(gdb) bt full #0 0x00000000004d7c4f in crcitt_string_array (dst=0x7fb458d06941 "66b7", src=0x7fff161351c0, size=2) at core/crc.c:237 i = 0 ccitt = 65535 c = 0x0 len = 10706350 str_len = 4 __FUNCTION__ = "crcitt_string_array" #1 0x00007fb458af54c1 in calc_crc_suffix (msg=0x7fb45cccf4d8, tag_suffix=0x7fb458d06941 "66b7") at ../../core/tags.h:55 ss_nr = 2 suffix_source = {{s = 0x0, len = 10706350}, {s = 0x0, len = 0}, {s = 0x417ad0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300pTs", len = 370376624}} #2 0x00007fb458af6114 in sl_reply_helper (msg=0x7fb45cccf4d8, code=400, reason=0x7fb457439828 "Missing Required Header in Request", tag=0x0) at sl_funcs.c:166 buf = {s = 0x0, len = 0} dset = {s = 0x0, len = 0} dst = {send_sock = 0x0, to = {s = {sa_family = 2, sa_data = "\023\304.\246\263\067\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 934520366}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 934520366, sin6_addr = {__in6_u = {__u6_addr8 = '\000' , __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0, blst_imask = 0}} dummy_bm = {to_tag_val = {s = 0x417ad0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300pTs", len = 370376624}} backup_mhomed = 32692 ret = 1556935896 text = {s = 0x7fb457439828 "Missing Required Header in Request", len = 34} backup_rt = 0 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1243967538, jmp_env = {{__jmpbuf = {140733563755152, 6738787, 7886016, 132727312, 7886016, 1537599782384, 7889841, 7886021}, __mask_was_saved = 56, __saved_mask = {__val = {140412626337808, 140733563755024, 30064771073, 0, 140412627784928, 7886016, 680160329744, 7889680, 7886021, 56, 140412627777400, 21474836480, 10706311, 0, 140411070840832, 140412627067872}}}}} pmsg = {id = 4294967295, pid = 0, tval = {tv_sec = 0, tv_usec = 8180}, fwd_send_flags = {f = 28722, blst_imask = 18981}, rpl_send_flags = {f = 0, blst_imask = 0}, first_line = {type = 31440, flags = 65, len = 0, u = {request = {method = {s = 0x7fff16137fb0 "\a", len = -713669696}, uri = { s = 0xc400000000
, len = -713666288}, version = {s = 0x0, len = 0}, method_value = 370366032}, reply = {version = {s = 0x7fff16137fb0 "\a", len = -713669696}, status = {s = 0xc400000000
, len = -713666288}, reason = {s = 0x0, len = 0}, statuscode = 370366032}}}, via1 = 0x7fff16135630, via2 = 0x7fff161355d8, headers = 0x85010f00e201, last_header = 0x7fb3d7290100, parsed_flag = 0, h_via1 = 0x7fb3d5be76c8, h_via2 = 0x5baaaa4b, callid = 0x78306, to = 0x59f9cb2513c40002, cseq = 0x0, from = 0x0, contact = 0x100000000, maxforwards = 0x350805f13c40002, route = 0x0, record_route = 0xffffffffffffffff, content_type = 0x7fb45cccf4d8, content_length = 0x7fb45cbc3728, authorization = 0x1e7dbeb964230002, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require = 0x1, proxy_require = 0x7fff16135410, unsupported = 0xa35db1 , allow = 0x0, event = 0xa35daf , accept = 0x1979030, accept_language = 0x4a257032, organization = 0x417ad0 <_start>, priority = 0x7fff16137fb0, subject = 0x0, user_agent = 0x0, server = 0x7fff16135480, content_disposition = 0x7fb457a9894b , diversion = 0x0, rpid = 0x4a257032, refer_to = 0x7fff161354c0, session_expires = 0x0, min_se = 0x7fb45cc16e98, sipifmatch = 0x7fb45cccf4d8, subscription_state = 0x7fff161354c0, date = 0xd533511b, identity = 0x7fb45cc16e98, identity_info = 0x0, pai = 0x7fff16135480, ppi = 0x4a257032, path = 0x417ad0 <_start>, privacy = 0x7fff16137fb0, min_expires = 0x0, body = 0x0, eoh = 0x7fff16135a80 "", unparsed = 0x43647c "\211\205D\376\377\377H\213\205x\372\377\377\213P\004\213\205D\376\377\377\205\300\017\224\300\017\266\300\t\302H\213\205x\372\377\377\211P\004\213\225D\376\377\377H\213\205x\372\377\377\211P\bH\213\205x\372\377\377\213@\b\211\005\232\362_", rcv = {src_ip = { af = 370365632, len = 32767, u = {addrl = {139839126499765, 140733563753664}, addr32 = {3581276597, 32558, 370365632, 32767}, addr16 = {61877, 54645, 32558, 0, 21696, 5651, 32767, 0}, addr = "\265\361u\325.