[sr-dev] [kamailio/kamailio] kazoo_query causes crash of kamailio (Issue #2922)

mihovilkolaric notifications at github.com
Sat Nov 6 16:53:29 CET 2021


Full backtrace:

```
#0  __GI_raise (sig=sig at entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
        set = {__val = {0, 140481737467984, 4222451712, 94125218804128, 94125218804229, 94125218804128, 94125218804128, 94125218804250, 94125218804428, 94125218804128, 94125218804428, 0, 0, 0, 0, 0}}
        pid = <optimized out>
        tid = <optimized out>
        ret = <optimized out>
#1  0x00007fc47407a859 in __GI_abort () at abort.c:79
        save_stage = 1
        act = {__sigaction_handler = {sa_handler = 0x7a, sa_sigaction = 0x7a}, sa_mask = {__val = {94125218804448, 3432, 140481737427665, 0, 140481738839488, 140481738843296, 140481653628996, 476, 140481653629648, 140481737982800, 140481737418232, 0, 
              11932610196109475840, 140481738621957, 140481740840960, 140481738638728}}, sa_flags = 1863311428, sa_restorer = 0x1dc}
        sigs = {__val = {32, 0 <repeats 15 times>}}
#2  0x00007fc47407a729 in __assert_fail_base (fmt=0x7fc474210588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x7fc46f0fe2d0 "json_object_get_type(jso) == json_type_object", file=0x7fc46f0fe044 "json_object.c", line=476, function=<optimized out>)
    at assert.c:92
        str = 0x559b3c352830 "`\356\064<\233U"
        total = 4096
#3  0x00007fc47408bf36 in __GI___assert_fail (assertion=0x7fc46f0fe2d0 "json_object_get_type(jso) == json_type_object", file=0x7fc46f0fe044 "json_object.c", line=476, function=0x7fc46f0fe280 "json_object_object_add_ex") at assert.c:101
No locals.
#4  0x00007fc46f0f7d26 in json_object_object_add_ex () from /lib/x86_64-linux-gnu/libjson-c.so.4
No symbol table info available.
#5  0x00007fc46f14ebe4 in kz_amqp_add_payload_common_properties (json_obj=0x559b3c3b30c0, server_id=0x7ffda57606f0 "kamailio at sipproxy.mydomain.com-<352213>-script-0", unique=0x7ffda5760660) at kz_amqp.c:1023
        node_name = '\000' <wiederholt 24 Mal>, "|\000\000\000w\000\000\000n\000\000\000[\000\000\000@\004v\245\375\177\000\000\000\000\005\000\000\000\000\000PO\000\000\000\000\000\000\200\v$t\304\177\000\000`\000\000\000\000\000\000\000\260\060;<\233U\000\000iX\217s\304\177", '\000' <wiederholt 11 Mal>, "@On\300%\231\245\200\361\064<\233U\000\000@,;<\233U\000\000\000\000\000\000\000\000\000\000\204\235\017o\304\177\000\000\000\000\000\000\000\000\000\000p,;<\233U\000\000\377\377\377\377\000\000\000\000U\254\017o\304\177\000\000n\000\000\000", '\377' <wiederholt 12 Mal>, "\200\361\064<\233U\000\000\000\000\000\000\000\000\000\000"...
#6  0x00007fc46f1509a0 in kz_amqp_pipe_send_receive (str_exchange=0x7ffda57609c0, str_routing_key=0x7ffda57609d0, str_payload=0x7ffda57609b0, kz_timeout=0x7ffda57609e0, json_ret=0x7ffda5760a10) at kz_amqp.c:1159
        ret = 1
        json_obj = 0x559b3c3b30c0
        cmd = 0x0
        json_body = 0x0
        unique_string = {s = 0x7ffda57606c0 "042a4c6f-a170-4d2a-a40f-9be55aa7d760", len = 36}
        serverid = "kamailio at sipproxy.mydomain.com-<352213>-script-0\000\326#t\304\177\000\000\000\334#t\304\177\000\000\200\334#t\304\177\000\000\000\345#t\304\177\000\000@\332#t\304\177\000\000\300\331#t\304\177\000\000\000\000\000\000\000\000\000\000p\000\000\000\000\000\000\000 \342#t\304\177\000\000\240\342#t\304\177\000\000`\000\000\000\000\000\000\000\a\000\000\000\304\177\000\000@\344#t\304\177\000\000\300C\037t\304\177\000\000\001\000\000\000\000\000\000\000\a\000\000\000\061", '\000' <wiederholt 27 Mal>...
