Here is another "backtrace full" log.
On Thursday, July 9, 2015 5:21 PM, Victor Seva notifications@github.com wrote:
yes, thanks— Reply to this email directly or view it on GitHub.
GNU gdb (GDB) Red Hat Enterprise Linux (7.2-75.el6) Copyright (C) 2010 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-redhat-linux-gnu". For bug reporting instructions, please see: http://www.gnu.org/software/gdb/bugs/... Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/usr/sbin/kamailio.debug...done. done. (gdb) run -P /var/run/kamailio.pid -m 64 -M 8 -u kamailio -g kamailio -D Starting program: /usr/sbin/kamailio -P /var/run/kamailio.pid -m 64 -M 8 -u kamailio -g kamailio -D [Thread debugging using libthread_db enabled] WARNING: no fork mode Detaching after fork from child process 4052. Detaching after fork from child process 4053. Detaching after fork from child process 4054. Detaching after fork from child process 4055. loading modules under config path: /usr/lib64/kamailio/modules/ Listening on udp: 1.2.3.4:5060 Aliases: udp: kamailiohost:5060
Program received signal SIGABRT, Aborted. 0x00007ffff765d625 in raise () from /lib64/libc.so.6 Missing separate debuginfos, use: debuginfo-install MariaDB-compat-5.5.39-1.el6.x86_64 glibc-2.12-1.149.el6_6.5.x86_64 keyutils-libs-1.4-5.el6.x86_64 krb5-libs-1.10.3-33.el6.x86_64 libcom_err-1.41.12-21.el6.x86_64 libselinux-2.0.94-5.8.el6.x86_64 nss-softokn-freebl-3.14.3-19.el6_6.x86_64 openssl-1.0.1e-30.el6_6.5.x86_64 sssd-client-1.11.6-30.el6_6.3.x86_64 zlib-1.2.3-29.el6.x86_64 (gdb) backtrace full #0 0x00007ffff765d625 in raise () from /lib64/libc.so.6 No symbol table info available. #1 0x00007ffff765ee05 in abort () from /lib64/libc.so.6 No symbol table info available. #2 0x000000000044fcee in free_lump (lmp=0x7ffff6efdab0) at data_lump.c:464 __FUNCTION__ = "free_lump" #3 0x000000000044fdf1 in free_lump_list (l=0x7ffff6efda40) at data_lump.c:498 t = 0x0 r = 0x0 foo = 0x7ffff6efdab0 crt = 0x7ffff6efda40 __FUNCTION__ = "free_lump_list" #4 0x00000000004507b4 in del_nonshm_lump (lump_list=0x7ffff6efaad8) at data_lump.c:647 r = 0x7fffffffe150 foo = 0x7ffff6efda40 crt = 0x0 prev = 0x7ffff6efaad8 prev_r = 0x3f6efa530 __FUNCTION__ = "del_nonshm_lump" #5 0x00000000004d4801 in replace_body (msg=0x7ffff6efa530, txt=...) at msg_translator.c:1618 anchor = 0x208 buf = 0x7ffff6e2a010 "\001" body = { s = 0xa6d406 "--unique-boundary-1\r\nContent-Type: application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0 101\r\na=rtp"..., len = 365} __FUNCTION__ = "replace_body" #6 0x00000000004d768d in check_boundaries (msg=0x7ffff6efa530, send_info=0x7fffebd73960) at msg_translator.c:1821 b = {s = 0x7ffff6efd6e8 "--unique-boundary-1\r\n", len = 21} fb = {s = 0x7ffff6efd5b8 "--unique-boundary-1--\r\n", len = 23} ob = {s = 0x7ffff6efd698 "--unique-boundary-1", len = 19} bsuffix = {s = 0x705c31 "\r\n", len = 2} fsuffix = {s = 0x708930 "--\r\n", len = 4} body = { s = 0x7ffff6efe080 "--unique-boundary-1\r\nContent-Type: application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0 101\r\na=rtp"..., len = 513} buf = { s = 0x7ffff6efcf78 "--unique-boundary-1\r\nContent-Type: application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0 101\r\na=rtp"..., len = 511} tmp = { s = 0x7ffff6efcf78 "--unique-boundary-1\r\nContent-Type: application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0 101\r\na=rtp"..., len = 21} lb = 0x7ffff6efd628 lb_t = 0x0 lb_found = 3 t = 146 ret = 19 lb_size = 229 pb = 0x7ffff6efe281 "" __FUNCTION__ = "check_boundaries" #7 0x00000000004d7b7a in build_req_buf_from_sip_req (msg=0x7ffff6efa530, returned_len=0x7fffffffad0c, send_info=0x7fffebd73960, mode=128) at msg_translator.c:1926 len = 1139 new_len = 0 received_len = 0 rport_len = 0 uri_len = 0 via_len = 0 body_delta = 0 line_buf = 0x0 received_buf = 0x0 rport_buf = 0x0 new_buf = 0x0 buf = 0xa6d100 "INVITE sip:+447888555999@1.2.3.4:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom: sip:+447888555999@1.2.3.4:5061;tag=as29e42e9b\r\nTo: <sip"... path_buf = {s = 0x0, len = 0} offset = 0 s_offset = 0 size = 0 via_anchor = 0x0 via_lump = 0x7fffffffa970 via_insert_param = 0x0 path_anchor = 0x7ffff6e2a010 path_lump = 0x7ffff6e2a578 branch = {s = 0x0, len = 0} flags = 393344 udp_mtu = 32767 di = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} __FUNCTION__ = "build_req_buf_from_sip_req" #8 0x00007ffff31bb752 in prepare_new_uac (t=0x7fffebd736f8, i_req=0x7ffff6efa530, branch=0, uri=0x7fffffffacf0, path=0x7fffffffacd0, next_hop=0x7ffff6efa7b0, fsocket=0x0, snd_flags=..., fproto=0, flags=0, instance=0x7fffffffacc0, ruid=0x7fffffffacb0, location_ua=0x7fffffffaca0) at t_fwd.c:459 shbuf = 0x0 add_rm_backup = 0x7ffff6efb7b0 body_lumps_backup = 0x7ffff6efbe70 parsed_uri_bak = {user = {s = 0x7ffff6efdb34 "+447888555999@sip.provider.com:5060", len = 13}, passwd = {s = 0x0, len = 0}, host = {s = 0x7ffff6efdb42 "sip.provider.com:5060", len = 16}, port = {s = 0x7ffff6efdb53 "5060", len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = { s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} ret = -1 