Full backtrace:
```
#0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
set = {__val = {0, 140481737467984, 4222451712, 94125218804128, 94125218804229,
94125218804128, 94125218804128, 94125218804250, 94125218804428, 94125218804128,
94125218804428, 0, 0, 0, 0, 0}}
pid = <optimized out>
tid = <optimized out>
ret = <optimized out>
#1 0x00007fc47407a859 in __GI_abort () at abort.c:79
save_stage = 1
act = {__sigaction_handler = {sa_handler = 0x7a, sa_sigaction = 0x7a}, sa_mask =
{__val = {94125218804448, 3432, 140481737427665, 0, 140481738839488, 140481738843296,
140481653628996, 476, 140481653629648, 140481737982800, 140481737418232, 0,
11932610196109475840, 140481738621957, 140481740840960, 140481738638728}},
sa_flags = 1863311428, sa_restorer = 0x1dc}
sigs = {__val = {32, 0 <repeats 15 times>}}
#2 0x00007fc47407a729 in __assert_fail_base (fmt=0x7fc474210588 "%s%s%s:%u:
%s%sAssertion `%s' failed.\n%n", assertion=0x7fc46f0fe2d0
"json_object_get_type(jso) == json_type_object", file=0x7fc46f0fe044
"json_object.c", line=476, function=<optimized out>)
at assert.c:92
str = 0x559b3c352830 "`\356\064<\233U"
total = 4096
#3 0x00007fc47408bf36 in __GI___assert_fail (assertion=0x7fc46f0fe2d0
"json_object_get_type(jso) == json_type_object", file=0x7fc46f0fe044
"json_object.c", line=476, function=0x7fc46f0fe280
"json_object_object_add_ex") at assert.c:101
No locals.
#4 0x00007fc46f0f7d26 in json_object_object_add_ex () from
/lib/x86_64-linux-gnu/libjson-c.so.4
No symbol table info available.
#5 0x00007fc46f14ebe4 in kz_amqp_add_payload_common_properties (json_obj=0x559b3c3b30c0,
server_id=0x7ffda57606f0
"kamailio(a)sipproxy.mydomain.com-<352213>-script-0";-script-0", unique=0x7ffda5760660)
at kz_amqp.c:1023
node_name = '\000' <wiederholt 24 Mal>,
"|\000\000\000w\000\000\000n\000\000\000[\000\000\000@\004v\245\375\177\000\000\000\000\005\000\000\000\000\000PO\000\000\000\000\000\000\200\v$t\304\177\000\000`\000\000\000\000\000\000\000\260\060;<\233U\000\000iX\217s\304\177",
'\000' <wiederholt 11 Mal>,
"@On\300%\231\245\200\361\064<\233U\000\000@,;<\233U\000\000\000\000\000\000\000\000\000\000\204\235\017o\304\177\000\000\000\000\000\000\000\000\000\000p,;<\233U\000\000\377\377\377\377\000\000\000\000U\254\017o\304\177\000\000n\000\000\000",
'\377' <wiederholt 12 Mal>,
"\200\361\064<\233U\000\000\000\000\000\000\000\000\000\000"...
#6 0x00007fc46f1509a0 in kz_amqp_pipe_send_receive (str_exchange=0x7ffda57609c0,
str_routing_key=0x7ffda57609d0, str_payload=0x7ffda57609b0, kz_timeout=0x7ffda57609e0,
json_ret=0x7ffda5760a10) at kz_amqp.c:1159
ret = 1
json_obj = 0x559b3c3b30c0
cmd = 0x0
json_body = 0x0
unique_string = {s = 0x7ffda57606c0
"042a4c6f-a170-4d2a-a40f-9be55aa7d760", len = 36}
serverid =
"kamailio@sipproxy.mydomain.com-<352213>-script-0\000\326#t\304\177\000\000\000\334#t\304\177\000\000\200\334#t\304\177\000\000\000\345#t\304\177\000\000@\332#t\304\177\000\000\300\331#t\304\177\000\000\000\000\000\000\000\000\000\000p\000\000\000\000\000\000\000
\342#t\304\177\000\000\240\342#t\304\177\000\000`\000\000\000\000\000\000\000\a\000\000\000\304\177\000\000@\344#t\304\177\000\000\300C\037t\304\177\000\000\001\000\000\000\000\000\000\000\a\000\000\000\061",
'\000' <wiederholt 27 Mal>...
