Another crash ....
# gdb /usr/sbin/kamailio /tmp/core
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from
/usr/lib/debug/.build-id/ff/dca0b3c4e5ce21804735c74ee480e9abd4c6a6.debug...done.
done.
[New LWP 26162]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f
/etc/kamailio/kamailio.'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74
74 ../../mem/../atomic/atomic_common.h: No such file or directory.
(gdb) bt full
#0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74
No locals.
#1 dlg_unref_helper (dlg=0x7f37572ad3a0, cnt=1, fname=0x6632 <error: Cannot access
memory at address 0x6632>, fline=1650) at dlg_hash.c:925
mypid = 26162
d_entry = 0x7f453f1b2470
__FUNCTION__ = "dlg_unref_helper"
#2 0x00007f374fb38e12 in dlg_run_event_route (dlg=0x7f37572ad3a0, msg=0x7f37966874f8,
ostate=1431987232, nstate=1) at dlg_handlers.c:1650
rt = 10133176
bkroute = 1
__FUNCTION__ = "dlg_run_event_route"
#3 0x00007f374fb3c21e in dlg_onroute (req=0x7f37966874f8, route_params=0x7f37555a4e10,
param=0x7f37555a6420) at dlg_handlers.c:1318
dlg0 = 0x6632
val = {
s = 0x9ab8cb <buf+203>
"bb6.e74;nat=yes>,<sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards:
69\r\nFrom: \"XXXXXXXXX\"
<sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxx"..., len =
7}
callid = {
s = 0x9ab9cd <buf+461>
"4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent:
ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode:
16\r\nContent-Length: 0\r\n\r\n", len = 50}
ftag = {
s = 0x9ab97a <buf+378> "as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID:
4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs
PBX\r\nX-Asterisk-HangupCause: No"..., len = 10}
ttag = {
s = 0x9ab9ba <buf+442> "45248699\r\nCall-ID:
4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs
PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode:
16\r\nContent-Length: 0"..., len = 8}
new_state = 5
old_state = 4
unref = 1
event = 7
dir = 1
ret = 26162
__FUNCTION__ = "dlg_onroute"
#4 0x00007f375241628d in run_rr_callbacks (req=0x7f37966874f8, rr_param=0x7ffcb7bbf3d0)
at rr_cb.c:96
l_param = {
s = 0x9ab8ae <buf+174>
"r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>,<sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards:
69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;"..., len
= 44}
cbp = 0x7f379667a2b8
__FUNCTION__ = "run_rr_callbacks"
#5 0x00007f37524088a2 in after_loose (_m=0x7f37966874f8, preloaded=2) at loose.c:928
puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
s = 0x9ab8e1 <buf+225>
"XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards:
69\r\nFrom: \"XXXXXXXXX\"
<sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxx"..., len = 12}, port = {
s = 0x9ab8ee <buf+238>
"5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards:
69\r\nFrom: \"XXXXXXXXX\"
<sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxxxxxxxxx.com>;"..., len = 4}, params = {
s = 0x9ab8f3 <buf+243>
"transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards:
69\r\nFrom: \"XXXXXXXXX\"
<sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=4"..., len = 58}, sip_params = {
s = 0x9ab8f3 <buf+243>
"transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards:
69\r\nFrom: \"XXXXXXXXX\"
<sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=4"..., len = 58}, headers = {s =
0x0, len = 0}, port_no = 5061, proto = 3, type = SIP_URI_T, flags = (unknown: 0),
transport = {
s = 0x9ab8f3 <buf+243>
"transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards:
69\r\nFrom: \"XXXXXXXXX\"
<sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=4"..., len = 13}, ttl = {s = 0x0,
len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0,
len = 0}, lr = {
---Type <return> to continue, or q <return> to quit---
s = 0x9ab907 <buf+263>
"lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
\"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID: 47"..., len
= 2}, r2 = {
s = 0x9ab901 <buf+257>
"r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
\"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-"..., len = 5},
gr = {s = 0x0, len = 0}, transport_val = {
s = 0x9ab8fd <buf+253>
"tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
\"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nC"..., len = 3},
ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0,
len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0,
len = 0}, r2_val = {
s = 0x9ab904 <buf+260>
"on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
