[sr-dev] [kamailio/kamailio] Segmentation Fault when sip_trace method is called with less then 2 arguments (#1351)

Muhammad Shahzad Shafi notifications at github.com
Mon Dec 4 03:36:56 CET 2017


<!--
Kamailio Project uses GitHub Issues only for bugs in the code or feature requests.

If you have questions about using Kamailio or related to its configuration file,
ask on sr-users mailing list:

  * http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

If you have questions about developing extensions to Kamailio or its existing
C code, ask on sr-dev mailing list

  * http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev

Please try to fill this template as much as possible for any issue. It helps the
developers to troubleshoot the issue.

If you submit a feature request (or enhancement), you can delete the text of
the template and only add the description of what you would like to be added.

If there is no content to be filled in a section, the entire section can be removed.

You can delete the comments from the template sections when filling.

You can delete next line and everything above before submitting (it is a comment).
-->

### Description

<!--
Explain what you did, what you expected to happen, and what actually happened.
-->
Segmentation fault when sip_trace method is called with less then 2 arguments.

### Troubleshooting
The problem does not happen if either "xheaders_write" module param is set to zero or we provide both arguments to sip_trace method.

#### Reproduction

<!--
If the issue can be reproduced, describe how it can be done.
-->

<pre>
..
# ----- siptrace params -----
modparam("siptrace", "trace_on", 1)
modparam("siptrace", "hep_mode_on", 0)
modparam("siptrace", "xheaders_write", 1)
modparam("siptrace", "trace_to_database", 0)
modparam("siptrace", "trace_flag", FLT_SIP_TRACE)
modparam("siptrace", "traced_user_avp", "$avp(traced_user)")
modparam("siptrace", "duplicate_uri", "WEBRTC_SIP_TRACE_ADDRESS")`
..

request_route {
..
  sip_trace("WEBRTC_SIP_TRACE_ADDRESS");
  setflag(FLT_SIP_TRACE);
..
}
..
</pre>

#### Debugging Data

<!--
If you got a core dump, use gdb to extract troubleshooting data - full backtrace,
local variables and the list of the code at the issue location.

