Description

We have a Kamailio running with a sipcapture module, then handling everything in app_lua and writing some information to a redis server. This Kamailio crashed after running for about a day.

Troubleshooting

Debugging Data

This is the gdb output of bt full:

GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/98/6903c27311ebc3717be5ca53d70d130c092eea.debug...done.
done.
[New LWP 120921]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio_li_sniffer.pid -f /etc/kamaili'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007ff05e2d5c3a in strlen () from /lib/x86_64-linux-gnu/libc.so.6
#0  0x00007ff05e2d5c3a in strlen () from /lib/x86_64-linux-gnu/libc.so.6
No symbol table info available.
#1  0x00007ff05783f2aa in redisvFormatCommand () from /usr/lib/x86_64-linux-gnu/libhiredis.so.0.10
No symbol table info available.
#2  0x00007ff0578400a2 in redisvAppendCommand () from /usr/lib/x86_64-linux-gnu/libhiredis.so.0.10
No symbol table info available.
#3  0x00007ff057840289 in redisvCommand () from /usr/lib/x86_64-linux-gnu/libhiredis.so.0.10
No symbol table info available.
#4  0x00007ff057a4d6ac in redisc_exec (srv=0x7ffd7df680d0, res=0x7ffd7df680f0, cmd=0x7ffd7df680e0) at redis_client.c:402
        rsrv = 0x7ff05d2bdba0
        rpl = 0x7ff05d2eb020
        c = 0 '\000'
        ap = {{gp_offset = 40, fp_offset = 48, overflow_arg_area = 0x7ffd7df680a0, reg_save_area = 0x7ffd7df67fb0}}
        ap2 = {{gp_offset = 24, fp_offset = 48, overflow_arg_area = 0x7ffd7df680a0, reg_save_area = 0x7ffd7df67fb0}}
        __FUNCTION__ = "redisc_exec"
#5  0x00007ff057a51156 in w_redis_cmd3 (msg=0x7ff05d30ca28, ssrv=0x7ff05d2d6088 "p\270-]\360\177", scmd=0x7ff05d2d61b0 "\360\237-]\360\177", sres=0x7ff05d2d62d8 "\030z-]\360\177") at ndb_redis_mod.c:160
        s = {{s = 0x7ff05d2db870 "liRedis", len = 7}, {
            s = 0x7ff05d2a00a0 "SETEX ACTIVECHANNELS_swp3pvm7jqpnu6ixphj1jc7c24@sipgate.de 21600 \n%swp3pvm7jqpnu6ixphj1jc7c24@sipgate.de\022\n2457742e16\032\n4923256980\"%swp3pvm7jqpnu6ixphj1jc7c24@sipgate.de", len = 167}, {
            s = 0x7ff05d2d7a18 "r", len = 1}}
        __FUNCTION__ = "w_redis_cmd3"
#6  0x000000000045ceac in do_action (h=0x7ffd7df68800, a=0x7ff05d2d6f78, msg=0x7ff05d30ca28) at core/action.c:1072
        ret = -5
        v = 1583322656
        dst = {send_sock = 0x770000006e, to = {s = {sa_family = 38432, sa_data = "_^\360\177\000\000\060\217\000\000\000\000\000"}, sin = {sin_family = 38432, sin_port = 24159, sin_addr = {s_addr = 32752}, 
              sin_zero = "0\217\000\000\000\000\000"}, sin6 = {sin6_family = 38432, sin6_port = 24159, sin6_flowinfo = 32752, sin6_addr = {__in6_u = {__u6_addr8 = "0\217\000\000\000\000\000\000 \226_^\360\177\000", __u6_addr16 = {36656, 0, 
                    0, 0, 38432, 24159, 32752, 0}, __u6_addr32 = {36656, 0, 1583322656, 32752}}}, sin6_scope_id = 3}}, id = 0, proto = -104 '\230', send_flags = {f = 191 '\277', blst_imask = 241 '\361'}}
        tmp = 0x1ef559c ""
        new_uri = 0x0
        end = 0x0
        crt = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>
        cmd = 0x7ff05d2b9940
        len = 131296
        user = 0
        uri = {user = {s = 0x7ffd7df68530 "\220\207\366}\375\177", len = 0}, passwd = {s = 0x7ffd7df68430 " ", len = 32620272}, host = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 2113307744}, port = {
            s = 0x7ffd7df684b0 "\330\204\366}\375\177", len = 32620440}, params = {s = 0x7c <error: Cannot access memory at address 0x7c>, len = 0}, sip_params = {s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, 
            len = 31080512}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1583322656}, port_no = 16480, proto = 474, type = ERROR_URI_T, flags = (unknown: 32462272), transport = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = 1580005056}, ttl = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 240}, user_param = {s = 0x7ff05e5f9620 "", len = 1583322656}, maddr = {
            s = 0x9 <error: Cannot access memory at address 0x9>, len = 0}, method = {s = 0x7ff057842acf "", len = 0}, lr = {s = 0x0, len = 1580007456}, r2 = {s = 0x7ffd7df684d8 "0\205\366}\375\177", len = -24651520}, gr = {s = 0x0, 
            len = 33205536}, transport_val = {s = 0x7ffd7df68570 "\377\377\377\177", len = 2113307952}, ttl_val = {s = 0x7ffd7df68618 "", len = 1579810305}, user_param_val = {s = 0x32 <error: Cannot access memory at address 0x32>, 
            len = 2113310080}, maddr_val = {s = 0x7ffd7df68790 "", len = 1579814957}, method_val = {s = 0x7ffd7df68628 "", len = 1579810305}, lr_val = {s = 0x7ffd7df68731 "\206\366}\375\177", len = 2113310080}, r2_val = {
            s = 0x7ffd7df68790 "", len = -24651520}, gr_val = {s = 0x3000000030 <error: Cannot access memory at address 0x3000000030>, len = 32418038}}
        next_hop = {user = {s = 0x1eea8f6 "", len = 32418028}, passwd = {s = 0x0, len = 10}, host = {s = 0x7fffffff <error: Cannot access memory at address 0x7fffffff>, len = 1375378619}, port = {
            s = 0x3 <error: Cannot access memory at address 0x3>, len = 48}, params = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 2113309744}, sip_params = {s = 0x1d8ff12 "x", len = 32418038}, headers = {
            s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 2113308496}, port_no = 43240, proto = 494, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x7ffd7df68730 " \206\366}\375\177", 
            len = 0}, ttl = {s = 0x7ffd7df68630 "", len = 12}, user_param = {s = 0x7ff000000009 <error: Cannot access memory at address 0x7ff000000009>, len = 2113308256}, maddr = {s = 0x7ffd7df686b0 "", len = 0}, method = {
            s = 0x7ffd7df68c5c "", len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x3ff0000000000000 <error: Cannot access memory at address 0x3ff0000000000000>, len = 1579812146}, gr = {
            s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 2113308528}, transport_val = {s = 0x0, len = 2}, ttl_val = {s = 0xe00000067 <error: Cannot access memory at address 0xe00000067>, len = 1}, 
          user_param_val = {s = 0x13 <error: Cannot access memory at address 0x13>, len = 2113307984}, maddr_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2113310080}, method_val = {
            s = 0x7ffd7df68520 "1\207\366}\375\177", len = 0}, lr_val = {s = 0x7ff05e3b8fea ".", len = 2113307992}, r2_val = {s = 0x0, len = 2113307958}, gr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 4}}
