Hi all

A server running version 4.4.4+0~20161223011227 has segfaulted for the second
time this month. I'm attaching a bt in case someone can explain it to me. 

cheers,

Jon

root@14cn9:/var/tmp# gdb /usr/sbin/kamailio 
core.kamailio.10623.14cn9.serverdomain.com.1485825987 
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from 
/usr/lib/debug/.build-id/8c/978e3f277d6d1ec67cd26a6f8c2b8da806d092.debug...done.
done.
[New LWP 10623]

warning: .dynamic section for "/lib/x86_64-linux-gnu/libpthread.so.0" is not at 
the expected address (wrong library or version mismatch?)
Warning: couldn't activate thread debugging using libthread_db: Cannot find new 
threads: generic error

warning: File "/lib/x86_64-linux-gnu/libthread_db-1.0.so" auto-loading has been 
declined by your `auto-load safe-path' set to "$debugdir:$datadir/auto-load".
To enable execution of this file add
        add-auto-load-safe-path /lib/x86_64-linux-gnu/libthread_db-1.0.so
line to your configuration file "/root/.gdbinit".
To completely disable this security protection add
        set auto-load safe-path /
line to your configuration file "/root/.gdbinit".
For more information about this security protection see the
"Auto-loading safe path" section in the GDB manual.  E.g., run from the shell:
        info "(gdb)Auto-loading safe path"

warning: Unable to find libthread_db matching inferior's thread library, thread 
debugging will not be available.
Warning: couldn't activate thread debugging using libthread_db: Cannot find new 
threads: generic error

warning: File "/lib/x86_64-linux-gnu/libthread_db-1.0.so" auto-loading has been 
declined by your `auto-load safe-path' set to "$debugdir:$datadir/auto-load".

warning: Unable to find libthread_db matching inferior's thread library, thread 
debugging will not be available.
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f 
/etc/kamailio/sbc.cfg -'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  get_send_socket2 (force_send_socket=0xf, to=0x7ffd144aa740, proto=1, 
mismatch=0x0) at forward.c:222
222     forward.c: No such file or directory.
(gdb) bt full
#0  get_send_socket2 (force_send_socket=0xf, to=0x7ffd144aa740, proto=1, 
mismatch=0x0) at forward.c:222
        __FUNCTION__ = "get_send_socket2"
#1  0x00007f26c8e0baa6 in uri2dst2 (dns_h=0x7f24c6ca7178, dst=0x7f24c6ca70b8, 
force_send_socket=0x1, sflags=..., uri=0x0, proto=-1005387774) at ut.h:305
        parsed_uri = {user = {s = 0x7f26cb5afebc "15185535074@1.2.3.123:5060", 
len = 11}, passwd = {s = 0x0, len = 0}, host = {s = 0x7f26cb5afec8 
"1.2.3.123:5060", len = 12}, port = {
            s = 0x7f26cb5afed5 "5060", len = 4}, params = {s = 0x0, len = 0}, 
sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, 
proto = 0, type = SIP_URI_T, flags = (unknown: 0), 
          transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param 
= {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, 
lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, 
          gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val 
= {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 
0x0, len = 0}, method_val = {s = 0x0, len = 0}, 
          lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s 
= 0x0, len = 0}}
        ip_found = -1005387774
        to = {s = {sa_family = 2, sa_data = 
"\023\304\306\001\066{\000\000\000\000\000\000\000"}, sin = {sin_family = 2, 
sin_port = 50195, sin_addr = {s_addr = 2067136966}, 
            sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 
2, sin6_port = 50195, sin6_flowinfo = 2067136966, sin6_addr = {__in6_u = 
{__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {
                  0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, 
sin6_scope_id = 0}}
        err = 0
        __FUNCTION__ = "uri2dst2"
#2  0x00007f26c8e0d797 in prepare_new_uac (t=0x7f24c6ca6ca0, 
i_req=0x7f26c906d1c0 <faked_req>, branch=1, uri=0x7ffd144aa9d0, path=0x2, 
next_hop=0x0, fsocket=0xf, snd_flags=..., fproto=0, flags=2, 
    instance=0x7f26c906d800 <faked_req+1600>, ruid=0x7f26c906d818 
<faked_req+1624>, location_ua=0x7f26c906d828 <faked_req+1640>) at t_fwd.c:431
        shbuf = 0x7ffd144aa9d0 "X\016[\313&\177"
        parsed_uri_bak = {user = {s = 0x7f26cb5b0e5c 
"15185535074@1.2.3.123:5060", len = 11}, passwd = {s = 0x0, len = 0}, host = {s 
= 0x7f26cb5b0e68 "1.2.3.123:5060", len = 12}, port = {
            s = 0x7f26cb5b0e75 "5060", len = 4}, params = {s = 0x0, len = 0}, 
sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, 
proto = 0, type = SIP_URI_T, flags = (unknown: 0), 
          transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param 
= {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, 
lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, 
          gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val 
= {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 
0x0, len = 0}, method_val = {s = 0x0, len = 0}, 
          lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s 
= 0x0, len = 0}}
        ret = -478
        len = 32548
        msg_uri_bak = {s = 0x7f26cb5b0e58 "sip:15185535074@1.2.3.123:5060", len 
= 33}
        dst_uri_bak = {s = 0x0, len = 0}
        dst_uri_backed_up = 1
        path_bak = {s = 0x0, len = 0}
        instance_bak = {s = 0x0, len = 0}
        ruid_bak = {s = 0x0, len = 0}
        ua_bak = {s = 0x0, len = 0}
        force_send_socket_bak = 0x1
        dst = 0x7f24c6ca70b8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = 
{{__jmpbuf = {140724943890992, -8664550427694897703, 139804597062864, 
139804558152128, 139795930705056, 139795930706104, 
                8663656708077872601, -8664549922703186471}, __mask_was_saved = 
0, __saved_mask = {__val = {140724943891568, 140724943891472, 139804564709766, 
8388608, 7497296, 675816, 891312, 901648, 8, 10, 
                  12007018592332922112, 891312, 6243476, 0, 6978052, 
7209399}}}}}
        __FUNCTION__ = "prepare_new_uac"
#3  0x00007f26c8e10355 in add_uac (t=0x7f24c6ca6ca0, request=0x7f26c906d1c0 
<faked_req>, uri=0x1, next_hop=0x0, path=0x2, proxy=0x0, fsocket=0xf, 
snd_flags=..., proto=0, flags=340436804, 
    instance=0x7f26c906d800 <faked_req+1600>, ruid=0x7f26c906d818 
<faked_req+1624>, location_ua=0x7f26c906d828 <faked_req+1640>) at t_fwd.c:788
        branch = 1
        __FUNCTION__ = "add_uac"
#4  0x00007f26c8e18c3a in t_forward_nonack (t=0x7f24c6ca6ca0, 
p_msg=0x7f26c906d1c0 <faked_req>, proxy=0x1, proto=0) at t_fwd.c:1667
        current_uri = {s = 0x0, len = -922299968}
        q = 0
        t_invite = 0x2
        success_branch = -922298328
        lock_replies = 2
        dst_uri = {s = 0x100000000 <error: Cannot access memory at address 
0x100000000>, len = 340439040}
        path = {s = 0x7f24c972c3a8 "", len = 1}
        instance = {
          s = 0x7f26c6cd4c40 <wr_buf> 
"\027\003\003\001Փ\342M\033\377\300F\030,\026\263}Y!\332lėr\304\nZŞ@T\021\017\070G\026\t\240}\373\265\"\022\030m\363o$\342\307\373\240[\256ݬ\325\343\330\032\213\363\027\022}\347R\244\355:}\254\346vک\303'|\200|hՑ\214L-d\343\375\210cO
 
·\326\361\261\003\375{u.}z\006\252l\353\020\225f\236\263Q\233*\305u\201Ťƪ\212\302o\313\024\064\216L)U\a\222\063(\023\224+}\347\";\311u1\317`(\261\260\355\272\315\035\n\206B`\224\210:\265`p\313LHe;@&\231\232\340z\"@\222\366k&\375%\273A\373=\262V\243d;\365\241",
 <incomplete sequence \340>..., len = 0}
        ruid = {s = 0x10000 <error: Cannot access memory at address 0x10000>, 
len = -961935824}
        location_ua = {s = 0x0, len = -874823191}
        si = 0xcb5b0c48
        backup_bflags = 0
        bflags = 0
        __FUNCTION__ = "t_forward_nonack"
#5  0x00007f26c8dda197 in _w_t_relay_to (force_proto=<optimized out>, 
proxy=<optimized out>, p_msg=<optimized out>) at tm.c:1412
        t = 0x7ffd144aa744
---Type <return> to continue, or q <return> to quit---
        res = 340436804
#6  w_t_relay (p_msg=0xf, _foo=0x7ffd144aa740 "\002", _bar=0x1 <error: Cannot 
access memory at address 0x1>) at tm.c:1626
No locals.
