After applying the linuxmaniac's patch, I have a new crash

# gdb /usr/sbin/kamailio /tmp/core
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later
<http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from
/usr/lib/debug/.build-id/4e/fae9c9a848e19a554209666ff42a678720280e.debug...done.
done.
[New LWP 15013]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid
-f /etc/kamailio/kamailio.'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74
74      ../../mem/../atomic/atomic_common.h: No such file or directory.
(gdb) bt full
#0  atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74
No locals.
#1  dlg_unref_helper (dlg=0x7f4b606c5008, cnt=1, fname=0x3aa5 <error: Cannot
#access memory at address 0x3aa5>, fline=1650) at dlg_hash.c:925
        mypid = 15013
        d_entry = 0x7f555b6b2bf0
        __FUNCTION__ = "dlg_unref_helper"
#2  0x00007f4b4d3d0e12 in dlg_run_event_route (dlg=0x7f4b606c5008,
msg=0x7f4b93f32aa8, ostate=1390662688, nstate=1) at dlg_handlers.c:1650
        rt = 10133176
        bkroute = 1
        __FUNCTION__ = "dlg_run_event_route"
#3  0x00007f4b4d3d421e in dlg_onroute (req=0x7f4b93f32aa8,
route_params=0x7f4b52e3be10, param=0x7f4b52e3d420) at dlg_handlers.c:1318
        dlg0 = 0x3aa5
        val = {
          s = 0x119535a "da8.12b2;nat=yes>\r\nRoute:
<sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom:
\"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customer"..., len = 8}
        callid = {
          s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042
BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3"..., len = 32}
        ftag = {
          s = 0x11953fb "1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall-ID:
510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax"..., len = 10}
        ttag = {
          s = 0x119543e "as695cd3d4\r\nCall-ID:
510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Ag"..., len = 10}
        new_state = 5
        old_state = 4
        unref = 1
        event = 7
        dir = 1
        ret = 15013
        __FUNCTION__ = "dlg_onroute"
#4  0x00007f4b4fcae28d in run_rr_callbacks (req=0x7f4b93f32aa8,
rr_param=0x7ffe5b58c860) at rr_cb.c:96
        l_param = {
          s = 0x119532f
"transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nRoute:
<sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom:
\"IbsVoip02\" <sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;"..., len = 59}
        cbp = 0x7f4b93f12208
        __FUNCTION__ = "run_rr_callbacks"
#5  0x00007f4b4fca08a2 in after_loose (_m=0x7f4b93f32aa8, preloaded=2) at
loose.c:928
        puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host
= {
            s = 0x1195379
"xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom:
\"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as6"..., len = 12}, port
= {s = 0x0, len = 0}, params = {
            s = 0x1195386
"r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: \"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall"...,
len = 45}, sip_params = {
            s = 0x1195386
"r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: \"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall"...,
len = 45}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type =
SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s =
0x0, len = 0}, user_param = {
            s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s =
0x0, len = 0}, lr = {
            s = 0x119538c "lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom:
\"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall-ID:
5"..., len = 2}, r2 = {
            s = 0x1195386
"r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: \"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061---Type <return> to continue,
or q <return> to quit---
>;tag=as695cd3d4\r\nCall"..., len = 5}, gr = {s = 0x0, len = 0},
>;transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0},
>;user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
          method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0},
r2_val = {
            s = 0x1195389
"on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: \"IbsVoip02\"
<sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;tag=1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall-ID"...,
len = 2}, gr_val = {s = 0x0, len = 0}}
        rt = 0x0
        status = 15013
        uri = {
          s = 0x1195319
"sip:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nRoute:
<sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom:
