The issue still same
Debug log
Using host libthread_db library "/lib64/libthread_db.so.1".
Core was generated by `/usr/local/sbin/kamailio -DD -P /run/kamailio/kamailio.pid -f
/usr/local/etc/ka'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x00007fbd1e10502c in __delete_call (call=0x7fbd1f0cdae0, credit_data=0x7fbd1ef4fe80)
at cnxcc_mod.c:880
880 if(call->prev && call->next) {
Missing separate debuginfos, use: dnf debuginfo-install krb5-libs-1.21.1-3.el9.x86_64
libevent-2.1.12-8.el9.x86_64 libselinux-3.6-2.el9.x86_64 libssh-0.10.4-13.el9.x86_64
libunistring-0.9.10-15.el9.x86_64 openldap-2.6.6-3.el9.x86_64
openssl-libs-3.2.2-6.el9.x86_64 pcre2-10.40-6.el9.x86_64
(gdb) bt full
#0 0x00007fbd1e10502c in __delete_call (call=0x7fbd1f0cdae0, credit_data=0x7fbd1ef4fe80)
at cnxcc_mod.c:880
__func__ = "__delete_call"
#1 0x00007fbd1e0fff27 in __stop_billing (callid=0x7fbd1efedd88) at cnxcc_mod.c:643
cd_entry = 0x7fbd1f1f9890
call = 0x7fbd1f0cdae0
hts = 0x7fbd1e13b910 <_data+48>
credit_data = 0x7fbd1ef4fe80
__func__ = "__stop_billing"
#2 0x00007fbd1e0fd928 in __dialog_terminated_callback (cell=0x7fbd1efedd10, type=64,
_params=0x7fbd1e591800 <params>) at cnxcc_mod.c:479
__func__ = "__dialog_terminated_callback"
#3 0x00007fbd1e4e0490 in run_dlg_callbacks (type=64, dlg=0x7fbd1efedd10,
req=0x7fbd3fc8ee50, rpl=0x0, dir=2, dlg_data=0x0) at dlg_cb.c:269
cb = 0x7fbd1f138c60
__func__ = "run_dlg_callbacks"
#4 0x00007fbd1e50ec84 in dlg_terminated (req=0x7fbd3fc8ee50, dlg=0x7fbd1efedd10, dir=2)
at dlg_handlers.c:404
iuid = 0x0
__func__ = "dlg_terminated"
#5 0x00007fbd1e51e844 in dlg_onroute (req=0x7fbd3fc8ee50, route_params=0x7ffeeaceb990,
param=0x0) at dlg_handlers.c:1502
dlg = 0x7fbd1efedd10
iuid = 0x7fbd1f12cf20
val = {s = 0x9f4af3 <buf+787> "547.56e1>\r\nP-SR-XUID:
atpsh-67330196-97f2-2\r\n\r\n", len = 8}
callid = {
s = 0x9f4930 <buf+336> "cdb12b30-1b6f-123e-0b83-00505697ee23\r\nCSeq:
91145595 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS,
MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE\r\nSupporte"...,
len = 36}
ftag = {
s = 0x9f48da <buf+250> "KXDNpKy3y2ZgQ\r\nTo: \"sipp\"
<sip:0999999998@172.16.172.220>;tag=QFp7eFB43KeFp\r\nCall-ID:
cdb12b30-1b6f-123e-0b83-00505697ee23\r\nCSeq: 91145595 BYE\r\nUser-Agent:
FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL,"..., len = 13}
ttag = {
s = 0x9f4918 <buf+312> "QFp7eFB43KeFp\r\nCall-ID:
cdb12b30-1b6f-123e-0b83-00505697ee23\r\nCSeq: 91145595 BYE\r\nUser-Agent:
FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER,
REFER, NOTIFY, PUBL"..., len = 13}
h_entry = 1861
h_id = 7781
new_state = 5
old_state = 4
unref = 2
event = 7
timeout = 0
reset = 0
dir = 2
ret = 0
__func__ = "dlg_onroute"
#6 0x00007fbd1e8d9e88 in run_rr_callbacks (req=0x7fbd3fc8ee50, rr_param=0x7ffeeaceba50)
at rr_cb.c:96
l_param = {
s = 0x9f4a77 <buf+663>
"lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=",
'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID:
atpsh-67330196-97f2-2\r\n\r\n", len = 132}
--Type <RET> for more, q to quit, c to continue without paging--c
cbp = 0x7fbd3fd0c8d0
__func__ = "run_rr_callbacks"
#7 0x00007fbd1e8c8e59 in after_loose (_m=0x7fbd3fc8ee50, preloaded=0) at loose.c:1021
hdr = 0x7fbd3facecf0
puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
s = 0x9f4a62 <buf+642>
"172.16.172.220:65000;lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=",
'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID:
atpsh-67330196-97f2-2\r\n\r\n", len = 14}, port = {
s = 0x9f4a71 <buf+657>
"65000;lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=",
'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID:
atpsh-67330196-97f2-2\r\n\r\n", len = 5}, params = {
