Full backtrace:
#0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
set = {__val = {0, 140481737467984, 4222451712, 94125218804128, 94125218804229, 94125218804128, 94125218804128, 94125218804250, 94125218804428, 94125218804128, 94125218804428, 0, 0, 0, 0, 0}}
pid = <optimized out>
tid = <optimized out>
ret = <optimized out>
#1 0x00007fc47407a859 in __GI_abort () at abort.c:79
save_stage = 1
act = {__sigaction_handler = {sa_handler = 0x7a, sa_sigaction = 0x7a}, sa_mask = {__val = {94125218804448, 3432, 140481737427665, 0, 140481738839488, 140481738843296, 140481653628996, 476, 140481653629648, 140481737982800, 140481737418232, 0,
11932610196109475840, 140481738621957, 140481740840960, 140481738638728}}, sa_flags = 1863311428, sa_restorer = 0x1dc}
sigs = {__val = {32, 0 <repeats 15 times>}}
#2 0x00007fc47407a729 in __assert_fail_base (fmt=0x7fc474210588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x7fc46f0fe2d0 "json_object_get_type(jso) == json_type_object", file=0x7fc46f0fe044 "json_object.c", line=476, function=<optimized out>)
at assert.c:92
str = 0x559b3c352830 "`\356\064<\233U"
total = 4096
#3 0x00007fc47408bf36 in __GI___assert_fail (assertion=0x7fc46f0fe2d0 "json_object_get_type(jso) == json_type_object", file=0x7fc46f0fe044 "json_object.c", line=476, function=0x7fc46f0fe280 "json_object_object_add_ex") at assert.c:101
No locals.
#4 0x00007fc46f0f7d26 in json_object_object_add_ex () from /lib/x86_64-linux-gnu/libjson-c.so.4
No symbol table info available.
#5 0x00007fc46f14ebe4 in kz_amqp_add_payload_common_properties (json_obj=0x559b3c3b30c0, server_id=0x7ffda57606f0 "kamailio@sipproxy.mydomain.com-<352213>-script-0", unique=0x7ffda5760660) at kz_amqp.c:1023
node_name = '\000' <wiederholt 24 Mal>, "|\000\000\000w\000\000\000n\000\000\000[\000\000\000@\004v\245\375\177\000\000\000\000\005\000\000\000\000\000PO\000\000\000\000\000\000\200\v$t\304\177\000\000`\000\000\000\000\000\000\000\260\060;<\233U\000\000iX\217s\304\177", '\000' <wiederholt 11 Mal>, "@On\300%\231\245\200\361\064<\233U\000\000@,;<\233U\000\000\000\000\000\000\000\000\000\000\204\235\017o\304\177\000\000\000\000\000\000\000\000\000\000p,;<\233U\000\000\377\377\377\377\000\000\000\000U\254\017o\304\177\000\000n\000\000\000", '\377' <wiederholt 12 Mal>, "\200\361\064<\233U\000\000\000\000\000\000\000\000\000\000"...
#6 0x00007fc46f1509a0 in kz_amqp_pipe_send_receive (str_exchange=0x7ffda57609c0, str_routing_key=0x7ffda57609d0, str_payload=0x7ffda57609b0, kz_timeout=0x7ffda57609e0, json_ret=0x7ffda5760a10) at kz_amqp.c:1159
ret = 1
json_obj = 0x559b3c3b30c0
cmd = 0x0
json_body = 0x0
unique_string = {s = 0x7ffda57606c0 "042a4c6f-a170-4d2a-a40f-9be55aa7d760", len = 36}
serverid = "kamailio@sipproxy.mydomain.com-<352213>-script-0\000\326#t\304\177\000\000\000\334#t\304\177\000\000\200\334#t\304\177\000\000\000\345#t\304\177\000\000@\332#t\304\177\000\000\300\331#t\304\177\000\000\000\000\000\000\000\000\000\000p\000\000\000\000\000\000\000 \342#t\304\177\000\000\240\342#t\304\177\000\000`\000\000\000\000\000\000\000\a\000\000\000\304\177\000\000@\344#t\304\177\000\000\300C\037t\304\177\000\000\001\000\000\000\000\000\000\000\a\000\000\000\061", '\000' <wiederholt 27 Mal>...
