After applying the linuxmaniac's patch, I have a new crash
``` # gdb /usr/sbin/kamailio /tmp/core GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: http://www.gnu.org/software/gdb/bugs/. Find the GDB manual and other documentation resources online at: http://www.gnu.org/software/gdb/documentation/. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/4e/fae9c9a848e19a554209666ff42a678720280e.debug...done. done. [New LWP 15013] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/kamailio.'. Program terminated with signal SIGSEGV, Segmentation fault. #0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74 74 ../../mem/../atomic/atomic_common.h: No such file or directory. (gdb) bt full #0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74 No locals. #1 dlg_unref_helper (dlg=0x7f4b606c5008, cnt=1, fname=0x3aa5 <error: Cannot #access memory at address 0x3aa5>, fline=1650) at dlg_hash.c:925 mypid = 15013 d_entry = 0x7f555b6b2bf0 __FUNCTION__ = "dlg_unref_helper" #2 0x00007f4b4d3d0e12 in dlg_run_event_route (dlg=0x7f4b606c5008, msg=0x7f4b93f32aa8, ostate=1390662688, nstate=1) at dlg_handlers.c:1650 rt = 10133176 bkroute = 1 __FUNCTION__ = "dlg_run_event_route" #3 0x00007f4b4d3d421e in dlg_onroute (req=0x7f4b93f32aa8, route_params=0x7f4b52e3be10, param=0x7f4b52e3d420) at dlg_handlers.c:1318 dlg0 = 0x3aa5 val = { s = 0x119535a "da8.12b2;nat=yes>\r\nRoute: sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: <sip:XXXXXXXXX@customer"..., len = 8} callid = { s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3"..., len = 32} ftag = { s = 0x11953fb "1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall-ID: 510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax"..., len = 10} ttag = { s = 0x119543e "as695cd3d4\r\nCall-ID: 510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Ag"..., len = 10} new_state = 5 old_state = 4 unref = 1 event = 7 dir = 1 ret = 15013 __FUNCTION__ = "dlg_onroute" #4 0x00007f4b4fcae28d in run_rr_callbacks (req=0x7f4b93f32aa8, rr_param=0x7ffe5b58c860) at rr_cb.c:96 l_param = { s = 0x119532f "transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nRoute: sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;"..., len = 59} cbp = 0x7f4b93f12208 __FUNCTION__ = "run_rr_callbacks" #5 0x00007f4b4fca08a2 in after_loose (_m=0x7f4b93f32aa8, preloaded=2) at loose.c:928 puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x1195379 "xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as6"..., len = 12}, port = {s = 0x0, len = 0}, params = { s = 0x1195386 "r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall"..., len = 45}, sip_params = { s = 0x1195386 "r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall"..., len = 45}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = { s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = { s = 0x119538c "lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall-ID: 5"..., len = 2}, r2 = { s = 0x1195386 "r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: <sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061---Type <return> to continue, or q <return> to quit---
;tag=as695cd3d4\r\nCall"..., len = 5}, gr = {s = 0x0, len = 0}, ;transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, ;user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = { s = 0x1195389 "on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall-ID"..., len = 2}, gr_val = {s = 0x0, len = 0}} rt = 0x0 status = 15013 uri = { s = 0x1195319 "sip:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nRoute: sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes\r\nFrom: "IbsVoip02" <sip:xxxxxx02@customers."