len = 0 parsed_uri_ok_bak = 1 free_new_uri = 1 msg_uri_bak = {s = 0x7ffff6efdb30 "sip:+447888555999@sip.provider.com:5060", len = 39} dst_uri_bak = {s = 0x7ffff6efcb08 "sip:sip.provider.com:606017.25:5060", len = 25} dst_uri_backed_up = 1 path_bak = {s = 0x0, len = 0} free_path = 1 instance_bak = {s = 0x0, len = 0} free_instance = 1 ruid_bak = {s = 0x0, len = 0} free_ruid = 1 ua_bak = {s = 0x0, len = 0} free_ua = 1 backup_route_type = 1 fwd_snd_flags_bak = {f = 0 '\000', blst_imask = 0 '\000'} rpl_snd_flags_bak = {f = 0 '\000', blst_imask = 0 '\000'} force_send_socket_bak = 0x0 dst = 0x7fffebd73960 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {39, 114263969407904274, 140737336290144, 140737488347472, 0, 0, 114263969449847314, -114264531344217582}, __mask_was_saved = 0, __saved_mask = { __val = {140733193388046, 627076158419, 1, 140737147573424, 592553366160, 140737272705179, 140737272702272, 4294967336, 140737147573424, 140737488333952, 140737272117063, 140737488333936, 4904691, 140737488334312, 140737488334288, 3479983113749674362}}}}} __FUNCTION__ = "prepare_new_uac" #9 0x00007ffff31beaf2 in add_uac (t=0x7fffebd736f8, request=0x7ffff6efa530, uri=0x7ffff6efa7a0, next_hop=0x7ffff6efa7b0, path=0x7ffff6efab60, proxy=0x0, fsocket=0x0, snd_flags=..., proto=0, flags=0, instance=0x7ffff6efab70, ruid=0x7ffff6efab88, location_ua=0x7ffff6efab98) at t_fwd.c:787 ret = 0 branch = 0 __FUNCTION__ = "add_uac" #10 0x00007ffff31c5b72 in t_forward_nonack (t=0x7fffebd736f8, p_msg=0x7ffff6efa530, proxy=0x0, proto=0) at t_fwd.c:1655 branch_ret = 1 lowest_ret = -1 current_uri = {s = 0x0, len = -1} added_branches = 0 first_branch = 0 i = 32767 q = 359 t_invite = 0x7ffff3203598 success_branch = 32767 try_new = 1 lock_replies = 100 dst_uri = {s = 0x7ffff6efd9c7 "", len = 0} path = {s = 0x0, len = 11681504} instance = {s = 0x7fffebd6e118 "trying -- your call is important to us", len = 38} ruid = {s = 0x7ffff6efa530 "\005", len = -338217224} location_ua = {s = 0x7fffebd6e118 "trying -- your call is important to us", len = 0} si = 0x100415ca0 backup_bflags = 0 bflags = 0 __FUNCTION__ = "t_forward_nonack" #11 0x00007ffff31b1f5c in t_relay_to (p_msg=0x7ffff6efa530, proxy=0x0, proto=0, replicate=0) at t_funcs.c:322 ret = 0 new_tran = 1 t = 0x7fffebd736f8 dst = {send_sock = 0xb24140, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\235\000\000\000\000\000\000", __u6_addr16 = {0, 0, 0, 0, 157, 0, 0, 0}, __u6_addr32 = {0, 0, 157, 0}}}, sin6_scope_id = 11682112}}, id = 0, proto = 32 ' ', send_flags = {f = 165 '\245', blst_imask = 158 '\236'}} port = 0 host = {s = 0x7fffffffb1c0 "P\341\377\377\377\177", len = 5203602} comp = 0 __FUNCTION__ = "t_relay_to" #12 0x00007ffff322a7d5 in _w_t_relay_to (p_msg=0x7ffff6efa530, proxy=0x0, force_proto=0) at tm.c:1474 t = 0x0 res = 0 __FUNCTION__ = "_w_t_relay_to" #13 0x00007ffff322b8b2 in w_t_relay (p_msg=0x7ffff6efa530, _foo=0x0, _bar=0x0) at tm.c:1675 No locals. #14 0x000000000041dcd4 in do_action (h=0x7fffffffb9b0, a=0x7ffff6e6df48, msg=0x7ffff6efa530) at action.c:1053 ret = -5 v = -152066768 dst = {send_sock = 0x7ffff6ebc5b0, to = {s = {sa_family = 55112, sa_data = "\357\366\377\177\000\000H\327\357\366\377\177\000"}, sin = {sin_family = 55112, sin_port = 63215, sin_addr = {s_addr = 32767}, sin_zero = "H\327\357\366\377\177\000"}, sin6 = {sin6_family = 55112, sin6_port = 63215, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "H\327\357\366\377\177\000\000H\327\357\366\377\177\000", __u6_addr16 = {55112, 63215, 32767, 0, 55112, 63215, 32767, 0}, __u6_addr32 = {4142913352, 32767, 4142913352, 32767}}}, sin6_scope_id = 4142559592}}, id = 32767, proto = 52 '4', send_flags = {f = 185 '\271', blst_imask = 255 '\377'}} tmp = 0x7fffffffc8f0 "" new_uri = 0x7fffffffb8f0 "" end = 0x7ffff6ea6478 "\001" crt = 0x7fffffffb938 "\305\023" cmd = 0x7ffff6e4dac8 len = -152066768 user = 32767 uri = {user = {s = 0x7fffffffb640 "\340\267\377\377\377\177", len = 5517182}, passwd = {s = 0x7fffffffb5b0 "0\245\357\366\377\177", len = 0}, host = {s = 0x7ffff6efa530 "\005", len = 4283552}, port = { s = 0x7fffffffb650 "\340\267\377\377\377\177", len = 5510142}, params = {s = 0x7fffffffb5b0 "0\245\357\366\377\177", len = 0}, sip_params = {s = 0x7ffff6ea7170 "\a", len = -18124}, headers = { s = 0x7ffff6efa530 "\005", len = -14096}, port_no = 42288, proto = 63215, type = 32767, flags = 4294953200, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 8}, user_param = { s = 0x5f <Address 0x5f out of bounds>, len = -152092015}, maddr = {s = 0x7ffff6bfbb3c "UH\211\345ATSH\203\354PH\211}\310H\211u\300H\203}", <incomplete sequence \310>, len = -152053944}, method = { s = 0x7fffffffb5c0 "", len = -152054000}, lr = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, r2 = {s = 0x7600000000 <Address 0x7600000000 out of bounds>, len = -152066768}, gr = { s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, transport_val = {s = 0x7fffffffb7e0 "\200\271\377\377\377\177", len = 5531816}, ttl_val = { s = 0x7fffffffb7e0 "\200\271\377\377\377\177", len = 5544362}, user_param_val = {s = 0x7fffffffb720 "0\245\357\366\377\177", len = -241853612}, maddr_val = {s = 0x7fffffffb750 "H\327\357\366\377\177", len = -271470533}, method_val = {s = 0x7fffffffb6c0 "\260\305\353\366\377\177", len = 0}, lr_val = {s = 0x728301 "rval_destroy", len = 7471900}, r2_val = { s = 0x7ffff6efd748 "--unique-boundary-1\r\nContent-Type: application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0 101\r\na=rtp"..., len = -152920048}, gr_val = {s = 0x7ffff6efd710 "p\001", len = 0}} next_hop = {user = {s = 0x200415ca0 <Address 0x200415ca0 out of bounds>, len = 2}, passwd = {s = 0x0, len = 2}, host = {s = 0x7ffff6eabe80 "", len = -152389240}, port = {s = 0x7ffff6efa530 "\005", len = -152387968}, params = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, sip_params = {s = 0x7fffffffb450 "P\272\377\377\377\177", len = 0}, headers = {s = 0x7ffff6ef6760 "", len = -152066768}, port_no = 26464, proto = 63215, type = 32767, flags = 4294959440, transport = {s = 0x7ffff1fcc488 "UH\211\345ATSH\203\354PH\211}\330H\211u\320H\211U\310H\213E\320H\211E\340H\213E\330\017\267@ f\203\370\001\017\205\212", len = 4283552}, ttl = {s = 0x7fffffffba50 " \273\377\377\377\177", len = 4316514}, user_param = {s = 0x7ffff6ea7190 "\002", len = -152066768}, maddr = {s = 0x7fffffffb4d0 "@\265\377\377\377\177", len = -225777708}, method = {s = 0x7fffffffb4c0 "\220\321\346\366\377\177", len = -19008}, lr = {s = 0x7ffff6ea7190 "\002", len = -152066768}, r2 = {s = 0x7fffebd6e210 "5061", len = 4}, gr = { s = 0x4ffffb500 <Address 0x4ffffb500 out of bounds>, len = -152066768}, transport_val = {s = 0x7ffff6e6d190 "J\002", len = -17584}, ttl_val = {s = 0x7fffffffb540 "@\266\377\377\377\177", len = 5203602}, user_param_val = {s = 0x7ffff6ea64a0 "", len = -152066768}, maddr_val = {s = 0x7ffff6ebff40 "", len = -152410976}, method_val = {s = 0x7fffffffb570 "P\266\377\377\377\177", len = -19008}, lr_val = { s = 0x7ffff6ea7178 "\023", len = 5210524}, r2_val = {s = 0x7fffffffb934 "\377\377\377\377\305\023", len = -19008}, gr_val = {s = 0x7ffff6efa530 "\005", len = -152066768}} u = 0x7fffffffc8f0 port = 0 dst_host = 0x7ffff6efd748 i = 32767 flags = 32767 avp = 0x7fffffffe150 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = -1}, re = 0x7fff00000000}, avp = 0x7ffff6eab488} sct = 0x7ffff6efd748 sjt = 0x7fffffffbad8 rve = 0x415ca0 mct = 0x7fffffffe150 rv = 0x800000002 rv1 = 0x7fffffffb7e0 c1 = {cache_type = 4142587336, val_type = 32767, c = {avp_val = {n = -18284, s = {s = 0x7fffffffb894 "", len = -152066768}, re = 0x7fffffffb894}, pval = {rs = {s = 0x7fffffffb894 "", len = -152066768}, ri = -14096, flags = 32767}}, i2s = "\020\264\377\377\377\177\000\000\f\240\225\361\377\177\000\000P\264\377\377\377\377"} s = {s = 0x400000001 <Address 0x400000001 out of bounds>, len = -152390520} srevp = {0x7ffff6eab8e8, 0x2f6eacc48} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #15 0x000000000042a3ea in run_actions (h=0x7fffffffb9b0, a=0x7ffff6e6df48, msg=0x7ffff6efa530) at action.c:1548 t = 0x7ffff6e6df48 ret = -1 mod = 0x13c5 ms = 0 __FUNCTION__ = "run_actions" #16 0x000000000042aa4f in run_actions_safe (h=0x7fffffffda40, a=0x7ffff6e6df48, msg=0x7ffff6efa530) at action.c:1613 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140737336288560, 114263969959455250, 4283552, 140737488347472, 0, 0, 114263970001398290, -114264531344217582}, __mask_was_saved = 0, __saved_mask = {__val = {140737336292968, 140737488337472, 4713976, 140737335951208, 140737336288560, 4283552, 140737488347472, 0, 0, 140737488337696, 4367338, 8187, 140737344499266, 8192, 140733193388032, 140737488337749}}}}} ret = 0 ign_on_break = 0 #17 0x0000000000542670 in rval_get_int (h=0x7fffffffda40, msg=0x7ffff6efa530, i=0x7fffffffbe88, rv=0x7ffff6e6e4c0, cache=0x0) at rvalue.c:912 r_avp = 0x7fffffffda40 avp_val = {n = -140792192, s = {s = 0x7ffff79bae80 "", len = -152066768}, re = 0x7ffff79bae80} pval = {rs = {s = 0x0, len = 0}, ri = -17360, flags = 32767} tmp = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856} s = 0x0 r = 1 ret = 0 destroy_pval = 0 __FUNCTION__ = "rval_get_int" #18 0x00000000005468a8 in rval_expr_eval_int (h=0x7fffffffda40, msg=0x7ffff6efa530, res=0x7fffffffbe88, rve=0x7ffff6e6e4b8) at rvalue.c:1906 i1 = 0 i2 = 0 ret = -1 c1 = {cache_type = 10932671, val_type = RV_NONE, c = {avp_val = {n = 10932617, s = { s = 0xa6d189 "sip:+447888555999@1.2.3.4:5061;tag=as29e42e9b\r\nTo: sip:+447888555999@1.2.3.4:5060\r\nContact: sip:+447888555999@1.2.3.4:5061\r\nCall-ID: 74653c5b109e03c231cc7edf103d7e8b@37.188.117"..., len = 10932709}, re = 0xa6d189}, pval = {rs = { s = 0xa6d189 "sip:+447888555999@1.2.3.4:5061;tag=as29e42e9b\r\nTo: sip:+447888555999@1.2.3.4:5060\r\nContact: sip:+447888555999@1.2.3.4:5061\r\nCall-ID: 74653c5b109e03c231cc7edf103d7e8b@37.188.117"..., len = 10932709}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} c2 = {cache_type = 10933494, val_type = 793, c = {avp_val = {n = -152773216, s = {s = 0x7ffff6e4dda0 ""\320&\363\377\177", len = -17248}, re = 0x7ffff6e4dda0}, pval = {rs = {s = 0x7ffff6e4dda0 ""\320&\363\377\177", len = -17248}, ri = 0, flags = 0}}, i2s = "\300\325\346\366\377\177\000\000\020\303\377\377\377\177\000\000\060\245\357\366\377\177"} rv1 = 0xa0000000a rv2 = 0x60 __FUNCTION__ = "rval_expr_eval_int" #19 0x0000000000546c9e in rval_expr_eval_int (h=0x7fffffffda40, msg=0x7ffff6efa530, res=0x7fffffffc310, rve=0x7ffff6e6ebb8) at rvalue.c:1914 i1 = 0 i2 = 1 ret = -1 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = -152066768, flags = 32767}}, i2s = "`\324\346\366\377\177\000\000@\332\377\377\377\177\000\000\000\000\000\000\000"} c2 = {cache_type = 4294950608, val_type = 32767, c = {avp_val = {n = 4367338, s = {s = 0x42a3ea "\211E\264H\307\005\030NZ", len = 0}, re = 0x42a3ea}, pval = {rs = {s = 0x42a3ea "\211E\264H\307\005\030NZ", len = 0}, ri = 0, flags = 0}}, i2s = "\304\023\000\000\001", '\000' <repeats 16 times>} rv1 = 0x0 rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" #20 0x000000000041d7be in do_action (h=0x7fffffffda40, a=0x7ffff6e6e240, msg=0x7ffff6efa530) at action.c:1029 ret = -5 v = 1 dst = {send_sock = 0x7fffffffc350, to = {s = {sa_family = 1754, sa_data = "\214\363\377\177\000\000=\000\000\000\000\000\000"}, sin = {sin_family = 1754, sin_port = 62348, sin_addr = {s_addr = 32767}, sin_zero = "=\000\000\000\000\000\000"}, sin6 = {sin6_family = 1754, sin6_port = 62348, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "=", '\000' <repeats 14 times>, __u6_addr16 = {61, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {61, 0, 0, 0}}}, sin6_scope_id = 8388608}}, id = 0, proto = 48 '0', send_flags = {f = 206 '\316', blst_imask = 114 'r'}} tmp = 0xd31d0 <Address 0xd31d0 out of bounds> new_uri = 0xd31d0 <Address 0xd31d0 out of bounds> end = 0x8 <Address 0x8 out of bounds> crt = 0x3b <Address 0x3b out of bounds> cmd = 0x61ee3f len = -15504 user = 158 uri = {user = {s = 0x1 <Address 0x1 out of bounds>, len = -152066768}, passwd = {s = 0x7fffffffc1f0 "\360\307\377\377\377\177", len = -152066768}, host = {s = 0x7ffff6ead758 "S\004", len = -14096}, port = { s = 0x7fffffffc700 "\246\213a", len = -152381608}, params = {s = 0x1f7781f76 <Address 0x1f7781f76 out of bounds>, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x7fffffffc76c "", len = -152066768}, port_no = 23712, proto = 65, type = ERROR_URI_T, flags = 4294959440, transport = {s = 0x0, len = 0}, ttl = {s = 0x7fffffffc7f0 "h\207\351\366\377\177", len = 4302682}, user_param = {s = 0xb23ee0 "خ\233\367\377\177", len = -14096}, maddr = {s = 0xd1 <Address 0xd1 out of bounds>, len = 5743147}, method = {s = 0x7ffff195f500 "", len = -144248473}, lr = {s = 0x7ffff195f500 "", len = 0}, r2 = { s = 0x7ffff6ef4030 "From Asterisk, si = 1.2.3.4, du = sip:sip.provider.com:6060 ru = sip:+447888555999@sip.provider.com:5060", len = -14632}, gr = {s = 0xf6efd328 <Address 0xf6efd328 out of bounds>, len = -15344}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x7fffffffc7e0 "", len = 0}, user_param_val = {s = 0x0, len = 6417983}, maddr_val = {s = 0x7fffffffc2c0 "", len = -152920048}, method_val = { s = 0x7fffffffc310 "\001", len = -208927014}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x800000 <Address 0x800000 out of bounds>, len = 6417983}, gr_val = {s = 0x7fffffffc300 "", len = -152920048}} next_hop = {user = {s = 0x7fffffffc050 "P\306\377\377\377\177", len = -244048376}, passwd = {s = 0x7fffffffc060 "\220\300\377\377\377\177", len = -208927014}, host = { s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = 0}, port = {s = 0x800000 <Address 0x800000 out of bounds>, len = 7}, params = {s = 0x5e7 <Address 0x5e7 out of bounds>, len = -152066768}, sip_params = {s = 0x5e700000001 <Address 0x5e700000001 out of bounds>, len = 7}, headers = {s = 0x7ffff1741d91 "UH\211\345ATSH\203\354PH\211}\330H\211u\320H\211U\310H\203}", <incomplete sequence \320>, len = 4283552}, port_no = 50768, proto = 65535, type = 32767, flags = 4316665, transport = {s = 0x7fffffffc090 "P\301\377\377\377\177", len = 4713976}, ttl = {s = 0x0, len = -152920048}, user_param = { s = 0x248 <Address 0x248 out of bounds>, len = 0}, maddr = {s = 0x7fffffffc150 "z\037x\367\377\177", len = 6399695}, method = {s = 0x7ffff6efac98 "FѦ", len = -152066264}, lr = {s = 0x0, len = -152066768}, r2 = { s = 0x7ffff6e71258 "p\002", len = -14512}, gr = { s = 0x7ffff6efd360 "v=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 te"..., len = -13552}, transport_val = {s = 0xffffffffffffffff <Address 0xffffffffffffffff out of bounds>, len = -152066768}, ttl_val = {s = 0x70a910 "build_res_buf_from_sip_req", len = -152066768}, user_param_val = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x7fffffffc1f0 "\360\307\377\377\377\177", len = 4367338}, lr_val = { s = 0x4 <Address 0x4 out of bounds>, len = -14304}, r2_val = {s = 0x7ffff7781f79 ">", len = -144248473}, gr_val = {s = 0x7ffff7781f7a "", len = 1}} u = 0x7ffff6efc6e8 port = 0 dst_host = 0x47edf8 i = 0 flags = 32767 avp = 0x5f6e2a010 st = {flags = 4294950880, id = 6, name = {n = -243994792, s = {s = 0x7ffff174ef58 "sanity", len = 7}, re = 0x7ffff174ef58}, avp = 0x3f6efa530} sct = 0x0 sjt = 0x7fff00000000 rve = 0x7ffff6e6ebb8 mct = 0x61a6cf rv = 0x0 rv1 = 0xd3198 