[sr-dev] [kamailio] Textops and Multipart Body - adding ISUP segfaults Kamailio (#240)

andreikabeliy notifications at github.com
Thu Jul 9 18:49:48 CEST 2015


Here is another "backtrace full" log.
 


     On Thursday, July 9, 2015 5:21 PM, Victor Seva <notifications at github.com> wrote:
   

 yes, thanks—
Reply to this email directly or view it on GitHub.   

  
GNU gdb (GDB) Red Hat Enterprise Linux (7.2-75.el6)
Copyright (C) 2010 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu".
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>...
Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/usr/sbin/kamailio.debug...done.
done.
(gdb) run -P /var/run/kamailio.pid -m 64 -M 8 -u kamailio -g kamailio -D
Starting program: /usr/sbin/kamailio -P /var/run/kamailio.pid -m 64 -M 8 -u kamailio -g kamailio -D
[Thread debugging using libthread_db enabled]
WARNING: no fork mode 
Detaching after fork from child process 4052.
Detaching after fork from child process 4053.
Detaching after fork from child process 4054.
Detaching after fork from child process 4055.
loading modules under config path: /usr/lib64/kamailio/modules/
Listening on 
             udp: 1.2.3.4:5060
Aliases: 
             udp: kamailiohost:5060


Program received signal SIGABRT, Aborted.
0x00007ffff765d625 in raise () from /lib64/libc.so.6
Missing separate debuginfos, use: debuginfo-install MariaDB-compat-5.5.39-1.el6.x86_64 glibc-2.12-1.149.el6_6.5.x86_64 keyutils-libs-1.4-5.el6.x86_64 krb5-libs-1.10.3-33.el6.x86_64 libcom_err-1.41.12-21.el6.x86_64 libselinux-2.0.94-5.8.el6.x86_64 nss-softokn-freebl-3.14.3-19.el6_6.x86_64 openssl-1.0.1e-30.el6_6.5.x86_64 sssd-client-1.11.6-30.el6_6.3.x86_64 zlib-1.2.3-29.el6.x86_64
(gdb) backtrace full
#0  0x00007ffff765d625 in raise () from /lib64/libc.so.6
No symbol table info available.
#1  0x00007ffff765ee05 in abort () from /lib64/libc.so.6
No symbol table info available.
#2  0x000000000044fcee in free_lump (lmp=0x7ffff6efdab0) at data_lump.c:464
        __FUNCTION__ = "free_lump"
#3  0x000000000044fdf1 in free_lump_list (l=0x7ffff6efda40) at data_lump.c:498
        t = 0x0
        r = 0x0
        foo = 0x7ffff6efdab0
        crt = 0x7ffff6efda40
        __FUNCTION__ = "free_lump_list"
#4  0x00000000004507b4 in del_nonshm_lump (lump_list=0x7ffff6efaad8) at data_lump.c:647
        r = 0x7fffffffe150
        foo = 0x7ffff6efda40
        crt = 0x0
        prev = 0x7ffff6efaad8
        prev_r = 0x3f6efa530
        __FUNCTION__ = "del_nonshm_lump"
#5  0x00000000004d4801 in replace_body (msg=0x7ffff6efa530, txt=...) at msg_translator.c:1618
        anchor = 0x208
        buf = 0x7ffff6e2a010 "\001"
        body = {
          s = 0xa6d406 "--unique-boundary-1\r\nContent-Type: application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0 101\r\na=rtp"..., len = 365}
        __FUNCTION__ = "replace_body"
#6  0x00000000004d768d in check_boundaries (msg=0x7ffff6efa530, send_info=0x7fffebd73960) at msg_translator.c:1821
        b = {s = 0x7ffff6efd6e8 "--unique-boundary-1\r\n", len = 21}
        fb = {s = 0x7ffff6efd5b8 "--unique-boundary-1--\r\n", len = 23}
        ob = {s = 0x7ffff6efd698 "--unique-boundary-1", len = 19}
        bsuffix = {s = 0x705c31 "\r\n", len = 2}
        fsuffix = {s = 0x708930 "--\r\n", len = 4}
        body = {
          s = 0x7ffff6efe080 "--unique-boundary-1\r\nContent-Type: application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0 101\r\na=rtp"..., len = 513}
        buf = {
          s = 0x7ffff6efcf78 "--unique-boundary-1\r\nContent-Type: application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0 101\r\na=rtp"..., len = 511}
        tmp = {
          s = 0x7ffff6efcf78 "--unique-boundary-1\r\nContent-Type: application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0 101\r\na=rtp"..., len = 21}
        lb = 0x7ffff6efd628
        lb_t = 0x0
        lb_found = 3
        t = 146
        ret = 19
        lb_size = 229
        pb = 0x7ffff6efe281 ""
        __FUNCTION__ = "check_boundaries"
#7  0x00000000004d7b7a in build_req_buf_from_sip_req (msg=0x7ffff6efa530, returned_len=0x7fffffffad0c, send_info=0x7fffebd73960, mode=128) at msg_translator.c:1926
        len = 1139
        new_len = 0
        received_len = 0
        rport_len = 0
        uri_len = 0
        via_len = 0
        body_delta = 0
        line_buf = 0x0
        received_buf = 0x0
        rport_buf = 0x0
        new_buf = 0x0
        buf = 0xa6d100 "INVITE sip:+447888555999 at 1.2.3.4:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom: <sip:+447888555999 at 1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip"...