\177\000\000\300T\023\026\377\177\000"}}, dst_ip = {af = 3581248631, len = 32691, u = {addrl = { 0, 198812463154}, addr32 = {0, 0, 1243967538, 46}, addr16 = {0, 0, 0, 0, 28722, 18981, 46, 0}, addr = "\000\000\000\000\000\000\000\000\062p%J.\000\000"}}, src_port = 21952, dst_port = 5651, proto_reserved1 = 32767, proto_reserved2 = -713684451, src_su = {s = {sa_family = 32691, sa_data = "\000\000\020\001\256\000'\000\000\000\240\251\213X"}, sin = {sin_family = 32691, sin_port = 0, sin_addr = {s_addr = 11403536}, sin_zero = "'\000\000\000\240\251\213X"}, sin6 = {sin6_family = 32691, sin6_port = 0, sin6_flowinfo = 11403536, sin6_addr = {__in6_u = { __u6_addr8 = "'\000\000\000\240\251\213X\264\177\000\000\340\366\314\\", __u6_addr16 = {39, 0, 43424, 22667, 32692, 0, 63200, 23756}, __u6_addr32 = {39, 1485547936, 32692, 1556936416}}}, sin6_scope_id = 32692}}, bind_address = 0x7fb45cccf4d8, proto = -24 '\350'}, buf = 0x7fff16135ba0 " \\\023\026\220\001", len = 4291280, new_uri = {s = 0x7fff16137fb0 "\a", len = 370365856}, dst_uri = {s = 0x7fb45866a1d5 "\351\025\003", len = 4291280}, parsed_uri_ok = 370376624, parsed_uri = {user = {s = 0x0, len = 0}, passwd = { s = 0x7fff16135730 "`W\023\026\377\177", len = 6730119}, host = {s = 0x7fff16135590 "", len = 1555496976}, port = {s = 0x8000000000001e2
, len = 1555496976}, params = {s = 0x7fff161355d0 "", len = 1497898071}, sip_params = { s = 0x417ad0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300pTs", len = 0}, headers = {s = 0x8000000
, len = 132725440}, port_no = 54480, proto = 13, type = ERROR_URI_T, flags = (unknown: 1492288), transport = {s = 0x19ddf0
, len = 8}, ttl = {s = 0x1f0
, len = 1557118392}, user_param = {s = 0x7fff16135600 "", len = 5931220}, maddr = {s = 0x0, len = 8094240}, method = {s = 0x8
, len = 1243967538}, lr = {s = 0x7fff16135700 "0W\023\026\377\177", len = 6696829}, r2 = { s = 0x7a9b10 "core", len = 5883622}, gr = {s = 0xa35e38 "AIB946AC236A3CF8E1\r\nCall-ID: AI00DC8FE96E72ECC7@192.168.13.20\r\nCSeq: 26672 OPTIONS\r\nMax-Forwards: 69\r\nAccept: application/sdp\r\nAllow: ACK,BYE,CANCEL,INVITE,NOTIFY,OPTIONS,PUBLISH,UPDATE,REFER,SUBSCRIB"..., len = 18}, transport_val = {s = 0x7fff16135694 "", len = 370367256}, ttl_val = {s = 0x7fb45cc22be0 "\023", len = 1556935896}, user_param_val = {s = 0x7fff16135660 "\310\374\301\\\264\177", len = 1556935896}, maddr_val = {s = 0x7fb45cc1fcc8 "\202\002", len = 1243967538}, method_val = {s = 0x7a9b10 "core", len = 370376624}, lr_val = {s = 0x7b212d <__FUNCTION__.7389> "rval_new_empty", len = 8035233}, r2_val = {s = 0x3b0
, len = 1555496976}, gr_val = {s = 0x19ddf0
, len = 1}}, parsed_orig_ruri_ok = 483, parsed_orig_ruri = {user = { s = 0x7fb45ccfbdb8 "\270\003", len = 370366192}, passwd = {s = 0x7fb45cb70010 "\001", len = 0}, host = {s = 0x4a257032
, len = 4291280}, port = {s = 0x7fff16137fb0 "\a", len = 0}, params = {s = 0x0, len = 370366256}, sip_params = { s = 0x62d9e0 "H\211E\360H\203", , len = 4291280}, headers = {s = 0x5e16137fb0
, len = 1557118448}, port_no = 58299, proto = 89, type = ERROR_URI_T, flags = (unknown: 370366304), transport = { s = 0x7fff16135b18 "\346\222g", len = 370366304}, ttl = {s = 0x62d908 "H\213E\370", , len = 0}, user_param = {s = 0x7fff16135b10 "\220[\023\026\377\177", len = 370367376}, maddr = {s = 0x630ffd "H\213E\310\351\221\002", len = 1487937504}, method = {s = 0x7fb458b014a7 "sl: sl_funcs.c", len = 1556952336}, lr = {s = 0x7fb45cb70010 "\001", len = 1}, r2 = {s = 0x0, len = 1556229080}, gr = {s = 0x258d06a00
, len = 1556935896}, transport_val = {s = 0x7fff161376e0 "\002", len = 0}, ttl_val = {s = 0x7fb45cb70010 "\001", len = 488}, user_param_val = {s = 0x7fb45ccd34d8 "\350\001", len = 10706375}, maddr_val = {s = 0x7fb3d5ea4050 "ǀ\340\n", len = 4291280}, method_val = {s = 0xc816137fb0
