Description

Troubleshooting

Reproduction

Debugging Data

# gdb kamailio /tmp/core
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later
<http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from kamailio...Reading symbols from
/usr/lib/debug/.build-id/4e/fae9c9a848e19a554209666ff42a678720280e.debug...done.
done.
[New LWP 32260]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid
-f /etc/kamailio/kamailio.'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  subst_run (se=0x7f8b8469eb50, input=0x4 <error: Cannot access memory at
#address 0x4>, msg=0x7f8b8475de28, count=0x1) at re.c:453
453     re.c: No such file or directory.
(gdb) bt full
#0  subst_run (se=0x7f8b8469eb50, input=0x4 <error: Cannot access memory at
#address 0x4>, msg=0x7f8b8475de28, count=0x1) at re.c:453
        head = 0x7f8b847606a0
        r = -2073697496
        eflags = 2203912
        __FUNCTION__ = "subst_run"
#1  0x0000000000576037 in subst_str (input=0x7f8b402c5d00 <tr_txt_buf>
"\"asterisk\"", msg=0x4, se=0x6acf73, count=0x7fff95b4590c) at re.c:503
        res = 0x7f8b8475de28
        dest = 0x7f8b847606a0 ""
        __FUNCTION__ = "subst_str"
#2  0x00007f8b400b65d2 in tr_txt_eval_re (msg=0x7f8b8475de28,
tp=0x7f8b8469ea60, subtype=8, val=0x7fff95b459e0) at txt_var.c:87
        se = 0x7f8b8469eb50
        nmatches = 32651
        result = 0x7f8b8475de28
        tr_txt_buf = "\"asterisk\"\000\000P201\000\"", '\000' <repeats 2029
        times>
        v = {rs = {s = 0x7fff95b45a20 "", len = 1856138293}, ri =
        -2073783984, flags = 32651}
        __FUNCTION__ = "tr_txt_eval_re"
#3  0x0000000000586a50 in tr_exec (msg=0x7f8b8475de28, t=0x7f8b8469dfc0,
v=0x7fff95b459e0) at pvapi.c:1681
        r = -2072639840
#4  0x000000000044e6a9 in lval_pvar_assign (lv=<optimized out>,
rv=<optimized out>, msg=<optimized out>, h=<optimized out>) at lvalue.c:334
        r_avp = 0x7f8b847606a0
        destroy_pval = -1783339264
        pvar = 0x7f8b847606b8
        pval = {rs = {
            s = 0x9ab890 <buf+144> "\"asterisk\"
<sip:asterisk@X.X.X.6:5080>;tag=as785f9e00\r\nTo:
<sip:zs_pbx40_trunk@XXXXXXXXXX.com>\r\nContact:
<sip:asterisk@X.X.X.6:5080>\r\nCall-ID:
7feae50257e62b06765f0a4c4d60650a@185"..., len = 10}, ri = 0, flags = 4}
        avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at
address 0x1>, len = -2058051944}, re = 0x1}
        v = -2072639840
#5  lval_assign (h=0x7fff95b46700, msg=0x7f8b8475de28, lv=0x7f8b8469df50,
rve=0x7f8b8469f6e0) at lvalue.c:399
        rv = 0x7f8b8469f6e8
        ret = -1783339264
        __FUNCTION__ = "lval_assign"
#6  0x00000000005414d3 in do_action (h=0x7fff95b46700, a=0x7f8b8469ec28,
msg=0x7f8b8475de28) at action.c:1430
        ret = -5
        v = 1
        dst = {send_sock = 0x7fff95b48bd0, to = {s = {sa_family = 4346,
        sa_data = "O\205\213\177\000\000\001\000\000\000\001\000\000"}, sin
        = {sin_family = 4346, sin_port = 34127, sin_addr = {s_addr = 32651},
              sin_zero = "\001\000\000\000\001\000\000"}, sin6 =
{sin6_family = 4346, sin6_port = 34127, sin6_flowinfo = 32651, sin6_addr =
{__in6_u = {
                  __u6_addr8 =
"\001\000\000\000\001\000\000\000\340\370\220\002\000\000\000", __u6_addr16
= {1, 0, 1, 0, 63712, 656, 0, 0}, __u6_addr32 = {1, 1, 43055328, 0}}},
sin6_scope_id = 110}},
          id = 119, proto = 0 '\000', send_flags = {f = 79 'O', blst_imask =
198 '\306'}}
        end = 0x7fff95b46700 "\002"
        uri = {user = {s = 0x7fff95b45c90 "\300\270\232", len = 1130964784},
passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len =
5615623}, host = {s = 0x0, len = 667307776}, port = {s = 0x0,
            len = 1036086182}, params = {s = 0x7fff95b45c80 "4\271\232", len
= -1783341956}, sip_params = {s = 0x7fff00000000 <error: Cannot access
memory at address 0x7fff00000000>, len = -1783342108},
          headers = {s = 0x0, len = -1783341952}, port_no = 48, proto = 0,
type = ERROR_URI_T, flags = (unknown: 10140004), transport = {s = 0x156673
<error: Cannot access memory at address 0x156673>,
            len = 1}, ttl = {s = 0x0, len = 5615623}, user_param = {s =
0x156673 <error: Cannot access memory at address 0x156673>, len =
667307776}, maddr = {
            s = 0x1ac00f <error: Cannot access memory at address 0x1ac00f>,
len = -1783342012}, method = {s = 0xe5 <error: Cannot access memory at
address 0xe5>, len = 0}, lr = {s = 0x7f8b8475de28 "\235\030",
            len = -1783341980}, r2 = {s = 0x0, len = 1138816376}, gr = {s =
0x7f8b8475de28 "\235\030", len = -1783341584}, transport_val = {s = 0x0, len
= -1783341072}, ttl_val = {
            s = 0x7f8b43e0f588 "0@\236C\213\177", len = 5615623},
user_param_val = {s = 0x7fff95b46c50 "(\336u\204\213\177", len = 667307776},
maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>,
            len = 1036492449}, method_val = {
            s = 0x9ab934 <buf+308>
"7feae50257e62b06765f0a4c4d60650a@X.X.X.6:5080\r\nCSeq: 102
NOTIFY\r\nUser-Agent: ast.zs PBX\r\nEvent: message-summary\r\nContent-Type:
application/simple-message-summary\r\nContent-Length:
97\r\n\r\nMessages-W"..., len = 50}, lr_val = {
            s = 0x9ab8c0 <buf+192> "as785f9e00\r\nTo:
<sip:zs_pbx40_trunk@XXXXXXXXXX.com>\r\nContact:
<sip:asterisk@X.X.X.6:5080>\r\nCall-ID:
7feae50257e62b06765f0a4c4d60650a@X.X.X.6:5080\r\nCSeq: 102
NOTIFY\r\nUser-Agent: as"..., len = 10}, r2_val = {s = 0x0, len = 0}, gr_val
= {s = 0x0, len = 667307776}}
---Type <return> to continue, or q <return> to quit---
        next_hop = {user = {s = 0x7fff95b45f50 "", len = -2073440000},
passwd = {s = 0x7f8b8475de28 "\235\030", len = -1783341584}, host = {s =
0x0, len = -1783341072}, port = {
            s = 0x7f8b43e0f588 "0@\236C\213\177", len = 1036498757}, params
= {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len =
0}, sip_params = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len =
42994560}, headers = {s = 0xe <error: Cannot access memory at address 0xe>,
len = -2073418280}, port_no = 2320, proto = 33870,
          type = 32651, flags = URI_USER_NORMALIZE, transport = {s =
0x200000001 <error: Cannot access memory at address 0x200000001>, len =
667307776}, ttl = {s = 0x2900a70 "", len = -2073440024},
          user_param = {s = 0x7fff95b45df0 "\020_\264\225\377\177", len =
-2072650200}, maddr = {s = 0x7fff95b46700 "\002", len = -1783341072}, method
= {s = 0x0, len = -2072650200}, lr = {
            s = 0x7fff95b45f10 "", len = -2073435824}, r2 = {s =
0x7fff95b46700 "\002", len = -1783341072}, gr = {s = 0x0, len = 1115878885},
transport_val = {s = 0x0, len = -2072641703}, ttl_val = {s = 0x0,
            len = 5717688}, user_param_val = {s = 0x7f8b84760cb0
"sip:s@185.99.186.218:5060", len = -2073435848}, maddr_val = {s =
0x7fff95b45f10 "", len = -2072650200}, method_val = {
            s = 0x7fff95b46700 "\002", len = -1783341072}, lr_val = {s =
0x0, len = 5795166}, r2_val = {s = 0x7f8b8469efd0 "!", len = -2073435864},
gr_val = {s = 0x7f8b8475de28 "\235\030", len = -1783339264}}
        u = 0x7fff95b46700
        flags = 0
        st = {flags = 2511626064, id = 32767, name = {n = -2073440000, s =
        {s = 0x7f8b8469d100 "", len = -2072650200}, re = 0x7f8b8469d100},
        avp = 0x7fff95b45df0}
        sct = 0x7fff95b46700
        sjt = 0x7fff95b46700
        mct = 0x0
        rv = 0x7f8b854f159d <build_trtable+2861>
        rv1 = 0x7f8b8475de28
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_INT, c = {avp_val =
        {n = -1783341788, s = {s = 0x7fff95b45d24 "", len = -1783337904}, re
        = 0x7fff95b45d24}, pval = {rs = {s = 0x7fff95b45d24 "",
                len = -1783337904}, ri = -1783342236, flags = 32767}}, i2s =
"\370", '\000' <repeats 15 times>, "D'iC\213\177"}
        s = {s = 0x29214a0 "\300\v\222\002", len = 43127968}
        srevp = {0x7f8b8469ec28, 0x7f8b8475de28}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
        str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
        {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140237199485840,
              string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s =
0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90,
attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#7  0x00000000005407b5 in run_actions (h=0x6acf73, a=0x4, msg=0x8) at
action.c:1549
        ret = -1783339264
        mod = 0x7f8b8469ec28
        __FUNCTION__ = "run_actions"
#8  0x0000000000542218 in do_action (h=0x7fff95b46700, a=0x7f8b846a0630,
msg=0x7f8b8475de28) at action.c:1049
        ret = 1
        v = 1
        dst = {send_sock = 0x920610, to = {s = {sa_family = 20224, sa_data =
        "\306'\320xD\247l`\264\225\377\177\000"}, sin = {sin_family = 20224,
        sin_port = 10182, sin_addr = {s_addr = 2806282448},
              sin_zero = "l`\264\225\377\177\000"}, sin6 = {sin6_family =
20224, sin6_port = 10182, sin6_flowinfo = 2806282448, sin6_addr = {__in6_u =
{
                  __u6_addr8 =
"l`\264\225\377\177\000\000hnk\204\213\177\000", __u6_addr16 = {24684,
38324, 32767, 0, 28264, 33899, 32651, 0}, __u6_addr32 = {2511626348, 32767,
2221633128, 32651}}},
              sin6_scope_id = 2511627712}}, id = 32767, proto = 40 '(',
send_flags = {f = 222 '\336', blst_imask = 117 'u'}}
        end = 0x7f8b8469efd0 "!"
