El Wed, 1 Feb 2017 10:21:35 +0100 "Jon Bonilla (Manwe)" <ma...@aholab.ehu.es> escribió:
Update: Installed version 4.4.5+0~20170202010534.75+jessie amd64 from nightly sources. The coredump is 100% reproducible: Outgoing call to a freeswitch server which is disabled (fsctl pause inbound) and responds 503. Kamailio dies after few seconds. The message in the log is CRITICAL: <core> [pass_fd.c:277]: receive_fd(): EOF on 10 Attaching latest coredump. cheers, Jon
fsctl pause inbound root@14cn5:/var/tmp# gdb /usr/sbin/kamailio core.kamailio.16550.14cn5.lax1.serverdomain.com.1486078532 GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: <http://www.gnu.org/software/gdb/bugs/>. Find the GDB manual and other documentation resources online at: <http://www.gnu.org/software/gdb/documentation/>. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/7b/e93574998c9901cbd05b83a8f35fe1e58c15c2.debug...done. done. [New LWP 16550] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/sbc.cfg -'. Program terminated with signal SIGSEGV, Segmentation fault. #0 get_send_socket2 (force_send_socket=0xf, to=0x7ffe60366260, proto=1, mismatch=0x0) at forward.c:222 222 forward.c: No such file or directory. (gdb) bt full #0 get_send_socket2 (force_send_socket=0xf, to=0x7ffe60366260, proto=1, mismatch=0x0) at forward.c:222 __FUNCTION__ = "get_send_socket2" #1 0x00007f72b0c0ccc6 in uri2dst2 (dns_h=0x7f70ae0494c0, dst=0x7f70ae049400, force_send_socket=0x1, sflags=..., uri=0x0, proto=-1005387774) at ut.h:305 parsed_uri = {user = {s = 0x7f72b33c9934 "destination@1.2.3.105:5060\n", len = 11}, passwd = {s = 0x0, len = 0}, host = {s = 0x7f72b33c9940 "1.2.3.105:5060\n", len = 12}, port = { s = 0x7f72b33c994d "5060\n", len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} ip_found = -1005387774 to = {s = {sa_family = 2, sa_data = "\023\304\306\001\066i\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1765147078}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1765147078, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = { 0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}} err = 0 __FUNCTION__ = "uri2dst2" #2 0x00007f72b0c0e9b7 in prepare_new_uac (t=0x7f70ae048fe8, i_req=0x7f72b0e6e1c0 <faked_req>, branch=1, uri=0x7ffe603664f0, path=0x2, next_hop=0x0, fsocket=0xf, snd_flags=..., fproto=0, flags=2, instance=0x7f72b0e6e800 <faked_req+1600>, ruid=0x7f72b0e6e818 <faked_req+1624>, location_ua=0x7f72b0e6e828 <faked_req+1640>) at t_fwd.c:431 shbuf = 0x7ffe603664f0 "h\214<\263r\177" parsed_uri_bak = {user = {s = 0x7f72b33c8c6c "destination@1.2.3.105:5060", len = 11}, passwd = {s = 0x0, len = 0}, host = {s = 0x7f72b33c8c78 "1.2.3.105:5060", len = 12}, port = { s = 0x7f72b33c8c85 "5060", len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} ret = -478 len = 32624 msg_uri_bak = {s = 0x7f72b33c8c68 "sip:destination@1.2.3.105:5060", len = 33} dst_uri_bak = {s = 0x0, len = 0} dst_uri_backed_up = 1 path_bak = {s = 0x0, len = 0} instance_bak = {s = 0x0, len = 0} ruid_bak = {s = 0x0, len = 0} ua_bak = {s = 0x0, len = 0} force_send_socket_bak = 0x1 dst = 0x7f70ae049400 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140730512598352, -9123264057138439874, 140130609932904, 140130570920384, 140121932599272, 140121932600320, 9124125451358083390, -9123264633400551106}, __mask_was_saved = 0, __saved_mask = {__val = {15689161018357612544, 140730512598832, 140130577478022, 8388608, 7395288, 761336, 993320, 998944, 8, 42, 15689161018357612544, 993320, 6244452, 764416, 6979012, 7210391}}}}} __FUNCTION__ = "prepare_new_uac" #3 0x00007f72b0c11575 in add_uac (t=0x7f70ae048fe8, request=0x7f72b0e6e1c0 <faked_req>, uri=0x1, next_hop=0x0, path=0x2, proxy=0x0, fsocket=0xf, snd_flags=..., proto=0, flags=1614176868, instance=0x7f72b0e6e800 <faked_req+1600>, ruid=0x7f72b0e6e818 <faked_req+1624>, location_ua=0x7f72b0e6e828 <faked_req+1640>) at t_fwd.c:788 branch = 1 __FUNCTION__ = "add_uac" #4 0x00007f72b0c19e5a in t_forward_nonack (t=0x7f70ae048fe8, p_msg=0x7f72b0e6e1c0 <faked_req>, proxy=0x1, proto=0) at t_fwd.c:1667 current_uri = {s = 0x0, len = -1327046208} q = 0 t_invite = 0x2 success_branch = -1327044568 lock_replies = 2 dst_uri = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 1614179104} path = {s = 0x7f70ae01c1a8 "\023", len = 1} instance = {s = 0x7f72b337dd08 "\244\002\070\263r\177", len = -1287877528} ruid = {s = 0x7f72b33be905 "515@1.2.3.105:5060 ID=KvcoZ5xMc5\n", len = 93} location_ua = {s = 0x7ffe60366a78 "`KE", len = 5740203} si = 0xb33ca828 backup_bflags = 0 ---Type <return> to continue, or q <return> to quit--- bflags = 0 __FUNCTION__ = "t_forward_nonack" #5 0x00007f72b0bdb3b7 in _w_t_relay_to (force_proto=<optimized out>, proxy=<optimized out>, p_msg=<optimized out>) at tm.c:1412 t = 0x7ffe60366264 res = 1614176868 #6 w_t_relay (p_msg=0xf, _foo=0x7ffe60366260 "\002", _bar=0x1 <error: Cannot access memory at address 0x1>) at tm.c:1626 No locals. #7 0x0000000000454b60 in do_action (h=0x7ffe60366fd0, a=0x7f72b332d270, msg=0x7f72b0e6e1c0 <faked_req>) at action.c:1060 ret = -5 v = 0 dst = {send_sock = 0x7f72b337c8a8, to = {s = {sa_family = 10015, sa_data = "\274\263r\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 10015, sin_port = 46012, sin_addr = { s_addr = 32626}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 10015, sin6_port = 46012, sin6_flowinfo = 32626, sin6_addr = {__in6_u = { __u6_addr8 = "\000\000\000\000\000\000\000\000\374\310H\000\000\000\000", __u6_addr16 = {0, 0, 0, 0, 51452, 72, 0, 0}, __u6_addr32 = {0, 0, 4770044, 0}}}, sin6_scope_id = 16}}, id = 708, proto = -74 '\266', send_flags = {f = 107 'k', blst_imask = 54 '6'}} end = 0x7ffe60366fd0 "\001" uri = {user = {s = 0x7ffe60368940 "\004", len = 4337712}, passwd = {s = 0x0, len = 0}, host = {s = 0x1000013c4 <error: Cannot access memory at address 0x1000013c4>, len = -1288523376}, port = { s = 0x7ffe60367120 "", len = -1327046208}, params = {s = 0x7ffe60367120 "", len = -1327046208}, sip_params = {s = 0x0, len = 1260158976}, headers = {s = 0x7f70ae02b420 "\002", len = -1288520176}, port_no = 65535, proto = 65535, type = ERROR_URI_T, flags = (unknown: 2967921088), transport = {s = 0x7ffe60368940 "\004", len = 1614179716}, ttl = {s = 0x0, len = 4361660}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x1682c10 "\035", len = 1614180912}, lr = {s = 0x7f72b3c3e1c4 "[%d]", len = -1279008313}, r2 = {s = 0x0, len = -1280168087}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7ffe60366dc0 "", len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = { s = 0x7f72b3b2499a <_IO_vfprintf_internal+22490> "\200\275(\373\377\377", len = 708}, method_val = { s = 0x7f70ae01c208 "CANCEL sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.71;branch=z9hG4bKde2f.c6bc2780dd8cde4c00a634b40ab00f5d.0;i=1\r\nFrom: <sip:doublesh...@sipgw-qa.serverdomain.com>;ta"..., len = 0}, lr_val = {s = 0x0, len = -1375617120}, r2_val = {s = 0x0, len = -1287877528}, gr_val = {s = 0x0, len = -5}} next_hop = {user = {s = 0x40a6 <error: Cannot access memory at address 0x40a6>, len = 10}, passwd = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1279987042}, host = { s = 0x1682c10 "\035", len = 1260158976}, port = {s = 0x7f72af7b512d "%s: %s%.*s", len = -1288518280}, params = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1327046208}, sip_params = {s = 0x7ffe60368940 "\004", len = 1614180096}, headers = {s = 0x0, len = 1260158976}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 3006451024), transport = {s = 0x7ffe60368940 "\004", len = -5}, ttl = {s = 0x7ffe60368940 "\004", len = -1327046208}, user_param = {s = 0x0, len = 4535845}, maddr = {s = 0x7ffe60368940 "\004", len = -1279008313}, method = {s = 0x7f72b332cd50 "%\001", len = -1327046208}, lr = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 0}, r2 = { s = 0x7ffe60366f20 "\341\377\377\377", len = 0}, gr = {s = 0x7ffe60367320 "\254jh\001", len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = { s = 0x7f72b3b2499a <_IO_vfprintf_internal+22490> "\200\275(\373\377\377", len = -1280161382}, user_param_val = {s = 0x7f72b3b2499a <_IO_vfprintf_internal+22490> "\200\275(\373\377\377", len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 104}, lr_val = { s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = -5}, r2_val = {s = 0x40a6 <error: Cannot access memory at address 0x40a6>, len = 10}, gr_val = { s = 0xb00000020 <error: Cannot access memory at address 0xb00000020>, len = 1260158976}} u = 0x7ffe60366fd0 flags = 0 st = {flags = 16550, id = 0, name = {n = 10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len = 32}, re = 0xa}, avp = 0x7f72b3b4f29e <__GI__IO_default_xsputn+174>} sct = 0x7ffe60366fd0 sjt = 0x7ffe60366fd0 mct = 0x0 rv = 0x454b60 <do_action+2960> rv1 = 0x7f72b0e6e1c0 <faked_req> c1 = {cache_type = 1614179235, val_type = 32766, c = {avp_val = {n = 1614179246, s = {s = 0x7ffe60366bae "", len = 10136660}, re = 0x7ffe60366bae}, pval = {rs = {s = 0x7ffe60366bae "", len = 10136660}, ri = 13, flags = 0}}, i2s = "b\254\232\000\000\000\000\000\000\200\034K\322\030\273\331\000\000\000\000\000"} s = {s = 0x0, len = 4535845} srevp = {0x7ffe60366c00, 0x60366b70} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #8 0x0000000000453625 in run_actions (h=0xf, h@entry=0x7ffe60366fd0, a=0x7ffe60366260, msg=0x1) at action.c:1549 ret = 1614186816 mod = 0x7f72b332d270 ---Type <return> to continue, or q <return> to quit--- __FUNCTION__ = "run_actions" #9 0x000000000045fff7 in run_actions_safe (h=0x7ffe60368940, a=<optimized out>, msg=<optimized out>) at action.c:1614 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140730512601040, 9124125445626566974, 140130570920384, 140730512607552, 140730512601812, 0, 9124125450978498878, -9123264633400551106}, __mask_was_saved = 0, __saved_mask = {__val = {140130570920384, 4294967296, 4535845, 140730512601488, 11, 0, 0, 140121932606863, 17, 140130617805210, 3, 140121932606885, 13, 140121932606885, 13, 0}}}}} ret = <optimized out> ign_on_break = 0 #10 0x0000000000423030 in rval_get_int (h=0x7ffe60368940, msg=0xf, i=0x7ffe603672d4, rv=0x0, cache=0x2) at rvalue.c:912 r_avp = 0x7ffe60366264 avp_val = {n = 23619648, s = {s = 0x1686840 "x\346\347\263r\177", len = 0}, re = 0x1686840} pval = {rs = {s = 0x7ffe60368940 "\004", len = 1614181456}, ri = 0, flags = 0} tmp = {s = 0x7ffe60368940 "\004", len = -1327046208} s = 0x7f72b0e6e1c0 <faked_req> r = 1614176868 ret = 1614176868 destroy_pval = 1614186816 __FUNCTION__ = "rval_get_int" #11 0x0000000000428dbc in rval_expr_eval_int (h=0x7ffe60368940, msg=0x7f72b0e6e1c0 <faked_req>, res=0x7ffe603672d4, rve=0x7f72b332d6b0) at rvalue.c:1910 i1 = 0 i2 = -1280047024 ret = -1 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 1614181920}, re = 0x0}, pval = {rs = {s = 0x0, len = 1614181920}, ri = 0, flags = 32766}}, i2s = '\000' <repeats 12 times>, "\376\177\000\000\000\000\000\000\000"} c2 = {cache_type = 3014805914, val_type = 32626, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 1260158976, flags = -642049838}}, i2s = "\377\377\377\377\377\377\377\377Pt6`\376\177\000\000@\211\066`\376\177"} rv1 = 0x0 rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" #12 0x0000000000428eb6 in rval_expr_eval_int (h=0x7ffe60368940, msg=0x7f72b0e6e1c0 <faked_req>, res=0x7ffe60367450, rve=0x7f72b332ddc0) at rvalue.c:1918 i1 = 32766 i2 = -1327046208 ret = -1 c1 = {cache_type = 1614186816, val_type = 32766, c = {avp_val = {n = -1288311624, s = {s = 