\"IbsVoip02\" <sip:xxxxxx02@customers."..., len = 81}
        use_ob = 0
        rparams = {
          s = 0x119532f
"transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nRoute:
<sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom:
\"IbsVoip02\" <sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061>;"..., len = 59}
        __FUNCTION__ = "after_loose"
#6  0x0000000000541cf0 in do_action (h=0x7ffe5b58cf80, a=0x7f4b93d577b8,
msg=0x7f4b93f32aa8) at action.c:1060
        ret = -5
        v = 0
        dst = {send_sock = 0x7ffe5b58cad0, to = {s = {sa_family = 1215,
        sa_data = "B\000\000\000\000\000\300Y\363\223K\177\000"}, sin =
        {sin_family = 1215, sin_port = 66, sin_addr = {s_addr = 0},
              sin_zero = "\300Y\363\223K\177\000"}, sin6 = {sin6_family =
1215, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8
= "\300Y\363\223K\177\000\000\273\065B\000\000\000\000",
                  __u6_addr16 = {22976, 37875, 32587, 0, 13755, 66, 0, 0},
__u6_addr32 = {2482198976, 32587, 4339131, 0}}}, sin6_scope_id = 18437387}},
id = 0, proto = 15 '\017', send_flags = {f = 0 '\000',
            blst_imask = 0 '\000'}}
        end = 0x7ffe5b58cf80 "\001"
        uri = {user = {s = 0x7ffe5b58e250 "\003", len = 4329872}, passwd =
        {s = 0x24f2c0 <error: Cannot access memory at address 0x24f2c0>, len
        = 1532545924}, host = {
            s = 0x2d2028 <error: Cannot access memory at address 0x2d2028>,
len = 1617711112}, port = {s = 0xa <error: Cannot access memory at address
0xa>, len = 0}, params = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len =
1390517168}, sip_params = {s = 0x7ffe5b58ccb0 "\373S\031\001", len =
5615623}, headers = {s = 0x0, len = 1774088704}, port_no = 65535,
          proto = 65535, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE |
unknown: 1295691688), transport = {s = 0x7ffe5b58cca0 "ST\031\001", len =
1532546204}, ttl = {s = 0x0, len = 1390517168},
          user_param = {
            s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042
BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3"..., len = 32}, maddr = {s = 0x8ad00000001 <error: Cannot access memory
at address 0x8ad00000001>, len = 10}, method = {s = 0x7ffe5b58e250 "\003",
len = 1532546208}, lr = {
            s = 0x1195473 "\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3240 1.0.3.162\r\nAllow: INVITE, AC"..., len = 18437235}, r2 = {s =
0x1c4fd8 <error: Cannot access memory at address 0x1c4fd8>, len = 8}, gr =
{s = 0x2363ce <error: Cannot access memory at address 0x2363ce>,
            len = 1532546148}, transport_val = {s = 0x500000000 <error:
Cannot access memory at address 0x500000000>, len = 1617711112}, ttl_val =
{s = 0x7f4b52e19bb0 "", len = 15013}, user_param_val = {
            s = 0x3ac <error: Cannot access memory at address 0x3ac>, len =
1}, maddr_val = {s = 0x7f4b52e19bc4 "", len = 5615623}, method_val = {
            s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route:
<sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068>\r\nRecord-Route:
<sips:xx.xx.xx.51;r2"..., len = 1774088704}, lr_val = {s = 0x7f4b5eac2050
"P\036\241SK\177", len = 1295744733}, r2_val = {s = 0x0, len = 1774088704},
gr_val = {s = 0x0, len = 1296097425}}
        next_hop = {user = {
            s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042
BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3"..., len = 32}, passwd = {
            s = 0x11953fb "1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall-ID:
510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax"..., len = 10}, host
= {
            s = 0x119543e "as695cd3d4\r\nCall-ID:
510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Ag"..., len =
1617711112}, port = {s = 0x0, len = 1774088704}, params = {s =
0x7ffe5b58e250 "\003", len = -1814770512}, sip_params = {s = 0x7f4b93f32aa8
"}\346\003",
            len = 1532546576}, headers = {
            s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route:
<sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068>\r\nRecord-Route:
<sips:xx.xx.xx.51;r2"..., len = 1390446080}, port_no = 8272, proto = 24236,
type = 32587, flags = (URI_USER_NORMALIZE | unknown: 1296103236), transport
= {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0},
          user_param = {s = 0x0, len = 0}, maddr = {s = 0x7f4b93c7ea78 "1",
len = 1}, method = {s = 0x1 <error: Cannot access memory at address 0x1>,
len = 1774088704}, lr = {
            s = 0x7fa93d906b0 <error: Cannot access memory at address
