Hello,
Situation:
Use a client (MCU) to call other clients through kamailio and hang up these calls, repeatedly
Suddenly some clients were found fail to register,
crash on kamailio was confirmed after checking the following log:
Jan 7 03:42:24 /kamailio[1425]: CRITICAL: [pass_fdc:293]: receive_fd(): EOF on 11
Jan 7 03:42:24 /kamailio[1415]: ALERT: [mainc:784]: handle_sigs(): child process 1416 exited by a signal 6
Jan 7 03:42:24 /kamailio[1415]: ALERT: [mainc:787]: handle_sigs(): core was generated
And here is the bt full
output from the coredump file:
#0 0x401cd8e8 in raise () from /lib/libcso6
No symbol table info available
#1 0x401d171c in abort () from /lib/libcso6
No symbol table info available
#2 0x401c6bf0 in assert_fail_base () from /lib/libcso6
No symbol table info available
#3 0x401c6cb8 in __assert_fail () from /lib/libcso6
No symbol table info available
#4 0x400cb0a8 in pthread_mutex_lock () from /lib/libpthreadso0
No symbol table info available
#5 0x40cdccdc in add_uac (t=0x419eb780, request=0x40408d18, uri=0x40408e88, next_hop=0x40408e90, path=0x40409094, proxy=0x0, fsocket=0x0, snd_flags=, proto=0, flags=0,
instance=0x4040909c, ruid=0x404090a8, location_ua=0x404090b0) at t_fwdc:863
ret = 0
branch = 0
__FUNCTION = "add_uac"
#6 0x40ce5598 in t_forward_nonack (t=0x419eb780, p_msg=0x40408d18, proxy=0x0, proto=0) at t_fwdc:1723
branch_ret = 0
lowest_ret = -1
current_uri = {s = 0x0, len = 0}
added_branches = 0
first_branch = 0
i = 1
q = 0
t_invite = 0xffffffff
success_branch = 1
try_new = 1
lock_replies = -1093035388
dst_uri = {s = 0x376a88 ": dsetc", len = 1093296396}
path = {s = 0x0, len = 0}
instance = {s = 0xbed99a5c "\200\325\314@\034\342>@\204\342-@x\021\002", len = 1087391576}
ruid = {s = 0x0, len = 1073991680}
location_ua = {s = 0x21178 "", len = 0}
si = 0x0
backup_bflags = 0
bflags = 0
FUNCTION = "t_forward_nonack"
#7 0x40ccd580 in t_relay_to (p_msg=0x40408d18, proxy=0x0, proto=0, replicate=0) at t_funcsc:355
ret = 0
new_tran = 1
t = 0x419eb780
dst = {send_sock = 0x40408d18, to = {s = {sa_family = 40716, sa_data = "\331\276\030\215@@\004\301\003A8\342>@"}, sin = {sin_family = 40716, sin_port = 48857,
sin_addr = {s_addr = 1077972248}, sin_zero = "\004\301\003A8\342>@"}, sin6 = {sin6_family = 40716, sin6_port = 48857, sin6_flowinfo = 1077972248, sin6_addr = {
in6_u = {__u6_addr8 = "\004\301\003A8\342>@\000\000\000\000\fa*A", __u6_addr16 = {49412, 16643, 57912, 16446, 0, 0, 24844, 16682}, __u6_addr32 = {
1090765060, 1077862968, 0, 1093296396}}}, sin6_scope_id = 0}}, id = 135544, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
port = 48857
host = {s = 0x4031c534 "\001", len = 1077972248}
comp = -1
__FUNCTION = "t_relay_to"
#8 0x40d1cb98 in w_t_relay_to (p_msg=0x40408d18, proxy=0x0, force_proto=0) at tmc:1517
t = 0x41086c80
res = -1093035156
__FUNCTION_ = "w_t_relay_to"
#9 0x40d1e1f4 in w_t_relay (p_msg=0x40408d18, foo=0x0, _bar=0x0) at tmc:1718
No locals
#10 0x00029aa0 in do_action (h=0xbed99fc8, a=0x40320f74, msg=0x40408d18) at actionc:1088
ret = -5
v = -1093034460
dst = {send_sock = 0x4036ee58, to = {s = {sa_family = 36120, sa_data = "@@\001\000\000\000OK\000\324\235\331\276"}, sin = {sin_family = 36120, sin_port = 16448,
sin_addr = {s_addr = 1}, sin_zero = "
OK\000\324\235\331\276"}, sin6 = {sin6_family = 36120, sin6_port = 16448, sin6_flowinfo = 1, sin6_addr = {__in6_u = {
__u6_addr8 = "`OK\000\324\235\331\276\000\000\000\000\000\000\000", __u6_addr16 = {20320, 75, 40404, 48857, 0, 0, 0, 0}, __u6_addr32 = {4935520, 3201932756,
0, 0}}}, sin6_scope_id = 3201932896}}, id = 1077341784, proto = 24 '\030', send_flags = {f = 141 '\215', blst_imask = 64 '@'}}
tmp = 0x4003d000 "H\377\002"
new_uri = 0x0
end = 0xd72a4 ""
crt = 0x0
cmd = 0x402ff898
len = 0
user = 135544
uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 1610612752}, port = {s = 0x8a
, len = 2623776},
