## gdb bt #0 0x0000000000000000 in ?? () #1 0x00007f1426c9f5d1 in jsonrpc_send (ctx=0x7f1426ec88e0 <_jsonrpc_ctx>) at jsonrpcs_mod.c:395 #2 0x00007f1426ca9d11 in jsonrpc_dispatch (msg=0x7ffdd76deda0, s1=0x0, s2=0x0) at jsonrpcs_mod.c:1228 #3 0x000000000045b2fc in do_action (h=0x7ffdd76decc0, a=0x7f143b6d2800, msg=0x7ffdd76deda0) at core/action.c:1054 #4 0x000000000046792c in run_actions (h=0x7ffdd76decc0, a=0x7f143b6d2800, msg=0x7ffdd76deda0) at core/action.c:1552 #5 0x000000000045b2be in do_action (h=0x7ffdd76decc0, a=0x7f143b6d2950, msg=0x7ffdd76deda0) at core/action.c:1049 #6 0x000000000046792c in run_actions (h=0x7ffdd76decc0, a=0x7f143b6d2950, msg=0x7ffdd76deda0) at core/action.c:1552 #7 0x000000000045b268 in do_action (h=0x7ffdd76decc0, a=0x7f143b6d2dc0, msg=0x7ffdd76deda0) at core/action.c:1045 #8 0x000000000046792c in run_actions (h=0x7ffdd76decc0, a=0x7f143b6ceb58, msg=0x7ffdd76deda0) at core/action.c:1552 #9 0x00007f141ce3621b in xhttp_process_request (orig_msg=0x7f143b70f648, new_buf=0x7f143b6cde80 "POST /RPC HTTP/1.1\r\nVia: SIP/2.0/TCP 127.0.0.1:59896\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341"..., new_len=577) at xhttp_mod.c:282 #10 0x00007f141ce37352 in xhttp_handler (msg=0x7f143b70f648) at xhttp_mod.c:357 #11 0x00000000005117d1 in nonsip_msg_run_hooks (msg=0x7f143b70f648) at core/nonsip_hooks.c:111 #12 0x0000000000562902 in receive_msg ( buf=0x23ea6d0 "POST /RPC HTTP/1.1\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341\r\nContent-Type: application/json\r\n"..., len=543, rcv_info=0x7f142dddd540) at core/receive.c:202 #13 0x00000000005fddfa in receive_tcp_msg ( tcpbuf=0x7f142dddd818 "POST /RPC HTTP/1.1\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341\r\nContent-Type: application/json\r\n"..., len=543, rcv_info=0x7f142dddd540, con=0x7f142dddd528) at core/tcp_read.c:1277 #14 0x00000000005ffd06 in tcp_read_req (con=0x7f142dddd528, bytes_read=0x7ffdd76df9bc, read_flags=0x7ffdd76df9b8) at core/tcp_read.c:1445 #15 0x00000000006028a1 in handle_io (fm=0x7f143b8535a8, events=1, idx=-1) at core/tcp_read.c:1619 #16 0x00000000005f4e9c in io_wait_loop_epoll (h=0xa85020 , t=2, repeat=0) at core/io_wait.h:1065 #17 0x00000000006046e4 in tcp_receive_loop (unix_sock=39) at core/tcp_read.c:1789 #18 0x00000000004dea9f in tcp_init_children () at core/tcp_main.c:4796 #19 0x00000000004231db in main_loop () at main.c:1708 #20 0x00000000004297a8 in main (argc=7, argv=0x7ffdd76e0018) at main.c:2639 ## gdb bt full #0 0x0000000000000000 in ?? () No symbol table info available. #1 0x00007f1426c9f5d1 in jsonrpc_send (ctx=0x7f1426ec88e0 <_jsonrpc_ctx>) at jsonrpcs_mod.c:395 nj = 0x2402ed0 i = 1 rbuf = {s = 0x2406360 "{\n\t\"jsonrpc\":\t\"2.0\",\n\t\"result\":\t{\n\t},\n\t\"id\":\t1\n}", len = 48} __func__ = "jsonrpc_send" #2 0x00007f1426ca9d11 in jsonrpc_dispatch (msg=0x7ffdd76deda0, s1=0x0, s2=0x0) at jsonrpcs_mod.c:1228 rpce = 0x7f143b4606d0 ctx = 0x7f1426ec88e0 <_jsonrpc_ctx> ret = 0 nj = 0x24028f0 val = {s = 0x23fe850 "tm.t_uac_start", len = 14} __func__ = "jsonrpc_dispatch" #3 0x000000000045b2fc in do_action (h=0x7ffdd76decc0, a=0x7f143b6d2800, msg=0x7ffdd76deda0) at core/action.c:1054 ret = -5 v = 997001520 