El Wed, 1 Feb 2017 10:21:35 +0100
"Jon Bonilla (Manwe)" <ma...@aholab.ehu.es> escribió:

Update:

Installed version 4.4.5+0~20170202010534.75+jessie amd64 from nightly sources.

The coredump is 100% reproducible: Outgoing call to a freeswitch server which
is disabled (fsctl pause inbound) and responds 503. Kamailio dies after few
seconds. The message in the log is 

CRITICAL: <core> [pass_fd.c:277]: receive_fd(): EOF on 10


Attaching latest coredump.



cheers,

Jon


fsctl pause inbound



root@14cn5:/var/tmp# gdb /usr/sbin/kamailio 
core.kamailio.16550.14cn5.lax1.serverdomain.com.1486078532 
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from 
/usr/lib/debug/.build-id/7b/e93574998c9901cbd05b83a8f35fe1e58c15c2.debug...done.
done.
[New LWP 16550]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f 
/etc/kamailio/sbc.cfg -'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  get_send_socket2 (force_send_socket=0xf, to=0x7ffe60366260, proto=1, 
mismatch=0x0) at forward.c:222
222     forward.c: No such file or directory.
(gdb) bt full
#0  get_send_socket2 (force_send_socket=0xf, to=0x7ffe60366260, proto=1, 
mismatch=0x0) at forward.c:222
        __FUNCTION__ = "get_send_socket2"
#1  0x00007f72b0c0ccc6 in uri2dst2 (dns_h=0x7f70ae0494c0, dst=0x7f70ae049400, 
force_send_socket=0x1, sflags=..., uri=0x0, proto=-1005387774) at ut.h:305
        parsed_uri = {user = {s = 0x7f72b33c9934 
"destination@1.2.3.105:5060\n", len = 11}, passwd = {s = 0x0, len = 0}, host = 
{s = 0x7f72b33c9940 "1.2.3.105:5060\n", len = 12}, port = {
            s = 0x7f72b33c994d "5060\n", len = 4}, params = {s = 0x0, len = 0}, 
sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, 
proto = 0, type = SIP_URI_T, 
          flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, 
len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = 
{s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, 
          r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s 
= 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 
0}, maddr_val = {s = 0x0, len = 0}, method_val = {
            s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, 
len = 0}, gr_val = {s = 0x0, len = 0}}
        ip_found = -1005387774
        to = {s = {sa_family = 2, sa_data = 
"\023\304\306\001\066i\000\000\000\000\000\000\000"}, sin = {sin_family = 2, 
sin_port = 50195, sin_addr = {s_addr = 1765147078}, 
            sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 
2, sin6_port = 50195, sin6_flowinfo = 1765147078, sin6_addr = {__in6_u = 
{__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {
                  0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, 
sin6_scope_id = 0}}
        err = 0
        __FUNCTION__ = "uri2dst2"
#2  0x00007f72b0c0e9b7 in prepare_new_uac (t=0x7f70ae048fe8, 
i_req=0x7f72b0e6e1c0 <faked_req>, branch=1, uri=0x7ffe603664f0, path=0x2, 
next_hop=0x0, fsocket=0xf, snd_flags=..., fproto=0, flags=2, 
    instance=0x7f72b0e6e800 <faked_req+1600>, ruid=0x7f72b0e6e818 
<faked_req+1624>, location_ua=0x7f72b0e6e828 <faked_req+1640>) at t_fwd.c:431
        shbuf = 0x7ffe603664f0 "h\214<\263r\177"
        parsed_uri_bak = {user = {s = 0x7f72b33c8c6c 
"destination@1.2.3.105:5060", len = 11}, passwd = {s = 0x0, len = 0}, host = {s 
= 0x7f72b33c8c78 "1.2.3.105:5060", len = 12}, port = {
            s = 0x7f72b33c8c85 "5060", len = 4}, params = {s = 0x0, len = 0}, 
sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, 
proto = 0, type = SIP_URI_T, flags = (unknown: 0), 
          transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param 
= {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, 
lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, 
          gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val 
= {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 
0x0, len = 0}, method_val = {s = 0x0, len = 0}, 
          lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s 
= 0x0, len = 0}}
        ret = -478
        len = 32624
        msg_uri_bak = {s = 0x7f72b33c8c68 "sip:destination@1.2.3.105:5060", len 
= 33}
        dst_uri_bak = {s = 0x0, len = 0}
        dst_uri_backed_up = 1
        path_bak = {s = 0x0, len = 0}
        instance_bak = {s = 0x0, len = 0}
        ruid_bak = {s = 0x0, len = 0}
        ua_bak = {s = 0x0, len = 0}
        force_send_socket_bak = 0x1
        dst = 0x7f70ae049400
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = 
{{__jmpbuf = {140730512598352, -9123264057138439874, 140130609932904, 
140130570920384, 140121932599272, 140121932600320, 
                9124125451358083390, -9123264633400551106}, __mask_was_saved = 
0, __saved_mask = {__val = {15689161018357612544, 140730512598832, 
140130577478022, 8388608, 7395288, 761336, 993320, 998944, 8, 
                  42, 15689161018357612544, 993320, 6244452, 764416, 6979012, 
7210391}}}}}
        __FUNCTION__ = "prepare_new_uac"
#3  0x00007f72b0c11575 in add_uac (t=0x7f70ae048fe8, request=0x7f72b0e6e1c0 
<faked_req>, uri=0x1, next_hop=0x0, path=0x2, proxy=0x0, fsocket=0xf, 
snd_flags=..., proto=0, flags=1614176868, 
    instance=0x7f72b0e6e800 <faked_req+1600>, ruid=0x7f72b0e6e818 
<faked_req+1624>, location_ua=0x7f72b0e6e828 <faked_req+1640>) at t_fwd.c:788
        branch = 1
        __FUNCTION__ = "add_uac"
#4  0x00007f72b0c19e5a in t_forward_nonack (t=0x7f70ae048fe8, 
p_msg=0x7f72b0e6e1c0 <faked_req>, proxy=0x1, proto=0) at t_fwd.c:1667
        current_uri = {s = 0x0, len = -1327046208}
        q = 0
        t_invite = 0x2
        success_branch = -1327044568
        lock_replies = 2
        dst_uri = {s = 0x100000000 <error: Cannot access memory at address 
0x100000000>, len = 1614179104}
        path = {s = 0x7f70ae01c1a8 "\023", len = 1}
        instance = {s = 0x7f72b337dd08 "\244\002\070\263r\177", len = 
-1287877528}
        ruid = {s = 0x7f72b33be905 "515@1.2.3.105:5060 ID=KvcoZ5xMc5\n", len = 
93}
        location_ua = {s = 0x7ffe60366a78 "`KE", len = 5740203}
        si = 0xb33ca828
        backup_bflags = 0
---Type <return> to continue, or q <return> to quit---
        bflags = 0
        __FUNCTION__ = "t_forward_nonack"
#5  0x00007f72b0bdb3b7 in _w_t_relay_to (force_proto=<optimized out>, 
proxy=<optimized out>, p_msg=<optimized out>) at tm.c:1412
        t = 0x7ffe60366264
        res = 1614176868
#6  w_t_relay (p_msg=0xf, _foo=0x7ffe60366260 "\002", _bar=0x1 <error: Cannot 
access memory at address 0x1>) at tm.c:1626
No locals.
