[SR-Users] Fwd: About a bug when registering a Tandberg (Cisco) E20 to Kamailio - Crash Segfault at 18 IP - error 4 in auth_db.so

Pedro Niño nino.pedro at gmail.com
Wed Feb 12 03:14:27 CET 2014


Kamailio is having a crash (Segfault at 18 IP - error 4 in auth_db.so) when
registering a cisco E20, via SIP

Here is a full dbg backtrack, and the core dump, but have no ideas about
how to proceed.

Im using Kamailio 4.1.1:

Got this Error at /var/log:

[14629359.586980] kamailio[982]: segfault at 18 ip 00007f034db8dcfd sp
00007fff34702950 error 4 in auth_db.so[7f034db85000+c000]


Kamailio Version:
----------
version: kamailio 4.1.1 (x86_64/linux) d6ffa1
flags: STATS: Off, USE_TCP, USE_TLS, TLS_HOOKS, USE_RAW_SOCKS,
DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC,
DBG_QM_MALLOC, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE,
USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16,
MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 4MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: d6ffa1
compiled on 16:28:48 Jan 29 2014 with gcc 4.4.5
-------------

Thanks in Advance.

---------- Forwarded message ----------
From: Pedro Niño <nino.pedro at gmail.com>
Date: 2014-01-31 11:14 GMT-04:30
Subject: About a bug when registering a Tandberg (Cisco) E20 to Kamailio -
Crash Segfault at 18 IP - error 4 in auth_db.so
To: users at lists.kamailio.org


Kamailio is having a crash (Segfault at 18 IP - error 4 in auth_db.so) when
registering a cisco E20, via SIP

Here is a full dbg backtrack, and the core dump, but have no ideas about
how to proceed.

Im using Kamailio 4.1.1:

Got this Error at /var/log:

[14629359.586980] kamailio[982]: segfault at 18 ip 00007f034db8dcfd sp
00007fff34702950 error 4 in auth_db.so[7f034db85000+c000]


Kamailio Version:
----------
version: kamailio 4.1.1 (x86_64/linux) d6ffa1
flags: STATS: Off, USE_TCP, USE_TLS, TLS_HOOKS, USE_RAW_SOCKS,
DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC,
DBG_QM_MALLOC, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE,
USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16,
MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 4MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: d6ffa1
compiled on 16:28:48 Jan 29 2014 with gcc 4.4.5
-------------

Thanks in Advance.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-users/attachments/20140211/2b6a3f88/attachment-0001.html>
-------------- next part --------------
root at occlsn101:/tmp/corefiles# gdb /usr/local/sbin/kamailio core.kamailio.sig11.982 
GNU gdb (GDB) 7.0.1-debian
Copyright (C) 2009 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>...
Reading symbols from /usr/local/sbin/kamailio...done.