s = 0x9f4a77 <buf+663>
"lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=",
'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID:
atpsh-67330196-97f2-2\r\n\r\n", len = 132}, sip_params = {
s = 0x9f4a77 <buf+663>
"lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=",
'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID:
atpsh-67330196-97f2-2\r\n\r\n", len = 132}, headers = {s = 0x0, len = 0}, port_no =
65000, proto = 0, type = SIP_URI_T,
flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param
= {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {
s = 0x0, len = 0}, lr = {
s = 0x9f4a77 <buf+663>
"lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=",
'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID:
atpsh-67330196-97f2-2\r\n\r\n", len = 2}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len
= 0}, transport_val = {s = 0x0, len = 0},
ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val =
{s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {
s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
rt = 0x7fbd3fc86300
res = 1
status = 1
uri = {
s = 0x9f4a5e <buf+638>
"sip:172.16.172.220:65000;lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=",
'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID:
atpsh-67330196-97f2-2\r\n\r\n", len = 157}
uri_is_myself = 1
use_ob = 0
rparams = {
s = 0x9f4a77 <buf+663>
"lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=",
'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID:
atpsh-67330196-97f2-2\r\n\r\n", len = 132}
__func__ = "after_loose"
#8 0x00007fbd1e8c95e5 in loose_route_mode (_m=0x7fbd3fc8ee50, _mode=0) at loose.c:1056
ret = 0
__func__ = "loose_route_mode"
#9 0x00007fbd1e8dbcfb in w_loose_route (msg=0x7fbd3fc8ee50, p1=0x0, p2=0x0) at
rr_mod.c:273
No locals.
#10 0x0000000000443202 in do_action (h=0x7ffeeacec600, a=0x7fbd3fcc8f30,
msg=0x7fbd3fc8ee50) at core/action.c:1121
ret = -5
li = 0
v = 0
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000'
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {
s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 =
{sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {
__in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000'
<repeats 86 times>, "\200\b\232?\275\177", '\000' <repeats 25
times>,
__ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0
'\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
tmp = 0x0
new_uri = 0x0
end = 0x0
crt = 0x0
cmd = 0x7fbd3f990f60
len = 0
user = 0
uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0,
len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0,
len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0},
port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0,
transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0,
len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0,
len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len
= 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {
s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0,
len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0,
len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s =
0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0,
len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0},
port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0,
transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0,
len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0,
len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len
= 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {
s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0,
len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0,