        uri = {user = {s = 0x7fff95b461e0 "`\271\232", len = 1130860144},
passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len =
5615623}, host = {s = 0x0, len = 667307776}, port = {s = 0x0,
            len = 1036086182}, params = {s = 0x7fff95b461d0 "๚", len =
-1783340596}, sip_params = {s = 0x7f8b846b6e68 "\233\005", len =
-2072650200}, headers = {s = 0x7fff95b463c4 "\377\177",
            len = -1783340592}, port_no = 71, proto = 0, type = ERROR_URI_T,
flags = (unknown: 10140160), transport = {s = 0x194f15 <error: Cannot access
memory at address 0x194f15>, len = 66}, ttl = {s = 0x0,
            len = 5615623}, user_param = {s = 0x194f15 <error: Cannot access
memory at address 0x194f15>, len = 667307776}, maddr = {s = 0x1fa2da <error:
Cannot access memory at address 0x1fa2da>,
            len = -1783340652}, method = {s = 0xee <error: Cannot access
memory at address 0xee>, len = 10140069}, lr = {s = 0x7f8b8475de28
"\235\030", len = -1783340620}, r2 = {s = 0x0, len = 1134258072},
          gr = {s = 0x7f8b8475de28 "\235\030", len = -1783340224},
transport_val = {s = 0x0, len = -1783339712}, ttl_val = {s = 0x7f8b439b67a8
"\300g\233C\213\177", len = 5615623}, user_param_val = {
            s = 0x7fff95b46c50 "(\336u\204\213\177", len = 667307776},
maddr_val = {s = 0x0, len = 1036492449}, method_val = {
            s = 0x9ab9e0 <buf+480> "ent-Length: 97\r\n\r\nMessages-Waiting:
no\r\nMessage-Account: sip:asterisk@X.X.X.6:5080\r\nVoice-Message: 0/0
(0/0)\r\n", len = 35}, lr_val = {
            s = 0x9ab960 <buf+352> "6:5080\r\nCSeq: 102
NOTIFY\r\nUser-Agent: ast.zs PBX\r\nEvent: message-summary\r\nContent-Type:
application/simple-message-summary\r\nContent-Length:
97\r\n\r\nMessages-Waiting: no\r\nMessage-Account: sip:asterisk@18"..., len
= 10}, r2_val = {
            s = 0x9ab9a5 <buf+421> "ary\r\nContent-Type:
application/simple-message-summary\r\nContent-Length:
97\r\n\r\nMessages-Waiting: no\r\nMessage-Account:
sip:asterisk@X.X.X.6:5080\r\nVoice-Message: ---Type <return> to
continue, or q <return> to quit---
0/0 (0/0)\r\n", len = 0}, gr_val = {s = 0x7fff00000000 <error: Cannot access
memory at address 0x7fff00000000>, len = -1783340460}}
        next_hop = {user = {s = 0x1 <error: Cannot access memory at address
0x1>, len = -2075194792}, passwd = {s = 0x7f8b8463c4a0
"\330\305c\204\213\177", len = 667307776}, host = {
            s = 0x7fff95b463c8 "(\336u\204\213\177", len = -2074998176},
port = {s = 0x7fff95b462c0 "|", len = -2072650200}, params = {s =
0x7fff95b463c8 "(\336u\204\213\177", len = 0}, sip_params = {
            s = 0x676e70 <select_cfg_var>
"AWAVAUATUSH\211\363H\203\354XdH\213\004%(", len = 5636821}, headers = {s =
0x7f8b0000003d <error: Cannot access memory at address 0x7f8b0000003d>, len
= 1008},
          port_no = 15, proto = 0, type = ERROR_URI_T, flags =
(URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 60), transport = {s =
0x1 <error: Cannot access memory at address 0x1>, len = 92}, ttl = {
            s = 0x0, len = 0}, user_param = {s = 0x770000006e <error: Cannot
access memory at address 0x770000006e>, len = 0}, maddr = {s = 0x7c <error:
Cannot access memory at address 0x7c>, len = 2698888},
          method = {s = 0x293c48 <error: Cannot access memory at address
0x293c48>, len = -2054728160}, lr = {s = 0x3c8 <error: Cannot access memory
at address 0x3c8>, len = -1783338992}, r2 = {
            s = 0x7fff95b46810 "\305\fv\204\213\177", len = 0}, gr = {
            s = 0x43b2fc <grp_hash_lookup+1420>
"1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200",
len = -2058043360}, transport_val = {
            s = 0x6aea19 <__FUNCTION__.8262> "rval_new_empty", len =
43099520}, ttl_val = {s = 0x291a590 "\001", len = -2057746175},
user_param_val = {
            s = 0x43b2fc <grp_hash_lookup+1420>
"1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200",
len = 43099536}, maddr_val = {
            s = 0x7fff95b46490 "", len = 4}, method_val = {s =
0x7fff95b46660 "\260\177\355C\213\177", len = -2057714242}, lr_val = {s =
0x7f8b846b8ce8 "\a", len = -2072650200}, r2_val = {
            s = 0x7fff95b46e30 "", len = -1783338768}, gr_val = {s =
0x291a510 "\001", len = -1783339456}}
        u = 0x7f8b8469efd0
        flags = 2
        st = {flags = 1, id = 0, name = {n = -2075194792, s = {s =
        0x7f8b844f0a58 "\n", len = -2073836384}, re = 0x7f8b844f0a58}, avp =
        0xa74478d027c64f00}
        sct = 0x7f8b8469efd0
        sjt = 0x7f8b8469efd0
        mct = 0x0
        rv = 0x7fff95b46070
        rv1 = 0x7f8b8475de28
        c1 = {cache_type = 2511627712, val_type = 32767, c = {avp_val = {n =
        -2072650200, s = {s = 0x7f8b8475de28 "\235\030", len = 0}, re =
        -0x7f8b8475de28}, pval = {rs = {s = 0x7f8b8475de28 "\235\030",
                len = 0}, ri = 5512432, flags = 0}}, i2s =
"\020\245\221\002", '\000' <repeats 12 times>, "\204\216gC\213\177"}
        s = {s = 0x291a400 "xV\207\205\213\177", len = 0}
        srevp = {0x7f8b846a0630, 0x7f8b8475de28}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
        str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
        {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140237199485840,
              string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s =
0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90,
attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#9  0x00000000005407b5 in run_actions (h=0x6acf73, h@entry=0x7fff95b46700,
a=0x4, a@entry=0x7f8b8469d9d8, msg=0x8, msg@entry=0x7f8b8475de28) at
#action.c:1549
        ret = 1
        mod = 0x7f8b846a0630
        __FUNCTION__ = "run_actions"
#10 0x000000000054d225 in run_top_route (a=0x7f8b8469d9d8,
msg=0x7f8b8475de28, c=<optimized out>) at action.c:1635
        ctx = {rec_lev = 2203832, run_flags = 0, last_retcode = 2695376,
jmp_env = {{__jmpbuf = {2702408, 8, 237, -6393852735543423232, 2695376,
6245668, 2203768, 6999923}, __mask_was_saved = 7467126,
              __saved_mask = {__val = {8, 239, 12052891338166128384,
2695312, 6245668, 9569808, 140236102870397, 140236102900704,
140237199498792, 140735705016048, 35, 140237199498792, 140236116819368,
                  140236116819984, 6597488, 43099408}}}}}
        p = <optimized out>
        ret = <optimized out>
        sfbk = 0
#11 0x00007f8b4315b8e6 in prepare_new_uac (t=0x7f8b43ed7da8,
i_req=0x7f8b8475de28, branch=-2075185312, uri=0x7fff95b466a0, path=0x21a108,
#next_hop=0x7f8b847606b8, fsocket=0x7f8b844f2f60, snd_flags=...,
    fproto=0, flags=2, instance=0x7f8b8475e468, ruid=0x7f8b8475e480,
location_ua=0x7f8b8475e490) at t_fwd.c:343
        shbuf = 0x7fff95b466a0 "\260\fv\204\213\177"
        parsed_uri_bak = {user = {s = 0x7f8b84760cb4
"s@185.99.186.218:5060", len = 1}, passwd = {s = 0x0, len = 0}, host = {s =
0x7f8b84760cb6 "185.99.186.218:5060", len = 14}, port = {
            s = 0x7f8b84760cc5 "5060", len = 4}, params = {s = 0x0, len =
0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no =
5060, proto = 0, type = SIP_URI_T, flags = (unknown: 0),
---Type <return> to continue, or q <return> to quit---
          transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0},
user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s =
0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0},
          gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0},
ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val
= {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0},
          lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val =
{s = 0x0, len = 0}}
        ret = -2072649560
        len = 0
        msg_uri_bak = {s = 0x7f8b84760cb0 "sip:s@185.99.186.218:5060", len =
        25}
        dst_uri_bak = {s = 0x0, len = 0}
        dst_uri_backed_up = -2075185312
        path_bak = {s = 0x0, len = 0}
        instance_bak = {s = 0x0, len = 0}
        ruid_bak = {s = 0x7f8b84760640 "uloc-590b3d48-7288-95060 ", len =
        20}
        ua_bak = {s = 0x7f8b84760d18 "Asterisk PBX
        SVN-branch-1.8-r434337slsda8", len = 35}
        force_send_socket_bak = 0x7f8b844f2f60
        dst = 0x7f8b43ed8010
        ctx = {rec_lev = 2, run_flags = 0, last_retcode = 0, jmp_env =
        {{__jmpbuf = {140735705016064, 1818402078992133173, 140237198711256,
        140237199498792, 140236116819368, 140236116819984,