warning: Can't read pathname for load map: Input/output error.
Reading symbols from /lib/libdl.so.2...(no debugging symbols found)...done.
Loaded symbols for /lib/libdl.so.2
Reading symbols from /lib/libresolv.so.2...(no debugging symbols found)...done.
Loaded symbols for /lib/libresolv.so.2
Reading symbols from /lib/libc.so.6...(no debugging symbols found)...done.
Loaded symbols for /lib/libc.so.6
Reading symbols from /lib64/ld-linux-x86-64.so.2...(no debugging symbols found)...done.
Loaded symbols for /lib64/ld-linux-x86-64.so.2
Reading symbols from /usr/local/lib64/kamailio/modules/db_mysql.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/db_mysql.so
Reading symbols from /usr/lib/libmysqlclient.so.16...(no debugging symbols found)...done.
Loaded symbols for /usr/lib/libmysqlclient.so.16
Reading symbols from /usr/local/lib64/kamailio/libsrdb2.so.1...done.
Loaded symbols for /usr/local/lib64/kamailio/libsrdb2.so.1
Reading symbols from /usr/local/lib64/kamailio/libsrdb1.so.1...done.
Loaded symbols for /usr/local/lib64/kamailio/libsrdb1.so.1
Reading symbols from /lib/libpthread.so.0...(no debugging symbols found)...done.
Loaded symbols for /lib/libpthread.so.0
Reading symbols from /lib/libcrypt.so.1...(no debugging symbols found)...done.
Loaded symbols for /lib/libcrypt.so.1
Reading symbols from /lib/libnsl.so.1...(no debugging symbols found)...done.
Loaded symbols for /lib/libnsl.so.1
Reading symbols from /lib/libm.so.6...(no debugging symbols found)...done.
Loaded symbols for /lib/libm.so.6
Reading symbols from /usr/lib/libz.so.1...(no debugging symbols found)...done.
Loaded symbols for /usr/lib/libz.so.1
Reading symbols from /usr/local/lib64/kamailio/modules/mi_fifo.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/mi_fifo.so
Reading symbols from /usr/local/lib64/kamailio/libkmi.so.1...done.
Loaded symbols for /usr/local/lib64/kamailio/libkmi.so.1
Reading symbols from /usr/local/lib64/kamailio/modules/kex.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/kex.so
Reading symbols from /usr/local/lib64/kamailio/libkcore.so.1...done.
Loaded symbols for /usr/local/lib64/kamailio/libkcore.so.1
Reading symbols from /usr/local/lib64/kamailio/libsrutils.so.1...done.
Loaded symbols for /usr/local/lib64/kamailio/libsrutils.so.1
Reading symbols from /usr/local/lib64/kamailio/modules/tm.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/tm.so
Reading symbols from /usr/local/lib64/kamailio/modules/tmx.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/tmx.so
Reading symbols from /usr/local/lib64/kamailio/modules/sl.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/sl.so
Reading symbols from /usr/local/lib64/kamailio/modules/rr.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/rr.so
Reading symbols from /usr/local/lib64/kamailio/modules/pv.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/pv.so
Reading symbols from /usr/local/lib64/kamailio/modules/maxfwd.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/maxfwd.so
Reading symbols from /usr/local/lib64/kamailio/modules/usrloc.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/usrloc.so
Reading symbols from /usr/local/lib64/kamailio/modules/registrar.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/registrar.so
Reading symbols from /usr/local/lib64/kamailio/modules/textops.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/textops.so
Reading symbols from /usr/local/lib64/kamailio/modules/siputils.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/siputils.so
Reading symbols from /usr/local/lib64/kamailio/modules/xlog.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/xlog.so
Reading symbols from /usr/local/lib64/kamailio/modules/sanity.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/sanity.so
Reading symbols from /usr/local/lib64/kamailio/modules/ctl.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/ctl.so
Reading symbols from /usr/local/lib64/kamailio/modules/cfg_rpc.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/cfg_rpc.so
Reading symbols from /usr/local/lib64/kamailio/modules/mi_rpc.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/mi_rpc.so
Reading symbols from /usr/local/lib64/kamailio/libbinrpc.so.0...done.
Loaded symbols for /usr/local/lib64/kamailio/libbinrpc.so.0
Reading symbols from /usr/local/lib64/kamailio/modules/acc.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/acc.so
Reading symbols from /usr/local/lib64/kamailio/modules/auth.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/auth.so
Reading symbols from /usr/local/lib64/kamailio/modules/auth_db.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/auth_db.so
Reading symbols from /usr/local/lib64/kamailio/modules/uac.so...done.
Loaded symbols for /usr/local/lib64/kamailio/modules/uac.so
Reading symbols from /lib/libnss_compat.so.2...(no debugging symbols found)...done.
Loaded symbols for /lib/libnss_compat.so.2
Reading symbols from /lib/libnss_nis.so.2...(no debugging symbols found)...done.
Loaded symbols for /lib/libnss_nis.so.2
Reading symbols from /lib/libnss_files.so.2...(no debugging symbols found)...done.
Loaded symbols for /lib/libnss_files.so.2
Reading symbols from /lib/libnss_mdns4_minimal.so.2...(no debugging symbols found)...done.
Loaded symbols for /lib/libnss_mdns4_minimal.so.2
Reading symbols from /lib/libnss_dns.so.2...(no debugging symbols found)...done.
Loaded symbols for /lib/libnss_dns.so.2
Reading symbols from /lib/libnss_mdns4.so.2...(no debugging symbols found)...done.
Loaded symbols for /lib/libnss_mdns4.so.2
Core was generated by `/usr/local/sbin/kamailio -f /usr/local/etc/kamailio/kamailio.cfg -P /var/run/ka'.
Program terminated with signal 11, Segmentation fault.
