I've encountered another crash, on 4.3:4717b5b, on processing a 487
response to a CANCEL message:
Aug 21 07:03:28 server3 /usr/local/sbin/kamailio[12912]: INFO:
[R-MAIN:222210534-3649154645-466773@msc9.382com.com] CANCEL received
from 173.231.21.131 (RURI=sip:13147323855@199.91.66.172:5060)
Aug 21 07:03:28 server3 /usr/local/sbin/kamailio[12909]: ALERT: <core>
[main.c:728]: handle_sigs(): child process 12916 exited by a signal 11
Aug 21 07:03:28 server3 /usr/local/sbin/kamailio[12909]: ALERT: <core>
[main.c:731]: handle_sigs(): core was generated
This is similar in style to the CANCEL/487 crashes I've posted in spring
and summer, except that there is no asynchronous processing and/or TM
transaction suspension/resuming going on here, as I turned it off
(ironically, because this resulted in occasional crashes on CANCEL/487 :-).
Any help would be appreciated...
(gdb) thread apply all bt full
Thread 1 (Thread 0x7ff1ad71a700 (LWP 12916)):
#0 0x000000000061ab7c in fm_extract_free (qm=0x7ff1ac551010,
frag=0x7ff1ac803268) at mem/f_malloc.c:182
pf = 0x0
hash = 29
#1 0x000000000061c250 in fm_malloc (qm=0x7ff1ac551010, size=232,
file=0x75d29c "<core>: parser/msg_parser.c", func=0x760150
"get_hdr_field", line=116) at mem/f_malloc.c:466
f = 0x7ff1ac551368
frag = 0x7ff1ac803268
hash = 33
__FUNCTION__ = "fm_malloc"
#2 0x00000000006292a5 in get_hdr_field (buf=0x7ff1ac80506d "Via:
SIP/2.0/UDP
173.231.21.131:5060;branch=z9hG4bK379f.13c57ed4.0\r\nRecord-Route:
<sip:199.91.66.172;lr=on;ftag=sansay4054880682rdb65099;fromcor=ejFwbUZxUmpUUFNBejFwbUZxUmpUUFNBejFwbUY->\r\nTo:
<sip:122"..., end=0x7ff1ac805240 "", hdr=0x7ff1ac7d5300) at
parser/msg_parser.c:116
tmp = 0x7ff1ac805072 "SIP/2.0/UDP
173.231.21.131:5060;branch=z9hG4bK379f.13c57ed4.0\r\nRecord-Route:
<sip:199.91.66.172;lr=on;ftag=sansay4054880682rdb65099;fromcor=ejFwbUZxUmpUUFNBejFwbUZxUmpUUFNBejFwbUY->\r\nTo:
<sip:12283280"...
match = 0x6f70a3 "INFO"
vb = 0x7ff1ac805015
cseq_b = 0x7ff1ac805000
to_b = 0xac805004
integer = 584
err = 1453435616
uval = 0
__FUNCTION__ = "get_hdr_field"
#3 0x000000000062c713 in parse_headers (msg=0x7ff1aa375e68, flags=64,
next=0) at parser/msg_parser.c:334
hf = 0x7ff1ac7d5300
tmp = 0x7ff1ac80506d "Via: SIP/2.0/UDP
173.231.21.131:5060;branch=z9hG4bK379f.13c57ed4.0\r\nRecord-Route:
<sip:199.91.66.172;lr=on;ftag=sansay4054880682rdb65099;fromcor=ejFwbUZxUmpUUFNBejFwbUZxUmpUUFNBejFwbUY->\r\nTo:
<sip:122"...
rest = 0x1fac8033e0 <Address 0x1fac8033e0 out of bounds>
end = 0x7ff1ac805240 ""
orig_flag = 0
__FUNCTION__ = "parse_headers"
#4 0x00007ff1abc5927f in pv_get_callid (msg=0x7ff1aa375e68,
param=0x7ff1ac5f0648, res=0x7fff56a1ad60) at pv_core.c:632
__FUNCTION__ = "pv_get_callid"
#5 0x00000000004f7c4a in pv_get_spec_value (msg=0x7ff1aa375e68,
sp=0x7ff1ac5f0630, value=0x7fff56a1ad60) at pvapi.c:1289
ret = 0
__FUNCTION__ = "pv_get_spec_value"
#6 0x00007ff1aa16946c in pv_get_t_var_rpl (msg=0x7ff1ab59e040,
param=0x7ff1ac5f0590, res=0x7fff56a1ad60) at t_var.c:327
pv = 0x7ff1ac5f0630
#7 0x00000000004f7c4a in pv_get_spec_value (msg=0x7ff1ab59e040,
sp=0x7ff1ac5f0578, value=0x7fff56a1ad60) at pvapi.c:1289
ret = 0
__FUNCTION__ = "pv_get_spec_value"
#8 0x00000000004f80b8 in pv_printf (msg=0x7ff1ab59e040,
list=0x7ff1ac5f0508, buf=0x7ff1ac5667b0 "FAIL:9.2.155",
len=0x7fff56a1aee8) at pvapi.c:1348
n = 5
tok = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}
it = 0x7ff1ac5f0508
cur = 0x7ff1ac5667b5 "9.2.155"
__FUNCTION__ = "pv_printf"
#9 0x0000000000599000 in get_str_fparam (dst=0x7fff56a1aee0,
msg=0x7ff1ab59e040, param=0x7ff1ac5f33f8) at sr_module.c:1672
val = {n = 8, s = {s = 0x8 <Address 0x8 out of bounds>, len =
0}, re = 0x8}
ret = 32767
avp = 0x61c5e3
pv_val = {rs = {s = 0x7fff56a1ae40 "", len = 4714192}, ri = 0,
flags = 0}
__FUNCTION__ = "get_str_fparam"
#10 0x00007ff1aa7be5d4 in w_mq_add (msg=0x7ff1ab59e040,
mq=0x7ff1ac5f3388 "`Gf\254\361\177", key=0x7ff1ac5f33f8
"\260Gf\254\361\177", val=0x7ff1ac5f0780 "prf\254\361\177") at
mqueue_mod.c:178
q = {s = 0x7ff1ac564778 "cdr_write1", len = 10}
qkey = {s = 0x7ff1ac5667b0 "FAIL:9.2.155", len = 8192}
qval = {s = 0x100000076 <Address 0x100000076 out of bounds>,
len = -1539946512}
__FUNCTION__ = "w_mq_add"
#11 0x000000000041df7e in do_action (h=0x7fff56a1ca90, a=0x7ff1ac664290,
msg=0x7ff1ab59e040) at action.c:1071
ret = -5
v = -1402577184
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
"\000\000\000\000\000\000P\264\241V\377\177\000"}, sin = {sin_family =
0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"P\264\241V\377\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"P\264\241V\377\177\000\000\001\000\000\000\000\000\000", __u6_addr16 =
{46160, 22177, 32767, 0, 1, 0, 0, 0}, __u6_addr32 = {1453438032, 32767,
1, 0}}}, sin6_scope_id = 1453438032}}, id = 32767, proto = -108 '\224',
send_flags = {f = 60 '<', blst_imask = 84 'T'}}
tmp = 0x7fff56a1ca90 "\004"
new_uri = 0x0
end = 0x1 <Address 0x1 out of bounds>
crt = 0x7fff56a1b410 ""
cmd = 0x7ff1ac57ce20
len = 4283776
user = 0
