Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #0 __pthread_kill_implementation (threadid=281473240669920, signo=signo@entry=6, no_tid=no_tid@entry=0) at ./nptl/pthread_kill.c:44
- tid = 25127
- ret = 0
- pd = 0xffff98861ee0
- old_mask = {__val = {281473238791052}}
- ret = <optimized out>
- #1 0x0000ffff986f0ab4 in __pthread_kill_internal (signo=6, threadid=<optimized out>) at ./nptl/pthread_kill.c:78
- No locals.
- #2 0x0000ffff986aa72c in __GI_raise (sig=sig@entry=6) at ../sysdeps/posix/raise.c:26
- ret = <optimized out>
- #3 0x0000ffff9869747c in __GI_abort () at ./stdlib/abort.c:79
- save_stage = 1
- act = {__sigaction_handler = {sa_handler = 0x20, sa_sigaction = 0x20}, sa_mask = {__val = {3, 2676586395008836901, 2676586395008836901, 11193459566446, 2332130293653205797, 4294967295, 0, 18446462598732840960, 1095216660735, 4222193353359360,
- 0, 3547266839205735485, 7236833196856379917, 7152929116648727406, 7651715184376049519, 5300974575771207758}}, sa_flags = 1856391493, sa_restorer = 0xaaaab1c80330 <abort@got[plt]>}
- #4 0x0000aaaab18f8a90 in del_lump (msg=0xffff96b486e0, offset=3839458264, len=328, type=HDR_OTHER_T) at data_lump.c:341
- tmp = 0xffff96b486e0
- prev = 0xffff96b50df8
- t = 0xffff66298840
- list = 0xffffca1185c8
- __FUNCTION__ = "del_lump"
- #5 0x0000ffff6628ae90 in rtpengine_offer_answer_body (msg=0xffff96b486e0, flags=0xffffca1187a0, node=0x0, spvar=0x0, body=0x0, outbody=0x0, set=0x0, op=1) at rtpengine.c:3978
- bencbuf = {pieces = 0xffff96b51038, free_list = 0x0, error = 0}
- dict = 0xffff96b50df8
- oldbody = {
- s = 0xffff96b4fdb0 "v=0\r\no=- 4249935498 1959544550 IN IP4 172.18.0.60\r\ns=-\r\nc=IN IP4 172.18.0.60\r\nt=0 0\r\nm=audio 12110 RTP/AVP 0 8 101\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/8000\r\na=fmt"..., len = 328}
- newbody = {
- s = 0xffff96b51290 "v=0\r\no=- 4249935498 1959544550 IN IP4 172.18.0.60\r\ns=-\r\nt=0 0\r\nm=audio 35736 RTP/AVP 0 8 101\r\nc=IN IP4 172.18.0.19\r\na=mid:0\r\na=rtpmap:0 PCMU/8000\r\na=rtpmap:8 PCMA/8000\r\na=rtpmap:101 telephone-event/80"..., len = 342}
- anchor = 0xff00000000ff0000
- __FUNCTION__ = "rtpengine_offer_answer_body"
- #6 0x0000ffff6628b15c in rtpengine_offer_answer (msg=0xffff96b486e0, flags=0xffffca1187a0, node=0x0, spvar=0x0, bpvar=0x0, body=0x0, op=1) at rtpengine.c:4008
- newbody = {s = 0xffffca118788 "h/\263e", len = -904820664}
- val = {rs = {s = 0x0, len = -1766553888}, ri = -1, flags = 0}
- ret = 65535
- __FUNCTION__ = "rtpengine_offer_answer"
- #7 0x0000ffff6628aba0 in rtpengine_offer_f (msg=0xffff96b486e0, flags=0xffffca1187a0, spvar=0x0, bpvar=0x0, body=0x0) at rtpengine.c:3929
- No locals.