#0  0x00007f034db8dcfd in auth_check (_m=0x7f03524a9ef0, _realm=0x7f0352446550 "\320\224ER\003\177", _table=0x7f0352455270 "H}ER\003\177", 
    _flags=0x7f0352455308 "`\367DR\003\177") at authorize.c:487
487			srealm = ((auth_body_t*)(hdr->parsed))->digest.username.user;
(gdb) bt all
No symbol "all" in current context.
(gdb) bt full
#0  0x00007f034db8dcfd in auth_check (_m=0x7f03524a9ef0, _realm=0x7f0352446550 "\320\224ER\003\177", _table=0x7f0352455270 "H}ER\003\177", 
    _flags=0x7f0352455308 "`\367DR\003\177") at authorize.c:487
        srealm = {
          s = 0x7f03455d1b69 "10.117.50.101>;tag=ccf50347b958f43a\r\nTo: <sip:37028 at 10.117.50.101>\r\nMax-Forwards: 16\r\nRoute: <sip:10.117.50.101;lr>\r\nAllow: INVITE,ACK,CANCEL,BYE,UPDATE,INFO,OPTIONS,REFER,NOTIFY\r\nUser-Agent: TANDBERG"..., len = 13}
        stable = {s = 0x7f0352457d48 "sipusers", len = 8}
        iflags = 1
        ret = 1
        hdr = 0x7f0352494650
        uri = 0x0
        turi = 0x0
        furi = 0x0
        __FUNCTION__ = "auth_check"
#1  0x000000000041c622 in do_action (h=0x7fff34703000, a=0x7f0352457b28, msg=0x7f03524a9ef0) at action.c:1117
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {
                s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                  __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, 
          id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7f035242ac20
        len = 0
        user = 0
        uri = {user = {s = 0x455d1bad <Address 0x455d1bad out of bounds>, len = 1380625776}, passwd = {
            s = 0x7f03455d1b8d "\nTo: <sip:37028 at 10.117.50.101>\r\nMax-Forwards: 16\r\nRoute: <sip:10.117.50.101;lr>\r\nAllow: INVITE,ACK,CANCEL,BYE,UPDATE,INFO,OPTIONS,REFER,NOTIFY\r\nUser-Agent: TANDBERG/257 (TE4.1.1.273710)\r\nExpires: 3600"..., len = 1163729821}, host = {s = 0x0, len = 0}, port = {s = 0x0, 
            len = 0}, params = {s = 0x455d1b8d <Address 0x455d1b8d out of bounds>, len = 1163729834}, sip_params = {s = 0x0, len = 0}, headers = {
            s = 0x3a70697300000000 <Address 0x3a70697300000000 out of bounds>, len = 5726777}, port_no = 46296, proto = 21066, type = 32515, 
          flags = 1319362943, transport = {s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 879775408}, ttl = {s = 0x0, 
            len = 0}, user_param = {s = 0x7fff34702f40 "p/p4\006", len = 1319386574}, maddr = {s = 0x7fff34702e20 "", len = 5547077}, method = {
            s = 0xcffd0 <Address 0xcffd0 out of bounds>, len = 1379774480}, lr = {s = 0x734702db0 <Address 0x734702db0 out of bounds>, len = 1380622064}, 
          r2 = {
            s = 0x7f03455d1b97 "37028 at 10.117.50.101>\r\nMax-Forwards: 16\r\nRoute: <sip:10.117.50.101;lr>\r\nAllow: INVITE,ACK,CANCEL,BYE,UPDATE,INFO,OPTIONS,REFER,NOTIFY\r\nUser-Agent: TANDBERG/257 (TE4.1.1.273710)\r\nExpires: 3600\r\nAuthoriz"..., len = 5}, gr = {s = 0x0, len = 0}, transport_val = {
            s = 0x7f03455d1b9d "10.117.50.101>\r\nMax-Forwards: 16\r\nRoute: <sip:10.117.50.101;lr>\r\nAllow: INVITE,ACK,CANCEL,BYE,UPDATE,INFO,OPTIONS,REFER,NOTIFY\r\nUser-Agent: TANDBERG/257 (TE4.1.1.273710)\r\nExpires: 3600\r\nAuthorization:"..., len = 13}, ttl_val = {s = 0x0, len = 0}, user_param_val = {
---Type <return> to continue, or q <return> to quit---
            s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {
            s = 0x100000000 <Address 0x100000000 out of bounds>, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff34702c00 "0,p4", len = 879766496}, passwd = {s = 0x140 <Address 0x140 out of bounds>, len = 24}, host = {
            s = 0x623460 "parse_to_param", len = 6429416}, port = {s = 0x30 <Address 0x30 out of bounds>, len = 0}, params = {
            s = 0x1000000001 <Address 0x1000000001 out of bounds>, len = 1380622064}, sip_params = {
            s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 879775408}, headers = {s = 0x0, len = 0}, port_no = 12416, 
          proto = 13424, type = 32767, flags = 4292235, transport = {s = 0x7fff34702c70 "\020-p4\377\177", len = 5607621}, ttl = {
            s = 0x7fff34702bf0 "\210tFR\003\177", len = 1350945346}, user_param = {s = 0x7f03524ab628 "\020", len = 5728225}, maddr = {
            s = 0x7f03524ab5b8 "\020", len = 1380622064}, method = {s = 0x7f0352467488 "\276\003", len = 879769328}, lr = {
            s = 0x34702c30 <Address 0x34702c30 out of bounds>, len = 1380625776}, r2 = {
            s = 0x7f03455d1b8d "\nTo: <sip:37028 at 10.117.50.101>\r\nMax-Forwards: 16\r\nRoute: <sip:10.117.50.101;lr>\r\nAllow: INVITE,ACK,CANCEL,BYE,UPDATE,INFO,OPTIONS,REFER,NOTIFY\r\nUser-Agent: TANDBERG/257 (TE4.1.1.273710)\r\nExpires: 3600"..., len = 1163729783}, gr = {s = 0x7f03524ab508 "\220\001", 
            len = 0}, transport_val = {s = 0x1d0000000b <Address 0x1d0000000b out of bounds>, len = 1163729805}, ttl_val = {
            s = 0x434702ce0 <Address 0x434702ce0 out of bounds>, len = 6428496}, user_param_val = {
            s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 879775408}, maddr_val = {s = 0x0, len = 1163729805}, 
          method_val = {s = 0x7fff34702d10 "", len = 5623681}, lr_val = {s = 0x7f03523dc838 "", len = 879766928}, r2_val = {
            s = 0x1734702d50 <Address 0x1734702d50 out of bounds>, len = 1163729811}, gr_val = {s = 0x0, len = 0}}
        u = 0x0
        port = 0
        dst_host = 0x0
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 879766344, id = 32767, name = {n = 879766496, s = {s = 0x7fff34702be0 "\270\265JR\003\177", len = 0}, re = 0x7fff34702be0}, avp = 0x8}
        sct = 0x0
        sjt = 0x0
        rve = 0x0
        mct = 0x0
        rv = 0x54a445
        rv1 = 0x0
        c1 = {cache_type = 1380622064, val_type = 32515, c = {avp_val = {n = 879769328, s = {s = 0x7fff347036f0 "", len = 852568}, re = 0x7fff347036f0}, 