id = "\004*Lo\241pM*\244\017\233\345Z\247\327`"
uuid_buffer = "042a4c6f-a170-4d2a-a40f-9be55aa7d760\000\000\000"
payload = 0x559b3b5f5b29 "core/mem/q_malloc.c"
__func__ = "kz_amqp_pipe_send_receive"
#7 0x00007fc46f158763 in kz_amqp_query_ex (msg=0x7fc47394beb8, exchange=0x7fc4738f03d0
"(q\216s\304\177", routing_key=0x7fc4738f57c8 "0\213\207s\304\177",
payload=0x7fc4738f58d8 "hX\217s\304\177") at kz_amqp.c:1494
json_s = {s = 0x7fc4738f5868 "0", len = 1}
exchange_s = {s = 0x7fc4738e7128 "callevt", len = 7}
routing_key_s = {s = 0x7fc473878b30 "0", len = 1}
kz_timeout = {tv_sec = 2, tv_usec = 0}
__func__ = "kz_amqp_query_ex"
j = 0x559b3c3b2bd0
ret = 0x0
res = 32708
strjson = 0x34 <error: Cannot access memory at address 0x34>
len = 0
value = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354",
<incomplete sequence \330>
#8 0x00007fc46f1588b2 in kz_amqp_query (msg=0x7fc47394beb8, exchange=0x7fc4738f03d0
"(q\216s\304\177", routing_key=0x7fc4738f57c8 "0\213\207s\304\177",
payload=0x7fc4738f58d8 "hX\217s\304\177", dst=0x7fc4738f04f0
"p\004\217s\304\177") at kz_amqp.c:1517
dst_pv = 0x7fc474170350 <__syslog>
dst_val = {rs = {s = 0x7ffda5760b00 "\220\021v\245\375\177", len =
1863978364}, ri = 52, flags = 3}
result = 0
#9 0x0000559b3b1c7355 in do_action (h=0x7ffda5761370, a=0x7fc4738f1d98,
msg=0x7fc47394beb8) at core/action.c:1151
ret = -5
v = 0
dst = {send_sock = 0x7fc4738eec20, to = {s = {sa_family = 1920, sa_data =
"\217s\304\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 1920,
sin_port = 29583, sin_addr = {s_addr = 32708}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 1920, sin6_port = 29583, sin6_flowinfo = 32708, sin6_addr =
{__in6_u = {__u6_addr8 = '\000' <wiederholt 15 Mal>, __u6_addr16 = {0, 0, 0,
0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 1920,
__ss_padding = "\217s\304\177", '\000' <wiederholt 43
Mal>, "@On\300%\231\245\240\026v\245\375\177\000\000\000\000\000\000\002",
'\000' <wiederholt 11 Mal>,
"#$^;\233U\000\000\064\000\000\000\000\000\000\000P\003\027t\304\177\000\000P\021v\245\375\177\000\000+y\026;\233U\000",
__ss_align = 52}}, id = 1938746392, send_flags = {f = 32708, blst_imask = 0}, proto = 16
'\020', proto_pad0 = 22 '\026', proto_pad1 = -23178}
tmp = 0x7ffda5761f70 "\001"
new_uri = 0x7fc4738eec10 "\001"
end = 0x7fc47394beb8 "\001"
crt = 0x34 <error: Cannot access memory at address 0x34>
cmd = 0x7fc4738e7ce8
len = 996025379
user = 21915
uri = {user = {s = 0x7fc47420df30 "d]", len = 996105001}, passwd = {s =
0xf600000187 <error: Cannot access memory at address 0xf600000187>, len =
994455272}, host = {s = 0x7ffda5760dd0 "", len = 1938022416}, port = {
s = 0x4a8 <error: Cannot access memory at address 0x4a8>, len =
1938022416}, params = {s = 0x7ffda5760e10 "@\016v\245\375\177", len =
1950306872}, sip_params = {s = 0x7fc47420df30 "d]", len = 0}, headers = {
s = 0x800000 <error: Cannot access memory at address 0x800000>, len =
7171768}, port_no = 37488, proto = 12, type = ERROR_URI_T, flags = (unknown: 1216840),
transport = {s = 0x129890 <error: Cannot access memory at address 0x129890>, len =
8}, ttl = {
s = 0x5 <error: Cannot access memory at address 0x5>, len = 1850687488},
user_param = {s = 0x7ffda5760e40 "@\017v\245\375\177", len = 993161627}, maddr =
{s = 0x0, len = 996104996}, method = {s = 0x7ffda5760f40 "", len = 0}, lr = {s =
0x7ffda5760f40 "",
len = 994414680}, r2 = {s = 0x7ffd00000000 <error: Cannot access memory at
address 0x7ffd00000000>, len = 0}, gr = {s = 0x559b3b5913ab "core", len = 0},
transport_val = {s = 0x559b3b591828 <__func__.7764> "rval_new_empty", len
= 995693617}, ttl_val = {
