[sr-dev] [kamailio/kamailio] Kamailio 4.4.5 crash at receive_fd() (#1069)

Pepelux notifications at github.com
Tue Apr 18 10:08:21 CEST 2017


Another crash ....

# gdb /usr/sbin/kamailio /tmp/core
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/ff/dca0b3c4e5ce21804735c74ee480e9abd4c6a6.debug...done.
done.
[New LWP 26162]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/kamailio.'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74
74      ../../mem/../atomic/atomic_common.h: No such file or directory.
(gdb) bt full
#0  atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74
No locals.
#1  dlg_unref_helper (dlg=0x7f37572ad3a0, cnt=1, fname=0x6632 <error: Cannot access memory at address 0x6632>, fline=1650) at dlg_hash.c:925
        mypid = 26162
        d_entry = 0x7f453f1b2470
        __FUNCTION__ = "dlg_unref_helper"
#2  0x00007f374fb38e12 in dlg_run_event_route (dlg=0x7f37572ad3a0, msg=0x7f37966874f8, ostate=1431987232, nstate=1) at dlg_handlers.c:1650
        rt = 10133176
        bkroute = 1
        __FUNCTION__ = "dlg_run_event_route"
#3  0x00007f374fb3c21e in dlg_onroute (req=0x7f37966874f8, route_params=0x7f37555a4e10, param=0x7f37555a6420) at dlg_handlers.c:1318
        dlg0 = 0x6632
        val = {   
          s = 0x9ab8cb <buf+203> "bb6.e74;nat=yes>,<sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxx"..., len = 7}
        callid = {
          s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25 at XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}
        ftag = {  
          s = 0x9ab97a <buf+378> "as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25 at XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: No"..., len = 10}
        ttag = {  
          s = 0x9ab9ba <buf+442> "45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25 at XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0"..., len = 8}
        new_state = 5
        old_state = 4
        unref = 1 
        event = 7 
        dir = 1   
        ret = 26162
        __FUNCTION__ = "dlg_onroute"
#4  0x00007f375241628d in run_rr_callbacks (req=0x7f37966874f8, rr_param=0x7ffcb7bbf3d0) at rr_cb.c:96
        l_param = {
          s = 0x9ab8ae <buf+174> "r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>,<sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at XX.XX.XX.53:5080>;"..., len = 44}
        cbp = 0x7f379667a2b8
        __FUNCTION__ = "run_rr_callbacks"
#5  0x00007f37524088a2 in after_loose (_m=0x7f37966874f8, preloaded=2) at loose.c:928
        puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
            s = 0x9ab8e1 <buf+225> "XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxx"..., len = 12}, port = {
            s = 0x9ab8ee <buf+238> "5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxxxxxxxxx.com>;"..., len = 4}, params = {
            s = 0x9ab8f3 <buf+243> "transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxxxxxxxxx.com>;tag=4"..., len = 58}, sip_params = {
            s = 0x9ab8f3 <buf+243> "transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxxxxxxxxx.com>;tag=4"..., len = 58}, headers = {s = 0x0, len = 0}, port_no = 5061, proto = 3, type = SIP_URI_T, flags = (unknown: 0), transport = {
            s = 0x9ab8f3 <buf+243> "transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxxxxxxxxx.com>;tag=4"..., len = 13}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {
---Type <return> to continue, or q <return> to quit---
            s = 0x9ab907 <buf+263> "lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID: 47"..., len = 2}, r2 = {
            s = 0x9ab901 <buf+257> "r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-"..., len = 5}, gr = {s = 0x0, len = 0}, transport_val = {
            s = 0x9ab8fd <buf+253> "tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxxxxxxxxx.com>;tag=45248699\r\nC"..., len = 3}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0,
            len = 0}, r2_val = {
            s = 0x9ab904 <buf+260> "on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID:"..., len = 2}, gr_val = {s = 0x0, len = 0}}
lecom.com>;tag=45248699\r\nCall-ID:"..., len = 2}, gr_val = {s = 0x0, len = 0}}
        rt = 0x0  
        status = 26162
        uri = {   
          s = 0x9ab89d <buf+157> "sip:XX.XX.XX.51;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>,<sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at 18"..., len = 61}
        use_ob = 0
