I have two kamailio servers which is in staging area, so there are few of users on it. say 2 or 3 making some testing calls.
The only difference between staging area and production area is that staging area enabled "ASYNC PUSH WAKE", similar concept and logic introduced by Danail at Kamailio World 2014. [Aynchronous Processing in Kamailio Configuration File](http://www.slideshare.net/miconda/26-danielconstantinmierlakamailiocfgasync)
These days, I experienced some crash at staging area and I can't reproduce it. But productions which has tens of thousands of users did not have this issue.
Since I've tested the ASYNC PUSH WAKE and all it works well, I believed (guess) the problem may caused by two factors:
1. There are some bugs hidden in PUSH WAKE algorithm that suspend a transaction by tm module, stores it to htable, then resume when matched some conditions.
2. sip client ( compromised Linphone ) used by my client. ( Note: I've tested all official CSipSimple / Bria / Linphone and all works well )
But totally no ideas till now.
I've turn on debug mode with:
``` debug=3 memlog=4 memdbg=4 corelog=3 ```
kamailio version is: ``` root@sip1:/home/pkg/kamailio/etc/kamailio# kamcmd core.info { version: kamailio 4.3.1 id: f38e67 compiler: gcc 4.7.2 compiled: 13:18:05 Aug 11 2015 flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, F_MALLOC, DBG_F_MALLOC, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES } ```
Before I catch the crash till it happens again, below is what I can give right now: 4 back traces and syslog indicate crash address
all corefiles are kept, I will feedback if I get another clues.
#### BT 1 ``` ===syslog===
Sep 4 14:24:57 sip1 kernel: [41174906.447276] kamailio[50056]: segfault at 7f97b600676e ip 00007f97b600676e sp 00007fff6e141a28 error 14 in mi_rpc.so[7f97b5f3b000+200000] Sep 4 14:25:17 sip1 media-dispatcher[76950]: debug: Connection to OpenSIPS lost: Connection was closed cleanly. Sep 4 14:25:17 sip1 /home/pkg/kamailio/sbin/kamailio[49990]: ALERT: <core> [main.c:728]: handle_sigs(): child process 50056 exited by a signal 11 Sep 4 14:25:17 sip1 /home/pkg/kamailio/sbin/kamailio[49990]: ALERT: <core> [main.c:731]: handle_sigs(): core was generated
===backtrace=== #0 0x00007f97b600676e in ?? () No symbol table info available. #1 0x00007f97b803db5e in run_trans_callbacks_internal (cb_lst=0x7f97b98e5900, type=32, trans=0x7f97b98e5890, params=0x7fff6e141b10) at t_hooks.c:268 cbp = 0x7f97b98e7380 backup_from = 0xa82430 backup_to = 0xa82438 backup_dom_from = 0xa82440 backup_dom_to = 0xa82448 backup_uri_from = 0xa82420 backup_uri_to = 0xa82428 backup_xavps = 0xa82560 __FUNCTION__ = "run_trans_callbacks_internal" #2 0x00007f97b803dc6f in run_trans_callbacks (type=32, trans=0x7f97b98e5890, req=0x7f97b98b38f8, rpl=0x7f98fb64e2b0, code=180) at t_hooks.c:295 params = {req = 0x7f97b98b38f8, rpl = 0x7f98fb64e2b0, param = 0x7f97b98e7390, code = 180, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}} #3 0x00007f97b809382e in relay_reply (t=0x7f97b98e5890, p_msg=0x7f98fb64e2b0, branch=1, msg_status=180, cancel_data=0x7fff6e141e70, do_put_on_wait=1) at t_reply.c:1767 relay = 1 save_clone = 0 buf = 0x0 res_len = 0 relayed_code = 0 relayed_msg = 0x0 reply_bak = 0x7fff05051cb0 bm = {to_tag_val = {s = 0xffffffff01b46f02 <Address 0xffffffff01b46f02 out of bounds>, len = -77247288}} totag_retr = 0 reply_status = RPS_PROVISIONAL uas_rb = 0x7f97b98e5950 to_tag = 0x7f97b80837bf reason = {s = 0x7fff6e141c60 "\200\034\024n\005", len = -1207424906} onsend_params = {req = 0x7fff6e141c80, rpl = 0x7f97b804db23, param = 0x7fff6e141c10, code = 1, flags = 0, branch = 0, t_rbuf = 0x7f97b98e5a50, dst = 0x50075b821, send_buf = { s = 0xfab1b348 <Address 0xfab1b348 out of bounds>, len = 1024}} __FUNCTION__ = "relay_reply" #4 0x00007f97b8097959 in reply_received (p_msg=0x7f98fb64e2b0) at t_reply.c:2429 msg_status = 180 last_uac_status = 100 ack = 0x7fff6e141f60 "` \024n\377\177" ack_len = 32664 branch = 1 reply_status = 6440375 onreply_route = 3 cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 6682541}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 6682541}}}} uac = 0x7f97b98e5c48 t = 0x7f97b98e5890 lack_dst = {send_sock = 0x7fff6e141e70, to = {s = {sa_family = 17847, sa_data = "b\000\000\000\000\000\200\036\024n\377\177\000"}, sin = {sin_family = 17847, sin_port = 98, sin_addr = { s_addr = 0}, sin_zero = "\200\036\024n\377\177\000"}, sin6 = {sin6_family = 17847, sin6_port = 98, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = "\200\036\024n\377\177\000\000\020\260\261\372\230\177\000", __u6_addr16 = {7808, 28180, 32767, 0, 45072, 64177, 32664, 0}, __u6_addr32 = {1846812288, 32767, 4205948944, 32664}}}, sin6_scope_id = 778}}, id = 10, proto = 84 'T', send_flags = {f = 109 'm', blst_imask = 180 '\264'}} backup_user_from = 0xa82430 backup_user_to = 0xa82438 backup_domain_from = 0xa82440 backup_domain_to = 0xa82448 backup_uri_from = 0xa82420 backup_uri_to = 0xa82428 backup_xavps = 0xa82560 replies_locked = 1 branch_ret = 1846812496 prev_branch = 32664 blst_503_timeout = -77274448 hf = 0xa96c10 onsend_params = {req = 0x4004188b0, rpl = 0x75fc90, param = 0x0, code = 0, flags = 3, branch = 0, t_rbuf = 0x7fff6e141ee0, dst = 0x631363, send_buf = {s = 0x7fff6e141ee0 "`\037\024n\377\177", len = 6422143}} ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {797, -5029273663833343261, 4294832, 140735040203504, 0, 0, -5029273663808177437, 5029028274090965731}, __mask_was_saved = 0, __saved_mask = {__val = {6422143, 140735040200416, 6475430, 140735040200128, 140295017705488, 140735040200192, 140289551658488, 140735040200160, 0, 1073741824, 1401221318984, 140295029470864, 7733692, 64, 28601913, 174}}}}} __FUNCTION__ = "reply_received" #5 0x00000000004901cc in do_forward_reply (msg=0x7f98fb64e2b0, mode=0) at forward.c:747 new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} new_len = 0 r = 2 ip = {af = 0, len = 0, u = {addrl = {21482551329, 140295017709352}, addr32 = {7714849, 5, 4205952808, 32664}, addr16 = {47137, 117, 5, 0, 48936, 64177, 32664, 0}, addr = "!\270u\000\005\000\000\000(\277\261\372\230\177\000"}} s = 0x7f98fb64e2b8 "99\351U" len = 32663 __FUNCTION__ = "do_forward_reply" #6 0x0000000000491856 in forward_reply (msg=0x7f98fb64e2b0) at forward.c:849 No locals. #7 0x000000000050e062 in receive_msg ( buf=0x1b46d40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bK60b8.17e8d16cb9ef6d39be60d4cc68762171.1;i=9e02;received=211.78.19.1;rport=57074\r\nVia: SIP/2.0/TCP 192.168.1.112:64044;received=218."..., len=797, rcv_info=0x7f97b98f1610) at receive.c:255 msg = 0x7f98fb64e2b0 ctx = {rec_lev = -1181805064, run_flags = 32663, last_retcode = 16383, jmp_env = {{__jmpbuf = {17179869186, 140289629072096, 4294832, 3424935750384, 0, 0, 4294832, 140735040203504}, __mask_was_saved = 1846813104, __saved_mask = {__val = {6234849, 28601648, 140296091965321, 0, 140296091950726, 140735040201912, 140289629951480, 65552, 797, 42949672963, 140289629953026, 0, 140289629953029, 140735040201360, 6235333, 4294832}}}}} ret = 0 inb = { s = 0x1b46d40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bK60b8.17e8d16cb9ef6d39be60d4cc68762171.1;i=9e02;received=211.78.19.1;rport=57074\r\nVia: SIP/2.0/TCP 192.168.1.112:64044;received=218."..., len = 797} __FUNCTION__ = "receive_msg" #8 0x00000000005f65fc in receive_tcp_msg ( tcpbuf=0x7f97b98f18e8 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bK60b8.17e8d16cb9ef6d39be60d4cc68762171.1;i=9e02;received=211.78.19.1;rport=57074\r\nVia: SIP/2.0/TCP 192.168.1.112:64044;received=218."..., len=797, rcv_info=0x7f97b98f1610, con=0x7f97b98f15f8) at tcp_read.c:1247 buf = 0x1b46d40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bK60b8.17e8d16cb9ef6d39be60d4cc68762171.1;i=9e02;received=211.78.19.1;rport=57074\r\nVia: SIP/2.0/TCP 192.168.1.112:64044;received=218."... bsize = 65535 blen = 65535 __FUNCTION__ = "receive_tcp_msg" #9 0x00000000005f7d9b in tcp_read_req (con=0x7f97b98f15f8, bytes_read=0x7fff6e1424c0, read_flags=0x7fff6e1424b8) at tcp_read.c:1401 bytes = 797 total_bytes = 797 resp = 1 size = 140735040201552 req = 0x7f97b98f1678 dst = {send_sock = 0x14, to = {s = {sa_family = 1, sa_data = "\000\000P\000\000\000\001 \000\200\370\320\366", <incomplete sequence \372>}, sin = {sin_family = 1, sin_port = 0, sin_addr = { s_addr = 80}, sin_zero = "\001 \000\200\370\320\366", <incomplete sequence \372>}, sin6 = {sin6_family = 1, sin6_port = 0, sin6_flowinfo = 80, sin6_addr = {__in6_u = { __u6_addr8 = "\001 \000\200\370\320\366\372\230\177\000\000\000\000\000", __u6_addr16 = {8193, 32768, 53496, 64246, 32664, 0, 0, 0}, __u6_addr32 = {2147491841, 4210479352, 32664, 0}}}, sin6_scope_id = 1846813872}}, id = 32767, proto = 8 '\b', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} c = 0 '\000' ret = -1 __FUNCTION__ = "tcp_read_req" #10 0x00000000005fadab in handle_io (fm=0x7f98faf6d0f8, events=1, idx=-1) at tcp_read.c:1624 ret = 0 n = -1 read_flags = 1 con = 0x7f97b98f15f8 s = 11 resp = 1 t = 381376958 __FUNCTION__ = "handle_io" #11 0x00000000005ee8c0 in io_wait_loop_epoll (h=0xa2dfe0, t=2, repeat=1) at io_wait.h:1061 n = 1 r = 0 fm = 0x7f98faf6d0f8 revents = 1 __FUNCTION__ = "io_wait_loop_epoll" #12 0x00000000005fbe1a in tcp_receive_loop (unix_sock=97) at tcp_read.c:1739 __FUNCTION__ = "tcp_receive_loop" #13 0x00000000005e54e1 in tcp_init_children () at tcp_main.c:4787 r = 15 i = 23 reader_fd_1 = 97 pid = 0 si_desc = "tcp receiver (generic)\000\000ygY\000\000\000\000\000P'\024n\377\177\000\000R\342B\000\000\000\000\000\060'\024n\377\177\000\000\260ò:\231\177\000\000\220\023\364\372\230\177\000\000_\301\211T\000\000\000\000\217sp\000\000\000\000\000\020\021\265\372\230\177\000\000(\000\000\000)\000\000\000UZ-;a\303\000\000m\303\000\000Tb\214K_\301\211T\000\000\000" si = 0x0 __FUNCTION__ = "tcp_init_children" #14 0x00000000004ab258 in main_loop () at main.c:1658 i = 24 pid = 50017 si = 0x0 si_desc = "udp receiver child=23 sock=211.78.19.1:5003\000n\000\000\000~/q\000\001\000\000\000\260䕸\227\177\000\000\060(\024n\377\177\000\000\032\264N\000\000\000\000\000\200(\024n\377\177\000\000\260\000\364\372\230\177\000\000\350\327⸗\177\000\000\260䕸\227\177\000\000_\301\211T\000\000\000\000\260\210A\000\001\000\000" nrprocs = 24 __FUNCTION__ = "main_loop" #15 0x00000000004b0b5b in main (argc=13, argv=0x7fff6e142af8) at main.c:2533 cfg_stream = 0x1a9a010 c = -1 r = 0 tmp = 0x7fff6e144d59 "" tmp_len = 32665 port = 994981744 proto = 0 options = 0x707db8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 1686944683 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x76 p = 0x7fff6e1429fe "" __FUNCTION__ = "main" ```
#### BT 2 ``` ===syslog=== Sep 8 09:59:08 sip2 kernel: [58418949.036449] kamailio[145444]: segfault at 7fa6a900676e ip 00007fa6a900676e sp 00007fff6fed90a8 error 14 in textops.so[7fa6a8ec6000+200000] Sep 8 09:59:38 sip2 media-dispatcher[98511]: debug: Connection to OpenSIPS lost: Connection was closed cleanly. Sep 8 09:59:38 sip2 /home/pkg/kamailio/sbin/kamailio[145378]: ALERT: <core> [main.c:728]: handle_sigs(): child process 145444 exited by a signal 11 Sep 8 09:59:38 sip2 /home/pkg/kamailio/sbin/kamailio[145378]: ALERT: <core> [main.c:731]: handle_sigs(): core was generated
===backtrace===