uri = {user = {s = 0x1 <Address 0x1 out of bounds>, len = 0},
passwd = {s = 0x800000 <Address 0x800000 out of bounds>, len =
-1420173248}, host = {s = 0x7ff1ac664170 "\240", len = 1453437552}, port
= {s = 0x7fff56a1b750 "\020", len = 0}, params = {s = 0x1acea9045
<Address 0x1acea9045 out of bounds>, len = 140}, sip_params = {s = 0x0,
len = 0}, headers = {s = 0x7fff56a1b7bc "\361\177", len = -1420173248},
port_no = 23936, proto = 65, type = ERROR_URI_T, flags = 1453447296,
transport = {s = 0x0, len = 0}, ttl = {s = 0x7fff56a1b350
"P\264\241V\377\177", len = 4369192}, user_param = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = -1420173248},
maddr = {s = 0x7ff1ac664170 "\240", len = 1453443728}, method = {s =
0x0, len = 1}, lr = {s = 0x7ff1ab59e040 "\265\230!", len = -969162998},
r2 = {s = 0x415d80 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300",
len = 1453447296}, gr = {s = 0x0, len = 0}, transport_val = {s =
0x2754a248c1bbbf0a <Address 0x2754a248c1bbbf0a out of bounds>, len =
-506478838}, ttl_val = {s = 0x7fff00000000 <Address 0x7fff00000000 out
of bounds>, len = -1420173248}, user_param_val = {s = 0x7ff1ac665ee0
"\236", len = 1453437808}, maddr_val = {s = 0x7fff56a1b723
"12916\266\267\241V\377\177", len = 0}, method_val = {s = 0x156a1b89c
<Address 0x156a1b89c out of bounds>, len = 1453439160}, lr_val = {s =
0x0, len = 1453439192}, r2_val = {s = 0x7fff56a1b300 "", len =
-1420173248}, gr_val = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 1453447296}}
next_hop = {user = {s = 0x7fff56a1b290 "\200]A", len =
1453438216}, passwd = {s = 0x7ff1ac5dcae8 "", len = -1400908488}, host =
{s = 0x1900000111 <Address 0x1900000111 out of bounds>, len =
-1403153419}, port = {s = 0x7ff100000006 "", len = -1518826664}, params
= {s = 0x1889a00 "PDT", len = 0}, sip_params = {s = 0x3000000010
<Address 0x3000000010 out of bounds>, len = 1453437568}, headers = {s =
0x7fff00000002 <Address 0x7fff00000002 out of bounds>, len = 4283776},
port_no = 37877, proto = 44125, type = 32753, flags = 6, transport = {s
= 0x100000000 <Address 0x100000000 out of bounds>, len = -1403010800},
ttl = {s = 0x7fefa43647f0 "\031", len = -1434735464}, user_param = {s =
0x7fff56a1b1f0 "E\220\352\254\001", len = -1403510296}, maddr = {s =
0xac7fd538 <Address 0xac7fd538 out of bounds>, len = -1402575760},
method = {s = 0x7ff1ab59e040 "\265\230!", len = 1453443728}, lr = {s =
0x7ff1ac5dcae8 "", len = 4283776}, r2 = {s = 0x7fff56a1b180 "\006",
len
= 5209162}, gr = {s = 0x1ffb <Address 0x1ffb out of bounds>, len =
-1394647486}, transport_val = {s = 0x2000 <Address 0x2000 out of
bounds>, len = 0}, ttl_val = {s = 0x2010 <Address 0x2010 out of bounds>,
len = -1420173248}, user_param_val = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 1453447296},
maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x7fff56a1b240
"P\263\241V\377\177", len = 4367555}, lr_val = {s = 0x6 <Address 0x6 out
of bounds>, len = 1453439088}, r2_val = {s = 0x7ff1acea9048 "]", len =
-1395039897}, gr_val = {s = 0x7ff1acea9049 "", len = 1}}
u = 0x0
port = 0
dst_host = 0x7fff56a1ba30
i = 32753
flags = 0
avp = 0x7fff56a1ca90
st = {flags = 1453437200, id = 32767, name = {n = -1413079500,
s = {s = 0x7ff1abc61e34
"H\213\225(\377\377\377H\211\002\213U\200H\213\205(\377\377\377\211P\020H\213\205(\377\377\377\213@\024\211\302\203\312\030H\213\205(\377\377\377\211P\024\270",
len = 1453437157}, re = 0x7ff1abc61e34}, avp = 0x7fef00000000}
sct = 0x1900000000
sjt = 0x200000000
rve = 0x7ff1ac5de8f0
mct = 0x7ff10000005d
rv = 0x7ff1ac5d93f5
rv1 = 0x415d80
c1 = {cache_type = 2894058808, val_type = 32753, c = {avp_val =
{n = 1453444832, s = {s = 0x7fff56a1cee0 "", len = -1400908488}, re =
0x7fff56a1cee0}, pval = {rs = {s = 0x7fff56a1cee0 "", len =
-1400908488}, ri = -1403526944, flags = 32753}}, i2s =
"\020\265\241V\377\177\000\000\002\000\000\000\000\000\000\000\350\312]\254\361\177"}
s = {s = 0x1ac5de8f0 <Address 0x1ac5de8f0 out of bounds>, len = 19}
srevp = {0xa876f0, 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
{type = NUMBER_ST, u = {number = 1, string = 0x1 <Address 0x1 out of
bounds>, str = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, data =
0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number
= 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data
= 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#12 0x000000000042a4c3 in run_actions (h=0x7fff56a1ca90,
a=0x7ff1ac664290, msg=0x7ff1ab59e040) at action.c:1548
t = 0x7ff1ac664290
ret = -1
mod = 0xac666478
ms = 0
__FUNCTION__ = "run_actions"
#13 0x000000000041dd16 in do_action (h=0x7fff56a1ca90, a=0x7ff1ac667830,
msg=0x7ff1ab59e040) at action.c:1044
ret = 1
v = 1
dst = {send_sock = 0x18c5b90, to = {s = {sa_family = 12199,
sa_data = "\327U\000\000\000\000\200\272\241V\377\177\000"}, sin =
{sin_family = 12199, sin_port = 21975, sin_addr = {s_addr = 0}, sin_zero
= "\200\272\241V\377\177\000"}, sin6 = {sin6_family = 12199, sin6_port =