#7  0x0000000000454b60 in do_action (h=0x7ffe60366fd0, a=0x7f72b332d270, 
msg=0x7f72b0e6e1c0 <faked_req>) at action.c:1060
        ret = -5
        v = 0
        dst = {send_sock = 0x7f72b337c8a8, to = {s = {sa_family = 10015, 
sa_data = "\274\263r\177\000\000\000\000\000\000\000\000\000"}, sin = 
{sin_family = 10015, sin_port = 46012, sin_addr = {
                s_addr = 32626}, sin_zero = "\000\000\000\000\000\000\000"}, 
sin6 = {sin6_family = 10015, sin6_port = 46012, sin6_flowinfo = 32626, 
sin6_addr = {__in6_u = {
                  __u6_addr8 = 
"\000\000\000\000\000\000\000\000\374\310H\000\000\000\000", __u6_addr16 = {0, 
0, 0, 0, 51452, 72, 0, 0}, __u6_addr32 = {0, 0, 4770044, 0}}}, sin6_scope_id = 
16}}, id = 708, 
          proto = -74 '\266', send_flags = {f = 107 'k', blst_imask = 54 '6'}}
        end = 0x7ffe60366fd0 "\001"
        uri = {user = {s = 0x7ffe60368940 "\004", len = 4337712}, passwd = {s = 
0x0, len = 0}, host = {s = 0x1000013c4 <error: Cannot access memory at address 
0x1000013c4>, len = -1288523376}, port = {
            s = 0x7ffe60367120 "", len = -1327046208}, params = {s = 
0x7ffe60367120 "", len = -1327046208}, sip_params = {s = 0x0, len = 
1260158976}, headers = {s = 0x7f70ae02b420 "\002", len = -1288520176}, 
          port_no = 65535, proto = 65535, type = ERROR_URI_T, flags = (unknown: 
2967921088), transport = {s = 0x7ffe60368940 "\004", len = 1614179716}, ttl = 
{s = 0x0, len = 4361660}, user_param = {s = 0x0, 
            len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x1682c10 
"\035", len = 1614180912}, lr = {s = 0x7f72b3c3e1c4 "[%d]", len = -1279008313}, 
r2 = {s = 0x0, len = -1280168087}, gr = {s = 0x0, 
            len = 0}, transport_val = {s = 0x7ffe60366dc0 "", len = 0}, ttl_val 
= {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {
            s = 0x7f72b3b2499a <_IO_vfprintf_internal+22490> 
"\200\275(\373\377\377", len = 708}, method_val = {
            s = 0x7f70ae01c208 "CANCEL 
sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: 
SIP/2.0/UDP 
1.2.3.71;branch=z9hG4bKde2f.c6bc2780dd8cde4c00a634b40ab00f5d.0;i=1\r\nFrom: 
<sip:doublesh...@sipgw-qa.serverdomain.com>;ta"..., len = 0}, lr_val = {s = 
0x0, len = -1375617120}, r2_val = {s = 0x0, len = -1287877528}, gr_val = {s = 
0x0, len = -5}}
        next_hop = {user = {s = 0x40a6 <error: Cannot access memory at address 
0x40a6>, len = 10}, passwd = {s = 0x20 <error: Cannot access memory at address 
0x20>, len = -1279987042}, host = {
            s = 0x1682c10 "\035", len = 1260158976}, port = {s = 0x7f72af7b512d 
"%s: %s%.*s", len = -1288518280}, params = {s = 0xffffffff <error: Cannot 
access memory at address 0xffffffff>, 
            len = -1327046208}, sip_params = {s = 0x7ffe60368940 "\004", len = 
1614180096}, headers = {s = 0x0, len = 1260158976}, port_no = 0, proto = 0, 
type = ERROR_URI_T, flags = (unknown: 3006451024), 
          transport = {s = 0x7ffe60368940 "\004", len = -5}, ttl = {s = 
0x7ffe60368940 "\004", len = -1327046208}, user_param = {s = 0x0, len = 
4535845}, maddr = {s = 0x7ffe60368940 "\004", 
            len = -1279008313}, method = {s = 0x7f72b332cd50 "%\001", len = 
-1327046208}, lr = {s = 0x600000000 <error: Cannot access memory at address 
0x600000000>, len = 0}, r2 = {
            s = 0x7ffe60366f20 "\341\377\377\377", len = 0}, gr = {s = 
0x7ffe60367320 "\254jh\001", len = 0}, transport_val = {s = 0x0, len = 0}, 
ttl_val = {
            s = 0x7f72b3b2499a <_IO_vfprintf_internal+22490> 
"\200\275(\373\377\377", len = -1280161382}, user_param_val = {s = 
0x7f72b3b2499a <_IO_vfprintf_internal+22490> "\200\275(\373\377\377", len = 0}, 
          maddr_val = {s = 0x0, len = 0}, method_val = {s = 0xffffffffffffffff 
<error: Cannot access memory at address 0xffffffffffffffff>, len = 104}, lr_val 
= {
            s = 0xffffffff00000000 <error: Cannot access memory at address 
0xffffffff00000000>, len = -5}, r2_val = {s = 0x40a6 <error: Cannot access 
memory at address 0x40a6>, len = 10}, gr_val = {
            s = 0xb00000020 <error: Cannot access memory at address 
0xb00000020>, len = 1260158976}}
        u = 0x7ffe60366fd0
        flags = 0
        st = {flags = 16550, id = 0, name = {n = 10, s = {s = 0xa <error: 
Cannot access memory at address 0xa>, len = 32}, re = 0xa}, avp = 
0x7f72b3b4f29e <__GI__IO_default_xsputn+174>}
        sct = 0x7ffe60366fd0
        sjt = 0x7ffe60366fd0
        mct = 0x0
        rv = 0x454b60 <do_action+2960>
        rv1 = 0x7f72b0e6e1c0 <faked_req>
        c1 = {cache_type = 1614179235, val_type = 32766, c = {avp_val = {n = 
1614179246, s = {s = 0x7ffe60366bae "", len = 10136660}, re = 0x7ffe60366bae}, 
pval = {rs = {s = 0x7ffe60366bae "", 
                len = 10136660}, ri = 13, flags = 0}}, i2s = 
"b\254\232\000\000\000\000\000\000\200\034K\322\030\273\331\000\000\000\000\000"}
        s = {s = 0x0, len = 4535845}
        srevp = {0x7ffe60366c00, 0x60366b70}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#8  0x0000000000453625 in run_actions (h=0xf, h@entry=0x7ffe60366fd0, 
a=0x7ffe60366260, msg=0x1) at action.c:1549
        ret = 1614186816
        mod = 0x7f72b332d270
---Type <return> to continue, or q <return> to quit---
        __FUNCTION__ = "run_actions"
#9  0x000000000045fff7 in run_actions_safe (h=0x7ffe60368940, a=<optimized 
out>, msg=<optimized out>) at action.c:1614
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = 
{{__jmpbuf = {140730512601040, 9124125445626566974, 140130570920384, 
140730512607552, 140730512601812, 0, 9124125450978498878, 
                -9123264633400551106}, __mask_was_saved = 0, __saved_mask = 
{__val = {140130570920384, 4294967296, 4535845, 140730512601488, 11, 0, 0, 
140121932606863, 17, 140130617805210, 3, 140121932606885, 
                  13, 140121932606885, 13, 0}}}}}
        ret = <optimized out>
        ign_on_break = 0
#10 0x0000000000423030 in rval_get_int (h=0x7ffe60368940, msg=0xf, 
i=0x7ffe603672d4, rv=0x0, cache=0x2) at rvalue.c:912
        r_avp = 0x7ffe60366264
        avp_val = {n = 23619648, s = {s = 0x1686840 "x\346\347\263r\177", len = 
0}, re = 0x1686840}
        pval = {rs = {s = 0x7ffe60368940 "\004", len = 1614181456}, ri = 0, 
flags = 0}
        tmp = {s = 0x7ffe60368940 "\004", len = -1327046208}
        s = 0x7f72b0e6e1c0 <faked_req>
        r = 1614176868
        ret = 1614176868
        destroy_pval = 1614186816
        __FUNCTION__ = "rval_get_int"
#11 0x0000000000428dbc in rval_expr_eval_int (h=0x7ffe60368940, 
msg=0x7f72b0e6e1c0 <faked_req>, res=0x7ffe603672d4, rve=0x7f72b332d6b0) at 
rvalue.c:1910
        i1 = 0
        i2 = -1280047024
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 0, s = {s = 0x0, len = 1614181920}, re = 0x0}, pval = {rs = {s = 0x0, len 
= 1614181920}, ri = 0, flags = 32766}}, 
          i2s = '\000' <repeats 12 times>, 
"\376\177\000\000\000\000\000\000\000"}
        c2 = {cache_type = 3014805914, val_type = 32626, c = {avp_val = {n = 0, 
s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 