            pval = {rs = {s = 0x7fff347036f0 "", len = 852568}, ri = 80, flags = 3}}, 
          i2s = "\300\266=R\003\177\000\000\330\264JR\003\177\000\000\260+p4\377\177"}
        s = {s = 0x7f0352466d68 "\001", len = 879767500}
        srevp = {0x11d4e623c73, 0xd0258}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
---Type <return> to continue, or q <return> to quit---
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#2  0x00000000004251f8 in run_actions (h=0x7fff34703000, a=0x7f0352457b28, msg=0x7f03524a9ef0) at action.c:1599
        t = 0x7f0352457b28
        ret = -1
        mod = 0x0
        ms = 0
        __FUNCTION__ = "run_actions"
#3  0x00000000004258cf in run_actions_safe (h=0x7fff34704560, a=0x7f0352457b28, msg=0x7f03524a9ef0) at action.c:1664
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {139652242251504, -3896159954071731659, 4290112, 140734073163440, 0, 0, 
                -3896159954084314571, 3895727266183627317}, __mask_was_saved = 0, __saved_mask = {__val = {139652242251504, 4290112, 140734073163440, 0, 0, 
                  140734073155888, 4346360, 0, 2048, 35239506176, 139652185359152, 140733193388032, 13764671360, 1731360010, 139652242251504, 
                  139652241976360}}}}}
        ret = 879769328
        ign_on_break = 0
#4  0x00000000004c85d2 in rval_get_int (h=0x7fff34704560, msg=0x7f03524a9ef0, i=0x7fff34703448, rv=0x7f0352458d50, cache=0x0) at rvalue.c:924
        r_avp = 0x7f03524554d0
        avp_val = {n = 1383988264, s = {s = 0x7f03527dfc28 "", len = 1380622064}, re = 0x7f03527dfc28}
        pval = {rs = {s = 0x7fff0000003c <Address 0x7fff0000003c out of bounds>, len = 35715777}, ri = 1383983416, flags = 32515}
        tmp = {s = 0x0, len = 0}
        s = 0x0
        r = 0
        ret = 0
        destroy_pval = 0
        __FUNCTION__ = "rval_get_int"
#5  0x00000000004cb35b in rval_expr_eval_int (h=0x7fff34704560, msg=0x7f03524a9ef0, res=0x7fff34703448, rve=0x7f0352458d48) at rvalue.c:1918
        i1 = 1393963008
        i2 = 32515
        ret = -1
        c1 = {cache_type = 2016, val_type = RV_NONE, c = {avp_val = {n = 1384402337, s = {
                s = 0x7f0352844da1 "H\205\300u*\213\023\061\311A\203\344 H\211\315A\t\324D\211#H\211\350H\213\034$H\213l$\bL\213d$\020H\203\304\030\303\017\037", len = 879768464}, re = 0x7f0352844da1}, pval = {rs = {
                s = 0x7f0352844da1 "H\205\300u*\213\023\061\311A\203\344 H\211\315A\t\324D\211#H\211\350H\213\034$H\213l$\bL\213d$\020H\203\304\030\303\017\037", len = 879768464}, ri = 879768497, flags = 32767}}, i2s = "\260&\026S\003\177\000\000\267\220\063M\003\177\000\000 \344\216R\003\177"}
        c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 1394046080, s = {s = 0x7f0353177480 "\340s\027S\003\177", 
                len = 879768288}, re = 0x7f0353177480}, pval = {rs = {s = 0x7f0353177480 "\340s\027S\003\177", len = 879768288}, ri = 879768312, 
              flags = 32767}}, i2s = "\260\063p4\001\000\000\000\252\363@\000\000\000\000\000\217;p4\377\177"}
        rv1 = 0x7fff347033b0
        rv2 = 0x7f0353171137
---Type <return> to continue, or q <return> to quit---
        __FUNCTION__ = "rval_expr_eval_int"
#6  0x00000000004cb55b in rval_expr_eval_int (h=0x7fff34704560, msg=0x7f03524a9ef0, res=0x7fff347038a8, rve=0x7f0352458548) at rvalue.c:1926
        i1 = 0
        i2 = 32767
        ret = -1
        c1 = {cache_type = 1379785760, val_type = 32515, c = {avp_val = {n = 1380533352, s = {s = 0x6c52494468 <Address 0x6c52494468 out of bounds>, 
                len = 879768800}, re = 0x6c52494468}, pval = {rs = {s = 0x6c52494468 <Address 0x6c52494468 out of bounds>, len = 879768800}, 
              ri = 1380622064, flags = 32515}}, i2s = "\330`BR\003\177\000\000`Ep4\377\177\000\000\000\202ER\003\177"}
        c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 1380622064, s = {s = 0x7f03524a9ef0 "\002", len = 879768704}, 
              re = 0x7f03524a9ef0}, pval = {rs = {s = 0x7f03524a9ef0 "\002", len = 879768704}, ri = 4347749, flags = 0}}, 
          i2s = "8DIR\003\177\000\000\020\260=R\003\177\000\000\000\215\v\000\000"}
        rv1 = 0x7f035280e023
        rv2 = 0x7fff34704eb0
        __FUNCTION__ = "rval_expr_eval_int"
#7  0x000000000041c168 in do_action (h=0x7fff34704560, a=0x7f0352459c58, msg=0x7f03524a9ef0) at action.c:1075
        ret = -5
        v = 0
        dst = {send_sock = 0xebd63234a31eb242, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000E\201|\200\225\340y\364"}, sin = {
              sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "E\201|\200\225\340y\364"}, sin6 = {sin6_family = 0, sin6_port = 0, 
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "E\201|\200\225\340y\364\360\236JR\003\177\000", __u6_addr16 = {33093, 32892, 57493, 
                    62585, 40688, 21066, 32515, 0}, __u6_addr32 = {2155643205, 4101628053, 1380622064, 32515}}}, sin6_scope_id = 4290112}}, id = 0, 
          proto = -80 '\260', send_flags = {f = 78 'N', blst_imask = 112 'p'}}
        tmp = 0x7fff34703a10 "\360>p4\377\177"
        new_uri = 0x4cb757 "\211E\314\213E\314H\230H\301\350?H\205\300\017\205\r\r"
        end = 0x10 <Address 0x10 out of bounds>
        crt = 0x0
        cmd = 0x7f0351e7702f
        len = 1373676905
        user = 32515
        uri = {user = {s = 0x0, len = -1}, passwd = {s = 0x7f03524a9ef0 "\002", len = 794018357}, host = {
            s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 0}, port = {s = 0x0, len = 0}, params = {
            s = 0xc9ee0f2a2e93c235 <Address 0xc9ee0f2a2e93c235 out of bounds>, len = 1380622064}, sip_params = {
            s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 879775408}, headers = {s = 0x7fff347038b0 "\020:p4\377\177", 