        id = "\004*Lo\241pM*\244\017\233\345Z\247\327`"
        uuid_buffer = "042a4c6f-a170-4d2a-a40f-9be55aa7d760\000\000\000"
        payload = 0x559b3b5f5b29 "core/mem/q_malloc.c"
        __func__ = "kz_amqp_pipe_send_receive"
#7  0x00007fc46f158763 in kz_amqp_query_ex (msg=0x7fc47394beb8, exchange=0x7fc4738f03d0 "(q\216s\304\177", routing_key=0x7fc4738f57c8 "0\213\207s\304\177", payload=0x7fc4738f58d8 "hX\217s\304\177") at kz_amqp.c:1494
        json_s = {s = 0x7fc4738f5868 "0", len = 1}
        exchange_s = {s = 0x7fc4738e7128 "callevt", len = 7}
        routing_key_s = {s = 0x7fc473878b30 "0", len = 1}
        kz_timeout = {tv_sec = 2, tv_usec = 0}
        __func__ = "kz_amqp_query_ex"
        j = 0x559b3c3b2bd0
        ret = 0x0
        res = 32708
        strjson = 0x34 <error: Cannot access memory at address 0x34>
        len = 0
        value = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>
#8  0x00007fc46f1588b2 in kz_amqp_query (msg=0x7fc47394beb8, exchange=0x7fc4738f03d0 "(q\216s\304\177", routing_key=0x7fc4738f57c8 "0\213\207s\304\177", payload=0x7fc4738f58d8 "hX\217s\304\177", dst=0x7fc4738f04f0 "p\004\217s\304\177") at kz_amqp.c:1517
        dst_pv = 0x7fc474170350 <__syslog>
        dst_val = {rs = {s = 0x7ffda5760b00 "\220\021v\245\375\177", len = 1863978364}, ri = 52, flags = 3}
        result = 0
#9  0x0000559b3b1c7355 in do_action (h=0x7ffda5761370, a=0x7fc4738f1d98, msg=0x7fc47394beb8) at core/action.c:1151
        ret = -5
        v = 0
        dst = {send_sock = 0x7fc4738eec20, to = {s = {sa_family = 1920, sa_data = "\217s\304\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 1920, sin_port = 29583, sin_addr = {s_addr = 32708}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 1920, sin6_port = 29583, sin6_flowinfo = 32708, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <wiederholt 15 Mal>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 1920, 
              __ss_padding = "\217s\304\177", '\000' <wiederholt 43 Mal>, "@On\300%\231\245\240\026v\245\375\177\000\000\000\000\000\000\002", '\000' <wiederholt 11 Mal>, "#$^;\233U\000\000\064\000\000\000\000\000\000\000P\003\027t\304\177\000\000P\021v\245\375\177\000\000+y\026;\233U\000", __ss_align = 52}}, id = 1938746392, send_flags = {f = 32708, blst_imask = 0}, proto = 16 '\020', proto_pad0 = 22 '\026', proto_pad1 = -23178}
        tmp = 0x7ffda5761f70 "\001"
        new_uri = 0x7fc4738eec10 "\001"
        end = 0x7fc47394beb8 "\001"
        crt = 0x34 <error: Cannot access memory at address 0x34>
        cmd = 0x7fc4738e7ce8
        len = 996025379
        user = 21915
        uri = {user = {s = 0x7fc47420df30 "d]", len = 996105001}, passwd = {s = 0xf600000187 <error: Cannot access memory at address 0xf600000187>, len = 994455272}, host = {s = 0x7ffda5760dd0 "", len = 1938022416}, port = {
            s = 0x4a8 <error: Cannot access memory at address 0x4a8>, len = 1938022416}, params = {s = 0x7ffda5760e10 "@\016v\245\375\177", len = 1950306872}, sip_params = {s = 0x7fc47420df30 "d]", len = 0}, headers = {
            s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7171768}, port_no = 37488, proto = 12, type = ERROR_URI_T, flags = (unknown: 1216840), transport = {s = 0x129890 <error: Cannot access memory at address 0x129890>, len = 8}, ttl = {
            s = 0x5 <error: Cannot access memory at address 0x5>, len = 1850687488}, user_param = {s = 0x7ffda5760e40 "@\017v\245\375\177", len = 993161627}, maddr = {s = 0x0, len = 996104996}, method = {s = 0x7ffda5760f40 "", len = 0}, lr = {s = 0x7ffda5760f40 "", 
            len = 994414680}, r2 = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 0}, gr = {s = 0x559b3b5913ab "core", len = 0}, transport_val = {s = 0x559b3b591828 <__func__.7764> "rval_new_empty", len = 995693617}, ttl_val = {
            s = 0x4a8 <error: Cannot access memory at address 0x4a8>, len = 1938022416}, user_param_val = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 996105001}, maddr_val = {
            s = 0x7f000001ff <error: Cannot access memory at address 0x7f000001ff>, len = 994455272}, method_val = {s = 0x7ffda5760ef0 "", len = 1938022416}, lr_val = {s = 0x7fc4742418a0 <_IO_helper_jumps> "", len = 1938022416}, r2_val = {
            s = 0x7ffda5760f30 "`\017v\245\375\177", len = 1950306872}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7173632}, passwd = {s = 0xc8b28 <error: Cannot access memory at address 0xc8b28>, len = 1214976}, host = {s = 0x129890 <error: Cannot access memory at address 0x129890>, 
            len = 8}, port = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 1850687488}, params = {s = 0x7ffda5760f60 "\200\020v\245\375\177", len = 993161627}, sip_params = {s = 0x0, len = 996104996}, headers = {s = 0x7fc4738f3850 "H\a", len = 0}, 
          port_no = 4224, proto = 42358, type = 32765, flags = (URI_USER_NORMALIZE | unknown: 994423860), transport = {s = 0x7fc4742418a0 <_IO_helper_jumps> "", len = 3432}, ttl = {s = 0x559b3b5913ab "core", len = 1937415856}, user_param = {
            s = 0x559b3b591630 <__func__.7732> "rval_destroy_helper", len = 995693617}, maddr = {s = 0x7fc4738f0780 "\002", len = 1938022416}, method = {s = 0x559b00000000 <error: Cannot access memory at address 0x559b00000000>, len = 1850687488}, lr = {
            s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 0}, r2 = {s = 0x0, len = 1938753352}, gr = {s = 0x748 <error: Cannot access memory at address 0x748>, len = 1938022416}, transport_val = {s = 0x7fc4738f0660 "\200", 
            len = 1938755320}, ttl_val = {s = 0xe1a57616c0 <error: Cannot access memory at address 0xe1a57616c0>, len = 0}, user_param_val = {s = 0x0, len = 996025379}, maddr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, 
          method_val = {s = 0x7ffda5761050 "P\021v\245\375\177", len = 991328555}, lr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1850687488}, r2_val = {s = 0x7ffda5761150 "\020\026v\245\375\177", len = 0}, gr_val = {s = 0x0, len = 996025379}}
        u = 0x7fc4738edcd0
        port = 0
        dst_host = 0x7ffda5761f70
        i = 4
        flags = 0
        avp = 0x7ffda5761150
        st = {flags = 1, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
        sct = 0x559b3b5e2423
        sjt = 0x400000001
        rve = 0x7fc473908270
        mct = 0x0
        rv = 0x7fc4738f3078
        rv1 = 0x559b3b178ca4 <rval_expr_eval+20729>
        c1 = {cache_type = 2775978288, val_type = 32765, c = {avp_val = {n = 991328479, s = {s = 0x559b3b1678df <rval_destroy_helper+1140> "\353\005\350z\204\375\377\220H\213E\310dH3\004%(", len = 1}, re = 0x559b3b1678df <rval_destroy_helper+1140>}, pval = {rs = {
                s = 0x559b3b1678df <rval_destroy_helper+1140> "\353\005\350z\204\375\377\220H\213E\310dH3\004%(", len = 1}, ri = 1938746392, flags = 32708}}, i2s = "\221\000\000\000\000\000\000\000\030\354\216s\304\177\000\000\210J\217s\304\177"}
        s = {s = 0x7fc4738f5868 "0", len = 1}
        srevp = {0x34, 0x7fc474170350 <__syslog>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {
                s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140481729070032, string = 0x7fc4738f03d0 "(q\216s\304\177", str = {s = 0x7fc4738f03d0 "(q\216s\304\177", len = 7}, 
              data = 0x7fc4738f03d0, attr = 0x7fc4738f03d0, select = 0x7fc4738f03d0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091528, string = 0x7fc4738f57c8 "0\213\207s\304\177", str = {s = 0x7fc4738f57c8 "0\213\207s\304\177", len = 1}, 