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000p\335m\327\375\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "p\335m\327\375\177\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "p\335m\327\375\177\000\000yh^\000\000\000\000", __u6_addr16 = {56688, 55149, 32765, 0, 26745, 94, 0, 0}, __u6_addr32 = {3614301552, 32765, 6187129, 0}}}, sin6_scope_id = 0}}, id = 3, proto = -96 '\240', send_flags = {f = 237 '\355', blst_imask = 109 'm'}} tmp = 0x7ffdd76decc0 "\003" new_uri = 0x7ffdd76de100 "\320\346m\327\375\177" end = 0x0 crt = 0x7ffdd76deda0 "%" cmd = 0x7f143b45dc30 len = 32765 user = -680664160 uri = {user = {s = 0x7f1422a02d88 "=", len = 580922760}, passwd = {s = 0x4177e0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200Wr", len = -680656880}, host = {s = 0x0, len = 0}, port = { s = 0x7ffdd76ddc30 "p\334m\327\375\177", len = 637797501}, params = {s = 0x259023ea6f6 , len = 10}, sip_params = { s = 0x23ea88e "pe: text/plain; charset=utf-8\\r\\n\", \"Yup, it sure does \\ud83d\\udc4c\"], \"jsonrpc\": \"2.0\", \"id\": 1}", len = 997258824}, headers = {s = 0x7f1422c19620 "Ԭ\237\"\024\177", len = 583112640}, port_no = 30688, proto = 65, type = 8, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 4294967292), transport = {s = 0x0, len = 6638142}, ttl = { s = 0x7f1422c196a0 "(\255\237\"\024\177", len = 583112480}, user_param = {s = 0x7f1422c197a0 "ŭ\237\"\024\177", len = 583112688}, maddr = {s = 0x7ffdd76ddc80 "\260\334m\327\375\177", len = 643231191}, method = {s = 0x7ffdd76ddc70 "\260\334m\327\375\177", len = 0}, lr = {s = 0x800000 "\310s", len = 4466640}, r2 = {s = 0x7f1422c19610 "ͬ\237\"\024\177", len = 583112192}, gr = { s = 0x7f1422c19690 "\"\255\237\"\024\177", len = 6638142}, transport_val = {s = 0x7ffdd76ddcb0 "", len = 994045968}, ttl_val = {s = 0x7ffdd76ddcb0 "", len = 994045968}, user_param_val = { s = 0x7ffdd76ddcf0 "", len = 643231191}, maddr_val = {s = 0x7ffdd76ddd60 "", len = 0}, method_val = {s = 0x800000 "\310s", len = 4466616}, lr_val = {s = 0x243ee8 , len = 3921992}, r2_val = {s = 0x44b1b8 "s", len = 769512744}, gr_val = {s = 0x4177e0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200Wr", len = -680656880}} next_hop = {user = {s = 0x7f143b749dd4 "hmessinaa.1489195588.1071.3.0", len = 8}, passwd = {s = 0x4 , len = 640927232}, host = {s = 0x7f1429869670 "presence\300\300\300\300", len = 8}, port = {s = 0x4 , len = 1}, params = {s = 0x7f143b749ddc "a.1489195588.1071.3.0", len = 21}, sip_params = {s = 0xa835a0 "", len = 769541896}, headers = { s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 769920808), transport = {s = 0x0, len = 0}, ttl = {s = 0x4177e0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200Wr", len = -680656880}, user_param = {s = 0x0, len = 769512744}, maddr = {s = 0x4177e0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200Wr", len = -680656880}, method = {s = 0x0, len = 0}, lr = { s = 0x7ffdd76ddd00 "p\335m\327\375\177", len = 6180517}, r2 = {s = 0x7f143b70f848 "\002", len = -680661600}, gr = {s = 0x7f143b6d0930 "\002", len = -680661824}, transport_val = {s = 0x7f142de3fec0 "$", len = 770168776}, ttl_val = {s = 0x4177e0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200Wr", len = -680656880}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x7ffdd76ddba0 "0\334m\327\375\177", len = 637786151}, method_val = {s = 0x7ffdd76ddb60 "\210-\240\"\024\177", len = 637719127}, lr_val = {s = 0x7f143b70f648 "%", len = 769541672}, r2_val = {s = 0x7f143b7496e8 "\f", len = 37660814}, gr_val = {s = 0x7f1422a02d88 "=", len = 580922760}} u = 0x7f143b6d09c8 port = 0 dst_host = 0x0 i = 21 flags = 0 avp = 0x7f143b6077b8 st = {flags = 4, id = 0, name = {n = 637720475, s = {s = 0x7f142602d79b "\270\001", len = 997498312}, re = 0x7f142602d79b }, avp = 0xc} sct = 0x0 sjt = 0x7ffdd76e0010 rve = 0x7ffdd76dded0 mct = 0x4177e0 <_start> rv = 0x0 rv1 = 0xff005e2240 c1 = {cache_type = 37660451, val_type = RV_NONE, c = {avp_val = {n = 46, s = {s = 0x10000002e , len = 0}, re = 0x10000002e}, pval = {rs = { s = 0x10000002e , len = 0}, ri = 770168776, flags = 32532}}, i2s = "\340wA\000\000\000\000\000\020\000n\327\375\177\000\000\000\000\000\000\000"} s = {s = 0x7ffdd76defa0 "\002", len = 2} srevp = {0x7ffdd76deda0, 0x7f143b6d0950} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #4 0x000000000046792c in run_actions (h=0x7ffdd76decc0, a=0x7f143b6d2800, msg=0x7ffdd76deda0) at core/action.c:1552 t = 0x7f143b6d2800 ret = -1 ---Type to continue, or q to quit--- mod = 0x64c8df ms = 0 __func__ = "run_actions" #5 0x000000000045b2be in do_action (h=0x7ffdd76decc0, a=0x7f143b6d2950, msg=0x7ffdd76deda0) at core/action.c:1049 ret = 1 v = 0 dst = {send_sock = 0x733a70 <__func__.7386>, to = {s = {sa_family = 46353, sa_data = "r\000\000\000\000\000\370\235l;\024\177\000"}, sin = {sin_family = 46353, sin_port = 114, sin_addr = {s_addr = 0}, sin_zero = "\370\235l;\024\177\000"}, sin6 = {sin6_family = 46353, sin6_port = 114, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\370\235l;\024\177\000\000\020\360?;\024\177\000", __u6_addr16 = {40440, 15212, 32532, 0, 61456, 15167, 32532, 0}, __u6_addr32 = {996974072, 32532, 994045968, 32532}}}, sin6_scope_id = 3614303344}}, id = 32765, proto = -32 '\340', send_flags = {f = 119 'w', blst_imask = 65 'A'}} tmp = 0x7ffdd76decc0 "\003" new_uri = 0x7ffdd76de4d0 "" end = 0x0 crt = 0x7ffdd76deda0 "%" cmd = 0x0 len = 32765 user = -680662496 uri = {user = {s = 0x7f143b6ca145 "", len = 1}, passwd = {s = 0x13c43b500000 , len = 0}, host = {s = 0x7f143b70f648 "%", len = -680659792}, port = {s = 0x0, len = 770168776}, params = {s = 0x4177e0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\200Wr", len = -680656880}, sip_params = {s = 0x0, len = 770168776}, headers = {s = 0x7f143b6ca146 "/RPC", len = 37742592}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x500000004 , len = 6638142}, user_param = { s = 0x7ffdd76de2d0 "", len = 994045968}, maddr = {s = 0x0, len = 994045968}, method = {s = 0x7ffdd76de310 "@\343m\327\375\177", len = 643231191}, lr = {s = 0x23cd0c0 "\320\331<\002", len = 0}, r2 = {s = 0x800000 "\310s", len = 4467720}, gr = {s = 0x243a98 , len = 3920888}, transport_val = {s = 0x44b1b8 "s", len = 8}, ttl_val = { s = 0x191e , len = 0}, user_param_val = {s = 0x7ffdd76de340 "\020\344m\327\375\177", len = 4820525}, maddr_val = {s = 0x0, len = 994070336}, method_val = { s = 0xd900000000 , len = 995776904}, lr_val = {s = 0x7ffdd76de410 "p\344m\327\375\177", len = 