len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
u = 0x0
port = 0
dst_host = 0x0
i = 0
flags = 0
avp = 0x7fbd3fc8ee50
st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp =
0x0}
sct = 0x7ffeeacec490
sjt = 0x7fbd3fcc79c0
rve = 0x0
mct = 0x0
rv = 0x0
rv1 = 0x7fbd3fc911d0
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s =
{s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0,
len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21
times>}
s = {s = 0x0, len = 0}
srevp = {0x0, 0x0}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#11 0x0000000000450a6d in run_actions (h=0x7ffeeacec600, a=0x7fbd3fcc8f30,
msg=0x7fbd3fc8ee50) at core/action.c:1618
t = 0x7fbd3fcc8f30
ret = -1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 0, tz_dsttime = 0}
tdiff = 515035576
__func__ = "run_actions"
#12 0x000000000045110f in run_actions_safe (h=0x7ffeeaceda90, a=0x7fbd3fcc8f30,
msg=0x7fbd3fc8ee50) at core/action.c:1681
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf =
{4294967296, 100897437188840159, 268, 536870912, 134217728, 0,
100897437172062943, -100309851447272737}, __mask_was_saved = 0,
__saved_mask = {__val = {140450242764528, 0, 0, 140732837840528,
4294967296, 268, 536870912, 134217728, 0, 140732837840912, 6261792,
140732837840816, 140450239826717, 0, 140732837840956,
140450795912448}}}}}
ret = -355546824
ign_on_break = 0
#13 0x00000000005f3e0c in rval_get_long (h=0x7ffeeaceda90, msg=0x7fbd3fc8ee50,
i=0x7ffeeacece80, rv=0x7fbd3fcc9098, cache=0x0) at core/rvalue.c:973
r_avp = 0x0
avp_val = {n = 134217728, s = {s = 0x8000000 <error: Cannot access memory at
address 0x8000000>, len = 0}, re = 0x8000000}
pval = {rs = {s = 0x400000000 <error: Cannot access memory at address
0x400000000>, len = -355545472}, ri = 8589934860, flags = 515035576}
tmp = {s = 0x0, len = 1}
s = 0x0
r = 0
ret = 0
destroy_pval = 0
__func__ = "rval_get_long"
#14 0x00000000005f8c20 in rval_expr_eval_long (h=0x7ffeeaceda90, msg=0x7fbd3fc8ee50,
res=0x7ffeeacece80, rve=0x7fbd3fcc9090) at core/rvalue.c:1854
i1 = 1
i2 = 268
ret = -1
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s =
{s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0,
len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 20
times>, "\001"}
c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n =
140450795679312, s = {s = 0x7fbd3fc8ee50 "(", len = 0},
re = 0x7fbd3fc8ee50}, pval = {rs = {s = 0x7fbd3fc8ee50 "(", len =
0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>}
rv1 = 0x7fbd1eaa5b77 <t_check_trans+249>
rv2 = 0x7ffeeacec950
__func__ = "rval_expr_eval_long"
#15 0x0000000000442c83 in do_action (h=0x7ffeeaceda90, a=0x7fbd3fccca70,
msg=0x7fbd3fc8ee50) at core/action.c:1097
ret = -5
li = 100897436834421471
v = 0
dst = {send_sock = 0x7ffeeacecf10, to = {s = {sa_family = 15884, sa_data =
"_", '\000' <repeats 12 times>}, sin = {sin_family = 15884,
sin_port = 95, sin_addr = {s_addr = 0}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 15884, sin6_port = 95,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000'
<repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {
0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 15884,
__ss_padding = "_", '\000' <repeats 25 times>,
"\377\377\377\377\000\000\000\000\000\000\000\000\210\033\311?\275\177\000\000\250\321\316\352\376\177\000\000P\356\310?\275\177\000\000\220\332\316\352\376\177\000\000\000\000\000\b",
'\000' <repeats 12 times>,
"P\317\316\352\376\177\000\000\017\021E\000\000\000\000\000\300\317\316\352\376\177\000\000P\356\310?\275\177\000",
__ss_align = 140450795683248}}, id = -355542384, send_flags = {
f = 32766, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0