1260158976, flags = -642049838}}, 
          i2s = 
"\377\377\377\377\377\377\377\377Pt6`\376\177\000\000@\211\066`\376\177"}
        rv1 = 0x0
        rv2 = 0x0
        __FUNCTION__ = "rval_expr_eval_int"
#12 0x0000000000428eb6 in rval_expr_eval_int (h=0x7ffe60368940, 
msg=0x7f72b0e6e1c0 <faked_req>, res=0x7ffe60367450, rve=0x7f72b332ddc0) at 
rvalue.c:1918
        i1 = 32766
        i2 = -1327046208
        ret = -1
        c1 = {cache_type = 1614186816, val_type = 32766, c = {avp_val = {n = 
-1288311624, s = {s = 0x4b335ecb8 <error: Cannot access memory at address 
0x4b335ecb8>, len = -1288515768}, re = 0x4b335ecb8}, 
            pval = {rs = {s = 0x4b335ecb8 <error: Cannot access memory at 
address 0x4b335ecb8>, len = -1288515768}, ri = -1327046208, flags = 32626}}, 
          i2s = 
"\000\000\000\000\005\000\000\000\301\341ór\177\000\000\254jh\001\000"}
        c2 = {cache_type = 8, val_type = RV_NONE, c = {avp_val = {n = 
-1279016550, s = {s = 0x7f72b3c3c19a "%H:%M:%S", len = 1}, re = 
0x7f72b3c3c19a}, pval = {rs = {s = 0x7f72b3c3c19a "%H:%M:%S", len = 1}, 
              ri = 1260158976, flags = -642049838}}, i2s = "\020 
\000\061\066\065\065\060\300\341\346\260r\177\000\000\017\000\000\000\000"}
        rv1 = 0x7f72b0e6e1c0 <faked_req>
        rv2 = 0x0
        __FUNCTION__ = "rval_expr_eval_int"
#13 0x0000000000455037 in do_action (h=0x7ffe60368940, a=0x7f72b332ede8, 
msg=0x7f72b0e6e1c0 <faked_req>) at action.c:1030
        ret = -5
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 14, sa_data = '\000' 
<repeats 13 times>}, sin = {sin_family = 14, sin_port = 0, sin_addr = {s_addr = 
0}, sin_zero = "\000\000\000\000\000\000\000"}, 
            sin6 = {sin6_family = 14, sin6_port = 0, sin6_flowinfo = 0, 
sin6_addr = {__in6_u = {__u6_addr8 = 
"\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000", __u6_addr16 = 
{0, 0, 0, 0, 1, 0, 0, 
                    0}, __u6_addr32 = {0, 0, 1, 0}}}, sin6_scope_id = 
2919447033}}, id = 32624, proto = 81 'Q', send_flags = {f = 187 '\273', 
blst_imask = 184 '\270'}}
        end = 0x7f72b332ddc0 "\004"
        uri = {user = {s = 0x1637930 "PST", len = 1614181696}, passwd = {s = 
0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {
            s = 0x323300000000 <error: Cannot access memory at address 
0x323300000000>, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, 
len = 1260158976}, port_no = 12, proto = 0, type = 32626, 
          flags = (unknown: 2919447280), transport = {s = 0x7ffe603675e0 
"-Q{\257r\177", len = 1614181888}, ttl = {s = 0x7f72b0e6e1c0 <faked_req> 
"\003", len = -1279008319}, user_param = {
            s = 0x1686aac "15:35:32 sbc[16550]: NOTICE: <script>: Node 
unavailable, trying next sip:1.2.3.105:5060 from group <null> M=INVITE 
R=sip:destination@1.2.3.105:5060 ID=KvcoZ5xMc5\n", 
            len = -1276654880}, maddr = {s = 0x8 <error: Cannot access memory 
at address 0x8>, len = -1279016550}, method = {s = 0x1 <error: Cannot access 
memory at address 0x1>, len = -1279743838}, lr = {
            s = 0x30353536313be905 <error: Cannot access memory at address 
0x30353536313be905>, len = 8187}, r2 = {s = 0x0, len = 23619648}, gr = {s = 
0x7f72af7b512d "%s: %s%.*s", len = 23620240}, 
          transport_val = {s = 0x2010 <error: Cannot access memory at address 
0x2010>, len = -1276647904}, ttl_val = {s = 0x1688aa0 "", len = 181}, 
user_param_val = {
---Type <return> to continue, or q <return> to quit---
            s = 0x2010 <error: Cannot access memory at address 0x2010>, len = 
-1279965780}, maddr_val = {s = 0x7ffe603676f0 "\300\341\346\260r\177", len = 
1614181936}, method_val = {
            s = 0x7f72b3e7e620 <main_arena> "", len = 23620256}, lr_val = {s = 
0x1686a90 "`\002", len = 192}, r2_val = {s = 0xb5 <error: Cannot access memory 
at address 0xb5>, len = -1279961239}, gr_val = {
            s = 0x100000000 <error: Cannot access memory at address 
0x100000000>, len = 1}}
        next_hop = {user = {s = 0x8f <error: Cannot access memory at address 
0x8f>, len = 23619648}, passwd = {s = 0x100000000 <error: Cannot access memory 
at address 0x100000000>, len = -1350872787}, host = {
            s = 0x7ffe603677d8 "0", len = 23619648}, port = {s = 0x0, len = 
-1279515043}, params = {s = 0x7ffe603677d8 "0", len = 23619648}, sip_params = {
            s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, 
len = -1350872787}, headers = {s = 0x7ffe603677d8 "0", len = 0}, port_no = 21, 
proto = 0, type = ERROR_URI_T, 
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 
3015430204), transport = {s = 0x7f72b0e6e1c0 <faked_req> "\003", len = 
1486078532}, ttl = {
            s = 0x1686aa0 "<173>Feb  2 15:35:32 sbc[16550]: NOTICE: <script>: 
Node unavailable, trying next sip:1.2.3.105:5060 from group <null> M=INVITE 
R=sip:destination@1.2.3.105:5060 ID=KvcoZ5xMc5\n", len = 180}, user_param = {s 
= 0x7f72b0e6e460 <faked_req+672> "\v", len = 47}, maddr = {s = 0x3a706973 
<error: Cannot access memory at address 0x3a706973>, len = 0}, method = {
            s = 0x1686aa0 "<173>Feb  2 15:35:32 sbc[16550]: NOTICE: <script>: 
Node unavailable, trying next sip:1.2.3.105:5060 from group <null> M=INVITE 
R=sip:destination@1.2.3.105:5060 ID=KvcoZ5xMc5\n", len = 0}, lr = {s = 
0x300000003 <error: Cannot access memory at address 0x300000003>, len = 
-1327046208}, r2 = {s = 0x2300000020 <error: Cannot access memory at address 
0x2300000020>, len = 15}, gr = {
            s = 0x7500000001 <error: Cannot access memory at address 
0x7500000001>, len = 4}, transport_val = {s = 0x7f7200000000 "", len = -28800}, 
ttl_val = {s = 0x1637930 "PST", len = 18}, 
          user_param_val = {s = 0x7f70ae0339f5 "sip:1.2.3.105:5060", len = 
10488584}, maddr_val = {s = 0x9a8e50 <_km_log_func> "\340jA", len = 0}, 
method_val = {
            s = 0x7f72af9b8568 <_xlog_prefix> "\242S{\257r\177", len = 5}, 
lr_val = {s = 0x416ae0 <syslog@plt> "\377%\222\310X", len = -1279536273}, 
r2_val = {s = 0x7f72b336f0c8 "`\224f\001", len = 48}, 
          gr_val = {s = 0x7ffe603678b0 "\250\350;\263r\177", len = 1614182384}}
        u = 0x7f72b332ddc0
        flags = 0
        st = {flags = 143, id = 0, name = {n = 23619648, s = {s = 0x1686840 
"x\346\347\263r\177", len = 0}, re = 0x1686840}, avp = 0x7f72af7b512d}
        sct = 0x7f72b332ddc0
        sjt = 0x7f72b332ddc0
        mct = 0x0
        rv = 0x7f72af7b512d
        rv1 = 0x7f72b0e6e1c0 <faked_req>
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 8180, s = {s = 0x1ff4 <error: Cannot access memory at address 0x1ff4>, len 
= 6}, re = 0x1ff4}, pval = {rs = {
                s = 0x1ff4 <error: Cannot access memory at address 0x1ff4>, len 
= 6}, ri = 0, flags = 3}}, i2s = "Pw6`\376\177\000\000 
u6`\376\177\000\000\000\303\347\263r\177"}
        s = {s = 0x7ffeffffffff <error: Cannot access memory at address 
0x7ffeffffffff>, len = 0}
        srevp = {0x0, 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#14 0x0000000000453625 in run_actions (h=0xf, a=0x7ffe60366260, msg=0x1) at 
