Here is another "backtrace full" log.
On Thursday, July 9, 2015 5:21 PM, Victor Seva <notifications(a)github.com>
wrote:
yes, thanks—
Reply to this email directly or view it on GitHub.
GNU gdb (GDB) Red Hat Enterprise Linux (7.2-75.el6)
Copyright (C) 2010 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu".
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>...
Reading symbols from /usr/sbin/kamailio...Reading symbols from
/usr/lib/debug/usr/sbin/kamailio.debug...done.
done.
(gdb) run -P /var/run/kamailio.pid -m 64 -M 8 -u kamailio -g kamailio -D
Starting program: /usr/sbin/kamailio -P /var/run/kamailio.pid -m 64 -M 8 -u kamailio -g
kamailio -D
[Thread debugging using libthread_db enabled]
WARNING: no fork mode
Detaching after fork from child process 4052.
Detaching after fork from child process 4053.
Detaching after fork from child process 4054.
Detaching after fork from child process 4055.
loading modules under config path: /usr/lib64/kamailio/modules/
Listening on
udp: 1.2.3.4:5060
Aliases:
udp: kamailiohost:5060
Program received signal SIGABRT, Aborted.
0x00007ffff765d625 in raise () from /lib64/libc.so.6
Missing separate debuginfos, use: debuginfo-install MariaDB-compat-5.5.39-1.el6.x86_64
glibc-2.12-1.149.el6_6.5.x86_64 keyutils-libs-1.4-5.el6.x86_64
krb5-libs-1.10.3-33.el6.x86_64 libcom_err-1.41.12-21.el6.x86_64
libselinux-2.0.94-5.8.el6.x86_64 nss-softokn-freebl-3.14.3-19.el6_6.x86_64
openssl-1.0.1e-30.el6_6.5.x86_64 sssd-client-1.11.6-30.el6_6.3.x86_64
zlib-1.2.3-29.el6.x86_64
(gdb) backtrace full
#0 0x00007ffff765d625 in raise () from /lib64/libc.so.6
No symbol table info available.
#1 0x00007ffff765ee05 in abort () from /lib64/libc.so.6
No symbol table info available.
#2 0x000000000044fcee in free_lump (lmp=0x7ffff6efdab0) at data_lump.c:464
__FUNCTION__ = "free_lump"
#3 0x000000000044fdf1 in free_lump_list (l=0x7ffff6efda40) at data_lump.c:498
t = 0x0
r = 0x0
foo = 0x7ffff6efdab0
crt = 0x7ffff6efda40
__FUNCTION__ = "free_lump_list"
#4 0x00000000004507b4 in del_nonshm_lump (lump_list=0x7ffff6efaad8) at data_lump.c:647
r = 0x7fffffffe150
foo = 0x7ffff6efda40
crt = 0x0
prev = 0x7ffff6efaad8
prev_r = 0x3f6efa530
__FUNCTION__ = "del_nonshm_lump"
#5 0x00000000004d4801 in replace_body (msg=0x7ffff6efa530, txt=...) at
msg_translator.c:1618
anchor = 0x208
buf = 0x7ffff6e2a010 "\001"
body = {
s = 0xa6d406 "--unique-boundary-1\r\nContent-Type:
application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk
PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0
101\r\na=rtp"..., len = 365}
__FUNCTION__ = "replace_body"
#6 0x00000000004d768d in check_boundaries (msg=0x7ffff6efa530, send_info=0x7fffebd73960)
at msg_translator.c:1821
b = {s = 0x7ffff6efd6e8 "--unique-boundary-1\r\n", len = 21}
fb = {s = 0x7ffff6efd5b8 "--unique-boundary-1--\r\n", len = 23}
ob = {s = 0x7ffff6efd698 "--unique-boundary-1", len = 19}
bsuffix = {s = 0x705c31 "\r\n", len = 2}
fsuffix = {s = 0x708930 "--\r\n", len = 4}
body = {
s = 0x7ffff6efe080 "--unique-boundary-1\r\nContent-Type:
application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk
PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0
101\r\na=rtp"..., len = 513}
buf = {
s = 0x7ffff6efcf78 "--unique-boundary-1\r\nContent-Type:
application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk
PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0
101\r\na=rtp"..., len = 511}
tmp = {
s = 0x7ffff6efcf78 "--unique-boundary-1\r\nContent-Type:
application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk
PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0
101\r\na=rtp"..., len = 21}
lb = 0x7ffff6efd628
lb_t = 0x0
lb_found = 3
t = 146
ret = 19
lb_size = 229
pb = 0x7ffff6efe281 ""
__FUNCTION__ = "check_boundaries"
#7 0x00000000004d7b7a in build_req_buf_from_sip_req (msg=0x7ffff6efa530,
returned_len=0x7fffffffad0c, send_info=0x7fffebd73960, mode=128) at msg_translator.c:1926
len = 1139
new_len = 0
received_len = 0
rport_len = 0
uri_len = 0
via_len = 0
body_delta = 0
line_buf = 0x0
received_buf = 0x0
rport_buf = 0x0
new_buf = 0x0
buf = 0xa6d100 "INVITE sip:+447888555999@1.2.3.4:5060 SIP/2.0\r\nVia:
SIP/2.0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom:
<sip:+447888555999@1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip"...