        path_buf = {s = 0x0, len = 0}
        offset = 0
        s_offset = 0
        size = 0
        via_anchor = 0x0
        via_lump = 0x7fffffffa970
        via_insert_param = 0x0
        path_anchor = 0x7ffff6e2a010
        path_lump = 0x7ffff6e2a578
        branch = {s = 0x0, len = 0}
        flags = 393344
        udp_mtu = 32767
        di = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, 
              sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', 
          send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        __FUNCTION__ = "build_req_buf_from_sip_req"
#8  0x00007ffff31bb752 in prepare_new_uac (t=0x7fffebd736f8, i_req=0x7ffff6efa530, branch=0, uri=0x7fffffffacf0, path=0x7fffffffacd0, next_hop=0x7ffff6efa7b0, fsocket=0x0, snd_flags=..., fproto=0, flags=0, 
    instance=0x7fffffffacc0, ruid=0x7fffffffacb0, location_ua=0x7fffffffaca0) at t_fwd.c:459
        shbuf = 0x0
        add_rm_backup = 0x7ffff6efb7b0
        body_lumps_backup = 0x7ffff6efbe70
        parsed_uri_bak = {user = {s = 0x7ffff6efdb34 "+447888555999 at sip.provider.com:5060", len = 13}, passwd = {s = 0x0, len = 0}, host = {s = 0x7ffff6efdb42 "sip.provider.com:5060", len = 16}, port = {s = 0x7ffff6efdb53 "5060", 
            len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, 
          user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {
            s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        ret = -1
        len = 0
        parsed_uri_ok_bak = 1
        free_new_uri = 1
        msg_uri_bak = {s = 0x7ffff6efdb30 "sip:+447888555999 at sip.provider.com:5060", len = 39}
        dst_uri_bak = {s = 0x7ffff6efcb08 "sip:sip.provider.com:606017.25:5060", len = 25}
        dst_uri_backed_up = 1
        path_bak = {s = 0x0, len = 0}
        free_path = 1
        instance_bak = {s = 0x0, len = 0}
        free_instance = 1
        ruid_bak = {s = 0x0, len = 0}
        free_ruid = 1
        ua_bak = {s = 0x0, len = 0}
        free_ua = 1
        backup_route_type = 1
        fwd_snd_flags_bak = {f = 0 '\000', blst_imask = 0 '\000'}
        rpl_snd_flags_bak = {f = 0 '\000', blst_imask = 0 '\000'}
        force_send_socket_bak = 0x0
        dst = 0x7fffebd73960
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {39, 114263969407904274, 140737336290144, 140737488347472, 0, 0, 114263969449847314, -114264531344217582}, __mask_was_saved = 0, __saved_mask = {
                __val = {140733193388046, 627076158419, 1, 140737147573424, 592553366160, 140737272705179, 140737272702272, 4294967336, 140737147573424, 140737488333952, 140737272117063, 140737488333936, 4904691, 140737488334312, 
                  140737488334288, 3479983113749674362}}}}}
        __FUNCTION__ = "prepare_new_uac"
#9  0x00007ffff31beaf2 in add_uac (t=0x7fffebd736f8, request=0x7ffff6efa530, uri=0x7ffff6efa7a0, next_hop=0x7ffff6efa7b0, path=0x7ffff6efab60, proxy=0x0, fsocket=0x0, snd_flags=..., proto=0, flags=0, instance=0x7ffff6efab70, 
    ruid=0x7ffff6efab88, location_ua=0x7ffff6efab98) at t_fwd.c:787
        ret = 0
        branch = 0
        __FUNCTION__ = "add_uac"
#10 0x00007ffff31c5b72 in t_forward_nonack (t=0x7fffebd736f8, p_msg=0x7ffff6efa530, proxy=0x0, proto=0) at t_fwd.c:1655
        branch_ret = 1
        lowest_ret = -1
        current_uri = {s = 0x0, len = -1}
        added_branches = 0
        first_branch = 0
        i = 32767
        q = 359
        t_invite = 0x7ffff3203598
        success_branch = 32767
        try_new = 1
        lock_replies = 100
        dst_uri = {s = 0x7ffff6efd9c7 "", len = 0}
        path = {s = 0x0, len = 11681504}
        instance = {s = 0x7fffebd6e118 "trying -- your call is important to us", len = 38}
        ruid = {s = 0x7ffff6efa530 "\005", len = -338217224}
        location_ua = {s = 0x7fffebd6e118 "trying -- your call is important to us", len = 0}
        si = 0x100415ca0
        backup_bflags = 0
        bflags = 0
        __FUNCTION__ = "t_forward_nonack"
#11 0x00007ffff31b1f5c in t_relay_to (p_msg=0x7ffff6efa530, proxy=0x0, proto=0, replicate=0) at t_funcs.c:322
        ret = 0
        new_tran = 1
        t = 0x7fffebd736f8
        dst = {send_sock = 0xb24140, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\235\000\000\000\000\000\000", __u6_addr16 = {0, 0, 0, 0, 157, 0, 0, 0}, __u6_addr32 = {0, 0, 
                    157, 0}}}, sin6_scope_id = 11682112}}, id = 0, proto = 32 ' ', send_flags = {f = 165 '\245', blst_imask = 158 '\236'}}
        port = 0
        host = {s = 0x7fffffffb1c0 "P\341\377\377\377\177", len = 5203602}
        comp = 0
        __FUNCTION__ = "t_relay_to"
#12 0x00007ffff322a7d5 in _w_t_relay_to (p_msg=0x7ffff6efa530, proxy=0x0, force_proto=0) at tm.c:1474
        t = 0x0
        res = 0
        __FUNCTION__ = "_w_t_relay_to"
#13 0x00007ffff322b8b2 in w_t_relay (p_msg=0x7ffff6efa530, _foo=0x0, _bar=0x0) at tm.c:1675
No locals.
#14 0x000000000041dcd4 in do_action (h=0x7fffffffb9b0, a=0x7ffff6e6df48, msg=0x7ffff6efa530) at action.c:1053
        ret = -5
        v = -152066768
        dst = {send_sock = 0x7ffff6ebc5b0, to = {s = {sa_family = 55112, sa_data = "\357\366\377\177\000\000H\327\357\366\377\177\000"}, sin = {sin_family = 55112, sin_port = 63215, sin_addr = {s_addr = 32767}, 
              sin_zero = "H\327\357\366\377\177\000"}, sin6 = {sin6_family = 55112, sin6_port = 63215, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "H\327\357\366\377\177\000\000H\327\357\366\377\177\000", 
                  __u6_addr16 = {55112, 63215, 32767, 0, 55112, 63215, 32767, 0}, __u6_addr32 = {4142913352, 32767, 4142913352, 32767}}}, sin6_scope_id = 4142559592}}, id = 32767, proto = 52 '4', send_flags = {f = 185 '\271', 
            blst_imask = 255 '\377'}}
        tmp = 0x7fffffffc8f0 ""
        new_uri = 0x7fffffffb8f0 ""
        end = 0x7ffff6ea6478 "\001"
        crt = 0x7fffffffb938 "\305\023"
        cmd = 0x7ffff6e4dac8
        len = -152066768
        user = 32767
        uri = {user = {s = 0x7fffffffb640 "\340\267\377\377\377\177", len = 5517182}, passwd = {s = 0x7fffffffb5b0 "0\245\357\366\377\177", len = 0}, host = {s = 0x7ffff6efa530 "\005", len = 4283552}, port = {
