}, ttl = {s = 0x80c5d4b
"\211E\364\213E\364\351\373\001", len = 0}, user_param = {s = 0x1 <Address
0x1 out of bounds>, len = 2}, maddr = {s = 0x1 <Address 0x1 out of bounds>,
len = 188}, method = {s = 0x0, len = 0}, lr = {s = 0xa517d7b0
"\200\326", len = -1227359856}, r2 = {s = 0xbfab72e0
"PV\226\266H\002", len = -1079287160}, gr = {
s = 0x826591a "\353\a\220\353\004\220\353\001\220\201\304\314", len
= -1235017720}, transport_val = {s = 0xb6961b94 " ", len = 168079552}, ttl_val =
{s = 0x0, len = -1}, user_param_val = {s = 0x0,
len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0},
lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x6af42c0
<Address 0x6af42c0 out of bounds>,
len = -1500340898}}
u = 0xb6b4aef8
port = 49067
dst_host = 0x20
i = 1893571582
flags = -1235017720
avp = 0xff565002
st = {flags = 28, id = 1, name = {n = 168077040, s = {s = 0xa04a6f0 "",
len = 0}, re = 0xa04a6f0}, avp = 0xb6993a54}
sct = 0xb6961bb8
sjt = 0xbfab6dc0
rve = 0xb694df34
mct = 0xb6937b04
rv = 0x0
rv1 = 0x0
c1 = {cache_type = 4436732, val_type = 3077202798, c = {avp_val = {n =
-1217954492, s = {s = 0xb7677d44 "\200\275\064\373\377\377", len = -1079287276},
re = 0xb7677d44}, pval = {rs = {
s = 0xb7677d44 "\200\275\064\373\377\377", len = -1079287276},
ri = -1241729638, flags = 8}}, i2s =
"\330f\253\277\000\000\000\000\025\002u\267\270\321\376\265\255\216&\bTa"}
s = {s = 0xbfab64f0 "", len = -1242200692}
srevp = {0x0, 0xbfab61a8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1,
string = 0x1 <Address 0x1 out of bounds>, str = {s = 0x1 <Address
0x1 out of bounds>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type =
RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 19}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}}
__FUNCTION__ = "do_action"
#18 0x08070ea0 in run_actions (h=0xbfab70d0, a=0xb694aee0, msg=0xbfab7178) at
action.c:1549
t = 0xb6952124
ret = 1
mod = 0x1
ms = 0
__FUNCTION__ = "run_actions"
#19 0x08065596 in do_action (h=0xbfab70d0, a=0xb69521c0, msg=0xbfab7178) at action.c:1049
ret = 1
v = 0
dst = {send_sock = 0xb77d07e5, to = {s = {sa_family = 29104, sa_data =
"\253\277\030\000\000\000\030BD\265\000\000\000"}, sin = {sin_family = 29104,
sin_port = 49067, sin_addr = {s_addr = 24},
sin_zero = "\030BD\265\000\000\000"}, sin6 = {sin6_family = 29104,
sin6_port = 49067, sin6_flowinfo = 24, sin6_addr = {__in6_u = {__u6_addr8 =
"\030BD\265\000\000\000\000D}g\267s\000\000",
__u6_addr16 = {16920, 46404, 0, 0, 32068, 46951, 115, 0}, __u6_addr32 =
{3041149464, 0, 3077012804, 115}}}, sin6_scope_id = 3041149457}}, id = -1218216444, proto
= -72 '\270', send_flags = {
f = 1 '\001', blst_imask = 126 '~'}}
tmp = 0xbfab72e0 "PV\226\266H\002"
new_uri = 0xb77e4910 ""
end = 0xbfab6ec4 "\377\377\377\377\364?~\267\304T\005\b\005"
crt = 0xb6d7f990 "(J\005\n \002"
cmd = 0x0
len = -1525164112
user = -1218199836
uri = {user = {s = 0xb696560c "", len = 138085432}, passwd = {s =
0x83b2ba3 "parse_headers", len = 334}, host = {s = 0x83b0000 "core",
len = 23}, port = {s = 0xb5792ff4 "\360\256", len = 0}, params = {
s = 0xbfab86fc "\201T\232\236", len = 33}, sip_params = {s =
0xb578c8d8 "\205\300u\f\213D$\034\203\304([\303\215v", len = -1231660904},
headers = {
s = 0xbfab6d28 "xn\253\277*F*\bWV\226\266=\201;\b\006", len =
137189177}, port_no = 22111, proto = 46742, type = 10, flags = 46, transport = {s = 0x0,
len = 1}, ttl = {
s = 0xb6d7f990 "(J\005\n \002", len = -1079282976}, user_param = {s
= 0xbfab6e78 "", len = 136988202}, maddr = {
s = 0xb6965657 "TTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost:
test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control:
no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok\r\nSec-W"quot;...,
len = 138117437}, method = {s = 0x6 <Address 0x6 out of bounds>, len = -1079284392},
lr = {s = 0xb57b3148 "\f \001", len = 0}, r2 = {s = 0xbfab71af "", len
= 10}, gr = {
s = 0x0, len = -1218199836}, transport_val = {s = 0xd696910 <Address