path_buf = {s = 0x0, len = 0}
offset = 0
s_offset = 0
size = 0
via_anchor = 0x0
via_lump = 0x7fffffffa970
via_insert_param = 0x0
path_anchor = 0x7ffff6e2a010
path_lump = 0x7ffff6e2a578
branch = {s = 0x0, len = 0}
flags = 393344
udp_mtu = 32767
di = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000'
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0,
sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000',
send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
__FUNCTION__ = "build_req_buf_from_sip_req"
#8 0x00007ffff31bb752 in prepare_new_uac (t=0x7fffebd736f8, i_req=0x7ffff6efa530,
branch=0, uri=0x7fffffffacf0, path=0x7fffffffacd0, next_hop=0x7ffff6efa7b0, fsocket=0x0,
snd_flags=..., fproto=0, flags=0,
instance=0x7fffffffacc0, ruid=0x7fffffffacb0, location_ua=0x7fffffffaca0) at
t_fwd.c:459
shbuf = 0x0
add_rm_backup = 0x7ffff6efb7b0
body_lumps_backup = 0x7ffff6efbe70
parsed_uri_bak = {user = {s = 0x7ffff6efdb34
"+447888555999@sip.provider.com:5060", len = 13}, passwd = {s = 0x0, len = 0},
host = {s = 0x7ffff6efdb42 "sip.provider.com:5060", len = 16}, port = {s =
0x7ffff6efdb53 "5060",
len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0},
headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = 0,
transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0},
user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0,
len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0},
transport_val = {s = 0x0, len = 0}, ttl_val = {
s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0,
len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0,
len = 0}, gr_val = {s = 0x0, len = 0}}
ret = -1
len = 0
parsed_uri_ok_bak = 1
free_new_uri = 1
msg_uri_bak = {s = 0x7ffff6efdb30
"sip:+447888555999@sip.provider.com:5060", len = 39}
dst_uri_bak = {s = 0x7ffff6efcb08 "sip:sip.provider.com:606017.25:5060",
len = 25}
dst_uri_backed_up = 1
path_bak = {s = 0x0, len = 0}
free_path = 1
instance_bak = {s = 0x0, len = 0}
free_instance = 1
ruid_bak = {s = 0x0, len = 0}
free_ruid = 1
ua_bak = {s = 0x0, len = 0}
free_ua = 1
backup_route_type = 1
fwd_snd_flags_bak = {f = 0 '\000', blst_imask = 0 '\000'}
rpl_snd_flags_bak = {f = 0 '\000', blst_imask = 0 '\000'}
force_send_socket_bak = 0x0
dst = 0x7fffebd73960
ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {39,
114263969407904274, 140737336290144, 140737488347472, 0, 0, 114263969449847314,
-114264531344217582}, __mask_was_saved = 0, __saved_mask = {
__val = {140733193388046, 627076158419, 1, 140737147573424, 592553366160,
140737272705179, 140737272702272, 4294967336, 140737147573424, 140737488333952,
140737272117063, 140737488333936, 4904691, 140737488334312,
140737488334288, 3479983113749674362}}}}}
__FUNCTION__ = "prepare_new_uac"
#9 0x00007ffff31beaf2 in add_uac (t=0x7fffebd736f8, request=0x7ffff6efa530,
uri=0x7ffff6efa7a0, next_hop=0x7ffff6efa7b0, path=0x7ffff6efab60, proxy=0x0, fsocket=0x0,
snd_flags=..., proto=0, flags=0, instance=0x7ffff6efab70,
ruid=0x7ffff6efab88, location_ua=0x7ffff6efab98) at t_fwd.c:787
ret = 0
branch = 0
__FUNCTION__ = "add_uac"
#10 0x00007ffff31c5b72 in t_forward_nonack (t=0x7fffebd736f8, p_msg=0x7ffff6efa530,
proxy=0x0, proto=0) at t_fwd.c:1655
branch_ret = 1
lowest_ret = -1
current_uri = {s = 0x0, len = -1}
added_branches = 0
first_branch = 0
i = 32767
q = 359
t_invite = 0x7ffff3203598
success_branch = 32767
try_new = 1
lock_replies = 100
dst_uri = {s = 0x7ffff6efd9c7 "", len = 0}
path = {s = 0x0, len = 11681504}
instance = {s = 0x7fffebd6e118 "trying -- your call is important to us",
len = 38}
ruid = {s = 0x7ffff6efa530 "\005", len = -338217224}
location_ua = {s = 0x7fffebd6e118 "trying -- your call is important to
us", len = 0}
si = 0x100415ca0
backup_bflags = 0
bflags = 0
__FUNCTION__ = "t_forward_nonack"
#11 0x00007ffff31b1f5c in t_relay_to (p_msg=0x7ffff6efa530, proxy=0x0, proto=0,
replicate=0) at t_funcs.c:322
ret = 0
new_tran = 1
t = 0x7fffebd736f8
dst = {send_sock = 0xb24140, to = {s = {sa_family = 0, sa_data = '\000'
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u =
{__u6_addr8 = "\000\000\000\000\000\000\000\000\235\000\000\000\000\000\000",
__u6_addr16 = {0, 0, 0, 0, 157, 0, 0, 0}, __u6_addr32 = {0, 0,
157, 0}}}, sin6_scope_id = 11682112}}, id = 0, proto = 32 ' ',
send_flags = {f = 165 '\245', blst_imask = 158 '\236'}}
port = 0
host = {s = 0x7fffffffb1c0 "P\341\377\377\377\177", len = 5203602}
comp = 0
__FUNCTION__ = "t_relay_to"
#12 0x00007ffff322a7d5 in _w_t_relay_to (p_msg=0x7ffff6efa530, proxy=0x0, force_proto=0)
at tm.c:1474
t = 0x0
res = 0
__FUNCTION__ = "_w_t_relay_to"
#13 0x00007ffff322b8b2 in w_t_relay (p_msg=0x7ffff6efa530, _foo=0x0, _bar=0x0) at
tm.c:1675
No locals.
#14 0x000000000041dcd4 in do_action (h=0x7fffffffb9b0, a=0x7ffff6e6df48,
msg=0x7ffff6efa530) at action.c:1053
ret = -5
v = -152066768
dst = {send_sock = 0x7ffff6ebc5b0, to = {s = {sa_family = 55112, sa_data =
"\357\366\377\177\000\000H\327\357\366\377\177\000"}, sin = {sin_family = 55112,
sin_port = 63215, sin_addr = {s_addr = 32767},
sin_zero = "H\327\357\366\377\177\000"}, sin6 = {sin6_family =
55112, sin6_port = 63215, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 =
"H\327\357\366\377\177\000\000H\327\357\366\377\177\000",
__u6_addr16 = {55112, 63215, 32767, 0, 55112, 63215, 32767, 0},
__u6_addr32 = {4142913352, 32767, 4142913352, 32767}}}, sin6_scope_id = 4142559592}}, id =
32767, proto = 52 '4', send_flags = {f = 185 '\271',
blst_imask = 255 '\377'}}
tmp = 0x7fffffffc8f0 ""
new_uri = 0x7fffffffb8f0 ""
end = 0x7ffff6ea6478 "\001"
crt = 0x7fffffffb938 "\305\023"
cmd = 0x7ffff6e4dac8
len = -152066768
user = 32767
uri = {user = {s = 0x7fffffffb640 "\340\267\377\377\377\177", len =
5517182}, passwd = {s = 0x7fffffffb5b0 "0\245\357\366\377\177", len = 0}, host =
{s = 0x7ffff6efa530 "\005", len = 4283552}, port = {