- #8 0x0000aaaab18cc4b8 in do_action (a=0xffff9669d6b8, msg=0xffff96b486e0) at action.c:1061
- ret = 0
- v = 65535
- i = 0
- len = 0
- cmatch = 128
- aitem = 0xaaaab198b178 <run_post_raw_processing_cb+52>
- adefault = 0xffffca118950
- spec = 0x1b222b0
- val = {rs = {s = 0x18 <error: Cannot access memory at address 0x18>, len = -1766548136}, ri = -1771638768, flags = 65535}
- start = {tv_sec = 187650102794784, tv_usec = 187650102777064}
- end_time = 65535
- cmd = 0xffff662b98a0 <cmds+960>
- acmd = 0x18
- cmdp = {0xffffca1187a0, 0x0, 0x0, 0x0, 0xaaaab1b29a4c <proto_udp_send+124>, 0xffffca118900, 0xaaaab1982c40 <script_return_push+104>, 0x86eb1c4bbb0}
- tmp_vals = {{rs = {s = 0x65b32f68 <error: Cannot access memory at address 0x65b32f68>, len = 1726331672}, ri = 0, flags = -1108377408}, {rs = {s = 0xffff9669d5f8 "in-iface=internal out-iface=internal", len = 36}, ri = -904820768,
- flags = 65535}, {rs = {s = 0xaaaab1a03170 <fm_split_frag+188> "\037 \003\325\375{Ũ\300\003_\326\377\303\002\321\375{\004\251\375\003\001\221\363S\005\251\340G", len = 1726680912}, ri = 1718022144, flags = 65535}, {rs = {
- s = 0xffff66677140 "p\021\353f\377\377", len = 40}, ri = -904820624, flags = 65535}, {rs = {s = 0xaaaab1a03248 <fm_malloc+204> <incomplete sequence \306>, len = 796649104}, ri = -1313190040, flags = 43690}, {rs = {s = 0xffffca118870 "",
- len = -1314900576}, ri = 1726679280, flags = 65535}, {rs = {s = 0xffff6666f000 "pʻ\261\252\252", len = 1726680912}, ri = 0, flags = -1108379584}, {rs = {s = 0x2f7bde10 <error: Cannot access memory at address 0x2f7bde10>,
- len = 1718022144}, ri = -904820624, flags = 65535}}
- route_p = 0x2f7bde50
- sval = {s = 0x2f7c0358 <error: Cannot access memory at address 0x2f7c0358>, len = 0}
- __FUNCTION__ = "do_action"
- #9 0x0000aaaab18c7eb4 in run_action_list (a=0xffff9669c388, msg=0xffff96b486e0) at action.c:194
- ret = 1
- t = 0xffff9669d6b8
- #10 0x0000aaaab18c7c74 in run_actions (a=0xffff9669c388, msg=0xffff96b486e0) at action.c:138
- ret = 43690
- _ = 65535
- ret_lvl = 2
- top_route = {s = 0xffffca118a04 "", len = -904820216}
- __FUNCTION__ = "run_actions"
- #11 0x0000aaaab18c81f8 in run_top_route (sr=..., msg=0xffff96b486e0) at action.c:254
- recursing = 1
- bk_action_flags = 0
- route_stack_start_bkp = 0
- route_stack_size_bkp = 2
- ret = 1726671840
- ctx = 0x0
- __FUNCTION__ = "run_top_route"
- #12 0x0000ffff6657ea24 in pre_print_uac_request (t=0xffff66ead0e0, branch=0, request=0xffff96b486e0, body_clone=0xffffca118b58) at t_fwd.c:194
- backup_route_type = 1
- backup_list = 0xffff66eaebe0
- p = 0xffff96b4cca0 "sip:[email protected]"
- __FUNCTION__ = "pre_print_uac_request"
- #13 0x0000ffff6657f698 in add_uac (t=0xffff66ead0e0, request=0xffff96b486e0, uri=0xffffca118bf8, next_hop=0xffffca118c08, bflags=0, path=0xffff96b48980, q=-1, attrs=0x0, proxy=0x0) at t_fwd.c:440
- branch = 0
- body_clone = 0x0
- do_free_proxy = 0
- ret = 0
