Another crash ....

gdb /usr/sbin/kamailio /tmp/core

GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
http://www.gnu.org/software/gdb/bugs/.
Find the GDB manual and other documentation resources online at:
http://www.gnu.org/software/gdb/documentation/.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/ff/dca0b3c4e5ce21804735c74ee480e9abd4c6a6.debug...done.
done.
[New LWP 26162]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by /usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/kamailio.'. Program terminated with signal SIGSEGV, Segmentation fault. #0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74 74 ../../mem/../atomic/atomic_common.h: No such file or directory. (gdb) bt full #0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74 No locals. #1 dlg_unref_helper (dlg=0x7f37572ad3a0, cnt=1, fname=0x6632 <error: Cannot access memory at address 0x6632>, fline=1650) at dlg_hash.c:925 mypid = 26162 d_entry = 0x7f453f1b2470 __FUNCTION__ = "dlg_unref_helper" #2 0x00007f374fb38e12 in dlg_run_event_route (dlg=0x7f37572ad3a0, msg=0x7f37966874f8, ostate=1431987232, nstate=1) at dlg_handlers.c:1650 rt = 10133176 bkroute = 1 __FUNCTION__ = "dlg_run_event_route" #3 0x00007f374fb3c21e in dlg_onroute (req=0x7f37966874f8, route_params=0x7f37555a4e10, param=0x7f37555a6420) at dlg_handlers.c:1318 dlg0 = 0x6632 val = { s = 0x9ab8cb <buf+203> "bb6.e74;nat=yes>,<sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxx"..., len = 7} callid = { s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50} ftag = { s = 0x9ab97a <buf+378> "as485ea82a\r\nTo: <sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: No"..., len = 10} ttag = { s = 0x9ab9ba <buf+442> "45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0"..., len = 8} new_state = 5 old_state = 4 unref = 1 event = 7 dir = 1 ret = 26162 __FUNCTION__ = "dlg_onroute" #4 0x00007f375241628d in run_rr_callbacks (req=0x7f37966874f8, rr_param=0x7ffcb7bbf3d0) at rr_cb.c:96 l_param = { s = 0x9ab8ae <buf+174> "r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>,<sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;"..., len = 44} cbp = 0x7f379667a2b8 __FUNCTION__ = "run_rr_callbacks" #5 0x00007f37524088a2 in after_loose (_m=0x7f37966874f8, preloaded=2) at loose.c:928 puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x9ab8e1 <buf+225> "XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601@customers.xxxx"..., len = 12}, port = { s = 0x9ab8ee <buf+238> "5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601@customers.xxxxxxxxxxx.com>;"..., len = 4}, params = { s = 0x9ab8f3 <buf+243> "transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=4"..., len = 58}, sip_params = { s = 0x9ab8f3 <buf+243> "transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=4"..., len = 58}, headers = {s = 0x0, len = 0}, port_no = 5061, proto = 3, type = SIP_URI_T, flags = (unknown: 0), transport = { s = 0x9ab8f3 <buf+243> "transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=4"..., len = 13}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = { ---Type <return> to continue, or q <return> to quit--- s = 0x9ab907 <buf+263> "lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID: 47"..., len = 2}, r2 = { s = 0x9ab901 <buf+257> "r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-"..., len = 5}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x9ab8fd <buf+253> "tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nC"..., len = 3}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = { s = 0x9ab904 <buf+260> "on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID:"..., len = 2}, gr_val = {s = 0x0, len = 0}} lecom.com>;tag=45248699\r\nCall-ID:"..., len = 2}, gr_val = {s = 0x0, len = 0}} rt = 0x0 status = 26162 uri = { s = 0x9ab89d <buf+157> "sip:XX.XX.XX.51;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>,<sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@18"..., len = 61} use_ob = 0 rparams = { s = 0x9ab8ae <buf+174> "r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>,<sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX@XX.XX.XX.53:5080>;"..., len = 44} __FUNCTION__ = "after_loose" #6 0x0000000000541cf0 in do_action (h=0x7ffcb7bbfaf0, a=0x7f37964bfd98, msg=0x7f37966874f8) at action.c:1060 ret = -5 v = 25 dst = {send_sock = 0x7ffcb7bbf640, to = {s = {sa_family = 1215, sa_data = "B\000\000\000\000\000\370\227h\226\067\177\000"}, sin = {sin_family = 1215, sin_port = 66, sin_addr = {s_addr = 0}, sin_zero = "\370\227h\226\067\177\000"}, sin6 = {sin6_family = 1215, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = "\370\227h\226\067\177\000\000\273\065B\000\000\000\000", __u6_addr16 = {38904, 38504, 32567, 0, 13755, 66, 0, 0}, __u6_addr32 = {2523437048, 32567, 4339131, 0}}}, sin6_scope_id = 36286432}}, id = 0, proto = 10 '\n', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7ffcb7bbfaf0 "\001" uri = {user = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13913760}, passwd = {s = 0x23a070 <error: Cannot access memory at address 0x23a070>, len = -1212418316}, host = { s = 0x2bcbb8 <error: Cannot access memory at address 0x2bcbb8>, len = 1462424480}, port = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, params = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776}, sip_params = {s = 0x7ffcb7bbf820 "z\271\232", len = 5615623}, headers = {s = 0x0, len = -2002407168}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 1337012136), transport = {s = 0x7ffcb7bbf810 "\315\271\232", len = -1212418036}, ttl = { s = 0x7f3700000000 <error: Cannot access memory at address 0x7f3700000000>, len = 1431825776}, user_param = { s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}, maddr = {s = 0x6bb01000000 <error: Cannot access memory at address 0x6bb01000000>, len = 13914448}, method = { s = 0x239dc0 <error: Cannot access memory at address 0x239dc0>, len = -1212418032}, lr = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 10140157}, r2 = { s = 0x4f7f4 <error: Cannot access memory at address 0x4f7f4>, len = 1}, gr = {s = 0x635f1 <error: Cannot access memory at address 0x635f1>, len = -1212418092}, transport_val = {s = 0x0, len = 1462424480}, ttl_val = {s = 0x7f375557ed70 "", len = 26162}, user_param_val = {s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, maddr_val = {s = 0x7f375557ed84 "", len = 5615623}, method_val = { s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: <sip:601@customers.xxxxxxxxxxx.com:5061>;tag=as3e9ce588\r\nTo: <sip:xxxxxx620@custo"..., len = -2002407168}, lr_val = {s = 0x7f3755b74078 "\t", len = 1337065181}, r2_val = {s = 0x0, len = -2002407168}, gr_val = {s = 0x0, len = 1337417873}} next_hop = {user = { s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}, passwd = { s = 0x9ab97a <buf+378> "as485ea82a\r\nTo: <sip:xxxxxx601@customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: No"..., len = 10}, host = { s = 0x9ab9ba <buf+442> "45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0"..., len = 1462424480}, port = {s = 0x0, len = -2002407168}, params = {s = 0x0, len = -1773448560}, sip_params = {s = 0x7f37966874f8 "\277T", len = -1212417664}, headers = { s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: <sip:601@customers.xxxxxxxxxxx.com:5061>;tag=as3e9ce588\r\ ---Type <return> to continue, or q <return> to quit--- nTo: <sip:xxxxxx620@custo"..., len = 1431770624}, port_no = 16504, proto = 21943, type = 32567, flags = (URI_USER_NORMALIZE | unknown: 1337423684), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x7f37963e7a78 "1", len = 1}, method = {s = 0x0, len = -2002407168}, lr = {s = 0x67964f8c90 <error: Cannot access memory at address 0x67964f8c90>, len = -1773448584}, r2 = {s = 0x7ffcb7bbf980 "", len = -1771539208}, gr = {s = 0x7ffcb7bc0dc0 "\003", len = -1212417196}, transport_val = {s = 0x0, len = 5795166}, ttl_val = { s = 0x7ffcb7bbfb54 "\001", len = -1212412480}, user_param_val = {s = 0x7f37966874f8 "\277T", len = -1212412480}, maddr_val = {s = 0x7ffcb7bbfb54 "\001", len = 4329797}, method_val = { s = 0xa00000000 <error: Cannot access memory at address 0xa00000000>, len = 1462424480}, lr_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, r2_val = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776}, gr_val = {s = 0x0, len = 0}} u = 0x7ffcb7bbfaf0 flags = 0 st = {flags = 10140109, id = 0, name = {n = 50, s = {s = 0x32 <error: Cannot access memory at address 0x32>, len = 10140026}, re = 0x32}, avp = 0xa} sct = 0x7ffcb7bbfaf0 sjt = 0x7ffcb7bbfaf0 mct = 0x0 rv = 0x7f37966874f8 rv1 = 0x7f37966874f8 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = -1212417832}, re = 0x0}, pval = {rs = {s = 0x0, len = -1212417832}, ri = -1212417864, flags = 32764}}, i2s = "\330\370\273\267\374\177\000\000\304\366\273\267\374\177\000\000\270\313+\000\000"} s = {s = 0x7ffcb7bc0dc0 "\003", len = -1212417040} srevp = {0x7f37964bfd98, 0x7f37966874f8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 139876723345328, string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s = 0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr = 0x7f37966847b0, select = 0x7f37966847b0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #7 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffcb7bbfaf0, a=0x7f37555a4e10, msg=0x7f37555a6420) at action.c:1549 ret = -1212412480 mod = 0x7f37964bfd98 __FUNCTION__ = "run_actions" #8 0x000000000054d187 in run_actions_safe (h=0x7ffcb7bc0dc0, a=<optimized out>, msg=<optimized out>) at action.c:1614 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140723391036144, -6256338930039500370, 139876723356920, 140723391040960, 140723391036960, 0, -6256338896078220882, 6256743653617062318}, __mask_was_saved = 0, __saved_mask = {__val = {2436122589503271168, 4294967565, 139876721732288, 139876720589288, 139874199928833, 0, 2436122589503271168, 0, 139876722008400, 140723391036448, 139876723356920, 140723391040960, 140723391036960, 0, 5795166, 140723391036960}}}}} ret = <optimized out> ign_on_break = 0 #9 0x0000000000421190 in rval_get_int (h=0x7ffcb7bc0dc0, msg=0x1, i=0x7ffcb7bbfe20, rv=0x3d4, cache=0x67) at rvalue.c:912 r_avp = 0x6632 avp_val = {n = 266, s = {s = 0x10a <error: Cannot access memory at address 0x10a>, len = -1772630408}, re = 0x10a} pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0} tmp = {s = 0xa49900 <_pkg_root> "\313\030p", len = -1773840408} s = 0x7f37966874f8 r = 26162 ret = 26162 destroy_pval = -1212412480 __FUNCTION__ = "rval_get_int" #10 0x0000000000426f1c in rval_expr_eval_int (h=0x7ffcb7bc0dc0, msg=0x7f37966874f8, res=0x7ffcb7bbfe20, rve=0x7f37964bf230) at rvalue.c:1910 i1 = 0 i2 = 0 ---Type <return> to continue, or q <return> to quit--- ret = -1 c1 = {cache_type = 3082554816, val_type = 32764, c = {avp_val = {n = 0, s = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -1773234896}, re = 0x300000000}, pval = {rs = { s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -1773234896}, ri = -1771539208, flags = 32567}}, i2s = "\000\000\000\000\004\000\000\000g\306\037P7\177\000\000\323x=\226\067\177"} c2 = {cache_type = 2520886432, val_type = 32567, c = {avp_val = {n = 5799339, s = {s = 0x587dab <pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\323 B", len = 10139993}, re = 0x587dab <pv_printf+267>}, pval = {rs = {s = 0x587dab <pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\323 B", len = 10139993}, ri = 9, flags = 0}}, i2s = "x\316W\226\067\177\000\000\000\261\245\210\226\330\316!\001\000\000\000\000"} rv1 = 0x7f37966874f8 rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" #11 0x00000000005421c7 in do_action (h=0x7ffcb7bc0dc0, a=0x7f37964c6300, msg=0x7f37966874f8) at action.c:1030 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 45312, sa_data = "\245\210\226\330\316!\370th\226\067\177\000"}, sin = {sin_family = 45312, sin_port = 34981, sin_addr = {s_addr = 567203990}, sin_zero = "\370th\226\067\177\000"}, sin6 = {sin6_family = 45312, sin6_port = 34981, sin6_flowinfo = 567203990, sin6_addr = {__in6_u = { __u6_addr8 = "\370th\226\067\177\000\000\221\267O7\177\000", __u6_addr16 = {29944, 38504, 32567, 0, 24721, 20407, 32567, 0}, __u6_addr32 = {2523428088, 32567, 1337417873, 32567}}},