#7  0x0000000000454b60 in do_action (h=0x7ffd144ab4b0, a=0x7f26cb52c270, 
msg=0x7f26c906d1c0 <faked_req>) at action.c:1060
        ret = -5
        v = 0
        dst = {send_sock = 0xd67a, to = {s = {sa_family = 5919, sa_data = 
"\334\313&\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 5919, 
sin_port = 52188, sin_addr = {s_addr = 32550}, 
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 
5919, sin6_port = 52188, sin6_flowinfo = 32550, sin6_addr = {__in6_u = {
                  __u6_addr8 = 
"\000\000\000\000\000\000\000\000\374\310H\000\000\000\000", __u6_addr16 = {0, 
0, 0, 0, 51452, 72, 0, 0}, __u6_addr32 = {0, 0, 4770044, 0}}}, sin6_scope_id = 
16}}, id = 690, 
          proto = -106 '\226', send_flags = {f = 176 '\260', blst_imask = 74 
'J'}}
        end = 0x7ffd144ab4b0 "\001"
        uri = {user = {s = 0x7ffd144ace20 "\004", len = 4337712}, passwd = {s = 
0x0, len = 0}, host = {s = 0x1000017ac <error: Cannot access memory at address 
0x1000017ac>, len = -883777136}, port = {
            s = 0x7ffd144ab600 "", len = -922299968}, params = {s = 
0x7ffd144ab600 "", len = -922299968}, sip_params = {s = 0x0, len = 931380480}, 
headers = {
            s = 0x7f24c6294f00 "BYE sip:2024558888@12.7.192.29:6060 
SIP/2.0\r\nVia: SIP/2.0/UDP 
1.2.3.4;branch=z9hG4bK22b3.10c96ffa224989a5381b9179586f8729.0\r\nVia: 
SIP/2.0/UDP 1.2.3.115;received=1.2.3.115;rport=5060;branch=z"..., len = 
-883773936}, port_no = 65535, proto = 65535, type = ERROR_URI_T, flags = 
(unknown: 3372667328), transport = {s = 0x7ffd144ace20 "\004", len = 
340439652}, ttl = {s = 0x0, 
            len = 4361660}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, 
len = 0}, method = {s = 0x17544e0 "x\326\a\314&\177", len = 340440848}, lr = {s 
= 0x7f26cbe3d1c4 "[%d]", len = -874262073}, r2 = {
            s = 0x0, len = -875421847}, gr = {s = 0x0, len = 0}, transport_val 
= {s = 0x7ffd144ab2a0 "", len = 0}, ttl_val = {s = 0x0, len = 0}, 
user_param_val = {s = 0x0, len = 0}, maddr_val = {
            s = 0x7f26cbd2399a <_IO_vfprintf_internal+22490> 
"\200\275(\373\377\377", len = 690}, method_val = {s = 0x7f24c972c408 
"\220\200O\313&\177", len = 0}, lr_val = {s = 0x0, len = -915226208}, 
          r2_val = {s = 0x0, len = -883222360}, gr_val = {s = 0x0, len = -5}}
        next_hop = {user = {s = 0x297f <error: Cannot access memory at address 
0x297f>, len = 10}, passwd = {s = 0x20 <error: Cannot access memory at address 
0x20>, len = -875240802}, host = {
            s = 0x17544e0 "x\326\a\314&\177", len = 931380480}, port = {s = 
0x7f26c79b412d "%s: %s%.*s", len = -883772040}, params = {s = 0xffffffff 
<error: Cannot access memory at address 0xffffffff>, 
            len = -922299968}, sip_params = {s = 0x7ffd144ace20 "\004", len = 
340440032}, headers = {s = 0x0, len = 931380480}, port_no = 0, proto = 0, type 
= ERROR_URI_T, flags = (unknown: 3411197264), 
          transport = {s = 0x7ffd144ace20 "\004", len = -5}, ttl = {s = 
0x7ffd144ace20 "\004", len = -922299968}, user_param = {s = 0x0, len = 
4535845}, maddr = {s = 0x7ffd144ace20 "\004", len = -874262073}, 
          method = {s = 0x7f26cb52bd50 "%\001", len = -922299968}, lr = {s = 
0x600000000 <error: Cannot access memory at address 0x600000000>, len = 0}, r2 
= {s = 0x7ffd144ab400 "\341\377\377\377", len = 0}, 
          gr = {s = 0x7ffd144ab820 "\001", len = 0}, transport_val = {s = 0x0, 
len = 0}, ttl_val = {s = 0x7f26cbd2399a <_IO_vfprintf_internal+22490> 
"\200\275(\373\377\377", len = -875415142}, 
          user_param_val = {s = 0x7f26cbd2399a <_IO_vfprintf_internal+22490> 
"\200\275(\373\377\377", len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = 
{
            s = 0xffffffffffffffff <error: Cannot access memory at address 
0xffffffffffffffff>, len = 109}, lr_val = {s = 0xffffffff00000000 <error: 
Cannot access memory at address 0xffffffff00000000>, 
            len = -5}, r2_val = {s = 0x297f <error: Cannot access memory at 
address 0x297f>, len = 10}, gr_val = {s = 0x20 <error: Cannot access memory at 
address 0x20>, len = 931380480}}
        u = 0x7ffd144ab4b0
        flags = 0
        st = {flags = 10623, id = 0, name = {n = 10, s = {s = 0xa <error: 
Cannot access memory at address 0xa>, len = 32}, re = 0xa}, avp = 
0x7f26cbd4e29e <__GI__IO_default_xsputn+174>}
        sct = 0x7ffd144ab4b0
        sjt = 0x7ffd144ab4b0
        mct = 0x0
        rv = 0x4be504 <tcp_send+228>
        rv1 = 0x7f26c906d1c0 <faked_req>
        c1 = {cache_type = 340439171, val_type = 32765, c = {avp_val = {n = 
340439182, s = {s = 0x7ffd144ab08e "", len = 10136659}, re = 0x7ffd144ab08e}, 
pval = {rs = {s = 0x7ffd144ab08e "", len = 10136659}, 
              ri = 11, flags = 0}}, i2s = 
"_\254\232\000\000\000\000\000\000\275\203\067\313\177\241\246\000\000\000\000\000"}
        s = {s = 0x0, len = -947045976}
        srevp = {0x0, 0x7f26c8e14085 <e2e_cancel+1365>}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#8  0x0000000000453625 in run_actions (h=0xf, h@entry=0x7ffd144ab4b0, 
a=0x7ffd144aa740, msg=0x1) at action.c:1549
        ret = 340446752
        mod = 0x7f26cb52c270
        __FUNCTION__ = "run_actions"
#9  0x000000000045fff7 in run_actions_safe (h=0x7ffd144ace20, a=<optimized 
out>, msg=<optimized out>) at action.c:1614
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = 
{{__jmpbuf = {140724943893680, 8663656706762958297, 139804558152128, 
140724943900192, 140724943894452, 0, 8663656707417269721, 
                -8664549922703186471}, __mask_was_saved = 0, __saved_mask = 
{__val = {139804558152128, 4294967296, 4535845, 140724943894128, 11, 0, 0, 
139795947484431, 11, 139804605036954, 4, 0, 0, 0, 0, 
                  0}}}}}
        ret = <optimized out>
        ign_on_break = 0
#10 0x0000000000423030 in rval_get_int (h=0x7ffd144ace20, msg=0xf, 
i=0x7ffd144ab7b4, rv=0x0, cache=0x2) at rvalue.c:912
        r_avp = 0x7ffd144aa744
        avp_val = {n = 24462560, s = {s = 0x17544e0 "x\326\a\314&\177", len = 
0}, re = 0x17544e0}
        pval = {rs = {s = 0x7ffd144ace20 "\004", len = 340441392}, ri = 0, 
flags = 0}
        tmp = {s = 0x7ffd144ace20 "\004", len = -922299968}
---Type <return> to continue, or q <return> to quit---
        s = 0x7f26c906d1c0 <faked_req>
        r = 340436804
        ret = 340436804
        destroy_pval = 340446752
        __FUNCTION__ = "rval_get_int"
#11 0x0000000000428dbc in rval_expr_eval_int (h=0x7ffd144ace20, 
msg=0x7f26c906d1c0 <faked_req>, res=0x7ffd144ab7b4, rve=0x7f26cb52c6b0) at 
rvalue.c:1910
        i1 = 0
        i2 = -875300784
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 0, s = {s = 0x0, len = 340441888}, re = 0x0}, pval = {rs = {s = 0x0, len = 
340441888}, ri = 0, flags = 32765}}, 
          i2s = '\000' <repeats 12 times>, 
"\375\177\000\000\000\000\000\000\000"}