params = {s = 0x121822c7 , len = -1093034636}, sip_params = {s = 0x98f6c " ", len = 1077000232}, headers = {s = 0xbed99e78 "",
len = 1077972248}, port_no = 46240, proto = 48857, type = 3727636, flags = 8388608, transport = {s = 0x6e9c68 , len = 967680},
ttl = {s = 0xbed99d7c "\001", len = 22}, user_param = {s = 0x4b4f4c "", len = 0}, maddr = {s = 0xbed99d5c "", len = 19}, method = {s = 0xbed99d84 "",
len = 303571655}, lr = {s = 0x0, len = 135544}, r2 = {s = 0x0, len = 0}, gr = {s = 0xbed99d8c "\b\230\021", len = 1152864}, transport_val = {
s = 0xbed99db0 "\001", len = 22}, ttl_val = {s = 0x4b4f4c "", len = 1}, user_param_val = {s = 0x280920 "\b0\033\345\004 \223\345\f0\033\345", len = 1},
maddr_val = {s = 0x4b4f60 "2", len = 0}, method_val = {s = 0xbed99d9c "$\341\021", len = 1153032}, lr_val = {s = 0x0, len = 1}, r2_val = {s = 0xbed99dbc "",
len = 1171748}, gr_val = {s = 0x1 , len = -1093034400}}
next_hop = {user = {s = 0xbed99c3c "", len = 1077972248}, passwd = {s = 0x4032aaac "0\003", len = -1093034880}, host = {s = 0x40408d18 "l\006", len = 1076849808},
port = {s = 0x3 , len = 0}, params = {s = 0x40317840 "", len = 1077972248}, sip_params = {
s = 0xffffffff , len = 1076983872}, headers = {s = 0x121822c7 , len = 0}, port_no = 4472,
proto = 2, type = ERROR_URI_T, flags = 0, transport = {s = 0x4003d000 "H\377\002", len = -1093033948}, ttl = {s = 0x29b18 "", len = 0}, user_param = {
s = 0x40408d18 "l\006", len = 1077062316}, maddr = {s = 0xbed9b4a0 "\004", len = 0}, method = {s = 0x0, len = -1}, lr = {
s = 0xbed99cac "l\234\331\276\370\233\331\276hi\003", len = 303571655}, r2 = {s = 0x0, len = 135544}, gr = {s = 0x40408d18 "l\006", len = 1077018000},
transport_val = {s = 0xbed9a0b0 "", len = 1073991680}, ttl_val = {s = 0xbed99c6c "\030\233\002", len = -1093035016}, user_param_val = {s = 0x36968 "", len = 0},
maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
u = 0x0
port = 4632
dst_host = 0x4032abdc
i = 4104020
flags = -1093034948
avp = 0x40310d88
st = {flags = 0, id = 0, name = {n = 1610612752, s = {s = 0x60000010 , len = 567153825}, re = 0x60000010}, avp = 0x280920}
sct = 0x128264
sjt = 0x0
rve = 0x4
mct = 0x40408d18
rv = 0x4101b35c
rv1 = 0x40408d18
c1 = {cache_type = RV_CACHE_EMPTY, val_type = 303571655, c = {avp_val = {n = 0, s = {s = 0x0, len = 135544}, re = 0x0}, pval = {rs = {s = 0x0, len = 135544}, ri = 0,
flags = 0}}, i2s = "\000\320\003@l\234\331\276\350l\003\000\003\000\000\000\377\377\377\377l\234"}
s = {s = 0x36968 "", len = 0}
srevp = {0xbed99b84, 0xbed99b10}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {
number = 2, string = 0x2 , str = {s = 0x2 , len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 3}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {
number = 1077333124, string = 0x4036cc84 "X\314\066@ ", str = {s = 0x4036cc84 "X\314\066@ ", len = 3}, data = 0x4036cc84, attr = 0x4036cc84,
select = 0x4036cc84}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__FUNCTION = "do_action"
#11 0x00036ce8 in run_actions (h=0xbed99fc8, a=0x40320f74, msg=0x40408d18) at actionc:1583
t = 0x40320f74
ret = -1
mod = 0x0
ms = 0
FUNCTION = "run_actions"
#12 0x00037478 in run_actions_safe (h=0xbed9b4a0, a=0x40320f74, msg=0x40408d18) at actionc:1648
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{jmpbuf = {303571655, 0, 135544, 0, 0, 0, 1073991680, -1093034060, -1093034176, 223592,
0 , 1610612752, 1100845520, 1416, 1100429564, 1164518012, 1077972248, 1077018000, -1093033808, 0, 1073991680, 1, 0, 0, 1077972248, -1, 0,
303571655, 303571655, 0, 135544, 0, 0, -1093033388, 226424, 0, 1077972248, 1077018000, -1093028704, 0, 0, -1, 1164092908, 303571655, 0, 135544, 0, 0, 0},
__mask_was_saved = 0, __saved_mask = {__val = {3201933468, 3201933352, 223592, 0 , 1610612752, 3, 2623776, 3201933652, 0, 5, 3201933692,
1085865828, 7249368, 1077864140, 4849333, 4849164, 8}}}}}
ret = -1
ign_on_break = 0
#13 0x0017ed68 in rval_get_int (h=0xbed9b4a0, msg=0x40408d18, i=0xbed9a390, rv=0x40321184, cache=0x0) at rvaluec:924
r_avp = 0x40408d18
avp_val = {n = 0, s = {s = 0x0, len = 4848947}, re = 0x0}
pval = {rs = {s = 0x3dc238 "parse_headers", len = 4035544}, ri = 1077864140, flags = 1076748296}
tmp = {s = 0x0, len = 5}
s = 0x0
r = 0
ret = 0
destroy_pval = 0
__FUNCTION = "rval_get_int"
#14 0x00183b3c in rval_expr_eval_int (h=0xbed9b4a0, msg=0x40408d18, res=0xbed9a390, rve=0x40321180) at rvaluec:1918
i1 = 5060
i2 = 1077972248
ret = -1
c1 = {cache_type = 135544, val_type = 1077018528, c = {avp_val = {n = -1093032424, s = {s = 0xbed9a618 "", len = 1077972248}, re = 0xbed9a618}, pval = {rs = {
s = 0xbed9a618 "", len = 1077972248}, ri = -1093028704, flags = -1093033244}}, i2s = "\340r\346@\344\242\331\276$\211\344@\001\000\000\000\000\000\000\224"}
c2 = {cache_type = 137, val_type = 4294967295, c = {avp_val = {n = 0, s = {s = 0x0, len = -1093033244}, re = 0x0}, pval = {rs = {s = 0x0, len = -1093033244},
ri = 1568104, flags = 192}}, i2s = "\000\000\000\000\b\000\000\000\220\221\235A\000\000\000\000\364@\347@\000"}
rv1 = 0x0
rv2 = 0x402de008
FUNCTION = "rval_expr_eval_int"
#15 0x00183f00 in rval_expr_eval_int (h=0xbed9b4a0, msg=0x40408d18, res=0xbed9a618, rve=0x40321524) at rvaluec:1926
i1 = 0
i2 = -1093028704
ret = -1
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}},
i2s = "\000\000\000\000\000F0@\000\000\000\000\000\000\000\000\030\215@@\324\260"}
c2 = {cache_type = 12, val_type = 4848849, c = {avp_val = {n = 4, s = {s = 0x4 , len = 303571655}, re = 0x4}, pval = {rs = {
s = 0x4 , len = 303571655}, ri = 0, flags = 135544}},
i2s = "\000\000\000\000\000\000\000\000\000\320\003@\314\243\331\276\350l\003\000\000"}
rv1 = 0x49fcc4
rv2 = 0x0
FUNCTION = "rval_expr_eval_int"
#16 0x00029600 in do_action (h=0xbed9b4a0, a=0x403218c8, msg=0x40408d18) at actionc:1064
ret = -5
v = 0
dst = {send_sock = 0x0, to = {s = {sa_family = 33508, sa_data = ">\000\240\325=\000\001\000\000\000\004\000\000"}, sin = {sin_family = 33508, sin_port = 62,
sin_addr = {s_addr = 4052384}, sin_zero = "\001\000\000\000\004\000\000"}, sin6 = {sin6_family = 33508, sin6_port = 62, sin6_flowinfo = 4052384, sin6_addr = {
in6_u = {__u6_addr8 = "\001\000\000\000\004\000\000\000\300\247\331\276\000\000\000", __u6_addr16 = {1, 0, 4, 0, 42944, 48857, 0, 0}, __u6_addr32 = {1, 4,
3201935296, 0}}}, sin6_scope_id = 303571655}}, id = 0, proto = 199 '\307', send_flags = {f = 34 '"', blst_imask = 24 '\030'}}
tmp = 0x0
new_uri = 0x3
end = 0xbed9a714 "<;\030"
crt = 0x0
cmd = 0x40329d38
len = 0
user = 135544
uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {
s = 0x0, len = 1610612752}, headers = {s = 0x121822c7 , len = -1093032500}, port_no = 36716, proto = 9, type = 7, flags = 5,
transport = {s = 0x40312380 "\001", len = -1093032232}, ttl = {s = 0x40408d18 "l\006", len = -1093028704}, user_param = {s = 0xbed9a59c "h\355\027",
len = 1077572256}, maddr = {s = 0x0, len = 5}, method = {s = 0x1 , len = 0}, lr = {s = 0xbed9a62c "0?\030", len = 1568104}, r2 = {
s = 0x6e9894 , len = 968660}, gr = {s = 0x6 , len = 0}, transport_val = {
s = 0x3dc7b4 ": parser/parse_addr_specc", len = 303571655}, ttl_val = {s = 0x0, len = 135544}, user_param_val = {s = 0x0, len = 0}, maddr_val = {
s = 0xbed9a63c "\214M)", len = 2604464}, method_val = {s = 0x3dd5a0 "parse_to_param", len = 285}, lr_val = {s = 0x40304600 "l?\002A\020\070\001A\001", len = 0},
r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 5}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 1077972248}, params = {s = 0x40329c04 "%\003",
len = -1093032736}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x121822c7 , len = 0}, port_no = 0, proto = 0,
type = ERROR_URI_T, flags = 4294967295, transport = {s = 0x0, len = -1093032756}, ttl = {s = 0x121822c7 , len = 0}, user_param = {
s = 0x21178 "", len = 0}, maddr = {s = 0x0, len = -1093032316}, method = {s = 0x37478 "\f", len = 141}, lr = {s = 0x40408d18 "l\006", len = 1077058564}, r2 = {
s = 0xbed9b4a0 "\004", len = 0}, gr = {s = 0x0, len = -1}, transport_val = {s = 0x403a72a0 "\002", len = 303571655}, ttl_val = {s = 0x0, len = 135544},
user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 1073991680}, method_val = {s = 0xbed9a4cc "xt\003", len = -1093032872}, lr_val = {s = 0x36968 "",
len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
u = 0x0
port = 4632
dst_host = 0xbed9a8e4
i = -1093028704
flags = 1088786032
avp = 0x40408d18
st = {flags = 3201934540, id = 27880, name = {n = 0, s = {s = 0x0, len = 1073991680}, re = 0x0}, avp = 0xbed9a4b4}
sct = 0x0
sjt = 0x121822c7
rve = 0x40321524
mct = 0x403ef9e0
rv = 0x4003d000
rv1 = 0xbed9aa48
c1 = {cache_type = 3201935400, val_type = 331612160, c = {avp_val = {n = 1, s = {s = 0x1 , len = 0}, re = 0x1}, pval = {rs = {
s = 0x1 , len = 0}, ri = 1077972248, flags = 4848957}},
i2s = "\001\000\000\000\307\"\030\022\000\000\000\000x\021\002\000\000\000\000\000\000"}
s = {s = 0x40e47ce8 "", len = 0}
srevp = {0x40e474f0, 0xbed9a464}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {
number = 2, string = 0x2 , str = {s = 0x2 , len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 3}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {
number = 1077333124, string = 0x4036cc84 "X\314\066@ ", str = {s = 0x4036cc84 "X\314\066@ ", len = 3}, data = 0x4036cc84, attr = 0x4036cc84,
select = 0x4036cc84}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__FUNCTION = "do_action"
#17 0x00036ce8 in run_actions (h=0xbed9b4a0, a=0x4031ea14, msg=0x40408d18) at actionc:1583
t = 0x403218c8
ret = 1
mod = 0x0
ms = 0
FUNCTION = "run_actions"
#18 0x000263ac in do_action (h=0xbed9b4a0, a=0x4032b32c, msg=0x40408d18) at actionc:712
ret = -5
v = 0
dst = {send_sock = 0x0, to = {s = {sa_family = 24, sa_data = "\000\000\002\375I\000\000\000\000\000\320\220\235A"}, sin = {sin_family = 24, sin_port = 0, sin_addr = {
s_addr = 4848898}, sin_zero = "\000\000\000\000\320\220\235A"}, sin6 = {sin6_family = 24, sin6_port = 0, sin6_flowinfo = 4848898, sin6_addr = {in6_u = {
__u6_addr8 = "\000\000\000\000\320\220\235A\000\000\000\000\000\000\000", __u6_addr16 = {0, 0, 37072, 16797, 0, 0, 0, 0}, __u6_addr32 = {0, 1100845264, 0,
0}}}, sin6_scope_id = 0}}, id = 0, proto = 199 '\307', send_flags = {f = 34 '"', blst_imask = 24 '\030'}}
tmp = 0xbed9abb4 "\350l\003"
new_uri = 0x121822c7
end = 0x403ebfec "\232\301>@\030"
crt = 0x280920 "\b0\033\345\004 \223\345\f0\033\345"
cmd = 0x40329698
len = 0
user = 1077034684
uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {
s = 0x0, len = 1610612752}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = 18, flags = 0, transport = {s = 0x40326164 "\001", len = -1093031160},
ttl = {s = 0x40408d18 "l\006", len = -1093028704}, user_param = {s = 0xbed9a9cc "h\355\027", len = 1076748296}, maddr = {
s = 0xbed9a9f4 "\360\253\331\276\030\215@@\240\264\331\276\004", len = 1085865828}, method = {s = 0x1 , len = 0}, lr = {
s = 0xbed9aa5c "<;\030", len = 1568104}, r2 = {s = 0x6e9a90 , len = 968152}, gr = {
s = 0x116570 "\004\060\240\343\202!\240\341\002 \201\340\003\060\202\340", len = 1215756}, transport_val = {s = 0x4 , len = 145},
ttl_val = {s = 0x0, len = 303571655}, user_param_val = {s = 0x40328d8c "\004", len = -1093030928}, maddr_val = {s = 0x40408d18 "l\006", len = -1093028704},
method_val = {s = 0x4 , len = 1091096887}, lr_val = {s = 0xb , len = 1091096872}, r2_val = {s = 0x0, len = 0},
gr_val = {s = 0x0, len = 5}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x60000010 , len = 56}, host = {s = 0x403636c0 "\n", len = 3}, port = {
s = 0x2 , len = 1077972248}, params = {s = 0x40329600 "#\003", len = -1093031664}, sip_params = {
s = 0x121822c7 , len = 1076733136}, headers = {s = 0x12 , len = 0}, port_no = 0, proto = 0,
type = 1077972248, flags = URI_USER_NORMALIZE, transport = {s = 0x0, len = 303571655}, ttl = {s = 0x121822c7 , len = 0},