- __FUNCTION__ = "add_uac"
- #14 0x0000ffff66580adc in t_forward_nonack (t=0xffff66ead0e0, p_msg=0xffff96b486e0, proxy=0x0, reset_bcounter=0, locked=0) at t_fwd.c:782
- reply_reason_487 = {s = 0xffff665c2658 "Request Terminated", len = 18}
- backup_uri = {s = 0x0, len = 0}
- backup_dst = {s = 0xffff96b4cc48 "sip:172.18.0.22:5060", len = 20}
- branch_ret = 128
- lowest_ret = -5
- current_uri = {
- s = 0xaaaab1db81df <buf+7> "sip:200@localcore SIP/2.0\r\nVia: SIP/2.0/UDP 172.18.0.60:50588;branch=z9hG4bKc59208682afff310;rport\r\nContact: <sip:[email protected]:50588>\r\nMax-Forwards: 69\r\nProxy-Authorization: Digest u"...,
- len = 17}
- added_branches = 0
- t_invite = 0x1fffff000
- i = 65535
- success_branch = -1766548048
- bk_sock = 0x0
- bk_bflags = 0
- branch = 0xffff6657903c <t_relay_to+44>
- idx = 65535
- bk_path = {s = 0x0, len = 0}
- __FUNCTION__ = "t_forward_nonack"
- #15 0x0000ffff66579300 in t_relay_to (p_msg=0xffff96b486e0, proxy=0x0, flags=0) at t_funcs.c:260
- ret = 0
- new_tran = 1
- reply_ret = 43690
- t = 0xffff66ead0e0
- __FUNCTION__ = "t_relay_to"
- #16 0x0000ffff6659856c in w_t_relay (p_msg=0xffff96b486e0, flags=0x0, proxy=0x0) at tm.c:1382
- p = 0x0
- t = 0x0
- ret = 65535
- __FUNCTION__ = "w_t_relay"
- #17 0x0000aaaab18cc4b8 in do_action (a=0xffff96694c80, msg=0xffff96b486e0) at action.c:1061
- ret = 0
- v = 43690
- i = -1771484848
- len = 65535
- cmatch = -1766553888
- aitem = 0x1b1c85cb4
- adefault = 0xaaaab1c4bbb0
- spec = 0xffffca119100
- val = {rs = {s = 0xffff96691fb8 "\002", len = -1766536560}, ri = 17, flags = 0}
- start = {tv_sec = 11118348000, tv_usec = 281473210156768}
- end_time = 4
- cmd = 0xffff665e8530 <cmds+720>
- aitem = 0xaaaab1db81fa <buf+34>
- adefault = 0xaaaab1db8631 <buf+1113>
- spec = 0xffffca119610
- val = {rs = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, ri = -1771638768, flags = 65535}
- start = {tv_sec = 187650102794784, tv_usec = 187650102777064}
- end_time = 65535
- cmd = 0x0
- acmd = 0x439ca119610
- cmdp = {0xffff9666f010, 0xc0, 0x19666f010, 0xffffca1196c0, 0xffff96b4b530, 0xffffca1195f0, 0xaaaab1982c40 <script_return_push+104>, 0x86e96b49690}
- tmp_vals = {{rs = {s = 0xaaaab1ba4f68 "fm_malloc frag", len = -904817424}, ri = -1314900576, flags = 43690}, {rs = {s = 0xffff96b4b530 "\b", len = -1771638768}, ri = -1766547912, flags = 1}, {rs = {s = 0x0, len = -904816936}, ri = 0,
- flags = 0}, {rs = {s = 0xffffca119550 "\300\226\021\312\377\377", len = -1314591272}, ri = 128, flags = 0}, {rs = {s = 0xaaaab1c85cb4 <ctime_buf+4> "Jun 29 08:19:18", len = -1312506960}, ri = -1766549672, flags = 65535}, {rs = {
- s = 0xffffca119560 "\360\225\021\312\377\377", len = -1314898728}, ri = 128, flags = 0}, {rs = {s = 0xaaaab1c85cb4 <ctime_buf+4> "Jun 29 08:19:18", len = -1766549672}, ri = -1771638768, flags = 2158}, {rs = {
- s = 0xaaaab1b81a20 <__FUNCTION__.3> "script_return_push", len = -1313352472}, ri = 8, flags = 0}}
