Full backtrace:

#0  __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
        set = {__val = {0, 140481737467984, 4222451712, 94125218804128, 94125218804229, 94125218804128, 94125218804128, 94125218804250, 94125218804428, 94125218804128, 94125218804428, 0, 0, 0, 0, 0}}
        pid = <optimized out>
        tid = <optimized out>
        ret = <optimized out>
#1  0x00007fc47407a859 in __GI_abort () at abort.c:79
        save_stage = 1
        act = {__sigaction_handler = {sa_handler = 0x7a, sa_sigaction = 0x7a}, sa_mask = {__val = {94125218804448, 3432, 140481737427665, 0, 140481738839488, 140481738843296, 140481653628996, 476, 140481653629648, 140481737982800, 140481737418232, 0, 
              11932610196109475840, 140481738621957, 140481740840960, 140481738638728}}, sa_flags = 1863311428, sa_restorer = 0x1dc}
        sigs = {__val = {32, 0 <repeats 15 times>}}
#2  0x00007fc47407a729 in __assert_fail_base (fmt=0x7fc474210588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x7fc46f0fe2d0 "json_object_get_type(jso) == json_type_object", file=0x7fc46f0fe044 "json_object.c", line=476, function=<optimized out>)
    at assert.c:92
        str = 0x559b3c352830 "`\356\064<\233U"
        total = 4096
#3  0x00007fc47408bf36 in __GI___assert_fail (assertion=0x7fc46f0fe2d0 "json_object_get_type(jso) == json_type_object", file=0x7fc46f0fe044 "json_object.c", line=476, function=0x7fc46f0fe280 "json_object_object_add_ex") at assert.c:101
No locals.
#4  0x00007fc46f0f7d26 in json_object_object_add_ex () from /lib/x86_64-linux-gnu/libjson-c.so.4
No symbol table info available.
#5  0x00007fc46f14ebe4 in kz_amqp_add_payload_common_properties (json_obj=0x559b3c3b30c0, server_id=0x7ffda57606f0 "kamailio@sipproxy.mydomain.com-<352213>-script-0", unique=0x7ffda5760660) at kz_amqp.c:1023
        node_name = '\000' <wiederholt 24 Mal>, "|\000\000\000w\000\000\000n\000\000\000[\000\000\000@\004v\245\375\177\000\000\000\000\005\000\000\000\000\000PO\000\000\000\000\000\000\200\v$t\304\177\000\000`\000\000\000\000\000\000\000\260\060;<\233U\000\000iX\217s\304\177", '\000' <wiederholt 11 Mal>, "@On\300%\231\245\200\361\064<\233U\000\000@,;<\233U\000\000\000\000\000\000\000\000\000\000\204\235\017o\304\177\000\000\000\000\000\000\000\000\000\000p,;<\233U\000\000\377\377\377\377\000\000\000\000U\254\017o\304\177\000\000n\000\000\000", '\377' <wiederholt 12 Mal>, "\200\361\064<\233U\000\000\000\000\000\000\000\000\000\000"...
#6  0x00007fc46f1509a0 in kz_amqp_pipe_send_receive (str_exchange=0x7ffda57609c0, str_routing_key=0x7ffda57609d0, str_payload=0x7ffda57609b0, kz_timeout=0x7ffda57609e0, json_ret=0x7ffda5760a10) at kz_amqp.c:1159
        ret = 1
        json_obj = 0x559b3c3b30c0
        cmd = 0x0
        json_body = 0x0
        unique_string = {s = 0x7ffda57606c0 "042a4c6f-a170-4d2a-a40f-9be55aa7d760", len = 36}
        serverid = "kamailio@sipproxy.mydomain.com-<352213>-script-0\000\326#t\304\177\000\000\000\334#t\304\177\000\000\200\334#t\304\177\000\000\000\345#t\304\177\000\000@\332#t\304\177\000\000\300\331#t\304\177\000\000\000\000\000\000\000\000\000\000p\000\000\000\000\000\000\000 \342#t\304\177\000\000\240\342#t\304\177\000\000`\000\000\000\000\000\000\000\a\000\000\000\304\177\000\000@\344#t\304\177\000\000\300C\037t\304\177\000\000\001\000\000\000\000\000\000\000\a\000\000\000\061", '\000' <wiederholt 27 Mal>...
        id = "\004*Lo\241pM*\244\017\233\345Z\247\327`"
        uuid_buffer = "042a4c6f-a170-4d2a-a40f-9be55aa7d760\000\000\000"
        payload = 0x559b3b5f5b29 "core/mem/q_malloc.c"
        __func__ = "kz_amqp_pipe_send_receive"
#7  0x00007fc46f158763 in kz_amqp_query_ex (msg=0x7fc47394beb8, exchange=0x7fc4738f03d0 "(q\216s\304\177", routing_key=0x7fc4738f57c8 "0\213\207s\304\177", payload=0x7fc4738f58d8 "hX\217s\304\177") at kz_amqp.c:1494
        json_s = {s = 0x7fc4738f5868 "0", len = 1}
        exchange_s = {s = 0x7fc4738e7128 "callevt", len = 7}
        routing_key_s = {s = 0x7fc473878b30 "0", len = 1}
        kz_timeout = {tv_sec = 2, tv_usec = 0}
        __func__ = "kz_amqp_query_ex"
        j = 0x559b3c3b2bd0
        ret = 0x0
        res = 32708
        strjson = 0x34 <error: Cannot access memory at address 0x34>
        len = 0
        value = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>
#8  0x00007fc46f1588b2 in kz_amqp_query (msg=0x7fc47394beb8, exchange=0x7fc4738f03d0 "(q\216s\304\177", routing_key=0x7fc4738f57c8 "0\213\207s\304\177", payload=0x7fc4738f58d8 "hX\217s\304\177", dst=0x7fc4738f04f0 "p\004\217s\304\177") at kz_amqp.c:1517
        dst_pv = 0x7fc474170350 <__syslog>
        dst_val = {rs = {s = 0x7ffda5760b00 "\220\021v\245\375\177", len = 1863978364}, ri = 52, flags = 3}
        result = 0
#9  0x0000559b3b1c7355 in do_action (h=0x7ffda5761370, a=0x7fc4738f1d98, msg=0x7fc47394beb8) at core/action.c:1151
        ret = -5
        v = 0
        dst = {send_sock = 0x7fc4738eec20, to = {s = {sa_family = 1920, sa_data = "\217s\304\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 1920, sin_port = 29583, sin_addr = {s_addr = 32708}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 1920, sin6_port = 29583, sin6_flowinfo = 32708, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <wiederholt 15 Mal>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 1920, 
              __ss_padding = "\217s\304\177", '\000' <wiederholt 43 Mal>, "@On\300%\231\245\240\026v\245\375\177\000\000\000\000\000\000\002", '\000' <wiederholt 11 Mal>, "#$^;\233U\000\000\064\000\000\000\000\000\000\000P\003\027t\304\177\000\000P\021v\245\375\177\000\000+y\026;\233U\000", __ss_align = 52}}, id = 1938746392, send_flags = {f = 32708, blst_imask = 0}, proto = 16 '\020', proto_pad0 = 22 '\026', proto_pad1 = -23178}
        tmp = 0x7ffda5761f70 "\001"
        new_uri = 0x7fc4738eec10 "\001"
        end = 0x7fc47394beb8 "\001"
        crt = 0x34 <error: Cannot access memory at address 0x34>
        cmd = 0x7fc4738e7ce8
        len = 996025379
        user = 21915
        uri = {user = {s = 0x7fc47420df30 "d]", len = 996105001}, passwd = {s = 0xf600000187 <error: Cannot access memory at address 0xf600000187>, len = 994455272}, host = {s = 0x7ffda5760dd0 "", len = 1938022416}, port = {
            s = 0x4a8 <error: Cannot access memory at address 0x4a8>, len = 1938022416}, params = {s = 0x7ffda5760e10 "@\016v\245\375\177", len = 1950306872}, sip_params = {s = 0x7fc47420df30 "d]", len = 0}, headers = {
            s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7171768}, port_no = 37488, proto = 12, type = ERROR_URI_T, flags = (unknown: 1216840), transport = {s = 0x129890 <error: Cannot access memory at address 0x129890>, len = 8}, ttl = {
            s = 0x5 <error: Cannot access memory at address 0x5>, len = 1850687488}, user_param = {s = 0x7ffda5760e40 "@\017v\245\375\177", len = 993161627}, maddr = {s = 0x0, len = 996104996}, method = {s = 0x7ffda5760f40 "", len = 0}, lr = {s = 0x7ffda5760f40 "", 
            len = 994414680}, r2 = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 0}, gr = {s = 0x559b3b5913ab "core", len = 0}, transport_val = {s = 0x559b3b591828 <__func__.7764> "rval_new_empty", len = 995693617}, ttl_val = {
            s = 0x4a8 <error: Cannot access memory at address 0x4a8>, len = 1938022416}, user_param_val = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 996105001}, maddr_val = {
            s = 0x7f000001ff <error: Cannot access memory at address 0x7f000001ff>, len = 994455272}, method_val = {s = 0x7ffda5760ef0 "", len = 1938022416}, lr_val = {s = 0x7fc4742418a0 <_IO_helper_jumps> "", len = 1938022416}, r2_val = {
            s = 0x7ffda5760f30 "`\017v\245\375\177", len = 1950306872}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7173632}, passwd = {s = 0xc8b28 <error: Cannot access memory at address 0xc8b28>, len = 1214976}, host = {s = 0x129890 <error: Cannot access memory at address 0x129890>, 
            len = 8}, port = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 1850687488}, params = {s = 0x7ffda5760f60 "\200\020v\245\375\177", len = 993161627}, sip_params = {s = 0x0, len = 996104996}, headers = {s = 0x7fc4738f3850 "H\a", len = 0}, 
          port_no = 4224, proto = 42358, type = 32765, flags = (URI_USER_NORMALIZE | unknown: 994423860), transport = {s = 0x7fc4742418a0 <_IO_helper_jumps> "", len = 3432}, ttl = {s = 0x559b3b5913ab "core", len = 1937415856}, user_param = {
            s = 0x559b3b591630 <__func__.7732> "rval_destroy_helper", len = 995693617}, maddr = {s = 0x7fc4738f0780 "\002", len = 1938022416}, method = {s = 0x559b00000000 <error: Cannot access memory at address 0x559b00000000>, len = 1850687488}, lr = {
            s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 0}, r2 = {s = 0x0, len = 1938753352}, gr = {s = 0x748 <error: Cannot access memory at address 0x748>, len = 1938022416}, transport_val = {s = 0x7fc4738f0660 "\200", 
            len = 1938755320}, ttl_val = {s = 0xe1a57616c0 <error: Cannot access memory at address 0xe1a57616c0>, len = 0}, user_param_val = {s = 0x0, len = 996025379}, maddr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, 
          method_val = {s = 0x7ffda5761050 "P\021v\245\375\177", len = 991328555}, lr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1850687488}, r2_val = {s = 0x7ffda5761150 "\020\026v\245\375\177", len = 0}, gr_val = {s = 0x0, len = 996025379}}
        u = 0x7fc4738edcd0
        port = 0
        dst_host = 0x7ffda5761f70
        i = 4
        flags = 0
        avp = 0x7ffda5761150
        st = {flags = 1, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
        sct = 0x559b3b5e2423
        sjt = 0x400000001
        rve = 0x7fc473908270
        mct = 0x0
        rv = 0x7fc4738f3078
        rv1 = 0x559b3b178ca4 <rval_expr_eval+20729>
        c1 = {cache_type = 2775978288, val_type = 32765, c = {avp_val = {n = 991328479, s = {s = 0x559b3b1678df <rval_destroy_helper+1140> "\353\005\350z\204\375\377\220H\213E\310dH3\004%(", len = 1}, re = 0x559b3b1678df <rval_destroy_helper+1140>}, pval = {rs = {
                s = 0x559b3b1678df <rval_destroy_helper+1140> "\353\005\350z\204\375\377\220H\213E\310dH3\004%(", len = 1}, ri = 1938746392, flags = 32708}}, i2s = "\221\000\000\000\000\000\000\000\030\354\216s\304\177\000\000\210J\217s\304\177"}
        s = {s = 0x7fc4738f5868 "0", len = 1}
        srevp = {0x34, 0x7fc474170350 <__syslog>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {
                s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140481729070032, string = 0x7fc4738f03d0 "(q\216s\304\177", str = {s = 0x7fc4738f03d0 "(q\216s\304\177", len = 7}, 
              data = 0x7fc4738f03d0, attr = 0x7fc4738f03d0, select = 0x7fc4738f03d0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091528, string = 0x7fc4738f57c8 "0\213\207s\304\177", str = {s = 0x7fc4738f57c8 "0\213\207s\304\177", len = 1}, 
              data = 0x7fc4738f57c8, attr = 0x7fc4738f57c8, select = 0x7fc4738f57c8}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091800, string = 0x7fc4738f58d8 "hX\217s\304\177", str = {s = 0x7fc4738f58d8 "hX\217s\304\177", len = 1}, data = 0x7fc4738f58d8, 
              attr = 0x7fc4738f58d8, select = 0x7fc4738f58d8}}, {type = MODFIXUP_ST, u = {number = 140481729070320, string = 0x7fc4738f04f0 "p\004\217s\304\177", str = {s = 0x7fc4738f04f0 "p\004\217s\304\177", len = 17}, data = 0x7fc4738f04f0, attr = 0x7fc4738f04f0, 
              select = 0x7fc4738f04f0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}}
        __func__ = "do_action"
#10 0x0000559b3b1d0463 in run_actions (h=0x7ffda5761370, a=0x7fc4738f1d98, msg=0x7fc47394beb8) at core/action.c:1581
        t = 0x7fc4738f1d98
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 0
        __func__ = "run_actions"
#11 0x0000559b3b1d0bd6 in run_actions_safe (h=0x7ffda5761f70, a=0x7fc4738f1d98, msg=0x7fc47394beb8) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {8589934592, -8218340047319111063, 0, 94125204317219, 52, 140481737982800, -8218340047371539863, -2792324605258929559}, __mask_was_saved = 0, __saved_mask = {__val = {94125201453467, 0, 
                  22470941476, 140727379432688, 11932610196109475840, 140727379432688, 8589934592, 0, 94125204317219, 52, 140481737982800, 140727379432704, 140481725410594, 32, 140481728339984, 140727379432816}}}}}
        ret = 32708
        ign_on_break = 0
#12 0x0000559b3b16a4b0 in rval_get_int (h=0x7ffda5761f70, msg=0x7fc47394beb8, i=0x7ffda5761750, rv=0x7fc4738f4040, cache=0x0) at core/rvalue.c:949
        r_avp = 0xa59925c06e4f4000
        avp_val = {n = 7, s = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 0}, re = 0x7}
        pval = {rs = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, ri = -1518987760, flags = 32765}
        tmp = {s = 0x0, len = 996025379}
        s = 0x0
        r = 0
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#13 0x0000559b3b16fa9c in rval_expr_eval_int (h=0x7ffda5761f70, msg=0x7fc47394beb8, res=0x7ffda5761750, rve=0x7fc4738f4038) at core/rvalue.c:1947
        i1 = 1947665232
        i2 = 32708
        ret = -1
        c1 = {cache_type = 1939127992, val_type = 32708, c = {avp_val = {n = -1518985360, s = {s = 0x7ffda5761f70 "\001", len = -1518986456}, re = 0x7ffda5761f70}, pval = {rs = {s = 0x7ffda5761f70 "\001", len = -1518986456}, ri = 1, flags = 32708}}, 
          i2s = " Їs\304\177\000\000\250\023\217s\304\177\000\000\310W\217s\304\177"}
        c2 = {cache_type = 52, val_type = 36, c = {avp_val = {n = 1947665232, s = {s = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = -1518987568}, re = 0x7fc474170350 <__syslog>}, pval = {rs = {
                s = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = -1518987568}, ri = 1932248914, flags = 32708}}, i2s = "\377\377\377\377", '\000' <wiederholt 12 Mal>, "裎s\304\177"}
        rv1 = 0x7fc4738f13a8
        rv2 = 0x7ffda5761700
        __func__ = "rval_expr_eval_int"
#14 0x0000559b3b1c0ec8 in do_action (h=0x7ffda5761f70, a=0x7fc4738f7f28, msg=0x7fc47394beb8) at core/action.c:1052
        ret = -5
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 16384, sa_data = "On\300%\231\245\334\035v\245\375\177\000"}, sin = {sin_family = 16384, sin_port = 28239, sin_addr = {s_addr = 2778277312}, sin_zero = "\334\035v\245\375\177\000"}, sin6 = {sin6_family = 16384, 