                -1818495034028692427, 1818402731650608181}, __mask_was_saved
                -= 0, __saved_mask = {__val = {140235982654803,
                -140735705017568, 1, 140735705016736, 140237198820624,
                -140237198822632, 10132608, 3,
                  6158328, 140237198820112, 140236067782550, 16777216,
140735705016324, 2206096, 140236067782550, 16777216}}}}}
        __FUNCTION__ = "prepare_new_uac"
#12 0x00007f8b4315de45 in add_uac (t=0x7f8b43ed7da8, request=0x7f8b8475de28,
uri=0x8, next_hop=0x1, path=0x21a108, proxy=0x0, fsocket=0x7f8b844f2f60,
#snd_flags=..., proto=0, flags=-2072639840,
    instance=0x7f8b8475e468, ruid=0x7f8b8475e480,
location_ua=0x7f8b8475e490) at t_fwd.c:788
        branch = 0
        __FUNCTION__ = "add_uac"
#13 0x00007f8b4316672a in t_forward_nonack (t=0x7f8b43ed7da8,
p_msg=0x7f8b8475de28, proxy=0x8, proto=1) at t_fwd.c:1667
        current_uri = {s = 0x0, len = -2072650200}
        q = 0
        t_invite = 0x2
        success_branch = -2072648560
        lock_replies = 2
        dst_uri = {s = 0x0, len = 10485676}
        path = {s = 0x7f8b433a71f0 <tm_cfg> "0OkC\213\177", len =
        1127903728}
        instance = {s = 0x7f8b433baf30 <user_rt_t1_timeout_ms> "", len =
        1124934652}
        ruid = {s = 0x7fff95b470e0 "", len = 1125417061}
        location_ua = {s = 0x7f8b845cbab8 "\207\003", len = 5512432}
        si = 0xa74478d027c64f00
        backup_bflags = 0
        bflags = 0
        __FUNCTION__ = "t_forward_nonack"
#14 0x00007f8b43137ba3 in t_relay_to (p_msg=0x7f8b8475de28, proxy=0x0,
proto=0, replicate=0) at t_funcs.c:328
        ret = 1
        t = 0x7f8b43ed7da8
        dst = {send_sock = 0x1ac00f, to = {s = {sa_family = 27748, sa_data =
        "\264\225\377\177\000\000\000\000\000\000\000\000\000"}, sin =
        {sin_family = 27748, sin_port = 38324, sin_addr = {s_addr = 32767},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 =
{sin6_family = 27748, sin6_port = 38324, sin6_flowinfo = 32767, sin6_addr =
{__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {
                    0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 2222317096}}, id = 32651, proto = -124 '\204', send_flags =
{f = 108 'l', blst_imask = 180 '\264'}}
        host = {s = 0x7f8b845cbab8 "\207\003", len = -2072650200}
        __FUNCTION__ = "t_relay_to"
#15 0x0000000000541cf0 in do_action (h=0x7fff95b47360, a=0x7f8b845cd4c8,
msg=0x7f8b8475de28) at action.c:1060
        ret = -5
        v = 0
        dst = {send_sock = 0x1800000000, to = {s = {sa_family = 28388,
        sa_data = "\264\225\377\177\000\000\000\000\000\000\000\000\000"},
        sin = {sin_family = 28388, sin_port = 38324, sin_addr = {
                s_addr = 32767}, sin_zero = "\000\000\000\000\000\000\000"},
sin6 = {sin6_family = 28388, sin6_port = 38324, sin6_flowinfo = 32767,
sin6_addr = {__in6_u = {
                  __u6_addr8 =
"\000\000\000\000\000\000\000\000\240\\\215C\213\177\000", __u6_addr16 = {0,
0, 0, 0, 23712, 17293, 32651, 0}, __u6_addr32 = {0, 0, 1133337760, 32651}}},
sin6_scope_id = 94}},
---Type <return> to continue, or q <return> to quit---
          id = 0, proto = 21 '\025', send_flags = {f = 70 'F', blst_imask =
110 'n'}}
        end = 0x7fff95b47360 "\001"
        uri = {user = {s = 0x7f8b844f36b0 "\377\377\377\377", len =
6999923}, passwd = {s = 0x6e5602 <__FUNCTION__.4797> "xavp_new_value", len =
667307776}, host = {
            s = 0x50 <error: Cannot access memory at address 0x50>, len =
-2074236072}, port = {s = 0x7f8b8475de28 "\235\030", len = -1783327504},
params = {s = 0x7fff95b494f0 "\006", len = -1783335964},
          sip_params = {s = 0x0, len = 1128019136}, headers = {s =
0x7f8b433bb000 "", len = 70}, port_no = 17941, proto = 110, type =
ERROR_URI_T, flags = (unknown: 667307776), transport = {
            s = 0x5e <error: Cannot access memory at address 0x5e>, len =
-2074296968}, ttl = {s = 0x7fff95b494f0 "\006", len = 1125128152},
user_param = {s = 0x7f8b845cbd78 "\207\003", len = 1125415371},
          maddr = {s = 0x0, len = 5512432}, method = {s = 0x0, len =
5506997}, lr = {s = 0x7fff95b470e0 "", len = 1132494968}, r2 = {s =
0x7f8b845cbab8 "\207\003", len = -2072650200}, gr = {
            s = 0x100000000 <error: Cannot access memory at address
0x100000000>, len = 1132494976}, transport_val = {s = 0x7f8b43808078
"\023TP|", len = 0}, ttl_val = {
            s = 0x7f8b00000000 <error: Cannot access memory at address
0x7f8b00000000>, len = 5581401}, user_param_val = {s = 0x7f8b437fb3b8
"H\265\177C\213\177", len = 35}, maddr_val = {
            s = 0x7f8b845cbd78 "\207\003", len = -2072650200}, method_val =
{s = 0x7f8b438d5ce8 "oV", <incomplete sequence \370>, len = 667307776},
lr_val = {s = 0x0, len = 1085918576}, r2_val = {
            s = 0x7f8b8475de28 "\235\030", len = 1131035264}, gr_val = {s =
0x7f8b8475de28 "\235\030", len = 1088236936}}
        next_hop = {user = {s = 0x7f8b40b9cc40 <ul> "\001", len =
1083664351}, passwd = {s = 0x7f8b436a3a80 "", len = -1783336688}, host = {s
= 0x7f8b40b9cc40 <ul> "\001", len = 0}, port = {
            s = 0x7fff95b494f0 "\006", len = -2072650200}, params = {s =
0x7fff95b494f0 "\006", len = -1783335964}, sip_params = {s = 0x0, len =
5558663}, headers = {s = 0x0, len = -1}, port_no = 28896,
          proto = 38324, type = 32767, flags = (URI_USER_NORMALIZE |
unknown: 1355312180), transport = {s = 0x7f8b8475de28 "\235\030", len =
-1783327504}, ttl = {s = 0x7fff95b473e4 "\377\177", len = 0},
          user_param = {s = 0xe6c36866a6886c35 <error: Cannot access memory
at address 0xe6c36866a6886c35>, len = 1856138293}, maddr = {s = 0x0, len =
0}, method = {s = 0x0, len = 0}, lr = {
            s = 0x156673 <error: Cannot access memory at address 0x156673>,
len = 667307776}, r2 = {
            s = 0x9ab80b <buf+11> "zs_pbx40_trunk@XXXXXXXXXX.com
SIP/2.0\r\nVia: SIP/2.0/UDP
X.X.X.6:5080;branch=z9hG4bK542e0106\r\nMax-Forwards: 69\r\nFrom:
\"asterisk\" <sip:asterisk@X.X.X.6:5080>;tag=as785f9e00\r\nTo: <si"...,
len = 14}, gr = {s = 0x0, len = 0}, transport_val = {
            s = 0x9ab81a <buf+26> "XXXXXXXXXX.com SIP/2.0\r\nVia:
SIP/2.0/UDP X.X.X.6:5080;branch=z9hG4bK542e0106\r\nMax-Forwards:
69\r\nFrom: \"asterisk\"
<sip:asterisk@X.X.X.6:5080>;tag=as785f9e00\r\nTo:
<sip:zs_pbx40_trun"..., len = 25}, ttl_val = {s = 0x0, len = 0},
user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 667307776},
method_val = {s = 0x0, len = -1783335964},
          lr_val = {s = 0x7fff95b494f0 "\006", len = 4329872}, r2_val = {s =
0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        u = 0x7fff95b47360
        flags = 0
        st = {flags = 1085918272, id = 32651, name = {n = 1083664351, s = {s
        = 0x7f8b409767df <lookup_helper+2607> "D\211\360H\213\214$\330\003",
        len = 1131035264}, re = 0x7f8b409767df <lookup_helper+2607>},
          avp = 0x7fff95b47110}
        sct = 0x7fff95b47360
        sjt = 0x7fff95b47360
        mct = 0x0
        rv = 0x426f1c <rval_expr_eval_int+684>
        rv1 = 0x7f8b8475de28
        c1 = {cache_type = 1127985152, val_type = 32651, c = {avp_val = {n =
        72, s = {s = 0x48 <error: Cannot access memory at address 0x48>, len
        = 362}, re = 0x48}, pval = {rs = {
                s = 0x48 <error: Cannot access memory at address 0x48>, len
= 362}, ri = 5615623, flags = 0}}, i2s =
"\000\000\000\000\000\000\000\000\000O\306'\320xD\247\000\000\000\000\000"}
        s = {s = 0x0, len = 1005473107}
        srevp = {0x7f8b845cd4c8, 0x7f8b8475de28}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
        str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
        {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140237199485840,
              string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s =
0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90,
attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#16 0x00000000005407b5 in run_actions (h=0x6acf73, h@entry=0x7fff95b47360,
a=0x4, msg=0x8) at action.c:1549
        ret = -1783327504
        mod = 0x7f8b845cd4c8
        __FUNCTION__ = "run_actions"
#17 0x000000000054d187 in run_actions_safe (h=0x7fff95b494f0, a=<optimized
out>, msg=<optimized out>) at action.c:1614
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env =