- route_p = 0xaaaab1db8631 <buf+1113>
- sval = {s = 0xaaaab1b403f8 "unknown", len = 7}
- __FUNCTION__ = "do_action"
- #26 0x0000aaaab18c7eb4 in run_action_list (a=0xffff966863c8, msg=0xffff96b486e0) at action.c:194
- ret = 1
- t = 0xffff96693d38
- #27 0x0000aaaab18c7c74 in run_actions (a=0xffff966863c8, msg=0xffff96b486e0) at action.c:138
- ret = 43690
- _ = 65535
- ret_lvl = 0
- top_route = {s = 0xffffca1196c0 "", len = 1717133664}
- __FUNCTION__ = "run_actions"
- #28 0x0000aaaab18c81f8 in run_top_route (sr=..., msg=0xffff96b486e0) at action.c:254
- recursing = 1
- bk_action_flags = 0
- route_stack_start_bkp = -1
- route_stack_size_bkp = -1766553888
- ret = -1315521676
- ctx = 0x0
- __FUNCTION__ = "run_top_route"
- #29 0x0000aaaab196bbe8 in receive_msg (
- buf=0xaaaab1db81d8 <buf> "INVITE sip:200@localcore SIP/2.0\r\nVia: SIP/2.0/UDP 172.18.0.60:50588;branch=z9hG4bKc59208682afff310;rport\r\nContact: <sip:[email protected]:50588>\r\nMax-Forwards: 69\r\nProxy-Authorization: D"...,
- len=1113, rcv_info=0xffffca119880, existing_context=0x0, msg_flags=0) at receive.c:225
- ctx = 0xffff96b49db0
- msg = 0xffff96b486e0
- start = {tv_sec = 281474071894032, tv_usec = 187650102433772}
- rc = 3
- old_route_type = -904816448
- tmp = 0x80 <error: Cannot access memory at address 0x80>
- in_buff = {
- s = 0xaaaab1db81d8 <buf> "INVITE sip:200@localcore SIP/2.0\r\nVia: SIP/2.0/UDP 172.18.0.60:50588;branch=z9hG4bKc59208682afff310;rport\r\nContact: <sip:[email protected]:50588>\r\nMax-Forwards: 69\r\nProxy-Authorization: D"...,
- len = 1113}
- __FUNCTION__ = "receive_msg"
- #30 0x0000aaaab1b299b4 in udp_read_req (si=0xffff9667a450, bytes_read=0xffffca119958) at net/proto_udp/proto_udp.c:192
- ri = {src_ip = {af = 2, len = 4, u = {addrl = {15312935583920165548, 4770618492597871678}, addr32 = {1006637740, 3565320648, 1110746174, 1110746174}, addr16 = {4780, 15360, 31176, 54402, 42046, 16948, 42046, 16948},
- addr = "\254\022\000<\310y\202\324>\2444B>\2444B"}}, dst_ip = {af = 2, len = 4, u = {addrl = {1073746604, 0}, addr32 = {1073746604, 0, 0, 0}, addr16 = {4780, 16384, 0, 0, 0, 0, 0, 0}, addr = "\254\022\000@", '\000' <repeats 11 times>}},
- src_port = 50588, dst_port = 5060, proto = 1, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "Ŝ\254\022\000<\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 40133, sin_addr = {
- s_addr = 1006637740}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 40133, sin6_flowinfo = 1006637740, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000(\236\021\312\377\377\000",
- __u6_addr16 = {0, 0, 0, 0, 40488, 51729, 65535, 0}, __u6_addr32 = {0, 0, 3390152232, 65535}}}, sin6_scope_id = 1751213958}}, bind_address = 0xffff9667a450}
- len = 1113
- buf = "INVITE sip:200@localcore SIP/2.0\r\nVia: SIP/2.0/UDP 172.18.0.60:50588;branch=z9hG4bKc59208682afff310;rport\r\nContact: <sip:[email protected]:50588>\r\nMax-Forwards: 69\r\nProxy-Authorization: D"...
