Hi all A server running version 4.4.4+0~20161223011227 has segfaulted for the second time this month. I'm attaching a bt in case someone can explain it to me.
cheers, Jon
root@14cn9:/var/tmp# gdb /usr/sbin/kamailio core.kamailio.10623.14cn9.serverdomain.com.1485825987 GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: <http://www.gnu.org/software/gdb/bugs/>. Find the GDB manual and other documentation resources online at: <http://www.gnu.org/software/gdb/documentation/>. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/8c/978e3f277d6d1ec67cd26a6f8c2b8da806d092.debug...done. done. [New LWP 10623] warning: .dynamic section for "/lib/x86_64-linux-gnu/libpthread.so.0" is not at the expected address (wrong library or version mismatch?) Warning: couldn't activate thread debugging using libthread_db: Cannot find new threads: generic error warning: File "/lib/x86_64-linux-gnu/libthread_db-1.0.so" auto-loading has been declined by your `auto-load safe-path' set to "$debugdir:$datadir/auto-load". To enable execution of this file add add-auto-load-safe-path /lib/x86_64-linux-gnu/libthread_db-1.0.so line to your configuration file "/root/.gdbinit". To completely disable this security protection add set auto-load safe-path / line to your configuration file "/root/.gdbinit". For more information about this security protection see the "Auto-loading safe path" section in the GDB manual. E.g., run from the shell: info "(gdb)Auto-loading safe path" warning: Unable to find libthread_db matching inferior's thread library, thread debugging will not be available. Warning: couldn't activate thread debugging using libthread_db: Cannot find new threads: generic error warning: File "/lib/x86_64-linux-gnu/libthread_db-1.0.so" auto-loading has been declined by your `auto-load safe-path' set to "$debugdir:$datadir/auto-load". warning: Unable to find libthread_db matching inferior's thread library, thread debugging will not be available. Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/sbc.cfg -'. Program terminated with signal SIGSEGV, Segmentation fault. #0 get_send_socket2 (force_send_socket=0xf, to=0x7ffd144aa740, proto=1, mismatch=0x0) at forward.c:222 222 forward.c: No such file or directory. (gdb) bt full #0 get_send_socket2 (force_send_socket=0xf, to=0x7ffd144aa740, proto=1, mismatch=0x0) at forward.c:222 __FUNCTION__ = "get_send_socket2" #1 0x00007f26c8e0baa6 in uri2dst2 (dns_h=0x7f24c6ca7178, dst=0x7f24c6ca70b8, force_send_socket=0x1, sflags=..., uri=0x0, proto=-1005387774) at ut.h:305 parsed_uri = {user = {s = 0x7f26cb5afebc "15185535074@1.2.3.123:5060", len = 11}, passwd = {s = 0x0, len = 0}, host = {s = 0x7f26cb5afec8 "1.2.3.123:5060", len = 12}, port = { s = 0x7f26cb5afed5 "5060", len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} ip_found = -1005387774 to = {s = {sa_family = 2, sa_data = "\023\304\306\001\066{\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 2067136966}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 2067136966, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = { 0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}} err = 0 __FUNCTION__ = "uri2dst2" #2 0x00007f26c8e0d797 in prepare_new_uac (t=0x7f24c6ca6ca0, i_req=0x7f26c906d1c0 <faked_req>, branch=1, uri=0x7ffd144aa9d0, path=0x2, next_hop=0x0, fsocket=0xf, snd_flags=..., fproto=0, flags=2, instance=0x7f26c906d800 <faked_req+1600>, ruid=0x7f26c906d818 <faked_req+1624>, location_ua=0x7f26c906d828 <faked_req+1640>) at t_fwd.c:431 shbuf = 0x7ffd144aa9d0 "X\016[\313&\177" parsed_uri_bak = {user = {s = 0x7f26cb5b0e5c "15185535074@1.2.3.123:5060", len = 11}, passwd = {s = 0x0, len = 0}, host = {s = 0x7f26cb5b0e68 "1.2.3.123:5060", len = 12}, port = { s = 0x7f26cb5b0e75 "5060", len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} ret = -478 len = 32548 msg_uri_bak = {s = 0x7f26cb5b0e58 "sip:15185535074@1.2.3.123:5060", len = 33} dst_uri_bak = {s = 0x0, len = 0} dst_uri_backed_up = 1 path_bak = {s = 0x0, len = 0} instance_bak = {s = 0x0, len = 0} ruid_bak = {s = 0x0, len = 0} ua_bak = {s = 0x0, len = 0} force_send_socket_bak = 0x1 dst = 0x7f24c6ca70b8 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140724943890992, -8664550427694897703, 139804597062864, 139804558152128, 139795930705056, 139795930706104, 8663656708077872601, -8664549922703186471}, __mask_was_saved = 0, __saved_mask = {__val = {140724943891568, 140724943891472, 139804564709766, 8388608, 7497296, 675816, 891312, 901648, 8, 10, 12007018592332922112, 891312, 6243476, 0, 6978052, 7209399}}}}} __FUNCTION__ = "prepare_new_uac" #3 0x00007f26c8e10355 in add_uac (t=0x7f24c6ca6ca0, request=0x7f26c906d1c0 <faked_req>, uri=0x1, next_hop=0x0, path=0x2, proxy=0x0, fsocket=0xf, snd_flags=..., proto=0, flags=340436804, instance=0x7f26c906d800 <faked_req+1600>, ruid=0x7f26c906d818 <faked_req+1624>, location_ua=0x7f26c906d828 <faked_req+1640>) at t_fwd.c:788 branch = 1 __FUNCTION__ = "add_uac" #4 0x00007f26c8e18c3a in t_forward_nonack (t=0x7f24c6ca6ca0, p_msg=0x7f26c906d1c0 <faked_req>, proxy=0x1, proto=0) at t_fwd.c:1667 current_uri = {s = 0x0, len = -922299968} q = 0 t_invite = 0x2 success_branch = -922298328 lock_replies = 2 dst_uri = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 340439040} path = {s = 0x7f24c972c3a8 "", len = 1} instance = { s = 0x7f26c6cd4c40 <wr_buf> "\027\003\003\001Õ\342M\033\377\300F\030,\026\263}Y!\332lÄr\304\nZÅ@T\021\017\070G\026\t\240}\373\265\"\022\030m\363o$\342\307\373\240[\256ݬ\325\343\330\032\213\363\027\022}\347R\244\355:}\254\346vÚ©\303'|\200|hÕ\214L-d\343\375\210cO ·\326\361\261\003\375{u.