\"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID:"..., len =
2}, gr_val = {s = 0x0, len = 0}}
lecom.com>;tag=45248699\r\nCall-ID:"..., len = 2}, gr_val = {s = 0x0, len = 0}}
rt = 0x0
status = 26162
uri = {
s = 0x9ab89d <buf+157>
"sip:XX.XX.XX.51;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>,<sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards:
69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@18"..., len = 61}
use_ob = 0
rparams = {
s = 0x9ab8ae <buf+174>
"r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>,<sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards:
69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;"..., len
= 44}
__FUNCTION__ = "after_loose"
#6 0x0000000000541cf0 in do_action (h=0x7ffcb7bbfaf0, a=0x7f37964bfd98,
msg=0x7f37966874f8) at action.c:1060
ret = -5
v = 25
dst = {send_sock = 0x7ffcb7bbf640, to = {s = {sa_family = 1215, sa_data =
"B\000\000\000\000\000\370\227h\226\067\177\000"}, sin = {sin_family = 1215,
sin_port = 66, sin_addr = {s_addr = 0},
sin_zero = "\370\227h\226\067\177\000"}, sin6 = {sin6_family =
1215, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
__u6_addr8 =
"\370\227h\226\067\177\000\000\273\065B\000\000\000\000", __u6_addr16 = {38904,
38504, 32567, 0, 13755, 66, 0, 0}, __u6_addr32 = {2523437048, 32567, 4339131, 0}}},
sin6_scope_id = 36286432}}, id = 0, proto = 10 '\n', send_flags = {f
= 0 '\000', blst_imask = 0 '\000'}}
end = 0x7ffcb7bbfaf0 "\001"
uri = {user = {s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 13913760}, passwd = {s = 0x23a070 <error: Cannot access memory at
address 0x23a070>, len = -1212418316}, host = {
s = 0x2bcbb8 <error: Cannot access memory at address 0x2bcbb8>, len =
1462424480}, port = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0},
params = {
s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776},
sip_params = {s = 0x7ffcb7bbf820 "z\271\232", len = 5615623}, headers = {s =
0x0, len = -2002407168}, port_no = 0,
proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown:
1337012136), transport = {s = 0x7ffcb7bbf810 "\315\271\232", len = -1212418036},
ttl = {
s = 0x7f3700000000 <error: Cannot access memory at address
0x7f3700000000>, len = 1431825776}, user_param = {
s = 0x9ab9cd <buf+461>
"4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent:
ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode:
16\r\nContent-Length: 0\r\n\r\n", len = 50}, maddr = {s = 0x6bb01000000 <error:
Cannot access memory at address 0x6bb01000000>, len = 13914448}, method = {
s = 0x239dc0 <error: Cannot access memory at address 0x239dc0>, len =
-1212418032}, lr = {s = 0x30 <error: Cannot access memory at address 0x30>, len =
10140157}, r2 = {
s = 0x4f7f4 <error: Cannot access memory at address 0x4f7f4>, len = 1},
gr = {s = 0x635f1 <error: Cannot access memory at address 0x635f1>, len =
-1212418092}, transport_val = {s = 0x0,
len = 1462424480}, ttl_val = {s = 0x7f375557ed70 "", len = 26162},
user_param_val = {s = 0x3ac <error: Cannot access memory at address 0x3ac>, len =
1}, maddr_val = {s = 0x7f375557ed84 "",
len = 5615623}, method_val = {
s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia:
SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom:
<sip:601@customers.xxxxxxxxxxx.com:5061>;tag=as3e9ce588\r\nTo:
<sip:xxxxxx620@custo"..., len = -2002407168}, lr_val = {s = 0x7f3755b74078
"\t", len = 1337065181}, r2_val = {s = 0x0, len = -2002407168}, gr_val = {s =
0x0, len = 1337417873}}
next_hop = {user = {
s = 0x9ab9cd <buf+461>
"4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent:
ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode:
16\r\nContent-Length: 0\r\n\r\n", len = 50}, passwd = {
s = 0x9ab97a <buf+378> "as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID:
4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs
PBX\r\nX-Asterisk-HangupCause: No"..., len = 10}, host = {
s = 0x9ab9ba <buf+442> "45248699\r\nCall-ID:
4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs
PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode:
16\r\nContent-Length: 0"..., len = 1462424480}, port = {s = 0x0, len = -2002407168},
params = {s = 0x0, len = -1773448560}, sip_params = {s = 0x7f37966874f8 "\277T",
len = -1212417664},
headers = {
s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia:
SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom:
<sip:601@customers.xxxxxxxxxxx.com:5061>;tag=as3e9ce588\r\