        rparams = {
          s = 0x9ab8ae <buf+174> "r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>,<sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: \"XXXXXXXXX\" <sip:XXXXXXXXX at XX.XX.XX.53:5080>;"..., len = 44}
        __FUNCTION__ = "after_loose"
#6  0x0000000000541cf0 in do_action (h=0x7ffcb7bbfaf0, a=0x7f37964bfd98, msg=0x7f37966874f8) at action.c:1060
        ret = -5  
        v = 25
        dst = {send_sock = 0x7ffcb7bbf640, to = {s = {sa_family = 1215, sa_data = "B\000\000\000\000\000\370\227h\226\067\177\000"}, sin = {sin_family = 1215, sin_port = 66, sin_addr = {s_addr = 0},
              sin_zero = "\370\227h\226\067\177\000"}, sin6 = {sin6_family = 1215, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\370\227h\226\067\177\000\000\273\065B\000\000\000\000", __u6_addr16 = {38904, 38504, 32567, 0, 13755, 66, 0, 0}, __u6_addr32 = {2523437048, 32567, 4339131, 0}}},
              sin6_scope_id = 36286432}}, id = 0, proto = 10 '\n', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        end = 0x7ffcb7bbfaf0 "\001"
        uri = {user = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13913760}, passwd = {s = 0x23a070 <error: Cannot access memory at address 0x23a070>, len = -1212418316}, host = {
            s = 0x2bcbb8 <error: Cannot access memory at address 0x2bcbb8>, len = 1462424480}, port = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, params = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776}, sip_params = {s = 0x7ffcb7bbf820 "z\271\232", len = 5615623}, headers = {s = 0x0, len = -2002407168}, port_no = 0,
          proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 1337012136), transport = {s = 0x7ffcb7bbf810 "\315\271\232", len = -1212418036}, ttl = {
            s = 0x7f3700000000 <error: Cannot access memory at address 0x7f3700000000>, len = 1431825776}, user_param = {
            s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25 at XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}, maddr = {s = 0x6bb01000000 <error: Cannot access memory at address 0x6bb01000000>, len = 13914448}, method = {
            s = 0x239dc0 <error: Cannot access memory at address 0x239dc0>, len = -1212418032}, lr = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 10140157}, r2 = {
            s = 0x4f7f4 <error: Cannot access memory at address 0x4f7f4>, len = 1}, gr = {s = 0x635f1 <error: Cannot access memory at address 0x635f1>, len = -1212418092}, transport_val = {s = 0x0,
            len = 1462424480}, ttl_val = {s = 0x7f375557ed70 "", len = 26162}, user_param_val = {s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, maddr_val = {s = 0x7f375557ed84 "",
            len = 5615623}, method_val = {
            s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: <sip:601 at customers.xxxxxxxxxxx.com:5061>;tag=as3e9ce588\r\nTo: <sip:xxxxxx620 at custo"..., len = -2002407168}, lr_val = {s = 0x7f3755b74078 "\t", len = 1337065181}, r2_val = {s = 0x0, len = -2002407168}, gr_val = {s = 0x0, len = 1337417873}}
        next_hop = {user = {
            s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25 at XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}, passwd = {
            s = 0x9ab97a <buf+378> "as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25 at XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: No"..., len = 10}, host = {
            s = 0x9ab9ba <buf+442> "45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25 at XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0"..., len = 1462424480}, port = {s = 0x0, len = -2002407168}, params = {s = 0x0, len = -1773448560}, sip_params = {s = 0x7f37966874f8 "\277T", len = -1212417664},
          headers = {
            s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: <sip:601 at customers.xxxxxxxxxxx.com:5061>;tag=as3e9ce588\r\
   ---Type <return> to continue, or q <return> to quit---
nTo: <sip:xxxxxx620 at custo"..., len = 1431770624}, port_no = 16504, proto = 21943, type = 32567, flags = (URI_USER_NORMALIZE | unknown: 1337423684), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0},
          user_param = {s = 0x0, len = 0}, maddr = {s = 0x7f37963e7a78 "1", len = 1}, method = {s = 0x0, len = -2002407168}, lr = {s = 0x67964f8c90 <error: Cannot access memory at address 0x67964f8c90>,
            len = -1773448584}, r2 = {s = 0x7ffcb7bbf980 "", len = -1771539208}, gr = {s = 0x7ffcb7bc0dc0 "\003", len = -1212417196}, transport_val = {s = 0x0, len = 5795166}, ttl_val = {