#0 0x00007fa6a900676e in ?? () No symbol table info available. #1 0x00007fa6ab3d9b5e in run_trans_callbacks_internal (cb_lst=0x7fa6acd75a88, type=32, trans=0x7fa6acd75a18, params=0x7fff6fed9190) at t_hooks.c:268 cbp = 0x7fa6acd680f0 backup_from = 0xa82430 backup_to = 0xa82438 backup_dom_from = 0xa82440 backup_dom_to = 0xa82448 backup_uri_from = 0xa82420 backup_uri_to = 0xa82428 backup_xavps = 0xa82560 __FUNCTION__ = "run_trans_callbacks_internal" #2 0x00007fa6ab3d9c6f in run_trans_callbacks (type=32, trans=0x7fa6acd75a18, req=0x7fa6acd6c828, rpl=0x7fa7ee9ea2b0, code=180) at t_hooks.c:295 params = {req = 0x7fa6acd6c828, rpl = 0x7fa7ee9ea2b0, param = 0x7fa6acd68100, code = 180, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}} #3 0x00007fa6ab42f82e in relay_reply (t=0x7fa6acd75a18, p_msg=0x7fa7ee9ea2b0, branch=1, msg_status=180, cancel_data=0x7fff6fed94f0, do_put_on_wait=1) at t_reply.c:1767 relay = 1 save_clone = 0 buf = 0x0 res_len = 0 relayed_code = 0 relayed_msg = 0x0 reply_bak = 0x7fff05059330 bm = {to_tag_val = {s = 0xffffffff00c75ead <Address 0xffffffff00c75ead out of bounds>, len = -291574016}} totag_retr = 0 reply_status = RPS_PROVISIONAL uas_rb = 0x7fa6acd75ad8 to_tag = 0x7fa6ab41f7bf reason = {s = 0x7fff6fed92e0 "", len = -1421744010} onsend_params = {req = 0x7fff6fed9300, rpl = 0x7fa6ab3e9b23, param = 0x7fff6fed9290, code = 1, flags = 0, branch = 0, t_rbuf = 0x7fa6acd75bd8, dst = 0x50075b821, send_buf = { s = 0xedeb7328 <Address 0xedeb7328 out of bounds>, len = 1024}} __FUNCTION__ = "relay_reply" #4 0x00007fa6ab433959 in reply_received (p_msg=0x7fa7ee9ea2b0) at t_reply.c:2429 msg_status = 180 last_uac_status = 100 ack = 0x7fff6fed95e0 "\340\226\355o\377\177" ack_len = 32679 branch = 1 reply_status = 6440375 onreply_route = 3 cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 6682541}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 6682541}}}} uac = 0x7fa6acd75dd0 t = 0x7fa6acd75a18 lack_dst = {send_sock = 0x7fff6fed94f0, to = {s = {sa_family = 17847, sa_data = "b\000\000\000\000\000\000\225\355o\377\177\000"}, sin = {sin_family = 17847, sin_port = 98, sin_addr = { s_addr = 0}, sin_zero = "\000\225\355o\377\177\000"}, sin6 = {sin6_family = 17847, sin6_port = 98, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = "\000\225\355o\377\177\000\000\020p\353\355\247\177\000", __u6_addr16 = {38144, 28653, 32767, 0, 28688, 60907, 32679, 0}, __u6_addr32 = {1877841152, 32767, 3991629840, 32679}}}, sin6_scope_id = 778}}, id = 10, proto = 84 'T', send_flags = {f = 93 ']', blst_imask = 199 '\307'}} backup_user_from = 0xa82430 backup_user_to = 0xa82438 backup_domain_from = 0xa82440 backup_domain_to = 0xa82448 backup_uri_from = 0xa82420 backup_uri_to = 0xa82428 backup_xavps = 0xa82560 replies_locked = 1 branch_ret = 1877841360 prev_branch = 32679 blst_503_timeout = -291593552 hf = 0xa96580 onsend_params = {req = 0x4004188b0, rpl = 0x75fc90, param = 0x0, code = 0, flags = 3, branch = 0, t_rbuf = 0x7fff6fed9560, dst = 0x631363, send_buf = {s = 0x7fff6fed9560 "\340\225\355o\377\177", len = 6422143}} ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {797, -4883994847374486000, 4294832, 140735071232368, 0, 0, -4883994847399651824, 4883678595199653392}, __mask_was_saved = 0, __saved_mask = {__val = {6422143, 140735071229280, 6475430, 140735071228992, 140359227895824, 140735071229056, 140353761848824, 140735071229024, 0, 1073741824, 1401221321056, 140359239663288, 7733692, 64, 13065785, 175}}}}} __FUNCTION__ = "reply_received" #5 0x00000000004901cc in do_forward_reply (msg=0x7fa7ee9ea2b0, mode=0) at forward.c:747 new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} new_len = 0 r = 2 ip = {af = 0, len = 0, u = {addrl = {21482551329, 140359227899688}, addr32 = {7714849, 5, 3991633704, 32679}, addr16 = {47137, 117, 5, 0, 32552, 60907, 32679, 0}, addr = "!\270u\000\005\000\000\000(\177\353\355\247\177\000"}} s = 0x7fa7ee9ea2b8 "\354@\356U" len = 32678 __FUNCTION__ = "do_forward_reply" #6 0x0000000000491856 in forward_reply (msg=0x7fa7ee9ea2b0) at forward.c:849 No locals. #7 0x000000000050e062 in receive_msg ( buf=0xc75d40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.2:5003;branch=z9hG4bKd59d.0efeaa2488813a7c1ff6cbb4fa19f351.1;i=6592;received=211.78.19.2;rport=22430\r\nVia: SIP/2.0/TCP 192.168.1.112:58885;received=218."..., len=797, rcv_info=0x7fa6acd7b088) at receive.c:255 msg = 0x7fa7ee9ea2b0 ctx = {rec_lev = -1395150736, run_flags = 32678, last_retcode = 16383, jmp_env = {{__jmpbuf = {17179869186, 140353840147104, 4294832, 3424966779248, 0, 0, 4294832, 140735071232368}, __mask_was_saved = 1877841968, __saved_mask = {__val = {6234849, 13065520, 140360302155657, 0, 140360302141062, 140735071230776, 140353841115248, 65552, 797, 42949672963, 140353841116794, 0, 140353841116797, 140735071230224, 6235333, 4294832}}}}} ret = 0 inb = { s = 0xc75d40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.2:5003;branch=z9hG4bKd59d.0efeaa2488813a7c1ff6cbb4fa19f351.1;i=6592;received=211.78.19.2;rport=22430\r\nVia: SIP/2.0/TCP 192.168.1.112:58885;received=218."..., len = 797} __FUNCTION__ = "receive_msg" #8 0x00000000005f65fc in receive_tcp_msg ( tcpbuf=0x7fa6acd7b360 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.2:5003;branch=z9hG4bKd59d.0efeaa2488813a7c1ff6cbb4fa19f351.1;i=6592;received=211.78.19.2;rport=22430\r\nVia: SIP/2.0/TCP 192.168.1.112:58885;received=218."..., len=797, rcv_info=0x7fa6acd7b088, con=0x7fa6acd7b070) at tcp_read.c:1247 buf = 0xc75d40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/TCP 211.78.19.2:5003;branch=z9hG4bKd59d.0efeaa2488813a7c1ff6cbb4fa19f351.1;i=6592;received=211.78.19.2;rport=22430\r\nVia: SIP/2.0/TCP 192.168.1.112:58885;received=218."... bsize = 65535 blen = 65535 __FUNCTION__ = "receive_tcp_msg" #9 0x00000000005f7d9b in tcp_read_req (con=0x7fa6acd7b070, bytes_read=0x7fff6fed9b40, read_flags=0x7fff6fed9b38) at tcp_read.c:1401 bytes = 797 total_bytes = 797 resp = 1 size = 140735071230416 req = 0x7fa6acd7b0f0 dst = {send_sock = 0x14, to = {s = {sa_family = 1, sa_data = "\000\000P\000\000\000\001 \000\200\370\220", <incomplete sequence \356>}, sin = {sin_family = 1, sin_port = 0, sin_addr = { s_addr = 80}, sin_zero = "\001 \000\200\370\220", <incomplete sequence \356>}, sin6 = {sin6_family = 1, sin6_port = 0, sin6_flowinfo = 80, sin6_addr = {__in6_u = { __u6_addr8 = "\001 \000\200\370\220\060\356\247\177\000\000\000\000\000", __u6_addr16 = {8193, 32768, 37112, 60976, 32679, 0, 0, 0}, __u6_addr32 = {2147491841, 3996160248, 32679, 0}}}, sin6_scope_id = 1877842736}}, id = 32767, proto = 8 '\b', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} c = 0 '\000' ret = -1 __FUNCTION__ = "tcp_read_req" #10 0x00000000005fadab in handle_io (fm=0x7fa7ee3090f8, events=1, idx=-1) at tcp_read.c:1624 ret = 0 n = -1 read_flags = 1 con = 0x7fa6acd7b070 s = 11 resp = 1 t = 1530467254 __FUNCTION__ = "handle_io" #11 0x00000000005ee8c0 in io_wait_loop_epoll (h=0xa2dfe0, t=2, repeat=1) at io_wait.h:1061 n = 1 r = 0 fm = 0x7fa7ee3090f8 revents = 1 __FUNCTION__ = "io_wait_loop_epoll" #12 0x00000000005fbe1a in tcp_receive_loop (unix_sock=97) at tcp_read.c:1739 __FUNCTION__ = "tcp_receive_loop" #13 0x00000000005e54e1 in tcp_init_children () at tcp_main.c:4787 r = 15 i = 23 reader_fd_1 = 97 pid = 0 si_desc = "tcp receiver (generic)\000\000ygY\000\000\000\000\000Н\355o\377\177\000\000R\342B\000\000\000\000\000\260\235\355o\377\177\000\000\260\203\354-\250\177\000\000\220\323-\356\247\177\000\000\023\255\r\020\000\000\000\000\217sp\000\000\000\000\000\020\321\356\355\247\177\000\000(\000\000\000)\000\000\000U\032g.\375\067\002\000\t8\002\000\267̑`\023\255\r\020\000\000\000" si = 0x0 __FUNCTION__ = "tcp_init_children" #14 0x00000000004ab258 in main_loop () at main.c:1658 i = 24 pid = 145405 si = 0x0 si_desc = "udp receiver child=23 sock=211.78.19.2:5003\000n\000\000\000~/q\000\001\000\000\000\260\244ϫ\246\177\000\000\260\236\355o\377\177\000\000\032\264N\000\000\000\000\000\000\237\355o\377\177\000\000\260\300-\356\247\177\000\000\350\227\034\254\246\177\000\000\260\244ϫ\246\177\000\000\023\255\r\020\000\000\000\000\260\210A\000\001\000\000" nrprocs = 24 __FUNCTION__ = "main_loop" #15 0x00000000004b0b5b in main (argc=13, argv=0x7fff6feda178) at main.c:2533 cfg_stream = 0xbc9010 c = -1 r = 0 tmp = 0x7fff6fedad59 "" tmp_len = 32680 port = 780662640 proto = 0 options = 0x707db8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 503368684 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x76 p = 0x7fff6feda07e "" __FUNCTION__ = "main" ```
#### BT 3 it generates two core files 3 and 4 in 20 secs
``` ===syslog=== Sep 10 14:39:29 sip1 kernel: [41693172.748753] kamailio[245950] general protection ip:602d43 sp:7fff185e8500 error:0 in kamailio[400000+3cb000] Sep 10 14:39:47 sip1 /home/pkg/kamailio/sbin/kamailio[245999]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 39 Sep 10 14:39:47 sip1 /home/pkg/kamailio/sbin/kamailio[245924]: ALERT: <core> [main.c:728]: handle_sigs(): child process 245950 exited by a signal 11 Sep 10 14:39:47 sip1 /home/pkg/kamailio/sbin/kamailio[245924]: ALERT: <core> [main.c:731]: handle_sigs(): core was generated Sep 10 14:39:47 sip1 kernel: [41693191.570265] kamailio[245924] general protection ip:7f1f2ba23800 sp:7fff185e7ff0 error:0 in tm.so[7f1f2b9c8000+114000]
===backtrace===
#0 0x0000000000602d43 in slow_timer_main () at timer.c:1130 n = 12 ret = 4294967295 tl = 0x7f1f2cca64f0 i = 957 __FUNCTION__ = "slow_timer_main" #1 0x00000000004aacf9 in main_loop () at main.c:1628 i = 24 pid = 0 si = 0x0 si_desc = "udp receiver child=23 sock=211.78.19.1:5003\000n\000\000\000~/q\000\001\000\000\000\260D4,\037\177\000\000\060\206^\030\377\177\000\000\032\264N\000\000\000\000\000\200\206^\030\377\177\000\000\260`\222n \177\000\000\350\067\201,\037\177\000\000\260D4,\037\177\000\000\224\321\306[\000\000\000\000\260\210A\000\001\000\000" nrprocs = 24 __FUNCTION__ = "main_loop" #2 0x00000000004b0b5b in main (argc=13, argv=0x7fff185e88f8) at main.c:2533 cfg_stream = 0x27a6010 c = -1 r = 0 tmp = 0x7fff185e8f32 "" tmp_len = 32544 port = -1360226448 proto = 0 options = 0x707db8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 1739382561 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x76 p = 0x7fff185e87fe "" __FUNCTION__ = "main"
``` #### BT 4 it generates two core files 3 and 4 in 20 secs
``` ===syslog=== Sep 10 14:39:29 sip1 kernel: [41693172.748753] kamailio[245950] general protection ip:602d43 sp:7fff185e8500 error:0 in kamailio[400000+3cb000] Sep 10 14:39:47 sip1 /home/pkg/kamailio/sbin/kamailio[245999]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 39 Sep 10 14:39:47 sip1 /home/pkg/kamailio/sbin/kamailio[245924]: ALERT: <core> [main.c:728]: handle_sigs(): child process 245950 exited by a signal 11 Sep 10 14:39:47 sip1 /home/pkg/kamailio/sbin/kamailio[245924]: ALERT: <core> [main.c:731]: handle_sigs(): core was generated Sep 10 14:39:47 sip1 kernel: [41693191.570265] kamailio[245924] general protection ip:7f1f2ba23800 sp:7fff185e7ff0 error:0 in tm.so[7f1f2b9c8000+114000]
===backtrace===
#0 0x00007f1f2ba23800 in run_trans_callbacks_internal (cb_lst=0x7f1f2c9ba700, type=131072, trans=0x7f1f2c9ba690, params=0x7fff185e80d0) at t_hooks.c:264 cbp = 0x3c223d65636e6174 backup_from = 0xa82430 backup_to = 0xa82438 backup_dom_from = 0xa82440 backup_dom_to = 0xa82448 backup_uri_from = 0xa82420 backup_uri_to = 0xa82428 backup_xavps = 0xa82560 __FUNCTION__ = "run_trans_callbacks_internal" #1 0x00007f1f2ba23c6f in run_trans_callbacks (type=131072, trans=0x7f1f2c9ba690, req=0x0, rpl=0x0, code=0) at t_hooks.c:295 params = {req = 0x0, rpl = 0x0, param = 0x0, code = 0, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}} #2 0x00007f1f2b9e2aa1 in free_cell (dead_cell=0x7f1f2c9ba690) at h_table.c:128 b = 0x621325 "\353\a\220\353\004\220\353\001\220H\201Đ" i = 0 rpl = 0x7fff185e8270 tt = 0x7fff185e8290 foo = 0x7f1f2c33c1c8 cbs = 0x621325 cbs_tmp = 0x7fff185e8280 __FUNCTION__ = "free_cell" #3 0x00007f1f2b9e4779 in free_hash_table () at h_table.c:432 p_cell = 0x7f1f2c9ba690 tmp_cell = 0x3a2772657375277b i = 53971 __FUNCTION__ = "free_hash_table" #4 0x00007f1f2ba09733 in tm_shutdown () at t_funcs.c:90 __FUNCTION__ = "tm_shutdown" #5 0x000000000059669b in destroy_modules () at sr_module.c:788 t = 0x7f206e524660 foo = 0x7f206e5241f8 __FUNCTION__ = "destroy_modules" #6 0x00000000004a011a in cleanup (show_status=1) at main.c:513 memlog = 32544 __FUNCTION__ = "cleanup" #7 0x00000000004a170e in shutdown_children (sig=15, show_status=1) at main.c:655 __FUNCTION__ = "shutdown_children" #8 0x00000000004a3c8d in handle_sigs () at main.c:746 chld = 0 chld_status = 139 memlog = 0 __FUNCTION__ = "handle_sigs" #9 0x00000000004abb64 in main_loop () at main.c:1701 i = 24 pid = 245999 si = 0x0 si_desc = "udp receiver child=23 sock=211.78.19.1:5003\000n\000\000\000~/q\000\001\000\000\000\260D4,\037\177\000\000\060\206^\030\377\177\000\000\032\264N\000\000\000\000\000\200\206^\030\377\177\000\000\260`\222n \177\000\000\350\067\201,\037\177\000\000\260D4,\037\177\000\000\224\321\306[\000\000\000\000\260\210A\000\001\000\000" nrprocs = 24 __FUNCTION__ = "main_loop" #10 0x00000000004b0b5b in main (argc=13, argv=0x7fff185e88f8) at main.c:2533 cfg_stream = 0x27a6010 c = -1 r = 0 tmp = 0x7fff185e8f32 "" tmp_len = 32544 port = -1360226448 proto = 0 options = 0x707db8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 1739382561 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x76 p = 0x7fff185e87fe "" __FUNCTION__ = "main" ```
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322
just caught another crash, cause there are lots of messages, I will waiting for your professional advise and get the right info you need.