0x4b335ecb8 <error: Cannot access memory at address 0x4b335ecb8>, len = -1288515768}, re = 0x4b335ecb8}, pval = {rs = {s = 0x4b335ecb8 <error: Cannot access memory at address 0x4b335ecb8>, len = -1288515768}, ri = -1327046208, flags = 32626}}, i2s = "\000\000\000\000\005\000\000\000\301\341ór\177\000\000\254jh\001\000"} c2 = {cache_type = 8, val_type = RV_NONE, c = {avp_val = {n = -1279016550, s = {s = 0x7f72b3c3c19a "%H:%M:%S", len = 1}, re = 0x7f72b3c3c19a}, pval = {rs = {s = 0x7f72b3c3c19a "%H:%M:%S", len = 1}, ri = 1260158976, flags = -642049838}}, i2s = "\020 \000\061\066\065\065\060\300\341\346\260r\177\000\000\017\000\000\000\000"} rv1 = 0x7f72b0e6e1c0 <faked_req> rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" #13 0x0000000000455037 in do_action (h=0x7ffe60368940, a=0x7f72b332ede8, msg=0x7f72b0e6e1c0 <faked_req>) at action.c:1030 ret = -5 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 14, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 14, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 14, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000", __u6_addr16 = {0, 0, 0, 0, 1, 0, 0, 0}, __u6_addr32 = {0, 0, 1, 0}}}, sin6_scope_id = 2919447033}}, id = 32624, proto = 81 'Q', send_flags = {f = 187 '\273', blst_imask = 184 '\270'}} end = 0x7f72b332ddc0 "\004" uri = {user = {s = 0x1637930 "PST", len = 1614181696}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = { s = 0x323300000000 <error: Cannot access memory at address 0x323300000000>, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 1260158976}, port_no = 12, proto = 0, type = 32626, flags = (unknown: 2919447280), transport = {s = 0x7ffe603675e0 "-Q{\257r\177", len = 1614181888}, ttl = {s = 0x7f72b0e6e1c0 <faked_req> "\003", len = -1279008319}, user_param = { s = 0x1686aac "15:35:32 sbc[16550]: NOTICE: <script>: Node unavailable, trying next sip:1.2.3.105:5060 from group <null> M=INVITE R=sip:destination@1.2.3.105:5060 ID=KvcoZ5xMc5\n", len = -1276654880}, maddr = {s = 0x8 <error: Cannot access memory at address 0x8>, len = -1279016550}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1279743838}, lr = { s = 0x30353536313be905 <error: Cannot access memory at address 0x30353536313be905>, len = 8187}, r2 = {s = 0x0, len = 23619648}, gr = {s = 0x7f72af7b512d "%s: %s%.*s", len = 23620240}, transport_val = {s = 0x2010 <error: Cannot access memory at address 0x2010>, len = -1276647904}, ttl_val = {s = 0x1688aa0 "", len = 181}, user_param_val = { ---Type <return> to continue, or q <return> to quit--- s = 0x2010 <error: Cannot access memory at address 0x2010>, len = -1279965780}, maddr_val = {s = 0x7ffe603676f0 "\300\341\346\260r\177", len = 1614181936}, method_val = { s = 0x7f72b3e7e620 <main_arena> "", len = 23620256}, lr_val = {s = 0x1686a90 "`\002", len = 192}, r2_val = {s = 0xb5 <error: Cannot access memory at address 0xb5>, len = -1279961239}, gr_val = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 1}} next_hop = {user = {s = 0x8f <error: Cannot access memory at address 0x8f>, len = 23619648}, passwd = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1350872787}, host = { s = 0x7ffe603677d8 "0", len = 23619648}, port = {s = 0x0, len = -1279515043}, params = {s = 0x7ffe603677d8 "0", len = 23619648}, sip_params = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1350872787}, headers = {s = 0x7ffe603677d8 "0", len = 0}, port_no = 21, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3015430204), transport = {s = 0x7f72b0e6e1c0 <faked_req> "\003", len = 1486078532}, ttl = { s = 0x1686aa0 "<173>Feb 2 15:35:32 sbc[16550]: NOTICE: <script>: Node unavailable, trying next sip:1.2.3.105:5060 from group <null> M=INVITE R=sip:destination@1.2.3.105:5060 ID=KvcoZ5xMc5\n", len = 180}, user_param = {s = 0x7f72b0e6e460 <faked_req+672> "\v", len = 47}, maddr = {s = 0x3a706973 <error: Cannot access memory at address 0x3a706973>, len = 0}, method = { s = 0x1686aa0 "<173>Feb 2 15:35:32 sbc[16550]: NOTICE: <script>: Node unavailable, trying next sip:1.2.3.105:5060 from group <null> M=INVITE R=sip:destination@1.2.3.105:5060 ID=KvcoZ5xMc5\n", len = 0}, lr = {s = 0x300000003 <error: Cannot access memory at address 0x300000003>, len = -1327046208}, r2 = {s = 0x2300000020 <error: Cannot access memory at address 0x2300000020>, len = 15}, gr = { s = 0x7500000001 <error: Cannot access memory at address 0x7500000001>, len = 4}, transport_val = {s = 0x7f7200000000 "", len = -28800}, ttl_val = {s = 0x1637930 "PST", len = 18}, user_param_val = {s = 0x7f70ae0339f5 "sip:1.2.3.105:5060", len = 10488584}, maddr_val = {s = 0x9a8e50 <_km_log_func> "\340jA", len = 0}, method_val = { s = 0x7f72af9b8568 <_xlog_prefix> "\242S{\257r\177", len = 5}, lr_val = {s = 0x416ae0 <syslog@plt> "\377%\222\310X", len = -1279536273}, r2_val = {s = 0x7f72b336f0c8 "`\224f\001", len = 48}, gr_val = {s = 0x7ffe603678b0 "\250\350;\263r\177", len = 1614182384}} u = 0x7f72b332ddc0 flags = 0 st = {flags = 143, id = 0, name = {n = 23619648, s = {s = 0x1686840 "x\346\347\263r\177", len = 0}, re = 0x1686840}, avp = 0x7f72af7b512d} sct = 0x7f72b332ddc0 sjt = 0x7f72b332ddc0 mct = 0x0 rv = 0x7f72af7b512d rv1 = 0x7f72b0e6e1c0 <faked_req> c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 8180, s = {s = 0x1ff4 <error: Cannot access memory at address 0x1ff4>, len = 6}, re = 0x1ff4}, pval = {rs = { s = 0x1ff4 <error: Cannot access memory at address 0x1ff4>, len = 6}, ri = 0, flags = 3}}, i2s = "Pw6`\376\177\000\000 u6`\376\177\000\000\000\303\347\263r\177"} s = {s = 0x7ffeffffffff <error: Cannot access memory at address 0x7ffeffffffff>, len = 0} srevp = {0x0, 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #14 0x0000000000453625 in run_actions (h=0xf, a=0x7ffe60366260, msg=0x1) at