            s = 0x7ffcb7bbfb54 "\001", len = -1212412480}, user_param_val = {s = 0x7f37966874f8 "\277T", len = -1212412480}, maddr_val = {s = 0x7ffcb7bbfb54 "\001", len = 4329797}, method_val = {
            s = 0xa00000000 <error: Cannot access memory at address 0xa00000000>, len = 1462424480}, lr_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, r2_val = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776}, gr_val = {s = 0x0, len = 0}}
        u = 0x7ffcb7bbfaf0
        flags = 0 
        st = {flags = 10140109, id = 0, name = {n = 50, s = {s = 0x32 <error: Cannot access memory at address 0x32>, len = 10140026}, re = 0x32}, avp = 0xa}
        sct = 0x7ffcb7bbfaf0
        sjt = 0x7ffcb7bbfaf0
        mct = 0x0 
        rv = 0x7f37966874f8
        rv1 = 0x7f37966874f8
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = -1212417832}, re = 0x0}, pval = {rs = {s = 0x0, len = -1212417832}, ri = -1212417864, flags = 32764}},
          i2s = "\330\370\273\267\374\177\000\000\304\366\273\267\374\177\000\000\270\313+\000\000"}
        s = {s = 0x7ffcb7bc0dc0 "\003", len = -1212417040}
        srevp = {0x7f37964bfd98, 0x7f37966874f8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 139876723345328,
              string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s = 0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr = 0x7f37966847b0, select = 0x7f37966847b0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#7  0x00000000005407b5 in run_actions (h=0x1, h at entry=0x7ffcb7bbfaf0, a=0x7f37555a4e10, msg=0x7f37555a6420) at action.c:1549
        ret = -1212412480
        mod = 0x7f37964bfd98
        __FUNCTION__ = "run_actions"
#8  0x000000000054d187 in run_actions_safe (h=0x7ffcb7bc0dc0, a=<optimized out>, msg=<optimized out>) at action.c:1614
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140723391036144, -6256338930039500370, 139876723356920, 140723391040960, 140723391036960, 0, -6256338896078220882,
                6256743653617062318}, __mask_was_saved = 0, __saved_mask = {__val = {2436122589503271168, 4294967565, 139876721732288, 139876720589288, 139874199928833, 0, 2436122589503271168, 0,
                  139876722008400, 140723391036448, 139876723356920, 140723391040960, 140723391036960, 0, 5795166, 140723391036960}}}}}
        ret = <optimized out>
        ign_on_break = 0
#9  0x0000000000421190 in rval_get_int (h=0x7ffcb7bc0dc0, msg=0x1, i=0x7ffcb7bbfe20, rv=0x3d4, cache=0x67) at rvalue.c:912
        r_avp = 0x6632
        avp_val = {n = 266, s = {s = 0x10a <error: Cannot access memory at address 0x10a>, len = -1772630408}, re = 0x10a}
        pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}
        tmp = {s = 0xa49900 <_pkg_root> "\313\030p", len = -1773840408}
        s = 0x7f37966874f8
        r = 26162 
        ret = 26162
        destroy_pval = -1212412480
        __FUNCTION__ = "rval_get_int"
#10 0x0000000000426f1c in rval_expr_eval_int (h=0x7ffcb7bc0dc0, msg=0x7f37966874f8, res=0x7ffcb7bbfe20, rve=0x7f37964bf230) at rvalue.c:1910
        i1 = 0
        i2 = 0
---Type <return> to continue, or q <return> to quit---
        ret = -1  
        c1 = {cache_type = 3082554816, val_type = 32764, c = {avp_val = {n = 0, s = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -1773234896}, re = 0x300000000}, pval = {rs = {
                s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -1773234896}, ri = -1771539208, flags = 32567}},
          i2s = "\000\000\000\000\004\000\000\000g\306\037P7\177\000\000\323x=\226\067\177"}
        c2 = {cache_type = 2520886432, val_type = 32567, c = {avp_val = {n = 5799339, s = {s = 0x587dab <pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\323 B", len = 10139993},
              re = 0x587dab <pv_printf+267>}, pval = {rs = {s = 0x587dab <pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\323 B", len = 10139993}, ri = 9, flags = 0}},
          i2s = "x\316W\226\067\177\000\000\000\261\245\210\226\330\316!\001\000\000\000\000"}
        rv1 = 0x7f37966874f8
        rv2 = 0x0 
        __FUNCTION__ = "rval_expr_eval_int"
#11 0x00000000005421c7 in do_action (h=0x7ffcb7bc0dc0, a=0x7f37964c6300, msg=0x7f37966874f8) at action.c:1030
        ret = -5  
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 45312, sa_data = "\245\210\226\330\316!\370th\226\067\177\000"}, sin = {sin_family = 45312, sin_port = 34981, sin_addr = {s_addr = 567203990},