s = 0x4a8 <error: Cannot access memory at address 0x4a8>, len =
1938022416}, user_param_val = {s = 0x7ffd00000000 <error: Cannot access memory at
address 0x7ffd00000000>, len = 996105001}, maddr_val = {
s = 0x7f000001ff <error: Cannot access memory at address 0x7f000001ff>,
len = 994455272}, method_val = {s = 0x7ffda5760ef0 "", len = 1938022416}, lr_val
= {s = 0x7fc4742418a0 <_IO_helper_jumps> "", len = 1938022416}, r2_val =
{
s = 0x7ffda5760f30 "`\017v\245\375\177", len = 1950306872}, gr_val =
{s = 0x0, len = 0}}
next_hop = {user = {s = 0x800000 <error: Cannot access memory at address
0x800000>, len = 7173632}, passwd = {s = 0xc8b28 <error: Cannot access memory at
address 0xc8b28>, len = 1214976}, host = {s = 0x129890 <error: Cannot access memory
at address 0x129890>,
len = 8}, port = {s = 0x6 <error: Cannot access memory at address 0x6>,
len = 1850687488}, params = {s = 0x7ffda5760f60 "\200\020v\245\375\177", len =
993161627}, sip_params = {s = 0x0, len = 996104996}, headers = {s = 0x7fc4738f3850
"H\a", len = 0},
port_no = 4224, proto = 42358, type = 32765, flags = (URI_USER_NORMALIZE |
unknown: 994423860), transport = {s = 0x7fc4742418a0 <_IO_helper_jumps>
"", len = 3432}, ttl = {s = 0x559b3b5913ab "core", len = 1937415856},
user_param = {
s = 0x559b3b591630 <__func__.7732> "rval_destroy_helper", len
= 995693617}, maddr = {s = 0x7fc4738f0780 "\002", len = 1938022416}, method = {s
= 0x559b00000000 <error: Cannot access memory at address 0x559b00000000>, len =
1850687488}, lr = {
s = 0xffffffffffffffff <error: Cannot access memory at address
0xffffffffffffffff>, len = 0}, r2 = {s = 0x0, len = 1938753352}, gr = {s = 0x748
<error: Cannot access memory at address 0x748>, len = 1938022416}, transport_val =
{s = 0x7fc4738f0660 "\200",
len = 1938755320}, ttl_val = {s = 0xe1a57616c0 <error: Cannot access memory
at address 0xe1a57616c0>, len = 0}, user_param_val = {s = 0x0, len = 996025379},
maddr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len =
1947665232},
method_val = {s = 0x7ffda5761050 "P\021v\245\375\177", len =
991328555}, lr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len =
1850687488}, r2_val = {s = 0x7ffda5761150 "\020\026v\245\375\177", len = 0},
gr_val = {s = 0x0, len = 996025379}}
u = 0x7fc4738edcd0
port = 0
dst_host = 0x7ffda5761f70
i = 4
flags = 0
avp = 0x7ffda5761150
st = {flags = 1, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp =
0x0}
sct = 0x559b3b5e2423
sjt = 0x400000001
rve = 0x7fc473908270
mct = 0x0
rv = 0x7fc4738f3078
rv1 = 0x559b3b178ca4 <rval_expr_eval+20729>
c1 = {cache_type = 2775978288, val_type = 32765, c = {avp_val = {n = 991328479, s
= {s = 0x559b3b1678df <rval_destroy_helper+1140>
"\353\005\350z\204\375\377\220H\213E\310dH3\004%(", len = 1}, re =
0x559b3b1678df <rval_destroy_helper+1140>}, pval = {rs = {
s = 0x559b3b1678df <rval_destroy_helper+1140>
"\353\005\350z\204\375\377\220H\213E\310dH3\004%(", len = 1}, ri = 1938746392,
flags = 32708}}, i2s =
"\221\000\000\000\000\000\000\000\030\354\216s\304\177\000\000\210J\217s\304\177"}
s = {s = 0x7fc4738f5868 "0", len = 1}
srevp = {0x34, 0x7fc474170350 <__syslog>}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4,
string = 0x4 <error: Cannot access memory at address 0x4>, str = {
s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data
= 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140481729070032,
string = 0x7fc4738f03d0 "(q\216s\304\177", str = {s = 0x7fc4738f03d0
"(q\216s\304\177", len = 7},
data = 0x7fc4738f03d0, attr = 0x7fc4738f03d0, select = 0x7fc4738f03d0}},
{type = RVE_FREE_FIXUP_ST, u = {number = 140481729091528, string = 0x7fc4738f57c8