'\000', proto_pad1 = 0}
tmp = 0x8000000 <error: Cannot access memory at address 0x8000000>
new_uri = 0x7ffeeaced080 "\b"
end = 0x7fbd3fd14870 "X-FS-Support"
crt = 0x7fbd1ebc1aa6 <pkg_proc_update_stats+115> "H\213\r\203l"
cmd = 0x7ffeeaced040
len = 32766
user = -355544976
uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0,
len = 0}, port = {
s = 0xffffffff0000010c <error: Cannot access memory at address
0xffffffff0000010c>, len = 0}, params = {
s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len =
0}, sip_params = {
s = 0x10c <error: Cannot access memory at address 0x10c>, len =
536870912}, headers = {
s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len =
0}, port_no = 52704, proto = 60110, type = 32766,
flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0x45110c), transport
= {s = 0x0, len = 1070132816}, ttl = {
s = 0x7fbd3fc91930 "\200\001", len = -355542384}, user_param = {s =
0x0, len = -1}, maddr = {
s = 0x100000000 <error: Cannot access memory at address 0x100000000>,
len = 744708831}, method = {
s = 0x10c <error: Cannot access memory at address 0x10c>, len =
536870912}, lr = {
s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len =
0}, r2 = {
s = 0x16675af23635adf <error: Cannot access memory at address
0x16675af23635adf>, len = -1190962465}, gr = {s = 0x0, len = 0},
transport_val = {s = 0x0, len = 5531605}, ttl_val = {s = 0x0, len = 0},
user_param_val = {s = 0x7ffeeaced210 "", len = -355544856},
maddr_val = {s = 0x7ffeeaced0ec "", len = 1070062736}, method_val = {s
= 0x0, len = -355544304}, lr_val = {s = 0x0, len = 0}, r2_val = {
s = 0x0, len = 0}, gr_val = {s = 0x0, len = -1}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s =
0x0, len = 0}, port = {s = 0x0, len = 0}, params = {
s = 0x10c <error: Cannot access memory at address 0x10c>, len =
536870912}, sip_params = {
s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len =
0}, headers = {s = 0x7ffeeaceccd0 "\340\315\316\352\376\177",
len = 4524653}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0,
transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 1070132816},
user_param = {s = 0x7fbd3fc91930 "\200\001", len = -355545856}, maddr
= {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0,
len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s
= 0x0, len = 0}, ttl_val = {s = 0x0, len = 0},
user_param_val = {s = 0x7fbd3f99efd8 "~\205m\036\275\177", len = 0},
maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0},
lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len
= 0}}
u = 0x7fbd3f7ff010
port = 0
dst_host = 0x8000000
i = 1070097552
flags = 0
avp = 0x7fbd3fc4e848
st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp =
0x0}
sct = 0x0
sjt = 0x0
rve = 0x7fbd3fcc9090
mct = 0x7fbd3fc91b80
rv = 0x0
rv1 = 0x7fbd3fc940a0
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s =
{s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0,
len = 0}, ri = 0, flags = 0}}, i2s =
"\000\000\000\000\000\000\000\000\330\357\231?\275\177\000\000\000\000\000\000\000"}
s = {s = 0x0, len = 0}
srevp = {0x0, 0x0}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#16 0x0000000000450a6d in run_actions (h=0x7ffeeaceda90, a=0x7fbd3fcc8ce0,
msg=0x7fbd3fc8ee50) at core/action.c:1618
t = 0x7fbd3fccca70
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 8725541, tz_dsttime = 0}
tdiff = 1070154176
__func__ = "run_actions"
#17 0x000000000043f70a in do_action (h=0x7ffeeaceda90, a=0x7fbd3fc95440,
msg=0x7fbd3fc8ee50) at core/action.c:709
ret = -5
li = 16
v = 1
dst = {send_sock = 0x8000000, to = {s = {sa_family = 0, sa_data =
"\000\000\000\000\000\000`\327\316\352\376\177\000"}, sin = {sin_family = 0,
sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"`\327\316\352\376\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"`\327\316\352\376\177\000\000\361=t\000\000\000\000", __u6_addr16 = {55136,
60110, 32766, 0, 15857, 116, 0, 0}, __u6_addr32 = {3939424096, 32766,
7618033, 0}}}, sin6_scope_id = 29}, sas = {ss_family = 0,
__ss_padding =
"\000\000\000\000\000\000`\327\316\352\376\177\000\000\361=t\000\000\000\000\000\035",
'\000' <repeats 15 times>,
"\377\377\377\377\377\377\377\377P\356\310?\275\177\000\000\000\000\000\b",
'\000' <repeats 12 times>,
"\360\327\316\352\376\177\000\000H\ru\000\000\000\000\000\020\327\316\352\376\177\000\000\246\032\274\036\275\177\000\000\000\000\000\000\000\000\000\000\204\330\316\352\376\177\000",
__ss_align = 134217728}},
id = 1069871744, send_flags = {f = 32701, blst_imask = 0}, proto = 34
'"', proto_pad0 = 75 'K', proto_pad1 = 159}
tmp = 0x7ffeeaced980 "0\332\316\352\376\177"
new_uri = 0x7ffeeaced910 "`\373\310?\275\177"
end = 0x4 <error: Cannot access memory at address 0x4>
crt = 0x7fbd3fc8ee50 "("
cmd = 0x7fbd3f99eb40
len = 32701
user = 1070475744
uri = {user = {s = 0x7fbd3facee10 "0", len = 0}, passwd = {s = 0x8000000
<error: Cannot access memory at address 0x8000000>, len = 129059344},
host = {s = 0x3c6910 <error: Cannot access memory at address 0x3c6910>,
len = 5158384}, port = {
s = 0x5ab7e0 <receive_msg+20280>
"\230H\301\340\004H\005\350\005\223", len = 16}, params = {
s = 0x4f <error: Cannot access memory at address 0x4f>, len = 7598071},
sip_params = {s = 0x7ffeeaced550 "`\326\316\352\376\177",
len = 4978977}, headers = {s = 0x0, len = 1065350864}, port_no = 0, proto =
2048, type = 13, flags = (unknown: 0x3f7ff6d0), transport = {
s = 0x7ffeeaced660 "`\327\316\352\376\177", len = 7502474}, ttl = {s
= 0x7ffeeaced660 "`\327\316\352\376\177", len = 7492948},
user_param = {s = 0x8bb92b "core", len = 7494079}, maddr = {s =
0x8bc708 <__func__.21> "parse_headers", len = 9157624}, method = {
s = 0x7fbd3facee50 "\220\001", len = 1065349136}, lr = {s = 0x8bc708
<__func__.21> "parse_headers", len = 9157624}, r2 = {
s = 0x40 <error: Cannot access memory at address 0x40>, len =
1065349136}, gr = {s = 0x0, len = 0}, transport_val = {
s = 0x9f4b20 <buf+832> "\r\n", len = 0}, ttl_val = {s =
0x8be270 <__func__.3> "parse_to_param", len = 9168712}, user_param_val =
{
s = 0x30 <error: Cannot access memory at address 0x30>, len =
1065349136}, maddr_val = {s = 0x7fbd3facef50 "\020", len = 1068297568},
method_val = {s = 0x0, len = 1065349136}, lr_val = {s = 0xd0 <error: Cannot
access memory at address 0xd0>, len = 1068297744}, r2_val = {
s = 0x400000000 <error: Cannot access memory at address 0x400000000>,
len = 0}, gr_val = {
s = 0x10c <error: Cannot access memory at address 0x10c>, len =
536870912}}
next_hop = {user = {s = 0x51 <error: Cannot access memory at address 0x51>,
len = 10438710}, passwd = {
s = 0x7 <error: Cannot access memory at address 0x7>, len = 8}, host =
{s = 0x7fbd3fc4ed10 "\003", len = 0}, port = {
s = 0x7fbd3fc5af70 "\001", len = 1070061840}, params = {s =
0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>,
len = 1069920112}, sip_params = {s = 0x0, len = 1068299680}, headers = {s =
0x7fbd3facf4f0 "\001", len = 1070027616}, port_no = 59456,
proto = 16324, type = 32701, flags = 0, transport = {s = 0x7fbd3fc5b250
"\004", len = 0}, ttl = {s = 0x0, len = 0}, user_param = {
s = 0x43fc7d860 <error: Cannot access memory at address 0x43fc7d860>,
len = 9193958}, maddr = {s = 0x0, len = 0}, method = {
s = 0x7ffeeaced4e0 "", len = 7807783}, lr = {s = 0x0, len = 0}, r2 =
{s = 0x1 <error: Cannot access memory at address 0x1>,