              sin_zero = "\370th\226\067\177\000"}, sin6 = {sin6_family = 45312, sin6_port = 34981, sin6_flowinfo = 567203990, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\370th\226\067\177\000\000\221`\267O7\177\000", __u6_addr16 = {29944, 38504, 32567, 0, 24721, 20407, 32567, 0}, __u6_addr32 = {2523428088, 32567, 1337417873, 32567}}},
              sin6_scope_id = 10140109}}, id = 0, proto = 50 '2', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        end = 0x7f37964bf230 "\001"
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776}, passwd = {s = 0x7ffcb7bc0010 "z\271\232", len = 5615623}, host = {s = 0x0, len = -2002407168}, port = {s = 0x0,
            len = 1337012137}, params = {s = 0x7ffcb7bc0000 "\315\271\232", len = -1212416004}, sip_params = {s = 0x7ffc00000000 <error: Cannot access memory at address 0x7ffc00000000>, len = 1431825776},
          headers = {
            s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25 at XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}, port_no = 64, proto = 47036, type = 1723, flags = (URI_SIP_USER_PHONE | unknown: 210129324), transport = {s = 0x7f3796537350 "\224\004", len = -1212416000}, ttl = {
            s = 0x30 <error: Cannot access memory at address 0x30>, len = 10140157}, user_param = {s = 0x4f7f4 <error: Cannot access memory at address 0x4f7f4>, len = 1}, maddr = {
            s = 0x635f1 <error: Cannot access memory at address 0x635f1>, len = -1212416060}, method = {s = 0x7f3796553930 "\001", len = 1462424480}, lr = {s = 0x7f375557ed70 "", len = 26162}, r2 = {
            s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, gr = {s = 0x7f375557ed84 "", len = 5615623}, transport_val = {
            s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: <sip:601 at customers.xxxxxxxxxxx.com:5061>;tag=as3e9ce588\r\nTo: <sip:xxxxxx620 at custo"..., len = -2002407168}, ttl_val = {s = 0x7f37559e7178 "\b\220\325U7\177", len = 1337065181}, user_param_val = {s = 0x7ffcb7bc0dc0 "\003", len = -2002407168}, maddr_val = {
            s = 0x28ac9 <error: Cannot access memory at address 0x28ac9>, len = 1337417873}, method_val = {
            s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25 at XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}, lr_val = {
            s = 0x9ab97a <buf+378> "as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25 at XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: No"..., len = 10}, r2_val = {
            s = 0x9ab9ba <buf+442> "45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25 at XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-Han
gupCauseCode: 16\r\nContent-Length: 0"..., len = 1462424480}, gr_val = {s = 0x0, len = -2002407168}}
        next_hop = {user = {s = 0x0, len = -1774037616}, passwd = {s = 0x7f37966874f8 "\277T", len = -1212415632}, host = {
            s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: <sip:601 at customers.xxxxxxxxxxx.com:5061>;tag=as3e9ce588\r\nTo: <sip:xxxxxx620 at custo"..., len = 1431770624}, port = {s = 0x7f37559e7178 "\b\220\325U7\177", len = 1337423685}, params = {
            s = 0xa92d04ebe56c51ae <error: Cannot access memory at address 0xa92d04ebe56c51ae>, len = 210129326}, sip_params = {s = 0x0, len = 37}, headers = {
            s = 0x9ab963 <buf+355> "XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: <sip:xxxxxx601 at customers.xxxxxxxxxxx.com>;tag=45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25 at XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-A"..., len = -1772799688}, port_no = 23088, proto = 38462, type = 32567, flags = URI_USER_NORMALIZE, transport = {s = 0x0, len = -2002407168}, ttl = {s = 0x0,
            len = -1774037640}, user_param = {s = 0x7ffcb7bc0170 "", len = -1771539208}, maddr = {s = 0x7ffcb7bc0dc0 "\003", len = -1212415120}, method = {s = 0x0, len = 5795166}, lr = {s = 0x7ffcb7bc0370 "",
            len = -1212412480}, r2 = {s = 0x7f37966874f8 "\277T", len = -1212412480}, gr = {s = 0x7ffcb7bc0370 "", len = 4329797}, transport_val = {s = 0x0, len = 1441022624}, ttl_val = {s = 0x7f379641bff0 "",
            len = -2002407168}, user_param_val = {s = 0x7ffcb7bc02b0 "\310\003", len = -1772698632}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = -2002407168}, lr_val = {s = 0x0,
            len = -1774037656}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1771539208}, gr_val = {s = 0x7ffcb7bc0dc0 "\003", len = -1212415120}}