, len = 0}, lr_val = {s = 0x7fb3d672e738 "", len = 370368864}, r2_val = {s = 0x7fb458af72d2 "\270\001", len = 1695216}, gr_val = {s = 0x8
, len = 484}}, add_rm = 0x68b59d , body_lumps = 0x7fff16135870, reply_lump = 0x7fb45cc22bd0, add_to_branch_s = "\330\364\314\\\264\177\000\000\340v\023\026\377\177\000\000\000\000\000\000\310\000\000\000\330\364\314\\\264\177\000\000\220Y\023\026\377\177\000\000\062Kf\000\000\000\000\000\030\000\000\000\000\000\000\000\207\261", add_to_branch_len = 0, hash_index = 370366672, msg_flags = 32767, flags = 1555496976, set_global_address = {s = 0x7c68b0 "core", len = 1555496976}, set_global_port = {s = 0x7fff16135910 "@Y\023\026\377\177", len = 1497898071}, force_send_socket = 0xffffffff00a35f65, path_vec = {s = 0x0, len = 134217728}, instance = { s = 0x66b187 "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b", len = 370366752}, reg_id = 1555496976, ruid = {s = 0x19ddf0
, len = 1555496976}, location_ua = {s = 0x7fff16135960 "\220Y\023\026\377\177", len = 1497898071}, ldv = {flow = { decoded = 370366784, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {134217728, 132727200}, addr32 = {134217728, 0, 132727200, 0}, addr16 = {0, 2048, 0, 0, 16800, 2025, 0, 0}, addr = "\000\000\000\b\000\000\000\000\240A\351\a\000\000\000"}}, dst_ip = {af = 904688, len = 0, u = {addrl = {1490528, 1695216}, addr32 = {1490528, 0, 1695216, 0}, addr16 = {48736, 22, 0, 0, 56816, 25, 0, 0}, addr = "`\276\026\000\000\000\000\000\360\335\031\000\000\000\000"}}, src_port = 8, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 495, src_su = {s = {sa_family = 0, sa_data = "\000\000 \315\\\264\177\000\000\220Y\023\026"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 1556946976}, sin_zero = "\264\177\000\000\220Y\023\026"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 1556946976, sin6_addr = {__in6_u = { __u6_addr8 = "\264\177\000\000\220Y\023\026\377\177\000\000ԀZ", __u6_addr16 = {32692, 0, 22928, 5651, 32767, 0, 32980, 90}, __u6_addr32 = {32692, 370366864, 32767, 5931220}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 32 ' '}}}} __FUNCTION__ = "sl_reply_helper" #3 0x00007fb458af7320 in sl_send_reply (msg=0x7fb45cccf4d8, code=400, reason=0x7fb457439828 "Missing Required Header in Request") at sl_funcs.c:303 No locals. #4 0x00007fb45742902f in sanity_reply (msg=0x7fb45cccf4d8, code=400, reason=0x7fb457439828 "Missing Required Header in Request") at sanity.c:55 No locals. #5 0x00007fb45742b27b in check_required_headers (_msg=0x7fb45cccf4d8) at sanity.c:267 __FUNCTION__ = "check_required_headers" #6 0x00007fb4574385a4 in sanity_check (_msg=0x7fb45cccf4d8, msg_checks=1511, uri_checks=7) at sanity_mod.c:174 ret = 1 #7 0x00007fb4574387ea in w_sanity_check (_msg=0x7fb45cccf4d8, _number=0x5e7
, _arg=0x7
) at sanity_mod.c:254 ret = 1 check = 1511 arg = 7 __FUNCTION__ = "w_sanity_check" #8 0x000000000043650a in do_action (h=0x7fff16136400, a=0x7fb45cc3cca0, msg=0x7fb45cccf4d8) at core/action.c:1066 ret = -5 v = 1695216 dst = {send_sock = 0x7fb45cc34f18, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\000\000\000\b\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\b\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = { __in6_u = {__u6_addr8 = "\000\000\000\b\000\000\000\000x>\351\a\000\000\000", __u6_addr16 = {0, 2048, 0, 0, 15992, 2025, 0, 0}, __u6_addr32 = {134217728, 0, 132726392, 0}}}, sin6_scope_id = 905496}}, id = 0, proto = -120 '\210', send_flags = {f = 22, blst_imask = 0}} tmp = 0xb6973e3f885925a1
new_uri = 0x7fb45cc39320 "\276\002" end = 0x7a9b10 "core" crt = 0x4a257032