"0\213\207s\304\177", str = {s = 0x7fc4738f57c8 "0\213\207s\304\177",
len = 1},
data = 0x7fc4738f57c8, attr = 0x7fc4738f57c8, select = 0x7fc4738f57c8}},
{type = RVE_FREE_FIXUP_ST, u = {number = 140481729091800, string = 0x7fc4738f58d8
"hX\217s\304\177", str = {s = 0x7fc4738f58d8 "hX\217s\304\177", len =
1}, data = 0x7fc4738f58d8,
attr = 0x7fc4738f58d8, select = 0x7fc4738f58d8}}, {type = MODFIXUP_ST, u =
{number = 140481729070320, string = 0x7fc4738f04f0 "p\004\217s\304\177", str =
{s = 0x7fc4738f04f0 "p\004\217s\304\177", len = 17}, data = 0x7fc4738f04f0, attr
= 0x7fc4738f04f0,
select = 0x7fc4738f04f0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#10 0x0000559b3b1d0463 in run_actions (h=0x7ffda5761370, a=0x7fc4738f1d98,
msg=0x7fc47394beb8) at core/action.c:1581
t = 0x7fc4738f1d98
ret = -1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 0, tz_dsttime = 0}
tdiff = 0
__func__ = "run_actions"
#11 0x0000559b3b1d0bd6 in run_actions_safe (h=0x7ffda5761f70, a=0x7fc4738f1d98,
msg=0x7fc47394beb8) at core/action.c:1645
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf =
{8589934592, -8218340047319111063, 0, 94125204317219, 52, 140481737982800,
-8218340047371539863, -2792324605258929559}, __mask_was_saved = 0, __saved_mask = {__val =
{94125201453467, 0,
22470941476, 140727379432688, 11932610196109475840, 140727379432688,
8589934592, 0, 94125204317219, 52, 140481737982800, 140727379432704, 140481725410594, 32,
140481728339984, 140727379432816}}}}}
ret = 32708
ign_on_break = 0
#12 0x0000559b3b16a4b0 in rval_get_int (h=0x7ffda5761f70, msg=0x7fc47394beb8,
i=0x7ffda5761750, rv=0x7fc4738f4040, cache=0x0) at core/rvalue.c:949
r_avp = 0xa59925c06e4f4000
avp_val = {n = 7, s = {s = 0x7 <error: Cannot access memory at address 0x7>,
len = 0}, re = 0x7}
pval = {rs = {s = 0x34 <error: Cannot access memory at address 0x34>, len =
1947665232}, ri = -1518987760, flags = 32765}
tmp = {s = 0x0, len = 996025379}
s = 0x0
r = 0
ret = 0
destroy_pval = 0
__func__ = "rval_get_int"
#13 0x0000559b3b16fa9c in rval_expr_eval_int (h=0x7ffda5761f70, msg=0x7fc47394beb8,
res=0x7ffda5761750, rve=0x7fc4738f4038) at core/rvalue.c:1947
i1 = 1947665232
i2 = 32708
ret = -1
c1 = {cache_type = 1939127992, val_type = 32708, c = {avp_val = {n = -1518985360,
s = {s = 0x7ffda5761f70 "\001", len = -1518986456}, re = 0x7ffda5761f70}, pval =
{rs = {s = 0x7ffda5761f70 "\001", len = -1518986456}, ri = 1, flags = 32708}},
i2s = "
Їs\304\177\000\000\250\023\217s\304\177\000\000\310W\217s\304\177"}
c2 = {cache_type = 52, val_type = 36, c = {avp_val = {n = 1947665232, s = {s =
0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete
sequence \330>, len = -1518987568}, re = 0x7fc474170350 <__syslog>}, pval = {rs =
{
s = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354",
<incomplete sequence \330>, len = -1518987568}, ri = 1932248914, flags = 32708}},
i2s = "\377\377\377\377", '\000' <wiederholt 12 Mal>,
"裎s\304\177"}
rv1 = 0x7fc4738f13a8
rv2 = 0x7ffda5761700
__func__ = "rval_expr_eval_int"
#14 0x0000559b3b1c0ec8 in do_action (h=0x7ffda5761f70, a=0x7fc4738f7f28,
msg=0x7fc47394beb8) at core/action.c:1052
ret = -5
v = 1
dst = {send_sock = 0x0, to = {s = {sa_family = 16384, sa_data =
"On\300%\231\245\334\035v\245\375\177\000"}, sin = {sin_family = 16384, sin_port
= 28239, sin_addr = {s_addr = 2778277312}, sin_zero =
"\334\035v\245\375\177\000"}, sin6 = {sin6_family = 16384,
sin6_port = 28239, sin6_flowinfo = 2778277312, sin6_addr = {__in6_u =
{__u6_addr8 = "\334\035v\245\375\177\000\000\000\000\000\000\026\000\000",
__u6_addr16 = {7644, 42358, 32765, 0, 0, 0, 22, 0}, __u6_addr32 = {2775981532, 32765, 0,
22}}},
sin6_scope_id = 997540784}, sas = {ss_family = 16384,
__ss_padding =
"On\300%\231\245\334\035v\245\375\177\000\000\000\000\000\000\026\000\000\000\260Cu;\233U\000\000\000\000\000\000\000\000\000\000\242\v:<\233U\000\000\023\000\000\000\233U\000\000\340\035v\245\375\177\000\000\261\252I;\233U\000\000\370\313`;\233U\000\000\000@On\300%\231\245\242\v:<\233U\000\000\000\000\000\000\002",
'\000' <wiederholt 11 Mal>, "#$^;\233U\000", __ss_align = 52}}, id
= 1947665232, send_flags = {f = 32708, blst_imask = 0}, proto = 104 'h',
proto_pad0 = -83 '\255', proto_pad1 = 29583}
tmp = 0x559b3b518985 <system_reseed+296> "\203\275l\373\377\377"
new_uri = 0x559b3b4d8e5c <parse_sip_header_name+3534>
"\203\370\002\017\216\214\003"
end = 0x7fc4734c1285 <_ul_sruid+5> "61869d09-55fd5-"
crt = 0x55fab <error: Cannot access memory at address 0x55fab>
cmd = 0x7fc4738e7f18
len = 1867105512
user = 32708
uri = {user = {s = 0x7ffda57619b0 "", len = 1938022416}, passwd = {s =
0x14800000187 <error: Cannot access memory at address 0x14800000187>, len =
1938022416}, host = {s = 0x7ffda57619f0 " \032v\245\375\177", len = 1950306872},
port = {
s = 0x7fc4738f54e0 "\030\003", len = 0}, params = {s = 0x800000
<error: Cannot access memory at address 0x800000>, len = 7176352}, sip_params = {s =
0xc81c0 <error: Cannot access memory at address 0xc81c0>, len = 1212256}, headers =
{
s = 0x128008 <error: Cannot access memory at address 0x128008>, len =
8}, port_no = 7, proto = 0, type = ERROR_URI_T, flags = (unknown: 1850687488), transport =
{s = 0x7ffda5761a20 "@\033v\245\375\177", len = 993161627}, ttl = {s = 0x0, len
= 1938022416},
user_param = {s = 0x7fc4738433e0 "", len = 0}, maddr = {s =
0x7ffda5761b40 "P\034v\245\375\177", len = 994423861}, method = {s =
0x7ffda5761b40 "P\034v\245\375\177", len = 0}, lr = {s = 0x559b3b60cb6b
"core", len = 994414680}, r2 = {
s = 0x559b3b60d868 <__func__.6887> "parse_headers", len =
996199992}, gr = {s = 0x7fc4738f5470 "\355\n:<\233U", len = 1938022416},
transport_val = {s = 0x559b3b60d868 <__func__.6887> "parse_headers", len =
996199992}, ttl_val = {
s = 0x40 <error: Cannot access memory at address 0x40>, len =
1938022416}, user_param_val = {s = 0x7fc47383e010 "\001", len = 1938773048},
maddr_val = {s = 0x5f8 <error: Cannot access memory at address 0x5f8>, len =
1938022416}, method_val = {
s = 0x7fc4738f5390 "@", len = 1938773216}, lr_val = {s =
0x7fc47341e257 <_reg_sruid+55> "", len = 1933697573}, r2_val = {s =
0x7fc47341e257 <_reg_sruid+55> "", len = 0}, gr_val = {s = 0x0, len =
-1518986412}}
next_hop = {user = {s = 0x500000000 <error: Cannot access memory at address
0x500000000>, len = 1010436526}, passwd = {s = 0x400000000 <error: Cannot access
memory at address 0x400000000>, len = 1850687488}, host = {
s = 0x559b3c3a09b3
";branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact:
<sip:1234@10.0.0.33:47335;rinstance=837681a60901b510;transport=tcp>\r\nTo:
<sip:1234@10.0.0.24:5060;transport=TCP>\r\nFrom: <s"..., len = 0}, port =
{
s = 0x0, len = 996025379}, params = {s = 0x34 <error: Cannot access memory
at address 0x34>, len = 1947665232}, sip_params = {s = 0x7ffda5761c50
"P\035v\245\375\177", len = 994965693}, headers = {
s = 0x5051bb0 <error: Cannot access memory at address 0x5051bb0>, len =
0}, port_no = 65535, proto = 65535, type = 4294967295, flags = (unknown: 1939127992),
transport = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len =
7179288}, ttl = {
s = 0xc7b90 <error: Cannot access memory at address 0xc7b90>, len =
1209320}, user_param = {s = 0x1273e8 <error: Cannot access memory at address
0x1273e8>, len = 8}, maddr = {s = 0x9 <error: Cannot access memory at address
0x9>, len = 1010437024}, method = {
s = 0x0, len = 1010437026}, lr = {s = 0x7fc4738f5470
"\355\n:<\233U", len = 1010437024}, r2 = {s = 0x7ffda5761ce0
"\260Cu;\233U", len = 0}, gr = {s = 0x7ffda5761ce0 "\260Cu;\233U", len
= 994414680}, transport_val = {
s = 0x1 <error: Cannot access memory at address 0x1>, len = 1938856088},
ttl_val = {s = 0x559b3b60cb6b "core", len = 1010436499}, user_param_val = {s =
0x559b3b60cbf8 <__func__.6774> "get_hdr_field", len = 1850687488},
maddr_val = {
s = 0x8900000187 <error: Cannot access memory at address 0x8900000187>,
len = 0}, method_val = {s = 0x0, len = 996025379}, lr_val = {s = 0x34 <error: Cannot
access memory at address 0x34>, len = 1947665232}, r2_val = {
s = 0x7ffda5761d50 "h\255\217s\304\177", len = 1935046835}, gr_val =
{s = 0x7fc4738faec8 " ", len = 4}}
u = 0x3000000018
port = 28239
dst_host = 0x0
i = 8
flags = 0
avp = 0x7ffda5761f50
st = {flags = 1010437026, id = 21915, name = {n = 1010437021, s = {s =
0x559b3c3a0b9d "0\r\n\r\n", len = 0}, re = 0x559b3c3a0b9d}, avp = 0x7fc4734c1294
<_ul_sruid+20>}
sct = 0xa59925c06e4f4000
sjt = 0x7ffda57619b0
rve = 0x7fc4738f4038
mct = 0x7ffda57619c0
rv = 0x7fc473654afb
rv1 = 0x7ffda5761e90
c1 = {cache_type = 1939030032, val_type = 32708, c = {avp_val = {n = 1939127992, s
= {s = 0x7fc47394beb8 "\001", len = 1939030032}, re = 0x7fc47394beb8}, pval =
{rs = {s = 0x7fc47394beb8 "\001", len = 1939030032}, ri = 1939127992, flags =
32708}},
i2s =
"\b\000\000\000\000\000\000\000\000@On\300%\231\245\370\255\217s\304\177"}
s = {s = 0x32 <error: Cannot access memory at address 0x32>, len =
-1518986976}
srevp = {0x7ffda5761d90, 0x7ffda5761f60}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4,
string = 0x4 <error: Cannot access memory at address 0x4>, str = {
s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data
= 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140481729070032,
string = 0x7fc4738f03d0 "(q\216s\304\177", str = {s = 0x7fc4738f03d0
"(q\216s\304\177", len = 7},
data = 0x7fc4738f03d0, attr = 0x7fc4738f03d0, select = 0x7fc4738f03d0}},
{type = RVE_FREE_FIXUP_ST, u = {number = 140481729091528, string = 0x7fc4738f57c8
"0\213\207s\304\177", str = {s = 0x7fc4738f57c8 "0\213\207s\304\177",
len = 1},
data = 0x7fc4738f57c8, attr = 0x7fc4738f57c8, select = 0x7fc4738f57c8}},
{type = RVE_FREE_FIXUP_ST, u = {number = 140481729091800, string = 0x7fc4738f58d8
"hX\217s\304\177", str = {s = 0x7fc4738f58d8 "hX\217s\304\177", len =
1}, data = 0x7fc4738f58d8,
attr = 0x7fc4738f58d8, select = 0x7fc4738f58d8}}, {type = MODFIXUP_ST, u =
{number = 140481729070320, string = 0x7fc4738f04f0 "p\004\217s\304\177", str =
{s = 0x7fc4738f04f0 "p\004\217s\304\177", len = 17}, data = 0x7fc4738f04f0, attr
= 0x7fc4738f04f0,
select = 0x7fc4738f04f0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#15 0x0000559b3b1d0463 in run_actions (h=0x7ffda5761f70, a=0x7fc4738e8ca8,
msg=0x7fc47394beb8) at core/action.c:1581
t = 0x7fc4738f7f28
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 1939127992, tz_dsttime = 32708}
tdiff = 0
__func__ = "run_actions"
#16 0x0000559b3b1d0ce6 in run_top_route (a=0x7fc4738e8ca8, msg=0x7fc47394beb8, c=0x0) at
core/action.c:1666
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf =
{8589934592, -8218340046916457879, 0, 94125204317219, 52, 140481737982800,
-8218340046968886679, -2792324605258929559}, __mask_was_saved = 0, __saved_mask = {__val =
{0, 0, 8589934592,
0, 94125204317219, 52, 140481737982800, 140727379435568, 94125202082674,
