After applying the linuxmaniac's patch, I have a new crash
```
# gdb /usr/sbin/kamailio /tmp/core
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later
<http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from
/usr/lib/debug/.build-id/4e/fae9c9a848e19a554209666ff42a678720280e.debug...done.
done.
[New LWP 15013]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid
-f /etc/kamailio/kamailio.'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74
74 ../../mem/../atomic/atomic_common.h: No such file or directory.
(gdb) bt full
#0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74
No locals.
#1 dlg_unref_helper (dlg=0x7f4b606c5008, cnt=1, fname=0x3aa5 <error: Cannot
#access memory at address 0x3aa5>, fline=1650) at dlg_hash.c:925
mypid = 15013
d_entry = 0x7f555b6b2bf0
__FUNCTION__ = "dlg_unref_helper"
#2 0x00007f4b4d3d0e12 in dlg_run_event_route (dlg=0x7f4b606c5008,
msg=0x7f4b93f32aa8, ostate=1390662688, nstate=1) at dlg_handlers.c:1650
rt = 10133176
bkroute = 1
__FUNCTION__ = "dlg_run_event_route"
#3 0x00007f4b4d3d421e in dlg_onroute (req=0x7f4b93f32aa8,
route_params=0x7f4b52e3be10, param=0x7f4b52e3d420) at dlg_handlers.c:1318
dlg0 = 0x3aa5
val = {
s = 0x119535a "da8.12b2;nat=yes>\r\nRoute:
<sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom:
\"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customer"..., len = 8}
callid = {
s = 0x1195453 "510932234-31301-205(a)BJC.BGI.A.DC\r\nCSeqnCSeq: 2042
BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3"..., len = 32}
ftag = {
s = 0x11953fb "1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall-ID:
510932234-31301-205(a)BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax"..., len = 10}
ttag = {
s = 0x119543e "as695cd3d4\r\nCall-ID:
510932234-31301-205(a)BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Ag"..., len = 10}
new_state = 5
old_state = 4
unref = 1
event = 7
dir = 1
ret = 15013
__FUNCTION__ = "dlg_onroute"
#4 0x00007f4b4fcae28d in run_rr_callbacks (req=0x7f4b93f32aa8,
rr_param=0x7ffe5b58c860) at rr_cb.c:96
l_param = {
s = 0x119532f
"transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nRoute:
<sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom:
\"IbsVoip02\" <sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;"..., len
= 59}
cbp = 0x7f4b93f12208
__FUNCTION__ = "run_rr_callbacks"
#5 0x00007f4b4fca08a2 in after_loose (_m=0x7f4b93f32aa8, preloaded=2) at
loose.c:928
puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host
= {
s = 0x1195379
"xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom:
\"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as6"..., len = 12}, port
= {s = 0x0, len = 0}, params = {
s = 0x1195386
"r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: \"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall"...,
len = 45}, sip_params = {
s = 0x1195386
"r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: \"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall"...,
len = 45}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type =
SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s =
0x0, len = 0}, user_param = {
s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s =
0x0, len = 0}, lr = {
s = 0x119538c "lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom:
\"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall-ID:
5"..., len = 2}, r2 = {
s = 0x1195386
"r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: \"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061---Type <return> to continue,
or q <return> to quit---
;tag=as695cd3d4\r\nCall"..., len = 5}, gr = {s =
0x0, len = 0},
;transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0},
;user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0},
r2_val = {
s = 0x1195389
"on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: \"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall-ID"...,
len = 2}, gr_val = {s = 0x0, len = 0}}
rt = 0x0
status = 15013
uri = {
s = 0x1195319
"sip:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nRoute:
<sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom:
\"IbsVoip02\" <sip:xxxxxx02@customers."..., len = 81}