              data = 0x7fc4738f57c8, attr = 0x7fc4738f57c8, select = 0x7fc4738f57c8}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091800, string = 0x7fc4738f58d8 "hX\217s\304\177", str = {s = 0x7fc4738f58d8 "hX\217s\304\177", len = 1}, data = 0x7fc4738f58d8, 
              attr = 0x7fc4738f58d8, select = 0x7fc4738f58d8}}, {type = MODFIXUP_ST, u = {number = 140481729070320, string = 0x7fc4738f04f0 "p\004\217s\304\177", str = {s = 0x7fc4738f04f0 "p\004\217s\304\177", len = 17}, data = 0x7fc4738f04f0, attr = 0x7fc4738f04f0, 
              select = 0x7fc4738f04f0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}}
        __func__ = "do_action"
#10 0x0000559b3b1d0463 in run_actions (h=0x7ffda5761370, a=0x7fc4738f1d98, msg=0x7fc47394beb8) at core/action.c:1581
        t = 0x7fc4738f1d98
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 0
        __func__ = "run_actions"
#11 0x0000559b3b1d0bd6 in run_actions_safe (h=0x7ffda5761f70, a=0x7fc4738f1d98, msg=0x7fc47394beb8) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {8589934592, -8218340047319111063, 0, 94125204317219, 52, 140481737982800, -8218340047371539863, -2792324605258929559}, __mask_was_saved = 0, __saved_mask = {__val = {94125201453467, 0, 
                  22470941476, 140727379432688, 11932610196109475840, 140727379432688, 8589934592, 0, 94125204317219, 52, 140481737982800, 140727379432704, 140481725410594, 32, 140481728339984, 140727379432816}}}}}
        ret = 32708
        ign_on_break = 0
#12 0x0000559b3b16a4b0 in rval_get_int (h=0x7ffda5761f70, msg=0x7fc47394beb8, i=0x7ffda5761750, rv=0x7fc4738f4040, cache=0x0) at core/rvalue.c:949
        r_avp = 0xa59925c06e4f4000
        avp_val = {n = 7, s = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 0}, re = 0x7}
        pval = {rs = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, ri = -1518987760, flags = 32765}
        tmp = {s = 0x0, len = 996025379}
        s = 0x0
        r = 0
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#13 0x0000559b3b16fa9c in rval_expr_eval_int (h=0x7ffda5761f70, msg=0x7fc47394beb8, res=0x7ffda5761750, rve=0x7fc4738f4038) at core/rvalue.c:1947
        i1 = 1947665232
        i2 = 32708
        ret = -1
        c1 = {cache_type = 1939127992, val_type = 32708, c = {avp_val = {n = -1518985360, s = {s = 0x7ffda5761f70 "\001", len = -1518986456}, re = 0x7ffda5761f70}, pval = {rs = {s = 0x7ffda5761f70 "\001", len = -1518986456}, ri = 1, flags = 32708}}, 
          i2s = " Їs\304\177\000\000\250\023\217s\304\177\000\000\310W\217s\304\177"}
        c2 = {cache_type = 52, val_type = 36, c = {avp_val = {n = 1947665232, s = {s = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = -1518987568}, re = 0x7fc474170350 <__syslog>}, pval = {rs = {
                s = 0x7fc474170350 <__syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = -1518987568}, ri = 1932248914, flags = 32708}}, i2s = "\377\377\377\377", '\000' <wiederholt 12 Mal>, "裎s\304\177"}
        rv1 = 0x7fc4738f13a8
        rv2 = 0x7ffda5761700
        __func__ = "rval_expr_eval_int"
#14 0x0000559b3b1c0ec8 in do_action (h=0x7ffda5761f70, a=0x7fc4738f7f28, msg=0x7fc47394beb8) at core/action.c:1052
        ret = -5
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 16384, sa_data = "On\300%\231\245\334\035v\245\375\177\000"}, sin = {sin_family = 16384, sin_port = 28239, sin_addr = {s_addr = 2778277312}, sin_zero = "\334\035v\245\375\177\000"}, sin6 = {sin6_family = 16384, 
              sin6_port = 28239, sin6_flowinfo = 2778277312, sin6_addr = {__in6_u = {__u6_addr8 = "\334\035v\245\375\177\000\000\000\000\000\000\026\000\000", __u6_addr16 = {7644, 42358, 32765, 0, 0, 0, 22, 0}, __u6_addr32 = {2775981532, 32765, 0, 22}}}, 