user_param = {s = 0x21178 "", len = 0}, maddr = {s = 0x0, len = -1093031244}, method = {s = 0x37478 "\f", len = 1077972248}, lr = {s = 0x40408d18 "l\006",
len = 1077057024}, r2 = {s = 0xbed9b4a0 "\004", len = 0}, gr = {s = 0x0, len = 1}, transport_val = {s = 0x40408d18 "l\006", len = 303571655}, ttl_val = {s = 0x0,
len = 135544}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 1073991680}, method_val = {s = 0xbed9a8fc "xt\003", len = -1093031800}, lr_val = {
s = 0x36968 "", len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
u = 0x403242fc
port = 48857
dst_host = 0x40408d18
i = 2
flags = 0
avp = 0x40408d18
st = {flags = 3201935612, id = 27880, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
sct = 0x403636a8
sjt = 0x40408d18
rve = 0x40329d34
mct = 0x113
rv = 0x4003d000
rv1 = 0xbed9ae78
c1 = {cache_type = RV_CACHE_EMPTY, val_type = 1073991680, c = {avp_val = {n = -1093031916, s = {s = 0xbed9a814 "xt\003", len = -1093032032}, re = 0xbed9a814}, pval = {
rs = {s = 0xbed9a814 "xt\003", len = -1093032032}, ri = 223592, flags = 0}},
i2s = "\000\000\000\000\307\"\030\022\000\000\000\000x\021\002\000\000\000\000\000\000"}
s = {s = 0x0, len = 0}
srevp = {0x0, 0x21178}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {
number = 2, string = 0x2 , str = {s = 0x2 , len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 3}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {
number = 1077333124, string = 0x4036cc84 "X\314\066@ ", str = {s = 0x4036cc84 "X\314\066@ ", len = 3}, data = 0x4036cc84, attr = 0x4036cc84,
select = 0x4036cc84}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__FUNCTION = "do_action"
#19 0x00036ce8 in run_actions (h=0xbed9b4a0, a=0x40329ad4, msg=0x40408d18) at actionc:1583
t = 0x4032b32c
ret = 1
mod = 0x0
ms = 0
FUNCTION = "run_actions"
#20 0x00029a2c in do_action (h=0xbed9b4a0, a=0x4032b454, msg=0x40408d18) at actionc:1079
ret = 1
v = 1
dst = {send_sock = 0x0, to = {s = {sa_family = 64960, sa_data = " @\b \000\000pD!@\340\070U"}, sin = {sin_family = 64960, sin_port = 16416, sin_addr = {
s_addr = 8200}, sin_zero = "pD!@\340\070U"}, sin6 = {sin6_family = 64960, sin6_port = 16416, sin6_flowinfo = 8200, sin6_addr = {in6_u = {
__u6_addr8 = "pD!@\340\070U\000\000\240-@\000\000\000", __u6_addr16 = {17520, 16417, 14560, 85, 40960, 16429, 0, 0}, __u6_addr32 = {1075922032, 5585120,
1076731904, 0}}}, sin6_scope_id = 1}}, id = 0, proto = 21 '\025', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
tmp = 0x4108cee0 "xlog"
new_uri = 0x4109e174 "\214\240\001"
end = 0x79
crt = 0x4
cmd = 0x403152a0
len = 135544
user = 0
uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {
s = 0x0, len = 1610612752}, headers = {s = 0x402da228 "\001", len = 134217728}, port_no = 0, proto = 13362, type = 1076597596, flags = 1076611795, transport = {
s = 0x402da228 "\001", len = 5585624}, ttl = {s = 0x402da4d0 "", len = 132392}, user_param = {s = 0x555a60 "", len = 124320}, maddr = {s = 0x555a60 "",
len = 1075903936}, method = {s = 0xbed9ae9f "A\373\037", len = 1076728908}, lr = {s = 0x1 , len = 1076731904}, r2 = {
s = 0x1 , len = 0}, gr = {s = 0x3 , len = -1093030216}, transport_val = {s = 0x402b73cc "%H:%M:%S",
len = 1076731904}, ttl_val = {s = 0x402d926c ",t+@", len = 5585496}, user_param_val = {s = 0x402da4d0 "", len = 8200}, maddr_val = {
s = 0x80 , len = 8200}, method_val = {s = 0xbed9af60 "", len = 5593696}, lr_val = {s = 0x402da228 "\001", len = 5585112}, r2_val = {
s = 0x402da4d0 "", len = 132904}, gr_val = {s = 0x553ad8 "failed\n", len = 132392}}
next_hop = {user = {
s = 0x419d4700 "4 CIF=1;QCIF=1\r\na=rtpmap:31 H261/90000\r\na=fmtp:31 CIF=2;QCIF=2\r\na=sendrecv\r\nm=application 30006 RTP/SAVP 100\r\na=crypto:1 AES_CM_128_HMAC_SHA1_80 inline:iBuE6kKiNbn30g7hkU2/qRE0ROKMAJZDD/Zg48t0\r\na=encr", len = 0}, passwd = {s = 0x419d4a44 "\220\001", len = 1100826908}, host = {s = 0x0, len = 5}, port = {
s = 0x419d4a9c "\001", len = 1077972248}, params = {s = 0x40315020 "\226\002", len = -1093030592}, sip_params = {s = 0x49feb5 "", len = 4849103}, headers = {