            s = 0x7fffffffb650 "\340\267\377\377\377\177", len = 5510142}, params = {s = 0x7fffffffb5b0 "0\245\357\366\377\177", len = 0}, sip_params = {s = 0x7ffff6ea7170 "\a", len = -18124}, headers = {
            s = 0x7ffff6efa530 "\005", len = -14096}, port_no = 42288, proto = 63215, type = 32767, flags = 4294953200, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 8}, user_param = {
            s = 0x5f <Address 0x5f out of bounds>, len = -152092015}, maddr = {s = 0x7ffff6bfbb3c "UH\211\345ATSH\203\354PH\211}\310H\211u\300H\203}", <incomplete sequence \310>, len = -152053944}, method = {
            s = 0x7fffffffb5c0 "", len = -152054000}, lr = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, r2 = {s = 0x7600000000 <Address 0x7600000000 out of bounds>, len = -152066768}, gr = {
            s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, transport_val = {s = 0x7fffffffb7e0 "\200\271\377\377\377\177", len = 5531816}, ttl_val = {
            s = 0x7fffffffb7e0 "\200\271\377\377\377\177", len = 5544362}, user_param_val = {s = 0x7fffffffb720 "0\245\357\366\377\177", len = -241853612}, maddr_val = {s = 0x7fffffffb750 "H\327\357\366\377\177", 
            len = -271470533}, method_val = {s = 0x7fffffffb6c0 "\260\305\353\366\377\177", len = 0}, lr_val = {s = 0x728301 "rval_destroy", len = 7471900}, r2_val = {
            s = 0x7ffff6efd748 "--unique-boundary-1\r\nContent-Type: application/sdp\r\n\r\nv=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0 101\r\na=rtp"..., len = -152920048}, gr_val = {s = 0x7ffff6efd710 "p\001", len = 0}}
        next_hop = {user = {s = 0x200415ca0 <Address 0x200415ca0 out of bounds>, len = 2}, passwd = {s = 0x0, len = 2}, host = {s = 0x7ffff6eabe80 "", len = -152389240}, port = {s = 0x7ffff6efa530 "\005", len = -152387968}, 
          params = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, sip_params = {s = 0x7fffffffb450 "P\272\377\377\377\177", len = 0}, headers = {s = 0x7ffff6ef6760 "", len = -152066768}, 
          port_no = 26464, proto = 63215, type = 32767, flags = 4294959440, transport = {s = 0x7ffff1fcc488 "UH\211\345ATSH\203\354PH\211}\330H\211u\320H\211U\310H\213E\320H\211E\340H\213E\330\017\267@ f\203\370\001\017\205\212", 
            len = 4283552}, ttl = {s = 0x7fffffffba50 " \273\377\377\377\177", len = 4316514}, user_param = {s = 0x7ffff6ea7190 "\002", len = -152066768}, maddr = {s = 0x7fffffffb4d0 "@\265\377\377\377\177", len = -225777708}, 
          method = {s = 0x7fffffffb4c0 "\220\321\346\366\377\177", len = -19008}, lr = {s = 0x7ffff6ea7190 "\002", len = -152066768}, r2 = {s = 0x7fffebd6e210 "5061", len = 4}, gr = {
            s = 0x4ffffb500 <Address 0x4ffffb500 out of bounds>, len = -152066768}, transport_val = {s = 0x7ffff6e6d190 "J\002", len = -17584}, ttl_val = {s = 0x7fffffffb540 "@\266\377\377\377\177", len = 5203602}, 
          user_param_val = {s = 0x7ffff6ea64a0 "", len = -152066768}, maddr_val = {s = 0x7ffff6ebff40 "", len = -152410976}, method_val = {s = 0x7fffffffb570 "P\266\377\377\377\177", len = -19008}, lr_val = {
            s = 0x7ffff6ea7178 "\023", len = 5210524}, r2_val = {s = 0x7fffffffb934 "\377\377\377\377\305\023", len = -19008}, gr_val = {s = 0x7ffff6efa530 "\005", len = -152066768}}
        u = 0x7fffffffc8f0
        port = 0
        dst_host = 0x7ffff6efd748
        i = 32767
        flags = 32767
        avp = 0x7fffffffe150
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = -1}, re = 0x7fff00000000}, avp = 0x7ffff6eab488}
        sct = 0x7ffff6efd748
        sjt = 0x7fffffffbad8
        rve = 0x415ca0
        mct = 0x7fffffffe150
        rv = 0x800000002
        rv1 = 0x7fffffffb7e0
        c1 = {cache_type = 4142587336, val_type = 32767, c = {avp_val = {n = -18284, s = {s = 0x7fffffffb894 "", len = -152066768}, re = 0x7fffffffb894}, pval = {rs = {s = 0x7fffffffb894 "", len = -152066768}, ri = -14096, 
              flags = 32767}}, i2s = "\020\264\377\377\377\177\000\000\f\240\225\361\377\177\000\000P\264\377\377\377\377"}
        s = {s = 0x400000001 <Address 0x400000001 out of bounds>, len = -152390520}
        srevp = {0x7ffff6eab8e8, 0x2f6eacc48}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
            u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#15 0x000000000042a3ea in run_actions (h=0x7fffffffb9b0, a=0x7ffff6e6df48, msg=0x7ffff6efa530) at action.c:1548
        t = 0x7ffff6e6df48
        ret = -1
        mod = 0x13c5
        ms = 0
        __FUNCTION__ = "run_actions"
#16 0x000000000042aa4f in run_actions_safe (h=0x7fffffffda40, a=0x7ffff6e6df48, msg=0x7ffff6efa530) at action.c:1613
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140737336288560, 114263969959455250, 4283552, 140737488347472, 0, 0, 114263970001398290, -114264531344217582}, __mask_was_saved = 0, 
              __saved_mask = {__val = {140737336292968, 140737488337472, 4713976, 140737335951208, 140737336288560, 4283552, 140737488347472, 0, 0, 140737488337696, 4367338, 8187, 140737344499266, 8192, 140733193388032, 
                  140737488337749}}}}}
        ret = 0
        ign_on_break = 0
#17 0x0000000000542670 in rval_get_int (h=0x7fffffffda40, msg=0x7ffff6efa530, i=0x7fffffffbe88, rv=0x7ffff6e6e4c0, cache=0x0) at rvalue.c:912
        r_avp = 0x7fffffffda40
        avp_val = {n = -140792192, s = {s = 0x7ffff79bae80 "", len = -152066768}, re = 0x7ffff79bae80}
        pval = {rs = {s = 0x0, len = 0}, ri = -17360, flags = 32767}
        tmp = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}
        s = 0x0
        r = 1
        ret = 0
        destroy_pval = 0
        __FUNCTION__ = "rval_get_int"
#18 0x00000000005468a8 in rval_expr_eval_int (h=0x7fffffffda40, msg=0x7ffff6efa530, res=0x7fffffffbe88, rve=0x7ffff6e6e4b8) at rvalue.c:1906
        i1 = 0
        i2 = 0
        ret = -1
        c1 = {cache_type = 10932671, val_type = RV_NONE, c = {avp_val = {n = 10932617, s = {
                s = 0xa6d189 "<sip:+447888555999 at 1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip:+447888555999 at 1.2.3.4:5060>\r\nContact: <sip:+447888555999 at 1.2.3.4:5061>\r\nCall-ID: 74653c5b109e03c231cc7edf103d7e8b at 37.188.117"..., len = 10932709}, re = 0xa6d189}, pval = {rs = {