94125205369896, 11932610196109475840, 140481729334224, 8589934592, 0, 94125204317219,
52}}}}}
p = 0x7ffda5761f70
ret = 0
sfbk = 0
#17 0x0000559b3b37f932 in receive_msg (
buf=0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia:
SIP/2.0/TCP
10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards:
69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"..., len=578,
rcv_info=0x7fc46f4c01a8)
at core/receive.c:513
msg = 0x7fc47394beb8
ctx = {rec_lev = 0, run_flags = 0, last_retcode = 6, jmp_env = {{__jmpbuf =
{107374182978, 140481657569976, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 0, __saved_mask =
{__val = {0, 65536, 11932610194258788473, 0, 140481657569680, 1024, 4604204945409, 128,
16, 2,
519691042940, 940597837950, 94125201408152, 0, 4095, 65536}}}}}
bctx = 0x0
ret = 0
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
diff = 0
inb = {s = 0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP
SIP/2.0\r\nVia: SIP/2.0/TCP
10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards:
69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"..., len = 578}
netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
keng = 0x0
evp = {data = 0x7ffda5762160, obuf = {s = 0x0, len = 0}, rcv = 0x7fc46f4c01a8, dst
= 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
cidlockidx = 0
cidlockset = 0
errsipmsg = 0
exectime = 0
__func__ = "receive_msg"
#18 0x0000559b3b41dfb3 in receive_tcp_msg (
tcpbuf=0x7fc46f4c0530 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia:
SIP/2.0/TCP
10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards:
70\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"..., len=578,
rcv_info=0x7fc46f4c01a8, con=0x7fc46f4c0190) at core/tcp_read.c:1424
buf = 0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP
SIP/2.0\r\nVia: SIP/2.0/TCP
10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards:
69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"...
bsize = 65535
blen = 65535
__func__ = "receive_tcp_msg"
#19 0x0000559b3b4205f8 in tcp_read_req (con=0x7fc46f4c0190, bytes_read=0x7ffda5762618,
read_flags=0x7ffda576261c) at core/tcp_read.c:1607
bytes = 578
total_bytes = 578
resp = 1
size = 322122547208
req = 0x7fc46f4c02b8
dst = {send_sock = 0x7ffda5762530, to = {s = {sa_family = 1, sa_data =
"\000\000\000\000\000\000@%v\245\375\177\000"}, sin = {sin_family = 1, sin_port
= 0, sin_addr = {s_addr = 0}, sin_zero = "@%v\245\375\177\000"}, sin6 =
{sin6_family = 1, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"@%v\245\375\177\000\000\030\000\000\000\000\000\000", __u6_addr16 = {9536,
42358, 32765, 0, 24, 0, 0, 0}, __u6_addr32 = {2775983424, 32765, 24, 0}}}, sin6_scope_id =
0}, sas = {ss_family = 1,
__ss_padding =
"\000\000\000\000\000\000@%v\245\375\177\000\000\030", '\000'
<wiederholt 23 Mal>,
"\001\000\000\000\000\000\000\000(\315\036o\304\177\000\000\000\000\000\000\000\000\000\000\350\304Io\000\000\000\000P%v\245\001\000\000\000(\315\036o\304\177\000\000P%v\245\375\177\000\000-\\@;\233U\000\000`&v\245\375\177\000\000\b\000\000\000\000\000\000",
__ss_align = 20}}, id = 1, send_flags = {f = 1, blst_imask = 0}, proto = 6 '\006',
proto_pad0 = 0 '\000', proto_pad1 = 0}
c = 0 '\000'
ret = 996025379
__func__ = "tcp_read_req"
#20 0x0000559b3b423af5 in handle_io (fm=0x7fc473954a08, events=1, idx=-1) at
core/tcp_read.c:1782
ret = 8
n = 8
read_flags = RD_CONN_SHORT_READ
con = 0x7fc46f4c0190
s = 6
resp = 94125205447392
t = 21915
ee = 0x0
__func__ = "handle_io"
#21 0x0000559b3b40eccc in io_wait_loop_epoll (h=0x559b3b6f62e0 <io_w>, t=2,
repeat=0) at core/io_wait.h:1070
n = 1
r = 0
fm = 0x7fc473954a08
revents = 1
