fsctl pause inbound root@14cn5:/var/tmp# gdb /usr/sbin/kamailio core.kamailio.16550.14cn5.lax1.serverdomain.com.1486078532 GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: . Find the GDB manual and other documentation resources online at: . For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/7b/e93574998c9901cbd05b83a8f35fe1e58c15c2.debug...done. done. [New LWP 16550] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/sbc.cfg -'. Program terminated with signal SIGSEGV, Segmentation fault. #0 get_send_socket2 (force_send_socket=0xf, to=0x7ffe60366260, proto=1, mismatch=0x0) at forward.c:222 222 forward.c: No such file or directory. (gdb) bt full #0 get_send_socket2 (force_send_socket=0xf, to=0x7ffe60366260, proto=1, mismatch=0x0) at forward.c:222 __FUNCTION__ = "get_send_socket2" #1 0x00007f72b0c0ccc6 in uri2dst2 (dns_h=0x7f70ae0494c0, dst=0x7f70ae049400, force_send_socket=0x1, sflags=..., uri=0x0, proto=-1005387774) at ut.h:305 parsed_uri = {user = {s = 0x7f72b33c9934 "destination@1.2.3.105:5060\n", len = 11}, passwd = {s = 0x0, len = 0}, host = {s = 0x7f72b33c9940 "1.2.3.105:5060\n", len = 12}, port = { s = 0x7f72b33c994d "5060\n", len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} ip_found = -1005387774 to = {s = {sa_family = 2, sa_data = "\023\304\306\001\066i\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1765147078}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1765147078, sin6_addr = {__in6_u = {__u6_addr8 = '\000' , __u6_addr16 = { 0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}} err = 0 __FUNCTION__ = "uri2dst2" #2 0x00007f72b0c0e9b7 in prepare_new_uac (t=0x7f70ae048fe8, i_req=0x7f72b0e6e1c0 , branch=1, uri=0x7ffe603664f0, path=0x2, next_hop=0x0, fsocket=0xf, snd_flags=..., fproto=0, flags=2, instance=0x7f72b0e6e800 , ruid=0x7f72b0e6e818 , location_ua=0x7f72b0e6e828 ) at t_fwd.c:431 shbuf = 0x7ffe603664f0 "h\214<\263r\177" parsed_uri_bak = {user = {s = 0x7f72b33c8c6c "destination@1.2.3.105:5060", len = 11}, passwd = {s = 0x0, len = 0}, host = {s = 0x7f72b33c8c78 "1.2.3.105:5060", len = 12}, port = { s = 0x7f72b33c8c85 "5060", len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} ret = -478 len = 32624 msg_uri_bak = {s = 0x7f72b33c8c68 "sip:destination@1.2.3.105:5060", len = 33} dst_uri_bak = {s = 0x0, len = 0} dst_uri_backed_up = 1 path_bak = {s = 0x0, len = 0} instance_bak = {s = 0x0, len = 0} ruid_bak = {s = 0x0, len = 0} ua_bak = {s = 0x0, len = 0} force_send_socket_bak = 0x1 dst = 0x7f70ae049400 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140730512598352, -9123264057138439874, 140130609932904, 140130570920384, 140121932599272, 140121932600320, 9124125451358083390, -9123264633400551106}, __mask_was_saved = 0, __saved_mask = {__val = {15689161018357612544, 140730512598832, 140130577478022, 8388608, 7395288, 761336, 993320, 998944, 8, 42, 15689161018357612544, 993320, 6244452, 764416, 6979012, 7210391}}}}} __FUNCTION__ = "prepare_new_uac" #3 0x00007f72b0c11575 in add_uac (t=0x7f70ae048fe8, request=0x7f72b0e6e1c0 , uri=0x1, next_hop=0x0, path=0x2, proxy=0x0, fsocket=0xf, snd_flags=..., proto=0, flags=1614176868, instance=0x7f72b0e6e800 , ruid=0x7f72b0e6e818 , location_ua=0x7f72b0e6e828 ) at t_fwd.c:788 branch = 1 __FUNCTION__ = "add_uac" #4 0x00007f72b0c19e5a in t_forward_nonack (t=0x7f70ae048fe8, p_msg=0x7f72b0e6e1c0 , proxy=0x1, proto=0) at t_fwd.c:1667 current_uri = {s = 0x0, len = -1327046208} q = 0 t_invite = 0x2 success_branch = -1327044568 lock_replies = 2 dst_uri = {s = 0x100000000 , len = 1614179104} path = {s = 0x7f70ae01c1a8 "\023", len = 1} instance = {s = 0x7f72b337dd08 "\244\002\070\263r\177", len = -1287877528} ruid = {s = 0x7f72b33be905 "515@1.2.3.105:5060 ID=KvcoZ5xMc5\n", len = 93} location_ua = {s = 0x7ffe60366a78 "`KE", len = 5740203} si = 0xb33ca828 backup_bflags = 0 ---Type to continue, or q to quit--- bflags = 0 __FUNCTION__ = "t_forward_nonack" #5 0x00007f72b0bdb3b7 