id = "\004*Lo\241pM*\244\017\233\345Z\247\327`"
uuid_buffer = "042a4c6f-a170-4d2a-a40f-9be55aa7d760\000\000\000"
payload = 0x559b3b5f5b29 "core/mem/q_malloc.c"
__func__ = "kz_amqp_pipe_send_receive"
#7 0x00007fc46f158763 in kz_amqp_query_ex (msg=0x7fc47394beb8, exchange=0x7fc4738f03d0 "(q\216s\304\177", routing_key=0x7fc4738f57c8 "0\213\207s\304\177", payload=0x7fc4738f58d8 "hX\217s\304\177") at kz_amqp.c:1494
json_s = {s = 0x7fc4738f5868 "0", len = 1}
exchange_s = {s = 0x7fc4738e7128 "callevt", len = 7}
routing_key_s = {s = 0x7fc473878b30 "0", len = 1}
kz_timeout = {tv_sec = 2, tv_usec = 0}
__func__ = "kz_amqp_query_ex"
j = 0x559b3c3b2bd0
ret = 0x0
res = 32708
strjson = 0x34 <error: Cannot access memory at address 0x34>
len = 0
value = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>
#8 0x00007fc46f1588b2 in kz_amqp_query (msg=0x7fc47394beb8, exchange=0x7fc4738f03d0 "(q\216s\304\177", routing_key=0x7fc4738f57c8 "0\213\207s\304\177", payload=0x7fc4738f58d8 "hX\217s\304\177", dst=0x7fc4738f04f0 "p\004\217s\304\177") at kz_amqp.c:1517
dst_pv = 0x7fc474170350 <__syslog>
dst_val = {rs = {s = 0x7ffda5760b00 "\220\021v\245\375\177", len = 1863978364}, ri = 52, flags = 3}
result = 0
#9 0x0000559b3b1c7355 in do_action (h=0x7ffda5761370, a=0x7fc4738f1d98, msg=0x7fc47394beb8) at core/action.c:1151
ret = -5
v = 0
dst = {send_sock = 0x7fc4738eec20, to = {s = {sa_family = 1920, sa_data = "\217s\304\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 1920, sin_port = 29583, sin_addr = {s_addr = 32708}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 1920, sin6_port = 29583, sin6_flowinfo = 32708, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <wiederholt 15 Mal>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 1920,
__ss_padding = "\217s\304\177", '\000' <wiederholt 43 Mal>, "@On\300%\231\245\240\026v\245\375\177\000\000\000\000\000\000\002", '\000' <wiederholt 11 Mal>, "#$^;\233U\000\000\064\000\000\000\000\000\000\000P\003\027t\304\177\000\000P\021v\245\375\177\000\000+y\026;\233U\000", __ss_align = 52}}, id = 1938746392, send_flags = {f = 32708, blst_imask = 0}, proto = 16 '\020', proto_pad0 = 22 '\026', proto_pad1 = -23178}
tmp = 0x7ffda5761f70 "\001"
new_uri = 0x7fc4738eec10 "\001"
end = 0x7fc47394beb8 "\001"
crt = 0x34 <error: Cannot access memory at address 0x34>
cmd = 0x7fc4738e7ce8
len = 996025379
user = 21915
uri = {user = {s = 0x7fc47420df30 "d]", len = 996105001}, passwd = {s = 0xf600000187 <error: Cannot access memory at address 0xf600000187>, len = 994455272}, host = {s = 0x7ffda5760dd0 "", len = 1938022416}, port = {
s = 0x4a8 <error: Cannot access memory at address 0x4a8>, len = 1938022416}, params = {s = 0x7ffda5760e10 "@\016v\245\375\177", len = 1950306872}, sip_params = {s = 0x7fc47420df30 "d]", len = 0}, headers = {
s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7171768}, port_no = 37488, proto = 12, type = ERROR_URI_T, flags = (unknown: 1216840), transport = {s = 0x129890 <error: Cannot access memory at address 0x129890>, len = 8}, ttl = {
s = 0x5 <error: Cannot access memory at address 0x5>, len = 1850687488}, user_param = {s = 0x7ffda5760e40 "@\017v\245\375\177", len = 993161627}, maddr = {s = 0x0, len = 996104996}, method = {s = 0x7ffda5760f40 "", len = 0}, lr = {s = 0x7ffda5760f40 "",
len = 994414680}, r2 = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 0}, gr = {s = 0x559b3b5913ab "core", len = 0}, transport_val = {s = 0x559b3b591828 <__func__.7764> "rval_new_empty", len = 995693617}, ttl_val = {