- tmp = 0x22e0000022e <error: Cannot access memory at address 0x22e0000022e>
- fromlen = 16
- p = 0x200ffffffff
- msg = {
- s = 0xaaaab1db81d8 <buf> "INVITE sip:200@localcore SIP/2.0\r\nVia: SIP/2.0/UDP 172.18.0.60:50588;branch=z9hG4bKc59208682afff310;rport\r\nContact: <sip:[email protected]:50588>\r\nMax-Forwards: 69\r\nProxy-Authorization: D"...,
- len = 1113}
- __FUNCTION__ = "udp_read_req"
- #31 0x0000aaaab1b1570c in handle_io (fm=0xffff966ce328, idx=0, event_type=1) at net/net_udp.c:313
- n = 0
- read = -1313788496
- __FUNCTION__ = "handle_io"
- #32 0x0000aaaab1b13ae0 in io_wait_loop_epoll (h=0xaaaab1c875a0 <_worker_io>, t=1, repeat=0) at net/../io_wait_loop.h:305
- ret = 1
- n = 1
- r = 0
- i = -1313772316
- e = 0xffff966ce328
- ep_event = {events = 2979075268, data = {ptr = 0xffffca119a50, fd = -904816048, u32 = 3390151248, u64 = 281474071894608}}
- fd = 43690
- curr_time = 11
- __FUNCTION__ = "io_wait_loop_epoll"
- #33 0x0000aaaab1b16d7c in udp_start_processes (chd_rank=0xaaaab1c868c0 <chd_rank>, startup_done=0x0) at net/net_udp.c:547
- si = 0xffff9667a450
- sif = 0xffff9667a450
- p_id = 0
- i = 2
- p = 1
- ifp_udp_rcv = {proc_desc = 0xaaaab1bff3d0 "UDP receiver", flags = 4, type = TYPE_UDP}
- __FUNCTION__ = "udp_start_processes"
- #34 0x0000aaaab1910bb8 in main_loop () at main.c:284
- chd_rank = 3
- startup_done = 0x0
- last_check = 0
- rc = 43690
- profiling_handler = {desc = 0xaaaab1b5f480 "_ProfilerStart_child()", post_fork = {in_child = 0xaaaab19105e4 <_ProfilerStart_child>, in_parent = 0xaaaab19105f8 <_ProfilerStart_parent>}, _next = 0x0}
- __FUNCTION__ = "main_loop"
- #35 0x0000aaaab19147c4 in main (argc=13, argv=0xffffca119db8) at main.c:888
- c = -1
- n = 26
- tmp = 0xffffca11ae8a ""
- tmp_len = 65535
- port = -904815176
- proto = 65535
- protos_no = 2
- options = 0xaaaab1b5ce10 "A:f:cCm:M:b:l:n:N:rRvdDFEVhw:t:u:g:p:P:G:W:o:a:k:s:"
- ret = -1
- seed = 4252529017
- rfd = 3
- procs_no = -904815552
- __FUNCTION__ = "main"
Advertisement
Add Comment
Please, Sign In to add comment