in _w_t_relay_to (force_proto=, proxy=, p_msg=) at tm.c:1412 t = 0x7ffe60366264 res = 1614176868 #6 w_t_relay (p_msg=0xf, _foo=0x7ffe60366260 "\002", _bar=0x1 ) at tm.c:1626 No locals. #7 0x0000000000454b60 in do_action (h=0x7ffe60366fd0, a=0x7f72b332d270, msg=0x7f72b0e6e1c0 ) at action.c:1060 ret = -5 v = 0 dst = {send_sock = 0x7f72b337c8a8, to = {s = {sa_family = 10015, sa_data = "\274\263r\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 10015, sin_port = 46012, sin_addr = { s_addr = 32626}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 10015, sin6_port = 46012, sin6_flowinfo = 32626, sin6_addr = {__in6_u = { __u6_addr8 = "\000\000\000\000\000\000\000\000\374\310H\000\000\000\000", __u6_addr16 = {0, 0, 0, 0, 51452, 72, 0, 0}, __u6_addr32 = {0, 0, 4770044, 0}}}, sin6_scope_id = 16}}, id = 708, proto = -74 '\266', send_flags = {f = 107 'k', blst_imask = 54 '6'}} end = 0x7ffe60366fd0 "\001" uri = {user = {s = 0x7ffe60368940 "\004", len = 4337712}, passwd = {s = 0x0, len = 0}, host = {s = 0x1000013c4 , len = -1288523376}, port = { s = 0x7ffe60367120 "", len = -1327046208}, params = {s = 0x7ffe60367120 "", len = -1327046208}, sip_params = {s = 0x0, len = 1260158976}, headers = {s = 0x7f70ae02b420 "\002", len = -1288520176}, port_no = 65535, proto = 65535, type = ERROR_URI_T, flags = (unknown: 2967921088), transport = {s = 0x7ffe60368940 "\004", len = 1614179716}, ttl = {s = 0x0, len = 4361660}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x1682c10 "\035", len = 1614180912}, lr = {s = 0x7f72b3c3e1c4 "[%d]", len = -1279008313}, r2 = {s = 0x0, len = -1280168087}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7ffe60366dc0 "", len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = { s = 0x7f72b3b2499a <_IO_vfprintf_internal+22490> "\200\275(\373\377\377", len = 708}, method_val = { s = 0x7f70ae01c208 "CANCEL sip:destination@sipgw-qa.serverdomain.com:443;transport=tls SIP/2.0\r\nVia: SIP/2.0/UDP 1.2.3.71;branch=z9hG4bKde2f.c6bc2780dd8cde4c00a634b40ab00f5d.0;i=1\r\nFrom: ;ta"..., len = 0}, lr_val = {s = 0x0, len = -1375617120}, r2_val = {s = 0x0, len = -1287877528}, gr_val = {s = 0x0, len = -5}} next_hop = {user = {s = 0x40a6 , len = 10}, passwd = {s = 0x20 , len = -1279987042}, host = { s = 0x1682c10 "\035", len = 1260158976}, port = {s = 0x7f72af7b512d "%s: %s%.*s", len = -1288518280}, params = {s = 0xffffffff , len = -1327046208}, sip_params = {s = 0x7ffe60368940 "\004", len = 1614180096}, headers = {s = 0x0, len = 1260158976}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 3006451024), transport = {s = 0x7ffe60368940 "\004", len = -5}, ttl = {s = 0x7ffe60368940 "\004", len = -1327046208}, user_param = {s = 0x0, len = 4535845}, maddr = {s = 0x7ffe60368940 "\004", len = -1279008313}, method = {s = 0x7f72b332cd50 "%\001", len = -1327046208}, lr = {s = 0x600000000 , len = 0}, r2 = { s = 0x7ffe60366f20 "\341\377\377\377", len = 0}, gr = {s = 0x7ffe60367320 "\254jh\001", len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = { s = 0x7f72b3b2499a <_IO_vfprintf_internal+22490> "\200\275(\373\377\377", len = -1280161382}, user_param_val = {s = 0x7f72b3b2499a <_IO_vfprintf_internal+22490> "\200\275(\373\377\377", len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0xffffffffffffffff , len = 104}, lr_val = { s = 0xffffffff00000000 , len = -5}, r2_val = {s = 0x40a6 , len = 10}, gr_val = { s = 0xb00000020 , len = 1260158976}} u = 0x7ffe60366fd0 flags = 0 st = {flags = 16550, id = 0, name = {n = 10, s = {s = 0xa , len = 32}, re = 0xa}, avp = 0x7f72b3b4f29e <__GI__IO_default_xsputn+174>} sct = 0x7ffe60366fd0 sjt = 0x7ffe60366fd0 mct = 0x0 rv = 0x454b60 rv1 = 0x7f72b0e6e1c0 c1 = {cache_type = 1614179235, val_type = 32766, c = {avp_val = {n = 1614179246, s = {s = 0x7ffe60366bae "", len = 10136660}, re = 0x7ffe60366bae}, pval = {rs = {s = 0x7ffe60366bae "", len = 10136660}, ri = 13, flags = 0}}, i2s = "b\254\232\000\000\000\000\000\000\200\034K\322\030\273\331\000\000\000\000\000"} s = {s = 0x0, len = 4535845} srevp = {0x7ffe60366c00, 0x60366b70} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #8 0x0000000000453625 in run_actions (h=0xf, h@entry=0x7ffe60366fd0, a=0x7ffe60366260, msg=0x1) at action.c:1549 ret = 1614186816 mod = 0x7f72b332d270 ---Type to continue, or q to quit--- __FUNCTION__ = "run_actions" #9 0x000000000045fff7 in run_actions_safe (h=0x7ffe60368940, a=, msg=) at action.c:1614 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140730512601040, 9124125445626566974, 140130570920384, 140730512607552, 140730512601812, 0, 9124125450978498878, -9123264633400551106}, __mask_was_saved = 0, __saved_mask = {__val = {140130570920384, 4294967296, 4535845, 140730512601488, 11, 0, 0, 140121932606863, 17, 140130617805210, 3, 140121932606885, 13, 140121932606885, 13, 0}}}}} ret = ign_on_break = 0 #10 0x0000000000423030 in rval_get_int (h=0x7ffe60368940, msg=0xf, i=0x7ffe603672d4, rv=0x0, cache=0x2) at rvalue.c:912 r_avp = 0x7ffe60366264 avp_val = {n = 23619648, s = {s = 0x1686840 "x\346\347\263r\177", len = 0}, re = 0x1686840} pval = {rs = {s = 0x7ffe60368940 "\004", len = 1614181456}, ri = 0, flags = 0} tmp = {s = 0x7ffe60368940 "\004", len = -1327046208} s = 0x7f72b0e6e1c0 r = 1614176868 ret = 1614176868 destroy_pval = 1614186816 __FUNCTION__ = "rval_get_int" #11 0x0000000000428dbc in rval_expr_eval_int (h=0x7ffe60368940, msg=0x7f72b0e6e1c0 , res=0x7ffe603672d4, rve=0x7f72b332d6b0) at rvalue.c:1910 i1 = 0 i2 = -1280047024 ret = -1 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 1614181920}, re = 0x0}, pval = {rs = {s = 0x0, len = 1614181920}, ri = 0, flags = 32766}}, i2s = '\000' , "\376\177\000\000\000\000\000\000\000"} c2 = {cache_type = 3014805914, val_type = 32626, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 1260158976, flags = -642049838}}, i2s = "\377\377\377\377\377\377\377\377Pt6`\376\177\000\000@\211\066`\376\177"} rv1 = 0x0 rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" #12 0x0000000000428eb6 in rval_expr_eval_int (h=0x7ffe60368940, msg=0x7f72b0e6e1c0 , res=0x7ffe60367450, rve=0x7f72b332ddc0) at rvalue.c:1918 i1 = 32766 i2 = -1327046208 ret = -1 c1 = {cache_type = 1614186816, val_type = 32766, c = {avp_val = {n = -1288311624, s = {s = 0x4b335ecb8 , len = -1288515768}, re = 0x4b335ecb8}, pval = {rs = {s = 0x4b335ecb8 , len = -1288515768}, ri = -1327046208, flags = 32626}}, i2s = "\000\000\000\000\005\000\000\000\301\341ór\177\000\000\254jh\001\000"} c2 = {cache_type = 8, val_type = RV_NONE, c = {avp_val = {n = -1279016550, s = {s = 0x7f72b3c3c19a "%H:%M:%S", len = 1}, re = 0x7f72b3c3c19a}, pval = {rs = {s = 0x7f72b3c3c19a "%H:%M:%S", len = 1}, ri = 1260158976, flags = -642049838}}, i2s = "\020 \000\061\066\065\065\060\300\341\346\260r\177\000\000\017\000\000\000\000"} rv1 = 0x7f72b0e6e1c0 rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" #13 0x0000000000455037 in do_action (h=0x7ffe60368940, a=0x7f72b332ede8, msg=0x7f72b0e6e1c0 ) at action.c:1030 ret = -5 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 14, sa_data = '\000' }, sin = {sin_family = 14, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 14, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000", __u6_addr16 = {0, 0, 0, 0, 1, 0, 0, 0}, __u6_addr32 = {0, 0, 1, 0}}}, sin6_scope_id = 2919447033}}, id = 32624, proto = 81 'Q', send_flags = {f = 187 '\273', blst_imask = 184 '\270'}} end = 0x7f72b332ddc0 "\004" uri = {user = {s = 0x1637930 "PST", len = 1614181696}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = { s = 0x323300000000 , len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 1260158976}, port_no = 12, proto = 0, type = 32626, flags = (unknown: 2919447280), transport = {s = 0x7ffe603675e0 "-Q{\257r\177", len = 1614181888}, ttl = {s = 0x7f72b0e6e1c0 "\003", len = -1279008319}, user_param = { s = 0x1686aac "15:35:32 sbc[16550]: NOTICE: