<!--
Kamailio Project uses GitHub Issues only for bugs in the code or feature requests.
If you have questions about using Kamailio or related to its configuration file,
ask on sr-users mailing list:
*
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
If you have questions about developing extensions to Kamailio or its existing
C code, ask on sr-dev mailing list
*
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
Please try to fill this template as much as possible for any issue. It helps the
developers to troubleshoot the issue.
If you submit a feature request (or enhancement), you can delete the text of
the template and only add the description of what you would like to be added.
If there is no content to be filled in a section, the entire section can be removed.
You can delete the comments from the template sections when filling.
You can delete next line and everything above before submitting (it is a comment).
-->
### Description
<!--
Explain what you did, what you expected to happen, and what actually happened.
-->
Segmentation fault when sip_trace method is called with less then 2 arguments.
### Troubleshooting
The problem does not happen if either "xheaders_write" module param is set to
zero or we provide both arguments to sip_trace method.
#### Reproduction
<!--
If the issue can be reproduced, describe how it can be done.
-->
<pre>
..
# ----- siptrace params -----
modparam("siptrace", "trace_on", 1)
modparam("siptrace", "hep_mode_on", 0)
modparam("siptrace", "xheaders_write", 1)
modparam("siptrace", "trace_to_database", 0)
modparam("siptrace", "trace_flag", FLT_SIP_TRACE)
modparam("siptrace", "traced_user_avp",
"$avp(traced_user)")
modparam("siptrace", "duplicate_uri",
"WEBRTC_SIP_TRACE_ADDRESS")`
..
request_route {
..
sip_trace("WEBRTC_SIP_TRACE_ADDRESS");
setflag(FLT_SIP_TRACE);
..
}
..
</pre>
#### Debugging Data
<!--
If you got a core dump, use gdb to extract troubleshooting data - full backtrace,
local variables and the list of the code at the issue location.
gdb /path/to/kamailio /path/to/corefile
bt full
info locals
list
If you are familiar with gdb, feel free to attach more of what you consider to
be relevant.
-->
```
#0 0xb766b417 in _IO_vfprintf_internal (s=0xbfedc5e0,
format=0xb19c7a28 "X-Siptrace-Fromip: %.*s\r\nX-Siptrace-Toip:
%.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir:
%s\r\n",
ap=0xbfedc6fc "\025") at vfprintf.c:1629
len = <optimized out>
string_malloced = <optimized out>
step0_jumps = {0, -13653, -13579, -13501, -13418, -13344, -13248, -13024, -12733,
-12367, -12140, -11875, -11660, -3450, -3880, -3819, -3480, -3465, -9946,
-2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, -3593, -11660, -13100}
space = 0
is_short = 0
use_outdigits = 0
step1_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, -12367, -12140, -11875, -11660, -3450,
-3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058,
-1997, -3269, -3593, -11660, 0}
group = 0
prec = -1
step2_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -12140, -11875, -11660, -3450, -3880,
-3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058,
-1997, -3269, -3593, -11660, 0}
string = 0x9 <Address 0x9 out of bounds>
left = 0
is_long_double = -1074936024
width = <optimized out>
step3a_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -11961, 0, 0, 0, -3880, -3819,
-3480, -3465, -9946, 0, 0, 0, 0, -3349, 0, 0, 0, 0, 0, 0}
alt = 0
showsign = 0
is_long = 0
is_char = 0
pad = <optimized out>
step3b_jumps = {0 <repeats 11 times>, -11660, 0, 0, -3880, -3819, -3480,
-3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, 0, 0, 0}
step4_jumps = {0 <repeats 14 times>, -3880, -3819, -3480, -3465, -9946,
-2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, 0, 0, 0}
is_negative = -1074936028
base = 0
the_arg = {pa_wchar = -1074927268 L'\xbfede95c', pa_int = -1074927268,
pa_long_int = -1074927268, pa_long_long_int = -4616814309237986980,
pa_u_int = 3220040028, pa_u_long_int = 3220040028, pa_u_long_long_int =
13829929764471564636, pa_double = -0.93064534650992981,
pa_long_double = 3.3942842958442789709117117072106753e-4719, pa_string =
0xbfede95c "s\351\316", <incomplete sequence \370>,
pa_wstring = 0xbfede95c L"\xf8cee973", pa_pointer = 0xbfede95c,
pa_user = 0xbfede95c}
spec = <optimized out>
_buffer = {__routine = 0xbfede95c, __arg = 0xbfedc5d8, __canceltype = -1217805458,
__prev = 0x0}
_avail = 0
thousands_sep = 0x0
grouping = 0xffffffff <Address 0xffffffff out of bounds>
f = <optimized out>
lead_str_end = 0xb19c7a3b "%.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time:
%llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n"
work_buffer = "_\262f\267
\307\355\277\242u\201\266\000\000\000\000\000\000\000\000h.~\266h.~\266|.~\266\252.~\266h.~\266\252.~\266\000\000\000\000\242u\201\266
", '\000' <repeats 12 times>"\370,
\201\202\266\000\000\000\000\304\301\355\277", '\000' <repeats 20
times>"\334,
\307\355\277\000\000\000\000\000\000\000\000\004\000\000\000\377\377\377\377\355G\202\266\bp\342\266\304\301\355\277\304i\202\266-i\001\262",
'\000' <repeats 20 times>"\340,
\326x\267\000\000\000\000\000\000\000\000
\201\202\266\000\000\000\000h\302\355\277\215\034\202\266\002", '\000'
<repeats 23 times>,
"L\310\355\277\000\000\000\000\000\000\000\000\004\000\000\000\003\000\000\000\020\310\355\277\377\377\377\377\377\377\377\377\034'4\267c\302\355\277\000<g\267h.~\266C\000\000\000̥z\266\\\302\355\277h\023~\266\030\303\355\277`\306\355\277\250\242z\266\241u\201\266\000\000\000\000D\335f\267\000\000\000\000\232u\201\266\000\000\000\000H\310\355\277\016\000\000\000\232u\201\266\063\204i\267\261Q'\b,\\;\b\004\000\000\000\000*\000\000\001\000\000\000$\311\355\277\001\000\000\000\364"...
workstart = 0x0
workend = 0xbfedc520 "\250\205 \267\260\205 \267"
ap_save = 0xbfedc6fc "\025"
nspecs_done = 5
save_errno = 0
readonly_format = 0
args_malloced = 0x0
specs = <optimized out>
specs_malloced = false
jump_table =
"\001\000\000\004\000\016\000\006\000\000\a\002\000\003\t\000\005\b\b\b\b\b\b\b\b\b\000\000\000\000\000\000\000\032\000\031\000\023\023\023\000\035\000\000\f\000\000\000\000\000\000\025\000\000\000\000\022\000\r\000\000\000\000\000\000\032\000\024\017\023\023\023\n\017\034\000\v\030\027\021\026\f\000\025\033\020\000\000\022\000\r"
__PRETTY_FUNCTION__ = "_IO_vfprintf_internal"
#1 0xb768ede0 in _IO_vsnprintf (
string=0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip:
udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method:
REGISTER\r\nX-Siptrace-Dir: ", maxlen=512,
format=0xb19c7a28 "X-Siptrace-Fromip: %.*s\r\nX-Siptrace-Toip:
%.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir:
%s\r\n",
args=0xbfedc6fc "\025") at vsnprintf.c:120
sf = {f = {_sbf = {_f = {_flags = -72515583,
_IO_read_ptr = 0xb716a787 "X-Siptrace-Fromip:
udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time:
1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ",
_IO_read_end = 0xb716a787 "X-Siptrace-Fromip:
udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time:
1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ",
_IO_read_base = 0xb716a787 "X-Siptrace-Fromip:
udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time:
1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ",
_IO_write_base = 0xb716a787 "X-Siptrace-Fromip:
udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time:
1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", _IO_write_ptr =
0xb716a82a "", _IO_write_end = 0xb716a986 "",
_IO_buf_base = 0xb716a787 "X-Siptrace-Fromip:
udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time:
1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", _IO_buf_end =
0xb716a986 "", _IO_save_base = 0x0, _IO_backup_base = 0x0, _IO_save_end = 0x0,
_markers = 0x0,
_chain = 0x0, _fileno = -1074936088, _flags2 = 0, _old_offset = 5,
_cur_column = 0, _vtable_offset = 0 '\000', _shortbuf = "", _lock =
0x0,
_offset = 593186573409608927, _codecvt = 0x23e, _wide_data = 0xb19c47b0,
_freeres_list = 0x0, _freeres_buf = 0x5, _freeres_size = 0, _mode = -1,
_unused2 =
"`b<\b\vl;\b?\000\000\000ha<\b\224\066*\267\\\344\355\277\364\066*\267H\320\355\277\375x\234\261\204\065*\267"},
vtable = 0xb778d6e0},
_s = {_allocate_buffer = 0, _free_buffer = 0xffffffff}},
overflow_buf =
"\000\000\000\000\004\000\000\000\375x\234\261a\245\026\267)\002\000\000<\270j\267\210\247\026\267\000\000\000\000\001\000\000\000\000y\234\261\004\000\000\000\000\000\000\000`\245\026\267\000\000\000\000\002\000\000\000\375x\234\261"}
ret = 0
#2 0xb7673cf2 in __snprintf (
s=0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip:
udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method:
REGISTER\r\nX-Siptrace-Dir: ", maxlen=512,
format=0xb19c7a28 "X-Siptrace-Fromip: %.*s\r\nX-Siptrace-Toip:
%.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir:
%s\r\n")
at snprintf.c:35
done = 0
#3 0xb19ae7c3 in sip_trace_xheaders_write (sto=0xbfedc924) at siptrace.c:594
buf = 0xb716a548 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP
185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS
6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"...
bytes_written = 0
eoh = 0xb716a787 "X-Siptrace-Fromip:
udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time:
1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: "
eoh_offset = 0
new_eoh = 0x0
__FUNCTION__ = "sip_trace_xheaders_write"
#4 0xb19b01fe in sip_trace_store (sto=0xbfedc924, dst=0x0, correlation_id_str=0x0) at
siptrace.c:750
__FUNCTION__ = "sip_trace_store"
ret = -1
#5 0xb19b64bd in sip_trace (msg=0xb72a3584, dst=0x0, correlation_id_str=0x0, dir=0x9
<Address 0x9 out of bounds>) at siptrace.c:1151
sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state =
{flags = 257, id = 75, name = {n = -1226220299, s = {
s = 0xb6e95cf5 "traced_user)", len = 11}, re = 0xb6e95cf5}, avp
= 0x0}, body = {
s = 0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP
185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS
6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len =
577}, callid = {
s = 0x848866f "0b5l88q765nk5ahdvqqd1a\r\nCSeq: 202
REGISTER\r\nWWW-Authenticate: Digest realm=\"acs.dummy.com\",
nonce=\"5a24acbba41b8f45ded1be19fc13951d5438c8e0\"\r\nServer: OpenSER
(1.3.4-notls (i386/linux))\r\nContent-Len"..., len = 22}, method = {
s = 0x8488691 "REGISTER\r\nWWW-Authenticate: Digest
realm=\"acs.dummy.com\",
nonce=\"5a24acbba41b8f45ded1be19fc13951d5438c8e0\"\r\nServer: OpenSER
(1.3.4-notls (i386/linux))\r\nContent-Length: 0\r\n\r\n", len = 8}, status = {
s = 0x8488508 "401 Unauthorized\r\nVia: SIP/2.0/UDP
185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS
6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK3573981\r\nT"...,
len = 3}, dir = 0x9 <Address 0x9 out of bounds>, fromtag = {
s = 0x848865a "coqoo7bgrr\r\nCall-ID: 0b5l88q765nk5ahdvqqd1a\r\nCSeq: 202
REGISTER\r\nWWW-Authenticate: Digest realm=\"acs.dummy.com\",
nonce=\"5a24acbba41b8f45ded1be19fc13951d5438c8e0\"\r\nServer: OpenSER
(1.3.4-notls (i386"..., len = 10}, fromip = {s = 0xbfedc9bc
"udp:185.18.45.53:5060", len = 21}, totag = {
s = 0x84885f8 "f585cd8bc1f6d3796bfeb421b703352f.8488\r\nFrom:
\"James Howlett\"
<sip:998100601189@172.16.171.60>;tag=coqoo7bgrr\r\nCall-ID:
0b5l88q765nk5ahdvqqd1a\r\nCSeq: 202 REGISTER\r\nWWW-Authenticate: Digest
realm=\"acs.a"..., len = 37}, toip = {s = 0xbfedc988
"udp:185.18.45.115:5060", len = 22},
toip_buff = "udp:185.18.45.115:5060", '\000' <repeats 29
times>, fromip_buff = "udp:185.18.45.53:5060", '\000' <repeats 30
times>, tv = {
tv_sec = 1512352655, tv_usec = 48676}, stat = 0x70}
snd_inf = 0x0
__FUNCTION__ = "sip_trace"
#6 0x08078b06 in do_action (h=0xbfede244, a=0xb712fe5c, msg=0xb72a3584) at
core/action.c:1054
ret = -5
v = 2
dst = {send_sock = 0x9cf, to = {s = {sa_family = 65456, sa_data =
"<\b\372\317'\b\304\322\355\277\000\000\000"}, sin = {sin_family = 65456,
sin_port = 2108,
sin_addr = {s_addr = 136826874}, sin_zero =
"\304\322\355\277\000\000\000"}, sin6 = {sin6_family = 65456, sin6_port = 2108,
sin6_flowinfo = 136826874,
sin6_addr = {__in6_u = {__u6_addr8 =
"\304\322\355\277\000\000\000\000\034\000\000\000\\U\002\266", __u6_addr16 =
{53956, 49133, 0, 0, 28, 0, 21852,
46594}, __u6_addr32 = {3220034244, 0, 28, 3053606236}}}, sin6_scope_id
= 0}}, id = -1074927268, proto = -88 '\250', send_flags = {f = 49133,
blst_imask = 28680}}
tmp = 0x8274cdd "\270"
new_uri = 0xb72a3a18 "\200"
end = 0x8274cdd "\270"
crt = 0xbfedd408
"\b\325\355\277\371C\b\bD\342\355\277\\\376\022\267\204\065*\267\220\032=\b\vl;\b\317\t"
cmd = 0xb6e8ab64
len = 0
user = 0
uri = {user = {s = 0xb23c3d00 "", len = 8388608}, passwd = {s = 0x285e8c
<Address 0x285e8c out of bounds>, len = 4531876}, host = {
s = 0x57a174 <Address 0x57a174 out of bounds>, len = 5755668}, port = {s
= 0x4 <Address 0x4 out of bounds>, len = 8}, params = {s = 0x0,
len = -1226674168}, sip_params = {s = 0xbfedd208 "\001", len =
135116871}, headers = {s = 0x0, len = 0}, port_no = 53768, proto = 49133, type =
136793309,
flags = 3068293128, transport = {s = 0xb71997d4 " ", len =
-1217821645}, ttl = {s = 0x0, len = -1223059524}, user_param = {
s = 0x3c0 <Address 0x3c0 out of bounds>, len = 1}, maddr = {s = 0x0, len
= 5}, method = {s = 0x0, len = -1074932984}, lr = {
s = 0x8197d1c
"\205\300\017\237\300\017\266ЋE\020\211\020\213E\b\213@\004\211\302\203\342\371\213E\b\211P\004\351\341\004",
len = -1074929084}, r2 = {
s = 0xb712f764 "\255\r", len = -1221970556}, gr = {s = 0x80db847
"\211E\364\213E\364\351\373\001", len = 0}, transport_val = {s = 0x0, len =
-1074933160},
ttl_val = {s = 0x8274cdd "\270", len = -1226674168}, user_param_val =
{s = 0xb71caee4 "l", len = -1245326265}, maddr_val = {s = 0x0, len =
-1222857012},
method_val = {s = 0xa0 <Address 0xa0 out of bounds>, len = -1074932952},
lr_val = {s = 0x8275535 "\213E܃\300\034\351\a\003", len = 5}, r2_val = {s =
0x0,
len = 32}, gr_val = {s = 0x83d1a90 "core: core/parser/parse_via.c",
len = 138112011}}
next_hop = {user = {s = 0xb6dfb1d5
"U\211\345S\203\354\024\350\372\343\377\377\201ÿ\263\002", len = -1226848018},
passwd = {s = 0x0, len = -1074932385},
host = {s = 0xa <Address 0xa out of bounds>, len = 0}, port = {s = 0x0,
len = -1074931896}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 2},
headers = {s = 0xb73a2138 "h\037:\267\006", len = 0}, port_no = 65535,
proto = 65535, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = -1074927268},
ttl = {s = 0xbfedd158 "\204\065*\267\240\070*\267", len =
-1221970284}, user_param = {s = 0xbfede45c "\020", len = -1221970188}, maddr =
{
s = 0xbfedd218
"\b\323\355\277\034}\031\bD\342\355\277d\367\022\267\204\065*\267G\270\r\b", len
= 134761067}, method = {s = 0xbfedd160 "",
len = -1223493788}, lr = {s = 0xb72a3584 "\001", len = -1221969760},
r2 = {s = 0x0, len = 0}, gr = {s = 0x1 <Address 0x1 out of bounds>,
len = -1221970284}, transport_val = {s = 0xbfede45c "\020", len =
-1221970188}, ttl_val = {
s = 0xbfedd148
"\030\322\355\277kJ\b\b`\321\355\277d\367\022\267\204\065*\267\240\070*\267",
len = -1281299135}, user_param_val = {
s = 0x7881ec2e <Address 0x7881ec2e out of bounds>, len = 0}, maddr_val =
{s = 0xb72a377c "", len = -1226674168}, method_val = {s = 0xbfedd3c0
"\260\237W",
len = -1226183112}, lr_val = {s = 0xbfedd1d8
"\b\322\355\277G\270\r\b", len = -1232975437}, r2_val = {s = 0xb6e27008
"\001", len = -1074933324}, gr_val = {
s = 0xbfedd278 "\260\377<\b\372\317'\b\304\322",
<incomplete sequence \355\277>, len = -1313472512}}
u = 0x80db847
port = 49133
dst_host = 0xfa20d
i = -1226674168
flags = 0
avp = 0x0
st = {flags = 3220033768, id = 0, name = {n = 0, s = {s = 0x0, len = -1226821088},
re = 0x0}, avp = 0xb6dfb190}
sct = 0xb72a3694
sjt = 0xb774731f
rve = 0x4
mct = 0xbfede45c
rv = 0x0
rv1 = 0x8
c1 = {cache_type = RV_CACHE_EMPTY, val_type = 3078153004, c = {avp_val = {n =
-1074933548, s = {s = 0xbfedd0d4 "\350\320", <incomplete sequence
\355\277>,
len = -1218077169}, re = 0xbfedd0d4}, pval = {rs = {s = 0xbfedd0d4
"\350\320", <incomplete sequence \355\277>, len = -1218077169}, ri =
-1216814292,
flags = -1074933564}}, i2s =
",\343x\267D\340x\267\304\320\355\277\377\377\377\377\000\000\000\000\000"}
s = {s = 0xb778e0bc "\303~6\033\b", len = -1216815116}
srevp = {0xb7659c74, 0xb778e0c0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#7 0x080843f9 in run_actions (h=0xbfede244, a=0xb712fe5c, msg=0xb72a3584) at
core/action.c:1552
t = 0xb712fe5c
ret = -1
mod = 0x4
ms = 0
__FUNCTION__ = "run_actions"
#8 0x08078a8a in do_action (h=0xbfede244, a=0xb712ff08, msg=0xb72a3584) at
core/action.c:1045
ret = 1
v = 1
dst = {send_sock = 0xbfedddd4, to = {s = {sa_family = 13301, sa_data =
"|\267\000\000\000\000\270\230\031\267\304\002\000"}, sin = {sin_family =
13301,
sin_port = 46972, sin_addr = {s_addr = 0}, sin_zero =
"\270\230\031\267\304\002\000"}, sin6 = {sin6_family = 13301, sin6_port =