            len = 5026651}, port_no = 16480, proto = 13424, type = 32767, flags = 7, transport = {s = 0x26632750a <Address 0x26632750a out of bounds>, 
            len = 1387503176}, ttl = {s = 0x7fff34703b60 "v\352'L#pg<65\n\336w\274\262\300T\323\252\336\355\277\333\071\360\236JR\003\177", 
            len = 1384878755}, user_param = {s = 0x7f035317111e <Address 0x7f035317111e out of bounds>, len = 16}, maddr = {s = 0x7f0352b39e40 "", 
            len = 7}, method = {s = 0x10 <Address 0x10 out of bounds>, len = 1}, lr = {s = 0x7f03524563e8 "\001", len = 879770072}, r2 = {
            s = 0x7f03524a9ef0 "\002", len = 879773024}, gr = {s = 0x7f0351e77028 "latin1", len = 7}, transport_val = {
            s = 0x10 <Address 0x10 out of bounds>, len = 1373639906}, ttl_val = {s = 0x7e0 <Address 0x7e0 out of bounds>, len = 0}, user_param_val = {
            s = 0x7f0352455cd0 "\004", len = 879771192}, maddr_val = {s = 0x7f03524a9ef0 "\002", len = 879773024}, method_val = {
---Type <return> to continue, or q <return> to quit---
            s = 0x2b5c7144355d577c <Address 0x2b5c7144355d577c out of bounds>, len = 1010922044}, lr_val = {
            s = 0x2ee665ba626b7070 <Address 0x2ee665ba626b7070 out of bounds>, len = 1233322726}, r2_val = {
            s = 0x2ff0276958937c61 <Address 0x2ff0276958937c61 out of bounds>, len = -2147483648}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x347039d8000b8d00 <Address 0x347039d8000b8d00 out of bounds>, len = 1380622064}, passwd = {s = 0x7f0352455970 "\370\002", 
            len = 879773024}, host = {s = 0x0, len = 1}, port = {s = 0x7f03524a9ef0 "\002", len = 672383541}, params = {
            s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 879775408}, sip_params = {s = 0x0, len = 0}, headers = {
            s = 0xc9ee0f2a2b53c235 <Address 0xc9ee0f2a2b53c235 out of bounds>, len = -491929035}, port_no = 0, proto = 0, type = ERROR_URI_T, 
          flags = 1380622064, transport = {s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 879775408}, ttl = {s = 0x0, 
            len = 0}, user_param = {s = 0x7fff347036c0 "\360\236JR\003\177", len = 4346360}, maddr = {
            s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 879775408}, method = {s = 0x0, len = 879769912}, lr = {
            s = 0x7fff3470393c "\003\177", len = 879769920}, r2 = {s = 0x7f0352486cf0 "\001", len = 1380622064}, gr = {s = 0x7f03524554d0 "\354\002", 
            len = 1}, transport_val = {s = 0x7fff34703750 "\260\070p4\377\177", len = 5014994}, ttl_val = {
            s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 0}, user_param_val = {s = 0x7f035242efc0 "", 
            len = 1380622064}, maddr_val = {s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 0}, method_val = {
            s = 0x7f03524563f0 "\004", len = 879770072}, lr_val = {s = 0x7f03524a9ef0 "\002", len = 879773024}, r2_val = {
            s = 0x137 <Address 0x137 out of bounds>, len = 1380622064}, gr_val = {s = 0x7f03524554d0 "\354\002", len = 879773024}}
        u = 0x918152b177dd6272
        port = 29312
        dst_host = 0xa72f018c1958068a
        i = -1952382309
        flags = 0
        avp = 0x33f43c2740ca7ff9
        st = {flags = 4290112, id = 0, name = {n = 879775408, s = {s = 0x7fff34704eb0 "\r", len = 0}, re = 0x7fff34704eb0}, avp = 0x0}
        sct = 0x2806a06d03520def
        sjt = 0x7fff34703ff0
        rve = 0x7f0352458548
        mct = 0x7f0352457328
        rv = 0x7f03524a9ef0
        rv1 = 0x7fff34703e38
        c1 = {cache_type = 1380276592, val_type = 32515, c = {avp_val = {n = 879768976, s = {s = 0x7fff34703590 "", len = 0}, re = 0x7fff34703590}, pval = {
              rs = {s = 0x7fff34703590 "", len = 0}, ri = 1380473976, flags = 1}}, 
          i2s = "`:p4\377\177\000\000\377\377\377\377\000\000\000\000\000\067p4\377\177"}
        s = {s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = 1380622064}
        srevp = {0x7fff34703aa8, 0x7fff34703a88}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
---Type <return> to continue, or q <return> to quit---
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#8  0x00000000004251f8 in run_actions (h=0x7fff34704560, a=0x7f0352459c58, msg=0x7f03524a9ef0) at action.c:1599
        t = 0x7f0352459c58
        ret = -1
        mod = 0x1bce9d96
        ms = 0
        __FUNCTION__ = "run_actions"
#9  0x000000000041c3ba in do_action (h=0x7fff34704560, a=0x7f035245ad18, msg=0x7f03524a9ef0) at action.c:1090
        ret = 1
        v = 1
        dst = {send_sock = 0x7fff34703eb0, to = {s = {sa_family = 62666, sa_data = "\033P\003\177\000\000\nu2f\000\000\000"}, sin = {sin_family = 62666, 
              sin_port = 20507, sin_addr = {s_addr = 32515}, sin_zero = "\nu2f\000\000\000"}, sin6 = {sin6_family = 62666, sin6_port = 20507, 
              sin6_flowinfo = 32515, sin6_addr = {__in6_u = {__u6_addr8 = "\nu2f", '\000' <repeats 11 times>, __u6_addr16 = {29962, 26162, 0, 0, 0, 0, 0, 
                    0}, __u6_addr32 = {1714582794, 0, 0, 0}}}, sin6_scope_id = 879771152}}, id = 32767, proto = -16 '\360', send_flags = {f = 158 '\236', 
            blst_imask = 74 'J'}}
        tmp = 0x34703fa0 <Address 0x34703fa0 out of bounds>
        new_uri = 0x7f03524a9ef0 "\002"
        end = 0xffffffffffffffff <Address 0xffffffffffffffff out of bounds>
        crt = 0x7f03524a9ef0 "\002"
        cmd = 0x0
        len = 684916
        user = 3
        uri = {user = {s = 0x0, len = -1}, passwd = {s = 0x7f03524a9ef0 "\002", len = 980664885}, host = {
            s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 879775408}, port = {s = 0x0, len = 0}, params = {
            s = 0xc9ee0f2a35b3c235 <Address 0xc9ee0f2a35b3c235 out of bounds>, len = -491929035}, sip_params = {