sin6_scope_id = 10140109}}, id = 0, proto = 50 '2', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
end = 0x7f37964bf230 "\001"
uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776}, passwd = {s = 0x7ffcb7bc0010 "z\271\232", len = 5615623}, host = {s = 0x0, len = -2002407168}, port = {s = 0x0,
len = 1337012137}, params = {s = 0x7ffcb7bc0000 "\315\271\232", len = -1212416004}, sip_params = {s = 0x7ffc00000000 <error: Cannot access memory at address 0x7ffc00000000>, len = 1431825776},
headers = {
s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}, port_no = 64, proto = 47036, type = 1723, flags = (URI_SIP_USER_PHONE | unknown: 210129324), transport = {s = 0x7f3796537350 "\224\004", len = -1212416000}, ttl = {
s = 0x30 <error: Cannot access memory at address 0x30>, len = 10140157}, user_param = {s = 0x4f7f4 <error: Cannot access memory at address 0x4f7f4>, len = 1}, maddr = {
s = 0x635f1 <error: Cannot access memory at address 0x635f1>, len = -1212416060}, method = {s = 0x7f3796553930 "\001", len = 1462424480}, lr = {s = 0x7f375557ed70 "", len = 26162}, r2 = {
s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, gr = {s = 0x7f375557ed84 "", len = 5615623}, transport_val = {
s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: sip:601@customers.xxxxxxxxxxx.com:5061;tag=as3e9ce588\r\nTo: <sip:xxxxxx620@custo"..., len = -2002407168}, ttl_val = {s = 0x7f37559e7178 "\b\220\325U7\177", len = 1337065181}, user_param_val = {s = 0x7ffcb7bc0dc0 "\003", len = -2002407168}, maddr_val = {
s = 0x28ac9 <error: Cannot access memory at address 0x28ac9>, len = 1337417873}, method_val = {
s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}, lr_val = {
s = 0x9ab97a <buf+378> "as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: No"..., len = 10}, r2_val = {
s = 0x9ab9ba <buf+442> "45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-Han
gupCauseCode: 16\r\nContent-Length: 0"..., len = 1462424480}, gr_val = {s = 0x0, len = -2002407168}}
next_hop = {user = {s = 0x0, len = -1774037616}, passwd = {s = 0x7f37966874f8 "\277T", len = -1212415632}, host = {
s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: sip:601@customers.xxxxxxxxxxx.com:5061;tag=as3e9ce588\r\nTo: <sip:xxxxxx620@custo"..., len = 1431770624}, port = {s = 0x7f37559e7178 "\b\220\325U7\177", len = 1337423685}, params = {
s = 0xa92d04ebe56c51ae <error: Cannot access memory at address 0xa92d04ebe56c51ae>, len = 210129326}, sip_params = {s = 0x0, len = 37}, headers = {
s = 0x9ab963 <buf+355> "XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-A"..., len = -1772799688}, port_no = 23088, proto = 38462, type = 32567, flags = URI_USER_NORMALIZE, transport = {s = 0x0, len = -2002407168}, ttl = {s = 0x0,
len = -1774037640}, user_param = {s = 0x7ffcb7bc0170 "", len = -1771539208}, maddr = {s = 0x7ffcb7bc0dc0 "\003", len = -1212415120}, method = {s = 0x0, len = 5795166}, lr = {s = 0x7ffcb7bc0370 "",
len = -1212412480}, r2 = {s = 0x7f37966874f8 "\277T", len = -1212412480}, gr = {s = 0x7ffcb7bc0370 "", len = 4329797}, transport_val = {s = 0x0, len = 1441022624}, ttl_val = {s = 0x7f379641bff0 "",
len = -2002407168}, user_param_val = {s = 0x7ffcb7bc02b0 "\310\003", len = -1772698632}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = -2002407168}, lr_val = {s = 0x0,
len = -1774037656}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1771539208}, gr_val = {s = 0x7ffcb7bc0dc0 "\003", len = -1212415120}}
u = 0x7f37964bf230
flags = 32567
st = {flags = 0, id = 0, name = {n = -1774037616, s = {s = 0x7f3796425590 "", len = -1771539208}, re = 0x7f3796425590}, avp = 0x7ffcb7bc0170}