action.c:1549
        ret = 1
        mod = 0x7f72b332ede8
        __FUNCTION__ = "run_actions"
#15 0x0000000000455250 in do_action (h=0x7ffe60368940, a=0x7f72b3364390, 
msg=0x7f72b0e6e1c0 <faked_req>) at action.c:678
        ret = -5
        v = 17
        dst = {send_sock = 0x400000001, to = {s = {sa_family = 32768, sa_data = 
"\034K\322\030\273\331\001\000\000\000\003\000\000"}, sin = {sin_family = 
32768, sin_port = 19228, sin_addr = {
                s_addr = 3652917458}, sin_zero = 
"\001\000\000\000\003\000\000"}, sin6 = {sin6_family = 32768, sin6_port = 
19228, sin6_flowinfo = 3652917458, sin6_addr = {__in6_u = {
                  __u6_addr8 = 
"\001\000\000\000\003\000\000\000\bl:\263r\177\000", __u6_addr16 = {1, 0, 3, 0, 
27656, 45882, 32626, 0}, __u6_addr32 = {1, 3, 3006950408, 32626}}}, 
sin6_scope_id = 1614184384}}, 
          id = 32766, proto = -64 '\300', send_flags = {f = 225 '\341', 
blst_imask = 230 '\346'}}
        end = 0x1 <error: Cannot access memory at address 0x1>
        uri = {user = {s = 0x7ffe60367fc0 "", len = -1327046208}, passwd = {s = 
0x7ffe60367fc0 "", len = -1327046208}, host = {s = 0x0, len = 1260158976}, port 
= {s = 0x7f72b33a3658 "@~f\001", 
            len = -1287995552}, params = {s = 0x7ffe60368940 "\004", len = -5}, 
sip_params = {s = 0x7ffe60367bc0 "", len = -1327046208}, headers = {s = 0x0, 
len = 4535845}, port_no = 31680, proto = 24630, 
          type = 32766, flags = (unknown: 1614183244), transport = {s = 
0x7f72b33abf60 "\204\002", len = -1327046208}, ttl = {s = 0x100000000 <error: 
Cannot access memory at address 0x100000000>, 
            len = 1260158976}, user_param = {s = 0x0, len = -1287987736}, maddr 
= {s = 0x0, len = -5}, method = {s = 0x7ffe60367c30 "", len = -1327046208}, lr 
= {s = 0x0, len = 4535845}, r2 = {
            s = 0x7ffe60367c30 "", len = -1288325472}, gr = {s = 0x7f72b33adde8 
"\221\002", len = -1327046208}, transport_val = {s = 0x100000000 <error: Cannot 
access memory at address 0x100000000>, 
            len = -1287871648}, ttl_val = {s = 0x0, len = 4535845}, 
user_param_val = {s = 0x7ffe60368e50 "", len = -1279965780}, maddr_val = {s = 
0x7f72b335b6a0 "\300\001", len = 1260158976}, method_val = {
            s = 0x400000000 <error: Cannot access memory at address 
0x400000000>, len = 0}, lr_val = {s = 0x7ffe60368940 "\004", len = 
-1327046208}, r2_val = {s = 0x7ffe60368940 "\004", len = 1614184176}, 
          gr_val = {s = 0x0, len = 4587511}}
        next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffe60367bc0 "", 
len = 1219270974}, host = {s = 0x7f72b0e6e1c0 <faked_req> "\003", len = 
1614186816}, port = {s = 0x7ffe60367ef0 "\001", 
---Type <return> to continue, or q <return> to quit---
            len = 0}, params = {s = 0x7e9f67c1af4c993e <error: Cannot access 
memory at address 0x7e9f67c1af4c993e>, len = 776378686}, sip_params = {s = 
0x7f7200000000 "", len = 2}, headers = {
            s = 0x9a8ee4 <route_type> "\002", len = 4587679}, port_no = 0, 
proto = 0, type = ERROR_URI_T, flags = URI_USER_NORMALIZE, transport = {s = 
0x7ffe60367c30 "", len = 1512872254}, ttl = {
            s = 0x7f72b33adde8 "\221\002", len = -1327046208}, user_param = {s 
= 0x2 <error: Cannot access memory at address 0x2>, len = 10129124}, maddr = {
            s = 0x7e9f67c1ac6c993e <error: Cannot access memory at address 
0x7e9f67c1ac6c993e>, len = 776378686}, method = {s = 0x0, len = 0}, lr = {s = 
0x7ffe60368290 "", len = 1260158976}, r2 = {
            s = 0x220000002a <error: Cannot access memory at address 
0x220000002a>, len = 1614184176}, gr = {s = 0x7ffe60368940 "\004", len = 
4337712}, transport_val = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = 
-28800}, ttl_val = {s = 0x1637930 "PST", len = -1288066864}, user_param_val = 
{s = 0x0, len = 5936733}, maddr_val = {
            s = 0x9a8e50 <_km_log_func> "\340jA", len = 5593238}, method_val = 
{s = 0x7f72af9b8568 <_xlog_prefix> "\242S{\257r\177", len = 1260158976}, lr_val 
= {s = 0xa502c0 <event_rt> "H\355:\263r\177", 
            len = -1287995248}, r2_val = {s = 0xffffffff <error: Cannot access 
memory at address 0xffffffff>, len = -1327046208}, gr_val = {s = 0x7ffe60368940 
"\004", len = 1614184176}}
        u = 0x1
        flags = 0
        st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x7f7200000001 "", len 
= 1614183360}, re = 0x7f7200000001}, avp = 0x7e9f67c048ac993e}
        sct = 0x1
        sjt = 0x1
        mct = 0x0
        rv = 0x7f72b0bd71ce <t_check_status+366>
        rv1 = 0x7f72b0e6e1c0 <faked_req>
        c1 = {cache_type = 1614184384, val_type = 32766, c = {avp_val = {n = 
-1327046208, s = {s = 0x7f72b0e6e1c0 <faked_req> "\003", len = 0}, re = 
0x7f72b0e6e1c0 <faked_req>}, pval = {rs = {
                s = 0x7f72b0e6e1c0 <faked_req> "\003", len = 0}, ri = 
-1330099511, flags = 32626}}, i2s = 
"\000\000\000\000\000\000\000\000#Ͻ\260r\177\000\000\000\000\000\000\000"}
        s = {s = 0x0, len = -1375432728}
        srevp = {0xa4dfa2 <ut_buf_int2str+18>, 0x100000002}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#16 0x0000000000453625 in run_actions (h=0xf, a=0x7ffe60366260, msg=0x1) at 
action.c:1549
        ret = 1
        mod = 0x7f72b33acbe0
        __FUNCTION__ = "run_actions"
#17 0x0000000000455088 in do_action (h=0x7ffe60368940, a=0x7f72b33ad818, 
msg=0x7f72b0e6e1c0 <faked_req>) at action.c:1049
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 3, sa_data = '\000' 
<repeats 13 times>}, sin = {sin_family = 3, sin_port = 0, sin_addr = {s_addr = 
0}, sin_zero = "\000\000\000\000\000\000\000"}, 
            sin6 = {sin6_family = 3, sin6_port = 0, sin6_flowinfo = 0, 
sin6_addr = {__in6_u = {__u6_addr8 = 
"\000\000\000\000\000\000\000\000p\200\066`\376\177\000", __u6_addr16 = {0, 0, 
0, 0, 32880, 24630, 
                    32766, 0}, __u6_addr32 = {0, 0, 1614184560, 32766}}}, 
sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 128 '\200', 
blst_imask = 28 '\034'}}
        end = 0x7f72b33ac090 "\001"
        uri = {user = {s = 0x7ffe60368940 "\004", len = -1327046208}, passwd = 
{s = 0x7ffe60368940 "\004", len = 1614185312}, host = {s = 0x0, len = 
1260158976}, port = {s = 0x0, len = -1288008312}, params = {
            s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, 
len = -1327046208}, sip_params = {s = 0x7ffe60368940 "\004", len = 1614184820}, 
headers = {s = 0x0, len = 4361660}, 
          port_no = 39230, proto = 42828, type = 2124376001, flags = 
(URI_SIP_USER_PHONE | unknown: 776378684), transport = {s = 0x7f7200000000 "", 
len = -1327046208}, ttl = {
            s = 0x100000000 <error: Cannot access memory at address 
0x100000000>, len = 0}, user_param = {s = 0x3af7b5136 <error: Cannot access 
memory at address 0x3af7b5136>, len = 0}, maddr = {s = 0x0, 
            len = 16}, method = {s = 0x7ffe60368670 "\250\350;\263r\177", len = 
1614185904}, lr = {s = 0x0, len = 1260158976}, r2 = {
            s = 0x9aac48 <buf+8> "503 Maximum Calls In Progress\r\nVia: 