21975, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"\200\272\241V\377\177\000\000]\000\000\000\000\000\000", __u6_addr16 =
{47744, 22177, 32767, 0, 93, 0, 0, 0}, __u6_addr32 = {1453439616, 32767,
93, 0}}}, sin6_scope_id = 1453439968}}, id = 32767, proto = -128 '\200',
send_flags = {f = 93 ']', blst_imask = 65 'A'}}
tmp = 0x0
new_uri = 0x0
end = 0x7ff1ace37090 "H\201\304", <incomplete sequence \330>
crt = 0x3000000030 <Address 0x3000000030 out of bounds>
cmd = 0x7fff56a1bb30
len = 1453439600
user = 32767
uri = {user = {s = 0x7fff56a1b890 "\200\036\016\255\361\177",
len = 8180}, passwd = {s = 0x7ff1ad0e1e80 "", len = 25975696}, host = {s
= 0x9a <Address 0x9a out of bounds>, len = 25975680}, port = {s = 0xb0
<Address 0xb0 out of bounds>, len = -1394812171}, params = {s =
0x7ff1ad0e1e80 "", len = 140}, sip_params = {s = 0x0, len = 25975088},
headers = {s = 0x7fff56a1ba00 "\220[\214\001", len = -1}, port_no = 0,
proto = 0, type = ERROR_URI_T, flags = 25975088, transport = {s = 0x0,
len = -1}, ttl = {s = 0x0, len = 25975088}, user_param = {s = 0x15
<Address 0x15 out of bounds>, len = -1}, maddr = {s = 0x0, len = -88},
method = {s = 0x7fff56a1ba50 "0", len = -1394381763}, lr = {s =
0x7fff56a1b9c0 "0\272\241V\377\177", len = -1445722882}, r2 = {s =
0x300000013 <Address 0x300000013 out of bounds>, len = 7}, gr = {s =
0x7300000007 <Address 0x7300000007 out of bounds>, len = 5},
transport_val = {s = 0x7ff100000001 "", len = -25200}, ttl_val = {s =
0x1889a00 "PDT", len = -1420173248}, user_param_val = {s =
0x7ff1ac7f9d50 "\230\221\\\254\361\177", len = -1400908488}, maddr_val =
{s = 0x7ff1ac59d9f0 "", len = 4283776}, method_val = {s = 0x7fff56a1ba30
"\001", len = 5209162}, lr_val = {s = 0x7ff1ac5511c8
"\370\344\177\254\361\177", len = -1501168808}, r2_val = {s = 0x18c5b90
"<134>Aug 21 07:03:19 /usr/local/sbin/kamailio[12916]: INFO: <core>
[mem/f_malloc.c:575]: fm_free(): freeing a free fragment
(0x7ff1ac8033a8/0x7ff1ac8033e0) - ignore\n", len = 0}, gr_val = {s =
0x20007fff00000007 <Address 0x20007fff00000007 out of bounds>, len = 153}}
next_hop = {user = {s = 0x7fff56a1b960 "\023", len =
1453440272}, passwd = {s = 0x56a1b7b6 <Address 0x56a1b7b6 out of
bounds>, len = 0}, host = {s = 0x3631393231a1b7a0 <Address
0x3631393231a1b7a0 out of bounds>, len = 1453438902}, port = {s =
0x7ff1ad0de2e0 "E\213\352\254\361\177", len = 1453439295}, params = {s =
0x1889a00 "PDT", len = 1453438816}, sip_params = {s = 0x3000000010
<Address 0x3000000010 out of bounds>, len = 1453439312}, headers = {s =
0x7fff56a1b890 "\200\036\016\255\361\177", len = -1422518688}, port_no =
48496, proto = 22177, type = 32767, flags = 2894058808, transport = {s =
0x7ff1ac5cb420 "M", len = -1420173248}, ttl = {s = 0x7fff56a1b850
"\260", len = -1423042897}, user_param = {s = 0x0, len = -1403011424},
maddr = {s = 0x393100000200 <Address 0x393100000200 out of bounds>, len
= -1400908488}, method = {s = 0xa6fec8 "487 Request cancelled\r\nVia:
SIP/2.0/UDP
199.91.66.172;branch=z9hG4bK379f.ae48c4c253d913f705a8d4b04a4941ed.1\r\nVia:
SIP/2.0/UDP
173.231.21.131:5060;branch=z9hG4bK379f.13c57ed4.0\r\nRecord-Route:
<sip:199."..., len = -1393913790}, lr = {s = 0x18c5b9c "07:03:19
/usr/local/sbin/kamailio[12916]: INFO: <core> [mem/f_malloc.c:575]:
fm_free(): freeing a free fragment (0x7ff1ac8033a8/0x7ff1ac8033e0) -
ignore\n", len = 25975708}, r2 = {s = 0x7ff1ad0deac0 "
\335\r\255\361\177", len = 7}, gr = {s = 0x1ffb <Address 0x1ffb out of
bounds>, len = -1394647486}, transport_val = {s = 0x2000 <Address 0x2000
out of bounds>, len = 0}, ttl_val = {s = 0x2010 <Address 0x2010 out of
bounds>, len = 0}, user_param_val = {s = 0x3 <Address 0x3 out of
bounds>, len = 2}, maddr_val = {s = 0x3000000010 <Address 0x3000000010
out of bounds>, len = 1453439792}, method_val = {s = 0x7fff56a1ba70
"\310\364s\254\361\177", len = 25975680}, lr_val = {s = 0xb0 <Address
0xb0 out of bounds>, len = -1391583616}, r2_val = {s = 0x2010 <Address
0x2010 out of bounds>, len = 25983888}, gr_val = {s = 0x2010 <Address
0x2010 out of bounds>, len = -1394813138}}
u = 0x7ff1ac7e2cb0
port = 0
dst_host = 0x7ff1ab59e040
i = 0
flags = 0
avp = 0x7ff1ac588010
st = {flags = 2730779824, id = 0, name = {n = 0, s = {s =
0x1013700000000 <Address 0x1013700000000 out of bounds>, len =
1453438901}, re = 0x1013700000000}, avp = 0x0}
sct = 0x5d
sjt = 0x7ff1ac7e2cb0
rve = 0x7ff1ac665670
mct = 0x7ff1ac7e2d0d
rv = 0x7ff1acdf6fee
rv1 = 0x7fff56a1baf0
c1 = {cache_type = 1453438912, val_type = 32767, c = {avp_val =
{n = -1394501785, s = {s = 0x7ff1ace19767 "\213D$8H\201\304\070\002",
len = 1453438816}, re = 0x7ff1ace19767}, pval = {rs = {s =
0x7ff1ace19767 "\213D$8H\201\304\070\002", len = 1453438816}, ri =
-1403518512, flags = 32753}}, i2s = '\000' <repeats 16 times>"\220,
\003\247\000\000"}
s = {s = 0x1813570 "`6\201\001", len = 0}
srevp = {0x0, 0x4}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
{type = NUMBER_ST, u = {number = 1, string = 0x1 <Address 0x1 out of
bounds>, str = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, data =