6612619}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x72b480 "core", len = 1003391895}} next_hop = {user = {s = 0x0, len = -680677360}, passwd = {s = 0x24026b0 "\005", len = -680677384}, host = {s = 0x5 , len = -680677408}, port = {s = 0x7ffdd76dafe8 "p'@\002", len = -680677392}, params = {s = 0x0, len = 37758640}, sip_params = {s = 0x2402770 "\006", len = 0}, headers = {s = 0x5 , len = 37540032}, port_no = 4, proto = 0, type = ERROR_URI_T, flags = (unknown: 1002988220), transport = {s = 0x0, len = 0}, ttl = {s = 0x7ffdd76de6d0 "\200\347m\327\375\177", len = 37758640}, user_param = {s = 0x0, len = 37758640}, maddr = {s = 0x2402770 "\006", len = 0}, method = {s = 0x5 , len = 1003366130}, lr = {s = 0x7ffdd76de250 "F\241l;\024\177", len = 0}, r2 = {s = 0x7 , len = 4}, gr = { s = 0x400000000 , len = -680664564}, transport_val = {s = 0x13c400000000 , len = 37540032}, ttl_val = { s = 0x7ffdd76de208 "", len = 997459112}, user_param_val = {s = 0x7ffdd76de220 "", len = 0}, maddr_val = {s = 0x7f143b6ca146 "/RPC", len = -680664560}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x23ccfb0 "", len = 4}, r2_val = {s = 0x0, len = 2}, gr_val = {s = 0x100000000 , len = -680664568}} u = 0x7f143b6d00e8 port = 0 dst_host = 0x0 i = -680656880 flags = 32765 avp = 0x4177e0 <_start> st = {flags = 3614302304, id = 0, name = {n = -680677392, s = {s = 0x7ffdd76daff0 "p'@\002", len = -680664884}, re = 0x7ffdd76daff0}, avp = 0x7ffdd76dc010} sct = 0x7f143b6cde85 sjt = 0x7f143b6c9dc0 rve = 0x7f143b6d09c8 mct = 0x6c8 rv = 0x7ffdd76dafe8 rv1 = 0x7f142de7d7c8 c1 = {cache_type = 3614302256, val_type = 32765, c = {avp_val = {n = 4373046, s = {s = 0x42ba36 "H\211E\360H\203", , len = 4290528}, re = 0x42ba36 }, pval = { rs = {s = 0x42ba36 "H\211E\360H\203", , len = 4290528}, ri = 1003344360, flags = 32532}}, i2s = "\020\300m\327\375\177\000\000\000\000\000\000\000\000\000\000\360\257m\327\375\177"} s = {s = 0x0, len = 0} srevp = {0x4177e0 <_start>, 0x7ffdd76e0010} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x000000000046792c in run_actions (h=0x7ffdd76decc0, a=0x7f143b6d2950, msg=0x7ffdd76deda0) at core/action.c:1552 t = 0x7f143b6d2950 ret = -1 mod = 0x7ffdd76e0010 ms = 0 __func__ = "run_actions" #7 0x000000000045b268 in do_action (h=0x7ffdd76decc0, a=0x7f143b6d2dc0, msg=0x7ffdd76deda0) at core/action.c:1045 ret = 1 v = 1 dst = {send_sock = 0x7ffdd76dea50, to = {s = {sa_family = 54568, sa_data = "\335-\024\177\000\000\340wA\000\000\000\000"}, sin = {sin_family = 54568, sin_port = 11741, sin_addr = {s_addr = 32532}, sin_zero = "\340wA\000\000\000\000"}, sin6 = {sin6_family = 54568, sin6_port = 11741, sin6_flowinfo = 32532, sin6_addr = {__in6_u = {__u6_addr8 = "\340wA\000\000\000\000\000\020\000n\327\375\177\000", __u6_addr16 = { 30688, 65, 0, 0, 16, 55150, 32765, 0}, __u6_addr32 = {4290528, 0, 3614310416, 32765}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} tmp = 0x7f142dddd528 "*" new_uri = 0x7f143b6e7ea8 "\001" end = 0x7f143b746c70 "\300" ---Type to continue, or q to quit--- crt = 0x7c6820 <__func__.6510> "parse_headers" cmd = 0x40 len = 32532 user = 996990646 uri = {user = {s = 0x400242990 , len = 996990644}, passwd = { s = 0x7f143b6cdeb4 "\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341\r\nContent-Type: application/json\r\n\r\n{\"method\": \"tm.t"..., len = 5}, host = {s = 0x7ffdd76dea20 "\001", len = 6794019}, port = {s = 0x3 , len = 3}, params = {s = 0x0, len = 997097128}, sip_params = {s = 0x7f143b6ce0c1 "", len = 996990617}, headers = {s = 0x7f143b6e7ea8 "\001", len = 994045968}, port_no = 59712, proto = 1285, type = 32765, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 643231188), transport = { s = 0x23ea88e "pe: text/plain; charset=utf-8\\r\\n\", \"Yup, it sure does \\ud83d\\udc4c\"], \"jsonrpc\": \"2.0\", \"id\": 1}", len = 0}, ttl = {s = 0x800000 "\310s", len = 4467720}, user_param = { s = 0x243a98 , len = 3920888}, maddr = {s = 0x44b1b8 "s", len = 8}, method = {s = 0x191e , len = 994045968}, lr = {s = 0x7ffdd76de970 " \352m\327\375\177", len = 4820525}, r2 = {s = 0x0, len = 8014304}, gr = {s = 0x7ffdd76dea20 "\001", len = 6605023}, transport_val = {s = 0x7ffdd76dea20 "\001", len = 6606070}, ttl_val = { s = 0x242fe0 , len = 3918144}, user_param_val = {s = 0x7c38d0 "core", len = 8}, maddr_val = {s = 0x7c6810 <__func__.6417> "get_hdr_field", len = 8142168}, method_val = { s = 0xe8 , len = 994045968}, lr_val = {s = 0x0, len = 1}, r2_val = {s = 0x7f143b6e7ea8 "\001", len = 997097072}, gr_val = {s = 0x0, len = 996990646}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffdd76de780 "P\355m\327\375\177", len = 997258824}, host = {s = 0x7f143b507170 "(\005", len = -680659792}, port = {s = 0x0, len = 997258824}, params = {s = 0x0, len = 1}, sip_params = {s = 0x13b4e1510 , len = 0}, headers = {s = 0x1 , len = 770168776}, port_no = 30688, proto = 65, type = ERROR_URI_T, flags = (unknown: 3614310416), transport = {s = 0x0, len = 0}, ttl = {s = 0x7ffdd76ded50 "\300", len = 4537338}, user_param = {s = 0x7ffdd76dec64 "\375\177", len = 0}, maddr = { s = 0xffffffffffffffff , len = 0}, method = {s = 0x0, len = 997258824}, lr = {s = 0x7f143b5086d0 ".\005", len = -680659792}, r2 = { s = 0x7ffdd76de880 "\264\336l;\024\177", len = 1002953566}, gr = {s = 0xd68 , len = 8}, transport_val = {s = 0x7f143bd8b51c "%d]", len = 6638142}, ttl_val = { s = 0x7ffdd76de840 "\240\350m\327\375\177", len = 994045968}, user_param_val = {s = 0x7ffdd76deda8 "", len = 6638142}, maddr_val = {s = 0x7ffdd76de860 "", len = 994045968}, method_val = {s = 0x7ffdd76dedb8 "", len = 994045968}, lr_val = {s = 0x7ffdd76de8a0 "\003", len = 643231191}, r2_val = {s = 0x242d18 , len = -680662820}, gr_val = { s = 0x500800000 , len = 996990639}} u = 0x0 port = 0 dst_host = 0x7ffdd76deda0 i = 996991169 flags = 32765 avp = 0x7f143b746ca8 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = -680663168}, re = 0x0}, avp = 0x46792c } sct = 0x7f143b6ce0c1 sjt = 0x7f143b746ca8 rve = 0x7f143b6d00e8 mct = 0x7ffdd76dea80 rv = 0x7ffdd76e0010 rv1 = 0x7f143b6cdeb6 c1 = {cache_type = 995125592, val_type = 32532, c = {avp_val = {n = -680662128, s = {s = 0x7ffdd76deb90 "", len = 997258824}, re = 0x7ffdd76deb90}, pval = {rs = {s = 0x7ffdd76deb90 "", len = 997258824}, ri = -680659792, flags = 32765}}, i2s = "\350\263K;\024\177\000\000\310\327\347-\024\177\000\000\340wA\000\000"} s = {s = 0x0, len = 0} srevp = {0x7f143b497850, 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #8 