s = 0x7fffffffb650 "\340\267\377\377\377\177", len = 5510142},
params = {s = 0x7fffffffb5b0 "0\245\357\366\377\177", len = 0}, sip_params = {s
= 0x7ffff6ea7170 "\a", len = -18124}, headers = {
s = 0x7ffff6efa530 "\005", len = -14096}, port_no = 42288, proto =
63215, type = 32767, flags = 4294953200, transport = {s = 0x0, len = 0}, ttl = {s = 0x0,
len = 8}, user_param = {
s = 0x5f <Address 0x5f out of bounds>, len = -152092015}, maddr = {s =
0x7ffff6bfbb3c "UH\211\345ATSH\203\354PH\211}\310H\211u\300H\203}",
<incomplete sequence \310>, len = -152053944}, method = {
s = 0x7fffffffb5c0 "", len = -152054000}, lr = {s = 0x1 <Address
0x1 out of bounds>, len = 0}, r2 = {s = 0x7600000000 <Address 0x7600000000 out of
bounds>, len = -152066768}, gr = {
s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n",
len = -7856}, transport_val = {s = 0x7fffffffb7e0 "\200\271\377\377\377\177",
len = 5531816}, ttl_val = {
s = 0x7fffffffb7e0 "\200\271\377\377\377\177", len = 5544362},
user_param_val = {s = 0x7fffffffb720 "0\245\357\366\377\177", len = -241853612},
maddr_val = {s = 0x7fffffffb750 "H\327\357\366\377\177",
len = -271470533}, method_val = {s = 0x7fffffffb6c0
"\260\305\353\366\377\177", len = 0}, lr_val = {s = 0x728301
"rval_destroy", len = 7471900}, r2_val = {
s = 0x7ffff6efd748 "--unique-boundary-1\r\nContent-Type:
application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk
PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0
101\r\na=rtp"..., len = -152920048}, gr_val = {s = 0x7ffff6efd710 "p\001",
len = 0}}
next_hop = {user = {s = 0x200415ca0 <Address 0x200415ca0 out of bounds>, len
= 2}, passwd = {s = 0x0, len = 2}, host = {s = 0x7ffff6eabe80 "", len =
-152389240}, port = {s = 0x7ffff6efa530 "\005", len = -152387968},
params = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300
.n", len = -7856}, sip_params = {s = 0x7fffffffb450
"P\272\377\377\377\177", len = 0}, headers = {s = 0x7ffff6ef6760 "",
len = -152066768},
port_no = 26464, proto = 63215, type = 32767, flags = 4294959440, transport = {s
= 0x7ffff1fcc488
"UH\211\345ATSH\203\354PH\211}\330H\211u\320H\211U\310H\213E\320H\211E\340H\213E\330\017\267@
f\203\370\001\017\205\212",
len = 4283552}, ttl = {s = 0x7fffffffba50 " \273\377\377\377\177",
len = 4316514}, user_param = {s = 0x7ffff6ea7190 "\002", len = -152066768},
maddr = {s = 0x7fffffffb4d0 "@\265\377\377\377\177", len = -225777708},
method = {s = 0x7fffffffb4c0 "\220\321\346\366\377\177", len =
-19008}, lr = {s = 0x7ffff6ea7190 "\002", len = -152066768}, r2 = {s =
0x7fffebd6e210 "5061", len = 4}, gr = {
s = 0x4ffffb500 <Address 0x4ffffb500 out of bounds>, len = -152066768},
transport_val = {s = 0x7ffff6e6d190 "J\002", len = -17584}, ttl_val = {s =
0x7fffffffb540 "@\266\377\377\377\177", len = 5203602},
user_param_val = {s = 0x7ffff6ea64a0 "", len = -152066768}, maddr_val
= {s = 0x7ffff6ebff40 "", len = -152410976}, method_val = {s = 0x7fffffffb570
"P\266\377\377\377\177", len = -19008}, lr_val = {
s = 0x7ffff6ea7178 "\023", len = 5210524}, r2_val = {s =
0x7fffffffb934 "\377\377\377\377\305\023", len = -19008}, gr_val = {s =
0x7ffff6efa530 "\005", len = -152066768}}
u = 0x7fffffffc8f0
port = 0
dst_host = 0x7ffff6efd748
i = 32767
flags = 32767
avp = 0x7fffffffe150
st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x7fff00000000 <Address
0x7fff00000000 out of bounds>, len = -1}, re = 0x7fff00000000}, avp = 0x7ffff6eab488}
sct = 0x7ffff6efd748
sjt = 0x7fffffffbad8
rve = 0x415ca0
mct = 0x7fffffffe150
rv = 0x800000002
rv1 = 0x7fffffffb7e0
c1 = {cache_type = 4142587336, val_type = 32767, c = {avp_val = {n = -18284, s =
{s = 0x7fffffffb894 "", len = -152066768}, re = 0x7fffffffb894}, pval = {rs = {s
= 0x7fffffffb894 "", len = -152066768}, ri = -14096,
flags = 32767}}, i2s =
"\020\264\377\377\377\177\000\000\f\240\225\361\377\177\000\000P\264\377\377\377\377"}
s = {s = 0x400000001 <Address 0x400000001 out of bounds>, len = -152390520}
srevp = {0x7ffff6eab8e8, 0x2f6eacc48}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#15 0x000000000042a3ea in run_actions (h=0x7fffffffb9b0, a=0x7ffff6e6df48,
msg=0x7ffff6efa530) at action.c:1548
t = 0x7ffff6e6df48
ret = -1
mod = 0x13c5
ms = 0
__FUNCTION__ = "run_actions"
#16 0x000000000042aa4f in run_actions_safe (h=0x7fffffffda40, a=0x7ffff6e6df48,
msg=0x7ffff6efa530) at action.c:1613
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf =
{140737336288560, 114263969959455250, 4283552, 140737488347472, 0, 0, 114263970001398290,
-114264531344217582}, __mask_was_saved = 0,
__saved_mask = {__val = {140737336292968, 140737488337472, 4713976,
140737335951208, 140737336288560, 4283552, 140737488347472, 0, 0, 140737488337696,
4367338, 8187, 140737344499266, 8192, 140733193388032,
140737488337749}}}}}
ret = 0
ign_on_break = 0
#17 0x0000000000542670 in rval_get_int (h=0x7fffffffda40, msg=0x7ffff6efa530,
i=0x7fffffffbe88, rv=0x7ffff6e6e4c0, cache=0x0) at rvalue.c:912
r_avp = 0x7fffffffda40
avp_val = {n = -140792192, s = {s = 0x7ffff79bae80 "", len =
-152066768}, re = 0x7ffff79bae80}
pval = {rs = {s = 0x0, len = 0}, ri = -17360, flags = 32767}
tmp = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300
.n", len = -7856}
s = 0x0
r = 1
ret = 0
destroy_pval = 0
__FUNCTION__ = "rval_get_int"
#18 0x00000000005468a8 in rval_expr_eval_int (h=0x7fffffffda40, msg=0x7ffff6efa530,
res=0x7fffffffbe88, rve=0x7ffff6e6e4b8) at rvalue.c:1906
i1 = 0
i2 = 0
ret = -1
c1 = {cache_type = 10932671, val_type = RV_NONE, c = {avp_val = {n = 10932617, s =
{
s = 0xa6d189
"<sip:+447888555999@1.2.3.4:5061>;tag=as29e42e9b\r\nTo:
<sip:+447888555999@1.2.3.4:5060>\r\nContact:
<sip:+447888555999@1.2.3.4:5061>\r\nCall-ID:
74653c5b109e03c231cc7edf103d7e8b(a)37.188.117"quot;..., len = 10932709}, re = 0xa6d189},
pval = {rs = {
s = 0xa6d189