0xd696910 out of bounds>, len = -1079284332}, ttl_val = {
s = 0xb77d0166
"\213M\340\205\300u3\211\360\213]\364\213u\370\213}\374\211\354]\303\215t&",
len = -1218155984}, user_param_val = {s = 0x805b926 "GLIBC_2.0", len =
-1079277828}, maddr_val = {
s = 0x805524e "libc.so.6", len = -1216756928}, method_val = {s =
0xbfab0002 "\237\266", len = -1216520544}, lr_val = {s = 0x805524e
"libc.so.6", len = -1216594520}, r2_val = {
s = 0xb77e3ff4 "\f\317\001", len = -1218221656}, gr_val = {s = 0x3
<Address 0x3 out of bounds>, len = -1079284204}}
next_hop = {user = {s = 0x13e <Address 0x13e out of bounds>, len =
138084352}, passwd = {s = 0x83b0000 "core", len = -1216774156}, host = {s =
0xb77993c0 "", len = 0}, port = {
s = 0xbfab6c48 "\334l\253\277m\314x\265\t", len = -1217754692},
params = {s = 0x2 <Address 0x2 out of bounds>, len = 0}, sip_params = {s =
0xb76a9a1d "\211\301e\203=\f", len = -1250349068},
headers = {s = 0xa0548a0 "", len = 0}, port_no = 27868, proto = 49067,
type = 3044592749, flags = 9, transport = {s = 0xb7797ff4 "|=\026", len =
-1217780685}, ttl = {s = 0xa054c46 "\r\n",
len = -1079284616}, user_param = {s = 0xb76a88ed "e\203=\f", len =
0}, maddr = {s = 0x1 <Address 0x1 out of bounds>, len = -1079282940}, method = {s =
0x1 <Address 0x1 out of bounds>,
len = -1216774156}, lr = {s = 0xbfab7270 "", len = -1253817830}, r2
= {s = 0xbfab7248 "", len = -1217965473}, gr = {s = 0xbfab7270 "", len
= -1253817831}, transport_val = {
s = 0x1 <Address 0x1 out of bounds>, len = 0}, ttl_val = {s = 0xb578c790
"\203\370\377t\016\061\300\213\\$\024\213t$\030\203\304\034\303\213\206\220",
len = -1231661592}, user_param_val = {
s = 0xc0 <Address 0xc0 out of bounds>, len = -1231661592}, maddr_val =
{s = 0xb6632008 "\001", len = -1250349068}, method_val = {s = 0xb76a51d6
"\201\303\036.\017", len = -1253817831}, lr_val = {
s = 0x8800001 <Address 0x8800001 out of bounds>, len = 0}, r2_val = {s =
0xbfab86fc "\201T\232\236", len = 2}, gr_val = {s = 0x0, len = -1235017720}}
u = 0x0
port = 2113
dst_host = 0x5
i = 134566308
flags = 138095523
avp = 0x5
st = {flags = 3215683192, id = 24330, name = {n = 138084352, s = {s = 0x83b0000
"core", len = 4}, re = 0x83b0000}, avp = 0xb6974be0}
sct = 0x80554c4
sjt = 0xb779c000
rve = 0xb6937ee0
mct = 0xb779c340
rv = 0xbfab72e0
rv1 = 0x0
c1 = {cache_type = RV_CACHE_EMPTY, val_type = 3215682552, c = {avp_val = {n =
-1231676640, s = {s = 0xb6961b20 "\001", len = -1235017720}, re = 0xb6961b20},
pval = {rs = {s = 0xb6961b20 "\001",
len = -1235017720}, ri = 23, flags = -1231598660}}, i2s =
"\210V\226\266\000\000\000\000\374\206\253\277\310l\253\277\000\000\000\000\220\371"}
s = {s = 0x80c5d4b "\211E\364\213E\364\351\373\001", len = 0}
srevp = {0x0, 0xbfab6be8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1,
string = 0x1 <Address 0x1 out of bounds>, str = {s = 0x1 <Address
0x1 out of bounds>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type =
RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 19}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}}
__FUNCTION__ = "do_action"
#20 0x08070ea0 in run_actions (h=0xbfab70d0, a=0xb69521c0, msg=0xbfab7178) at
action.c:1549
t = 0xb69521c0
ret = -1
mod = 0x40000001
ms = 0
__FUNCTION__ = "run_actions"
#21 0xa5174a69 in xhttp_process_request (orig_msg=0xb6d7f828,
new_buf=0xb6965650 "GET / HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost:
test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control:
no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok"quot;...,
new_len=584) at xhttp_mod.c:282
ret = 0
tmp_msg = {id = 1, pid = 0, tval = {tv_sec = 0, tv_usec = 0}, fwd_send_flags = {f
= 0 '\000', blst_imask = 0 '\000'}, rpl_send_flags = {f = 1
'\001', blst_imask = 0 '\000'}, first_line = {type = 1,
flags = 2, len = 16, u = {request = {method = {
s = 0xb6965650 "GET / HTTP/1.1\r\nVia: SIP/2.0/TLS
x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma:
no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok"quot;..., len = 3}, uri = {