c1 = {cache_type = 10, val_type = RV_BEXPR, c = {avp_val = {n = -152066768, s = {s = 0x7ffff6efa530 "\005", len = 10932528}, re = 0x7ffff6efa530}, pval = {rs = {s = 0x7ffff6efa530 "\005", len = 10932528}, ri = 10933206, flags = 0}}, i2s = "\221\035t\361\377\177\000\000\240\A\000\000\000\000\000P\341\377\377\377\177"} s = {s = 0x100000001 <Address 0x100000001 out of bounds>, len = -152066264} srevp = {0x7fffffffbfb0, 0x7ffff1744839} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #21 0x000000000042a3ea in run_actions (h=0x7fffffffda40, a=0x7ffff6e6cfb8, msg=0x7ffff6efa530) at action.c:1548 t = 0x7ffff6e6e240 ret = 1 mod = 0x5294fa ms = 0 __FUNCTION__ = "run_actions" #22 0x000000000041a75a in do_action (h=0x7fffffffda40, a=0x7ffff6e99918, msg=0x7ffff6efa530) at action.c:677 ret = -5 v = -152066768 dst = {send_sock = 0x415ca0, to = {s = {sa_family = 57680, sa_data = "\377\377\377\177\000\000\060\312\377\377\377\177\000"}, sin = {sin_family = 57680, sin_port = 65535, sin_addr = {s_addr = 32767}, sin_zero = "0\312\377\377\377\177\000"}, sin6 = {sin6_family = 57680, sin6_port = 65535, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "0\312\377\377\377\177\000\000\037\312D\000\000\000\000", __u6_addr16 = {51760, 65535, 32767, 0, 51743, 68, 0, 0}, __u6_addr32 = {4294953520, 32767, 4508191, 0}}}, sin6_scope_id = 4142499792}}, id = 32767, proto = 40 '(', send_flags = {f = 204 '\314', blst_imask = 255 '\377'}} tmp = 0x7fffffffda40 "\004" new_uri = 0x7ffff6e2a168 "(W\355\366\377\177" end = 0x300000000 <Address 0x300000000 out of bounds> crt = 0x7ffff6ea7128 ">\r\nql" cmd = 0x7ffff6e56828 len = -152057192 user = 32767 uri = {user = {s = 0x7fffffffc930 "\320\312\377\377\377\177", len = 5514762}, passwd = {s = 0x7fffffffc870 "\340\310\377\377\377\177", len = 6417983}, host = {s = 0x7fffffffc880 "؇\351\366\377\177", len = -152920048}, port = {s = 0x7fffffffc8d0 "", len = -208927014}, params = {s = 0x7fffffffc8e0 "", len = 0}, sip_params = {s = 0x7ffff6e987d8 "\003", len = -13272}, headers = {s = 0x7ffff6efa530 "\005", len = -9664}, port_no = 25912, proto = 63215, type = 32767, flags = 8, transport = {s = 0x7ffff1fcc488 "UH\211\345ATSH\203\354PH\211}\330H\211u\320H\211U\310H\213E\320H\211E\340H\213E\330\017\267@ f\203\370\001\017\205\212", len = 4283552}, ttl = { s = 0x7fffffffcec0 "\220\317\377\377\377\177", len = 4316514}, user_param = {s = 0x7fffffffc900 "", len = 4713976}, maddr = {s = 0x0, len = -152920048}, method = {s = 0x0, len = 0}, lr = { s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = 6399695}, r2 = {s = 0x7fffffffc9d0 "Ї\351\366\377\177", len = -152066768}, gr = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, transport_val = {s = 0x7fffffffcad0 "p\314\377\377\377\177", len = 5531816}, ttl_val = {s = 0x7fffffffc970 "8", len = 4713976}, user_param_val = {s = 0x0, len = -152920048}, maddr_val = { s = 0x6f0100 "insert_new_lump_before", len = 7272288}, method_val = {s = 0x38 <Address 0x38 out of bounds>, len = -152920048}, lr_val = {s = 0x7ffff6e2a1c8 "", len = -152057248}, r2_val = { s = 0x7fff00000007 <Address 0x7fff00000007 out of bounds>, len = -152056576}, gr_val = {s = 0x7fff00000007 <Address 0x7fff00000007 out of bounds>, len = -152407768}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x800000 <Address 0x800000 out of bounds>, len = 7525160}, host = {s = 0xac7c8 <Address 0xac7c8 out of bounds>, len = 863448}, port = { s = 0xd2fe8 <Address 0xd2fe8 out of bounds>, len = 8}, params = {s = 0x58 <Address 0x58 out of bounds>, len = -14528}, sip_params = {s = 0x11900618ba6 <Address 0x11900618ba6 out of bounds>, len = -152059472}, headers = {s = 0x7fffffffc740 "", len = 4713976}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 4142047248, transport = {s = 0x8 <Address 0x8 out of bounds>, len = 0}, ttl = {s = 0x7fffffffc800 "@\311\377\377", len = 6399695}, user_param = {s = 0x0, len = 11625600}, maddr = {s = 0x7ffff6ef78c0 "\200d\261", len = 4}, method = {s = 0xb03580 "\376", len = -158960584}, lr = {s = 0x7ffff6ef78c0 "\200d\261", len = 4}, r2 = { s = 0x30 <Address 0x30 out of bounds>, len = -152066768}, gr = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, transport_val = {s = 0x7fffffffc830 "0\311\377\377\377\177", len = 5421816}, ttl_val = {s = 0x7ffff6e2a1c8 "", len = -152059472}, user_param_val = {s = 0x400000007 <Address 0x400000007 out of bounds>, len = 7721968}, maddr_val = {s = 0x0, len = -152066768}, method_val = { s = 0x7ffff6e98768 "\002", len = -9664}, lr_val = {s = 0xffffc940 <Address 0xffffc940 out of bounds>, len = 6498312}, r2_val = {s = 0x7fffffffc840 "p\310\377\377\377\177", len = -152066768}, gr_val = { s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}} u = 0x16 port = 0 dst_host = 0x415ca0 i = 1 flags = 32767 avp = 0x7ffff2b1ee24 st = {flags = 0, id = 13, name = {n = 6417983, s = {s = 0x61ee3f "H\213E\370H\213P\bH\213E\360H\211\020H\213E\360H\307@(\b", len = -14656}, re = 0x61ee3f}, avp = 0x7ffff6e2a010} sct = 0x7fffffffcaf0 sjt = 0x44ecff rve = 0x7ffff6e2a1c8 mct = 0x7ffff6efb7e8 rv = 0x0 rv1 = 0x100000007 