action.c:1549 ret = 1 mod = 0x7f72b332ede8 __FUNCTION__ = "run_actions" #15 0x0000000000455250 in do_action (h=0x7ffe60368940, a=0x7f72b3364390, msg=0x7f72b0e6e1c0 <faked_req>) at action.c:678 ret = -5 v = 17 dst = {send_sock = 0x400000001, to = {s = {sa_family = 32768, sa_data = "\034K\322\030\273\331\001\000\000\000\003\000\000"}, sin = {sin_family = 32768, sin_port = 19228, sin_addr = { s_addr = 3652917458}, sin_zero = "\001\000\000\000\003\000\000"}, sin6 = {sin6_family = 32768, sin6_port = 19228, sin6_flowinfo = 3652917458, sin6_addr = {__in6_u = { __u6_addr8 = "\001\000\000\000\003\000\000\000\bl:\263r\177\000", __u6_addr16 = {1, 0, 3, 0, 27656, 45882, 32626, 0}, __u6_addr32 = {1, 3, 3006950408, 32626}}}, sin6_scope_id = 1614184384}}, id = 32766, proto = -64 '\300', send_flags = {f = 225 '\341', blst_imask = 230 '\346'}} end = 0x1 <error: Cannot access memory at address 0x1> uri = {user = {s = 0x7ffe60367fc0 "", len = -1327046208}, passwd = {s = 0x7ffe60367fc0 "", len = -1327046208}, host = {s = 0x0, len = 1260158976}, port = {s = 0x7f72b33a3658 "@~f\001", len = -1287995552}, params = {s = 0x7ffe60368940 "\004", len = -5}, sip_params = {s = 0x7ffe60367bc0 "", len = -1327046208}, headers = {s = 0x0, len = 4535845}, port_no = 31680, proto = 24630, type = 32766, flags = (unknown: 1614183244), transport = {s = 0x7f72b33abf60 "\204\002", len = -1327046208}, ttl = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 1260158976}, user_param = {s = 0x0, len = -1287987736}, maddr = {s = 0x0, len = -5}, method = {s = 0x7ffe60367c30 "", len = -1327046208}, lr = {s = 0x0, len = 4535845}, r2 = { s = 0x7ffe60367c30 "", len = -1288325472}, gr = {s = 0x7f72b33adde8 "\221\002", len = -1327046208}, transport_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1287871648}, ttl_val = {s = 0x0, len = 4535845}, user_param_val = {s = 0x7ffe60368e50 "", len = -1279965780}, maddr_val = {s = 0x7f72b335b6a0 "\300\001", len = 1260158976}, method_val = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, lr_val = {s = 0x7ffe60368940 "\004", len = -1327046208}, r2_val = {s = 0x7ffe60368940 "\004", len = 1614184176}, gr_val = {s = 0x0, len = 4587511}} next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffe60367bc0 "", len = 1219270974}, host = {s = 0x7f72b0e6e1c0 <faked_req> "\003", len = 1614186816}, port = {s = 0x7ffe60367ef0 "\001", ---Type <return> to continue, or q <return> to quit--- len = 0}, params = {s = 0x7e9f67c1af4c993e <error: Cannot access memory at address 0x7e9f67c1af4c993e>, len = 776378686}, sip_params = {s = 0x7f7200000000 "", len = 2}, headers = { s = 0x9a8ee4 <route_type> "\002", len = 4587679}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = URI_USER_NORMALIZE, transport = {s = 0x7ffe60367c30 "", len = 1512872254}, ttl = { s = 0x7f72b33adde8 "\221\002", len = -1327046208}, user_param = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 10129124}, maddr = { s = 0x7e9f67c1ac6c993e <error: Cannot access memory at address 0x7e9f67c1ac6c993e>, len = 776378686}, method = {s = 0x0, len = 0}, lr = {s = 0x7ffe60368290 "", len = 1260158976}, r2 = { s = 0x220000002a <error: Cannot access memory at address 0x220000002a>, len = 1614184176}, gr = {s = 0x7ffe60368940 "\004", len = 4337712}, transport_val = { s = 0x1 <error: Cannot access memory at address 0x1>, len = -28800}, ttl_val = {s = 0x1637930 "PST", len = -1288066864}, user_param_val = {s = 0x0, len = 5936733}, maddr_val = { s = 0x9a8e50 <_km_log_func> "\340jA", len = 5593238}, method_val = {s = 0x7f72af9b8568 <_xlog_prefix> "\242S{\257r\177", len = 1260158976}, lr_val = {s = 0xa502c0 <event_rt> "H\355:\263r\177", len = -1287995248}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1327046208}, gr_val = {s = 0x7ffe60368940 "\004", len = 1614184176}} u = 0x1 flags = 0 st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x7f7200000001 "", len = 1614183360}, re = 0x7f7200000001}, avp = 0x7e9f67c048ac993e} sct = 0x1 sjt = 0x1 mct = 0x0 rv = 0x7f72b0bd71ce <t_check_status+366> rv1 = 0x7f72b0e6e1c0 <faked_req> c1 = {cache_type = 1614184384, val_type = 32766, c = {avp_val = {n = -1327046208, s = {s = 0x7f72b0e6e1c0 <faked_req> "\003", len = 0}, re = 0x7f72b0e6e1c0 <faked_req>}, pval = {rs = { s = 0x7f72b0e6e1c0 <faked_req> "\003", len = 0}, ri = -1330099511, flags = 32626}}, i2s = "\000\000\000\000\000\000\000\000#Ͻ\260r\177\000\000\000\000\000\000\000"} s = {s = 0x0, len = -1375432728} srevp = {0xa4dfa2 <ut_buf_int2str+18>, 0x100000002} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #16 0x0000000000453625 in run_actions (h=0xf, a=0x7ffe60366260, msg=0x1) at action.c:1549 ret = 1 mod = 0x7f72b33acbe0 __FUNCTION__ = "run_actions" #17 0x0000000000455088 in do_action (h=0x7ffe60368940, a=0x7f72b33ad818, msg=0x7f72b0e6e1c0 <faked_req>) at action.c:1049 ret = 1 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 3, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 3, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 3, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000p\200\066`\376\177\000", __u6_addr16 = {0, 0, 0, 0, 32880, 24630, 32766, 0}, __u6_addr32 = {0, 0, 1614184560, 32766}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 128 '\200', blst_imask = 28 '\034'}} end = 0x7f72b33ac090 "\001" uri = {user = {s = 0x7ffe60368940 "\004", len = -1327046208}, passwd = {s = 0x7ffe60368940 "\004", len = 1614185312}, host = {s = 0x0, len = 1260158976}, port = {s = 0x0, len = -1288008312}, params = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1327046208}, sip_params = {s = 0x7ffe60368940 "\004", len = 1614184820}, headers = {s = 0x0, len = 4361660}, port_no = 39230, proto = 42828, type = 2124376001, flags = (URI_SIP_USER_PHONE | unknown: 776378684), transport = {s = 0x7f7200000000 "", len = -1327046208}, ttl = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, user_param = {s = 0x3af7b5136 <error: Cannot access memory at address 0x3af7b5136>, len = 0}, maddr = {s = 0x0, len = 16}, method = {s = 0x7ffe60368670 "\250\350;\263r\177", len = 1614185904}, lr = {s = 0x0, len = 1260158976}, r2 = { s = 0x9aac48 <buf+8> "503 Maximum Calls In Progress\r\nVia: SIP/2.0/UDP 1.2.3.71;branch=z9hG4bK4493.b072e897d3ace993b6b5cbd17812aa64.0;i=1\r\nVia: SIP/2.0/TLS 192.168.5.41:55873;received=5.5.5.110;branch=z9hG4bK.2Ry9zmf"..., len = 23433520}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 1260158976}, ttl_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1614185312}, user_param_val = {s = 0x7ffe60368940 "\004", len = 4337712}, maddr_val = {s = 0x0, len = 23484904}, method_val = { s = 0x1000001 <error: Cannot access memory at address 0x1000001>, len = 0}, lr_val = {s = 0x7ffe60368940 "\004", len = -1327046208}, r2_val = {s = 0x7ffe60368940 "\004", len = 1614185536}, gr_val = {s = 0x0, len = 1260158976}} next_hop = {user = {s = 0x0, len = -1288004192}, passwd = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1327046208}, host = {s = 0x7ffe60368940 "\004", len = 1614185156}, port = {s = 0x0, len = 4362150}, params = {s = 0x7e9f67c05a2c993e <error: Cannot access memory at address 0x7e9f67c05a2c993e>, len = 776378686}, sip_params = {s = 0x7f7200000000 "", len = -1279619515}, headers = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 3006677904), transport = {s = 0x0, len = -1287871648}, ttl = {s = 0x0, len = 5}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x7f72b33ca398 "H\254\232", len = 5894312}, method = { s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, lr = {s = 0x0, len = 1260158976}, r2 = {s = 0x0, len = 1614185536}, gr = {s = 0x7ffe60368940 "\004", len = 4337712}, transport_val = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7399016}, ttl_val = {s = 0xb9b80 <error: Cannot access memory at address 0xb9b80>, len = 989592}, user_param_val = {s = 0xf3e20 <error: Cannot access memory at address 0xf3e20>, len = 8}, maddr_val = {s = 0x9 <error: Cannot access memory at address 0x9>, len = 1260158976}, method_val = { ---Type <return> to continue, or q <return> to quit--- s = 0x7f72b33af400 "\n", len = 1260158976}, lr_val = {s = 0x0, len = -1287998264}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1327046208}, gr_val = { s = 0x7ffe60368940 "\004", len = 1614185536}} u = 0x7f72b33ac090 flags = 0 st = {flags = 0, id = 0, name = {n = -1288004192, s = {s = 0x7f72b33a9da0 "\020", len = -1}, re = 0x7f72b33a9da0}, avp = 0x7f72b0e6e1c0 <faked_req>} sct = 0x7f72b33ac090 sjt = 0x7f72b33ac090 mct = 0x0 rv = 0x9aac48 <buf+8> rv1 = 0x7f72b0e6e1c0 <faked_req> c1 = {cache_type = 23484464, val_type = RV_NONE, c = {avp_val = {n = 1614184820, s = {s = 0x7ffe60368174 "\001", len = 1614186816}, re = 0x7ffe60368174}, pval = {rs = {s = 0x7ffe60368174 "\001", len = 1614186816}, ri = 4337712, flags = 0}}, i2s = "8\200\066`\376\177\000\000\000\000\000\000\376\177\000\000\000\000\000\000\000"} s = {s = 0x0, len = 1614184560} srevp = {0x1665830, 0x7f72b3b55020 <__GI___libc_malloc+96>} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #18 0x0000000000453625 in run_actions (h=0xf, a=0x7ffe60366260, msg=0x1) at action.c:1549 ret = 1 mod = 0x7f72b33ad818 __FUNCTION__ = "run_actions" #19 0x0000000000455088 in do_action (h=0x7ffe60368940, a=0x7f72b33adab0, msg=0x7f72b0e6e1c0 <faked_req>) at action.c:1049 ret = 1 v = 1 dst = {send_sock = 0x7ffe60368598, to = {s = {sa_family = 17952, sa_data = "h\001\000\000\000\000\377\377\377\377\000\000\000"}, sin = {sin_family = 17952, sin_port = 360, sin_addr = {s_addr = 0}, sin_zero = "\377\377\377\377\000\000\000"}, sin6 = {sin6_family = 17952, sin6_port = 360, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = "\377\377\377\377\000\000\000\000-Q{\257r\177\000", __u6_addr16 = {65535, 65535, 0, 0, 20781, 44923, 32626, 0}, __u6_addr32 = {4294967295, 0, 2944094509, 32626}}}, sin6_scope_id = 1614185880}}, id = 32766, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7f72b33ab4c8 "\020" uri = {user = {s = 0x1b6cb9744c0d096 <error: Cannot access memory at address 0x1b6cb9744c0d096>, len = 1260158976}, passwd = {s = 0x1684880 "", len = 1614186336}, host = {s = 0x7ffe60368e50 "", len = -1287871648}, port = {s = 0x7ffe60368e50 "", len = 1614186336}, params = {s = 0x0, len = 4337663}, sip_params = { s = 0xc10397200000000 <error: Cannot access memory at address 0xc10397200000000>, len = -28800}, headers = {s = 0x1637930 "PST", len = -1375556488}, port_no = 104, proto = 0, type = ERROR_URI_T, flags = (unknown: 10488584), transport = {s = 0x9a8e50 <_km_log_func> "\340jA", len = 0}, ttl = {s = 0x7f72af9b8568 <_xlog_prefix> "\242S{\257r\177", len = 1260158976}, user_param = { s = 0x416ae0 <syslog@plt> "\377%\222\310X", len = -1288028176}, maddr = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1287871648}, method = {s = 0x7ffe60368e50 "", len = 1614186336}, lr = {s = 0x0, len = 4361660}, r2 = {s = 0x6ee90f "NOTICE", len = -1350872158}, gr = {s = 0x3f <error: Cannot access memory at address 0x3f>, len = -1287919448}, transport_val = {s = 0x7f72b336f6c8 "_0:\263r\177", len = -1287871648}, ttl_val = {s = 0x7f72b33be8dc "from group <null> M=INVITE R=sip:destination@1.2.3.105:5060 ID=KvcoZ5xMc5\n", len = 52}, user_param_val = {s = 0x7ffe603686a8 "?", len = 5740203}, maddr_val = { s = 0x9aad9d <buf+349> "KvcoZ5xMc5\r\nCSeq: 20 INVITE\r\nRetry-After: 300\r\nUser-Agent: Primo MS 2.0/N+\r\nAccept: application/sdp\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY\r\nSupported"..., len = 