        u = 0x1ef5597
        port = 24159
        dst_host = 0x0
        i = 1583322656
        flags = 32752
        avp = 0xffffffffffffffff
        st = {flags = 0, id = 0, name = {n = 91, s = {s = 0x5b <error: Cannot access memory at address 0x5b>, len = -1}, re = 0x5b}, avp = 0x0}
        sct = 0x60
        sjt = 0x0
        rve = 0x0
        mct = 0x0
        rv = 0x1ef5597
        rv1 = 0x0
        c1 = {cache_type = 5, val_type = RV_NONE, c = {avp_val = {n = 2113309744, s = {s = 0x7ffd7df68c30 "", len = 30998297}, re = 0x7ffd7df68c30}, pval = {rs = {s = 0x7ffd7df68c30 "", len = 30998297}, ri = 32418038, flags = 0}}, 
          i2s = "\000\000\000\000\000\000\000\000\000\177\360\001\006\000\000\000\350\250\356\001\000"}
        s = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 112}
        srevp = {0xffffffffffffffff, 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#7  0x0000000000469afa in run_actions (h=0x7ffd7df68800, a=0x7ff05d2d6f78, msg=0x7ff05d30ca28) at core/action.c:1552
        t = 0x7ff05d2d6f78
        ret = -1
        mod = 0x7ff057c7d3cd
        ms = 0
        __FUNCTION__ = "run_actions"
#8  0x000000000046a1b1 in run_actions_safe (h=0x7ffd7df6aee0, a=0x7ff05d2d6f78, msg=0x7ff05d30ca28) at core/action.c:1620
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140670332234288, 1667728728683687988, 4291248, 140726716774352, 0, 0, 1667728728687882292, -1666880443433635788}, __mask_was_saved = 0, __saved_mask = {
                __val = {140724603453440, 0, 140668768878606, 0, 0, 0, 0, 18446744073709551615, 140670348687719, 30759624, 140670348687770, 6, 140670241592264, 47260797760, 140724603453441, 140670241592269}}}}}
        ret = 32765
        ign_on_break = 0
#9  0x000000000042dc6f in rval_get_int (h=0x7ffd7df6aee0, msg=0x7ff05d30ca28, i=0x7ffd7df68b54, rv=0x7ff05d2db0d8, cache=0x0) at core/rvalue.c:912
        r_avp = 0x7ffd7df689c0
        avp_val = {n = 2113309200, s = {s = 0x7ffd7df68a10 "(\312\060]\360\177", len = 133}, re = 0x7ffd7df68a10}
        pval = {rs = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 16005432}, ri = 384480, flags = 4}
        tmp = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 1375346761}
        s = 0x0
        r = 2113309072
        ret = 0
        destroy_pval = 0
        __FUNCTION__ = "rval_get_int"
#10 0x0000000000432374 in rval_expr_eval_int (h=0x7ffd7df6aee0, msg=0x7ff05d30ca28, res=0x7ffd7df68b54, rve=0x7ff05d2db0d0) at core/rvalue.c:1906
        i1 = 0
        i2 = 1
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 1562718224, s = {s = 0x7ff05d253010 "\001", len = 2113309376}, re = 0x7ff05d253010}, pval = {rs = {s = 0x7ff05d253010 "\001", len = 2113309376}, 
              ri = 1533206860, flags = 32752}}, i2s = "n\000\000\000w", '\000' <repeats 14 times>, "\001\000"}
        c2 = {cache_type = 386872, val_type = RV_NONE, c = {avp_val = {n = 774176, s = {s = 0xbd020 <error: Cannot access memory at address 0xbd020>, len = 777848}, re = 0xbd020}, pval = {rs = {
                s = 0xbd020 <error: Cannot access memory at address 0xbd020>, len = 777848}, ri = 8, flags = 0}}, i2s = "6\000\000\000\000\000\000\000\000\331\207\376s\325T\271\360\212\366}\375\177"}
        rv1 = 0x7ffd7df68a80
        rv2 = 0x7ff05d253010
        __FUNCTION__ = "rval_expr_eval_int"
#11 0x00000000004327b9 in rval_expr_eval_int (h=0x7ffd7df6aee0, msg=0x7ff05d30ca28, res=0x7ffd7df68c88, rve=0x7ff05d2da808) at core/rvalue.c:1914
        i1 = 0
        i2 = 1562718224
        ret = -1
        c1 = {cache_type = 4291248, val_type = RV_NONE, c = {avp_val = {n = 2113320912, s = {s = 0x7ffd7df6b7d0 "\r", len = 0}, re = 0x7ffd7df6b7d0}, pval = {rs = {s = 0x7ffd7df6b7d0 "\r", len = 0}, ri = 0, flags = 0}}, 
          i2s = "\320\213\366}\375\177\000\000\027\305B\000\000\000\000\000\364\373\350\001\000"}
        c2 = {cache_type = 2113310080, val_type = 936, c = {avp_val = {n = 1563496992, s = {s = 0x7ff05d311220 "\002", len = 2113309696}, re = 0x7ff05d311220}, pval = {rs = {s = 0x7ff05d311220 "\002", len = 2113309696}, ri = 4376047, 
              flags = 0}}, i2s = "\260zA\000P\000\000\000P\214\366}\375\177\000\000\000\000\000\000\000"}
        rv1 = 0x1dbe558
        rv2 = 0x7ff05d2eea30
        __FUNCTION__ = "rval_expr_eval_int"
#12 0x000000000045c7c5 in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2dc010, msg=0x7ff05d30ca28) at core/action.c:1030
        ret = -5
        v = 0
        dst = {send_sock = 0x1000000, to = {s = {sa_family = 13192, sa_data = "\364\000\000\000\000\000\220\343\005\000\000\000\000"}, sin = {sin_family = 13192, sin_port = 244, sin_addr = {s_addr = 0}, 
              sin_zero = "\220\343\005\000\000\000\000"}, sin6 = {sin6_family = 13192, sin6_port = 244, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\343\005\000\000\000\000\000x\314\v\000\000\000\000", __u6_addr16 = {58256, 
                    5, 0, 0, 52344, 11, 0, 0}, __u6_addr32 = {385936, 0, 773240, 0}}}, sin6_scope_id = 777848}}, id = 0, proto = 8 '\b', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        tmp = 0x7ff057c6acae "H\205\300u\034H\205\333t\027\276\004"
        new_uri = 0x0
        end = 0x0
        crt = 0x1e8fbf4 "24"
        cmd = 0x7ff05d2c7a70
        len = 2113310048
        user = 32765
        uri = {user = {s = 0x7ffd7df68f80 "", len = 6677782}, passwd = {s = 0x0, len = 0}, host = {s = 0x73e120 "core", len = 2113310720}, port = {s = 0x7ff05d2d89a0 "\001", len = 1563478568}, params = {
            s = 0x5d311220 <error: Cannot access memory at address 0x5d311220>, len = 0}, sip_params = {s = 0x7ff05d2c8780 "\030\210,]\360\177", len = -24651520}, headers = {s = 0x7ffd7df68f90 " \220\366}\375\177", len = 5981733}, 
          port_no = 936, proto = 0, type = ERROR_URI_T, flags = (unknown: 2113310720), transport = {s = 0x7ff05d2d8988 "\017", len = 1563478568}, ttl = {s = 0x7ff05d311228 "n\025\061]\360\177", len = 0}, user_param = {
            s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 1563355696}, maddr = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 5989420}, method = {s = 0x0, 
            len = 2113310720}, lr = {s = 0x7ffd7df69020 "P\220\366}\375\177", len = 4399688}, r2 = {s = 0x1ecbd70 "\020\321\334\001", len = 0}, gr = {s = 0x7ff05d2d8980 "\a", len = 2113311192}, transport_val = {
            s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7ffd7df69040 "(\312\060]\360\177", len = 4398966}, maddr_val = {s = 0x7ffd7df690d0 "", len = 1563259632}, method_val = {