                s = 0xa6d189 "<sip:+447888555999 at 1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip:+447888555999 at 1.2.3.4:5060>\r\nContact: <sip:+447888555999 at 1.2.3.4:5061>\r\nCall-ID: 74653c5b109e03c231cc7edf103d7e8b at 37.188.117"..., len = 10932709}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 10933494, val_type = 793, c = {avp_val = {n = -152773216, s = {s = 0x7ffff6e4dda0 "\"\320&\363\377\177", len = -17248}, re = 0x7ffff6e4dda0}, pval = {rs = {s = 0x7ffff6e4dda0 "\"\320&\363\377\177", 
                len = -17248}, ri = 0, flags = 0}}, i2s = "\300\325\346\366\377\177\000\000\020\303\377\377\377\177\000\000\060\245\357\366\377\177"}
        rv1 = 0xa0000000a
        rv2 = 0x60
        __FUNCTION__ = "rval_expr_eval_int"
#19 0x0000000000546c9e in rval_expr_eval_int (h=0x7fffffffda40, msg=0x7ffff6efa530, res=0x7fffffffc310, rve=0x7ffff6e6ebb8) at rvalue.c:1914
        i1 = 0
        i2 = 1
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = -152066768, flags = 32767}}, 
          i2s = "`\324\346\366\377\177\000\000@\332\377\377\377\177\000\000\000\000\000\000\000"}
        c2 = {cache_type = 4294950608, val_type = 32767, c = {avp_val = {n = 4367338, s = {s = 0x42a3ea "\211E\264H\307\005\030NZ", len = 0}, re = 0x42a3ea}, pval = {rs = {s = 0x42a3ea "\211E\264H\307\005\030NZ", len = 0}, 
              ri = 0, flags = 0}}, i2s = "\304\023\000\000\001", '\000' <repeats 16 times>}
        rv1 = 0x0
        rv2 = 0x0
        __FUNCTION__ = "rval_expr_eval_int"
#20 0x000000000041d7be in do_action (h=0x7fffffffda40, a=0x7ffff6e6e240, msg=0x7ffff6efa530) at action.c:1029
        ret = -5
        v = 1
        dst = {send_sock = 0x7fffffffc350, to = {s = {sa_family = 1754, sa_data = "\214\363\377\177\000\000=\000\000\000\000\000\000"}, sin = {sin_family = 1754, sin_port = 62348, sin_addr = {s_addr = 32767}, 
              sin_zero = "=\000\000\000\000\000\000"}, sin6 = {sin6_family = 1754, sin6_port = 62348, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "=", '\000' <repeats 14 times>, __u6_addr16 = {61, 0, 0, 0, 0, 0, 
                    0, 0}, __u6_addr32 = {61, 0, 0, 0}}}, sin6_scope_id = 8388608}}, id = 0, proto = 48 '0', send_flags = {f = 206 '\316', blst_imask = 114 'r'}}
        tmp = 0xd31d0 <Address 0xd31d0 out of bounds>
        new_uri = 0xd31d0 <Address 0xd31d0 out of bounds>
        end = 0x8 <Address 0x8 out of bounds>
        crt = 0x3b <Address 0x3b out of bounds>
        cmd = 0x61ee3f
        len = -15504
        user = 158
        uri = {user = {s = 0x1 <Address 0x1 out of bounds>, len = -152066768}, passwd = {s = 0x7fffffffc1f0 "\360\307\377\377\377\177", len = -152066768}, host = {s = 0x7ffff6ead758 "S\004", len = -14096}, port = {
            s = 0x7fffffffc700 "\246\213a", len = -152381608}, params = {s = 0x1f7781f76 <Address 0x1f7781f76 out of bounds>, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x7fffffffc76c "", len = -152066768}, 
          port_no = 23712, proto = 65, type = ERROR_URI_T, flags = 4294959440, transport = {s = 0x0, len = 0}, ttl = {s = 0x7fffffffc7f0 "h\207\351\366\377\177", len = 4302682}, user_param = {s = 0xb23ee0 "خ\233\367\377\177", 
            len = -14096}, maddr = {s = 0xd1 <Address 0xd1 out of bounds>, len = 5743147}, method = {s = 0x7ffff195f500 "", len = -144248473}, lr = {s = 0x7ffff195f500 "", len = 0}, r2 = {
            s = 0x7ffff6ef4030 "From Asterisk, si = 1.2.3.4, du = sip:sip.provider.com:6060 ru = sip:+447888555999 at sip.provider.com:5060", len = -14632}, gr = {s = 0xf6efd328 <Address 0xf6efd328 out of bounds>, 
            len = -15344}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x7fffffffc7e0 "", len = 0}, user_param_val = {s = 0x0, len = 6417983}, maddr_val = {s = 0x7fffffffc2c0 "", len = -152920048}, method_val = {
            s = 0x7fffffffc310 "\001", len = -208927014}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x800000 <Address 0x800000 out of bounds>, len = 6417983}, gr_val = {s = 0x7fffffffc300 "", len = -152920048}}
        next_hop = {user = {s = 0x7fffffffc050 "P\306\377\377\377\177", len = -244048376}, passwd = {s = 0x7fffffffc060 "\220\300\377\377\377\177", len = -208927014}, host = {
            s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = 0}, port = {s = 0x800000 <Address 0x800000 out of bounds>, len = 7}, params = {s = 0x5e7 <Address 0x5e7 out of bounds>, len = -152066768}, 
          sip_params = {s = 0x5e700000001 <Address 0x5e700000001 out of bounds>, len = 7}, headers = {s = 0x7ffff1741d91 "UH\211\345ATSH\203\354PH\211}\330H\211u\320H\211U\310H\203}", <incomplete sequence \320>, len = 4283552}, 
          port_no = 50768, proto = 65535, type = 32767, flags = 4316665, transport = {s = 0x7fffffffc090 "P\301\377\377\377\177", len = 4713976}, ttl = {s = 0x0, len = -152920048}, user_param = {
            s = 0x248 <Address 0x248 out of bounds>, len = 0}, maddr = {s = 0x7fffffffc150 "z\037x\367\377\177", len = 6399695}, method = {s = 0x7ffff6efac98 "FѦ", len = -152066264}, lr = {s = 0x0, len = -152066768}, r2 = {
            s = 0x7ffff6e71258 "p\002", len = -14512}, gr = {
            s = 0x7ffff6efd360 "v=0\r\no=root 1672889700 1672889700 IN IP4 1.2.3.4\r\ns=Asterisk PBX 11.2.2\r\nc=IN IP4 1.2.3.4\r\nt=0 0\r\nm=audio 15534 RTP/AVP 8 0 101\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:101 te"..., len = -13552}, transport_val = {s = 0xffffffffffffffff <Address 0xffffffffffffffff out of bounds>, len = -152066768}, ttl_val = {s = 0x70a910 "build_res_buf_from_sip_req", len = -152066768}, 
          user_param_val = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x7fffffffc1f0 "\360\307\377\377\377\177", len = 4367338}, lr_val = {
            s = 0x4 <Address 0x4 out of bounds>, len = -14304}, r2_val = {s = 0x7ffff7781f79 ">", len = -144248473}, gr_val = {s = 0x7ffff7781f7a "", len = 1}}
        u = 0x7ffff6efc6e8
        port = 0
        dst_host = 0x47edf8
        i = 0
        flags = 32767
        avp = 0x5f6e2a010
        st = {flags = 4294950880, id = 6, name = {n = -243994792, s = {s = 0x7ffff174ef58 "sanity", len = 7}, re = 0x7ffff174ef58}, avp = 0x3f6efa530}
        sct = 0x0
        sjt = 0x7fff00000000
        rve = 0x7ffff6e6ebb8
        mct = 0x61a6cf