  gdb /path/to/kamailio /path/to/corefile
  bt full
  info locals
  list

If you are familiar with gdb, feel free to attach more of what you consider to
be relevant.
-->

```
#0  0xb766b417 in _IO_vfprintf_internal (s=0xbfedc5e0,
    format=0xb19c7a28 "X-Siptrace-Fromip: %.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n",
    ap=0xbfedc6fc "\025") at vfprintf.c:1629
        len = <optimized out>
        string_malloced = <optimized out>
        step0_jumps = {0, -13653, -13579, -13501, -13418, -13344, -13248, -13024, -12733, -12367, -12140, -11875, -11660, -3450, -3880, -3819, -3480, -3465, -9946,
          -2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, -3593, -11660, -13100}
        space = 0
        is_short = 0
        use_outdigits = 0
        step1_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, -12367, -12140, -11875, -11660, -3450, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058,
          -1997, -3269, -3593, -11660, 0}
        group = 0
        prec = -1
        step2_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -12140, -11875, -11660, -3450, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058,
          -1997, -3269, -3593, -11660, 0}
        string = 0x9 <Address 0x9 out of bounds>
        left = 0
        is_long_double = -1074936024
        width = <optimized out>
        step3a_jumps = {0, 0, 0, 0, 0, 0, 0, 0, 0, 0, -11961, 0, 0, 0, -3880, -3819, -3480, -3465, -9946, 0, 0, 0, 0, -3349, 0, 0, 0, 0, 0, 0}
        alt = 0
        showsign = 0
        is_long = 0
        is_char = 0
        pad = <optimized out>
        step3b_jumps = {0 <repeats 11 times>, -11660, 0, 0, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, 0, 0, 0}
        step4_jumps = {0 <repeats 14 times>, -3880, -3819, -3480, -3465, -9946, -2661, -2926, -11572, -2279, -3349, -2058, -1997, -3269, 0, 0, 0}
        is_negative = -1074936028
        base = 0
        the_arg = {pa_wchar = -1074927268 L'\xbfede95c', pa_int = -1074927268, pa_long_int = -1074927268, pa_long_long_int = -4616814309237986980,
          pa_u_int = 3220040028, pa_u_long_int = 3220040028, pa_u_long_long_int = 13829929764471564636, pa_double = -0.93064534650992981,
          pa_long_double = 3.3942842958442789709117117072106753e-4719, pa_string = 0xbfede95c "s\351\316", <incomplete sequence \370>,
          pa_wstring = 0xbfede95c L"\xf8cee973", pa_pointer = 0xbfede95c, pa_user = 0xbfede95c}
        spec = <optimized out>
        _buffer = {__routine = 0xbfede95c, __arg = 0xbfedc5d8, __canceltype = -1217805458, __prev = 0x0}
        _avail = 0
        thousands_sep = 0x0
        grouping = 0xffffffff <Address 0xffffffff out of bounds>
        f = <optimized out>
        lead_str_end = 0xb19c7a3b "%.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n"
        work_buffer = "_\262f\267 \307\355\277\242u\201\266\000\000\000\000\000\000\000\000h.~\266h.~\266|.~\266\252.~\266h.~\266\252.~\266\000\000\000\000\242u\201\266
", '\000' <repeats 12 times>"\370, \201\202\266\000\000\000\000\304\301\355\277", '\000' <repeats 20 times>"\334, \307\355\277\000\000\000\000\000\000\000\000\004\000\000\000\377\377\377\377\355G\202\266\bp\342\266\304\301\355\277\304i\202\266-i\001\262", '\000' <repeats 20 times>"\340, \326x\267\000\000\000\000\000\000\000\000 \201\202\266\000\000\000\000h\302\355\277\215\034\202\266\002", '\000' <repeats 23 times>, "L\310\355\277\000\000\000\000\000\000\000\000\004\000\000\000\003\000\000\000\020\310\355\277\377\377\377\377\377\377\377\377\034'4\267c\302\355\277\000<g\267h.~\266C\000\000\000̥z\266\\\302\355\277h\023~\266\030\303\355\277`\306\355\277\250\242z\266\241u\201\266\000\000\000\000D\335f\267\000\000\000\000\232u\201\266\000\000\000\000H\310\355\277\016\000\000\000\232u\201\266\063\204i\267\261Q'\b,\\;\b\004\000\000\000\000*\000\000\001\000\000\000$\311\355\277\001\000\000\000\364"...
        workstart = 0x0
        workend = 0xbfedc520 "\250\205 \267\260\205 \267"
        ap_save = 0xbfedc6fc "\025"
        nspecs_done = 5
        save_errno = 0
        readonly_format = 0
        args_malloced = 0x0
        specs = <optimized out>