              sin6_scope_id = 997540784}, sas = {ss_family = 16384, 
              __ss_padding = "On\300%\231\245\334\035v\245\375\177\000\000\000\000\000\000\026\000\000\000\260Cu;\233U\000\000\000\000\000\000\000\000\000\000\242\v:<\233U\000\000\023\000\000\000\233U\000\000\340\035v\245\375\177\000\000\261\252I;\233U\000\000\370\313`;\233U\000\000\000 at On\300%\231\245\242\v:<\233U\000\000\000\000\000\000\002", '\000' <wiederholt 11 Mal>, "#$^;\233U\000", __ss_align = 52}}, id = 1947665232, send_flags = {f = 32708, blst_imask = 0}, proto = 104 'h', proto_pad0 = -83 '\255', proto_pad1 = 29583}
        tmp = 0x559b3b518985 <system_reseed+296> "\203\275l\373\377\377"
        new_uri = 0x559b3b4d8e5c <parse_sip_header_name+3534> "\203\370\002\017\216\214\003"
        end = 0x7fc4734c1285 <_ul_sruid+5> "61869d09-55fd5-"
        crt = 0x55fab <error: Cannot access memory at address 0x55fab>
        cmd = 0x7fc4738e7f18
        len = 1867105512
        user = 32708
        uri = {user = {s = 0x7ffda57619b0 "", len = 1938022416}, passwd = {s = 0x14800000187 <error: Cannot access memory at address 0x14800000187>, len = 1938022416}, host = {s = 0x7ffda57619f0 " \032v\245\375\177", len = 1950306872}, port = {
            s = 0x7fc4738f54e0 "\030\003", len = 0}, params = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7176352}, sip_params = {s = 0xc81c0 <error: Cannot access memory at address 0xc81c0>, len = 1212256}, headers = {
            s = 0x128008 <error: Cannot access memory at address 0x128008>, len = 8}, port_no = 7, proto = 0, type = ERROR_URI_T, flags = (unknown: 1850687488), transport = {s = 0x7ffda5761a20 "@\033v\245\375\177", len = 993161627}, ttl = {s = 0x0, len = 1938022416}, 
          user_param = {s = 0x7fc4738433e0 "", len = 0}, maddr = {s = 0x7ffda5761b40 "P\034v\245\375\177", len = 994423861}, method = {s = 0x7ffda5761b40 "P\034v\245\375\177", len = 0}, lr = {s = 0x559b3b60cb6b "core", len = 994414680}, r2 = {
            s = 0x559b3b60d868 <__func__.6887> "parse_headers", len = 996199992}, gr = {s = 0x7fc4738f5470 "\355\n:<\233U", len = 1938022416}, transport_val = {s = 0x559b3b60d868 <__func__.6887> "parse_headers", len = 996199992}, ttl_val = {
            s = 0x40 <error: Cannot access memory at address 0x40>, len = 1938022416}, user_param_val = {s = 0x7fc47383e010 "\001", len = 1938773048}, maddr_val = {s = 0x5f8 <error: Cannot access memory at address 0x5f8>, len = 1938022416}, method_val = {
            s = 0x7fc4738f5390 "@", len = 1938773216}, lr_val = {s = 0x7fc47341e257 <_reg_sruid+55> "", len = 1933697573}, r2_val = {s = 0x7fc47341e257 <_reg_sruid+55> "", len = 0}, gr_val = {s = 0x0, len = -1518986412}}
        next_hop = {user = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = 1010436526}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1850687488}, host = {
            s = 0x559b3c3a09b3 ";branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234 at 10.0.0.33:47335;rinstance=837681a60901b510;transport=tcp>\r\nTo: <sip:1234 at 10.0.0.24:5060;transport=TCP>\r\nFrom: <s"..., len = 0}, port = {
            s = 0x0, len = 996025379}, params = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, sip_params = {s = 0x7ffda5761c50 "P\035v\245\375\177", len = 994965693}, headers = {
            s = 0x5051bb0 <error: Cannot access memory at address 0x5051bb0>, len = 0}, port_no = 65535, proto = 65535, type = 4294967295, flags = (unknown: 1939127992), transport = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7179288}, ttl = {
            s = 0xc7b90 <error: Cannot access memory at address 0xc7b90>, len = 1209320}, user_param = {s = 0x1273e8 <error: Cannot access memory at address 0x1273e8>, len = 8}, maddr = {s = 0x9 <error: Cannot access memory at address 0x9>, len = 1010437024}, method = {