len = 1068297632}, gr = {s = 0x9f4b22 <buf+834> "", len =
10439422}, transport_val = {s = 0x0, len = -355543632}, ttl_val = {
s = 0x9f4b22 <buf+834> "", len = 10439242}, user_param_val =
{s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0,
len = 7534444}, lr_val = {s = 0x7ffeeaced4e0 "", len = 1065349136},
r2_val = {s = 0x7fbd3facee10 "0", len = 1065349136}, gr_val = {
s = 0x7ffeeaced520 "P\325\316\352\376\177", len = 515644070}}
u = 0x7ffeeacedab0
port = 0
dst_host = 0x7fbd3facee50
i = 41
flags = 0
avp = 0x7627ed <parse_cseq+2542>
st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 65537}, re = 0x0}, avp
= 0x9f47e0 <buf>}
sct = 0x7fbd3fc8ee50
sjt = 0x7fbd3fce29e0
rve = 0x7fbd3fc923c0
mct = 0x7ffeeaced810
rv = 0x0
rv1 = 0x7ffeeaced930
c1 = {cache_type = 3939422992, val_type = 32766, c = {avp_val = {n =
140450790895632, s = {s = 0x7fbd3f7ff010 "\001", len = 1068532832},
re = 0x7fbd3f7ff010}, pval = {rs = {s = 0x7fbd3f7ff010 "\001", len
= 1068532832}, ri = 140450790895632, flags = -355544240}},
i2s =
"\200\031\213\036\275\177\000\000p\031\213\036\275\177\000\000\020\022\213\036\275\177"}
s = {s = 0x893f988fe0 <error: Cannot access memory at address 0x893f988fe0>,
len = -355542000}
srevp = {0x7ffeeacedb50, 0x7fbd1e83b9ae <tps_msg_received+3364>}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#18 0x0000000000450a6d in run_actions (h=0x7ffeeaceda90, a=0x7fbd3fc8fb60,
msg=0x7fbd3fc8ee50) at core/action.c:1618
t = 0x7fbd3fc95440
ret = -1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 1070132816, tz_dsttime = 32701}
tdiff = 536870912
__func__ = "run_actions"
#19 0x00000000004511d7 in run_top_route (a=0x7fbd3fc8fb60, msg=0x7fbd3fc8ee50, c=0x0) at
core/action.c:1701
ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf =
{4294967296, 100897436159138527, 268, 536870912, 134217728, 0,
100897436209470175, -100309851447272737}, __mask_was_saved = 0,
__saved_mask = {__val = {6379359, 4294967296, 140450795679312, 1,
4294967296, 268, 536870912, 134217728, 0, 140732837845856, 0,
4611686022722355200, 0, 140450796023248, 4294967296, 268}}}}}
p = 0x7ffeeaceda90
ret = 134217728
sfbk = 0
#20 0x00000000005ab16e in receive_msg (
buf=0x9f47e0 <buf> "BYE
sip:gw+internal_sip_gw04_sbc01@172.16.172.216:65000;transport=udp;gw=internal_sip_gw04_sbc01
SIP/2.0\r\nVia: SIP/2.0/UDP
172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bK4BHUQ4D1gBaSS\r\nMax-Forwards: 6"...,
len=834, rcv_info=0x7ffeeacee120) at core/receive.c:518
msg = 0x7fbd3fc8ee50
ctx = {rec_lev = 0, run_flags = 2, last_retcode = 1, jmp_env = {{__jmpbuf =
{4294967296, 100897436159138527, 268, 536870912, 134217728, 0,
100897436209470175, -100309851447272737}, __mask_was_saved = 0,
__saved_mask = {__val = {0 <repeats 16 times>}}}}}
bctx = 0x0
ret = 0
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
diff = 0
inb = {
s = 0x9f47e0 <buf> "BYE
sip:gw+internal_sip_gw04_sbc01@172.16.172.216:65000;transport=udp;gw=internal_sip_gw04_sbc01
SIP/2.0\r\nVia: SIP/2.0/UDP
172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bK4BHUQ4D1gBaSS\r\nMax-Forwards: 6"...,
len = 834}
netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0}
keng = 0x0
evp = {data = 0x7ffeeacedc80, obuf = {s = 0x0, len = 0}, rcv = 0x7ffeeacee120, dst
= 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
cidlockidx = 0
cidlockset = 0
errsipmsg = 0
exectime = 0
__func__ = "receive_msg"
#21 0x00000000006f9272 in udp_rcv_loop () at core/udp_server.c:751
len = 605
buf = "BYE
sip:gw+internal_sip_gw04_sbc01@172.16.172.216:65000;transport=udp;gw=internal_sip_gw04_sbc01
SIP/2.0\r\nVia: SIP/2.0/UDP
172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bK4BHUQ4D1gBaSS\r\nMax-Forwards: 6"...