sct = 0x7f37964bf230
---Type to continue, or q to quit---
sjt = 0x7f37964bf230
mct = 0x0
rv = 0x55b007 <get_debug_level+103>
rv1 = 0x7f37966874f8
c1 = {cache_type = 10140026, val_type = RV_NONE, c = {avp_val = {n = 10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len = 10140090}, re = 0xa}, pval = {rs = {
s = 0xa <error: Cannot access memory at address 0xa>, len = 10140090}, ri = -1212416284, flags = 32764}}, i2s = "\000\000\000\000\000\000\000\000\240\323W7\177\000\000\b\000\000\000\000"}
s = {
s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: sip:601@customers.xxxxxxxxxxx.com:5061;tag=as3e9ce588\r\nTo: <sip:xxxxxx620@custo"..., len = -2002407168}
srevp = {0x7f37964c6300, 0x7f37966874f8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 139876723345328,
string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s = 0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr = 0x7f37966847b0, select = 0x7f37966847b0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
FUNCTION = "do_action"
#12 0x00000000005407b5 in run_actions (h=0x1, a=0x7f37555a4e10, msg=0x7f37555a6420) at action.c:1549
ret = 1
mod = 0x7f37964c6300
FUNCTION = "run_actions"
#13 0x00000000005423e0 in do_action (h=0x7ffcb7bc0dc0, a=0x7f3796668250, msg=0x7f37966874f8) at action.c:678
ret = -5
v = 0
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\070o\321U7\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "8o\321U7\177\000"},
sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "8o\321U7\177\000\000\230\332>\227\067\177\000", __u6_addr16 = {28472, 21969, 32567, 0, 55960, 38718,
32567, 0}, __u6_addr32 = {1439788856, 32567, 2537478808, 32567}}}, sin6_scope_id = 528}}, id = 0, proto = -112 '\220', send_flags = {f = 211 '\323', blst_imask = 187 '\273'}}
end = 0x8 <error: Cannot access memory at address 0x8>
uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776}, passwd = {s = 0x7ffcb7bc0560 "\300\r\274\267\374\177", len = 5615623}, host = {
s = 0x100000002 <error: Cannot access memory at address 0x100000002>, len = -2002407168}, port = {s = 0x0, len = -1774040560}, params = {s = 0x7ffcb7bc0dc0 "\003", len = -5}, sip_params = {
s = 0x7ffcb7bc0590 "", len = -1771539208}, headers = {s = 0x0, len = 5506997}, port_no = 1424, proto = 47036, type = 32764, flags = (unknown: 3082552768), transport = {
s = 0x7f3796424a10 "\267\001", len = -1771539208}, ttl = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1756792081}, user_param = {
s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, len = 0}, maddr = {s = 0x7ffcb7bc0588 "\207\321T", len = 36888808}, method = {s = 0x2328ee0 "\005", len = 36867552}, lr = {
s = 0x0, len = 36867552}, r2 = {s = 0x100000003 <error: Cannot access memory at address 0x100000003>, len = -1212413984}, gr = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0},
transport_val = {s = 0x200000001 <error: Cannot access memory at address 0x200000001>, len = -1212414576}, ttl_val = {s = 0x232dfc0 "Ѝ2\002", len = 0}, user_param_val = {s = 0x7f3796689366 "BYE",
len = 1}, maddr_val = {s = 0x32e0d0 <error: Cannot access memory at address 0x32e0d0>, len = -1756812511}, method_val = {s = 0x7ffcb7bc058c "", len = 0}, lr_val = {s = 0x7ffcb7bc0dc0 "\003",
len = -1771539208}, r2_val = {s = 0x7ffcb7bc0dc0 "\003", len = -1212413760}, gr_val = {s = 0x0, len = 5558663}}
next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffcb7bc0590 "", len = 9195950}, host = {s = 0x7f37966874f8 "\277T", len = -1212412480}, port = {s = 0x7ffcb7bc08c0 "\001", len = 0}, params = {
s = 0xa92d04e4120c51ae <error: Cannot access memory at address 0xa92d04e4120c51ae>, len = 210129326}, sip_params = {s = 0x0, len = 0}, headers = {
s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, port_no = 3, proto = 0, type = TEL_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = {s = 0x0,
len = 36867720}, ttl = {s = 0x1000001 <error: Cannot access memory at address 0x1000001>, len = -1212414348}, user_param = {s = 0x2328de0 "", len = 1391525782}, maddr = {