s = 0x4a8 <error: Cannot access memory at address 0x4a8>, len = 1938022416}, user_param_val = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 996105001}, maddr_val = {
s = 0x7f000001ff <error: Cannot access memory at address 0x7f000001ff>, len = 994455272}, method_val = {s = 0x7ffda5760ef0 "", len = 1938022416}, lr_val = {s = 0x7fc4742418a0 <_IO_helper_jumps> "", len = 1938022416}, r2_val = {
s = 0x7ffda5760f30 "`\017v\245\375\177", len = 1950306872}, gr_val = {s = 0x0, len = 0}}
next_hop = {user = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7173632}, passwd = {s = 0xc8b28 <error: Cannot access memory at address 0xc8b28>, len = 1214976}, host = {s = 0x129890 <error: Cannot access memory at address 0x129890>,
len = 8}, port = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 1850687488}, params = {s = 0x7ffda5760f60 "\200\020v\245\375\177", len = 993161627}, sip_params = {s = 0x0, len = 996104996}, headers = {s = 0x7fc4738f3850 "H\a", len = 0},
port_no = 4224, proto = 42358, type = 32765, flags = (URI_USER_NORMALIZE | unknown: 994423860), transport = {s = 0x7fc4742418a0 <_IO_helper_jumps> "", len = 3432}, ttl = {s = 0x559b3b5913ab "core", len = 1937415856}, user_param = {
s = 0x559b3b591630 <__func__.7732> "rval_destroy_helper", len = 995693617}, maddr = {s = 0x7fc4738f0780 "\002", len = 1938022416}, method = {s = 0x559b00000000 <error: Cannot access memory at address 0x559b00000000>, len = 1850687488}, lr = {
s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 0}, r2 = {s = 0x0, len = 1938753352}, gr = {s = 0x748 <error: Cannot access memory at address 0x748>, len = 1938022416}, transport_val = {s = 0x7fc4738f0660 "\200",
len = 1938755320}, ttl_val = {s = 0xe1a57616c0 <error: Cannot access memory at address 0xe1a57616c0>, len = 0}, user_param_val = {s = 0x0, len = 996025379}, maddr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232},
method_val = {s = 0x7ffda5761050 "P\021v\245\375\177", len = 991328555}, lr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1850687488}, r2_val = {s = 0x7ffda5761150 "\020\026v\245\375\177", len = 0}, gr_val = {s = 0x0, len = 996025379}}
u = 0x7fc4738edcd0
port = 0
dst_host = 0x7ffda5761f70
i = 4
flags = 0
avp = 0x7ffda5761150
st = {flags = 1, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
sct = 0x559b3b5e2423
sjt = 0x400000001
rve = 0x7fc473908270
mct = 0x0
rv = 0x7fc4738f3078
rv1 = 0x559b3b178ca4 <rval_expr_eval+20729>
c1 = {cache_type = 2775978288, val_type = 32765, c = {avp_val = {n = 991328479, s = {s = 0x559b3b1678df <rval_destroy_helper+1140> "\353\005\350z\204\375\377\220H\213E\310dH3\004%(", len = 1}, re = 0x559b3b1678df <rval_destroy_helper+1140>}, pval = {rs = {
s = 0x559b3b1678df <rval_destroy_helper+1140> "\353\005\350z\204\375\377\220H\213E\310dH3\004%(", len = 1}, ri = 1938746392, flags = 32708}}, i2s = "\221\000\000\000\000\000\000\000\030\354\216s\304\177\000\000\210J\217s\304\177"}
s = {s = 0x7fc4738f5868 "0", len = 1}
srevp = {0x34, 0x7fc474170350 <__syslog>}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {
s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140481729070032, string = 0x7fc4738f03d0 "(q\216s\304\177", str = {s = 0x7fc4738f03d0 "(q\216s\304\177", len = 7},
