[sr-dev] [kamailio/kamailio] Kamailio crashes on ws connection when both http_reply_parse and track_cseq_updates are enabled (#1277)

Muhammad Shahzad Shafi notifications at github.com
Sat Oct 21 17:57:55 CEST 2017


<!--
Kamailio Project uses GitHub Issues only for bugs in the code or feature requests.

If you have questions about using Kamailio or related to its configuration file,
ask on sr-users mailing list:

  * http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

If you have questions about developing extensions to Kamailio or its existing
C code, ask on sr-dev mailing list

  * http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev

Please try to fill this template as much as possible for any issue. It helps the
developers to troubleshoot the issue.

If you submit a feature request (or enhancement), you can delete the text of
the template and only add the description of what you would like to be added.

If there is no content to be filled in a section, the entire section can be removed.

You can delete the comments from the template sections when filling.

You can delete next line and everything above before submitting (it is a comment).
-->

### Description
<!--
Explain what you did, what you expected to happen, and what actually happened.
-->
Kamailio gives segfault due to SIGCHLD when a websocket client tries to connect to it.

The problem seems to happen due to following global parameter,

>http_reply_parse=yes

Along with following dialog module parameter,

>modparam("dialog", "track_cseq_updates", 1)

### Troubleshooting

Disabling dialog parameter track_cseq_updates fixes the problem but in my setup i need this to be set since i use uac_auth() method in failure routes.

>modparam("dialog", "track_cseq_updates", 0)

#### Reproduction
<!--
If the issue can be reproduced, describe how it can be done.
-->

The issue is reproducible by setting following in kamailio.cfg

>http_reply_parse=yes
>modparam("dialog", "track_cseq_updates", 1)

#### Debugging Data
<!--
If you got a core dump, use gdb to extract troubleshooting data - full backtrace,
local variables and the list of the code at the issue location.