0x7fa93d906b0>, len = -1814770536}, r2 = {s = 0x7ffe5b58ce10 "", len =
-1812780376}, gr = {s = 0x7ffe5b58e250 "\003", len = 1532547044},
          transport_val = {s = 0x0, len = 5795166}, ttl_val = {s =
0x7ffe5b58cfe4 "\001", len = 1532551760}, user_param_val = {s =
0x7f4b93f32aa8 "}\346\003", len = 1532551760}, maddr_val = {
            s = 0x7ffe5b58cfe4 "\001", len = 4329797}, method_val = {s =
0xa00000000 <error: Cannot access memory at address 0xa00000000>, len =
1617711112}, lr_val = {
---Type <return> to continue, or q <return> to quit---
            s = 0xa <error: Cannot access memory at address 0xa>, len = 0},
r2_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len =
1390517168}, gr_val = {s = 0x0, len = 0}}
        u = 0x7ffe5b58cf80
        flags = 0
        st = {flags = 18437203, id = 0, name = {n = 32, s = {s = 0x20
        <error: Cannot access memory at address 0x20>, len = 18437115}, re =
        0x20}, avp = 0xa}
        sct = 0x7ffe5b58cf80
        sjt = 0x7ffe5b58cf80
        mct = 0x0
        rv = 0x7f4b93f32aa8
        rv1 = 0x7f4b93f32aa8
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val
        = {n = 0, s = {s = 0x0, len = 1532546408}, re = 0x0}, pval = {rs =
        {s = 0x0, len = 1532546408}, ri = 1532546376, flags = 32766}},
          i2s = "h\315X[\376\177\000\000\000r\276io;\351\273( -\000\000"}
        s = {s = 0x7ffe5b58e250 "\003", len = 1532547200}
        srevp = {0x7f4b93d577b8, 0x7f4b93f32aa8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
        str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
        {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#7  0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffe5b58cf80,
a=0x7f4b52e3be10, msg=0x7f4b52e3d420) at action.c:1549
        ret = 1532551760
        mod = 0x7f4b93d577b8
        __FUNCTION__ = "run_actions"
#8  0x000000000054d187 in run_actions_safe (h=0x7ffe5b58e250, a=<optimized
out>, msg=<optimized out>) at action.c:1614
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env =
{{__jmpbuf = {140730430967680, 2679121111027585546, 139962581461672,
140730430972496, 140730430968496, 0, 2679121111971303946,
                -2678920028792385014}, __mask_was_saved = 0, __saved_mask =
                -{__val = {13540419104367604224, 4297924648,
                -139962579756256, 139962578602400, 139960099274753, 0,
                -13540419104367604224, 0,
                  139962580007312, 140730430967984, 139962581461672,
140730430972496, 140730430968496, 0, 5795166, 140730430968496}}}}}
        ret = <optimized out>
        ign_on_break = 0
#9  0x0000000000421190 in rval_get_int (h=0x7ffe5b58e250, msg=0x1,
i=0x7ffe5b58d2b0, rv=0xb7c, cache=0x67) at rvalue.c:912
        r_avp = 0x3aa5
        avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at
address 0x1>, len = -1814181456}, re = 0x1}
        pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}
        tmp = {s = 0xa49900 <_pkg_root> "\313\030p", len = 0}
        s = 0x7f4b93f32aa8
        r = 15013
        ret = 15013
        destroy_pval = 1532551760
        __FUNCTION__ = "rval_get_int"
#10 0x0000000000426f1c in rval_expr_eval_int (h=0x7ffe5b58e250,
msg=0x7f4b93f32aa8, res=0x7ffe5b58d2b0, rve=0x7f4b93d56c50) at rvalue.c:1910
        i1 = 0
        i2 = 0
        ret = -1
        c1 = {cache_type = 1532551760, val_type = 32766, c = {avp_val = {n =
        0, s = {s = 0x300000000 <error: Cannot access memory at address
        0x300000000>, len = -1814207504}, re = 0x300000000}, pval = {rs = {
                s = 0x300000000 <error: Cannot access memory at address
0x300000000>, len = -1814207504}, ri = -1812780376, flags = 32587}},
          i2s =
"\000\000\000\000\004\000\000\000\217J\251MK\177\000\000\213\310ƓK\177"}
        c2 = {cache_type = 2479561888, val_type = 32587, c = {avp_val = {n =
5799339, s = {s = 0x100587dab <error: Cannot access memory at address
0x100587dab>, len = 18437069}, re = 0x100587dab}, pval = {
              rs = {s = 0x100587dab <error: Cannot access memory at address
0x100587dab>, len = 18437069}, ri = 9, flags = 0}}, i2s =
"\260\311ݓK\177\000\000\000r\276io;\351\273\001\000\000\000\000"}
---Type <return> to continue, or q <return> to quit---
        rv1 = 0x7f4b93f32aa8
        rv2 = 0x0
        __FUNCTION__ = "rval_expr_eval_int"
#11 0x00000000005421c7 in do_action (h=0x7ffe5b58e250, a=0x7f4b93d5dd20,
msg=0x7f4b93f32aa8) at action.c:1030
        ret = -5
        v = 0
        dst = {send_sock = 0x7ffe5b58d430, to = {s = {sa_family = 29184,