data = 0x7fc4738f03d0, attr = 0x7fc4738f03d0, select = 0x7fc4738f03d0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091528, string = 0x7fc4738f57c8 "0\213\207s\304\177", str = {s = 0x7fc4738f57c8 "0\213\207s\304\177", len = 1},
data = 0x7fc4738f57c8, attr = 0x7fc4738f57c8, select = 0x7fc4738f57c8}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091800, string = 0x7fc4738f58d8 "hX\217s\304\177", str = {s = 0x7fc4738f58d8 "hX\217s\304\177", len = 1}, data = 0x7fc4738f58d8,
attr = 0x7fc4738f58d8, select = 0x7fc4738f58d8}}, {type = MODFIXUP_ST, u = {number = 140481729070320, string = 0x7fc4738f04f0 "p\004\217s\304\177", str = {s = 0x7fc4738f04f0 "p\004\217s\304\177", len = 17}, data = 0x7fc4738f04f0, attr = 0x7fc4738f04f0,
select = 0x7fc4738f04f0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#10 0x0000559b3b1d0463 in run_actions (h=0x7ffda5761370, a=0x7fc4738f1d98, msg=0x7fc47394beb8) at core/action.c:1581
t = 0x7fc4738f1d98
ret = -1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 0, tz_dsttime = 0}
tdiff = 0
__func__ = "run_actions"
#11 0x0000559b3b1d0bd6 in run_actions_safe (h=0x7ffda5761f70, a=0x7fc4738f1d98, msg=0x7fc47394beb8) at core/action.c:1645
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {8589934592, -8218340047319111063, 0, 94125204317219, 52, 140481737982800, -8218340047371539863, -2792324605258929559}, __mask_was_saved = 0, __saved_mask = {__val = {94125201453467, 0,
22470941476, 140727379432688, 11932610196109475840, 140727379432688, 8589934592, 0, 94125204317219, 52, 140481737982800, 140727379432704, 140481725410594, 32, 140481728339984, 140727379432816}}}}}
ret = 32708
ign_on_break = 0
#12 0x0000559b3b16a4b0 in rval_get_int (h=0x7ffda5761f70, msg=0x7fc47394beb8, i=0x7ffda5761750, rv=0x7fc4738f4040, cache=0x0) at core/rvalue.c:949
r_avp = 0xa59925c06e4f4000
avp_val = {n = 7, s = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 0}, re = 0x7}
pval = {rs = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, ri = -1518987760, flags = 32765}
tmp = {s = 0x0, len = 996025379}
s = 0x0
r = 0
ret = 0
destroy_pval = 0
__func__ = "rval_get_int"
#13 0x0000559b3b16fa9c in rval_expr_eval_int (h=0x7ffda5761f70, msg=0x7fc47394beb8, res=0x7ffda5761750, rve=0x7fc4738f4038) at core/rvalue.c:1947
i1 = 1947665232
i2 = 32708
ret = -1
c1 = {cache_type = 1939127992, val_type = 32708, c = {avp_val = {n = -1518985360, s = {s = 0x7ffda5761f70 "\001", len = -1518986456}, re = 0x7ffda5761f70}, pval = {rs = {s = 0x7ffda5761f70 "\001", len = -1518986456}, ri = 1, flags = 32708}},
i2s = " Їs\304\177\000\000\250\023\217s\304\177\000\000\310W\217s\304\177"}
c2 = {cache_type = 52, val_type = 36, c = {avp_val = {n = 1947665232, s = {s = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = -1518987568}, re = 0x7fc474170350 <__syslog>}, pval = {rs = {
s = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = -1518987568}, ri = 1932248914, flags = 32708}}, i2s = "\377\377\377\377", '\000' <wiederholt 12 Mal>, "裎s\304\177"}
rv1 = 0x7fc4738f13a8
rv2 = 0x7ffda5761700
__func__ = "rval_expr_eval_int"
#14 0x0000559b3b1c0ec8 in do_action (h=0x7ffda5761f70, a=0x7fc4738f7f28, msg=0x7fc47394beb8) at core/action.c:1052
ret = -5
v = 1
dst = {send_sock = 0x0, to = {s = {sa_family = 16384, sa_data = "On\300%\231\245\334\035v\245\375\177\000"}, sin = {sin_family = 16384, sin_port = 28239, sin_addr = {s_addr = 2778277312}, sin_zero = "\334\035v\245\375\177\000"}, sin6 = {sin6_family = 16384,