s = 0x8 , len = 0}, port_no = 0, proto = 0, type = 1089616044, flags = 4294967295, transport = {s = 0x0, len = 0}, ttl = {
s = 0x121822c7 , len = 0}, user_param = {s = 0x21178 "", len = 0}, maddr = {s = 0x0, len = -1093030172}, method = {
s = 0x37478 "\f", len = 1100827356}, lr = {s = 0x40408d18 "l\006", len = 1076973600}, r2 = {s = 0xbed9b4a0 "\004", len = 0}, gr = {s = 0x0, len = -1},
transport_val = {s = 0x40231380 "\b0\235\345\003`\206\340\336\372\377\352\v", len = 303571655}, ttl_val = {s = 0x0, len = 135544}, user_param_val = {s = 0x0,
len = 0}, maddr_val = {s = 0x0, len = 1073991680}, method_val = {s = 0xbed9ad2c "xt\003", len = -1093030728}, lr_val = {s = 0x36968 "", len = 0}, r2_val = {
s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
u = 0x4109e174
port = 48857
dst_host = 0x1
i = -1093028704
flags = -1
avp = 0x40408d18
st = {flags = 3201936684, id = 27880, name = {n = 152, s = {s = 0x98 , len = 1100827388}, re = 0x98}, avp = 0xffffffff}
sct = 0x403ece20
sjt = 0x40408d18
rve = 0x40329694
mct = 0x402d944c
rv = 0x4003d000
rv1 = 0xbed9b2a8
c1 = {cache_type = 4849103, val_type = 1452104383, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 8388608,
flags = 7249432}}, i2s = "\254\070\362@\307\"\030\022\000\000\000\000x\021\002\000\000\000\000\000\000"}
s = {s = 0x403ff4fc "\033", len = 4849333}
srevp = {0xbed9ac8c, 0xbed9ac8c}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {
number = 2, string = 0x2 , str = {s = 0x2 , len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 3}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {
number = 1077333124, string = 0x4036cc84 "X\314\066@ ", str = {s = 0x4036cc84 "X\314\066@ ", len = 3}, data = 0x4036cc84, attr = 0x4036cc84,
select = 0x4036cc84}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__FUNCTION = "do_action"
#21 0x00036ce8 in run_actions (h=0xbed9b4a0, a=0x403294d0, msg=0x40408d18) at actionc:1583
t = 0x4032b454
ret = 1
mod = 0x4003d000
ms = 0
FUNCTION = "run_actions"
#22 0x000263ac in do_action (h=0xbed9b4a0, a=0x403160fc, msg=0x40408d18) at actionc:712
ret = -5
v = 0
dst = {send_sock = 0x115f68, to = {s = {sa_family = 36108, sa_data = "\022\000\004\000\000\000\240\000\000\000\364\360\334@"}, sin = {sin_family = 36108,
sin_port = 18, sin_addr = {s_addr = 4}, sin_zero = "\240\000\000\000\364\360\334@"}, sin6 = {sin6_family = 36108, sin6_port = 18, sin6_flowinfo = 4,
sin6_addr = {in6_u = {__u6_addr8 = "\240\000\000\000\364\360\334@\307\"\030\022\004\263\331\276", __u6_addr16 = {160, 0, 61684, 16604, 8903, 4632, 45828,
48857}, __u6_addr32 = {160, 1088221428, 303571655, 3201938180}}}, sin6_scope_id = 1077862732}}, id = 0, proto = 0 '\000', send_flags = {f = 208 '\320',
blst_imask = 3 '\003'}}
tmp = 0x40e43104 "\f\220\002"
new_uri = 0x121822c7
end = 0x49fcb8 "Route: sip:101009336:5060;nat=yes;lr=on\r\nFrom: sip:1000@101009336:5060;tag=875590146\r\nTo: sip:9144@101009336:5060;tag=748310794\r\nCall-ID: 54544907\r\nCSeq: 6 INFO\r\nContact:
crt = 0x21178 ""
cmd = 0x40304fe0
len = 626540
user = -1093028780
uri = {user = {
s = 0x49fc9f "branch=z9hG4bK897806495\r\nRoute: \r\nFrom: sip:1000@101009336:5060;tag=875590146\r\nTo: sip:9144@101009336:5060;tag=748310794\r\nCall-ID: 54544907\r\nCSeq: 6 INFO", len = 0}, passwd = {s = 0x0, len = -1093029204}, host = {s = 0x40d588cc "<0\033\345\002\001", len = 2042},
port = {s = 0x7d8 , len = 1077972248}, params = {
s = 0x49fc8c "09336:5062;rport;branch=z9hG4bK897806495\r\nRoute: sip:101009336:5060;nat=yes;lr=on\r\nFrom: sip:1000@101009336:5060;tag=875590146\r\nTo: sip:9144@101009336:5060;tag=748310794\r\nCall-ID: 545", len = 4115756}, sip_params = {s = 0x3ebab8 ": parser/parse_viac", len = 32}, headers = {
s = 0x402de008 "\001", len = 0}, port_no = 12660, proto = 16799, type = 98365684, flags = 4848822, transport = {s = 0x403ee130 " ", len = -1093029288}, ttl = {