        rv = 0x0
        rv1 = 0xd3198
        c1 = {cache_type = 10, val_type = RV_BEXPR, c = {avp_val = {n = -152066768, s = {s = 0x7ffff6efa530 "\005", len = 10932528}, re = 0x7ffff6efa530}, pval = {rs = {s = 0x7ffff6efa530 "\005", len = 10932528}, ri = 10933206, 
              flags = 0}}, i2s = "\221\035t\361\377\177\000\000\240\\A\000\000\000\000\000P\341\377\377\377\177"}
        s = {s = 0x100000001 <Address 0x100000001 out of bounds>, len = -152066264}
        srevp = {0x7fffffffbfb0, 0x7ffff1744839}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
            u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#21 0x000000000042a3ea in run_actions (h=0x7fffffffda40, a=0x7ffff6e6cfb8, msg=0x7ffff6efa530) at action.c:1548
        t = 0x7ffff6e6e240
        ret = 1
        mod = 0x5294fa
        ms = 0
        __FUNCTION__ = "run_actions"
#22 0x000000000041a75a in do_action (h=0x7fffffffda40, a=0x7ffff6e99918, msg=0x7ffff6efa530) at action.c:677
        ret = -5
        v = -152066768
        dst = {send_sock = 0x415ca0, to = {s = {sa_family = 57680, sa_data = "\377\377\377\177\000\000\060\312\377\377\377\177\000"}, sin = {sin_family = 57680, sin_port = 65535, sin_addr = {s_addr = 32767}, 
              sin_zero = "0\312\377\377\377\177\000"}, sin6 = {sin6_family = 57680, sin6_port = 65535, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "0\312\377\377\377\177\000\000\037\312D\000\000\000\000", 
                  __u6_addr16 = {51760, 65535, 32767, 0, 51743, 68, 0, 0}, __u6_addr32 = {4294953520, 32767, 4508191, 0}}}, sin6_scope_id = 4142499792}}, id = 32767, proto = 40 '(', send_flags = {f = 204 '\314', 
            blst_imask = 255 '\377'}}
        tmp = 0x7fffffffda40 "\004"
        new_uri = 0x7ffff6e2a168 "(W\355\366\377\177"
        end = 0x300000000 <Address 0x300000000 out of bounds>
        crt = 0x7ffff6ea7128 ">\r\nql"
        cmd = 0x7ffff6e56828
        len = -152057192
        user = 32767
        uri = {user = {s = 0x7fffffffc930 "\320\312\377\377\377\177", len = 5514762}, passwd = {s = 0x7fffffffc870 "\340\310\377\377\377\177", len = 6417983}, host = {s = 0x7fffffffc880 "؇\351\366\377\177", len = -152920048}, 
          port = {s = 0x7fffffffc8d0 "", len = -208927014}, params = {s = 0x7fffffffc8e0 "", len = 0}, sip_params = {s = 0x7ffff6e987d8 "\003", len = -13272}, headers = {s = 0x7ffff6efa530 "\005", len = -9664}, port_no = 25912, 
          proto = 63215, type = 32767, flags = 8, transport = {s = 0x7ffff1fcc488 "UH\211\345ATSH\203\354PH\211}\330H\211u\320H\211U\310H\213E\320H\211E\340H\213E\330\017\267@ f\203\370\001\017\205\212", len = 4283552}, ttl = {
            s = 0x7fffffffcec0 "\220\317\377\377\377\177", len = 4316514}, user_param = {s = 0x7fffffffc900 "", len = 4713976}, maddr = {s = 0x0, len = -152920048}, method = {s = 0x0, len = 0}, lr = {
            s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = 6399695}, r2 = {s = 0x7fffffffc9d0 "Ї\351\366\377\177", len = -152066768}, gr = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", 
            len = -7856}, transport_val = {s = 0x7fffffffcad0 "p\314\377\377\377\177", len = 5531816}, ttl_val = {s = 0x7fffffffc970 "8", len = 4713976}, user_param_val = {s = 0x0, len = -152920048}, maddr_val = {
            s = 0x6f0100 "insert_new_lump_before", len = 7272288}, method_val = {s = 0x38 <Address 0x38 out of bounds>, len = -152920048}, lr_val = {s = 0x7ffff6e2a1c8 "", len = -152057248}, r2_val = {
            s = 0x7fff00000007 <Address 0x7fff00000007 out of bounds>, len = -152056576}, gr_val = {s = 0x7fff00000007 <Address 0x7fff00000007 out of bounds>, len = -152407768}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x800000 <Address 0x800000 out of bounds>, len = 7525160}, host = {s = 0xac7c8 <Address 0xac7c8 out of bounds>, len = 863448}, port = {
            s = 0xd2fe8 <Address 0xd2fe8 out of bounds>, len = 8}, params = {s = 0x58 <Address 0x58 out of bounds>, len = -14528}, sip_params = {s = 0x11900618ba6 <Address 0x11900618ba6 out of bounds>, len = -152059472}, 
          headers = {s = 0x7fffffffc740 "", len = 4713976}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 4142047248, transport = {s = 0x8 <Address 0x8 out of bounds>, len = 0}, ttl = {s = 0x7fffffffc800 "@\311\377\377", 
            len = 6399695}, user_param = {s = 0x0, len = 11625600}, maddr = {s = 0x7ffff6ef78c0 "\200d\261", len = 4}, method = {s = 0xb03580 "\376", len = -158960584}, lr = {s = 0x7ffff6ef78c0 "\200d\261", len = 4}, r2 = {
            s = 0x30 <Address 0x30 out of bounds>, len = -152066768}, gr = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, transport_val = {s = 0x7fffffffc830 "0\311\377\377\377\177", 
            len = 5421816}, ttl_val = {s = 0x7ffff6e2a1c8 "", len = -152059472}, user_param_val = {s = 0x400000007 <Address 0x400000007 out of bounds>, len = 7721968}, maddr_val = {s = 0x0, len = -152066768}, method_val = {
            s = 0x7ffff6e98768 "\002", len = -9664}, lr_val = {s = 0xffffc940 <Address 0xffffc940 out of bounds>, len = 6498312}, r2_val = {s = 0x7fffffffc840 "p\310\377\377\377\177", len = -152066768}, gr_val = {
            s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}}
        u = 0x16
        port = 0
        dst_host = 0x415ca0
        i = 1
        flags = 32767
        avp = 0x7ffff2b1ee24
        st = {flags = 0, id = 13, name = {n = 6417983, s = {s = 0x61ee3f "H\213E\370H\213P\bH\213E\360H\211\020H\213E\360H\307@(\b", len = -14656}, re = 0x61ee3f}, avp = 0x7ffff6e2a010}
        sct = 0x7fffffffcaf0
        sjt = 0x44ecff
        rve = 0x7ffff6e2a1c8
        mct = 0x7ffff6efb7e8
        rv = 0x0
        rv1 = 0x100000007
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x1000013c5 <Address 0x1000013c5 out of bounds>, len = 0}
        srevp = {0x0, 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
            u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#23 0x000000000042a3ea in run_actions (h=0x7fffffffda40, a=0x7ffff6e99688, msg=0x7ffff6efa530) at action.c:1548
        t = 0x7ffff6e99918
        ret = 1
        mod = 0x0
        ms = 0
        __FUNCTION__ = "run_actions"
#24 0x000000000041dc3d in do_action (h=0x7fffffffda40, a=0x7ffff6e99a38, msg=0x7ffff6efa530) at action.c:1044