            s = 0x7fff00000000 <Address 0x7fff00000000 out of bounds>, len = 1373835026}, headers = {s = 0xf5dd44 "", len = 0}, port_no = 15624, 
          proto = 13424, type = SIPS_URI_T, flags = 1344330752, transport = {s = 0x0, len = -1}, ttl = {s = 0x0, len = 1380622064}, user_param = {
            s = 0x7fff34703e00 "\260>p4\377\177", len = 1344003728}, maddr = {s = 0x3a28d <Address 0x3a28d out of bounds>, len = 1}, method = {
            s = 0x7f034545b780 "", len = 0}, lr = {s = 0x3a28d <Address 0x3a28d out of bounds>, len = 1024}, r2 = {s = 0x7fff34703db0 "\bEIR\003\177", 
            len = 1343837958}, gr = {s = 0x134703ef4 <Address 0x134703ef4 out of bounds>, len = 1162196864}, transport_val = {
            s = 0x7fff34703dc0 "\340=p4\377\177", len = 1343838223}, ttl_val = {s = 0x9 <Address 0x9 out of bounds>, len = 1162196848}, user_param_val = {
            s = 0x0, len = 1162196864}, maddr_val = {s = 0x7f0352494508 "\001", len = 1343840266}, method_val = {s = 0x7fff34703de0 "", len = 1343840292}, 
          lr_val = {s = 0x234703e00 <Address 0x234703e00 out of bounds>, len = 1344330752}, r2_val = {s = 0x7fff34703e00 "\260>p4\377\177", 
            len = 1343840882}, gr_val = {s = 0xffffffff00000000 <Address 0xffffffff00000000 out of bounds>, len = 1380622064}}
        next_hop = {user = {s = 0x6e726f596d335329 <Address 0x6e726f596d335329 out of bounds>, len = 1348808012}, passwd = {
            s = 0x7f03524260d8 "\345W\bO\003\177", len = -129190690}, host = {s = 0xaf30c30a75c85e2f <Address 0xaf30c30a75c85e2f out of bounds>, 
            len = -2147483648}, port = {s = 0x0, len = 0}, params = {s = 0x72f7c663913c4094 <Address 0x72f7c663913c4094 out of bounds>, len = -426859285}, 
          sip_params = {s = 0x42e7eb8053321989 <Address 0x42e7eb8053321989 out of bounds>, len = 1140112760}, headers = {
            s = 0x3c6770234c27ea76 <Address 0x3c6770234c27ea76 out of bounds>, len = -569756362}, port_no = 54100, proto = 57002, type = 970702829, 
---Type <return> to continue, or q <return> to quit---
          flags = 1380622064, transport = {s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 879775408}, ttl = {s = 0x0, 
            len = 0}, user_param = {s = 0x7fff34703c50 "`=p4\377\177", len = 4346360}, maddr = {
            s = 0xfb2a69fecc0ce9e2 <Address 0xfb2a69fecc0ce9e2 out of bounds>, len = -1805102720}, method = {
            s = 0xabb53848b1c1027a <Address 0xabb53848b1c1027a out of bounds>, len = -1526389988}, lr = {
            s = 0x9d92188b3f3d276c <Address 0x9d92188b3f3d276c out of bounds>, len = 1118342707}, r2 = {
            s = 0xce7e319443a0a60f <Address 0xce7e319443a0a60f out of bounds>, len = 1380622064}, gr = {s = 0x7f035242f2c0 "\355\001", len = 879770752}, 
          transport_val = {s = 0x0, len = 1373832625}, ttl_val = {s = 0xf48050 "\005", len = 4}, user_param_val = {s = 0xf59d73 "\375", len = 1380622064}, 
          maddr_val = {s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 879775408}, method_val = {s = 0x0, len = 0}, 
          lr_val = {s = 0x7fff34703d60 "\260=p4\377\177", len = 4348111}, r2_val = {s = 0x7f0352b39e98 "@\375\365", len = 1380622064}, gr_val = {
            s = 0x7f035242f2c0 "\355\001", len = 879773024}}
        u = 0x7f03524aab90
        port = 0
        dst_host = 0x200000000
        i = 32515
        flags = 1716709026
        avp = 0x7fff347043d0
        st = {flags = 2016, id = 0, name = {n = 16, s = {s = 0x10 <Address 0x10 out of bounds>, len = 1374122024}, re = 0x10}, avp = 0xffffffff00000007}
        sct = 0x3524aa0e8
        sjt = 0x417640
        rve = 0x7f0352457328
        mct = 0x7fff34703f30
        rv = 0x7f0351e014e2
        rv1 = 0x7f03501c281c
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 1384459376, s = {s = 0x7f0352852c70 "H\205\300H\211\303\017\204\244", 
                len = 879773199}, re = 0x7f0352852c70}, pval = {rs = {s = 0x7f0352852c70 "H\205\300H\211\303\017\204\244", len = 879773199}, ri = 16, 
              flags = 0}}, i2s = "(p\347Q\003\177\000\000\a\000\000\000\000\000\000\000\020\000\000\000\000"}
        s = {s = 0x10 <Address 0x10 out of bounds>, len = 1}
        srevp = {0x7f0352b39e40, 0x7}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#10 0x00000000004251f8 in run_actions (h=0x7fff34704560, a=0x7f0352455750, msg=0x7f03524a9ef0) at action.c:1599
        t = 0x7f035245ad18
        ret = 1
        mod = 0x3000000018
---Type <return> to continue, or q <return> to quit---
        ms = 0
        __FUNCTION__ = "run_actions"
#11 0x000000000041a280 in do_action (h=0x7fff34704560, a=0x7f0352430e88, msg=0x7f03524a9ef0) at action.c:715
        ret = -5
        v = 0
        dst = {send_sock = 0x7f03527e55b0, to = {s = {sa_family = 12288, sa_data = "\026S\003\177\000\000-\000\000\000\000\000\000"}, sin = {
              sin_family = 12288, sin_port = 21270, sin_addr = {s_addr = 32515}, sin_zero = "-\000\000\000\000\000\000"}, sin6 = {sin6_family = 12288, 
              sin6_port = 21270, sin6_flowinfo = 32515, sin6_addr = {__in6_u = {__u6_addr8 = "-\000\000\000\000\000\000\000\377\377\377\377\000\000\000", 
                  __u6_addr16 = {45, 0, 0, 0, 65535, 65535, 0, 0}, __u6_addr32 = {45, 0, 4294967295, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 8 '\b', 
          send_flags = {f = 69 'E', blst_imask = 73 'I'}}
        tmp = 0x505000000000000 <Address 0x505000000000000 out of bounds>
        new_uri = 0x7f03455d1aa1 "Call-ID: 698db2877152176f at 162.122.144.77\r\nCSeq: 5043 REGISTER\r\nContact: <sip:37028 at 162.122.144.77:5060;transport=tcp>;+sip.instance=\"<urn:uuid:dbd69841-c672-573d-9b27-8ef28cf1e94d>\"\r\nFrom: <sip:37028@"...