..., len = 81} use_ob = 0 rparams = { s = 0x119532f "transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nRoute: sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;"..., len = 59} __FUNCTION__ = "after_loose" #6 0x0000000000541cf0 in do_action (h=0x7ffe5b58cf80, a=0x7f4b93d577b8, msg=0x7f4b93f32aa8) at action.c:1060 ret = -5 v = 0 dst = {send_sock = 0x7ffe5b58cad0, to = {s = {sa_family = 1215, sa_data = "B\000\000\000\000\000\300Y\363\223K\177\000"}, sin = {sin_family = 1215, sin_port = 66, sin_addr = {s_addr = 0}, sin_zero = "\300Y\363\223K\177\000"}, sin6 = {sin6_family = 1215, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\300Y\363\223K\177\000\000\273\065B\000\000\000\000", __u6_addr16 = {22976, 37875, 32587, 0, 13755, 66, 0, 0}, __u6_addr32 = {2482198976, 32587, 4339131, 0}}}, sin6_scope_id = 18437387}}, id = 0, proto = 15 '\017', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7ffe5b58cf80 "\001" uri = {user = {s = 0x7ffe5b58e250 "\003", len = 4329872}, passwd = {s = 0x24f2c0 <error: Cannot access memory at address 0x24f2c0>, len = 1532545924}, host = { s = 0x2d2028 <error: Cannot access memory at address 0x2d2028>, len = 1617711112}, port = {s = 0xa <error: Cannot access memory at address 0xa>, len = 0}, params = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 1390517168}, sip_params = {s = 0x7ffe5b58ccb0 "\373S\031\001", len = 5615623}, headers = {s = 0x0, len = 1774088704}, port_no = 65535, proto = 65535, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 1295691688), transport = {s = 0x7ffe5b58cca0 "ST\031\001", len = 1532546204}, ttl = {s = 0x0, len = 1390517168}, user_param = { s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3"..., len = 32}, maddr = {s = 0x8ad00000001 <error: Cannot access memory at address 0x8ad00000001>, len = 10}, method = {s = 0x7ffe5b58e250 "\003", len = 1532546208}, lr = { s = 0x1195473 "\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3240 1.0.3.162\r\nAllow: INVITE, AC"..., len = 18437235}, r2 = {s = 0x1c4fd8 <error: Cannot access memory at address 0x1c4fd8>, len = 8}, gr = {s = 0x2363ce <error: Cannot access memory at address 0x2363ce>, len = 1532546148}, transport_val = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = 1617711112}, ttl_val = {s = 0x7f4b52e19bb0 "", len = 15013}, user_param_val = { s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, maddr_val = {s = 0x7f4b52e19bc4 "", len = 5615623}, method_val = { s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route: sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068\r\nRecord-Route: <sips:xx.xx.xx.51;r2"..., len = 1774088704}, lr_val = {s = 0x7f4b5eac2050 "P\036\241SK\177", len = 1295744733}, r2_val = {s = 0x0, len = 1774088704}, gr_val = {s = 0x0, len = 1296097425}} next_hop = {user = { s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3"..., len = 32}, passwd = { s = 0x11953fb "1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall-ID: 510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax"..., len = 10}, host = { s = 0x119543e "as695cd3d4\r\nCall-ID: 510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Ag"..., len = 1617711112}, port = {s = 0x0, len = 1774088704}, params = {s = 0x7ffe5b58e250 "\003", len = -1814770512}, sip_params = {s = 0x7f4b93f32aa8 "}\346\003", len = 1532546576}, headers = { s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route: sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068\r\nRecord-Route: <sips:xx.xx.xx.51;r2"..., len = 1390446080}, port_no = 8272, proto = 24236, type = 32587, flags = (URI_USER_NORMALIZE | unknown: 1296103236), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x7f4b93c7ea78 "1", len = 1}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1774088704}, lr = { s = 0x7fa93d906b0 <error: Cannot access memory at address 0x7fa93d906b0>, len = -1814770536}, r2 = {s = 0x7ffe5b58ce10 "", len = -1812780376}, gr = {s = 0x7ffe5b58e250 "\003", len = 1532547044}, transport_val = {s = 0x0, len = 5795166}, ttl_val = {s = 0x7ffe5b58cfe4 "\001", len = 1532551760}, user_param_val = {s = 0x7f4b93f32aa8 "}\346\003", len = 1532551760}, maddr_val = { s = 0x7ffe5b58cfe4 "\001", len = 4329797}, method_val = {s = 0xa00000000 <error: Cannot access memory at address 0xa00000000>, len = 1617711112}, lr_val = { ---Type <return> to continue, or q <return> to quit--- s = 0xa <error: Cannot access memory at address 0xa>, len = 0}, r2_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1390517168}, gr_val = {s = 0x0, len = 0}} u = 0x7ffe5b58cf80 flags = 0 st = {flags = 18437203, id = 0, name = {n = 32, s = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 18437115}, re = 0x20}, avp = 0xa} sct = 0x7ffe5b58cf80 sjt = 0x7ffe5b58cf80 mct = 0x0 rv = 0x7f4b93f32aa8 rv1 = 0x7f4b93f32aa8 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 1532546408}, re = 0x0}, pval = {rs = {s = 0x0, len = 1532546408}, ri = 1532546376, flags = 32766}}, i2s = "h\315X[\376\177\000\000\000r\276io;\351\273( -\000\000"} s = {s = 0x7ffe5b58e250 "\003", len = 1532547200} srevp = {0x7f4b93d577b8, 0x7f4b93f32aa8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #7 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffe5b58cf80, a=0x7f4b52e3be10, msg=0x7f4b52e3d420) at action.c:1549 ret = 1532551760 mod = 0x7f4b93d577b8 __FUNCTION__ = "run_actions" #8 0x000000000054d187 in run_actions_safe (h=0x7ffe5b58e250, a=<optimized out>, msg=<optimized out>) at action.c:1614 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140730430967680, 2679121111027585546, 139962581461672, 140730430972496, 140730430968496, 0, 2679121111971303946, -2678920028792385014}, __mask_was_saved = 0, __saved_mask = -{__val = {13540419104367604224, 4297924648, -139962579756256, 139962578602400, 139960099274753, 0, -13540419104367604224, 0, 139962580007312, 140730430967984, 139962581461672, 140730430972496, 140730430968496, 0, 5795166, 140730430968496}}}}} ret = <optimized out> ign_on_break = 0 #9 0x0000000000421190 in rval_get_int (h=0x7ffe5b58e250, msg=0x1, i=0x7ffe5b58d2b0, rv=0xb7c, cache=0x67) at rvalue.c:912 r_avp = 0x3aa5 avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1814181456}, re = 0x1} pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0} tmp = {s = 0xa49900 <_pkg_root> "\313\030p", len = 0} s = 0x7f4b93f32aa8 r = 15013 ret = 15013 destroy_pval = 1532551760 __FUNCTION__ = "rval_get_int" #10 0x0000000000426f1c in rval_expr_eval_int (h=0x7ffe5b58e250, msg=0x7f4b93f32aa8, res=0x7ffe5b58d2b0, rve=0x7f4b93d56c50) at rvalue.c:1910 i1 = 0 i2 = 0 ret = -1 c1 = {cache_type = 1532551760, val_type = 32766, c = {avp_val = {n = 0, s = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -1814207504}, re = 0x300000000}, pval = {rs = { s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -1814207504}, ri = -1812780376, flags = 32587}}, i2s = "\000\000\000\000\004\000\000\000\217J\251MK\177\000\000\213\310ƓK\177"} c2 = {cache_type = 2479561888, val_type = 32587, c = {avp_val = {n = 5799339, s = {s = 0x100587dab <error: Cannot access memory at address 0x100587dab>, len = 18437069}, re = 0x100587dab}, pval = { rs = {s = 0x100587dab <error: Cannot access memory at address 0x100587dab>, len = 18437069}, ri = 9, flags = 0}}, i2s = "\260\311ݓK\177\000\000\000r\276io;\351\273\001\000\000\000\000"} ---Type <return> to continue, or q <return> to quit--- rv1 = 0x7f4b93f32aa8 rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" #11 0x00000000005421c7 in do_action (h=0x7ffe5b58e250, a=0x7f4b93d5dd20, msg=0x7f4b93f32aa8) at action.c:1030 ret = -5 v = 0 dst = {send_sock = 0x7ffe5b58d430, to = {s = {sa_family = 29184, sa_data = "\276io;\351\273\000\326X[\376\177\000"}, sin = {sin_family = 29184, sin_port = 27070, sin_addr = {s_addr = 3152624495}, sin_zero = "\000\326X[\376\177\000"}, sin6 = {sin6_family = 29184, sin6_port = 27070, sin6_flowinfo = 3152624495, sin6_addr = {__in6_u = { __u6_addr8 = "\000\326X[\376\177\000\000\221\340@MK\177\000", __u6_addr16 = {54784, 