### Description We upgrade Kamailio from V5.6.5 to V5.8.2 . When call out , out of credit and drop calls. Kamailio v5.8.2 crashed . We think our system not enough memory so we up to memory but the same issue. Anyone met this issue , please help us. Thanks
Our system : - OS: Centos 9 stream - Kamailo vesion 5.8.2
#### Reproduction
#### Debugging Data
<Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007f0f1f38902c in __delete_call (call=0x7f0f207d4d90, credit_data=0x7f0f203d42e0) at cnxcc_mod.c:879 879 clist_rm(call, next, prev); Missing separate debuginfos, use: dnf debuginfo-install MariaDB-shared-10.5.25-1.el9.x86_64 hiredis-1.0.2-2.el9.x86_64 (gdb) bt full #0 0x00007f0f1f38902c in __delete_call (call=0x7f0f207d4d90, credit_data=0x7f0f203d42e0) at cnxcc_mod.c:879 __func__ = "__delete_call" #1 0x00007f0f1f383f27 in __stop_billing (callid=0x7f0f207d7378) at cnxcc_mod.c:643 cd_entry = 0x7f0f204f8360 call = 0x7f0f207d4d90 hts = 0x7f0f1f3bf910 <_data+48> credit_data = 0x7f0f203d42e0 __func__ = "__stop_billing" #2 0x00007f0f1f381928 in __dialog_terminated_callback (cell=0x7f0f207d7300, type=64, _params=0x7f0f1f7a8800 <params>) at cnxcc_mod.c:479 __func__ = "__dialog_terminated_callback" #3 0x00007f0f1f6f7490 in run_dlg_callbacks (type=64, dlg=0x7f0f207d7300, req=0x7f0f40eda090, rpl=0x0, dir=2, dlg_data=0x0) at dlg_cb.c:269 cb = 0x7f0f207d7860 __func__ = "run_dlg_callbacks" #4 0x00007f0f1f725c84 in dlg_terminated (req=0x7f0f40eda090, dlg=0x7f0f207d7300, dir=2) at dlg_handlers.c:404 iuid = 0x0 __func__ = "dlg_terminated" #5 0x00007f0f1f735844 in dlg_onroute (req=0x7f0f40eda090, route_params=0x7ffe01fc4a70, param=0x0) at dlg_handlers.c:1502 dlg = 0x7f0f207d7300 iuid = 0x7f0f20cfc690 val = {s = 0x9f4ae7 <buf+775> "2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 8} callid = { s = 0x9f4924 <buf+324> "3506e2a7-0fdc-123e-aebc-00505697ee23\r\nCSeq: 90509168 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE\r\nSupporte"..., len = 36} ftag = { s = 0x9f48ce <buf+238> "FF27yjy610cZS\r\nTo: "sipp" sip:0999999990@172.16.172.221;tag=BU30ZvQFDtgHS\r\nCall-ID: 3506e2a7-0fdc-123e-aebc-00505697ee23\r\nCSeq: 90509168 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL,"..., len = 13} ttag = { s = 0x9f490c <buf+300> "BU30ZvQFDtgHS\r\nCall-ID: 3506e2a7-0fdc-123e-aebc-00505697ee23\r\nCSeq: 90509168 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBL"..., len = 13} h_entry = 994 h_id = 10194 new_state = 5 old_state = 4 unref = 2 event = 7 timeout = 0 reset = 0 dir = 2 ret = 0 __func__ = "dlg_onroute" #6 0x00007f0f1fae7e88 in run_rr_callbacks (req=0x7f0f40eda090, rr_param=0x7ffe01fc4b30) at rr_cb.c:96 l_param = { s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 132} --Type <RET> for more, q to quit, c to continue without paging--c cbp = 0x7f0f40edfa10 __func__ = "run_rr_callbacks" #7 0x00007f0f1fad6e59 in after_loose (_m=0x7f0f40eda090, preloaded=0) at loose.c:1021 hdr = 0x7f0f40e08460 puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x9f4a56 <buf+630> "172.16.172.221:65000;lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 14}, port = { s = 0x9f4a65 <buf+645> "65000;lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 5}, params = { s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 132}, sip_params = { s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 132}, headers = {s = 0x0, len = 0}, port_no = 65000, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = { s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = { s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 2}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} rt = 0x7f0f40e08660 res = 1 status = 1 uri = { s = 0x9f4a52 <buf+626> "sip:172.16.172.221:65000;lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 157} uri_is_myself = 1 use_ob = 0 rparams = { s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 132} __func__ = "after_loose" #8 0x00007f0f1fad75e5 in loose_route_mode (_m=0x7f0f40eda090, _mode=0) at loose.c:1056 ret = 0 __func__ = "loose_route_mode" #9 0x00007f0f1fae9cfb in w_loose_route (msg=0x7f0f40eda090, p1=0x0, p2=0x0) at rr_mod.c:273 No locals. #10 0x0000000000443202 in do_action (h=0x7ffe01fc56e0, a=0x7f0f40e9d320, msg=0x7f0f40eda090) at core/action.c:1121 ret = -5 li = 0 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 86 times>, "\020\016\272@\017\177", '\000' <repeats 25 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x0 new_uri = 0x0 end = 0x0 crt = 0x0 cmd = 0x7f0f40b91310 len = 0 user = 0 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = { s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = { s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x0 port = 0 dst_host = 0x0 i = 0 flags = 0 avp = 0x7f0f40eda090 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x7ffe01fc5570 sjt = 0x7f0f40e9bdb0 rve = 0x0 mct = 0x0 rv = 0x0 rv1 = 0x7f0f40e65470 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = { s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #11 0x0000000000450a6d in run_actions (h=0x7ffe01fc56e0, a=0x7f0f40e9d320, msg=0x7f0f40eda090) at core/action.c:1618 t = 0x7f0f40e9d320 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 533967288 __func__ = "run_actions" #12 0x000000000045110f in run_actions_safe (h=0x7ffe01fc6b70, a=0x7f0f40e9d320, msg=0x7f0f40eda090) at core/action.c:1681 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, 7972416043526547515, 140728931744408, 4394786, 9616872, 139703624372224, 7972416043509770299, -7971453441872074693}, __mask_was_saved = 0, __saved_mask = { __val = {139702937259984, 0, 0, 140728931735408, 4294967296, 140728931744408, 4394786, 9616872, 139703624372224, 140728931735792, 6261792, 140728931735696, 139702934448925, 0, 140728931735836, 139703490298096}}}}} ret = 33315352 ign_on_break = 0 #13 0x00000000005f3e0c in rval_get_long (h=0x7ffe01fc6b70, msg=0x7f0f40eda090, i=0x7ffe01fc5f60, rv=0x7f0f40e9d488, cache=0x0) at core/rvalue.c:973 r_avp = 0x0 avp_val = {n = 9616872, s = {s = 0x92bde8 "\340\334A", len = 1223135232}, re = 0x92bde8} pval = {rs = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 33316704}, ri = 8623258264, flags = 533967288} tmp = {s = 0x0, len = 1} s = 0x0 r = 0 ret = 0 destroy_pval = 0 __func__ = "rval_get_long" #14 0x00000000005f8c20 in rval_expr_eval_long (h=0x7ffe01fc6b70, msg=0x7f0f40eda090, res=0x7ffe01fc5f60, rve=0x7f0f40e9d480) at core/rvalue.c:1854 i1 = 1 i2 = 140728931744408 ret = -1 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = { s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 20 times>, "\001"} c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 139703490551952, s = {s = 0x7f0f40eda090 "@", len = 0}, re = 0x7f0f40eda090}, pval = {rs = {s = 0x7f0f40eda090 "@", len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} rv1 = 0x7f0f1fcb3b77 <t_check_trans+249> rv2 = 0x7ffe01fc5a30 __func__ = "rval_expr_eval_long" #15 0x0000000000442c83 in do_action (h=0x7ffe01fc6b70, a=0x7f0f40ea0e60, msg=0x7f0f40eda090) at core/action.c:1097 ret = -5 li = 7972416043847411771 v = 0 dst = {send_sock = 0x7ffe01fc5ff0, to = {s = {sa_family = 15884, sa_data = "_", '\000' <repeats 12 times>}, sin = { sin_family = 15884, sin_port = 95, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 