sin6_port = 28239, sin6_flowinfo = 2778277312, sin6_addr = {__in6_u = {__u6_addr8 = "\334\035v\245\375\177\000\000\000\000\000\000\026\000\000", __u6_addr16 = {7644, 42358, 32765, 0, 0, 0, 22, 0}, __u6_addr32 = {2775981532, 32765, 0, 22}}},
sin6_scope_id = 997540784}, sas = {ss_family = 16384,
__ss_padding = "On\300%\231\245\334\035v\245\375\177\000\000\000\000\000\000\026\000\000\000\260Cu;\233U\000\000\000\000\000\000\000\000\000\000\242\v:<\233U\000\000\023\000\000\000\233U\000\000\340\035v\245\375\177\000\000\261\252I;\233U\000\000\370\313`;\233U\000\000\000@On\300%\231\245\242\v:<\233U\000\000\000\000\000\000\002", '\000' <wiederholt 11 Mal>, "#$^;\233U\000", __ss_align = 52}}, id = 1947665232, send_flags = {f = 32708, blst_imask = 0}, proto = 104 'h', proto_pad0 = -83 '\255', proto_pad1 = 29583}
tmp = 0x559b3b518985 <system_reseed+296> "\203\275l\373\377\377"
new_uri = 0x559b3b4d8e5c <parse_sip_header_name+3534> "\203\370\002\017\216\214\003"
end = 0x7fc4734c1285 <_ul_sruid+5> "61869d09-55fd5-"
crt = 0x55fab <error: Cannot access memory at address 0x55fab>
cmd = 0x7fc4738e7f18
len = 1867105512
user = 32708
uri = {user = {s = 0x7ffda57619b0 "", len = 1938022416}, passwd = {s = 0x14800000187 <error: Cannot access memory at address 0x14800000187>, len = 1938022416}, host = {s = 0x7ffda57619f0 " \032v\245\375\177", len = 1950306872}, port = {
s = 0x7fc4738f54e0 "\030\003", len = 0}, params = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7176352}, sip_params = {s = 0xc81c0 <error: Cannot access memory at address 0xc81c0>, len = 1212256}, headers = {
s = 0x128008 <error: Cannot access memory at address 0x128008>, len = 8}, port_no = 7, proto = 0, type = ERROR_URI_T, flags = (unknown: 1850687488), transport = {s = 0x7ffda5761a20 "@\033v\245\375\177", len = 993161627}, ttl = {s = 0x0, len = 1938022416},
user_param = {s = 0x7fc4738433e0 "", len = 0}, maddr = {s = 0x7ffda5761b40 "P\034v\245\375\177", len = 994423861}, method = {s = 0x7ffda5761b40 "P\034v\245\375\177", len = 0}, lr = {s = 0x559b3b60cb6b "core", len = 994414680}, r2 = {
s = 0x559b3b60d868 <__func__.6887> "parse_headers", len = 996199992}, gr = {s = 0x7fc4738f5470 "\355\n:<\233U", len = 1938022416}, transport_val = {s = 0x559b3b60d868 <__func__.6887> "parse_headers", len = 996199992}, ttl_val = {
s = 0x40 <error: Cannot access memory at address 0x40>, len = 1938022416}, user_param_val = {s = 0x7fc47383e010 "\001", len = 1938773048}, maddr_val = {s = 0x5f8 <error: Cannot access memory at address 0x5f8>, len = 1938022416}, method_val = {
s = 0x7fc4738f5390 "@", len = 1938773216}, lr_val = {s = 0x7fc47341e257 <_reg_sruid+55> "", len = 1933697573}, r2_val = {s = 0x7fc47341e257 <_reg_sruid+55> "", len = 0}, gr_val = {s = 0x0, len = -1518986412}}
next_hop = {user = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = 1010436526}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1850687488}, host = {
s = 0x559b3c3a09b3 ";branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837681a60901b510;transport=tcp>\r\nTo: <sip:1234@10.0.0.24:5060;transport=TCP>\r\nFrom: <s"..., len = 0}, port = {
s = 0x0, len = 996025379}, params = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, sip_params = {s = 0x7ffda5761c50 "P\035v\245\375\177", len = 994965693}, headers = {
s = 0x5051bb0 <error: Cannot access memory at address 0x5051bb0>, len = 0}, port_no = 65535, proto = 65535, type = 4294967295, flags = (unknown: 1939127992), transport = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7179288}, ttl = {