10}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1260158976}, lr_val = { s = 0x1 <error: Cannot access memory at address 0x1>, len = -1348761896}, r2_val = {s = 0x7f72b33a3f98 "h\275\070\263r\177", len = -1287871648}, gr_val = {s = 0x0, len = 1260158976}} next_hop = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1350875792}, passwd = { s = 0x7f72b33be8a8 "Node unavailable, trying next sip:1.2.3.105:5060 from group <null> M=INVITE R=sip:destination@1.2.3.105:5060 ID=KvcoZ5xMc5\n", len = 63}, host = { s = 0x7f72af7b53a2 "<script>: ", len = 7268623}, port = {s = 0x7f70ae0055f0 "\001", len = -1375708040}, params = { s = 0x7f72b33be8a8 "Node unavailable, trying next sip:1.2.3.105:5060 from group <null> M=INVITE R=sip:destination@1.2.3.105:5060 ID=KvcoZ5xMc5\n", len = 63}, sip_params = {s = 0x0, len = -1375711312}, headers = {s = 0x0, len = 1260158976}, port_no = 24408, proto = 44546, type = 32624, flags = (unknown: 3006936040), transport = {s = 0x7ffe60368e50 "", len = -1287871648}, ttl = {s = 0x7f72b33a3ff0 "\001", len = -1287871648}, user_param = {s = 0x0, len = 4542519}, maddr = { s = 0x7f72b33c8df8 "SIP/2.0 183 Session Progress\r\nVia: SIP/2.0/TLS 192.168.5.41:55873;received=5.5.5.110;branch=z9hG4bK.htu8hFOxv;rport=61830\r\nRecord-Route: <sip:1.2.3.71;r2=on;lr=on;ftag=cjBN~9alL;nat=yes>\r\nRecor"..., len = -1279515043}, method = {s = 0x7ffe6036886c "", len = -1364370368}, lr = {s = 0x4b5 <error: Cannot access memory at address 0x4b5>, len = 5}, r2 = {s = 0x0, len = 1205}, gr = {s = 0x0, len = 4951110}, transport_val = {s = 0x7f7000000000 <error: Cannot access memory at address 0x7f7000000000>, len = 1205}, ttl_val = {s = 0x0, len = 1260158976}, user_param_val = { s = 0x7f72aead5c40 <wr_buf> "\027\003\003\004\260\r\006\343\256\335j7\302M\206\242\021\067\017MV\231\021\267ߺ\377\332\023\345\331=.\375\225\260!\001$\023k\236\374\320\031\067\210\253\331\377ס\361\233\f\243Ó\315\031\026d+mp,2\357g\343\210\r.\tN\270\371$'\f\237\066\020\001\313\356n\240L\204\251,\244A^\230\317\324:y\352C|\312!@b]F\267\363g\265,[\302\231\357/O\271\204\206\066\b\270\265\062F\304\"C[\372U\22---Type <return> to continue, or q <return> to quit--- 7{\bo\275\375et\202\215\214\250R\327\363\336\021\375\300\001\357<\023C\353\370\006\023\371\353\327\n\323\177n,\216\214\342\342'f\323Я(\307\370\243\344\064\253m\211g[\245\345\202h-\304\070O\231"..., len = 4958668}, maddr_val = {s = 0x4b5 <error: Cannot access memory at address 0x4b5>, len = 1205}, method_val = {s = 0x4b5 <error: Cannot access memory at address 0x4b5>, len = 0}, lr_val = { s = 0x7ffe00000000 <error: Cannot access memory at address 0x7ffe00000000>, len = 1}, r2_val = { s = 0x7f72aead5c40 <wr_buf> "\027\003\003\004\260\r\006\343\256\335j7\302M\206\242\021\067\017MV\231\021\267ߺ\377\332\023\345\331=.\375\225\260!\001$\023k\236\374\320\031\067\210\253\331\377ס\361\233\f\243Ó\315\031\026d+mp,2\357g\343\210\r.\tN\270\371$'\f\237\066\020\001\313\356n\240L\204\251,\244A^\230\317\324:y\352C|\312!@b]F\267\363g\265,[\302\231\357/O\271\204\206\066\b\270\265\062F\304\"C[\372U\227{\bo\275\375et\202\215\214\250R\327\363\336\021\375\300\001\357<\023C\353\370\006\023\371\353\327\n\323\177n,\216\214\342\342'f\323Я(\307\370\243\344\064\253m\211g[\245\345\202h-\304\070O\231"..., len = 0}, gr_val = {s = 0x10000 <error: Cannot access memory at address 0x10000>, len = -1366682064}} u = 0x7f72b33ab4c8 flags = 32766 st = {flags = 1, id = 0, name = {n = -1350875792, s = {s = 0x7f72af7b4570 <xlog_2_helper+1360> "\351\\\374\377\377\017\037", len = -1287919448}, re = 0x7f72af7b4570 <xlog_2_helper+1360>}, avp = 0x7f720000003f} sct = 0x7f72b33ab4c8 sjt = 0x7f72b33ab4c8 mct = 0x0 rv = 0x7f72af7b512d rv1 = 0x7f72b0e6e1c0 <faked_req> c1 = {cache_type = 21, val_type = RV_NONE, c = {avp_val = {n = -1279537089, s = {s = 0x7f72b3bbd03f <__GI___vsyslog_chk+655> "H\201Ĩ", len = 1319204404}, re = 0x7f72b3bbd03f <__GI___vsyslog_chk+655>}, pval = {rs = {s = 0x7f72b3bbd03f <__GI___vsyslog_chk+655> "H\201Ĩ", len = 1319204404}, ri = 1486078532, flags = 0}}, i2s = "\200Hh\001\000\000\000\000r\000\000\000\000\000\000\000Kh`\242\313e"} s = {s = 0x7ffe60368598 "`\243<\263r\177", len = 23610912} srevp = {0x0, 0x7f72b3bc265d <__libc_send+141>} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #20 0x0000000000453625 in run_actions (h=0xf, h@entry=0x7ffe60368940, a=0x7ffe60366260, a@entry=0x7f72b33a4700, msg=0x1, msg@entry=0x7f72b0e6e1c0 <faked_req>) at action.c:1549 ret = 1 mod = 0x7f72b33adab0 __FUNCTION__ = "run_actions" #21 0x0000000000460095 in run_top_route (a=0x7f72b33a4700, msg=0x7f72b0e6e1c0 <faked_req>, c=<optimized out>) at action.c:1635 ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140730512607552, -9123264057138439874, 140130609940224, 140130570920384, 1, 140121932599272, 9124125445653829950, -9123264633400551106}, __mask_was_saved = 0, __saved_mask = {__val = {1850632230, 761992, 140121932605688, 140130570921024, 140130568566228, 503, 1, 140121932599272, 140130568086583, 140130610089464, 140121932486344, 140130610089464, 140130570920384, 140121932599792, 140121932605048, 503}}}}} p = <optimized out> ret = <optimized out> sfbk = 0 #22 0x00007f72b0bbae7b in run_failure_handlers (t=0x7f70ae048fe8, rpl=0x7f72b33ca360, code=503, extra_flags=1) at t_reply.c:990 faked_req = {id = 3, pid = 16567, tval = {tv_sec = 1486078532, tv_usec = 679675}, fwd_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, rpl_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, first_line = {type = 1, flags = 1, len = 68, u = {request = {method = { s = 0x7f70ae04ad78 "INVITE sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: SIP/2.0/TLS 192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: <sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: sip"..., len = 6}, uri = { s = 0x7f70ae04ad7f "sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: SIP/2.0/TLS 192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: <sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: sip:349118"..., len = 51}, version = { s = 0x7f70ae04adb3 "SIP/2.0\r\nVia: SIP/2.0/TLS 192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: <sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: sip:destinat...