        sa_data = "\276io;\351\273\000\326X[\376\177\000"}, sin =
        {sin_family = 29184, sin_port = 27070, sin_addr = {s_addr =
        3152624495},
              sin_zero = "\000\326X[\376\177\000"}, sin6 = {sin6_family =
29184, sin6_port = 27070, sin6_flowinfo = 3152624495, sin6_addr = {__in6_u =
{
                  __u6_addr8 =
"\000\326X[\376\177\000\000\221\340@MK\177\000", __u6_addr16 = {54784,
23384, 32766, 0, 57489, 19776, 32587, 0}, __u6_addr32 = {1532548608, 32766,
1296097425, 32587}}},
              sin6_scope_id = 18437203}}, id = 0, proto = 32 ' ', send_flags
= {f = 0 '\000', blst_imask = 0 '\000'}}
        end = 0x7f4b93d56c50 "\001"
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>,
len = 1390517168}, passwd = {s = 0x7ffe5b58d4a0 "\373S\031\001", len =
5615623}, host = {s = 0x0, len = 1774088704}, port = {
            s = 0x0, len = 1295691689}, params = {s = 0x7ffe5b58d490
"ST\031\001", len = 1532548236}, sip_params = {s = 0x7ffe00000000 <error:
Cannot access memory at address 0x7ffe00000000>,
            len = 1390517168}, headers = {
            s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042
BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3"..., len = 32}, port_no = 54480, proto = 23384, type = 2221, flags =
(URI_SIP_USER_PHONE | unknown: 8), transport = {s = 0x7f4b93dced70
"\225\004", len = 1532548240}, ttl = {
            s = 0x1195473 "\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3240 1.0.3.162\r\nAllow: INVITE, AC"..., len = 18437235}, user_param = {s
= 0x1c4fd8 <error: Cannot access memory at address 0x1c4fd8>, len = 8},
maddr = {
            s = 0x2363ce <error: Cannot access memory at address 0x2363ce>,
len = 1532548180}, method = {s = 0x7f4b93deb350 "\001", len = 1617711112},
lr = {s = 0x7f4b52e19bb0 "", len = 15013}, r2 = {
            s = 0x3ac <error: Cannot access memory at address 0x3ac>, len =
1}, gr = {s = 0x7f4b52e19bc4 "", len = 5615623}, transport_val = {
            s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route:
<sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068>\r\nRecord-Route:
<sips:xx.xx.xx.51;r2"..., len = 1774088704}, ttl_val = {s = 0x7f4b5338cc58
"p\314\070SK\177", len = 1295744733}, user_param_val = {s = 0x7ffe5b58e250
"\003", len = 1774088704}, maddr_val = {
            s = 0x770000006e <error: Cannot access memory at address
0x770000006e>, len = 1296097425}, method_val = {
            s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042
BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream
GXV3"..., len = 32}, lr_val = {
            s = 0x11953fb "1567533218\r\nTo:
<sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061>;tag=as695cd3d4\r\nCall-ID:
510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax"..., len = 10},
r2_val = {
            s = 0x119543e "as695cd3d4\r\nCall-ID:
510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact:
<sip:xxxxxx02@192.168.0.32:31301;transport=tls>\r\nMax-Forwards:
69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Ag"..., len =
1617711112}, gr_val = {s = 0x0, len = 1774088704}}
        next_hop = {user = {s = 0x0, len = -1815362160}, passwd = {s =
0x7f4b93f32aa8 "}\346\003", len = 1532548608}, host = {
            s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route:
<sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068>\r\nRecord-Route:
<sips:xx.xx.xx.51;r2"..., len = 1390446080}, port = {s = 0x7f4b5338cc58
"p\314\070SK\177", len = 1296103237}, params = {
            s = 0x252e2674d62c920a <error: Cannot access memory at address
0x252e2674d62c920a>, len = 1713803786}, sip_params = {s = 0x7ffe00000000
<error: Cannot access memory at address 0x7ffe00000000>,
            len = 1532549040}, headers = {s = 0x11a9360 "\r", len =
-1814121640}, port_no = 51760, proto = 37831, type = 32587, flags =
URI_USER_NORMALIZE, transport = {s = 0x0, len = 1774088704}, ttl = {
            s = 0x0, len = -1815362184}, user_param = {s = 0x7ffe5b58d600
"", len = -1812780376}, maddr = {s = 0x7ffe5b58e250 "\003", len =
1532549120}, method = {s = 0x0, len = 5795166}, lr = {
            s = 0x7ffe5b58d800 "", len = 1532551760}, r2 = {s =
0x7f4b93f32aa8 "}\346\003", len = 1532551760}, gr = {s = 0x7ffe5b58d800 "",
len = 4329797}, transport_val = {
            s = 0x600000000 <error: Cannot access memory at address
0x600000000>, len = 18537344}, ttl_val = {s = 0x1f480 <error: Cannot access
memory at address 0x1f480>, len = -1795123680}, user_param_val = {
            s = 0x11ae390 "", len = 1532548676}, maddr_val = {s = 0x0, len =