            s = 0x0, len = 0}, lr_val = {s = 0x0, len = -24651520}, r2_val = {s = 0x7ffd7df69050 "\200\221\366}\375\177", len = 4399820}, gr_val = {s = 0x7ff05d2d8978 "\001", len = 2113311192}}
        next_hop = {user = {s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, passwd = {s = 0x7ffd7df69180 "\260\222\366}\375\177", len = 4405224}, host = {s = 0x0, len = 30759440}, port = {s = 0x7ffd7df69090 "(\312\060]\360\177", 
            len = 1472711292}, params = {s = 0x7ff05d2d97d8 "!", len = 2113311192}, sip_params = {s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, headers = {s = 0x1d55a10 "\200\065\357\001", len = -24651520}, port_no = 37104, 
          proto = 32246, type = 32765, flags = (unknown: 30759440), transport = {s = 0x7ff05d2d72f0 "\a", len = 1563261728}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x1df8de0 " \273\354\001", 
            len = 1472632365}, method = {s = 0x1d55a10 "\200\065\357\001", len = 30759440}, lr = {s = 0x1df8de0 " \273\354\001", len = 1472620846}, r2 = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 30759440}, gr = {
            s = 0x7ff057c62030 "\213V\bH\213\066\351\225U", len = 2113311360}, transport_val = {s = 0x0, len = -24651520}, ttl_val = {s = 0xe8de0e2342a7b034 <error: Cannot access memory at address 0xe8de0e2342a7b034>, len = 1563355696}, 
          user_param_val = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 2113320912}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x7ffd7df692b0 "\200\230\366}\375\177", len = 4401525}, 
          lr_val = {s = 0x1f07f00 "\020]\337\001", len = 4291248}, r2_val = {s = 0x7ffd7df6b7d0 "\r", len = 1563355696}, gr_val = {s = 0x7ff05d2d90a8 "\017", len = 2113311496}}
        u = 0x2
        port = 0
        dst_host = 0x7ff05d30ca28
        i = 1472702157
        flags = 0
        avp = 0x7ffd7df68e30
        st = {flags = 2113310352, id = 32765, name = {n = 1533206860, s = {s = 0x7ff05b62e14c <pkg_proc_update_stats+130> "H\213\r\225M ", len = 2113310544}, re = 0x7ff05b62e14c <pkg_proc_update_stats+130>}, avp = 0x0}
        sct = 0xb954d573fe87d900
        sjt = 0x7ffd7df68e70
        rve = 0x7ff05d2da808
        mct = 0x664969 <qm_info+46>
        rv = 0x1f0ec00
        rv1 = 0x7ffd7df690d8
        c1 = {cache_type = 55, val_type = RV_NONE, c = {avp_val = {n = -24651520, s = {s = 0xb954d573fe87d900 <error: Cannot access memory at address 0xb954d573fe87d900>, len = 2113310400}, re = 0xb954d573fe87d900}, pval = {rs = {
                s = 0xb954d573fe87d900 <error: Cannot access memory at address 0xb954d573fe87d900>, len = 2113310400}, ri = 4842663, flags = 0}}, i2s = "\000\000\000\000\000\000\000\000@z{\000\005\000\000\000\200c%]\360\177"}
        s = {s = 0x7ffd7df68e50 "", len = 1562718224}
        srevp = {0x7ff05d2d72f8, 0x7ff05d253010}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#13 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2dc010, msg=0x7ff05d30ca28) at core/action.c:1552
        t = 0x7ff05d2dc010
        ret = -1
        mod = 0xb954d573fe87d900
        ms = 0
        __FUNCTION__ = "run_actions"
#14 0x000000000045cc6c in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2deab8, msg=0x7ff05d30ca28) at core/action.c:1045
        ret = 1
        v = 1
        dst = {send_sock = 0x2020200a2922676e, to = {s = {sa_family = 8224, sa_data = " end\n      pos"}, sin = {sin_family = 8224, sin_port = 25888, sin_addr = {s_addr = 537551982}, sin_zero = "     pos"}, sin6 = {sin6_family = 8224, 
              sin6_port = 25888, sin6_flowinfo = 537551982, sin6_addr = {__in6_u = {__u6_addr8 = "     posix.close", __u6_addr16 = {8224, 8224, 28704, 29551, 30825, 25390, 28524, 25971}, __u6_addr32 = {538976288, 1936683040, 1663989865, 
                    1702063980}}}, sin6_scope_id = 1701980192}}, id = 1717527649, proto = 40 '(', send_flags = {f = 202 '\312', blst_imask = 48 '0'}}
        tmp = 0x206c696e203d3d20 <error: Cannot access memory at address 0x206c696e203d3d20>
        new_uri = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s"
        end = 0x7ffd7df6b7d0 "\r"
        crt = 0x7ff05d2cb210 "handle_packet"
        cmd = 0x7ff05d2b3568
        len = 538976288
        user = 538976288
        uri = {user = {s = 0x665f65706970202c <error: Cannot access memory at address 0x665f65706970202c>, len = 539568494}, passwd = {s = 0x7720657372756365 <error: Cannot access memory at address 0x7720657372756365>, len = 543716457}, 
          host = {s = 0x726120676e696e69 <error: Cannot access memory at address 0x726120676e696e69>, len = 1701672295}, port = {s = 0x65736c6520202020 <error: Cannot access memory at address 0x65736c6520202020>, len = 539831584}, params = {
            s = 0x65636f727020746e <error: Cannot access memory at address 0x65636f727020746e>, len = 537555827}, sip_params = {s = 0x74735f6576617320 <error: Cannot access memory at address 0x74735f6576617320>, len = 1953853284}, 
          headers = {s = 0x7075642e7869736f <error: Cannot access memory at address 0x7075642e7869736f>, len = 1869621280}, port_no = 21587, proto = 20292, type = 1180652629, flags = (URI_USER_NORMALIZE | unknown: 1313164360), transport = {
            s = 0x2066692020202020 <error: Cannot access memory at address 0x2066692020202020>, len = 544501614}, ttl = {s = 0x2074756f6474735f <error: Cannot access memory at address 0x2074756f6474735f>, len = 1852139636}, user_param = {
            s = 0x6569642020202020 <error: Cannot access memory at address 0x6569642020202020>, len = 1696737312}, maddr = {s = 0x676e692d70756420 <error: Cannot access memory at address 0x676e692d70756420>, len = 537536802}, method = {
            s = 0x2020200a646e6520 <error: Cannot access memory at address 0x2020200a646e6520>, len = 1763713056}, lr = {s = 0x2e7869736f702074 <error: Cannot access memory at address 0x2e7869736f702074>, len = 846230884}, r2 = {
            s = 0x202c64665f657469 <error: Cannot access memory at address 0x202c64665f657469>, len = 1769172848}, gr = {s = 0x4c49465f54554f44 <error: Cannot access memory at address 0x4c49465f54554f44>, len = 693063237}, transport_val = {
            s = 0x2020202020200a6e <error: Cannot access memory at address 0x2020202020200a6e>, len = 1768169504}, ttl_val = {s = 0x756420726f727265 <error: Cannot access memory at address 0x756420726f727265>, len = 1764569712}, 