use_ob = 0
rparams = {
s = 0x119532f
"transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nRoute:
<sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom:
\"IbsVoip02\" <sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;"..., len
= 59}
__FUNCTION__ = "after_loose"
#6 0x0000000000541cf0 in do_action (h=0x7ffe5b58cf80, a=0x7f4b93d577b8,
msg=0x7f4b93f32aa8) at action.c:1060
ret = -5
v = 0
dst = {send_sock = 0x7ffe5b58cad0, to = {s = {sa_family = 1215,
sa_data = "B\000\000\000\000\000\300Y\363\223K\177\000"}, sin =
{sin_family = 1215, sin_port = 66, sin_addr = {s_addr = 0},
sin_zero = "\300Y\363\223K\177\000"}, sin6 = {sin6_family =
1215, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8
= "\300Y\363\223K\177\000\000\273\065B\000\000\000\000",
__u6_addr16 = {22976, 37875, 32587, 0, 13755, 66, 0, 0},
__u6_addr32 = {2482198976, 32587, 4339131, 0}}}, sin6_scope_id = 18437387}},
id = 0, proto = 15 '\017', send_flags = {f = 0 '\000',
blst_imask = 0 '\000'}}
end = 0x7ffe5b58cf80 "\001"
uri = {user = {s = 0x7ffe5b58e250 "\003", len = 4329872}, passwd =
{s = 0x24f2c0 <error: Cannot access memory at address 0x24f2c0>, len
= 1532545924}, host = {
s = 0x2d2028 <error: Cannot access memory at address 0x2d2028>,
len = 1617711112}, port = {s = 0xa <error: Cannot access memory at address
0xa>, len = 0}, params = {
s = 0x1 <error: Cannot access memory at address 0x1>, len =
1390517168}, sip_params = {s = 0x7ffe5b58ccb0 "\373S\031\001", len =
5615623}, headers = {s = 0x0, len = 1774088704}, port_no = 65535,
proto = 65535, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE |
unknown: 1295691688), transport = {s = 0x7ffe5b58cca0 "ST\031\001", len =
1532546204}, ttl = {s = 0x0, len = 1390517168},
user_param = {
s = 0x1195453 "510932234-31301-205(a)BJC.BGI.A.DC\r\nCSeqnCSeq: 2042
BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3"..., len = 32}, maddr = {s = 0x8ad00000001 <error: Cannot access memory
at address 0x8ad00000001>, len = 10}, method = {s = 0x7ffe5b58e250 "\003",
len = 1532546208}, lr = {
s = 0x1195473 "\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3240 1.0.3.162\r\nAllow: INVITE, AC"..., len = 18437235}, r2 = {s =
0x1c4fd8 <error: Cannot access memory at address 0x1c4fd8>, len = 8}, gr =
{s = 0x2363ce <error: Cannot access memory at address 0x2363ce>,
len = 1532546148}, transport_val = {s = 0x500000000 <error:
Cannot access memory at address 0x500000000>, len = 1617711112}, ttl_val =
{s = 0x7f4b52e19bb0 "", len = 15013}, user_param_val = {
s = 0x3ac <error: Cannot access memory at address 0x3ac>, len =
1}, maddr_val = {s = 0x7f4b52e19bc4 "", len = 5615623}, method_val = {
s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route:
<sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068>\r\nRecord-Route:
<sips:xx.xx.xx.51;r2"..., len = 1774088704}, lr_val = {s = 0x7f4b5eac2050
"P\036\241SK\177", len = 1295744733}, r2_val = {s = 0x0, len = 1774088704},
gr_val = {s = 0x0, len = 1296097425}}
next_hop = {user = {
s = 0x1195453 "510932234-31301-205(a)BJC.BGI.A.DC\r\nCSeqnCSeq: 2042
BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3"..., len = 32}, passwd = {
s = 0x11953fb "1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall-ID:
510932234-31301-205(a)BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax"..., len = 10}, host
= {
s = 0x119543e "as695cd3d4\r\nCall-ID:
510932234-31301-205(a)BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Ag"..., len =
1617711112}, port = {s = 0x0, len = 1774088704}, params = {s =
0x7ffe5b58e250 "\003", len = -1814770512}, sip_params = {s = 0x7f4b93f32aa8
"}\346\003",
len = 1532546576}, headers = {
s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route:
<sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068>\r\nRecord-Route:
<sips:xx.xx.xx.51;r2"..., len = 1390446080}, port_no = 8272, proto = 24236,
type = 32587, flags = (URI_USER_NORMALIZE | unknown: 1296103236), transport
= {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0},
user_param = {s = 0x0, len = 0}, maddr = {s = 0x7f4b93c7ea78 "1",
len = 1}, method = {s = 0x1 <error: Cannot access memory at address 0x1>,