SIP/2.0/UDP 
1.2.3.71;branch=z9hG4bK4493.b072e897d3ace993b6b5cbd17812aa64.0;i=1\r\nVia: 
SIP/2.0/TLS 192.168.5.41:55873;received=5.5.5.110;branch=z9hG4bK.2Ry9zmf"..., 
len = 23433520}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 
1260158976}, ttl_val = {s = 0x400000000 <error: Cannot access memory at address 
0x400000000>, 
            len = 1614185312}, user_param_val = {s = 0x7ffe60368940 "\004", len 
= 4337712}, maddr_val = {s = 0x0, len = 23484904}, method_val = {
            s = 0x1000001 <error: Cannot access memory at address 0x1000001>, 
len = 0}, lr_val = {s = 0x7ffe60368940 "\004", len = -1327046208}, r2_val = {s 
= 0x7ffe60368940 "\004", len = 1614185536}, 
          gr_val = {s = 0x0, len = 1260158976}}
        next_hop = {user = {s = 0x0, len = -1288004192}, passwd = {s = 
0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 
-1327046208}, host = {s = 0x7ffe60368940 "\004", len = 1614185156}, 
          port = {s = 0x0, len = 4362150}, params = {s = 0x7e9f67c05a2c993e 
<error: Cannot access memory at address 0x7e9f67c05a2c993e>, len = 776378686}, 
sip_params = {s = 0x7f7200000000 "", 
            len = -1279619515}, headers = {s = 0x100000000 <error: Cannot 
access memory at address 0x100000000>, len = 0}, port_no = 0, proto = 0, type = 
ERROR_URI_T, flags = (unknown: 3006677904), 
          transport = {s = 0x0, len = -1287871648}, ttl = {s = 0x0, len = 5}, 
user_param = {s = 0x0, len = 0}, maddr = {s = 0x7f72b33ca398 "H\254\232", len = 
5894312}, method = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, 
lr = {s = 0x0, len = 1260158976}, r2 = {s = 0x0, len = 1614185536}, gr = {s = 
0x7ffe60368940 "\004", len = 4337712}, 
          transport_val = {s = 0x800000 <error: Cannot access memory at address 
0x800000>, len = 7399016}, ttl_val = {s = 0xb9b80 <error: Cannot access memory 
at address 0xb9b80>, len = 989592}, 
          user_param_val = {s = 0xf3e20 <error: Cannot access memory at address 
0xf3e20>, len = 8}, maddr_val = {s = 0x9 <error: Cannot access memory at 
address 0x9>, len = 1260158976}, method_val = {
---Type <return> to continue, or q <return> to quit---
            s = 0x7f72b33af400 "\n", len = 1260158976}, lr_val = {s = 0x0, len 
= -1287998264}, r2_val = {s = 0xffffffff <error: Cannot access memory at 
address 0xffffffff>, len = -1327046208}, gr_val = {
            s = 0x7ffe60368940 "\004", len = 1614185536}}
        u = 0x7f72b33ac090
        flags = 0
        st = {flags = 0, id = 0, name = {n = -1288004192, s = {s = 
0x7f72b33a9da0 "\020", len = -1}, re = 0x7f72b33a9da0}, avp = 0x7f72b0e6e1c0 
<faked_req>}
        sct = 0x7f72b33ac090
        sjt = 0x7f72b33ac090
        mct = 0x0
        rv = 0x9aac48 <buf+8>
        rv1 = 0x7f72b0e6e1c0 <faked_req>
        c1 = {cache_type = 23484464, val_type = RV_NONE, c = {avp_val = {n = 
1614184820, s = {s = 0x7ffe60368174 "\001", len = 1614186816}, re = 
0x7ffe60368174}, pval = {rs = {s = 0x7ffe60368174 "\001", 
                len = 1614186816}, ri = 4337712, flags = 0}}, i2s = 
"8\200\066`\376\177\000\000\000\000\000\000\376\177\000\000\000\000\000\000\000"}
        s = {s = 0x0, len = 1614184560}
        srevp = {0x1665830, 0x7f72b3b55020 <__GI___libc_malloc+96>}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#18 0x0000000000453625 in run_actions (h=0xf, a=0x7ffe60366260, msg=0x1) at 
action.c:1549
        ret = 1
        mod = 0x7f72b33ad818
        __FUNCTION__ = "run_actions"
#19 0x0000000000455088 in do_action (h=0x7ffe60368940, a=0x7f72b33adab0, 
msg=0x7f72b0e6e1c0 <faked_req>) at action.c:1049
        ret = 1
        v = 1
        dst = {send_sock = 0x7ffe60368598, to = {s = {sa_family = 17952, 
sa_data = "h\001\000\000\000\000\377\377\377\377\000\000\000"}, sin = 
{sin_family = 17952, sin_port = 360, sin_addr = {s_addr = 0}, 
              sin_zero = "\377\377\377\377\000\000\000"}, sin6 = {sin6_family = 
17952, sin6_port = 360, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                  __u6_addr8 = 
"\377\377\377\377\000\000\000\000-Q{\257r\177\000", __u6_addr16 = {65535, 
65535, 0, 0, 20781, 44923, 32626, 0}, __u6_addr32 = {4294967295, 0, 2944094509, 
32626}}}, 
              sin6_scope_id = 1614185880}}, id = 32766, proto = 0 '\000', 
send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        end = 0x7f72b33ab4c8 "\020"
        uri = {user = {s = 0x1b6cb9744c0d096 <error: Cannot access memory at 
address 0x1b6cb9744c0d096>, len = 1260158976}, passwd = {s = 0x1684880 "", len 
= 1614186336}, host = {s = 0x7ffe60368e50 "", 
            len = -1287871648}, port = {s = 0x7ffe60368e50 "", len = 
1614186336}, params = {s = 0x0, len = 4337663}, sip_params = {
            s = 0xc10397200000000 <error: Cannot access memory at address 
0xc10397200000000>, len = -28800}, headers = {s = 0x1637930 "PST", len = 
-1375556488}, port_no = 104, proto = 0, type = ERROR_URI_T, 
          flags = (unknown: 10488584), transport = {s = 0x9a8e50 <_km_log_func> 
"\340jA", len = 0}, ttl = {s = 0x7f72af9b8568 <_xlog_prefix> "\242S{\257r\177", 
len = 1260158976}, user_param = {
            s = 0x416ae0 <syslog@plt> "\377%\222\310X", len = -1288028176}, 
maddr = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, 
len = -1287871648}, method = {s = 0x7ffe60368e50 "", 
            len = 1614186336}, lr = {s = 0x0, len = 4361660}, r2 = {s = 
0x6ee90f "NOTICE", len = -1350872158}, gr = {s = 0x3f <error: Cannot access 
memory at address 0x3f>, len = -1287919448}, 
          transport_val = {s = 0x7f72b336f6c8 "_0:\263r\177", len = 
-1287871648}, ttl_val = {s = 0x7f72b33be8dc "from group <null> M=INVITE 
R=sip:destination@1.2.3.105:5060 ID=KvcoZ5xMc5\n", len = 52}, 
          user_param_val = {s = 0x7ffe603686a8 "?", len = 5740203}, maddr_val = 
{
            s = 0x9aad9d <buf+349> "KvcoZ5xMc5\r\nCSeq: 20 
INVITE\r\nRetry-After: 300\r\nUser-Agent: Primo MS 2.0/N+\r\nAccept: 
application/sdp\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, 
UPDATE, REGISTER, REFER, NOTIFY\r\nSupported"..., len = 10}, method_val = {s = 
0x400000000 <error: Cannot access memory at address 0x400000000>, len = 
1260158976}, lr_val = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = 
-1348761896}, r2_val = {s = 0x7f72b33a3f98 "h\275\070\263r\177", len = 
-1287871648}, gr_val = {s = 0x0, len = 1260158976}}
        next_hop = {user = {s = 0x1 <error: Cannot access memory at address 
0x1>, len = -1350875792}, passwd = {
            s = 0x7f72b33be8a8 "Node unavailable, trying next 
sip:1.2.3.105:5060 from group <null> M=INVITE R=sip:destination@1.2.3.105:5060 
ID=KvcoZ5xMc5\n", len = 63}, host = {
            s = 0x7f72af7b53a2 "<script>: ", len = 7268623}, port = {s = 
0x7f70ae0055f0 "\001", len = -1375708040}, params = {
            s = 0x7f72b33be8a8 "Node unavailable, trying next 
sip:1.2.3.105:5060 from group <null> M=INVITE R=sip:destination@1.2.3.105:5060 
ID=KvcoZ5xMc5\n", len = 63}, sip_params = {s = 0x0, 
            len = -1375711312}, headers = {s = 0x0, len = 1260158976}, port_no 