cmd = 0x7fb45cbd52c0 len = 928 user = -1 uri = {user = {s = 0x7fb45cc25f00 "\020", len = 370368920}, passwd = {s = 0x7fb45cccf4d8 "\253\357\001", len = 370374368}, host = {s = 0x417ad0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300pTs", len = 5891003}, port = {s = 0x0, len = 370368512}, params = { s = 0xffffffff16136040
, len = 6501767}, sip_params = {s = 0x7fff16136090 "\020a\023\026\377\177", len = 0}, headers = {s = 0x7fb45cc22000 "\001", len = 1556935896}, port_no = 39696, proto = 122, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 12), transport = {s = 0x7b2100 <__FUNCTION__.7365> "rval_destroy", len = 8035233}, ttl = {s = 0x7fb45ccdaa60 "\002", len = 1555496976}, user_param = {s = 0x417ad0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300pTs", len = 370376624}, maddr = {s = 0x0, len = 0}, method = { s = 0x7fff16136110 "\030\321\r", len = 4558147}, lr = {s = 0x7fff16136070 "", len = 1243967538}, r2 = {s = 0x7fb45cbd3778 "\201\026\254W\264\177", len = 370376624}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x10000000
, len = 1556935896}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7fff16136110 "\030\321\r", len = 6475675}, maddr_val = {s = 0x400000000
, len = 0}, method_val = {s = 0x7fff161360e0 "@a\023\026\377\177", len = 6730119}, lr_val = {s = 0x7fff16136100 "", len = 1555496976}, r2_val = { s = 0x7fb45cc21fe8 "\017", len = 1555496976}, gr_val = {s = 0x7fff16136140 "pa\023\026\377\177", len = 1497898071}} next_hop = {user = {s = 0x7fff16135f00 "p`\023\026\377\177", len = 6484214}, passwd = {s = 0x7fb45cc257d0 "\001", len = 370368548}, host = {s = 0x7fb45cccf4d8 "\253\357\001", len = 370374368}, port = {s = 0x4a257032
, len = 4291280}, params = { s = 0x7fff16135e90 "0_\023\026\377\177", len = 0}, sip_params = {s = 0x7fb45cc20318 "\004", len = 370368920}, headers = {s = 0x7fb45cccf4d8 "\253\357\001", len = 370374368}, port_no = 24208, proto = 5651, type = 32767, flags = (unknown: 5891080), transport = { s = 0x9597413900000039
, len = 370368512}, ttl = {s = 0x7fb45cc1e590 "\002", len = 1556935896}, user_param = {s = 0x7fff16135f30 "\362\001", len = -711476689}, maddr = {s = 0x417ad0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300pTs", len = 370376624}, method = {s = 0x7fff16135f40 "p_\023\026\377\177", len = 6730119}, lr = {s = 0x7fff16135f00 "p`\023\026\377\177", len = 1555496976}, r2 = {s = 0x7fb45cbb0e30 "46.166.179.55", len = 1243967538}, gr = {s = 0x417ad0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300pTs", len = 370376624}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x7fff16136070 "", len = 6503692}, user_param_val = {s = 0xdcd68
, len = 1490392}, maddr_val = {s = 0x19ddf0
, len = 8}, method_val = { s = 0x1f2
, len = 1556226240}, lr_val = {s = 0x7fff16135f70 "", len = 5931220}, r2_val = {s = 0x0, len = 1555510256}, gr_val = {s = 0x7600000000
, len = 1555510256}} ---Type to continue, or q to quit--- u = 0x0 port = 0 dst_host = 0x0 i = 370374368 flags = 0 avp = 0x7fb45cc39320 st = {flags = 4291280, id = 0, name = {n = 10706316, s = {s = 0xa35d8c " SIP/2.0\nTo: 0\nVia: SIP/2.0/UDP :]\n\r\n", len = 370368216}, re = 0xa35d8c }, avp = 0x7fb45cbb0e30} sct = 0x0 sjt = 0x7fff16137fb0 rve = 0x7fff161362a0 mct = 0x417ad0 <_start> rv = 0x100000000d rv1 = 0x7fb45cccf4d8 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 370368256}, re = 0x0}, pval = {rs = {s = 0x0, len = 370368256}, ri = 6502029, flags = 0}}, i2s = "\330\364\314\\\264\177\000\000ؘ\301\\\264\177\000\000\330\366\314\\\264\177"} s = {s = 0x417ad0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300pTs", len = 370376624} srevp = {0x7fff00000000, 0x4a257032} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #9 0x0000000000442ba7 in run_actions (h=0x7fff16136400, a=0x7fb45cc3cca0, msg=0x7fb45cccf4d8) at core/action.c:1552 t = 0x7fb45cc3cca0 ret = -1 mod = 0x0 ms = 0 __FUNCTION__ = "run_actions" #10 0x0000000000443284 in run_actions_safe (h=0x7fff161376e0, a=0x7fb45cc3cca0, msg=0x7fb45cccf4d8) at