s = 0xb6965654 "/ HTTP/1.1\r\nVia: SIP/2.0/TLS
x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma:
no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok\r\nSe"quot;..., len = 1}, version = {
s = 0xb6965656 "HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost:
test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control:
no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok\r\nSec-"quot;...,
len = 8}, method_value = 16384}, reply = {version = {
s = 0xb6965650 "GET / HTTP/1.1\r\nVia: SIP/2.0/TLS
x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma:
no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok"quot;..., len = 3}, status = {
s = 0xb6965654 "/ HTTP/1.1\r\nVia: SIP/2.0/TLS
x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma:
no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok\r\nSe"quot;..., len = 1}, reason = {
s = 0xb6965656 "HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost:
test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control:
no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok\r\nSec-"quot;...,
len = 8}, statuscode = 16384}}}, via1 = 0xb6961b20, via2 = 0x0, headers = 0xb6974be0,
last_header = 0xb695c510, parsed_flag = 18446744073709551615,
h_via1 = 0xb6974be0, h_via2 = 0x0, callid = 0x0, to = 0x0, cseq = 0x0, from =
0x0, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type =
0x0, content_length = 0x0,
authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require =
0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0,
accept_language = 0xb6961e60,
organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0xb6961d94,
server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0,
session_expires = 0x0, min_se = 0x0,
sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0,
identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, body = 0x0, eoh =
0xb6965896 "\r\n",
unparsed = 0xb6965896 "\r\n", rcv = {src_ip = {af = 2, len = 4, u =
{addrl = {2515258290, 0, 0, 0}, addr32 = {2515258290, 0, 0, 0}, addr16 = {52146, 38379, 0,
0, 0, 0, 0, 0},
addr = "\262\313\353\225", '\000' <repeats 11
times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1548587732, 0, 0, 0}, addr32 =
{1548587732, 0, 0, 0}, addr16 = {37588, 23629, 0, 0, 0, 0, 0, 0},
addr = "\324\222M\\", '\000' <repeats 11 times>}},
src_port = 31366, dst_port = 8443, proto_reserved1 = 1, proto_reserved2 = 0, src_su = {s =
{sa_family = 2,
sa_data = "z\206\262\313\353\225\000\000\000\000\000\000\000"},
sin = {sin_family = 2, sin_port = 34426, sin_addr = {s_addr = 2515258290}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 2, sin6_port = 34426, sin6_flowinfo = 2515258290, sin6_addr
= {__in6_u = {__u6_addr8 =
"\000\000\000\000\000\000\000\000\001\000\000\000\310J~\267", __u6_addr16 = {0,
0, 0, 0, 1,
0, 19144, 46974}, __u6_addr32 = {0, 0, 1, 3078507208}}},
sin6_scope_id = 0}}, bind_address = 0xb6653088, proto = 3 '\003'},
buf = 0xb6965650 "GET / HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost:
test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control:
no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok"quot;..., len =
584, new_uri = {s = 0x0, len = 0}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0,
parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0},
sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0,
type = ERROR_URI_T, flags = 0,
transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s =
0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len
= 0}, r2 = {s = 0x0, len = 0},
gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s =
0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
method_val = {s = 0x0, len = 0},
lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0,
len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd
= {s = 0x0, len = 0}, host = {
s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0},
sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0,
type = ERROR_URI_T, flags = 0,
transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s =
0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len
= 0}, r2 = {s = 0x0, len = 0},
gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s =
0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
method_val = {s = 0x0, len = 0},
lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0,
len = 0}}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0xb695c638, add_to_branch_s =
'\000' <repeats 57 times>,
add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 0,
set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0},
force_send_socket = 0x0, path_vec = {s = 0x0, len = 0},
instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0},
location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 0, len
= 0, u = {addrl = {0, 0, 0, 0},
addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr =
'\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0,
0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0,
0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}},
src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s =
{sa_family = 0,
sa_data = '\000' <repeats 13 times>}, sin = {sin_family
= 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000'
<repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0,
0}}}, sin6_scope_id = 0}},
bind_address = 0x0, proto = 0 '\000'}}}}
msg = 0xbfab7178
ra_ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf =
{-1525164112, -1227359856, -1079282976, -1079283672, -1770382054, -827108235},
__mask_was_saved = 0, __saved_mask = {
__val = {3215683976, 3045741472, 3063305636, 544, 3215684288, 3059949576,
2779660224, 2779665395, 129, 3046232728, 0, 3215689468, 3215683944, 136838447, 3059949576,
3063305672, 138083373,
138084317, 213, 3077899005, 3046232728, 136883713, 3215685216, 0, 100,
0, 21, 129, 3215683976, 136875280, 3215684288, 3077898773}}}}}
__FUNCTION__ = "xhttp_process_request"
#22 0xa5175b68 in xhttp_handler (msg=0xb6d7f828) at xhttp_mod.c:357
ret = 0
fake_msg = 0xb6965650 "GET / HTTP/1.1\r\nVia: SIP/2.0/TLS
x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma:
no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok"quot;...
fake_msg_len = 584
pmatch = {rm_so = 0, rm_eo = 0}
c = 32 ' '
__FUNCTION__ = "xhttp_handler"
#23 0x081283de in nonsip_msg_run_hooks (msg=0xb6d7f828) at nonsip_hooks.c:111
r = 1
ret = 1
#24 0x08150a47 in receive_msg (
buf=0xa054a28 "GET / HTTP/1.1\r\nHost: test.dummy.ok:8443\r\nConnection:
Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok\r\nSec-WebSocket-Version: 13\r\nUser-Agent:"...,
len=544, rcv_info=0xa5aedca4) at receive.c:189
msg = 0xb6d7f828
ctx = {rec_lev = 5333888, run_flags = 4, last_retcode = 119, jmp_env = {{__jmpbuf
= {-1238976092, 89, -1079281576, 135028043, 0, -1243844620}, __mask_was_saved = 0,
__saved_mask = {__val = {0, 32,
3077898773, 3053375928, 136744621, 3215685780, 0, 28, 136726975, 5, 0,
92, 3059949576, 3059949576, 213, 3077202798, 3053359487, 3059949576, 3215685780,
3063306712, 3055991204, 3055962697,
16777216, 11526868, 4540512, 8193, 65560, 121, 65536, 3078045309,
3078198264, 3078045004}}}}}
ret = -1216774156
inb = {
s = 0xa054a28 "GET / HTTP/1.1\r\nHost: test.dummy.ok:8443\r\nConnection:
Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok\r\nSec-WebSocket-Version: 13\r\nUser-Agent:"..., len =
544}
netinfo = {data = {s = 0xb5dc6ff4 "\310Y\033", len = 10}, dst =
0x1000000, rcv = 0xafe31c}
__FUNCTION__ = "receive_msg"
#25 0x082395df in receive_tcp_msg (
tcpbuf=0xa5aede60 "GET / HTTP/1.1\r\nHost: test.dummy.ok:8443\r\nConnection:
Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok\r\nSec-WebSocket-Version: 13\r\nUser-Agent:"...,
len=544, rcv_info=0xa5aedca4, con=0xa5aedc90) at tcp_read.c:1279
buf = 0xa054a28 "GET / HTTP/1.1\r\nHost: test.dummy.ok:8443\r\nConnection:
Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin:
https://web.service.dummy.ok\r\nSec-WebSocket-Version: 13\r\nUser-Agent:"...