0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number
= 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data
= 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#14 0x000000000042a4c3 in run_actions (h=0x7fff56a1ca90,
a=0x7ff1ac6661b0, msg=0x7ff1ab59e040) at action.c:1548
t = 0x7ff1ac667830
ret = 1
mod = 0x7fff56a1d880
ms = 0
__FUNCTION__ = "run_actions"
#15 0x000000000041a833 in do_action (h=0x7fff56a1ca90, a=0x7ff1ac791718,
msg=0x7ff1ab59e040) at action.c:677
ret = -5
v = -1400908488
dst = {send_sock = 0xffffffffac7fd538, to = {s = {sa_family =
0, sa_data = "\000\000\000\000\000\000\030D]\254\361\177\000"}, sin =
{sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"\030D]\254\361\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"\030D]\254\361\177\000\000\001\000\000\000\000\000\000", __u6_addr16 =
{17432, 44125, 32753, 0, 1, 0, 0, 0}, __u6_addr32 = {2891793432, 32753,
1, 0}}}, sin6_scope_id = 1453441520}}, id = 32767, proto = -108 '\224',
send_flags = {f = 60 '<', blst_imask = 84 'T'}}
tmp = 0x7fff56a1cee0 ""
new_uri = 0x0
end = 0x0
crt = 0x7fff56a1c230 "\020D]\254\361\177"
cmd = 0x7ff1ac57f210
len = 1453441696
user = 32767
uri = {user = {s = 0x1ac7fd538 <Address 0x1ac7fd538 out of
bounds>, len = 487}, passwd = {s = 0x0, len = -1420173248}, host = {s =
0x7ff1ac7911c0 "\305\001", len = 1453441040}, port = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 0}, params =
{s = 0x100000000 <Address 0x100000000 out of bounds>, len = 0},
sip_params = {s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>,
len = 4316438}, headers = {s = 0x0, len = -1420173248}, port_no = 23936,
proto = 65, type = ERROR_URI_T, flags = 1453447296, transport = {s =
0x0, len = 0}, ttl = {s = 0x7fff56a1c0f0 "\360\301\241V\377\177", len =
4369192}, user_param = {s = 0x1e756a1c190 <Address 0x1e756a1c190 out of
bounds>, len = -1420173248}, maddr = {s = 0x7ff1ac7911c0 "\305\001", len
= 1453443728}, method = {s = 0x0, len = 1}, lr = {s = 0x7ff1ab59e040
"\265\230!", len = -579092726}, r2 = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 1453447296},
gr = {s = 0x0, len = 0}, transport_val = {s = 0x2754a248dcfbbf0a
<Address 0x2754a248dcfbbf0a out of bounds>, len = -506478838}, ttl_val =
{s = 0x7ff100000000 "", len = 498957366}, user_param_val = {s = 0x8
<Address 0x8 out of bounds>, len = -1400894488}, maddr_val = {s =
0x7ff1ac5c4110 "\002", len = 1453442120}, method_val = {s =
0x7ff1ac5d3d20 "\023", len = -1400908488}, lr_val = {s = 0x7ff1ac7fd538
"\300\217!", len = 0}, r2_val = {s = 0x7ff1ac7fd538 "\300\217!", len =
4283776}, gr_val = {s = 0x7fff56a1c1a0 "0áV\377\177", len = 5515810}}
next_hop = {user = {s = 0x12000001e7 <Address 0x12000001e7 out
of bounds>, len = 1453442016}, passwd = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 1453447296},
host = {s = 0x12 <Address 0x12 out of bounds>, len = 4283776}, port = {s
= 0x7fff56a1bfa0 "", len = 5538764}, params = {s = 0x0, len =
-1400908432}, sip_params = {s = 0x1e7ac7fd538 <Address 0x1e7ac7fd538 out
of bounds>, len = 1453440880}, headers = {s = 0x7ff1ac5d2080 "", len =
-1400908488}, port_no = 48768, proto = 22177, type = 32767, flags =
2881832090, transport = {s = 0x2754a248d8fbbf0a <Address
0x2754a248d8fbbf0a out of bounds>, len = 1453440880}, ttl = {s =
0x7ff1ac5d2080 "", len = -1400908488}, user_param = {s = 0x1800000000
<Address 0x1800000000 out of bounds>, len = -1403182976}, maddr = {s =
0x7fff56a1bef0 "\200]A", len = 5209162}, method = {s =
0xffffffff00000000 <Address 0xffffffff00000000 out of bounds>, len = 0},
lr = {s = 0x7ff1ac5dc308 "\022", len = -1400908488}, r2 = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 1453447296},
gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff56a1bfa0 "", len =
4367555}, ttl_val = {s = 0x7ff1ac7fd538 "\300\217!", len = -1420173248},
user_param_val = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 1453447296},
maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x7fff56a1bfe0
"\360\300\241V\377\177", len = 4367555}, lr_val = {s = 0x7fff56a1c000
"\300\021y\254\361\177", len = -1400908488}, r2_val = {s =
0x7ff1ac5e06c0 "u", len = 1453444832}, gr_val = {s = 0x7ff1ac5d2760
"\001", len = 0}}
u = 0x0
port = 0
dst_host = 0x7fff56a1c7d0
i = 19
flags = 300
avp = 0x7fff56a1ca90
st = {flags = 0, id = 32767, name = {n = 1453447296, s = {s =
0xfe56a1d880 <Address 0xfe56a1d880 out of bounds>, len = -1403227224},
re = 0xfe56a1d880}, avp = 0xac7fd538}
sct = 0x0
sjt = 0x0
rve = 0x0
mct = 0x7ff1ac7fd538
rv = 0x7ff1ac5c3978
rv1 = 0x415d80
c1 = {cache_type = 1453440512, val_type = 32767, c = {avp_val =
{n = -1400908488, s = {s = 0x7ff1ac7fd538 "\300\217!", len =
-1403210720}, re = 0x7ff1ac7fd538}, pval = {rs = {s = 0x7ff1ac7fd538
"\300\217!", len = -1403210720}, ri = -1403539360, flags = 32753}}, i2s
=
"\350\375]\254\361\177\000\000\000\000\000\000\000\000\000\000\f\000\000\000\377\377"}
s = {s = 0x1abc66047 <Address 0x1abc66047 out of bounds>, len =
4283776}
srevp = {0x7fff56a1bda0, 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