46972,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"\270\230\031\267\304\002\000\000\070\336\355\277\065U'\b", __u6_addr16 =
{39096, 46873, 708, 0,
56888, 49133, 21813, 2087}, __u6_addr32 = {3071908024, 708,
3220037176, 136795445}}}, sin6_scope_id = 5}}, id = 0, proto = 4 '\004',
send_flags = {
f = 46946, blst_imask = 11736}}
tmp = 0xb72a36f4 ""
new_uri = 0xb77d7908 ""
end = 0xbfedde84 "\377\377\377\377\364o}\267<Y\005\b\005"
crt = 0xbfede45c "\020"
cmd = 0xbfede45c
len = -1221970284
user = -1218240796
uri = {user = {s = 0x83bd30c "core", len = 4}, passwd = {s = 0xb71cadb0
"\001", len = 138149819}, host = {s = 0x2000007e <Address 0x2000007e out of
bounds>,
len = 4096}, port = {s = 0x0, len = -1222857296}, params = {s = 0xb71caf00
"\001", len = -1221969600}, sip_params = {s = 0xb72a3728 "",
len = -1221969516}, headers = {s = 0xb72a38ec "", len =
-1217109483}, port_no = 33272, proto = 46722, type = 136826874, flags = 3220036884,
transport = {
s = 0x0, len = 28}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0},
maddr = {s = 0xb6e27008 "\001", len = 0}, method = {s = 0x0,
len = -1074930376}, lr = {s = 0xb68249b3 "\213\223\324\a", len =
-1226674168}, r2 = {
s = 0xbfeddd14
"\344\036c\267\020ii\rT\335\355\277v-|\267\060\312c\267\262\300\005\b", len =
0}, gr = {s = 0x0, len = 0}, transport_val = {
s = 0xb7631ee4 "\032L", len = 225011984}, ttl_val = {s = 0xbfeddd54
"\324\335\355\277\365\063|\267", len = -1216598666}, user_param_val = {
s = 0xb763ca30 "GLIBC_2.0", len = 134594738}, maddr_val = {s =
0x1000 <Address 0x1000 out of bounds>, len = 134567646}, method_val = {
s = 0xb7629020 "\262\300\005\b\020ii\r", len = -1074987006}, lr_val
= {s = 0xb77c8ab0 "\205\300u\344\203\304\b\270\001", len = 134567646}, r2_val =
{
s = 0xb77b7c30 "libresolv.so.2", len = -1216516108}, gr_val = {
s = 0xb762c9a8
"\227\201B\250|`\234|\374Qcq\\zy\360\003\346`\033|\231/\310Km\301\243\353\372\266=/\222\210\353",
<incomplete sequence \352>, len = 3}}
next_hop = {user = {s = 0xffffffff <Address 0xffffffff out of bounds>, len =
138138380}, passwd = {s = 0x4 <Address 0x4 out of bounds>, len = -1223059220},
host = {s = 0x83bffc9 "get_hdr_field", len = 135}, port = {s =
0x83bd30c "core", len = -1074930680}, params = {s = 0x8274cdd "\270",
len = -1226674168},
sip_params = {s = 0xb71cab74 "\b", len = 35}, headers = {s = 0x0, len
= -1222857892}, port_no = 1040, proto = 0, type = 3220036824, flags = 136795445,
transport = {s = 0x5 <Address 0x5 out of bounds>, len = 1}, ttl = {s =
0xb8 <Address 0xb8 out of bounds>, len = -1230656743}, user_param = {
s = 0x83b6c0b "fragm. from qm_malloc", len = -1222857616}, maddr =
{s = 0xc9 <Address 0xc9 out of bounds>, len = -1226674168}, method = {
s = 0xb73a2298 "", len = -1222857684}, lr = {s = 0xb68281f8
<incomplete sequence \320>, len = -1230628236}, r2 = {s = 0xb6a5ab19 "core:
db_id.c",
len = -1217105105}, gr = {s = 0xb6a61a74 "@\331\002", len =
-1230774707}, transport_val = {
s = 0x848856c ".0\r\nVia: SIP/2.0/WSS
6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK3573981\r\nTo:
<sip:998100601189@172.16.171.60>;tag=f585cd8bc1f6d3796bfeb421b703352f.8488\r\nFrom:
\"James Howlett\""..., len = 1}, ttl_val = {s = 0x6f <Address 0x6f out
of bounds>, len = -1222857212},
user_param_val = {s = 0x0, len = -1222857324}, maddr_val = {s = 0x0, len =
138970480}, method_val = {s = 0x10002 <Address 0x10002 out of bounds>, len = 26},
lr_val = {