}z\006\252l\353\020\225f\236\263Q\233*\305u\201Ťƪ\212\302o\313\024\064\216L)U\a\222\063(\023\224+}\347\";\311u1\317`(\261\260\355\272\315\035\n\206B`\224\210:\265`p\313LHe;@&\231\232\340z\"@\222\366k&\375%\273A\373=\262V\243d;\365\241", <incomplete sequence \340>..., len = 0} ruid = {s = 0x10000 <error: Cannot access memory at address 0x10000>, len = -961935824} location_ua = {s = 0x0, len = -874823191} si = 0xcb5b0c48 backup_bflags = 0 bflags = 0 __FUNCTION__ = "t_forward_nonack" #5 0x00007f26c8dda197 in _w_t_relay_to (force_proto=<optimized out>, proxy=<optimized out>, p_msg=<optimized out>) at tm.c:1412 t = 0x7ffd144aa744 ---Type <return> to continue, or q <return> to quit--- res = 340436804 #6 w_t_relay (p_msg=0xf, _foo=0x7ffd144aa740 "\002", _bar=0x1 <error: Cannot access memory at address 0x1>) at tm.c:1626 No locals. #7 0x0000000000454b60 in do_action (h=0x7ffd144ab4b0, a=0x7f26cb52c270, msg=0x7f26c906d1c0 <faked_req>) at action.c:1060 ret = -5 v = 0 dst = {send_sock = 0xd67a, to = {s = {sa_family = 5919, sa_data = "\334\313&\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 5919, sin_port = 52188, sin_addr = {s_addr = 32550}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 5919, sin6_port = 52188, sin6_flowinfo = 32550, sin6_addr = {__in6_u = { __u6_addr8 = "\000\000\000\000\000\000\000\000\374\310H\000\000\000\000", __u6_addr16 = {0, 0, 0, 0, 51452, 72, 0, 0}, __u6_addr32 = {0, 0, 4770044, 0}}}, sin6_scope_id = 16}}, id = 690, proto = -106 '\226', send_flags = {f = 176 '\260', blst_imask = 74 'J'}} end = 0x7ffd144ab4b0 "\001" uri = {user = {s = 0x7ffd144ace20 "\004", len = 4337712}, passwd = {s = 0x0, len = 0}, host = {s = 0x1000017ac <error: Cannot access memory at address 0x1000017ac>, len = -883777136}, port = { s = 0x7ffd144ab600 "", len = -922299968}, params = {s = 0x7ffd144ab600 "", len = -922299968}, sip_params = {s = 0x0, len = 931380480}, headers = { s = 0x7f24c6294f00 "BYE sip:2024558888@12.7.192.29:6060 SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.4;branch=z9hG4bK22b3.10c96ffa224989a5381b9179586f8729.0\r\nVia: SIP/2.0/UDP 1.2.3.115;received=1.2.3.115;rport=5060;branch=z"..., len = -883773936}, port_no = 65535, proto = 65535, type = ERROR_URI_T, flags = (unknown: 3372667328), transport = {s = 0x7ffd144ace20 "\004", len = 340439652}, ttl = {s = 0x0, len = 4361660}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x17544e0 "x\326\a\314&\177", len = 340440848}, lr = {s = 0x7f26cbe3d1c4 "[%d]", len = -874262073}, r2 = { s = 0x0, len = -875421847}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7ffd144ab2a0 "", len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = { s = 0x7f26cbd2399a <_IO_vfprintf_internal+22490> "\200\275(\373\377\377", len = 690}, method_val = {s = 0x7f24c972c408 "\220\200O\313&\177", len = 0}, lr_val = {s = 0x0, len = -915226208}, r2_val = {s = 0x0, len = -883222360}, gr_val = {s = 0x0, len = -5}} next_hop = {user = {s = 0x297f <error: Cannot access memory at address 0x297f>, len = 10}, passwd = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -875240802}, host = { s = 0x17544e0 "x\326\a\314&\177", len = 931380480}, port = {s = 0x7f26c79b412d "%s: %s%.*s", len = -883772040}, params = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -922299968}, sip_params = {s = 0x7ffd144ace20 "\004", len = 340440032}, headers = {s = 0x0, len = 931380480}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 3411197264), transport = {s = 0x7ffd144ace20 "\004", len = -5}, ttl = {s = 0x7ffd144ace20 "\004", len = -922299968}, user_param = {s = 0x0, len = 4535845}, maddr = {s = 0x7ffd144ace20 "\004", len = -874262073}, method = {s = 0x7f26cb52bd50 "%\001", len = -922299968}, lr = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 0}, r2 = {s = 0x7ffd144ab400 "\341\377\377\377", len = 0}, gr = {s = 0x7ffd144ab820 "\001", len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x7f26cbd2399a <_IO_vfprintf_internal+22490> "\200\275(\373\377\377", len = -875415142}, user_param_val = {s = 0x7f26cbd2399a <_IO_vfprintf_internal+22490> "\200\275(\373\377\377", len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 109}, lr_val = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = -5}, r2_val = {s = 0x297f <error: Cannot access memory at address 0x297f>, len = 10}, gr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 931380480}} u = 0x7ffd144ab4b0 flags = 0 st = {flags = 10623, id = 0, name = {n = 10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len = 32}, re = 0xa}, avp = 0x7f26cbd4e29e <__GI__IO_default_xsputn+174>} sct = 0x7ffd144ab4b0 sjt = 0x7ffd144ab4b0 mct = 0x0 rv = 0x4be504 <tcp_send+228> rv1 = 0x7f26c906d1c0 <faked_req> c1 = {cache_type = 340439171, val_type = 32765, c = {avp_val = {n = 340439182, s = {s = 0x7ffd144ab08e "", len = 10136659}, re = 0x7ffd144ab08e}, pval = {rs = {s = 0x7ffd144ab08e "", len = 10136659}, ri = 11, flags = 0}}, i2s = "_\254\232\000\000\000\000\000\000\275\203\067\313\177\241\246\000\000\000\000\000"} s = {s = 0x0, len = -947045976} srevp = {0x0, 0x7f26c8e14085 <e2e_cancel+1365>} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #8 0x0000000000453625 in run_actions (h=0xf, h@entry=0x7ffd144ab4b0, a=0x7ffd144aa740, msg=0x1) at action.c:1549 ret = 340446752 mod = 0x7f26cb52c270 __FUNCTION__ = "run_actions" #9 0x000000000045fff7 in run_actions_safe (h=0x7ffd144ace20, a=<optimized out>, msg=<optimized out>) at action.c:1614 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140724943893680, 8663656706762958297, 139804558152128, 140724943900192, 140724943894452, 0, 8663656707417269721, -8664549922703186471}, __mask_was_saved = 0, __saved_mask = {__val = {139804558152128, 4294967296, 4535845, 140724943894128, 11, 0, 0, 139795947484431, 11, 139804605036954, 4, 0, 0, 0, 0, 0}}}}} ret = <optimized out> ign_on_break = 0 #10 0x0000000000423030 in rval_get_int (h=0x7ffd144ace20, msg=0xf, i=0x7ffd144ab7b4, rv=0x0, cache=0x2) at rvalue.c:912 r_avp = 0x7ffd144aa744 avp_val = {n = 24462560, s = {s = 0x17544e0 "x\326\a\314&\177", len = 0}, re = 0x17544e0} pval = {rs = {s = 0x7ffd144ace20 "\004", len = 340441392}, ri = 0, flags = 0} tmp = {s = 0x7ffd144ace20 "\004", len = -922299968} ---Type <return> to continue, or q <return> to quit--- s = 0x7f26c906d1c0 <faked_req> r = 340436804 ret = 340436804 destroy_pval = 340446752 __FUNCTION__ = "rval_get_int" #11 0x0000000000428dbc in rval_expr_eval_int (h=0x7ffd144ace20, msg=0x7f26c906d1c0 <faked_req>, res=0x7ffd144ab7b4, rve=0x7f26cb52c6b0) at rvalue.c:1910 i1 = 0 i2 = -875300784 ret = -1 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 340441888}, re = 0x0}, pval = {rs = {s = 0x0, len = 340441888}, ri = 0, flags = 32765}}, i2s = '\000' <repeats 12 times>, "\375\177\000\000\000\000\000\000\000"} c2 = {cache_type = 3419552154, val_type = 32550, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 931380480, flags = -1499365429}}, i2s = "\377\377\377\377\377\377\377\377\060\271J\024\375\177\000\000 \316J\024\375\177"} rv1 = 0x0 rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" #12 0x0000000000428eb6 in rval_expr_eval_int (h=0x7ffd144ace20, msg=0x7f26c906d1c0 <faked_req>, res=0x7ffd144ab930, rve=0x7f26cb52cdc0) at rvalue.c:1918 i1 = 32765 i2 = -922299968 ret = -1 c1 = {cache_type = 340446752, val_type = 32765, c = {avp_val = {n = -946126547, s = {s = 0x4c79b412d <error: Cannot access memory at address 0x4c79b412d>, len = -883769528}, re = 0x4c79b412d}, pval = { rs = {s = 0x4c79b412d <error: Cannot access memory at address 0x4c79b412d>, len = -883769528}, ri = -922299968, flags = 32550}}, i2s = "\000\000\000\000\005\000\000\000\301\321\343\313&\177\000\000LGu\001\000"} c2 = {cache_type = 8, val_type = RV_NONE, c = {avp_val = {n = -874270310, s = {s = 0x7f26cbe3b19a "%H:%M:%S", len = 1}, re = 0x7f26cbe3b19a}, pval = {rs = {s = 0x7f26cbe3b19a "%H:%M:%S", len = 1}, ri = 931380480, flags = -1499365429}}, i2s = "\020 \000\061\060\066\062\063\300\321\006\311&\177\000\000\017\000\000\000\000"} rv1 = 0x7f26c906d1c0 <faked_req> rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" #13 0x0000000000455037 in do_action (h=0x7ffd144ace20, a=0x7f26cb52dde8, msg=0x7f26c906d1c0 <faked_req>) at action.c:1030 ret = -5 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 14, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 14, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 14, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000", __u6_addr16 = {0, 0, 0, 0, 1, 0, 0, 0}, __u6_addr32 = {0, 0, 1, 0}}}, sin6_scope_id = 3325207609}}, id = 32548, proto = 81 'Q', send_flags = {f = 171 '\253', blst_imask = 216 '\330'}} end = 0x7f26cb52cdc0 "\004" uri = {user = {s = 0x16f9930 "PST", len = 340441632}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = { s = 0x373200000000 <error: Cannot access memory at address 0x373200000000>, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 931380480}, port_no = 12, proto = 0, type = 32550, flags = (unknown: 3324156664), transport = {s = 0x7ffd144abac0 "-A\233\307&\177", len = 340441824}, ttl = {s = 0x7f26c906d1c0 <faked_req> "7\324)", len = -874262079}, user_param = { s = 0x175474c "17:26:27 sbc[10623]: NOTICE: <script>: Node unavailable, trying next sip:1.2.3.123:5060 from group FREESWITCH M=INVITE R=sip:15185535074@1.2.3.123:5060 ID=3480863f5afd0da91b6f2fbb2226d60c@12.7.1"..., len = -871908640}, maddr = {s = 0x8 <error: Cannot access memory at address 0x8>, len = -874270310}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -874997598}, lr = {s = 0x33323630315a4b5a <error: Cannot access memory at address 0x33323630315a4b5a>, len = 8187}, r2 = {s = 0x0, len = 24462560}, gr = {s = 0x7f26c79b412d "%s: %s%.*s", len = 24463152}, transport_val = {s = 0x2010 <error: Cannot access memory at address 0x2010>, len = -871901664}, ttl_val = {s = 0x1756740 "", len = 219}, user_param_val = { s = 0x2010 <error: Cannot access memory at address 0x2010>, len = -875219540}, maddr_val = {s = 0x7ffd144abbd0 "\300\321\006\311&\177", len = 340441872}, method_val = { s = 0x7f26cc07d620 <main_arena> "", len = 24463168}, lr_val = {s = 0x1754730 "`\002", len = 240}, r2_val = {s = 0xdb <error: Cannot access memory at address 0xdb>, len = -875214999}, gr_val = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 1}} next_hop = {user = {s = 0x8f <error: Cannot access memory at address 0x8f>, len = 24462560}, passwd = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -946126547}, host = { s = 0x7ffd144abcb8 "0", len = 24462560}, port = {s = 0x0, len = -874768803}, params = {s = 0x7ffd144abcb8 "0", len = 24462560}, sip_params = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -946126547}, headers = {s = 0x7ffd144abcb8 "0", len = 0}, port_no = 21, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3420176444), transport = {s = 0x7f26c906d1c0 <faked_req> "7\324)", len = 1485825987}, ttl = { s = 0x1754740 "<173>Jan 30 17:26:27 sbc[10623]: NOTICE: <script>: Node unavailable, trying next sip:1.2.3.123:5060 from group FREESWITCH M=INVITE R=sip:15185535074@1.2.3.123:5060 ID=3480863f5afd0da91b6f2fbb222"..., len = 218}, user_param = {s = 0x7f26c906d460 <faked_req+672> "\v", len = 47}, maddr = {s = 0x3a706973 <error: Cannot access memory at address 0x3a706973>, len = 0}, method = { s = 0x1754740 "<173>Jan 30 17:26:27 sbc[10623]: NOTICE: <script>: Node unavailable, trying next sip:1.2.3.123:5060 from group FREESWITCH M=INVITE R=sip:15185535074@1.2.3.123:5060 ID=3480863f5afd0da91b6f2fbb222"..., len = 0}, lr = {s = 0x300000003 <error: Cannot access memory at address 0x300000003>, len = -922299968}, r2 = {s = 0x1a0000001b <error: Cannot access memory at address 