s = 0xc7b90 <error: Cannot access memory at address 0xc7b90>, len = 1209320}, user_param = {s = 0x1273e8 <error: Cannot access memory at address 0x1273e8>, len = 8}, maddr = {s = 0x9 <error: Cannot access memory at address 0x9>, len = 1010437024}, method = {
s = 0x0, len = 1010437026}, lr = {s = 0x7fc4738f5470 "\355\n:<\233U", len = 1010437024}, r2 = {s = 0x7ffda5761ce0 "\260Cu;\233U", len = 0}, gr = {s = 0x7ffda5761ce0 "\260Cu;\233U", len = 994414680}, transport_val = {
s = 0x1 <error: Cannot access memory at address 0x1>, len = 1938856088}, ttl_val = {s = 0x559b3b60cb6b "core", len = 1010436499}, user_param_val = {s = 0x559b3b60cbf8 <__func__.6774> "get_hdr_field", len = 1850687488}, maddr_val = {
s = 0x8900000187 <error: Cannot access memory at address 0x8900000187>, len = 0}, method_val = {s = 0x0, len = 996025379}, lr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, r2_val = {
s = 0x7ffda5761d50 "h\255\217s\304\177", len = 1935046835}, gr_val = {s = 0x7fc4738faec8 " ", len = 4}}
u = 0x3000000018
port = 28239
dst_host = 0x0
i = 8
flags = 0
avp = 0x7ffda5761f50
st = {flags = 1010437026, id = 21915, name = {n = 1010437021, s = {s = 0x559b3c3a0b9d "0\r\n\r\n", len = 0}, re = 0x559b3c3a0b9d}, avp = 0x7fc4734c1294 <_ul_sruid+20>}
sct = 0xa59925c06e4f4000
sjt = 0x7ffda57619b0
rve = 0x7fc4738f4038
mct = 0x7ffda57619c0
rv = 0x7fc473654afb
rv1 = 0x7ffda5761e90
c1 = {cache_type = 1939030032, val_type = 32708, c = {avp_val = {n = 1939127992, s = {s = 0x7fc47394beb8 "\001", len = 1939030032}, re = 0x7fc47394beb8}, pval = {rs = {s = 0x7fc47394beb8 "\001", len = 1939030032}, ri = 1939127992, flags = 32708}},
i2s = "\b\000\000\000\000\000\000\000\000@On\300%\231\245\370\255\217s\304\177"}
s = {s = 0x32 <error: Cannot access memory at address 0x32>, len = -1518986976}
srevp = {0x7ffda5761d90, 0x7ffda5761f60}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {
s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140481729070032, string = 0x7fc4738f03d0 "(q\216s\304\177", str = {s = 0x7fc4738f03d0 "(q\216s\304\177", len = 7},
data = 0x7fc4738f03d0, attr = 0x7fc4738f03d0, select = 0x7fc4738f03d0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091528, string = 0x7fc4738f57c8 "0\213\207s\304\177", str = {s = 0x7fc4738f57c8 "0\213\207s\304\177", len = 1},
data = 0x7fc4738f57c8, attr = 0x7fc4738f57c8, select = 0x7fc4738f57c8}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091800, string = 0x7fc4738f58d8 "hX\217s\304\177", str = {s = 0x7fc4738f58d8 "hX\217s\304\177", len = 1}, data = 0x7fc4738f58d8,
attr = 0x7fc4738f58d8, select = 0x7fc4738f58d8}}, {type = MODFIXUP_ST, u = {number = 140481729070320, string = 0x7fc4738f04f0 "p\004\217s\304\177", str = {s = 0x7fc4738f04f0 "p\004\217s\304\177", len = 17}, data = 0x7fc4738f04f0, attr = 0x7fc4738f04f0,
select = 0x7fc4738f04f0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#15 0x0000559b3b1d0463 in run_actions (h=0x7ffda5761f70, a=0x7fc4738e8ca8, msg=0x7fc47394beb8) at core/action.c:1581
t = 0x7fc4738f7f28
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 1939127992, tz_dsttime = 32708}
tdiff = 0
__func__ = "run_actions"
#16 0x0000559b3b1d0ce6 in run_top_route (a=0x7fc4738e8ca8, msg=0x7fc47394beb8, c=0x0) at core/action.c:1666
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {8589934592, -8218340046916457879, 0, 94125204317219, 52, 140481737982800, -8218340046968886679, -2792324605258929559}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 8589934592,