s = 0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP
185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS
6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len =
0}, r2_val = {s = 0xbfede45c "\020", len = -1221970188}, gr_val = {
s = 0xbfeddf18 "h\340\355\277P\230\031\267\204\065*\267\002", len =
136893382}}
u = 0x0
port = 2114
dst_host = 0x5
i = 134567476
flags = -1
avp = 0x5
st = {flags = 138970945, id = 38528, name = {n = -1221970284, s = {s = 0xb72a3694
"\002", len = -1074928548}, re = 0xb72a3694}, avp = 0xb72a36f4}
sct = 0x805593c
sjt = 0xb77b7c98
rve = 0xb712faa0
mct = 0xb7629020
rv = 0x84885d3
rv1 = 0x0
c1 = {cache_type = RV_CACHE_EMPTY, val_type = 3072997108, c = {avp_val = {n =
-1074930152, s = {s = 0xbfedde18 "\210\337\355\277PY<\266", len =
136889644},
re = 0xbfedde18}, pval = {rs = {s = 0xbfedde18
"\210\337\355\277PY<\266", len = 136889644}, ri = -1226674168, flags =
-1223058892}},
i2s = "`\327;\b\273\377;\bO\001\000\000\f\323;\b\221\206H\b\231\206"}
s = {s = 0x4 <Address 0x4 out of bounds>, len = 126}
srevp = {0x579ca4, 0x57d314}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#9 0x080843f9 in run_actions (h=0xbfede244, a=0xb712ff08, msg=0xb72a3584) at
core/action.c:1552
t = 0xb712ff08
ret = -1
mod = 0x0
ms = 0
__FUNCTION__ = "run_actions"
#10 0x08084b03 in run_top_route (a=0xb712ff08, msg=0xb72a3584, c=0xbfede244) at
core/action.c:1641
ctx = {rec_lev = 0, run_flags = 126, last_retcode = 0, jmp_env = {{__jmpbuf = {14,
0, 0, 0, 94, 0}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 0,
0, 0, 0, 0, 0, 3061963914, 3062006264, 3220038748, 3220037764,
3061964261, 35, 1, 4, 3072110084, 3220038180, 2310458, 3220037784, 3061965435, 35, 1,
4, 3220037832, 136011880, 3072996740, 1073741828, 0, 135068986,
3072996740}}}}}
p = 0xbfede244
ret = -1222607340
sfbk = 0
#11 0x0815f9ce in receive_msg (
buf=0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP
185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS
6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len=577,
rcv_info=0xbfede3fc) at core/receive.c:327
msg = 0xb72a3584
ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf =
{-1221970284, -1074928548, -1221970188, -1074929688, -1279414975, 2021780526},
__mask_was_saved = 0, __saved_mask = {__val = {3078323352, 3078453512,
4294967295, 3078451188, 134568902, 5, 3220038336, 3078388710, 3078453952,
3076689952, 1, 5, 0, 5, 134567476, 138561348, 0, 3076746516, 1546143882,
0, 3220040028, 3220038488, 3078412688, 3220038664, 3077676560, 50195,
3078453512, 1104, 136655121, 0, 1546143882, 3220038424}}}}}
bctx = 0x80559e6
ret = 1
stats_on = 0
tvb = {tv_sec = -1074928848, tv_usec = -1216513344}
tve = {tv_sec = 134568902, tv_usec = -1216516108}
tz = {tz_minuteswest = -1218219948, tz_dsttime = 134538164}
diff = 0
inb = {
s = 0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP
185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS
6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len =
577}
netinfo = {data = {s = 0xbfede2b0 "\024mc\267\212H(\\", len =
-1074929048}, dst = 0xbfede274, rcv = 0xb7629020}
keng = 0x0
__FUNCTION__ = "receive_msg"
#12 0x0825a456 in udp_rcv_loop () at core/udp_server.c:515
len = 577
buf = "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP
185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS
6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"...