0x1a0000001b>, len = 17}, gr = {s = 0x7500000000 <error: Cannot access memory at address 0x7500000000>, len = 1}, transport_val = {s = 0x0, len = -28800}, ttl_val = {s = 0x16f9930 "PST", len = 18}, user_param_val = {s = 0x7f24c632a3a3 "FREESWITCH", len = 10488584}, maddr_val = {s = 0x9a8e50 <_km_log_func> "\340jA", len = 0}, method_val = {s = 0x7f26c7bb7568 <_xlog_prefix> "\242C\233\307&\177", len = 5}, lr_val = {s = 0x416ae0 <syslog@plt> "\377%\222\310X", len = -874790033}, r2_val = {s = 0x7f26cb56b670 "\020\243r\001", len = 48}, gr_val = {s = 0x7ffd144abd90 "\020KZ\313&\177", len = 340442320}} u = 0x7f26cb52cdc0 flags = 0 st = {flags = 143, id = 0, name = {n = 24462560, s = {s = 0x17544e0 "x\326\a\314&\177", len = 0}, re = 0x17544e0}, avp = 0x7f26c79b412d} sct = 0x7f26cb52cdc0 ---Type <return> to continue, or q <return> to quit--- sjt = 0x7f26cb52cdc0 mct = 0x0 rv = 0x7f26c79b412d rv1 = 0x7f26c906d1c0 <faked_req> c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 8180, s = {s = 0x1ff4 <error: Cannot access memory at address 0x1ff4>, len = 6}, re = 0x1ff4}, pval = {rs = { s = 0x1ff4 <error: Cannot access memory at address 0x1ff4>, len = 6}, ri = 0, flags = 5}}, i2s = "0\274J\024\375\177\000\000\000\272J\024\375\177\000\000\000\263\a\314&\177"} s = {s = 0x7ffdffffffff <error: Cannot access memory at address 0x7ffdffffffff>, len = 0} srevp = {0x0, 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #14 0x0000000000453625 in run_actions (h=0xf, a=0x7ffd144aa740, msg=0x1) at action.c:1549 ret = 1 mod = 0x7f26cb52dde8 __FUNCTION__ = "run_actions" #15 0x0000000000455250 in do_action (h=0x7ffd144ace20, a=0x7f26cb579ab8, msg=0x7f26c906d1c0 <faked_req>) at action.c:678 ret = -5 v = 17 dst = {send_sock = 0x400000001, to = {s = {sa_family = 48384, sa_data = "\203\067\313\177\241\246\001\000\000\000\003\000\000"}, sin = {sin_family = 48384, sin_port = 14211, sin_addr = { s_addr = 2795601867}, sin_zero = "\001\000\000\000\003\000\000"}, sin6 = {sin6_family = 48384, sin6_port = 14211, sin6_flowinfo = 2795601867, sin6_addr = {__in6_u = { __u6_addr8 = "\001\000\000\000\003\000\000\000p\316X\313&\177\000", __u6_addr16 = {1, 0, 3, 0, 52848, 52056, 32550, 0}, __u6_addr32 = {1, 3, 3411594864, 32550}}}, sin6_scope_id = 340444320}}, id = 32765, proto = -64 '\300', send_flags = {f = 209 '\321', blst_imask = 6 '\006'}} end = 0x1 <error: Cannot access memory at address 0x1> uri = {user = {s = 0x7ffd144ac4a0 "", len = -922299968}, passwd = {s = 0x7ffd144ac4a0 "", len = -922299968}, host = {s = 0x0, len = 931380480}, port = {s = 0x7f26cb5898c0 "\300\227r\001", len = -883351096}, params = {s = 0x7ffd144ace20 "\004", len = -5}, sip_params = {s = 0x7ffd144ac0a0 "", len = -922299968}, headers = {s = 0x0, len = 4535845}, port_no = 49312, proto = 5194, type = 32765, flags = (unknown: 340443180), transport = {s = 0x7f26cb5921c8 "f\002", len = -922299968}, ttl = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 931380480}, user_param = {s = 0x0, len = -883343280}, maddr = {s = 0x0, len = -5}, method = {s = 0x7ffd144ac110 "", len = -922299968}, lr = {s = 0x0, len = 4535845}, r2 = {s = 0x7ffd144ac110 "", len = -883579232}, gr = {s = 0x7f26cb594050 "s\002", len = -922299968}, transport_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -883222360}, ttl_val = { s = 0x0, len = 4535845}, user_param_val = {s = 0x7ffd144ad330 "", len = -875219540}, maddr_val = {s = 0x7f26cb55a6a0 "\300\001", len = 931380480}, method_val = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, lr_val = {s = 0x7ffd144ace20 "\004", len = -922299968}, r2_val = {s = 0x7ffd144ace20 "\004", len = 340444112}, gr_val = {s = 0x0, len = 4587511}} next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffd144ac0a0 "", len = 1854498265}, host = {s = 0x7f26c906d1c0 <faked_req> "7\324)", len = 340446752}, port = {s = 0x7ffd144ac3d0 "\001", len = 0}, params = {s = 0x783b7ddf8de965d9 <error: Cannot access memory at address 0x783b7ddf8de965d9>, len = -2036111911}, sip_params = {s = 0x7f2600000000 "", len = 2}, headers = { s = 0x9a8ee4 <route_type> "\002", len = 4587679}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = URI_USER_NORMALIZE, transport = {s = 0x7ffd144ac110 "", len = -221682215}, ttl = { s = 0x7f26cb594050 "s\002", len = -922299968}, user_param = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 10129124}, maddr = { s = 0x783b7ddf72c965d9 <error: Cannot access memory at address 0x783b7ddf72c965d9>, len = -2036111911}, method = {s = 0x0, len = 0}, lr = {s = 0x7ffd144ac770 "", len = 931380480}, r2 = { s = 0x1a00000018 <error: Cannot access memory at address 0x1a00000018>, len = 340444112}, gr = {s = 0x7ffd144ace20 "\004", len = 4337712}, transport_val = {s = 0x0, len = -28800}, ttl_val = { s = 0x16f9930 "PST", len = -883223808}, user_param_val = {s = 0x0, len = 5936669}, maddr_val = {s = 0x9a8e50 <_km_log_func> "\340jA", len = 5593174}, method_val = { s = 0x7f26c7bb7568 <_xlog_prefix> "\242C\233\307&\177", len = 931380480}, lr_val = {s = 0xa502c0 <event_rt> "\260OY\313&\177", len = -883350792}, r2_val = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -922299968}, gr_val = {s = 0x7ffd144ace20 "\004", len = 340444112}} u = 0x1 flags = 0 st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x7f2600000001 "", len = 340443296}, re = 0x7f2600000001}, avp = 0x783b7ddf6e8965d9} sct = 0x1 sjt = 0x1 mct = 0x0 rv = 0x7f26c8dd5fae <t_check_status+366> rv1 = 0x7f26c906d1c0 <faked_req> c1 = {cache_type = 340444320, val_type = 32765, c = {avp_val = {n = -922299968, s = {s = 0x7f26c906d1c0 <faked_req> "7\324)", len = 0}, re = 0x7f26c906d1c0 <faked_req>}, pval = {rs = { s = 0x7f26c906d1c0 <faked_req> "7\324)", len = 0}, ri = -925353351, flags = 32550}}, i2s = "\000\000\000\000\000\000\000\000\003\275\335\310&\177\000\000\000\000\000\000\000"} s = {s = 0x0, len = -959812448} srevp = {0xa4dfa2 <ut_buf_int2str+18>, 0x100000002} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" ---Type <return> to continue, or q <return> to quit--- #16 0x0000000000453625 in run_actions (h=0xf, a=0x7ffd144aa740, msg=0x1) at action.c:1549 ret = 1 mod = 0x7f26cb592e48 __FUNCTION__ = "run_actions" #17 0x0000000000455088 in do_action (h=0x7ffd144ace20, a=0x7f26cb593a80, msg=0x7f26c906d1c0 <faked_req>) at action.c:1049 ret = 1 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 3, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 3, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 3, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000P\305J\024\375\177\000", __u6_addr16 = {0, 0, 0, 0, 50512, 5194, 32765, 0}, __u6_addr32 = {0, 0, 340444496, 32765}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 189 '\275', blst_imask = 131 '\203'}} end = 0x7f26cb5922f8 "\001" uri = {user = {s = 0x7ffd144ace20 "\004", len = -922299968}, passwd = {s = 0x7ffd144ace20 "\004", len = 340445248}, host = {s = 0x0, len = 931380480}, port = {s = 0x0, len = -883363856}, params = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -922299968}, sip_params = {s = 0x7ffd144ace20 "\004", len = 340444756}, headers = {s = 0x0, len = 4361660}, port_no = 26073, proto = 30185, type = 2017164767, flags = (URI_USER_NORMALIZE | unknown: 2258855384), transport = {s = 0x7f2600000000 "", len = -922299968}, ttl = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 4535845}, user_param = {s = 0x3c79b4136 <error: Cannot access memory at address 0x3c79b4136>, len = 0}, maddr = { s = 0x7f26cb5409b0 "d\001", len = 16}, method = {s = 0x7ffd144acb50 "\020KZ\313&\177", len = 340445840}, lr = {s = 0x7ffd144ac570 "", len = 931380480}, r2 = { s = 0x9aac48 <buf+8> "503 Maximum Calls In Progress\r\nVia: SIP/2.0/UDP 1.2.3.4;branch=z9hG4bKbdcf.a98cb99338522a1799fd347f7a9929a9.0\r\nVia: SIP/2.0/UDP 12.7.192.27;rport=5060;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9"..., len = 24234928}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 931380480}, ttl_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 340445248}, user_param_val = {s = 0x7ffd144ace20 "\004", len = 4337712}, maddr_val = {s = 0x0, len = 24278024}, method_val = { s = 0x1000001 <error: Cannot access memory at address 0x1000001>, len = 0}, lr_val = {s = 0x7ffd144ace20 "\004", len = -922299968}, r2_val = {s = 0x7ffd144ace20 "\004", len = 340445472}, gr_val = { s = 0x0, len = 931380480}} next_hop = {user = {s = 0x0, len = -883359736}, passwd = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -922299968}, host = {s = 0x7ffd144ace20 "\004", len = 340445092}, port = {s = 0x0, len = 4362150}, params = {s = 0x783b7ddf7b0965d9 <error: Cannot access memory at address 0x783b7ddf7b0965d9>, len = -2036111911}, sip_params = {s = 0x7f2600000000 "", len = -874873275}, headers = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, port_no = 0, proto = 0, type = 32765, flags = (unknown: 3411516088), transport = { s = 0x0, len = -883222360}, ttl = {s = 0x0, len = 5}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x7f26cb5b18e0 "H\254\232", len = 5894248}, method = { s = 0x20 <error: Cannot access memory at address 0x20>, len = -874997598}, lr = {s = 0x3332363031002010 <error: Cannot access memory at address 0x3332363031002010>, len = 931380480}, r2 = { s = 0x0, len = 340445472}, gr = {s = 0x7ffd144ace20 "\004", len = 4337712}, transport_val = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7498344}, ttl_val = { s = 0xa4ea0 <error: Cannot access memory at address 0xa4ea0>, len = 890264}, user_param_val = {s = 0xdc210 <error: Cannot access memory at address 0xdc210>, len = 8}, maddr_val = { s = 0xa <error: Cannot access memory at address 0xa>, len = 931380480}, method_val = {s = 0x7f26cb5b0e58 "sip:15185535074@1.2.3.123:5060", len = 931380480}, lr_val = { s = 0x7ffd144ad4f0 "\020\302\r", len = -883353808}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -922299968}, gr_val = {s = 0x7ffd144ace20 "\004", len = 340445472}} u = 0x7f26cb5922f8 flags = 0 st = {flags = 0, id = 0, name = {n = -883359736, s = {s = 0x7f26cb590008 "\020", len = -1}, re = 0x7f26cb590008}, avp = 0x7f26c906d1c0 <faked_req>} sct = 0x7f26cb5922f8 sjt = 0x7f26cb5922f8 mct = 0x0 rv = 0x9aac48 <buf+8> rv1 = 0x7f26c906d1c0 <faked_req> c1 = {cache_type = 24277584, val_type = RV_NONE, c = {avp_val = {n = 340444756, s = {s = 0x7ffd144ac654 "\001", len = 340446752}, re = 0x7ffd144ac654}, pval = {rs = {s = 0x7ffd144ac654 "\001", len = 340446752}, ri = 4337712, flags = 0}}, i2s = "\030\305J\024\375\177\000\000\000\000\000\000\375\177\000\000\000\000\000\000\000"} s = {s = 0x0, len = 340444496} srevp = {0x1727250, 0x7f26cbd54020 <__GI___libc_malloc+96>} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #18 0x0000000000453625 in run_actions (h=0xf, a=0x7ffd144aa740, msg=0x1) at action.c:1549 ret = 1 mod = 0x7f26cb593a80 __FUNCTION__ = "run_actions" #19 0x0000000000455088 in do_action (h=0x7ffd144ace20, a=0x7f26cb593d18, msg=0x7f26c906d1c0 <faked_req>) at action.c:1049 ret = 1 v = 1 dst = {send_sock = 0x7ffd144aca78, to = {s = {sa_family = 17632, sa_data = "u\001\000\000\000\000\377\377\377\377\000\000\000"}, sin = {sin_family = 17632, sin_port = 373, sin_addr = {s_addr = 0}, sin_zero = "\377\377\377\377\000\000\000"}, sin6 = {sin6_family = 17632, sin6_port = 373, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = "\377\377\377\377\000\000\000\000-A\233\307&\177\000", __u6_addr16 = {65535, 65535, 0, 0, 16685, 51099, 32550, 0}, __u6_addr32 = {4294967295, 0, 3348840749, 32550}}}, sin6_scope_id = 340445816}}, id = 