__func__ = "io_wait_loop_epoll"
#22 0x0000559b3b426aa8 in tcp_receive_loop (unix_sock=75) at core/tcp_read.c:1978
__func__ = "tcp_receive_loop"
#23 0x0000559b3b2a161e in tcp_init_children (woneinit=0x7ffda5762a00) at
core/tcp_main.c:5153
r = 0
i = 7
reader_fd_1 = 75
pid = 0
si_desc = "tcp receiver
(generic)\000\000\256\311\061;\233U\000\000\340)v\245\375\177\000\000d\031=;\000\000\000\000\270\361\223s\000\000\000\000\213\313\\;\233U\000\000\232\000v\245\375\177\000\000\255$R;\233U\000\000\000\000\000\000\000\000\000\000(\315\036o\304\177\000\000\064\000\000\000\000\000\000\000\340\217Jo\001\000\000\000\320)v\245\375\177\000\000\265&R;\233U\000"
si = 0x0
__func__ = "tcp_init_children"
#24 0x0000559b3b153f0b in main_loop () at main.c:1843
i = 8
pid = 352197
si = 0x0
si_desc = "udp receiver child=7
sock=10.8.0.10:5060\000\322\061;$\000\000\000\002\000\000\000\064\000\000\000\000@On\300%\231\245\240\026$t\304\177\000\000\210\240X;\233U\000\000\000\000\000\000\000\000\000\000#$^;\233U\000\000\064\000\000\000\000\000\000\000P\003\027t\304\177\000\000\220+v\245\375\177\000\000\327\277\060;\233U\000"
nrprocs = 8
woneinit = 1
__func__ = "main_loop"
#25 0x0000559b3b15e745 in main (argc=1, argv=0x7ffda57630e8) at main.c:3058
cfg_stream = 0x559b3c2bf2a0
c = -1
r = 0
tmp = 0x0
tmp_len = 0
port = 0
proto = -1518792248
ahost = 0x0
aport = 0
options = 0x559b3b58d188
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 3597399342
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x0
p = 0x0
st = {st_dev = 25, st_ino = 9656, st_nlink = 2, st_mode = 16895, st_uid = 0,
st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0,
st_atim = {tv_sec = 1636097156, tv_nsec = 709532085}, st_mtim = {tv_sec = 1636211948,
tv_nsec = 447930869}, st_ctim = {tv_sec = 1636211948, tv_nsec = 447930869},
__glibc_reserved = {0, 0, 0}}
tbuf =
"\260/v\245\375\177\000\000\253'@t\304\177\000\000\002\000\000\000\000\000\000\000\016\000\000\000\000\000\000\200",
'\000' <wiederholt 48 Mal>,
"`\321Bt\304\177\000\000\001.v\245\375\177\000\000\350\311Bt\304\177",
'\000' <wiederholt 26 Mal>,
"\220\354$t\304\177\000\000\004\000\000\024\000\000\000\000\300\303%t\304\177",
'\000' <wiederholt 130 Mal>...
option_index = 0
long_options = {{name = 0x559b3b58f5e6 "help", has_arg = 0, flag = 0x0,
val = 104}, {name = 0x559b3b58a521 "version", has_arg = 0, flag = 0x0, val =
118}, {name = 0x559b3b58f5eb "alias", has_arg = 1, flag = 0x0, val = 1024},
{name = 0x559b3b58f5f1 "subst",
has_arg = 1, flag = 0x0, val = 1025}, {name = 0x559b3b58f5f7
"substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x559b3b58f600
"substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x559b3b58f60a
"server-id", has_arg = 1, flag = 0x0,
val = 1028}, {name = 0x559b3b58f614 "loadmodule", has_arg = 1, flag
= 0x0, val = 1029}, {name = 0x559b3b58f61f "modparam", has_arg = 1, flag = 0x0,
val = 1030}, {name = 0x559b3b58f628 "log-engine", has_arg = 1, flag = 0x0, val =
1031}, {
name = 0x559b3b58f633 "debug", has_arg = 1, flag = 0x0, val = 1032},
{name = 0x559b3b58f639 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name
= 0x559b3b58f643 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0,
has_arg = 0, flag = 0x0,
val = 0}}
__func__ = "main"
(gdb) info locals
set = {__val = {0, 140481737467984, 4222451712, 94125218804128, 94125218804229,
94125218804128, 94125218804128, 94125218804250, 94125218804428, 94125218804128,
94125218804428, 0, 0, 0, 0, 0}}
pid = <optimized out>
tid = <optimized out>
ret = <optimized out>
(gdb) list
45 in ../sysdeps/unix/sysv/linux/raise.c
```
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/2922#issuecomment-962471034