core/action.c:1620 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {1243967538, -5289690794683718239, 4291280, 140733563764656, 0, 0, -5289690794713078367, 5289779651776292257}, __mask_was_saved = 0, __saved_mask = {__val = {1243967538, 4291280, 140733563764656, 0, 0, 140733563758064, 6502029, 4291280, 140733563764656, 0, 6730119, 140733563757808, 140412626337808, 4291280, 140412626337808, 140733563757872}}}}} ret = 2 ign_on_break = 0 #11 0x000000000062f0f6 in rval_get_int (h=0x7fff161376e0, msg=0x7fb45cccf4d8, i=0x7fff16136888, rv=0x7fb45cc3d8d8, cache=0x0) at core/rvalue.c:912 r_avp = 0x7fb45cc255d8 avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0} pval = {rs = {s = 0x7fff16136680 "", len = 6703922}, ri = 0, flags = 0} tmp = {s = 0x7600000000
, len = 1555510256} s = 0x0 r = 32692 ret = 0 destroy_pval = 0 __FUNCTION__ = "rval_get_int" #12 0x000000000063368d in rval_expr_eval_int (h=0x7fff161376e0, msg=0x7fb45cccf4d8, res=0x7fff16136888, rve=0x7fb45cc3d8d0) at core/rvalue.c:1910 i1 = 0 i2 = 4 ret = -1 c1 = {cache_type = 1518500249, val_type = 1518500249, c = {avp_val = {n = 1243967538, s = {s = 0x4a257032
, len = 4291280}, re = 0x4a257032}, pval = {rs = {s = 0x4a257032
, len = 4291280}, ri = 370376624, flags = 32767}}, i2s = '\000' , "`g\023\026\377\177"} c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = -718013627}, re = 0x0}, pval = {rs = {s = 0x0, len = -718013627}, ri = 1518500249, flags = 1518500249}}, i2s = "\242\357\034\"\231y\202\332 _\303\\\264\177\000\000(_\303\\\264\177"} rv1 = 0x62cf9b rv2 = 0x7fff16136700 __FUNCTION__ = "rval_expr_eval_int" #13 0x0000000000633acb in rval_expr_eval_int (h=0x7fff161376e0, msg=0x7fb45cccf4d8, res=0x7fff16136d10, rve=0x7fb45cc3d0b8) at core/rvalue.c:1918 i1 = 0 i2 = 0 ret = -1 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 4624394, s = {s = 0x46900a "\211Eȃ}\310\377\017\224\300\017\266\300H\205\300\017\204\304\006", len = 370370688}, re = 0x46900a }, pval = {rs = { s = 0x46900a "\211Eȃ}\310\377\017\224\300\017\266\300H\205\300\017\204\304\006", len = 370370688}, ri = 1556935896, flags = 32692}}, i2s = "0\363\301\\\264\177\000\000\340v\023\026\377\177\000\000\000\000\000\000\000"} c2 = {cache_type = 2992413567, val_type = 3847146789, c = {avp_val = {n = 0, s = {s = 0x0, len = 134217728}, re = 0x0}, pval = {rs = {s = 0x0, len = 134217728}, ri = 132725632, flags = 0}}, i2s = "\020\324\r\000\000\000\000\000\200\304\026\000\000\000\000\000\360\335\031\000\000"} rv1 = 0x7fb45cc34ef8 rv2 = 0x7fb45cc35f20 __FUNCTION__ = "rval_expr_eval_int" #14 0x0000000000435ecf in do_action (h=0x7fff161376e0, a=0x7fb45cc3e5c8, msg=0x7fb45cccf4d8) at core/action.c:1030 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 28722, sa_data = "%J\377\377\377\377\320zA\000\000\000\000"}, sin = {sin_family = 28722, sin_port = 18981, sin_addr = {s_addr = 4294967295}, sin_zero = "\320zA\000\000\000\000"}, sin6 = {sin6_family = 28722, sin6_port = 18981, sin6_flowinfo = 4294967295, sin6_addr = {__in6_u = {__u6_addr8 = "\320zA\000\000\000\000\000\062p%J\000\000\000", __u6_addr16 = {31440, 65, 0, 0, 28722, 18981, 0, 0}, __u6_addr32 = {4291280, 0, 1243967538, 0}}}, sin6_scope_id = 4291280}}, id = 8, proto = 32 ' ', send_flags = {f = 54579, blst_imask = 32691}} tmp = 0x0 new_uri = 0x0 end = 0x7fff16136d50 "\377\377\377\377" crt = 0x0 cmd = 0x0 len = 0 user = 0 uri = {user = {s = 0x15
, len = 1690710585}, passwd = {s = 0x1979030 "", len = 4290224}, host = {s = 0x76
, len = 1537911378}, port = {s = 0x3
, len = 0}, params = {s = 0x0, len = 1690711439}, sip_params = {s = 0x1979030 "", len = 0}, headers = {s = 0x7fff16136c90 "p34ճ\177", len = 370371536}, port_no = 18, proto = 0, type = 36, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 20), transport = {s = 0x7600000008
, len = 2}, ttl = {s = 0x1