bsize = 65535
blen = 65535
__FUNCTION__ = "receive_tcp_msg"
#26 0x0823b42f in tcp_read_req (con=0xa5aedc90, bytes_read=0xbfab7f24,
read_flags=0xbfab7f1c) at tcp_read.c:1447
bytes = 544
total_bytes = 544
resp = 1
size = 0
req = 0xa5aedd04
dst = {send_sock = 0x2001, to = {s = {sa_family = 54276, sa_data =
"\264\266@74\245\001\000\000\000\020\000\000"}, sin = {sin_family = 54276,
sin_port = 46772, sin_addr = {s_addr = 2771662656},
sin_zero = "\001\000\000\000\020\000\000"}, sin6 = {sin6_family =
54276, sin6_port = 46772, sin6_flowinfo = 2771662656, sin6_addr = {__in6_u = {
__u6_addr8 =
"\001\000\000\000\020\000\000\000\001\000\000\000\001\000\000", __u6_addr16 =
{1, 0, 16, 0, 1, 0, 1, 0}, __u6_addr32 = {1, 16, 1, 1}}}, sin6_scope_id = 16}}, id =
-1079279848,
proto = 4 '\004', send_flags = {f = 0 '\000', blst_imask = 0
'\000'}}
c = 0 '\000'
ret = 0
__FUNCTION__ = "tcp_read_req"
#27 0x0823ecf8 in handle_io (fm=0xb6b4d404, events=1, idx=-1) at tcp_read.c:1679
ret = 0
n = 0
read_flags = 1
con = 0xa5aedc90
s = 16
resp = 1
t = 1478278877
__FUNCTION__ = "handle_io"
#28 0x08230b80 in io_wait_loop_epoll (h=0x8452f40, t=2, repeat=0) at io_wait.h:1065
n = 1
r = 0
fm = 0xb6b4d404
revents = 1
__FUNCTION__ = "io_wait_loop_epoll"
#29 0x0823ffca in tcp_receive_loop (unix_sock=66) at tcp_read.c:1791
__FUNCTION__ = "tcp_receive_loop"
#30 0x0822776c in tcp_init_children () at tcp_main.c:4796
r = 0
i = -1
reader_fd_1 = 66
pid = 0
si_desc = "tcp receiver
(tls:y.y.y.y:8443)\000\000\000\001\000\000\000\000\000\000\000\252\066\000\000\000\000\000\000\000\000\000\000\340\062\064\245\241o`\r8\202\253\277\372\205$\b\377\377\377\377\263\362\071\b\001\000\000\000a\200$\b\000\000\000\000\001\000\000\000hu4\b\241o`\r\263\066\000\000(\000\000\000\070\202\253\277\004\000\000\000\304\323\000?"