@sipgw-qa.serverdomain.com\r\nCSeq: 20 INVITE\r\nCall-ID: K"..., len = 7}, method_value = 1}, reply = {version = { s = 0x7f70ae04ad78 "INVITE sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: SIP/2.0/TLS 192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: <sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: sip"..., len = 6}, status = { s = 0x7f70ae04ad7f "sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: SIP/2.0/TLS 192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: <sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: sip:349118"..., len = 51}, reason = { s = 0x7f70ae04adb3 "SIP/2.0\r\nVia: SIP/2.0/TLS 192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: <sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: sip:destinat...@sipgw-qa.serverdomain.com\r\nCSeq: 20 INVITE\r\nCall-ID: K"..., len = 7}, statuscode = 1}}}, via1 = 0x7f70ae04b268, via2 = 0x0, headers = 0x7f70ae04b228, last_header = 0x7f70ae04baa0, parsed_flag = 18446744073709551615, h_via1 = 0x7f70ae04b228, h_via2 = 0x0, callid = 0x7f70ae04b8a0, to = 0x7f70ae04b618, cseq = 0x7f70ae04b830, from = 0x7f70ae04b3d0, contact = 0x7f70ae04ba20, maxforwards = 0x7f70ae04b8e0, ---Type <return> to continue, or q <return> to quit--- route = 0x0, record_route = 0x0, content_type = 0x7f70ae04b9a0, content_length = 0x7f70ae04b9e0, authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x7f70ae04b920, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x7f70ae04b960, event = 0x0, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x7f70ae04baa0, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, body = 0x0, eoh = 0x7f70ae04b068 "\r\nv=0\r\no=doublesharp 3959 3018 IN IP4 192.168.5.41\r\ns=Talk\r\nc=IN IP4 192.168.5.41\r\nb=AS:380\r\nt=0 0\r\na=rtcp-xr:rcvr-rtt=all:10000 stat-summary=loss,dup,jitt,TTL voip-metrics\r\nm=audio 1 RTP/AVP 96 18 0 "..., unparsed = 0x7f70ae04b068 "\r\nv=0\r\no=doublesharp 3959 3018 IN IP4 192.168.5.41\r\ns=Talk\r\nc=IN IP4 192.168.5.41\r\nb=AS:380\r\nt=0 0\r\na=rtcp-xr:rcvr-rtt=all:10000 stat-summary=loss,dup,jitt,TTL voip-metrics\r\nm=audio 1 RTP/AVP 96 18 0 "..., rcv = {src_ip = {af = 2, len = 4, u = {addrl = {1850632230, 0}, addr32 = {1850632230, 0, 0, 0}, addr16 = {26662, 28238, 0, 0, 0, 0, 0, 0}, addr = "&hNn", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1194721734, 0}, addr32 = {1194721734, 0, 0, 0}, addr16 = {454, 18230, 0, 0, 0, 0, 0, 0}, addr = "\306\001\066G", '\000' <repeats 11 times>}}, src_port = 61830, dst_port = 443, proto_reserved1 = 1, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\361\206&hNn\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 34545, sin_addr = {s_addr = 1850632230}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 2, sin6_port = 34545, sin6_flowinfo = 1850632230, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\000\223/\263r\177\000", __u6_addr16 = {0, 0, 0, 0, 37632, 45871, 32626, 0}, __u6_addr32 = {0, 0, 3006239488, 32626}}}, sin6_scope_id = 3022729957}}, bind_address = 0x7f72b32f9300, proto = 3 '\003'}, buf = 0x7f70ae04ad78 "INVITE sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: SIP/2.0/TLS 192.168.5.41:55873;branch=z9hG4bK.2Ry9zmf~g;rport\r\nFrom: <sip:doublesh...@sipgw-qa.serverdomain.com>;tag=gmfuAmbM8\r\nTo: sip"..., len = 1198, new_uri = {s = 0x7f72b33c9930 "sip:destination@1.2.3.105:5060\n", len = 33}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = { s = 0x7f72b33c8c6c "destination@1.2.3.105:5060", len = 11}, passwd = {s = 0x0, len = 0}, host = {s = 0x7f72b33c8c78 "1.2.3.105:5060", len = 12}, port = {s = 0x7f72b33c8c85 "5060", len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = { s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x7f72b33af400, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = "z9hG4bK4493.b072e897d3ace993b6b5cbd17812aa64.1", '\000' <repeats 11 times>, add_to_branch_len = 46, hash_index = 14660, msg_flags = 262353, flags = 32, set_global_address = { s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0xf, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = { s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 0 '\000'}}}} shmem_msg = 0x7f70ae04a678 on_failure = 1 __FUNCTION__ = "run_failure_handlers" #23 0x00007f72b0bbcb72 in t_should_relay_response (Trans=0x7f70ae048fe8, new_code=503, branch=0, should_store=0x7ffe60368bd8, should_relay=0x7ffe60368bd4, cancel_data=0x0, reply=0x7f72b33ca360) at t_reply.c:1346 picked_code = 503 new_branch = 1614176868 inv_through = 1 replies_dropped = 0 __FUNCTION__ = "t_should_relay_response" #24 0x00007f72b0bc469a in relay_reply (t=0x7f70ae048fe8, p_msg=0x7ffe60366260, branch=1, msg_status=0, cancel_data=0x2, do_put_on_wait=0) at t_reply.c:1749 relay = 0 save_clone = 6244452 res_len = 0 bm = {to_tag_val = {s = 0x71f1a2 <__FUNCTION__.7358> "parse_headers", len = -1375432192}} totag_retr = -1287871648 reason = { s = 0x7f70ae04c978 "ACK sip:destinat...@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.71;branch=z9hG4bK4493.b072e897d3ace993b6b5cbd17812aa64.0;i=1\r\nFrom: <sip:doublesh...