, len = 7200}, user_param = {s = 0x1921000 "CEST", len = 0}, maddr = { s = 0xa35e4b "\nCall-ID: AI00DC8FE96E72ECC7@192.168.13.20\r\nCSeq: 26672 OPTIONS\r\nMax-Forwards: 69\r\nAccept: application/sdp\r\nAllow: ACK,BYE,CANCEL,INVITE,NOTIFY,OPTIONS,PUBLISH,UPDATE,REFER,SUBSCRIBE\r\nAllow-Events: pr"..., len = 4290224}, method = { s = 0x7fff16136d90 "\220o\023\026\377\177", len = 7908062}, lr = {s = 0x3
, len = 0}, r2 = {s = 0x0, len = 1690711439}, gr = {s = 0x7fff16136c80 "ުx", len = 40}, transport_val = {s = 0x7fff16136d30 "\002", len = 370371696}, ttl_val = {s = 0x0, len = 0}, user_param_val = { s = 0x78aade "ERROR", len = -718013790}, maddr_val = {s = 0x7fb3d5343370 <__FUNCTION__.13071> "sip_trace_prepare", len = 0}, method_val = {s = 0x7fb45cccf6f8 "_\200P\003", len = 0}, lr_val = {s = 0x0, len = 370372272}, r2_val = {s = 0x7fff16136e90 "", len = 1556935896}, gr_val = {s = 0x0, len = 0}} next_hop = {user = {s = 0xffffffff
, len = 1690052647}, passwd = {s = 0x1ff4
, len = 26710064}, host = {s = 0x7fb464f2d760 "", len = 1691288805}, port = { s = 0x197903c "23:36:18 kamailio[18696]: ERROR: siptrace [siptrace.c:535]: sip_trace_prepare(): cannot parse FROM header\n", len = 1693629120}, params = {s = 0x8
, len = 1691282951}, sip_params = { s = 0x197903c "23:36:18 kamailio[18696]: ERROR: siptrace [siptrace.c:535]: sip_trace_prepare(): cannot parse FROM header\n", len = 1690464002}, headers = {s = 0x3639363831000080
, len = 8187}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 26709456), transport = {s = 0x7fb3d533fb20 "%s: %s%s(): cannot parse FROM header\n", len = 370371672}, ttl = {s = 0x0, len = 21}, user_param = {s = 0xffffffff
, len = 1690052647}, maddr = {s = 0x1ff4
, len = 26710064}, method = {s = 0x7fb464f2d760 "", len = 26710048}, lr = {s = 0x7fff16136c58 "(", len = 128}, r2 = {s = 0x77
, len = 1690244946}, gr = {s = 0x0, len = 8208}, transport_val = {s = 0x0, len = 1537911378}, ttl_val = {s = 0x2000
, len = 26709456}, user_param_val = {s = 0x7fff16136b70 "0\220\227\001", len = -718013664}, maddr_val = {s = 0x7fff16136c58 "(", len = 26709456}, method_val = {s = 0x0, len = 1690739581}, lr_val = {s = 0x7fff16136c58 "(", len = 26709456}, r2_val = {s = 0xffffffff
, len = -718013664}, gr_val = {s = 0x7fff16136c58 "(", len = 0}} u = 0x0 port = 0 dst_host = 0x0 i = 0 flags = 0 ---Type to continue, or q to quit--- avp = 0x0 st = {flags = 0, id = 14385, name = {n = 26709456, s = {s = 0x1978dd0 "\270\327\362d\264\177", len = 8142192}, re = 0x1978dd0}, avp = 0x7fff16136bb8} sct = 0xffffffff sjt = 0x7fb45cccf4d8 rve = 0x7fb45cc3d0b8 mct = 0x0 rv = 0x1ffb rv1 = 0x0 c1 = {cache_type = 26349568, val_type = RV_NONE, c = {avp_val = {n = 370371008, s = {s = 0x7fff161369c0 "p=|", len = 8}, re = 0x7fff161369c0}, pval = {rs = {s = 0x7fff161369c0 "p=|", len = 8}, ri = 1691282951, flags = 32692}}, i2s = "<\220\227\001\000\000\000\000\002o\302d\264\177\000\000\200\000\000\061\070\066"} s = {s = 0x7fb464f2b2e0 <_nl_C_LC_TIME> "\325\377\316d\264\177", len = 370371408} srevp = {0x7fff16136bd0, 0x7fff161369a0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #15 0x0000000000442ba7 in run_actions (h=0x7fff161376e0, a=0x7fb45cc19768, msg=0x7fb45cccf4d8) at core/action.c:1552 t = 0x7fb45cc3e5c8 ret = 1 mod = 0x1c16137fb0 ms = 0 __FUNCTION__ = "run_actions" #16 0x0000000000432e4f in do_action (h=0x7fff161376e0, a=0x7fb45cbebcd0, msg=0x7fb45cccf4d8) at core/action.c:678 ret = -5 v = 10706755 dst = {send_sock = 0x7fff16137460, to = {s = {sa_family = 39398, sa_data = "h", '\000' }, sin = {sin_family = 39398, sin_port = 104, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 39398, sin6_port = 104, sin6_flowinfo = 0, sin6_addr = { __in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000X%\315\\\264\177\000", __u6_addr16 = {0, 0, 0, 0, 9560, 23757, 32692, 0}, __u6_addr32 = {0, 0, 1556948312, 32692}}}, sin6_scope_id = 10706353}}, id = 0, proto = -103 '\231', send_flags = {f = 163, blst_imask = 0}} tmp = 0x16bdd8