si = 0x0
__FUNCTION__ = "tcp_init_children"
#31 0x080f00e7 in main_loop () at main.c:1704
i = 4
pid = 13993
si = 0x0
si_desc = "udp receiver child=3
sock=y.y.y.y:5080\000\062\064\245\001\000\000\000\001\000\000\000\364\237\342\265\000\260\063\245\016\020\000\000\250\370~\245\250\370~\245\000\000\000\000`\310\342\265\364o\334\265\001\000\000\000\000\000\000\000\374\206\253\277H\204\253\277\377\241&\b\324\253\231\266\367\001>\265\235\346\065\b\350\367\065\bn\000\000"
nrprocs = 4
woneinit = 1
__FUNCTION__ = "main_loop"
#32 0x080f679b in main (argc=13, argv=0xbfab8874) at main.c:2631
cfg_stream = 0x9ab5008
c = -1
r = 0
tmp = 0xbfab9908 ""
tmp_len = 1
port = 0
proto = 0
options = 0x8354d18
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:"
ret = -1
seed = 2660914305
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0xbfab87a0
p = 0x805ce5c "[\201\303\264\202;"
st = {st_dev = 15, __pad1 = 0, st_ino = 12628, st_mode = 16832, st_nlink = 2,
st_uid = 0, st_gid = 0, st_rdev = 0, __pad2 = 0, st_size = 60, st_blksize = 4096,
st_blocks = 0, st_atim = {
n = 1
r = 0
fm = 0xb6b4d404
revents = 1
__FUNCTION__ = "io_wait_loop_epoll"
#29 0x0823ffca in tcp_receive_loop (unix_sock=66) at tcp_read.c:1791
__FUNCTION__ = "tcp_receive_loop"
#30 0x0822776c in tcp_init_children () at tcp_main.c:4796
r = 0
i = -1
reader_fd_1 = 66
pid = 0
si_desc = "tcp receiver
(tls:y.y.y.y:8443)\000\000\000\001\000\000\000\000\000\000\000\252\066\000\000\000\000\000\000\000\000\000\000\340\062\064\245\241o`\r8\202\253\277\372\205$\b\377\377\377\377\263\362\071\b\001\000\000\000a\200$\b\000\000\000\000\001\000\000\000hu4\b\241o`\r\263\066\000\000(\000\000\000\070\202\253\277\004\000\000\000\304\323\000?"
si = 0x0
__FUNCTION__ = "tcp_init_children"
#31 0x080f00e7 in main_loop () at main.c:1704
i = 4
pid = 13993
si = 0x0
si_desc = "udp receiver child=3
sock=y.y.y.y:5080\000\062\064\245\001\000\000\000\001\000\000\000\364\237\342\265\000\260\063\245\016\020\000\000\250\370~\245\250\370~\245\000\000\000\000`\310\342\265\364o\334\265\001\000\000\000\000\000\000\000\374\206\253\277H\204\253\277\377\241&\b\324\253\231\266\367\001>\265\235\346\065\b\350\367\065\bn\000\000"
nrprocs = 4
woneinit = 1
__FUNCTION__ = "main_loop"
#32 0x080f679b in main (argc=13, argv=0xbfab8874) at main.c:2631
cfg_stream = 0x9ab5008
c = -1
r = 0
tmp = 0xbfab9908 ""
tmp_len = 1
port = 0
proto = 0
options = 0x8354d18
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:"
ret = -1
seed = 2660914305
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0xbfab87a0
p = 0x805ce5c "[\201\303\264\202;"
st = {st_dev = 15, __pad1 = 0, st_ino = 12628, st_mode = 16832, st_nlink = 2,
st_uid = 0, st_gid = 0, st_rdev = 0, __pad2 = 0, st_size = 60, st_blksize = 4096,
st_blocks = 0, st_atim = {
---Type <return> to continue, or q <return> to quit---
tv_sec = 1506010457, tv_nsec = 983334802}, st_mtim = {tv_sec = 1508597914,
tv_nsec = 354506842}, st_ctim = {tv_sec = 1508598507, tv_nsec = 860710419}, __unused4 = 0,
__unused5 = 0}
__FUNCTION__ = "main"
(gdb) info locals
__FUNCTION__ = "dlg_cseq_prepare_msg"
(gdb) list
76
77 if(msg->first_line.type==SIP_REPLY) {
78 /* reply to local transaction -- nothing to do */
79 if (parse_headers(msg, HDR_VIA2_F, 0)==-1
80 || (msg->via2==0) || (msg->via2->error!=PARSE_OK)) {
81 if(get_cseq(msg)->method_id != METHOD_CANCEL) {
82 LM_DBG("no second via in this message \n");
83 return 3;