15884, sin6_port = 95, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 15884, __ss_padding = "_", '\000' <repeats 25 times>, "\377\377\377\377\000\000\000\000\000\000\000\000(^\346@\017\177\000\000\210b\374\001\376\177\000\000\220\240\355@\017\177\000\000pk\374\001\376\177\000\000轒\000\000\000\000\000\000\220\347H\017\177\000\0000`\374\001\376\177\000\000\017\021E\000\000\000\000\000\240`\374\001\376\177\000\000\220\240\355@\017\177\000", __ss_align = 139703490068560}}, id = 33319792, send_flags = {f = 32766, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x8000000 <error: Cannot access memory at address 0x8000000> new_uri = 0x7ffe01fc6160 "\b" end = 0x7f0f40ee3f60 "X-FS-Support" crt = 0x7f0f1fdcfaa6 <pkg_proc_update_stats+115> "H\213\r\203l" cmd = 0x7ffe01fc6120 len = 32766 user = 33317200 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = { s = 0xffffffff01fc7a98 <error: Cannot access memory at address 0xffffffff01fc7a98>, len = 0}, params = { s = 0x92bde8 "\340\334A", len = 0}, sip_params = {s = 0x7ffe01fc7a98 "?~\374\001\376\177", len = 4394786}, headers = { s = 0x92bde8 "\340\334A", len = 1223135232}, port_no = 24256, proto = 508, type = 32766, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0x45110c), transport = {s = 0x0, len = 1089314960}, ttl = { s = 0x7f0f40e65bd0 "\200\001", len = 33319792}, user_param = {s = 0x0, len = -1}, maddr = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -234461125}, method = { s = 0x7ffe01fc7a98 "?~\374\001\376\177", len = 4394786}, lr = {s = 0x92bde8 "\340\334A", len = 1223135232}, r2 = { s = 0x6ea3b626f106683b <error: Cannot access memory at address 0x6ea3b626f106683b>, len = 1168533563}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 5531605}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7ffe01fc62f0 "\200\003", len = 33317320}, maddr_val = {s = 0x7ffe01fc61cc "", len = 1088756432}, method_val = {s = 0x0, len = 33317872}, lr_val = { s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = -1}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = { s = 0x7ffe01fc7a98 "?~\374\001\376\177", len = 4394786}, sip_params = {s = 0x92bde8 "\340\334A", len = 1223135232}, headers = { s = 0x7ffe01fc5db0 "\300^\374\001\376\177", len = 4524653}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = { s = 0x0, len = 0}, ttl = {s = 0x0, len = 1089314960}, user_param = {s = 0x7f0f40e65bd0 "\200\001", len = 33316320}, maddr = { s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7f0f40b9f568 "~\365\216\037\017\177", len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7f0f409ff010 port = 0 dst_host = 0x92bde8 i = 1088720928 flags = 0 avp = 0x7f0f40e496c8 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x0 sjt = 0x0 rve = 0x7f0f40e9d480 mct = 0x7f0f40e65e20 rv = 0x0 rv1 = 0x7f0f40e68340 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = { s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = "\000\000\000\000\000\000\000\000h\365\271@\017\177\000\000\000\000\000\000\000"} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #16 0x0000000000450a6d in run_actions (h=0x7ffe01fc6b70, a=0x7f0f40e9d0d0, msg=0x7f0f40eda090) at core/action.c:1618 t = 0x7f0f40ea0e60 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 8725541, tz_dsttime = 0} tdiff = 1088848992 __func__ = "run_actions" #17 0x000000000043f70a in do_action (h=0x7ffe01fc6b70, a=0x7f0f40e696e0, msg=0x7f0f40eda090) at core/action.c:709 ret = -5 li = 16 v = 1 dst = {send_sock = 0x92bde8, to = {s = {sa_family = 36864, sa_data = "\347H\017\177\000\000@h\374\001\376\177\000"}, sin = { sin_family = 36864, sin_port = 18663, sin_addr = {s_addr = 32527}, sin_zero = "@h\374\001\376\177\000"}, sin6 = { sin6_family = 36864, sin6_port = 18663, sin6_flowinfo = 32527, sin6_addr = {__in6_u = { __u6_addr8 = "@h\374\001\376\177\000\000\361=t\000\000\000\000", __u6_addr16 = {26688, 508, 32766, 0, 15857, 116, 0, 0}, __u6_addr32 = {33318976, 32766, 7618033, 0}}}, sin6_scope_id = 28}, sas = {ss_family = 36864, __ss_padding = "\347H\017\177\000\000@h\374\001\376\177\000\000\361=t\000\000\000\000\000\034", '\000' <repeats 15 times>, "\377\377\377\377\377\377\377\377\220\240\355@\017\177\000\000轒\000\000\000\000\000\000\220\347H\017\177\000\000\320h\374\001\376\177\000\000H\ru\000\000\000\000\000\360g\374\001\376\177\000\000\246\372\334\037\017\177\000\000\000\000\000\000\000\000\000\000di\374\001\376\177\000", __ss_align = 134217728}}, id = 1086994592, send_flags = {f = 32527, blst_imask = 0}, proto = 21 '\025', proto_pad0 = 75 'K', proto_pad1 = 159} tmp = 0x7ffe01fc6a60 "\020k\374\001\376\177" new_uri = 0x7ffe01fc69f0 "" end = 0x4 <error: Cannot access memory at address 0x4> crt = 0x7f0f40eda090 "@" cmd = 0x7f0f40b9f0d0 len = 32527 user = 1089145792 uri = {user = {s = 0x7f0f40e08630 "", len = 0}, passwd = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 129248720}, host = {s = 0x3a5670 <error: Cannot access memory at address 0x3a5670>, len = 4969008}, port = { s = 0x57e920 <fork_tcp_process+5074> ";", len = 16}, params = {s = 0x4e <error: Cannot access memory at address 0x4e>, len = 7598071}, sip_params = {s = 0x7ffe01fc6630 "@g\374\001\376\177", len = 4978977}, headers = {s = 0x0, len = 1084226000}, port_no = 62544, proto = 16543, type = 19, flags = (unknown: 0x409ff9d0), transport = {s = 0x7ffe01fc6740 "@h\374\001\376\177", len = 7502474}, ttl = {s = 0x7ffe01fc6740 "@h\374\001\376\177", len = 7492948}, user_param = {s = 0x8bb92b "core", len = 7494079}, maddr = {s = 0x8bc708 <__func__.21> "parse_headers", len = 9157624}, method = {s = 0x7f0f40e085c0 "\220\001", len = 1084223504}, lr = {s = 0x8bc708 <__func__.21> "parse_headers", len = 9157624}, r2 = { s = 0x40 <error: Cannot access memory at address 0x40>, len = 1084223504}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x9f4b13 <buf+819> "\r\n", len = 0}, ttl_val = {s = 0x8be270 <__func__.3> "parse_to_param", len = 9168712}, user_param_val = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 1084223504}, maddr_val = {s = 0x7f0f40e08630 "", len = 1088455888}, method_val = {s = 0x0, len = 1084223504}, lr_val = { s = 0x130 <error: Cannot access memory at address 0x130>, len = 1088456064}, r2_val = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, gr_val = { s = 0x7ffe01fc7a98 "?~\374\001\376\177", len = 4394786}} next_hop = {user = {s = 0x4a <error: Cannot access memory at address 0x4a>, len = 10438703}, passwd = { s = 0x7 <error: Cannot access memory at address 0x7>, len = 8}, host = {s = 0x7f0f40cc6060 "\001", len = 0}, port = { s = 0x7f0f40e521c0 "\001", len = 1088827984}, params = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 1088758208}, sip_params = {s = 0x0, len = 1086993056}, headers = {s = 0x7f0f40e07b30 "\003", len = 1088454800}, port_no = 40176, proto = 16617, type = 32527, flags = 0, transport = {s = 0x7f0f40ca3db0 <incomplete sequence \353>, len = 0}, ttl = {s = 0x0, len = 0}, user_param = { s = 0x440e631a0 <error: Cannot access memory at address 0x440e631a0>, len = 9193958}, maddr = {s = 0x0, len = 0}, method = { s = 0x7ffe01fc65c0 "", len = 7807783}, lr = {s = 0x0, len = 0}, r2 = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1088455952}, gr = {s = 0x9f4b15 <buf+821> "", len = 