{{__jmpbuf = {140735705019232, -1818495031581316043, 140237197857680,
140237199498792, 140237197860160, 0, -1818495034588632011,
                1818402731650608181}, __mask_was_saved = 0, __saved_mask =
{__val = {12052891338166128384, 140237197857400, 140235982654803,
140735705027824, 4294967291, 140735705027824, 140237199498792, 0,
                  5506997, 140735705027824, 25774158030, 140237197852024,
12052891338166128384, 30064771072, 140237197861968, 140735705027824}}}}}
        ret = <optimized out>
---Type <return> to continue, or q <return> to quit---
        ign_on_break = 0
#18 0x000000000044e4fd in lval_pvar_assign (lv=<optimized out>,
rv=<optimized out>, msg=<optimized out>, h=<optimized out>) at lvalue.c:282
        r_avp = 0x7f8b847606a0
        destroy_pval = -1783327504
        pvar = 0x7f8b847606b8
        pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 24}
        avp_val = {n = -1783327504, s = {s = 0x7fff95b494f0 "\006", len =
        -2072650200}, re = 0x7fff95b494f0}
        v = -2072639840
#19 lval_assign (h=0x7fff95b494f0, msg=0x7f8b8475de28, lv=0x7f8b845cd390,
rve=0x7f8b845cdd40) at lvalue.c:399
        rv = 0x7f8b845cdd48
        ret = -1783327504
        __FUNCTION__ = "lval_assign"
#20 0x00000000005414d3 in do_action (h=0x7fff95b494f0, a=0x7f8b845ce450,
msg=0x7f8b8475de28) at action.c:1430
        ret = -5
        v = 1
        dst = {send_sock = 0x3a706973, to = {s = {sa_family = 0, sa_data =
        '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0,
        sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"},
            sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
sin6_addr = {__in6_u = {__u6_addr8 =
"\000\000\000\000\000\000\000\000\330\023\000\000\036\000\000", __u6_addr16
= {0, 0, 0, 0, 5080, 0,
                    30, 0}, __u6_addr32 = {0, 0, 5080, 30}}}, sin6_scope_id
= 10139691}}, id = 0, proto = -88 '\250', send_flags = {f = 232 '\350',
blst_imask = 117 'u'}}
        end = 0x7fff95b494f0 "\006"
        uri = {user = {s = 0x7fff95b494f0 "\006", len = -2072650200}, passwd
= {s = 0x7fff95b494f0 "\006", len = -1783334604}, host = {s = 0x0, len =
5558663}, port = {s = 0x0, len = 1}, params = {
            s = 0x7fff95b47630 "", len = 1355312181}, sip_params = {s =
0x7f8b8475de28 "\235\030", len = -1783327504}, headers = {s = 0x7fff95b47934
"\377\177", len = 0}, port_no = 27701, proto = 37736,
          type = 3871565926, flags = (URI_USER_NORMALIZE | unknown:
1856138292), transport = {s = 0x7f8b00000000 <error: Cannot access memory at
address 0x7f8b00000000>, len = 944}, ttl = {
            s = 0x19 <error: Cannot access memory at address 0x19>, len =
-2072650200}, user_param = {s = 0x7fff95b494f0 "\006", len = -1783333744},
maddr = {s = 0x0, len = 4326528}, method = {
            s = 0x7fff95b476e0 "\206\271\232", len = 4326591}, lr = {s =
0x7f8b847637e8 "\002", len = 4339131}, r2 = {
            s = 0x9ab986 <buf+390> "ast.zs PBX\r\nEvent:
message-summary\r\nContent-Type:
application/simple-message-summary\r\nContent-Length:
97\r\n\r\nMessages-Waiting: no\r\nMessage-Account:
sip:asterisk@X.X.X.6:5080\r\nVoice-Message: 0/0 (0"..., len = 10}, gr =
{s = 0x0, len = 5795166}, transport_val = {s = 0x7fff95b47934 "\377\177",
len = 667307776}, ttl_val = {s = 0x7f8b8475de28 "\235\030",
            len = -1783334604}, user_param_val = {s = 0x7fff95b494f0 "\006",
len = 4329872}, maddr_val = {s = 0x1000000 <error: Cannot access memory at
address 0x1000000>, len = 14080880}, method_val = {
            s = 0x21a478 <error: Cannot access memory at address 0x21a478>,
len = 2696336}, lr_val = {s = 0x293c48 <error: Cannot access memory at
address 0x293c48>, len = 8}, r2_val = {
            s = 0xf2 <error: Cannot access memory at address 0xf2>, len =
667307776}, gr_val = {s = 0x292490 <error: Cannot access memory at address
0x292490>, len = 667307776}}
        next_hop = {user = {s = 0x0, len = -2073959688}, passwd = {s =
0xffffffff <error: Cannot access memory at address 0xffffffff>, len =
-2072650200}, host = {s = 0x7fff95b494f0 "\006", len = -1783334604},
          port = {s = 0x0, len = 4353820}, params = {s = 0xe6c3686695c86c35
<error: Cannot access memory at address 0xe6c3686695c86c35>, len =
1856138293}, sip_params = {s = 0x0, len = 944}, headers = {
            s = 0x19 <error: Cannot access memory at address 0x19>, len =
-2072650200}, port_no = 38128, proto = 38324, type = 32767, flags =
(unknown: 2511633888), transport = {s = 0x0, len = 4326528}, ttl = {
            s = 0x7fff95b47830 "\206\271\232", len = 4326591}, user_param =
{s = 0x7f8b847637e8 "\002", len = 4339131}, maddr = {
            s = 0x9ab986 <buf+390> "ast.zs PBX\r\nEvent:
message-summary\r\nContent-Type:
application/simple-message-summary\r\nContent-Length:
97\r\n\r\nMessages-Waiting: no\r\nMessage-Account:
sip:asterisk@X.X.X.6:5080\r\nVoice-Message: 0/0 (0"..., len = 10},
method = {s = 0x0, len = 5795166}, lr = {s = 0x7fff95b47ab0 "", len =
667307776}, r2 = {s = 0x7f8b8475de28 "\235\030", len = -1783334732}, gr = {
            s = 0x7fff95b494f0 "\006", len = 1090600854}, transport_val = {s
= 0x1000000 <error: Cannot access memory at address 0x1000000>, len =
14080880}, ttl_val = {
            s = 0x21a478 <error: Cannot access memory at address 0x21a478>,
len = 2696336}, user_param_val = {s = 0x293c48 <error: Cannot access memory
at address 0x293c48>, len = 8}, maddr_val = {
            s = 0xf2 <error: Cannot access memory at address 0xf2>, len =
667307776}, method_val = {s = 0x292490 <error: Cannot access memory at
address 0x292490>, len = 667307776}, lr_val = {
            s = 0x7f8b845cd390 "\002", len = -2073957880}, r2_val = {s =
0xffffffff <error: Cannot access memory at address 0xffffffff>, len =
-2072650200}, gr_val = {s = 0x7fff95b494f0 "\006",
            len = -1783334224}}
        u = 0x7fff95b494f0
        flags = 32651
        st = {flags = 0, id = 0, name = {n = -2073959688, s = {s =
        0x7f8b8461e2f8 "\001", len = -1}, re = 0x7f8b8461e2f8}, avp =
        0x7f8b8475de28}
        sct = 0x7fff95b494f0
        sjt = 0x7fff95b494f0
        mct = 0x0
        rv = 0x7fff95b475f0
        rv1 = 0x7f8b8475de28
        c1 = {cache_type = 2222319856, val_type = 32651, c = {avp_val = {n =
        -1783335404, s = {s = 0x7fff95b47614 "\377\177", len = -1783333680},
        -re = 0x7fff95b47614}, pval = {rs = {
                s = 0x7fff95b47614 "\377\177", len = -1783333680}, ri =
1090600854, flags = 32651}}, i2s =
"\000\000\000\001\000\000\000\000p\333\326\000\000\000\000\000x\244!\000\000"}
        s = {s = 0x31 <error: Cannot access memory at address 0x31>, len =
10139691}
---Type <return> to continue, or q <return> to quit---
        srevp = {0x7f8b845ce450, 0x7f8b8475de28}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140237199485840,
              string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s =
0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90,
attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#21 0x00000000005407b5 in run_actions (h=0x6acf73, a=0x4, msg=0x8) at
action.c:1549
        ret = 1
        mod = 0x7f8b845ce450
        __FUNCTION__ = "run_actions"
#22 0x00000000005423e0 in do_action (h=0x7fff95b494f0, a=0x7f8b84624210,
msg=0x7f8b8475de28) at action.c:678
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 16278, sa_data =
        "\001A\213\177\000\000\000\000\000\001\000\000\000"}, sin =
        {sin_family = 16278, sin_port = 16641, sin_addr = {s_addr = 32651},
              sin_zero = "\000\000\000\001\000\000\000"}, sin6 =
{sin6_family = 16278, sin6_port = 16641, sin6_flowinfo = 32651, sin6_addr =
{__in6_u = {
                  __u6_addr8 =
"\000\000\000\001\000\000\000\000p\333\326\000\000\000\000", __u6_addr16 =
{0, 256, 0, 0, 56176, 214, 0, 0}, __u6_addr32 = {16777216, 0, 14080880,
0}}},
              sin6_scope_id = 2204792}}, id = 0, proto = 84 'T', send_flags
= {f = 123 '{', blst_imask = 180 '\264'}}
        end = 0xa <error: Cannot access memory at address 0xa>
        uri = {user = {s = 0xf2 <error: Cannot access memory at address
0xf2>, len = 667307776}, passwd = {s = 0x2923b8 <error: Cannot access memory
at address 0x2923b8>, len = 6245668}, host = {
            s = 0x28e886 <error: Cannot access memory at address 0x28e886>,