len = 1774088704}, lr = {
s = 0x7fa93d906b0 <error: Cannot access memory at address
0x7fa93d906b0>, len = -1814770536}, r2 = {s = 0x7ffe5b58ce10 "", len =
-1812780376}, gr = {s = 0x7ffe5b58e250 "\003", len = 1532547044},
transport_val = {s = 0x0, len = 5795166}, ttl_val = {s =
0x7ffe5b58cfe4 "\001", len = 1532551760}, user_param_val = {s =
0x7f4b93f32aa8 "}\346\003", len = 1532551760}, maddr_val = {
s = 0x7ffe5b58cfe4 "\001", len = 4329797}, method_val = {s =
0xa00000000 <error: Cannot access memory at address 0xa00000000>, len =
1617711112}, lr_val = {
---Type <return> to continue, or q <return> to quit---
s = 0xa <error: Cannot access memory at address 0xa>, len = 0},
r2_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len =
1390517168}, gr_val = {s = 0x0, len = 0}}
u = 0x7ffe5b58cf80
flags = 0
st = {flags = 18437203, id = 0, name = {n = 32, s = {s = 0x20
<error: Cannot access memory at address 0x20>, len = 18437115}, re =
0x20}, avp = 0xa}
sct = 0x7ffe5b58cf80
sjt = 0x7ffe5b58cf80
mct = 0x0
rv = 0x7f4b93f32aa8
rv1 = 0x7f4b93f32aa8
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val
= {n = 0, s = {s = 0x0, len = 1532546408}, re = 0x0}, pval = {rs =
{s = 0x0, len = 1532546408}, ri = 1532546376, flags = 32766}},
i2s = "h\315X[\376\177\000\000\000r\276io;\351\273( -\000\000"}
s = {s = 0x7ffe5b58e250 "\003", len = 1532547200}
srevp = {0x7f4b93d577b8, 0x7f4b93f32aa8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
{type = NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#7 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffe5b58cf80,
a=0x7f4b52e3be10, msg=0x7f4b52e3d420) at action.c:1549
ret = 1532551760
mod = 0x7f4b93d577b8
__FUNCTION__ = "run_actions"
#8 0x000000000054d187 in run_actions_safe (h=0x7ffe5b58e250, a=<optimized
out>, msg=<optimized out>) at action.c:1614
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env =
{{__jmpbuf = {140730430967680, 2679121111027585546, 139962581461672,
140730430972496, 140730430968496, 0, 2679121111971303946,
-2678920028792385014}, __mask_was_saved = 0, __saved_mask =
-{__val = {13540419104367604224, 4297924648,
-139962579756256, 139962578602400, 139960099274753, 0,
-13540419104367604224, 0,
139962580007312, 140730430967984, 139962581461672,
140730430972496, 140730430968496, 0, 5795166, 140730430968496}}}}}
ret = <optimized out>
ign_on_break = 0
#9 0x0000000000421190 in rval_get_int (h=0x7ffe5b58e250, msg=0x1,
i=0x7ffe5b58d2b0, rv=0xb7c, cache=0x67) at rvalue.c:912
r_avp = 0x3aa5
avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at
address 0x1>, len = -1814181456}, re = 0x1}
pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}
tmp = {s = 0xa49900 <_pkg_root> "\313\030p", len = 0}
s = 0x7f4b93f32aa8
r = 15013
ret = 15013
destroy_pval = 1532551760
__FUNCTION__ = "rval_get_int"
#10 0x0000000000426f1c in rval_expr_eval_int (h=0x7ffe5b58e250,
msg=0x7f4b93f32aa8, res=0x7ffe5b58d2b0, rve=0x7f4b93d56c50) at rvalue.c:1910
i1 = 0
i2 = 0
ret = -1
c1 = {cache_type = 1532551760, val_type = 32766, c = {avp_val = {n =
0, s = {s = 0x300000000 <error: Cannot access memory at address
0x300000000>, len = -1814207504}, re = 0x300000000}, pval = {rs = {
s = 0x300000000 <error: Cannot access memory at address
0x300000000>, len = -1814207504}, ri = -1812780376, flags = 32587}},
i2s =
"\000\000\000\000\004\000\000\000\217J\251MK\177\000\000\213\310ƓK\177"}
c2 = {cache_type = 2479561888, val_type = 32587, c = {avp_val = {n =
5799339, s = {s = 0x100587dab <error: Cannot access memory at address
0x100587dab>, len = 18437069}, re = 0x100587dab}, pval = {
rs = {s = 0x100587dab <error: Cannot access memory at address
0x100587dab>, len = 18437069}, ri = 9, flags = 0}}, i2s =
"\260\311ݓK\177\000\000\000r\276io;\351\273\001\000\000\000\000"}
---Type <return> to continue, or q <return> to quit---
rv1 = 0x7f4b93f32aa8
rv2 = 0x0
__FUNCTION__ = "rval_expr_eval_int"
#11 0x00000000005421c7 in do_action (h=0x7ffe5b58e250, a=0x7f4b93d5dd20,
msg=0x7f4b93f32aa8) at action.c:1030
ret = -5
v = 0
dst = {send_sock = 0x7ffe5b58d430, to = {s = {sa_family = 29184,
sa_data = "\276io;\351\273\000\326X[\376\177\000"}, sin =
{sin_family = 29184, sin_port = 27070, sin_addr = {s_addr =
3152624495},
sin_zero = "\000\326X[\376\177\000"}, sin6 = {sin6_family =
29184, sin6_port = 27070, sin6_flowinfo = 3152624495, sin6_addr = {__in6_u =
{
__u6_addr8 =
"\000\326X[\376\177\000\000\221\340@MK\177\000", __u6_addr16 = {54784,
23384, 32766, 0, 57489, 19776, 32587, 0}, __u6_addr32 = {1532548608, 32766,
1296097425, 32587}}},
sin6_scope_id = 18437203}}, id = 0, proto = 32 ' ', send_flags
= {f = 0 '\000', blst_imask = 0 '\000'}}
end = 0x7f4b93d56c50 "\001"
uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>,
len = 1390517168}, passwd = {s = 0x7ffe5b58d4a0 "\373S\031\001", len =
5615623}, host = {s = 0x0, len = 1774088704}, port = {
s = 0x0, len = 1295691689}, params = {s = 0x7ffe5b58d490
"ST\031\001", len = 1532548236}, sip_params = {s = 0x7ffe00000000 <error:
Cannot access memory at address 0x7ffe00000000>,
len = 1390517168}, headers = {
s = 0x1195453 "510932234-31301-205(a)BJC.BGI.A.DC\r\nCSeqnCSeq: 2042
BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3"..., len = 32}, port_no = 54480, proto = 23384, type = 2221, flags =
(URI_SIP_USER_PHONE | unknown: 8), transport = {s = 0x7f4b93dced70
"\225\004", len = 1532548240}, ttl = {
s = 0x1195473 "\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3240 1.0.3.162\r\nAllow: INVITE, AC"..., len = 18437235}, user_param = {s
= 0x1c4fd8 <error: Cannot access memory at address 0x1c4fd8>, len = 8},
maddr = {
s = 0x2363ce <error: Cannot access memory at address 0x2363ce>,
len = 1532548180}, method = {s = 0x7f4b93deb350 "\001", len = 1617711112},
lr = {s = 0x7f4b52e19bb0 "", len = 15013}, r2 = {
s = 0x3ac <error: Cannot access memory at address 0x3ac>, len =
1}, gr = {s = 0x7f4b52e19bc4 "", len = 5615623}, transport_val = {
s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route:
<sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068>\r\nRecord-Route:
<sips:xx.xx.xx.51;r2"..., len = 1774088704}, ttl_val = {s = 0x7f4b5338cc58
"p\314\070SK\177", len = 1295744733}, user_param_val = {s = 0x7ffe5b58e250
"\003", len = 1774088704}, maddr_val = {
s = 0x770000006e <error: Cannot access memory at address
0x770000006e>, len = 1296097425}, method_val = {
s = 0x1195453 "510932234-31301-205(a)BJC.BGI.A.DC\r\nCSeqnCSeq: 2042
BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3"..., len = 32}, lr_val = {
s = 0x11953fb "1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall-ID:
510932234-31301-205(a)BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax"..., len = 10},
r2_val = {
s = 0x119543e "as695cd3d4\r\nCall-ID:
510932234-31301-205(a)BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Ag"..., len =
1617711112}, gr_val = {s = 0x0, len = 1774088704}}
next_hop = {user = {s = 0x0, len = -1815362160}, passwd = {s =
0x7f4b93f32aa8 "}\346\003", len = 1532548608}, host = {
s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route:
<sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068>\r\nRecord-Route:
<sips:xx.xx.xx.51;r2"..., len = 1390446080}, port = {s = 0x7f4b5338cc58
"p\314\070SK\177", len = 1296103237}, params = {
s = 0x252e2674d62c920a <error: Cannot access memory at address
0x252e2674d62c920a>, len = 1713803786}, sip_params = {s = 0x7ffe00000000
<error: Cannot access memory at address 0x7ffe00000000>,
len = 1532549040}, headers = {s = 0x11a9360 "\r", len =
-1814121640}, port_no = 51760, proto = 37831, type = 32587, flags =
URI_USER_NORMALIZE, transport = {s = 0x0, len = 1774088704}, ttl = {
s = 0x0, len = -1815362184}, user_param = {s = 0x7ffe5b58d600
"", len = -1812780376}, maddr = {s = 0x7ffe5b58e250 "\003", len =
1532549120}, method = {s = 0x0, len = 5795166}, lr = {
s = 0x7ffe5b58d800 "", len = 1532551760}, r2 = {s =
0x7f4b93f32aa8 "}\346\003", len = 1532551760}, gr = {s = 0x7ffe5b58d800
"",
len = 4329797}, transport_val = {
s = 0x600000000 <error: Cannot access memory at address
0x600000000>, len = 18537344}, ttl_val = {s = 0x1f480 <error: Cannot access
memory at address 0x1f480>, len = -1795123680}, user_param_val = {
s = 0x11ae390 "", len = 1532548676}, maddr_val = {s = 0x0, len =
0}, method_val = {s = 0x0, len = 1774088704}, lr_val = {s = 0x24f9d0 <error:
Cannot access memory at address 0x24f9d0>,
len = -1815362200}, r2_val = {s = 0xffffffff <error: Cannot
access memory at address 0xffffffff>, len = -1812780376}, gr_val = {s =
0x7ffe5b58e250 "\003", len = 1532549120}}
u = 0x7f4b93d56c50
flags = 32587
st = {flags = 0, id = 0, name = {n = -1815362160, s = {s =
0x7f4b93cbc590 "", len = -1812780376}, re = 0x7f4b93cbc590}, avp =
0x7ffe5b58d600}
sct = 0x7f4b93d56c50
sjt = 0x7f4b93d56c50
mct = 0x0
rv = 0x55b007 <get_debug_level+103>
rv1 = 0x7f4b93f32aa8
c1 = {cache_type = 18437115, val_type = RV_NONE, c = {avp_val = {n =
10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len =
18437182}, re = 0xa}, pval = {rs = {
s = 0xa <error: Cannot access memory at address 0xa>, len =
18437182}, ri = 1532547956, flags = 32766}}, i2s =
"`\323X[\376\177\000\000\bPl`K\177\000\000\n\000\000\000\000"}
---Type <return> to continue, or q <return> to quit---
s = {
s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route:
<sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068>\r\nRecord-Route:
<sips:xx.xx.xx.51;r2"..., len = 1774088704}
srevp = {0x7f4b93d5dd20, 0x7f4b93f32aa8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#12 0x00000000005407b5 in run_actions (h=0x1, a=0x7f4b52e3be10,
msg=0x7f4b52e3d420) at action.c:1549
ret = 1
mod = 0x7f4b93d5dd20
__FUNCTION__ = "run_actions"
#13 0x00000000005423e0 in do_action (h=0x7ffe5b58e250, a=0x7f4b93f001a0,
msg=0x7f4b93f32aa8) at action.c:678
ret = -5
v = 0
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
"\000\000\000\000\000\000\220\340X[\376\177\000"}, sin = {sin_family
= 0, sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "\220\340X[\376\177\000"}, sin6 = {sin6_family = 0,
sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"\220\340X[\376\177\000\000\230JȔ\001\000\000",
__u6_addr16 = {57488, 23384, 32766, 0, 19096, 38088, 1,
0}, __u6_addr32 = {1532551312, 32766, 2496154264, 1}}}, sin6_scope_id =
2481185840}}, id = 32587, proto = -88 '\250', send_flags = {
f = 42 '*', blst_imask = 243 '\363'}}
end = 0x8 <error: Cannot access memory at address 0x8>
uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>,
len = 1390517168}, passwd = {s = 0x7ffe5b58d9f0 "P\342X[\376\177",
len = 5615623}, host = {s = 0x0, len = 1774088704}, port = {
s = 0x0, len = -1815365104}, params = {s = 0x7ffe5b58e250
"\003", len = -5}, sip_params = {s = 0x7ffe5b58da20 "", len =
-1812780376},
headers = {s = 0x0, len = 5506997}, port_no = 55840,
proto = 23384, type = 32766, flags = (unknown: 1532549712),
transport = {s = 0x7f4b93cbba10 "\267\001", len = -1812780376}, ttl = {
s = 0x100000000 <error: Cannot access memory at address
0x100000000>, len = -1798116625}, user_param = {s = 0x770000006e <error:
Cannot access memory at address 0x770000006e>, len = 0}, maddr = {
s = 0x7ffe5b58da18 "\207\321T", len = 18536232}, method = {s =
0x11951b0 "\001", len = 18436272}, lr = {s = 0x0, len = 18436272}, r2 = {
s = 0x100000003 <error: Cannot access memory at address
0x100000003>, len = 1532550256}, gr = {s = 0x3 <error: Cannot access memory
at address 0x3>, len = 0}, transport_val = {
s = 0x200000001 <error: Cannot access memory at address
0x200000001>, len = 1532549664}, ttl_val = {s = 0x11a9220 "\240P\031\001",
len = 0}, user_param_val = {s = 0x7f4b93f35d0e "Grandstream GXV",
len = 1}, maddr_val = {s = 0x1ad710 <error: Cannot access memory
at address 0x1ad710>, len = -1798137055}, method_val = {s = 0x7ffe5b58da1c
"", len = 0}, lr_val = {s = 0x7ffe5b58e250 "\003",
len = -1812780376}, r2_val = {s = 0x7ffe5b58e250 "\003", len =
1532550480}, gr_val = {s = 0x0, len = 5558663}}
next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffe5b58da20
"", len = -1257467382}, host = {s = 0x7f4b93f32aa8 "}\346\003", len =
1532551760}, port = {s = 0x7ffe5b58dd50 "\001", len = 0},
params = {s = 0x252e2674c38c920a <error: Cannot access memory at
address 0x252e2674c38c920a>, len = 1713803786}, sip_params = {s = 0x0, len =
0}, headers = {
s = 0x400000000 <error: Cannot access memory at address
0x400000000>, len = 0}, port_no = 3, proto = 0, type = TEL_URI_T, flags =
(URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = {s = 0x0,
len = 18436440}, ttl = {s = 0x1000001 <error: Cannot access
memory at address 0x1000001>, len = 1532549892}, user_param = {s = 0x11950b0
"", len = 1350205334}, maddr = {
s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 13826376}, method = {s = 0x24f148 <error: Cannot access
memory at address 0x24f148>, len = 2950840}, lr = {
s = 0x2d2028 <error: Cannot access memory at address 0x2d2028>,
len = 1774088704}, r2 = {s = 0x108 <error: Cannot access memory at address
0x108>, len = 1532550480}, gr = {
s = 0x7ffe5b58e250 "\003", len = 4329872}, transport_val = {s =
0x8 <error: Cannot access memory at address 0x8>, len = -1812767376},
ttl_val = {
s = 0x100000000 <error: Cannot access memory at address
0x100000000>, len = 18436624}, user_param_val = {s = 0x11950b0 "", len = 8},
maddr_val = {
s = 0x80 <error: Cannot access memory at address 0x80>, len =
-1798145530}, method_val = {s = 0x0, len = 1774088704}, lr_val = {s = 0x0,
len = -1815364344}, r2_val = {
s = 0xffffffff <error: Cannot access memory at address
0xffffffff>, len = -1812780376}, gr_val = {s = 0x7ffe5b58e250 "\003", len =
1532550480}}
u = 0x8
flags = 0
st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x1 <error: Cannot
access memory at address 0x1>, len = 1532549664}, re = 0x1}, avp =
0x252e2674b50c920a}
sct = 0x8
sjt = 0x8
mct = 0x0
rv = 0x7ffe5b58dac0
---Type <return> to continue, or q <return> to quit---
rv1 = 0x7f4b93f32aa8
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_STR, c = {avp_val =
{n = 1532540992, s = {s = 0x7ffe5b58b840 "", len = 1532536896}, re =
0x7ffe5b58b840}, pval = {rs = {s = 0x7ffe5b58b840 "",
len = 1532536896}, ri = 1532549316, flags = 32766}}, i2s =
"\320\310\032\001\000\000\000\000\bPl`K\177\000\000\n\000\000\000\000"}
s = {
s = 0x43b2fc <grp_hash_lookup+1420>
"1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200",
len = 1532549788}
srevp = {0x7f4b93cbd198, 0x7f4b93f32aa8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#14 0x00000000005407b5 in run_actions (h=0x1, a=0x7f4b52e3be10,
msg=0x7f4b52e3d420) at action.c:1549
ret = 1
mod = 0x7f4b93cbd198
__FUNCTION__ = "run_actions"
#15 0x0000000000542218 in do_action (h=0x7ffe5b58e250, a=0x7f4b93cbd2c8,
msg=0x7f4b93f32aa8) at action.c:1049
ret = 1
v = 1
dst = {send_sock = 0x7f4b93f32aa8, to = {s = {sa_family = 3038,
sa_data = "\212RK\177\000\000\310\000\000\000\376\177\000"}, sin =
{sin_family = 3038, sin_port = 21130, sin_addr = {s_addr = 32587},
sin_zero = "\310\000\000\000\376\177\000"}, sin6 =
{sin6_family = 3038, sin6_port = 21130, sin6_flowinfo = 32587, sin6_addr =
{__in6_u = {
__u6_addr8 =
"\310\000\000\000\376\177\000\000@Ӗ`K\177\000", __u6_addr16 = {200, 0,
32766, 0, 54080, 24726, 32587, 0}, __u6_addr32 = {200, 32766, 1620497216,
32587}}},
sin6_scope_id = 2482198976}}, id = 32587, proto = -88 '\250',
send_flags = {f = 42 '*', blst_imask = 243 '\363'}}
end = 0x7f4b93cbbd08 "\001"
uri = {user = {s = 0x7ffe5b58e2bc "K\177", len = 1532550724}, passwd
= {s = 0x7f4b00000000 <error: Cannot access memory at address
0x7f4b00000000>, len = 1620496936}, host = {
s = 0x6 <error: Cannot access memory at address 0x6>, len = 0},
port = {s = 0x7f4b52c1d090 "(Җ`K\177", len = 4930}, params = {s =
0x7ffe5b58dffc "", len = 5615623}, sip_params = {
s = 0x1342 <error: Cannot access memory at address 0x1342>, len
= 1774088704}, headers = {s = 0x7f4b6096d340 "\002", len = -1815580832},
port_no = 22976, proto = 37875, type = 32587,
flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 696),
transport = {s = 0x7f4b93f32aa8 "}\346\003", len = -1813809880}, ttl = {s =
0x7f4b93f32aa8 "}\346\003", len = 1620497456},
user_param = {s = 0x0, len = -1}, maddr = {s = 0x7ffe5b58de90 "",
len = -704867830}, method = {s = 0x4 <error: Cannot access memory at address
0x4>, len = 10133176}, lr = {s = 0xa02840 <p_onsend> "",
len = -1812780376}, r2 = {s = 0x252e2674c8ac920a <error: Cannot
access memory at address 0x252e2674c8ac920a>, len = 1713803786}, gr = {s =
0x0, len = 0}, transport_val = {
s = 0x7f4b52b3b1f0 <tm_cfg> "\b\206\344RK\177", len =
5615623},