s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13913952}, method = {s = 0x239fb0 <error: Cannot access memory at address 0x239fb0>, len = 2863264}, lr = {
s = 0x2bcbb8 <error: Cannot access memory at address 0x2bcbb8>, len = -2002407168}, r2 = {s = 0x10e <error: Cannot access memory at address 0x10e>, len = -1212413760}, gr = {
s = 0x7ffcb7bc0dc0 "\003", len = 4329872}, transport_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = -1771531328}, ttl_val = {
s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 36867904}, user_param_val = {s = 0x2328de0 "", len = 8}, maddr_val = {
s = 0x80 <error: Cannot access memory at address 0x80>, len = -1756820986}, method_val = {s = 0x0, len = -2002407168}, lr_val = {s = 0x0, len = -1774039800}, r2_val = {
s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1771539208}, gr_val = {s = 0x7ffcb7bc0dc0 "\003", len = -1212413760}}
u = 0x8
---Type to continue, or q to quit---
flags = 0
st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1212414576}, re = 0x1}, avp = 0xa92d04e4008c51ae}
sct = 0x8
sjt = 0x8
mct = 0x0
rv = 0x7ffcb7bc0630
rv1 = 0x7f37966874f8
c1 = {cache_type = 3082539912, val_type = 32764, c = {avp_val = {n = -1212423248, s = {s = 0x7ffcb7bbe3b0 "'\312W\226\067\177", len = -1212427344}, re = 0x7ffcb7bbe3b0}, pval = {rs = {
s = 0x7ffcb7bbe3b0 "'\312W\226\067\177", len = -1212427344}, ri = -1212414924, flags = 32764}}, i2s = "\200\352\062\002\000\000\000\000\240\323
W7\177\000\000\b\000\000\000\000"}
s = {
s = 0x43b2fc <grp_hash_lookup+1420> "1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200", len = -1212414452}
srevp = {0x7f3796426198, 0x7f37966874f8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 139876723345328,
string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s = 0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr = 0x7f37966847b0, select = 0x7f37966847b0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
FUNCTION = "do_action"
#14 0x00000000005407b5 in run_actions (h=0x1, a=0x7f37555a4e10, msg=0x7f37555a6420) at action.c:1549
ret = 1
mod = 0x7f3796426198
FUNCTION = "run_actions"
#15 0x0000000000542218 in do_action (h=0x7ffcb7bc0dc0, a=0x7f37964262c8, msg=0x7f37966874f8) at action.c:1049
ret = 1
v = 1
dst = {send_sock = 0x7f37966874f8, to = {s = {sa_family = 34958, sa_data = "\000U7\177\000\000\341\001\000\000\374\177\000"}, sin = {sin_family = 34958, sin_port = 21760, sin_addr = {s_addr = 32567},
sin_zero = "\341\001\000\000\374\177\000"}, sin6 = {sin6_family = 34958, sin6_port = 21760, sin6_flowinfo = 32567, sin6_addr = {__in6_u = {
__u6_addr8 = "\341\001\000\000\374\177\000\000\310@XW7\177\000", __u6_addr16 = {481, 0, 32764, 0, 16584, 22360, 32567, 0}, __u6_addr32 = {481, 32764, 1465401544, 32567}}},
sin6_scope_id = 2522107376}}, id = 32567, proto = -8 '\370', send_flags = {f = 116 't', blst_imask = 104 'h'}}
end = 0x7f3796424d08 "\001"
uri = {user = {s = 0x7ffcb7bc0b6c "", len = -1212413516}, passwd = {s = 0x7f37563803c0 "\363T", len = 1465401264}, host = {s = 0x9 <error: Cannot access memory at address 0x9>, len = 0}, port = {
s = 0x7f375539d330 "\260?XW7\177", len = 7895}, params = {s = 0x7ffcb7bc0b6c "", len = 5615623}, sip_params = {s = 0x1ed7 <error: Cannot access memory at address 0x1ed7>, len = -2002407168},
headers = {s = 0x7f37575840c8 "\002", len = -1774255040}, port_no = 19952, proto = 38484, type = 32567, flags = (URI_SIP_USER_PHONE | unknown: 492), transport = {s = 0x7f37966874f8 "\277T",
len = -1772487928}, ttl = {s = 0x7f37966874f8 "\277T", len = 1465401784}, user_param = {s = 0x0, len = -1}, maddr = {s = 0x7ffcb7bc0a00 "", len = 1684820398}, method = {
s = 0x4 <error: Cannot access memory at address 0x4>, len = 10133176}, lr = {s = 0xa02840 <p_onsend> "", len = -1771539208}, r2 = {
s = 0xa92d04e414ec51ae <error: Cannot access memory at address 0xa92d04e414ec51ae>, len = 210129326}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7f37552a21f0 <tm_cfg> "\b\026[U7\177",