len = 6999923}, port = {s = 0x6aea19 <__FUNCTION__.8262> "rval_new_empty",
len = 1005473107}, params = {
            s = 0x400000000 <error: Cannot access memory at address
0x400000000>, len = -2074167456}, sip_params = {s = 0x0, len = -2072650200},
headers = {s = 0x7fff95b47c10 "\200Av\204\213\177",
            len = 4326400}, port_no = 46944, proto = 33886, type = 32651,
flags = (unknown: 936), transport = {s = 0x19 <error: Cannot access memory
at address 0x19>, len = -2072650200}, ttl = {
            s = 0x7fff95b494f0 "\006", len = -1783332400}, user_param = {s =
0x0, len = 4326528}, maddr = {s = 0x7fff95b47c20 "\206\271\232", len =
4326591}, method = {s = 0x7f8b84764180 "\002",
            len = 4339131}, lr = {
            s = 0x9ab986 <buf+390> "ast.zs PBX\r\nEvent:
message-summary\r\nContent-Type:
application/simple-message-summary\r\nContent-Length:
97\r\n\r\nMessages-Waiting: no\r\nMessage-Account:
sip:asterisk@X.X.X.6:5080\r\nVoice-Message: 0/0 (0"..., len = 6}, r2 =
{s = 0x0, len = 1090600854}, gr = {s = 0x1000000 <error: Cannot access
memory at address 0x1000000>, len = 14080880}, transport_val = {
            s = 0x21a478 <error: Cannot access memory at address 0x21a478>,
len = -1783333724}, ttl_val = {s = 0x293c48 <error: Cannot access memory at
address 0x293c48>, len = 1090600854}, user_param_val = {
            s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 14080880}, maddr_val = {s = 0x21a478 <error: Cannot access
memory at address 0x21a478>, len = 667307776}, method_val = {
            s = 0x293c48 <error: Cannot access memory at address 0x293c48>,
len = -2074935496}, lr_val = {s = 0x7fff95b48220 "", len = -2072650200},
r2_val = {s = 0x7fff95b48220 "", len = -2072650200},
          gr_val = {s = 0x0, len = 5512432}}
        next_hop = {user = {s = 0x6aea19 <__FUNCTION__.8262>
"rval_new_empty", len = 667307776}, passwd = {s = 0xffffffff <error: Cannot
access memory at address 0xffffffff>, len = -2074159736}, host = {
            s = 0x0, len = -2072650200}, port = {s = 0x7fff95b47d60
"\350\067v\204\213\177", len = 4326400}, params = {s = 0x7f8b845ed588
"\002", len = 944}, sip_params = {
            s = 0x19 <error: Cannot access memory at address 0x19>, len =
-2072650200}, headers = {s = 0x7fff95b494f0 "\006", len = -1783332064},
port_no = 65336, proto = 33874, type = 32651,
          flags = (unknown: 2222317096), transport = {s = 0x7fff95b47d70
"\360߈\002", len = 4326591}, ttl = {s = 0x7f8b847637e8 "\002", len =
4339131}, user_param = {
            s = 0x288dff0 "ast.zs PBX4.7-a8462c9596cb38db32", len = 10},
maddr = {s = 0x0, len = 0}, method = {s = 0x7fff95b48008 "", len =
-1783332888}, lr = {s = 0x7fff95b48008 "", len = -1783333388}, r2 = {
            s = 0x293c48 <error: Cannot access memory at address 0x293c48>,
len = 1090600854}, gr = {s = 0x1000000 <error: Cannot access memory at
address 0x1000000>, len = 14080880}, transport_val = {
            s = 0x21a478 <error: Cannot access memory at address 0x21a478>,
len = 2696336}, ttl_val = {s = 0x293c48 <error: Cannot access memory at
address 0x293c48>, len = 8}, user_param_val = {
            s = 0xf2 <error: Cannot access memory at address 0xf2>, len =
667307776}, maddr_val = {s = 0x7fff95b47e98 "\265\aT", len = 47}, method_val
= {
            s = 0x3a706973 <error: Cannot access memory at address
0x3a706973>, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len =
7}, gr_val = {s = 0x7f8b8475de28 "\235\030", len = 7}}
        u = 0xa
        flags = 32767
        st = {flags = 7006745, id = 0, name = {n = 667307776, s = {s =
        0xa74478d027c64f00 <error: Cannot access memory at address
        0xa74478d027c64f00>, len = -1}, re = 0xa74478d027c64f00}, avp =
        0x7f8b845ed588}
        sct = 0xa
        sjt = 0xa
        mct = 0x0
        rv = 0x4204bf <rval_new_str+15>
        rv1 = 0x7f8b8475de28
        c1 = {cache_type = 2702408, val_type = RV_NONE, c = {avp_val = {n =
        1090600854, s = {
---Type <return> to continue, or q <return> to quit---
                s = 0x7f8b41013f96 <pkg_proc_update_stats+70>
"Hc\023H\213|$\b1\300L\213D$\020L\213L$\030L\213T$0H\215\064RH\301\346\004H\003\065\322\315
", len = 16777216},
              re = 0x7f8b41013f96 <pkg_proc_update_stats+70>}, pval = {rs =
{
                s = 0x7f8b41013f96 <pkg_proc_update_stats+70>
"Hc\023H\213|$\b1\300L\213D$\020L\213L$\030L\213T$0H\215\064RH\301\346\004H\003\065\322\315
", len = 16777216}, ri = 14081096, flags = 0}},
          i2s =
"\240\243!\000\000\000\000\000\270#)\000\000\000\000\000H<)\000\000"}
        s = {s = 0x7f8b847637e8 "\002", len = 4339131}
        srevp = {0x7f8b84621018, 0x7f8b8475de28}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
        str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
        {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140237199485840,
              string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s =
0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90,
attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#23 0x00000000005407b5 in run_actions (h=0x6acf73, a=0x4, msg=0x8) at
action.c:1549
        ret = 1
        mod = 0x7f8b84621018
        __FUNCTION__ = "run_actions"
#24 0x00000000005423e0 in do_action (h=0x7fff95b494f0, a=0x7f8b84624210,
msg=0x7f8b8475de28) at action.c:678
        ret = -5
        v = 0
        dst = {send_sock = 0x7fff95b48620, to = {s = {sa_family = 56872,
        sa_data = "u\204\213\177\000\000 \206\264\225\377\177\000"}, sin =
        {sin_family = 56872, sin_port = 33909, sin_addr = {s_addr = 32651},
              sin_zero = " \206\264\225\377\177\000"}, sin6 = {sin6_family =
56872, sin6_port = 33909, sin6_flowinfo = 32651, sin6_addr = {__in6_u = {
                  __u6_addr8 = "
\206\264\225\377\177\000\000(\336u\204\213\177\000", __u6_addr16 = {34336,
38324, 32767, 0, 56872, 33909, 32651, 0}, __u6_addr32 = {2511636000, 32767,
2222317096, 32651}}},
              sin6_scope_id = 0}}, id = 0, proto = 7 '\a', send_flags = {f =
176 '\260', blst_imask = 85 'U'}}
        end = 0xf <error: Cannot access memory at address 0xf>
        uri = {user = {s = 0x7fff95b481f0 "\360\224\264\225\377\177", len =
1130964784}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>,
len = 5615623}, host = {s = 0x0, len = 667307776},
          port = {s = 0x7f8b8475e5a0 "N\270\232", len = -2074935496}, params
= {s = 0x7fff95b494f0 "\006", len = -5}, sip_params = {s = 0x7fff95b48220
"", len = -2072650200}, headers = {s = 0x0,
            len = 5506997}, port_no = 33312, proto = 38324, type = 32767,
flags = (unknown: 10140004), transport = {s = 0x7f8b8452ff38 "\331\001", len
= -2072650200}, ttl = {
            s = 0x100000000 <error: Cannot access memory at address
0x100000000>, len = 5615623}, user_param = {s = 0x156673 <error: Cannot
access memory at address 0x156673>, len = 667307776}, maddr = {
            s = 0x1ac00f <error: Cannot access memory at address 0x1ac00f>,
len = -1783332444}, method = {s = 0x7f8b845f4a70 "\001", len = 0}, lr = {s =
0x7f8b8475de28 "\235\030", len = -1783332412}, r2 = {
            s = 0x0, len = 1138816376}, gr = {s = 0x7f8b8475de28 "\235\030",
len = -1783332016}, transport_val = {s = 0x0, len = -1783331504}, ttl_val =
{s = 0x7f8b43e0f588 "0@\236C\213\177", len = 5615623},
          user_param_val = {s = 0x0, len = 667307776}, maddr_val = {s =
0x100000000 <error: Cannot access memory at address 0x100000000>, len =
667307776}, method_val = {
            s = 0x9ab934 <buf+308>
"7feae50257e62b06765f0a4c4d60650a@X.X.X.6:5080\r\nCSeq: 102
NOTIFY\r\nUser-Agent: ast.zs PBX\r\nEvent: message-summary\r\nContent-Type:
application/simple-message-summary\r\nContent-Length:
97\r\n\r\nMessages-W"..., len = 0}, lr_val = {s = 0x7fff95b494f0 "\006", len
= -2072650200}, r2_val = {s = 0x7fff95b494f0 "\006", len = -1783331504},
gr_val = {s = 0x0, len = 5558663}}
        next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7fff95b48220
"", len = 1355312181}, host = {s = 0x7f8b8475de28 "\235\030", len =
-1783327504}, port = {s = 0x7fff95b48550 "\001", len = 0},
          params = {s = 0xe6c368677b086c35 <error: Cannot access memory at
address 0xe6c368677b086c35>, len = 1856138293}, sip_params = {s = 0x0, len =
667307776}, headers = {
            s = 0xf1 <error: Cannot access memory at address 0xf1>, len =