  gdb /path/to/kamailio /path/to/corefile
  bt full
  info locals
  list

If you are familiar with gdb, feel free to attach more of what you consider to
be relevant.
-->

```
webrtc-as:/tmp# gdb /usr/local/adx-webrtc/sbin/kamailio core.kamailio.14045.webrtc-as.1508598510
...
Reading symbols from /usr/local/adx-webrtc/sbin/kamailio...done.
[New LWP 14045]

warning: Can't read pathname for load map: Input/output error.
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/i386-linux-gnu/i686/cmov/libthread_db.so.1".
Core was generated by `/usr/local/adx-webrtc/sbin/kamailio -f /usr/local/adx-webrtc/etc/kamailio/kamai'.
Program terminated with signal 11, Segmentation fault.
#0  0xb58a41a6 in dlg_cseq_prepare_msg (msg=0xbfab2cc4) at dlg_cseq.c:81
81				if(get_cseq(msg)->method_id != METHOD_CANCEL) {


(gdb) bt full
#0  0xb58a41a6 in dlg_cseq_prepare_msg (msg=0xbfab2cc4) at dlg_cseq.c:81
        __FUNCTION__ = "dlg_cseq_prepare_msg"
#1  0xb58a53a0 in dlg_cseq_prepare_new_msg (msg=0xbfab2cc4) at dlg_cseq.c:116
        __FUNCTION__ = "dlg_cseq_prepare_new_msg"
#2  0xb58a99b6 in dlg_cseq_msg_sent (data=0xbfab333c) at dlg_cseq.c:369
        msg = {id = 0, pid = 0, tval = {tv_sec = 0, tv_usec = 0}, fwd_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, rpl_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, first_line = {type = 2, 
            flags = 2, len = 34, u = {request = {method = {
                  s = 0xb6959fe8 "HTTP/1.1 101 Switching Protocols\r\nSia: SIP/2.0/TLS x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin: https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade: websocket\r\nConne"..., len = 8}, uri = {
                  s = 0xb6959ff1 "101 Switching Protocols\r\nSia: SIP/2.0/TLS x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin: https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade: websocket\r\nConnection: up"..., len = 3}, version = {
                  s = 0xb6959ff5 "Switching Protocols\r\nSia: SIP/2.0/TLS x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin: https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade: websocket\r\nConnection: upgrad"..., len = 19}, method_value = 101}, reply = {version = {
                  s = 0xb6959fe8 "HTTP/1.1 101 Switching Protocols\r\nSia: SIP/2.0/TLS x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin: https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade: websocket\r\nConne"..., len = 8}, status = {
                  s = 0xb6959ff1 "101 Switching Protocols\r\nSia: SIP/2.0/TLS x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin: https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade: websocket\r\nConnection: up"..., len = 3}, reason = {
                  s = 0xb6959ff5 "Switching Protocols\r\nSia: SIP/2.0/TLS x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin: https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade: websocket\r\nConnection: upgrad"..., len = 19}, statuscode = 101}}}, via1 = 0x0, via2 = 0x0, headers = 0xb695c554, last_header = 0xb695a1a0, parsed_flag = 18446744073709551615, h_via1 = 0x0, h_via2 = 0x0, 
          callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0xb695a1a0, authorization = 0x0, expires = 0x0, 
          proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, 
          subject = 0x0, user_agent = 0x0, server = 0xb695a15c, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, 
          subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, body = 0x0, eoh = 0xb695a135 "\r\n", unparsed = 0xb695a135 "\r\n", rcv = {
            src_ip = {af = 0, len = 0, u = {addrl = {0, 0, 0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0, 0, 
                  0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {
                sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, 
                sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, 
            bind_address = 0x0, proto = 0 '\000'}, 
          buf = 0xb6959fe8 "HTTP/1.1 101 Switching Protocols\r\nSia: SIP/2.0/TLS x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin: https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade: websocket\r\nConne"..., len = 335, new_uri = {s = 0x0, len = 0}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, 
              len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, 
            transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, 
            gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, 
            lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
              s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, 
            transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, 
            gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, 
            lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = '\000' <repeats 57 times>, 
          add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 0, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, path_vec = {s = 0x0, len = 0}, 
          instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0, 0, 0}, 
                    addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0, 0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 
                      0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, 
                    sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, 
                    sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, 
                bind_address = 0x0, proto = 0 '\000'}}}}
        obuf = 0xbfab333c
        direction = 0
        dlg = 0x0
        nval = {s = 0x0, len = 0}
        tbuf = '\000' <repeats 19103 times>, "\027\003\003\002\070\000\000\000\000\000\000\000\001\213I\377\277\315\036\037\313\216\060OW\016\373\034\366\226\332\322\212}5\244a\311\277s\\\340\212B^\022\372\v\372\342L0d\257e6\341\236\343d\000\220\v\354\364\205\023G\245\333dN1\336\261r3\346\203\312,x\226>\310\263h\241\257\264\203<\301\244 at R\326\370\063[^J \357\232\203\177\\\376\273\001{\311\004 \261\306G\371\bUe\027\065)\001\221)\364\316\037\r\326N\213\266d\252\214d\032\265\273\303\344\325\203\363\300\362\365\351_\221\273:r\223\251\277+\v\212~\234\301\345&\a\300F\207\236\274\035\366\f\001\217\033k\375%1b\237\001.\030\221\211X\244a<\252\276\223}\202\000\033\237\177\v\276>K5;\036\370&\330@\031\355\240-\376\026<s\211\246\235k\001\260`\211\333\270:mg\311\341`\037\065\313\244\"s\233\365?\233\331\035\242\262\217\061\240\004\370\001u\215\003\306\331>\255\025\324V\f\236\240\256\251o\343j\262\217\263qJ\367\333\314\004\263\023B\311W\240\034U|I\v\366\060\211\244$\277\177 \213\377\376\064#z\222y'5\236\365\355}\273\005\336/\254m\022\034\312\272\025\035\307d\223\361\214\004l\tq\f4\313\346\302:I\210\351\300W\024#\033}\022\343\322\362\214\226\n1\254\321\362\210Z%\352"...
        tbuf_len = 0
        via = 0xa50c6b8c
        hfk = 0x0
        cenv = 0x8430bc4
        __FUNCTION__ = "dlg_cseq_msg_sent"
#3  0x080c5ca9 in sr_event_exec (type=2, data=0xbfab333c) at events.c:231
        ret = 0
        i = 2
#4  0xb5e520cc in msg_send_buffer (dst=0xbfab3964, 
    buf=0xb6959fe8 "HTTP/1.1 101 Switching Protocols\r\nSia: SIP/2.0/TLS x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin: https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade: websocket\r\nConne"..., len=335, flags=0) at ../../forward.h:138
        new_dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\f\000\000\000\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, 
              sin_zero = "\f\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\f\000\000\000\000\000\000\000\210\063\253\277K]\f\b", 
                  __u6_addr16 = {12, 0, 0, 0, 13192, 49067, 23883, 2060}, __u6_addr32 = {12, 0, 3215668104, 135028043}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', 
            blst_imask = 0 '\000'}}
        outb = {
          s = 0xb6959fe8 "HTTP/1.1 101 Switching Protocols\r\nSia: SIP/2.0/TLS x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin: https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade: websocket\r\nConne"..., len = 335}
        netinfo = {data = {s = 0xb5e58f55 "\213E\344\213@\f\211E\344\203}\344", len = -1079299188}, dst = 0x2, rcv = 0xb5e5f19c}
        port = -1079297644
        ip = {af = 168079844, len = 3215668056, u = {addrl = {3051745692, 2769070720, 2769054604, 3215668168}, addr32 = {3051745692, 2769070720, 2769054604, 3215668168}, addr16 = {61852, 46565, 43648, 42252, 
              27532, 42252, 13256, 49067}, addr = "\234\361\345\265\200\252\f\245\214k\f\245\310\063\253\277"}}
        from = 0x0
        local_addr = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
            sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 12 times>, "xq\253\277", __u6_addr16 = {0, 0, 0, 0, 0, 0, 29048, 49067}, __u6_addr32 = {0, 0, 
                  0, 3215683960}}}, sin6_scope_id = 3078193140}}
        con = 0x0
        wsev = {type = 0, buf = 0x0, len = 0, id = 0}
        ret = 0
        __FUNCTION__ = "msg_send_buffer"
#5  0xb5e55fb7 in sl_reply_helper (msg=0xbfab7178, code=101, reason=0xb695c598 "Switching Protocols", tag=0x0) at sl_funcs.c:202
        buf = {
          s = 0xb6959fe8 "HTTP/1.1 101 Switching Protocols\r\nSia: SIP/2.0/TLS x.x.x.x:31366;rport=31366\r\nAccess-Control-Allow-Origin: https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade: websocket\r\nConne"..., len = 335}
        dset = {s = 0x0, len = 0}
        dst = {send_sock = 0xb6653088, to = {s = {sa_family = 2, sa_data = "z\206\262\313\353\225\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 34426, sin_addr = {s_addr = 2515258290}, 