---Type <return> to continue, or q <return> to quit---
nTo: <sip:xxxxxx620@custo"..., len = 1431770624}, port_no = 16504, proto = 21943,
type = 32567, flags = (URI_USER_NORMALIZE | unknown: 1337423684), transport = {s = 0x0,
len = 0}, ttl = {s = 0x0, len = 0},
user_param = {s = 0x0, len = 0}, maddr = {s = 0x7f37963e7a78 "1", len
= 1}, method = {s = 0x0, len = -2002407168}, lr = {s = 0x67964f8c90 <error: Cannot
access memory at address 0x67964f8c90>,
len = -1773448584}, r2 = {s = 0x7ffcb7bbf980 "", len = -1771539208},
gr = {s = 0x7ffcb7bc0dc0 "\003", len = -1212417196}, transport_val = {s = 0x0,
len = 5795166}, ttl_val = {
s = 0x7ffcb7bbfb54 "\001", len = -1212412480}, user_param_val = {s =
0x7f37966874f8 "\277T", len = -1212412480}, maddr_val = {s = 0x7ffcb7bbfb54
"\001", len = 4329797}, method_val = {
s = 0xa00000000 <error: Cannot access memory at address 0xa00000000>,
len = 1462424480}, lr_val = {s = 0x8 <error: Cannot access memory at address 0x8>,
len = 0}, r2_val = {
s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776},
gr_val = {s = 0x0, len = 0}}
u = 0x7ffcb7bbfaf0
flags = 0
st = {flags = 10140109, id = 0, name = {n = 50, s = {s = 0x32 <error: Cannot
access memory at address 0x32>, len = 10140026}, re = 0x32}, avp = 0xa}
sct = 0x7ffcb7bbfaf0
sjt = 0x7ffcb7bbfaf0
mct = 0x0
rv = 0x7f37966874f8
rv1 = 0x7f37966874f8
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s =
{s = 0x0, len = -1212417832}, re = 0x0}, pval = {rs = {s = 0x0, len = -1212417832}, ri =
-1212417864, flags = 32764}},
i2s =
"\330\370\273\267\374\177\000\000\304\366\273\267\374\177\000\000\270\313+\000\000"}
s = {s = 0x7ffcb7bc0dc0 "\003", len = -1212417040}
srevp = {0x7f37964bfd98, 0x7f37966874f8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str = {s =
0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2,
select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len =
12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number =
139876723345328,
string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s =
0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr =
0x7f37966847b0, select = 0x7f37966847b0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}}
__FUNCTION__ = "do_action"
#7 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffcb7bbfaf0, a=0x7f37555a4e10,
msg=0x7f37555a6420) at action.c:1549
ret = -1212412480
mod = 0x7f37964bfd98
__FUNCTION__ = "run_actions"
#8 0x000000000054d187 in run_actions_safe (h=0x7ffcb7bc0dc0, a=<optimized out>,
msg=<optimized out>) at action.c:1614
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf =
{140723391036144, -6256338930039500370, 139876723356920, 140723391040960, 140723391036960,
0, -6256338896078220882,
6256743653617062318}, __mask_was_saved = 0, __saved_mask = {__val =
{2436122589503271168, 4294967565, 139876721732288, 139876720589288, 139874199928833, 0,
2436122589503271168, 0,
139876722008400, 140723391036448, 139876723356920, 140723391040960,
140723391036960, 0, 5795166, 140723391036960}}}}}
ret = <optimized out>
ign_on_break = 0
#9 0x0000000000421190 in rval_get_int (h=0x7ffcb7bc0dc0, msg=0x1, i=0x7ffcb7bbfe20,
rv=0x3d4, cache=0x67) at rvalue.c:912
r_avp = 0x6632
avp_val = {n = 266, s = {s = 0x10a <error: Cannot access memory at address
0x10a>, len = -1772630408}, re = 0x10a}
pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}
tmp = {s = 0xa49900 <_pkg_root> "\313\030p", len = -1773840408}
s = 0x7f37966874f8
r = 26162
ret = 26162
destroy_pval = -1212412480
__FUNCTION__ = "rval_get_int"
#10 0x0000000000426f1c in rval_expr_eval_int (h=0x7ffcb7bc0dc0, msg=0x7f37966874f8,
res=0x7ffcb7bbfe20, rve=0x7f37964bf230) at rvalue.c:1910
i1 = 0
i2 = 0
---Type <return> to continue, or q <return> to quit---
ret = -1
c1 = {cache_type = 3082554816, val_type = 32764, c = {avp_val = {n = 0, s = {s =
0x300000000 <error: Cannot access memory at address 0x300000000>, len =
-1773234896}, re = 0x300000000}, pval = {rs = {
s = 0x300000000 <error: Cannot access memory at address
0x300000000>, len = -1773234896}, ri = -1771539208, flags = 32567}},
i2s =
"\000\000\000\000\004\000\000\000g\306\037P7\177\000\000\323x=\226\067\177"}
c2 = {cache_type = 2520886432, val_type = 32567, c = {avp_val = {n = 5799339, s =
{s = 0x587dab <pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\323
B", len = 10139993},
re = 0x587dab <pv_printf+267>}, pval = {rs = {s = 0x587dab
<pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\323 B", len =