32765, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7f26cb591730 "\020" ---Type <return> to continue, or q <return> to quit--- uri = {user = {s = 0x7f26c79b43a2 "<script>: ", len = 931380480}, passwd = { s = 0x1754740 "<173>Jan 30 17:26:27 sbc[10623]: NOTICE: <script>: Node unavailable, trying next sip:1.2.3.123:5060 from group FREESWITCH M=INVITE R=sip:15185535074@1.2.3.123:5060 ID=3480863f5afd0da91b6f2fbb222"..., len = 340446272}, host = {s = 0x7ffd144ad330 "", len = -883222360}, port = {s = 0x7ffd144ad330 "", len = 340446272}, params = {s = 0x0, len = 4337663}, sip_params = { s = 0xd449b6700000000 <error: Cannot access memory at address 0xd449b6700000000>, len = -28800}, headers = {s = 0x16f9930 "PST", len = -883222360}, port_no = 22128, proto = 52052, type = 32550, flags = (unknown: 10488584), transport = {s = 0x9a8e50 <_km_log_func> "\340jA", len = 0}, ttl = {s = 0x7f26c7bb7568 <_xlog_prefix> "\242C\233\307&\177", len = 931380480}, user_param = { s = 0x416ae0 <syslog@plt> "\377%\222\310X", len = -883383720}, maddr = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -883222360}, method = {s = 0x7ffd144ad330 "", len = 340446272}, lr = {s = 0x0, len = 4361660}, r2 = {s = 0x6ee54f "NOTICE", len = -946125918}, gr = {s = 0x61 <error: Cannot access memory at address 0x61>, len = -883274992}, transport_val = { s = 0x7f26cb571af8 "ÇX\313&\177", len = -883222360}, ttl_val = { s = 0x7f26cb5a4b44 "from group FREESWITCH M=INVITE R=sip:15185535074@1.2.3.123:5060 ID=3480863f5afd0da91b6f2fbb2226d60c@12.7.192.27\n", len = 52}, user_param_val = {s = 0x7ffd144acb88 "a", len = 5740139}, maddr_val = { s = 0x9aadfa <buf+442> "3480863f5afd0da91b6f2fbb2226d60c@12.7.192.27\r\nCSeq: 102 INVITE\r\nRetry-After: 300\r\nUser-Agent: Primo MS 2.0/N+\r\nAccept: application/sdp\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE,"..., len = 44}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 931380480}, lr_val = { s = 0x1e6 <error: Cannot access memory at address 0x1e6>, len = -944015656}, r2_val = {s = 0x7f26cb58a200 "0\030W\313&\177", len = -883222360}, gr_val = {s = 0x0, len = 931380480}} next_hop = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -946129552}, passwd = { s = 0x7f26cb5a4b10 "Node unavailable, trying next sip:1.2.3.123:5060 from group FREESWITCH M=INVITE R=sip:15185535074@1.2.3.123:5060 ID=3480863f5afd0da91b6f2fbb2226d60c@12.7.192.27\n", len = 97}, host = {s = 0x7f26c79b43a2 "<script>: ", len = 7267663}, port = {s = 0x0, len = -883823336}, params = { s = 0x7f26cb5a4b10 "Node unavailable, trying next sip:1.2.3.123:5060 from group FREESWITCH M=INVITE R=sip:15185535074@1.2.3.123:5060 ID=3480863f5afd0da91b6f2fbb2226d60c@12.7.192.27\n", len = 97}, sip_params = {s = 0x7ffd144accc0 "", len = -883222360}, headers = {s = 0x0, len = 931380480}, port_no = 52416, proto = 5194, type = 32765, flags = (unknown: 3411580496), transport = { s = 0x7ffd144ad330 "", len = -883222360}, ttl = {s = 0x7f26cb58a258 "\001", len = -883222360}, user_param = {s = 0x0, len = 4542519}, maddr = {s = 0x7f26cb5b16a0 "Þ\232", len = -874768803}, method = {s = 0x7ffd144acd4c "", len = -959624128}, lr = {s = 0x1da <error: Cannot access memory at address 0x1da>, len = 14}, r2 = {s = 0x0, len = 474}, gr = {s = 0x0, len = 4951110}, transport_val = {s = 0x7f2400000000 <error: Cannot access memory at address 0x7f2400000000>, len = 931380480}, ttl_val = {s = 0x0, len = 340446836}, user_param_val = { s = 0x7ffd144ad4f0 "\020\302\r", len = 4337712}, maddr_val = {s = 0x1da <error: Cannot access memory at address 0x1da>, len = 474}, method_val = { s = 0x1da <error: Cannot access memory at address 0x1da>, len = 0}, lr_val = {s = 0x7ffd144ad4f0 "\020\302\r", len = -883222360}, r2_val = {s = 0x7ffd144ad4f0 "\020\302\r", len = 340447216}, gr_val = {s = 0x0, len = 4587511}} u = 0x7f26cb591730 flags = 1 st = {flags = 1, id = 0, name = {n = -946129552, s = {s = 0x7f26c79b3570 <xlog_2_helper+1360> "\351\\\374\377\377\017\037", len = -883274992}, re = 0x7f26c79b3570 <xlog_2_helper+1360>}, avp = 0x7ffd00000061} sct = 0x7f26cb591730 sjt = 0x7f26cb591730 mct = 0x0 rv = 0x7f26c79b412d rv1 = 0x7f26c906d1c0 <faked_req> c1 = {cache_type = 21, val_type = RV_NONE, c = {avp_val = {n = -874790849, s = {s = 0x7f26cbdbc03f <__GI___vsyslog_chk+655> "H\201Ĩ", len = 0}, re = 0x7f26cbdbc03f <__GI___vsyslog_chk+655>}, pval = { rs = {s = 0x7f26cbdbc03f <__GI___vsyslog_chk+655> "H\201Ĩ", len = 0}, ri = 1485825987, flags = 0}}, i2s = "@Gu\001\000\000\000\000\224\000\000\000\000\000\000\000\020KZ\313&\177"} s = {s = 0x7ffd144aca78 "\250\030[\313&\177", len = 24462560} srevp = {0x0, 0x7f26cbdc165d <__libc_send+141>} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #20 0x0000000000453625 in run_actions (h=0xf, h@entry=0x7ffd144ace20, a=0x7ffd144aa740, a@entry=0x7f26cb58a968, msg=0x1, msg@entry=0x7f26c906d1c0 <faked_req>) at action.c:1549 ret = 1 mod = 0x7f26cb593d18 __FUNCTION__ = "run_actions" #21 0x0000000000460095 in run_top_route (a=0x7f26cb58a968, msg=0x7f26c906d1c0 <faked_req>, c=<optimized out>) at action.c:1635 ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140724943900192, -8664550427694897703, 139804597070184, 139804558152128, 1, 139795930705056, 8663656706668586457, -8664549922703186471}, __mask_was_saved = 0, __saved_mask = {__val = {7499504, 674472, 139795947483256, 139804558152768, 139804555797428, 503, 1, 139795930705056, 139804555317783, 139804597225760, 139795919910088, 139804597225760, 139804558152128, 139795930705576, 139795947482616, 503}}}}} p = <optimized out> ret = <optimized out> sfbk = 0 #22 0x00007f26c8db9c5b in run_failure_handlers (t=0x7f24c6ca6ca0, rpl=0x7f26cb5b18a8, code=503, extra_flags=1) at t_reply.c:990 faked_req = {id = 2741303, pid = 10619, tval = {tv_sec = 1485825987, tv_usec = 30844}, fwd_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, rpl_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, first_line = {type = 1, flags = 1, len = 49, u = {request = {method = { s = 0x7f24c7ca74f8 "INVITE sip:15185535074@1.2.3.4:5060 SIP/2.0\r\nRecord-Route: <sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: SIP/2.0/UDP 12.7.192.27:60"..., len = 6}, uri = { s = 0x7f24c7ca74ff "sip:15185535074@1.2.3.4:5060 SIP/2.0\r\nRecord-Route: <sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: SIP/2.0/UDP 12.7.192.27:6060;rece"..., len = 32}, version = { ---Type <return> to continue, or q <return> to quit--- s = 0x7f24c7ca7520 "SIP/2.0\r\nRecord-Route: <sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: SIP/2.0/UDP 12.7.192.27:6060;received=12.7.192.27;branch=z9hG4bK4a"..., len = 7}, method_value = 1}, reply = {version = { s = 0x7f24c7ca74f8 "INVITE sip:15185535074@1.2.3.4:5060 SIP/2.0\r\nRecord-Route: <sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: SIP/2.0/UDP 12.7.192.27:60"..., len = 6}, status = { s = 0x7f24c7ca74ff "sip:15185535074@1.2.3.4:5060 SIP/2.0\r\nRecord-Route: <sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: SIP/2.0/UDP 12.7.192.27:6060;rece"..., len = 32}, reason = { s = 0x7f24c7ca7520 "SIP/2.0\r\nRecord-Route: <sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: SIP/2.0/UDP 12.7.192.27:6060;received=12.7.192.27;branch=z9hG4bK4a"..., len = 7}, statuscode = 1}}}, via1 = 0x7f24c7ca7a28, via2 = 0x7f24c7ca7b90, headers = 0x7f24c7ca79a8, last_header = 0x7f24c7ca8448, parsed_flag = 18446744073709551615, h_via1 = 0x7f24c7ca79e8, h_via2 = 0x7f24c7ca7b50, callid = 0x7f24c7ca8218, to = 0x7f24c7ca7fc0, cseq = 0x7f24c7ca8258, from = 0x7f24c7ca7d78, contact = 0x7f24c7ca81d8, maxforwards = 0x7f24c7ca7d38, route = 0x0, record_route = 0x7f24c7ca79a8, content_type = 0x7f24c7ca8408, content_length = 0x7f24c7ca8448, authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x7f24c7ca83c8, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x7f24c7ca8388, event = 0x0, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x7f24c7ca82c8, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x7f24c7ca8308, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0, date = 0x7f26cb5954f0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, body = 0x0, eoh = 0x7f24c7ca781c "\r\nv=0\r\no=root 282422976 282422976 IN IP4 12.7.192.27\r\ns=IVS-SBC\r\nc=IN IP4 12.7.192.27\r\nt=0 0\r\nm=audio 22306 RTP/AVP 0 9 18 4 8 103 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:9 G722/8000\r\na=rtpmap:18 G729/800"..., unparsed = 0x7f24c7ca781c "\r\nv=0\r\no=root 282422976 282422976 IN IP4 12.7.192.27\r\ns=IVS-SBC\r\nc=IN IP4 12.7.192.27\r\nt=0 0\r\nm=audio 22306 RTP/AVP 0 9 18 4 8 103 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:9 G722/8000\r\na=rtpmap:18 G729/800"..., rcv = {src_ip = {af = 2, len = 4, u = {addrl = {465569548, 139795915961584}, addr32 = {465569548, 0, 3320411376, 32548}, addr16 = {1804, 7104, 0, 0, 29936, 50665, 32548, 0}, addr = "\f\a\300\033\000\000\000\000\360t\351\305$\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {1228276166, 0}, addr32 = {1228276166, 0, 0, 0}, addr16 = {454, 18742, 0, 0, 0, 0, 0, 0}, addr = "\306\001\066I", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\f\a\300\033\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 465569548}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 465569548, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f26cb4f8090, proto = 1 '\001'}, buf = 0x7f24c7ca74f8 "INVITE sip:15185535074@1.2.3.4:5060 SIP/2.0\r\nRecord-Route: <sip:12.7.192.27;lr>\r\nVia: SIP/2.0/UDP 12.7.192.27;branch=z9hG4bKbdcf.b7fdae31594be08bdc20ad66b9a5a7ce.0\r\nVia: SIP/2.0/UDP 12.7.192.27:60"..., len = 1198, new_uri = {s = 0x7f26cb5afeb8 "sip:15185535074@1.2.3.123:5060", len = 33}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = { s = 0x7f26cb5b0e5c "15185535074@1.2.3.123:5060", len = 11}, passwd = {s = 0x0, len = 0}, host = {s = 0x7f26cb5b0e68 "1.2.3.123:5060", len = 12}, port = {s = 0x7f26cb5b0e75 "5060", len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = { s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x7f26cb5af3b8, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = "z9hG4bKbdcf.a98cb99338522a1799fd347f7a9929a9.1", '\000' <repeats 11 times>, add_to_branch_len = 46, hash_index = 64731, msg_flags = 262353, flags = 0, set_global_address = { s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0xf, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = { s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 0 '\000'}}}} shmem_msg = 0x7f24c7ca6df8 on_failure = 1 __FUNCTION__ = "run_failure_handlers" #23 0x00007f26c8dbb952 in t_should_relay_response (Trans=0x7f24c6ca6ca0, new_code=503, branch=0, should_store=0x7ffd144ad0b8, should_relay=0x7ffd144ad0b4, cancel_data=0x0, reply=0x7f26cb5b18a8) at t_reply.c:1346 picked_code = 503 new_branch = 340436804 inv_through = 1 replies_dropped = 0 __FUNCTION__ = "t_should_relay_response" #24 0x00007f26c8dc347a in relay_reply (t=0x7f24c6ca6ca0, p_msg=0x7ffd144aa740, branch=1, msg_status=0, cancel_data=0x2, do_put_on_wait=0) at t_reply.c:1749 relay = 32550 save_clone = 6243476 res_len = 0 bm = {to_tag_val = {s = 0x71ede2 <__FUNCTION__.7358> "parse_headers", len = -959811912}} totag_retr = -883222360 reason = { s = 0x7f24c6310b48 "ACK sip:15185535074@1.2.3.4:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.4;branch=z9hG4bKbdcf.a98cb99338522a1799fd347f7a9929a9.0\r\nMax-Forwards: 68\r\nFrom: \"2024558888\" <sip:2024558888@12.7.192.27>;tag="..., len = -959811832} onsend_params = {req = 0x7f24c6310b48, rpl = 0x7f24c6310b48, param = 0x7f24c6ca6f08, code = 340448048, flags = 