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 34426, sin6_flowinfo = 2515258290, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {
                    0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 1, proto = 3 '\003', send_flags = {f = 1 '\001', blst_imask = 0 '\000'}}
        dummy_bm = {to_tag_val = {s = 0x82646aa "\213\025\214XA\b\213R\b9\320\017\214\300\002", len = 138042733}}
        backup_mhomed = 0
        ret = -1525898716
        text = {s = 0xb695c598 "Switching Protocols", len = 19}
        backup_rt = 136692883
        ctx = {rec_lev = 224423841, run_flags = 518, last_retcode = 32, jmp_env = {{__jmpbuf = {7, 0, -1525896576, 8, -1079297640, 136726975}, __mask_was_saved = 5, __saved_mask = {__val = {0, 20, 138035965, 
                  138037119, 161, 138035960, 6846744, 7557840, 7558196, 4, 121, 2769068580, 2769070720, 3215669560, 135028043, 0, 2769054604, 3215669560, 136719511, 3059949576, 3063269120, 118, 0, 3063269120, 
                  272, 3215669768, 136726975, 5, 0, 200, 137638064, 137638524}}}}}
        pmsg = {id = 2769057578, pid = 2, tval = {tv_sec = -1079298356, tv_usec = 2}, fwd_send_flags = {f = 2 '\002', blst_imask = 0 '\000'}, rpl_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, 
          first_line = {type = -14952, flags = -18795, len = -1227359856, u = {request = {method = {s = 0xbfab72e0 "PV\226\266H\002", len = -1079298280}, uri = {s = 0x818b3a5 "\213E\344\351\211\002", 
                  len = -1079298364}, version = {s = 0x50 <Address 0x50 out of bounds>, len = -1079298372}, method_value = -1231752376}, reply = {version = {s = 0xbfab72e0 "PV\226\266H\002", 
                  len = -1079298280}, status = {s = 0x818b3a5 "\213E\344\351\211\002", len = -1079298364}, reason = {s = 0x50 <Address 0x50 out of bounds>, len = -1079298372}, statuscode = 3063214920}}}, 
          via1 = 0x0, via2 = 0xbfab36c4, headers = 0xbfab35a8, last_header = 0x8188cb5, parsed_flag = 13163490031275437096, h_via1 = 0xbfab3518, h_via2 = 0xd606fa1, callid = 0x0, to = 0x0, cseq = 0x0, 
          from = 0x0, contact = 0x0, maxforwards = 0xb691c4b0, route = 0x0, record_route = 0x0, content_type = 0xbfab3d20, content_length = 0x1c0, authorization = 0xbfab35f8, expires = 0x82649bf, 
          proxy_auth = 0x5, supported = 0x0, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0xbfab3bac, accept = 0xffffffe4, accept_language = 0x0, organization = 0x1, 
          priority = 0x5, subject = 0x8188c14, user_agent = 0x1c, server = 0xffffffff, content_disposition = 0x0, diversion = 0x73, rpid = 0x0, refer_to = 0x0, session_expires = 0xbfab3598, min_se = 0x8188bff, 
          sipifmatch = 0xb6ae0ff0, subscription_state = 0x0, date = 0x2, identity = 0xbfab39a0, identity_info = 0x18, pai = 0xa50c7729, ppi = 0x0, path = 0xb7677d44, privacy = 0x0, body = 0xa50c7708, 
          eoh = 0x0, unparsed = 0xbfab3ba8 "\200\252\f\245\002", rcv = {src_ip = {af = 93, len = 2769057544, u = {addrl = {3215670764, 224423841, 0, 3215689468}, addr32 = {3215670764, 224423841, 0, 
                  3215689468}, addr16 = {15852, 49067, 28577, 3424, 0, 0, 34556, 49067}, addr = "\354=\253\277\241o`\r\000\000\000\000\374\206\253\277"}}, dst_ip = {af = 3215671656, len = 135931595, u = {
                addrl = {3063006384, 0, 3215670604, 3215670600}, addr32 = {3063006384, 0, 3215670604, 3215670600}, addr16 = {50352, 46737, 0, 0, 15692, 49067, 15688, 49067}, 
                addr = "\260\304\221\266\000\000\000\000L=\253\277H=\253\277"}}, src_port = 15684, dst_port = 49067, proto_reserved1 = 262144, proto_reserved2 = -1079298552, src_su = {s = {sa_family = 35860, 
                sa_data = "\030\bD\f\256\266\300\001\000\000\310\066\253\277"}, sin = {sin_family = 35860, sin_port = 2072, sin_addr = {s_addr = 3064859716}, sin_zero = "\300\001\000\000\310\066\253\277"}, 
              sin6 = {sin6_family = 35860, sin6_port = 2072, sin6_flowinfo = 3064859716, sin6_addr = {__in6_u = {__u6_addr8 = "\300\001\000\000\310\066\253\277\277I&\b\002\000\000", __u6_addr16 = {448, 0, 
                      14024, 49067, 18879, 2086, 2, 0}, __u6_addr32 = {448, 3215668936, 136726975, 2}}}, sin6_scope_id = 0}}, bind_address = 0xbfab3628, proto = -1 '\377'}, buf = 0xb6ae0ff0 "\033", len = 0, 
          new_uri = {s = 0xbfab3648 "\330g\221\266(l\221\266\330g\221\266\020\322\254\266\330\066\253\277\241o`\r", len = 135028043}, dst_uri = {s = 0x0, len = 1}, parsed_uri_ok = -1079298488, parsed_uri = {
            user = {s = 0x8188c14 "\205\300t\a\270\001", len = 32}, passwd = {s = 0x0, len = -1231979188}, host = {s = 0x1 <Address 0x1 out of bounds>, len = 1}, port = {s = 0x0, len = -1231984680}, params = {
              s = 0xb6916c28 "\001", len = -1231984680}, sip_params = {s = 0xb6acd210 "\020", len = -1079298344}, headers = {s = 0xd606fa1 <Address 0xd606fa1 out of bounds>, len = 0}, port_no = 34556, 
            proto = 49067, type = 3215671816, flags = 135931595, transport = {s = 0xb6916c28 "\001", len = 1}, ttl = {s = 0xbfab3dec "\277I&\b\260", len = -1079296536}, user_param = {s = 0xbfab3de4 "\314\001", 
              len = 0}, maddr = {s = 0x0, len = -1241607909}, method = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, lr = {s = 0xbfab36c8 "", len = 2}, r2 = {s = 0xb6632008 "\001", len = 226}, gr = {
              s = 0xb6acd210 "\020", len = -1230188016}, transport_val = {s = 0xb6ae0698 "\002", len = -1230109024}, ttl_val = {s = 0x0, len = -1231661426}, user_param_val = {
              s = 0xf <Address 0xf out of bounds>, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = -1241607909}, r2_val = {
              s = 0xe0 <Address 0xe0 out of bounds>, len = 262144}, gr_val = {s = 0xae <Address 0xae out of bounds>, len = -1}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {
              s = 0xf0 <Address 0xf0 out of bounds>, len = -1079298104}, passwd = {s = 0xb695c598 "Switching Protocols", len = 5}, host = {s = 0x0, len = 456}, port = {s = 0x1b4 <Address 0x1b4 out of bounds>, 
              len = -1227359856}, params = {s = 0xbfab72e0 "PV\226\266H\002", len = -1079298136}, sip_params = {
              s = 0x818d27a "\213E\340\353\"\220\353\004\220\353\001\220\213E\320\211\004$\350\263\242\377\377\213E\344\211\004$\350\250\242\377\377\270", len = -1231698536}, headers = {s = 0xb694b754 "sip:", 
              len = 4}, port_no = 62280, proto = 46740, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 224423841}, ttl = {s = 0x0, len = -1079277828}, user_param = {
              s = 0xbfab3828 "\270\321\376\265\255\216&\bt8\253\277", len = 136730906}, maddr = {s = 0xb6632008 "\001", len = -1231979088}, method = {s = 0x0, len = 0}, lr = {
              s = 0xd606fa1 <Address 0xd606fa1 out of bounds>, len = 0}, r2 = {
              s = 0xbfab3798 "h8\253\277\260\327\027\245\220\371\327\266\340r\253\277\350<\253\277/:\031\bH\363\224\266xq\253\277\234\357\224\266", len = 135028043}, gr = {s = 0x0, len = 20}, transport_val = {
              s = 0xb694ef9c "\002", len = 37147}, ttl_val = {s = 0xb695c5a0 "g Protocols", len = -1231753308}, user_param_val = {s = 0xb695c598 "Switching Protocols", len = -1231698536}, maddr_val = {s = 0x0, 
              len = 428}, method_val = {s = 0xbfab3868 "89\253\277\277I&\b\005", len = -1525164112}, lr_val = {s = 0xb6d7f990 "(J\005\n \002", len = -1079282976}, r2_val = {
              s = 0xbfab3ce8 "\310F\253\277[k\006\b\b c\266T\305\225\266\204p3\b\334\215\063\bY\004", len = 135871023}, gr_val = {s = 0xb694f348 "\a", len = -1079283336}}, add_rm = 0xb694ef9c, 
          body_lumps = 0x0, reply_lump = 0xb694f348, 
          add_to_branch_s = "\273\003u\267X\305\225\266\205\266+\b\370;\253\277\000\000\000\000\304\000\000\000=\221\067\b\340\000\000\000\000\027\067\b\310\070\253\277\032Y&\b\b c\266`d\220\266\324}\221\266\033\221", add_to_branch_len = -1231979088, hash_index = 3077903151, msg_flags = 224423841, flags = 3059949576, set_global_address = {s = 0xb6917f8a "7\b\350\004", len = -1231959972}, set_global_port = {
            s = 0xe <Address 0xe out of bounds>, len = 224423841}, force_send_socket = 0x0, path_vec = {s = 0xb7750215 "\201\303\213\265\002", len = -1241591368}, instance = {
            s = 0x8268ead "\213E\364\213P\004\213E\f\211\020\213E\f\307@\024\004", len = -1079297932}, reg_id = 0, ruid = {s = 0x1c <Address 0x1c out of bounds>, len = 136049093}, location_ua = {
            s = 0xbfab38dc "\375B:\b\177G:\b\241", len = 0}, ldv = {flow = {decoded = 16, rcv = {src_ip = {af = 3059949576, len = 3064788156, u = {addrl = {262144, 3215669400, 3053359487, 3059949576}, 
                    addr32 = {262144, 3215669400, 3053359487, 3059949576}, addr16 = {0, 4, 14488, 49067, 37247, 46590, 8200, 46691}, addr = "\000\000\004\000\230\070\253\277\177\221\376\265\b c\266"}}, 
                dst_ip = {af = 3215669364, len = 3215669560, u = {addrl = {136726975, 5, 16777216, 9219348}, addr32 = {136726975, 5, 16777216, 9219348}, addr16 = {18879, 2086, 5, 0, 0, 256, 44308, 140}, 
                    addr = "\277I&\b\005\000\000\000\000\000\000\001\024\255\214"}}, src_port = 31028, dst_port = 104, proto_reserved1 = 7557868, proto_reserved2 = 7558196, src_su = {s = {sa_family = 4, 
                    sa_data = "\000\000x\000\000\000\234\361\345\265\200\252\f\245"}, sin = {sin_family = 4, sin_port = 0, sin_addr = {s_addr = 120}, sin_zero = "\234\361\345\265\200\252\f\245"}, sin6 = {
                    sin6_family = 4, sin6_port = 0, sin6_flowinfo = 120, sin6_addr = {__in6_u = {__u6_addr8 = "\234\361\345\265\200\252\f\245\310\070\253\277K]\f\b", __u6_addr16 = {61852, 46565, 43648, 42252, 