10139993}, ri = 9, flags = 0}},
i2s =
"x\316W\226\067\177\000\000\000\261\245\210\226\330\316!\001\000\000\000\000"}
rv1 = 0x7f37966874f8
rv2 = 0x0
__FUNCTION__ = "rval_expr_eval_int"
#11 0x00000000005421c7 in do_action (h=0x7ffcb7bc0dc0, a=0x7f37964c6300,
msg=0x7f37966874f8) at action.c:1030
ret = -5
v = 0
dst = {send_sock = 0x0, to = {s = {sa_family = 45312, sa_data =
"\245\210\226\330\316!\370th\226\067\177\000"}, sin = {sin_family = 45312,
sin_port = 34981, sin_addr = {s_addr = 567203990},
sin_zero = "\370th\226\067\177\000"}, sin6 = {sin6_family = 45312,
sin6_port = 34981, sin6_flowinfo = 567203990, sin6_addr = {__in6_u = {
__u6_addr8 = "\370th\226\067\177\000\000\221`\267O7\177\000",
__u6_addr16 = {29944, 38504, 32567, 0, 24721, 20407, 32567, 0}, __u6_addr32 = {2523428088,
32567, 1337417873, 32567}}},
sin6_scope_id = 10140109}}, id = 0, proto = 50 '2', send_flags = {f
= 0 '\000', blst_imask = 0 '\000'}}
end = 0x7f37964bf230 "\001"
uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len =
1431825776}, passwd = {s = 0x7ffcb7bc0010 "z\271\232", len = 5615623}, host = {s
= 0x0, len = -2002407168}, port = {s = 0x0,
len = 1337012137}, params = {s = 0x7ffcb7bc0000 "\315\271\232", len
= -1212416004}, sip_params = {s = 0x7ffc00000000 <error: Cannot access memory at
address 0x7ffc00000000>, len = 1431825776},
headers = {
s = 0x9ab9cd <buf+461>
"4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent:
ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode:
16\r\nContent-Length: 0\r\n\r\n", len = 50}, port_no = 64, proto = 47036, type =
1723, flags = (URI_SIP_USER_PHONE | unknown: 210129324), transport = {s = 0x7f3796537350
"\224\004", len = -1212416000}, ttl = {
s = 0x30 <error: Cannot access memory at address 0x30>, len = 10140157},
user_param = {s = 0x4f7f4 <error: Cannot access memory at address 0x4f7f4>, len =
1}, maddr = {
s = 0x635f1 <error: Cannot access memory at address 0x635f1>, len =
-1212416060}, method = {s = 0x7f3796553930 "\001", len = 1462424480}, lr = {s =
0x7f375557ed70 "", len = 26162}, r2 = {
s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, gr =
{s = 0x7f375557ed84 "", len = 5615623}, transport_val = {
s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia:
SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom:
<sip:601@customers.xxxxxxxxxxx.com:5061>;tag=as3e9ce588\r\nTo:
<sip:xxxxxx620@custo"..., len = -2002407168}, ttl_val = {s = 0x7f37559e7178
"\b\220\325U7\177", len = 1337065181}, user_param_val = {s = 0x7ffcb7bc0dc0
"\003", len = -2002407168}, maddr_val = {
s = 0x28ac9 <error: Cannot access memory at address 0x28ac9>, len =
1337417873}, method_val = {
s = 0x9ab9cd <buf+461>
"4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent:
ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode:
16\r\nContent-Length: 0\r\n\r\n", len = 50}, lr_val = {
s = 0x9ab97a <buf+378> "as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID:
4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs
PBX\r\nX-Asterisk-HangupCause: No"..., len = 10}, r2_val = {
s = 0x9ab9ba <buf+442> "45248699\r\nCall-ID:
4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs
PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-Han
gupCauseCode: 16\r\nContent-Length: 0"..., len = 1462424480}, gr_val = {s = 0x0, len
= -2002407168}}
next_hop = {user = {s = 0x0, len = -1774037616}, passwd = {s = 0x7f37966874f8
"\277T", len = -1212415632}, host = {
s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia:
SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom:
<sip:601@customers.xxxxxxxxxxx.com:5061>;tag=as3e9ce588\r\nTo:
<sip:xxxxxx620@custo"..., len = 1431770624}, port = {s = 0x7f37559e7178
"\b\220\325U7\177", len = 1337423685}, params = {
s = 0xa92d04ebe56c51ae <error: Cannot access memory at address
0xa92d04ebe56c51ae>, len = 210129326}, sip_params = {s = 0x0, len = 37}, headers = {
s = 0x9ab963 <buf+355> "XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo:
<sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID:
4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs
PBX\r\nX-A"..., len = -1772799688}, port_no = 23088, proto = 38462, type = 32567,
flags = URI_USER_NORMALIZE, transport = {s = 0x0, len = -2002407168}, ttl = {s = 0x0,
len = -1774037640}, user_param = {s = 0x7ffcb7bc0170 "", len =
-1771539208}, maddr = {s = 0x7ffcb7bc0dc0 "\003", len = -1212415120}, method =
{s = 0x0, len = 5795166}, lr = {s = 0x7ffcb7bc0370 "",