"<sip:+447888555999@1.2.3.4:5061>;tag=as29e42e9b\r\nTo:
<sip:+447888555999@1.2.3.4:5060>\r\nContact:
<sip:+447888555999@1.2.3.4:5061>\r\nCall-ID:
74653c5b109e03c231cc7edf103d7e8b(a)37.188.117"quot;..., len = 10932709}, ri = 0, flags =
0}}, i2s = '\000' <repeats 21 times>}
c2 = {cache_type = 10933494, val_type = 793, c = {avp_val = {n = -152773216, s =
{s = 0x7ffff6e4dda0 "\"\320&\363\377\177", len = -17248}, re =
0x7ffff6e4dda0}, pval = {rs = {s = 0x7ffff6e4dda0
"\"\320&\363\377\177",
len = -17248}, ri = 0, flags = 0}}, i2s =
"\300\325\346\366\377\177\000\000\020\303\377\377\377\177\000\000\060\245\357\366\377\177"}
rv1 = 0xa0000000a
rv2 = 0x60
__FUNCTION__ = "rval_expr_eval_int"
#19 0x0000000000546c9e in rval_expr_eval_int (h=0x7fffffffda40, msg=0x7ffff6efa530,
res=0x7fffffffc310, rve=0x7ffff6e6ebb8) at rvalue.c:1914
i1 = 0
i2 = 1
ret = -1
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s =
{s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = -152066768, flags =
32767}},
i2s =
"`\324\346\366\377\177\000\000@\332\377\377\377\177\000\000\000\000\000\000\000"}
c2 = {cache_type = 4294950608, val_type = 32767, c = {avp_val = {n = 4367338, s =
{s = 0x42a3ea "\211E\264H\307\005\030NZ", len = 0}, re = 0x42a3ea}, pval = {rs =
{s = 0x42a3ea "\211E\264H\307\005\030NZ", len = 0},
ri = 0, flags = 0}}, i2s = "\304\023\000\000\001", '\000'
<repeats 16 times>}
rv1 = 0x0
rv2 = 0x0
__FUNCTION__ = "rval_expr_eval_int"
#20 0x000000000041d7be in do_action (h=0x7fffffffda40, a=0x7ffff6e6e240,
msg=0x7ffff6efa530) at action.c:1029
ret = -5
v = 1
dst = {send_sock = 0x7fffffffc350, to = {s = {sa_family = 1754, sa_data =
"\214\363\377\177\000\000=\000\000\000\000\000\000"}, sin = {sin_family = 1754,
sin_port = 62348, sin_addr = {s_addr = 32767},
sin_zero = "=\000\000\000\000\000\000"}, sin6 = {sin6_family =
1754, sin6_port = 62348, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 =
"=", '\000' <repeats 14 times>, __u6_addr16 = {61, 0, 0, 0, 0, 0,
0, 0}, __u6_addr32 = {61, 0, 0, 0}}}, sin6_scope_id = 8388608}}, id =
0, proto = 48 '0', send_flags = {f = 206 '\316', blst_imask = 114
'r'}}
tmp = 0xd31d0 <Address 0xd31d0 out of bounds>
new_uri = 0xd31d0 <Address 0xd31d0 out of bounds>
end = 0x8 <Address 0x8 out of bounds>
crt = 0x3b <Address 0x3b out of bounds>
cmd = 0x61ee3f
len = -15504
user = 158
uri = {user = {s = 0x1 <Address 0x1 out of bounds>, len = -152066768},
passwd = {s = 0x7fffffffc1f0 "\360\307\377\377\377\177", len = -152066768}, host
= {s = 0x7ffff6ead758 "S\004", len = -14096}, port = {
s = 0x7fffffffc700 "\246\213a", len = -152381608}, params = {s =
0x1f7781f76 <Address 0x1f7781f76 out of bounds>, len = 0}, sip_params = {s = 0x0,
len = 0}, headers = {s = 0x7fffffffc76c "", len = -152066768},
port_no = 23712, proto = 65, type = ERROR_URI_T, flags = 4294959440, transport =
{s = 0x0, len = 0}, ttl = {s = 0x7fffffffc7f0 "h\207\351\366\377\177", len =
4302682}, user_param = {s = 0xb23ee0 "خ\233\367\377\177",
len = -14096}, maddr = {s = 0xd1 <Address 0xd1 out of bounds>, len =
5743147}, method = {s = 0x7ffff195f500 "", len = -144248473}, lr = {s =
0x7ffff195f500 "", len = 0}, r2 = {
s = 0x7ffff6ef4030 "From Asterisk, si = 1.2.3.4, du =
sip:sip.provider.com:6060 ru = sip:+447888555999@sip.provider.com:5060", len =
-14632}, gr = {s = 0xf6efd328 <Address 0xf6efd328 out of bounds>,
len = -15344}, transport_val = {s = 0x0, len = 0}, ttl_val = {s =
0x7fffffffc7e0 "", len = 0}, user_param_val = {s = 0x0, len = 6417983},
maddr_val = {s = 0x7fffffffc2c0 "", len = -152920048}, method_val = {
s = 0x7fffffffc310 "\001", len = -208927014}, lr_val = {s = 0x0, len
= 0}, r2_val = {s = 0x800000 <Address 0x800000 out of bounds>, len = 6417983},
gr_val = {s = 0x7fffffffc300 "", len = -152920048}}
next_hop = {user = {s = 0x7fffffffc050 "P\306\377\377\377\177", len =
-244048376}, passwd = {s = 0x7fffffffc060 "\220\300\377\377\377\177", len =
-208927014}, host = {
s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n",
len = 0}, port = {s = 0x800000 <Address 0x800000 out of bounds>, len = 7}, params =
{s = 0x5e7 <Address 0x5e7 out of bounds>, len = -152066768},
sip_params = {s = 0x5e700000001 <Address 0x5e700000001 out of bounds>, len
= 7}, headers = {s = 0x7ffff1741d91
"UH\211\345ATSH\203\354PH\211}\330H\211u\320H\211U\310H\203}", <incomplete
sequence \320>, len = 4283552},
port_no = 50768, proto = 65535, type = 32767, flags = 4316665, transport = {s =
0x7fffffffc090 "P\301\377\377\377\177", len = 4713976}, ttl = {s = 0x0, len =
-152920048}, user_param = {
s = 0x248 <Address 0x248 out of bounds>, len = 0}, maddr = {s =
0x7fffffffc150 "z\037x\367\377\177", len = 6399695}, method = {s =
0x7ffff6efac98 "FѦ", len = -152066264}, lr = {s = 0x0, len = -152066768}, r2 =
{
s = 0x7ffff6e71258 "p\002", len = -14512}, gr = {
s = 0x7ffff6efd360 "v=0\r\no=root 1672889700 1672889700 IN IP4
1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0
101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 te"..., len =
-13552}, transport_val = {s = 0xffffffffffffffff <Address 0xffffffffffffffff out of
bounds>, len = -152066768}, ttl_val = {s = 0x70a910
"build_res_buf_from_sip_req", len = -152066768},
user_param_val = {s = 0x415ca0
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, maddr_val =
{s = 0x0, len = 0}, method_val = {s = 0x7fffffffc1f0 "\360\307\377\377\377\177",
len = 4367338}, lr_val = {
s = 0x4 <Address 0x4 out of bounds>, len = -14304}, r2_val = {s =
0x7ffff7781f79 ">", len = -144248473}, gr_val = {s = 0x7ffff7781f7a
"", len = 1}}
u = 0x7ffff6efc6e8
port = 0
dst_host = 0x47edf8
i = 0
flags = 32767
avp = 0x5f6e2a010
st = {flags = 4294950880, id = 6, name = {n = -243994792, s = {s = 0x7ffff174ef58
"sanity", len = 7}, re = 0x7ffff174ef58}, avp = 0x3f6efa530}
sct = 0x0
sjt = 0x7fff00000000
rve = 0x7ffff6e6ebb8
