[sr-dev] [kamailio/kamailio] Issues with PUA_REGINFO module (#1579)

Lars Olsson notifications at github.com
Mon Jul 2 16:43:47 CEST 2018


`Core was generated by `/usr/local/sbin/kamailio -f /root/kamailio-test.cfg'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007fe975560399 in release_urecord (_r=0x7fe96deb2430) at urecord.c:555
555			mem_delete_urecord(_r->slot->d, _r);
(gdb) bt full
#0  0x00007fe975560399 in release_urecord (_r=0x7fe96deb2430) at urecord.c:555
No locals.
#1  0x00007fe971e5619e in process_body (notify_body=..., domain=0x7fe96dea0ed8) at notify.c:461
        doc = 0xf4b110
        doc_root = 0xf4b4a0
        registrations = 0xf4b860
        contacts = 0x0
        uris = 0x0
        params = 0x0
        uri = "\320\063\r\301\376\177\000\000\370rWg\000\000\000\000\020\203A\000\004\000\000\000\240\267~", '\000' <repeats 21 times>, "\260\064\r\301\376\177\000\000\f\323l\000\000\000\000\000\250\026\f\000\000\000\000\000\b\000\000\000\000\000\000\000\017\000\000\000\000\000\000\000\020@\256v\351\177\000\000\000\064\r\301\376\177\000\000\300V\272v\351\177\000\000&\240\244\000\000\000\000\000\203\236\244\000\000\000\000\000\260\064\r\301\376\177\000\000\222]g\000\000\000\000\000\212\001\000\000\376\177\000\000\253ag", '\000' <repeats 21 times>, "\240\267~\000\000\000\000\000) IN@\001\000\000\270\347~\000\000\000\000\000"...
        aor_key = {s = 0x7ffec10d3370 "\320\063\r\301\376\177", len = 6}
        aor = {s = 0xf33660 "sip:1000 at mnc001.mcc001.3gppnetwork.org", len = 38}
        callid = {s = 0x0, len = 0}
        contact = {s = 0x0, len = 0}
        contact_uri = {s = 0x0, len = 0}
        contact_params = {s = 0x0, len = 0}
        param = {s = 0x0, len = 0}
        received = {s = 0x0, len = 0}
        path = {s = 0x0, len = 0}
        user_agent = {s = 0x0, len = 0}
        state = 0
        event = 0
        expires = 10788902
        result = 0
        final_result = 2
        expires_char = 0x0
        cseq_char = 0x7fe975c56495 "sl: sl.c"
        cseq = 0
        len = 4293392
        ul_record = 0x7fe96deb2430
        ul_contact = 0x0
        parsed_aor = {user = {s = 0xf33664 "1000 at mnc001.mcc001.3gppnetwork.org", len = 4}, passwd = {s = 0x0, len = 0}, host = {s = 0xf33669 "mnc001.mcc001.3gppnetwork.org", len = 29}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, 
          sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, 
            len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {
            s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        mem_only = 1
        __FUNCTION__ = "process_body"
#2  0x00007fe971e56f51 in reginfo_handle_notify (msg=0x7fe976ba48e8, domain=0x7fe96dea0ed8 "\330\r\352m\351\177", s2=0x0) at notify.c:501
        body = {
          s = 0xa49e9c <buf+412> "<?xml version=\"1.0\"?>\r\n<reginfo xmlns=\"urn:ietf:params:xml:ns:reginfo\" version=\"3\" state=\"full\">\r\n<registration aor=\"sip:1000 at mnc001.mcc001.3gppnetwork.org\" id=\"0x7feff71118f8\" state=\"terminated\">\r\n<c"..., len = 394}
        result = 1
        __FUNCTION__ = "reginfo_handle_notify"
#3  0x000000000047bfee in do_action (h=0x7ffec10d53c0, a=0x7fe976b8ba90, msg=0x7fe976ba48e8) at core/action.c:1073
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, 
---Type <return> to continue, or q <return> to quit---
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0, 
            blst_imask = 0}}
        tmp = 0x7ffec10d53c0 "\004"
        new_uri = 0x0
        end = 0x0
        crt = 0x7fe976ba48e8 "\001"
        cmd = 0x7fe976b86fc8
        len = 32766
        user = -1056095264
        uri = {user = {s = 0x0, len = 300666880}, passwd = {s = 0x0, len = 1733784312}, host = {s = 0x418310 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\060\217t", len = -1056088512}, port = {s = 0x0, len = 0}, params = {
            s = 0x7ffec10d3c80 "\220=\r\301\376\177", len = 4753009}, sip_params = {s = 0x7ffec10d4050 "pushas.mnc001.mcc001.3gppnetwork.org", len = 0}, headers = {s = 0x6d2e736168737570 <error: Cannot access memory at address 0x6d2e736168737570>, 