10439410}, transport_val = {s = 0x0, len = 33318544}, ttl_val = { s = 0x9f4b15 <buf+821> "", len = 10439230}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x0, len = 7534444}, lr_val = {s = 0x7ffe01fc65c0 "", len = 1084223504}, r2_val = {s = 0x7f0f40e08630 "", len = 1084223504}, gr_val = {s = 0x7ffe01fc6600 "0f\374\001\376\177", len = 534575782}} u = 0x7ffe01fc6b90 port = 0 dst_host = 0x7f0f40e085c0 i = 41 flags = 0 avp = 0x7627ed <parse_cseq+2542> st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 65537}, re = 0x0}, avp = 0x9f47e0 <buf>} sct = 0x7f0f40eda090 sjt = 0x7f0f40eb0bc0 rve = 0x7f0f40e66660 mct = 0x7ffe01fc68f0 rv = 0x0 rv1 = 0x7ffe01fc6a10 c1 = {cache_type = 10504224, val_type = RV_NONE, c = {avp_val = {n = 10504232, s = {s = 0xa04828 <def_list+40> "", len = 1085943864}, re = 0xa04828 <def_list+40>}, pval = {rs = {s = 0xa04828 <def_list+40> "", len = 1085943864}, ri = 10504544, flags = 10504552}}, i2s = "\200\371\253\037\017\177\000\000p\371\253\037\017\177\000\000\020\362\253\037\017\177"} s = {s = 0xa04810 <def_list+16> "", len = 33320176} srevp = {0x7ffe01fc6c30, 0x7f0f1fa499ae <tps_msg_received+3364>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #18 0x0000000000450a6d in run_actions (h=0x7ffe01fc6b70, a=0x7f0f40e63e00, msg=0x7f0f40eda090) at core/action.c:1618 t = 0x7f0f40e696e0 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 1089314960, tz_dsttime = 32527} tdiff = 4394786 __func__ = "run_actions" #19 0x00000000004511d7 in run_top_route (a=0x7f0f40e63e00, msg=0x7f0f40eda090, c=0x0) at core/action.c:1701 ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, 7972416042383599675, 140728931744408, 4394786, 9616872, 139703624372224, 7972416042299713595, -7971453441872074693}, __mask_was_saved = 0, __saved_mask = { __val = {6379359, 4294967296, 139703490551952, 140728898420737, 4294967296, 140728931744408, 4394786, 9616872, 139703624372224, 140728931740736, 0, 4611686022722355200, 0, 139703490412128, 4294967296, 140728931744408}}}}} p = 0x7ffe01fc6b70 ret = 9616872 sfbk = 0 #20 0x00000000005ab16e in receive_msg ( buf=0x9f47e0 <buf> "BYE sip:gw+internal_sip_gw03@172.16.172.242:65000;transport=udp;gw=internal_sip_gw03 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bKX9Zm25Xe6316g\r\nMax-Forwards: 69\r\nFrom: <si"..., len=821, rcv_info=0x7ffe01fc7200) at core/receive.c:518 msg = 0x7f0f40eda090 ctx = {rec_lev = 0, run_flags = 2, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, 7972416042383599675, 140728931744408, 4394786, 9616872, 139703624372224, 7972416042299713595, -7971453441872074693}, __mask_was_saved = 0, __saved_mask = { __val = {0, 0, 0, 1880844493789993498, 1880844493789993498, 1880844493789993498, 1880844493789993498, 0, 0, 0, 0, 2314885530818453536, 2314885530818453536, 2314885530818453536, 2314885530818453536, 0}}}}} bctx = 0x0 ret = 0 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} diff = 0 inb = { s = 0x9f47e0 <buf> "BYE sip:gw+internal_sip_gw03@172.16.172.242:65000;transport=udp;gw=internal_sip_gw03 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bKX9Zm25Xe6316g\r\nMax-Forwards: 69\r\nFrom: <si"..., len = 821} netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0} keng = 0x0 evp = {data = 0x7ffe01fc6d60, obuf = {s = 0x0, len = 0}, rcv = 0x7ffe01fc7200, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 exectime = 0 __func__ = "receive_msg" #21 0x00000000006f9272 in udp_rcv_loop () at core/udp_server.c:751 len = 598 buf = "BYE sip:gw+internal_sip_gw03@172.16.172.242:65000;transport=udp;gw=internal_sip_gw03 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bKX9Zm25Xe6316g\r\nMax-Forwards: 