        u = 0x7f37964bf230
        flags = 32567
        st = {flags = 0, id = 0, name = {n = -1774037616, s = {s = 0x7f3796425590 "", len = -1771539208}, re = 0x7f3796425590}, avp = 0x7ffcb7bc0170}
        sct = 0x7f37964bf230
---Type <return> to continue, or q <return> to quit---
        sjt = 0x7f37964bf230
        mct = 0x0 
        rv = 0x55b007 <get_debug_level+103>
        rv1 = 0x7f37966874f8
        c1 = {cache_type = 10140026, val_type = RV_NONE, c = {avp_val = {n = 10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len = 10140090}, re = 0xa}, pval = {rs = {
                s = 0xa <error: Cannot access memory at address 0xa>, len = 10140090}, ri = -1212416284, flags = 32764}}, i2s = "\000\000\000\000\000\000\000\000\240\323*W7\177\000\000\b\000\000\000\000"}
        s = {
          s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: <sip:601 at customers.xxxxxxxxxxx.com:5061>;tag=as3e9ce588\r\nTo: <sip:xxxxxx620 at custo"..., len = -2002407168}
        srevp = {0x7f37964c6300, 0x7f37966874f8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 139876723345328,
              string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s = 0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr = 0x7f37966847b0, select = 0x7f37966847b0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#12 0x00000000005407b5 in run_actions (h=0x1, a=0x7f37555a4e10, msg=0x7f37555a6420) at action.c:1549
        ret = 1   
        mod = 0x7f37964c6300
        __FUNCTION__ = "run_actions"
#13 0x00000000005423e0 in do_action (h=0x7ffcb7bc0dc0, a=0x7f3796668250, msg=0x7f37966874f8) at action.c:678
        ret = -5  
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\070o\321U7\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "8o\321U7\177\000"},
            sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "8o\321U7\177\000\000\230\332>\227\067\177\000", __u6_addr16 = {28472, 21969, 32567, 0, 55960, 38718,
                    32567, 0}, __u6_addr32 = {1439788856, 32567, 2537478808, 32567}}}, sin6_scope_id = 528}}, id = 0, proto = -112 '\220', send_flags = {f = 211 '\323', blst_imask = 187 '\273'}}
        end = 0x8 <error: Cannot access memory at address 0x8>
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776}, passwd = {s = 0x7ffcb7bc0560 "\300\r\274\267\374\177", len = 5615623}, host = {
            s = 0x100000002 <error: Cannot access memory at address 0x100000002>, len = -2002407168}, port = {s = 0x0, len = -1774040560}, params = {s = 0x7ffcb7bc0dc0 "\003", len = -5}, sip_params = {
            s = 0x7ffcb7bc0590 "", len = -1771539208}, headers = {s = 0x0, len = 5506997}, port_no = 1424, proto = 47036, type = 32764, flags = (unknown: 3082552768), transport = {
            s = 0x7f3796424a10 "\267\001", len = -1771539208}, ttl = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1756792081}, user_param = {
            s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, len = 0}, maddr = {s = 0x7ffcb7bc0588 "\207\321T", len = 36888808}, method = {s = 0x2328ee0 "\005", len = 36867552}, lr = {
            s = 0x0, len = 36867552}, r2 = {s = 0x100000003 <error: Cannot access memory at address 0x100000003>, len = -1212413984}, gr = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0},
          transport_val = {s = 0x200000001 <error: Cannot access memory at address 0x200000001>, len = -1212414576}, ttl_val = {s = 0x232dfc0 "Ѝ2\002", len = 0}, user_param_val = {s = 0x7f3796689366 "BYE",
            len = 1}, maddr_val = {s = 0x32e0d0 <error: Cannot access memory at address 0x32e0d0>, len = -1756812511}, method_val = {s = 0x7ffcb7bc058c "", len = 0}, lr_val = {s = 0x7ffcb7bc0dc0 "\003",
            len = -1771539208}, r2_val = {s = 0x7ffcb7bc0dc0 "\003", len = -1212413760}, gr_val = {s = 0x0, len = 5558663}}
        next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffcb7bc0590 "", len = 9195950}, host = {s = 0x7f37966874f8 "\277T", len = -1212412480}, port = {s = 0x7ffcb7bc08c0 "\001", len = 0}, params = {
            s = 0xa92d04e4120c51ae <error: Cannot access memory at address 0xa92d04e4120c51ae>, len = 210129326}, sip_params = {s = 0x0, len = 0}, headers = {
            s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, port_no = 3, proto = 0, type = TEL_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = {s = 0x0,