            len = 808477550}, port_no = 12387, proto = 12592, type = 1885811502, flags = (unknown: 1991919848), transport = {s = 0x7fe976b8aee0 "c", len = -1056097104}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {
            s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, method = {s = 0x0, len = 1733784312}, lr = {s = 0x418310 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\060\217t", len = -1056088512}, r2 = {
            s = 0x0, len = 0}, gr = {s = 0x7ffec10d3d90 "\200>\r\301\376\177", len = 4754710}, transport_val = {s = 0x0, len = 1991919848}, ttl_val = {s = 0x7fe976b8aee0 "c", len = -1056091200}, user_param_val = {s = 0x0, len = 1}, maddr_val = {
            s = 0x675772f8 <error: Cannot access memory at address 0x675772f8>, len = 1671370636}, method_val = {s = 0x418310 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\060\217t", len = -1056088512}, lr_val = {s = 0x0, len = 0}, 
          r2_val = {s = 0x87e41b8d6d5f178c <error: Cannot access memory at address 0x87e41b8d6d5f178c>, len = 482416524}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x1ffffffff <error: Cannot access memory at address 0x1ffffffff>, len = 15906160}, passwd = {s = 0xa <error: Cannot access memory at address 0xa>, len = 2003418427}, host = {s = 0x7ffec10d3b8f "", 
            len = -1056097296}, port = {s = 0x3 <error: Cannot access memory at address 0x3>, len = -1}, params = {s = 0x0, len = -1056097296}, sip_params = {s = 0x26 <error: Cannot access memory at address 0x26>, len = -1056097296}, headers = {
            s = 0x402 <error: Cannot access memory at address 0x402>, len = 11238720}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 2003422408), transport = {
            s = 0x673616873757006 <error: Cannot access memory at address 0x673616873757006>, len = 811822701}, ttl = {s = 0x67330b3130306363 <error: Cannot access memory at address 0x67330b3130306363>, len = 1701736560}, user_param = {
            s = 0x7fe976b80de0 "H\306\353t\351\177", len = 2000597655}, maddr = {s = 0x0, len = -1056097488}, method = {s = 0xf2b570 "127.0.0.1 via TCP/IP", len = -1056097504}, lr = {s = 0x0, len = 0}, r2 = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = -1056097481}, gr = {s = 0x7ffec10d3b18 "", len = -1056097520}, transport_val = {s = 0x237a8c0 <error: Cannot access memory at address 0x237a8c0>, len = 0}, ttl_val = {s = 0x0, 
            len = 0}, user_param_val = {s = 0x4e45202d2d2d2023 <error: Cannot access memory at address 0x4e45202d2d2d2023>, len = 1448091716}, maddr_val = {s = 0xa322e3535000a2d <error: Cannot access memory at address 0xa322e3535000a2d>, 
            len = 1952804352}, method_val = {s = 0xa67726f2e <error: Cannot access memory at address 0xa67726f2e>, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        u = 0x7fe976b8a5e0
        port = 0
        dst_host = 0x0
        i = -1
        flags = 32745
        avp = 0x3
        st = {flags = 15906160, id = 0, name = {n = 10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len = 0}, re = 0xa}, avp = 0x7fe9773598a7 <__GI__IO_file_read+23>}
        sct = 0x0
        sjt = 0x0
        rve = 0x7ffec10d3fef
        mct = 0x0
        rv = 0x0
        rv1 = 0x7ffec10d4050
        c1 = {cache_type = 368693280, val_type = RV_NONE, c = {avp_val = {n = 1528123860, s = {s = 0x5b1551d4 <error: Cannot access memory at address 0x5b1551d4>, len = 531751811}, re = 0x5b1551d4}, pval = {rs = {
                s = 0x5b1551d4 <error: Cannot access memory at address 0x5b1551d4>, len = 531751811}, ri = 1528123860, flags = 0}}, i2s = "\203\343\261\037", '\000' <repeats 17 times>}
        s = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 1530459981}
        srevp = {0x63, 0x1000}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}}
        __FUNCTION__ = "do_action"
#4  0x0000000000488671 in run_actions (h=0x7ffec10d53c0, a=0x7fe976b8b280, msg=0x7fe976ba48e8) at core/action.c:1565
---Type <return> to continue, or q <return> to quit---
