I found one in backup, but is not same.
#0 0x00007f8e28d5fc3b in trace_onreply_in (t=0xa72441, type=4, ps=0x7f8e1c2a7ac8) at siptrace.c:1271
sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 10953664}, re = 0x0}, avp = 0x198}, body = {
s = 0xa72487 "41a86d83kw9tay0nh@10.0.70.3~2o\r\nCSeq: 102 BYE\r\nFrom: <sip:380894600053@81.31.45.51>;tag=as397e1088\r\nTo: 380965115229 <sip:0965115229@195.24.242.106>;tag=y4yzzqusnwd66s7y.o\r\nServer: Sippy\r\nContent-Leng"..., len = 30}, callid = {
s = 0xa724b1 "BYE\r\nFrom: <sip:380894600053@81.31.45.51>;tag=as397e1088\r\nTo: 380965115229 <sip:0965115229@195.24.242.106>;tag=y4yzzqusnwd66s7y.o\r\nServer: Sippy\r\nContent-Length: 0\r\n\r\n", len = 3}, method = {s = 0x7fffcca85710 "200", len = 3},
status = {s = 0x7f8e28d6ad86 "", len = 10953951}, dir = 0xa <Address 0xa out of bounds>, fromtag = {s = 0x7fffcca85814 "udp:195.24.242.106:5061", len = 23}, fromip = {s = 0x0, len = 0}, toip = {s = 0x7fffcca857e0 "udp:81.31.45.51:5060", len = 20},
toip_buff = "udp:81.31.45.51:5060", '\000' <repeats 31 times>, fromip_buff = "udp:195.24.242.106:5061", '\000' <repeats 28 times>, tv = {tv_sec = 0, tv_usec = 0}, stat = 0x0}
msg = 0x7f8e2fa50470
req = 0x7f8e1bf23ea8
statusbuf = "\000\000\000\000\000\000\000"
__FUNCTION__ = "trace_onreply_in"
#1 0x00007f8e2cae6b5e in reparse_on_dns_failover_fixup (handle=0xa823e8, gname=0xa823f0, name=0xa823f8, val=0xa82400) at t_fwd.c:2006
__llevel = 32654
__FUNCTION__ = "reparse_on_dns_failover_fixup"
#2 0x00007f8e2cae6c6f in reparse_on_dns_failover_fixup (handle=0xc8, gname=0x7f8e1c38dcf8, name=0x7f8e2fa50470, val=0x7f8e1bf23ea8) at t_fwd.c:2006
__llevel = 0
__FUNCTION__ = "reparse_on_dns_failover_fixup"
#3 0x00007f8e2caf4b34 in t_lookupOriginalT (p_msg=0xa72422) at t_lookup.c:854
__llevel = 10953728
p_cell = 0xa72421
hash_index = 3433588208
t_msg = 0xa724b6
branch = 0x364ad611
hash_bucket = 0x7f8e1c2a7ac8
foo = 1
ret = 32654
__FUNCTION__ = "t_lookupOriginalT"
#4 0x00007f8e2caf6b0f in t_reply_matching (p_msg=0x7f8e1c2a7ac8, p_branch=0xa724b6) at t_lookup.c:1021
__llevel = 32654
p_cell = 0x7f8e2cfd2df8
hash_index = 0
entry_label = 32767
branch_id = 0
hashi = 0x38e <Address 0x38e out of bounds>
branchi = 0x7f8e1c38b8d0 "\340u=/\216\177"
p = 0x7f8e2f727940 "\001"
n = 0x7f8e2fa50470 "\342\""
hash_bucket = 0x680c0e
hashl = 32767
branchl = 32654
scan_space = -1
req_method = {s = 0x7f8e2f3d5a00 "\005", len = 910874129}
loopi = 0xa723d5 "SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83kw9tay0nh@10.0"...
loopl = 0
is_cancel = 7224
__FUNCTION__ = "t_reply_matching"
#5 0x00007f8e2caf7489 in t_reply_matching (p_msg=0x0, p_branch=0x0) at t_lookup.c:1046
__llevel = 32654
p_cell = 0x0
hash_index = 473479376
entry_label = 32767
branch_id = 32654
hashi = 0xa723d5 "SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83kw9tay0nh@10.0"...