{type = NUMBER_ST, u = {number = 1, string = 0x1 <Address 0x1 out of
bounds>, str = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, data =
0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number
= 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data
= 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#16 0x000000000042a4c3 in run_actions (h=0x7fff56a1ca90,
a=0x7ff1ac7912e0, msg=0x7ff1ab59e040) at action.c:1548
t = 0x7ff1ac791718
ret = 1
mod = 0x56a1c430
ms = 0
__FUNCTION__ = "run_actions"
#17 0x000000000041dd16 in do_action (h=0x7fff56a1ca90, a=0x7ff1ac792988,
msg=0x7ff1ab59e040) at action.c:1044
ret = 1
v = 1
dst = {send_sock = 0x10a, to = {s = {sa_family = 0, sa_data =
"\000\000\000\000\000\000\000\000\200\000\000\000\000"}, sin =
{sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"\000\000\200\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"\000\000\200\000\000\000\000\000\300\aU\000\000\000\000", __u6_addr16 =
{0, 128, 0, 0, 1984, 85, 0, 0}, __u6_addr32 = {8388608, 0, 5572544,
0}}}, sin6_scope_id = 2331856}}, id = 0, proto = 64 '@', send_flags = {f
= 248 '\370', blst_imask = 42 '*'}}
tmp = 0x8 <Address 0x8 out of bounds>
new_uri = 0x109 <Address 0x109 out of bounds>
end = 0x7ff100000000 ""
crt = 0x8556a1c8b0 <Address 0x8556a1c8b0 out of bounds>
cmd = 0x7ff1ac8009c8
len = 1453443120
user = 32767
uri = {user = {s = 0x100415d80 <Address 0x100415d80 out of
bounds>, len = 0}, passwd = {s = 0x7fff00000000 <Address 0x7fff00000000
out of bounds>, len = -1445744562}, host = {s = 0x10c <Address 0x10c out
of bounds>, len = -1400908488}, port = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 1453447296},
params = {s = 0x0, len = 0}, sip_params = {s = 0x7fff56a1cc70
"\344͡V\377\177", len = 4316527}, headers = {s = 0x8 <Address 0x8 out of
bounds>, len = 0}, port_no = 51024, proto = 22177, type = 32767, flags =
6407651, transport = {s = 0x0, len = -1400878352}, ttl = {s = 0xa6ffad
"54880682rdb65099;fromcor=ejFwbUZxUmpUUFNBejFwbUZxUmpUUFNBejFwbUY->\r\nTo:
<sip:12283280382@216.158.87.230>;tag=2120f820bddfad05d33f3eb0c54af677-f15d\r\nFrom:
<sip:4159465707@192.104.111.65>;tag=sansay4054"..., len = 10944399},
user_param = {s = 0xa701b4 "", len = -1401072656}, maddr = {s = 0x0, len
= -1400908488}, method = {s = 0x7ff1ac5e0900 "v", len = 1453444832}, lr
= {s = 0x762540 "parse_to_param", len = 7734992}, r2 = {s = 0x30
<Address 0x30 out of bounds>, len = -1403711472}, gr = {s =
0x7ff1ac5511c8 "\370\344\177\254\361\177", len = -1400899168},
transport_val = {s = 0x400000007 <Address 0x400000007 out of bounds>,
len = 7733600}, ttl_val = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 6425939},
user_param_val = {s = 0x7fff56a1c770 "", len = -1403711472}, maddr_val =
{s = 0x7fff56a1c7c0 "Д#", len = -1443563814}, method_val = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 0}, lr_val =
{s = 0x800000 <Address 0x800000 out of bounds>, len = 6425939}, r2_val =
{s = 0x7fff56a1c7b0 "", len = -1403711472}, gr_val = {s = 0x7fff56a1c800
"0ȡV\377\177", len = -1443563814}}
next_hop = {user = {s = 0x456a1c548 <Address 0x456a1c548 out of
bounds>, len = -1400908488}, passwd = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 1453447296},
host = {s = 0x0, len = 0}, port = {s = 0x7fff56a1c670 "p̡V\377\177", len
= 5539092}, params = {s = 0x7fff56a1c740 "pǡV\377\177", len = 5418009},
sip_params = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 0}, headers =
{s = 0x800000 <Address 0x800000 out of bounds>, len = 5572896}, port_no
= 37856, proto = 35, type = ERROR_URI_T, flags = 2894058808, transport =
{s = 0xac5af230 <Address 0xac5af230 out of bounds>, len = 0}, ttl = {s =
0x7ff1ac7f9958 "\240\231\177\254\361\177", len = -1400908488},
user_param = {s = 0x7ff1ac7e2cb0
"[R-OUTBOUND-VENDOR-ROUTE-ADVANCE:968507771-0-290965380@192.104.111.66]
Transaction cancelled\n", len = 105}, maddr = {s = 0x7fff56a1c580
"\200]A", len = 4714192}, method = {s = 0x400000000 <Address 0x400000000
out of bounds>, len = -1400923816}, lr = {s = 0x7ff1ac5d5210 "\020", len
= -1400908488}, r2 = {s = 0x415d80
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300", len = 1453447296},
gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff56a1c670
"p̡V\377\177", len = 4367555}, ttl_val = {s = 0x76df10
"do_parse_rr_body", len = -1400908488}, user_param_val = {s = 0xffffffff
<Address 0xffffffff out of bounds>, len = -1400923816}, maddr_val = {s =
0x7ff1ac7f98c0 "", len = -1400908488}, method_val = {s = 0x7fff56a1c610
"", len = -1403711472}, lr_val = {s = 0x7fff56a1c660 "", len =
-1400908488}, r2_val = {s = 0x7ff1ac5e07e0 "v", len = 1453444832},
gr_val = {s = 0x800000 <Address 0x800000 out of bounds>, len = 0}}
u = 0x47eed0
port = 0
dst_host = 0x5ac551010
i = 0
flags = 32753
avp = 0x7ff100000000
st = {flags = 1453442272, id = 32767, name = {n = -1400923744,
s = {s = 0x7ff1ac7f99a0 "\370][\254\361\177", len = 4283776}, re =
0x7ff1ac7f99a0}, avp = 0x1e7}
sct = 0x7fff56a1c8f0
sjt = 0x61c5e3