-2074129800}, port_no = 62232, proto = 33874, type = 32651, flags =
(unknown: 2222317096), transport = {s = 0x0, len = 667307776},
          ttl = {s = 0x0, len = -2074595816}, user_param = {s =
0x7fff95b48350 "", len = -2072650200}, maddr = {s = 0x7fff95b494f0 "\006",
len = -1783331504}, method = {s = 0x0, len = 5795166}, lr = {
            s = 0x7fff95b48550 "\001", len = 667307776}, r2 = {s =
0x7f8b8475de28 "\235\030", len = -1783331504}, gr = {s = 0x7fff95b494f0
"\006", len = 4329872}, transport_val = {s = 0x0, len = -1783331980},
          ttl_val = {s = 0xee <error: Cannot access memory at address 0xee>,
len = -2072643184}, user_param_val = {s = 0xa49900 <_pkg_root> "\313\030p",
len = -2074829352}, maddr_val = {s = 0x0, len = 0},
          method_val = {s = 0x0, len = 667307776}, lr_val = {s =
0x7fff95b494f0 "\006", len = -2074934992}, r2_val = {s = 0xffffffff <error:
Cannot access memory at address 0xffffffff>, len = -2072650200},
          gr_val = {s = 0x7fff95b494f0 "\006", len = -1783331504}}
        u = 0xf
        flags = 0
        st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x7f8b00000001
        <error: Cannot access memory at address 0x7f8b00000001>, len =
        -1783332320}, re = 0x7f8b00000001}, avp = 0xe6c3686750c86c35}
        sct = 0xf
        sjt = 0xf
        mct = 0x0
        rv = 0x0
        rv1 = 0x7f8b8475de28
---Type <return> to continue, or q <return> to quit---
        c1 = {cache_type = 2220900400, val_type = 32651, c = {avp_val = {n =
667307776, s = {s = 0xa74478d027c64f00 <error: Cannot access memory at
address 0xa74478d027c64f00>, len = -2072650200},
              re = 0xa74478d027c64f00}, pval = {rs = {s = 0xa74478d027c64f00
<error: Cannot access memory at address 0xa74478d027c64f00>, len =
-2072650200}, ri = -1783332668, flags = 32767}},
          i2s = "\000\000\000\000\n", '\000' <repeats 11 times>,
"D'iC\213\177"}
        s = {s = 0x66845f2c48 <error: Cannot access memory at address
0x66845f2c48>, len = -1783332764}
        srevp = {0x7f8b84530958, 0x7f8b8475de28}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140237199485840,
              string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s =
0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90,
attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#25 0x00000000005407b5 in run_actions (h=0x6acf73, a=0x4, msg=0x8) at
action.c:1549
        ret = -1783327504
        mod = 0x7f8b84530958
        __FUNCTION__ = "run_actions"
#26 0x0000000000542218 in do_action (h=0x7fff95b494f0, a=0x7f8b845317d0,
msg=0x7f8b8475de28) at action.c:1049
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
        "\000\000\000\000\000\000(\336u\204\213\177\000"}, sin = {sin_family
        = 0, sin_port = 0, sin_addr = {s_addr = 0},
              sin_zero = "(\336u\204\213\177\000"}, sin6 = {sin6_family = 0,
sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"(\336u\204\213\177\000\000P\207\264\225\377\177\000",
                  __u6_addr16 = {56872, 33909, 32651, 0, 34640, 38324,
32767, 0}, __u6_addr32 = {2222317096, 32651, 2511636304, 32767}}},
sin6_scope_id = 0}}, id = 0, proto = -64 '\300', send_flags = {
            f = 137 '\211', blst_imask = 180 '\264'}}
        end = 0x7f8b84530130 "\001"
        uri = {user = {s = 0x7fff95b48b70 "", len = -2072650200}, passwd =
        {s = 0x7fff95b48b70 "", len = -2072650200}, host = {s = 0x0, len =
        667307776}, port = {s = 0x0, len = -2074938600}, params = {
            s = 0x7fff95b494f0 "\006", len = -5}, sip_params = {s =
0x7fff95b48770 "", len = -2072650200}, headers = {s = 0x0, len = 5506997},
port_no = 34672, proto = 38324, type = 32767,
          flags = (unknown: 10140004), transport = {s = 0x7f8b8452f318
"\327\001", len = -2072650200}, ttl = {s = 0x100000000 <error: Cannot access
memory at address 0x100000000>, len = 5615623}, user_param = {
            s = 0x7f8b8452a4c8 "\307\001", len = -2072650200}, maddr = {s =
0x1ac00f <error: Cannot access memory at address 0x1ac00f>, len =
-1783331084}, method = {s = 0x7f8b8464f330 "\001",
            len = -1783331068}, lr = {s = 0x7f8b8475de28 "\235\030", len =
-2074969528}, r2 = {s = 0x7f8b8475de28 "\235\030", len = -2072650200}, gr =
{s = 0x7fff95b48cc0 "", len = -2072650200},
          transport_val = {s = 0x0, len = 5615623}, ttl_val = {s =
0x7f8b43e0f588 "0@\236C\213\177", len = 667307776}, user_param_val = {s =
0x7fff95b494f0 "\006", len = 1081383208}, maddr_val = {
            s = 0x156673 <error: Cannot access memory at address 0x156673>,
len = 667307776}, method_val = {
            s = 0x9ab934 <buf+308>
"7feae50257e62b06765f0a4c4d60650a@X.X.X.6:5080\r\nCSeq: 102
NOTIFY\r\nUser-Agent: ast.zs PBX\r\nEvent: message-summary\r\nContent-Type:
application/simple-message-summary\r\nContent-Length:
97\r\n\r\nMessages-W"..., len = 0}, lr_val = {s = 0x7fff95b494f0 "\006", len
= -2072650200}, r2_val = {s = 0x7fff95b494f0 "\006", len = -1783330144},
gr_val = {s = 0x0, len = 5558663}}
        next_hop = {user = {s = 0x0, len = -1}, passwd = {s = 0x7fff95b48770
"", len = 1355312181}, host = {s = 0x7f8b8475de28 "\235\030", len =
-1783327504}, port = {s = 0x7fff95b48aa0 "", len = 0}, params = {
            s = 0xe6c3686775e86c35 <error: Cannot access memory at address
0xe6c3686775e86c35>, len = 1856138293}, sip_params = {s = 0x0, len = 50},
headers = {
            s = 0x9ab8c0 <buf+192> "as785f9e00\r\nTo:
<sip:zs_pbx40_trunk@XXXXXXXXXX.com>\r\nContact:
<sip:asterisk@X.X.X.6:5080>\r\nCall-ID:
7feae50257e62b06765f0a4c4d60650a@X.X.X.6:5080\r\nCSeq: 102
NOTIFY\r\nUser-Agent: as"..., len = 10}, port_no = 56848, proto = 33874,
type = 32651, flags = (unknown: 2222317096), transport = {s = 0x0, len =
667307776}, ttl = {
            s = 0x30 <error: Cannot access memory at address 0x30>, len =
-2073886456}, user_param = {s = 0x7fff95b488a0 "", len = -2072650200}, maddr
= {s = 0x7fff95b494f0 "\006", len = -1783330144},
          method = {s = 0x0, len = 5795166}, lr = {s = 0x7fff95b48aa0 "",
len = 667307776}, r2 = {s = 0x7f8b8475de28 "\235\030", len = -1783330144},
gr = {s = 0x7fff95b494f0 "\006", len = 4329872},
          transport_val = {s = 0x0, len = 1138816376}, ttl_val = {s =
0x7f8b8451f028 "", len = 667307776}, user_param_val = {s = 0x7fff95b489e0
"\310\003", len = -2073657864}, maddr_val = {s = 0x0, len = 0},
          method_val = {s = 0x0, len = 667307776}, lr_val = {s = 0x0, len =
-2074938096}, r2_val = {s = 0xffffffff <error: Cannot access memory at
address 0xffffffff>, len = -2072650200}, gr_val = {
            s = 0x7fff95b494f0 "\006", len = -1783330144}}
        u = 0x7f8b84530130
        flags = 0
        st = {flags = 0, id = 0, name = {n = -1, s = {s = 0x7f8bffffffff
        <error: Cannot access memory at address 0x7f8bffffffff>, len =
        -1783330960}, re = 0x7f8bffffffff}, avp = 0xe6c3686750c86c35}
        sct = 0x7f8b84530130
        sjt = 0x7f8b84530130
        mct = 0x0
        rv = 0x7fff95b485a4
        rv1 = 0x7f8b8475de28
---Type <return> to continue, or q <return> to quit---
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val
= {n = 6779060, s = {s = 0x6770b4 <select_cfg_var+580> "\211E\bH\230ƀ\300¤",
len = 0}, re = 0x6770b4 <select_cfg_var+580>}, pval = {
              rs = {s = 0x6770b4 <select_cfg_var+580> "\211E\bH\230ƀ\300¤",
len = 0}, ri = -1783331308, flags = 32767}}, i2s =
"\000\000\000\000\000\000\000\000\000O\306'\320xD\247D'iC\213\177"}
        s = {s = 0x0, len = 0}
        srevp = {0x7f8b845317d0, 0x7f8b8475de28}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
        str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
        {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140237199485840,
              string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s =
0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90,
attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#27 0x00000000005407b5 in run_actions (h=0x6acf73, a=0x4, msg=0x8) at
action.c:1549
        ret = -1783327504
        mod = 0x7f8b845317d0
        __FUNCTION__ = "run_actions"
#28 0x0000000000542218 in do_action (h=0x7fff95b494f0, a=0x7f8b84531900,
msg=0x7f8b8475de28) at action.c:1049
        ret = 1
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
        "\000\000\000\000\000\000O\302q\000\000\000\000"}, sin = {sin_family