            s = 0x0, len = 1010437026}, lr = {s = 0x7fc4738f5470 "\355\n:<\233U", len = 1010437024}, r2 = {s = 0x7ffda5761ce0 "\260Cu;\233U", len = 0}, gr = {s = 0x7ffda5761ce0 "\260Cu;\233U", len = 994414680}, transport_val = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = 1938856088}, ttl_val = {s = 0x559b3b60cb6b "core", len = 1010436499}, user_param_val = {s = 0x559b3b60cbf8 <__func__.6774> "get_hdr_field", len = 1850687488}, maddr_val = {
            s = 0x8900000187 <error: Cannot access memory at address 0x8900000187>, len = 0}, method_val = {s = 0x0, len = 996025379}, lr_val = {s = 0x34 <error: Cannot access memory at address 0x34>, len = 1947665232}, r2_val = {
            s = 0x7ffda5761d50 "h\255\217s\304\177", len = 1935046835}, gr_val = {s = 0x7fc4738faec8 " ", len = 4}}
        u = 0x3000000018
        port = 28239
        dst_host = 0x0
        i = 8
        flags = 0
        avp = 0x7ffda5761f50
        st = {flags = 1010437026, id = 21915, name = {n = 1010437021, s = {s = 0x559b3c3a0b9d "0\r\n\r\n", len = 0}, re = 0x559b3c3a0b9d}, avp = 0x7fc4734c1294 <_ul_sruid+20>}
        sct = 0xa59925c06e4f4000
        sjt = 0x7ffda57619b0
        rve = 0x7fc4738f4038
        mct = 0x7ffda57619c0
        rv = 0x7fc473654afb
        rv1 = 0x7ffda5761e90
        c1 = {cache_type = 1939030032, val_type = 32708, c = {avp_val = {n = 1939127992, s = {s = 0x7fc47394beb8 "\001", len = 1939030032}, re = 0x7fc47394beb8}, pval = {rs = {s = 0x7fc47394beb8 "\001", len = 1939030032}, ri = 1939127992, flags = 32708}}, 
          i2s = "\b\000\000\000\000\000\000\000\000 at On\300%\231\245\370\255\217s\304\177"}
        s = {s = 0x32 <error: Cannot access memory at address 0x32>, len = -1518986976}
        srevp = {0x7ffda5761d90, 0x7ffda5761f60}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {
                s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140481729070032, string = 0x7fc4738f03d0 "(q\216s\304\177", str = {s = 0x7fc4738f03d0 "(q\216s\304\177", len = 7}, 
              data = 0x7fc4738f03d0, attr = 0x7fc4738f03d0, select = 0x7fc4738f03d0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091528, string = 0x7fc4738f57c8 "0\213\207s\304\177", str = {s = 0x7fc4738f57c8 "0\213\207s\304\177", len = 1}, 
              data = 0x7fc4738f57c8, attr = 0x7fc4738f57c8, select = 0x7fc4738f57c8}}, {type = RVE_FREE_FIXUP_ST, u = {number = 140481729091800, string = 0x7fc4738f58d8 "hX\217s\304\177", str = {s = 0x7fc4738f58d8 "hX\217s\304\177", len = 1}, data = 0x7fc4738f58d8, 
              attr = 0x7fc4738f58d8, select = 0x7fc4738f58d8}}, {type = MODFIXUP_ST, u = {number = 140481729070320, string = 0x7fc4738f04f0 "p\004\217s\304\177", str = {s = 0x7fc4738f04f0 "p\004\217s\304\177", len = 17}, data = 0x7fc4738f04f0, attr = 0x7fc4738f04f0, 
              select = 0x7fc4738f04f0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}}
        __func__ = "do_action"
#15 0x0000559b3b1d0463 in run_actions (h=0x7ffda5761f70, a=0x7fc4738e8ca8, msg=0x7fc47394beb8) at core/action.c:1581
        t = 0x7fc4738f7f28
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 1939127992, tz_dsttime = 32708}
        tdiff = 0
        __func__ = "run_actions"
#16 0x0000559b3b1d0ce6 in run_top_route (a=0x7fc4738e8ca8, msg=0x7fc47394beb8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {8589934592, -8218340046916457879, 0, 94125204317219, 52, 140481737982800, -8218340046968886679, -2792324605258929559}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 8589934592, 
                  0, 94125204317219, 52, 140481737982800, 140727379435568, 94125202082674, 94125205369896, 11932610196109475840, 140481729334224, 8589934592, 0, 94125204317219, 52}}}}}