                          14536, 49067, 23883, 2060}, __u6_addr32 = {3051745692, 2769070720, 3215669448, 135028043}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 28 '\034'}}}}
        __FUNCTION__ = "sl_reply_helper"
#6  0xb5e56dcc in sl_send_reply (msg=0xbfab7178, code=101, reason=0xb695c598 "Switching Protocols") at sl_funcs.c:303
No locals.
#7  0xb5e4dde5 in send_reply (msg=0xbfab7178, code=101, reason=0xa50ca4ac) at sl.c:281
        r = 0xb695c598 "Switching Protocols"
        t = 0xffffffff
        ret = 1
        __FUNCTION__ = "send_reply"
#8  0xa50b953f in ws_send_reply (msg=0xbfab7178, code=101, reason=0xa50ca4ac, hdrs=0xbfab4068) at ws_handshake.c:109
        __FUNCTION__ = "ws_send_reply"
#9  0xa50be321 in ws_handle_handshake (msg=0xbfab7178) at ws_handshake.c:424
        key = {s = 0xb6965819 "GVs/6jVe4SSceoeJGmIG0g==\r\nSec-WebSocket-Extensions: permessage-deflate; client_max_window_bits\r\nSec-WebSocket-Protocol: sip\r\n\r\n", len = 24}
        headers = {
          s = 0xa50ca880 "Access-Control-Allow-Origin: https://web.service.dummy.ok\r\nSec-WebSocket-Protocol: sip\r\nUpgrade: websocket\r\nConnection: upgrade\r\nSec-WebSocket-Accept: y3st9Xv712JK2HJY6KDEx2nRd0w=\r\n", len = 182}
        reply_key = {s = 0xa50caa80 "y3st9Xv712JK2HJY6KDEx2nRd0w=[", len = 28}
        origin = {
          s = 0xb69656fb "https://web.service.dummy.ok\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36\r\nDNT: 1\r"..., len = 29}
        sha1 = "\313{-\365{\373\327bJ\330rX\350\240\304\307i\321wL"
        hdr_flags = 123
        sub_protocol = 1
        version = 13
        hdr = 0x0
        con = 0xa5aedc90
        wsc = 0xb691c4b0
        __FUNCTION__ = "ws_handle_handshake"
#10 0x080655ce in do_action (h=0xbfab4be0, a=0xb6950d68, msg=0xbfab7178) at action.c:1054
        ret = -5
        v = 5
        dst = {send_sock = 0xb692b968, to = {s = {sa_family = 37147, sa_data = "\376\265\200\000\000\000\000\200\000\000\216\000\000"}, sin = {sin_family = 37147, sin_port = 46590, sin_addr = {s_addr = 128}, 
              sin_zero = "\000\200\000\000\216\000\000"}, sin6 = {sin6_family = 37147, sin6_port = 46590, sin6_flowinfo = 128, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\000\200\000\000\216\000\000\000\377\377\377\377\000\000\000", __u6_addr16 = {32768, 0, 142, 0, 65535, 65535, 0, 0}, __u6_addr32 = {32768, 142, 4294967295, 0}}}, 
              sin6_scope_id = 124}}, id = -1079293400, proto = -65 '\277', send_flags = {f = 73 'I', blst_imask = 38 '&'}}
        tmp = 0xb5fe911b "\201\303\235@"
        new_uri = 0x0
        end = 0x837178c "core: rvalue.c"
        crt = 0xb68ce36c " "
        cmd = 0xb66643f8
        len = 161
        user = 0
        uri = {user = {s = 0x80000 <Address 0x80000 out of bounds>, len = 176}, passwd = {s = 0xffffffff <Address 0xffffffff out of bounds>, len = 0}, host = {s = 0xf4 <Address 0xf4 out of bounds>, len = 1}, 
          port = {s = 0x0, len = 32}, params = {s = 0x0, len = -1079293560}, sip_params = {
            s = 0x81897cc "\205\300\017\237\300\017\266\320\213E\020\211\020\213E\b\213@\004\211\302\203\342\371\213E\b\211P\004\351\341\004", len = -1079283504}, headers = {s = 0xb694e8e4 "]\017", 
            len = -1079283336}, port_no = 65535, proto = 65535, type = 3062691928, flags = 116, transport = {s = 0x0, len = -1241664416}, ttl = {s = 0xb6d7f990 "(J\005\n \002", len = -1079282976}, 
          user_param = {
            s = 0xbfab48f8 "\030I\253\277\240\b\375\265\274\033\226\266$J\253\277\350I\253\277 \356\275\265\220\371\327\266\340r\253\277\210J\253\277\256\301\266\265xq\253\277\b\344\224\266\070J\253\277\064J\253\277", len = -1241708491}, maddr = {
            s = 0xb6965688 "Host: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok\r\nSec-WebSocket-Version: 13\r\nUser-Agent: Mozilla/5.0 (Ma"..., len = -1231756347}, method = {s = 0x4 <Address 0x4 out of bounds>, len = -1079291832}, lr = {s = 0xbfab5044 "", len = -1231898264}, r2 = {
            s = 0x4 <Address 0x4 out of bounds>, len = 0}, gr = {s = 0x0, len = -1241664416}, transport_val = {s = 0xbfab4918 "\210J\253\277\256\301\266\265xq\253\277\b\344\224\266\070J\253\277\064J\253\277", 
            len = -1241708384}, ttl_val = {s = 0xb6961bbc "\210V\226\266\004", len = -1079293404}, user_param_val = {s = 0xbfab49e8 "\241", len = -1245843936}, maddr_val = {s = 0xb6d7f990 "(J\005\n \002", 
            len = -1079282976}, method_val = {s = 0xbfab4a88 "\370J\253\277\205\343\023\bxq\253\277\b\344\224\266\064K\253\277K]\f\b", len = -1246314066}, lr_val = {s = 0xbfab7178 "\001", len = -1231756280}, 
          r2_val = {s = 0xbfab4a38 "", len = -1079293388}, gr_val = {s = 0x0, len = 176}}
        next_hop = {user = {s = 0x2 <Address 0x2 out of bounds>, len = 0}, passwd = {s = 0xbfab47e8 "\001", len = -1525164112}, host = {s = 0xb6d7f990 "(J\005\n \002", len = -1079282976}, port = {
            s = 0xbfab4898 "\210I\253\277\314\227\030\b\320p\253\277\344\350\224\266xq\253\277\377\377\377\377X\370\214\266t", len = 134681845}, params = {s = 0xbfab47e0 "", len = -1231755036}, sip_params = {
            s = 0xbfab7178 "\001", len = -1}, headers = {s = 0x0, len = 0}, port_no = 1, proto = 0, type = 2769803184, flags = 3067607440, transport = {s = 0xbfab72e0 "PV\226\266H\002", len = -1079294008}, 
          ttl = {s = 0x9629dd1a <Address 0x9629dd1a out of bounds>, len = -827108235}, user_param = {s = 0x0, len = -1079293752}, maddr = {s = 0x818919c "\205\300\017\204S\005", len = -1079293788}, method = {
            s = 0xb68cfc04 "\001", len = -1079291828}, lr = {s = 0xbfab5048 "\354\253\214", len = -1079291836}, r2 = {s = 0xbfab86fc "\201T\232\236", len = -1079290936}, gr = {
            s = 0x81a44f4 "\205\300\017\204^\036", len = -1231869952}, transport_val = {s = 0x2 <Address 0x2 out of bounds>, len = -1079291988}, ttl_val = {s = 0xbfab4fa8 "xP\253\277\033\221\376\265\005", 
            len = -1079291996}, user_param_val = {s = 0xb6906460 "\020", len = -1079293752}, maddr_val = {s = 0xb5fe911b "\201\303\235@", len = 224423841}, method_val = {s = 0x0, len = -1079293816}, lr_val = {
            s = 0x80c5d4b "\211E\364\213E\364\351\373\001", len = 0}, r2_val = {s = 0x8371700 "core", len = -1231326200}, gr_val = {s = 0xb5fe911b "\201\303\235@", len = -1232235660}}
        u = 0x80c5d4b
        port = 49067
        dst_host = 0x83b0000
        i = -1231756280
        flags = 0
        avp = 0xbfab7178
        st = {flags = 3215675148, id = 20232, name = {n = 0, s = {s = 0x0, len = 262144}, re = 0x0}, avp = 0x1}
        sct = 0xbfab4d58
        sjt = 0xbfab7178
        rve = 0xbfab4af8
        mct = 0xbfab70d0
        rv = 0x2
        rv1 = 0x813e385
        c1 = {cache_type = 3215689468, val_type = 3215673384, c = {avp_val = {n = 135827584, s = {s = 0x8189080 "\205\300\017\204l\006", len = -1079293948}, re = 0x8189080}, pval = {rs = {
                s = 0x8189080 "\205\300\017\204l\006", len = -1079293948}, ri = -1231868804, flags = -1079291988}}, i2s = "\250O\253\277\244O\253\277\374\206\253\277(S\253\277\024\070\032\b\033"}
        s = {s = 0xd606fa1 <Address 0xd606fa1 out of bounds>, len = 0}
        srevp = {0xbfab86fc, 0xbfab52f8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, 
              string = 0x1 <Address 0x1 out of bounds>, str = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 19}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#11 0x08070ea0 in run_actions (h=0xbfab4be0, a=0xb6950d68, msg=0xbfab7178) at action.c:1549
        t = 0xb6950d68
        ret = -1
        mod = 0x1000000
        ms = 0
        __FUNCTION__ = "run_actions"
#12 0x080714f5 in run_actions_safe (h=0xbfab70d0, a=0xb6950d68, msg=0xbfab7178) at action.c:1614
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {-1525164112, -1227359856, -1079282976, -1079292984, -1775117030, -827108235}, __mask_was_saved = 0, __saved_mask = {__val = {
                  3215674584, 136726975, 5, 0, 32, 138085432, 138095523, 318, 138084352, 0, 3063092684, 3063090588, 3215676716, 2, 0, 3215689468, 3215674488, 135871193, 3063203816, 3063203824, 0, 135826431, 
                  3062687824, 3215689468, 3063203816, 3063306390, 0, 3215689468, 3215676520, 135919377, 3062916228, 0}}}}}
        ret = -1231763484
        ign_on_break = 0
#13 0x081897cc in rval_get_int (h=0xbfab70d0, msg=0xbfab7178, i=0xbfab5800, rv=0xb6951848, cache=0x0) at rvalue.c:912
        r_avp = 0x2
        avp_val = {n = 476, s = {s = 0x1dc <Address 0x1dc out of bounds>, len = 2}, re = 0x1dc}
        pval = {rs = {s = 0xbfab4e08 "\002", len = 136726975}, ri = 5, flags = 0}
        tmp = {s = 0x0, len = 428}
        s = 0x0
        r = 0
        ret = 0
        destroy_pval = 0
        __FUNCTION__ = "rval_get_int"
#14 0x0818d6b6 in rval_expr_eval_int (h=0xbfab70d0, msg=0xbfab7178, res=0xbfab5800, rve=0xb6951844) at rvalue.c:1910
        i1 = 0
        i2 = 0
        ret = -1
        c1 = {cache_type = RV_CACHE_SELECT, val_type = 10, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = -1241664416, flags = -1079292072}}, 
          i2s = "\240\b\375\265\000\034\226\266dP\253\277\030P\253\277 \356\275\265\220\371"}
        c2 = {cache_type = 110, val_type = RV_NONE, c = {avp_val = {n = -1241664416, s = {s = 0xb5fdb460 "4\303", len = -1227359856}, re = 0xb5fdb460}, pval = {rs = {s = 0xb5fdb460 "4\303", len = -1227359856}, 
              ri = -1079282976, flags = -1079292104}}, i2s = "5\b\375\265\237V\226\266a\303\224\266\n\000\000\000K]\f\b\226X"}
        rv1 = 0xb699c7ac
        rv2 = 0xffffffff
        __FUNCTION__ = "rval_expr_eval_int"