@sipgw-qa.serverdomain.com>;tag=g"..., len = -1375432112} onsend_params = {req = 0x7f70ae04c978, rpl = 0x7f70ae04c978, param = 0x7f70ae049250, code = 1614188112, flags = 32766, branch = 0, t_rbuf = 0x0, dst = 0x7f72b33a2e50, send_buf = { s = 0x7f72b33ca360 "\022", len = -1375432208}} ip = {af = 2919534568, len = 32624, u = {addrl = {4587679, 140121932614008}, addr32 = {4587679, 0, 2919549304, 32624}, addr16 = {159, 70, 0, 0, 51576, 44548, 32624, 0}, addr = "\237\000F\000\000\000\000\000x\311\004\256p\177\000"}} ---Type <return> to continue, or q <return> to quit--- __FUNCTION__ = "relay_reply" #25 0x00007f72b0bc9233 in reply_received (p_msg=0x7f72b33ca360) at t_reply.c:2466 msg_status = 503 ack_len = 343 branch = 0 reply_status = 1 cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 2}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 2}}}} uac = 0x7f70ae0491f0 t = 0x7f70ae048fe8 lack_dst = {send_sock = 0x24586aa0, to = {s = {sa_family = 1076, sa_data = "5\257r\177\000\000\002\000\000\000\000\000\000"}, sin = {sin_family = 1076, sin_port = 44853, sin_addr = {s_addr = 32626}, sin_zero = "\002\000\000\000\000\000\000"}, sin6 = {sin6_family = 1076, sin6_port = 44853, sin6_flowinfo = 32626, sin6_addr = {__in6_u = {__u6_addr8 = "\002", '\000' <repeats 14 times>, __u6_addr16 = {2, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {2, 0, 0, 0}}}, sin6_scope_id = 2}}, id = 0, proto = 3 '\003', send_flags = {f = 236 '\354', blst_imask = 54 '6'}} backup_domain_from = 0x1 replies_locked = 1 blst_503_timeout = 1614187968 hf = 0x7ffe60366264 onsend_params = {req = 0x9aad59 <buf+281>, rpl = 0x7f720000003b, param = 0x800000, code = 7401248, flags = 0, branch = 0, t_rbuf = 0xb95e0, dst = 0xf10e0, send_buf = { s = 0xf3e20 <error: Cannot access memory at address 0xf3e20>, len = 8}} ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140730512608848, -9123264057138439874, 140130609933904, 140130610094944, 140121932599792, 140121932599272, 9124125445691578686, -9123264633400551106}, __mask_was_saved = 0, __saved_mask = {__val = {2, 609774240, 15689161018357612544, 10, 10136762, 6, 140130610093992, 10137280, 15689161018357612544, 10136684, 6524004, 998944, 140130610093992, 5, 10136762, 10136765}}}}} __FUNCTION__ = "reply_received" #26 0x0000000000501f76 in do_forward_reply (msg=0x7f72b33ca360, mode=0) at forward.c:747 new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} new_len = 32626 r = 0 ip = {af = 8388608, len = 0, u = {addrl = {7401776, 758664}, addr32 = {7401776, 0, 758664, 0}, addr16 = {61744, 112, 0, 0, 37768, 11, 0, 0}, addr = "0\361p\000\000\000\000\000\210\223\v\000\000\000\000"}} len = 1 __FUNCTION__ = "do_forward_reply" #27 0x00000000005446a3 in receive_msg (buf=0x0, len=3007095648, rcv_info=0x7f72b33c9fa8) at receive.c:299 msg = 0x7f72b33ca360 ctx = {rec_lev = 609774240, run_flags = 0, last_retcode = 5299513, jmp_env = {{__jmpbuf = {0, 0, 0, 140130609323016, 2, 140130577478022, 8388608, 7405000}, __mask_was_saved = 756160, __saved_mask = { __val = {10105736, 0, 140730512610054, 1, 1, 140130609238160, 140130625703367, 140119013064709, 0, 7072676, 140130617542504, 140130609899624, 140130609238160, 140130627831440, 140130625729253, 140130627831440}}}}} inb = { s = 0x9aac40 <buf> "SIP/2.0 503 Maximum Calls In Progress\r\nVia: SIP/2.0/UDP 1.2.3.71;branch=z9hG4bK4493.b072e897d3ace993b6b5cbd17812aa64.0;i=1\r\nVia: SIP/2.0/TLS 192.168.5.41:55873;received=5.5.5.110;branch=z9hG4bK"..., len = 640} netinfo = {data = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 2}, dst = 0x7f72b3ae4768, rcv = 0x7f72b44b5000} __FUNCTION__ = "receive_msg" #28 0x000000000048a410 in udp_rcv_loop () at udp_server.c:495 len = 640 buf = "SIP/2.0 503 Maximum Calls In Progress\r\nVia: SIP/2.0/UDP 1.2.3.71;branch=z9hG4bK4493.b072e897d3ace993b6b5cbd17812aa64.0;i=1\r\nVia: SIP/2.0/TLS 192.168.5.41:55873;received=5.5.5.110;branch=z9hG4bK"... from = 0x7f72b339a868 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {1748369862, 140121928722800}, addr32 = {1748369862, 0, 2915658096, 32624}, addr16 = {454, 26678, 0, 0, 26992, 44489, 32624, 0}, addr = "\306\001\066h\000\000\000\000piÉp\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {1194721734, 0}, addr32 = {1194721734, 0, 0, 0}, addr16 = {454, 18230, 0, 0, 0, 0, 0, 0}, addr = "\306\001\066G", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\306\001\066h\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1748369862}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1748369862, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, ---Type <return> to continue, or q <return> to quit--- 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f72b32f9090, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #29 0x000000000050ac19 in main_loop () at main.c:1614 si_desc = "udp receiver child=1 sock=1.2.3.71:5060\000\000\001\000\000\000\"p\213\256r\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000\235j_", '\000' <repeats 14 times>, "\200\034K\322\030\273Ù°4\213\256r\177\000\000\000\200\034K\322\030\273\331\b\003\245\000\000\000\000\000\004\000\000\000\000\000\000" woneinit = 1 __FUNCTION__ = "main_loop" #30 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631 cfg_stream = 0x0 r = 1614176868 tmp = 0x7ffe60369efc "" tmp_len = 0 port = 0 proto = -1270131248 ret = 0 seed = 3118883294 debug_save = 0 debug_flag = 8 dont_fork_cnt = 0 st = {st_dev = 15, st_ino = 12125, st_nlink = 2, st_mode = 16832, st_uid = 110, st_gid = 117, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1478720081, tv_nsec = 915607037}, st_mtim = {tv_sec = 1486078433, tv_nsec = 873149234}, st_ctim = {tv_sec = 1486078433, tv_nsec = 873149234}, __glibc_reserved = {0, 0, 0}} __FUNCTION__ = "main"
_______________________________________________ SIP Express Router (SER) and Kamailio (OpenSER) - sr-users mailing list sr-users@lists.sip-router.org http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users