        c2 = {cache_type = 3419552154, val_type = 32550, c = {avp_val = {n = 0, 
s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 
931380480, flags = -1499365429}}, 
          i2s = "\377\377\377\377\377\377\377\377\060\271J\024\375\177\000\000 
\316J\024\375\177"}
        rv1 = 0x0
        rv2 = 0x0
        __FUNCTION__ = "rval_expr_eval_int"
#12 0x0000000000428eb6 in rval_expr_eval_int (h=0x7ffd144ace20, 
msg=0x7f26c906d1c0 <faked_req>, res=0x7ffd144ab930, rve=0x7f26cb52cdc0) at 
rvalue.c:1918
        i1 = 32765
        i2 = -922299968
        ret = -1
        c1 = {cache_type = 340446752, val_type = 32765, c = {avp_val = {n = 
-946126547, s = {s = 0x4c79b412d <error: Cannot access memory at address 
0x4c79b412d>, len = -883769528}, re = 0x4c79b412d}, pval = {
              rs = {s = 0x4c79b412d <error: Cannot access memory at address 
0x4c79b412d>, len = -883769528}, ri = -922299968, flags = 32550}}, 
          i2s = 
"\000\000\000\000\005\000\000\000\301\321\343\313&\177\000\000LGu\001\000"}
        c2 = {cache_type = 8, val_type = RV_NONE, c = {avp_val = {n = 
-874270310, s = {s = 0x7f26cbe3b19a "%H:%M:%S", len = 1}, re = 0x7f26cbe3b19a}, 
pval = {rs = {s = 0x7f26cbe3b19a "%H:%M:%S", len = 1}, 
              ri = 931380480, flags = -1499365429}}, i2s = "\020 
\000\061\060\066\062\063\300\321\006\311&\177\000\000\017\000\000\000\000"}
        rv1 = 0x7f26c906d1c0 <faked_req>
        rv2 = 0x0
        __FUNCTION__ = "rval_expr_eval_int"
#13 0x0000000000455037 in do_action (h=0x7ffd144ace20, a=0x7f26cb52dde8, 
msg=0x7f26c906d1c0 <faked_req>) at action.c:1030
        ret = -5
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 14, sa_data = '\000' 
<repeats 13 times>}, sin = {sin_family = 14, sin_port = 0, sin_addr = {s_addr = 
0}, sin_zero = "\000\000\000\000\000\000\000"}, 
            sin6 = {sin6_family = 14, sin6_port = 0, sin6_flowinfo = 0, 
sin6_addr = {__in6_u = {__u6_addr8 = 
"\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000", __u6_addr16 = 
{0, 0, 0, 0, 1, 0, 0, 
                    0}, __u6_addr32 = {0, 0, 1, 0}}}, sin6_scope_id = 
3325207609}}, id = 32548, proto = 81 'Q', send_flags = {f = 171 '\253', 
blst_imask = 216 '\330'}}
        end = 0x7f26cb52cdc0 "\004"
        uri = {user = {s = 0x16f9930 "PST", len = 340441632}, passwd = {s = 
0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {
            s = 0x373200000000 <error: Cannot access memory at address 
0x373200000000>, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, 
len = 931380480}, port_no = 12, proto = 0, type = 32550, 
          flags = (unknown: 3324156664), transport = {s = 0x7ffd144abac0 
"-A\233\307&\177", len = 340441824}, ttl = {s = 0x7f26c906d1c0 <faked_req> 
"7\324)", len = -874262079}, user_param = {
            s = 0x175474c "17:26:27 sbc[10623]: NOTICE: <script>: Node 
unavailable, trying next sip:1.2.3.123:5060 from group FREESWITCH M=INVITE 
R=sip:15185535074@1.2.3.123:5060 
ID=3480863f5afd0da91b6f2fbb2226d60c@12.7.1"..., len = -871908640}, maddr = {s = 
0x8 <error: Cannot access memory at address 0x8>, len = -874270310}, method = 
{s = 0x1 <error: Cannot access memory at address 0x1>, len = -874997598}, 
          lr = {s = 0x33323630315a4b5a <error: Cannot access memory at address 
0x33323630315a4b5a>, len = 8187}, r2 = {s = 0x0, len = 24462560}, gr = {s = 
0x7f26c79b412d "%s: %s%.*s", len = 24463152}, 
          transport_val = {s = 0x2010 <error: Cannot access memory at address 
0x2010>, len = -871901664}, ttl_val = {s = 0x1756740 "", len = 219}, 
user_param_val = {
            s = 0x2010 <error: Cannot access memory at address 0x2010>, len = 
-875219540}, maddr_val = {s = 0x7ffd144abbd0 "\300\321\006\311&\177", len = 
340441872}, method_val = {
            s = 0x7f26cc07d620 <main_arena> "", len = 24463168}, lr_val = {s = 
0x1754730 "`\002", len = 240}, r2_val = {s = 0xdb <error: Cannot access memory 
at address 0xdb>, len = -875214999}, gr_val = {
            s = 0x100000000 <error: Cannot access memory at address 
0x100000000>, len = 1}}
        next_hop = {user = {s = 0x8f <error: Cannot access memory at address 
0x8f>, len = 24462560}, passwd = {s = 0x100000000 <error: Cannot access memory 
at address 0x100000000>, len = -946126547}, host = {
            s = 0x7ffd144abcb8 "0", len = 24462560}, port = {s = 0x0, len = 
-874768803}, params = {s = 0x7ffd144abcb8 "0", len = 24462560}, sip_params = {
            s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, 
len = -946126547}, headers = {s = 0x7ffd144abcb8 "0", len = 0}, port_no = 21, 
proto = 0, type = ERROR_URI_T, 
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 
3420176444), transport = {s = 0x7f26c906d1c0 <faked_req> "7\324)", len = 
1485825987}, ttl = {
            s = 0x1754740 "<173>Jan 30 17:26:27 sbc[10623]: NOTICE: <script>: 
Node unavailable, trying next sip:1.2.3.123:5060 from group FREESWITCH M=INVITE 
R=sip:15185535074@1.2.3.123:5060 ID=3480863f5afd0da91b6f2fbb222"..., len = 
218}, user_param = {s = 0x7f26c906d460 <faked_req+672> "\v", len = 47}, maddr = 
{s = 0x3a706973 <error: Cannot access memory at address 0x3a706973>, len = 0}, 
method = {
            s = 0x1754740 "<173>Jan 30 17:26:27 sbc[10623]: NOTICE: <script>: 
Node unavailable, trying next sip:1.2.3.123:5060 from group FREESWITCH M=INVITE 
R=sip:15185535074@1.2.3.123:5060 ID=3480863f5afd0da91b6f2fbb222"..., len = 0}, 
lr = {s = 0x300000003 <error: Cannot access memory at address 0x300000003>, len 
= -922299968}, r2 = {s = 0x1a0000001b <error: Cannot access memory at address 
0x1a0000001b>, 
            len = 17}, gr = {s = 0x7500000000 <error: Cannot access memory at 
address 0x7500000000>, len = 1}, transport_val = {s = 0x0, len = -28800}, 
ttl_val = {s = 0x16f9930 "PST", len = 18}, 
          user_param_val = {s = 0x7f24c632a3a3 "FREESWITCH", len = 10488584}, 
maddr_val = {s = 0x9a8e50 <_km_log_func> "\340jA", len = 0}, method_val = {s = 
0x7f26c7bb7568 <_xlog_prefix> "\242C\233\307&\177", 
            len = 5}, lr_val = {s = 0x416ae0 <syslog@plt> "\377%\222\310X", len 
= -874790033}, r2_val = {s = 0x7f26cb56b670 "\020\243r\001", len = 48}, gr_val 
= {s = 0x7ffd144abd90 "\020KZ\313&\177", 
            len = 340442320}}
        u = 0x7f26cb52cdc0
        flags = 0
        st = {flags = 143, id = 0, name = {n = 24462560, s = {s = 0x17544e0 
"x\326\a\314&\177", len = 0}, re = 0x17544e0}, avp = 0x7f26c79b412d}
        sct = 0x7f26cb52cdc0
---Type <return> to continue, or q <return> to quit---
        sjt = 0x7f26cb52cdc0
        mct = 0x0
        rv = 0x7f26c79b412d
        rv1 = 0x7f26c906d1c0 <faked_req>
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 8180, s = {s = 0x1ff4 <error: Cannot access memory at address 0x1ff4>, len 
= 6}, re = 0x1ff4}, pval = {rs = {
                s = 0x1ff4 <error: Cannot access memory at address 0x1ff4>, len 
= 6}, ri = 0, flags = 5}}, i2s = 