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} s = {s = 0x1000013c5 <Address 0x1000013c5 out of bounds>, len = 0} srevp = {0x0, 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #23 0x000000000042a3ea in run_actions (h=0x7fffffffda40, a=0x7ffff6e99688, msg=0x7ffff6efa530) at action.c:1548 t = 0x7ffff6e99918 ret = 1 mod = 0x0 ms = 0 __FUNCTION__ = "run_actions" #24 0x000000000041dc3d in do_action (h=0x7fffffffda40, a=0x7ffff6e99a38, msg=0x7ffff6efa530) at action.c:1044 ret = 1 v = 1 dst = {send_sock = 0x883eb07c, to = {s = {sa_family = 1024, sa_data = "\000\000\000\000\000\000l\322\377\377\377\177\000"}, sin = {sin_family = 1024, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "l\322\377\377\377\177\000"}, sin6 = {sin6_family = 1024, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "l\322\377\377\377\177\000\000\001\000\000\000\000\000\000", __u6_addr16 = { 53868, 65535, 32767, 0, 1, 0, 0, 0}, __u6_addr32 = {4294955628, 32767, 1, 0}}}, sin6_scope_id = 4294955424}}, id = 32767, proto = 112 'p', send_flags = {f = 38 '&', blst_imask = 84 'T'}} tmp = 0x7ffff318925b "\211E\374\203}\374\002\017\224\300\017\266\300H\205\300t3H\213E\350\307\004$" new_uri = 0x0 end = 0xa6d4f6 "=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=silenceSupp:off - - - -\r\na=ptime:20\r\na=sendrecv\r\n\r\n--unique-boundary-1\r\n" crt = 0x7ffff6efac50 "\001" cmd = 0x7ffff6e4feb8 len = 0 user = 0 uri = {user = {s = 0x7fffffffd000 "\022*\257By\362\225\001\022*͞\003\rj\376", len = 5514864}, passwd = {s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = -152066768}, host = {s = 0x7ffff6e690f8 "!\002", len = -12352}, port = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = 0}, params = {s = 0x100000000 <Address 0x100000000 out of bounds>, len = 0}, sip_params = { s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = -11532}, headers = {s = 0x7ffff6efa530 "\005", len = -152066768}, port_no = 23712, proto = 65, type = ERROR_URI_T, flags = 4294959440, transport = { s = 0x0, len = 0}, ttl = {s = 0x7fffffffd0a0 "\240\321\377\377\377\177", len = 4368975}, user_param = {s = 0x7fffffffd110 "0\321\377\377\377\177", len = -152066768}, maddr = {s = 0x7ffff6e690f8 "!\002", len = -9664}, method = {s = 0x0, len = 1}, lr = {s = 0x7ffff6efa530 "\005", len = 1076832786}, r2 = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x195f27942af2a12 <Address 0x195f27942af2a12 out of bounds>, len = -1630721518}, ttl_val = {s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = -12016}, user_param_val = {s = 0x7ffff6e6a370 "", len = -152066768}, maddr_val = {s = 0x7fffffffd130 "\020\322\377\377\377\177", len = -216215272}, method_val = {s = 0x7ffff6e6a370 "", len = 4283552}, lr_val = {s = 0x7fffffffd0c0 "", len = 5203602}, r2_val = { s = 0x7fffffffd1d0 "", len = 1}, gr_val = {s = 0x7fffebb98ca8 "", len = -134289984}} next_hop = {user = {s = 0x7ffff6e62330 "\374\001", len = -12768}, passwd = {s = 0x7ffff6ef7770 "8>\351\366\377\177", len = 0}, host = {s = 0x100415ca0 <Address 0x100415ca0 out of bounds>, len = -7856}, port = { s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = 5531816}, params = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -152066768}, sip_params = { s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, headers = {s = 0x0, len = 0}, port_no = 52992, proto = 65535, type = 32767, flags = 4368975, transport = { s = 0xf6ef9eb8 <Address 0xf6ef9eb8 out of bounds>, len = -152066768}, ttl = {s = 0x7ffff6e62330 "\374\001", len = -9664}, user_param = {s = 0x0, len = 1}, maddr = {s = 0x7ffff6efa530 "\005", len = 1156524562}, method = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, lr = {s = 0x0, len = 0}, r2 = {s = 0x195f279456f2a12 <Address 0x195f279456f2a12 out of bounds>, len = -1630721518}, gr = { s = 0x0, len = 0}, transport_val = {s = 0x7fffffffcf50 "", len = 4367338}, ttl_val = {s = 0x42 <Address 0x42 out of bounds>, len = -152066768}, user_param_val = { s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x7fffffffcf90 "\240\320\377\377\377\177", len = 4367338}, lr_val = { s = 0x7fffffffcf10 "", len = -152066768}, r2_val = {s = 0x7ffff6ea3608 "\002\004", len = -10304}, gr_val = {s = 0x7ffff6ebbe70 "\270\276\353\366\377\177", len = 1}} u = 0x0 port = 0 dst_host = 0x7fffffffd780 i = 32767 flags = 32767 avp = 0x7fffffffda40 st = {flags = 4294954336, id = 32767, name = {n = -152078480, s = {s = 0x7ffff6ef7770 "8>\351\366\377\177", len = 4283552}, re = 0x7ffff6ef7770}, avp = 0x7fffffffe150} sct = 0x7fffffffd130 sjt = 0x3f3189fbc rve = 0x7ffff6e98ed0 mct = 0x7ffff6efa530 rv = 0x7fffffffce20 rv1 = 0x7fffffffd210 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = -12816}, re = 0x0}, pval = {rs = {s = 0x0, len = -12816}, ri = -152736744, flags = 32767}}, i2s = "\000\000\000\000\000\000\000\000A@\357\366\377\177\000\000\060\000\000\000\060"} s = {s = 0x100415ca0 <Address 0x100415ca0 out of bounds>, len = -7856} srevp = {0x7fffffffcd00, 0x7ffff6efa530} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #25 0x000000000042a3ea in run_actions (h=0x7fffffffda40, a=0x7ffff6e99a38, msg=0x7ffff6efa530) at action.c:1548 