#15 0x080650b2 in do_action (h=0xbfab70d0, a=0xb6952088, msg=0xbfab7178) at action.c:1030
        ret = -5
        v = 0
        dst = {send_sock = 0xb5f5895f, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\374\206\253\277\030X\253\277"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, 
              sin_zero = "\374\206\253\277\030X\253\277"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\374\206\253\277\030X\253\277\331:\031\b\004\261\231\266", __u6_addr16 = {34556, 49067, 22552, 49067, 15065, 2073, 45316, 46745}, __u6_addr32 = {3215689468, 3215677464, 
                    135871193, 3063525636}}}, sin6_scope_id = 3063525644}}, id = 0, proto = -1 '\377', send_flags = {f = 139 '\213', blst_imask = 24 '\030'}}
        tmp = 0x0
        new_uri = 0x952 <Address 0x952 out of bounds>
        end = 0x81a69ee "\270"
        crt = 0x0
        cmd = 0xd
        len = 0
        user = 0
        uri = {user = {s = 0x0, len = -1079288484}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 3}, port = {s = 0x2 <Address 0x2 out of bounds>, len = -1}, params = {
            s = 0xffffffff <Address 0xffffffff out of bounds>, len = -1079289992}, sip_params = {s = 0x8188263 "\211\004$\350US\355\377\203\304\034[^_]\303U\211\345\203\354\070\213E\b\005\272\001", 
            len = -1235017728}, headers = {s = 0x1bc <Address 0x1bc out of bounds>, len = 137828236}, port_no = 37181, proto = 2103, type = 224, flags = 137828096, transport = {s = 0x0, len = -1079288976}, 
          ttl = {s = 0x0, len = -1241729631}, user_param = {s = 0x0, len = -1217954492}, maddr = {s = 0x0, len = -1241729638}, method = {s = 0xb76a2433 "\201\303\301[\017", len = -1079288488}, lr = {
            s = 0xe <Address 0xe out of bounds>, len = -1241729638}, r2 = {s = 0x1 <Address 0x1 out of bounds>, len = 13}, gr = {s = 0xbfab5e24 "T\346o\267a", len = 13}, transport_val = {
            s = 0xb7797ff4 "|=\026", len = -1079288432}, ttl_val = {s = 0xb5f5895f "", len = -1079288472}, user_param_val = {
            s = 0xb767525f "\213\225t\372\377\377\071\302\017\205\362\361\377\377\270\377\377\377\177+\205x\373\377\377\071\302\017\207\337\361\377\377\001\225x\373\377\377\200?", len = -1079288432}, 
          maddr_val = {s = 0xb5f5895f "", len = 0}, method_val = {s = 0x0, len = 135821446}, lr_val = {s = 0xb6632008 "\001", len = 0}, r2_val = {s = 0x0, len = -1231759392}, gr_val = {s = 0xb694d390 "\a", 
            len = 137828096}}
        next_hop = {user = {s = 0xbfab580c "", len = 0}, passwd = {s = 0xb695c598 "Switching Protocols", len = -1525164112}, host = {s = 0xb6d7f990 "(J\005\n \002", len = -1079282976}, port = {
            s = 0xbfab5868 "hZ\253\277P\334\030\b\320p\253\277xq\253\277\064Z\253\277\210\333\224\266", len = 135850740}, params = {s = 0xb694d7e0 "\002", len = -1079283336}, sip_params = {
            s = 0xbfab5a34 "\001", len = 32}, headers = {s = 0xb694d390 "\a", len = 0}, port_no = 55264, proto = 46740, type = ERROR_URI_T, flags = 0, transport = {s = 0x128 <Address 0x128 out of bounds>, 
            len = -1079290008}, ttl = {s = 0x82649bf "\213E\340\203\300$\201\304\274", len = 184}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x2 <Address 0x2 out of bounds>, len = 0}, method = {
            s = 0xbfab86fc "\201T\232\236", len = -1079289960}, lr = {s = 0x826591a "\353\a\220\353\004\220\353\001\220\201\304\314", len = -1235017720}, r2 = {s = 0xb6994f3c "\020", len = -1079290104}, gr = {
            s = 0x81882be "\211E\360\203}\360", len = -1231677704}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x8371700 "core", len = 0}, maddr_val = {s = 0x0, 
            len = 32}, method_val = {s = 0xbfab86fc "\201T\232\236", len = -1079289992}, lr_val = {
            s = 0x8187886 "\203\304l[^_]\303U\211\345\203\354\030\213E\b\213@\004\215P\377\213E\b\211P\004\213E\b\213@\004\205\300u\v\213E\b\211\004$\350\360\365\377\377\311\303U\211\345WVS\201\354\374", 
            len = -1235017720}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        u = 0x1
        port = 49067
        dst_host = 0xb699d424
        i = -1231671128
        flags = 0
        avp = 0xb6966620
        st = {flags = 3063268760, id = 55264, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
        sct = 0x1
        sjt = 0x1
        rve = 0xb6951844
        mct = 0x0
        rv = 0xbfab5a34
        rv1 = 0x0
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = 3063207912, c = {avp_val = {n = -1231698528, s = {s = 0xb695c5a0 "g Protocols", len = 0}, re = 0xb695c5a0}, pval = {rs = {s = 0xb695c5a0 "g Protocols", 
                len = 0}, ri = -1217068523, flags = -1525164112}}, i2s = "\260\327\027\245\220\371\327\266\340r\253\277hV\253\277^\323\030\b\340\327"}
        s = {s = 0xb5fe911b "\201\303\235@", len = 213}
        srevp = {0x19c, 0xbfab56c8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, 
              string = 0x1 <Address 0x1 out of bounds>, str = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 19}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#16 0x08070ea0 in run_actions (h=0xbfab70d0, a=0xb6950c28, msg=0xbfab7178) at action.c:1549
        t = 0xb6952088
        ret = 1
        mod = 0xb6920320
        ms = 0
        __FUNCTION__ = "run_actions"
#17 0x08065552 in do_action (h=0xbfab70d0, a=0xb6952124, msg=0xbfab7178) at action.c:1045
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\\c\253\277\005\000\000", __u6_addr16 = {0, 0, 0, 0, 25436, 49067, 5, 0}, 
                  __u6_addr32 = {0, 0, 3215680348, 5}}}, sin6_scope_id = 7}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        tmp = 0xb578cee7 "\211n\370)~\374\306\004."
        new_uri = 0x128 <Address 0x128 out of bounds>
        end = 0xb7773d4c "malloc.c"
        crt = 0xb5792ff4 "\360\256"
        cmd = 0xb665c1e4
        len = -1217064161
        user = -1250349068
        uri = {user = {s = 0xbfe2bb61 <Address 0xbfe2bb61 out of bounds>, len = 1084160162}, passwd = {s = 0x153911c2 <Address 0x153911c2 out of bounds>, len = 1892152629}, host = {
            s = 0x19945161 <Address 0x19945161 out of bounds>, len = 1918852815}, port = {s = 0xcb18b54e <Address 0xcb18b54e out of bounds>, len = -1526424657}, params = {s = 0xbfab6248 "", len = 0}, 
          sip_params = {s = 0x1 <Address 0x1 out of bounds>, len = -1525164112}, headers = {s = 0xa04b0c0 "\350\267\004\n\032", len = -1231472044}, port_no = 25176, proto = 49067, type = 3077518168, flags = 0, 
          transport = {s = 0x0, len = 1}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0xb6d7f990 "(J\005\n \002", len = -1079282976}, method = {
            s = 0xbfab6308 "Hc\253\277^\323\030\b\004{\223\266\300m\253\277\270\033\226\266\004{\223\266", len = 135840547}, lr = {s = 0xb6961b94 " ", len = -1231676050}, r2 = {s = 0x0, len = -1235017720}, 
          gr = {s = 0x0, len = -1079287036}, transport_val = {s = 0xbfab62a8 "ph\253\277TV\226\266\001", len = -1525164112}, ttl_val = {s = 0xb6d7f990 "(J\005\n \002", len = -1079282976}, user_param_val = {
            s = 0xbfab6308 "Hc\253\277^\323\030\b\004{\223\266\300m\253\277\270\033\226\266\004{\223\266", len = 135821446}, maddr_val = {s = 0xb6632008 "\001", len = -1231676488}, method_val = {
            s = 0x837178c "core: rvalue.c", len = 137859433}, lr_val = {s = 0x81 <Address 0x81 out of bounds>, len = 137828096}, r2_val = {s = 0xbfab6870 "", len = -1231661484}, gr_val = {
            s = 0x1 <Address 0x1 out of bounds>, len = 0}}
        next_hop = {user = {s = 0x0, len = 168079552}, passwd = {s = 0xbfab6178 "\250a\253\277K]\f\b", len = -1241607809}, host = {s = 0xb6632008 "\001", len = -1079287468}, port = {
            s = 0xffffffff <Address 0xffffffff out of bounds>, len = -1079287272}, params = {s = 0xbfab6164 "\254Ps", len = 16777216}, sip_params = {s = 0x8caf54 <Address 0x8caf54 out of bounds>, 
            len = 6846808}, headers = {s = 0x7350ac <Address 0x7350ac out of bounds>, len = 7557292}, port_no = 4, proto = 0, type = 118, flags = 2769803184, transport = {s = 0xb6d7f990 "(J\005\n \002", 
            len = -1079287384}, ttl = {s = 0x80c5d4b "\211E\364\213E\364\351\373\001", len = 0}, user_param = {s = 0x1 <Address 0x1 out of bounds>, len = 2}, maddr = {s = 0x1 <Address 0x1 out of bounds>, 
            len = 188}, method = {s = 0x0, len = 0}, lr = {s = 0xa517d7b0 "\200\326", len = -1227359856}, r2 = {s = 0xbfab72e0 "PV\226\266H\002", len = -1079287160}, gr = {
            s = 0x826591a "\353\a\220\353\004\220\353\001\220\201\304\314", len = -1235017720}, transport_val = {s = 0xb6961b94 " ", len = 168079552}, ttl_val = {s = 0x0, len = -1}, user_param_val = {s = 0x0, 
            len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x6af42c0 <Address 0x6af42c0 out of bounds>, 
            len = -1500340898}}
        u = 0xb6b4aef8
        port = 49067
        dst_host = 0x20
        i = 1893571582
        flags = -1235017720
        avp = 0xff565002
        st = {flags = 28, id = 1, name = {n = 168077040, s = {s = 0xa04a6f0 "", len = 0}, re = 0xa04a6f0}, avp = 0xb6993a54}
        sct = 0xb6961bb8
        sjt = 0xbfab6dc0
        rve = 0xb694df34
        mct = 0xb6937b04
        rv = 0x0
        rv1 = 0x0
        c1 = {cache_type = 4436732, val_type = 3077202798, c = {avp_val = {n = -1217954492, s = {s = 0xb7677d44 "\200\275\064\373\377\377", len = -1079287276}, re = 0xb7677d44}, pval = {rs = {
                s = 0xb7677d44 "\200\275\064\373\377\377", len = -1079287276}, ri = -1241729638, flags = 8}}, i2s = "\330f\253\277\000\000\000\000\025\002u\267\270\321\376\265\255\216&\bTa"}