          user_param_val = {s = 0x652020202020200a <error: Cannot access memory at address 0x652020202020200a>, len = 537551982}, maddr_val = {s = 0x632e7869736f7020 <error: Cannot access memory at address 0x632e7869736f7020>, 
            len = 1702063980}, method_val = {s = 0x7ff05d2b94c0 "\267\344\360W\360\177", len = 538976288}, lr_val = {s = 0x65736f6c632e7869 <error: Cannot access memory at address 0x65736f6c632e7869>, len = 1920411680}, r2_val = {
            s = 0x202020200a296466 <error: Cannot access memory at address 0x202020200a296466>, len = 174354021}, gr_val = {s = 0x636f6c20200a0a64 <error: Cannot access memory at address 0x636f6c20200a0a64>, len = 1914727521}}
        next_hop = {user = {s = 0x6e776170732e4d20 <error: Cannot access memory at address 0x6e776170732e4d20>, len = 1534339104}, passwd = {s = 0x746f6e2066692020 <error: Cannot access memory at address 0x746f6e2066692020>, 
            len = 1952805408}, host = {s = 0x6964202020200a6e <error: Cannot access memory at address 0x6964202020200a6e>, len = 573055077}, port = {s = 0x726f66206e692072 <error: Cannot access memory at address 0x726f66206e692072>, 
            len = 1919885419}, params = {s = 0x6e6520200a292274 <error: Cannot access memory at address 0x6e6520200a292274>, len = 538970724}, sip_params = {s = 0x2065736f6c632e78 <error: Cannot access memory at address 0x2065736f6c632e78>, 
            len = 1936683048}, headers = {s = 0xb554f4454 <error: Cannot access memory at address 0xb554f4454>, len = 1563353520}, port_no = 26912, proto = 8294, type = 1042314275, flags = (unknown: 1563353528), transport = {
            s = 0x7ff05d2eea30 "\034d\036Z]\025\r", len = 4291248}, ttl = {s = 0x7ffd7df69790 "\320\227\366}\375\177", len = 4522002}, user_param = {s = 0x6961772e7869736f <error: Cannot access memory at address 0x6961772e7869736f>, 
            len = 1881677940}, maddr = {s = 0x7ff05d2ee1b0 "172.20.40.5", len = 10717792}, method = {s = 0x297075642e <error: Cannot access memory at address 0x297075642e>, len = 1563476872}, lr = {
            s = 0x7ffd7df697d0 "\020\230\366}\375\177", len = 4525774}, r2 = {s = 0x7ffd7df698e0 "", len = 2113312832}, gr = {s = 0x2065696420202020 <error: Cannot access memory at address 0x2065696420202020>, len = 1563476872}, 
          transport_val = {s = 0x7ff05d30c3b0 "", len = 1563478568}, ttl_val = {s = 0x7ffd7df69810 "`\230\366}\375\177", len = 4528003}, user_param_val = {s = 0x7ff05d2c9478 "\310\246+]\360\177", len = 2113312992}, maddr_val = {
            s = 0x7ffd7df69840 "", len = 2113312816}, method_val = {s = 0x646e650a74657220 <error: Cannot access memory at address 0x646e650a74657220>, len = 1563476912}, lr_val = {s = 0x7ffd7df69860 "\260zA", len = 1463997149}, r2_val = {
            s = 0x66726550202d0056 <error: Cannot access memory at address 0x66726550202d0056>, len = 2113312992}, gr_val = {s = 0x7ffd7df69860 "\260zA", len = 1463997228}}
        u = 0xd
        port = 0
        dst_host = 0x7ff05d2eea30
        i = 1646403616
        flags = 170664549
        avp = 0x6620726f72726522
        st = {flags = 1563206568, id = 32752, name = {n = 1563478568, s = {s = 0x7ff05d30ca28 "\243\221d", len = 2113313424}, re = 0x7ff05d30ca28}, avp = 0x45cd85 <do_action+31624>}
        sct = 0x0
        sjt = 0x7ffd7df694c0
        rve = 0x7ff05d2d90a8
        mct = 0x7ff057e9815f <w_app_lua_run0+60>
        rv = 0x6469702066692020
        rv1 = 0xb954d573fe87d900
        c1 = {cache_type = 1563209688, val_type = 32752, c = {avp_val = {n = 2113313664, s = {s = 0x7ffd7df69b80 "", len = 1600484457}, re = 0x7ffd7df69b80}, pval = {rs = {s = 0x7ffd7df69b80 "", len = 1600484457}, ri = 538976288, 
              flags = 1936662560}}, i2s = ".exit (pipeline (list."}
        s = {s = 0x6461657228203270 <error: Cannot access memory at address 0x6461657228203270>, len = 0}
        srevp = {0x7ff05d30ca28, 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#15 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2d6828, msg=0x7ff05d30ca28) at core/action.c:1552
        t = 0x7ff05d2deab8
        ret = 1
        mod = 0xb954d573fe87d900
        ms = 0
        __FUNCTION__ = "run_actions"
#16 0x000000000045958d in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2cdb18, msg=0x7ff05d30ca28) at core/action.c:678
        ret = -5
        v = 1948786802
        dst = {send_sock = 0x24, to = {s = {sa_family = 51752, sa_data = "0]\360\177\000\000\330\257,]\360\177\000"}, sin = {sin_family = 51752, sin_port = 23856, sin_addr = {s_addr = 32752}, sin_zero = "\330\257,]\360\177\000"}, sin6 = {
              sin6_family = 51752, sin6_port = 23856, sin6_flowinfo = 32752, sin6_addr = {__in6_u = {__u6_addr8 = "\330\257,]\360\177\000\000\340\256\366}\375\177\000", __u6_addr16 = {45016, 23852, 32752, 0, 44768, 32246, 32765, 0}, 
                  __u6_addr32 = {1563209688, 32752, 2113318624, 32765}}}, sin6_scope_id = 2}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        tmp = 0x0
        new_uri = 0x7ff05d30ca28 "\243\221d"
        end = 0x17df6aee0 <error: Cannot access memory at address 0x17df6aee0>
        crt = 0x2030203d00000005 <error: Cannot access memory at address 0x2030203d00000005>
        cmd = 0x7ff000000000
        len = 1717527920
        user = 537536878
        uri = {user = {s = 0x1724f6716c27b034 <error: Cannot access memory at address 0x1724f6716c27b034>, len = 1981263924}, passwd = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 1562718224}, host = {
            s = 0x7ffd7df69d70 "\200\345,]\360\177", len = 1562718224}, port = {s = 0x7ffd7df69c50 "\200\234\366}\375\177", len = 1533206860}, params = {s = 0x7ffd7df69d70 "\200\345,]\360\177", len = 0}, sip_params = {
            s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 16004968}, headers = {s = 0x5dfb0 <error: Cannot access memory at address 0x5dfb0>, len = 772248}, port_no = 56952, proto = 11, type = ERROR_URI_T, 
          flags = (unknown: 8), transport = {s = 0x41 <error: Cannot access memory at address 0x41>, len = -24651520}, ttl = {s = 0x7ffd7df69c80 "@\235\366}\375\177", len = -24651520}, user_param = {
            s = 0x7ffd7df69d50 "\300\235\366}\375\177", len = 4381807}, maddr = {s = 0x7ff05d2ee268 "\020", len = 0}, method = {s = 0x7ffd7df69d40 "pz,]\360\177", len = 0}, lr = {s = 0x7ff05d2cb6f8 "\004", len = 2113314516}, r2 = {
            s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, gr = {s = 0x7ffd7df69d20 "\230\345,]\360\177", len = 0}, transport_val = {s = 0x7ff05d2ee1b0 "172.20.40.5", len = 2113314288}, ttl_val = {s = 0x0, len = 1563478568}, 