branchi = 0x7f8e2f727940 "\001"
p = 0x0
n = 0x7f8e2cfd2df8 ""
hash_bucket = 0x7f8e2fa50470
hashl = 32767
branchl = 0
scan_space = 32767
cseq_method = {s = 0x7fffcca85cb0 "\020^\250\314\377\177", len = 6818830}
req_method = {s = 0x7fffcca85bb0 "\340[\250\314\377\177", len = 749693711}
loopi = 0x4188b0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300@\202n"
loopl = 0
is_cancel = 167
__FUNCTION__ = "t_reply_matching"
#6 0x00007f8e2cb3e94b in relay_reply (t=0xa72558, p_msg=0x7fffcca85e00, branch=0, msg_status=10953679, cancel_data=0xa0000018a, do_put_on_wait=32654) at t_reply.c:2051
relay = 33554432
save_clone = 0
buf = 0x364ad611 <Address 0x364ad611 out of bounds>
res_len = 6492249
relayed_code = 0
relayed_msg = 0x6245b7
reply_bak = 0x198005668c8
bm = {to_tag_val = {s = 0x0, len = 0}}
totag_retr = 32767
reply_status = RPS_ERROR
uas_rb = 0xa723c0
to_tag = 0x6245b7
reason = {s = 0x4004188b0 <Address 0x4004188b0 out of bounds>, len = 799343728}
onsend_params = {req = 0x7fffcca85de0, rpl = 0x1460065f7ad, param = 0x7f8e00000000, code = 7733660, flags = 0, branch = 0, t_rbuf = 0x40, dst = 0xa72424, send_buf = {s = 0x7fffcca85ed0 "\260_\250", <incomplete sequence \314>, len = 910874129}}
__FUNCTION__ = "relay_reply"
#7 0x00000000004901cc in do_forward_reply (msg=0x7f8e2fa50470, mode=0) at forward.c:747
new_buf = 0x0
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
new_len = 0
r = 1
ip = {af = 0, len = 0, u = {addrl = {21482551297, 140248654491432}, addr32 = {7714817, 5, 792407848, 32654}, addr16 = {47105, 117, 5, 0, 12072, 12091, 32654, 0}, addr = "\001\270u\000\005\000\000\000(/;/\216\177\000"}}
s = 0x7fffcca85f70 "\021\326J6"
---Type <return> to continue, or q <return> to quit---
len = 32654
__FUNCTION__ = "do_forward_reply"
#8 0x0000000000491856 in forward_reply (msg=0x7f8e2fa50470) at forward.c:849
Hit http://ftp.cz.debian.org wheezy-updates/main Translation-en/DiffIndex
Hit http://security.debian.org wheezy/updates/main Sources
Hit http://security.debian.org wheezy/updates/main amd64 Packages
Hit http://hwraid.le-vert.net wheezy Release
Hit http://security.debian.org wheezy/updates/main Translation-en
Hit http://hwraid.le-vert.net wheezy/main amd64 Packages
No locals.
#9 0x000000000050e062 in receive_msg (buf=0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"...,
len=408, rcv_info=0x7fffcca861b0) at receive.c:255
msg = 0x7f8e2fa50470
ctx = {rec_lev = 383305440, run_flags = 32654, last_retcode = 5, jmp_env = {{__jmpbuf = {10268600, 0, 0, 0, 0, 140248696117746, 140247862083589, 0}, __mask_was_saved = -861380448, __saved_mask = {__val = {10953600, 140736626975160, 910874129, 51539607555,
910874129, 4294832, 140736626976240, 140736626975008, 6322852, 7728554256, 140248255940568, 140736626974992, 6318455, 140736626975264, 167897581528, 10953600}}}}}
ret = 4294832
inb = {s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len = 408}
__FUNCTION__ = "receive_msg"
#10 0x000000000060db81 in udp_rcv_loop () at udp_server.c:495
len = 408
buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"...