        s = {s = 0xbfab64f0 "", len = -1242200692}
        srevp = {0x0, 0xbfab61a8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, 
              string = 0x1 <Address 0x1 out of bounds>, str = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 19}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#18 0x08070ea0 in run_actions (h=0xbfab70d0, a=0xb694aee0, msg=0xbfab7178) at action.c:1549
        t = 0xb6952124
        ret = 1
        mod = 0x1
        ms = 0
        __FUNCTION__ = "run_actions"
#19 0x08065596 in do_action (h=0xbfab70d0, a=0xb69521c0, msg=0xbfab7178) at action.c:1049
        ret = 1
        v = 0
        dst = {send_sock = 0xb77d07e5, to = {s = {sa_family = 29104, sa_data = "\253\277\030\000\000\000\030BD\265\000\000\000"}, sin = {sin_family = 29104, sin_port = 49067, sin_addr = {s_addr = 24}, 
              sin_zero = "\030BD\265\000\000\000"}, sin6 = {sin6_family = 29104, sin6_port = 49067, sin6_flowinfo = 24, sin6_addr = {__in6_u = {__u6_addr8 = "\030BD\265\000\000\000\000D}g\267s\000\000", 
                  __u6_addr16 = {16920, 46404, 0, 0, 32068, 46951, 115, 0}, __u6_addr32 = {3041149464, 0, 3077012804, 115}}}, sin6_scope_id = 3041149457}}, id = -1218216444, proto = -72 '\270', send_flags = {
            f = 1 '\001', blst_imask = 126 '~'}}
        tmp = 0xbfab72e0 "PV\226\266H\002"
        new_uri = 0xb77e4910 ""
        end = 0xbfab6ec4 "\377\377\377\377\364?~\267\304T\005\b\005"
        crt = 0xb6d7f990 "(J\005\n \002"
        cmd = 0x0
        len = -1525164112
        user = -1218199836
        uri = {user = {s = 0xb696560c "", len = 138085432}, passwd = {s = 0x83b2ba3 "parse_headers", len = 334}, host = {s = 0x83b0000 "core", len = 23}, port = {s = 0xb5792ff4 "\360\256", len = 0}, params = {
            s = 0xbfab86fc "\201T\232\236", len = 33}, sip_params = {s = 0xb578c8d8 "\205\300u\f\213D$\034\203\304([\303\215v", len = -1231660904}, headers = {
            s = 0xbfab6d28 "xn\253\277*F*\bWV\226\266=\201;\b\006", len = 137189177}, port_no = 22111, proto = 46742, type = 10, flags = 46, transport = {s = 0x0, len = 1}, ttl = {
            s = 0xb6d7f990 "(J\005\n \002", len = -1079282976}, user_param = {s = 0xbfab6e78 "", len = 136988202}, maddr = {
            s = 0xb6965657 "TTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok\r\nSec-W"..., len = 138117437}, method = {s = 0x6 <Address 0x6 out of bounds>, len = -1079284392}, lr = {s = 0xb57b3148 "\f \001", len = 0}, r2 = {s = 0xbfab71af "", len = 10}, gr = {
            s = 0x0, len = -1218199836}, transport_val = {s = 0xd696910 <Address 0xd696910 out of bounds>, len = -1079284332}, ttl_val = {
            s = 0xb77d0166 "\213M\340\205\300u3\211\360\213]\364\213u\370\213}\374\211\354]\303\215t&", len = -1218155984}, user_param_val = {s = 0x805b926 "GLIBC_2.0", len = -1079277828}, maddr_val = {
            s = 0x805524e "libc.so.6", len = -1216756928}, method_val = {s = 0xbfab0002 "\237\266", len = -1216520544}, lr_val = {s = 0x805524e "libc.so.6", len = -1216594520}, r2_val = {
            s = 0xb77e3ff4 "\f\317\001", len = -1218221656}, gr_val = {s = 0x3 <Address 0x3 out of bounds>, len = -1079284204}}
        next_hop = {user = {s = 0x13e <Address 0x13e out of bounds>, len = 138084352}, passwd = {s = 0x83b0000 "core", len = -1216774156}, host = {s = 0xb77993c0 "", len = 0}, port = {
            s = 0xbfab6c48 "\334l\253\277m\314x\265\t", len = -1217754692}, params = {s = 0x2 <Address 0x2 out of bounds>, len = 0}, sip_params = {s = 0xb76a9a1d "\211\301e\203=\f", len = -1250349068}, 
          headers = {s = 0xa0548a0 "", len = 0}, port_no = 27868, proto = 49067, type = 3044592749, flags = 9, transport = {s = 0xb7797ff4 "|=\026", len = -1217780685}, ttl = {s = 0xa054c46 "\r\n", 
            len = -1079284616}, user_param = {s = 0xb76a88ed "e\203=\f", len = 0}, maddr = {s = 0x1 <Address 0x1 out of bounds>, len = -1079282940}, method = {s = 0x1 <Address 0x1 out of bounds>, 
            len = -1216774156}, lr = {s = 0xbfab7270 "", len = -1253817830}, r2 = {s = 0xbfab7248 "", len = -1217965473}, gr = {s = 0xbfab7270 "", len = -1253817831}, transport_val = {
            s = 0x1 <Address 0x1 out of bounds>, len = 0}, ttl_val = {s = 0xb578c790 "\203\370\377t\016\061\300\213\\$\024\213t$\030\203\304\034\303\213\206\220", len = -1231661592}, user_param_val = {
            s = 0xc0 <Address 0xc0 out of bounds>, len = -1231661592}, maddr_val = {s = 0xb6632008 "\001", len = -1250349068}, method_val = {s = 0xb76a51d6 "\201\303\036.\017", len = -1253817831}, lr_val = {
            s = 0x8800001 <Address 0x8800001 out of bounds>, len = 0}, r2_val = {s = 0xbfab86fc "\201T\232\236", len = 2}, gr_val = {s = 0x0, len = -1235017720}}
        u = 0x0
        port = 2113
        dst_host = 0x5
        i = 134566308
        flags = 138095523
        avp = 0x5
        st = {flags = 3215683192, id = 24330, name = {n = 138084352, s = {s = 0x83b0000 "core", len = 4}, re = 0x83b0000}, avp = 0xb6974be0}
        sct = 0x80554c4
        sjt = 0xb779c000
        rve = 0xb6937ee0
        mct = 0xb779c340
        rv = 0xbfab72e0
        rv1 = 0x0
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = 3215682552, c = {avp_val = {n = -1231676640, s = {s = 0xb6961b20 "\001", len = -1235017720}, re = 0xb6961b20}, pval = {rs = {s = 0xb6961b20 "\001", 
                len = -1235017720}, ri = 23, flags = -1231598660}}, i2s = "\210V\226\266\000\000\000\000\374\206\253\277\310l\253\277\000\000\000\000\220\371"}
        s = {s = 0x80c5d4b "\211E\364\213E\364\351\373\001", len = 0}
        srevp = {0x0, 0xbfab6be8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, 
              string = 0x1 <Address 0x1 out of bounds>, str = {s = 0x1 <Address 0x1 out of bounds>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 19}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#20 0x08070ea0 in run_actions (h=0xbfab70d0, a=0xb69521c0, msg=0xbfab7178) at action.c:1549
        t = 0xb69521c0
        ret = -1
        mod = 0x40000001
        ms = 0
        __FUNCTION__ = "run_actions"
#21 0xa5174a69 in xhttp_process_request (orig_msg=0xb6d7f828, 
    new_buf=0xb6965650 "GET / HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok"..., new_len=584) at xhttp_mod.c:282
        ret = 0
        tmp_msg = {id = 1, pid = 0, tval = {tv_sec = 0, tv_usec = 0}, fwd_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, rpl_send_flags = {f = 1 '\001', blst_imask = 0 '\000'}, first_line = {type = 1, 
            flags = 2, len = 16, u = {request = {method = {
                  s = 0xb6965650 "GET / HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok"..., len = 3}, uri = {
                  s = 0xb6965654 "/ HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok\r\nSe"..., len = 1}, version = {
                  s = 0xb6965656 "HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok\r\nSec-"..., len = 8}, method_value = 16384}, reply = {version = {
                  s = 0xb6965650 "GET / HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok"..., len = 3}, status = {
                  s = 0xb6965654 "/ HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok\r\nSe"..., len = 1}, reason = {
                  s = 0xb6965656 "HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok\r\nSec-"..., len = 8}, statuscode = 16384}}}, via1 = 0xb6961b20, via2 = 0x0, headers = 0xb6974be0, last_header = 0xb695c510, parsed_flag = 18446744073709551615, 
          h_via1 = 0xb6974be0, h_via2 = 0x0, callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0x0, 
          authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0, accept_language = 0xb6961e60, 
          organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0xb6961d94, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, 
          sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, body = 0x0, eoh = 0xb6965896 "\r\n", 
          unparsed = 0xb6965896 "\r\n", rcv = {src_ip = {af = 2, len = 4, u = {addrl = {2515258290, 0, 0, 0}, addr32 = {2515258290, 0, 0, 0}, addr16 = {52146, 38379, 0, 0, 0, 0, 0, 0}, 
                addr = "\262\313\353\225", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1548587732, 0, 0, 0}, addr32 = {1548587732, 0, 0, 0}, addr16 = {37588, 23629, 0, 0, 0, 0, 0, 0}, 
                addr = "\324\222M\\", '\000' <repeats 11 times>}}, src_port = 31366, dst_port = 8443, proto_reserved1 = 1, proto_reserved2 = 0, src_su = {s = {sa_family = 2, 
                sa_data = "z\206\262\313\353\225\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 34426, sin_addr = {s_addr = 2515258290}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
                sin6_family = 2, sin6_port = 34426, sin6_flowinfo = 2515258290, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\001\000\000\000\310J~\267", __u6_addr16 = {0, 0, 0, 0, 1, 
                      0, 19144, 46974}, __u6_addr32 = {0, 0, 1, 3078507208}}}, sin6_scope_id = 0}}, bind_address = 0xb6653088, proto = 3 '\003'}, 
          buf = 0xb6965650 "GET / HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok"..., len = 584, new_uri = {s = 0x0, len = 0}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
              s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, 
            transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, 
            gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, 
            lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
              s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, 
            transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, 
            gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, 
            lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0xb695c638, add_to_branch_s = '\000' <repeats 57 times>, 
          add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 0, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, path_vec = {s = 0x0, len = 0}, 
          instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0, 0, 0}, 
                    addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0, 0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 
                      0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, 
                    sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, 
                    sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, 
                bind_address = 0x0, proto = 0 '\000'}}}}
        msg = 0xbfab7178
        ra_ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {-1525164112, -1227359856, -1079282976, -1079283672, -1770382054, -827108235}, __mask_was_saved = 0, __saved_mask = {
                __val = {3215683976, 3045741472, 3063305636, 544, 3215684288, 3059949576, 2779660224, 2779665395, 129, 3046232728, 0, 3215689468, 3215683944, 136838447, 3059949576, 3063305672, 138083373, 
                  138084317, 213, 3077899005, 3046232728, 136883713, 3215685216, 0, 100, 0, 21, 129, 3215683976, 136875280, 3215684288, 3077898773}}}}}
        __FUNCTION__ = "xhttp_process_request"
#22 0xa5175b68 in xhttp_handler (msg=0xb6d7f828) at xhttp_mod.c:357
        ret = 0
        fake_msg = 0xb6965650 "GET / HTTP/1.1\r\nVia: SIP/2.0/TLS x.x.x.x:31366\r\nHost: test.dummy.ok:8443\r\nConnection: upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok"...
        fake_msg_len = 584
        pmatch = {rm_so = 0, rm_eo = 0}
        c = 32 ' '
        __FUNCTION__ = "xhttp_handler"
#23 0x081283de in nonsip_msg_run_hooks (msg=0xb6d7f828) at nonsip_hooks.c:111
        r = 1
        ret = 1
#24 0x08150a47 in receive_msg (
    buf=0xa054a28 "GET / HTTP/1.1\r\nHost: test.dummy.ok:8443\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok\r\nSec-WebSocket-Version: 13\r\nUser-Agent:"..., len=544, rcv_info=0xa5aedca4) at receive.c:189
        msg = 0xb6d7f828
        ctx = {rec_lev = 5333888, run_flags = 4, last_retcode = 119, jmp_env = {{__jmpbuf = {-1238976092, 89, -1079281576, 135028043, 0, -1243844620}, __mask_was_saved = 0, __saved_mask = {__val = {0, 32, 
                  3077898773, 3053375928, 136744621, 3215685780, 0, 28, 136726975, 5, 0, 92, 3059949576, 3059949576, 213, 3077202798, 3053359487, 3059949576, 3215685780, 3063306712, 3055991204, 3055962697, 
                  16777216, 11526868, 4540512, 8193, 65560, 121, 65536, 3078045309, 3078198264, 3078045004}}}}}
        ret = -1216774156
        inb = {
          s = 0xa054a28 "GET / HTTP/1.1\r\nHost: test.dummy.ok:8443\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok\r\nSec-WebSocket-Version: 13\r\nUser-Agent:"..., len = 544}
        netinfo = {data = {s = 0xb5dc6ff4 "\310Y\033", len = 10}, dst = 0x1000000, rcv = 0xafe31c}
        __FUNCTION__ = "receive_msg"
#25 0x082395df in receive_tcp_msg (
    tcpbuf=0xa5aede60 "GET / HTTP/1.1\r\nHost: test.dummy.ok:8443\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok\r\nSec-WebSocket-Version: 13\r\nUser-Agent:"..., len=544, rcv_info=0xa5aedca4, con=0xa5aedc90) at tcp_read.c:1279
        buf = 0xa054a28 "GET / HTTP/1.1\r\nHost: test.dummy.ok:8443\r\nConnection: Upgrade\r\nPragma: no-cache\r\nCache-Control: no-cache\r\nUpgrade: websocket\r\nOrigin: https://web.service.dummy.ok\r\nSec-WebSocket-Version: 13\r\nUser-Agent:"...
        bsize = 65535
        blen = 65535
        __FUNCTION__ = "receive_tcp_msg"
#26 0x0823b42f in tcp_read_req (con=0xa5aedc90, bytes_read=0xbfab7f24, read_flags=0xbfab7f1c) at tcp_read.c:1447
        bytes = 544
        total_bytes = 544
        resp = 1
        size = 0
        req = 0xa5aedd04
        dst = {send_sock = 0x2001, to = {s = {sa_family = 54276, sa_data = "\264\266 at 74\245\001\000\000\000\020\000\000"}, sin = {sin_family = 54276, sin_port = 46772, sin_addr = {s_addr = 2771662656}, 
              sin_zero = "\001\000\000\000\020\000\000"}, sin6 = {sin6_family = 54276, sin6_port = 46772, sin6_flowinfo = 2771662656, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\001\000\000\000\020\000\000\000\001\000\000\000\001\000\000", __u6_addr16 = {1, 0, 16, 0, 1, 0, 1, 0}, __u6_addr32 = {1, 16, 1, 1}}}, sin6_scope_id = 16}}, id = -1079279848, 
          proto = 4 '\004', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        c = 0 '\000'
        ret = 0
        __FUNCTION__ = "tcp_read_req"
#27 0x0823ecf8 in handle_io (fm=0xb6b4d404, events=1, idx=-1) at tcp_read.c:1679
        ret = 0
        n = 0
        read_flags = 1
        con = 0xa5aedc90
        s = 16
        resp = 1
        t = 1478278877
        __FUNCTION__ = "handle_io"
#28 0x08230b80 in io_wait_loop_epoll (h=0x8452f40, t=2, repeat=0) at io_wait.h:1065
        n = 1
        r = 0
        fm = 0xb6b4d404
        revents = 1
        __FUNCTION__ = "io_wait_loop_epoll"
#29 0x0823ffca in tcp_receive_loop (unix_sock=66) at tcp_read.c:1791
        __FUNCTION__ = "tcp_receive_loop"
#30 0x0822776c in tcp_init_children () at tcp_main.c:4796
        r = 0
        i = -1
        reader_fd_1 = 66
        pid = 0
        si_desc = "tcp receiver (tls:y.y.y.y:8443)\000\000\000\001\000\000\000\000\000\000\000\252\066\000\000\000\000\000\000\000\000\000\000\340\062\064\245\241o`\r8\202\253\277\372\205$\b\377\377\377\377\263\362\071\b\001\000\000\000a\200$\b\000\000\000\000\001\000\000\000hu4\b\241o`\r\263\066\000\000(\000\000\000\070\202\253\277\004\000\000\000\304\323\000?"
        si = 0x0
        __FUNCTION__ = "tcp_init_children"
#31 0x080f00e7 in main_loop () at main.c:1704
        i = 4
        pid = 13993
        si = 0x0
        si_desc = "udp receiver child=3 sock=y.y.y.y:5080\000\062\064\245\001\000\000\000\001\000\000\000\364\237\342\265\000\260\063\245\016\020\000\000\250\370~\245\250\370~\245\000\000\000\000`\310\342\265\364o\334\265\001\000\000\000\000\000\000\000\374\206\253\277H\204\253\277\377\241&\b\324\253\231\266\367\001>\265\235\346\065\b\350\367\065\bn\000\000"
        nrprocs = 4
        woneinit = 1
        __FUNCTION__ = "main_loop"
#32 0x080f679b in main (argc=13, argv=0xbfab8874) at main.c:2631
        cfg_stream = 0x9ab5008
        c = -1
        r = 0
        tmp = 0xbfab9908 ""
        tmp_len = 1
        port = 0
        proto = 0
        options = 0x8354d18 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:"
        ret = -1
        seed = 2660914305
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0xbfab87a0
        p = 0x805ce5c "[\201\303\264\202;"
        st = {st_dev = 15, __pad1 = 0, st_ino = 12628, st_mode = 16832, st_nlink = 2, st_uid = 0, st_gid = 0, st_rdev = 0, __pad2 = 0, st_size = 60, st_blksize = 4096, st_blocks = 0, st_atim = {
        n = 1
        r = 0
        fm = 0xb6b4d404
        revents = 1
        __FUNCTION__ = "io_wait_loop_epoll"
#29 0x0823ffca in tcp_receive_loop (unix_sock=66) at tcp_read.c:1791
        __FUNCTION__ = "tcp_receive_loop"
#30 0x0822776c in tcp_init_children () at tcp_main.c:4796
        r = 0
        i = -1
        reader_fd_1 = 66
        pid = 0
        si_desc = "tcp receiver (tls:y.y.y.y:8443)\000\000\000\001\000\000\000\000\000\000\000\252\066\000\000\000\000\000\000\000\000\000\000\340\062\064\245\241o`\r8\202\253\277\372\205$\b\377\377\377\377\263\362\071\b\001\000\000\000a\200$\b\000\000\000\000\001\000\000\000hu4\b\241o`\r\263\066\000\000(\000\000\000\070\202\253\277\004\000\000\000\304\323\000?"
        si = 0x0
        __FUNCTION__ = "tcp_init_children"
#31 0x080f00e7 in main_loop () at main.c:1704
        i = 4
        pid = 13993
        si = 0x0
        si_desc = "udp receiver child=3 sock=y.y.y.y:5080\000\062\064\245\001\000\000\000\001\000\000\000\364\237\342\265\000\260\063\245\016\020\000\000\250\370~\245\250\370~\245\000\000\000\000`\310\342\265\364o\334\265\001\000\000\000\000\000\000\000\374\206\253\277H\204\253\277\377\241&\b\324\253\231\266\367\001>\265\235\346\065\b\350\367\065\bn\000\000"
        nrprocs = 4
        woneinit = 1
        __FUNCTION__ = "main_loop"
#32 0x080f679b in main (argc=13, argv=0xbfab8874) at main.c:2631
        cfg_stream = 0x9ab5008
        c = -1
        r = 0
        tmp = 0xbfab9908 ""
        tmp_len = 1
        port = 0
        proto = 0
        options = 0x8354d18 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:"
        ret = -1
        seed = 2660914305
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0xbfab87a0
        p = 0x805ce5c "[\201\303\264\202;"
        st = {st_dev = 15, __pad1 = 0, st_ino = 12628, st_mode = 16832, st_nlink = 2, st_uid = 0, st_gid = 0, st_rdev = 0, __pad2 = 0, st_size = 60, st_blksize = 4096, st_blocks = 0, st_atim = {
---Type <return> to continue, or q <return> to quit---
            tv_sec = 1506010457, tv_nsec = 983334802}, st_mtim = {tv_sec = 1508597914, tv_nsec = 354506842}, st_ctim = {tv_sec = 1508598507, tv_nsec = 860710419}, __unused4 = 0, __unused5 = 0}
        __FUNCTION__ = "main"


(gdb) info locals
__FUNCTION__ = "dlg_cseq_prepare_msg"

(gdb) list
76	
77		if(msg->first_line.type==SIP_REPLY) {
78			/* reply to local transaction -- nothing to do */
79			if (parse_headers(msg, HDR_VIA2_F, 0)==-1
80					|| (msg->via2==0) || (msg->via2->error!=PARSE_OK)) {
81				if(get_cseq(msg)->method_id != METHOD_CANCEL) {
82					LM_DBG("no second via in this message \n");
83					return 3;
84				}
85			}