        specs_malloced = false
        jump_table = "\001\000\000\004\000\016\000\006\000\000\a\002\000\003\t\000\005\b\b\b\b\b\b\b\b\b\000\000\000\000\000\000\000\032\000\031\000\023\023\023\000\035\000\000\f\000\000\000\000\000\000\025\000\000\000\000\022\000\r\000\000\000\000\000\000\032\000\024\017\023\023\023\n\017\034\000\v\030\027\021\026\f\000\025\033\020\000\000\022\000\r"
        __PRETTY_FUNCTION__ = "_IO_vfprintf_internal"
#1  0xb768ede0 in _IO_vsnprintf (
    string=0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", maxlen=512,
    format=0xb19c7a28 "X-Siptrace-Fromip: %.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n",
    args=0xbfedc6fc "\025") at vsnprintf.c:120
        sf = {f = {_sbf = {_f = {_flags = -72515583,
                _IO_read_ptr = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ",
                _IO_read_end = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ",
                _IO_read_base = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ",
                _IO_write_base = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", _IO_write_ptr = 0xb716a82a "", _IO_write_end = 0xb716a986 "",
                _IO_buf_base = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", _IO_buf_end = 0xb716a986 "", _IO_save_base = 0x0, _IO_backup_base = 0x0, _IO_save_end = 0x0, _markers = 0x0,
                _chain = 0x0, _fileno = -1074936088, _flags2 = 0, _old_offset = 5, _cur_column = 0, _vtable_offset = 0 '\000', _shortbuf = "", _lock = 0x0,
                _offset = 593186573409608927, _codecvt = 0x23e, _wide_data = 0xb19c47b0, _freeres_list = 0x0, _freeres_buf = 0x5, _freeres_size = 0, _mode = -1,
                _unused2 = "`b<\b\vl;\b?\000\000\000ha<\b\224\066*\267\\\344\355\277\364\066*\267H\320\355\277\375x\234\261\204\065*\267"}, vtable = 0xb778d6e0},
            _s = {_allocate_buffer = 0, _free_buffer = 0xffffffff}},
          overflow_buf = "\000\000\000\000\004\000\000\000\375x\234\261a\245\026\267)\002\000\000<\270j\267\210\247\026\267\000\000\000\000\001\000\000\000\000y\234\261\004\000\000\000\000\000\000\000`\245\026\267\000\000\000\000\002\000\000\000\375x\234\261"}
        ret = 0
#2  0xb7673cf2 in __snprintf (
    s=0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: ", maxlen=512,
    format=0xb19c7a28 "X-Siptrace-Fromip: %.*s\r\nX-Siptrace-Toip: %.*s\r\nX-Siptrace-Time: %llu %llu\r\nX-Siptrace-Method: %.*s\r\nX-Siptrace-Dir: %s\r\n")
    at snprintf.c:35
        done = 0
#3  0xb19ae7c3 in sip_trace_xheaders_write (sto=0xbfedc924) at siptrace.c:594
        buf = 0xb716a548 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"...
        bytes_written = 0
        eoh = 0xb716a787 "X-Siptrace-Fromip: udp:185.18.45.53:5060\r\nX-Siptrace-Toip: udp:185.18.45.115:5060\r\nX-Siptrace-Time: 1512352655 48676\r\nX-Siptrace-Method: REGISTER\r\nX-Siptrace-Dir: "
        eoh_offset = 0
        new_eoh = 0x0
        __FUNCTION__ = "sip_trace_xheaders_write"
#4  0xb19b01fe in sip_trace_store (sto=0xbfedc924, dst=0x0, correlation_id_str=0x0) at siptrace.c:750
        __FUNCTION__ = "sip_trace_store"
        ret = -1
#5  0xb19b64bd in sip_trace (msg=0xb72a3584, dst=0x0, correlation_id_str=0x0, dir=0x9 <Address 0x9 out of bounds>) at siptrace.c:1151
        sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state = {flags = 257, id = 75, name = {n = -1226220299, s = {
                s = 0xb6e95cf5 "traced_user)", len = 11}, re = 0xb6e95cf5}, avp = 0x0}, body = {
            s = 0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len = 577}, callid = {
            s = 0x848866f "0b5l88q765nk5ahdvqqd1a\r\nCSeq: 202 REGISTER\r\nWWW-Authenticate: Digest realm=\"acs.dummy.com\", nonce=\"5a24acbba41b8f45ded1be19fc13951d5438c8e0\"\r\nServer: OpenSER (1.3.4-notls (i386/linux))\r\nContent-Len"..., len = 22}, method = {
            s = 0x8488691 "REGISTER\r\nWWW-Authenticate: Digest realm=\"acs.dummy.com\", nonce=\"5a24acbba41b8f45ded1be19fc13951d5438c8e0\"\r\nServer: OpenSER (1.3.4-notls (i386/linux))\r\nContent-Length: 0\r\n\r\n", len = 8}, status = {