        ret = 1
        v = 1
        dst = {send_sock = 0x883eb07c, to = {s = {sa_family = 1024, sa_data = "\000\000\000\000\000\000l\322\377\377\377\177\000"}, sin = {sin_family = 1024, sin_port = 0, sin_addr = {s_addr = 0}, 
              sin_zero = "l\322\377\377\377\177\000"}, sin6 = {sin6_family = 1024, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "l\322\377\377\377\177\000\000\001\000\000\000\000\000\000", __u6_addr16 = {
                    53868, 65535, 32767, 0, 1, 0, 0, 0}, __u6_addr32 = {4294955628, 32767, 1, 0}}}, sin6_scope_id = 4294955424}}, id = 32767, proto = 112 'p', send_flags = {f = 38 '&', blst_imask = 84 'T'}}
        tmp = 0x7ffff318925b "\211E\374\203}\374\002\017\224\300\017\266\300H\205\300t3H\213E\350\307\004$"
        new_uri = 0x0
        end = 0xa6d4f6 "=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=silenceSupp:off - - - -\r\na=ptime:20\r\na=sendrecv\r\n\r\n--unique-boundary-1\r\n"
        crt = 0x7ffff6efac50 "\001"
        cmd = 0x7ffff6e4feb8
        len = 0
        user = 0
        uri = {user = {s = 0x7fffffffd000 "\022*\257By\362\225\001\022*͞\003\rj\376", len = 5514864}, passwd = {s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = -152066768}, host = {s = 0x7ffff6e690f8 "!\002", 
            len = -12352}, port = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = 0}, params = {s = 0x100000000 <Address 0x100000000 out of bounds>, len = 0}, sip_params = {
            s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = -11532}, headers = {s = 0x7ffff6efa530 "\005", len = -152066768}, port_no = 23712, proto = 65, type = ERROR_URI_T, flags = 4294959440, transport = {
            s = 0x0, len = 0}, ttl = {s = 0x7fffffffd0a0 "\240\321\377\377\377\177", len = 4368975}, user_param = {s = 0x7fffffffd110 "0\321\377\377\377\177", len = -152066768}, maddr = {s = 0x7ffff6e690f8 "!\002", len = -9664}, 
          method = {s = 0x0, len = 1}, lr = {s = 0x7ffff6efa530 "\005", len = 1076832786}, r2 = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, gr = {s = 0x0, len = 0}, transport_val = {
            s = 0x195f27942af2a12 <Address 0x195f27942af2a12 out of bounds>, len = -1630721518}, ttl_val = {s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = -12016}, user_param_val = {s = 0x7ffff6e6a370 "", 
            len = -152066768}, maddr_val = {s = 0x7fffffffd130 "\020\322\377\377\377\177", len = -216215272}, method_val = {s = 0x7ffff6e6a370 "", len = 4283552}, lr_val = {s = 0x7fffffffd0c0 "", len = 5203602}, r2_val = {
            s = 0x7fffffffd1d0 "", len = 1}, gr_val = {s = 0x7fffebb98ca8 "", len = -134289984}}
        next_hop = {user = {s = 0x7ffff6e62330 "\374\001", len = -12768}, passwd = {s = 0x7ffff6ef7770 "8>\351\366\377\177", len = 0}, host = {s = 0x100415ca0 <Address 0x100415ca0 out of bounds>, len = -7856}, port = {
            s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = 5531816}, params = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -152066768}, sip_params = {
            s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, headers = {s = 0x0, len = 0}, port_no = 52992, proto = 65535, type = 32767, flags = 4368975, transport = {
            s = 0xf6ef9eb8 <Address 0xf6ef9eb8 out of bounds>, len = -152066768}, ttl = {s = 0x7ffff6e62330 "\374\001", len = -9664}, user_param = {s = 0x0, len = 1}, maddr = {s = 0x7ffff6efa530 "\005", len = 1156524562}, 
          method = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, lr = {s = 0x0, len = 0}, r2 = {s = 0x195f279456f2a12 <Address 0x195f279456f2a12 out of bounds>, len = -1630721518}, gr = {
            s = 0x0, len = 0}, transport_val = {s = 0x7fffffffcf50 "", len = 4367338}, ttl_val = {s = 0x42 <Address 0x42 out of bounds>, len = -152066768}, user_param_val = {
            s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x7fffffffcf90 "\240\320\377\377\377\177", len = 4367338}, lr_val = {
            s = 0x7fffffffcf10 "", len = -152066768}, r2_val = {s = 0x7ffff6ea3608 "\002\004", len = -10304}, gr_val = {s = 0x7ffff6ebbe70 "\270\276\353\366\377\177", len = 1}}
        u = 0x0
        port = 0
        dst_host = 0x7fffffffd780
        i = 32767
        flags = 32767
        avp = 0x7fffffffda40
        st = {flags = 4294954336, id = 32767, name = {n = -152078480, s = {s = 0x7ffff6ef7770 "8>\351\366\377\177", len = 4283552}, re = 0x7ffff6ef7770}, avp = 0x7fffffffe150}
        sct = 0x7fffffffd130
        sjt = 0x3f3189fbc
        rve = 0x7ffff6e98ed0
        mct = 0x7ffff6efa530
        rv = 0x7fffffffce20
        rv1 = 0x7fffffffd210
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = -12816}, re = 0x0}, pval = {rs = {s = 0x0, len = -12816}, ri = -152736744, flags = 32767}}, 
          i2s = "\000\000\000\000\000\000\000\000A@\357\366\377\177\000\000\060\000\000\000\060"}
        s = {s = 0x100415ca0 <Address 0x100415ca0 out of bounds>, len = -7856}
        srevp = {0x7fffffffcd00, 0x7ffff6efa530}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
            u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#25 0x000000000042a3ea in run_actions (h=0x7fffffffda40, a=0x7ffff6e99a38, msg=0x7ffff6efa530) at action.c:1548
        t = 0x7ffff6e99a38
        ret = -1
        mod = 0xf6efa530
        ms = 0
        __FUNCTION__ = "run_actions"
#26 0x000000000041a75a in do_action (h=0x7fffffffda40, a=0x7ffff6e69d08, msg=0x7ffff6efa530) at action.c:677
        ret = -5
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\377\177\000\000 \330\377\377\377\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 32767}, sin_zero = " \330\377\377\377\177\000"}, 
            sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = " \330\377\377\377\177\000\000Ϧa\000\000\000\000", __u6_addr16 = {55328, 65535, 32767, 0, 42703, 97, 0, 0}, 
                  __u6_addr32 = {4294957088, 32767, 6399695, 0}}}, sin6_scope_id = 1}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        tmp = 0xa6d140 "0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom: <sip:+447888555999 at 1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip:+447888555999 at 1.2.3.4:5060>\r\nContact: <sip:+447888555999@"...