0x000000000046792c in run_actions (h=0x7ffdd76decc0, a=0x7f143b6ceb58, msg=0x7ffdd76deda0) at core/action.c:1552 t = 0x7f143b6d2dc0 ret = 1 mod = 0x0 ms = 0 __func__ = "run_actions" #9 0x00007f141ce3621b in xhttp_process_request (orig_msg=0x7f143b70f648, new_buf=0x7f143b6cde80 "POST /RPC HTTP/1.1\r\nVia: SIP/2.0/TCP 127.0.0.1:59896\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341"..., new_len=577) at xhttp_mod.c:282 ret = 0 tmp_msg = {id = 37, pid = 0, tval = {tv_sec = 0, tv_usec = 0}, fwd_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, rpl_send_flags = {f = 3 '\003', blst_imask = 0 '\000'}, first_line = {type = 1, flags = 2, len = 20, u = { request = {method = { s = 0x7f143b6cde80 "POST /RPC HTTP/1.1\r\nVia: SIP/2.0/TCP 127.0.0.1:59896\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341"..., len = 4}, uri = { s = 0x7f143b6cde85 "/RPC HTTP/1.1\r\nVia: SIP/2.0/TCP 127.0.0.1:59896\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341\r\nCon"..., len = 4}, version = { s = 0x7f143b6cde8a "HTTP/1.1\r\nVia: SIP/2.0/TCP 127.0.0.1:59896\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341\r\nContent-"..., len = 8}, method_value = 16384}, reply = {version = { s = 0x7f143b6cde80 "POST /RPC HTTP/1.1\r\nVia: SIP/2.0/TCP 127.0.0.1:59896\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341"..., len = 4}, status = { s = 0x7f143b6cde85 "/RPC HTTP/1.1\r\nVia: SIP/2.0/TCP 127.0.0.1:59896\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341\r\nCon"..., len = 4}, reason = { s = 0x7f143b6cde8a "HTTP/1.1\r\nVia: SIP/2.0/TCP 127.0.0.1:59896\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341\r\nContent-"..., len = 8}, statuscode = 16384}}}, via1 = 0x7f143b6e7ea8, via2 = 0x0, headers = 0x7f143b746ca8, last_header = 0x7f143b749d68, parsed_flag = 18446744073709551615, h_via1 = 0x7f143b746ca8, h_via2 = 0x0, callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x7f143b749d68, content_length = 0x7f143b7496e8, authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x7f143b746fe8, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x7f143b747808, ---Type to continue, or q to quit--- server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, min_expires = 0x0, body = 0x0, eoh = 0x7f143b6cdf6a "\r\n{\"method\": \"tm.t_uac_start\", \"params\": [\"MESSAGE\", \"sip:amessina@messinet.com\", \"sip:127.0.0.1:5060\", \".\", \"From: \\r\\nTo: \\r\\nMax-Forwards: "..., unparsed = 0x7f143b6cdf6a "\r\n{\"method\": \"tm.t_uac_start\", \"params\": [\"MESSAGE\", \"sip:amessina@messinet.com\", \"sip:127.0.0.1:5060\", \".\", \"From: \\r\\nTo: \\r\\nMax-Forwards: "..., rcv = {src_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0, 0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0}, addr = "\177\000\000\001", '\000' }}, dst_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0, 0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0}, addr = "\177\000\000\001", '\000' }}, src_port = 59896, dst_port = 5060, proto_reserved1 = 21, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\351\370\177\000\000\001\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 63721, sin_addr = {s_addr = 16777343}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 