len = -1212412480}, r2 = {s = 0x7f37966874f8 "\277T", len =
-1212412480}, gr = {s = 0x7ffcb7bc0370 "", len = 4329797}, transport_val = {s =
0x0, len = 1441022624}, ttl_val = {s = 0x7f379641bff0 "",
len = -2002407168}, user_param_val = {s = 0x7ffcb7bc02b0 "\310\003",
len = -1772698632}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len =
-2002407168}, lr_val = {s = 0x0,
len = -1774037656}, r2_val = {s = 0xffffffff <error: Cannot access memory
at address 0xffffffff>, len = -1771539208}, gr_val = {s = 0x7ffcb7bc0dc0
"\003", len = -1212415120}}
u = 0x7f37964bf230
flags = 32567
st = {flags = 0, id = 0, name = {n = -1774037616, s = {s = 0x7f3796425590
"", len = -1771539208}, re = 0x7f3796425590}, avp = 0x7ffcb7bc0170}
sct = 0x7f37964bf230
---Type <return> to continue, or q <return> to quit---
sjt = 0x7f37964bf230
mct = 0x0
rv = 0x55b007 <get_debug_level+103>
rv1 = 0x7f37966874f8
c1 = {cache_type = 10140026, val_type = RV_NONE, c = {avp_val = {n = 10, s = {s =
0xa <error: Cannot access memory at address 0xa>, len = 10140090}, re = 0xa}, pval =
{rs = {
s = 0xa <error: Cannot access memory at address 0xa>, len =
10140090}, ri = -1212416284, flags = 32764}}, i2s =
"\000\000\000\000\000\000\000\000\240\323*W7\177\000\000\b\000\000\000\000"}
s = {
s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia:
SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom:
<sip:601@customers.xxxxxxxxxxx.com:5061>;tag=as3e9ce588\r\nTo:
<sip:xxxxxx620@custo"..., len = -2002407168}
srevp = {0x7f37964c6300, 0x7f37966874f8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str = {s =
0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2,
select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len =
12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number =
139876723345328,
string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s =
0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr =
0x7f37966847b0, select = 0x7f37966847b0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}}
__FUNCTION__ = "do_action"
#12 0x00000000005407b5 in run_actions (h=0x1, a=0x7f37555a4e10, msg=0x7f37555a6420) at
action.c:1549
ret = 1
mod = 0x7f37964c6300
__FUNCTION__ = "run_actions"
#13 0x00000000005423e0 in do_action (h=0x7ffcb7bc0dc0, a=0x7f3796668250,
msg=0x7f37966874f8) at action.c:678
ret = -5
v = 0
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
"\000\000\000\000\000\000\070o\321U7\177\000"}, sin = {sin_family = 0, sin_port
= 0, sin_addr = {s_addr = 0}, sin_zero = "8o\321U7\177\000"},
sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr =
{__in6_u = {__u6_addr8 = "8o\321U7\177\000\000\230\332>\227\067\177\000",
__u6_addr16 = {28472, 21969, 32567, 0, 55960, 38718,
32567, 0}, __u6_addr32 = {1439788856, 32567, 2537478808, 32567}}},
sin6_scope_id = 528}}, id = 0, proto = -112 '\220', send_flags = {f = 211
'\323', blst_imask = 187 '\273'}}
end = 0x8 <error: Cannot access memory at address 0x8>
uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len =
1431825776}, passwd = {s = 0x7ffcb7bc0560 "\300\r\274\267\374\177", len =
5615623}, host = {
s = 0x100000002 <error: Cannot access memory at address 0x100000002>,
len = -2002407168}, port = {s = 0x0, len = -1774040560}, params = {s = 0x7ffcb7bc0dc0
"\003", len = -5}, sip_params = {
s = 0x7ffcb7bc0590 "", len = -1771539208}, headers = {s = 0x0, len =
5506997}, port_no = 1424, proto = 47036, type = 32764, flags = (unknown: 3082552768),
transport = {
s = 0x7f3796424a10 "\267\001", len = -1771539208}, ttl = {s =
0x100000000 <error: Cannot access memory at address 0x100000000>, len =
-1756792081}, user_param = {
s = 0x770000006e <error: Cannot access memory at address 0x770000006e>,
len = 0}, maddr = {s = 0x7ffcb7bc0588 "\207\321T", len = 36888808}, method = {s
= 0x2328ee0 "\005", len = 36867552}, lr = {
s = 0x0, len = 36867552}, r2 = {s = 0x100000003 <error: Cannot access
memory at address 0x100000003>, len = -1212413984}, gr = {s = 0x3 <error: Cannot
access memory at address 0x3>, len = 0},
transport_val = {s = 0x200000001 <error: Cannot access memory at address
0x200000001>, len = -1212414576}, ttl_val = {s = 0x232dfc0 "Ѝ2\002", len =
0}, user_param_val = {s = 0x7f3796689366 "BYE",
len = 1}, maddr_val = {s = 0x32e0d0 <error: Cannot access memory at address
0x32e0d0>, len = -1756812511}, method_val = {s = 0x7ffcb7bc058c "", len = 0},
lr_val = {s = 0x7ffcb7bc0dc0 "\003",
len = -1771539208}, r2_val = {s = 0x7ffcb7bc0dc0 "\003", len =
-1212413760}, gr_val = {s = 0x0, len = 5558663}}