            s = 0x8488508 "401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK3573981\r\nT"..., len = 3}, dir = 0x9 <Address 0x9 out of bounds>, fromtag = {
            s = 0x848865a "coqoo7bgrr\r\nCall-ID: 0b5l88q765nk5ahdvqqd1a\r\nCSeq: 202 REGISTER\r\nWWW-Authenticate: Digest realm=\"acs.dummy.com\", nonce=\"5a24acbba41b8f45ded1be19fc13951d5438c8e0\"\r\nServer: OpenSER (1.3.4-notls (i386"..., len = 10}, fromip = {s = 0xbfedc9bc "udp:185.18.45.53:5060", len = 21}, totag = {
            s = 0x84885f8 "f585cd8bc1f6d3796bfeb421b703352f.8488\r\nFrom: \"James Howlett\" <sip:998100601189 at 172.16.171.60>;tag=coqoo7bgrr\r\nCall-ID: 0b5l88q765nk5ahdvqqd1a\r\nCSeq: 202 REGISTER\r\nWWW-Authenticate: Digest realm=\"acs.a"..., len = 37}, toip = {s = 0xbfedc988 "udp:185.18.45.115:5060", len = 22},
          toip_buff = "udp:185.18.45.115:5060", '\000' <repeats 29 times>, fromip_buff = "udp:185.18.45.53:5060", '\000' <repeats 30 times>, tv = {
            tv_sec = 1512352655, tv_usec = 48676}, stat = 0x70}
        snd_inf = 0x0
        __FUNCTION__ = "sip_trace"
#6  0x08078b06 in do_action (h=0xbfede244, a=0xb712fe5c, msg=0xb72a3584) at core/action.c:1054
        ret = -5
        v = 2
        dst = {send_sock = 0x9cf, to = {s = {sa_family = 65456, sa_data = "<\b\372\317'\b\304\322\355\277\000\000\000"}, sin = {sin_family = 65456, sin_port = 2108,
              sin_addr = {s_addr = 136826874}, sin_zero = "\304\322\355\277\000\000\000"}, sin6 = {sin6_family = 65456, sin6_port = 2108, sin6_flowinfo = 136826874,
              sin6_addr = {__in6_u = {__u6_addr8 = "\304\322\355\277\000\000\000\000\034\000\000\000\\U\002\266", __u6_addr16 = {53956, 49133, 0, 0, 28, 0, 21852,
                    46594}, __u6_addr32 = {3220034244, 0, 28, 3053606236}}}, sin6_scope_id = 0}}, id = -1074927268, proto = -88 '\250', send_flags = {f = 49133,
            blst_imask = 28680}}
        tmp = 0x8274cdd "\270"
        new_uri = 0xb72a3a18 "\200"
        end = 0x8274cdd "\270"
        crt = 0xbfedd408 "\b\325\355\277\371C\b\bD\342\355\277\\\376\022\267\204\065*\267\220\032=\b\vl;\b\317\t"
        cmd = 0xb6e8ab64
        len = 0
        user = 0
        uri = {user = {s = 0xb23c3d00 "", len = 8388608}, passwd = {s = 0x285e8c <Address 0x285e8c out of bounds>, len = 4531876}, host = {
            s = 0x57a174 <Address 0x57a174 out of bounds>, len = 5755668}, port = {s = 0x4 <Address 0x4 out of bounds>, len = 8}, params = {s = 0x0,
            len = -1226674168}, sip_params = {s = 0xbfedd208 "\001", len = 135116871}, headers = {s = 0x0, len = 0}, port_no = 53768, proto = 49133, type = 136793309,
          flags = 3068293128, transport = {s = 0xb71997d4 " ", len = -1217821645}, ttl = {s = 0x0, len = -1223059524}, user_param = {
            s = 0x3c0 <Address 0x3c0 out of bounds>, len = 1}, maddr = {s = 0x0, len = 5}, method = {s = 0x0, len = -1074932984}, lr = {
            s = 0x8197d1c "\205\300\017\237\300\017\266ЋE\020\211\020\213E\b\213@\004\211\302\203\342\371\213E\b\211P\004\351\341\004", len = -1074929084}, r2 = {
            s = 0xb712f764 "\255\r", len = -1221970556}, gr = {s = 0x80db847 "\211E\364\213E\364\351\373\001", len = 0}, transport_val = {s = 0x0, len = -1074933160},
          ttl_val = {s = 0x8274cdd "\270", len = -1226674168}, user_param_val = {s = 0xb71caee4 "l", len = -1245326265}, maddr_val = {s = 0x0, len = -1222857012},
          method_val = {s = 0xa0 <Address 0xa0 out of bounds>, len = -1074932952}, lr_val = {s = 0x8275535 "\213E܃\300\034\351\a\003", len = 5}, r2_val = {s = 0x0,
            len = 32}, gr_val = {s = 0x83d1a90 "core: core/parser/parse_via.c", len = 138112011}}
        next_hop = {user = {s = 0xb6dfb1d5 "U\211\345S\203\354\024\350\372\343\377\377\201ÿ\263\002", len = -1226848018}, passwd = {s = 0x0, len = -1074932385},
          host = {s = 0xa <Address 0xa out of bounds>, len = 0}, port = {s = 0x0, len = -1074931896}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 2},
          headers = {s = 0xb73a2138 "h\037:\267\006", len = 0}, port_no = 65535, proto = 65535, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = -1074927268},