mct = 0x61a6cf
rv = 0x0
rv1 = 0xd3198
c1 = {cache_type = 10, val_type = RV_BEXPR, c = {avp_val = {n = -152066768, s = {s
= 0x7ffff6efa530 "\005", len = 10932528}, re = 0x7ffff6efa530}, pval = {rs = {s
= 0x7ffff6efa530 "\005", len = 10932528}, ri = 10933206,
flags = 0}}, i2s =
"\221\035t\361\377\177\000\000\240\\A\000\000\000\000\000P\341\377\377\377\177"}
s = {s = 0x100000001 <Address 0x100000001 out of bounds>, len = -152066264}
srevp = {0x7fffffffbfb0, 0x7ffff1744839}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#21 0x000000000042a3ea in run_actions (h=0x7fffffffda40, a=0x7ffff6e6cfb8,
msg=0x7ffff6efa530) at action.c:1548
t = 0x7ffff6e6e240
ret = 1
mod = 0x5294fa
ms = 0
__FUNCTION__ = "run_actions"
#22 0x000000000041a75a in do_action (h=0x7fffffffda40, a=0x7ffff6e99918,
msg=0x7ffff6efa530) at action.c:677
ret = -5
v = -152066768
dst = {send_sock = 0x415ca0, to = {s = {sa_family = 57680, sa_data =
"\377\377\377\177\000\000\060\312\377\377\377\177\000"}, sin = {sin_family =
57680, sin_port = 65535, sin_addr = {s_addr = 32767},
sin_zero = "0\312\377\377\377\177\000"}, sin6 = {sin6_family =
57680, sin6_port = 65535, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 =
"0\312\377\377\377\177\000\000\037\312D\000\000\000\000",
__u6_addr16 = {51760, 65535, 32767, 0, 51743, 68, 0, 0}, __u6_addr32 =
{4294953520, 32767, 4508191, 0}}}, sin6_scope_id = 4142499792}}, id = 32767, proto = 40
'(', send_flags = {f = 204 '\314',
blst_imask = 255 '\377'}}
tmp = 0x7fffffffda40 "\004"
new_uri = 0x7ffff6e2a168 "(W\355\366\377\177"
end = 0x300000000 <Address 0x300000000 out of bounds>
crt = 0x7ffff6ea7128 ">\r\nql"
cmd = 0x7ffff6e56828
len = -152057192
user = 32767
uri = {user = {s = 0x7fffffffc930 "\320\312\377\377\377\177", len =
5514762}, passwd = {s = 0x7fffffffc870 "\340\310\377\377\377\177", len =
6417983}, host = {s = 0x7fffffffc880 "؇\351\366\377\177", len = -152920048},
port = {s = 0x7fffffffc8d0 "", len = -208927014}, params = {s =
0x7fffffffc8e0 "", len = 0}, sip_params = {s = 0x7ffff6e987d8 "\003",
len = -13272}, headers = {s = 0x7ffff6efa530 "\005", len = -9664}, port_no =
25912,
proto = 63215, type = 32767, flags = 8, transport = {s = 0x7ffff1fcc488
"UH\211\345ATSH\203\354PH\211}\330H\211u\320H\211U\310H\213E\320H\211E\340H\213E\330\017\267@
f\203\370\001\017\205\212", len = 4283552}, ttl = {
s = 0x7fffffffcec0 "\220\317\377\377\377\177", len = 4316514},
user_param = {s = 0x7fffffffc900 "", len = 4713976}, maddr = {s = 0x0, len =
-152920048}, method = {s = 0x0, len = 0}, lr = {
s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len =
6399695}, r2 = {s = 0x7fffffffc9d0 "Ї\351\366\377\177", len = -152066768}, gr =
{s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n",
len = -7856}, transport_val = {s = 0x7fffffffcad0
"p\314\377\377\377\177", len = 5531816}, ttl_val = {s = 0x7fffffffc970
"8", len = 4713976}, user_param_val = {s = 0x0, len = -152920048}, maddr_val =
{
s = 0x6f0100 "insert_new_lump_before", len = 7272288}, method_val =
{s = 0x38 <Address 0x38 out of bounds>, len = -152920048}, lr_val = {s =
0x7ffff6e2a1c8 "", len = -152057248}, r2_val = {
s = 0x7fff00000007 <Address 0x7fff00000007 out of bounds>, len =
-152056576}, gr_val = {s = 0x7fff00000007 <Address 0x7fff00000007 out of bounds>,
len = -152407768}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x800000 <Address 0x800000
out of bounds>, len = 7525160}, host = {s = 0xac7c8 <Address 0xac7c8 out of
bounds>, len = 863448}, port = {
s = 0xd2fe8 <Address 0xd2fe8 out of bounds>, len = 8}, params = {s =
0x58 <Address 0x58 out of bounds>, len = -14528}, sip_params = {s = 0x11900618ba6
<Address 0x11900618ba6 out of bounds>, len = -152059472},
headers = {s = 0x7fffffffc740 "", len = 4713976}, port_no = 0, proto =
0, type = ERROR_URI_T, flags = 4142047248, transport = {s = 0x8 <Address 0x8 out of
bounds>, len = 0}, ttl = {s = 0x7fffffffc800 "@\311\377\377",
len = 6399695}, user_param = {s = 0x0, len = 11625600}, maddr = {s =
0x7ffff6ef78c0 "\200d\261", len = 4}, method = {s = 0xb03580 "\376",
len = -158960584}, lr = {s = 0x7ffff6ef78c0 "\200d\261", len = 4}, r2 = {
s = 0x30 <Address 0x30 out of bounds>, len = -152066768}, gr = {s =
0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856},
transport_val = {s = 0x7fffffffc830 "0\311\377\377\377\177",
len = 5421816}, ttl_val = {s = 0x7ffff6e2a1c8 "", len = -152059472},
user_param_val = {s = 0x400000007 <Address 0x400000007 out of bounds>, len =
7721968}, maddr_val = {s = 0x0, len = -152066768}, method_val = {
s = 0x7ffff6e98768 "\002", len = -9664}, lr_val = {s = 0xffffc940
<Address 0xffffc940 out of bounds>, len = 6498312}, r2_val = {s = 0x7fffffffc840
"p\310\377\377\377\177", len = -152066768}, gr_val = {
s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n",
len = -7856}}
u = 0x16
port = 0
dst_host = 0x415ca0
i = 1
flags = 32767
avp = 0x7ffff2b1ee24
st = {flags = 0, id = 13, name = {n = 6417983, s = {s = 0x61ee3f
"H\213E\370H\213P\bH\213E\360H\211\020H\213E\360H\307@(\b", len = -14656}, re =
0x61ee3f}, avp = 0x7ffff6e2a010}
sct = 0x7fffffffcaf0
sjt = 0x44ecff
rve = 0x7ffff6e2a1c8
mct = 0x7ffff6efb7e8
rv = 0x0
rv1 = 0x100000007
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s =
{s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s =
'\000' <repeats 21 times>}
s = {s = 0x1000013c5 <Address 0x1000013c5 out of bounds>, len = 0}
srevp = {0x0, 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#23 0x000000000042a3ea in run_actions (h=0x7fffffffda40, a=0x7ffff6e99688,
msg=0x7ffff6efa530) at action.c:1548
t = 0x7ffff6e99918
ret = 1
mod = 0x0
ms = 0
__FUNCTION__ = "run_actions"
#24 0x000000000041dc3d in do_action (h=0x7fffffffda40, a=0x7ffff6e99a38,
msg=0x7ffff6efa530) at action.c:1044
ret = 1
v = 1
dst = {send_sock = 0x883eb07c, to = {s = {sa_family = 1024, sa_data =