0}, method_val = {s = 0x0, len = 1774088704}, lr_val = {s = 0x24f9d0 <error:
Cannot access memory at address 0x24f9d0>,
            len = -1815362200}, r2_val = {s = 0xffffffff <error: Cannot
access memory at address 0xffffffff>, len = -1812780376}, gr_val = {s =
0x7ffe5b58e250 "\003", len = 1532549120}}
        u = 0x7f4b93d56c50
        flags = 32587
        st = {flags = 0, id = 0, name = {n = -1815362160, s = {s =
        0x7f4b93cbc590 "", len = -1812780376}, re = 0x7f4b93cbc590}, avp =
        0x7ffe5b58d600}
        sct = 0x7f4b93d56c50
        sjt = 0x7f4b93d56c50
        mct = 0x0
        rv = 0x55b007 <get_debug_level+103>
        rv1 = 0x7f4b93f32aa8
        c1 = {cache_type = 18437115, val_type = RV_NONE, c = {avp_val = {n =
        10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len =
        18437182}, re = 0xa}, pval = {rs = {
                s = 0xa <error: Cannot access memory at address 0xa>, len =
18437182}, ri = 1532547956, flags = 32766}}, i2s =
"`\323X[\376\177\000\000\bPl`K\177\000\000\n\000\000\000\000"}
---Type <return> to continue, or q <return> to quit---
        s = {
          s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route:
<sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068>\r\nRecord-Route:
<sips:xx.xx.xx.51;r2"..., len = 1774088704}
        srevp = {0x7f4b93d5dd20, 0x7f4b93f32aa8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#12 0x00000000005407b5 in run_actions (h=0x1, a=0x7f4b52e3be10,
msg=0x7f4b52e3d420) at action.c:1549
        ret = 1
        mod = 0x7f4b93d5dd20
        __FUNCTION__ = "run_actions"
#13 0x00000000005423e0 in do_action (h=0x7ffe5b58e250, a=0x7f4b93f001a0,
msg=0x7f4b93f32aa8) at action.c:678
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
        "\000\000\000\000\000\000\220\340X[\376\177\000"}, sin = {sin_family
        = 0, sin_port = 0, sin_addr = {s_addr = 0},
              sin_zero = "\220\340X[\376\177\000"}, sin6 = {sin6_family = 0,
sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"\220\340X[\376\177\000\000\230JȔ\001\000\000",
                  __u6_addr16 = {57488, 23384, 32766, 0, 19096, 38088, 1,
0}, __u6_addr32 = {1532551312, 32766, 2496154264, 1}}}, sin6_scope_id =
2481185840}}, id = 32587, proto = -88 '\250', send_flags = {
            f = 42 '*', blst_imask = 243 '\363'}}
        end = 0x8 <error: Cannot access memory at address 0x8>
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>,
        len = 1390517168}, passwd = {s = 0x7ffe5b58d9f0 "P\342X[\376\177",
        len = 5615623}, host = {s = 0x0, len = 1774088704}, port = {
            s = 0x0, len = -1815365104}, params = {s = 0x7ffe5b58e250
"\003", len = -5}, sip_params = {s = 0x7ffe5b58da20 "", len = -1812780376},
headers = {s = 0x0, len = 5506997}, port_no = 55840,
          proto = 23384, type = 32766, flags = (unknown: 1532549712),
transport = {s = 0x7f4b93cbba10 "\267\001", len = -1812780376}, ttl = {
            s = 0x100000000 <error: Cannot access memory at address
0x100000000>, len = -1798116625}, user_param = {s = 0x770000006e <error:
Cannot access memory at address 0x770000006e>, len = 0}, maddr = {
            s = 0x7ffe5b58da18 "\207\321T", len = 18536232}, method = {s =
0x11951b0 "\001", len = 18436272}, lr = {s = 0x0, len = 18436272}, r2 = {
            s = 0x100000003 <error: Cannot access memory at address
0x100000003>, len = 1532550256}, gr = {s = 0x3 <error: Cannot access memory
at address 0x3>, len = 0}, transport_val = {
            s = 0x200000001 <error: Cannot access memory at address
0x200000001>, len = 1532549664}, ttl_val = {s = 0x11a9220 "\240P\031\001",
len = 0}, user_param_val = {s = 0x7f4b93f35d0e "Grandstream GXV",
            len = 1}, maddr_val = {s = 0x1ad710 <error: Cannot access memory
at address 0x1ad710>, len = -1798137055}, method_val = {s = 0x7ffe5b58da1c
"", len = 0}, lr_val = {s = 0x7ffe5b58e250 "\003",
            len = -1812780376}, r2_val = {s = 0x7ffe5b58e250 "\003", len =
1532550480}, gr_val = {s = 0x0, len = 5558663}}
        next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffe5b58da20
"", len = -1257467382}, host = {s = 0x7f4b93f32aa8 "}\346\003", len =
1532551760}, port = {s = 0x7ffe5b58dd50 "\001", len = 0},
          params = {s = 0x252e2674c38c920a <error: Cannot access memory at
address 0x252e2674c38c920a>, len = 1713803786}, sip_params = {s = 0x0, len =
0}, headers = {
            s = 0x400000000 <error: Cannot access memory at address
0x400000000>, len = 0}, port_no = 3, proto = 0, type = TEL_URI_T, flags =
(URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = {s = 0x0,
            len = 18436440}, ttl = {s = 0x1000001 <error: Cannot access
memory at address 0x1000001>, len = 1532549892}, user_param = {s = 0x11950b0
"", len = 1350205334}, maddr = {
            s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 13826376}, method = {s = 0x24f148 <error: Cannot access
memory at address 0x24f148>, len = 2950840}, lr = {
            s = 0x2d2028 <error: Cannot access memory at address 0x2d2028>,
len = 1774088704}, r2 = {s = 0x108 <error: Cannot access memory at address
0x108>, len = 1532550480}, gr = {
            s = 0x7ffe5b58e250 "\003", len = 4329872}, transport_val = {s =
0x8 <error: Cannot access memory at address 0x8>, len = -1812767376},
ttl_val = {
            s = 0x100000000 <error: Cannot access memory at address
0x100000000>, len = 18436624}, user_param_val = {s = 0x11950b0 "", len = 8},
maddr_val = {
            s = 0x80 <error: Cannot access memory at address 0x80>, len =
-1798145530}, method_val = {s = 0x0, len = 1774088704}, lr_val = {s = 0x0,
len = -1815364344}, r2_val = {
            s = 0xffffffff <error: Cannot access memory at address
0xffffffff>, len = -1812780376}, gr_val = {s = 0x7ffe5b58e250 "\003", len =
1532550480}}
        u = 0x8
        flags = 0
        st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x1 <error: Cannot
        access memory at address 0x1>, len = 1532549664}, re = 0x1}, avp =
        0x252e2674b50c920a}
        sct = 0x8
        sjt = 0x8
        mct = 0x0
        rv = 0x7ffe5b58dac0
---Type <return> to continue, or q <return> to quit---
        rv1 = 0x7f4b93f32aa8
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_STR, c = {avp_val =
{n = 1532540992, s = {s = 0x7ffe5b58b840 "", len = 1532536896}, re =
0x7ffe5b58b840}, pval = {rs = {s = 0x7ffe5b58b840 "",
                len = 1532536896}, ri = 1532549316, flags = 32766}}, i2s =
"\320\310\032\001\000\000\000\000\bPl`K\177\000\000\n\000\000\000\000"}
        s = {
          s = 0x43b2fc <grp_hash_lookup+1420>
"1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200",
len = 1532549788}
        srevp = {0x7f4b93cbd198, 0x7f4b93f32aa8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#14 0x00000000005407b5 in run_actions (h=0x1, a=0x7f4b52e3be10,
msg=0x7f4b52e3d420) at action.c:1549
        ret = 1
        mod = 0x7f4b93cbd198
        __FUNCTION__ = "run_actions"
#15 0x0000000000542218 in do_action (h=0x7ffe5b58e250, a=0x7f4b93cbd2c8,
msg=0x7f4b93f32aa8) at action.c:1049
        ret = 1
        v = 1
        dst = {send_sock = 0x7f4b93f32aa8, to = {s = {sa_family = 3038,
        sa_data = "\212RK\177\000\000\310\000\000\000\376\177\000"}, sin =
        {sin_family = 3038, sin_port = 21130, sin_addr = {s_addr = 32587},
              sin_zero = "\310\000\000\000\376\177\000"}, sin6 =
{sin6_family = 3038, sin6_port = 21130, sin6_flowinfo = 32587, sin6_addr =
{__in6_u = {
                  __u6_addr8 =
"\310\000\000\000\376\177\000\000@Ӗ`K\177\000", __u6_addr16 = {200, 0,
32766, 0, 54080, 24726, 32587, 0}, __u6_addr32 = {200, 32766, 1620497216,
32587}}},
              sin6_scope_id = 2482198976}}, id = 32587, proto = -88 '\250',
send_flags = {f = 42 '*', blst_imask = 243 '\363'}}
        end = 0x7f4b93cbbd08 "\001"
        uri = {user = {s = 0x7ffe5b58e2bc "K\177", len = 1532550724}, passwd
= {s = 0x7f4b00000000 <error: Cannot access memory at address
0x7f4b00000000>, len = 1620496936}, host = {
            s = 0x6 <error: Cannot access memory at address 0x6>, len = 0},
port = {s = 0x7f4b52c1d090 "(Җ`K\177", len = 4930}, params = {s =
0x7ffe5b58dffc "", len = 5615623}, sip_params = {
            s = 0x1342 <error: Cannot access memory at address 0x1342>, len
= 1774088704}, headers = {s = 0x7f4b6096d340 "\002", len = -1815580832},
port_no = 22976, proto = 37875, type = 32587,
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 696),
transport = {s = 0x7f4b93f32aa8 "}\346\003", len = -1813809880}, ttl = {s =
0x7f4b93f32aa8 "}\346\003", len = 1620497456},
          user_param = {s = 0x0, len = -1}, maddr = {s = 0x7ffe5b58de90 "",
len = -704867830}, method = {s = 0x4 <error: Cannot access memory at address
0x4>, len = 10133176}, lr = {s = 0xa02840 <p_onsend> "",
            len = -1812780376}, r2 = {s = 0x252e2674c8ac920a <error: Cannot
access memory at address 0x252e2674c8ac920a>, len = 1713803786}, gr = {s =
0x0, len = 0}, transport_val = {
            s = 0x7f4b52b3b1f0 <tm_cfg> "\b\206\344RK\177", len = 5615623},
ttl_val = {s = 0x7ffe5b58dffc "", len = 1532550996}, user_param_val = {s =