        = 0, sin_port = 0, sin_addr = {s_addr = 0},
              sin_zero = "O\302q\000\000\000\000"}, sin6 = {sin6_family = 0,
sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"O\302q\000\000\000\000\000\230\nO\205\213\177\000",
                  __u6_addr16 = {49743, 113, 0, 0, 2712, 34127, 32651, 0},
__u6_addr32 = {7455311, 0, 2236549784, 32651}}}, sin6_scope_id = 720}}, id =
0, proto = -64 '\300', send_flags = {f = 90 'Z',
            blst_imask = 180 '\264'}}
        end = 0x7f8b8452f510 "\001"
        uri = {user = {s = 0x7fff95b48c90 "\360\224\264\225\377\177", len =
        1130964784}, passwd = {s = 0x1 <error: Cannot access memory at
        address 0x1>, len = 5615623}, host = {s = 0x0, len = 667307776},
          port = {s = 0x0, len = -2074943984}, params = {s = 0x7fff95b494f0
"\006", len = -5}, sip_params = {s = 0x7fff95b48cc0 "", len = -2072650200},
headers = {s = 0x0, len = 5506997}, port_no = 36032,
          proto = 38324, type = 32767, flags = (unknown: 10140004),
transport = {s = 0x7f8b8452de10 "\325\001", len = -2072650200}, ttl = {s =
0x100000000 <error: Cannot access memory at address 0x100000000>,
            len = 5615623}, user_param = {s = 0x156673 <error: Cannot access
memory at address 0x156673>, len = 667307776}, maddr = {s = 0x1ac00f <error:
Cannot access memory at address 0x1ac00f>,
            len = -1783329724}, method = {s = 0x291a500 "", len = 0}, lr =
{s = 0x7f8b8475de28 "\235\030", len = -1783329692}, r2 = {s = 0x0, len =
1138816376}, gr = {s = 0x7f8b8475de28 "\235\030",
            len = -1783329296}, transport_val = {s = 0x0, len =
-1783328784}, ttl_val = {s = 0x7f8b43e0f588 "0@\236C\213\177", len =
5615623}, user_param_val = {s = 0x7fff95b494f0 "\006", len = 667307776},
          maddr_val = {s = 0x91a600 <error: Cannot access memory at address
0x91a600>, len = 1036492449}, method_val = {
            s = 0x9ab934 <buf+308>
"7feae50257e62b06765f0a4c4d60650a@X.X.X.6:5080\r\nCSeq: 102
NOTIFY\r\nUser-Agent: ast.zs PBX\r\nEvent: message-summary\r\nContent-Type:
application/simple-message-summary\r\nContent-Length:
97\r\n\r\nMessages-W"..., len = 0}, lr_val = {s = 0x7fff95b494f0 "\006", len
= -2072650200}, r2_val = {s = 0x7fff95b494f0 "\006", len = -1783328784},
gr_val = {s = 0x0, len = 5558663}}
        next_hop = {user = {s = 0x0, len = -1}, passwd = {s = 0x7fff95b48cc0
"", len = 1355312181}, host = {s = 0x7f8b8475de28 "\235\030", len =
-1783327504}, port = {s = 0x7fff95b48ff0 "", len = 0}, params = {
            s = 0xe6c368676e486c35 <error: Cannot access memory at address
0xe6c368676e486c35>, len = 1856138293}, sip_params = {s = 0x7f8b00000000
<error: Cannot access memory at address 0x7f8b00000000>,
            len = -2072648360}, headers = {s = 0x7f8b8475de28 "\235\030",
len = 5615623}, port_no = 34800, proto = 33869, type = 32651, flags =
URI_USER_NORMALIZE, transport = {
            s = 0x15ad0 <error: Cannot access memory at address 0x15ad0>,
len = 667307776}, ttl = {s = 0x7f8b8475de28 "\235\030", len = -2074949176},
user_param = {s = 0x7fff95b48df0 "", len = -2072650200},
          maddr = {s = 0x7fff95b494f0 "\006", len = -1783328784}, method =
{s = 0x0, len = 5795166}, lr = {s = 0x7fff95b48ff0 "", len = 667307776}, r2
= {s = 0x7f8b8475de28 "\235\030", len = -1783328784},
          gr = {s = 0x7fff95b494f0 "\006", len = 4329872}, transport_val =
{s = 0x7f8b00000000 <error: Cannot access memory at address 0x7f8b00000000>,
len = -2072648360}, ttl_val = {
            s = 0x7f8b8475de28 "\235\030", len = 5615623}, user_param_val =
{s = 0x7f8b844f0b00 <incomplete sequence \350>, len = 667307776}, maddr_val
= {s = 0x0, len = 0}, method_val = {s = 0x0,
            len = 667307776}, lr_val = {s = 0x0, len = -2074941200}, r2_val
= {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len =
-2072650200}, gr_val = {s = 0x7fff95b494f0 "\006",
            len = -1783328784}}
        u = 0x7f8b8452f510
        flags = 0
        st = {flags = 0, id = 0, name = {n = -1, s = {s = 0x7f8bffffffff
        <error: Cannot access memory at address 0x7f8bffffffff>, len =
        -1783329600}, re = 0x7f8bffffffff}, avp = 0xe6c3686750c86c35}
        sct = 0x7f8b8452f510
        sjt = 0x7f8b8452f510
        mct = 0x0
        rv = 0x7fff95b48d60
        rv1 = 0x7f8b8475de28
        c1 = {cache_type = 2511624888, val_type = 32767, c = {avp_val = {n =
        -1783338272, s = {s = 0x7fff95b46ae0 "", len = -1783342368}, re =
        -0x7fff95b46ae0}, pval = {rs = {s = 0x7fff95b46ae0 "",
---Type <return> to continue, or q <return> to quit---
                len = -1783342368}, ri = -1783329948, flags = 32767}}, i2s =
"\320\v\222\002", '\000' <repeats 12 times>, "D'iC\213\177"}
        s = {
          s = 0x43b2fc <grp_hash_lookup+1420>
"1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200",
len = -1783329476}
        srevp = {0x7f8b84531900, 0x7f8b8475de28}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140237199485840,
              string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s =
0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90,
attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#29 0x00000000005407b5 in run_actions (h=0x6acf73, a=0x4, msg=0x8) at
action.c:1549
        ret = -1783327504
        mod = 0x7f8b84531900
        __FUNCTION__ = "run_actions"
#30 0x0000000000542218 in do_action (h=0x7fff95b494f0, a=0x7f8b84531a30,
msg=0x7f8b8475de28) at action.c:1049
        ret = 1
        v = 0
        dst = {send_sock = 0x7f8b8475de28, to = {s = {sa_family = 52190,
        sa_data = "\020C\213\177\000\000\310\000\000\000\377\177\000"}, sin
        = {sin_family = 52190, sin_port = 17168, sin_addr = {
                s_addr = 32651}, sin_zero = "\310\000\000\000\377\177\000"},
sin6 = {sin6_family = 52190, sin6_port = 17168, sin6_flowinfo = 32651,
sin6_addr = {__in6_u = {
                  __u6_addr8 =
"\310\000\000\000\377\177\000\000\300F\221C\213\177\000", __u6_addr16 =
{200, 0, 32767, 0, 18112, 17297, 32651, 0}, __u6_addr32 = {200, 32767,
1133594304, 32651}}},
              sin6_scope_id = 2222342528}}, id = 32651, proto = 40 '(',
send_flags = {f = 222 '\336', blst_imask = 117 'u'}}
        end = 0x7f8b8452e8f0 "\001"
        uri = {user = {s = 0x7fff95b4929c "", len = -1783328540}, passwd =
{s = 0x7f8b43944ca8 "\361\023", len = 1133554216}, host = {s = 0x8 <error:
Cannot access memory at address 0x8>, len = -1783328508},
          port = {s = 0x7f8b43551b50 "(\252\220C\213\177", len =
1133554216}, params = {s = 0xc8 <error: Cannot access memory at address
0xc8>, len = -1783328252}, sip_params = {s = 0x7fff95b49200 "",
            len = 0}, headers = {s = 0x7f8b4390aa28 "P\033UC\213\177", len =
5615623}, port_no = 43560, proto = 17296, type = 32651, flags = (unknown:
200), transport = {s = 0x7fff95b492a0 "",
            len = 1125140923}, ttl = {s = 0x7f8b8475de28 "\235\030", len =
-1783328096}, user_param = {s = 0x779800000000 <error: Cannot access memory
at address 0x779800000000>, len = -1}, maddr = {
            s = 0x7fff95b49130 "", len = -1783328364}, method = {s = 0x4
<error: Cannot access memory at address 0x4>, len = -1783328348}, lr = {s =
0x7f8b4390aa28 "P\033UC\213\177", len = 200}, r2 = {
            s = 0x7f8b4390aa28 "P\033UC\213\177", len = -2072650200}, gr =
{s = 0x0, len = 0}, transport_val = {s = 0x4 <error: Cannot access memory at
address 0x4>, len = 5615623}, ttl_val = {
            s = 0x7f8b4390aa28 "P\033UC\213\177", len = -1783328268},
user_param_val = {s = 0x7f8b8475de28 "\235\030", len = 1}, maddr_val = {s =
0x7f8b4390aa28 "P\033UC\213\177", len = 1133554216},
          method_val = {s = 0x4 <error: Cannot access memory at address
0x4>, len = -2072650200}, lr_val = {s = 0xc8 <error: Cannot access memory at
address 0xc8>, len = 1133554736}, r2_val = {
            s = 0x7f8b4390aa28 "P\033UC\213\177", len = 1124929466}, gr_val
= {s = 0x0, len = 1125151101}}
        next_hop = {user = {s = 0xc8 <error: Cannot access memory at address
0xc8>, len = -1783328096}, passwd = {s = 0x4 <error: Cannot access memory at
address 0x4>, len = -2072650200}, host = {
            s = 0xc8 <error: Cannot access memory at address 0xc8>, len =
1133554736}, port = {s = 0x7f8b4390aa28 "P\033UC\213\177", len =
1125193098}, params = {s = 0x0, len = 10498080}, sip_params = {