69\r\nFrom: <si"... tmp = 0x1201ae640 <error: Cannot access memory at address 0x1201ae640> fromaddr = 0x7f0f40e99c00 fromaddrlen = 16 rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {3870036140, 0}, addr32 = {3870036140, 0, 0, 0}, addr16 = {4268, 59052, 0, 0, 0, 0, 0, 0}, addr = "\254\020\254\346", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {3719041196, 0}, addr32 = {3719041196, 0, 0, 0}, addr16 = {4268, 56748, 0, 0, 0, 0, 0, 0}, addr = "\254\020\254\335", '\000' <repeats 11 times>}}, src_port = 5080, dst_port = 65000, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023ج\020\254\346\000\000\000\000\000\000\000"}, sin = { sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 3870036140}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 3870036140, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023ج\020\254\346", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7f0f40b88fa0, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} printbuf = "\340o\374\001\376\177\000\000f*\260\037\017\177\000\000)\262\272\037\017\177\000\000\340b5\037\017\177\000\000\020p\374\001\376\177\000\000\322\v\272\037\017\177\000\000\000\000\000\000\000\000\000\000\340b5\037\017\177\000\000\000\000\000\000\000\000\000\000p\233\351@\017\177\000\000@p\374\001\376\177\000\000 e\032 \017\177\000\000\230z\374\001\376\177\000\000"\017C\000\000\000\000\000轒\000\000\000\000\000\000\220\347H\017\177\000\000`p\374\001\376\177\000\000ǥ\272\037\017\177\000\000\360b5\037\017\177\000\000p\233\351@\017\177\000\000\000q\374\001\376\177\000\000\257:3\037\017\177\000\000\000\000\000\000\260\000\000\000p/\306@\260", '\000' <repeats 91 times>... i = -1 j = 506880 l = 176 __func__ = "udp_rcv_loop" #22 0x000000000042dcb6 in main_loop () at main.c:1815 i = 47 pid = 0 si = 0x7f0f40b88fa0 si_desc = "udp receiver child=47 sock=172.16.172.221:65000\0000\000\000\000\000\000\000\000\000\345\032 \017\177\000\000@t\374\001\001\000\000\000\200\211\341\037\017\177\000\000\310/\272@\017\177\000\000\037%r\000\000\000\000\000\230z\374\001\376\177\000\000\200\211\341\037\017\177\000\000轒\000\000\000\000\000\000\220\347H\001\000\000" nrprocs = 128 woneinit = 1 __func__ = "main_loop" #23 0x0000000000439e7d in main (argc=10, argv=0x7ffe01fc7a98) at main.c:3256 cfg_stream = 0xfa5380 c = -1 r = 0 tmp = 0x7ffe01fc7ea8 "" tmp_len = 0 port = 5060 proto = 0 aproto = 0 ahost = 0x0 aport = 0 options = 0x8433f8 ":f:cm:M:dVIhEeb:B:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1463919274 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x7ffe01fc7980 p = 0x1800000 <error: Cannot access memory at address 0x1800000> st = {st_dev = 24, st_ino = 1005, st_nlink = 2, st_mode = 16832, st_uid = 991, st_gid = 988, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1730298568, tv_nsec = 63999933}, st_mtim = {tv_sec = 1730298573, tv_nsec = 240999872}, st_ctim = {tv_sec = 1730298573, tv_nsec = 240999872}, __glibc_reserved = {0, 0, 0}} l1 = 512 tbuf = "B\215\347H\017\177\000\000\210J\344H\017\177\000\000\020w\374\001\376\177\000\000\006\000\000\000\000\000\000\000\b7\344H\017\177\000\000\006\000\000\000\020\000\000\0000\232\347H\017\177\000\000\325\031\345H\017\177\000\000\000\000\000\000\000\000\000\000\240,\345H\017\177\000\000\370\377\240H\017\177\000\000\020\033\344H\017\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\340v\374\001\376\177\000\000\240J\344H\017\177\000\000\240J\344H\017\177\000\000\000\000\000\000\000\000\000\000p)\344H\017\177\000\000\340v\374\001\376\177\000\000\200\245\347H\017\177\000\000\0000\344H\017\177\000\000\342;\344H\017\177\000\000v\344\344H\017\177\000\000\334#\240H\017\177\000\000"... option_index = 0 long_options = {{name = 0x845b26 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x84054c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x845b2b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x845b31 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x845b37 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x845b40 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x845b4a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x845b54 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x845b5f "modparam", has_arg = 1, flag = 0x0, val = 1030}, { name = 0x845b68 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x845b73 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x845b79 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x845b83 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x845b8a "all-errors", has_arg = 0, flag = 0x0, val = 1035}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" (gdb) ) ```
#### Log Messages
Oct 30 21:32:19 KAM-V2-02 kamailio[2711]: 188(2711) ERROR: {1 90509167 INVITE 3b4b542a-0fdc-123e-aebc-00505697ee23} <script>: cut prefix : 172.16.172.230:5080 Oct 30 21:32:23 KAM-V2-02 kamailio[2687]: 176(2687) BUG: {1 90509168 BYE 3506e2a7-0fdc-123e-aebc-00505697ee23} cnxcc [cnxcc_mod.c:869]: __delete_call(): number of concurrent calls dropped to negative value: -1 Oct 30 21:32:23 KAM-V2-02 kamailio[2687]: 176(2687) BUG: {1 90509168 BYE 3506e2a7-0fdc-123e-aebc-00505697ee23} cnxcc [cnxcc_mod.c:874]: __delete_call(): number of calls dropped to negative value: -1 Oct 30 21:32:23 KAM-V2-02 kernel: kamailio[2687]: segfault at 8 ip 00007f0f1f38902c sp 00007ffe01fc4470 error 6 in cnxcc.so[7f0f1f377000+3c000] likely on CPU 10 (core 0, socket 5) Oct 30 21:32:23 KAM-V2-02 kernel: Code: 48 8b 05 c7 5f 03 00 8b 00 8d 50 ff 48 8b 05 bb 5f 03 00 89 10 48 8b 85 78 ff ff ff 48 8b 00 48 8b 95 78 ff ff ff 48 8b 52 08 <48> 89 50 08 48 8b 85 78 ff ff ff 48 8b 40 08 48 8b 95 78 ff ff ff Oct 30 21:32:23 KAM-V2-02 mariadbd[1313]: 2024-10-30 21:32:23 189 [Warning] Aborted connection 189 to db: 'kamailio' user: 'kamailio' host: 'localhost' (Got an error reading communication packets) Oct 30 21:32:23 KAM-V2-02 kamailio[3130]: 395(3130) CRITICAL: <core> [core/pass_fd.c:281]: receive_fd(): EOF on 186 Oct 30 21:32:23 KAM-V2-02 kamailio[2331]: 0(2331) ALERT: <core> [main.c:805]: handle_sigs(): child process 2687 exited by a signal 11 Oct 30 21:32:23 KAM-V2-02 kamailio[2331]: 0(2331) ALERT: <core> [main.c:809]: handle_sigs(): core was generated
#### SIP Traffic
<!-- If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
``` (paste your sip traffic here) ```
### Possible Solutions
<!-- If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix. -->
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
version: kamailio 5.8.2 (x86_64/linux) 3fa5f4 flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, MEM_JOIN_FREE, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_SEND_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 3fa5f4 compiled on 22:03:02 Oct 28 2024 with gcc 11.5.0
* **Operating System**:
CentOS Stream release 9 NAME="CentOS Stream" VERSION="9" ID="centos" ID_LIKE="rhel fedora" VERSION_ID="9" PLATFORM_ID="platform:el9" PRETTY_NAME="CentOS Stream 9" ANSI_COLOR="0;31" LOGO="fedora-logo-icon" CPE_NAME="cpe:/o:centos:centos:9" HOME_URL="https://centos.org/" BUG_REPORT_URL="https://issues.redhat.com/" REDHAT_SUPPORT_PRODUCT="Red Hat Enterprise Linux 9" REDHAT_SUPPORT_PRODUCT_VERSION="CentOS Stream" CentOS Stream release 9 CentOS Stream release 9