          ttl = {s = 0xbfedd158 "\204\065*\267\240\070*\267", len = -1221970284}, user_param = {s = 0xbfede45c "\020", len = -1221970188}, maddr = {
            s = 0xbfedd218 "\b\323\355\277\034}\031\bD\342\355\277d\367\022\267\204\065*\267G\270\r\b", len = 134761067}, method = {s = 0xbfedd160 "",
            len = -1223493788}, lr = {s = 0xb72a3584 "\001", len = -1221969760}, r2 = {s = 0x0, len = 0}, gr = {s = 0x1 <Address 0x1 out of bounds>,
            len = -1221970284}, transport_val = {s = 0xbfede45c "\020", len = -1221970188}, ttl_val = {
            s = 0xbfedd148 "\030\322\355\277kJ\b\b`\321\355\277d\367\022\267\204\065*\267\240\070*\267", len = -1281299135}, user_param_val = {
            s = 0x7881ec2e <Address 0x7881ec2e out of bounds>, len = 0}, maddr_val = {s = 0xb72a377c "", len = -1226674168}, method_val = {s = 0xbfedd3c0 "\260\237W",
            len = -1226183112}, lr_val = {s = 0xbfedd1d8 "\b\322\355\277G\270\r\b", len = -1232975437}, r2_val = {s = 0xb6e27008 "\001", len = -1074933324}, gr_val = {
            s = 0xbfedd278 "\260\377<\b\372\317'\b\304\322", <incomplete sequence \355\277>, len = -1313472512}}
        u = 0x80db847
        port = 49133
        dst_host = 0xfa20d
        i = -1226674168
        flags = 0
        avp = 0x0
        st = {flags = 3220033768, id = 0, name = {n = 0, s = {s = 0x0, len = -1226821088}, re = 0x0}, avp = 0xb6dfb190}
        sct = 0xb72a3694
        sjt = 0xb774731f
        rve = 0x4
        mct = 0xbfede45c
        rv = 0x0
        rv1 = 0x8
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = 3078153004, c = {avp_val = {n = -1074933548, s = {s = 0xbfedd0d4 "\350\320", <incomplete sequence \355\277>,
                len = -1218077169}, re = 0xbfedd0d4}, pval = {rs = {s = 0xbfedd0d4 "\350\320", <incomplete sequence \355\277>, len = -1218077169}, ri = -1216814292,
              flags = -1074933564}}, i2s = ",\343x\267D\340x\267\304\320\355\277\377\377\377\377\000\000\000\000\000"}
        s = {s = 0xb778e0bc "\303~6\033\b", len = -1216815116}
        srevp = {0xb7659c74, 0xb778e0c0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#7  0x080843f9 in run_actions (h=0xbfede244, a=0xb712fe5c, msg=0xb72a3584) at core/action.c:1552
        t = 0xb712fe5c
        ret = -1
        mod = 0x4
        ms = 0
        __FUNCTION__ = "run_actions"
#8  0x08078a8a in do_action (h=0xbfede244, a=0xb712ff08, msg=0xb72a3584) at core/action.c:1045
        ret = 1
        v = 1
        dst = {send_sock = 0xbfedddd4, to = {s = {sa_family = 13301, sa_data = "|\267\000\000\000\000\270\230\031\267\304\002\000"}, sin = {sin_family = 13301,
              sin_port = 46972, sin_addr = {s_addr = 0}, sin_zero = "\270\230\031\267\304\002\000"}, sin6 = {sin6_family = 13301, sin6_port = 46972,
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\270\230\031\267\304\002\000\000\070\336\355\277\065U'\b", __u6_addr16 = {39096, 46873, 708, 0,
                    56888, 49133, 21813, 2087}, __u6_addr32 = {3071908024, 708, 3220037176, 136795445}}}, sin6_scope_id = 5}}, id = 0, proto = 4 '\004', send_flags = {
            f = 46946, blst_imask = 11736}}
        tmp = 0xb72a36f4 ""
        new_uri = 0xb77d7908 ""
        end = 0xbfedde84 "\377\377\377\377\364o}\267<Y\005\b\005"
        crt = 0xbfede45c "\020"
        cmd = 0xbfede45c
        len = -1221970284
        user = -1218240796
        uri = {user = {s = 0x83bd30c "core", len = 4}, passwd = {s = 0xb71cadb0 "\001", len = 138149819}, host = {s = 0x2000007e <Address 0x2000007e out of bounds>,
            len = 4096}, port = {s = 0x0, len = -1222857296}, params = {s = 0xb71caf00 "\001", len = -1221969600}, sip_params = {s = 0xb72a3728 "",
            len = -1221969516}, headers = {s = 0xb72a38ec "", len = -1217109483}, port_no = 33272, proto = 46722, type = 136826874, flags = 3220036884, transport = {
            s = 0x0, len = 28}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0xb6e27008 "\001", len = 0}, method = {s = 0x0,
            len = -1074930376}, lr = {s = 0xb68249b3 "\213\223\324\a", len = -1226674168}, r2 = {