"0\274J\024\375\177\000\000\000\272J\024\375\177\000\000\000\263\a\314&\177"}
        s = {s = 0x7ffdffffffff <error: Cannot access memory at address 
0x7ffdffffffff>, len = 0}
        srevp = {0x0, 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#14 0x0000000000453625 in run_actions (h=0xf, a=0x7ffd144aa740, msg=0x1) at 
action.c:1549
        ret = 1
        mod = 0x7f26cb52dde8
        __FUNCTION__ = "run_actions"
#15 0x0000000000455250 in do_action (h=0x7ffd144ace20, a=0x7f26cb579ab8, 
msg=0x7f26c906d1c0 <faked_req>) at action.c:678
        ret = -5
        v = 17
        dst = {send_sock = 0x400000001, to = {s = {sa_family = 48384, sa_data = 
"\203\067\313\177\241\246\001\000\000\000\003\000\000"}, sin = {sin_family = 
48384, sin_port = 14211, sin_addr = {
                s_addr = 2795601867}, sin_zero = 
"\001\000\000\000\003\000\000"}, sin6 = {sin6_family = 48384, sin6_port = 
14211, sin6_flowinfo = 2795601867, sin6_addr = {__in6_u = {
                  __u6_addr8 = 
"\001\000\000\000\003\000\000\000p\316X\313&\177\000", __u6_addr16 = {1, 0, 3, 
0, 52848, 52056, 32550, 0}, __u6_addr32 = {1, 3, 3411594864, 32550}}}, 
              sin6_scope_id = 340444320}}, id = 32765, proto = -64 '\300', 
send_flags = {f = 209 '\321', blst_imask = 6 '\006'}}
        end = 0x1 <error: Cannot access memory at address 0x1>
        uri = {user = {s = 0x7ffd144ac4a0 "", len = -922299968}, passwd = {s = 
0x7ffd144ac4a0 "", len = -922299968}, host = {s = 0x0, len = 931380480}, port = 
{s = 0x7f26cb5898c0 "\300\227r\001", 
            len = -883351096}, params = {s = 0x7ffd144ace20 "\004", len = -5}, 
sip_params = {s = 0x7ffd144ac0a0 "", len = -922299968}, headers = {s = 0x0, len 
= 4535845}, port_no = 49312, proto = 5194, 
          type = 32765, flags = (unknown: 340443180), transport = {s = 
0x7f26cb5921c8 "f\002", len = -922299968}, ttl = {s = 0x100000000 <error: 
Cannot access memory at address 0x100000000>, len = 931380480}, 
          user_param = {s = 0x0, len = -883343280}, maddr = {s = 0x0, len = 
-5}, method = {s = 0x7ffd144ac110 "", len = -922299968}, lr = {s = 0x0, len = 
4535845}, r2 = {s = 0x7ffd144ac110 "", 
            len = -883579232}, gr = {s = 0x7f26cb594050 "s\002", len = 
-922299968}, transport_val = {s = 0x100000000 <error: Cannot access memory at 
address 0x100000000>, len = -883222360}, ttl_val = {
            s = 0x0, len = 4535845}, user_param_val = {s = 0x7ffd144ad330 "", 
len = -875219540}, maddr_val = {s = 0x7f26cb55a6a0 "\300\001", len = 
931380480}, method_val = {
            s = 0x400000000 <error: Cannot access memory at address 
0x400000000>, len = 0}, lr_val = {s = 0x7ffd144ace20 "\004", len = -922299968}, 
r2_val = {s = 0x7ffd144ace20 "\004", len = 340444112}, 
          gr_val = {s = 0x0, len = 4587511}}
        next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffd144ac0a0 "", 
len = 1854498265}, host = {s = 0x7f26c906d1c0 <faked_req> "7\324)", len = 
340446752}, port = {s = 0x7ffd144ac3d0 "\001", 
            len = 0}, params = {s = 0x783b7ddf8de965d9 <error: Cannot access 
memory at address 0x783b7ddf8de965d9>, len = -2036111911}, sip_params = {s = 
0x7f2600000000 "", len = 2}, headers = {
            s = 0x9a8ee4 <route_type> "\002", len = 4587679}, port_no = 0, 
proto = 0, type = ERROR_URI_T, flags = URI_USER_NORMALIZE, transport = {s = 
0x7ffd144ac110 "", len = -221682215}, ttl = {
            s = 0x7f26cb594050 "s\002", len = -922299968}, user_param = {s = 
0x2 <error: Cannot access memory at address 0x2>, len = 10129124}, maddr = {
            s = 0x783b7ddf72c965d9 <error: Cannot access memory at address 
0x783b7ddf72c965d9>, len = -2036111911}, method = {s = 0x0, len = 0}, lr = {s = 
0x7ffd144ac770 "", len = 931380480}, r2 = {
            s = 0x1a00000018 <error: Cannot access memory at address 
0x1a00000018>, len = 340444112}, gr = {s = 0x7ffd144ace20 "\004", len = 
4337712}, transport_val = {s = 0x0, len = -28800}, ttl_val = {
            s = 0x16f9930 "PST", len = -883223808}, user_param_val = {s = 0x0, 
len = 5936669}, maddr_val = {s = 0x9a8e50 <_km_log_func> "\340jA", len = 
5593174}, method_val = {
            s = 0x7f26c7bb7568 <_xlog_prefix> "\242C\233\307&\177", len = 
931380480}, lr_val = {s = 0xa502c0 <event_rt> "\260OY\313&\177", len = 
-883350792}, r2_val = {
            s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, 
len = -922299968}, gr_val = {s = 0x7ffd144ace20 "\004", len = 340444112}}
        u = 0x1
        flags = 0
        st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x7f2600000001 "", len 
= 340443296}, re = 0x7f2600000001}, avp = 0x783b7ddf6e8965d9}
        sct = 0x1
        sjt = 0x1
        mct = 0x0
        rv = 0x7f26c8dd5fae <t_check_status+366>
        rv1 = 0x7f26c906d1c0 <faked_req>
        c1 = {cache_type = 340444320, val_type = 32765, c = {avp_val = {n = 
-922299968, s = {s = 0x7f26c906d1c0 <faked_req> "7\324)", len = 0}, re = 
0x7f26c906d1c0 <faked_req>}, pval = {rs = {
                s = 0x7f26c906d1c0 <faked_req> "7\324)", len = 0}, ri = 
-925353351, flags = 32550}}, i2s = 
"\000\000\000\000\000\000\000\000\003\275\335\310&\177\000\000\000\000\000\000\000"}
        s = {s = 0x0, len = -959812448}
        srevp = {0xa4dfa2 <ut_buf_int2str+18>, 0x100000002}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
---Type <return> to continue, or q <return> to quit---
#16 0x0000000000453625 in run_actions (h=0xf, a=0x7ffd144aa740, msg=0x1) at 
action.c:1549
        ret = 1
        mod = 0x7f26cb592e48
        __FUNCTION__ = "run_actions"
#17 0x0000000000455088 in do_action (h=0x7ffd144ace20, a=0x7f26cb593a80, 
msg=0x7f26c906d1c0 <faked_req>) at action.c:1049
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 3, sa_data = '\000' 
<repeats 13 times>}, sin = {sin_family = 3, sin_port = 0, sin_addr = {s_addr = 
0}, sin_zero = "\000\000\000\000\000\000\000"}, 
            sin6 = {sin6_family = 3, sin6_port = 0, sin6_flowinfo = 0, 
sin6_addr = {__in6_u = {__u6_addr8 = 
"\000\000\000\000\000\000\000\000P\305J\024\375\177\000", __u6_addr16 = {0, 0, 
0, 0, 50512, 5194, 
                    32765, 0}, __u6_addr32 = {0, 0, 340444496, 32765}}}, 
sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 189 '\275', 
blst_imask = 131 '\203'}}
        end = 0x7f26cb5922f8 "\001"
        uri = {user = {s = 0x7ffd144ace20 "\004", len = -922299968}, passwd = 
{s = 0x7ffd144ace20 "\004", len = 340445248}, host = {s = 0x0, len = 
931380480}, port = {s = 0x0, len = -883363856}, params = {
            s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, 
len = -922299968}, sip_params = {s = 0x7ffd144ace20 "\004", len = 340444756}, 
headers = {s = 0x0, len = 4361660}, 
          port_no = 26073, proto = 30185, type = 2017164767, flags = 
(URI_USER_NORMALIZE | unknown: 2258855384), transport = {s = 0x7f2600000000 "", 