        end = 0x7f03455d1a9a "rport\r\nCall-ID: 698db2877152176f at 162.122.144.77\r\nCSeq: 5043 REGISTER\r\nContact: <sip:37028 at 162.122.144.77:5060;transport=tcp>;+sip.instance=\"<urn:uuid:dbd69841-c672-573d-9b27-8ef28cf1e94d>\"\r\nFrom: <sip"...
        crt = 0x524944d8 <Address 0x524944d8 out of bounds>
        cmd = 0x7f035241c320
        len = 1380625136
        user = 32515
        uri = {user = {
            s = 0x7f03527de95c "\226\201B\250\017\204\035\346|`\234|\374Qcq\\zy\360\003\346`\033|\231/\310Km\301\243\353\372\266=/\222\210\353\352", 
            len = 879772560}, passwd = {s = 0x7f03527dfc28 "", len = 1384011184}, host = {s = 0x7f03524946c0 "8", len = 1379774480}, port = {s = 0x0, 
            len = 1393964472}, params = {s = 0x7f0353163000 "", len = 1379774480}, sip_params = {s = 0x7fff34704290 "\300Bp4\004", len = 1350945346}, 
          headers = {s = 0x400000000 <Address 0x400000000 out of bounds>, len = 6488304}, port_no = 6259, proto = 99, type = ERROR_URI_T, 
          flags = 1380625088, transport = {s = 0x4347042c0 <Address 0x4347042c0 out of bounds>, len = 17}, ttl = {s = 0x7fff34704380 " Dp4\377\177", 
            len = 5780932}, user_param = {s = 0x7f03523db380 "", len = 1380625088}, maddr = {s = 0x7fff34704380 " Dp4\377\177", len = 5547077}, method = {
            s = 0x7f0300000001 <Address 0x7f0300000001 out of bounds>, len = 0}, lr = {s = 0x7f0300000001 <Address 0x7f0300000001 out of bounds>, 
            len = 1394045224}, r2 = {s = 0x7f03523dc358 "", len = 1379774480}, gr = {s = 0x7fff34704330 "#\036]E\003\177", len = 1350945346}, 
          transport_val = {s = 0x7f0352494508 "\001", len = 1380625136}, ttl_val = {s = 0x7fff347043d6 "\005\005\241\032]E\003\177", len = 879772631}, 
          user_param_val = {s = 0x7f03455d1e23 "", len = 1163729562}, maddr_val = {
            s = 0x7f03455d1aa1 "Call-ID: 698db2877152176f at 162.122.144.77\r\nCSeq: 5043 REGISTER\r\nContact: <sip:37028 at 162.122.144.77:5060;transport=tcp>;+sip.instance=\"<urn:uuid:dbd69841-c672-573d-9b27-8ef28cf1e94d>\"\r\nFrom: <sip:37028@"..., len = 879772624}, method_val = {
            s = 0x4523dbc08 <Address 0x4523dbc08 out of bounds>, len = 1163729508}, lr_val = {
            s = 0x417640 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\340\314\\", len = 331632304}, r2_val = {
            s = 0x7f03455d1a68 ";branch=z9hG4bK035abbd0e46b3a4269a2bdb6b49fed5d.1;rport\r\nCall-ID: 698db2877152176f at 162.122.144.77\r\nCSeq: 5043 REGISTER\r\nContact: <sip:37028 at 162.122.144.77:5060;transport=tcp>;+sip.instance=\"<urn:uuid:"..., len = 1163729512}, gr_val = {s = 0x7fff34704420 "\020Ep4\377\177", 
            len = 5802997}}
        next_hop = {user = {s = 0x7f03504294f0 "-982 at 127.0.0.1", len = 1346540784}, passwd = {s = 0x7f03504294f0 "-982 at 127.0.0.1", len = 1346540798}, 
          host = {s = 0x7f0350429532 "", len = 1346540784}, port = {s = 0x7f0350429532 "", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, 
            len = 0}, headers = {s = 0x34704120 <Address 0x34704120 out of bounds>, len = 1350945346}, port_no = 0, proto = 0, type = 57, flags = 0, 
---Type <return> to continue, or q <return> to quit---
          transport = {s = 0x3664333739653235 <Address 0x3664333739653235 out of bounds>, len = 1380534264}, ttl = {s = 0x2d <Address 0x2d out of bounds>, 
            len = 0}, user_param = {s = 0x2d <Address 0x2d out of bounds>, len = 982}, maddr = {s = 0x3000000018 <Address 0x3000000018 out of bounds>, 
            len = 879772832}, method = {s = 0x7fff347043e0 "\232\032]E\003\177", len = 1387491264}, lr = {s = 0x0, len = 1384396594}, r2 = {
            s = 0xfbad8001 <Address 0xfbad8001 out of bounds>, len = 1353056165}, gr = {s = 0x7f0350a5ffa5 "52e97149-3d6-", len = 1391030601}, 
          transport_val = {s = 0x2d <Address 0x2d out of bounds>, len = 982}, ttl_val = {s = 0x1e <Address 0x1e out of bounds>, len = 1391857674}, 
          user_param_val = {s = 0x7f03524898a0 "127.0.0.1", len = 879772224}, maddr_val = {
            s = 0x3664333739653235 <Address 0x3664333739653235 out of bounds>, len = 879772224}, method_val = {s = 0x7f0353163578 "", len = 5}, lr_val = {
            s = 0xa8428197 <Address 0xa8428197 out of bounds>, len = 1391859756}, r2_val = {s = 0x3000000018 <Address 0x3000000018 out of bounds>, 
            len = 0}, gr_val = {s = 0x7fff00000017 <Address 0x7fff00000017 out of bounds>, len = 44108294}}
        u = 0x7f03524aa0e8
        port = 0
        dst_host = 0x7fff34704eb0
        i = 7
        flags = 32515
        avp = 0x7fff34704510
        st = {flags = 66, id = 0, name = {n = 0, s = {s = 0x0, len = 1346540784}, re = 0x0}, avp = 0x7f0352843732}
        sct = 0x552ee0
        sjt = 0xcf8b0
        rve = 0x7f035242f4e0
        mct = 0x7f03523db380
        rv = 0x7fff347041e0
        rv1 = 0x7f03524aac00
        c1 = {cache_type = 1353056191, val_type = 32515, c = {avp_val = {n = 1353056165, s = {s = 0x7f0350a5ffa5 "52e97149-3d6-", len = 1353056191}, 
              re = 0x7f0350a5ffa5}, pval = {rs = {s = 0x7f0350a5ffa5 "52e97149-3d6-", len = 1353056191}, ri = 879771776, flags = 32767}}, 
          i2s = "\360\224BP\003\177\000\000pAp4\377\177\000\000\346# P\003\177"}
        s = {s = 0x7f0350a5ffa5 "52e97149-3d6-", len = 1353056178}
        srevp = {0x7f0350a5ffa5, 0x7f0350a5ffa5}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#12 0x00000000004251f8 in run_actions (h=0x7fff34704560, a=0x7f035242ec60, msg=0x7f03524a9ef0) at action.c:1599
        t = 0x7f0352430e88
        ret = -1
        mod = 0x417640
        ms = 0
---Type <return> to continue, or q <return> to quit---
        __FUNCTION__ = "run_actions"
#13 0x0000000000425997 in run_top_route (a=0x7f035242ec60, msg=0x7f03524a9ef0, c=0x0) at action.c:1685