            len = 36867720}, ttl = {s = 0x1000001 <error: Cannot access memory at address 0x1000001>, len = -1212414348}, user_param = {s = 0x2328de0 "", len = 1391525782}, maddr = {
            s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13913952}, method = {s = 0x239fb0 <error: Cannot access memory at address 0x239fb0>, len = 2863264}, lr = {
            s = 0x2bcbb8 <error: Cannot access memory at address 0x2bcbb8>, len = -2002407168}, r2 = {s = 0x10e <error: Cannot access memory at address 0x10e>, len = -1212413760}, gr = {
            s = 0x7ffcb7bc0dc0 "\003", len = 4329872}, transport_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = -1771531328}, ttl_val = {
            s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 36867904}, user_param_val = {s = 0x2328de0 "", len = 8}, maddr_val = {
            s = 0x80 <error: Cannot access memory at address 0x80>, len = -1756820986}, method_val = {s = 0x0, len = -2002407168}, lr_val = {s = 0x0, len = -1774039800}, r2_val = {
            s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1771539208}, gr_val = {s = 0x7ffcb7bc0dc0 "\003", len = -1212413760}}
        u = 0x8   
---Type <return> to continue, or q <return> to quit---
        flags = 0 
        st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1212414576}, re = 0x1}, avp = 0xa92d04e4008c51ae}
        sct = 0x8 
        sjt = 0x8 
        mct = 0x0 
        rv = 0x7ffcb7bc0630
        rv1 = 0x7f37966874f8
        c1 = {cache_type = 3082539912, val_type = 32764, c = {avp_val = {n = -1212423248, s = {s = 0x7ffcb7bbe3b0 "'\312W\226\067\177", len = -1212427344}, re = 0x7ffcb7bbe3b0}, pval = {rs = {
                s = 0x7ffcb7bbe3b0 "'\312W\226\067\177", len = -1212427344}, ri = -1212414924, flags = 32764}}, i2s = "\200\352\062\002\000\000\000\000\240\323*W7\177\000\000\b\000\000\000\000"}
        s = {
          s = 0x43b2fc <grp_hash_lookup+1420> "1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t at D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200", len = -1212414452}
        srevp = {0x7f3796426198, 0x7f37966874f8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 139876723345328,
              string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s = 0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr = 0x7f37966847b0, select = 0x7f37966847b0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#14 0x00000000005407b5 in run_actions (h=0x1, a=0x7f37555a4e10, msg=0x7f37555a6420) at action.c:1549
        ret = 1   
        mod = 0x7f3796426198
        __FUNCTION__ = "run_actions"
#15 0x0000000000542218 in do_action (h=0x7ffcb7bc0dc0, a=0x7f37964262c8, msg=0x7f37966874f8) at action.c:1049
        ret = 1   
        v = 1
        dst = {send_sock = 0x7f37966874f8, to = {s = {sa_family = 34958, sa_data = "\000U7\177\000\000\341\001\000\000\374\177\000"}, sin = {sin_family = 34958, sin_port = 21760, sin_addr = {s_addr = 32567},
              sin_zero = "\341\001\000\000\374\177\000"}, sin6 = {sin6_family = 34958, sin6_port = 21760, sin6_flowinfo = 32567, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\341\001\000\000\374\177\000\000\310 at XW7\177\000", __u6_addr16 = {481, 0, 32764, 0, 16584, 22360, 32567, 0}, __u6_addr32 = {481, 32764, 1465401544, 32567}}},
              sin6_scope_id = 2522107376}}, id = 32567, proto = -8 '\370', send_flags = {f = 116 't', blst_imask = 104 'h'}}
        end = 0x7f3796424d08 "\001"
        uri = {user = {s = 0x7ffcb7bc0b6c "", len = -1212413516}, passwd = {s = 0x7f37563803c0 "\363T", len = 1465401264}, host = {s = 0x9 <error: Cannot access memory at address 0x9>, len = 0}, port = {
            s = 0x7f375539d330 "\260?XW7\177", len = 7895}, params = {s = 0x7ffcb7bc0b6c "", len = 5615623}, sip_params = {s = 0x1ed7 <error: Cannot access memory at address 0x1ed7>, len = -2002407168},
          headers = {s = 0x7f37575840c8 "\002", len = -1774255040}, port_no = 19952, proto = 38484, type = 32567, flags = (URI_SIP_USER_PHONE | unknown: 492), transport = {s = 0x7f37966874f8 "\277T",
            len = -1772487928}, ttl = {s = 0x7f37966874f8 "\277T", len = 1465401784}, user_param = {s = 0x0, len = -1}, maddr = {s = 0x7ffcb7bc0a00 "", len = 1684820398}, method = {
            s = 0x4 <error: Cannot access memory at address 0x4>, len = 10133176}, lr = {s = 0xa02840 <p_onsend> "", len = -1771539208}, r2 = {