next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffcb7bc0590 "",
len = 9195950}, host = {s = 0x7f37966874f8 "\277T", len = -1212412480}, port =
{s = 0x7ffcb7bc08c0 "\001", len = 0}, params = {
s = 0xa92d04e4120c51ae <error: Cannot access memory at address
0xa92d04e4120c51ae>, len = 210129326}, sip_params = {s = 0x0, len = 0}, headers = {
s = 0x400000000 <error: Cannot access memory at address 0x400000000>,
len = 0}, port_no = 3, proto = 0, type = TEL_URI_T, flags = (URI_USER_NORMALIZE |
URI_SIP_USER_PHONE), transport = {s = 0x0,
len = 36867720}, ttl = {s = 0x1000001 <error: Cannot access memory at
address 0x1000001>, len = -1212414348}, user_param = {s = 0x2328de0 "", len =
1391525782}, maddr = {
s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len =
13913952}, method = {s = 0x239fb0 <error: Cannot access memory at address 0x239fb0>,
len = 2863264}, lr = {
s = 0x2bcbb8 <error: Cannot access memory at address 0x2bcbb8>, len =
-2002407168}, r2 = {s = 0x10e <error: Cannot access memory at address 0x10e>, len =
-1212413760}, gr = {
s = 0x7ffcb7bc0dc0 "\003", len = 4329872}, transport_val = {s = 0x8
<error: Cannot access memory at address 0x8>, len = -1771531328}, ttl_val = {
s = 0x100000000 <error: Cannot access memory at address 0x100000000>,
len = 36867904}, user_param_val = {s = 0x2328de0 "", len = 8}, maddr_val = {
s = 0x80 <error: Cannot access memory at address 0x80>, len =
-1756820986}, method_val = {s = 0x0, len = -2002407168}, lr_val = {s = 0x0, len =
-1774039800}, r2_val = {
s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len
= -1771539208}, gr_val = {s = 0x7ffcb7bc0dc0 "\003", len = -1212413760}}
u = 0x8
---Type <return> to continue, or q <return> to quit---
flags = 0
st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x1 <error: Cannot access
memory at address 0x1>, len = -1212414576}, re = 0x1}, avp = 0xa92d04e4008c51ae}
sct = 0x8
sjt = 0x8
mct = 0x0
rv = 0x7ffcb7bc0630
rv1 = 0x7f37966874f8
c1 = {cache_type = 3082539912, val_type = 32764, c = {avp_val = {n = -1212423248,
s = {s = 0x7ffcb7bbe3b0 "'\312W\226\067\177", len = -1212427344}, re =
0x7ffcb7bbe3b0}, pval = {rs = {
s = 0x7ffcb7bbe3b0 "'\312W\226\067\177", len = -1212427344},
ri = -1212414924, flags = 32764}}, i2s =
"\200\352\062\002\000\000\000\000\240\323*W7\177\000\000\b\000\000\000\000"}
s = {
s = 0x43b2fc <grp_hash_lookup+1420>
"1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200",
len = -1212414452}
srevp = {0x7f3796426198, 0x7f37966874f8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str = {s =
0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2,
select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len =
12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number =
139876723345328,
string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s =
0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr =
0x7f37966847b0, select = 0x7f37966847b0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}}
__FUNCTION__ = "do_action"
#14 0x00000000005407b5 in run_actions (h=0x1, a=0x7f37555a4e10, msg=0x7f37555a6420) at
action.c:1549
ret = 1
mod = 0x7f3796426198
__FUNCTION__ = "run_actions"
#15 0x0000000000542218 in do_action (h=0x7ffcb7bc0dc0, a=0x7f37964262c8,
msg=0x7f37966874f8) at action.c:1049
ret = 1
v = 1
dst = {send_sock = 0x7f37966874f8, to = {s = {sa_family = 34958, sa_data =
"\000U7\177\000\000\341\001\000\000\374\177\000"}, sin = {sin_family = 34958,
sin_port = 21760, sin_addr = {s_addr = 32567},
sin_zero = "\341\001\000\000\374\177\000"}, sin6 = {sin6_family =
34958, sin6_port = 21760, sin6_flowinfo = 32567, sin6_addr = {__in6_u = {
__u6_addr8 =
"\341\001\000\000\374\177\000\000\310@XW7\177\000", __u6_addr16 = {481, 0,
32764, 0, 16584, 22360, 32567, 0}, __u6_addr32 = {481, 32764, 1465401544, 32567}}},
sin6_scope_id = 2522107376}}, id = 32567, proto = -8 '\370',
send_flags = {f = 116 't', blst_imask = 104 'h'}}
end = 0x7f3796424d08 "\001"
uri = {user = {s = 0x7ffcb7bc0b6c "", len = -1212413516}, passwd = {s =
0x7f37563803c0 "\363T", len = 1465401264}, host = {s = 0x9 <error: Cannot
access memory at address 0x9>, len = 0}, port = {
s = 0x7f375539d330 "\260?XW7\177", len = 7895}, params = {s =
0x7ffcb7bc0b6c "", len = 5615623}, sip_params = {s = 0x1ed7 <error: Cannot
access memory at address 0x1ed7>, len = -2002407168},
headers = {s = 0x7f37575840c8 "\002", len = -1774255040}, port_no =