ttl_val = {s = 0x7ffe5b58dffc "", len = 1532550996}, user_param_val = {s =
0x7f4b52b3b1f0 <tm_cfg> "\b\206\344RK\177", len = 1},
maddr_val = {s = 0x7f4b6096d228 "\220\320\301RK\177", len =
-1812780376}, method_val = {s = 0xc8 <error: Cannot access memory at address
0xc8>, len = 1620497456}, lr_val = {
s = 0x7f4b6096d228 "\220\320\301RK\177", len = 5615623}, r2_val
= {s = 0x8b8 <error: Cannot access memory at address 0x8b8>, len =
1384533946}, gr_val = {s = 0x0, len = 1384755581}}
next_hop = {user = {s = 0xc8 <error: Cannot access memory at address
0xc8>, len = 1532551168}, passwd = {s = 0x4 <error: Cannot access memory at
address 0x4>, len = -1812780376}, host = {
s = 0xc8 <error: Cannot access memory at address 0xc8>, len =
1620497456}, port = {s = 0x7f4b6096d228 "\220\320\301RK\177", len =
1384797578}, params = {
s = 0x7ffe00000000 <error: Cannot access memory at address
0x7ffe00000000>, len = 10498080}, sip_params = {s = 0xa03028 <def_list+8>
"", len = 10498096}, headers = {s = 0xa03038 <def_list+24> "",
len = 10498120}, port_no = 10568, proto = 160, type =
ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 4176515656), transport =
{
s = 0x3b078d3919c985fc <error: Cannot access memory at address
0x3b078d3919c985fc>, len = 1937935116}, ttl = {s = 0x7f4b00000000 <error:
Cannot access memory at address 0x7f4b00000000>,
len = 1561592008}, user_param = {s = 0x0, len = -1824518765},
maddr = {
s = 0x7f4b5d142bb8
"ʉ\317\v\230\211\221\271\024\024\357\253\246;\366\004\346\062\322\033\227\177\263\274\360\225Oq\307\v&o\340~g\315x\367\366tl\343\031\337\312\330\357ےS\r\242\005,\276\036\365\271\361o2\262",
<incomplete sequence \327>, len = 32}, method = {s = 0x7f4b5d142d6c
"z\035\236\bΒ\b\025\317R\360\245-\244R\343\307A>1\240\002", len =
-1823902561}, lr = {
s = 0x7f4b5d55eda8 "\261=i\\\235&>\352\246W(\336:N~\025", len
=
1532551316}, r2 = {s = 0x2 <error: Cannot access memory at address 0x2>, len
= 1350205334}, gr = {
s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 13828752}, transport_val = {s = 0x24e800 <error: Cannot
access memory at address 0x24e800>, len = 2948464}, ttl_val = {
s = 0x2d2028 <error: Cannot access memory at address 0x2d2028>,
len = 8}, user_param_val = {s = 0x112 <error: Cannot access memory at
address 0x112>, len = 1774088704}, maddr_val = {
s = 0x2cfd70 <error: Cannot access memory at address 0x2cfd70>,
len = 6245668}, method_val = {s = 0x7f4b93e37528 "]\005", len = 6999923},
lr_val = {s = 0x715640 <__FUNCTION__.7459> "parse_via",
len = 1620496936}, r2_val = {s = 0x252e2674ca8c920a <error:
Cannot access memory at address 0x252e2674ca8c920a>, len = 1532551460},
gr_val = {s = 0x0, len = 18436881}}
u = 0x7f4b93cbbd08
---Type <return> to continue, or q <return> to quit---
flags = 32587
st = {flags = 200, id = 0, name = {n = 1532551168, s = {s =
0x7ffe5b58e000 "", len = 4}, re = 0x7ffe5b58e000}, avp = 0x7f4b93f32aa8}
sct = 0x7f4b93cbbd08
sjt = 0x7f4b93cbbd08
mct = 0x0
rv = 0x1
rv1 = 0x7f4b93f32aa8
c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val =
{n = 1620497128, s = {s = 0x7f4b6096d2e8 <incomplete sequence \310>,
len = 10485504}, re = 0x7f4b6096d2e8}, pval = {rs = {
s = 0x7f4b6096d2e8 <incomplete sequence \310>, len =
10485504}, ri = 4, flags = 1}}, i2s =
"\000\340X[\376\177\000\000\000\000\000\000\376\177\000\000\000\000\000\000K\177"}
s = {s = 0xa49900 <_pkg_root> "\313\030p", len = 4}
srevp = {0x7f4b93cbd2c8, 0x7f4b93f32aa8}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
{type = NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#16 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffe5b58e250,
a=0x7f4b52e3be10, a@entry=0x7f4b93cb2dc8, msg=0x7f4b52e3d420,
#msg@entry=0x7f4b93f32aa8) at action.c:1549
ret = 1
mod = 0x7f4b93cbd2c8
__FUNCTION__ = "run_actions"
#17 0x000000000054d225 in run_top_route (a=0x7f4b93cb2dc8,
msg=0x7f4b93f32aa8, c=<optimized out>) at action.c:1635
ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env =
{{__jmpbuf = {140730430972496, -2678919650641931766, 139962578841032,
139962581461672, 0, 0, 2679121110996128266, -2678920028792385014},