rve = 0x7ff1ac790a38
mct = 0x13000000008
rv = 0x415d80
rv1 = 0x6f2654
c1 = {cache_type = 7303331, val_type = RV_NONE, c = {avp_val =
{n = -1403486192, s = {s = 0x7ff1ac588010 "", len = 0}, re =
0x7ff1ac588010}, pval = {rs = {s = 0x7ff1ac588010 "", len = 0}, ri = 0,
flags = 0}}, i2s =
"\b\303]\254\361\177\000\000\000\000\000\000\000\000\000\000\360\327\177\254\361\177"}
s = {s = 0x7ff1ac7f99a0 "\370][\254\361\177", len = -1400908488}
srevp = {0x7fff56a1c420, 0x7ff1ac7e2cb0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
{type = NUMBER_ST, u = {number = 1, string = 0x1 <Address 0x1 out of
bounds>, str = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, data =
0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number
= 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data
= 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#18 0x000000000042a4c3 in run_actions (h=0x7fff56a1ca90,
a=0x7ff1ac792988, msg=0x7ff1ab59e040) at action.c:1548
t = 0x7ff1ac792988
ret = -1
mod = 0x61c5e3
ms = 0
__FUNCTION__ = "run_actions"
#19 0x000000000042abf0 in run_top_route (a=0x7ff1ac792988,
msg=0x7ff1ab59e040, c=0x0) at action.c:1634
ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env =
{{__jmpbuf = {140675957904696, 2834068496558309130, 4283776,
140734646835328, 0, 0, 2834068496482811658, -2834435909128044790},
__mask_was_saved = 0, __saved_mask = {__val = {140675957740528,
10944776, 10944698, 10944706, 140675936383543, 2874794672,
140734646831936, 4669992, 0, 140667267710216, 140667267710224,
18446744070868028288, 11010080, 10043378560, 140675938639936, 0}}}}}
p = 0x7fff56a1ca90
ret = -1400908488
sfbk = 0
#20 0x00007ff1ab320c7a in run_failure_handlers (t=0x7fefa685fb58,
rpl=0x7ff1ac7fd538, code=487, extra_flags=64) at t_reply.c:987
faked_req = {id = 2201781, pid = 12918, tval = {tv_sec =
1440165795, tv_usec = 762181}, fwd_send_flags = {f = 0 '\000',
blst_imask = 0 '\000'}, rpl_send_flags = {f = 0 '\000', blst_imask = 0
'\000'}, first_line = {type = 1, flags = 1, len = 811, u = {request =
{method = {s = 0x7fefa68c7400 "INVITE
sip:12283280382@199.91.66.172:5060;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.17"...,
len = 6}, uri = {s = 0x7fefa68c7407
"sip:12283280382@199.91.66.172:5060;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip"...,
len = 794}, version = {s = 0x7fefa68c7722 "SIP/2.0\r\nVia: SIP/2.0/UDP
173.231.21.131:5060;branch=z9hG4bK379f.13c57ed4.0\r\nTo:
<sip:12283280382@216.158.87.230>\r\nFrom:
<sip:4159465707@192.104.111.65>;tag=sansay4054880682rdb65099\r\nCall-ID:
96850777"..., len = 7}, method_value = 1}, reply = {version = {s =
0x7fefa68c7400 "INVITE
sip:12283280382@199.91.66.172:5060;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.17"...,
len = 6}, status = {s = 0x7fefa68c7407
"sip:12283280382@199.91.66.172:5060;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip"...,
len = 794}, reason = {s = 0x7fefa68c7722 "SIP/2.0\r\nVia: SIP/2.0/UDP
173.231.21.131:5060;branch=z9hG4bK379f.13c57ed4.0\r\nTo:
<sip:12283280382@216.158.87.230>\r\nFrom:
<sip:4159465707@192.104.111.65>;tag=sansay4054880682rdb65099\r\nCall-ID:
96850777"..., len = 7}, statuscode = 1}}}, via1 = 0x7fefa68c79f8, via2 =
0x0, headers = 0x7fefa68c79b8, last_header = 0x7fefa68c8130, parsed_flag
= 18446744073709551615, h_via1 = 0x7fefa68c79b8, h_via2 = 0x0, callid =
0x7fefa68c7f80, to = 0x7fefa68c7b20, cseq = 0x7fefa68c7fc0, from =
0x7fefa68c7d38, contact = 0x7fefa68c8030, maxforwards = 0x7fefa68c80f0,
route = 0x0, record_route = 0x0, content_type = 0x7fefa68c8070,
content_length = 0x7fefa68c80b0, authorization = 0x0, expires = 0x0,
proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0,
unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0,
accept_language = 0x0, organization = 0x0, priority = 0x0, subject =
0x0, user_agent = 0x0, server = 0x0, content_disposition = 0x0,
diversion = 0x0, rpid = 0x7fefa68c8130, refer_to = 0x0, session_expires
= 0x0, min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0, date =
0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path =
0x0, privacy = 0x0, body = 0x0, eoh = 0x7fefa68c78d5
"\r\nv=0\r\no=Sansay-VSXi 188 1 IN IP4 192.104.111.65\r\ns=Session
Controller\r\nc=IN IP4 192.104.111.93\r\nt=0 0\r\nm=audio 25226 RTP/AVP
0 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101
telephone-event/8000\r\na=fmtp:101"..., unparsed = 0x7fefa68c78d5
"\r\nv=0\r\no=Sansay-VSXi 188 1 IN IP4 192.104.111.65\r\ns=Session
Controller\r\nc=IN IP4 192.104.111.93\r\nt=0 0\r\nm=audio 25226 RTP/AVP
0 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101
telephone-event/8000\r\na=fmtp:101"..., rcv = {src_ip = {af = 2, len =
4, u = {addrl = {2199250861, 0}, addr32 = {2199250861, 0, 0, 0}, addr16
= {59309, 33557, 0, 0, 0, 0, 0, 0}, addr = "\255\347\025\203", '\000'
<repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl =
{2890030023, 0}, addr32 = {2890030023, 0, 0, 0}, addr16 = {23495, 44098,
0, 0, 0, 0, 0, 0}, addr = "\307[B\254", '\000' <repeats 11
times>}},