tmp = 0x11eeb7300 <error: Cannot access memory at address 0x11eeb7300>
fromaddr = 0x7fbd3fd07070
fromaddrlen = 16
rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {3870036140, 0}, addr32 =
{3870036140, 0, 0, 0}, addr16 = {4268, 59052, 0, 0, 0, 0, 0, 0},
addr = "\254\020\254\346", '\000' <repeats 11
times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {3702263980, 0}, addr32 =
{3702263980, 0,
0, 0}, addr16 = {4268, 56492, 0, 0, 0, 0, 0, 0}, addr =
"\254\020\254\334", '\000' <repeats 11 times>}}, src_port = 5080,
dst_port = 65000, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s =
{sa_family = 2,
sa_data = "\023ج\020\254\346\000\000\000\000\000\000\000"}, sin =
{sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 3870036140},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family =
2, sin6_port = 55315, sin6_flowinfo = 3870036140, sin6_addr = {
__in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding =
"\023ج\020\254\346", '\000' <repeats 111 times>, __ss_align =
0}},
bind_address = 0x7fbd3f988fa0, rflags = 0, proto = 1 '\001', proto_pad0
= 0 '\000', proto_pad1 = 0}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
printbuf =
"\000\337\316\352\376\177\000\000fJ\217\036\275\177\000\000)ҙ\036\275\177\000\000\340\"\r\036\275\177\000\0000\337\316\352\376\177\000\000\322+\231\036\275\177\000\000\000\000\000\000\000\000\000\000\340\"\r\036\275\177\000\000\000\000\000\000\000\000\000\000\340o\320?\275\177\000\000`\337\316\352\376\177\000\000La\353\036\275\177\000\000\f\001\000\000\000\000\000\000\000\000\000
\000\000\000\000\000\000\000\b", '\000' <repeats 12 times>,
"\200\337\316\352\376\177\000\000\307ř\036\275\177\000\000\360\"\r\036\275\177\000\000\340o\320?\275\177\000\000
\340\316\352\376\177\000\000\257\372\n\036\275\177\000\000\000\000\000\000\357\000\000\000\200q\250?\357",
'\000' <repeats 91 times>...