#### Side Note
It reminds me a experience few days ago, I encounter several crash continuously in production servers and each crash on a different place. After some test, I found it's due to new parameter `handle_lost_tcp` of `usrloc` module, without knowing the reason, it returns normal after I turn that parameter off.
I not sure if this is related, but I also turn off it on staging server as well now.
``` modparam("usrloc", "close_expired_tcp", 0) ```
This time it generate 4 backtrace in a minute:
``` 16:42 core.kamailio.sig11.115636.1441874475 16:42 core.kamailio.sig11.115603.1441874475 16:42 core.kamailio.sig11.115648.1441874504 16:43 core.kamailio.sig11.115576.1441874572 ```
SYSLOG:
``` Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: NOTICE: <script>: xx3 main route Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_lookup.c:701]: t_lookupOriginalT(): DEBUG: t_lookupOriginalT: searching on hash entry 47045 Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_lookup.c:409]: matching_3261(): DEBUG: RFC3261 transaction matched, tid=.aDOUSxaqI Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_lookup.c:798]: t_lookupOriginalT(): DEBUG: t_lookupOriginalT: canceled transaction found (0x7fb75dd823d8)! Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_lookup.c:801]: t_lookupOriginalT(): DEBUG: t_lookupOriginalT completed Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [tm.c:1043]: w_t_lookup_cancel(): lookup_original: t_lookupOriginalT returned: 0x7fb75dd823d8 Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: INFO: <core> [mem/f_malloc.c:575]: fm_free(): freeing a free fragment (0x7fb75dd93cf0/0x7fb75dd93d28) - ignore Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: INFO: <core> [mem/f_malloc.c:575]: fm_free(): freeing a free fragment (0x7fb75dd83d88/0x7fb75dd83dc0) - ignore Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: INFO: <core> [mem/f_malloc.c:575]: fm_free(): freeing a free fragment (0x7fb75dd9ffa0/0x7fb75dd9ffd8) - ignore Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: dialog [dlg_handlers.c:302]: dlg_iuid_sfree(): freeing dlg iuid [0:0] (0x7fb75dd30065) Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: INFO: <core> [mem/f_malloc.c:575]: fm_free(): freeing a free fragment (0x7fb75dd3002d/0x7fb75dd30065) - ignore Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: INFO: <core> [mem/f_malloc.c:575]: fm_free(): freeing a free fragment (0x7fb75dd83d28/0x7fb75dd83d60) - ignore Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: INFO: <core> [mem/f_malloc.c:575]: fm_free(): freeing a free fragment (0x7fb75dd9b128/0x7fb75dd9b160) - ignore Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: INFO: <core> [mem/f_malloc.c:575]: fm_free(): freeing a free fragment (0x7fb75dd823a0/0x7fb75dd823d8) - ignore Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: NOTICE: <script>: ZZZZZZZZZZZZZZZZZZZZZZt_check_trans Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: NOTICE: <script>: have see loose_route ? Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: <core> [parser/msg_parser.c:187]: get_hdr_field(): DEBUG: get_hdr_body : content_length=0 Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: <core> [parser/msg_parser.c:89]: get_hdr_field(): found end of header Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: rr [loose.c:111]: find_first_route(): No Route headers found Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: rr [loose.c:927]: loose_route(): There is no Route HF Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: NOTICE: <script>: J get CANCEL protocol Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: NOTICE: <script>: [ROUTEDEBUG] enter route 1 Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: NOTICE: <script>: XXY route 1 Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: pv [pv_core.c:1110]: pv_get_dsturi(): no destination URI Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: pv [pv_core.c:1126]: pv_get_dsturi_attr(): no destination URI Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: pv [pv_core.c:1126]: pv_get_dsturi_attr(): no destination URI Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: pv [pv_core.c:1126]: pv_get_dsturi_attr(): no destination URI Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: pv [pv_core.c:386]: pv_get_xto_attr(): no Display name Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: pv [pv_core.c:353]: pv_get_contact(): no contact header! Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: registrar [regpv.c:178]: pv_get_ulc(): profile not set or no contacts there Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: NOTICE: <script>: avp route 1 rd=211.78.19.1 rp=5060 rm=CANCEL du=<null> dd=<null> ds=<null> dp=<null> oP=UDP dP=<null> td=211.78.19.1 rP=UDP #011#011#011XXsocket=<null> Xport=<null> ru{nameaddr.uri}=sip:0975074886@211.78.19.1 #011#011#011rU=0975074886 Ri=211.78.19.1 Rp=5003 fs=<null> si=118.163.134.250 sp=57562 fd=211.78.19.1 fn=<null> fu=sip:5777448@211.78.19.1 ru=sip:0975074886@211.78.19.1 ct=<null> #011#011#011sndto(ip)=<null> socket=<null> br=<null> bR=<null> DLG_status=<null> Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_lookup.c:701]: t_lookupOriginalT(): DEBUG: t_lookupOriginalT: searching on hash entry 47045 Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_lookup.c:409]: matching_3261(): DEBUG: RFC3261 transaction matched, tid=.aDOUSxaqI Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_lookup.c:798]: t_lookupOriginalT(): DEBUG: t_lookupOriginalT: canceled transaction found (0x7fb75dd823d8)! Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_lookup.c:801]: t_lookupOriginalT(): DEBUG: t_lookupOriginalT completed Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_lookup.c:1312]: t_newtran(): DEBUG: t_newtran: msg id=60 , global msg id=59 , T on entrance=0xffffffffffffffff Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_lookup.c:466]: t_lookup_request(): t_lookup_request: start searching: hash=47045, isACK=0 Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_lookup.c:424]: matching_3261(): DEBUG: RFC3261 transaction matching failed Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_lookup.c:648]: t_lookup_request(): DEBUG: t_lookup_request: no transaction found Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: tm [t_hooks.c:358]: run_reqin_callbacks_internal(): DBG: trans=0x7fb75dd99878, callback type 1, id 0 entered Sep 10 16:41:15 sip1 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: <core> [md5utils.c:67]: MD5StringArray(): MD5 calculated: a075ca4036a38176794f4f3679e1fbcd Sep 10 16:41:15 sip1 kernel: [41700465.011740] kamailio[115636] general protection ip:7fb8dfae9a45 sp:7fffffa5ed28 error:0 in libc-2.13.so[7fb8df9c8000+182000] Sep 10 16:41:15 sip1 kernel: [41700465.425038] kamailio[115603] general protection ip:601a63 sp:7fffffa62020 error:0 in kamailio[400000+3cb000] ```
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#issuecomment-139182962
Can you paste here the 'bt full' from the core file core.kamailio.sig11.115636.1441874475?