32765, branch = 0, t_rbuf = 0x0, dst = 0x7f26cb5890b8, send_buf = { s = 0x7f26cb5b18a8 "}\304)", len = -959811928}} ---Type <return> to continue, or q <return> to quit--- ip = {af = 3335154848, len = 32548, u = {addrl = {4587679, 139795920653128}, addr32 = {4587679, 0, 3325102920, 32548}, addr16 = {159, 70, 0, 0, 2888, 50737, 32548, 0}, addr = "\237\000F\000\000\000\000\000H\v1\306$\177\000"}} __FUNCTION__ = "relay_reply" #25 0x00007f26c8dc8013 in reply_received (p_msg=0x7f26cb5b18a8) at t_reply.c:2466 msg_status = 503 ack_len = 364 branch = 0 reply_status = 1 cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = -915742330}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = -915742330}}}} uac = 0x7f24c6ca6ea8 t = 0x7f24c6ca6ca0 lack_dst = {send_sock = 0x800000, to = {s = {sa_family = 29184, sa_data = "r\000\000\000\000\000 J\n\000\000\000\000"}, sin = {sin_family = 29184, sin_port = 114, sin_addr = {s_addr = 0}, sin_zero = " J\n\000\000\000\000"}, sin6 = {sin6_family = 29184, sin6_port = 114, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = " J\n\000\000\000\000\000\000\216\r\000\000\000\000", __u6_addr16 = {18976, 10, 0, 0, 36352, 13, 0, 0}, __u6_addr32 = {674336, 0, 888320, 0}}}, sin6_scope_id = 901648}}, id = 0, proto = 8 '\b', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} backup_domain_from = 0x1 replies_locked = 1 blst_503_timeout = 340447904 hf = 0x7ffd144aa744 onsend_params = {req = 0x9aadb4 <buf+372>, rpl = 0x7f260000003d, param = 0x800000, code = 7501448, flags = 0, branch = 0, t_rbuf = 0xa44c0, dst = 0xd8978, send_buf = { s = 0xdc210 <error: Cannot access memory at address 0xdc210>, len = 8}} ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140724943901488, -8664550427694897703, 139804597063864, 139804597229736, 139795930705576, 139795930705056, 8663656706295293401, -8664549922703186471}, __mask_was_saved = 0, __saved_mask = {__val = {12007018592332922112, 0, 12007018592332922112, 10136892, 10136708, 6, 139804597228832, 10137408, 12007018592332922112, 10136684, 6523028, 901648, 139804597228832, 5, 10136708, 10136761}}}}} __FUNCTION__ = "reply_received" #26 0x0000000000501f76 in do_forward_reply (msg=0x7f26cb5b18a8, mode=0) at forward.c:747 new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} new_len = 32550 r = 0 ip = {af = 672584, len = 0, u = {addrl = {886856, 901648}, addr32 = {886856, 0, 901648, 0}, addr16 = {34888, 13, 0, 0, 49680, 13, 0, 0}, addr = "H\210\r\000\000\000\000\000\020\302\r\000\000\000\000"}} len = 1 __FUNCTION__ = "do_forward_reply" #27 0x0000000000544663 in receive_msg (buf=0x0, len=3411744936, rcv_info=0x7f26cb5b1520) at receive.c:299 msg = 0x7f26cb5b18a8 ctx = {rec_lev = 11377206, run_flags = 0, last_retcode = 5299449, jmp_env = {{__jmpbuf = {0, 0, 0, 139804596554760, 6, 139804564709766, 8388608, 7505160}, __mask_was_saved = 670328, __saved_mask = { __val = {10105736, 0, 140724943902694, 5, 1, 139804596469904, 139804612935111, 139792595550213, 0, 7071716, 139804604774248, 139804597029960, 139804596469904, 139804615063184, 139804612960997, 139804615063184}}}}} inb = { s = 0x9aac40 <buf> "SIP/2.0 503 Maximum Calls In Progress\r\nVia: SIP/2.0/UDP 1.2.3.4;branch=z9hG4bKbdcf.a98cb99338522a1799fd347f7a9929a9.0\r\nVia: SIP/2.0/UDP 12.7.192.27;rport=5060;branch=z9hG4bKbdcf.b7fdae31594be08bdc"..., len = 768} netinfo = {data = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 6}, dst = 0x7f26cbce3768, rcv = 0x7f26cc6b4000} __FUNCTION__ = "receive_msg" #28 0x000000000048a410 in udp_rcv_loop () at udp_server.c:495 len = 768 buf = "SIP/2.0 503 Maximum Calls In Progress\r\nVia: SIP/2.0/UDP 1.2.3.4;branch=z9hG4bKbdcf.a98cb99338522a1799fd347f7a9929a9.0\r\nVia: SIP/2.0/UDP 12.7.192.27;rport=5060;branch=z9hG4bKbdcf.b7fdae31594be08bdc"... from = 0x7f26cb580c48 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {1781924294, 139795915962144}, addr32 = {1781924294, 0, 3320411936, 32548}, addr16 = {454, 27190, 0, 0, 30496, 50665, 32548, 0}, addr = "\306\001\066j\000\000\000\000 w\351\305$\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {1228276166, 0}, addr32 = {1228276166, 0, 0, 0}, addr16 = {454, 18742, 0, 0, 0, 0, 0, 0}, addr = "\306\001\066I", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\306\001\066j\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1781924294}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1781924294, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f26cb4f8090, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #29 0x000000000050abd9 in main_loop () at main.c:1614 si_desc = "udp receiver child=5 sock=1.2.3.4:5060\000\000\001\000\000\000\"`\253\306&\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000\315f_", '\000' <repeats 14 times>, "\275\203\067\313\177\241\246\260$\253\306&\177\000\000\000\275\203\067\313\177\241\246\b\003\245\000\000\000\000\000\004\000\000\000\000\000\000" woneinit = 1 ---Type <return> to continue, or q <return> to quit--- __FUNCTION__ = "main_loop" #30 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631 cfg_stream = 0x0 r = 340436804 tmp = 0x7ffd144aeefc "" tmp_len = 0 port = 0 proto = -865385008 ret = 0 seed = 3457480916 debug_save = 0 debug_flag = 8 dont_fork_cnt = 0 st = {st_dev = 15, st_ino = 11649, st_nlink = 2, st_mode = 16832, st_uid = 110, st_gid = 117, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1480629734, tv_nsec = 255371722}, st_mtim = {tv_sec = 1484083606, tv_nsec = 607034961}, st_ctim = {tv_sec = 1484083606, tv_nsec = 607034961}, __glibc_reserved = {0, 0, 0}} __FUNCTION__ = "main" (gdb)
_______________________________________________ SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list sr-users@lists.sip-router.org http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users