              sin6_port = 28239, sin6_flowinfo = 2778277312, sin6_addr = {__in6_u = {__u6_addr8 = "\334\035v\245\375\177\000\000\000\000\000\000\026\000\000", __u6_addr16 = {7644, 42358, 32765, 0, 0, 0, 22, 0}, __u6_addr32 = {2775981532, 32765, 0, 22}}}, 
              sin6_scope_id = 997540784}, sas = {ss_family = 16384, 
              __ss_padding = "On\300%\231\245\334\035v\245\375\177\000\000\000\000\000\000\026\000\000\000\260Cu;\233U\000\000\000\000\000\000\000\000\000\000\242\v:<\233U\000\000\023\000\000\000\233U\000\000\340\035v\245\375\177\000\000\261\252I;\233U\000\000\370\313`;\233U\000\000\000@On\300%\231\245\242\v:<\233U\000\000\000\000\000\000\002", '\000' <wiederholt 11 Mal>, "#$^;\233U\000", __ss_align = 52}}, id = 1947665232, send_flags = {f = 32708, blst_imask = 0}, proto = 104 'h', proto_pad0 = -83 '\255', proto_pad1 = 29583}
        tmp = 0x559b3b518985 <system_reseed+296> "\203\275l\373\377\377"
        new_uri = 0x559b3b4d8e5c <parse_sip_header_name+3534> "\203\370\002\017\216\214\003"
        end = 0x7fc4734c1285 <_ul_sruid+5> "61869d09-55fd5-"
        crt = 0x55fab <error: Cannot access memory at address 0x55fab>
        cmd = 0x7fc4738e7f18
        len = 1867105512
        user = 32708
        uri = {user = {s = 0x7ffda57619b0 "", len = 1938022416}, passwd = {s = 0x14800000187 <error: Cannot access memory at address 0x14800000187>, len = 1938022416}, host = {s = 0x7ffda57619f0 " \032v\245\375\177", len = 1950306872}, port = {
            s = 0x7fc4738f54e0 "\030\003", len = 0}, params = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7176352}, sip_params = {s = 0xc81c0 <error: Cannot access memory at address 0xc81c0>, len = 1212256}, headers = {
            s = 0x128008 <error: Cannot access memory at address 0x128008>, len = 8}, port_no = 7, proto = 0, type = ERROR_URI_T, flags = (unknown: 1850687488), transport = {s = 0x7ffda5761a20 "@\033v\245\375\177", len = 993161627}, ttl = {s = 0x0, len = 1938022416}, 
          user_param = {s = 0x7fc4738433e0 "", len = 0}, maddr = {s = 0x7ffda5761b40 "P\034v\245\375\177", len = 994423861}, method = {s = 0x7ffda5761b40 "P\034v\245\375\177", len = 0}, lr = {s = 0x559b3b60cb6b "core", len = 994414680}, r2 = {
            s = 0x559b3b60d868 <__func__.6887> "parse_headers", len = 996199992}, gr = {s = 0x7fc4738f5470 "\355\n:<\233U", len = 1938022416}, transport_val = {s = 0x559b3b60d868 <__func__.6887> "parse_headers", len = 996199992}, ttl_val = {
            s = 0x40 <error: Cannot access memory at address 0x40>, len = 1938022416}, user_param_val = {s = 0x7fc47383e010 "\001", len = 1938773048}, maddr_val = {s = 0x5f8 <error: Cannot access memory at address 0x5f8>, len = 1938022416}, method_val = {
            s = 0x7fc4738f5390 "@", len = 1938773216}, lr_val = {s = 0x7fc47341e257 <_reg_sruid+55> "", len = 1933697573}, r2_val = {s = 0x7fc47341e257 <_reg_sruid+55> "", len = 0}, gr_val = {s = 0x0, len = -1518986412}}
        next_hop = {user = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = 1010436526}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1850687488}, host = {
            s = 0x559b3c3a09b3 ";branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837681a60901b510;transport=tcp>\r\nTo: <sip:1234@10.0.0.24:5060;transport=TCP>\r\nFrom: <s"..., len = 0}, port = {
            s = 0x0, len = 996025379}, params = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, sip_params = {s = 0x7ffda5761c50 "P\035v\245\375\177", len = 994965693}, headers = {
            s = 0x5051bb0 <error: Cannot access memory at address 0x5051bb0>, len = 0}, port_no = 65535, proto = 65535, type = 4294967295, flags = (unknown: 1939127992), transport = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7179288}, ttl = {