            s = 0xa03028 <def_list+8> "", len = 10498096}, headers = {s =
0xa03038 <def_list+24> "", len = 10498120}, port_no = 10568, proto = 160,
type = ERROR_URI_T, flags = (unknown: 0), transport = {
            s = 0x7f8b844bec80 <wr_buf>
"\027\003\001\003\340k\r\203t\250\234\377\306\030\372\233\a\037\255\300[
\202\346\270\017\032Oά\362;\325Զ\227\027\t{\322_\034\336P>\001\341\327\062\027\243\211\326N\364H@d%\225s9勏\205!\342P0\370\267\070\377\247&\221i\377\206\246Aѻy\364\nrԑCH\370\v\356ǔ\255\032\064T\301\237\265\020Z)if\373\250\020u\275\202\310\031\205\224\246\303F\273\006pP\242#\305\022\022\272\324\a\217\065\200\036\033\003t\346n\250\005<\245\025\301\n\361s\236q\301G\231\267\325\354\256]]u@\021\212\375\313&7\313-\253\004\277n\275\033\216{\335\301\207ә\265\f;<\212\314rq6\305\024\253",
<incomplete sequence \311>..., len = 14083112}, ttl = {s = 0x400000000
<error: Cannot access memory at address 0x400000000>, len = -1783365432},
user_param = {s = 0x0, len = 1090600854}, maddr = {
            s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 1005471026}, method = {s = 0x0, len = -1783327964}, lr =
{s = 0x293020 <error: Cannot access memory at address 0x293020>,
            len = -1783327948}, r2 = {s = 0x7f8b8475de28 "\235\030", len =
1090600854}, gr = {s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 14083728}, transport_val = {
            s = 0x219958 <error: Cannot access memory at address 0x219958>,
len = 2693488}, ttl_val = {s = 0x293c48 <error: Cannot access memory at
address 0x293c48>, len = 8}, user_param_val = {
            s = 0x101 <error: Cannot access memory at address 0x101>, len =
667307776}, maddr_val = {s = 0x291970 <error: Cannot access memory at
address 0x291970>, len = 6245668}, method_val = {
            s = 0x7f8b8467fc80 "\020\005", len = 6999923}, lr_val = {s =
0x715640 <__FUNCTION__.7459> "parse_via", len = 1133594024}, r2_val = {
            s = 0xe6c3686759486c35 <error: Cannot access memory at address
0xe6c3686759486c35>, len = -1783327804}, gr_val = {s = 0x0, len = 10139768}}
        u = 0x7f8b8452e8f0
        flags = 32651
        st = {flags = 200, id = 0, name = {n = -1783328096, s = {s =
        0x7fff95b492a0 "", len = 4}, re = 0x7fff95b492a0}, avp =
        0x7f8b8475de28}
        sct = 0x7f8b8452e8f0
---Type <return> to continue, or q <return> to quit---
        sjt = 0x7f8b8452e8f0
        mct = 0x0
        rv = 0x1
        rv1 = 0x7f8b8475de28
        c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val =
        {n = 1133594216, s = {s = 0x7f8b43914668 <incomplete sequence \310>,
        len = 10485504}, re = 0x7f8b43914668}, pval = {rs = {
                s = 0x7f8b43914668 <incomplete sequence \310>, len =
10485504}, ri = 4, flags = 1}}, i2s =
"\000\222\264\225\377\177\000\000\000\347\001D\213\177\000\000\000\245aC\213\177"}
        s = {s = 0xa49900 <_pkg_root> "\313\030p", len = 4}
        srevp = {0x7f8b84531a30, 0x7f8b8475de28}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
        str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
        {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140237199485840,
              string = 0x7f8b8475ab90 "\350\062]\204\213\177", str = {s =
0x7f8b8475ab90 "\350\062]\204\213\177", len = 3}, data = 0x7f8b8475ab90,
attr = 0x7f8b8475ab90, select = 0x7f8b8475ab90}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#31 0x00000000005407b5 in run_actions (h=0x6acf73, h@entry=0x7fff95b494f0,
a=0x4, a@entry=0x7f8b8451ee00, msg=0x8, msg@entry=0x7f8b8475de28) at
#action.c:1549
        ret = -1
        mod = 0x7f8b84531a30
        __FUNCTION__ = "run_actions"
#32 0x000000000054d225 in run_top_route (a=0x7f8b8451ee00,
msg=0x7f8b8475de28, c=<optimized out>) at action.c:1635
        ctx = {rec_lev = 6, run_flags = 0, last_retcode = 1, jmp_env =
{{__jmpbuf = {140735705027824, 1818402078992133173, 140237197143552,
140237199498792, 0, 0, -1818495031344337867, 1818402731650608181},
              __mask_was_saved = 0, __saved_mask = {__val = {10139768, 595,
140237199498792, 10139709, 10139648, 595, 140237199498792, 10139709,
10139648, 595, 12052891338166128384, 0, 140237199425776,
                  1073741825, 140236102683928, 140237199410640}}}}}
        p = <optimized out>
        ret = <optimized out>
        sfbk = 0
#33 0x000000000055501e in receive_msg (buf=0x0, len=2222317096,
rcv_info=0x7fff95b497d0) at receive.c:240
        msg = 0x7f8b8475de28
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env =
{{__jmpbuf = {140735705028192, 1818402078992133173, 140237198564784,
140237199498792, 0, 0, -1818495031344337867, 1818402731650608181},
              __mask_was_saved = 0, __saved_mask = {__val = {10109832, 0,
140735705028582, 4, 1, 140237196963680, 140237221805511, 140234977181701, 0,
7048948, 140237213644648, 140237198483864,
                  140735705028452, 140237223933584, 140237198483864, 12}}}}}
        inb = {
          s = 0x9ab800 <buf> "NOTIFY
sip:zs_pbx40_trunk@XXXXXXXXXX.com SIP/2.0\r\nVia: SIP/2.0/UDP
X.X.X.6:5080;branch=z9hG4bK542e0106\r\nMax-Forwards: 69\r\nFrom:
\"asterisk\" <sip:asterisk@X.X.X.6:5080>;tag=as785f9e"..., len = 595}
        netinfo = {data = {s = 0xffffffff <error: Cannot access memory at
address 0xffffffff>, len = 2}, dst = 0x7f8b854db768, rcv = 0x7f8b85eac000}
        __FUNCTION__ = "receive_msg"
#34 0x0000000000467630 in udp_rcv_loop () at udp_server.c:495
        len = 595
        buf = "NOTIFY sip:zs_pbx40_trunk@XXXXXXXXXX.com
SIP/2.0\r\nVia: SIP/2.0/UDP
X.X.X.6:5080;branch=z9hG4bK542e0106\r\nMax-Forwards: 69\r\nFrom:
\"asterisk\" <sip:asterisk@X.X.X.6:5080>;tag=as785f9e"...
        from = 0x7f8b84666198
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {940519353,
        140236108241828}, addr32 = {940519353, 0, 1131060132, 32651}, addr16
        = {12217, 14351, 0, 0, 39844, 17258, 32651, 0},
              addr =
"\271/\017\070\000\000\000\000\244\233jC\213\177\000"}}, dst_ip = {af = 2,
len = 4, u = {addrl = {856633273, 0}, addr32 = {856633273, 0, 0, 0}, addr16
= {12217, 13071, 0, 0, 0, 0, 0, 0},
              addr = "\271/\017\063", '\000' <repeats 11 times>}}, src_port
= 5080, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su =
{s = {sa_family = 2,
              sa_data = "\023ع/\017\070\000\000\000\000\000\000\000"}, sin =
{sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 940519353}, sin_zero
= "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 940519353,
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16
= {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0,
                    0}}}, sin6_scope_id = 0}}, bind_address =
0x7f8b844f2f60, proto = 1 '\001'}
        __FUNCTION__ = "udp_rcv_loop"
#35 0x00000000004eec99 in main_loop () at main.c:1614
---Type <return> to continue, or q <return> to quit---
        si_desc = "udp receiver child=4
sock=X.X.X.1:5060\000\000\000\000\000\360\205\\\204\213\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000]o_",
'\000' <repeats 14 times>,
"O\306'\320xD\247\260\304)\204\213\177\000\000\000O\306'\320xD\247\b\022\245\000\000\000\000\000\004\000\000\000\000\000\000"
        woneinit = 1
        __FUNCTION__ = "main_loop"
#36 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631
        cfg_stream = 0x0
        r = -2072639840
        tmp = 0x7fff95b4aee4 ""
        tmp_len = 0
        port = 0
        proto = -2048211504
        ret = 0
        seed = 2234431947
        debug_save = 0
        debug_flag = 8
        dont_fork_cnt = 0
        st = {st_dev = 15, st_ino = 13588, st_nlink = 2, st_mode = 16832,
        st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 40,
        st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1493100498,
            tv_nsec = 744107611}, st_mtim = {tv_sec = 1493919466, tv_nsec =
395667252}, st_ctim = {tv_sec = 1493919466, tv_nsec = 395667252},
__glibc_reserved = {0, 0, 0}}
        __FUNCTION__ = "main"
(gdb)

Log Messages

SIP Traffic

Possible Solutions

Additional Information

version: kamailio 4.4.5 (x86_64/linux) 
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: unknown 
compiled with gcc 4.9.2

Linux customers 3.16.0-4-amd64 #1 SMP Debian 3.16.39-1+deb8u2 (2017-03-07) x86_64 GNU/Linux


You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.