63721, sin6_flowinfo = 16777343, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\377\377\377\377\001\000\000", __u6_addr16 = {0, 0, 0, 0, 65535, 65535, 1, 0}, __u6_addr32 = {0, 0, 4294967295, 1}}}, sin6_scope_id = 770151536}}, bind_address = 0x7f143b458408, proto = 2 '\002'}, buf = 0x7f143b6cde80 "POST /RPC HTTP/1.1\r\nVia: SIP/2.0/TCP 127.0.0.1:59896\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341"..., len = 577, new_uri = {s = 0x0, len = 0}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = { s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = '\000' , add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 0, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, path_vec = { s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' }}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' }}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' }, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' , __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 0 '\000'}}}} msg = 0x7ffdd76deda0 ra_ctx = {rec_lev = 3, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {139724645586216, -8203280414701836900, 4290528, 140728217763856, 0, 0, -8203280414747974244, 8202103562574964124}, __mask_was_saved = 0, __saved_mask = {__val = {139724414005533, 140728217760960, 140728217759264, 140728217759296, 86902003499, 2, 139724870119440, 192, 139724873572880, 4290528, 139724645586216, 4290528, 140728217763856, 0, 0, 140728217759168}}}}} __func__ = "xhttp_process_request" #10 0x00007f141ce37352 in xhttp_handler (msg=0x7f143b70f648) at xhttp_mod.c:357 ret = 0 fake_msg = 0x7f143b6cde80 "POST /RPC HTTP/1.1\r\nVia: SIP/2.0/TCP 127.0.0.1:59896\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341"... fake_msg_len = 577 pmatch = {rm_so = 7785552, rm_eo = 0} c = 32 ' ' __func__ = "xhttp_handler" #11 0x00000000005117d1 in nonsip_msg_run_hooks (msg=0x7f143b70f648) at core/nonsip_hooks.c:111 r = 1 ret = 1 #12 0x0000000000562902 in receive_msg ( buf=0x23ea6d0 "POST /RPC HTTP/1.1\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341\r\nContent-Type: application/json\r\n"..., len=543, rcv_info=0x7f142dddd540) at core/receive.c:202 msg = 0x7f143b70f648 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140728217761632, 6254673, 139724645586216, 77309427711, 59448882964, 139724645586216, 139724645586968, 2332167242271}, __mask_was_saved = 131073, __saved_mask = {__val = {139724645586968, 4, 139724645586973, 4, 139724645586978, 8, 16384, 4290528, 139724645731280, 2083059138560, 16383, 140728217762232, 139724645586216, 139724867883958, 18446744069414584863, 0}}}}} bctx = 0x4177e0 <_start> ret = 32532 stats_on = 0 tvb = {tv_sec = 7934273, tv_usec = 140724603453445} tve = {tv_sec = 7934273, tv_usec = 140728217761424} tz = {tz_minuteswest = 1006370819, tz_dsttime = 18} diff = 0 inb = { s = 0x23ea6d0 "POST /RPC HTTP/1.1\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341\r\nContent-Type: application/json\r\n"..., len = 543} netinfo = {data = {s = 0x7ffdd76df700 "\270\371m\327\375\177", len = 4987481}, dst = 0x7f142dddd822, rcv = 0x7f142dddd81d} keng = 0x0 __func__ = "receive_msg" #13 0x00000000005fddfa in receive_tcp_msg ( tcpbuf=0x7f142dddd818 "POST /RPC