            s = 0xc7b90 <error: Cannot access memory at address 0xc7b90>, len = 1209320}, user_param = {s = 0x1273e8 <error: Cannot access memory at address 0x1273e8>, len = 8}, maddr = {s = 0x9 <error: Cannot access memory at address 0x9>, len = 1010437024}, method = {
            s = 0x0, len = 1010437026}, lr = {s = 0x7fc4738f5470 "\355\n:<\233U", len = 1010437024}, r2 = {s = 0x7ffda5761ce0 "\260Cu;\233U", len = 0}, gr = {s = 0x7ffda5761ce0 "\260Cu;\233U", len = 994414680}, transport_val = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = 1938856088}, ttl_val = {s = 0x559b3b60cb6b "core", len = 1010436499}, user_param_val = {s = 0x559b3b60cbf8 <__func__.6774> "get_hdr_field", len = 1850687488}, maddr_val = {
            s = 0x8900000187 <error: Cannot access memory at address 0x8900000187>, len = 0}, method_val = {s = 0x0, len = 996025379}, lr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, r2_val = {
            s = 0x7ffda5761d50 "h\255\217s\304\177", len = 1935046835}, gr_val = {s = 0x7fc4738faec8 " ", len = 4}}
        u = 0x3000000018
        port = 28239
        dst_host = 0x0
        i = 8
        flags = 0
        avp = 0x7ffda5761f50
        st = {flags = 1010437026, id = 21915, name = {n = 1010437021, s = {s = 0x559b3c3a0b9d "0\r\n\r\n", len = 0}, re = 0x559b3c3a0b9d}, avp = 0x7fc4734c1294 <_ul_sruid+20>}
        sct = 0xa59925c06e4f4000
        sjt = 0x7ffda57619b0
        rve = 0x7fc4738f4038
        mct = 0x7ffda57619c0
        rv = 0x7fc473654afb
        rv1 = 0x7ffda5761e90
        c1 = {cache_type = 1939030032, val_type = 32708, c = {avp_val = {n = 1939127992, s = {s = 0x7fc47394beb8 "\001", len = 1939030032}, re = 0x7fc47394beb8}, pval = {rs = {s = 0x7fc47394beb8 "\001", len = 1939030032}, ri = 1939127992, flags = 32708}}, 
          i2s = "\b\000\000\000\000\000\000\000\000@On\300%\231\245\370\255\217s\304\177"}
        s = {s = 0x32 <error: Cannot access memory at address 0x32>, len = -1518986976}
        srevp = {0x7ffda5761d90, 0x7ffda5761f60}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {
                s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140481729070032, string = 0x7fc4738f03d0 "(q\216s\304\177", str = {s = 0x7fc4738f03d0 "(q\216s\304\177", len = 7}, 
              data = 0x7fc4738f03d0, attr = 0x7fc4738f03d0, select = 0x7fc4738f03d0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091528, string = 0x7fc4738f57c8 "0\213\207s\304\177", str = {s = 0x7fc4738f57c8 "0\213\207s\304\177", len = 1}, 
              data = 0x7fc4738f57c8, attr = 0x7fc4738f57c8, select = 0x7fc4738f57c8}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091800, string = 0x7fc4738f58d8 "hX\217s\304\177", str = {s = 0x7fc4738f58d8 "hX\217s\304\177", len = 1}, data = 0x7fc4738f58d8, 
              attr = 0x7fc4738f58d8, select = 0x7fc4738f58d8}}, {type = MODFIXUP_ST, u = {number = 140481729070320, string = 0x7fc4738f04f0 "p\004\217s\304\177", str = {s = 0x7fc4738f04f0 "p\004\217s\304\177", len = 17}, data = 0x7fc4738f04f0, attr = 0x7fc4738f04f0, 
              select = 0x7fc4738f04f0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}}
        __func__ = "do_action"
#15 0x0000559b3b1d0463 in run_actions (h=0x7ffda5761f70, a=0x7fc4738e8ca8, msg=0x7fc47394beb8) at core/action.c:1581
        t = 0x7fc4738f7f28
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 1939127992, tz_dsttime = 32708}
        tdiff = 0
        __func__ = "run_actions"
#16 0x0000559b3b1d0ce6 in run_top_route (a=0x7fc4738e8ca8, msg=0x7fc47394beb8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {8589934592, -8218340046916457879, 0, 94125204317219, 52, 140481737982800, -8218340046968886679, -2792324605258929559}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 8589934592, 