        p = 0x7ffda5761f70
        ret = 0
        sfbk = 0
#17 0x0000559b3b37f932 in receive_msg (
    buf=0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234 at 10.0.0.33:47335;rinstance=837"..., len=578, rcv_info=0x7fc46f4c01a8)
    at core/receive.c:513
        msg = 0x7fc47394beb8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 6, jmp_env = {{__jmpbuf = {107374182978, 140481657569976, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 0, __saved_mask = {__val = {0, 65536, 11932610194258788473, 0, 140481657569680, 1024, 4604204945409, 128, 16, 2, 
                  519691042940, 940597837950, 94125201408152, 0, 4095, 65536}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234 at 10.0.0.33:47335;rinstance=837"..., len = 578}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffda5762160, obuf = {s = 0x0, len = 0}, rcv = 0x7fc46f4c01a8, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#18 0x0000559b3b41dfb3 in receive_tcp_msg (
    tcpbuf=0x7fc46f4c0530 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 70\r\nContact: <sip:1234 at 10.0.0.33:47335;rinstance=837"..., len=578, 
    rcv_info=0x7fc46f4c01a8, con=0x7fc46f4c0190) at core/tcp_read.c:1424
        buf = 0x559b3c3a0960 "REGISTER sip:10.0.0.24:5060;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 10.0.0.33:47335;branch=z9hG4bK-524287-1---83d016a408b857dd;rport\r\nMax-Forwards: 69\r\nContact: <sip:1234 at 10.0.0.33:47335;rinstance=837"...
        bsize = 65535
        blen = 65535
        __func__ = "receive_tcp_msg"
#19 0x0000559b3b4205f8 in tcp_read_req (con=0x7fc46f4c0190, bytes_read=0x7ffda5762618, read_flags=0x7ffda576261c) at core/tcp_read.c:1607
        bytes = 578
        total_bytes = 578
        resp = 1
        size = 322122547208
        req = 0x7fc46f4c02b8
        dst = {send_sock = 0x7ffda5762530, to = {s = {sa_family = 1, sa_data = "\000\000\000\000\000\000@%v\245\375\177\000"}, sin = {sin_family = 1, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "@%v\245\375\177\000"}, sin6 = {sin6_family = 1, sin6_port = 0, 
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "@%v\245\375\177\000\000\030\000\000\000\000\000\000", __u6_addr16 = {9536, 42358, 32765, 0, 24, 0, 0, 0}, __u6_addr32 = {2775983424, 32765, 24, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 1, 
              __ss_padding = "\000\000\000\000\000\000@%v\245\375\177\000\000\030", '\000' <wiederholt 23 Mal>, "\001\000\000\000\000\000\000\000(\315\036o\304\177\000\000\000\000\000\000\000\000\000\000\350\304Io\000\000\000\000P%v\245\001\000\000\000(\315\036o\304\177\000\000P%v\245\375\177\000\000-\\@;\233U\000\000`&v\245\375\177\000\000\b\000\000\000\000\000\000", __ss_align = 20}}, id = 1, send_flags = {f = 1, blst_imask = 0}, proto = 6 '\006', proto_pad0 = 0 '\000', proto_pad1 = 0}
        c = 0 '\000'
        ret = 996025379
        __func__ = "tcp_read_req"
#20 0x0000559b3b423af5 in handle_io (fm=0x7fc473954a08, events=1, idx=-1) at core/tcp_read.c:1782
        ret = 8
        n = 8
        read_flags = RD_CONN_SHORT_READ
        con = 0x7fc46f4c0190
        s = 6
        resp = 94125205447392
        t = 21915
        ee = 0x0
        __func__ = "handle_io"
#21 0x0000559b3b40eccc in io_wait_loop_epoll (h=0x559b3b6f62e0 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
        n = 1
        r = 0
        fm = 0x7fc473954a08
        revents = 1
        __func__ = "io_wait_loop_epoll"
#22 0x0000559b3b426aa8 in tcp_receive_loop (unix_sock=75) at core/tcp_read.c:1978
        __func__ = "tcp_receive_loop"
#23 0x0000559b3b2a161e in tcp_init_children (woneinit=0x7ffda5762a00) at core/tcp_main.c:5153