        t = 0x7fe976b8ba90
        ret = 1
        mod = 0x0
        ms = 0
        __FUNCTION__ = "run_actions"
#5  0x000000000047bed5 in do_action (h=0x7ffec10d53c0, a=0x7fe976b8c118, msg=0x7fe976ba48e8) at core/action.c:1058
        ret = 1
        v = 1
        dst = {send_sock = 0xf4b9fc, to = {s = {sa_family = 47612, sa_data = "\364\000\000\000\000\000\230\271\364\000\000\000\000"}, sin = {sin_family = 47612, sin_port = 244, sin_addr = {s_addr = 0}, sin_zero = "\230\271\364\000\000\000\000"}, 
            sin6 = {sin6_family = 47612, sin6_port = 244, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\230\271\364\000\000\000\000\000\240\271\364\000\000\000\000", __u6_addr16 = {47512, 244, 0, 0, 47520, 244, 0, 0}, __u6_addr32 = {
                    16038296, 0, 16038304, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 4587, blst_imask = 14932}}
        tmp = 0x7fe9766d05da ""
        new_uri = 0x7465737261686300 <error: Cannot access memory at address 0x7465737261686300>
        end = 0x7374657372616800 <error: Cannot access memory at address 0x7374657372616800>
        crt = 0x7fe9766d05d2 "%x%c%x%c"
        cmd = 0x0
        len = 32766
        user = -1056093360
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, passwd = {s = 0x770000006f <error: Cannot access memory at address 0x770000006f>, len = 0}, host = {s = 0x7c <error: Cannot access memory at address 0x7c>, 
            len = 4088}, port = {s = 0x0, len = 2003346976}, params = {s = 0xff8 <error: Cannot access memory at address 0xff8>, len = 4088}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 2000031776}, port_no = 17104, proto = 49421, 
          type = 32766, flags = (unknown: 16042512), transport = {s = 0xc <error: Cannot access memory at address 0xc>, len = -1056094832}, ttl = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 0}, user_param = {
            s = 0x7fe976ba30f8 "", len = 1991919848}, maddr = {s = 0x7ffec10d4570 "", len = 1991913720}, method = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 1733784312}, lr = {
            s = 0x418310 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\060\217t", len = -1056088512}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7ffec10d4910 "\300I\r\301\376\177", len = 4702190}, transport_val = {s = 0x0, 
            len = 2009902352}, ttl_val = {s = 0x7ffec10d4370 "", len = 1933597149}, user_param_val = {s = 0x70c055ab <error: Cannot access memory at address 0x70c055ab>, len = 1991919848}, maddr_val = {s = 0x7fe976b88d30 "U", len = -1056093712}, 
          method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 1933598680}, gr_val = {s = 0x0, len = 2005549464}}
        next_hop = {user = {s = 0x22000 <error: Cannot access memory at address 0x22000>, len = 136684}, passwd = {s = 0x215ec <error: Cannot access memory at address 0x215ec>, len = 0}, host = {
            s = 0x5 <error: Cannot access memory at address 0x5>, len = 2232320}, port = {s = 0x223000 <error: Cannot access memory at address 0x223000>, len = 2236928}, params = {s = 0x222208 <error: Cannot access memory at address 0x222208>, 
            len = 135168}, sip_params = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 2000007838}, headers = {s = 0x7ffec10d4720 "", len = -1056094448}, port_no = 1139, proto = 30570, type = 32745, flags = (unknown: 2003436664), 
          transport = {s = 0x0, len = 1999826793}, ttl = {s = 0xc <error: Cannot access memory at address 0xc>, len = 2007711308}, user_param = {s = 0x7ffec10d42a0 "\320B\r\301\376\177", len = -1340356096}, maddr = {s = 0x0, len = 1}, method = {
            s = 0x7fe977ccd770 "H\327\314w\351\177", len = 2007713726}, lr = {s = 0x7ffec10d4270 "\370\017", len = -1056095808}, r2 = {s = 0x7ffec11ae1a8 "", len = -1055202856}, gr = {s = 0x7ffec10d42d0 "\370\060\272v\351\177", len = 2003346976}, 
          transport_val = {s = 0x1000 <error: Cannot access memory at address 0x1000>, len = 4088}, ttl_val = {s = 0x0, len = 4088}, user_param_val = {s = 0x0, len = 2000023192}, maddr_val = {