```

#### Log Messages

<!--
Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->

```
Oct 21 15:08:30 webrtc-as webrtc[14045]: INFO: tls [tls_server.c:420]: tls_accept(): tls_accept: new connection from x.x.x.x:aaaaa using TLSv1/SSLv3 AES256-GCM-SHA384 256 
Oct 21 15:08:30 webrtc-as webrtc[14045]: INFO: tls [tls_server.c:423]: tls_accept(): tls_accept: local socket: y.y.y.y:bbbb 
Oct 21 15:08:30 webrtc-as webrtc[14045]: INFO: tls [tls_server.c:434]: tls_accept(): tls_accept: client did not present a certificate 
Oct 21 15:08:30 webrtc-as kernel: [2587094.669038] kamailio[14045] segfault at 18 ip b58a41a6 sp bfaa2970 error 4 in dialog.so[b5885000+98000] 
Oct 21 15:08:31 webrtc-as webrtc[14077]: CRITICAL: <core> [pass_fd.c:277]: receive_fd(): EOF on 63 
Oct 21 15:08:31 webrtc-as webrtc[13959]: ALERT: <core> [main.c:740]: handle_sigs(): child process 14045 exited by a signal 11 
Oct 21 15:08:31 webrtc-as webrtc[13959]: ALERT: <core> [main.c:743]: handle_sigs(): core was generated 
Oct 21 15:08:31 webrtc-as webrtc[13959]: INFO: <core> [main.c:755]: handle_sigs(): terminating due to SIGCHLD 
Oct 21 15:08:31 webrtc-as webrtc[14076]: INFO: <core> [main.c:810]: sig_usr(): signal 15 received 
Oct 21 15:08:31 webrtc-as webrtc[14075]: INFO: <core> [main.c:810]: sig_usr(): signal 15 received 
Oct 21 15:08:31 webrtc-as webrtc[13961]: INFO: <core> [main.c:810]: sig_usr(): signal 15 received 
Oct 21 15:08:31 webrtc-as webrtc[14069]: INFO: <core> [main.c:810]: sig_usr(): signal 15 received 
Oct 21 15:08:31 webrtc-as webrtc[13962]: INFO: <core> [main.c:810]: sig_usr(): signal 15 received 
...
```

#### SIP Traffic

<!--
If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->

```
Not Available - Kamailio crash upon HTTP WS Upgrade.
```

### Possible Solutions

<!--
If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix.
-->

In kamailio/modules/dialog/dlg_cseq.c commenting out IF condition at line 81, then rebuilding kamailio binary seems to fix the problem, i.e.

```
    if(msg->first_line.type==SIP_REPLY) {
        /* reply to local transaction -- nothing to do */
        if (parse_headers(msg, HDR_VIA2_F, 0)==-1
                || (msg->via2==0) || (msg->via2->error!=PARSE_OK)) {
===>      //if(get_cseq(msg)->method_id != METHOD_CANCEL) {
                LM_DBG("no second via in this message \n");
                return 3;
===>      //}
        }
    }
```

### Additional Information

  * **Kamailio Version** - output of `kamailio -v`

```
version: kamailio 4.4.6 (i386/linux) becbde
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: becbde -dirty
compiled on 15:01:17 Oct 21 2017 with gcc 4.7.2
```

* **Operating System**:

<!--
Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...;
Kernel details (output of `uname -a`)
-->

```
Linux webrtc-as 3.16.0-0.bpo.4-686-pae #1 SMP Debian 3.16.36-1+deb8u2~bpo70+1 (2016-10-19) i686 GNU/Linux
```


-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1277
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-dev/attachments/20171021/6149d882/attachment-0001.html>


More information about the sr-dev mailing list