= 24408, proto = 44546, type = 32624, flags = (unknown: 3006936040), transport 
= {s = 0x7ffe60368e50 "", len = -1287871648}, 
          ttl = {s = 0x7f72b33a3ff0 "\001", len = -1287871648}, user_param = {s 
= 0x0, len = 4542519}, maddr = {
            s = 0x7f72b33c8df8 "SIP/2.0 183 Session Progress\r\nVia: 
SIP/2.0/TLS 
192.168.5.41:55873;received=5.5.5.110;branch=z9hG4bK.htu8hFOxv;rport=61830\r\nRecord-Route:
 <sip:1.2.3.71;r2=on;lr=on;ftag=cjBN~9alL;nat=yes>\r\nRecor"..., len = 
-1279515043}, method = {s = 0x7ffe6036886c "", len = -1364370368}, lr = {s = 
0x4b5 <error: Cannot access memory at address 0x4b5>, len = 5}, r2 = {s = 0x0, 
len = 1205}, 
          gr = {s = 0x0, len = 4951110}, transport_val = {s = 0x7f7000000000 
<error: Cannot access memory at address 0x7f7000000000>, len = 1205}, ttl_val = 
{s = 0x0, len = 1260158976}, user_param_val = {
            s = 0x7f72aead5c40 <wr_buf> 
"\027\003\003\004\260\r\006\343\256\335j7\302M\206\242\021\067\017MV\231\021\267ߺ\377\332\023\345\331=.\375\225\260!\001$\023k\236\374\320\031\067\210\253\331\377ס\361\233\f\243Ӈ\315\031\026d+mp,2\357g\343\210\r.\tN\270\371$'\f\237\066\020\001\313\356n\240L\204\251,\244A^\230\317\324:y\352C|\312!@b]F\267\363g\265,[\302\231\357/O\271\204\206\066\b\270\265\062F\304\"C[\372U\22---Type
 <return> to continue, or q <return> to quit---
7{\bo\275\375et\202\215\214\250R\327\363\336\021\375\300\001\357<\023C\353\370\006\023\371\353\327\n\323\177n,\216\214\342\342'f\323Я(\307\370\243\344\064\253m\211g[\245\345\202h-\304\070O\231"...,
 
            len = 4958668}, maddr_val = {s = 0x4b5 <error: Cannot access memory 
at address 0x4b5>, len = 1205}, method_val = {s = 0x4b5 <error: Cannot access 
memory at address 0x4b5>, len = 0}, lr_val = {
            s = 0x7ffe00000000 <error: Cannot access memory at address 
0x7ffe00000000>, len = 1}, r2_val = {
            s = 0x7f72aead5c40 <wr_buf> 
"\027\003\003\004\260\r\006\343\256\335j7\302M\206\242\021\067\017MV\231\021\267ߺ\377\332\023\345\331=.\375\225\260!\001$\023k\236\374\320\031\067\210\253\331\377ס\361\233\f\243Ӈ\315\031\026d+mp,2\357g\343\210\r.\tN\270\371$'\f\237\066\020\001\313\356n\240L\204\251,\244A^\230\317\324:y\352C|\312!@b]F\267\363g\265,[\302\231\357/O\271\204\206\066\b\270\265\062F\304\"C[\372U\227{\bo\275\375et\202\215\214\250R\327\363\336\021\375\300\001\357<\023C\353\370\006\023\371\353\327\n\323\177n,\216\214\342\342'f\323Я(\307\370\243\344\064\253m\211g[\245\345\202h-\304\070O\231"...,
 len = 0}, 
          gr_val = {s = 0x10000 <error: Cannot access memory at address 
0x10000>, len = -1366682064}}
        u = 0x7f72b33ab4c8
        flags = 32766
        st = {flags = 1, id = 0, name = {n = -1350875792, s = {s = 
0x7f72af7b4570 <xlog_2_helper+1360> "\351\\\374\377\377\017\037", len = 
-1287919448}, re = 0x7f72af7b4570 <xlog_2_helper+1360>}, 
          avp = 0x7f720000003f}
        sct = 0x7f72b33ab4c8
        sjt = 0x7f72b33ab4c8
        mct = 0x0
        rv = 0x7f72af7b512d
        rv1 = 0x7f72b0e6e1c0 <faked_req>
        c1 = {cache_type = 21, val_type = RV_NONE, c = {avp_val = {n = 
-1279537089, s = {s = 0x7f72b3bbd03f <__GI___vsyslog_chk+655> "H\201Ĩ", len = 
1319204404}, 
              re = 0x7f72b3bbd03f <__GI___vsyslog_chk+655>}, pval = {rs = {s = 
0x7f72b3bbd03f <__GI___vsyslog_chk+655> "H\201Ĩ", len = 1319204404}, ri = 
1486078532, flags = 0}}, 
          i2s = 
"\200Hh\001\000\000\000\000r\000\000\000\000\000\000\000Kh`\242\313e"}
        s = {s = 0x7ffe60368598 "`\243<\263r\177", len = 23610912}
        srevp = {0x0, 0x7f72b3bc265d <__libc_send+141>}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, 
u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#20 0x0000000000453625 in run_actions (h=0xf, h@entry=0x7ffe60368940, 
a=0x7ffe60366260, a@entry=0x7f72b33a4700, msg=0x1, msg@entry=0x7f72b0e6e1c0 
<faked_req>) at action.c:1549
        ret = 1
        mod = 0x7f72b33adab0
        __FUNCTION__ = "run_actions"
#21 0x0000000000460095 in run_top_route (a=0x7f72b33a4700, msg=0x7f72b0e6e1c0 
<faked_req>, c=<optimized out>) at action.c:1635
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = 
{{__jmpbuf = {140730512607552, -9123264057138439874, 140130609940224, 
140130570920384, 1, 140121932599272, 9124125445653829950, 
                -9123264633400551106}, __mask_was_saved = 0, __saved_mask = 
{__val = {1850632230, 761992, 140121932605688, 140130570921024, 
140130568566228, 503, 1, 140121932599272, 140130568086583, 
                  140130610089464, 140121932486344, 140130610089464, 
140130570920384, 140121932599792, 140121932605048, 503}}}}}
        p = <optimized out>
        ret = <optimized out>
        sfbk = 0
#22 0x00007f72b0bbae7b in run_failure_handlers (t=0x7f70ae048fe8, 
rpl=0x7f72b33ca360, code=503, extra_flags=1) at t_reply.c:990
        faked_req = {id = 3, pid = 16567, tval = {tv_sec = 1486078532, tv_usec 
= 679675}, fwd_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, 
rpl_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, 
          first_line = {type = 1, flags = 1, len = 68, u = {request = {method = 
{
                  s = 0x7f70ae04ad78 "INVITE 
sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: 
SIP/2.0/TLS 192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: 
<sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: sip"..., len = 
6}, uri = {
                  s = 0x7f70ae04ad7f 
"sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: 
SIP/2.0/TLS 192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: 
<sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: 
sip:349118"..., len = 51}, version = {
                  s = 0x7f70ae04adb3 "SIP/2.0\r\nVia: SIP/2.0/TLS 
192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: 
<sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: 
sip:destinat...@sipgw-qa.serverdomain.com\r\nCSeq: 20 INVITE\r\nCall-ID: K"..., 
len = 7}, method_value = 1}, reply = {version = {
                  s = 0x7f70ae04ad78 "INVITE 
sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: 
SIP/2.0/TLS 192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: 
<sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: sip"..., len = 
6}, status = {
                  s = 0x7f70ae04ad7f 
"sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: 
SIP/2.0/TLS 192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: 
<sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: 
sip:349118"..., len = 51}, reason = {
                  s = 0x7f70ae04adb3 "SIP/2.0\r\nVia: SIP/2.0/TLS 
192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: 
<sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: 
sip:destinat...@sipgw-qa.serverdomain.com\r\nCSeq: 20 INVITE\r\nCall-ID: K"..., 
len = 7}, statuscode = 1}}}, via1 = 0x7f70ae04b268, via2 = 0x0, headers = 
0x7f70ae04b228, last_header = 0x7f70ae04baa0, parsed_flag = 
18446744073709551615, 
          h_via1 = 0x7f70ae04b228, h_via2 = 0x0, callid = 0x7f70ae04b8a0, to = 