        r = 0
        i = 7
        reader_fd_1 = 75
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\256\311\061;\233U\000\000\340)v\245\375\177\000\000d\031=;\000\000\000\000\270\361\223s\000\000\000\000\213\313\\;\233U\000\000\232\000v\245\375\177\000\000\255$R;\233U\000\000\000\000\000\000\000\000\000\000(\315\036o\304\177\000\000\064\000\000\000\000\000\000\000\340\217Jo\001\000\000\000\320)v\245\375\177\000\000\265&R;\233U\000"
        si = 0x0
        __func__ = "tcp_init_children"
#24 0x0000559b3b153f0b in main_loop () at main.c:1843
        i = 8
        pid = 352197
        si = 0x0
        si_desc = "udp receiver child=7 sock=10.8.0.10:5060\000\322\061;$\000\000\000\002\000\000\000\064\000\000\000\000 at On\300%\231\245\240\026$t\304\177\000\000\210\240X;\233U\000\000\000\000\000\000\000\000\000\000#$^;\233U\000\000\064\000\000\000\000\000\000\000P\003\027t\304\177\000\000\220+v\245\375\177\000\000\327\277\060;\233U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#25 0x0000559b3b15e745 in main (argc=1, argv=0x7ffda57630e8) at main.c:3058
        cfg_stream = 0x559b3c2bf2a0
        c = -1
        r = 0
        tmp = 0x0
        tmp_len = 0
        port = 0
        proto = -1518792248
        ahost = 0x0
        aport = 0
        options = 0x559b3b58d188 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 3597399342
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0x0
        st = {st_dev = 25, st_ino = 9656, st_nlink = 2, st_mode = 16895, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1636097156, tv_nsec = 709532085}, st_mtim = {tv_sec = 1636211948, 
            tv_nsec = 447930869}, st_ctim = {tv_sec = 1636211948, tv_nsec = 447930869}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\260/v\245\375\177\000\000\253'@t\304\177\000\000\002\000\000\000\000\000\000\000\016\000\000\000\000\000\000\200", '\000' <wiederholt 48 Mal>, "`\321Bt\304\177\000\000\001.v\245\375\177\000\000\350\311Bt\304\177", '\000' <wiederholt 26 Mal>, "\220\354$t\304\177\000\000\004\000\000\024\000\000\000\000\300\303%t\304\177", '\000' <wiederholt 130 Mal>...
        option_index = 0
        long_options = {{name = 0x559b3b58f5e6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x559b3b58a521 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x559b3b58f5eb "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x559b3b58f5f1 "subst", 
            has_arg = 1, flag = 0x0, val = 1025}, {name = 0x559b3b58f5f7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x559b3b58f600 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x559b3b58f60a "server-id", has_arg = 1, flag = 0x0, 
            val = 1028}, {name = 0x559b3b58f614 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x559b3b58f61f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x559b3b58f628 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {
            name = 0x559b3b58f633 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x559b3b58f639 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x559b3b58f643 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, 
            val = 0}}
        __func__ = "main"

        
(gdb) info locals
set = {__val = {0, 140481737467984, 4222451712, 94125218804128, 94125218804229, 94125218804128, 94125218804128, 94125218804250, 94125218804428, 94125218804128, 94125218804428, 0, 0, 0, 0, 0}}
pid = <optimized out>
tid = <optimized out>
ret = <optimized out>

(gdb) list
45      in ../sysdeps/unix/sysv/linux/raise.c
```

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/2922#issuecomment-962471034
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-dev/attachments/20211106/d2871436/attachment-0001.htm>


More information about the sr-dev mailing list