__mask_was_saved = 0, __saved_mask = {__val = {18436881, 762,
139962581461672, 18436813, 18436768, 762, 139962581461672, 18436813,
18436768, 762, 13540419104367604224, 0, 139962581313368,
1073741825, 139961484381464, 139962581298232}}}}}
p = <optimized out>
ret = <optimized out>
sfbk = 0
#18 0x000000000055501e in receive_msg (buf=0x0, len=2482186920,
rcv_info=0x7f4b56f76b60) at receive.c:240
msg = 0x7f4b93f32aa8
ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env =
{{__jmpbuf = {140730430972864, -2678919650641931766, 139962580407896,
139962581461672, 0, 0, 2679121110996128266, -2678920028792385014},
__mask_was_saved = 0, __saved_mask = {__val =
{140730430973152, 16, 13540419104367604224, 7328512, 139961558330936,
140730430973408, 140730430973416, 139961558330184, 4294967295,
139961558330936,
6026966, 139961503056656, 140730430973124, 38, 762,
140730430973408}}}}}
inb = {
s = 0x11952a0 "BYE sip:XXXXXXXXX@xx.xx.xx.56:5080 SIP/2.0\r\nVia:
SIP/2.0/TLS 192.168.0.32:31301;branch=z9hG4bK1829228487;rport\r\nRoute:
<sip:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=y"...,
len = 762}
netinfo = {data = {s = 0x0, len = 2}, dst = 0x7f4b56f76b48, rcv =
0x49cdf4 <tcp_send+228>}
__FUNCTION__ = "receive_msg"
#19 0x00000000005c164d in tcp_read_req (con=0x7f4b56f76b48,
bytes_read=0x7ffe5b58e5e0, read_flags=0x7ffe5b58e5e8) at tcp_read.c:1428
bytes = 15013
total_bytes = 762
resp = 15013
size = 139961489937440
req = 0x7ffe5b58e5e8
dst = {send_sock = 0x7f4b93c87440, to = {s = {sa_family = 2, sa_data
= "\237\244S=\n\353\000\000\000\000\000\000\000"}, sin = {sin_family
= 2, sin_port = 42143, sin_addr = {s_addr = 3943316819},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 =
{sin6_family = 2, sin6_port = 42143, sin6_flowinfo = 3943316819, sin6_addr =
{__in6_u = {
__u6_addr8 =
"\000\000\000\000\000\000\000\000\000>\227SK\177\000", __u6_addr16 = {0, 0,
0, 0, 15872, 21399, 32587, 0}, __u6_addr32 = {0, 0, 1402420736, 32587}}},
sin6_scope_id = 8193}},
id = -1812859568, proto = 75 'K', send_flags = {f = 127 '\177',
blst_imask = 0 '\000'}}
---Type <return> to continue, or q <return> to quit---
c = 116 't'
ret = 15013
__FUNCTION__ = "tcp_read_req"
#20 0x00000000005c65a9 in handle_io (fm=0x0, events=-16880, idx=-1) at
tcp_read.c:1679
ret = 762
n = 4
read_flags = 1
con = 0x7f4b56f76b48
s = 11
t = 15013
__FUNCTION__ = "handle_io"
#21 0x00000000005ccc4e in io_wait_loop_epoll (h=<optimized out>,
t=<optimized out>, repeat=<optimized out>) at io_wait.h:1065
revents = 1390657040
n = 1
fm = 0x1
#22 tcp_receive_loop (unix_sock=1) at tcp_read.c:1791
__FUNCTION__ = "tcp_receive_loop"
#23 0x00000000004bd0e7 in tcp_init_children () at tcp_main.c:4796
reader_fd_1 = 38
pid = 15013
si_desc = "tcp receiver
(generic)\000\000\b\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\350\034O",
'\000' <repeats 14 times>,
"r\276io;\351\273\b\000\000\000\000\000\000\000\000AʓK\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\350\034O\000\000\000\000"
__FUNCTION__ = "tcp_init_children"
#24 0x00000000004f01a0 in main_loop () at main.c:1704
si_desc = "udp receiver child=7
sock=xx.xx.xx.51:5060\000\000\000\000\000
8\350\223K\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000]o_",
'\000' <repeats 14 times>,
"r\276io;黰\004\243\223K\177\000\000\000r\276io;\351\273\b\022\245\000\000\000\000\000\004\000\000\000\000\000\000"
woneinit = 1
__FUNCTION__ = "main_loop"
#25 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631
cfg_stream = 0x0
r = 15013
tmp = 0x7ffe5b58eee4 ""
tmp_len = 0
port = 0
proto = -1788607024
ret = 0
seed = 2215009822
debug_save = 0
debug_flag = 8
dont_fork_cnt = 0
st = {st_dev = 15, st_ino = 10167, st_nlink = 2, st_mode = 16832,
st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 40,
st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1492601340,
tv_nsec = 987819248}, st_mtim = {tv_sec = 1492629152, tv_nsec =
187196612}, st_ctim = {tv_sec = 1492629152, tv_nsec = 187196612},
__glibc_reserved = {0, 0, 0}}
__FUNCTION__ = "main"
(gdb) info locals
No locals.
(gdb) list
69 in ../../mem/../atomic/atomic_common.h
(gdb)
```
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1069#issuecomment-295648515