len = -922299968}, ttl = {
            s = 0x100000000 <error: Cannot access memory at address 
0x100000000>, len = 4535845}, user_param = {s = 0x3c79b4136 <error: Cannot 
access memory at address 0x3c79b4136>, len = 0}, maddr = {
            s = 0x7f26cb5409b0 "d\001", len = 16}, method = {s = 0x7ffd144acb50 
"\020KZ\313&\177", len = 340445840}, lr = {s = 0x7ffd144ac570 "", len = 
931380480}, r2 = {
            s = 0x9aac48 <buf+8> "503 Maximum Calls In Progress\r\nVia: 
SIP/2.0/UDP 
1.2.3.4;branch=z9hG4bKbdcf.a98cb99338522a1799fd347f7a9929a9.0\r\nVia: 
SIP/2.0/UDP 
12.7.192.27;rport=5060;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9"..., len = 
24234928}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 931380480}, 
ttl_val = {s = 0x400000000 <error: Cannot access memory at address 
0x400000000>, 
            len = 340445248}, user_param_val = {s = 0x7ffd144ace20 "\004", len 
= 4337712}, maddr_val = {s = 0x0, len = 24278024}, method_val = {
            s = 0x1000001 <error: Cannot access memory at address 0x1000001>, 
len = 0}, lr_val = {s = 0x7ffd144ace20 "\004", len = -922299968}, r2_val = {s = 
0x7ffd144ace20 "\004", len = 340445472}, gr_val = {
            s = 0x0, len = 931380480}}
        next_hop = {user = {s = 0x0, len = -883359736}, passwd = {s = 
0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 
-922299968}, host = {s = 0x7ffd144ace20 "\004", len = 340445092}, 
          port = {s = 0x0, len = 4362150}, params = {s = 0x783b7ddf7b0965d9 
<error: Cannot access memory at address 0x783b7ddf7b0965d9>, len = 
-2036111911}, sip_params = {s = 0x7f2600000000 "", 
            len = -874873275}, headers = {s = 0x100000000 <error: Cannot access 
memory at address 0x100000000>, len = 0}, port_no = 0, proto = 0, type = 32765, 
flags = (unknown: 3411516088), transport = {
            s = 0x0, len = -883222360}, ttl = {s = 0x0, len = 5}, user_param = 
{s = 0x0, len = 0}, maddr = {s = 0x7f26cb5b18e0 "H\254\232", len = 5894248}, 
method = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = 
-874997598}, lr = {s = 0x3332363031002010 <error: Cannot access memory at 
address 0x3332363031002010>, len = 931380480}, r2 = {
            s = 0x0, len = 340445472}, gr = {s = 0x7ffd144ace20 "\004", len = 
4337712}, transport_val = {s = 0x800000 <error: Cannot access memory at address 
0x800000>, len = 7498344}, ttl_val = {
            s = 0xa4ea0 <error: Cannot access memory at address 0xa4ea0>, len = 
890264}, user_param_val = {s = 0xdc210 <error: Cannot access memory at address 
0xdc210>, len = 8}, maddr_val = {
            s = 0xa <error: Cannot access memory at address 0xa>, len = 
931380480}, method_val = {s = 0x7f26cb5b0e58 "sip:15185535074@1.2.3.123:5060", 
len = 931380480}, lr_val = {
            s = 0x7ffd144ad4f0 "\020\302\r", len = -883353808}, r2_val = {s = 
0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 
-922299968}, gr_val = {s = 0x7ffd144ace20 "\004", 
            len = 340445472}}
        u = 0x7f26cb5922f8
        flags = 0
        st = {flags = 0, id = 0, name = {n = -883359736, s = {s = 
0x7f26cb590008 "\020", len = -1}, re = 0x7f26cb590008}, avp = 0x7f26c906d1c0 
<faked_req>}
        sct = 0x7f26cb5922f8
        sjt = 0x7f26cb5922f8
        mct = 0x0
        rv = 0x9aac48 <buf+8>
        rv1 = 0x7f26c906d1c0 <faked_req>
        c1 = {cache_type = 24277584, val_type = RV_NONE, c = {avp_val = {n = 
340444756, s = {s = 0x7ffd144ac654 "\001", len = 340446752}, re = 
0x7ffd144ac654}, pval = {rs = {s = 0x7ffd144ac654 "\001", 
                len = 340446752}, ri = 4337712, flags = 0}}, i2s = 
"\030\305J\024\375\177\000\000\000\000\000\000\375\177\000\000\000\000\000\000\000"}
        s = {s = 0x0, len = 340444496}
        srevp = {0x1727250, 0x7f26cbd54020 <__GI___libc_malloc+96>}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#18 0x0000000000453625 in run_actions (h=0xf, a=0x7ffd144aa740, msg=0x1) at 
action.c:1549
        ret = 1
        mod = 0x7f26cb593a80
        __FUNCTION__ = "run_actions"
#19 0x0000000000455088 in do_action (h=0x7ffd144ace20, a=0x7f26cb593d18, 
msg=0x7f26c906d1c0 <faked_req>) at action.c:1049
        ret = 1
        v = 1
        dst = {send_sock = 0x7ffd144aca78, to = {s = {sa_family = 17632, 
sa_data = "u\001\000\000\000\000\377\377\377\377\000\000\000"}, sin = 
{sin_family = 17632, sin_port = 373, sin_addr = {s_addr = 0}, 
              sin_zero = "\377\377\377\377\000\000\000"}, sin6 = {sin6_family = 
17632, sin6_port = 373, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                  __u6_addr8 = 
"\377\377\377\377\000\000\000\000-A\233\307&\177\000", __u6_addr16 = {65535, 
65535, 0, 0, 16685, 51099, 32550, 0}, __u6_addr32 = {4294967295, 0, 3348840749, 
32550}}}, 
              sin6_scope_id = 340445816}}, id = 32765, proto = 0 '\000', 
send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        end = 0x7f26cb591730 "\020"
---Type <return> to continue, or q <return> to quit---
        uri = {user = {s = 0x7f26c79b43a2 "<script>: ", len = 931380480}, 
passwd = {
            s = 0x1754740 "<173>Jan 30 17:26:27 sbc[10623]: NOTICE: <script>: 
Node unavailable, trying next sip:1.2.3.123:5060 from group FREESWITCH M=INVITE 
R=sip:15185535074@1.2.3.123:5060 ID=3480863f5afd0da91b6f2fbb222"..., len = 
340446272}, host = {s = 0x7ffd144ad330 "", len = -883222360}, port = {s = 
0x7ffd144ad330 "", len = 340446272}, params = {s = 0x0, len = 4337663}, 
sip_params = {
            s = 0xd449b6700000000 <error: Cannot access memory at address 
0xd449b6700000000>, len = -28800}, headers = {s = 0x16f9930 "PST", len = 
-883222360}, port_no = 22128, proto = 52052, type = 32550, 
          flags = (unknown: 10488584), transport = {s = 0x9a8e50 <_km_log_func> 
"\340jA", len = 0}, ttl = {s = 0x7f26c7bb7568 <_xlog_prefix> 
"\242C\233\307&\177", len = 931380480}, user_param = {
            s = 0x416ae0 <syslog@plt> "\377%\222\310X", len = -883383720}, 
maddr = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, 
len = -883222360}, method = {s = 0x7ffd144ad330 "", 
            len = 340446272}, lr = {s = 0x0, len = 4361660}, r2 = {s = 0x6ee54f 
"NOTICE", len = -946125918}, gr = {s = 0x61 <error: Cannot access memory at 
address 0x61>, len = -883274992}, transport_val = {
            s = 0x7f26cb571af8 "ǒX\313&\177", len = -883222360}, ttl_val = {
            s = 0x7f26cb5a4b44 "from group FREESWITCH M=INVITE 
R=sip:15185535074@1.2.3.123:5060 
ID=3480863f5afd0da91b6f2fbb2226d60c@12.7.192.27\n", len = 52}, user_param_val = 
{s = 0x7ffd144acb88 "a", 
            len = 5740139}, maddr_val = {
            s = 0x9aadfa <buf+442> 
"3480863f5afd0da91b6f2fbb2226d60c@12.7.192.27\r\nCSeq: 102 
INVITE\r\nRetry-After: 300\r\nUser-Agent: Primo MS 2.0/N+\r\nAccept: 
application/sdp\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, 
