Full backtrace:
``` #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 set = {__val = {0, 140481737467984, 4222451712, 94125218804128, 94125218804229, 94125218804128, 94125218804128, 94125218804250, 94125218804428, 94125218804128, 94125218804428, 0, 0, 0, 0, 0}} pid = <optimized out> tid = <optimized out> ret = <optimized out> #1 0x00007fc47407a859 in __GI_abort () at abort.c:79 save_stage = 1 act = {__sigaction_handler = {sa_handler = 0x7a, sa_sigaction = 0x7a}, sa_mask = {__val = {94125218804448, 3432, 140481737427665, 0, 140481738839488, 140481738843296, 140481653628996, 476, 140481653629648, 140481737982800, 140481737418232, 0, 11932610196109475840, 140481738621957, 140481740840960, 140481738638728}}, sa_flags = 1863311428, sa_restorer = 0x1dc} sigs = {__val = {32, 0 <repeats 15 times>}} #2 0x00007fc47407a729 in __assert_fail_base (fmt=0x7fc474210588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x7fc46f0fe2d0 "json_object_get_type(jso) == json_type_object", file=0x7fc46f0fe044 "json_object.c", line=476, function=<optimized out>) at assert.c:92 str = 0x559b3c352830 "`\356\064<\233U" total = 4096 #3 0x00007fc47408bf36 in __GI___assert_fail (assertion=0x7fc46f0fe2d0 "json_object_get_type(jso) == json_type_object", file=0x7fc46f0fe044 "json_object.c", line=476, function=0x7fc46f0fe280 "json_object_object_add_ex") at assert.c:101 No locals. #4 0x00007fc46f0f7d26 in json_object_object_add_ex () from /lib/x86_64-linux-gnu/libjson-c.so.4 No symbol table info available. #5 0x00007fc46f14ebe4 in kz_amqp_add_payload_common_properties (json_obj=0x559b3c3b30c0, server_id=0x7ffda57606f0 "kamailio@sipproxy.mydomain.com-<352213>-script-0", unique=0x7ffda5760660) at kz_amqp.c:1023 node_name = '\000' <wiederholt 24 Mal>, "|\000\000\000w\000\000\000n\000\000\000[\000\000\000@\004v\245\375\177\000\000\000\000\005\000\000\000\000\000PO\000\000\000\000\000\000\200\v$t\304\177\000\000`\000\000\000\000\000\000\000\260\060;<\233U\000\000iX\217s\304\177", '\000' <wiederholt 11 Mal>, "@On\300%\231\245\200\361\064<\233U\000\000@,;<\233U\000\000\000\000\000\000\000\000\000\000\204\235\017o\304\177\000\000\000\000\000\000\000\000\000\000p,;<\233U\000\000\377\377\377\377\000\000\000\000U\254\017o\304\177\000\000n\000\000\000", '\377' <wiederholt 12 Mal>, "\200\361\064<\233U\000\000\000\000\000\000\000\000\000\000"... #6 0x00007fc46f1509a0 in kz_amqp_pipe_send_receive (str_exchange=0x7ffda57609c0, str_routing_key=0x7ffda57609d0, str_payload=0x7ffda57609b0, kz_timeout=0x7ffda57609e0, json_ret=0x7ffda5760a10) at kz_amqp.c:1159 ret = 1 json_obj = 0x559b3c3b30c0 cmd = 0x0 json_body = 0x0 unique_string = {s = 0x7ffda57606c0 "042a4c6f-a170-4d2a-a40f-9be55aa7d760", len = 36} serverid = "kamailio@sipproxy.mydomain.com-<352213>-script-0\000\326#t\304\177\000\000\000\334#t\304\177\000\000\200\334#t\304\177\000\000\000\345#t\304\177\000\000@\332#t\304\177\000\000\300\331#t\304\177\000\000\000\000\000\000\000\000\000\000p\000\000\000\000\000\000\000 \342#t\304\177\000\000\240\342#t\304\177\000\000`\000\000\000\000\000\000\000\a\000\000\000\304\177\000\000@\344#t\304\177\000\000\300C\037t\304\177\000\000\001\000\000\000\000\000\000\000\a\000\000\000\061", '\000' <wiederholt 27 Mal>... id = "\004*Lo\241pM*\244\017\233\345Z\247\327`" uuid_buffer = "042a4c6f-a170-4d2a-a40f-9be55aa7d760\000\000\000" payload = 0x559b3b5f5b29 "core/mem/q_malloc.c" __func__ = "kz_amqp_pipe_send_receive" #7 0x00007fc46f158763 in kz_amqp_query_ex (msg=0x7fc47394beb8, exchange=0x7fc4738f03d0 "(q\216s\304\177", routing_key=0x7fc4738f57c8 "0\213\207s\304\177", payload=0x7fc4738f58d8 "hX\217s\304\177") at kz_amqp.c:1494 json_s = {s = 0x7fc4738f5868 "0", len = 1} exchange_s = {s = 0x7fc4738e7128 "callevt", len = 7} routing_key_s = {s = 0x7fc473878b30 "0", len = 1} kz_timeout = {tv_sec = 2, tv_usec = 0} __func__ = "kz_amqp_query_ex" j = 0x559b3c3b2bd0 ret = 0x0 res = 32708 strjson = 0x34 <error: Cannot access memory at address 0x34> len = 0 value = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete sequence \330> #8 0x00007fc46f1588b2 in kz_amqp_query (msg=0x7fc47394beb8, exchange=0x7fc4738f03d0 "(q\216s\304\177", routing_key=0x7fc4738f57c8 "0\213\207s\304\177", payload=0x7fc4738f58d8 "hX\217s\304\177", dst=0x7fc4738f04f0 "p\004\217s\304\177") at kz_amqp.c:1517 dst_pv = 0x7fc474170350 <__syslog> dst_val = {rs = {s = 0x7ffda5760b00 "\220\021v\245\375\177", len = 1863978364}, ri = 52, flags = 3} result = 0 #9 0x0000559b3b1c7355 in do_action (h=0x7ffda5761370, a=0x7fc4738f1d98, msg=0x7fc47394beb8) at core/action.c:1151 ret = -5 v = 0 dst = {send_sock = 0x7fc4738eec20, to = {s = {sa_family = 1920, sa_data = "\217s\304\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 1920, sin_port = 29583, sin_addr = {s_addr = 32708}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 1920, sin6_port = 29583, sin6_flowinfo = 32708, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <wiederholt 15 Mal>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 1920, __ss_padding = "\217s\304\177", '\000' <wiederholt 43 Mal>, "@On\300%\231\245\240\026v\245\375\177\000\000\000\000\000\000\002", '\000' <wiederholt 11 Mal>, "#$^;\233U\000\000\064\000\000\000\000\000\000\000P\003\027t\304\177\000\000P\021v\245\375\177\000\000+y\026;\233U\000", __ss_align = 52}}, id = 1938746392, send_flags = {f = 32708, blst_imask = 0}, proto = 16 '\020', proto_pad0 = 22 '\026', proto_pad1 = -23178} tmp = 0x7ffda5761f70 "\001" new_uri = 0x7fc4738eec10 "\001" end = 0x7fc47394beb8 "\001" crt = 0x34 <error: Cannot access memory at address 0x34> cmd = 0x7fc4738e7ce8 len = 996025379 user = 21915 uri = {user = {s = 0x7fc47420df30 "d]", len = 996105001}, passwd = {s = 0xf600000187 <error: Cannot access memory at address 0xf600000187>, len = 994455272}, host = {s = 0x7ffda5760dd0 "", len = 1938022416}, port = { s = 0x4a8 <error: Cannot access memory at address 0x4a8>, len = 1938022416}, params = {s = 0x7ffda5760e10 "@\016v\245\375\177", len = 1950306872}, sip_params = {s = 0x7fc47420df30 "d]", len = 0}, headers = { s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7171768}, port_no = 37488, proto = 12, type = ERROR_URI_T, flags = (unknown: 1216840), transport = {s = 0x129890 <error: Cannot access memory at address 0x129890>, len = 8}, ttl = { s = 0x5 <error: Cannot access memory at address 0x5>, len = 1850687488}, user_param = {s = 0x7ffda5760e40 "@\017v\245\375\177", len = 993161627}, maddr = {s = 0x0, len = 996104996}, method = {s = 0x7ffda5760f40 "", len = 0}, lr = {s = 0x7ffda5760f40 "", len = 994414680}, r2 = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 0}, gr = {s = 0x559b3b5913ab "core", len = 0}, transport_val = {s = 0x559b3b591828 <__func__.7764> "rval_new_empty", len = 995693617}, ttl_val = { s = 0x4a8 <error: Cannot access memory at address 0x4a8>, len = 1938022416}, user_param_val = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 996105001}, maddr_val = { s = 0x7f000001ff <error: Cannot access memory at address 0x7f000001ff>, len = 994455272}, method_val = {s = 0x7ffda5760ef0 "", len = 1938022416}, lr_val = {s = 0x7fc4742418a0 <_IO_helper_jumps> "", len = 1938022416}, r2_val = { s = 0x7ffda5760f30 "`\017v\245\375\177", len = 1950306872}, gr_val = {s = 0x0, len = 0}} next_hop = {user = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7173632}, passwd = {s = 0xc8b28 <error: Cannot access memory at address 0xc8b28>, len = 1214976}, host = {s = 0x129890 <error: Cannot access memory at address 0x129890>, len = 8}, port = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 1850687488}, params = {s = 0x7ffda5760f60 "\200\020v\245\375\177", len = 993161627}, sip_params = {s = 0x0, len = 996104996}, headers = {s = 0x7fc4738f3850 "H\a", len = 0}, port_no = 4224, proto = 42358, type = 32765, flags = (URI_USER_NORMALIZE | unknown: 994423860), transport = {s = 0x7fc4742418a0 <_IO_helper_jumps> "", len = 3432}, ttl = {s = 0x559b3b5913ab "core", len = 1937415856}, user_param = { s = 0x559b3b591630 <__func__.7732> "rval_destroy_helper", len = 995693617}, maddr = {s = 0x7fc4738f0780 "\002", len = 1938022416}, method = {s = 0x559b00000000 <error: Cannot access memory at address 0x559b00000000>, len = 1850687488}, lr = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 0}, r2 = {s = 0x0, len = 1938753352}, gr = {s = 0x748 <error: Cannot access memory at address 0x748>, len = 1938022416}, transport_val = {s = 0x7fc4738f0660 "\200", len = 1938755320}, ttl_val = {s = 0xe1a57616c0 <error: Cannot access memory at address 0xe1a57616c0>, len = 0}, user_param_val = {s = 0x0, len = 996025379}, maddr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, method_val = {s = 0x7ffda5761050 "P\021v\245\375\177", len = 991328555}, lr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1850687488}, r2_val = {s = 0x7ffda5761150 "\020\026v\245\375\177", len = 0}, gr_val = {s = 0x0, len = 996025379}} u = 0x7fc4738edcd0 port = 0 dst_host = 0x7ffda5761f70 i = 4 flags = 0 avp = 0x7ffda5761150 st = {flags = 1, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x559b3b5e2423 sjt = 0x400000001 rve = 0x7fc473908270 mct = 0x0 rv = 0x7fc4738f3078 rv1 = 0x559b3b178ca4 <rval_expr_eval+20729> c1 = {cache_type = 2775978288, val_type = 32765, c = {avp_val = {n = 991328479, s = {s = 0x559b3b1678df <rval_destroy_helper+1140> "\353\005\350z\204\375\377\220H\213E\310dH3\004%(", len = 1}, re = 0x559b3b1678df <rval_destroy_helper+1140>}, pval = {rs = { s = 0x559b3b1678df <rval_destroy_helper+1140> "\353\005\350z\204\375\377\220H\213E\310dH3\004%(", len = 1}, ri = 1938746392, flags = 32708}}, i2s = "\221\000\000\000\000\000\000\000\030\354\216s\304\177\000\000\210J\217s\304\177"} s = {s = 0x7fc4738f5868 "0", len = 1} srevp = {0x34, 0x7fc474170350 <__syslog>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = { s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140481729070032, string = 0x7fc4738f03d0 "(q\216s\304\177", str = {s = 0x7fc4738f03d0 "(q\216s\304\177", len = 7}, data = 0x7fc4738f03d0, attr = 0x7fc4738f03d0, select = 0x7fc4738f03d0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091528, string = 0x7fc4738f57c8 "0\213\207s\304\177", str = {s = 0x7fc4738f57c8 "0\213\207s\304\177", len = 1}, data = 0x7fc4738f57c8, attr = 0x7fc4738f57c8, select = 0x7fc4738f57c8}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091800, string = 0x7fc4738f58d8 "hX\217s\304\177", str = {s = 0x7fc4738f58d8 "hX\217s\304\177", len = 1}, data = 0x7fc4738f58d8, attr = 0x7fc4738f58d8, select = 0x7fc4738f58d8}}, {type = MODFIXUP_ST, u = {number = 140481729070320, string = 0x7fc4738f04f0 "p\004\217s\304\177", str = {s = 0x7fc4738f04f0 "p\004\217s\304\177", len = 17}, data = 0x7fc4738f04f0, attr = 0x7fc4738f04f0, select = 0x7fc4738f04f0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #10 0x0000559b3b1d0463 in run_actions (h=0x7ffda5761370, a=0x7fc4738f1d98, msg=0x7fc47394beb8) at core/action.c:1581 t = 0x7fc4738f1d98 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 0 __func__ = "run_actions" #11 0x0000559b3b1d0bd6 in run_actions_safe (h=0x7ffda5761f70, a=0x7fc4738f1d98, msg=0x7fc47394beb8) at core/action.c:1645 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {8589934592, -8218340047319111063, 0, 94125204317219, 52, 140481737982800, -8218340047371539863, -2792324605258929559}, __mask_was_saved = 0, __saved_mask = {__val = {94125201453467, 0, 22470941476, 140727379432688, 11932610196109475840, 140727379432688, 8589934592, 0, 94125204317219, 52, 140481737982800, 140727379432704, 140481725410594, 32, 140481728339984, 140727379432816}}}}} ret = 32708 ign_on_break = 0 #12 0x0000559b3b16a4b0 in rval_get_int (h=0x7ffda5761f70, msg=0x7fc47394beb8, i=0x7ffda5761750, rv=0x7fc4738f4040, cache=0x0) at core/rvalue.c:949 r_avp = 0xa59925c06e4f4000 avp_val = {n = 7, s = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 0}, re = 0x7} pval = {rs = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, ri = -1518987760, flags = 32765} tmp = {s = 0x0, len = 996025379} s = 0x0 r = 0 ret = 0 destroy_pval = 0 __func__ = "rval_get_int" #13 0x0000559b3b16fa9c in rval_expr_eval_int (h=0x7ffda5761f70, msg=0x7fc47394beb8, res=0x7ffda5761750, rve=0x7fc4738f4038) at core/rvalue.c:1947 i1 = 1947665232 i2 = 32708 ret = -1 c1 = {cache_type = 1939127992, val_type = 32708, c = {avp_val = {n = -1518985360, s = {s = 0x7ffda5761f70 "\001", len = -1518986456}, re = 0x7ffda5761f70}, pval = {rs = {s = 0x7ffda5761f70 "\001", len = -1518986456}, ri = 1, flags = 32708}}, i2s = " Їs\304\177\000\000\250\023\217s\304\177\000\000\310W\217s\304\177"} c2 = {cache_type = 52, val_type = 36, c = {avp_val = {n = 1947665232, s = {s = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = -1518987568}, re = 0x7fc474170350 <__syslog>}, pval = {rs = { s = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = -1518987568}, ri = 1932248914, flags = 32708}}, i2s = "\377\377\377\377", '\000' <wiederholt 12 Mal>, "裎s\304\177"} rv1 = 0x7fc4738f13a8 rv2 = 0x7ffda5761700 __func__ = "rval_expr_eval_int" #14 0x0000559b3b1c0ec8 in do_action (h=0x7ffda5761f70, a=0x7fc4738f7f28, msg=0x7fc47394beb8) at core/action.c:1052 ret = -5 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 16384, sa_data = "On\300%\231\245\334\035v\245\375\177\000"}, sin = {sin_family = 16384, sin_port = 28239, sin_addr = {s_addr = 2778277312}, sin_zero = "\334\035v\245\375\177\000"}, sin6 = {sin6_family = 16384, sin6_port = 28239, sin6_flowinfo = 2778277312, sin6_addr = {__in6_u = {__u6_addr8 = "\334\035v\245\375\177\000\000\000\000\000\000\026\000\000", __u6_addr16 = {7644, 42358, 32765, 0, 0, 0, 22, 0}, __u6_addr32 = {2775981532, 32765, 0, 22}}}, sin6_scope_id = 997540784}, sas = {ss_family = 16384, __ss_padding = "On\300%\231\245\334\035v\245\375\177\000\000\000\000\000\000\026\000\000\000\260Cu;\233U\000\000\000\000\000\000\000\000\000\000\242\v:<\233U\000\000\023\000\000\000\233U\000\000\340\035v\245\375\177\000\000\261\252I;\233U\000\000\370\313`;\233U\000\000\000@On\300%\231\245\242\v:<\233U\000\000\000\000\000\000\002", '\000' <wiederholt 11 Mal>, "#$^;\233U\000", __ss_align = 52}}, id = 1947665232, send_flags = {f = 32708, blst_imask = 0}, proto = 104 'h', proto_pad0 = -83 '\255', proto_pad1 = 29583} tmp = 0x559b3b518985 <system_reseed+296> "\203\275l\373\377\377" new_uri = 0x559b3b4d8e5c <parse_sip_header_name+3534> "\203\370\002\017\216\214\003" end = 0x7fc4734c1285 <_ul_sruid+5> "61869d09-55fd5-" crt = 0x55fab <error: Cannot access memory at address 0x55fab> cmd = 0x7fc4738e7f18 len = 1867105512 user = 32708 uri = {user = {s = 0x7ffda57619b0 "", len = 1938022416}, passwd = {s = 0x14800000187 <error: Cannot access memory at address 0x14800000187>, len = 1938022416}, host = {s = 0x7ffda57619f0 " \032v\245\375\177", len = 1950306872}, port = { s = 0x7fc4738f54e0 "\030\003", len = 0}, params = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7176352}, sip_params = {s = 0xc81c0 <error: Cannot access memory at address 0xc81c0>, len = 1212256}, headers = { s = 0x128008 <error: Cannot access memory at address 0x128008>, len = 8}, port_no = 7, proto = 0, type = ERROR_URI_T, flags = (unknown: 1850687488), transport = {s = 0x7ffda5761a20 "@\033v\245\375\177", len = 993161627}, ttl = {s = 0x0, len = 1938022416}, user_param = {s = 0x7fc4738433e0 "", len = 0}, maddr = {s = 0x7ffda5761b40 "P\034v\245\375\177", len = 994423861}, method = {s = 0x7ffda5761b40 "P\034v\245\375\177", len = 0}, lr = {s = 0x559b3b60cb6b "core", len = 994414680}, r2 = { s = 0x559b3b60d868 <__func__.6887> "parse_headers", len = 996199992}, gr = {s = 0x7fc4738f5470 "\355\n:<\233U", len = 1938022416}, transport_val = {s = 0x559b3b60d868 <__func__.6887> "parse_headers", len = 996199992}, ttl_val = { s = 0x40 <error: Cannot access memory at address 0x40>, len = 1938022416}, user_param_val = {s = 0x7fc47383e010 "\001", len = 1938773048}, maddr_val = {s = 0x5f8 <error: Cannot access memory at address 0x5f8>, len = 1938022416}, method_val = { s = 0x7fc4738f5390 "@", len = 1938773216}, lr_val = {s = 0x7fc47341e257 <_reg_sruid+55> "", len = 1933697573}, r2_val = {s = 0x7fc47341e257 <_reg_sruid+55> "", len = 0}, gr_val = {s = 0x0, len = -1518986412}} next_hop = {user = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = 1010436526}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1850687488}, host = { s = 0x559b3c3a09b3 ";branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: sip:1234@10.0.0.33:47335;rinstance=837681a60901b510;transport=tcp\r\nTo: sip:1234@10.0.0.24:5060;transport=TCP\r\nFrom: <s"..., len = 0}, port = { s = 0x0, len = 996025379}, params = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, sip_params = {s = 0x7ffda5761c50 "P\035v\245\375\177", len = 994965693}, headers = { s = 0x5051bb0 <error: Cannot access memory at address 0x5051bb0>, len = 0}, port_no = 65535, proto = 65535, type = 4294967295, flags = (unknown: 1939127992), transport = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7179288}, ttl = { s = 0xc7b90 <error: Cannot access memory at address 0xc7b90>, len = 1209320}, user_param = {s = 0x1273e8 <error: Cannot access memory at address 0x1273e8>, len = 8}, maddr = {s = 0x9 <error: Cannot access memory at address 0x9>, len = 1010437024}, method = { s = 0x0, len = 1010437026}, lr = {s = 0x7fc4738f5470 "\355\n:<\233U", len = 1010437024}, r2 = {s = 0x7ffda5761ce0 "\260Cu;\233U", len = 0}, gr = {s = 0x7ffda5761ce0 "\260Cu;\233U", len = 994414680}, transport_val = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 1938856088}, ttl_val = {s = 0x559b3b60cb6b "core", len = 1010436499}, user_param_val = {s = 0x559b3b60cbf8 <__func__.6774> "get_hdr_field", len = 1850687488}, maddr_val = { s = 0x8900000187 <error: Cannot access memory at address 0x8900000187>, len = 0}, method_val = {s = 0x0, len = 996025379}, lr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, r2_val = { s = 0x7ffda5761d50 "h\255\217s\304\177", len = 1935046835}, gr_val = {s = 0x7fc4738faec8 " ", len = 4}} u = 0x3000000018 port = 28239 dst_host = 0x0 i = 8 flags = 0 avp = 0x7ffda5761f50 st = {flags = 1010437026, id = 21915, name = {n = 1010437021, s = {s = 0x559b3c3a0b9d "0\r\n\r\n", len = 0}, re = 0x559b3c3a0b9d}, avp = 0x7fc4734c1294 <_ul_sruid+20>} sct = 0xa59925c06e4f4000 sjt = 0x7ffda57619b0 rve = 0x7fc4738f4038 mct = 0x7ffda57619c0 rv = 0x7fc473654afb rv1 = 0x7ffda5761e90 c1 = {cache_type = 1939030032, val_type = 32708, c = {avp_val = {n = 1939127992, s = {s = 0x7fc47394beb8 "\001", len = 1939030032}, re = 0x7fc47394beb8}, pval = {rs = {s = 0x7fc47394beb8 "\001", len = 1939030032}, ri = 1939127992, flags = 32708}}, i2s = "\b\000\000\000\000\000\000\000\000@On\300%\231\245\370\255\217s\304\177"} s = {s = 0x32 <error: Cannot access memory at address 0x32>, len = -1518986976} srevp = {0x7ffda5761d90, 0x7ffda5761f60} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = { s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140481729070032, string = 0x7fc4738f03d0 "(q\216s\304\177", str = {s = 0x7fc4738f03d0 "(q\216s\304\177", len = 7}, data = 0x7fc4738f03d0, attr = 0x7fc4738f03d0, select = 0x7fc4738f03d0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091528, string = 0x7fc4738f57c8 "0\213\207s\304\177", str = {s = 0x7fc4738f57c8 "0\213\207s\304\177", len = 1}, data = 0x7fc4738f57c8, attr = 0x7fc4738f57c8, select = 0x7fc4738f57c8}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091800, string = 0x7fc4738f58d8 "hX\217s\304\177", str = {s = 0x7fc4738f58d8 "hX\217s\304\177", len = 1}, data = 0x7fc4738f58d8, attr = 0x7fc4738f58d8, select = 0x7fc4738f58d8}}, {type = MODFIXUP_ST, u = {number = 140481729070320, string = 0x7fc4738f04f0 "p\004\217s\304\177", str = {s = 0x7fc4738f04f0 "p\004\217s\304\177", len = 17}, data = 0x7fc4738f04f0, attr = 0x7fc4738f04f0, select = 0x7fc4738f04f0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #15 0x0000559b3b1d0463 in run_actions (h=0x7ffda5761f70, a=0x7fc4738e8ca8, msg=0x7fc47394beb8) at core/action.c:1581 t = 0x7fc4738f7f28 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 1939127992, tz_dsttime = 32708} tdiff = 0 __func__ = "run_actions" #16 0x0000559b3b1d0ce6 in run_top_route (a=0x7fc4738e8ca8, msg=0x7fc47394beb8, c=0x0) at core/action.c:1666 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {8589934592, -8218340046916457879, 