s = 0x4 , len = 4848788}, user_param = {
s = 0x49fc98 ";rport;branch=z9hG4bK897806495\r\nRoute: sip:101009336:5060;nat=yes;lr=on\r\nFrom: sip:1000@101009336:5060;tag=875590146\r\nTo: sip:9144@101009336:5060;tag=748310794\r\nCall-ID: 54544907\r\nCSeq:", len = 4848792}, maddr = {s = 0x4 , len = 331743235}, method = {
s = 0xbed9b374 "$b(", len = -1093029004}, lr = {s = 0x403ee14c "\350", len = 1077933164}, r2 = {s = 0xbed9b2a4 "", len = 1100951944}, gr = {s = 0xbed9b4d8 "",
len = 1}, transport_val = {s = 0xffffffff , len = -1}, ttl_val = {s = 0xbed9b2ac "\373\377\377\377\310\264\331\276\001",
len = 1077933164}, user_param_val = {s = 0x49feb5 "", len = 4848763}, maddr_val = {s = 0x0, len = 84271112}, method_val = {s = 0xbed9b29c "L\341>@",
len = 1085865828}, lr_val = {s = 0x419f31e0 "\310", len = 0}, r2_val = {s = 0x4 , len = 8388608}, gr_val = {
s = 0x6ea098 , len = 966608}}
next_hop = {user = {s = 0x0, len = 135544}, passwd = {s = 0x280920 "\b0\033\345\004 \223\345\f0\033\345", len = -1093029596}, host = {s = 0xbed9b124 "",
len = 1076748296}, port = {s = 0xbed9b14c "l\217\t", len = 1085865828}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 8388608}, headers = {
s = 0x6ea058 , len = 966672}, port_no = 24488, proto = 17, type = 1215756, flags = 4, transport = {
s = 0x9e , len = 0}, ttl = {s = 0x121822c7 , len = -1093029452}, user_param = {s = 0x98f6c " ",
len = 109}, maddr = {s = 0x40addfec "", len = -1093029428}, method = {s = 0x27d028 "\004", len = 4}, lr = {s = 0x3e9fa4 "core", len = 0}, r2 = {
s = 0x3 , len = -1093029340}, gr = {s = 0x2e14d0 "", len = 0}, transport_val = {s = 0x0, len = -1093029428}, ttl_val = {
s = 0xbed9b1cc "\314\210\325@\372\a", len = 1088115668}, user_param_val = {s = 0x40db0528 "tm: t_replyc", len = 8}, maddr_val = {s = 0x0, len = 4111032},
method_val = {s = 0x121822c7 , len = 0}, lr_val = {s = 0x21178 "", len = 0}, r2_val = {s = 0x0, len = -1093029282}, gr_val = {
s = 0xbed9b25f "\005\234\262\331\276d\377\270@\340\061\237A", len = 4849333}}
u = 0x157
port = 61
dst_host = 0x8
i = 4
flags = 626540
avp = 0xbed9b44c
st = {flags = 4, id = 141, name = {n = 343, s = {s = 0x157 , len = 1088221428}, re = 0x157}, avp = 0xbed9b15c}
sct = 0x1d
sjt = 0x40408d18
rve = 0x4031529c
mct = 0x49fddf
rv = 0x128d0c
rv1 = 0x0
c1 = {cache_type = 3201937612, val_type = 3201937612, c = {avp_val = {n = 1076748296, s = {s = 0x402de008 "\001", len = -1093029644}, re = 0x402de008}, pval = {rs = {
s = 0x402de008 "\001", len = -1093029644}, ri = 1085865828, flags = 86}},
i2s = "\000\000\000\000\254\177=\000\000\000\200\000\200\233n\000\350\304\016\000\200d"}
s = {s = 0x1b5 , len = 2623776}
srevp = {0x419f3210, 0x386f70}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {
number = 2, string = 0x2 , str = {s = 0x2 , len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 3}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {
number = 1077333124, string = 0x4036cc84 "X\314\066@ ", str = {s = 0x4036cc84 "X\314\066@ ", len = 3}, data = 0x4036cc84, attr = 0x4036cc84,
select = 0x4036cc84}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__FUNCTION = "do_action"
#23 0x00036ce8 in run_actions (h=0xbed9b4a0, a=0x4030fbc0, msg=0x40408d18) at actionc:1583
t = 0x403160fc
ret = 1
mod = 0x0
ms = 0
FUNCTION = "run_actions"
#24 0x00037538 in run_top_route (a=0x4030fbc0, msg=0x40408d18, c=0x0) at actionc:1669
ctx = {rec_lev = 4, run_flags = 0, last_retcode = -1, jmp_env = {{jmpbuf = {303571655, 0, 135544, 0, 0, 0, 1073991680, -1093028724, -1093028840, 223592,
0 , 1610612752, 966492, 1138420, 1215756, 2623776, -1093028532, -1093028532, 1076748296, -1093028492, 1085865828, 1077859196, 0, 14,
8388608, 7250220, 966460, 1138388, 1215756, 4, 162, 0, 303571655, -1093028388, 626540, 4124784, 4122588, 3607920, 0, 1077859224, 303571655, 1077872804,
1076748296, 0, 5, 1164317944, 1164522740, -1093028324, 1077972248}, __mask_was_saved = 0, __saved_mask = {__val = {4848676, 1, 13, 3749280, 3201938908, 1, 13,