            s = 0x7ffe00000100 <error: Cannot access memory at address 0x7ffe00000100>, len = 4128}, method_val = {s = 0x40 <error: Cannot access memory at address 0x40>, len = 112}, lr_val = {
            s = 0x100 <error: Cannot access memory at address 0x100>, len = 4128}, r2_val = {s = 0x40 <error: Cannot access memory at address 0x40>, len = 112}, gr_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 99}}
        u = 0x7ffec10d4b60
        port = 0
        dst_host = 0x0
        i = -1056094864
        flags = 0
        avp = 0xf4b9fc
        st = {flags = 47, id = 0, name = {n = 2007719113, s = {s = 0x7fe977ab5cc9 <_dl_new_object+761> "\353\b\017\037D", len = 75}, re = 0x7fe977ab5cc9 <_dl_new_object+761>}, avp = 0x4d0}
        sct = 0x0
        sjt = 0x7fe9733ffbee <my_parse_charset_xml+142>
        rve = 0x7fe976b8a5e0
        mct = 0x5bcc
        rv = 0x24
        rv1 = 0xf4b9fc
        c1 = {cache_type = 2187264, val_type = RV_NONE, c = {avp_val = {n = 11246912, s = {s = 0xab9d40 <rec_name> "ns.mnc001.mcc001.3gppnetwork.org", len = 1752397168}, re = 0xab9d40 <rec_name>}, pval = {rs = {
                s = 0xab9d40 <rec_name> "ns.mnc001.mcc001.3gppnetwork.org", len = 1752397168}, ri = 808477550, flags = 1668099633}}, i2s = "c001.3gppnetwork.org\000"}
        s = {s = 0xab7d40 <buff> "0\"\205\200", len = 2003409083}
---Type <return> to continue, or q <return> to quit---
        srevp = {0x7ffec10d4050, 0x7ffec10d4740}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}}
        __FUNCTION__ = "do_action"
#6  0x0000000000488671 in run_actions (h=0x7ffec10d53c0, a=0x7fe976b8c118, msg=0x7fe976ba48e8) at core/action.c:1565
        t = 0x7fe976b8c118
        ret = -1
        mod = 0x7fe97732ef69 <_IO_vfprintf_internal+15785>
        ms = 0
        __FUNCTION__ = "run_actions"
#7  0x0000000000478a88 in do_action (h=0x7ffec10d53c0, a=0x7fe976b897f0, msg=0x7fe976ba48e8) at core/action.c:691
        ret = -5
        v = 32
        dst = {send_sock = 0x7fe9761958a8, to = {s = {sa_family = 1490, sa_data = "mv\351\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 1490, sin_port = 30317, sin_addr = {s_addr = 32745}, 
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 1490, sin6_port = 30317, sin6_flowinfo = 32745, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\016\000\000\000\377\377\377\377", __u6_addr16 = {
                    0, 0, 0, 0, 14, 0, 65535, 65535}, __u6_addr32 = {0, 0, 14, 4294967295}}}, sin6_scope_id = 1986856410}}, id = 32745, proto = 0 '\000', send_flags = {f = 0, blst_imask = 0}}
        tmp = 0x7ffec10d53c0 "\004"
        new_uri = 0x7fe976ae3385 <_kex_sruid+5> "5b3a378e-4102-"
        end = 0x0
        crt = 0x7fe976ba48e8 "\001"
        cmd = 0x0
        len = 32766
        user = -1056091872
        uri = {user = {s = 0x2e <error: Cannot access memory at address 0x2e>, len = 2007789952}, passwd = {s = 0x7ffec10d4ef0 "\322\005mv\351\177", len = 1733784312}, host = {
            s = 0x418310 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\060\217t", len = -1056088512}, port = {s = 0x0, len = 0}, params = {s = 0x7ffec10d49c0 "\320J\r\301\376\177", len = 4753009}, sip_params = {
            s = 0x7fe9766d05d2 "%x%c%x%c", len = 1986856410}, headers = {s = 0x0, len = 1999826793}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 1991919848), transport = {s = 0x7fe976b88d30 "U", len = -1056093712}, ttl = {
            s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 1999833443}, user_param = {s = 0x68737570 <error: Cannot access memory at address 0x68737570>, len = 1999833498}, maddr = {
            s = 0x1c10d4a70 <error: Cannot access memory at address 0x1c10d4a70>, len = 0}, method = {s = 0x0, len = 1733784312}, lr = {s = 0x418310 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\060\217t", len = -1056088512}, r2 = {
            s = 0x0, len = 0}, gr = {s = 0x7ffec10d4ad0 "\300K\r\301\376\177", len = 4754710}, transport_val = {s = 0x0, len = 1991919848}, ttl_val = {s = 0x7fe976b88d30 "U", len = -1056091200}, user_param_val = {s = 0x0, len = 1}, maddr_val = {