            s = 0xbfeddd14 "\344\036c\267\020ii\rT\335\355\277v-|\267\060\312c\267\262\300\005\b", len = 0}, gr = {s = 0x0, len = 0}, transport_val = {
            s = 0xb7631ee4 "\032L", len = 225011984}, ttl_val = {s = 0xbfeddd54 "\324\335\355\277\365\063|\267", len = -1216598666}, user_param_val = {
            s = 0xb763ca30 "GLIBC_2.0", len = 134594738}, maddr_val = {s = 0x1000 <Address 0x1000 out of bounds>, len = 134567646}, method_val = {
            s = 0xb7629020 "\262\300\005\b\020ii\r", len = -1074987006}, lr_val = {s = 0xb77c8ab0 "\205\300u\344\203\304\b\270\001", len = 134567646}, r2_val = {
            s = 0xb77b7c30 "libresolv.so.2", len = -1216516108}, gr_val = {
            s = 0xb762c9a8 "\227\201B\250|`\234|\374Qcq\\zy\360\003\346`\033|\231/\310Km\301\243\353\372\266=/\222\210\353", <incomplete sequence \352>, len = 3}}
        next_hop = {user = {s = 0xffffffff <Address 0xffffffff out of bounds>, len = 138138380}, passwd = {s = 0x4 <Address 0x4 out of bounds>, len = -1223059220},
          host = {s = 0x83bffc9 "get_hdr_field", len = 135}, port = {s = 0x83bd30c "core", len = -1074930680}, params = {s = 0x8274cdd "\270", len = -1226674168},
          sip_params = {s = 0xb71cab74 "\b", len = 35}, headers = {s = 0x0, len = -1222857892}, port_no = 1040, proto = 0, type = 3220036824, flags = 136795445,
          transport = {s = 0x5 <Address 0x5 out of bounds>, len = 1}, ttl = {s = 0xb8 <Address 0xb8 out of bounds>, len = -1230656743}, user_param = {
            s = 0x83b6c0b "fragm. from qm_malloc", len = -1222857616}, maddr = {s = 0xc9 <Address 0xc9 out of bounds>, len = -1226674168}, method = {
            s = 0xb73a2298 "", len = -1222857684}, lr = {s = 0xb68281f8  <incomplete sequence \320>, len = -1230628236}, r2 = {s = 0xb6a5ab19 "core: db_id.c",
            len = -1217105105}, gr = {s = 0xb6a61a74 "@\331\002", len = -1230774707}, transport_val = {
            s = 0x848856c ".0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK3573981\r\nTo: <sip:998100601189 at 172.16.171.60>;tag=f585cd8bc1f6d3796bfeb421b703352f.8488\r\nFrom: \"James Howlett\""..., len = 1}, ttl_val = {s = 0x6f <Address 0x6f out of bounds>, len = -1222857212},
          user_param_val = {s = 0x0, len = -1222857324}, maddr_val = {s = 0x0, len = 138970480}, method_val = {s = 0x10002 <Address 0x10002 out of bounds>, len = 26},
          lr_val = {
            s = 0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len = 0}, r2_val = {s = 0xbfede45c "\020", len = -1221970188}, gr_val = {
            s = 0xbfeddf18 "h\340\355\277P\230\031\267\204\065*\267\002", len = 136893382}}
        u = 0x0
        port = 2114
        dst_host = 0x5
        i = 134567476
        flags = -1
        avp = 0x5
        st = {flags = 138970945, id = 38528, name = {n = -1221970284, s = {s = 0xb72a3694 "\002", len = -1074928548}, re = 0xb72a3694}, avp = 0xb72a36f4}
        sct = 0x805593c
        sjt = 0xb77b7c98
        rve = 0xb712faa0
        mct = 0xb7629020
        rv = 0x84885d3
        rv1 = 0x0
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = 3072997108, c = {avp_val = {n = -1074930152, s = {s = 0xbfedde18 "\210\337\355\277PY<\266", len = 136889644},
              re = 0xbfedde18}, pval = {rs = {s = 0xbfedde18 "\210\337\355\277PY<\266", len = 136889644}, ri = -1226674168, flags = -1223058892}},
          i2s = "`\327;\b\273\377;\bO\001\000\000\f\323;\b\221\206H\b\231\206"}
        s = {s = 0x4 <Address 0x4 out of bounds>, len = 126}
        srevp = {0x579ca4, 0x57d314}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#9  0x080843f9 in run_actions (h=0xbfede244, a=0xb712ff08, msg=0xb72a3584) at core/action.c:1552
        t = 0xb712ff08
        ret = -1
        mod = 0x0
        ms = 0
        __FUNCTION__ = "run_actions"
#10 0x08084b03 in run_top_route (a=0xb712ff08, msg=0xb72a3584, c=0xbfede244) at core/action.c:1641
        ctx = {rec_lev = 0, run_flags = 126, last_retcode = 0, jmp_env = {{__jmpbuf = {14, 0, 0, 0, 94, 0}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 0,
                  0, 0, 0, 0, 0, 3061963914, 3062006264, 3220038748, 3220037764, 3061964261, 35, 1, 4, 3072110084, 3220038180, 2310458, 3220037784, 3061965435, 35, 1,