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#issuecomment-139205274
`bt full` from the core file `core.kamailio.sig11.115636.1441874475`
``` #0 0x00007fb8dfae9a45 in ?? () from /lib/x86_64-linux-gnu/libc.so.6 No symbol table info available. #1 0x00007fb75cf2031d in build_local_reparse (Trans=0x7fb75dd823d8, branch=1, len=0x7fffffa5eeac, method=0x7fb75cf6c3da "CANCEL", method_len=6, to=0x7fb75dd82428, reason=0x0) at t_msgbuilder.c:403 invite_buf = 0x7fb75dd9b160 "INVITE sip:886975074886@211.78.19.2:5070 SIP/2.0\r\nRecord-Route: sip:211.78.19.1:5003;r2=on;lr=on;ftag=3FryYW3l5;nat=yes;did=643.bd8\r\nRecord-Route: <sip:211.78.19.1:5003;transport=tcp;r2=on;lr=on;fta"... invite_buf_end = 0x7fb75dd9b8d2 "" cancel_buf = 0x7fb75dd823d8 "CANCEL sip:886975074886@211.78.19.2:5070 SIP/2.0\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bK5c7b.a075ca4036a38176794f4f3679e1fbcd.1;i=5\r\nFrom: "0903235692" sip:5777448@211.78.19.1;tag=3FryYW3l"... s = 0x7fb75dd9b348 ": "0975074886" sip:5777004@211.78.19.1\r\nCSeq: 20 INVITE\r\nCall-ID: XFy280pHda\r\nMax-Forwards: 69\r\nSupported: outbound\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO"... s1 = 0x7fb75dd9b346 "To: "0975074886" sip:5777004@211.78.19.1\r\nCSeq: 20 INVITE\r\nCall-ID: XFy280pHda\r\nMax-Forwards: 69\r\nSupported: outbound\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, IN"... d = 0x7fb75dd824a3 "" invite_len = 1906 hf_type = HDR_TO_T first_via = 0 to_len = 47 cancel_buf_len = 1953 reason_len = 0 code_len = 32695 reas1 = 0x0 reas_last = 0x0 hdr = 0x7fb75dd99a10 __FUNCTION__ = "build_local_reparse" #2 0x00007fb75ceb7ca7 in cancel_branch (t=0x7fb75dd823d8, branch=1, reason=0x0, flags=8) at t_cancel.c:262 cancel = 0xffffffff5dd99938 <Address 0xffffffff5dd99938 out of bounds> len = 32695 crb = 0x7fb75dd82828 irb = 0x7fb75dd827a0 ret = 1 tmp_cd = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 1558933544}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 1558933544}}}} pcbuf = 0x0 __FUNCTION__ = "cancel_branch" #3 0x00007fb75cee28f1 in e2e_cancel (cancel_msg=0x7fb8a04fa2b0, t_cancel=0x7fb75dd99878, t_invite=0x7fb75dd823d8) at t_fwd.c:1307 cancel_bm = 2 reason = 0x0 free_reason = 0 i = 1 lowest_error = 0 ret = 1 tmcb = {req = 0x1, rpl = 0x7fb8dfa18184, param = 0x38, code = -1605393744, flags = 32696, branch = 0, t_rbuf = 0x0, dst = 0x7fb8a04fa2b0, send_buf = {s = 0x300000003 <Address 0x300000003 out of bounds>, len = 0}} __FUNCTION__ = "e2e_cancel" #4 0x00007fb75cee6da5 in t_forward_cancel (p_msg=0x7fb8a04fa2b0, proxy=0x0, proto=0, tran=0x7fffffa5f150) at t_fwd.c:1825 t_invite = 0x7fb75dd823d8 t = 0x7fb75dd99878 ret = 32767 new_tran = 1 dst = {send_sock = 0x38, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = "\000\000\000\000\000\000\000\000\370\364\245\377\377\177\000", __u6_addr16 = {0, 0, 0, 0, 62712, 65445, 32767, 0}, __u6_addr32 = {0, 0, 4289066232, 32767}}}, sin6_scope_id = 5}}, id = 0, proto = -1 '\377', send_flags = {f = 255 '\377', blst_imask = 255 '\377'}} host = {s = 0x1 <Address 0x1 out of bounds>, len = -543063676} port = 0 comp = 0 __FUNCTION__ = "t_forward_cancel" #5 0x00007fb75ced0a3c in t_relay_to (p_msg=0x7fb8a04fa2b0, proxy=0x0, proto=0, replicate=0) at t_funcs.c:232 ret = 0 new_tran = 0 t = 0x1 dst = {send_sock = 0x7, to = {s = {sa_family = 63424, sa_data = "\245\377\377\177\000\000P\232\357\001\000\000\000"}, sin = {sin_family = 63424, sin_port = 65445, sin_addr = {s_addr = 32767}, sin_zero = "P\232\357\001\000\000\000"}, sin6 = { sin6_family = 63424, sin6_port = 65445, sin6_flowinfo = 32767, sin6_addr = {__in6_u = { __u6_addr8 = "P\232\357\001\000\000\000\000\371\264\240߸\177\000", __u6_addr16 = {39504, 495, 0, 0, 46329, 57248, 32696, 0}, __u6_addr32 = {32479824, 0, 3751851257, 32696}}}, sin6_scope_id = 0}}, id = 0, proto = 1 '\001', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} port = 0 host = {s = 0x101010101010101 <Address 0x101010101010101 out of bounds>, len = 65793} comp = 257 __FUNCTION__ = "t_relay_to" #6 0x00007fb75cf10425 in _w_t_relay_to (p_msg=0x7fb8a04fa2b0, proxy=0x0, force_proto=0) at tm.c:1476 t = 0x7fffffa5f890 res = 0 __FUNCTION__ = "_w_t_relay_to" #7 0x00007fb75cf11576 in w_t_relay (p_msg=0x7fb8a04fa2b0, _foo=0x0, _bar=0x0) at tm.c:1677 No locals. #8 0x00000000004206b5 in do_action (h=0x7fffffa5f930, a=0x7fb89fa81840, msg=0x7fb8a04fa2b0) at action.c:1053 ret = -5 v = 32 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\260\370\245\377\377\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\260\370\245\377\377\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = "\260\370\245\377\377\177\000\000\\311\341\001\004\000\000", __u6_addr16 = {63664, 65445, 32767, 0, 51548, 481, 4, 0}, __u6_addr32 = {4289067184, 32767, 31574364, 4}}}, sin6_scope_id = 4289066758}}, id = 32767, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} tmp = 0x7fb8dfa6cd16 "L\213L$(\351\030\355\377\377Hc\355L\211\357\276\060" new_uri = 0xfbad8001 <Address 0xfbad8001 out of bounds> end = 0x7fb8dfb15e80 "%hu%n:%hu%n:%hu%n" crt = 0x1ef9cb0 "<31>Sep 10 16:41:15 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: <core> [md5utils.c:67]: MD5StringArray(): MD5 calculated: a075ca4036a38176794f4f3679e1fbcd\n" cmd = 0x7fb89f9eac30 len = 0 user = 0 uri = {user = {s = 0x7fb8dfb15e86 "%hu%n:%hu%n", len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0xdfb15e80 <Address 0xdfb15e80 out of bounds>, len = -542955387}, port = { s = 0x1b9 <Address 0x1b9 out of bounds>, len = -5902159}, params = {s = 0x8 <Address 0x8 out of bounds>, len = -543098068}, sip_params = {s = 0x7fb75bb35787 "s", len = -5900941}, headers = {s = 0x7fffffa5f938 "", len = 0}, port_no = 22398, proto = 23475, type = 32695, flags = 31574364, transport = {s = 0x0, len = -5900342}, ttl = {s = 0x7fb8dfb15e80 "%hu%n:%hu%n:%hu%n", len = -542955387}, user_param = { s = 0x7ffffbad8001 <Address 0x7ffffbad8001 out of bounds>, len = 31574365}, maddr = {s = 0x1e1c95d "", len = 31574364}, method = {s = 0x1e1c95c "8", len = 31574364}, lr = {s = 0x1e1c95c "8", len = 31574364}, r2 = {s = 0x1e1c95d "", len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = { s = 0x1e1c95d "", len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x3131f680 <Address 0x3131f680 out of bounds>, len = 0}, lr_val = { s = 0x7fb8dfd40000 <Address 0x7fb8dfd40000 out of bounds>, len = -542716650}, r2_val = { s = 0xffffffff <Address 0xffffffff out of bounds>, len = -5900736}, gr_val = { s = 0x7fb8dfa1f5d0 "H\213\227\210", len = -5900480}} next_hop = {user = {s = 0x7fb8dfb16728 "", len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = { s = 0x7fffffa5f740 "\001\200\255", <incomplete sequence \373>, len = 0}, headers = {s = 0x0, len = 32}, port_no = 65535, proto = 65535, type = ERROR_URI_T, flags = 4289067096, transport = { s = 0xffffffffffffffff <Address 0xffffffffffffffff out of bounds>, len = -542912138}, ttl = { s = 0x1ef9a50 "\230\376\324߸\177", len = -5899664}, user_param = {s = 0x1cb <Address 0x1cb out of bounds>, len = -5899392}, maddr = {s = 0x1ef9a50 "\230\376\324߸\177", len = -543116039}, method = { s = 0xdfb15e80 <Address 0xdfb15e80 out of bounds>, len = 0}, lr = { s = 0x7fb89fdfa160 "avp route 1 rd=211.78.19.1 rp=5060 rm=CANCEL du=<null> dd=<null> ds=<null> dp=<null> oP=UDP dP=<null> td=211.78.19.1 rP=UDP \t\t\tXXsocket=<null> Xport=<null> ru{nameaddr.uri}=sip:0975074886@211.78.19.1 "..., len = 31574365}, r2 = {s = 0x7fb75bb35788 "", len = -543098068}, gr = {s = 0x7fb8dfb16726 "d]", len = 100}, transport_val = {s = 0xffa5f858 <Address 0xffa5f858 out of bounds>, len = 0}, ttl_val = { s = 0x7fb8dfb16725 "%d]", len = -5900960}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = -5900256}, lr_val = { s = 0x3000000020 <Address 0x3000000020 out of bounds>, len = 0}, r2_val = { s = 0xffffffffffffffff <Address 0xffffffffffffffff out of bounds>, len = 0}, gr_val = { s = 0x200000000 <Address 0x200000000 out of bounds>, len = 0}} u = 0x55f1422b port = 0 dst_host = 0x0 i = -542882797 flags = 0 avp = 0x2010 st = {flags = 32479824, id = 0, name = {n = -543116039, s = {s = 0x7fb8dfa0b4f9 "f\203;", len = 0}, re = 0x7fb8dfa0b4f9}, avp = 0x1} sct = 0x7fffffa5f7e0 sjt = 0x7fffffa5f8a0 rve = 0x7fb8dfd40000 mct = 0x3000000010 rv = 0x7fffffa5f9a0 rv1 = 0x0 c1 = {cache_type = 16843008, val_type = 16843009, c = {avp_val = {n = 16843009, s = { s = 0x101010101010101 <Address 0x101010101010101 out of bounds>, len = 16843009}, re = 0x101010101010101}, pval = {rs = {s = 0x101010101010101 <Address 0x101010101010101 out of bounds>, len = 16843009}, ri = 65793, flags = 0}}, i2s = "P\232\357\001\000\000\000\000\220\371\245\377\377\177\000\000\a\000\000\000\000"} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <Address 0x2 out of bounds>, str = {s = 0x2 <Address 0x2 out of bounds>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140430928824000, string = 0x7fb89fa0c6c0 "X\022\266\237\270\177", str = {s = 0x7fb89fa0c6c0 "X\022\266\237\270\177", len = 5}, data = 0x7fb89fa0c6c0, attr = 0x7fb89fa0c6c0, select = 0x7fb89fa0c6c0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #9 0x000000000042c7b3 in run_actions (h=0x7fffffa5f930, a=0x7fb89fa81840, msg=0x7fb8a04fa2b0) at action.c:1548 t = 0x7fb89fa81840 ret = -1 mod = 0xa00000010 ms = 0 __FUNCTION__ = "run_actions" #10 0x000000000042ce2e in run_actions_safe (h=0x7fffffa61900, a=0x7fb89fa81840, msg=0x7fb8a04fa2b0) at action.c:1613 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {376, -467098313743310625, 4294832, 140737482466400, 0, 0, -467098313768476449, 467098105497477343}, __mask_was_saved = 0, __saved_mask = { __val = {32480416, 8208, 32488624, 140432005987904, 544, 8208, 140432002794515, 1441874475, 140432005987904, 32480432, 522, 32480416, 544, 8208, 140432002796032, 32480432}}}}} ret = 32479824 ign_on_break = 0 #11 0x0000000000546be5 in rval_get_int (h=0x7fffffa61900, msg=0x7fb8a04fa2b0, i=0x7fffffa5fd88, rv=0x7fb89fa819a8, cache=0x0) at rvalue.c:912 r_avp = 0x7fffffa5fb10 avp_val = {n = 0, s = {s = 0x0, len = 28800}, re = 0x0} pval = {rs = {s = 0x290000000f <Address 0x290000000f out of bounds>, len = 16}, ri = 8, flags = 115} tmp = {s = 0x0, len = 1538479998} s = 0x0 r = 32695 ret = 0 destroy_pval = 0 __FUNCTION__ = "rval_get_int" #12 0x000000000054adec in rval_expr_eval_int (h=0x7fffffa61900, msg=0x7fb8a04fa2b0, res=0x7fffffa5fd88, rve=0x7fb89fa819a0) at rvalue.c:1906 i1 = 1538451792 i2 = 32767 ret = -1 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_INT, c = {avp_val = {n = 0, s = {s = 0x0, len = 1538479998}, re = 0x0}, pval = {rs = {s = 0x0, len = 1538479998}, ri = -1612733671, flags = 32696}}, i2s = '\000' <repeats 12 times>"\271, \001\000\000x\001\000\000\000"} c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 1, s = { s = 0x1 <Address 0x1 out of bounds>, len = 7315068}, re = 0x1}, pval = {rs = { s = 0x1 <Address 0x1 out of bounds>, len = 7315068}, ri = 1538478898, flags = 32695}}, i2s = "\271\001\000\000\000\000\000\000`\241ߟ\270\177\000\000\070>q\000\000"} rv1 = 0x7fb800000000 rv2 = 0x7fffffa5fba0 __FUNCTION__ = "rval_expr_eval_int" #13 0x000000000054b1d3 in rval_expr_eval_int (h=0x7fffffa61900, msg=0x7fb8a04fa2b0, res=0x7fffffa60200, rve=0x7fb89fa820a0) at rvalue.c:1914 i1 = 376 i2 = 0 ret = -1 c1 = {cache_type = 4294967295, val_type = RV_NONE, c = {avp_val = {n = -1616379416, s = { s = 0x80e79fa801e8 <Address 0x80e79fa801e8 out of bounds>, len = 2000}, re = 0x80e79fa801e8}, pval = { rs = {s = 0x80e79fa801e8 <Address 0x80e79fa801e8 out of bounds>, len = 2000}, ri = -1605393744, flags = 32696}}, i2s = "\377\377\377\377\377\377\377\377\220\375\245\377\377\177\000\000\240\375\245\377\377\177"} c2 = {cache_type = 4289068432, val_type = 32767, c = {avp_val = {n = 1559244429, s = { s = 