0x7f70ae04b618, cseq = 0x7f70ae04b830, from = 0x7f70ae04b3d0, contact = 
0x7f70ae04ba20, maxforwards = 0x7f70ae04b8e0, 
---Type <return> to continue, or q <return> to quit---
          route = 0x0, record_route = 0x0, content_type = 0x7f70ae04b9a0, 
content_length = 0x7f70ae04b9e0, authorization = 0x0, expires = 0x0, proxy_auth 
= 0x0, supported = 0x7f70ae04b920, require = 0x0, 
          proxy_require = 0x0, unsupported = 0x0, allow = 0x7f70ae04b960, event 
= 0x0, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, 
subject = 0x0, user_agent = 0x7f70ae04baa0, 
          server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, 
refer_to = 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, 
subscription_state = 0x0, date = 0x0, identity = 0x0, 
          identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, 
body = 0x0, 
          eoh = 0x7f70ae04b068 "\r\nv=0\r\no=doublesharp 3959 3018 IN IP4 
192.168.5.41\r\ns=Talk\r\nc=IN IP4 192.168.5.41\r\nb=AS:380\r\nt=0 
0\r\na=rtcp-xr:rcvr-rtt=all:10000 stat-summary=loss,dup,jitt,TTL 
voip-metrics\r\nm=audio 1 RTP/AVP 96 18 0 "..., 
          unparsed = 0x7f70ae04b068 "\r\nv=0\r\no=doublesharp 3959 3018 IN IP4 
192.168.5.41\r\ns=Talk\r\nc=IN IP4 192.168.5.41\r\nb=AS:380\r\nt=0 
0\r\na=rtcp-xr:rcvr-rtt=all:10000 stat-summary=loss,dup,jitt,TTL 
voip-metrics\r\nm=audio 1 RTP/AVP 96 18 0 "..., rcv = {src_ip = {af = 2, len = 
4, u = {addrl = {1850632230, 0}, addr32 = {1850632230, 0, 0, 0}, addr16 = 
{26662, 28238, 0, 0, 0, 0, 0, 0}, 
                addr = "&hNn", '\000' <repeats 11 times>}}, dst_ip = {af = 2, 
len = 4, u = {addrl = {1194721734, 0}, addr32 = {1194721734, 0, 0, 0}, addr16 = 
{454, 18230, 0, 0, 0, 0, 0, 0}, 
                addr = "\306\001\066G", '\000' <repeats 11 times>}}, src_port = 
61830, dst_port = 443, proto_reserved1 = 1, proto_reserved2 = 0, src_su = {s = 
{sa_family = 2, 
                sa_data = "\361\206&hNn\000\000\000\000\000\000\000"}, sin = 
{sin_family = 2, sin_port = 34545, sin_addr = {s_addr = 1850632230}, sin_zero = 
"\000\000\000\000\000\000\000"}, sin6 = {
                sin6_family = 2, sin6_port = 34545, sin6_flowinfo = 1850632230, 
sin6_addr = {__in6_u = {__u6_addr8 = 
"\000\000\000\000\000\000\000\000\000\223/\263r\177\000", __u6_addr16 = {0, 0, 
0, 0, 37632, 
                      45871, 32626, 0}, __u6_addr32 = {0, 0, 3006239488, 
32626}}}, sin6_scope_id = 3022729957}}, bind_address = 0x7f72b32f9300, proto = 
3 '\003'}, 
          buf = 0x7f70ae04ad78 "INVITE 
sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: 
SIP/2.0/TLS 192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: 
<sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: sip"..., len = 
1198, new_uri = {s = 0x7f72b33c9930 "sip:destination@1.2.3.105:5060\n", len = 
33}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = {
              s = 0x7f72b33c8c6c "destination@1.2.3.105:5060", len = 11}, 
passwd = {s = 0x0, len = 0}, host = {s = 0x7f72b33c8c78 "1.2.3.105:5060", len = 
12}, port = {s = 0x7f72b33c8c85 "5060", 
              len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len 
= 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = 
SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, 
              len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 
0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len 
= 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, 
              len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, 
len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, 
method_val = {s = 0x0, len = 0}, lr_val = {
              s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 
0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, 
len = 0}, passwd = {s = 0x0, len = 0}, host = {
              s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, 
len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, 
port_no = 0, proto = 0, type = ERROR_URI_T, 
            flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 
0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, 
method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, 
            r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = 
{s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, 
len = 0}, maddr_val = {s = 0x0, len = 0}, 
            method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, 
r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 
0x7f72b33af400, body_lumps = 0x0, reply_lump = 0x0, 
          add_to_branch_s = "z9hG4bK4493.b072e897d3ace993b6b5cbd17812aa64.1", 
'\000' <repeats 11 times>, add_to_branch_len = 46, hash_index = 14660, 
msg_flags = 262353, flags = 32, set_global_address = {
            s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, 
force_send_socket = 0xf, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, 
len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, 
          location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = 
{src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 
= {0, 0, 0, 0, 0, 0, 0, 0}, 
                    addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 
0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 
0}, addr = '\000' <repeats 15 times>}}, 
                src_port = 0, dst_port = 0, proto_reserved1 = 0, 
proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 
times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {
                      s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, 
sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u 
= {__u6_addr8 = '\000' <repeats 15 times>, 
                        __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = 
{0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 0 '\000'}}}}
        shmem_msg = 0x7f70ae04a678
        on_failure = 1
        __FUNCTION__ = "run_failure_handlers"
#23 0x00007f72b0bbcb72 in t_should_relay_response (Trans=0x7f70ae048fe8, 
new_code=503, branch=0, should_store=0x7ffe60368bd8, 
should_relay=0x7ffe60368bd4, cancel_data=0x0, reply=0x7f72b33ca360)
    at t_reply.c:1346
        picked_code = 503
        new_branch = 1614176868
        inv_through = 1
        replies_dropped = 0
        __FUNCTION__ = "t_should_relay_response"
#24 0x00007f72b0bc469a in relay_reply (t=0x7f70ae048fe8, p_msg=0x7ffe60366260, 
branch=1, msg_status=0, cancel_data=0x2, do_put_on_wait=0) at t_reply.c:1749
        relay = 0
        save_clone = 6244452
        res_len = 0
        bm = {to_tag_val = {s = 0x71f1a2 <__FUNCTION__.7358> "parse_headers", 
len = -1375432192}}
        totag_retr = -1287871648
        reason = {
          s = 0x7f70ae04c978 "ACK 
sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: 
SIP/2.0/UDP 
1.2.3.71;branch=z9hG4bK4493.b072e897d3ace993b6b5cbd17812aa64.0;i=1\r\nFrom: 
<sip:doublesh...@sipgw-qa.serverdomain.com>;tag=g"..., len = -1375432112}
        onsend_params = {req = 0x7f70ae04c978, rpl = 0x7f70ae04c978, param = 
0x7f70ae049250, code = 1614188112, flags = 32766, branch = 0, t_rbuf = 0x0, dst 