src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 =
0, src_su = {s = {sa_family = 2, sa_data =
"\023ĭ\347\025\203\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
sin_port = 50195, sin_addr = {s_addr = 2199250861}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port =
50195, sin6_flowinfo = 2199250861, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address =
0x7ff1ac573620, proto = 1 '\001'}, buf = 0x7fefa68c7400 "INVITE
sip:12283280382@199.91.66.172:5060;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.17"...,
len = 1456, new_uri = {s = 0x7ff1ac800be8
"sip:3333#12283280382@216.158.87.228:5060;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172"...,
len = 800}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri
= {user = {s = 0x7fefa68c70e4
"3333#12283280382@216.158.87.228:5060;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;src"...,
len = 16}, passwd = {s = 0x0, len = 0}, host = {s = 0x7fefa68c70f5
"216.158.87.228:5060;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;"...,
len = 14}, port = {s = 0x7fefa68c7104
"5060;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66"...,
len = 4}, params = {s = 0x7fefa68c7109
"srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;"...,
len = 759}, sip_params = {s = 0x7ff1ac8013e1
"199.91.66.172;srcip=199.91.66.172", len = 759}, headers = {s = 0x0, len
= 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = 0, transport
= {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0,
len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr =
{s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0},
transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0},
user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val =
{s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok =
0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len
= 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s
= 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0,
len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0,
transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param =
{s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len =
0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len
= 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0},
user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val =
{s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm =
0x7fefa56aa190, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s =
'\000' <repeats 57 times>, add_to_branch_len = 0, hash_index = 63859,
msg_flags = 270544, flags = 0, set_global_address = {s = 0x0, len = 0},
set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, path_vec
= {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid =
{s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow =
{decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0},
addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000'
<repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0},
addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000'
<repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0,
proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000'
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr =
{s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 =
{sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u
= {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0,
0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}},
bind_address = 0x0, proto = 0 '\000'}}}}
shmem_msg = 0x7fefa68c69f8
on_failure = 2
__FUNCTION__ = "run_failure_handlers"
#21 0x00007ff1ab323903 in t_should_relay_response (Trans=0x7fefa685fb58,
new_code=487, branch=1, should_store=0x7fff56a1cde0,
should_relay=0x7fff56a1cde4, cancel_data=0x7fff56a1d030,
reply=0x7ff1ac7fd538) at t_reply.c:1342
branch_cnt = 2
picked_code = 487
new_branch = 32753
inv_through = 0
extra_flags = 64
i = -1522490609
replies_dropped = 0
__FUNCTION__ = "t_should_relay_response"
#22 0x00007ff1ab326488 in relay_reply (t=0x7fefa685fb58,
p_msg=0x7ff1ac7fd538, branch=1, msg_status=487,
cancel_data=0x7fff56a1d030, do_put_on_wait=1) at t_reply.c:1745
relay = 0
save_clone = 4283776
buf = 0x0
res_len = 0
relayed_code = 0
relayed_msg = 0x0
reply_bak = 0x7fefa48a12e0
bm = {to_tag_val = {s = 0x7fff56a1ce10 "0ΡV\377\177", len =
-1422827893}}
totag_retr = 0
reply_status = 32751
uas_rb = 0x7fff56a1ce30
to_tag = 0x7ff1ab316def
reason = {s = 0x56a1ce00 <Address 0x56a1ce00 out of bounds>,
len = 1024}
onsend_params = {req = 0x7fefa2c3e000, rpl = 0x7fefa2c3ee78,
param = 0xd300000000, code = -1534455072, flags = 32751, branch = 0,
t_rbuf = 0x7fff56a1ce60, dst = 0x1, send_buf = {s = 0x7fefa685fd18
"\001", len = 1024}}
__FUNCTION__ = "relay_reply"
#23 0x00007ff1ab32aaed in reply_received (p_msg=0x7ff1ac7fd538) at
t_reply.c:2430
msg_status = 487
last_uac_status = 100
ack = 0x7fefa48a12e0 "ACK
sip:88880000412283280382@108.59.2.155:5060;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91.66.172;srcip=199.91."...