0, 94125204317219, 52, 140481737982800, 140727379435568, 94125202082674, 94125205369896, 11932610196109475840, 140481729334224, 8589934592, 0, 94125204317219, 52}}}}}
p = 0x7ffda5761f70
ret = 0
sfbk = 0
#17 0x0000559b3b37f932 in receive_msg (
buf=0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"..., len=578, rcv_info=0x7fc46f4c01a8)
at core/receive.c:513
msg = 0x7fc47394beb8
ctx = {rec_lev = 0, run_flags = 0, last_retcode = 6, jmp_env = {{__jmpbuf = {107374182978, 140481657569976, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 0, __saved_mask = {__val = {0, 65536, 11932610194258788473, 0, 140481657569680, 1024, 4604204945409, 128, 16, 2,
519691042940, 940597837950, 94125201408152, 0, 4095, 65536}}}}}
bctx = 0x0
ret = 0
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
diff = 0
inb = {s = 0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"..., len = 578}
netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
keng = 0x0
evp = {data = 0x7ffda5762160, obuf = {s = 0x0, len = 0}, rcv = 0x7fc46f4c01a8, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
cidlockidx = 0
cidlockset = 0
errsipmsg = 0
exectime = 0
__func__ = "receive_msg"
#18 0x0000559b3b41dfb3 in receive_tcp_msg (
tcpbuf=0x7fc46f4c0530 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 70\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"..., len=578,
rcv_info=0x7fc46f4c01a8, con=0x7fc46f4c0190) at core/tcp_read.c:1424
buf = 0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"...
bsize = 65535
blen = 65535
__func__ = "receive_tcp_msg"
#19 0x0000559b3b4205f8 in tcp_read_req (con=0x7fc46f4c0190, bytes_read=0x7ffda5762618, read_flags=0x7ffda576261c) at core/tcp_read.c:1607
bytes = 578
total_bytes = 578
resp = 1
size = 322122547208
req = 0x7fc46f4c02b8
dst = {send_sock = 0x7ffda5762530, to = {s = {sa_family = 1, sa_data = "\000\000\000\000\000\000@%v\245\375\177\000"}, sin = {sin_family = 1, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "@%v\245\375\177\000"}, sin6 = {sin6_family = 1, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "@%v\245\375\177\000\000\030\000\000\000\000\000\000", __u6_addr16 = {9536, 42358, 32765, 0, 24, 0, 0, 0}, __u6_addr32 = {2775983424, 32765, 24, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 1,
__ss_padding = "\000\000\000\000\000\000@%v\245\375\177\000\000\030", '\000' <wiederholt 23 Mal>, "\001\000\000\000\000\000\000\000(\315\036o\304\177\000\000\000\000\000\000\000\000\000\000\350\304Io\000\000\000\000P%v\245\001\000\000\000(\315\036o\304\177\000\000P%v\245\375\177\000\000-\\@;\233U\000\000`&v\245\375\177\000\000\b\000\000\000\000\000\000", __ss_align = 20}}, id = 1, send_flags = {f = 1, blst_imask = 0}, proto = 6 '\006', proto_pad0 = 0 '\000', proto_pad1 = 0}
c = 0 '\000'
ret = 996025379
__func__ = "tcp_read_req"
#20 0x0000559b3b423af5 in handle_io (fm=0x7fc473954a08, events=1, idx=-1) at core/tcp_read.c:1782
ret = 8
n = 8
read_flags = RD_CONN_SHORT_READ
con = 0x7fc46f4c0190
s = 6
resp = 94125205447392
t = 21915
ee = 0x0
__func__ = "handle_io"
#21 0x0000559b3b40eccc in io_wait_loop_epoll (h=0x559b3b6f62e0 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
n = 1
r = 0
fm = 0x7fc473954a08
revents = 1
__func__ = "io_wait_loop_epoll"
#22 0x0000559b3b426aa8 in tcp_receive_loop (unix_sock=75) at core/tcp_read.c:1978