UPDATE,"..., len = 44}, method_val = {s = 0x400000000 <error: Cannot access 
memory at address 0x400000000>, len = 931380480}, lr_val = {
            s = 0x1e6 <error: Cannot access memory at address 0x1e6>, len = 
-944015656}, r2_val = {s = 0x7f26cb58a200 "0\030W\313&\177", len = -883222360}, 
gr_val = {s = 0x0, len = 931380480}}
        next_hop = {user = {s = 0x1 <error: Cannot access memory at address 
0x1>, len = -946129552}, passwd = {
            s = 0x7f26cb5a4b10 "Node unavailable, trying next 
sip:1.2.3.123:5060 from group FREESWITCH M=INVITE 
R=sip:15185535074@1.2.3.123:5060 
ID=3480863f5afd0da91b6f2fbb2226d60c@12.7.192.27\n", 
            len = 97}, host = {s = 0x7f26c79b43a2 "<script>: ", len = 7267663}, 
port = {s = 0x0, len = -883823336}, params = {
            s = 0x7f26cb5a4b10 "Node unavailable, trying next 
sip:1.2.3.123:5060 from group FREESWITCH M=INVITE 
R=sip:15185535074@1.2.3.123:5060 
ID=3480863f5afd0da91b6f2fbb2226d60c@12.7.192.27\n", 
            len = 97}, sip_params = {s = 0x7ffd144accc0 "", len = -883222360}, 
headers = {s = 0x0, len = 931380480}, port_no = 52416, proto = 5194, type = 
32765, flags = (unknown: 3411580496), transport = {
            s = 0x7ffd144ad330 "", len = -883222360}, ttl = {s = 0x7f26cb58a258 
"\001", len = -883222360}, user_param = {s = 0x0, len = 4542519}, maddr = {s = 
0x7f26cb5b16a0 "Þ­\232", len = -874768803}, 
          method = {s = 0x7ffd144acd4c "", len = -959624128}, lr = {s = 0x1da 
<error: Cannot access memory at address 0x1da>, len = 14}, r2 = {s = 0x0, len = 
474}, gr = {s = 0x0, len = 4951110}, 
          transport_val = {s = 0x7f2400000000 <error: Cannot access memory at 
address 0x7f2400000000>, len = 931380480}, ttl_val = {s = 0x0, len = 
340446836}, user_param_val = {
            s = 0x7ffd144ad4f0 "\020\302\r", len = 4337712}, maddr_val = {s = 
0x1da <error: Cannot access memory at address 0x1da>, len = 474}, method_val = {
            s = 0x1da <error: Cannot access memory at address 0x1da>, len = 0}, 
lr_val = {s = 0x7ffd144ad4f0 "\020\302\r", len = -883222360}, r2_val = {s = 
0x7ffd144ad4f0 "\020\302\r", len = 340447216}, 
          gr_val = {s = 0x0, len = 4587511}}
        u = 0x7f26cb591730
        flags = 1
        st = {flags = 1, id = 0, name = {n = -946129552, s = {s = 
0x7f26c79b3570 <xlog_2_helper+1360> "\351\\\374\377\377\017\037", len = 
-883274992}, re = 0x7f26c79b3570 <xlog_2_helper+1360>}, 
          avp = 0x7ffd00000061}
        sct = 0x7f26cb591730
        sjt = 0x7f26cb591730
        mct = 0x0
        rv = 0x7f26c79b412d
        rv1 = 0x7f26c906d1c0 <faked_req>
        c1 = {cache_type = 21, val_type = RV_NONE, c = {avp_val = {n = 
-874790849, s = {s = 0x7f26cbdbc03f <__GI___vsyslog_chk+655> "H\201Ĩ", len = 
0}, re = 0x7f26cbdbc03f <__GI___vsyslog_chk+655>}, pval = {
              rs = {s = 0x7f26cbdbc03f <__GI___vsyslog_chk+655> "H\201Ĩ", len 
= 0}, ri = 1485825987, flags = 0}}, i2s = 
"@Gu\001\000\000\000\000\224\000\000\000\000\000\000\000\020KZ\313&\177"}
        s = {s = 0x7ffd144aca78 "\250\030[\313&\177", len = 24462560}
        srevp = {0x0, 0x7f26cbdc165d <__libc_send+141>}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#20 0x0000000000453625 in run_actions (h=0xf, h@entry=0x7ffd144ace20, 
a=0x7ffd144aa740, a@entry=0x7f26cb58a968, msg=0x1, msg@entry=0x7f26c906d1c0 
<faked_req>) at action.c:1549
        ret = 1
        mod = 0x7f26cb593d18
        __FUNCTION__ = "run_actions"
#21 0x0000000000460095 in run_top_route (a=0x7f26cb58a968, msg=0x7f26c906d1c0 
<faked_req>, c=<optimized out>) at action.c:1635
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = 
{{__jmpbuf = {140724943900192, -8664550427694897703, 139804597070184, 
139804558152128, 1, 139795930705056, 8663656706668586457, 
                -8664549922703186471}, __mask_was_saved = 0, __saved_mask = 
{__val = {7499504, 674472, 139795947483256, 139804558152768, 139804555797428, 
503, 1, 139795930705056, 139804555317783, 
                  139804597225760, 139795919910088, 139804597225760, 
139804558152128, 139795930705576, 139795947482616, 503}}}}}
        p = <optimized out>
        ret = <optimized out>
        sfbk = 0
#22 0x00007f26c8db9c5b in run_failure_handlers (t=0x7f24c6ca6ca0, 
rpl=0x7f26cb5b18a8, code=503, extra_flags=1) at t_reply.c:990
        faked_req = {id = 2741303, pid = 10619, tval = {tv_sec = 1485825987, 
tv_usec = 30844}, fwd_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, 
rpl_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, 
          first_line = {type = 1, flags = 1, len = 49, u = {request = {method = 
{
                  s = 0x7f24c7ca74f8 "INVITE sip:15185535074@1.2.3.4:5060 
SIP/2.0\r\nRecord-Route: <sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 
12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: 
SIP/2.0/UDP 12.7.192.27:60"..., len = 6}, uri = {
                  s = 0x7f24c7ca74ff "sip:15185535074@1.2.3.4:5060 
SIP/2.0\r\nRecord-Route: <sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 
12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: 
SIP/2.0/UDP 12.7.192.27:6060;rece"..., len = 32}, version = {
---Type <return> to continue, or q <return> to quit---
                  s = 0x7f24c7ca7520 "SIP/2.0\r\nRecord-Route: 
<sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 
12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: 
SIP/2.0/UDP 12.7.192.27:6060;received=12.7.192.27;branch=z9hG4bK4a"..., len = 
7}, method_value = 1}, reply = {version = {
                  s = 0x7f24c7ca74f8 "INVITE sip:15185535074@1.2.3.4:5060 
SIP/2.0\r\nRecord-Route: <sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 
12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: 
SIP/2.0/UDP 12.7.192.27:60"..., len = 6}, status = {
                  s = 0x7f24c7ca74ff "sip:15185535074@1.2.3.4:5060 
SIP/2.0\r\nRecord-Route: <sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 
12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: 
SIP/2.0/UDP 12.7.192.27:6060;rece"..., len = 32}, reason = {
                  s = 0x7f24c7ca7520 "SIP/2.0\r\nRecord-Route: 
<sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 
12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: 
SIP/2.0/UDP 12.7.192.27:6060;received=12.7.192.27;branch=z9hG4bK4a"..., len = 
7}, statuscode = 1}}}, via1 = 0x7f24c7ca7a28, via2 = 0x7f24c7ca7b90, headers = 
0x7f24c7ca79a8, last_header = 0x7f24c7ca8448, parsed_flag = 
18446744073709551615, 
          h_via1 = 0x7f24c7ca79e8, h_via2 = 0x7f24c7ca7b50, callid = 
0x7f24c7ca8218, to = 0x7f24c7ca7fc0, cseq = 0x7f24c7ca8258, from = 
0x7f24c7ca7d78, contact = 0x7f24c7ca81d8, maxforwards = 0x7f24c7ca7d38, 
          route = 0x0, record_route = 0x7f24c7ca79a8, content_type = 
0x7f24c7ca8408, content_length = 0x7f24c7ca8448, authorization = 0x0, expires = 
0x0, proxy_auth = 0x0, supported = 0x7f24c7ca83c8, 