          user_param_val = {s = 0x8968 <error: Cannot access memory at address 0x8968>, len = 2113314352}, maddr_val = {s = 0x7ff05d2ccf70 "\001", len = 1563478568}, method_val = {s = 0x7ffd7df69d50 "\300\235\366}\375\177", 
            len = 1520823051}, lr_val = {s = 0x0, len = 2113314352}, r2_val = {s = 0x7ff05d2ce598 "\001", len = 1563478568}, gr_val = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 0}}
        next_hop = {user = {s = 0x7ff05d2c7a70 "\b{,]\360\177", len = -24651520}, passwd = {s = 0x7ffd7df69dc0 "P\236\366}\375\177", len = 5981733}, host = {s = 0x0, len = 2113314352}, port = {s = 0x7ff05d2ce580 "\017", len = 1563478568}, 
          params = {s = 0x7ff05d2cb6f0 "\001", len = 0}, sip_params = {s = 0x7ff05d30ca28 "\243\221d", len = 1563355696}, headers = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 5989420}, 
          port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 2113314352), transport = {s = 0x7ffd7df69e50 "\200\236\366}\375\177", len = 4399688}, ttl = {s = 0x7ffd00000025 <error: Cannot access memory at address 0x7ffd00000025>, 
            len = 0}, user_param = {s = 0x7ff05d2ce578 "\a", len = 2113314824}, maddr = {s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, method = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -24651520}, 
          lr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1397494312}, r2 = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 2113320912}, gr = {s = 0x0, len = 0}, transport_val = {
            s = 0x0, len = -24651520}, ttl_val = {s = 0x7ffd7df69e80 "\260\237\366}\375\177", len = 4399820}, user_param_val = {s = 0x7ff05d2ce570 "\001", len = 2113314824}, maddr_val = {s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, 
          method_val = {s = 0x7ffd7df69fb0 "\200\245\366}\375\177", len = 4405224}, lr_val = {s = 0x6d80 <error: Cannot access memory at address 0x6d80>, len = 2113314608}, r2_val = {s = 0x7ff05d2c9398 "\017", len = 28}, gr_val = {
            s = 0x7ff05d2cf3d0 "!", len = 2113314824}}
        u = 0x207000
        port = 25972
        dst_host = 0x7ffd7df69b80
        i = 4
        flags = 1768955948
        avp = 0x209000
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 2113313888}, re = 0x0}, avp = 0x46a1b1 <run_actions_safe+169>}
        sct = 0x2020202000000030
        sjt = 0x0
        rve = 0x7ff05d2cafd8
        mct = 0x5b
        rv = 0x78e8
        rv1 = 0x7ff05d30ca28
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 1, s = {s = 0x7ff000000001 <error: Cannot access memory at address 0x7ff000000001>, len = 1563355696}, re = 0x7ff000000001}, pval = {rs = {
                s = 0x7ff000000001 <error: Cannot access memory at address 0x7ff000000001>, len = 1563355696}, ri = 1877454900, flags = 388298353}}, i2s = "\260zA\000\000\000\000\000\320\267\366}\375\177\000\000\000\000\000\000\000"}
        s = {s = 0x0, len = 1563355696}
        srevp = {0x417ab0 <_start>, 0x7ffd7df6b7d0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#17 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2cdb18, msg=0x7ff05d30ca28) at core/action.c:1552
        t = 0x7ff05d2cdb18
        ret = -1
        mod = 0xb954d573fe87d900
        ms = 0
        __FUNCTION__ = "run_actions"
#18 0x000000000045cc6c in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2cdc68, msg=0x7ff05d30ca28) at core/action.c:1045
        ret = 1
        v = 1
        dst = {send_sock = 0x7ff051355f71, to = {s = {sa_family = 45108, sa_data = "\347\033q\366$\027\064\260EL\331\260>\027"}, sin = {sin_family = 45108, sin_port = 7143, sin_addr = {s_addr = 388298353}, 
              sin_zero = "4\260EL\331\260>\027"}, sin6 = {sin6_family = 45108, sin6_port = 7143, sin6_flowinfo = 388298353, sin6_addr = {__in6_u = {__u6_addr8 = "4\260EL\331\260>\027\000\000\000\000\000\000\000", __u6_addr16 = {45108, 
                    19525, 45273, 5950, 0, 0, 0, 0}, __u6_addr32 = {1279635508, 389984473, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 104 'h', send_flags = {f = 170 '\252', blst_imask = 231 '\347'}}
        tmp = 0x0
        new_uri = 0x7ffd7df6a380 "\360\314\343\001"
        end = 0x0
        crt = 0x1d08580 ""
        cmd = 0x7ff05d2b3568
        len = 7
        user = 0
        uri = {user = {s = 0x7ffd7df6a400 "", len = 1580671501}, passwd = {s = 0x0, len = 0}, host = {s = 0x7ffd7df6a100 "0\242\366}\375\177", len = 2113585744}, port = {
            s = 0x2000000000 <error: Cannot access memory at address 0x2000000000>, len = 0}, params = {s = 0x0, len = 30427152}, sip_params = {s = 0x7ffd7df6a250 "", len = 1362444288}, headers = {s = 0x7ff051359358 "HF!", len = 31958800}, 
          port_no = 7, proto = 0, type = ERROR_URI_T, flags = (URI_SIP_USER_PHONE | unknown: 1587695352), transport = {s = 0x1e7a710 "", len = 1587696341}, ttl = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1587686988}, 
          user_param = {s = 0x0, len = -2009157508}, maddr = {s = 0x1e35b60 "", len = 2113317104}, method = {s = 0x7ff05e3b91c4 "[%d]", len = 1580962247}, lr = {s = 0x0, len = 1579802473}, r2 = {s = 0x7ff05e257d28 "", len = 1579538456}, 
          gr = {s = 0x7ffd7df6a480 "\200v\354\001", len = 35715777}, transport_val = {s = 0x7ffd7df6a450 " \221;^\360\177", len = 31959656}, ttl_val = {s = 0x0, len = 1589831120}, user_param_val = {
            s = 0x7ff05e29f99a <vfprintf+22490> "\200\275(\373\377\377", len = 4253399}, maddr_val = {s = 0x7ff05e264d78 "", len = 4210936}, method_val = {s = 0x1e3ccf0 "", len = 2113317248}, lr_val = {s = 0x7ff05e3b91c4 "[%d]", 
            len = 1580962247}, r2_val = {s = 0x0, len = 1579802473}, gr_val = {s = 0x1d859 <error: Cannot access memory at address 0x1d859>, len = 10}}
        next_hop = {user = {s = 0x7ffd7df6a510 "", len = 1579983518}, passwd = {s = 0x1e35b60 "", len = 2113317328}, host = {s = 0x7c7a7f "%s: %s%s(): bad cseq\n", len = 8157831}, port = {
            s = 0x7ff05e29f99a <vfprintf+22490> "\200\275(\373\377\377", len = 1579802473}, params = {s = 0x0, len = 0}, sip_params = {s = 0x7ffd7df6a560 "\260zA", len = 1579809178}, headers = {s = 0x0, len = 1579809178}, port_no = 0, 
          proto = 0, type = 32765, flags = (URI_SIP_USER_PHONE | unknown: 4294967288), transport = {s = 0x1d859 <error: Cannot access memory at address 0x1d859>, len = 10}, ttl = {s = 0x7ff05e3b9120 " != ((void *)0)", len = 1579983518}, 