HTTP/1.1\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341\r\nContent-Type: application/json\r\n"..., len=543, rcv_info=0x7f142dddd540, con=0x7f142dddd528) at core/tcp_read.c:1277 buf = 0x23ea6d0 "POST /RPC HTTP/1.1\r\nHost: 127.0.0.1:5060\r\nConnection: keep-alive\r\nUser-Agent: python-requests/2.10.0\r\nAccept-Encoding: gzip, deflate\r\nAccept: */*\r\nContent-Length: 341\r\nContent-Type: application/json\r\n"... bsize = 65535 blen = 65535 __func__ = "receive_tcp_msg" #14 0x00000000005ffd06 in tcp_read_req (con=0x7f142dddd528, bytes_read=0x7ffdd76df9bc, read_flags=0x7ffdd76df9b8) at core/tcp_read.c:1445 bytes = 543 ---Type to continue, or q to quit--- total_bytes = 543 resp = 1 size = 140728217761904 req = 0x7f142dddd5a8 dst = {send_sock = 0x7ffdd76df9b0, to = {s = {sa_family = 8, sa_data = '\000' }, sin = {sin_family = 8, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 8, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' , __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 3614308480}}, id = 32765, proto = 1 '\001', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} c = 58 ':' ret = -1 __func__ = "tcp_read_req" #15 0x00000000006028a1 in handle_io (fm=0x7f143b8535a8, events=1, idx=-1) at core/tcp_read.c:1619 ret = 8 n = 8 read_flags = 1 con = 0x7f142dddd528 s = 18 resp = 1 t = 1789911478 __func__ = "handle_io" #16 0x00000000005f4e9c in io_wait_loop_epoll (h=0xa85020 , t=2, repeat=0) at core/io_wait.h:1065 n = 1 r = 0 fm = 0x7f143b8535a8 revents = 1 __func__ = "io_wait_loop_epoll" #17 0x00000000006046e4 in tcp_receive_loop (unix_sock=39) at core/tcp_read.c:1789 __func__ = "tcp_receive_loop" #18 0x00000000004dea9f in tcp_init_children () at core/tcp_main.c:4796 r = 0 i = 1 reader_fd_1 = 39 pid = 0 si_desc = "tcp receiver (generic)\000\000h\235\\h\000\000\000\000\340wA\000\000\000\000\000\020\000n\327\375\177", '\000' , "\374m\327\375\177\000\000\340\273Q\000\000\000\000\000\061\"x\000\000\000\000\000\001\000\000\000\000\000\000\000\307\177r\000\000\000\000\000@\346G;\024\177\000\000\030\000\000\000\031\000\000\000h\235\\h\000\000\000" si = 0x0 __func__ = "tcp_init_children" #19 0x00000000004231db in main_loop () at main.c:1708 i = 2 pid = 1062 si = 0x0 si_desc = "udp receiver child=1 sock=[2601:240:C800:900:0:0:0:3]:5060\000:\024\177\000\000\260\374m\327\375\177\000\000Hu\267)\024\177\000\000`N\035;\024\177\000\000`\234m;\024\177\000\000\340\035\035;\024\177\000\000\003\000\000\000\001\000\000\000\000\375m\327\375\177\000\000\251_e\000\000\000\000" nrprocs = 2 woneinit = 1 __func__ = "main_loop" #20 0x00000000004297a8 in main (argc=7, argv=0x7ffdd76e0018) at main.c:2639 cfg_stream = 0x2160010 c = -1 r = 0 tmp = 0x7ffdd76e1f02 "" tmp_len = 32532 port = 1012975296 proto = 0 options = 0x728a90 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 2661379742 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x1 p = 0xf0b2ff st = {st_dev = 21, st_ino = 23353, st_nlink = 2, st_mode = 16872, st_uid = 986, st_gid = 983, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1488666221, tv_nsec = 514687562}, st_mtim = {tv_sec = 1489195558, tv_nsec = 338164671}, st_ctim = {tv_sec = 1489195558, tv_nsec = 338164671}, __glibc_reserved = {0, 0, 0}} __func__ = "main"