23384, 32766, 0, 57489, 19776, 32587, 0}, __u6_addr32 = {1532548608, 32766, 1296097425, 32587}}}, sin6_scope_id = 18437203}}, id = 0, proto = 32 ' ', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7f4b93d56c50 "\001" uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1390517168}, passwd = {s = 0x7ffe5b58d4a0 "\373S\031\001", len = 5615623}, host = {s = 0x0, len = 1774088704}, port = { s = 0x0, len = 1295691689}, params = {s = 0x7ffe5b58d490 "ST\031\001", len = 1532548236}, sip_params = {s = 0x7ffe00000000 <error: Cannot access memory at address 0x7ffe00000000>, len = 1390517168}, headers = { s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3"..., len = 32}, port_no = 54480, proto = 23384, type = 2221, flags = (URI_SIP_USER_PHONE | unknown: 8), transport = {s = 0x7f4b93dced70 "\225\004", len = 1532548240}, ttl = { s = 0x1195473 "\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3240 1.0.3.162\r\nAllow: INVITE, AC"..., len = 18437235}, user_param = {s = 0x1c4fd8 <error: Cannot access memory at address 0x1c4fd8>, len = 8}, maddr = { s = 0x2363ce <error: Cannot access memory at address 0x2363ce>, len = 1532548180}, method = {s = 0x7f4b93deb350 "\001", len = 1617711112}, lr = {s = 0x7f4b52e19bb0 "", len = 15013}, r2 = { s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, gr = {s = 0x7f4b52e19bc4 "", len = 5615623}, transport_val = { s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route: sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068\r\nRecord-Route: <sips:xx.xx.xx.51;r2"..., len = 1774088704}, ttl_val = {s = 0x7f4b5338cc58 "p\314\070SK\177", len = 1295744733}, user_param_val = {s = 0x7ffe5b58e250 "\003", len = 1774088704}, maddr_val = { s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, len = 1296097425}, method_val = { s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3"..., len = 32}, lr_val = { s = 0x11953fb "1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall-ID: 510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax"..., len = 10}, r2_val = { s = 0x119543e "as695cd3d4\r\nCall-ID: 510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Ag"..., len = 1617711112}, gr_val = {s = 0x0, len = 1774088704}} next_hop = {user = {s = 0x0, len = -1815362160}, passwd = {s = 0x7f4b93f32aa8 "}\346\003", len = 1532548608}, host = { s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route: sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068\r\nRecord-Route: <sips:xx.xx.xx.51;r2"..., len = 1390446080}, port = {s = 0x7f4b5338cc58 "p\314\070SK\177", len = 1296103237}, params = { s = 0x252e2674d62c920a <error: Cannot access memory at address 0x252e2674d62c920a>, len = 1713803786}, sip_params = {s = 0x7ffe00000000 <error: Cannot access memory at address 0x7ffe00000000>, len = 1532549040}, headers = {s = 0x11a9360 "\r", len = -1814121640}, port_no = 51760, proto = 37831, type = 32587, flags = URI_USER_NORMALIZE, transport = {s = 0x0, len = 1774088704}, ttl = { s = 0x0, len = -1815362184}, user_param = {s = 0x7ffe5b58d600 "", len = -1812780376}, maddr = {s = 0x7ffe5b58e250 "\003", len = 1532549120}, method = {s = 0x0, len = 5795166}, lr = { s = 0x7ffe5b58d800 "", len = 1532551760}, r2 = {s = 0x7f4b93f32aa8 "}\346\003", len = 1532551760}, gr = {s = 0x7ffe5b58d800 "", len = 4329797}, transport_val = { s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 18537344}, ttl_val = {s = 0x1f480 <error: Cannot access memory at address 0x1f480>, len = -1795123680}, user_param_val = { s = 0x11ae390 "", len = 1532548676}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 1774088704}, lr_val = {s = 0x24f9d0 <error: Cannot access memory at address 0x24f9d0>, len = -1815362200}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1812780376}, gr_val = {s = 0x7ffe5b58e250 "\003", len = 1532549120}} u = 0x7f4b93d56c50 flags = 32587 st = {flags = 0, id = 0, name = {n = -1815362160, s = {s = 0x7f4b93cbc590 "", len = -1812780376}, re = 0x7f4b93cbc590}, avp = 0x7ffe5b58d600} sct = 0x7f4b93d56c50 sjt = 0x7f4b93d56c50 mct = 0x0 rv = 0x55b007 <get_debug_level+103> rv1 = 0x7f4b93f32aa8 c1 = {cache_type = 18437115, val_type = RV_NONE, c = {avp_val = {n = 10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len = 18437182}, re = 0xa}, pval = {rs = { s = 0xa <error: Cannot access memory at address 0xa>, len = 18437182}, ri = 1532547956, flags = 32766}}, i2s = "`\323X[\376\177\000\000\bPl`K\177\000\000\n\000\000\000\000"} ---Type <return> to continue, or q <return> to quit--- s = { s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route: sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068\r\nRecord-Route: <sips:xx.xx.xx.51;r2"..., len = 1774088704} srevp = {0x7f4b93d5dd20, 0x7f4b93f32aa8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #12 0x00000000005407b5 in run_actions (h=0x1, a=0x7f4b52e3be10, msg=0x7f4b52e3d420) at action.c:1549 ret = 1 mod = 0x7f4b93d5dd20 __FUNCTION__ = "run_actions" #13 0x00000000005423e0 in do_action (h=0x7ffe5b58e250, a=0x7f4b93f001a0, msg=0x7f4b93f32aa8) at action.c:678 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\220\340X[\376\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\220\340X[\376\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\340X[\376\177\000\000\230JȔ\001\000\000", __u6_addr16 = {57488, 23384, 32766, 0, 19096, 38088, 1, 0}, __u6_addr32 = {1532551312, 32766, 2496154264, 1}}}, sin6_scope_id = 2481185840}}, id = 32587, proto = -88 '\250', send_flags = { f = 42 '*', blst_imask = 243 '\363'}} end = 0x8 <error: Cannot access memory at address 0x8> uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1390517168}, passwd = {s = 0x7ffe5b58d9f0 "P\342X[\376\177", len = 5615623}, host = {s = 0x0, len = 1774088704}, port = { s = 0x0, len = -1815365104}, params = {s = 0x7ffe5b58e250 "\003", len = -5}, sip_params = {s = 0x7ffe5b58da20 "", len = -1812780376}, headers = {s = 0x0, len = 5506997}, port_no = 55840, proto = 23384, type = 32766, flags = (unknown: 1532549712), transport = {s = 0x7f4b93cbba10 "\267\001", len = -1812780376}, ttl = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1798116625}, user_param = {s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, len = 0}, maddr = { s = 0x7ffe5b58da18 "\207\321T", len = 18536232}, method = {s = 0x11951b0 "\001", len = 18436272}, lr = {s = 0x0, len = 18436272}, r2 = { s = 0x100000003 <error: Cannot access memory at address 0x100000003>, len = 1532550256}, gr = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, transport_val = { s = 0x200000001 <error: Cannot access memory at address 0x200000001>, len = 1532549664}, ttl_val = {s = 0x11a9220 "\240P\031\001", len = 0}, user_param_val = {s = 0x7f4b93f35d0e "Grandstream GXV", len = 1}, maddr_val = {s = 0x1ad710 <error: Cannot access memory at address 0x1ad710>, len = -1798137055}, method_val = {s = 0x7ffe5b58da1c "", len = 0}, lr_val = {s = 0x7ffe5b58e250 "\003", len = -1812780376}, r2_val = {s = 0x7ffe5b58e250 "\003", len = 1532550480}, gr_val = {s = 0x0, len = 5558663}} next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffe5b58da20 "", len = -1257467382}, host = {s = 0x7f4b93f32aa8 "}\346\003", len = 1532551760}, port = {s = 0x7ffe5b58dd50 "\001", len = 0}, params = {s = 0x252e2674c38c920a <error: Cannot access memory at address 0x252e2674c38c920a>, len = 1713803786}, sip_params = {s = 0x0, len = 0}, headers = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, port_no = 3, proto = 0, type = TEL_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = {s = 0x0, len = 18436440}, ttl = {s = 0x1000001 <error: Cannot access memory at address 0x1000001>, len = 1532549892}, user_param = {s = 0x11950b0 "", len = 1350205334}, maddr = { s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13826376}, method = {s = 0x24f148 <error: Cannot access memory at address 0x24f148>, len = 2950840}, lr = { s = 0x2d2028 <error: Cannot access memory at address 0x2d2028>, len = 1774088704}, r2 = {s = 0x108 <error: Cannot access memory at address 0x108>, len = 1532550480}, gr = { s = 0x7ffe5b58e250 "\003", len = 4329872}, transport_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = -1812767376}, ttl_val = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 18436624}, user_param_val = {s = 0x11950b0 "", len = 8}, maddr_val = { s = 0x80 <error: Cannot access memory at address 0x80>, len = -1798145530}, method_val = {s = 0x0, len = 1774088704}, lr_val = {s = 0x0, len = -1815364344}, r2_val = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1812780376}, gr_val = {s = 0x7ffe5b58e250 "\003", len = 1532550480}} u = 0x8 flags = 0 st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1532549664}, re = 0x1}, avp = 0x252e2674b50c920a} sct = 0x8 sjt = 0x8 mct = 0x0 rv = 0x7ffe5b58dac0 ---Type <return> to continue, or q <return> to quit--- rv1 = 0x7f4b93f32aa8 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_STR, c = {avp_val = {n = 1532540992, s = {s = 0x7ffe5b58b840 "", len = 1532536896}, re = 0x7ffe5b58b840}, pval = {rs = {s = 0x7ffe5b58b840 "", len = 1532536896}, ri = 1532549316, flags = 32766}}, i2s = "\320\310\032\001\000\000\000\000\bPl`K\177\000\000\n\000\000\000\000"} s = { s = 0x43b2fc <grp_hash_lookup+1420> "1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200", len = 1532549788} srevp = {0x7f4b93cbd198, 0x7f4b93f32aa8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #14 0x00000000005407b5 in run_actions (h=0x1, a=0x7f4b52e3be10, msg=0x7f4b52e3d420) at action.c:1549 ret = 1 mod = 0x7f4b93cbd198 __FUNCTION__ = "run_actions" #15 0x0000000000542218 in do_action (h=0x7ffe5b58e250, a=0x7f4b93cbd2c8, msg=0x7f4b93f32aa8) at action.c:1049 ret = 1 v = 1 dst = {send_sock = 0x7f4b93f32aa8, to = {s = {sa_family = 3038, sa_data = "\212RK\177\000\000\310\000\000\000\376\177\000"}, sin = {sin_family = 3038, sin_port = 21130, sin_addr = {s_addr = 32587}, sin_zero = "\310\000\000\000\376\177\000"}, sin6 = {sin6_family = 3038, sin6_port = 21130, sin6_flowinfo = 32587, sin6_addr = {__in6_u = { __u6_addr8 = "\310\000\000\000\376\177\000\000@Ӗ`K\177\000", __u6_addr16 = {200, 0, 32766, 0, 54080, 24726, 32587, 0}, __u6_addr32 = {200, 32766, 1620497216, 32587}}}, sin6_scope_id = 2482198976}}, id = 32587, proto = -88 '\250', send_flags = {f = 42 '*', blst_imask = 243 '\363'}} end = 0x7f4b93cbbd08 "\001" uri = {user = {s = 0x7ffe5b58e2bc "K\177", len = 1532550724}, passwd = {s = 0x7f4b00000000 <error: Cannot access memory at address 0x7f4b00000000>, len = 1620496936}, host = { s = 0x6 <error: Cannot access memory at address 0x6>, len = 0}, port = {s = 0x7f4b52c1d090 "(Җ`K\177", len = 4930}, params = {s = 0x7ffe5b58dffc "", len = 5615623}, sip_params = { s = 0x1342 <error: Cannot access memory at address 0x1342>, len = 1774088704}, headers = {s = 0x7f4b6096d340 "\002", len = -1815580832}, port_no = 22976, proto = 37875, type = 32587, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 696), transport = {s = 0x7f4b93f32aa8 "}\346\003", len = -1813809880}, ttl = {s = 0x7f4b93f32aa8 "}\346\003", len = 1620497456}, user_param = {s = 0x0, len = -1}, maddr = {s = 0x7ffe5b58de90 "", len = -704867830}, method = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 10133176}, lr = {s = 0xa02840 <p_onsend> "", len = -1812780376}, r2 = {s = 0x252e2674c8ac920a <error: Cannot access memory at address 0x252e2674c8ac920a>, len = 1713803786}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x7f4b52b3b1f0 <tm_cfg> "\b\206\344RK\177", len = 5615623}, ttl_val = {s = 0x7ffe5b58dffc "", len = 1532550996}, user_param_val = {s = 0x7f4b52b3b1f0 <tm_cfg> "\b\206\344RK\177", len = 1}, maddr_val = {s = 0x7f4b6096d228 "\220\320\301RK\177", len = -1812780376}, method_val = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 1620497456}, lr_val = { s = 0x7f4b6096d228 "\220\320\301RK\177", len = 5615623}, r2_val = {s = 0x8b8 <error: Cannot access memory at address 0x8b8>, len = 1384533946}, gr_val = {s = 0x0, len = 1384755581}} next_hop = {user = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 1532551168}, passwd = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -1812780376}, host = { s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 1620497456}, port = {s = 0x7f4b6096d228 "\220\320\301RK\177", len = 1384797578}, params = { s = 0x7ffe00000000 <error: Cannot access memory at address 0x7ffe00000000>, len = 10498080}, sip_params = {s = 0xa03028 <def_list+8> "", len = 10498096}, headers = {s = 0xa03038 <def_list+24> "", len = 10498120}, port_no = 10568, proto = 160, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 4176515656), transport = { s = 0x3b078d3919c985fc <error: Cannot access memory at address 0x3b078d3919c985fc>, len = 1937935116}, ttl = {s = 0x7f4b00000000 <error: Cannot access memory at address 0x7f4b00000000>, len = 1561592008}, user_param = {s = 0x0, len = -1824518765}, maddr = { s = 0x7f4b5d142bb8 "ʉ\317\v\230\211\221\271\024\024\357\253\246;\366\004\346\062\322\033\227\177\263\274\360\225Oq\307\v&o\340~g\315x\367\366tl\343\031\337\312\330\357ےS\r\242\005,\276\036\365\271\361o2\262", <incomplete sequence \327>, len = 32}, method = {s = 0x7f4b5d142d6c "z\035\236\bΒ\b\025\317R\360\245-\244R\343\307A>1\240\002", len = -1823902561}, lr = { s = 0x7f4b5d55eda8 "\261=i\\235&>\352\246W(\336:N~\025", len = 1532551316}, r2 = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1350205334}, gr = { s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13828752}, transport_val = {s = 0x24e800 <error: Cannot access memory at address 0x24e800>, len = 2948464}, ttl_val = { s = 0x2d2028 <error: Cannot access memory at address 0x2d2028>, len = 8}, user_param_val = {s = 0x112 <error: Cannot access memory at address 0x112>, len = 1774088704}, maddr_val = { s = 0x2cfd70 <error: Cannot access memory at address 0x2cfd70>, len = 6245668}, method_val = {s = 0x7f4b93e37528 "]\005", len = 6999923}, lr_val = {s = 0x715640 <__FUNCTION__.7459> "parse_via", len = 1620496936}, r2_val = {s = 0x252e2674ca8c920a <error: Cannot access memory at address 0x252e2674ca8c920a>, len = 1532551460}, gr_val = {s = 0x0, len = 18436881}} u = 0x7f4b93cbbd08 ---Type <return> to continue, or q <return> to quit--- flags = 32587 st = {flags = 200, id = 0, name = {n = 1532551168, s = {s = 0x7ffe5b58e000 "", len = 4}, re = 0x7ffe5b58e000}, avp = 0x7f4b93f32aa8} sct = 0x7f4b93cbbd08 sjt = 0x7f4b93cbbd08 mct = 0x0 rv = 0x1 rv1 = 0x7f4b93f32aa8 c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val = {n = 1620497128, s = {s = 0x7f4b6096d2e8 <incomplete sequence \310>, len = 10485504}, re = 0x7f4b6096d2e8}, pval = {rs = { s = 0x7f4b6096d2e8 <incomplete sequence \310>, len = 10485504}, ri = 4, flags = 1}}, i2s = "\000\340X[\376\177\000\000\000\000\000\000\376\177\000\000\000\000\000\000K\177"} s = {s = 0xa49900 <_pkg_root> "\313\030p", len = 4} srevp = {0x7f4b93cbd2c8, 0x7f4b93f32aa8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #16 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffe5b58e250, a=0x7f4b52e3be10, a@entry=0x7f4b93cb2dc8, msg=0x7f4b52e3d420, #msg@entry=0x7f4b93f32aa8) at action.c:1549 ret = 1 mod = 0x7f4b93cbd2c8 __FUNCTION__ = "run_actions" #17 0x000000000054d225 in run_top_route (a=0x7f4b93cb2dc8, msg=0x7f4b93f32aa8, c=<optimized out>) at action.c:1635 ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140730430972496, -2678919650641931766, 139962578841032, 139962581461672, 0, 0, 2679121110996128266, -2678920028792385014}, __mask_was_saved = 0, __saved_mask = {__val = {18436881, 762, 139962581461672, 18436813, 18436768, 