0, 1085944084, 0, 135544, 303571655, 0, 1073741825, 1077972248, 0, 303571655, 3201939020, 1691804, 0, 135544, 3751672, 4848758, 1077972268, 82, 1,
1077972248, 225, 1073741825, 1077972220, 0, 0}}}}}
p = 0xbed9b4a0
ret = 135544
sfbk = 0
#25 0x0013ce80 in receive_msg (
buf=0x49fc24 "INFO sip:9144@101009144:5060;transport=TCP;alias=101009144:36841~2 SIP/20\r\nVia: SIP/20/UDP 101009336:5062;rport;branch=z9hG4bK897806495\r\nRoute: sip:101009336:5060;nat=yes;lr=on\r\nFrom: ", len=657, rcv_info=0xbed9b8b4) at receivec:216
msg = 0x40408d18
ctx = {rec_lev = 0, run_flags = 1, last_retcode = -1093028124, jmp_env = {{__jmpbuf = {-1093028084, 1094111756, 0, 1077352742, 2127, 5, 0, 1074750288, 1075464840,
1073835920, 1094553688, 1100326448, 76, 8403020, 1075499064, 1073991680, -1093027904, 1073913596, 1073993916, 1075465032, 0, 0, 1, 2127, 1074750344,
1074749440, 105499, 1075499832, 88616, 1, 19, 268896657, 1073994528, 0, -1093027928, 105499, 1074750344, -1093027836, -1093027860, 1073836664, -1093027928,
1073994436, 0, 1074750344, 1, 0, 1, 1073994088, 2623776, -12717463, 1073994528, 0, -1093027856, 104072, 1074750328, 0, 1073994528, 1073836664, 1073994088,
1073994436, 0, 1074750328, 1, 0}, __mask_was_saved = 1, __saved_mask = {__val = {1073994088, 3201939468, 626540, 1075499064, 1074749440, 0, 108658490,
1073994528, 0, 7714291, 135544, 1073994088, 0, 1074349248, 0, 1, 4427664, 0, 1073991680, 3201939580, 1073854768, 1074750344, 1, 1, 0, 0, 1075499064,
303571655, 0, 135544, 0, 0}}}}}
ret = 2487808
inb = {
s = 0x49fc24 "INFO sip:9144@101009144:5060;transport=TCP;alias=101009144:36841~2 SIP/20\r\nVia: SIP/20/UDP 101009336:5062;rport;branch=z9hG4bK897806495\r\nRoute: sip:101009336:5060;nat=yes;lr=on\r\nFrom: ", len = 657}
__FUNCTION = "receive_msg"
#26 0x00266708 in udp_rcv_loop () at udp_serverc:521
len = 657
buf = "INFO sip:9144@101009144:5060;transport=TCP;alias=101009144:36841~2 SIP/20\r\nVia: SIP/20/UDP 101009336:5062;rport;branch=z9hG4bK897806495\r\nRoute: sip:101009336:5060;nat=yes;lr=on\r\nFrom: "
tmp = 0x0
from = 0x402fe830
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {610100234, 3201939668, 1935216, 1759989418}, addr32 = {610100234, 3201939668, 1935216, 1759989418}, addr16 = {25610,
9309, 47316, 48857, 34672, 29, 20138, 26855}, addr = "\nd]$\324\270\331\276p\207\035\000\252N\347h"}}, dst_ip = {af = 2, len = 4, u = {addrl = {610100234, 0,
0, 0}, addr32 = {610100234, 0, 0, 0}, addr16 = {25610, 9309, 0, 0, 0, 0, 0, 0}, addr = "\nd]$", '\000' }}, src_port = 5062, dst_port = 5060,
proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\306\nd]$\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
sin_port = 50707, sin_addr = {s_addr = 610100234}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50707,
sin6_flowinfo = 610100234, sin6_addr = {in6_u = {__u6_addr8 = '\000' , __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}}, bind_address = 0x402fde78, proto = 1 '\001'}
__FUNCTION = "udp_rcv_loop"
#27 0x000c90a0 in main_loop () at mainc:1629
i = 0
pid = 0
si = 0x402fde78
si_desc = "udp receiver child=0 sock=101009336:5060 (101009336:5060)\000\300u1@h\t;\000 \236\060@\000\000\000\000x\021\002\000\024\260=@\000\000\000\000d\272\331\276\260\275'\000\230\331\070\000X\311\070\000\030\000\000\000\000\240[A\000\000\000\000\000\320\003@\244\303\230A"
r = 1073991680
nrprocs = 1
FUNCTION = "main_loop"
#28 0x000d0830 in main (argc=5, argv=0xbed9bd04) at mainc:2581
cfg_stream = 0x4b5008
c = -1
r = 0
tmp = 0x4003dac4 "8c\017@\a"
tmp_len = -1093026968
port = 1073836664
proto = -1093026900
options = 0x383880 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:OA:"
ret = -1
seed = 629055291
rfd = 216
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x0
p = 0x5
FUNCTION = "main"
It seems the socket got error (uncertain)
Does anyone have the similar experience?
Thanks
—
Reply to this email directly or view it on GitHub.