t = 0x7ffff6e99a38 ret = -1 mod = 0xf6efa530 ms = 0 __FUNCTION__ = "run_actions" #26 0x000000000041a75a in do_action (h=0x7fffffffda40, a=0x7ffff6e69d08, msg=0x7ffff6efa530) at action.c:677 ret = -5 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\377\177\000\000 \330\377\377\377\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 32767}, sin_zero = " \330\377\377\377\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = " \330\377\377\377\177\000\000Ϧa\000\000\000\000", __u6_addr16 = {55328, 65535, 32767, 0, 42703, 97, 0, 0}, __u6_addr32 = {4294957088, 32767, 6399695, 0}}}, sin6_scope_id = 1}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} tmp = 0xa6d140 "0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom: sip:+447888555999@1.2.3.4:5061;tag=as29e42e9b\r\nTo: sip:+447888555999@1.2.3.4:5060\r\nContact: <sip:+447888555999@"... new_uri = 0x2e <Address 0x2e out of bounds> end = 0xa6d58a "" crt = 0x7fffffffd820 "\220\331\377\377\377\177" cmd = 0x7ffff6e56940 len = 0 user = 0 uri = {user = {s = 0x7ffff6efac50 "\001", len = -152063064}, passwd = {s = 0x7fffffffd6ee "\005\005qѦ", len = -10513}, host = { s = 0xa6d4f6 "=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=silenceSupp:off - - - -\r\na=ptime:20\r\na=sendrecv\r\n\r\n--unique-boundary-1\r\n", len = 10932569}, port = { s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = 10932591}, params = {s = 0x500000000000000 <Address 0x500000000000000 out of bounds>, len = 0}, sip_params = {s = 0x776054 "parse_via", len = 7812227}, headers = {s = 0x40 <Address 0x40 out of bounds>, len = -152920048}, port_no = 41432, proto = 63202, type = 32767, flags = 4294956776, transport = {s = 0x400000008 <Address 0x400000008 out of bounds>, len = 10932564}, ttl = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = 331735376}, user_param = { s = 0xa6d158 ";branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom: sip:+447888555999@1.2.3.4:5061;tag=as29e42e9b\r\nTo: sip:+447888555999@1.2.3.4:5060\r\nContact: sip:+447888555999@1.2.3.4:5061\r\nCal"..., len = 10932568}, maddr = {s = 0x7fffffffd820 "\220\331\377\377\377\177", len = 6799587}, method = {s = 0xffffd938 <Address 0xffffd938 out of bounds>, len = -338231396}, lr = { s = 0xffffffffffffd6f0 <Address 0xffffffffffffd6f0 out of bounds>, len = 6417983}, r2 = {s = 0x7fffffffd6e0 "", len = -152920048}, gr = {s = 0x7fffffffd730 "`\327\377\377\377\177", len = -152064944}, transport_val = { s = 0xa6d4f6 "=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=silenceSupp:off - - - -\r\na=ptime:20\r\na=sendrecv\r\n\r\n--unique-boundary-1\r\n", len = 10932538}, ttl_val = { s = 0x800000 <Address 0x800000 out of bounds>, len = 0}, user_param_val = { s = 0xa6d171 "Max-Forwards: 69\r\nFrom: sip:+447888555999@1.2.3.4:5061;tag=as29e42e9b\r\nTo: sip:+447888555999@1.2.3.4:5060\r\nContact: sip:+447888555999@1.2.3.4:5061\r\nCall-ID: 74653c5b109e03c231c"..., len = 10932569}, maddr_val = {s = 0xd2df8 <Address 0xd2df8 out of bounds>, len = -152064944}, method_val = {s = 0x7ffff6efb3a8 "2", len = -216038109}, lr_val = {s = 0x7400415ca0 <Address 0x7400415ca0 out of bounds>, len = -152065000}, r2_val = {s = 0x7fffffffd760 " \330\377\377\377\177", len = 4713976}, gr_val = {s = 0x0, len = -152920048}} next_hop = {user = {s = 0xa7d260 "", len = 7528240}, passwd = {s = 0xabd10 <Address 0xabd10 out of bounds>, len = -338231312}, host = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, port = {s = 0x7fffffffd510 "@\325\377\377\004", len = -216229634}, params = {s = 0x7fffffffd4d0 "\020\026\327\353\002", len = -216493477}, sip_params = {s = 0x7ffff6efa530 "\005", len = -338225568}, headers = { s = 0x7fffebd6ff80 "x\364\321\353\377\177", len = -338561912}, port_no = 5728, proto = 60375, type = 32767, flags = 4142900528, transport = {s = 0x2ebd71610 <Address 0x2ebd71610 out of bounds>, len = -215601968}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 100}, maddr = {s = 0x7fffffffd5d0 "P\254\357\366\377\177", len = 6417983}, method = {s = 0x4ffffd540 <Address 0x4ffffd540 out of bounds>, len = 7803616}, lr = { s = 0x7fffffffd590 "\300\325\377\377\377\177", len = -208927014}, r2 = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = 16}, gr = {s = 0x7fffffffd680 " \330\377\377\377\177", len = 6754917}, transport_val = {s = 0xab6e0 <Address 0xab6e0 out of bounds>, len = 858952}, ttl_val = {s = 0xd2df8 <Address 0xd2df8 out of bounds>, len = 8}, user_param_val = {s = 0x72 <Address 0x72 out of bounds>, len = -338230976}, maddr_val = {s = 0x9ce00000000 <Address 0x9ce00000000 out of bounds>, len = -152063120}, method_val = {s = 0x7fffffffd5c0 "\200\326\377\377\377\177", len = 4713976}, lr_val = {s = 0x0, len = -152920048}, r2_val = { s = 0x0, len = 0}, gr_val = {s = 0x7fffffffd680 " \330\377\377\377\177", len = 6399695}} u = 0x74f6efa530 port = 0 dst_host = 0x75a52c i = 10 flags = 0 avp = 0x7ffff6e2a010 st = {flags = 10998064, id = 0, name = {n = 10998072, s = {s = 0xa7d138 "", len = 10998080}, re = 0xa7d138}, avp = 0xa7d148} sct = 0x7ffff6e2a328 sjt = 0x7ffff6efac18 rve = 0x7ffff6e692d0 mct = 0x0 rv = 0x0 rv1 = 0x7ffff6efa728 c1 = {cache_type = 10932905, val_type = RV_NONE, c = {avp_val = {n = 10932899, s = { s = 0xa6d2a3 "5 16:45:20 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH\r\nSupported: replaces, timer\r\nX-Call-History-Id: 514007383\r\nX-SIPS-CALLID: 1388554425@192.168.1.72\r\nP-A"..., len = -11072}, re = 0xa6d2a3}, pval = {rs = { s = 0xa6d2a3 "5 16:45:20 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH\r\nSupported: replaces, timer\r\nX-Call-History-Id: 514007383\r\nX-SIPS-CALLID: 1388554425@192.168.1.72\r\nP-A"..., len = -11072}, ri = -338231424, flags = 32767}}, i2s = "\b(\352\366\377\177\000\000\360\377\326\353\377\177\000\000(\247\357\366\377\177"} s = { s = 0xa6d37c " sip:+447888555999@1.2.3.4\r\nContent-Length: 365\r\nContent-Type: multipart/mixed;boundary="unique-boundary-1"\r\nMime-Version: 1.0\r\n\r\n--unique-boundary-1\r\nContent-Type: application/sdp\r\n\r\nv=0\r\no=r"..., len = 10932896} srevp = {0x75d3e0, 0x7ffff6efb160} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #27 0x000000000042a3ea in run_actions (h=0x7fffffffda40, a=0x7ffff6e60d18, msg=0x7ffff6efa530) at action.c:1548 t = 0x7ffff6e69d08 ret = 1 mod = 0xa6d133 ms = 0 __FUNCTION__ = "run_actions" #28 0x000000000042ab17 in run_top_route (a=0x7ffff6e60d18, msg=0x7ffff6efa530, c=0x0) at action.c:1634 ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140737336289064, 114263968871033362, 4283552, 140737488347472, 0, 0, 114263968912976402, -114264531344217582}, __mask_was_saved = 0, __saved_mask = {__val = {140737279388689, 8437870752, 14, 4611686022726615054, 0, 140737488345840, 140737279389571, 227640687945, 0, 4611686026796357744, 140737336288560, 140737488345904, 5635185, 8589925168, 140737336288560, 0}}}}} p = 0x7fffffffda40 ret = -152066264 sfbk = 0 #29 0x0000000000509330 in receive_msg ( buf=0xa6d100 "INVITE sip:+447888555999@1.2.3.4:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom: sip:+447888555999@1.2.3.4:5061;tag=as29e42e9b\r\nTo: <sip"..., len=1014, rcv_info=0x7fffffffdd30) at receive.c:196 msg = 0x7ffff6efa530 ctx = {rec_lev = 700032, run_flags = 0, last_retcode = 852720, jmp_env = {{__jmpbuf = {852880, 8, 46, 140737488346128, 1705108409254, 140737335931856, 140737343873808, 140737354063872}, __mask_was_saved = 0, __saved_mask = {__val = {4294967295, 8, 1, 140737147573488, 0, 0, 1024, 8589925504, 140737147573488, 140737488346240, 6298145, 140737219175072, 140737147573488, 140737333187210, 6298273, 140737488346608}}}}} ret = -9008 inb = { s = 0xa6d100 "INVITE sip:+447888555999@1.2.3.4:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom: sip:+447888555999@1.2.3.4:5061;tag=as29e42e9b\r\nTo: <sip"..., len = 1014} __FUNCTION__ = "receive_msg" #30 0x0000000000608a2e in udp_rcv_loop () at udp_server.c:495 len = 1014 buf = "INVITE sip:+447888555999@1.2.3.4:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom: sip:+447888555999@1.2.3.4:5061;tag=as29e42e9b\r\nTo: <sip"... tmp = 0x7ffff7df1865 "I\211\303L\213L$0L\213D$(H\213|$ H\213t$\030H\213T$\020H\213L$\bH\213\004$H\203\304HA\377\343ffffff.\017\037\204" from = 0x7ffff6ea3408 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {140733620534309, 140737488347472}, addr32 = {427146277, 32767, 4294959440, 32767}, addr16 = {48165, 6517, 32767, 0, 57680, 65535, 32767, 0}, addr = "%\274u\031\377\177\000\000P\341\377\377\377\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {427146277, 0}, addr32 = {427146277, 0, 0, 0}, addr16 = {48165, 6517, 0, 0, 0, 0, 0, 0}, addr = "%\274u\031", '\000' <repeats 11 times>}}, src_port = 5061, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\305%\274u\031\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50451, sin_addr = {s_addr = 427146277}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50451, sin6_flowinfo = 427146277, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7ffff6e4b1d8, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #31 0x00000000004a5ca4 in main_loop () at main.c:1382 i = 7390784 pid = 4053 si = 0x400000000 si_desc = "\356\326p\000\000\000\000\000@\306p\000\000\000\000\000\b\000\000\000\001\000\000\000\260\024\260\353\377\177\000\000\220\336\377\377\377\177\000\000\363wN\000\000\000\000\000\t\000\000\000\377\177\000\000\260\024\260\353\377\177\000\000\000\000\000\004\004\000\000\000\260\024\260\353\377\177\000\000\240\A\000\000\000\000\000P\341\377\377\001\000\000\000\340\336\377\377\377\177\000\000\226xN\000\000\000\000\000h\241\342\366n\000\000\000\356\326p\000\000\000\000" nrprocs = 7352968 __FUNCTION__ = "main_loop" #32 0x00000000004acd36 in main (argc=12, argv=0x7fffffffe158) at main.c:2533 cfg_stream = 0xa85010 c = -1 r = 0 tmp = 0x7fffffffe421 "" tmp_len = 32767 port = -143129121 proto = 0 options = 0x702650 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 3752915056 rfd = 8 debug_save = 0 debug_flag = 0 dont_fork_cnt = 1 n_lst = 0x40d7d4 p = 0x0 __FUNCTION__ = "main" (gdb) quit A debugging session is active.
Inferior 1 [process 4049] will be killed.
Quit anyway? (y or n)
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/240#issuecomment-120066445