0x7fb75cf02e8d "H\211E\320H\203", <incomplete sequence \320>, len = -1605393744}, re = 0x7fb75cf02e8d}, pval = {rs = {s = 0x7fb75cf02e8d "H\211E\320H\203", <incomplete sequence \320>, len = -1605393744}, ri = -5898808, flags = 32767}}, i2s = "\001\000\000\000\000\000\000\000\204\201\241߸\177\000\000 \000\000\000\060"} rv1 = 0x7fffffa62460 rv2 = 0x4188b0 __FUNCTION__ = "rval_expr_eval_int" #14 0x00000000004201db in do_action (h=0x7fffffa61900, a=0x7fb89fa86428, msg=0x7fb8a04fa2b0) at action.c:1029 ret = -5 v = 31574364 dst = {send_sock = 0x1ef9cb0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\b\000\000\000\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\b\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = "\b\000\000\000\000\000\000\000e\000\000\000\000\000\000", __u6_addr16 = {8, 0, 0, 0, 101, 0, 0, 0}, __u6_addr32 = {8, 0, 101, 0}}}, sin6_scope_id = 32480432}}, id = 0, proto = 43 '+', send_flags = {f = 66 'B', blst_imask = 241 '\361'}} tmp = 0x7fff00000015 <Address 0x7fff00000015 out of bounds> new_uri = 0x178 <Address 0x178 out of bounds> end = 0x0 crt = 0x7fb89fdfa160 "avp route 1 rd=211.78.19.1 rp=5060 rm=CANCEL du=<null> dd=<null> ds=<null> dp=<null> oP=UDP dP=<null> td=211.78.19.1 rP=UDP \t\t\tXXsocket=<null> Xport=<null> ru{nameaddr.uri}=sip:0975074886@211.78.19.1 "... cmd = 0x7fb89f9eaf40 len = 32696 user = -1605393744 uri = {user = {s = 0x2010 <Address 0x2010 out of bounds>, len = 32488624}, passwd = {s = 0x7fb8dfd4fe40 "", len = 112}, host = {s = 0x2010 <Address 0x2010 out of bounds>, len = -542882797}, port = { s = 0x55f1422b <Address 0x55f1422b out of bounds>, len = -539689408}, params = { s = 0x1ef9cb0 "<31>Sep 10 16:41:15 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: <core> [md5utils.c:67]: MD5StringArray(): MD5 calculated: a075ca4036a38176794f4f3679e1fbcd\n", len = 102}, sip_params = {s = 0x1ef9ca0 "`\002", len = 112}, headers = {s = 0x2010 <Address 0x2010 out of bounds>, len = -542881280}, port_no = 40112, proto = 495, type = ERROR_URI_T, flags = 32479824, transport = {s = 0x7fffffa601f0 "\260\234\357\001", len = -539689408}, ttl = {s = 0x0, len = -1}, user_param = {s = 0xb <Address 0xb out of bounds>, len = -539689408}, maddr = {s = 0x14 <Address 0x14 out of bounds>, len = -1}, method = { s = 0xb <Address 0xb out of bounds>, len = -88}, lr = {s = 0x7fffffa60240 "0", len = -542885956}, r2 = { s = 0x1ef9a50 "\230\376\324߸\177", len = -542504339}, gr = {s = 0x0, len = 1538479998}, transport_val = { s = 0x290000000f <Address 0x290000000f out of bounds>, len = 16}, ttl_val = { s = 0x7300000008 <Address 0x7300000008 out of bounds>, len = 4}, user_param_val = { s = 0x3000000000 <Address 0x3000000000 out of bounds>, len = 28800}, maddr_val = {s = 0x1e1c5b0 "CST", len = -539704352}, method_val = {s = 0x0, len = -5897760}, lr_val = {s = 0x1e1c95c "8", len = 31574364}, r2_val = {s = 0x7fffffa60300 "8\235\245\237\270\177", len = 31574364}, gr_val = { s = 0x7fb8dfd50a00 "\260\305\341\001", len = -5897142}} next_hop = {user = {s = 0x1ef9a50 "\230\376\324߸\177", len = -539699392}, passwd = {s = 0x0, len = 2}, host = { s = 0x7fffffa60150 "\017", len = 31574364}, port = {s = 0x7fffffa5ffa6 "\377\377", len = 0}, params = { s = 0x363336353131ff90 <Address 0x363336353131ff90 out of bounds>, len = -5898330}, sip_params = { s = 0x7fb8dfd4c020 "\277^\261߸\177", len = -5897937}, headers = {s = 0x1e1c5b0 "CST", len = -5898416}, port_no = 16, proto = 0, type = 48, flags = 4289069376, transport = {s = 0x7fffffa60080 "+B\361U", len = -5898140}, ttl = {s = 0x7fffffa6006c "", len = -5898140}, user_param = {s = 0x0, len = 0}, maddr = { s = 0x0, len = -5897440}, method = {s = 0x7fffffffffff <Address 0x7fffffffffff out of bounds>, len = 0}, lr = {s = 0xffff3531ffffffff <Address 0xffff3531ffffffff out of bounds>, len = 0}, r2 = { s = 0x200000000 <Address 0x200000000 out of bounds>, len = -542021855}, gr = { s = 0x1ef9cbb "16:41:15 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: <core> [md5utils.c:67]: MD5StringArray(): MD5 calculated: a075ca4036a38176794f4f3679e1fbcd\n", len = -539704352}, transport_val = { s = 0x1ef9cbb "16:41:15 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: <core> [md5utils.c:67]: MD5StringArray(): MD5 calculated: a075ca4036a38176794f4f3679e1fbcd\n", len = 7}, ttl_val = { s = 0x1ffc <Address 0x1ffc out of bounds>, len = -542721239}, user_param_val = { s = 0x7fffffa600a0 "\240\234\357\001", len = 0}, maddr_val = {s = 0x7fffffa6006a "", len = 0}, method_val = { s = 0x3 <Address 0x3 out of bounds>, len = 2}, lr_val = { s = 0x3000000010 <Address 0x3000000010 out of bounds>, len = -5897440}, r2_val = { s = 0x7fffffa60260 "\\311\341\001", len = 11}, gr_val = { s = 0xffffffffffffffa8 <Address 0xffffffffffffffa8 out of bounds>, len = 32480416}} u = 0x7fb89fa5dcc8 port = 0 dst_host = 0x7fffffa60590 i = 0 flags = 32696 avp = 0xdfd4c020 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = -1}, re = 0x0}, avp = 0x7fb8dfa6cd16} sct = 0x3000000030 sjt = 0x7fb8dfaa0ec0 rve = 0x7fb89fa820a0 mct = 0x0 rv = 0x0 rv1 = 0x7fffffa603e6 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = -5897390}}, i2s = '\000' <repeats 16 times>, "@\002\246\377\377\177"} s = {s = 0x0, len = 0} srevp = {0x1e1c95d, 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <Address 0x2 out of bounds>, str = {s = 0x2 <Address 0x2 out of bounds>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140430928824000, string = 0x7fb89fa0c6c0 "X\022\266\237\270\177", str = {s = 0x7fb89fa0c6c0 "X\022\266\237\270\177", len = 5}, data = 0x7fb89fa0c6c0, attr = 0x7fb89fa0c6c0, select = 0x7fb89fa0c6c0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #15 0x000000000042c7b3 in run_actions (h=0x7fffffa61900, a=0x7fb89fa7efc8, msg=0x7fb8a04fa2b0) at action.c:1548 t = 0x7fb89fa86428 ret = 1 mod = 0x1 ms = 0 __FUNCTION__ = "run_actions" #16 0x000000000041d330 in do_action (h=0x7fffffa61900, a=0x7fb89fa5ce80, msg=0x7fb8a04fa2b0) at action.c:677 ret = -5 v = -1616526872 dst = {send_sock = 0x7fb8dfb16725, to = {s = {sa_family = 53622, sa_data = "\243\337", '\000' <repeats 11 times>}, sin = {sin_family = 53622, sin_port = 57251, sin_addr = { s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 53622, sin6_port = 57251, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 103}}, id = 0, proto = -80 '\260', send_flags = {f = 162 '\242', blst_imask = 79 'O'}} tmp = 0x7fb8dfa32885 "H\213\234", <incomplete sequence \370> new_uri = 0x7fffffa60b90 "]\311\341\001" end = 0x0 crt = 0x7fb8dfb15e80 "%hu%n:%hu%n:%hu%n" cmd = 0x7fb89f9f39a8 len = 32767 user = -5894982 uri = {user = {s = 0x101010101010100 <Address 0x101010101010100 out of bounds>, len = 16843009}, passwd = { s = 0x101010101010101 <Address 0x101010101010101 out of bounds>, len = -1605393744}, host = { s = 0x201ef9a50 <Address 0x201ef9a50 out of bounds>, len = 1545199232}, port = { s = 0x7 <Address 0x7 out of bounds>, len = 376}, params = {s = 0x7fffffa607b0 "\340\a\246\377\377\177", len = 1545124379}, sip_params = {s = 0x0, len = 1}, headers = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, port_no = 26408, proto = 57265, type = 32696, flags = 2689573552, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 376}, user_param = {s = 0x7fffffa607e0 "\320\r\246\377\377\177", len = 1545177530}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = -1605393744}, lr = { s = 0x7fffffa60dd0 "\240\016\246\377\377\177", len = 4327093}, r2 = { s = 0x7fffffffffff <Address 0x7fffffffffff out of bounds>, len = -5895016}, gr = { s = 0xffffffffffffffff <Address 0xffffffffffffffff out of bounds>, len = -542912138}, transport_val = { s = 0x1ef9a50 "\230\376\324߸\177", len = -5894480}, ttl_val = {s = 0x29 <Address 0x29 out of bounds>, len = -5894208}, user_param_val = {s = 0x1ef9a50 "\230\376\324߸\177", len = -1605393744}, maddr_val = { s = 0x7fb89fa3e9f8 "\222\002", len = -5894448}, method_val = { s = 0x7fb89fdfa160 "avp route 1 rd=211.78.19.1 rp=5060 rm=CANCEL du=<null> dd=<null> ds=<null> dp=<null> oP=UDP dP=<null> td=211.78.19.1 rP=UDP \t\t\tXXsocket=<null> Xport=<null> ru{nameaddr.uri}=sip:0975074886@211.78.19.1 "..., len = -1922080545}, lr_val = {s = 0x7fb75bb35788 "", len = -543098068}, r2_val = { s = 0x178 <Address 0x178 out of bounds>, len = 4294832}, gr_val = { s = 0x7fffffa608f0 "\360\t\246\377\377\177", len = 5439141}} next_hop = {user = {s = 0x290000000f <Address 0x290000000f out of bounds>, len = 16}, passwd = { s = 0x7300000008 <Address 0x7300000008 out of bounds>, len = 4}, host = {s = 0x0, len = 28800}, port = { s = 0x1e1c5b0 "CST", len = 130}, params = { s = 0x1ef9cb0 "<31>Sep 10 16:41:15 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: <core> [md5utils.c:67]: MD5StringArray(): MD5 calculated: a075ca4036a38176794f4f3679e1fbcd\n", len = 1441874475}, sip_params = { s = 0x7fb8a04fac58 "6", len = 376}, headers = {s = 0x7fffffa60750 "\260\a\246\377\377\177", len = 4294832}, port_no = 9312, proto = 65446, type = ERROR_URI_T, flags = 0, transport = { s = 0x101ef9cb0 <Address 0x101ef9cb0 out of bounds>, len = -1616526840}, ttl = { s = 0x3000000028 <Address 0x3000000028 out of bounds>, len = 376}, user_param = { s = 0x7fffffa60880 "\360\b\246\377\377\177", len = 5428540}, maddr = {s = 0x7fffffa606b0 "\210\236o", len = 376}, method = {s = 0x7fffffa607b0 "\340\a\246\377\377\177", len = 4294832}, lr = { s = 0x7fffffa62460 "\r", len = -1605393744}, r2 = {s = 0x7fb89fa5c1e8 "\002", len = -5891840}, gr = { s = 0x3000000028 <Address 0x3000000028 out of bounds>, len = -5896352}, transport_val = { s = 0x7fffffa606a0 "p\v\246\377\377\177", len = -5895296}, ttl_val = {s = 0x7fffffa60b70 "\200^\261߸\177", len = -5896496}, user_param_val = {s = 0x6f9e88 "DEBUG", len = 1545211310}, maddr_val = { s = 0x7fb75c1a1192 "loose_route", len = 0}, method_val = { s = 0x200000000 <Address 0x200000000 out of bounds>, len = 1545199232}, lr_val = { s = 0x178 <Address 0x178 out of bounds>, len = 4294832}, r2_val = { s = 0x7fffffa60750 "\260\a\246\377\377\177", len = 1545071392}, gr_val = {s = 0x0, len = 0}} u = 0x7fb8dfd50a00 port = 0 dst_host = 0x7fffffa60b50 i = 1 flags = 32695 avp = 0x7fffffa60b70 st = {flags = 4289070720, id = 32767, name = {n = -542885956, s = {s = 0x7fb8dfa437bc "\203=)\376\060", len = 32479824}, re = 0x7fb8dfa437bc}, avp = 0x7fb8dfaa0a6d} sct = 0x7fb8dfb15e86 sjt = 0x546b7f rve = 0x1e1c95c mct = 0x7fffffa609f0 rv = 0xffffffffffffffa8 rv1 = 0x1e1c95c c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = -5891840, s = { s = 0x7fffffa61900 "\004", len = -1605393744}, re = 0x7fffffa61900}, pval = {rs = { s = 0x7fffffa61900 "\004", len = -1605393744}, ri = -1616526840, flags = 32696}}, i2s = "آO\240\270\177\000\000\001\000\000\000\n\000\000\000\v\000\000\000\000"} s = {s = 0x7fffffa60630 "\200\b\246\377\377\177", len = -539689408} srevp = {0x1ef9cb0, 0x1ef9a50} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <Address 0x2 out of bounds>, str = {s = 0x2 <Address 0x2 out of bounds>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140430928824000, string = 0x7fb89fa0c6c0 "X\022\266\237\270\177", str = {s = 0x7fb89fa0c6c0 "X\022\266\237\270\177", len = 5}, data = 0x7fb89fa0c6c0, attr = 0x7fb89fa0c6c0, select = 0x7fb89fa0c6c0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #17 0x000000000042c7b3 in run_actions (h=0x7fffffa61900, a=0x7fb89fa5c308, msg=0x7fb8a04fa2b0) at action.c:1548 t = 0x7fb89fa5ce80 ret = 1 mod = 0x7fb8dfa6cd16 ms = 0 __FUNCTION__ = "run_actions" #18 0x0000000000420621 in do_action (h=0x7fffffa61900, a=0x7fb89fa7a668, msg=0x7fb8a04fa2b0) at action.c:1044 ret = 1 v = 1 dst = {send_sock = 0x1ef9cb0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000 \020\246\377\377\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = " \020\246\377\377\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = " \020\246\377\377\177\000\000g\000\000\000\000\000\000", __u6_addr16 = {4128, 65446, 32767, 0, 103, 0, 0, 0}, __u6_addr32 = {4289073184, 32767, 103, 0}}}, sin6_scope_id = 32480432}}, id = 0, proto = -80 '\260', send_flags = {f = 162 '\242', blst_imask = 79 'O'}} tmp = 0x7fff00000017 <Address 0x7fff00000017 out of bounds> new_uri = 0x178 <Address 0x178 out of bounds> end = 0x0 crt = 0x7fb89fdfa160 "avp route 1 rd=211.78.19.1 rp=5060 rm=CANCEL du=<null> dd=<null> ds=<null> dp=<null> oP=UDP dP=<null> td=211.78.19.1 rP=UDP \t\t\tXXsocket=<null> Xport=<null> ru{nameaddr.uri}=sip:0975074886@211.78.19.1 "... cmd = 0x7fffffa61120 len = 32696 user = -1605393744 uri = {user = {s = 0x7fffffa60ea0 "\260\017\246\377\377\177", len = 4376499}, passwd = {s = 0x7fb8dfd4fe40 "", len = 112}, host = {s = 0x2010 <Address 0x2010 out of bounds>, len = -542882797}, port = { s = 0x55f1422b <Address 0x55f1422b out of bounds>, len = -539689408}, params = { s = 0x1ef9cb0 "<31>Sep 10 16:41:15 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: <core> [md5utils.c:67]: MD5StringArray(): MD5 calculated: a075ca4036a38176794f4f3679e1fbcd\n", len = 104}, sip_params = {s = 0x1ef9ca0 "`\002", len = -1605393744}, headers = {s = 0x7fb89fa3e9f8 "\222\002", len = -5894448}, port_no = 40112, proto = 495, type = ERROR_URI_T, flags = 32479824, transport = {s = 0xffa60f70 <Address 0xffa60f70 out of bounds>, len = -539689408}, ttl = {s = 0xffffffff00000000 <Address 0xffffffff00000000 out of bounds>, len = 0}, user_param = {s = 0xb <Address 0xb out of bounds>, len = 376}, maddr = { s = 0x4188b0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300@\202n", len = -5888928}, method = {s = 0x0, len = 0}, lr = {s = 0x7fffffa60fb0 "\260\020\246\377\377\177", len = 4378158}, r2 = { s = 0x1ef9a50 "\230\376\324߸\177", len = -1605393744}, gr = {s = 0x7fb89fa3e9f8 "\222\002", len = -5891840}, transport_val = {s = 0x0, len = -1}, ttl_val = {s = 0x178 <Address 0x178 out of bounds>, len = 426074335}, user_param_val = {s = 0x4188b0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300@\202n", len = -5888928}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0xf98488891fe560df <Address 0xf98488891fe560df out of bounds>, len = -1922080545}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x178 <Address 0x178 out of bounds>, len = 4294832}, gr_val = { s = 0x7fffffa60fb0 "\260\020\246\377\377\177", len = 5439141}} next_hop = {user = {s = 0x7fffffa60cba "\246\377\377\177", len = -539699392}, passwd = {s = 0x0, len = 2}, host = {s = 0x7fffffa60ed0 "", len = 31574364}, port = {s = 0x7fffffa60d26 "", len = 0}, params = { s = 0x3633363531310d10 <Address 0x3633363531310d10 out of bounds>, len = -5894874}, sip_params = { s = 0x7fb8dfd4c020 "\277^\261߸\177", len = -5894481}, headers = {s = 0x7fb89f9f2230 "*0\032\\267\177", len = -5894960}, port_no = 16, proto = 0, type = ERROR_URI_T, flags = 0, transport = { s = 0xffffffffffa60e00 <Address 0xffffffffffa60e00 out of bounds>, len = -1616532384}, ttl = { s = 0x7fffffa60dec "", len = 376}, user_param = {s = 0x7fffffa60f40 "\260\017\246\377\377\177", len = 5428540}, maddr = {s = 0x2010 <Address 0x2010 out of bounds>, len = -542881280}, method = { s = 0x1ef9cb0 "<31>Sep 10 16:41:15 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: <core> [md5utils.c:67]: MD5StringArray(): MD5 calculated: a075ca4036a38176794f4f3679e1fbcd\n", len = 32479824}, lr = { s = 0x3531ffa60e40 <Address 0x3531ffa60e40 out of bounds>, len = -1605393744}, r2 = { s = 0x7fb89fa5ac40 "\002", len = -5891840}, gr = { s = 0x1ef9cbb "16:41:15 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: <core> [md5utils.c:67]: MD5StringArray(): MD5 calculated: a075ca4036a38176794f4f3679e1fbcd\n", len = -539704352}, transport_val = { s = 0x1ef9cbb "16:41:15 /home/pkg/kamailio/sbin/kamailio[115636]: DEBUG: <core> [md5utils.c:67]: MD5StringArray(): MD5 calculated: a075ca4036a38176794f4f3679e1fbcd\n", len = 7}, ttl_val = { s = 0x1ffc <Address 0x1ffc out of bounds>, len = -542721239}, user_param_val = { s = 0x7fffffa60e20 "\240\234\357\001", len = 0}, maddr_val = {s = 0x7fffffa60dea "", len = 0}, method_val = { s = 0x3 <Address 0x3 out of bounds>, len = 2}, lr_val = { s = 0x3000000010 <Address 0x3000000010 out of bounds>, len = 376}, r2_val = { s = 0x4188b0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300@\202n", len = -5888928}, gr_val = {s = 0x0, len = 0}} u = 0x7fb89fa3f7a8 port = 0 dst_host = 0x7fffffa61210 i = 0 flags = 32696 avp = 0x0 st = {flags = 32480443, id = 0, name = {n = 0, s = {s = 0x0, len = 8188}, re = 0x0}, avp = 0x7fb8dfa6cd16} sct = 0x3000000030 sjt = 0x546b7f rve = 0x7fb89fa5c5c0 mct = 0x7fffffa610b0 rv = 0x7fb8dfd4c3e0 rv1 = 0x0 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = -5891840, s = { s = 0x7fffffa61900 "\004", len = -1605393744}, re = 0x7fffffa61900}, pval = {rs = { s = 0x7fffffa61900 "\004", len = -1605393744}, ri = -1616532384, flags = 32696}}, i2s = "آO\240\270\177\000\000\001\000\000\000\n\000\000\000\273\234\357\001\377\377"} s = {s = 0x0, len = 0} srevp = {0x1e1c95d, 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <Address 0x2 out of bounds>, str = {s = 0x2 <Address 0x2 out of bounds>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140430928824000, string = 0x7fb89fa0c6c0 "X\022\266\237\270\177", str = {s = 0x7fb89fa0c6c0 "X\022\266\237\270\177", len = 5}, data = 0x7fb89fa0c6c0, attr = 0x7fb89fa0c6c0, select = 0x7fb89fa0c6c0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #19 0x000000000042c7b3 in run_actions (h=0x7fffffa61900, a=0x7fb89fa7a668, msg=0x7fb8a04fa2b0) at action.c:1548 t = 0x7fb89fa7a668 ret = -1 mod = 0x1 ms = 0 __FUNCTION__ = "run_actions" #20 0x0000000000420677 in do_action (h=0x7fffffa61900, a=0x7fb89fa79910, msg=0x7fb8a04fa2b0) at action.c:1048 ret = 1 v = 0 dst = {send_sock = 0x1e1c5b0, to = {s = {sa_family = 5680, sa_data = "\246\377\377\177\000\000\020\000\000\000\060\000\000"}, sin = {sin_family = 5680, sin_port = 65446, sin_addr = {s_addr = 32767}, sin_zero = "\020\000\000\000\060\000\000"}, sin6 = { sin6_family = 5680, sin6_port = 65446, sin6_flowinfo = 32767, sin6_addr = {__in6_u = { __u6_addr8 = "\020\000\000\000\060\000\000\000 \030\246\377\377\177\000", __u6_addr16 = {16, 0, 48, 0, 6176, 65446, 32767, 0}, __u6_addr32 = {16, 48, 4289075232, 32767}}}, sin6_scope_id = 4289075040}}, id = 32767, proto = 68 'D', send_flags = {f = 23 '\027', blst_imask = 166 '\246'}} tmp = 0xffffffff <Address 0xffffffff out of bounds> new_uri = 0x7fffffa61940 "\337`\005\064\211\210\204\371\337`o\215@w{\006" end = 0x3000000010 <Address 0x3000000010 out of bounds> crt = 0x0 cmd = 0x7fb89f9f39a8 len = 32696 user = -539689408 uri = {user = {s = 0x0, len = -5892896}, passwd = {s = 0x1e1c95c "8", len = 31574364}, host = { s = 0x7fffffa61600 " \300\324߸\177", len = 31574364}, port = {s = 0x7fb8dfd50a00 "\260\305\341\001", len = -5892278}, params = {s = 0x7fb8dfb15e80 "%hu%n:%hu%n:%hu%n", len = -542955387}, sip_params = { s = 0x3531fbad8001 <Address 0x3531fbad8001 out of bounds>, len = 31574365}, headers = {s = 0x1e1c95d "", len = 31574364}, port_no = 51548, proto = 481, type = ERROR_URI_T, flags = 31574364, transport = { s = 0x1e1c95c "8", len = 31574364}, ttl = {s = 0x1e1c95d "", len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x3 <Address 0x3 out of bounds>, len = 2}, lr = { s = 0x3000000000 <Address 0x3000000000 out of bounds>, len = 0}, r2 = { s = 0x7fffffa617a0 "\260\234\357\001", len = 11}, gr = { s = 0xffffffffffffffa8 <Address 0xffffffffffffffa8 out of bounds>, len = 0}, transport_val = { s = 0x2010 <Address 0x2010 out of bounds>, len = -542716650}, ttl_val = { s = 0x7fb8ffffffff <Address 0x7fb8ffffffff out of bounds>, len = 176}, user_param_val = { s = 0x2010 <Address 0x2010 out of bounds>, len = -539699392}, maddr_val = {s = 0x0, len = 2}, method_val = { s = 0x7fffffa61830 "\017", len = 31574364}, lr_val = {s = 0x7fffffa61686 "", len = 0}, r2_val = { s = 0x3633363531311670 <Address 0x3633363531311670 out of bounds>, len = -5892474}, gr_val = { s = 0x7fb8dfd4c020 "\277^\261߸\177", len = -5892081}} next_hop = {user = {s = 0x7fffffa61460 " \300\324߸\177", len = 31574364}, passwd = { s = 0x7fb8dfd50a00 "\260\305\341\001", len = -5892694}, host = {s = 0x7fb8dfb15e80 "%hu%n:%hu%n:%hu%n", len = -542955387}, port = {s = 0xfbad8001 <Address 0xfbad8001 out of bounds>, len = 31574365}, params = { s = 0x1e1c95d "", len = 31574364}, sip_params = {s = 0x1e1c95c "8", len = 31574364}, headers = { s = 0x1e1c95c "8", len = 31574364}, port_no = 51549, proto = 481, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 28800}, maddr = { s = 0x1e10000 <Address 0x1e10000 out of bounds>, len = 0}, method = {s = 0x7fb8dfa1f5d0 "H\213\227\210", len = -5892896}, lr = {s = 0x7fb800000000 "", len = 0}, r2 = { s = 0x4dfb15e80 <Address 0x4dfb15e80 out of bounds>, len = -542716650}, gr = { s = 0x7fffffffffff <Address 0x7fffffffffff out of bounds>, len = -1617137648}, transport_val = { s = 0x3000000020 <Address 0x3000000020 out of bounds>, len = -5892384}, ttl_val = { s = 0x7fffffa61620 "\020", len = 2}, user_param_val = {s = 0x7fffffa61690 "\017", len = 31574364}, maddr_val = {s = 0x7fffffa614e6 "", len = 0}, method_val = { s = 0x36333635313114d0 <Address 0x36333635313114d0 out of bounds>, len = -5892890}, lr_val = { s = 0x7fb8dfd4c020 "\277^\261߸\177", len = -5892497}, r2_val = {s = 0x1e1c5b0 "CST", len = -5894095}, gr_val = {s = 0x8 <Address 0x8 out of bounds>, len = -5892480}} u = 0x7fffffa618d0 port = 0 dst_host = 0x1ef9cb0 i = 32479824 flags = 0 avp = 0x1ef9cb0 st = {flags = 0, id = 0, name = {n = 160, s = {s = 0xb000000a0 <Address 0xb000000a0 out of bounds>, len = 0}, re = 0xb000000a0}, avp = 0x7fffffa61340} sct = 0x353155f1422b sjt = 0x7fb8dfaa0a6d rve = 0x7fb89fa5aca8 mct = 0x1ef9a50 rv = 0xffa60e91 rv1 = 0x7fb8dfa44a00 c1 = {cache_type = 3755277888, val_type = 32696, c = {avp_val = {n = -543098068, s = { s = 0x7fb8dfa0fb2c "\200\275\250\372\377\377", len = 7442919}, re = 0x7fb8dfa0fb2c}, pval = {rs = { s = 0x7fb8dfa0fb2c "\200\275\250\372\377\377", len = 7442919}, ri = -542882701, flags = 32696}}, i2s = "\330\026\246\377\377\177\000\000\000\000\000\000\000\000\000\000\340\221q\000\000"} s = {s = 0xffffffff <Address 0xffffffff out of bounds>, len = 32488624} srevp = {0xffa61480, 0x1ef9ca0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <Address 0x2 out of bounds>, str = {s = 0x2 <Address 0x2 out of bounds>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140430928824000, string = 0x7fb89fa0c6c0 "X\022\266\237\270\177", str = {s = 0x7fb89fa0c6c0 "X\022\266\237\270\177", len = 5}, data = 0x7fb89fa0c6c0, attr = 0x7fb89fa0c6c0, select = 0x7fb89fa0c6c0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #21 0x000000000042c7b3 in run_actions (h=0x7fffffa61900, a=0x7fb89fa07ef8, msg=0x7fb8a04fa2b0) at action.c:1548 t = 0x7fb89fa79910 ret = 1 mod = 0x7 ms = 0 __FUNCTION__ = "run_actions" #22 0x000000000042cef6 in run_top_route (a=0x7fb89fa07ef8, msg=0x7fb8a04fa2b0, c=0x0) at action.c:1634 ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {376, -467098338449858337, 4294832, 140737482466400, 0, 0, -467098338475024161, 467098105497477343}, __mask_was_saved = 0, __saved_mask = { __val = {140425514817510, 4302411225, 0, 4611686024164212803, 18446744073709551615, 140737482463664, 140425514999864, 15574475448, 0, 4611686022722355203, 140430940283568, 140737482463728, 5651578, 4294967298, 140430940283568, 4611686025411928696}}}}} p = 0x7fffffa61900 ret = 4294832 sfbk = 0 #23 0x000000000050d852 in receive_msg ( buf=0x1ec2d10 "CANCEL sip:0975074886@211.78.19.1 SIP/2.0\r\nVia: SIP/2.0/TCP 192.168.2.43:54810;branch=z9hG4bK.aDOUSxaqI;rport\r\nCall-ID: XFy280pHda\r\nFrom: sip:5777448@211.78.19.1;tag=3FryYW3l5\r\nTo: "0975074886" <sip"..., len=376, rcv_info=0x7fb75dd2d738) at receive.c:196 msg = 0x7fb8a04fa2b0 ctx = {rec_lev = 0, run_flags = 32695, last_retcode = 28800, jmp_env = {{__jmpbuf = {31573424, 11, -88, 1614940183712, 8208, 0, 4294832, 140737482466400}, __mask_was_saved = -5891296, __saved_mask = {__val = { 6234849, 32480432, 0, 32480432, 128, 32480432, 1441874475, 8208, 3, 140737482464592, 4294832, 140737482466400, 0, 0, 140432003174080, 206158430256}}}}} ret = -88 inb = { s = 0x1ec2d10 "CANCEL sip:0975074886@211.78.19.1 SIP/2.0\r\nVia: SIP/2.0/TCP 192.168.2.43:54810;branch=z9hG4bK.aDOUSxaqI;rport\r\nCall-ID: XFy280pHda\r\nFrom: sip:5777448@211.78.19.1;tag=3FryYW3l5\r\nTo: "0975074886" <sip"..., len = 376} __FUNCTION__ = "receive_msg" #24 0x00000000005f65fc in receive_tcp_msg ( tcpbuf=0x7fb75dd2da10 "CANCEL sip:0975074886@211.78.19.1 SIP/2.0\r\nVia: SIP/2.0/TCP 192.168.2.43:54810;branch=z9hG4bK.aDOUSxaqI;rport\r\nCall-ID: XFy280pHda\r\nFrom: sip:5777448@211.78.19.1;tag=3FryYW3l5\r\nTo: "0975074886" <sip"..., len=376, rcv_info=0x7fb75dd2d738, con=0x7fb75dd2d720) at tcp_read.c:1247 buf = 0x1ec2d10 "CANCEL sip:0975074886@211.78.19.1 SIP/2.0\r\nVia: SIP/2.0/TCP 192.168.2.43:54810;branch=z9hG4bK.aDOUSxaqI;rport\r\nCall-ID: XFy280pHda\r\nFrom: sip:5777448@211.78.19.1;tag=3FryYW3l5\r\nTo: "0975074886" <sip"... bsize = 65535 blen = 65535 __FUNCTION__ = "receive_tcp_msg" #25 0x00000000005f7d9b in tcp_read_req (con=0x7fb75dd2d720, bytes_read=0x7fffffa61e30, read_flags=0x7fffffa61e28) at tcp_read.c:1401 bytes = 376 total_bytes = 376 resp = 1 size = 0 req = 0x7fb75dd2d7a0 dst = {send_sock = 0x14, to = {s = {sa_family = 1, sa_data = "\000\000P\000\000\000\210\236o\000\000\000\000"}, sin = {sin_family = 1, sin_port = 0, sin_addr = {s_addr = 80}, sin_zero = "\210\236o\000\000\000\000"}, sin6 = {sin6_family = 1, sin6_port = 0, sin6_flowinfo = 80, sin6_addr = {__in6_u = { __u6_addr8 = "\210\236o\000\000\000\000\000\025\032u\000\000\000\000", __u6_addr16 = {40584, 111, 0, 0, 6677, 117, 0, 0}, __u6_addr32 = {7315080, 0, 7674389, 0}}}, sin6_scope_id = 7678414}}, id = 0, proto = -1 '\377', send_flags = {f = 255 '\377', blst_imask = 255 '\377'}} c = 116 't' ret = 0 __FUNCTION__ = "tcp_read_req" #26 0x00000000005fadab in handle_io (fm=0x7fb89fe19110, events=1, idx=-1) at tcp_read.c:1624 ret = 1574098952 n = 67 read_flags = 1 con = 0x7fb75dd2d720 s = 12 resp = 4831797 t = 1574098720 __FUNCTION__ = "handle_io" #27 0x00000000005ee8c0 in io_wait_loop_epoll (h=0xa2dfe0, t=2, repeat=1) at io_wait.h:1061 n = 1 r = 0 fm = 0x7fb89fe19110 revents = 1 __FUNCTION__ = "io_wait_loop_epoll" #28 0x00000000005fbe1a in tcp_receive_loop (unix_sock=86) at tcp_read.c:1739 __FUNCTION__ = "tcp_receive_loop" #29 0x00000000005e54e1 in tcp_init_children () at tcp_main.c:4787 r = 9 i = 23 reader_fd_1 = 86 pid = 0 si_desc = "tcp receiver (generic)\000\000ygY\000\000\000\000\000\300 \246\377\377\177\000\000R\342B\000\000\000\000\000\240 \246\377\377\177\000\000\260\203\235߸\177\000\000\220\323ޟ\270\177\000\000C\021=m\000\000\000\000\217sp\000\000\000\000\000\020џ\237\270\177\000\000)\000\000\000*\000\000\000U\032\030\340\223\303\001\000\237\303\001\000\364\021}5C\021=m\000\000\000" si = 0x0 __FUNCTION__ = "tcp_init_children" #30 0x00000000004ab258 in main_loop () at main.c:1658 i = 24 pid = 115603 si = 0x0 si_desc = "udp receiver child=23 sock=211.78.19.1:5003\000\000\000\000\000`$\246\377\377\177", '\000' <repeats 18 times>"\300, \016\252߸\177\000\000\060\000\000\000\060\000\000\000\260\300ޟ\270\177\000\000\220!\246\377\377\177\000\000\260\244\200]\267\177\000\000C\021=m\000\000\000\000\260\210A\000\001\000\000" nrprocs = 24 __FUNCTION__ = "main_loop" #31 0x00000000004b0b5b in main (argc=13, argv=0x7fffffa62468) at main.c:2533 cfg_stream = 0x1e16010 c = -1 r = 0 tmp = 0x7fffffa637c3 "" tmp_len = 32696 port = -533137552 proto = 0 options = 0x707db8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 832711724 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x76 p = 0x7fffffa6236e "" __FUNCTION__ = "main" ```
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#issuecomment-139323585
caught it again
#### SYSLOG ``` Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [tcp_read.c:1523]: handle_io(): received n=8 con=0x7f923c914778, fd=12 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [tcp_read.c:1332]: tcp_read_req(): content-length=240 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/msg_parser.c:616]: parse_msg(): SIP Reply (status): Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/msg_parser.c:618]: parse_msg(): version: <SIP/2.0> Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/msg_parser.c:620]: parse_msg(): status: <183> Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/msg_parser.c:622]: parse_msg(): reason: <Session Progress> Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/parse_via.c:1254]: parse_via_param(): Found param type 232, <branch> = <z9hG4bKe733.06537d1bec1bc953b7b8ff05607a8672.1>; state=6 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/parse_via.c:1254]: parse_via_param(): Found param type 236, <i> = <b61>; state=6 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/parse_via.c:1254]: parse_via_param(): Found param type 234, <received> = <211.78.19.1>; state=6 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/parse_via.c:1254]: parse_via_param(): Found param type 235, <rport> = <18490>; state=16 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/parse_via.c:2642]: parse_via(): end of header reached, state=5 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/msg_parser.c:496]: parse_headers(): parse_headers: Via found, flags=2 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/msg_parser.c:498]: parse_headers(): parse_headers: this is the first via Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [receive.c:134]: receive_msg(): After parse_msg... Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/parse_via.c:1254]: parse_via_param(): Found param type 234, <received> = <118.163.134.250>; state=6 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/parse_via.c:1254]: parse_via_param(): Found param type 232, <branch> = <z9hG4bK.wMHXVdtOc>; state=6 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/parse_via.c:1254]: parse_via_param(): Found param type 235, <rport> = <43859>; state=16 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/parse_via.c:2642]: parse_via(): end of header reached, state=5 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/msg_parser.c:496]: parse_headers(): parse_headers: Via found, flags=4 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/msg_parser.c:509]: parse_headers(): parse_headers: this is the second via Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: tm [t_lookup.c:1011]: t_check_msg(): DEBUG: t_check_msg: msg id=114 global id=113 T start=(nil) Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/parse_addr_spec.c:172]: parse_to_param(): DEBUG: add_param: tag=as74c983b5 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/parse_addr_spec.c:894]: parse_addr_spec(): end of header reached, state=29 Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/msg_parser.c:173]: get_hdr_field(): DEBUG: get_hdr_field: <To> [55]; uri=[sip:5777015@211.78.19.1] Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/msg_parser.c:175]: get_hdr_field(): DEBUG: to body ["0979708746" sip:5777015@211.78.19.1] Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: <core> [parser/msg_parser.c:153]: get_hdr_field(): get_hdr_field: cseq <CSeq>: <20> <INVITE> Sep 11 10:15:18 sip1 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: tm [t_lookup.c:888]: t_reply_matching(): DEBUG: t_reply_matching: hash 13182 label 0 branch 1 Sep 11 10:15:18 sip1 kernel: [41763585.057940] kamailio[123969] general protection ip:7f923ba4cd1b sp:7fff5bdaef50 error:0 in tm.so[7f923b9e4000+114000] Sep 11 10:15:39 sip1 /home/pkg/kamailio/sbin/kamailio[123971]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 108 Sep 11 10:15:39 sip1 /home/pkg/kamailio/sbin/kamailio[123971]: DEBUG: <core> [tcp_main.c:3448]: handle_ser_child(): dead child 72, pid 123969 (shutting down?) Sep 11 10:15:39 sip1 /home/pkg/kamailio/sbin/kamailio[123971]: DEBUG: <core> [io_wait.h:598]: io_watch_del(): DBG: io_watch_del (0x9e9d40, 108, -1, 0x0) fd_no=106 called Sep 11 10:15:39 sip1 /home/pkg/kamailio/sbin/kamailio[123896]: ALERT: <core> [main.c:728]: handle_sigs(): child process 123969 exited by a signal 11 ```
#### BACKTRACE core.kamailio.sig11.123969.1441937718 ``` #0 0x00007f923ba4cd1b in t_reply_matching (p_msg=0x7f937f050140, p_branch=0x7fff5bdaf340) at t_lookup.c:901 p_cell = 0x1e43e000000af hash_index = 13182 entry_label = 0 branch_id = 1 hashi = 0x172ed5e "e733.06537d1bec1bc953b7b8ff05607a8672.1;i=b61;received=211.78.19.1;rport=18490\r\nVia: SIP/2.0/TCP 192.168.2.84:38483;received=118.163.134.250;branch=z9hG4bK.wMHXVdtOc;rport=43859\r\nRecord-Route: <sip:21"... branchi = 0x172ed84 "1;i=b61;received=211.78.19.1;rport=18490\r\nVia: SIP/2.0/TCP 192.168.2.84:38483;received=118.163.134.250;branch=z9hG4bK.wMHXVdtOc;rport=43859\r\nRecord-Route: <sip:211.78.19.1:5003;r2=on;lr=on;ftag=0KeO-~"... p = 0x172ed84 "1;i=b61;received=211.78.19.1;rport=18490\r\nVia: SIP/2.0/TCP 192.168.2.84:38483;received=118.163.134.250;branch=z9hG4bK.wMHXVdtOc;rport=43859\r\nRecord-Route: <sip:211.78.19.1:5003;r2=on;lr=on;ftag=0KeO-~"... n = 0x172ed85 ";i=b61;received=211.78.19.1;rport=18490\r\nVia: SIP/2.0/TCP 192.168.2.84:38483;received=118.163.134.250;branch=z9hG4bK.wMHXVdtOc;rport=43859\r\nRecord-Route: <sip:211.78.19.1:5003;r2=on;lr=on;ftag=0KeO-~i"... hash_bucket = 0x7f923c423088 hashl = 4 branchl = 1 scan_space = 1 cseq_method = { s = 0x172ef60 "INVITE\r\nServer: PBX\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH\r\nSupported: replaces, timer\r\nContact: sip:886979708746@211.78.19.2:5070;transport=TCP\r\nContent-"..., len = 6} req_method = {s = 0x4188b0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300@\202n", len = 1541078944} loopi = 0x172ed63 "06537d1bec1bc953b7b8ff05607a8672.1;i=b61;received=211.78.19.1;rport=18490\r\nVia: SIP/2.0/TCP 192.168.2.84:38483;received=118.163.134.250;branch=z9hG4bK.wMHXVdtOc;rport=43859\r\nRecord-Route: <sip:211.78."