762, 139962581461672, 18436813, 18436768, 762, 13540419104367604224, 0, 139962581313368, 1073741825, 139961484381464, 139962581298232}}}}} p = <optimized out> ret = <optimized out> sfbk = 0 #18 0x000000000055501e in receive_msg (buf=0x0, len=2482186920, rcv_info=0x7f4b56f76b60) at receive.c:240 msg = 0x7f4b93f32aa8 ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140730430972864, -2678919650641931766, 139962580407896, 139962581461672, 0, 0, 2679121110996128266, -2678920028792385014}, __mask_was_saved = 0, __saved_mask = {__val = {140730430973152, 16, 13540419104367604224, 7328512, 139961558330936, 140730430973408, 140730430973416, 139961558330184, 4294967295, 139961558330936, 6026966, 139961503056656, 140730430973124, 38, 762, 140730430973408}}}}} inb = { s = 0x11952a0 "BYE sip:XXXXXXXXX@xx.xx.xx.56:5080 SIP/2.0\r\nVia: SIP/2.0/TLS 192.168.0.32:31301;branch=z9hG4bK1829228487;rport\r\nRoute: <sip:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=y"..., len = 762} netinfo = {data = {s = 0x0, len = 2}, dst = 0x7f4b56f76b48, rcv = 0x49cdf4 <tcp_send+228>} __FUNCTION__ = "receive_msg" #19 0x00000000005c164d in tcp_read_req (con=0x7f4b56f76b48, bytes_read=0x7ffe5b58e5e0, read_flags=0x7ffe5b58e5e8) at tcp_read.c:1428 bytes = 15013 total_bytes = 762 resp = 15013 size = 139961489937440 req = 0x7ffe5b58e5e8 dst = {send_sock = 0x7f4b93c87440, to = {s = {sa_family = 2, sa_data = "\237\244S=\n\353\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 42143, sin_addr = {s_addr = 3943316819}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 42143, sin6_flowinfo = 3943316819, sin6_addr = {__in6_u = { __u6_addr8 = "\000\000\000\000\000\000\000\000\000>\227SK\177\000", __u6_addr16 = {0, 0, 0, 0, 15872, 21399, 32587, 0}, __u6_addr32 = {0, 0, 1402420736, 32587}}}, sin6_scope_id = 8193}}, id = -1812859568, proto = 75 'K', send_flags = {f = 127 '\177', blst_imask = 0 '\000'}} ---Type <return> to continue, or q <return> to quit--- c = 116 't' ret = 15013 __FUNCTION__ = "tcp_read_req" #20 0x00000000005c65a9 in handle_io (fm=0x0, events=-16880, idx=-1) at tcp_read.c:1679 ret = 762 n = 4 read_flags = 1 con = 0x7f4b56f76b48 s = 11 t = 15013 __FUNCTION__ = "handle_io" #21 0x00000000005ccc4e in io_wait_loop_epoll (h=<optimized out>, t=<optimized out>, repeat=<optimized out>) at io_wait.h:1065 revents = 1390657040 n = 1 fm = 0x1 #22 tcp_receive_loop (unix_sock=1) at tcp_read.c:1791 __FUNCTION__ = "tcp_receive_loop" #23 0x00000000004bd0e7 in tcp_init_children () at tcp_main.c:4796 reader_fd_1 = 38 pid = 15013 si_desc = "tcp receiver (generic)\000\000\b\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\350\034O", '\000' <repeats 14 times>, "r\276io;\351\273\b\000\000\000\000\000\000\000\000AʓK\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\350\034O\000\000\000\000" __FUNCTION__ = "tcp_init_children" #24 0x00000000004f01a0 in main_loop () at main.c:1704 si_desc = "udp receiver child=7 sock=xx.xx.xx.51:5060\000\000\000\000\000 8\350\223K\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000]o_", '\000' <repeats 14 times>, "r\276io;黰\004\243\223K\177\000\000\000r\276io;\351\273\b\022\245\000\000\000\000\000\004\000\000\000\000\000\000" woneinit = 1 __FUNCTION__ = "main_loop" #25 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631 cfg_stream = 0x0 r = 15013 tmp = 0x7ffe5b58eee4 "" tmp_len = 0 port = 0 proto = -1788607024 ret = 0 seed = 2215009822 debug_save = 0 debug_flag = 8 dont_fork_cnt = 0 st = {st_dev = 15, st_ino = 10167, st_nlink = 2, st_mode = 16832, st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1492601340, tv_nsec = 987819248}, st_mtim = {tv_sec = 1492629152, tv_nsec = 187196612}, st_ctim = {tv_sec = 1492629152, tv_nsec = 187196612}, __glibc_reserved = {0, 0, 0}} __FUNCTION__ = "main" (gdb) info locals No locals. (gdb) list 69 in ../../mem/../atomic/atomic_common.h (gdb) ```