                  4, 3220037832, 136011880, 3072996740, 1073741828, 0, 135068986, 3072996740}}}}}
        p = 0xbfede244
        ret = -1222607340
        sfbk = 0
#11 0x0815f9ce in receive_msg (
    buf=0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len=577, rcv_info=0xbfede3fc) at core/receive.c:327
        msg = 0xb72a3584
        ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {-1221970284, -1074928548, -1221970188, -1074929688, -1279414975, 2021780526},
              __mask_was_saved = 0, __saved_mask = {__val = {3078323352, 3078453512, 4294967295, 3078451188, 134568902, 5, 3220038336, 3078388710, 3078453952,
                  3076689952, 1, 5, 0, 5, 134567476, 138561348, 0, 3076746516, 1546143882, 0, 3220040028, 3220038488, 3078412688, 3220038664, 3077676560, 50195,
                  3078453512, 1104, 136655121, 0, 1546143882, 3220038424}}}}}
        bctx = 0x80559e6
        ret = 1
        stats_on = 0
        tvb = {tv_sec = -1074928848, tv_usec = -1216513344}
        tve = {tv_sec = 134568902, tv_usec = -1216516108}
        tz = {tz_minuteswest = -1218219948, tz_dsttime = 134538164}
        diff = 0
        inb = {
          s = 0x8488500 "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"..., len = 577}
        netinfo = {data = {s = 0xbfede2b0 "\024mc\267\212H(\\", len = -1074929048}, dst = 0xbfede274, rcv = 0xb7629020}
        keng = 0x0
        __FUNCTION__ = "receive_msg"
#12 0x0825a456 in udp_rcv_loop () at core/udp_server.c:515
        len = 577
        buf = "SIP/2.0 401 Unauthorized\r\nVia: SIP/2.0/UDP 185.18.45.115;branch=z9hG4bK8c01.866bb318e1643e5b7f0134b81ff246af.0\r\nVia: SIP/2.0/WSS 6qb17qtojlum.invalid;rport=4076;received=185.9.249.194;branch=z9hG4bK35"...
        tmp = 0x834e413 "counters_prefork_init"
        from = 0xb71cad60
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {892171861, 4, 1546143882, 1}, addr32 = {892171861, 4, 1546143882, 1}, addr16 = {30293, 13613, 4, 0, 18570,
                23592, 1, 0}, addr = "Uv-5\004\000\000\000\212H(\\\001\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {1932359253, 0, 0, 0}, addr32 = {
                1932359253, 0, 0, 0}, addr16 = {30293, 29485, 0, 0, 0, 0, 0, 0}, addr = "Uv-s", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060,
          proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304Uv-5\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
              sin_port = 50195, sin_addr = {s_addr = 892171861}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195,
              sin6_flowinfo = 892171861, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0,
                    0, 0}}}, sin6_scope_id = 0}}, bind_address = 0xb6e7896c, proto = 1 '\001'}
        __FUNCTION__ = "udp_rcv_loop"
#13 0x080693c6 in main_loop () at main.c:1623
        i = 1
        pid = 0
        si = 0xb6e7896c
        si_desc = "udp receiver child=1 sock=185.18.45.115:5060\000\000\000\000\004\000\000\000\b\347\355\277\212H(\\\001\000\000\000\212H(\\\210\346\355\277L\343'\bd\204\271\261\004\000\000\000\031\251\066\b\350\272\066\bq\000\000\000\264\247\066\b\b\020\000\000y\221f\266\070\200 \267\277\064\300\265\230\061\301\265\f\200\001\262\f\034\300\265"
        nrprocs = 4
        woneinit = 1
        __FUNCTION__ = "main_loop"
#14 0x080708ac in main (argc=13, argv=0xbfedead4) at main.c:2643
        cfg_stream = 0x8e7a008
        c = -1
        r = 0
        tmp = 0xbfee090d ""
        tmp_len = 1
        port = 0
        proto = 0
        options = 0x83422fc ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 4174309747
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0xbfedea00
        p = 0x805d5ec "[\201\303$o<"
        st = {st_dev = 14, __pad1 = 0, st_ino = 6140, st_mode = 16832, st_nlink = 2, st_uid = 0, st_gid = 0, st_rdev = 0, __pad2 = 0, st_size = 60, st_blksize = 4096,
          st_blocks = 0, st_atim = {tv_sec = 1510541218, tv_nsec = 950311164}, st_mtim = {tv_sec = 1512352641, tv_nsec = 828578904}, st_ctim = {tv_sec = 1512352652,
            tv_nsec = 920812953}, __unused4 = 0, __unused5 = 0}
        __FUNCTION__ = "main"
```