            s = 0x675772f8 <error: Cannot access memory at address 0x675772f8>, len = -1994451060}, method_val = {s = 0x418310 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\060\217t", len = -1056088512}, lr_val = {s = 0x0, len = 0}, 
          r2_val = {s = 0x87e41b8d88df178c <error: Cannot access memory at address 0x87e41b8d88df178c>, len = 482416524}, gr_val = {s = 0x7fe900000000 <error: Cannot access memory at address 0x7fe900000000>, len = 1999833498}}
        next_hop = {user = {s = 0x1766d05da <error: Cannot access memory at address 0x1766d05da>, len = 1829122352}, passwd = {s = 0x656e707067330b31 <error: Cannot access memory at address 0x656e707067330b31>, len = 1919907700}, host = {
            s = 0x7fe976195b18 "s", len = 0}, port = {s = 0x0, len = 24}, params = {s = 0x7ffec10d4e30 "\032", len = -1056092816}, sip_params = {s = 0x7ffec10d4e40 "\205\ryu\351\177", len = -1056092800}, headers = {s = 0x0, len = 2009902352}, 
          port_no = 65535, proto = 65535, type = 4294967295, flags = (unknown: 0), transport = {s = 0xa5b50f0b <error: Cannot access memory at address 0xa5b50f0b>, len = 2003376174}, ttl = {
            s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -958486955}, user_param = {s = 0x7fe976b80d70 ">\306\353t\351\177", len = 2003343200}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 2003364960}, lr = {
            s = 0x0, len = 0}, r2 = {s = 0x0, len = 1999855287}, gr = {s = 0x7ffec10d4e50 "\001\200\255\373\351\177", len = -1056092608}, transport_val = {s = 0x7fe9766d05d2 "%x%c%x%c", len = 1986856410}, ttl_val = {s = 0x0, len = 1999826793}, 
          user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 49}, maddr_val = {s = 0x7ffec10d49d0 "", len = 91}, method_val = {s = 0x0, len = 0}, lr_val = {
            s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, len = 0}, r2_val = {s = 0x7ffec10d49a0 "\020\203A", len = 0}, gr_val = {s = 0x7ffec10d4740 "\031[\031v\351\177", len = 2003346976}}
        u = 0x7fe976b88f68
        port = 0
        dst_host = 0x0
        i = 1
        flags = 1937076230
        avp = 0x7fe900000000
        st = {flags = 0, id = 0, name = {n = 1981373200, s = {s = 0x7fe976195b10 "%c%d@%.*s", len = 0}, re = 0x7fe976195b10}, avp = 0x7fe900000014}
---Type <return> to continue, or q <return> to quit---
        sct = 0x7ffec10d5160
        sjt = 0x3000000018
        rve = 0x20
        mct = 0x0
        rv = 0x7fe97733099a <_IO_vfprintf_internal+22490>
        rv1 = 0x0
        c1 = {cache_type = 1999833498, val_type = 32745, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 2}}, 
          i2s = "\377\377\377\377\377\377\377\377\r\000\000\000\351\177\000\000\377\377\377\377\377\377"}
        s = {s = 0x7ffe00000000 <error: Cannot access memory at address 0x7ffe00000000>, len = 1999833498}
        srevp = {0x7ffe00000000, 0x33ca3a5400000000}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}}
        __FUNCTION__ = "do_action"
#8  0x0000000000488671 in run_actions (h=0x7ffec10d53c0, a=0x7fe976b897f0, msg=0x7fe976ba48e8) at core/action.c:1565
        t = 0x7fe976b897f0
        ret = -1
        mod = 0x3000000030
        ms = 0
        __FUNCTION__ = "run_actions"
#9  0x000000000047bed5 in do_action (h=0x7ffec10d53c0, a=0x7fe976b89a28, msg=0x7fe976ba48e8) at core/action.c:1058
        ret = 1
        v = 1
        dst = {send_sock = 0x7fe976b8cd98, to = {s = {sa_family = 62928, sa_data = "\313w\351\177\000\000PR\r\301\376\177\000"}, sin = {sin_family = 62928, sin_port = 30667, sin_addr = {s_addr = 32745}, sin_zero = "PR\r\301\376\177\000"}, sin6 = {
              sin6_family = 62928, sin6_port = 30667, sin6_flowinfo = 32745, sin6_addr = {__in6_u = {__u6_addr8 = "PR\r\301\376\177\000\000\b\325\314w\351\177\000", __u6_addr16 = {21072, 49421, 32766, 0, 54536, 30668, 32745, 0}, __u6_addr32 = {
                    3238875728, 32766, 2009912584, 32745}}}, sin6_scope_id = 3238875768}}, id = 32766, proto = -80 '\260', send_flags = {f = 30668, blst_imask = 32745}}