= 0x7f72b33a2e50, send_buf = {
            s = 0x7f72b33ca360 "\022", len = -1375432208}}
        ip = {af = 2919534568, len = 32624, u = {addrl = {4587679, 
140121932614008}, addr32 = {4587679, 0, 2919549304, 32624}, addr16 = {159, 70, 
0, 0, 51576, 44548, 32624, 0}, 
            addr = "\237\000F\000\000\000\000\000x\311\004\256p\177\000"}}
---Type <return> to continue, or q <return> to quit---
        __FUNCTION__ = "relay_reply"
#25 0x00007f72b0bc9233 in reply_received (p_msg=0x7f72b33ca360) at 
t_reply.c:2466
        msg_status = 503
        ack_len = 343
        branch = 0
        reply_status = 1
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 
0x0, len = 2}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 2}}}}
        uac = 0x7f70ae0491f0
        t = 0x7f70ae048fe8
        lack_dst = {send_sock = 0x24586aa0, to = {s = {sa_family = 1076, 
sa_data = "5\257r\177\000\000\002\000\000\000\000\000\000"}, sin = {sin_family 
= 1076, sin_port = 44853, sin_addr = {s_addr = 32626}, 
              sin_zero = "\002\000\000\000\000\000\000"}, sin6 = {sin6_family = 
1076, sin6_port = 44853, sin6_flowinfo = 32626, sin6_addr = {__in6_u = 
{__u6_addr8 = "\002", '\000' <repeats 14 times>, 
                  __u6_addr16 = {2, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {2, 0, 
0, 0}}}, sin6_scope_id = 2}}, id = 0, proto = 3 '\003', send_flags = {f = 236 
'\354', blst_imask = 54 '6'}}
        backup_domain_from = 0x1
        replies_locked = 1
        blst_503_timeout = 1614187968
        hf = 0x7ffe60366264
        onsend_params = {req = 0x9aad59 <buf+281>, rpl = 0x7f720000003b, param 
= 0x800000, code = 7401248, flags = 0, branch = 0, t_rbuf = 0xb95e0, dst = 
0xf10e0, send_buf = {
            s = 0xf3e20 <error: Cannot access memory at address 0xf3e20>, len = 
8}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = 
{{__jmpbuf = {140730512608848, -9123264057138439874, 140130609933904, 
140130610094944, 140121932599792, 140121932599272, 
                9124125445691578686, -9123264633400551106}, __mask_was_saved = 
0, __saved_mask = {__val = {2, 609774240, 15689161018357612544, 10, 10136762, 
6, 140130610093992, 10137280, 15689161018357612544, 
                  10136684, 6524004, 998944, 140130610093992, 5, 10136762, 
10136765}}}}}
        __FUNCTION__ = "reply_received"
#26 0x0000000000501f76 in do_forward_reply (msg=0x7f72b33ca360, mode=0) at 
forward.c:747
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' 
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 
0}, sin_zero = "\000\000\000\000\000\000\000"}, 
            sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, 
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = 
{0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, 
              sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 
0 '\000', blst_imask = 0 '\000'}}
        new_len = 32626
        r = 0
        ip = {af = 8388608, len = 0, u = {addrl = {7401776, 758664}, addr32 = 
{7401776, 0, 758664, 0}, addr16 = {61744, 112, 0, 0, 37768, 11, 0, 0}, 
            addr = "0\361p\000\000\000\000\000\210\223\v\000\000\000\000"}}
        len = 1
        __FUNCTION__ = "do_forward_reply"
#27 0x00000000005446a3 in receive_msg (buf=0x0, len=3007095648, 
rcv_info=0x7f72b33c9fa8) at receive.c:299
        msg = 0x7f72b33ca360
        ctx = {rec_lev = 609774240, run_flags = 0, last_retcode = 5299513, 
jmp_env = {{__jmpbuf = {0, 0, 0, 140130609323016, 2, 140130577478022, 8388608, 
7405000}, __mask_was_saved = 756160, __saved_mask = {
                __val = {10105736, 0, 140730512610054, 1, 1, 140130609238160, 
140130625703367, 140119013064709, 0, 7072676, 140130617542504, 140130609899624, 
140130609238160, 140130627831440, 140130625729253, 
                  140130627831440}}}}}
        inb = {
          s = 0x9aac40 <buf> "SIP/2.0 503 Maximum Calls In Progress\r\nVia: 
SIP/2.0/UDP 
1.2.3.71;branch=z9hG4bK4493.b072e897d3ace993b6b5cbd17812aa64.0;i=1\r\nVia: 
SIP/2.0/TLS 192.168.5.41:55873;received=5.5.5.110;branch=z9hG4bK"..., len = 640}
        netinfo = {data = {s = 0xffffffff <error: Cannot access memory at 
address 0xffffffff>, len = 2}, dst = 0x7f72b3ae4768, rcv = 0x7f72b44b5000}
        __FUNCTION__ = "receive_msg"
#28 0x000000000048a410 in udp_rcv_loop () at udp_server.c:495
        len = 640
        buf = "SIP/2.0 503 Maximum Calls In Progress\r\nVia: SIP/2.0/UDP 
1.2.3.71;branch=z9hG4bK4493.b072e897d3ace993b6b5cbd17812aa64.0;i=1\r\nVia: 
SIP/2.0/TLS 192.168.5.41:55873;received=5.5.5.110;branch=z9hG4bK"...
        from = 0x7f72b339a868
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {1748369862, 
140121928722800}, addr32 = {1748369862, 0, 2915658096, 32624}, addr16 = {454, 
26678, 0, 0, 26992, 44489, 32624, 0}, 
              addr = "\306\001\066h\000\000\000\000piÉ­p\177\000"}}, dst_ip = 
{af = 2, len = 4, u = {addrl = {1194721734, 0}, addr32 = {1194721734, 0, 0, 0}, 
addr16 = {454, 18230, 0, 0, 0, 0, 0, 0}, 
              addr = "\306\001\066G", '\000' <repeats 11 times>}}, src_port = 
5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = 
{sa_family = 2, 
              sa_data = "\023\304\306\001\066h\000\000\000\000\000\000\000"}, 
sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1748369862}, 
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1748369862, 
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = 
{0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 
---Type <return> to continue, or q <return> to quit---
                    0}}}, sin6_scope_id = 0}}, bind_address = 0x7f72b32f9090, 
proto = 1 '\001'}
        __FUNCTION__ = "udp_rcv_loop"
#29 0x000000000050ac19 in main_loop () at main.c:1614
        si_desc = "udp receiver child=1 
sock=1.2.3.71:5060\000\000\001\000\000\000\"p\213\256r\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000\235j_",
 '\000' <repeats 14 times>, 
"\200\034K\322\030\273Ù°4\213\256r\177\000\000\000\200\034K\322\030\273\331\b\003\245\000\000\000\000\000\004\000\000\000\000\000\000"
        woneinit = 1
        __FUNCTION__ = "main_loop"
#30 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631
        cfg_stream = 0x0
        r = 1614176868
        tmp = 0x7ffe60369efc ""
        tmp_len = 0
        port = 0
        proto = -1270131248
        ret = 0
        seed = 3118883294
        debug_save = 0
        debug_flag = 8
        dont_fork_cnt = 0
        st = {st_dev = 15, st_ino = 12125, st_nlink = 2, st_mode = 16832, 
st_uid = 110, st_gid = 117, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 
4096, st_blocks = 0, st_atim = {tv_sec = 1478720081, 
            tv_nsec = 915607037}, st_mtim = {tv_sec = 1486078433, tv_nsec = 
873149234}, st_ctim = {tv_sec = 1486078433, tv_nsec = 873149234}, 
__glibc_reserved = {0, 0, 0}}
        __FUNCTION__ = "main"
_______________________________________________
SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list
sr-users@lists.sip-router.org
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

Reply via email to