        new_uri = 0x2e <Address 0x2e out of bounds>
        end = 0xa6d58a ""
        crt = 0x7fffffffd820 "\220\331\377\377\377\177"
        cmd = 0x7ffff6e56940
        len = 0
        user = 0
        uri = {user = {s = 0x7ffff6efac50 "\001", len = -152063064}, passwd = {s = 0x7fffffffd6ee "\005\005qѦ", len = -10513}, host = {
            s = 0xa6d4f6 "=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=silenceSupp:off - - - -\r\na=ptime:20\r\na=sendrecv\r\n\r\n--unique-boundary-1\r\n", len = 10932569}, port = {
            s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = 10932591}, params = {s = 0x500000000000000 <Address 0x500000000000000 out of bounds>, len = 0}, sip_params = {s = 0x776054 "parse_via", 
            len = 7812227}, headers = {s = 0x40 <Address 0x40 out of bounds>, len = -152920048}, port_no = 41432, proto = 63202, type = 32767, flags = 4294956776, transport = {s = 0x400000008 <Address 0x400000008 out of bounds>, 
            len = 10932564}, ttl = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = 331735376}, user_param = {
            s = 0xa6d158 ";branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom: <sip:+447888555999 at 1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip:+447888555999 at 1.2.3.4:5060>\r\nContact: <sip:+447888555999 at 1.2.3.4:5061>\r\nCal"..., len = 10932568}, maddr = {s = 0x7fffffffd820 "\220\331\377\377\377\177", len = 6799587}, method = {s = 0xffffd938 <Address 0xffffd938 out of bounds>, len = -338231396}, lr = {
            s = 0xffffffffffffd6f0 <Address 0xffffffffffffd6f0 out of bounds>, len = 6417983}, r2 = {s = 0x7fffffffd6e0 "", len = -152920048}, gr = {s = 0x7fffffffd730 "`\327\377\377\377\177", len = -152064944}, transport_val = {
            s = 0xa6d4f6 "=rtpmap:101 telephone-event/8000\r\na=fmtp:101 0-16\r\na=silenceSupp:off - - - -\r\na=ptime:20\r\na=sendrecv\r\n\r\n--unique-boundary-1\r\n", len = 10932538}, ttl_val = {
            s = 0x800000 <Address 0x800000 out of bounds>, len = 0}, user_param_val = {
            s = 0xa6d171 "Max-Forwards: 69\r\nFrom: <sip:+447888555999 at 1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip:+447888555999 at 1.2.3.4:5060>\r\nContact: <sip:+447888555999 at 1.2.3.4:5061>\r\nCall-ID: 74653c5b109e03c231c"..., len = 10932569}, maddr_val = {s = 0xd2df8 <Address 0xd2df8 out of bounds>, len = -152064944}, method_val = {s = 0x7ffff6efb3a8 "2", len = -216038109}, lr_val = {s = 0x7400415ca0 <Address 0x7400415ca0 out of bounds>, 
            len = -152065000}, r2_val = {s = 0x7fffffffd760 " \330\377\377\377\177", len = 4713976}, gr_val = {s = 0x0, len = -152920048}}
        next_hop = {user = {s = 0xa7d260 "", len = 7528240}, passwd = {s = 0xabd10 <Address 0xabd10 out of bounds>, len = -338231312}, host = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = -7856}, 
          port = {s = 0x7fffffffd510 "@\325\377\377\004", len = -216229634}, params = {s = 0x7fffffffd4d0 "\020\026\327\353\002", len = -216493477}, sip_params = {s = 0x7ffff6efa530 "\005", len = -338225568}, headers = {
            s = 0x7fffebd6ff80 "x\364\321\353\377\177", len = -338561912}, port_no = 5728, proto = 60375, type = 32767, flags = 4142900528, transport = {s = 0x2ebd71610 <Address 0x2ebd71610 out of bounds>, len = -215601968}, 
          ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 100}, maddr = {s = 0x7fffffffd5d0 "P\254\357\366\377\177", len = 6417983}, method = {s = 0x4ffffd540 <Address 0x4ffffd540 out of bounds>, len = 7803616}, lr = {
            s = 0x7fffffffd590 "\300\325\377\377\377\177", len = -208927014}, r2 = {s = 0x415ca0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300 .n", len = 16}, gr = {s = 0x7fffffffd680 " \330\377\377\377\177", len = 6754917}, 
          transport_val = {s = 0xab6e0 <Address 0xab6e0 out of bounds>, len = 858952}, ttl_val = {s = 0xd2df8 <Address 0xd2df8 out of bounds>, len = 8}, user_param_val = {s = 0x72 <Address 0x72 out of bounds>, len = -338230976}, 
          maddr_val = {s = 0x9ce00000000 <Address 0x9ce00000000 out of bounds>, len = -152063120}, method_val = {s = 0x7fffffffd5c0 "\200\326\377\377\377\177", len = 4713976}, lr_val = {s = 0x0, len = -152920048}, r2_val = {
            s = 0x0, len = 0}, gr_val = {s = 0x7fffffffd680 " \330\377\377\377\177", len = 6399695}}
        u = 0x74f6efa530
        port = 0
        dst_host = 0x75a52c
        i = 10
        flags = 0
        avp = 0x7ffff6e2a010
        st = {flags = 10998064, id = 0, name = {n = 10998072, s = {s = 0xa7d138 "", len = 10998080}, re = 0xa7d138}, avp = 0xa7d148}
        sct = 0x7ffff6e2a328
        sjt = 0x7ffff6efac18
        rve = 0x7ffff6e692d0
        mct = 0x0
        rv = 0x0
        rv1 = 0x7ffff6efa728
        c1 = {cache_type = 10932905, val_type = RV_NONE, c = {avp_val = {n = 10932899, s = {
                s = 0xa6d2a3 "5 16:45:20 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH\r\nSupported: replaces, timer\r\nX-Call-History-Id: 514007383\r\nX-SIPS-CALLID: 1388554425 at 192.168.1.72\r\nP-A"..., len = -11072}, re = 0xa6d2a3}, pval = {rs = {
                s = 0xa6d2a3 "5 16:45:20 GMT\r\nAllow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH\r\nSupported: replaces, timer\r\nX-Call-History-Id: 514007383\r\nX-SIPS-CALLID: 1388554425 at 192.168.1.72\r\nP-A"..., len = -11072}, ri = -338231424, flags = 32767}}, i2s = "\b(\352\366\377\177\000\000\360\377\326\353\377\177\000\000(\247\357\366\377\177"}