        tmp = 0x7fe976b89a28 "Y"
        new_uri = 0x74bc8 <error: Cannot access memory at address 0x74bc8>
        end = 0x73ee98 <yyparse+45891> "H\205\300u\034H\213\005\244\241\060"
        crt = 0x7ffec10d53d0 "\370rWg"
        cmd = 0x7fe9772ee920
        len = 32745
        user = 2007758101
        uri = {user = {s = 0x7ffec10d4fd0 "", len = 1989012073}, passwd = {s = 0x850000007c <error: Cannot access memory at address 0x850000007c>, len = 0}, host = {s = 0x800000 "variable already exists: %s.%s\n", len = 7599272}, port = {
            s = 0x4000747c0 <error: Cannot access memory at address 0x4000747c0>, len = 8285792}, params = {s = 0xc0b58 <error: Cannot access memory at address 0xc0b58>, len = 8}, sip_params = {s = 0x7ffec10d50b0 "", len = 7061415}, headers = {
            s = 0x7ffec10d5000 "\200\314\270v\351\177", len = 6198293}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 8197712), transport = {s = 0x7ffec10d50b0 "", len = 6774162}, ttl = {s = 0x7fe976b8cc80 "\001", 
            len = 1991822800}, user_param = {s = 0x7ffec10d5102 "\r\301\376\177", len = -1056091901}, maddr = {s = 0xa4a026 <buf+806> "", len = 10788162}, method = {s = 0x7eb740 <__FUNCTION__.6644> "parse_via", len = 2007711308}, lr = {
            s = 0x40 <error: Cannot access memory at address 0x40>, len = -1472036457}, r2 = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 5}, gr = {s = 0x7fe977cbf578 "\260\321\314w\351\177", len = 2007713726}, transport_val = {
            s = 0x5b839f8191d4a04 <error: Cannot access memory at address 0x5b839f8191d4a04>, len = -1056091984}, ttl_val = {s = 0x7fe9772e8d28 "", len = 1999563040}, user_param_val = {s = 0x7ffec10d51c0 " \351.w\351\177", len = 44108294}, 
          maddr_val = {s = 0x7ffec10d51b0 "\377\377\377\377", len = 4}, method_val = {s = 0x0, len = 2009855440}, lr_val = {s = 0x7fe977cbf000 "", len = 4254684}, r2_val = {s = 0x7fe9772f5d78 "", len = 4209792}, gr_val = {
            s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = 981}}
        next_hop = {user = {s = 0x737361705f657669 <error: Cannot access memory at address 0x737361705f657669>, len = 1685221239}, passwd = {s = 0x3230313461336235 <error: Cannot access memory at address 0x3230313461336235>, len = -1056092592}, 
          host = {s = 0x7fe975790d85 <_ul_sruid+5> "5b3a378e-4102-", len = -1056092592}, port = {s = 0x7fe9766d05d2 "%x%c%x%c", len = -1056092232}, params = {s = 0x1a <error: Cannot access memory at address 0x1a>, len = 0}, sip_params = {
            s = 0x7fe975790d85 <_ul_sruid+5> "5b3a378e-4102-", len = 1999991817}, headers = {s = 0x7fe9fbad8001 <error: Cannot access memory at address 0x7fe9fbad8001>, len = 1970867589}, port_no = 3461, proto = 30073, type = 32745, 
          flags = (URI_USER_NORMALIZE | unknown: 1970867588), transport = {s = 0x7fe975790d85 <_ul_sruid+5> "5b3a378e-4102-", len = 1970867603}, ttl = {s = 0x7fe975790d9f <_ul_sruid+31> "", len = 1970867589}, user_param = {
            s = 0x7fe975790d9f <_ul_sruid+31> "", len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x766d05d2 <error: Cannot access memory at address 0x766d05d2>, len = -1056092072}, r2 = {
---Type <return> to continue, or q <return> to quit---
            s = 0x3230313461336235 <error: Cannot access memory at address 0x3230313461336235>, len = -1056092384}, gr = {s = 0x7fe975315605 <_reg_sruid+5> "5b3a378e-4102-", len = -1056092384}, transport_val = {s = 0x7fe9766d05d2 "%x%c%x%c", 
            len = -1056092024}, ttl_val = {s = 0x1a <error: Cannot access memory at address 0x1a>, len = 0}, user_param_val = {s = 0x7fe975315605 <_reg_sruid+5> "5b3a378e-4102-", len = 1999991817}, maddr_val = {
            s = 0x7ffefbad8001 <error: Cannot access memory at address 0x7ffefbad8001>, len = 1966167557}, method_val = {s = 0x7fe900000005 <error: Cannot access memory at address 0x7fe900000005>, len = 112}, lr_val = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = 6807573}, r2_val = {s = 0x7ffec10d4f90 "", len = 1991131152}, gr_val = {s = 0x7fe976b8ce40 "@", len = 1991131152}}