            s = 0xa92d04e414ec51ae <error: Cannot access memory at address 0xa92d04e414ec51ae>, len = 210129326}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7f37552a21f0 <tm_cfg> "\b\026[U7\177",
            len = 5615623}, ttl_val = {s = 0x7ffcb7bc0b6c "", len = -1212413244}, user_param_val = {s = 0x7f37552a21f0 <tm_cfg> "\b\026[U7\177", len = 1}, maddr_val = {s = 0x7f3757583fb0 "0\323\071U7\177",
            len = -1771539208}, method_val = {s = 0x1e1 <error: Cannot access memory at address 0x1e1>, len = 1465401784}, lr_val = {s = 0x7f3757583fb0 "0\323\071U7\177", len = 5615623}, r2_val = {
            s = 0x7f37572f3388 "\360\247\067U7\177", len = 1425852922}, gr_val = {s = 0x0, len = 1426075181}}
        next_hop = {user = {s = 0x1e1 <error: Cannot access memory at address 0x1e1>, len = -1212413072}, passwd = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -1771539208}, host = {
            s = 0x1e1 <error: Cannot access memory at address 0x1e1>, len = 1465401784}, port = {s = 0x7f3757583fb0 "0\323\071U7\177", len = 1426115770}, params = {s = 0x0, len = 10498080}, sip_params = {
            s = 0xa03028 <def_list+8> "", len = 10498096}, headers = {s = 0xa03038 <def_list+24> "", len = 10498120}, port_no = 10568, proto = 160, type = ERROR_URI_T, flags = (unknown: 0), transport = {
            s = 0x7f37963bbc80 <wr_buf> "\027\003\001\004\060\375**.N\354\367\271\252ȴ\302\353\351\065Ә\364\342W\213$c\356'N\232پ\365\300\025\310\t\033e\222\345\204\067\351\344\026\304\033j\363j\203Ky\371\254\254n}\022}\255\224\066\017\256NmĦ\353\367\247\252\360\255\300\214)\002\016)\003\221\375o@\265{\273d\356K\245\031qh/J\326\305XQ\025e\363z\242&\342a\330\356o\330@\220\232]yvh\344\035&\331\327od\026\060\340!ˁ\217\200\031\vd\377\062TZ\357?\240\n\320g\307\033\030\317\334\326&Kɢ\002g\236*5A\335\356Lu\236\254\005\363\206\231Zվ\374\254\212\236\020\255\343\024\061\323\a\264H\263\340\245\021ni"..., len = 395}, ttl = {
            s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1212416000}, user_param = {s = 0x0, len = 1391525782}, maddr = {
---Type <return> to continue, or q <return> to quit---
            s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13915544}, method = {s = 0x2399c0 <error: Cannot access memory at address 0x2399c0>, len = -1212412940}, lr = {
            s = 0x2bcb70 <error: Cannot access memory at address 0x2bcb70>, len = -1212412924}, r2 = {s = 0x7f37966874f8 "\277T", len = 1391525782}, gr = {
            s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13916264}, transport_val = {s = 0x2396a8 <error: Cannot access memory at address 0x2396a8>, len = 2860952}, ttl_val = {
            s = 0x2bcbb8 <error: Cannot access memory at address 0x2bcbb8>, len = 8}, user_param_val = {s = 0x118 <error: Cannot access memory at address 0x118>, len = -2002407168}, maddr_val = {
            s = 0x2ba798 <error: Cannot access memory at address 0x2ba798>, len = 6245668}, method_val = {s = 0x7f379659fb08 "\\\005", len = 6999923}, lr_val = {s = 0x715640 <__FUNCTION__.7459> "parse_via",
            len = 1465401264}, r2_val = {s = 0xa92d04e4090c51ae <error: Cannot access memory at address 0xa92d04e4090c51ae>, len = -1212412780}, gr_val = {s = 0x0, len = 10139797}}
        u = 0x7f3796424d08
        flags = 32567
        st = {flags = 481, id = 0, name = {n = -1212413072, s = {s = 0x7ffcb7bc0b70 "", len = 4}, re = 0x7ffcb7bc0b70}, avp = 0x7f37966874f8}
        sct = 0x7f3796424d08
        sjt = 0x7f3796424d08
        mct = 0x0 
        rv = 0x1  
        rv1 = 0x7f37966874f8
        c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val = {n = 1465401456, s = {s = 0x7f3757584070 "\341\001", len = 10485504}, re = 0x7f3757584070}, pval = {rs = {
                s = 0x7f3757584070 "\341\001", len = 10485504}, ri = 4, flags = 1}}, i2s = "\000\v\274\267\374\177", '\000' <repeats 11 times>, "\313;U7\177"}
        s = {s = 0xa49900 <_pkg_root> "\313\030p", len = 4}
        srevp = {0x7f37964262c8, 0x7f37966874f8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 139876723345328,
              string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s = 0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr = 0x7f37966847b0, select = 0x7f37966847b0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#16 0x00000000005407b5 in run_actions (h=0x1, h at entry=0x7ffcb7bc0dc0, a=0x7f37555a4e10, a at entry=0x7f379641bdc8, msg=0x7f37555a6420, msg at entry=0x7f37966874f8) at action.c:1549
        ret = 1   
        mod = 0x7f37964262c8
        __FUNCTION__ = "run_actions"
#17 0x000000000054d225 in run_top_route (a=0x7f379641bdc8, msg=0x7f37966874f8, c=<optimized out>) at action.c:1635
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140723391040960, 6256744100537323950, 139876720819656, 139876723356920, 0, 0, -6256338930008043090, 6256743653617062318},
              __mask_was_saved = 0, __saved_mask = {__val = {10139797, 646, 139876723356920, 10139738, 10139648, 646, 139876723356920, 10139738, 10139648, 646, 2436122589503271168, 0, 139876723288072,
                  1073741825, 139875626353736, 139876723272936}}}}}
        p = <optimized out>
        ret = <optimized out>
        sfbk = 0  
#18 0x000000000055501e in receive_msg (buf=0x0, len=2523428088, rcv_info=0x7ffcb7bc10a0) at receive.c:240
        msg = 0x7f37966874f8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140723391041328, 6256744100537323950, 139876722383928, 139876723356920, 0, 0, -6256338930008043090, 6256743653617062318},
              __mask_was_saved = 0, __saved_mask = {__val = {10109832, 0, 140723391041718, 6, 1, 139876720639840, 139876745481671, 139874199928837, 0, 7048948, 139876737320808, 139876722179400,
                  140723391041588, 139876747609744, 139876722179400, 12}}}}}
        inb = {   
          s = 0x9ab800 <buf> "BYE sips:xxxxxx601 at 192.168.1.17:15077;alias=62.93.160.62~47967~3;transport=tls SIP/2.0\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;branch=z9hG4bK05a78335\r\nRoute: <sip:XX.XX.XX.51;r2=on;lr;ftag=as485ea82a;d"..., len = 646}
        netinfo = {data = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 2}, dst = 0x7f37973d8768, rcv = 0x7f3797da9000}
        __FUNCTION__ = "receive_msg"
#19 0x0000000000467630 in udp_rcv_loop () at udp_server.c:495
        len = 646 
---Type <return> to continue, or q <return> to quit---
        buf = "BYE sips:xxxxxx601 at 192.168.1.17:15077;alias=62.93.160.62~47967~3;transport=tls SIP/2.0\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;branch=z9hG4bK05a78335\r\nRoute: <sip:XX.XX.XX.51;r2=on;lr;ftag=as485ea82a;d"...
        from = 0x7f3796567d48
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {890187705, 139875631917044}, addr32 = {890187705, 0, 1431988212, 32567}, addr16 = {12217, 13583, 0, 0, 26612, 21850, 32567, 0},
              addr = "\271/\017\065\000\000\000\000\364gZU7\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {856633273, 0}, addr32 = {856633273, 0, 0, 0}, addr16 = {12217, 13071, 0, 0, 0, 0, 0, 0},
              addr = "\271/\017\063", '\000' <repeats 11 times>}}, src_port = 5080, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2,
              sa_data = "\023ع/\017\065\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 890187705}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 890187705, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0,
                    0}}}, sin6_scope_id = 0}}, bind_address = 0x7f37963eff60, proto = 1 '\001'}
        __FUNCTION__ = "udp_rcv_loop"
#20 0x00000000004eec99 in main_loop () at main.c:1614
        si_desc = "udp receiver child=6 sock=XX.XX.XX.51:5060\000\000\000\000\000и^\226\067\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000]o_", '\000' <repeats 14 times>, "\261\245\210\226\330\316!\260\224\031\226\067\177\000\000\000\261\245\210\226\330\316!\b\022\245\000\000\000\000\000\004\000\000\000\000\000\000"
        woneinit = 1
        __FUNCTION__ = "main_loop"
#21 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631
        cfg_stream = 0x0
        r = 26162 
        tmp = 0x7ffcb7bc1ee4 ""
        tmp_len = 0
        port = 0  
        proto = -1747282480
        ret = 0   
        seed = 810405613
        debug_save = 0
        debug_flag = 8
        dont_fork_cnt = 0
        st = {st_dev = 15, st_ino = 10167, st_nlink = 2, st_mode = 16832, st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1492119111,
            tv_nsec = 264028111}, st_mtim = {tv_sec = 1492495469, tv_nsec = 702131134}, st_ctim = {tv_sec = 1492495469, tv_nsec = 702131134}, __glibc_reserved = {0, 0, 0}}
        __FUNCTION__ = "main"
(gdb) info locals 
No locals.
(gdb) list
69      in ../../mem/../atomic/atomic_common.h



-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1069#issuecomment-294722707
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-dev/attachments/20170418/934057b0/attachment-0001.html>


More information about the sr-dev mailing list