0x7f4b52b3b1f0 <tm_cfg> "\b\206\344RK\177", len = 1},
          maddr_val = {s = 0x7f4b6096d228 "\220\320\301RK\177", len =
-1812780376}, method_val = {s = 0xc8 <error: Cannot access memory at address
0xc8>, len = 1620497456}, lr_val = {
            s = 0x7f4b6096d228 "\220\320\301RK\177", len = 5615623}, r2_val
= {s = 0x8b8 <error: Cannot access memory at address 0x8b8>, len =
1384533946}, gr_val = {s = 0x0, len = 1384755581}}
        next_hop = {user = {s = 0xc8 <error: Cannot access memory at address
0xc8>, len = 1532551168}, passwd = {s = 0x4 <error: Cannot access memory at
address 0x4>, len = -1812780376}, host = {
            s = 0xc8 <error: Cannot access memory at address 0xc8>, len =
1620497456}, port = {s = 0x7f4b6096d228 "\220\320\301RK\177", len =
1384797578}, params = {
            s = 0x7ffe00000000 <error: Cannot access memory at address
0x7ffe00000000>, len = 10498080}, sip_params = {s = 0xa03028 <def_list+8>
"", len = 10498096}, headers = {s = 0xa03038 <def_list+24> "",
            len = 10498120}, port_no = 10568, proto = 160, type =
ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 4176515656), transport =
{
            s = 0x3b078d3919c985fc <error: Cannot access memory at address
0x3b078d3919c985fc>, len = 1937935116}, ttl = {s = 0x7f4b00000000 <error:
Cannot access memory at address 0x7f4b00000000>,
            len = 1561592008}, user_param = {s = 0x0, len = -1824518765},
maddr = {
            s = 0x7f4b5d142bb8
"ʉ\317\v\230\211\221\271\024\024\357\253\246;\366\004\346\062\322\033\227\177\263\274\360\225Oq\307\v&o\340~g\315x\367\366tl\343\031\337\312\330\357ےS\r\242\005,\276\036\365\271\361o2\262",
<incomplete sequence \327>, len = 32}, method = {s = 0x7f4b5d142d6c
"z\035\236\bΒ\b\025\317R\360\245-\244R\343\307A>1\240\002", len =
-1823902561}, lr = {
            s = 0x7f4b5d55eda8 "\261=i\\\235&>\352\246W(\336:N~\025", len =
1532551316}, r2 = {s = 0x2 <error: Cannot access memory at address 0x2>, len
= 1350205334}, gr = {
            s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 13828752}, transport_val = {s = 0x24e800 <error: Cannot
access memory at address 0x24e800>, len = 2948464}, ttl_val = {
            s = 0x2d2028 <error: Cannot access memory at address 0x2d2028>,
len = 8}, user_param_val = {s = 0x112 <error: Cannot access memory at
address 0x112>, len = 1774088704}, maddr_val = {
            s = 0x2cfd70 <error: Cannot access memory at address 0x2cfd70>,
len = 6245668}, method_val = {s = 0x7f4b93e37528 "]\005", len = 6999923},
lr_val = {s = 0x715640 <__FUNCTION__.7459> "parse_via",
            len = 1620496936}, r2_val = {s = 0x252e2674ca8c920a <error:
Cannot access memory at address 0x252e2674ca8c920a>, len = 1532551460},
gr_val = {s = 0x0, len = 18436881}}
        u = 0x7f4b93cbbd08
---Type <return> to continue, or q <return> to quit---
        flags = 32587
        st = {flags = 200, id = 0, name = {n = 1532551168, s = {s =
0x7ffe5b58e000 "", len = 4}, re = 0x7ffe5b58e000}, avp = 0x7f4b93f32aa8}
        sct = 0x7f4b93cbbd08
        sjt = 0x7f4b93cbbd08
        mct = 0x0
        rv = 0x1
        rv1 = 0x7f4b93f32aa8
        c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val =
        {n = 1620497128, s = {s = 0x7f4b6096d2e8 <incomplete sequence \310>,
        len = 10485504}, re = 0x7f4b6096d2e8}, pval = {rs = {
                s = 0x7f4b6096d2e8 <incomplete sequence \310>, len =
10485504}, ri = 4, flags = 1}}, i2s =
"\000\340X[\376\177\000\000\000\000\000\000\376\177\000\000\000\000\000\000K\177"}
        s = {s = 0xa49900 <_pkg_root> "\313\030p", len = 4}
        srevp = {0x7f4b93cbd2c8, 0x7f4b93f32aa8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
        str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
        {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#16 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffe5b58e250,
a=0x7f4b52e3be10, a@entry=0x7f4b93cb2dc8, msg=0x7f4b52e3d420,
#msg@entry=0x7f4b93f32aa8) at action.c:1549
        ret = 1
        mod = 0x7f4b93cbd2c8
        __FUNCTION__ = "run_actions"
#17 0x000000000054d225 in run_top_route (a=0x7f4b93cb2dc8,
msg=0x7f4b93f32aa8, c=<optimized out>) at action.c:1635
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env =
{{__jmpbuf = {140730430972496, -2678919650641931766, 139962578841032,
139962581461672, 0, 0, 2679121110996128266, -2678920028792385014},
              __mask_was_saved = 0, __saved_mask = {__val = {18436881, 762,
139962581461672, 18436813, 18436768, 762, 139962581461672, 18436813,