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {139652242252008, -3896159951198633419, 4290112, 140734073163440, 0, 0, 
                -3896159951144107467, 3895727266183627317}, __mask_was_saved = 0, __saved_mask = {__val = {139652212551841, 4294967296, 14, 
                  140734073143310, 0, 140734073161232, 139652212552304, 4410937633660, 0, 4611686024061808028, 139652242251504, 140734073161296, 5082107, 
                  5174740560, 139652242251504, 0}}}}}
        p = 0x7fff34704560
        ret = 1380622568
        sfbk = 0
#14 0x00000000004a7ac7 in receive_msg (
    buf=0x7f03455d1a20 "REGISTER sip:10.117.50.101 SIP/2.0\r\nVia: SIP/2.0/TCP 162.122.144.77:5060;branch=z9hG4bK035abbd0e46b3a4269a2bdb6b49fed5d.1;rport\r\nCall-ID: 698db2877152176f at 162.122.144.77\r\nCSeq: 5043 REGISTER\r\nContact:"..., len=1027, rcv_info=0x7f03455d1750) at receive.c:212
        msg = 0x7f03524a9ef0
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1394045224, jmp_env = {{__jmpbuf = {140734073161664, 140734073162212, 17587891077120, 
                139652025358880, 139652025358136, 48408368952, 4290112, 4411811188400}, __mask_was_saved = 0, __saved_mask = {__val = {139652025358136, 
                  4290112, 140734073163440, 140734073161600, 5431575, 139652239282693, 140734073161648, 140734073162212, 139652025358136, 2823282947, 
                  4410931417087, 42949672963, 139652025359904, 0, 139652025359907, 140734073161760}}}}}
        ret = 32515
        inb = {
          s = 0x7f03455d1a20 "REGISTER sip:10.117.50.101 SIP/2.0\r\nVia: SIP/2.0/TCP 162.122.144.77:5060;branch=z9hG4bK035abbd0e46b3a4269a2bdb6b49fed5d.1;rport\r\nCall-ID: 698db2877152176f at 162.122.144.77\r\nCSeq: 5043 REGISTER\r\nContact:"..., len = 1027}
        __FUNCTION__ = "receive_msg"
#15 0x0000000000530b74 in receive_tcp_msg (
    tcpbuf=0x7f03455d1a20 "REGISTER sip:10.117.50.101 SIP/2.0\r\nVia: SIP/2.0/TCP 162.122.144.77:5060;branch=z9hG4bK035abbd0e46b3a4269a2bdb6b49fed5d.1;rport\r\nCall-ID: 698db2877152176f at 162.122.144.77\r\nCSeq: 5043 REGISTER\r\nContact:"..., len=1027, rcv_info=0x7f03455d1750, con=0x7f03455d1738)
    at tcp_read.c:1185
        buf = 0x0
        bsize = 0
        blen = 3
        __FUNCTION__ = "receive_tcp_msg"
#16 0x0000000000531c73 in tcp_read_req (con=0x7f03455d1738, bytes_read=0x7fff347049ec, read_flags=0x7fff347049e4) at tcp_read.c:1387
        bytes = 1027
        total_bytes = 1027
        resp = 1
        size = 139652242173672
        req = 0x7f03455d17b8
        dst = {send_sock = 0x7f03455d1738, to = {s = {sa_family = 482, sa_data = "\375%\002\000\000\000\001\000p4\v\000\000"}, sin = {sin_family = 482, 
              sin_port = 9725, sin_addr = {s_addr = 2}, sin_zero = "\001\000p4\v\000\000"}, sin6 = {sin6_family = 482, sin6_port = 9725, sin6_flowinfo = 2, 
              sin6_addr = {__in6_u = {__u6_addr8 = "\001\000p4\v\000\000\000\000\002\216\000\000\000\000", __u6_addr16 = {1, 13424, 11, 0, 512, 142, 0, 0}, 
                  __u6_addr32 = {879755265, 11, 9306624, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', 
---Type <return> to continue, or q <return> to quit---
            blst_imask = 0 '\000'}}
        c = 0 '\000'
        ret = 0
        __FUNCTION__ = "tcp_read_req"
#17 0x0000000000533662 in handle_io (fm=0x7f0352496ee8, events=1, idx=-1) at tcp_read.c:1617
        ret = 8
        n = 837
        read_flags = 1
        con = 0x7f03455d1738
        s = 11
        resp = 1
        t = 637339767
        __FUNCTION__ = "handle_io"
#18 0x000000000052bffc in io_wait_loop_epoll (h=0x8e0200, t=2, repeat=0) at io_wait.h:1092
        n = 1
        r = 0
        fm = 0x7f0352496ee8
        revents = 1
        __FUNCTION__ = "io_wait_loop_epoll"
#19 0x0000000000533f8b in tcp_receive_loop (unix_sock=37) at tcp_read.c:1728
        __FUNCTION__ = "tcp_receive_loop"
#20 0x000000000052655b in tcp_init_children () at tcp_main.c:4959
        r = 2
        i = 3
        reader_fd_1 = 37
        pid = 0
        si_desc = "tcp receiver (generic)\000\000 at vA\000\003\000\000\000`\237HR\003\177\000\000 at vA\000\000\000\000\000\000Lp4\377\177\000\000(\250O\000\000\000\000\000 at vA\000\000\000\000\000\260\233HR\001\000\000\000\313$^\000\000\000\000\000 at vA\000\377\377\377\377\033\000\000\000\000\000\000\000\320\256BR\003\177\000\000`\237HR\003\177\000\000 at vA\000\000\000\000"
        si = 0x0
        __FUNCTION__ = "tcp_init_children"
#21 0x000000000047001b in main_loop () at main.c:1702
        i = 4
        pid = 977
        si = 0x0
        si_desc = "udp receiver child=3 sock=20.0.48.101:5060\000\060\000\177\000\000\320\022CR\003\177\000\000\216\246^\000\000\000\000\000p\230^\000\000\000\000\000\\\r\301F\000\000\000\000 at vA\000\000\000\000\000\260Np4\377\177", '\000' <repeats 18 times>"\360, Lp4\377\177\000\000\226\312K\000\000\000\000"
        nrprocs = 4
        __FUNCTION__ = "main_loop"
#22 0x0000000000472c83 in main (argc=13, argv=0x7fff34704eb8) at main.c:2533
---Type <return> to continue, or q <return> to quit---
        cfg_stream = 0xecd010
        c = -1
        r = 0
        tmp = 0x7fff34705f86 ""
        tmp_len = 32767
        port = 879775528
        proto = 0
        options = 0x5e2bc8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
        ret = -1
        seed = 1354694317
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7f03527ebac0
        p = 0x5cccf0 "H\211l$\330L\211d$\340H\215-\377\202*"
        __FUNCTION__ = "main"
-------------- next part --------------
A non-text attachment was scrubbed...
Name: corekamailio.zip
Type: application/zip
Size: 1022871 bytes
Desc: not available
URL: <http://lists.sip-router.org/pipermail/sr-users/attachments/20140211/2b6a3f88/attachment-0001.zip>


More information about the sr-users mailing list