        s = {
          s = 0xa6d37c " <sip:+447888555999 at 1.2.3.4>\r\nContent-Length: 365\r\nContent-Type: multipart/mixed;boundary=\"unique-boundary-1\"\r\nMime-Version: 1.0\r\n\r\n--unique-boundary-1\r\nContent-Type: application/sdp\r\n\r\nv=0\r\no=r"..., len = 10932896}
        srevp = {0x75d3e0, 0x7ffff6efb160}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
            u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#27 0x000000000042a3ea in run_actions (h=0x7fffffffda40, a=0x7ffff6e60d18, msg=0x7ffff6efa530) at action.c:1548
        t = 0x7ffff6e69d08
        ret = 1
        mod = 0xa6d133
        ms = 0
        __FUNCTION__ = "run_actions"
#28 0x000000000042ab17 in run_top_route (a=0x7ffff6e60d18, msg=0x7ffff6efa530, c=0x0) at action.c:1634
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140737336289064, 114263968871033362, 4283552, 140737488347472, 0, 0, 114263968912976402, -114264531344217582}, __mask_was_saved = 0, 
              __saved_mask = {__val = {140737279388689, 8437870752, 14, 4611686022726615054, 0, 140737488345840, 140737279389571, 227640687945, 0, 4611686026796357744, 140737336288560, 140737488345904, 5635185, 8589925168, 
                  140737336288560, 0}}}}}
        p = 0x7fffffffda40
        ret = -152066264
        sfbk = 0
#29 0x0000000000509330 in receive_msg (
    buf=0xa6d100 "INVITE sip:+447888555999 at 1.2.3.4:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom: <sip:+447888555999 at 1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip"..., len=1014, rcv_info=0x7fffffffdd30) at receive.c:196
        msg = 0x7ffff6efa530
        ctx = {rec_lev = 700032, run_flags = 0, last_retcode = 852720, jmp_env = {{__jmpbuf = {852880, 8, 46, 140737488346128, 1705108409254, 140737335931856, 140737343873808, 140737354063872}, __mask_was_saved = 0, 
              __saved_mask = {__val = {4294967295, 8, 1, 140737147573488, 0, 0, 1024, 8589925504, 140737147573488, 140737488346240, 6298145, 140737219175072, 140737147573488, 140737333187210, 6298273, 140737488346608}}}}}
        ret = -9008
        inb = {
          s = 0xa6d100 "INVITE sip:+447888555999 at 1.2.3.4:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom: <sip:+447888555999 at 1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip"..., len = 1014}
        __FUNCTION__ = "receive_msg"
#30 0x0000000000608a2e in udp_rcv_loop () at udp_server.c:495
        len = 1014
        buf = "INVITE sip:+447888555999 at 1.2.3.4:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.4:5061;branch=z9hG4bK063b78c5\r\nMax-Forwards: 69\r\nFrom: <sip:+447888555999 at 1.2.3.4:5061>;tag=as29e42e9b\r\nTo: <sip"...
        tmp = 0x7ffff7df1865 "I\211\303L\213L$0L\213D$(H\213|$ H\213t$\030H\213T$\020H\213L$\bH\213\004$H\203\304HA\377\343ffffff.\017\037\204"
        from = 0x7ffff6ea3408
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {140733620534309, 140737488347472}, addr32 = {427146277, 32767, 4294959440, 32767}, addr16 = {48165, 6517, 32767, 0, 57680, 65535, 32767, 0}, 
              addr = "%\274u\031\377\177\000\000P\341\377\377\377\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {427146277, 0}, addr32 = {427146277, 0, 0, 0}, addr16 = {48165, 6517, 0, 0, 0, 0, 0, 0}, 
              addr = "%\274u\031", '\000' <repeats 11 times>}}, src_port = 5061, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, 
              sa_data = "\023\305%\274u\031\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50451, sin_addr = {s_addr = 427146277}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, 
              sin6_port = 50451, sin6_flowinfo = 427146277, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, 
          bind_address = 0x7ffff6e4b1d8, proto = 1 '\001'}
        __FUNCTION__ = "udp_rcv_loop"
#31 0x00000000004a5ca4 in main_loop () at main.c:1382
        i = 7390784
        pid = 4053
        si = 0x400000000
        si_desc = "\356\326p\000\000\000\000\000@\306p\000\000\000\000\000\b\000\000\000\001\000\000\000\260\024\260\353\377\177\000\000\220\336\377\377\377\177\000\000\363wN\000\000\000\000\000\t\000\000\000\377\177\000\000\260\024\260\353\377\177\000\000\000\000\000\004\004\000\000\000\260\024\260\353\377\177\000\000\240\\A\000\000\000\000\000P\341\377\377\001\000\000\000\340\336\377\377\377\177\000\000\226xN\000\000\000\000\000h\241\342\366n\000\000\000\356\326p\000\000\000\000"
        nrprocs = 7352968
        __FUNCTION__ = "main_loop"
#32 0x00000000004acd36 in main (argc=12, argv=0x7fffffffe158) at main.c:2533
        cfg_stream = 0xa85010
        c = -1
        r = 0
        tmp = 0x7fffffffe421 ""
        tmp_len = 32767
        port = -143129121
        proto = 0
        options = 0x702650 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
        ret = -1
        seed = 3752915056
        rfd = 8
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 1
        n_lst = 0x40d7d4
        p = 0x0
        __FUNCTION__ = "main"
(gdb) quit
A debugging session is active.

	Inferior 1 [process 4049] will be killed.

Quit anyway? (y or n) 


---
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/240#issuecomment-120066445
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-dev/attachments/20150709/95da9ea8/attachment-0001.html>


More information about the sr-dev mailing list