tmp = 0xa72380 "93.99.158.97"
from = 0x7f8e2f987188
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {1794250947, 4294832}, addr32 = {1794250947, 0, 4294832, 0}, addr16 = {6339, 27378, 0, 0, 34992, 65, 0, 0}, addr = "\303\030\362j\000\000\000\000\260\210A\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {
858595153, 0}, addr32 = {858595153, 0, 0, 0}, addr16 = {8017, 13101, 0, 0, 0, 0, 0, 0}, addr = "Q\037-3", '\000' <repeats 11 times>}}, src_port = 5061, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2,
sa_data = "\023\305\303\030\362j\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50451, sin_addr = {s_addr = 1794250947}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50451, sin6_flowinfo = 1794250947,
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f8e2f3d75e0, proto = 1 '\001'}
__FUNCTION__ = "udp_rcv_loop"
#11 0x00000000004aa664 in main_loop () at main.c:1573
i = 5
pid = 0
si = 0x7f8e2f3d75e0
si_desc = "udp receiver child=5 sock=81.31.45.51:5060\000\000n\000\000\000n/q\000\001\000\000\000\260\264y\027\216\177\000\000\060c\250\314\377\177\000\000\210Z\006\033\216\177\000\000\240\352\344'\216\177\000\000\020v\215/\216\177\000\000\020\277\344'\216\177\000
\000\003\000\000\000\216\177\000\000\021\326J6\000\000\000\000\260\210A\000\001\000\000"
nrprocs = 8
__FUNCTION__ = "main_loop"
#12 0x00000000004b0b5b in main (argc=9, argv=0x7fffcca865f8) at main.c:2533
cfg_stream = 0x14b0010
c = -1
r = 0
tmp = 0x7fffcca86a4f ""
tmp_len = 32654
port = 836212592
proto = 0
options = 0x707da0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
ret = -1
seed = 4234779735
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x55
p = 0x7fffcca864fe ""
__FUNCTION__ = "main"
(gdb) frame 0
#0 0x00007f8e28d5fc3b in trace_onreply_in (t=0xa72441, type=4, ps=0x7f8e1c2a7ac8) at siptrace.c:1271
1271 if(trace_local_ip.s && trace_local_ip.len > 0) {
(gdb) p *msg
$1 = {id = 8930, pid = 7643, tval = {tv_sec = 1437593263, tv_usec = 563447}, fwd_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, rpl_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, first_line = {type = 65538, len = 16, u = {request = {method = {
s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len = 7}, uri = {
s = 0xa723c8 "200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83k"..., len = 3}, version = {
s = 0xa723cc "OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83kw9ta"..., len = 2}, method_value = 200},
reply = {version = {s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len = 7},
status = {s = 0xa723c8 "200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83k"..., len = 3}, reason = {
s = 0xa723cc "OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83kw9ta"..., len = 2}, statuscode = 200}}},
via1 = 0x7f8e2f727940, via2 = 0x7f8e2f9aa360, headers = 0x7f8e2f3d55d8, last_header = 0x7f8e2f3d4928, parsed_flag = 118, h_via1 = 0x7f8e2f3d55d8, h_via2 = 0x7f8e2f3d40a0, callid = 0x7f8e2f3d51b0, to = 0x0, cseq = 0x7f8e2f3d5a00, from = 0x7f8e2f3d4928, contact = 0x0,
maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0x0, authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0,
accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x0, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0,
date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, body = 0x0, eoh = 0x0, unparsed = 0xa724eb "To: 380965115229 <sip:0965115229@195.24.242.106>;tag=y4yzzqusnwd66s7y.o\r\nServer: Sippy\r\nContent-Length: 0\r\n\r\n", rcv = {
src_ip = {af = 2, len = 4, u = {addrl = {1794250947, 4294832}, addr32 = {1794250947, 0, 4294832, 0}, addr16 = {6339, 27378, 0, 0, 34992, 65, 0, 0}, addr = "\303\030\362j\000\000\000\000\260\210A\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {858595153,
0}, addr32 = {858595153, 0, 0, 0}, addr16 = {8017, 13101, 0, 0, 0, 0, 0, 0}, addr = "Q\037-3", '\000' <repeats 11 times>}}, src_port = 5061, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2,
sa_data = "\023\305\303\030\362j\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50451, sin_addr = {s_addr = 1794250947}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50451, sin6_flowinfo = 1794250947,
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f8e2f3d75e0, proto = 1 '\001'},
buf = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len = 408, new_uri = {s = 0x0, len = 0},
dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0},
port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {
s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0,
len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0},
port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {
s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0,
len = 0}}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = '\000' <repeats 57 times>, add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 0, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0},
force_send_socket = 0x0, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0},
addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0,
proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 0 '\000'}}}}
(gdb) q
—
Reply to this email directly or view it on GitHub.