... loopl = 32 is_cancel = 0 __FUNCTION__ = "t_reply_matching" #1 0x00007f923ba4fb0f in t_check_msg (p_msg=0x7f937f050140, param_branch=0x7fff5bdaf340) at t_lookup.c:1069 local_branch = 1541075456 canceled = -1 ret = 0 __FUNCTION__ = "t_check_msg" #2 0x00007f923ba50489 in t_check (p_msg=0x7f937f050140, param_branch=0x7fff5bdaf340) at t_lookup.c:1111 ret = 0 #3 0x00007f923ba9794b in reply_received (p_msg=0x7f937f050140) at t_reply.c:2118 msg_status = 0 last_uac_status = 23627184 ack = 0x7fff5bdaf410 "\020\365\332[\377\177" ack_len = 32767 branch = 3 reply_status = 6440375 onreply_route = 952550563 cancel_data = {cancel_bitmap = 4, reason = {cause = 320, u = {text = {s = 0xb <Address 0xb out of bounds>, len = -88}, e2e_cancel = 0xb, packed_hdrs = {s = 0xb <Address 0xb out of bounds>, len = -88}}}} uac = 0x7f937f050160 t = 0x762130 lack_dst = {send_sock = 0x7fff5bdaf410, to = {s = {sa_family = 24128, sa_data = "\212\276\223\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 24128, sin_port = 48778, sin_addr = { s_addr = 32659}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 24128, sin6_port = 48778, sin6_flowinfo = 32659, sin6_addr = {__in6_u = { __u6_addr8 = "\000\000\000\000\000\000\000\000\377\377\377\377\000\000\000", __u6_addr16 = {0, 0, 0, 0, 65535, 65535, 0, 0}, __u6_addr32 = {0, 0, 4294967295, 0}}}, sin6_scope_id = 11}}, id = 0, proto = 64 '@', send_flags = {f = 94 '^', blst_imask = 138 '\212'}} backup_user_from = 0x172f146 backup_user_to = 0x7f937e9435c8 backup_domain_from = 0x7f93be5f6a6d backup_domain_to = 0x172ee11 backup_uri_from = 0x7f937f050140 backup_uri_to = 0x0 backup_xavps = 0x7f9300000003 replies_locked = 14385 branch_ret = 0 prev_branch = 32659 blst_503_timeout = 2131034432 hf = 0x763058 onsend_params = {req = 0x4004188b0, rpl = 0x75fc90, param = 0x0, code = 0, flags = 3, branch = 0, t_rbuf = 0x7fff5bdaf390, dst = 0x631592, send_buf = { s = 0x1745810 "<31>Sep 11 10:15:18 /home/pkg/kamailio/sbin/kamailio[123969]: DEBUG: tm [t_lookup.c:888]: t_reply_matching(): DEBUG: t_reply_matching: hash 13182 label 0 branch 1\n", len = 24401328}} ctx = {rec_lev = 1541075856, run_flags = 32767, last_retcode = 4294832, jmp_env = {{__jmpbuf = {140734734466976, 0, 0, 140272530845376, 206158430248, 140734734463712, 140734734463520, 0}, __mask_was_saved = 1541075664, __saved_mask = {__val = {6422143, 7315080, 7739304, 7745634, 0, 140734734464128, 11, 18446744073709551528, 24401920, 8208, 1400183748624, 140271467956440, 7733692, 64, 24309265, 1441937718}}}}} __FUNCTION__ = "reply_received" #4 0x00000000004901cc in do_forward_reply (msg=0x7f937f050140, mode=0) at forward.c:747 new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} new_len = 0 r = 2 ip = {af = 40, len = 48, u = {addrl = {140734734464320, 140734734464128}, addr32 = {1541076288, 32767, 1541076096, 32767}, addr16 = {62784, 23514, 32767, 0, 62592, 23514, 32767, 0}, addr = "@\365\332[\377\177\000\000\200\364\332[\377\177\000"}} s = 0x7f9300000003 "" len = 32658 __FUNCTION__ = "do_forward_reply" #5 0x0000000000491856 in forward_reply (msg=0x7f937f050140) at forward.c:849 No locals. #6 0x000000000050e062 in receive_msg ( buf=0x172ed10 "SIP/2.0 183 Session Progress\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bKe733.06537d1bec1bc953b7b8ff05607a8672.1;i=b61;received=211.78.19.1;rport=18490\r\nVia: SIP/2.0/TCP 192.168.2.84:38483;receiv"..., len=1078, rcv_info=0x7f923c914790) at receive.c:255 msg = 0x7f937f050140 ctx = {rec_lev = 0, run_flags = 32658, last_retcode = 28800, jmp_env = {{__jmpbuf = {23627184, 11, -88, 4629999147008, 8208, 0, 4294832, 140734734466976}, __mask_was_saved = 1541076576, __saved_mask = {__val = {6234849, 24401936, 0, 24401936, 130, 24401936, 1441937718, 8208, 140266058106744, 140734734465168, 4294832, 140734734466976, 0, 0, 140272530845376, 206158430256}}}}} ret = -88 inb = { s = 0x172ed10 "SIP/2.0 183 Session Progress\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bKe733.06537d1bec1bc953b7b8ff05607a8672.1;i=b61;received=211.78.19.1;rport=18490\r\nVia: SIP/2.0/TCP 192.168.2.84:38483;receiv"..., len = 1078} __FUNCTION__ = "receive_msg" #7 0x00000000005f65fc in receive_tcp_msg ( tcpbuf=0x7f923c914a68 "SIP/2.0 183 Session Progress\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bKe733.06537d1bec1bc953b7b8ff05607a8672.1;i=b61;received=211.78.19.1;rport=18490\r\nVia: SIP/2.0/TCP 192.168.2.84:38483;receiv"..., len=1078, rcv_info=0x7f923c914790, con=0x7f923c914778) at tcp_read.c:1247 buf = 0x172ed10 "SIP/2.0 183 Session Progress\r\nVia: SIP/2.0/TCP 211.78.19.1:5003;branch=z9hG4bKe733.06537d1bec1bc953b7b8ff05607a8672.1;i=b61;received=211.78.19.1;rport=18490\r\nVia: SIP/2.0/TCP 192.168.2.84:38483;receiv"... bsize = 65535 blen = 65535 __FUNCTION__ = "receive_tcp_msg" #8 0x00000000005f7d9b in tcp_read_req (con=0x7f923c914778, bytes_read=0x7fff5bdaf96c, read_flags=0x7fff5bdaf968) at tcp_read.c:1401 bytes = 1078 total_bytes = 1078 resp = 1 size = 140734734465024 req = 0x7f923c9147f8 dst = {send_sock = 0x14, to = {s = {sa_family = 1, sa_data = "\000\000\001\000\000\000\210\236o\000\000\000\000"}, sin = {sin_family = 1, sin_port = 0, sin_addr = {s_addr = 1}, sin_zero = "\210\236o\000\000\000\000"}, sin6 = {sin6_family = 1, sin6_port = 0, sin6_flowinfo = 1, sin6_addr = {__in6_u = { __u6_addr8 = "\210\236o\000\000\000\000\000\025\032u\000\000\000\000", __u6_addr16 = {40584, 111, 0, 0, 6677, 117, 0, 0}, __u6_addr32 = {7315080, 0, 7674389, 0}}}, sin6_scope_id = 7678414}}, id = 0, proto = 8 '\b', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} c = 0 '\000' ret = 1541076976 __FUNCTION__ = "tcp_read_req" #9 0x00000000005fa3e5 in handle_io (fm=0x7f937e96f900, events=1, idx=-1) at tcp_read.c:1568 ret = 8 n = 8 read_flags = 1 con = 0x7f923c914778 s = 12 resp = 140266057669928 t = 1015717160 __FUNCTION__ = "handle_io" #10 0x00000000005ee8c0 in io_wait_loop_epoll (h=0xa2dfe0, t=2, repeat=1) at io_wait.h:1061 n = 1 r = 0 fm = 0x7f937e96f900 revents = 1 __FUNCTION__ = "io_wait_loop_epoll" #11 0x00000000005fbe1a in tcp_receive_loop (unix_sock=112) at tcp_read.c:1739 __FUNCTION__ = "tcp_receive_loop" #12 0x00000000005e54e1 in tcp_init_children () at tcp_main.c:4787 r = 22 i = 23 reader_fd_1 = 112 pid = 0 si_desc = "tcp receiver (generic)\000\000ygY\000\000\000\000\000\000\374\332[\377\177\000\000R\342B\000\000\000\000\000\340\373\332[\377\177\000\000\260\343R\276\223\177\000\000 2\224~\223\177\000\000\210W\364/\000\000\000\000\217sp\000\000\000\000\000\020\061U~\223\177\000\000)\000\000\000*\000\000\000Uz;\023\344\001\000\037\344\001\000aިf\210W\364/\000\000\000" si = 0x0 __FUNCTION__ = "tcp_init_children" #13 0x00000000004ab258 in main_loop () at main.c:1658 i = 24 pid = 123923 si = 0x0 si_desc = "udp receiver child=23 sock=211.78.19.1:5003\000\000\000\000\000\240\377\332[\377\177", '\000' <repeats 18 times>"\300, n_\276\223\177\000\000\060\000\000\000\060\000\000\000@\037\224~\223\177\000\000\320\374\332[\377\177\000\000\260\004\066<\222\177\000\000\210W\364/\000\000\000\000\260\210A\000\001\000\000" nrprocs = 24 __FUNCTION__ = "main_loop" #14 0x00000000004b0b5b in main (argc=13, argv=0x7fff5bdaffa8) at main.c:2533 cfg_stream = 0x1682010 c = -1 r = 0 tmp = 0x7fff5bdb07c3 "" tmp_len = 32659 port = -1091676304 proto = 0 options = 0x707db8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 2623255322 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x76 p = 0x7fff5bdafeae "" __FUNCTION__ = "main" ```
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#issuecomment-139434734
Maybe it is related to transaction mismatch ( due to the config logic chaos )
If you saw the following message, kamailio may crash. I'll keep testing
``` ERROR: tm [t_reply.c:533]: _reply_light(): ERROR: _reply_light: can't generate 200 reply when a final 487 was sent out ```
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#issuecomment-139489311
It should not crash in any case. You don't have any custom module or other patch in this instance, right?
Would it be possible to grant me access to the system in order to investigate the core file? It might be faster to troubleshoot.
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#issuecomment-139501321
The instance is official 4.3.1 with no custom modules, the only patch is jsonrpc_io.c from #268 to avoid crash when connect a jsonrpc server which was not up.
However, after some experiments, it is caused by execute t_continue() on a transaction that are not suspend. I can avoid it by adjust script, but did not know which component that actually killed kamailio. but I think it can be reproduce.
#### Described below:
We have implement a push join algorithm introduced by Danail at Kamailio World 2014. [Aynchronous Processing in Kamailio Configuration File](http://www.slideshare.net/miconda/26-danielconstantinmierlakamailiocfgasync)
Let's say the caller A wants to call callee B who is offline:
``` 1. A send INVITE to KAMAILIO 2. set t_set_fr(60000, 4000) to simulate max-wait-timeout for a suspended transaction. ( which is 4 Secs ) 3. KAMAILIO suspend this transaction via t_suspend() 4. KAMAILIO stores transaction id in htable with timeout 10 Secs ( htable timeout set via modparam ) 5. B did NOT register within 4 Secs. then A timed out. 6. this transaction will go to a failure_route that we armed before suspend. 7. in failure route, A will continue to dial another phone number ( says pstn ), send INVITE to another server, and waiting for 180. 8. B registered after 4 Secs but before 10 Secs ( htable not delete that record yet ) 9. so issue t_continue() on transaction A. But it will NOT send anything to B actually. you will see kamailio complaining "script writer didn't release transaction" in syslog. And looks like KAMAILIO did some cleaning procedure. 10. when KAMAILIO received response 180 or 183 from the remote server, sooner or later kamailio will crash (at onsend_route or onreply_route, occurs often when parsing Cseq. ) 11. If A send a CANCEL at this moment, kamailio will generate a fake 487 response and swallows it, no forward to remote server, and remote server will waiting 200 ok, left a blocking dead channel alone. ``` currently I delete record in htable after max-wait-timeout, and everything works fine.
#### Question: Is it possible if B registered and lookup htable after max-wait-timeout but before we delete htable record in timeout failure_route() ? ( edge case race condition )
#### In the name of kamailio:
Ha, I love the sentence "It should not crash in any case.", it really should become a slogan of kamailio. "kamailio - it never crash"
Anyway, no matter whether I can avoid crash by adjust config file now or not, I will grant you access if you need. it looks like a hell of corefiles though.
please tell me what's the mail address I should send to, and I'll prepare for it.
for better kamailio, cheers.
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#issuecomment-139879395
I pushed a safety check to skip t_continue() if the transaction was not suspended. Can you try with latest master branch or backport the commits 52c4965bbb4cde5d7bddcf697aa504e7c2202ac1 and 171553ebcac2f00a015191f36f2f228c0d3e483b to your branch?
Your scenario is rather interesting, would be good if you can test it again with the patches to see the result. t_continue() expects some fields in current branch that were set by t_suspend(), perhaps not having everywhere safety checks when accessing them, that's why I added a generic safety check.
An again, at runtime kamailio should not crash, event the config is not well written, we need to detect and throw error messages.
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#issuecomment-140038663
It looks great!
**Test Version:**
``` version: kamailio 4.4.0-dev4 id: 33f159 ```
**After reproduce, now I only see some warning msgs in syslog instead of crash.**
Is this the expecting result ?
``` Sep 17 16:33:55 SIP-B03 /home/pkg/kamailio/sbin/kamailio[99434]: ERROR: tm [t_suspend.c:181]: t_continue(): transaction is not suspended [35608:1687951895] Sep 17 16:33:55 SIP-B03 /home/pkg/kamailio/sbin/kamailio[99434]: ERROR: tmx [tmx_mod.c:642]: w_t_continue(): resuming the processing of transaction [35608:1687951895] failed Sep 17 16:33:55 SIP-B03 /home/pkg/kamailio/sbin/kamailio[99434]: WARNING: tm [t_lookup.c:1476]: t_unref(): WARNING: script writer didn't release transaction ```
kamailio - it never crashes
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#issuecomment-141008375
Yes, the expected result was to throw some error messages to inform the admin that it was sort of improper use of t_continue.
Now, given that this situation is somehow possible, maybe we should make those error messages printed as warning or notice.
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#issuecomment-141010462
Agreed, WARNING is suitable.
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#issuecomment-141012694
Closed #322.
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#event-412159768
Changed to warning level.
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/322#issuecomment-141103776