i = -1
j = 343040
l = 239
__func__ = "udp_rcv_loop"
#22 0x000000000042dcb6 in main_loop () at main.c:1815
i = 110
pid = 0
si = 0x7fbd3f988fa0
si_desc = "udp receiver child=110
sock=172.16.172.220:65000\000\000\204\000\000\000\000\000\240\350\316\352\376\177\000\000\f\001\000\000\000\000\000\000\000\000\000
\000\000\000\0008>\233?\275\177\000\000\232=\205G\275\177\000\0000\000\000\0000\000\000\000X\344\316\352\376\177\000\000`\343\316\352\376\177\000\000\000\252\000\3016\\\321",
<incomplete sequence \324>
nrprocs = 128
woneinit = 1
__func__ = "main_loop"
#23 0x0000000000439e7d in main (argc=10, argv=0x7ffeeacee9b8) at main.c:3256
cfg_stream = 0x1700380
c = -1
r = 0
tmp = 0x7ffeeacefe91 ""
tmp_len = 0
port = 5060
proto = 0
aproto = 0
ahost = 0x0
aport = 0
options = 0x8433f8
":f:cm:M:dVIhEeb:B:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 2922804141
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 2
n_lst = 0x7ffeeacee8a0
p = 0x1e00000 <error: Cannot access memory at address 0x1e00000>
st = {st_dev = 24, st_ino = 987, st_nlink = 2, st_mode = 16832, st_uid = 991,
st_gid = 988, __pad0 = 0, st_rdev = 0, st_size = 40,
st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1730540752, tv_nsec =
312000234}, st_mtim = {tv_sec = 1731395989, tv_nsec = 734966496},
st_ctim = {tv_sec = 1731395989, tv_nsec = 734966496}, __glibc_reserved = {0, 0,
0}}
l1 = 512
tbuf =
"9\375\305G\275\177\000\000\210\272\302G\275\177\000\0000\346\316\352\376\177\000\000\006\000\000\000\000\000\000\000\b\247\302G\275\177\000\000\006\000\000\000\020\000\000\0000\n\306G\275\177\000\000Չ\303G\275\177\000\000\000\000\000\000\000\000\000\000\240\234\303G\275\177\000\000\370\377\200G\275\177\000\000\000\n\302G\275\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\000\346\316\352\376\177\000\000\240\272\302G\275\177\000\000\240\272\302G\275\177\000\000\000\000\000\000\000\000\000\000`\030\302G\275\177\000\000\000\346\316\352\376\177\000\000\200\025\306G\275\177\000\000\000\240\302G\275\177\000\000\342\253\302G\275\177\000\000vT\303G\275\177\000\000\334#\200G\275\177\000\000\232"...
option_index = 0
long_options = {{name = 0x845b26 "help", has_arg = 0, flag = 0x0, val =
104}, {name = 0x84054c "version", has_arg = 0, flag = 0x0, val = 118}, {
name = 0x845b2b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name
= 0x845b31 "subst", has_arg = 1, flag = 0x0, val = 1025}, {
name = 0x845b37 "substdef", has_arg = 1, flag = 0x0, val = 1026},
{name = 0x845b40 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
name = 0x845b4a "server-id", has_arg = 1, flag = 0x0, val = 1028},
{name = 0x845b54 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {
name = 0x845b5f "modparam", has_arg = 1, flag = 0x0, val = 1030},
{name = 0x845b68 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {
name = 0x845b73 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name
= 0x845b79 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {
name = 0x845b83 "atexit", has_arg = 1, flag = 0x0, val = 1034},
{name = 0x845b8a "all-errors", has_arg = 0, flag = 0x0, val = 1035}, {
name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
__func__ = "main"
(gdb)
(gdb) p*call
$1 = {prev = 0x7fbd1e5db5d1 <pcre2_malloc>, next = 0x7fbd1e5db621
<pcre2_free>, lock = {lock = {val = 0}, locker_pid = {val = 0},
rec_lock_level = 518420048}, confirmed = -67 '\275', max_amount =
6.9391911253011244e-310, money_based = {connect_cost = 0, cost_per_second = 0,
initial_pulse = 10, final_pulse = 0}, start_timestamp = 0, consumed_amount =
6.3664406801021389e-314, connect_amount = 0, dlg_h_entry = 10,
dlg_h_id = 0, client_id = {s = 0x0, len = 10}, sip_data = {callid = {s = 0x0, len = 10},
from_uri = {
s = 0xffffffffffffffff <error: Cannot access memory at address
0xffffffffffffffff>, len = -1}, from_tag = {
s = 0xffffffffffffffff <error: Cannot access memory at address
0xffffffffffffffff>, len = -1}, to_uri = {
s = 0xffffffffffffffff <error: Cannot access memory at address
0xffffffffffffffff>, len = -1}, to_tag = {
s = 0xffffffffffffffff <error: Cannot access memory at address
0xffffffffffffffff>, len = -1}}}
(gdb)
--
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/4009#issuecomment-2470084931
You are receiving this because you are subscribed to this thread.
Message ID: <kamailio/kamailio/issues/4009/2470084931(a)github.com>