new_uri = 0x1f3
end = 0x19ddf0
crt = 0xdcd68
cmd = 0x7fb45cbdeec0 len = 0 user = 132727336 uri = {user = {s = 0x7fb45cc8c410 "\001", len = 1556655496}, passwd = {s = 0x7fff16137372 "\002\002", len = 370373491}, host = {s = 0xa35f65 "", len = 10706386}, port = {s = 0x7d1190 <__FUNCTION__.6586> "parse_via", len = 8185520}, params = {s = 0x40
, len = 1555496976}, sip_params = {s = 0x200417ad0
, len = 1}, headers = {s = 0x0, len = 1556655440}, port_no = 29600, proto = 5651, type = 83918847, flags = (unknown: 370373484), transport = {s = 0x45cccf4d8
, len = 10706375}, ttl = { s = 0x400417ad0
, len = 8177840}, user_param = { s = 0xa35dcb ";rport;branch=z9hG4bK_AI2018Sep25361233449\r\nTo: \r\nFrom: ;tag=AIB946AC236A3CF8E1\r\nCall-ID: AI00DC8FE96E72ECC7@192.168.13.20\r\nCSeq: 26672 OPTIONS\r\nMax-For"..., len = 6730119}, maddr = { s = 0x7fff161374b0 "\020v\023\026\377\177", len = 7008909}, method = {s = 0x0, len = 1555496976}, lr = {s = 0x7fff16137380 "\260s\023\026\377\177", len = 1497898071}, r2 = {s = 0x7fff161373d0 "`t\023\026\377\177", len = 0}, gr = {s = 0x8000000
, len = 1556661264}, transport_val = {s = 0xa35db1 "", len = 10706336}, ttl_val = {s = 0x19ddf0
, len = 8}, user_param_val = {s = 0x20201f2
, len = 1556661208}, maddr_val = {s = 0x7fff161373b0 "\260t\023\026\377\177", len = 5931220}, method_val = { s = 0x0, len = 8094240}, lr_val = {s = 0x0, len = 1243967538}, r2_val = {s = 0x7fff161374b0 "\020v\023\026\377\177", len = 6696829}, gr_val = {s = 0x7c68b0 "core", len = 10706755}} next_hop = {user = {s = 0x19ddf0
, len = 8}, passwd = {s = 0x1e1
, len = 4680525}, host = {s = 0x7fff16137120 "@r\023\026\377\177", len = 5931220}, port = {s = 0x0, len = 1555501856}, params = { s = 0x2b00000000
, len = 1555501856}, sip_params = {s = 0x7fff16137240 "\320s\023\026\377\177", len = 6703922}, headers = {s = 0x7fff16137210 "\260\310|", len = 1493126676}, port_no = 1, proto = 0, type = 32691, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 6730116), transport = {s = 0x7fff16137190 "", len = 1555496976}, ttl = {s = 0xffffffff00a35dc7
, len = 1555496976}, user_param = {s = 0x7fff161371d0 "", len = 1497898071}, maddr = { s = 0x80000000000000
, len = 0}, method = {s = 0x8000000
, len = 132727656}, lr = {s = 0xdcc28
, len = 1490072}, r2 = {s = 0x40019ddf0
, len = 8177840}, gr = { s = 0x1f1
, len = 1556655440}, transport_val = {s = 0x7fff16137300 "\260t\023\026\377\177", len = 6963939}, ttl_val = {s = 0x0, len = 8094240}, user_param_val = {s = 0x0, len = 1243967538}, maddr_val = {s = 0x7fff16137300 "\260t\023\026\377\177", len = 6696829}, method_val = {s = 0x7cc8b0 "core", len = 1243967538}, lr_val = {s = 0x7fff16137320 "\200s\023\026\377\177", len = 6696829}, r2_val = {s = 0x62
, len = 1556935896}, gr_val = {s = 0x7fff161373d0 "`t\023\026\377\177", len = 1492702566}} u = 0x8000000 port = 0 dst_host = 0x7fff16137570 i = 9 flags = 0 avp = 0xdcc08 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 134217728}, re = 0x0}, avp = 0x7e93b68} sct = 0xe8 sjt = 0x7c6d38 rve = 0x7fff161375b0 mct = 0x7c97ea <__FUNCTION__.6394> rv = 0x7fb459481c57 rv1 = 0x7fb459481c57 c1 = {cache_type = 825375280, val_type = 3289652, c = {avp_val = {n = 6730119, s = {s = 0x66b187 "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b", len = 370372784}, re = 0x66b187 }, pval = {rs = { s = 0x66b187 "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b", len = 370372784}, ri = 1555496976, flags = 32692}}, i2s = "\000\000\000\000udp:\020\000\267\\\264\177\000\000\360p\023\026\377\177"} s = {s = 0x312e32363a736c74