__func__ = "tcp_receive_loop"
#23 0x0000559b3b2a161e in tcp_init_children (woneinit=0x7ffda5762a00) at core/tcp_main.c:5153
r = 0
i = 7
reader_fd_1 = 75
pid = 0
si_desc = "tcp receiver (generic)\000\000\256\311\061;\233U\000\000\340)v\245\375\177\000\000d\031=;\000\000\000\000\270\361\223s\000\000\000\000\213\313\\;\233U\000\000\232\000v\245\375\177\000\000\255$R;\233U\000\000\000\000\000\000\000\000\000\000(\315\036o\304\177\000\000\064\000\000\000\000\000\000\000\340\217Jo\001\000\000\000\320)v\245\375\177\000\000\265&R;\233U\000"
si = 0x0
__func__ = "tcp_init_children"
#24 0x0000559b3b153f0b in main_loop () at main.c:1843
i = 8
pid = 352197
si = 0x0
si_desc = "udp receiver child=7 sock=10.8.0.10:5060\000\322\061;$\000\000\000\002\000\000\000\064\000\000\000\000@On\300%\231\245\240\026$t\304\177\000\000\210\240X;\233U\000\000\000\000\000\000\000\000\000\000#$^;\233U\000\000\064\000\000\000\000\000\000\000P\003\027t\304\177\000\000\220+v\245\375\177\000\000\327\277\060;\233U\000"
nrprocs = 8
woneinit = 1
__func__ = "main_loop"
#25 0x0000559b3b15e745 in main (argc=1, argv=0x7ffda57630e8) at main.c:3058
cfg_stream = 0x559b3c2bf2a0
c = -1
r = 0
tmp = 0x0
tmp_len = 0
port = 0
proto = -1518792248
ahost = 0x0
aport = 0
options = 0x559b3b58d188 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 3597399342
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x0
p = 0x0
st = {st_dev = 25, st_ino = 9656, st_nlink = 2, st_mode = 16895, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1636097156, tv_nsec = 709532085}, st_mtim = {tv_sec = 1636211948,
tv_nsec = 447930869}, st_ctim = {tv_sec = 1636211948, tv_nsec = 447930869}, __glibc_reserved = {0, 0, 0}}
tbuf = "\260/v\245\375\177\000\000\253'@t\304\177\000\000\002\000\000\000\000\000\000\000\016\000\000\000\000\000\000\200", '\000' <wiederholt 48 Mal>, "`\321Bt\304\177\000\000\001.v\245\375\177\000\000\350\311Bt\304\177", '\000' <wiederholt 26 Mal>, "\220\354$t\304\177\000\000\004\000\000\024\000\000\000\000\300\303%t\304\177", '\000' <wiederholt 130 Mal>...
option_index = 0
long_options = {{name = 0x559b3b58f5e6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x559b3b58a521 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x559b3b58f5eb "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x559b3b58f5f1 "subst",
has_arg = 1, flag = 0x0, val = 1025}, {name = 0x559b3b58f5f7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x559b3b58f600 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x559b3b58f60a "server-id", has_arg = 1, flag = 0x0,
val = 1028}, {name = 0x559b3b58f614 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x559b3b58f61f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x559b3b58f628 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {
name = 0x559b3b58f633 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x559b3b58f639 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x559b3b58f643 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0,
val = 0}}
__func__ = "main"
(gdb) info locals
set = {__val = {0, 140481737467984, 4222451712, 94125218804128, 94125218804229, 94125218804128, 94125218804128, 94125218804250, 94125218804428, 94125218804128, 94125218804428, 0, 0, 0, 0, 0}}
pid = <optimized out>
tid = <optimized out>
ret = <optimized out>
(gdb) list
45 in ../sysdeps/unix/sysv/linux/raise.c
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or unsubscribe.
Triage notifications on the go with GitHub Mobile for iOS or Android.