          require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 
0x7f24c7ca8388, event = 0x0, accept = 0x0, accept_language = 0x0, organization 
= 0x0, priority = 0x0, subject = 0x0, 
          user_agent = 0x7f24c7ca82c8, server = 0x0, content_disposition = 0x0, 
diversion = 0x0, rpid = 0x7f24c7ca8308, refer_to = 0x0, session_expires = 0x0, 
min_se = 0x0, sipifmatch = 0x0, 
          subscription_state = 0x0, date = 0x7f26cb5954f0, identity = 0x0, 
identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, body = 
0x0, 
          eoh = 0x7f24c7ca781c "\r\nv=0\r\no=root 282422976 282422976 IN IP4 
12.7.192.27\r\ns=IVS-SBC\r\nc=IN IP4 12.7.192.27\r\nt=0 0\r\nm=audio 22306 
RTP/AVP 0 9 18 4 8 103 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:9 
G722/8000\r\na=rtpmap:18 G729/800"..., 
          unparsed = 0x7f24c7ca781c "\r\nv=0\r\no=root 282422976 282422976 IN 
IP4 12.7.192.27\r\ns=IVS-SBC\r\nc=IN IP4 12.7.192.27\r\nt=0 0\r\nm=audio 22306 
RTP/AVP 0 9 18 4 8 103 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:9 
G722/8000\r\na=rtpmap:18 G729/800"..., rcv = {src_ip = {af = 2, len = 4, u = 
{addrl = {465569548, 139795915961584}, addr32 = {465569548, 0, 3320411376, 
32548}, addr16 = {1804, 7104, 0, 0, 29936, 
                  50665, 32548, 0}, addr = 
"\f\a\300\033\000\000\000\000\360t\351\305$\177\000"}}, dst_ip = {af = 2, len = 
4, u = {addrl = {1228276166, 0}, addr32 = {1228276166, 0, 0, 0}, addr16 = {454, 
                  18742, 0, 0, 0, 0, 0, 0}, addr = "\306\001\066I", '\000' 
<repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, 
proto_reserved2 = 0, src_su = {s = {sa_family = 2, 
                sa_data = "\023\304\f\a\300\033\000\000\000\000\000\000\000"}, 
sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 465569548}, 
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
                sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 465569548, 
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = 
{0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 
                      0}}}, sin6_scope_id = 0}}, bind_address = 0x7f26cb4f8090, 
proto = 1 '\001'}, 
          buf = 0x7f24c7ca74f8 "INVITE sip:15185535074@1.2.3.4:5060 
SIP/2.0\r\nRecord-Route: <sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 
12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: 
SIP/2.0/UDP 12.7.192.27:60"..., len = 1198, new_uri = {s = 0x7f26cb5afeb8 
"sip:15185535074@1.2.3.123:5060", len = 33}, dst_uri = {s = 0x0, len = 0}, 
parsed_uri_ok = 0, parsed_uri = {user = {
              s = 0x7f26cb5b0e5c "15185535074@1.2.3.123:5060", len = 11}, 
passwd = {s = 0x0, len = 0}, host = {s = 0x7f26cb5b0e68 "1.2.3.123:5060", len = 
12}, port = {s = 0x7f26cb5b0e75 "5060", 
              len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len 
= 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = 
SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, 
              len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 
0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len 
= 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, 
              len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, 
len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, 
method_val = {s = 0x0, len = 0}, lr_val = {
              s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 
0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, 
len = 0}, passwd = {s = 0x0, len = 0}, host = {
              s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, 
len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, 
port_no = 0, proto = 0, type = ERROR_URI_T, 
            flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 
0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, 
method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, 
            r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = 
{s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, 
len = 0}, maddr_val = {s = 0x0, len = 0}, 
            method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, 
r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 
0x7f26cb5af3b8, body_lumps = 0x0, reply_lump = 0x0, 
          add_to_branch_s = "z9hG4bKbdcf.a98cb99338522a1799fd347f7a9929a9.1", 
'\000' <repeats 11 times>, add_to_branch_len = 46, hash_index = 64731, 
msg_flags = 262353, flags = 0, set_global_address = {
            s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, 
force_send_socket = 0xf, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, 
len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, 
          location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = 
{src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 
= {0, 0, 0, 0, 0, 0, 0, 0}, 
                    addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 
0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 
0}, addr = '\000' <repeats 15 times>}}, 
                src_port = 0, dst_port = 0, proto_reserved1 = 0, 
proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 
times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {
                      s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, 
sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u 
= {__u6_addr8 = '\000' <repeats 15 times>, 
                        __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = 
{0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 0 '\000'}}}}
        shmem_msg = 0x7f24c7ca6df8
        on_failure = 1
        __FUNCTION__ = "run_failure_handlers"
#23 0x00007f26c8dbb952 in t_should_relay_response (Trans=0x7f24c6ca6ca0, 
new_code=503, branch=0, should_store=0x7ffd144ad0b8, 
should_relay=0x7ffd144ad0b4, cancel_data=0x0, reply=0x7f26cb5b18a8)
    at t_reply.c:1346
        picked_code = 503
        new_branch = 340436804
        inv_through = 1
        replies_dropped = 0
        __FUNCTION__ = "t_should_relay_response"
#24 0x00007f26c8dc347a in relay_reply (t=0x7f24c6ca6ca0, p_msg=0x7ffd144aa740, 
branch=1, msg_status=0, cancel_data=0x2, do_put_on_wait=0) at t_reply.c:1749
        relay = 32550
        save_clone = 6243476
        res_len = 0
        bm = {to_tag_val = {s = 0x71ede2 <__FUNCTION__.7358> "parse_headers", 
len = -959811912}}
        totag_retr = -883222360
        reason = {
          s = 0x7f24c6310b48 "ACK sip:15185535074@1.2.3.4:5060 SIP/2.0\r\nVia: 
SIP/2.0/UDP 
1.2.3.4;branch=z9hG4bKbdcf.a98cb99338522a1799fd347f7a9929a9.0\r\nMax-Forwards: 
68\r\nFrom: \"2024558888\" <sip:2024558888@12.7.192.27>;tag="..., len = 
-959811832}
        onsend_params = {req = 0x7f24c6310b48, rpl = 0x7f24c6310b48, param = 
0x7f24c6ca6f08, code = 340448048, flags = 32765, branch = 0, t_rbuf = 0x0, dst 
= 0x7f26cb5890b8, send_buf = {
            s = 0x7f26cb5b18a8 "}\304)", len = -959811928}}