19952, proto = 38484, type = 32567, flags = (URI_SIP_USER_PHONE | unknown: 492), transport
= {s = 0x7f37966874f8 "\277T",
len = -1772487928}, ttl = {s = 0x7f37966874f8 "\277T", len =
1465401784}, user_param = {s = 0x0, len = -1}, maddr = {s = 0x7ffcb7bc0a00 "",
len = 1684820398}, method = {
s = 0x4 <error: Cannot access memory at address 0x4>, len = 10133176},
lr = {s = 0xa02840 <p_onsend> "", len = -1771539208}, r2 = {
s = 0xa92d04e414ec51ae <error: Cannot access memory at address
0xa92d04e414ec51ae>, len = 210129326}, gr = {s = 0x0, len = 0}, transport_val = {s =
0x7f37552a21f0 <tm_cfg> "\b\026[U7\177",
len = 5615623}, ttl_val = {s = 0x7ffcb7bc0b6c "", len =
-1212413244}, user_param_val = {s = 0x7f37552a21f0 <tm_cfg>
"\b\026[U7\177", len = 1}, maddr_val = {s = 0x7f3757583fb0
"0\323\071U7\177",
len = -1771539208}, method_val = {s = 0x1e1 <error: Cannot access memory at
address 0x1e1>, len = 1465401784}, lr_val = {s = 0x7f3757583fb0
"0\323\071U7\177", len = 5615623}, r2_val = {
s = 0x7f37572f3388 "\360\247\067U7\177", len = 1425852922}, gr_val =
{s = 0x0, len = 1426075181}}
next_hop = {user = {s = 0x1e1 <error: Cannot access memory at address
0x1e1>, len = -1212413072}, passwd = {s = 0x4 <error: Cannot access memory at
address 0x4>, len = -1771539208}, host = {
s = 0x1e1 <error: Cannot access memory at address 0x1e1>, len =
1465401784}, port = {s = 0x7f3757583fb0 "0\323\071U7\177", len = 1426115770},
params = {s = 0x0, len = 10498080}, sip_params = {
s = 0xa03028 <def_list+8> "", len = 10498096}, headers = {s =
0xa03038 <def_list+24> "", len = 10498120}, port_no = 10568, proto = 160,
type = ERROR_URI_T, flags = (unknown: 0), transport = {
s = 0x7f37963bbc80 <wr_buf>
"\027\003\001\004\060\375**.N\354\367\271\252ȴ\302\353\351\065Ә\364\342W\213$c\356'N\232پ\365\300\025\310\t\033e\222\345\204\067\351\344\026\304\033j\363j\203Ky\371\254\254n}\022}\255\224\066\017\256NmĦ\353\367\247\252\360\255\300\214)\002\016)\003\221\375o@\265{\273d\356K\245\031qh/J\326\305XQ\025e\363z\242&\342a\330\356o\330@\220\232]yvh\344\035&\331\327od\026\060\340!ˁ\217\200\031\vd\377\062TZ\357?\240\n\320g\307\033\030\317\334\326&Kɢ\002g\236*5A\335\356Lu\236\254\005\363\206\231Zվ\374\254\212\236\020\255\343\024\061\323\a\264H\263\340\245\021ni"...,
len = 395}, ttl = {
s = 0x400000000 <error: Cannot access memory at address 0x400000000>,
len = -1212416000}, user_param = {s = 0x0, len = 1391525782}, maddr = {
---Type <return> to continue, or q <return> to quit---
s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len =
13915544}, method = {s = 0x2399c0 <error: Cannot access memory at address 0x2399c0>,
len = -1212412940}, lr = {
s = 0x2bcb70 <error: Cannot access memory at address 0x2bcb70>, len =
-1212412924}, r2 = {s = 0x7f37966874f8 "\277T", len = 1391525782}, gr = {
s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len =
13916264}, transport_val = {s = 0x2396a8 <error: Cannot access memory at address
0x2396a8>, len = 2860952}, ttl_val = {
s = 0x2bcbb8 <error: Cannot access memory at address 0x2bcbb8>, len =
8}, user_param_val = {s = 0x118 <error: Cannot access memory at address 0x118>, len
= -2002407168}, maddr_val = {
s = 0x2ba798 <error: Cannot access memory at address 0x2ba798>, len =
6245668}, method_val = {s = 0x7f379659fb08 "\\\005", len = 6999923}, lr_val = {s
= 0x715640 <__FUNCTION__.7459> "parse_via",
len = 1465401264}, r2_val = {s = 0xa92d04e4090c51ae <error: Cannot access
memory at address 0xa92d04e4090c51ae>, len = -1212412780}, gr_val = {s = 0x0, len =
10139797}}
u = 0x7f3796424d08
flags = 32567
st = {flags = 481, id = 0, name = {n = -1212413072, s = {s = 0x7ffcb7bc0b70
"", len = 4}, re = 0x7ffcb7bc0b70}, avp = 0x7f37966874f8}
sct = 0x7f3796424d08
sjt = 0x7f3796424d08
mct = 0x0
rv = 0x1
rv1 = 0x7f37966874f8
c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val = {n =
1465401456, s = {s = 0x7f3757584070 "\341\001", len = 10485504}, re =
0x7f3757584070}, pval = {rs = {
s = 0x7f3757584070 "\341\001", len = 10485504}, ri = 4, flags =
1}}, i2s = "\000\v\274\267\374\177", '\000' <repeats 11 times>,
"\313;U7\177"}
s = {s = 0xa49900 <_pkg_root> "\313\030p", len = 4}
srevp = {0x7f37964262c8, 0x7f37966874f8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str = {s =
0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2,
select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len =
12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number =
139876723345328,
string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s =