                  0, 94125204317219, 52, 140481737982800, 140727379435568, 94125202082674, 94125205369896, 11932610196109475840, 140481729334224, 8589934592, 0, 94125204317219, 52}}}}}
        p = 0x7ffda5761f70
        ret = 0
        sfbk = 0
#17 0x0000559b3b37f932 in receive_msg (
    buf=0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"..., len=578, rcv_info=0x7fc46f4c01a8)
    at core/receive.c:513
        msg = 0x7fc47394beb8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 6, jmp_env = {{__jmpbuf = {107374182978, 140481657569976, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 0, __saved_mask = {__val = {0, 65536, 11932610194258788473, 0, 140481657569680, 1024, 4604204945409, 128, 16, 2, 
                  519691042940, 940597837950, 94125201408152, 0, 4095, 65536}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"..., len = 578}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffda5762160, obuf = {s = 0x0, len = 0}, rcv = 0x7fc46f4c01a8, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#18 0x0000559b3b41dfb3 in receive_tcp_msg (
    tcpbuf=0x7fc46f4c0530 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 70\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"..., len=578, 
    rcv_info=0x7fc46f4c01a8, con=0x7fc46f4c0190) at core/tcp_read.c:1424
        buf = 0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234@10.0.0.33:47335;rinstance=837"...
        bsize = 65535
        blen = 65535
        __func__ = "receive_tcp_msg"
#19 0x0000559b3b4205f8 in tcp_read_req (con=0x7fc46f4c0190, bytes_read=0x7ffda5762618, read_flags=0x7ffda576261c) at core/tcp_read.c:1607
        bytes = 578
        total_bytes = 578
        resp = 1
        size = 322122547208
        req = 0x7fc46f4c02b8
        dst = {send_sock = 0x7ffda5762530, to = {s = {sa_family = 1, sa_data = "\000\000\000\000\000\000@%v\245\375\177\000"}, sin = {sin_family = 1, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "@%v\245\375\177\000"}, sin6 = {sin6_family = 1, sin6_port = 0, 
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "@%v\245\375\177\000\000\030\000\000\000\000\000\000", __u6_addr16 = {9536, 42358, 32765, 0, 24, 0, 0, 0}, __u6_addr32 = {2775983424, 32765, 24, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 1, 
              __ss_padding = "\000\000\000\000\000\000@%v\245\375\177\000\000\030", '\000' <wiederholt 23 Mal>, "\001\000\000\000\000\000\000\000(\315\036o\304\177\000\000\000\000\000\000\000\000\000\000\350\304Io\000\000\000\000P%v\245\001\000\000\000(\315\036o\304\177\000\000P%v\245\375\177\000\000-\\@;\233U\000\000`&v\245\375\177\000\000\b\000\000\000\000\000\000", __ss_align = 20}}, id = 1, send_flags = {f = 1, blst_imask = 0}, proto = 6 '\006', proto_pad0 = 0 '\000', proto_pad1 = 0}
        c = 0 '\000'
        ret = 996025379
        __func__ = "tcp_read_req"
#20 0x0000559b3b423af5 in handle_io (fm=0x7fc473954a08, events=1, idx=-1) at core/tcp_read.c:1782
        ret = 8
        n = 8
        read_flags = RD_CONN_SHORT_READ
        con = 0x7fc46f4c0190
        s = 6
        resp = 94125205447392
        t = 21915
        ee = 0x0
        __func__ = "handle_io"
#21 0x0000559b3b40eccc in io_wait_loop_epoll (h=0x559b3b6f62e0 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
        n = 1
        r = 0
        fm = 0x7fc473954a08
        revents = 1
        __func__ = "io_wait_loop_epoll"
#22 0x0000559b3b426aa8 in tcp_receive_loop (unix_sock=75) at core/tcp_read.c:1978
        __func__ = "tcp_receive_loop"
#23 0x0000559b3b2a161e in tcp_init_children (woneinit=0x7ffda5762a00) at core/tcp_main.c:5153