ack_len = 1149
branch = 1
reply_status = -1403711016
onreply_route = 2
cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u =
{text = {s = 0x0, len = 10944776}, e2e_cancel = 0x0, packed_hdrs = {s =
0x0, len = 10944776}}}}
uac = 0x7fefa685ff10
t = 0x7fefa685fb58
lack_dst = {send_sock = 0x800000, to = {s = {sa_family = 65333,
sa_data = "\246\000\000\000\000\000\000\000\200\000\000\000\000"}, sin =
{sin_family = 65333, sin_port = 166, sin_addr = {s_addr = 0}, sin_zero =
"\000\000\200\000\000\000\000"}, sin6 = {sin6_family = 65333, sin6_port
= 166, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"\000\000\200\000\000\000\000\000Фw\254\361\177\000", __u6_addr16 = {0,
128, 0, 0, 42192, 44151, 32753, 0}, __u6_addr32 = {8388608, 0,
2893522128, 32753}}}, sin6_scope_id = 2329736}}, id = 0, proto = -64
'\300', send_flags = {f = 239 '\357', blst_imask = 42 '*'}}
backup_user_from = 0xa7fef0
backup_user_to = 0xa7fef8
backup_domain_from = 0xa7ff00
backup_domain_to = 0xa7ff08
backup_uri_from = 0xa7fee0
backup_uri_to = 0xa7fee8
backup_xavps = 0xa80020
replies_locked = 1
branch_ret = 0
prev_branch = -1400908456
blst_503_timeout = 32753
hf = 0x24856a1d100
onsend_params = {req = 0x7fff56a1cff0, rpl = 0x47eed0, param =
0x0, code = -1400889744, flags = 32753, branch = 0, t_rbuf = 0xa70108,
dst = 0xa6fedf, send_buf = {s = 0x7fff56a1d0b0 "\350\376\247", len =
6407651}}
ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env =
{{__jmpbuf = {140667234423520, 2834068496587669258, 4283776,
140734646835328, 0, 0, 2834068496646389514, -2834435909128044790},
__mask_was_saved = 0, __saved_mask = {__val = {0, 140734646833328,
6460751, 140734646833088, 140675915249370, 140734646833360, 0, 8388608,
5574856, 2329600, 2813752, 2833136, 8, 282, 140675915249370,
1400167727104}}}}}
__FUNCTION__ = "reply_received"
#24 0x000000000048dc54 in do_forward_reply (msg=0x7ff1ac7fd538, mode=0)
at forward.c:747
new_buf = 0x0
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
'\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0,
sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"},
sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr =
{__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0,
0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id
= 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0
'\000'}}
new_len = 1
r = 0
ip = {af = 1453445712, len = 32767, u = {addrl = {6487414, 0},
addr32 = {6487414, 0, 0, 0}, addr16 = {64886, 98, 0, 0, 0, 0, 0, 0},
addr = "v\375b", '\000' <repeats 12 times>}}
s = 0x32 <Address 0x32 out of bounds>
len = 0
__FUNCTION__ = "do_forward_reply"
#25 0x000000000048f297 in forward_reply (msg=0x7ff1ac7fd538) at
forward.c:849
No locals.
#26 0x000000000050b130 in receive_msg (buf=0xa6fec0 "SIP/2.0 487 Request
cancelled\r\nVia: SIP/2.0/UDP
199.91.66.172;branch=z9hG4bK379f.ae48c4c253d913f705a8d4b04a4941ed.1\r\nVia:
SIP/2.0/UDP
173.231.21.131:5060;branch=z9hG4bK379f.13c57ed4.0\r\nRecord-Route:
<"..., len=584, rcv_info=0x7fff56a1d450) at receive.c:255
msg = 0x7ff1ac7fd538
ctx = {rec_lev = 10258744, run_flags = 0, last_retcode = 0,
jmp_env = {{__jmpbuf = {0, 0, 0, 140675971621024, 1705102016513, 0,
170403418896, 10944128}, __mask_was_saved = 1453446232, __saved_mask =
{__val = {140675955242848, 12884901902, 140675955242848, 4283776,
140734646835328, 140734646834112, 6309050, 5748413344, 140667204692152,
140734646834080, 6304733, 140734646834368, 170234505400, 10944128,
6304861, 140734646834448}}}}}
ret = 1453446128
inb = {s = 0xa6fec0 "SIP/2.0 487 Request cancelled\r\nVia:
SIP/2.0/UDP
199.91.66.172;branch=z9hG4bK379f.ae48c4c253d913f705a8d4b04a4941ed.1\r\nVia:
SIP/2.0/UDP
173.231.21.131:5060;branch=z9hG4bK379f.13c57ed4.0\r\nRecord-Route:
<"..., len = 584}
__FUNCTION__ = "receive_msg"
#27 0x000000000060a3ea in udp_rcv_loop () at udp_server.c:495
len = 584
buf = "SIP/2.0 487 Request cancelled\r\nVia: SIP/2.0/UDP
199.91.66.172;branch=z9hG4bK379f.ae48c4c253d913f705a8d4b04a4941ed.1\r\nVia:
SIP/2.0/UDP
173.231.21.131:5060;branch=z9hG4bK379f.13c57ed4.0\r\nRecord-Route: <"...
tmp = 0xa6fe80 "75.135.118.221"
from = 0x7ff1ac77a280
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {2600614764, 0},
addr32 = {2600614764, 0, 0, 0}, addr16 = {15212, 39682, 0, 0, 0, 0, 0,
0}, addr = "l;\002\233", '\000' <repeats 11 times>}}, dst_ip = {af
= 2,
len = 4, u = {addrl = {2890030023, 0}, addr32 = {2890030023, 0, 0, 0},
addr16 = {23495, 44098, 0, 0, 0, 0, 0, 0}, addr = "\307[B\254", '\000'
<repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1
= 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data =
"\023\304l;\002\233\000\000\000\000\000\000\000"}, sin = {sin_family =
2, sin_port = 50195, sin_addr = {s_addr = 2600614764}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port =
50195, sin6_flowinfo = 2600614764, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address =
0x7ff1ac573620, proto = 1 '\001'}
__FUNCTION__ = "udp_rcv_loop"
#28 0x00000000004a7ef7 in main_loop () at main.c:1573
i = 6
pid = 0
si = 0x7ff1ac573620
si_desc = "udp receiver child=6
sock=199.91.66.172:5060\000\177\000\000\300աV\377\177\000\000\373\215N\000\000\000\000\000\023\b\000\000\377\177\000\000\260dĢ\357\177\000\000p֡V\377\177\000\000\260dĢ\357\177\000\000\200]A\000\000\000\000\000\200ءV\001\000\000\000\020֡V\377\177\000\000\236\216N\000\000\000\000"
nrprocs = 24
__FUNCTION__ = "main_loop"
#29 0x00000000004ae2d2 in main (argc=11, argv=0x7fff56a1d888) at main.c:2533
cfg_stream = 0x17f1010
c = -1
r = 0
tmp = 0x7fff56a1f964 ""
tmp_len = 32767
port = 1453447006
proto = 0
options = 0x704fb8
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
ret = -1
seed = 618280211
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x40d864
p = 0xc2 <Address 0xc2 out of bounds>
__FUNCTION__ = "main"
--
Alex Balashov | Principal | Evariste Systems LLC
303 Perimeter Center North, Suite 300
Atlanta, GA 30346
United States
Tel: +1-800-250-5920 (toll-free) / +1-678-954-0671 (direct)
Web:
http://www.evaristesys.com/,
http://www.csrpswitch.com/