          user_param = {s = 0x1e3ccf0 "", len = 2113317472}, maddr = {s = 0x7d4720 "%s: %s%s(): bad cseq\n", len = 8210216}, method = {s = 0x1ec7680 " \206\330\001", len = 2113317504}, lr = {s = 0x7ff05e3b91c4 "[%d]", len = 1580962247}, 
          r2 = {s = 0x0, len = 1579802473}, gr = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 1579809178}, transport_val = {s = 0x7ffd7df6a610 "\260zA", len = 1580962245}, ttl_val = {
            s = 0x7ffd7df6a5c0 "p\241,]\360\177", len = 8}, user_param_val = {s = 0x7ff05e3b91c8 "", len = 0}, maddr_val = {s = 0x7ff05e29f99a <vfprintf+22490> "\200\275(\373\377\377", len = 10}, method_val = {
            s = 0xa726f7200000005 <error: Cannot access memory at address 0xa726f7200000005>, len = 1579809178}, lr_val = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 0}, r2_val = {
            s = 0xb00000000 <error: Cannot access memory at address 0xb00000000>, len = 0}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1513578687}}
        u = 0x7ff051355cb0
        port = 4391
        dst_host = 0x1000000bd
        i = 144
        flags = 0
        avp = 0x7ff057c5cb90
        st = {flags = 1, id = 32765, name = {n = 0, s = {s = 0x0, len = 1}, re = 0x0}, avp = 0x1e7a710}
        sct = 0x1e7aa68
        sjt = 0x7ffd7df6a380
        rve = 0x7ff05d2cf3d0
        mct = 0x1e7a710
        rv = 0x0
        rv1 = 0x7ff051355670
        c1 = {cache_type = 31961328, val_type = RV_NONE, c = {avp_val = {n = 2113315360, s = {s = 0x7ffd7df6a220 "\377\377\377\377", len = 1}, re = 0x7ffd7df6a220}, pval = {rs = {s = 0x7ffd7df6a220 "\377\377\377\377", len = 1}, 
              ri = 1362451632, flags = 32752}}, i2s = "\377\377\377\377\000\000\000\000\020\247\347\001\000\000\000\000\210\307\305W\360\177"}
        s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1587689837}
        srevp = {0x0, 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#19 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2ca170, msg=0x7ff05d30ca28) at core/action.c:1552
        t = 0x7ff05d2cdc68
        ret = 1
        mod = 0x0
        ms = 0
        __FUNCTION__ = "run_actions"
#20 0x000000000045958d in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2c4920, msg=0x7ff05d30ca28) at core/action.c:678
        ret = -5
        v = 20
        dst = {send_sock = 0x1000000, to = {s = {sa_family = 15624, sa_data = "\364\000\000\000\000\000\020\332\005\000\000\000\000"}, sin = {sin_family = 15624, sin_port = 244, sin_addr = {s_addr = 0}, 
              sin_zero = "\020\332\005\000\000\000\000"}, sin6 = {sin6_family = 15624, sin6_port = 244, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\020\332\005\000\000\000\000\000\370\302\v\000\000\000\000", __u6_addr16 = {
                    55824, 5, 0, 0, 49912, 11, 0, 0}, __u6_addr32 = {383504, 0, 770808, 0}}}, sin6_scope_id = 777848}}, id = 0, proto = 105 'i', send_flags = {f = 73 'I', blst_imask = 102 'f'}}
        tmp = 0x1ff4 <error: Cannot access memory at address 0x1ff4>
        new_uri = 0x1d0f0b0 "CET"
        end = 0x7ffd7df6a830 "\220\250\366}\375\177"
        crt = 0x6 <error: Cannot access memory at address 0x6>
        cmd = 0x7ff05d2b3568
        len = 0
        user = 0
        uri = {user = {s = 0x7ffd7df6a900 "", len = 1562718224}, passwd = {s = 0x40005d8b0 <error: Cannot access memory at address 0x40005d8b0>, len = 1562718224}, host = {s = 0x7ffd7df6a940 "p\251\366}\375\177", len = 1533206860}, port = {
            s = 0x7ffd7df6a9e0 "\300\250.]\360\177", len = 0}, params = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 16005136}, sip_params = {s = 0x5df08 <error: Cannot access memory at address 0x5df08>, 
            len = 772080}, headers = {s = 0xbde78 <error: Cannot access memory at address 0xbde78>, len = 8}, port_no = 67, proto = 0, type = ERROR_URI_T, flags = (unknown: 4270315776), transport = {s = 0x7ffd7df6a970 " \252\366}\375\177", 
            len = 4842663}, ttl = {s = 0x0, len = 8092224}, user_param = {s = 0x7ffd7df6aa20 "0\253\366}\375\177", len = 0}, maddr = {s = 0x7ffd7df6aa20 "0\253\366}\375\177", len = 6671236}, method = {
            s = 0x40005dc00 <error: Cannot access memory at address 0x40005dc00>, len = 8189744}, lr = {s = 0x7cd200 "core", len = -24651520}, r2 = {s = 0x7cf090 <__FUNCTION__.6198> "parse_to_param", len = 8181208}, gr = {
            s = 0x30 <error: Cannot access memory at address 0x30>, len = 1562718224}, transport_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 1}, ttl_val = {s = 0x7ffd7df6aa90 " \254\366}\375\177", 
            len = 1562718224}, user_param_val = {s = 0x7ff05d2ea8c0 "0", len = -24651520}, maddr_val = {s = 0x7ffd7df6aadb "]\360\177", len = 1563355696}, method_val = {s = 0x400417ab0 <error: Cannot access memory at address 0x400417ab0>, 
            len = 8180224}, lr_val = {s = 0x0, len = -24651520}, r2_val = {s = 0x7ffd7df6ab30 "@", len = 6919225}, gr_val = {s = 0x800000000 <error: Cannot access memory at address 0x800000000>, len = 1}}
        next_hop = {user = {s = 0x0, len = 2113317744}, passwd = {s = 0x5d30f1e8 <error: Cannot access memory at address 0x5d30f1e8>, len = 1563487888}, host = {s = 0xa39866 <buf+1254> "", len = 10720755}, port = {
            s = 0x400417ab0 <error: Cannot access memory at address 0x400417ab0>, len = 351336240}, params = {s = 0x1d <error: Cannot access memory at address 0x1d>, len = 10720488}, sip_params = {s = 0x7ffd7df6ac20 "0\255\366}\375\177", 
            len = 7028980}, headers = {s = 0x0, len = 8092224}, port_no = 43888, proto = 32246, type = 32765, flags = (URI_USER_NORMALIZE | unknown: 6703464), transport = {s = 0x7ffd7df6ab00 "", len = 1562718224}, ttl = {
            s = 0xa3964a <buf+714> "low: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE\r\nSupported: replaces\r\nContact: <sip:4923256980@217.10.77.115:5060>\r\nContent-Type: application/sdp\r\nContent-Leng"..., len = 1562718224}, user_param = {s = 0x7ffd7df6ab40 "\210\025.]\360\177", len = 1533206860}, maddr = {s = 0x0, len = 0}, method = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 16004952}, lr = {
            s = 0x5dfc0 <error: Cannot access memory at address 0x5dfc0>, len = 772264}, r2 = {s = 0xbde78 <error: Cannot access memory at address 0xbde78>, len = 8}, gr = {s = 0x40 <error: Cannot access memory at address 0x40>, 
            len = 7124329}, transport_val = {s = 0x7ff05d2e1588 "\001", len = 1563301240}, ttl_val = {s = 0x0, len = 8092224}, user_param_val = {s = 0x7ffd7df6ac20 "0\255\366}\375\177", len = 1563355696}, maddr_val = {