        u = 0x418310 <_start>
        port = 0
        dst_host = 0x7fe977ab8ff7 <_dl_fixup+247>
        i = -1056091248
        flags = 1952542303
        avp = 0x675772f8
        st = {flags = 1634558315, id = 27753, name = {n = 1336480768, s = {s = 0x41dd04694fa91400 <error: Cannot access memory at address 0x41dd04694fa91400>, len = -1875221347}, re = 0x41dd04694fa91400}, avp = 0x616b7873578b1f45}
        sct = 0x7ffec10d5190
        sjt = 0x7fe977ccd1b0
        rve = 0x7fe976b88f68
        mct = 0x1
        rv = 0x0
        rv1 = 0x7fe9772ee920
        c1 = {cache_type = 1991918472, val_type = 32745, c = {avp_val = {n = 1933545691, s = {s = 0x7fe9733f90db <net_flush+27> "H\213S\b\205\300\017\225\300H\211S\030\200\273\204", len = 93}, re = 0x7fe9733f90db <net_flush+27>}, pval = {rs = {
                s = 0x7fe9733f90db <net_flush+27> "H\213S\b\205\300\017\225\300H\211S\030\200\273\204", len = 93}, ri = 1933516845, flags = 32745}}, i2s = "\r\242\017\000\000\000\000@\b", '\000' <repeats 12 times>}
        s = {s = 0x7ffec10d4dc0 "kamailio", len = -1056092768}
        srevp = {0x7ffec10d5220, 0x7ffec10d52b0}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}}
        __FUNCTION__ = "do_action"
#10 0x0000000000488671 in run_actions (h=0x7ffec10d53c0, a=0x7fe976b89a28, msg=0x7fe976ba48e8) at core/action.c:1565
        t = 0x7fe976b89a28
        ret = -1
        mod = 0xa49dbc <buf+188>
        ms = 0
        __FUNCTION__ = "run_actions"
#11 0x0000000000488dde in run_top_route (a=0x7fe976b89a28, msg=0x7fe976ba48e8, c=0x0) at core/action.c:1654
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {1733784312, -8654762288311494772, 4293392, 140732137299520, 0, 0, -8654762288282134644, 8654116410500388748}, __mask_was_saved = 0, __saved_mask = {__val = {
                  18446744073709551615, 140732137296976, 140640693095286, 4293392, 0, 4611686022722355200, 140640696027368, 140732137297072, 5482162, 6286889192, 140640696027368, 1073741825, 0, 140732137297072, 1733784312, 4293392}}}}}
        p = 0x7ffec10d53c0
        ret = 0
        sfbk = 0
#12 0x00000000005a05a7 in receive_msg (
    buf=0xa49d00 <buf> "NOTIFY sip:192.168.55.20 SIP/2.0\r\nVia: SIP/2.0/UDP 127.0.1.1:5060;branch=z9hG4bK-23797-1-3\r\nFrom: <sip:1000 at 192.168.55.20>;tag=1\r\nTo: <sip:1000 at 192.168.55.20>\r\nCall-ID: 1-23797 at 127.0.1.1\r\nCSeq: 2 NOTI"..., 
    len=806, rcv_info=0x7ffec10d5960) at core/receive.c:277
        msg = 0x7fe976ba48e8
        ctx = {rec_lev = 1939005104, run_flags = 32745, last_retcode = 1939003429, jmp_env = {{__jmpbuf = {1272, 6807573, 0, 140640714020104, 140732137297376, 140732137297360, 4282249833, 4254878}, __mask_was_saved = -1, __saved_mask = {__val = {
                  0, 140640703678312, 140640713961472, 474984, 786784, 788304, 8, 16, 140640695238672, 140732137297488, 6198293, 0, 21483034192, 140732137297664, 10741184, 0}}}}}
        bctx = 0x77ab8ff7
        ret = 0
        stats_on = 0
---Type <return> to continue, or q <return> to quit---
        tvb = {tv_sec = 140638704107521, tv_usec = 140640714019248}
        tve = {tv_sec = 5, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        diff = 0
        inb = {
          s = 0xa49d00 <buf> "NOTIFY sip:192.168.55.20 SIP/2.0\r\nVia: SIP/2.0/UDP 127.0.1.1:5060;branch=z9hG4bK-23797-1-3\r\nFrom: <sip:1000 at 192.168.55.20>;tag=1\r\nTo: <sip:1000 at 192.168.55.20>\r\nCall-ID: 1-23797 at 127.0.1.1\r\nCSeq: 2 NOTI"..., 
          len = 806}
        netinfo = {data = {s = 0x7ffec10d5670 "@Z\r\301\376\177", len = 2009912584}, rcv = 0x7ffec10d5698, dst = 0x7fe977ccd1b0}
        keng = 0x0
        evp = {data = 0x7ffec10d5540, rcv = 0x7ffec10d5960, dst = 0x0}
        __FUNCTION__ = "receive_msg"
#13 0x00000000004b93a1 in udp_rcv_loop () at core/udp_server.c:554
        len = 806
        buf = "NOTIFY sip:192.168.55.20 SIP/2.0\r\nVia: SIP/2.0/UDP 127.0.1.1:5060;branch=z9hG4bK-23797-1-3\r\nFrom: <sip:1000 at 192.168.55.20>;tag=1\r\nTo: <sip:1000 at 192.168.55.20>\r\nCall-ID: 1-23797 at 127.0.1.1\r\nCSeq: 2 NOTI"...