18436768, 762, 13540419104367604224, 0, 139962581313368,
                  1073741825, 139961484381464, 139962581298232}}}}}
        p = <optimized out>
        ret = <optimized out>
        sfbk = 0
#18 0x000000000055501e in receive_msg (buf=0x0, len=2482186920,
rcv_info=0x7f4b56f76b60) at receive.c:240
        msg = 0x7f4b93f32aa8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env =
{{__jmpbuf = {140730430972864, -2678919650641931766, 139962580407896,
139962581461672, 0, 0, 2679121110996128266, -2678920028792385014},
              __mask_was_saved = 0, __saved_mask = {__val =
{140730430973152, 16, 13540419104367604224, 7328512, 139961558330936,
140730430973408, 140730430973416, 139961558330184, 4294967295,
139961558330936,
                  6026966, 139961503056656, 140730430973124, 38, 762,
140730430973408}}}}}
        inb = {
          s = 0x11952a0 "BYE sip:XXXXXXXXX@xx.xx.xx.56:5080 SIP/2.0\r\nVia:
SIP/2.0/TLS 192.168.0.32:31301;branch=z9hG4bK1829228487;rport\r\nRoute:
<sip:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=y"...,
len = 762}
        netinfo = {data = {s = 0x0, len = 2}, dst = 0x7f4b56f76b48, rcv =
0x49cdf4 <tcp_send+228>}
        __FUNCTION__ = "receive_msg"
#19 0x00000000005c164d in tcp_read_req (con=0x7f4b56f76b48,
bytes_read=0x7ffe5b58e5e0, read_flags=0x7ffe5b58e5e8) at tcp_read.c:1428
        bytes = 15013
        total_bytes = 762
        resp = 15013
        size = 139961489937440
        req = 0x7ffe5b58e5e8
        dst = {send_sock = 0x7f4b93c87440, to = {s = {sa_family = 2, sa_data
        = "\237\244S=\n\353\000\000\000\000\000\000\000"}, sin = {sin_family
        = 2, sin_port = 42143, sin_addr = {s_addr = 3943316819},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 =
{sin6_family = 2, sin6_port = 42143, sin6_flowinfo = 3943316819, sin6_addr =
{__in6_u = {
                  __u6_addr8 =
"\000\000\000\000\000\000\000\000\000>\227SK\177\000", __u6_addr16 = {0, 0,
0, 0, 15872, 21399, 32587, 0}, __u6_addr32 = {0, 0, 1402420736, 32587}}},
sin6_scope_id = 8193}},
          id = -1812859568, proto = 75 'K', send_flags = {f = 127 '\177',
blst_imask = 0 '\000'}}
---Type <return> to continue, or q <return> to quit---
        c = 116 't'
        ret = 15013
        __FUNCTION__ = "tcp_read_req"
#20 0x00000000005c65a9 in handle_io (fm=0x0, events=-16880, idx=-1) at
tcp_read.c:1679
        ret = 762
        n = 4
        read_flags = 1
        con = 0x7f4b56f76b48
        s = 11
        t = 15013
        __FUNCTION__ = "handle_io"
#21 0x00000000005ccc4e in io_wait_loop_epoll (h=<optimized out>,
t=<optimized out>, repeat=<optimized out>) at io_wait.h:1065
        revents = 1390657040
        n = 1
        fm = 0x1
#22 tcp_receive_loop (unix_sock=1) at tcp_read.c:1791
        __FUNCTION__ = "tcp_receive_loop"
#23 0x00000000004bd0e7 in tcp_init_children () at tcp_main.c:4796
        reader_fd_1 = 38
        pid = 15013
        si_desc = "tcp receiver
        (generic)\000\000\b\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\350\034O",
        '\000' <repeats 14 times>,
        "r\276io;\351\273\b\000\000\000\000\000\000\000\000AʓK\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\350\034O\000\000\000\000"
        __FUNCTION__ = "tcp_init_children"
#24 0x00000000004f01a0 in main_loop () at main.c:1704
        si_desc = "udp receiver child=7
sock=xx.xx.xx.51:5060\000\000\000\000\000
8\350\223K\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000]o_",
'\000' <repeats 14 times>,
"r\276io;黰\004\243\223K\177\000\000\000r\276io;\351\273\b\022\245\000\000\000\000\000\004\000\000\000\000\000\000"
        woneinit = 1
        __FUNCTION__ = "main_loop"
#25 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631
        cfg_stream = 0x0
        r = 15013
        tmp = 0x7ffe5b58eee4 ""
        tmp_len = 0
        port = 0
        proto = -1788607024
        ret = 0
        seed = 2215009822
        debug_save = 0
        debug_flag = 8
        dont_fork_cnt = 0
        st = {st_dev = 15, st_ino = 10167, st_nlink = 2, st_mode = 16832,
        st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 40,
        st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1492601340,
            tv_nsec = 987819248}, st_mtim = {tv_sec = 1492629152, tv_nsec =
187196612}, st_ctim = {tv_sec = 1492629152, tv_nsec = 187196612},
__glibc_reserved = {0, 0, 0}}
        __FUNCTION__ = "main"
(gdb) info locals
No locals.
(gdb) list
69      in ../../mem/../atomic/atomic_common.h
(gdb)


You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.