"\000\000\000\000\000\000l\322\377\377\377\177\000"}, sin = {sin_family = 1024,
sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "l\322\377\377\377\177\000"}, sin6 = {sin6_family =
1024, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"l\322\377\377\377\177\000\000\001\000\000\000\000\000\000", __u6_addr16 = {
53868, 65535, 32767, 0, 1, 0, 0, 0}, __u6_addr32 = {4294955628, 32767,
1, 0}}}, sin6_scope_id = 4294955424}}, id = 32767, proto = 112 'p', send_flags =
{f = 38 '&', blst_imask = 84 'T'}}
tmp = 0x7ffff318925b
"\211E\374\203}\374\002\017\224\300\017\266\300H\205\300t3H\213E\350\307\004$"
new_uri = 0x0
end = 0xa6d4f6 "=rtpmap:101 telephone-event/8000\r\na=fmtp:101
0-16\r\na=silenceSupp:off - - -
-\r\na=ptime:20\r\na=sendrecv\r\n\r\n--unique-boundary-1\r\n"
crt = 0x7ffff6efac50 "\001"
cmd = 0x7ffff6e4feb8
len = 0
user = 0
uri = {user = {s = 0x7fffffffd000
"\022*\257By\362\225\001\022*͞\003\rj\376", len = 5514864}, passwd = {s =
0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = -152066768}, host = {s
= 0x7ffff6e690f8 "!\002",
len = -12352}, port = {s = 0x415ca0
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = 0}, params = {s =
0x100000000 <Address 0x100000000 out of bounds>, len = 0}, sip_params = {
s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len =
-11532}, headers = {s = 0x7ffff6efa530 "\005", len = -152066768}, port_no =
23712, proto = 65, type = ERROR_URI_T, flags = 4294959440, transport = {
s = 0x0, len = 0}, ttl = {s = 0x7fffffffd0a0
"\240\321\377\377\377\177", len = 4368975}, user_param = {s = 0x7fffffffd110
"0\321\377\377\377\177", len = -152066768}, maddr = {s = 0x7ffff6e690f8
"!\002", len = -9664},
method = {s = 0x0, len = 1}, lr = {s = 0x7ffff6efa530 "\005", len =
1076832786}, r2 = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300
.n", len = -7856}, gr = {s = 0x0, len = 0}, transport_val = {
s = 0x195f27942af2a12 <Address 0x195f27942af2a12 out of bounds>, len =
-1630721518}, ttl_val = {s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>,
len = -12016}, user_param_val = {s = 0x7ffff6e6a370 "",
len = -152066768}, maddr_val = {s = 0x7fffffffd130
"\020\322\377\377\377\177", len = -216215272}, method_val = {s = 0x7ffff6e6a370
"", len = 4283552}, lr_val = {s = 0x7fffffffd0c0 "", len = 5203602},
r2_val = {
s = 0x7fffffffd1d0 "", len = 1}, gr_val = {s = 0x7fffebb98ca8
"", len = -134289984}}
next_hop = {user = {s = 0x7ffff6e62330 "\374\001", len = -12768}, passwd
= {s = 0x7ffff6ef7770 "8>\351\366\377\177", len = 0}, host = {s = 0x100415ca0
<Address 0x100415ca0 out of bounds>, len = -7856}, port = {
s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len =
5531816}, params = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300
.n", len = -152066768}, sip_params = {
s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n",
len = -7856}, headers = {s = 0x0, len = 0}, port_no = 52992, proto = 65535, type = 32767,
flags = 4368975, transport = {
s = 0xf6ef9eb8 <Address 0xf6ef9eb8 out of bounds>, len = -152066768},
ttl = {s = 0x7ffff6e62330 "\374\001", len = -9664}, user_param = {s = 0x0, len =
1}, maddr = {s = 0x7ffff6efa530 "\005", len = 1156524562},
method = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300
.n", len = -7856}, lr = {s = 0x0, len = 0}, r2 = {s = 0x195f279456f2a12 <Address
0x195f279456f2a12 out of bounds>, len = -1630721518}, gr = {
s = 0x0, len = 0}, transport_val = {s = 0x7fffffffcf50 "", len =
4367338}, ttl_val = {s = 0x42 <Address 0x42 out of bounds>, len = -152066768},
user_param_val = {
s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n",
len = -7856}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x7fffffffcf90
"\240\320\377\377\377\177", len = 4367338}, lr_val = {
s = 0x7fffffffcf10 "", len = -152066768}, r2_val = {s =
0x7ffff6ea3608 "\002\004", len = -10304}, gr_val = {s = 0x7ffff6ebbe70
"\270\276\353\366\377\177", len = 1}}
u = 0x0
port = 0
dst_host = 0x7fffffffd780
i = 32767
flags = 32767
avp = 0x7fffffffda40
st = {flags = 4294954336, id = 32767, name = {n = -152078480, s = {s =
0x7ffff6ef7770 "8>\351\366\377\177", len = 4283552}, re = 0x7ffff6ef7770},
avp = 0x7fffffffe150}
sct = 0x7fffffffd130
sjt = 0x3f3189fbc
rve = 0x7ffff6e98ed0
mct = 0x7ffff6efa530
rv = 0x7fffffffce20
rv1 = 0x7fffffffd210
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s =
{s = 0x0, len = -12816}, re = 0x0}, pval = {rs = {s = 0x0, len = -12816}, ri = -152736744,
flags = 32767}},
i2s =
"\000\000\000\000\000\000\000\000A@\357\366\377\177\000\000\060\000\000\000\060"}
s = {s = 0x100415ca0 <Address 0x100415ca0 out of bounds>, len = -7856}
srevp = {0x7fffffffcd00, 0x7ffff6efa530}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#25 0x000000000042a3ea in run_actions (h=0x7fffffffda40, a=0x7ffff6e99a38,
msg=0x7ffff6efa530) at action.c:1548
t = 0x7ffff6e99a38
ret = -1
mod = 0xf6efa530
ms = 0
__FUNCTION__ = "run_actions"
#26 0x000000000041a75a in do_action (h=0x7fffffffda40, a=0x7ffff6e69d08,
msg=0x7ffff6efa530) at action.c:677
ret = -5
v = 1
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
"\000\000\377\177\000\000 \330\377\377\377\177\000"}, sin = {sin_family = 0,
sin_port = 0, sin_addr = {s_addr = 32767}, sin_zero = "
\330\377\377\377\177\000"},
sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 32767, sin6_addr =
{__in6_u = {__u6_addr8 = " \330\377\377\377\177\000\000Ϧa\000\000\000\000",
__u6_addr16 = {55328, 65535, 32767, 0, 42703, 97, 0, 0},
__u6_addr32 = {4294957088, 32767, 6399695, 0}}}, sin6_scope_id = 1}}, id
= 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0
'\000'}}
tmp = 0xa6d140 "0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards:
69\r\nFrom: <sip:+447888555999@1.2.3.4:5061>;tag=as29e42e9b\r\nTo:
<sip:+447888555999@1.2.3.4:5060>\r\nContact: <sip:+447888555999@"...