        tmp = 0x7ffec10d5ba0 "`]\r\301\376\177"
        from = 0x7fe976ba3688
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {140731214375104, 0}, addr32 = {2315954368, 32766, 0, 0}, addr16 = {43200, 35338, 32766, 0, 0, 0, 0, 0}, addr = "\300\250\n\212\376\177\000\000\000\000\000\000\000\000\000"}}, dst_ip = {af = 2, 
            len = 4, u = {addrl = {339192000, 0}, addr32 = {339192000, 0, 0, 0}, addr16 = {43200, 5175, 0, 0, 0, 0, 0, 0}, addr = "\300\250\067\024", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, 
          proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\300\250\n\212\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 2315954368}, sin_zero = "\000\000\000\000\000\000\000"}, 
            sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 2315954368, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, 
          bind_address = 0x7fe976b73840, proto = 1 '\001'}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        printbuf = '\000' <repeats 16 times>, "pW\r\301\376\177\000\000\244\a\352m\351\177\000\000\020\203A\000\000\000\000\000@^\r\301\376\177", '\000' <repeats 18 times>, "\240W\r\301\003\000\000\000\370bdr\351\177\000\000`W\205r\351\177\000\000p1\272v\351\177\000\000\000X\r\301\376\177\000\000\300\331_r\351\177\000\000\003\000\000\000\005\000\000\000\030c\270v\005\000\000\000\020Y\r\301\376\177\000\064\020X\r\301\376\177\000\000`Z\r\301\376\177\000\000\244\a\352m\351\177\000\000\020\203A\000\000\000\000\000@^\r\301\376\177", '\000' <repeats 18 times>, "\200X\r\301\376\177\000\000"...
        i = -1
        j = 0
        l = 1588414302
        __FUNCTION__ = "udp_rcv_loop"
#14 0x0000000000424437 in main_loop () at main.c:1626
        i = 4
        pid = 0
        si = 0x7fe976b73840
        si_desc = "udp receiver child=4 sock=192.168.55.20:5060\000\177\000\000\001\000\000\000\000\000\000\000\001\000\000\000\f\b\000\000\370rWg\000\000\000\000\060\r\352m\351\177\000\000\360Z\r\301\001\000\000\000\310V\301m\351\177\000\000\360Z\r\301\376\177\000\000\326\065g\000\000\000\000\000\020\203A\000\000\000\000\000\340\245\270v\351\177\000"
        nrprocs = 8
        woneinit = 1
        __FUNCTION__ = "main_loop"
#15 0x000000000042b985 in main (argc=3, argv=0x7ffec10d5e48) at main.c:2645
        cfg_stream = 0xeb8010
        c = -1
        r = 0
        tmp = 0x0
        tmp_len = 32745
        port = 2007714157
        proto = 0
        options = 0x74c8b0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
---Type <return> to continue, or q <return> to quit---
        seed = 4176688069
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7ffec10d5d00
        p = 0x7ffec10d5e68 "\223}\r\301\376\177"
        st = {st_dev = 99, st_ino = 29, st_nlink = 2, st_mode = 16877, st_uid = 103, st_gid = 109, __pad0 = 0, st_rdev = 0, st_size = 80, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1530294610, tv_nsec = 578894952}, st_mtim = {
            tv_sec = 1530541796, tv_nsec = 307604840}, st_ctim = {tv_sec = 1530541796, tv_nsec = 307604840}, __glibc_reserved = {0, 0, 0}}
        __FUNCTION__ = "main"
(gdb) 
`

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1579#issuecomment-401829267
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-dev/attachments/20180702/773e2c85/attachment-0001.html>


More information about the sr-dev mailing list