            s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 2113320912}, method_val = {s = 0xa39866 <buf+1254> "", len = 10720838}, lr_val = {s = 0x7ffd7df6ac20 "0\255\366}\375\177", len = 6839005}, 
          r2_val = {s = 0x7d6faa <__FUNCTION__.6418> "get_hdr_field", len = 1563301216}, gr_val = {s = 0xa39866 <buf+1254> "", len = 10720826}}
        u = 0x157842ad1
        port = 65535
        dst_host = 0x7ffd7df6a9cf
        i = 2
        flags = 0
        avp = 0x7ffd7df6aa40
        st = {flags = 2113317008, id = 32765, name = {n = 1533206860, s = {s = 0x7ff05b62e14c <pkg_proc_update_stats+130> "H\213\r\225M ", len = 6}, re = 0x7ff05b62e14c <pkg_proc_update_stats+130>}, avp = 0x0}
        sct = 0x7ff000000001
        sjt = 0x7ffd7df6aee2
        rve = 0x7ff05e5f7300
        mct = 0x664969 <qm_info+46>
        rv = 0x7ffd00000000
        rv1 = 0x7ffd7df6a810
        c1 = {cache_type = 2113317056, val_type = 32765, c = {avp_val = {n = 1562718224, s = {s = 0x7ff05d253010 "\001", len = 2113317056}, re = 0x7ff05d253010}, pval = {rs = {s = 0x7ff05d253010 "\001", len = 2113317056}, ri = 1562718224, 
              flags = 32752}}, i2s = "\000\251\366}\375\177\000\000L\341b[\360\177\000\000p\251\366}\375\177"}
        s = {s = 0x7ffd7df6a850 "", len = 1562718224}
        srevp = {0x39327df6ae90, 0x7ff05d253010}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#21 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2c39c0, msg=0x7ff05d30ca28) at core/action.c:1552
        t = 0x7ff05d2c4920
        ret = 1
        mod = 0xb954d57300000000
        ms = 0
        __FUNCTION__ = "run_actions"
#22 0x000000000046a2bd in run_top_route (a=0x7ff05d2c39c0, msg=0x7ff05d30ca28, c=0x7ffd7df6aee0) at core/action.c:1641
        ctx = {rec_lev = 1563492736, run_flags = 32752, last_retcode = -24651520, jmp_env = {{__jmpbuf = {4291248, 140670332234288, 4291248, 140726716774352, 0, 0, 140726716727328, 4302026204}, __mask_was_saved = 2113318256, __saved_mask = {
                __val = {140670302069697, 4294967416, 32, 32, 140670331596816, 140726716771744, 140670302070636, 0, 0, 4611686037170749880, 140670332357160, 140726716771792, 5298061, 12889193136, 140670332357160, 4611686035607257088}}}}}
        p = 0x7ffd7df6aee0
        ret = 32752
        sfbk = 0
#23 0x0000000000580a69 in receive_msg (
    buf=0xa393f7 <buf+119> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 172.20.40.5;branch=z9hG4bKe877.99be6a0f42b6af42ea04ccf5096212f6.0;received=172.20.40.5\r\nVia: SIP/2.0/UDP 217.10.68.147;branch=z9hG4bKe877.e34c617b86d11387c957efc71c542"..., 
    len=1135, rcv_info=0x7ffd7df6b0f0) at core/receive.c:327
        msg = 0x7ff05d30ca28
        ctx = {rec_lev = 5, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140670332234288, 1667728727226167348, 4291248, 140726716774352, 0, 0, 1667728727247138868, -1666880443433635788}, __mask_was_saved = 0, __saved_mask = {
                __val = {140670332234288, 4291248, 140726716774352, 140726716772288, 140670275555975, 140670275624576, 169010473594, 140726716772376, 96052620480, 11417664, 0, 152437174176, 140668768878608, 4291248, 140670332234288, 
                  4291248}}}}}
        bctx = 0x664969 <qm_info+46>
        ret = 1
        stats_on = 0
        tvb = {tv_sec = 140726716772048, tv_usec = 140670331596816}
        tve = {tv_sec = 140726716772096, tv_usec = 140670331596816}
        tz = {tz_minuteswest = 9, tz_dsttime = 0}
        diff = 0
        inb = {
          s = 0xa393f7 <buf+119> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 172.20.40.5;branch=z9hG4bKe877.99be6a0f42b6af42ea04ccf5096212f6.0;received=172.20.40.5\r\nVia: SIP/2.0/UDP 217.10.68.147;branch=z9hG4bKe877.e34c617b86d11387c957efc71c542"..., len = 1135}
        netinfo = {data = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 0}, dst = 0x1000000, rcv = 0xf44700}
        keng = 0x0
        __FUNCTION__ = "receive_msg"
#24 0x00007ff059ce4cdf in parsing_hepv3_message (buf=0xa39380 <buf> "HEP3\004\346", len=1254) at hep.c:499
        from = {s = {sa_family = 2, sa_data = "\023\304\331\nMs\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1934428889}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, 
            sin6_port = 50195, sin6_flowinfo = 1934428889, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}
        to = {s = {sa_family = 2, sa_data = "\023\304\254\024(\005\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 86512812}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, 
            sin6_port = 50195, sin6_flowinfo = 86512812, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {140670703307481, 0}, addr32 = {1934428889, 32752, 0, 0}, addr16 = {2777, 29517, 32752, 0, 0, 0, 0, 0}, addr = "\331\nMs\360\177\000\000\000\000\000\000\000\000\000"}}, dst_ip = {af = 2, 
            len = 4, u = {addrl = {140724689966252, 140726716772656}, addr32 = {86512812, 32765, 2113319216, 32765}, addr16 = {5292, 1320, 32765, 0, 45360, 32246, 32765, 0}, addr = "\254\024(\005\375\177\000\000\060\261\366}\375\177\000"}}, 
          src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 4254168, src_su = {s = {sa_family = 2, sa_data = "\023\304\331\nMs\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {
                s_addr = 1934428889}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1934428889, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 
                    0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7ff05d2eaca8, proto = 1 '\001'}
        tmp = 0xa393f1 <buf+113> ""
        dst_ip = {af = 2, len = 4, u = {addrl = {140668855391404, 140726716772816}, addr32 = {86512812, 32752, 2113319376, 32765}, addr16 = {5292, 1320, 32752, 0, 45520, 32246, 32765, 0}, 
            addr = "\254\024(\005\360\177\000\000\320\261\366}\375\177\000"}}
        src_ip = {af = 2, len = 4, u = {addrl = {140670703307481, 1}, addr32 = {1934428889, 32752, 1, 0}, addr16 = {2777, 29517, 32752, 0, 1, 0, 0, 0}, addr = "\331\nMs\360\177\000\000\001\000\000\000\000\000\000"}}
        si = 0x7ff05d2eaca8
        tmp_len = 4
        i = 1254
        payload = 0xa393f7 <buf+119> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 172.20.40.5;branch=z9hG4bKe877.99be6a0f42b6af42ea04ccf5096212f6.0;received=172.20.40.5\r\nVia: SIP/2.0/UDP 217.10.68.147;branch=z9hG4bKe877.e34c617b86d11387c957efc71c542"...