        r = 0
        i = 7
        reader_fd_1 = 75
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\256\311\061;\233U\000\000\340)v\245\375\177\000\000d\031=;\000\000\000\000\270\361\223s\000\000\000\000\213\313\\;\233U\000\000\232\000v\245\375\177\000\000\255$R;\233U\000\000\000\000\000\000\000\000\000\000(\315\036o\304\177\000\000\064\000\000\000\000\000\000\000\340\217Jo\001\000\000\000\320)v\245\375\177\000\000\265&R;\233U\000"
        si = 0x0
        __func__ = "tcp_init_children"
#24 0x0000559b3b153f0b in main_loop () at main.c:1843
        i = 8
        pid = 352197
        si = 0x0
        si_desc = "udp receiver child=7 sock=10.8.0.10:5060\000\322\061;$\000\000\000\002\000\000\000\064\000\000\000\000@On\300%\231\245\240\026$t\304\177\000\000\210\240X;\233U\000\000\000\000\000\000\000\000\000\000#$^;\233U\000\000\064\000\000\000\000\000\000\000P\003\027t\304\177\000\000\220+v\245\375\177\000\000\327\277\060;\233U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#25 0x0000559b3b15e745 in main (argc=1, argv=0x7ffda57630e8) at main.c:3058
        cfg_stream = 0x559b3c2bf2a0
        c = -1
        r = 0
        tmp = 0x0
        tmp_len = 0
        port = 0
        proto = -1518792248
        ahost = 0x0
        aport = 0
        options = 0x559b3b58d188 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 3597399342
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0x0
        st = {st_dev = 25, st_ino = 9656, st_nlink = 2, st_mode = 16895, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1636097156, tv_nsec = 709532085}, st_mtim = {tv_sec = 1636211948, 
            tv_nsec = 447930869}, st_ctim = {tv_sec = 1636211948, tv_nsec = 447930869}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\260/v\245\375\177\000\000\253'@t\304\177\000\000\002\000\000\000\000\000\000\000\016\000\000\000\000\000\000\200", '\000' <wiederholt 48 Mal>, "`\321Bt\304\177\000\000\001.v\245\375\177\000\000\350\311Bt\304\177", '\000' <wiederholt 26 Mal>, "\220\354$t\304\177\000\000\004\000\000\024\000\000\000\000\300\303%t\304\177", '\000' <wiederholt 130 Mal>...
        option_index = 0
        long_options = {{name = 0x559b3b58f5e6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x559b3b58a521 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x559b3b58f5eb "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x559b3b58f5f1 "subst", 
            has_arg = 1, flag = 0x0, val = 1025}, {name = 0x559b3b58f5f7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x559b3b58f600 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x559b3b58f60a "server-id", has_arg = 1, flag = 0x0, 
            val = 1028}, {name = 0x559b3b58f614 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x559b3b58f61f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x559b3b58f628 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {
            name = 0x559b3b58f633 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x559b3b58f639 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x559b3b58f643 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, 
            val = 0}}
        __func__ = "main"

        
(gdb) info locals
set = {__val = {0, 140481737467984, 4222451712, 94125218804128, 94125218804229, 94125218804128, 94125218804128, 94125218804250, 94125218804428, 94125218804128, 94125218804428, 0, 0, 0, 0, 0}}
pid = <optimized out>
tid = <optimized out>
ret = <optimized out>

(gdb) list
45      in ../sysdeps/unix/sysv/linux/raise.c


You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or unsubscribe.
Triage notifications on the go with GitHub Mobile for iOS or Android.