---Type <return> to continue, or q <return> to quit---
        ip = {af = 3335154848, len = 32548, u = {addrl = {4587679, 
139795920653128}, addr32 = {4587679, 0, 3325102920, 32548}, addr16 = {159, 70, 
0, 0, 2888, 50737, 32548, 0}, 
            addr = "\237\000F\000\000\000\000\000H\v1\306$\177\000"}}
        __FUNCTION__ = "relay_reply"
#25 0x00007f26c8dc8013 in reply_received (p_msg=0x7f26cb5b18a8) at 
t_reply.c:2466
        msg_status = 503
        ack_len = 364
        branch = 0
        reply_status = 1
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 
0x0, len = -915742330}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 
-915742330}}}}
        uac = 0x7f24c6ca6ea8
        t = 0x7f24c6ca6ca0
        lack_dst = {send_sock = 0x800000, to = {s = {sa_family = 29184, sa_data 
= "r\000\000\000\000\000 J\n\000\000\000\000"}, sin = {sin_family = 29184, 
sin_port = 114, sin_addr = {s_addr = 0}, 
              sin_zero = " J\n\000\000\000\000"}, sin6 = {sin6_family = 29184, 
sin6_port = 114, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = " 
J\n\000\000\000\000\000\000\216\r\000\000\000\000", 
                  __u6_addr16 = {18976, 10, 0, 0, 36352, 13, 0, 0}, __u6_addr32 
= {674336, 0, 888320, 0}}}, sin6_scope_id = 901648}}, id = 0, proto = 8 '\b', 
send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        backup_domain_from = 0x1
        replies_locked = 1
        blst_503_timeout = 340447904
        hf = 0x7ffd144aa744
        onsend_params = {req = 0x9aadb4 <buf+372>, rpl = 0x7f260000003d, param 
= 0x800000, code = 7501448, flags = 0, branch = 0, t_rbuf = 0xa44c0, dst = 
0xd8978, send_buf = {
            s = 0xdc210 <error: Cannot access memory at address 0xdc210>, len = 
8}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = 
{{__jmpbuf = {140724943901488, -8664550427694897703, 139804597063864, 
139804597229736, 139795930705576, 139795930705056, 
                8663656706295293401, -8664549922703186471}, __mask_was_saved = 
0, __saved_mask = {__val = {12007018592332922112, 0, 12007018592332922112, 
10136892, 10136708, 6, 139804597228832, 10137408, 
                  12007018592332922112, 10136684, 6523028, 901648, 
139804597228832, 5, 10136708, 10136761}}}}}
        __FUNCTION__ = "reply_received"
#26 0x0000000000501f76 in do_forward_reply (msg=0x7f26cb5b18a8, mode=0) at 
forward.c:747
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' 
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 
0}, sin_zero = "\000\000\000\000\000\000\000"}, 
            sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, 
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = 
{0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, 
              sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 
0 '\000', blst_imask = 0 '\000'}}
        new_len = 32550
        r = 0
        ip = {af = 672584, len = 0, u = {addrl = {886856, 901648}, addr32 = 
{886856, 0, 901648, 0}, addr16 = {34888, 13, 0, 0, 49680, 13, 0, 0}, addr = 
"H\210\r\000\000\000\000\000\020\302\r\000\000\000\000"}}
        len = 1
        __FUNCTION__ = "do_forward_reply"
#27 0x0000000000544663 in receive_msg (buf=0x0, len=3411744936, 
rcv_info=0x7f26cb5b1520) at receive.c:299
        msg = 0x7f26cb5b18a8
        ctx = {rec_lev = 11377206, run_flags = 0, last_retcode = 5299449, 
jmp_env = {{__jmpbuf = {0, 0, 0, 139804596554760, 6, 139804564709766, 8388608, 
7505160}, __mask_was_saved = 670328, __saved_mask = {
                __val = {10105736, 0, 140724943902694, 5, 1, 139804596469904, 
139804612935111, 139792595550213, 0, 7071716, 139804604774248, 139804597029960, 
139804596469904, 139804615063184, 139804612960997, 
                  139804615063184}}}}}
        inb = {
          s = 0x9aac40 <buf> "SIP/2.0 503 Maximum Calls In Progress\r\nVia: 
SIP/2.0/UDP 
1.2.3.4;branch=z9hG4bKbdcf.a98cb99338522a1799fd347f7a9929a9.0\r\nVia: 
SIP/2.0/UDP 12.7.192.27;rport=5060;branch=z9hG4bKbdcf.b7fdae31594be08bdc"..., 
len = 768}
        netinfo = {data = {s = 0xffffffff <error: Cannot access memory at 
address 0xffffffff>, len = 6}, dst = 0x7f26cbce3768, rcv = 0x7f26cc6b4000}
        __FUNCTION__ = "receive_msg"
#28 0x000000000048a410 in udp_rcv_loop () at udp_server.c:495
        len = 768
        buf = "SIP/2.0 503 Maximum Calls In Progress\r\nVia: SIP/2.0/UDP 
1.2.3.4;branch=z9hG4bKbdcf.a98cb99338522a1799fd347f7a9929a9.0\r\nVia: 
SIP/2.0/UDP 12.7.192.27;rport=5060;branch=z9hG4bKbdcf.b7fdae31594be08bdc"...
        from = 0x7f26cb580c48
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {1781924294, 
139795915962144}, addr32 = {1781924294, 0, 3320411936, 32548}, addr16 = {454, 
27190, 0, 0, 30496, 50665, 32548, 0}, 
              addr = "\306\001\066j\000\000\000\000 w\351\305$\177\000"}}, 
dst_ip = {af = 2, len = 4, u = {addrl = {1228276166, 0}, addr32 = {1228276166, 
0, 0, 0}, addr16 = {454, 18742, 0, 0, 0, 0, 0, 0}, 
              addr = "\306\001\066I", '\000' <repeats 11 times>}}, src_port = 
5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = 
{sa_family = 2, 
              sa_data = "\023\304\306\001\066j\000\000\000\000\000\000\000"}, 
sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1781924294}, 
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1781924294, 
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = 
{0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 
                    0}}}, sin6_scope_id = 0}}, bind_address = 0x7f26cb4f8090, 
proto = 1 '\001'}
        __FUNCTION__ = "udp_rcv_loop"
#29 0x000000000050abd9 in main_loop () at main.c:1614
        si_desc = "udp receiver child=5 
sock=1.2.3.4:5060\000\000\001\000\000\000\"`\253\306&\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000\315f_",
 '\000' <repeats 14 times>, 
"\275\203\067\313\177\241\246\260$\253\306&\177\000\000\000\275\203\067\313\177\241\246\b\003\245\000\000\000\000\000\004\000\000\000\000\000\000"
        woneinit = 1
---Type <return> to continue, or q <return> to quit---
        __FUNCTION__ = "main_loop"
#30 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631
        cfg_stream = 0x0
        r = 340436804
        tmp = 0x7ffd144aeefc ""
        tmp_len = 0
        port = 0
        proto = -865385008
        ret = 0
        seed = 3457480916
        debug_save = 0
        debug_flag = 8
        dont_fork_cnt = 0
        st = {st_dev = 15, st_ino = 11649, st_nlink = 2, st_mode = 16832, 
st_uid = 110, st_gid = 117, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 
4096, st_blocks = 0, st_atim = {tv_sec = 1480629734, 
            tv_nsec = 255371722}, st_mtim = {tv_sec = 1484083606, tv_nsec = 
607034961}, st_ctim = {tv_sec = 1484083606, tv_nsec = 607034961}, 
__glibc_reserved = {0, 0, 0}}
        __FUNCTION__ = "main"
(gdb)
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

Reply via email to