tmp = 0x834e413 "counters_prefork_init"
from = 0xb71cad60
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {892171861, 4, 1546143882, 1},
addr32 = {892171861, 4, 1546143882, 1}, addr16 = {30293, 13613, 4, 0, 18570,
23592, 1, 0}, addr =
"Uv-5\004\000\000\000\212H(\\\001\000\000"}}, dst_ip = {af = 2, len = 4, u =
{addrl = {1932359253, 0, 0, 0}, addr32 = {
1932359253, 0, 0, 0}, addr16 = {30293, 29485, 0, 0, 0, 0, 0, 0}, addr =
"Uv-s", '\000' <repeats 11 times>}}, src_port = 5060, dst_port =
5060,
proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data
= "\023\304Uv-5\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
sin_port = 50195, sin_addr = {s_addr = 892171861}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195,
sin6_flowinfo = 892171861, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0,
0, 0}}}, sin6_scope_id = 0}}, bind_address = 0xb6e7896c, proto = 1
'\001'}
__FUNCTION__ = "udp_rcv_loop"
#13 0x080693c6 in main_loop () at main.c:1623
i = 1
pid = 0
si = 0xb6e7896c
si_desc = "udp receiver child=1
sock=185.18.45.115:5060\000\000\000\000\004\000\000\000\b\347\355\277\212H(\\\001\000\000\000\212H(\\\210\346\355\277L\343'\bd\204\271\261\004\000\000\000\031\251\066\b\350\272\066\bq\000\000\000\264\247\066\b\b\020\000\000y\221f\266\070\200
\267\277\064\300\265\230\061\301\265\f\200\001\262\f\034\300\265"
nrprocs = 4
woneinit = 1
__FUNCTION__ = "main_loop"
#14 0x080708ac in main (argc=13, argv=0xbfedead4) at main.c:2643
cfg_stream = 0x8e7a008
c = -1
r = 0
tmp = 0xbfee090d ""
tmp_len = 1
port = 0
proto = 0
options = 0x83422fc
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 4174309747
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0xbfedea00
p = 0x805d5ec "[\201\303$o<"
st = {st_dev = 14, __pad1 = 0, st_ino = 6140, st_mode = 16832, st_nlink = 2,
st_uid = 0, st_gid = 0, st_rdev = 0, __pad2 = 0, st_size = 60, st_blksize = 4096,
st_blocks = 0, st_atim = {tv_sec = 1510541218, tv_nsec = 950311164}, st_mtim =
{tv_sec = 1512352641, tv_nsec = 828578904}, st_ctim = {tv_sec = 1512352652,
tv_nsec = 920812953}, __unused4 = 0, __unused5 = 0}
__FUNCTION__ = "main"
```
#### Log Messages
<!--
Check the syslog file and if there are relevant log messages printed by Kamailio, add them
next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->
```
Dec 4 02:57:35 webrtc-as-rct kernel: [1811495.918954] kamailio[15829] segfault at 9 ip
b766b417 sp bfedbffc error 4 in libc-2.13.so[b762a000+161000]
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15901]: CRITICAL: <core>
[core/pass_fd.c:277]: receive_fd(): EOF on 24
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15826]: ALERT: <core> [main.c:743]:
handle_sigs(): child process 15829 exited by a signal 11
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15826]: ALERT: <core> [main.c:746]:
handle_sigs(): core was generated
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15826]: INFO: <core> [main.c:768]:
handle_sigs(): terminating due to SIGCHLD
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15899]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15897]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15895]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15893]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15891]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15888]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15887]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15885]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15865]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15861]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15871]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15867]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15873]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15875]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15881]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15877]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15879]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15883]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15901]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15846]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15849]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15840]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15844]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15848]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15842]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15856]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15860]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15854]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15858]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15852]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15834]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15835]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15830]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15836]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15828]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15831]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15837]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15832]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15833]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15869]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Dec 4 02:57:35 webrtc-as-rct adx-webrtc[15826]: INFO: <core> [core/sctp_core.c:53]:
sctp_core_destroy(): SCTP API not initialized
```
#### SIP Traffic
<!--
If the issue is exposed by processing specific SIP messages, grab them with ngrep or save
in a pcap file, then add them next, or attach to issue, or provide a link to download them
(e.g., to a pastebin site).
-->
```
N/A
```
### Possible Solutions
<!--
If you found a solution or workaround for the issue, describe it. Ideally, provide a pull
request with a fix.
-->
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
```
version: kamailio 5.0.4 (i386/linux)
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE,
USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC,
DBG_SR_MEMORY, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR,
USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024,
BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, select.
id: unknown
compiled on 11:05:34 Dec 1 2017 with gcc 4.7.2
```
* **Operating System**:
<!--
Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04,
CentOS 7.1, ...), MacOS, xBSD, Solaris, ...;
Kernel details (output of `uname -a`)
-->
```
Linux webrtc-as-rct 3.10-0.bpo.2-686-pae #1 SMP Debian 3.10.5-1~bpo70+1 (2013-08-11) i686
GNU/Linux
```
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1351