0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr =
0x7f37966847b0, select = 0x7f37966847b0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}}
__FUNCTION__ = "do_action"
#16 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffcb7bc0dc0, a=0x7f37555a4e10,
a@entry=0x7f379641bdc8, msg=0x7f37555a6420, msg@entry=0x7f37966874f8) at action.c:1549
ret = 1
mod = 0x7f37964262c8
__FUNCTION__ = "run_actions"
#17 0x000000000054d225 in run_top_route (a=0x7f379641bdc8, msg=0x7f37966874f8,
c=<optimized out>) at action.c:1635
ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf =
{140723391040960, 6256744100537323950, 139876720819656, 139876723356920, 0, 0,
-6256338930008043090, 6256743653617062318},
__mask_was_saved = 0, __saved_mask = {__val = {10139797, 646,
139876723356920, 10139738, 10139648, 646, 139876723356920, 10139738, 10139648, 646,
2436122589503271168, 0, 139876723288072,
1073741825, 139875626353736, 139876723272936}}}}}
p = <optimized out>
ret = <optimized out>
sfbk = 0
#18 0x000000000055501e in receive_msg (buf=0x0, len=2523428088, rcv_info=0x7ffcb7bc10a0)
at receive.c:240
msg = 0x7f37966874f8
ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf =
{140723391041328, 6256744100537323950, 139876722383928, 139876723356920, 0, 0,
-6256338930008043090, 6256743653617062318},
__mask_was_saved = 0, __saved_mask = {__val = {10109832, 0, 140723391041718,
6, 1, 139876720639840, 139876745481671, 139874199928837, 0, 7048948, 139876737320808,
139876722179400,
140723391041588, 139876747609744, 139876722179400, 12}}}}}
inb = {
s = 0x9ab800 <buf> "BYE
sips:xxxxxx601@192.168.1.17:15077;alias=62.93.160.62~47967~3;transport=tls SIP/2.0\r\nVia:
SIP/2.0/UDP XX.XX.XX.53:5080;branch=z9hG4bK05a78335\r\nRoute:
<sip:XX.XX.XX.51;r2=on;lr;ftag=as485ea82a;d"..., len = 646}
netinfo = {data = {s = 0xffffffff <error: Cannot access memory at address
0xffffffff>, len = 2}, dst = 0x7f37973d8768, rcv = 0x7f3797da9000}
__FUNCTION__ = "receive_msg"
#19 0x0000000000467630 in udp_rcv_loop () at udp_server.c:495
len = 646
---Type <return> to continue, or q <return> to quit---
buf = "BYE
sips:xxxxxx601@192.168.1.17:15077;alias=62.93.160.62~47967~3;transport=tls SIP/2.0\r\nVia:
SIP/2.0/UDP XX.XX.XX.53:5080;branch=z9hG4bK05a78335\r\nRoute:
<sip:XX.XX.XX.51;r2=on;lr;ftag=as485ea82a;d"...
from = 0x7f3796567d48
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {890187705, 139875631917044}, addr32
= {890187705, 0, 1431988212, 32567}, addr16 = {12217, 13583, 0, 0, 26612, 21850, 32567,
0},
addr = "\271/\017\065\000\000\000\000\364gZU7\177\000"}}, dst_ip =
{af = 2, len = 4, u = {addrl = {856633273, 0}, addr32 = {856633273, 0, 0, 0}, addr16 =
{12217, 13071, 0, 0, 0, 0, 0, 0},
addr = "\271/\017\063", '\000' <repeats 11 times>}},
src_port = 5080, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s =
{sa_family = 2,
sa_data = "\023ع/\017\065\000\000\000\000\000\000\000"}, sin =
{sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 890187705}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 890187705, sin6_addr =
{__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0,
0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0,
0}}}, sin6_scope_id = 0}}, bind_address = 0x7f37963eff60, proto = 1
'\001'}
__FUNCTION__ = "udp_rcv_loop"
#20 0x00000000004eec99 in main_loop () at main.c:1614
si_desc = "udp receiver child=6
sock=XX.XX.XX.51:5060\000\000\000\000\000и^\226\067\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000]o_",
'\000' <repeats 14 times>,
"\261\245\210\226\330\316!\260\224\031\226\067\177\000\000\000\261\245\210\226\330\316!\b\022\245\000\000\000\000\000\004\000\000\000\000\000\000"
woneinit = 1
__FUNCTION__ = "main_loop"
#21 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631
cfg_stream = 0x0
r = 26162
tmp = 0x7ffcb7bc1ee4 ""
tmp_len = 0
port = 0
proto = -1747282480
ret = 0
seed = 810405613
debug_save = 0
debug_flag = 8
dont_fork_cnt = 0
st = {st_dev = 15, st_ino = 10167, st_nlink = 2, st_mode = 16832, st_uid = 108,
st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0,
st_atim = {tv_sec = 1492119111,
tv_nsec = 264028111}, st_mtim = {tv_sec = 1492495469, tv_nsec = 702131134},
st_ctim = {tv_sec = 1492495469, tv_nsec = 702131134}, __glibc_reserved = {0, 0, 0}}
__FUNCTION__ = "main"
(gdb) info locals
No locals.
(gdb) list
69 in ../../mem/../atomic/atomic_common.h
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1069#issuecomment-294722707