0, 94125204317219, 52, 140481737982800, -8218340046968886679, -2792324605258929559}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 8589934592, 0, 94125204317219, 52, 140481737982800, 140727379435568, 94125202082674, 94125205369896, 11932610196109475840, 140481729334224, 8589934592, 0, 94125204317219, 52}}}}} p = 0x7ffda5761f70 ret = 0 sfbk = 0 #17 0x0000559b3b37f932 in receive_msg ( buf=0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"..., len=578, rcv_info=0x7fc46f4c01a8) at core/receive.c:513 msg = 0x7fc47394beb8 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 6, jmp_env = {{__jmpbuf = {107374182978, 140481657569976, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 0, __saved_mask = {__val = {0, 65536, 11932610194258788473, 0, 140481657569680, 1024, 4604204945409, 128, 16, 2, 519691042940, 940597837950, 94125201408152, 0, 4095, 65536}}}}} bctx = 0x0 ret = 0 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} diff = 0 inb = {s = 0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"..., len = 578} netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0} keng = 0x0 evp = {data = 0x7ffda5762160, obuf = {s = 0x0, len = 0}, rcv = 0x7fc46f4c01a8, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 exectime = 0 __func__ = "receive_msg" #18 0x0000559b3b41dfb3 in receive_tcp_msg ( tcpbuf=0x7fc46f4c0530 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 70\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"..., len=578, rcv_info=0x7fc46f4c01a8, con=0x7fc46f4c0190) at core/tcp_read.c:1424 buf = 0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"... bsize = 65535 blen = 65535 __func__ = "receive_tcp_msg" #19 0x0000559b3b4205f8 in tcp_read_req (con=0x7fc46f4c0190, bytes_read=0x7ffda5762618, read_flags=0x7ffda576261c) at core/tcp_read.c:1607 bytes = 578 total_bytes = 578 resp = 1 size = 322122547208 req = 0x7fc46f4c02b8 dst = {send_sock = 0x7ffda5762530, to = {s = {sa_family = 1, sa_data = "\000\000\000\000\000\000@%v\245\375\177\000"}, sin = {sin_family = 1, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "@%v\245\375\177\000"}, sin6 = {sin6_family = 1, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "@%v\245\375\177\000\000\030\000\000\000\000\000\000", __u6_addr16 = {9536, 42358, 32765, 0, 24, 0, 0, 0}, __u6_addr32 = {2775983424, 32765, 24, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 1, __ss_padding = "\000\000\000\000\000\000@%v\245\375\177\000\000\030", '\000' <wiederholt 23 Mal>, "\001\000\000\000\000\000\000\000(\315\036o\304\177\000\000\000\000\000\000\000\000\000\000\350\304Io\000\000\000\000P%v\245\001\000\000\000(\315\036o\304\177\000\000P%v\245\375\177\000\000-\@;\233U\000\000`&v\245\375\177\000\000\b\000\000\000\000\000\000", __ss_align = 20}}, id = 1, send_flags = {f = 1, blst_imask = 0}, proto = 6 '\006', proto_pad0 = 0 '\000', proto_pad1 = 0} c = 0 '\000' ret = 996025379 __func__ = "tcp_read_req" #20 0x0000559b3b423af5 in handle_io (fm=0x7fc473954a08, events=1, idx=-1) at core/tcp_read.c:1782 ret = 8 n = 8 read_flags = RD_CONN_SHORT_READ con = 0x7fc46f4c0190 s = 6 resp = 94125205447392 t = 21915 ee = 0x0 __func__ = "handle_io" #21 0x0000559b3b40eccc in io_wait_loop_epoll (h=0x559b3b6f62e0 <io_w>, t=2, repeat=0) at core/io_wait.h:1070 n = 1 r = 0 fm = 0x7fc473954a08 revents = 1 __func__ = "io_wait_loop_epoll" #22 