, len = 892415538} srevp = {0x7fff16137050, 0x17} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #17 0x0000000000442ba7 in run_actions (h=0x7fff161376e0, a=0x7fb45cbeb7f8, msg=0x7fb45cccf4d8) at core/action.c:1552 t = 0x7fb45cbebcd0 ret = 1 mod = 0x7c6d38 ms = 0 __FUNCTION__ = "run_actions" #18 0x000000000044334c in run_top_route (a=0x7fb45cbeb7f8, msg=0x7fb45cccf4d8, c=0x0) at core/action.c:1641 ctx = {rec_lev = 2, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {1243967538, -5289690794302036575, 4291280, 140733563764656, 0, 0, -5289690794213956191, 5289779651776292257}, __mask_was_saved = 0, __saved_mask = {__val = {4294967296, 140733563762544, 140412568716109, 4302808816, 15, 15, 0, 140733563762592, 140412568716460, 4291280, 0, 4611686022722355200, 140412627776728, 140733563762640, 5083376, 4299258576}}}}} p = 0x7fff161376e0 ret = 0 sfbk = 0 #19 0x0000000000560659 in receive_msg (buf=0xa35d80 "INVITE sip:0 SIP/2.0\nTo: 0\nVia: SIP/2.0/UDP :]\n\r\n", len=49, rcv_info=0x7fff16137aa0) at core/receive.c:264 msg = 0x7fb45cccf4d8 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {0, 0, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 167503724544, 10771840, 140733563763368, 0, 55834574851, 1243967538, 4291280, 140733563764656, 140733563763200, 4598061, 0, 0, 1}}}}} bctx = 0x461ae5 ret = 0 stats_on = 0 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 0, tz_dsttime = 0} diff = 0 ---Type to continue, or q to quit--- inb = {s = 0xa35d80 "INVITE sip:0 SIP/2.0\nTo: 0\nVia: SIP/2.0/UDP :]\n\r\n", len = 49} netinfo = {data = {s = 0x0, len = 0}, dst = 0x0, rcv = 0x0} keng = 0x0 __FUNCTION__ = "receive_msg" #20 0x0000000000468f4f in udp_rcv_loop () at core/udp_server.c:515 len = 49 buf = "INVITE sip:0 SIP/2.0\nTo: 0\nVia: SIP/2.0/UDP :]\n\r\n\000.0/UDP 192.168.13.20:5060;rport;branch=z9hG4bK_AI2018Sep25361233449\r\nTo: \r\nFrom: ;tag=AIB946AC236A3CF8"... tmp = 0xa45d80 "62.12.152.250" from = 0x7fb45cca1068 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {934520366, 140733563763584}, addr32 = {934520366, 0, 370375552, 32767}, addr16 = {42542, 14259, 0, 0, 31616, 5651, 32767, 0}, addr = ".\246\263\067\000\000\000\000\200{\023\026\377\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {55607391, 0}, addr32 = { 55607391, 0, 0, 0}, addr16 = {32863, 848, 0, 0, 0, 0, 0, 0}, addr = "_\200P\003", '\000' }}, src_port = 52023, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\313\067.\246\263\067\000\000\000\000\000\000\000"}, sin = { sin_family = 2, sin_port = 14283, sin_addr = {s_addr = 934520366}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 14283, sin6_flowinfo = 934520366, sin6_addr = {__in6_u = {__u6_addr8 = '\000' , __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = { 0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7fb45cbc3728, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #21 0x00000000004229f9 in main_loop () at main.c:1623 i = 15 pid = 0 si = 0x7fb45cbc3728 si_desc = "udp receiver child=15 sock=95.128.80.3:5060\000\263\177\000\000\006\000\000\000\000\000\000\000H\242}[\264\177\000\000P|\023\026\377\177\000\000@\253qֳ\177\000\000\360\022\301U\264\177\000\000\320\373\312\\\264\177\000\000p\342\300U\264\177\000\000\003\000\000\000\000\000\000\000\004\000\000\000\000\000\000\000\000\340\272ճ\177\000" nrprocs = 20 woneinit = 1 __FUNCTION__ = "main_loop" #22 0x0000000000429f5d in main (argc=7, argv=0x7fff16137fb8) at main.c:2642 cfg_stream = 0x18a7010 c = -1 r = 0 tmp = 0x7fff16138724 "" tmp_len = 0 port = 0 proto = 0 options = 0x7388e0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 2257233624 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x2 p = 0x0 st = {st_dev = 19, st_ino = 1699034, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1520196478, tv_nsec = 865352763}, st_mtim = {tv_sec = 1536532931, tv_nsec = 244914079}, st_ctim = {tv_sec = 1536532931, tv_nsec = 244914079}, __unused = {0, 0, 0}} __FUNCTION__ = "main" (gdb)