#### Log Messages

<!--
Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->

```
Dec  4 02:57:35 webrtc-as-rct kernel: [1811495.918954] kamailio[15829] segfault at 9 ip b766b417 sp bfedbffc error 4 in libc-2.13.so[b762a000+161000]
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15901]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 24
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15826]: ALERT: <core> [main.c:743]: handle_sigs(): child process 15829 exited by a signal 11
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15826]: ALERT: <core> [main.c:746]: handle_sigs(): core was generated
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15826]: INFO: <core> [main.c:768]: handle_sigs(): terminating due to SIGCHLD
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15899]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15897]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15895]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15893]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15891]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15888]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15887]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15885]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15865]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15861]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15871]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15867]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15873]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15875]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15881]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15877]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15879]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15883]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15901]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15846]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15849]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15840]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15844]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15848]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15842]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15856]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15860]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15854]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15858]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15852]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15834]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15835]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15830]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15836]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15828]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15831]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15837]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15832]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15833]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15869]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Dec  4 02:57:35 webrtc-as-rct adx-webrtc[15826]: INFO: <core> [core/sctp_core.c:53]: sctp_core_destroy(): SCTP API not initialized
```

#### SIP Traffic

<!--
If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->

```
N/A
```

### Possible Solutions

<!--
If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix.
-->

### Additional Information

  * **Kamailio Version** - output of `kamailio -v`

```
version: kamailio 5.0.4 (i386/linux)
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, select.
id: unknown
compiled on 11:05:34 Dec  1 2017 with gcc 4.7.2
```

* **Operating System**:

<!--
Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...;
Kernel details (output of `uname -a`)
-->

```
Linux webrtc-as-rct 3.10-0.bpo.2-686-pae #1 SMP Debian 3.10.5-1~bpo70+1 (2013-08-11) i686 GNU/Linux
```


-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1351
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-dev/attachments/20171204/8ec54158/attachment-0001.html>


More information about the sr-dev mailing list