len = 5615623}, ttl_val = {s = 0x7ffcb7bc0b6c "", len = -1212413244}, user_param_val = {s = 0x7f37552a21f0 <tm_cfg> "\b\026[U7\177", len = 1}, maddr_val = {s = 0x7f3757583fb0 "0\323\071U7\177",
len = -1771539208}, method_val = {s = 0x1e1 <error: Cannot access memory at address 0x1e1>, len = 1465401784}, lr_val = {s = 0x7f3757583fb0 "0\323\071U7\177", len = 5615623}, r2_val = {
s = 0x7f37572f3388 "\360\247\067U7\177", len = 1425852922}, gr_val = {s = 0x0, len = 1426075181}}
next_hop = {user = {s = 0x1e1 <error: Cannot access memory at address 0x1e1>, len = -1212413072}, passwd = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -1771539208}, host = {
s = 0x1e1 <error: Cannot access memory at address 0x1e1>, len = 1465401784}, port = {s = 0x7f3757583fb0 "0\323\071U7\177", len = 1426115770}, params = {s = 0x0, len = 10498080}, sip_params = {
s = 0xa03028 <def_list+8> "", len = 10498096}, headers = {s = 0xa03038 <def_list+24> "", len = 10498120}, port_no = 10568, proto = 160, type = ERROR_URI_T, flags = (unknown: 0), transport = {
s = 0x7f37963bbc80 <wr_buf> "\027\003\001\004\060\375**.N\354\367\271\252ȴ\302\353\351\065Ә\364\342W\213$c\356'N\232پ\365\300\025\310\t\033e\222\345\204\067\351\344\026\304\033j\363j\203Ky\371\254\254n}\022}\255\224\066\017\256NmĦ\353\367\247\252\360\255\300\214)\002\016)\003\221\375o@\265{\273d\356K\245\031qh/J\326\305XQ\025e\363z\242&\342a\330\356o\330@\220\232]yvh\344\035&\331\327od\026\060\340!ˁ\217\200\031\vd\377\062TZ\357?\240\n\320g\307\033\030\317\334\326&Kɢ\002g\236*5A\335\356Lu\236\254\005\363\206\231Zվ\374\254\212\236\020\255\343\024\061\323\a\264H\263\340\245\021ni"..., len = 395}, ttl = {
s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1212416000}, user_param = {s = 0x0, len = 1391525782}, maddr = {
---Type to continue, or q to quit---
s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13915544}, method = {s = 0x2399c0 <error: Cannot access memory at address 0x2399c0>, len = -1212412940}, lr = {
s = 0x2bcb70 <error: Cannot access memory at address 0x2bcb70>, len = -1212412924}, r2 = {s = 0x7f37966874f8 "\277T", len = 1391525782}, gr = {
s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13916264}, transport_val = {s = 0x2396a8 <error: Cannot access memory at address 0x2396a8>, len = 2860952}, ttl_val = {
s = 0x2bcbb8 <error: Cannot access memory at address 0x2bcbb8>, len = 8}, user_param_val = {s = 0x118 <error: Cannot access memory at address 0x118>, len = -2002407168}, maddr_val = {
s = 0x2ba798 <error: Cannot access memory at address 0x2ba798>, len = 6245668}, method_val = {s = 0x7f379659fb08 "\\005", len = 6999923}, lr_val = {s = 0x715640 <FUNCTION.7459> "parse_via",
len = 1465401264}, r2_val = {s = 0xa92d04e4090c51ae <error: Cannot access memory at address 0xa92d04e4090c51ae>, len = -1212412780}, gr_val = {s = 0x0, len = 10139797}}
u = 0x7f3796424d08
flags = 32567
st = {flags = 481, id = 0, name = {n = -1212413072, s = {s = 0x7ffcb7bc0b70 "", len = 4}, re = 0x7ffcb7bc0b70}, avp = 0x7f37966874f8}
sct = 0x7f3796424d08
sjt = 0x7f3796424d08
mct = 0x0
rv = 0x1
rv1 = 0x7f37966874f8
c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val = {n = 1465401456, s = {s = 0x7f3757584070 "\341\001", len = 10485504}, re = 0x7f3757584070}, pval = {rs = {
s = 0x7f3757584070 "\341\001", len = 10485504}, ri = 4, flags = 1}}, i2s = "\000\v\274\267\374\177", '\000' <repeats 11 times>, "\313;U7\177"}
s = {s = 0xa49900 <_pkg_root> "\313\030p", len = 4}
srevp = {0x7f37964262c8, 0x7f37966874f8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 139876723345328,
string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s = 0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr = 0x7f37966847b0, select = 0x7f37966847b0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
FUNCTION = "do_action"