0x0000559b3b426aa8 in tcp_receive_loop (unix_sock=75) at core/tcp_read.c:1978 __func__ = "tcp_receive_loop" #23 0x0000559b3b2a161e in tcp_init_children (woneinit=0x7ffda5762a00) at core/tcp_main.c:5153 r = 0 i = 7 reader_fd_1 = 75 pid = 0 si_desc = "tcp receiver (generic)\000\000\256\311\061;\233U\000\000\340)v\245\375\177\000\000d\031=;\000\000\000\000\270\361\223s\000\000\000\000\213\313\;\233U\000\000\232\000v\245\375\177\000\000\255$R;\233U\000\000\000\000\000\000\000\000\000\000(\315\036o\304\177\000\000\064\000\000\000\000\000\000\000\340\217Jo\001\000\000\000\320)v\245\375\177\000\000\265&R;\233U\000" si = 0x0 __func__ = "tcp_init_children" #24 0x0000559b3b153f0b in main_loop () at main.c:1843 i = 8 pid = 352197 si = 0x0 si_desc = "udp receiver child=7 sock=10.8.0.10:5060\000\322\061;$\000\000\000\002\000\000\000\064\000\000\000\000@On\300%\231\245\240\026$t\304\177\000\000\210\240X;\233U\000\000\000\000\000\000\000\000\000\000#$^;\233U\000\000\064\000\000\000\000\000\000\000P\003\027t\304\177\000\000\220+v\245\375\177\000\000\327\277\060;\233U\000" nrprocs = 8 woneinit = 1 __func__ = "main_loop" #25 0x0000559b3b15e745 in main (argc=1, argv=0x7ffda57630e8) at main.c:3058 cfg_stream = 0x559b3c2bf2a0 c = -1 r = 0 tmp = 0x0 tmp_len = 0 port = 0 proto = -1518792248 ahost = 0x0 aport = 0 options = 0x559b3b58d188 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3597399342 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x0 p = 0x0 st = {st_dev = 25, st_ino = 9656, st_nlink = 2, st_mode = 16895, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1636097156, tv_nsec = 709532085}, st_mtim = {tv_sec = 1636211948, tv_nsec = 447930869}, st_ctim = {tv_sec = 1636211948, tv_nsec = 447930869}, __glibc_reserved = {0, 0, 0}} tbuf = "\260/v\245\375\177\000\000\253'@t\304\177\000\000\002\000\000\000\000\000\000\000\016\000\000\000\000\000\000\200", '\000' <wiederholt 48 Mal>, "`\321Bt\304\177\000\000\001.v\245\375\177\000\000\350\311Bt\304\177", '\000' <wiederholt 26 Mal>, "\220\354$t\304\177\000\000\004\000\000\024\000\000\000\000\300\303%t\304\177", '\000' <wiederholt 130 Mal>... option_index = 0 long_options = {{name = 0x559b3b58f5e6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x559b3b58a521 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x559b3b58f5eb "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x559b3b58f5f1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x559b3b58f5f7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x559b3b58f600 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x559b3b58f60a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x559b3b58f614 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x559b3b58f61f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x559b3b58f628 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, { name = 0x559b3b58f633 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x559b3b58f639 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x559b3b58f643 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main"
(gdb) info locals set = {__val = {0, 140481737467984, 4222451712, 94125218804128, 94125218804229, 94125218804128, 94125218804128, 94125218804250, 94125218804428, 94125218804128, 94125218804428, 0, 0, 0, 0, 0}} pid = <optimized out> tid = <optimized out> ret = <optimized out>
(gdb) list 45 in ../sysdeps/unix/sysv/linux/raise.c ```