84 }
85 }
```
#### Log Messages
<!--
Check the syslog file and if there are relevant log messages printed by Kamailio, add them
next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->
```
Oct 21 15:08:30 webrtc-as webrtc[14045]: INFO: tls [tls_server.c:420]: tls_accept():
tls_accept: new connection from x.x.x.x:aaaaa using TLSv1/SSLv3 AES256-GCM-SHA384 256
Oct 21 15:08:30 webrtc-as webrtc[14045]: INFO: tls [tls_server.c:423]: tls_accept():
tls_accept: local socket: y.y.y.y:bbbb
Oct 21 15:08:30 webrtc-as webrtc[14045]: INFO: tls [tls_server.c:434]: tls_accept():
tls_accept: client did not present a certificate
Oct 21 15:08:30 webrtc-as kernel: [2587094.669038] kamailio[14045] segfault at 18 ip
b58a41a6 sp bfaa2970 error 4 in dialog.so[b5885000+98000]
Oct 21 15:08:31 webrtc-as webrtc[14077]: CRITICAL: <core> [pass_fd.c:277]:
receive_fd(): EOF on 63
Oct 21 15:08:31 webrtc-as webrtc[13959]: ALERT: <core> [main.c:740]: handle_sigs():
child process 14045 exited by a signal 11
Oct 21 15:08:31 webrtc-as webrtc[13959]: ALERT: <core> [main.c:743]: handle_sigs():
core was generated
Oct 21 15:08:31 webrtc-as webrtc[13959]: INFO: <core> [main.c:755]: handle_sigs():
terminating due to SIGCHLD
Oct 21 15:08:31 webrtc-as webrtc[14076]: INFO: <core> [main.c:810]: sig_usr():
signal 15 received
Oct 21 15:08:31 webrtc-as webrtc[14075]: INFO: <core> [main.c:810]: sig_usr():
signal 15 received
Oct 21 15:08:31 webrtc-as webrtc[13961]: INFO: <core> [main.c:810]: sig_usr():
signal 15 received
Oct 21 15:08:31 webrtc-as webrtc[14069]: INFO: <core> [main.c:810]: sig_usr():
signal 15 received
Oct 21 15:08:31 webrtc-as webrtc[13962]: INFO: <core> [main.c:810]: sig_usr():
signal 15 received
...
```
#### SIP Traffic
<!--
If the issue is exposed by processing specific SIP messages, grab them with ngrep or save
in a pcap file, then add them next, or attach to issue, or provide a link to download them
(e.g., to a pastebin site).
-->
```
Not Available - Kamailio crash upon HTTP WS Upgrade.
```
### Possible Solutions
<!--
If you found a solution or workaround for the issue, describe it. Ideally, provide a pull
request with a fix.
-->
In kamailio/modules/dialog/dlg_cseq.c commenting out IF condition at line 81, then
rebuilding kamailio binary seems to fix the problem, i.e.
```
if(msg->first_line.type==SIP_REPLY) {
/* reply to local transaction -- nothing to do */
if (parse_headers(msg, HDR_VIA2_F, 0)==-1
|| (msg->via2==0) || (msg->via2->error!=PARSE_OK)) {
===> //if(get_cseq(msg)->method_id != METHOD_CANCEL) {
LM_DBG("no second via in this message \n");
return 3;
===> //}
}
}
```
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
```
version: kamailio 4.4.6 (i386/linux) becbde
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE,
USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC,
DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER,
USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024,
BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: becbde -dirty
compiled on 15:01:17 Oct 21 2017 with gcc 4.7.2
```
* **Operating System**:
<!--
Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04,
CentOS 7.1, ...), MacOS, xBSD, Solaris, ...;
Kernel details (output of `uname -a`)
-->
```
Linux webrtc-as 3.16.0-0.bpo.4-686-pae #1 SMP Debian 3.16.36-1+deb8u2~bpo70+1 (2016-10-19)
i686 GNU/Linux
```
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1277