new_uri = 0x2e <Address 0x2e out of bounds>
end = 0xa6d58a ""
crt = 0x7fffffffd820 "\220\331\377\377\377\177"
cmd = 0x7ffff6e56940
len = 0
user = 0
uri = {user = {s = 0x7ffff6efac50 "\001", len = -152063064}, passwd = {s
= 0x7fffffffd6ee "\005\005qѦ", len = -10513}, host = {
s = 0xa6d4f6 "=rtpmap:101 telephone-event/8000\r\na=fmtp:101
0-16\r\na=silenceSupp:off - - -
-\r\na=ptime:20\r\na=sendrecv\r\n\r\n--unique-boundary-1\r\n", len = 10932569}, port
= {
s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n",
len = 10932591}, params = {s = 0x500000000000000 <Address 0x500000000000000 out of
bounds>, len = 0}, sip_params = {s = 0x776054 "parse_via",
len = 7812227}, headers = {s = 0x40 <Address 0x40 out of bounds>, len =
-152920048}, port_no = 41432, proto = 63202, type = 32767, flags = 4294956776, transport =
{s = 0x400000008 <Address 0x400000008 out of bounds>,
len = 10932564}, ttl = {s = 0x415ca0
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = 331735376},
user_param = {
s = 0xa6d158 ";branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom:
<sip:+447888555999@1.2.3.4:5061>;tag=as29e42e9b\r\nTo:
<sip:+447888555999@1.2.3.4:5060>\r\nContact:
<sip:+447888555999@1.2.3.4:5061>\r\nCal"..., len = 10932568}, maddr = {s =
0x7fffffffd820 "\220\331\377\377\377\177", len = 6799587}, method = {s =
0xffffd938 <Address 0xffffd938 out of bounds>, len = -338231396}, lr = {
s = 0xffffffffffffd6f0 <Address 0xffffffffffffd6f0 out of bounds>, len =
6417983}, r2 = {s = 0x7fffffffd6e0 "", len = -152920048}, gr = {s =
0x7fffffffd730 "`\327\377\377\377\177", len = -152064944}, transport_val = {
s = 0xa6d4f6 "=rtpmap:101 telephone-event/8000\r\na=fmtp:101
0-16\r\na=silenceSupp:off - - -
-\r\na=ptime:20\r\na=sendrecv\r\n\r\n--unique-boundary-1\r\n", len = 10932538},
ttl_val = {
s = 0x800000 <Address 0x800000 out of bounds>, len = 0}, user_param_val
= {
s = 0xa6d171 "Max-Forwards: 69\r\nFrom:
<sip:+447888555999@1.2.3.4:5061>;tag=as29e42e9b\r\nTo:
<sip:+447888555999@1.2.3.4:5060>\r\nContact:
<sip:+447888555999@1.2.3.4:5061>\r\nCall-ID: 74653c5b109e03c231c"..., len =
10932569}, maddr_val = {s = 0xd2df8 <Address 0xd2df8 out of bounds>, len =
-152064944}, method_val = {s = 0x7ffff6efb3a8 "2", len = -216038109}, lr_val =
{s = 0x7400415ca0 <Address 0x7400415ca0 out of bounds>,
len = -152065000}, r2_val = {s = 0x7fffffffd760 "
\330\377\377\377\177", len = 4713976}, gr_val = {s = 0x0, len = -152920048}}
next_hop = {user = {s = 0xa7d260 "", len = 7528240}, passwd = {s =
0xabd10 <Address 0xabd10 out of bounds>, len = -338231312}, host = {s = 0x415ca0
"1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856},
port = {s = 0x7fffffffd510 "@\325\377\377\004", len = -216229634},
params = {s = 0x7fffffffd4d0 "\020\026\327\353\002", len = -216493477},
sip_params = {s = 0x7ffff6efa530 "\005", len = -338225568}, headers = {
s = 0x7fffebd6ff80 "x\364\321\353\377\177", len = -338561912},
port_no = 5728, proto = 60375, type = 32767, flags = 4142900528, transport = {s =
0x2ebd71610 <Address 0x2ebd71610 out of bounds>, len = -215601968},
ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 100}, maddr = {s =
0x7fffffffd5d0 "P\254\357\366\377\177", len = 6417983}, method = {s =
0x4ffffd540 <Address 0x4ffffd540 out of bounds>, len = 7803616}, lr = {
s = 0x7fffffffd590 "\300\325\377\377\377\177", len = -208927014}, r2
= {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len =
16}, gr = {s = 0x7fffffffd680 " \330\377\377\377\177", len = 6754917},
transport_val = {s = 0xab6e0 <Address 0xab6e0 out of bounds>, len =
858952}, ttl_val = {s = 0xd2df8 <Address 0xd2df8 out of bounds>, len = 8},
user_param_val = {s = 0x72 <Address 0x72 out of bounds>, len = -338230976},
maddr_val = {s = 0x9ce00000000 <Address 0x9ce00000000 out of bounds>, len
= -152063120}, method_val = {s = 0x7fffffffd5c0 "\200\326\377\377\377\177", len
= 4713976}, lr_val = {s = 0x0, len = -152920048}, r2_val = {
s = 0x0, len = 0}, gr_val = {s = 0x7fffffffd680 "
\330\377\377\377\177", len = 6399695}}
u = 0x74f6efa530
port = 0
dst_host = 0x75a52c
i = 10
flags = 0
avp = 0x7ffff6e2a010
st = {flags = 10998064, id = 0, name = {n = 10998072, s = {s = 0xa7d138
"", len = 10998080}, re = 0xa7d138}, avp = 0xa7d148}
sct = 0x7ffff6e2a328
sjt = 0x7ffff6efac18
rve = 0x7ffff6e692d0
mct = 0x0
rv = 0x0
rv1 = 0x7ffff6efa728
c1 = {cache_type = 10932905, val_type = RV_NONE, c = {avp_val = {n = 10932899, s =
{
s = 0xa6d2a3 "5 16:45:20 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS,
BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH\r\nSupported: replaces,
timer\r\nX-Call-History-Id: 514007383\r\nX-SIPS-CALLID:
1388554425(a)192.168.1.72\r\nP-A"quot;..., len = -11072}, re = 0xa6d2a3}, pval = {rs = {
s = 0xa6d2a3 "5 16:45:20 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS,
BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH\r\nSupported: replaces,
timer\r\nX-Call-History-Id: 514007383\r\nX-SIPS-CALLID:
1388554425(a)192.168.1.72\r\nP-A"quot;..., len = -11072}, ri = -338231424, flags = 32767}},
i2s =
"\b(\352\366\377\177\000\000\360\377\326\353\377\177\000\000(\247\357\366\377\177"}
s = {
s = 0xa6d37c " <sip:+447888555999@1.2.3.4>\r\nContent-Length:
365\r\nContent-Type:
multipart/mixed;boundary=\"unique-boundary-1\"\r\nMime-Version:
1.0\r\n\r\n--unique-boundary-1\r\nContent-Type:
application/sdp\r\n\r\nv=0\r\no=r"..., len = 10932896}
srevp = {0x75d3e0, 0x7ffff6efb160}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#27 0x000000000042a3ea in run_actions (h=0x7fffffffda40, a=0x7ffff6e60d18,
msg=0x7ffff6efa530) at action.c:1548
t = 0x7ffff6e69d08
ret = 1
mod = 0xa6d133
ms = 0
__FUNCTION__ = "run_actions"
#28 0x000000000042ab17 in run_top_route (a=0x7ffff6e60d18, msg=0x7ffff6efa530, c=0x0) at
action.c:1634
ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf =
{140737336289064, 114263968871033362, 4283552, 140737488347472, 0, 0, 114263968912976402,
-114264531344217582}, __mask_was_saved = 0,
__saved_mask = {__val = {140737279388689, 8437870752, 14,
4611686022726615054, 0, 140737488345840, 140737279389571, 227640687945, 0,
4611686026796357744, 140737336288560, 140737488345904, 5635185, 8589925168,
140737336288560, 0}}}}}
p = 0x7fffffffda40
ret = -152066264
sfbk = 0
#29 0x0000000000509330 in receive_msg (
buf=0xa6d100 "INVITE sip:+447888555999@1.2.3.4:5060 SIP/2.0\r\nVia: SIP/2.0/UDP
1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom:
<sip:+447888555999@1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip"..., len=1014,
rcv_info=0x7fffffffdd30) at receive.c:196
msg = 0x7ffff6efa530
ctx = {rec_lev = 700032, run_flags = 0, last_retcode = 852720, jmp_env =
{{__jmpbuf = {852880, 8, 46, 140737488346128, 1705108409254, 140737335931856,
140737343873808, 140737354063872}, __mask_was_saved = 0,
__saved_mask = {__val = {4294967295, 8, 1, 140737147573488, 0, 0, 1024,
8589925504, 140737147573488, 140737488346240, 6298145, 140737219175072, 140737147573488,
140737333187210, 6298273, 140737488346608}}}}}
ret = -9008
inb = {
s = 0xa6d100 "INVITE sip:+447888555999@1.2.3.4:5060 SIP/2.0\r\nVia:
SIP/2.0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom:
<sip:+447888555999@1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip"..., len =
1014}
__FUNCTION__ = "receive_msg"
#30 0x0000000000608a2e in udp_rcv_loop () at udp_server.c:495
len = 1014
buf = "INVITE sip:+447888555999@1.2.3.4:5060 SIP/2.0\r\nVia: SIP/2.0/UDP
1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom:
<sip:+447888555999@1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip"...
tmp = 0x7ffff7df1865 "I\211\303L\213L$0L\213D$(H\213|$
H\213t$\030H\213T$\020H\213L$\bH\213\004$H\203\304HA\377\343ffffff.\017\037\204"
from = 0x7ffff6ea3408
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {140733620534309, 140737488347472},
addr32 = {427146277, 32767, 4294959440, 32767}, addr16 = {48165, 6517, 32767, 0, 57680,
65535, 32767, 0},
addr = "%\274u\031\377\177\000\000P\341\377\377\377\177\000"}},
dst_ip = {af = 2, len = 4, u = {addrl = {427146277, 0}, addr32 = {427146277, 0, 0, 0},
addr16 = {48165, 6517, 0, 0, 0, 0, 0, 0},
addr = "%\274u\031", '\000' <repeats 11 times>}},
src_port = 5061, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s =
{sa_family = 2,
sa_data = "\023\305%\274u\031\000\000\000\000\000\000\000"}, sin =
{sin_family = 2, sin_port = 50451, sin_addr = {s_addr = 427146277}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2,
sin6_port = 50451, sin6_flowinfo = 427146277, sin6_addr = {__in6_u =
{__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0,
0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}},
bind_address = 0x7ffff6e4b1d8, proto = 1 '\001'}
__FUNCTION__ = "udp_rcv_loop"
#31 0x00000000004a5ca4 in main_loop () at main.c:1382
i = 7390784
pid = 4053
si = 0x400000000
si_desc =
"\356\326p\000\000\000\000\000@\306p\000\000\000\000\000\b\000\000\000\001\000\000\000\260\024\260\353\377\177\000\000\220\336\377\377\377\177\000\000\363wN\000\000\000\000\000\t\000\000\000\377\177\000\000\260\024\260\353\377\177\000\000\000\000\000\004\004\000\000\000\260\024\260\353\377\177\000\000\240\\A\000\000\000\000\000P\341\377\377\001\000\000\000\340\336\377\377\377\177\000\000\226xN\000\000\000\000\000h\241\342\366n\000\000\000\356\326p\000\000\000\000"
nrprocs = 7352968
__FUNCTION__ = "main_loop"
#32 0x00000000004acd36 in main (argc=12, argv=0x7fffffffe158) at main.c:2533
cfg_stream = 0xa85010
c = -1
r = 0
tmp = 0x7fffffffe421 ""
tmp_len = 32767
port = -143129121
proto = 0
options = 0x702650
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
ret = -1
seed = 3752915056
rfd = 8
debug_save = 0
debug_flag = 0
dont_fork_cnt = 1
n_lst = 0x40d7d4
p = 0x0
__FUNCTION__ = "main"
(gdb) quit
A debugging session is active.
Inferior 1 [process 4049] will be killed.
Quit anyway? (y or n)
---
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/240#issuecomment-120066445