#16 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffcb7bc0dc0, a=0x7f37555a4e10, a@entry=0x7f379641bdc8, msg=0x7f37555a6420, msg@entry=0x7f37966874f8) at action.c:1549
ret = 1
mod = 0x7f37964262c8
FUNCTION = "run_actions"
#17 0x000000000054d225 in run_top_route (a=0x7f379641bdc8, msg=0x7f37966874f8, c=) at action.c:1635
ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140723391040960, 6256744100537323950, 139876720819656, 139876723356920, 0, 0, -6256338930008043090, 6256743653617062318},
__mask_was_saved = 0, __saved_mask = {__val = {10139797, 646, 139876723356920, 10139738, 10139648, 646, 139876723356920, 10139738, 10139648, 646, 2436122589503271168, 0, 139876723288072,
1073741825, 139875626353736, 139876723272936}}}}}
p =
ret =
sfbk = 0
#18 0x000000000055501e in receive_msg (buf=0x0, len=2523428088, rcv_info=0x7ffcb7bc10a0) at receive.c:240
msg = 0x7f37966874f8
ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140723391041328, 6256744100537323950, 139876722383928, 139876723356920, 0, 0, -6256338930008043090, 6256743653617062318},
__mask_was_saved = 0, __saved_mask = {__val = {10109832, 0, 140723391041718, 6, 1, 139876720639840, 139876745481671, 139874199928837, 0, 7048948, 139876737320808, 139876722179400,
140723391041588, 139876747609744, 139876722179400, 12}}}}}
inb = {
s = 0x9ab800 "BYE sips:xxxxxx601@192.168.1.17:15077;alias=62.93.160.62479673;transport=tls SIP/2.0\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;branch=z9hG4bK05a78335\r\nRoute: <sip:XX.XX.XX.51;r2=on;lr;ftag=as485ea82a;d"..., len = 646}
netinfo = {data = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 2}, dst = 0x7f37973d8768, rcv = 0x7f3797da9000}
FUNCTION = "receive_msg"
#19 0x0000000000467630 in udp_rcv_loop () at udp_server.c:495
len = 646
---Type to continue, or q to quit---
buf = "BYE sips:xxxxxx601@192.168.1.17:15077;alias=62.93.160.62479673;transport=tls SIP/2.0\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;branch=z9hG4bK05a78335\r\nRoute: <sip:XX.XX.XX.51;r2=on;lr;ftag=as485ea82a;d"...
from = 0x7f3796567d48
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {890187705, 139875631917044}, addr32 = {890187705, 0, 1431988212, 32567}, addr16 = {12217, 13583, 0, 0, 26612, 21850, 32567, 0},
addr = "\271/\017\065\000\000\000\000\364gZU7\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {856633273, 0}, addr32 = {856633273, 0, 0, 0}, addr16 = {12217, 13071, 0, 0, 0, 0, 0, 0},
addr = "\271/\017\063", '\000' <repeats 11 times>}}, src_port = 5080, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2,
sa_data = "\023ع/\017\065\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 890187705}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 890187705, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, _u6_addr32 = {0, 0, 0,
0}}}, sin6_scope_id = 0}}, bind_address = 0x7f37963eff60, proto = 1 '\001'}
FUNCTION = "udp_rcv_loop"
#20 0x00000000004eec99 in main_loop () at main.c:1614
si_desc = "udp receiver child=6 sock=XX.XX.XX.51:5060\000\000\000\000\000и^\226\067\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000]o
", '\000' <repeats 14 times>, "\261\245\210\226\330\316!\260\224\031\226\067\177\000\000\000\261\245\210\226\330\316!\b\022\245\000\000\000\000\000\004\000\000\000\000\000\000"
woneinit = 1
FUNCTION = "main_loop"
#21 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631
cfg_stream = 0x0
r = 26162
tmp = 0x7ffcb7bc1ee4 ""
tmp_len = 0
port = 0
proto = -1747282480
ret = 0
seed = 810405613
debug_save = 0
debug_flag = 8
dont_fork_cnt = 0
st = {st_dev = 15, st_ino = 10167, st_nlink = 2, st_mode = 16832, st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1492119111,
tv_nsec = 264028111}, st_mtim = {tv_sec = 1492495469, tv_nsec = 702131134}, st_ctim = {tv_sec = 1492495469, tv_nsec = 702131134}, __glibc_reserved = {0, 0, 0}}
FUNCTION = "main"
(gdb) info locals
No locals.
(gdb) list
69 in ../../mem/../atomic/atomic_common.h


You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.