        payload_len = 1135
        chunk = 0xa393f1 <buf+113>
        hg = 0x7ff05d2eabb8
        totelem = 11
        chunk_vendor = 0
        chunk_type = 15
        chunk_length = 1141
        total_length = 1254
        __FUNCTION__ = "parsing_hepv3_message"
#25 0x00007ff059ce3264 in hepv3_received (buf=0xa39380 <buf> "HEP3\004\346", len=1254, ri=0x7ffd7df6b330) at hep.c:231
        __FUNCTION__ = "hepv3_received"
#26 0x00007ff059ce19cb in hep_msg_received (data=0x7ffd7df6b310) at hep.c:85
        srevp = 0x7ffd7df6b310
        buf = 0xa39380 <buf> "HEP3\004\346"
        len = 0x7ffd7df6b2e4
        ri = 0x7ffd7df6b330
        __FUNCTION__ = "hep_msg_received"
        heph = 0xa39380 <buf>
#27 0x000000000049e4e1 in sr_event_exec (type=7, data=0x7ffd7df6b310) at core/events.c:263
        ret = 0
        i = 7
#28 0x000000000048731a in udp_rcv_loop () at core/udp_server.c:466
        sredp = {0xa39380 <buf>, 0x7ffd7df6b2e4, 0x7ffd7df6b330}
        len = 1254
        buf = "HEP3\004\346\000\000\000\001\000\a\002\000\000\000\002\000\a\021\000\000\000\a\000\b\023\304\000\000\000\b\000\b\023\304\000\000\000\t\000\n\034d\036Z\000\000\000\n\000\n]\025\r\000\000\000\000\v\000\a\001\000\000\000\f\000\n\000\000\000\000\000\000\000\003\000\n\331\nMs\000\000\000\004\000\n\254\024(\005\000\000\000\016\000\024rodauMyHep2001\000\000\000\017\004uSIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 172.20.40.5;branch=z9hG4bKe877.99be6a0f42b6af42e"...
        tmp = 0x52fe33 <init_child+52> "\311\303UH\211\345AWAVAUATSH\203\354\070H\211}\270H\203}\270"
        from = 0x7ff05d2edfd8
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {16777343, 140670331935744}, addr32 = {16777343, 0, 1563057152, 32752}, addr16 = {127, 256, 0, 0, 23552, 23850, 32752, 0}, 
              addr = "\177\000\000\001\000\000\000\000\000\\*]\360\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 36988, 
          dst_port = 9060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\220|\177\000\000\001\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 31888, sin_addr = {s_addr = 16777343}, 
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 31888, sin6_flowinfo = 16777343, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, 
                  __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7ff05d2a5a80, proto = 1 '\001'}
        __FUNCTION__ = "udp_rcv_loop"
#29 0x0000000000422d08 in main_loop () at main.c:1623
        i = 23
        pid = 0
        si = 0x7ff05d2a5a80
        si_desc = "udp receiver child=23 sock=0.0.0.0:9060\000\000\331\207\376q\000\000\000\261\200u\000\000\000\000\000\000\331\207\376s\325T\271\004\000\000\000\000\000\000\000\246\252\256\066\000\000\000\000\260zA\000\000\000\000\000\320\267\366}\375\177", '\000' <repeats 19 times>, "\265\366}\375\177\000\000!3_\000\000\000\000"
        nrprocs = 96
        woneinit = 1
        __FUNCTION__ = "main_loop"
#30 0x000000000042a408 in main (argc=13, argv=0x7ffd7df6b7d8) at main.c:2643
        cfg_stream = 0x1c95010
        c = -1
        r = 0
        tmp = 0x7ffd7df6befe ""
        tmp_len = 1579565480
        port = 32752
        proto = 2113320592
        options = 0x73b8f8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1271703746
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0x1 <error: Cannot access memory at address 0x1>
        st = {st_dev = 15, st_ino = 259871, st_nlink = 2, st_mode = 16877, st_uid = 117, st_gid = 122, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1506502981, tv_nsec = 691416812}, st_mtim = {
            tv_sec = 1511857903, tv_nsec = 184120552}, st_ctim = {tv_sec = 1511857903, tv_nsec = 184120552}, __glibc_reserved = {0, 0, 0}}
        __FUNCTION__ = "main"
No symbol table info available.
1826	main.c: No such file or directory.

Log Messages

The log didn't say anything except this line:

ov 29 08:39:09 hostname /usr/sbin/kamailio[121099]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 34
Nov 29 08:39:09 hostname /usr/sbin/kamailio[120885]: ALERT: <core> [main.c:743]: handle_sigs(): child process 120921 exited by a signal 11
Nov 29 08:39:09 hostname /usr/sbin/kamailio[120885]: ALERT: <core> [main.c:746]: handle_sigs(): core was generated

Additional Information

version: kamailio 5.0.3 (x86_64/linux)
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: unknown
compiled with gcc 4.9.2

Kamailio is running on a Debian Jessie system.

Linux hostname 3.16.0-4-amd64 #1 SMP Debian 3.16.43-2+deb8u5 (2017-09-19) x86_64 GNU/Linux


You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.