<!-- Kamailio Project uses GitHub Issues only for bugs in the code or feature requests.
If you have questions about using Kamailio or related to its configuration file, ask on sr-users mailing list:
* http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
If you have questions about developing extensions to Kamailio or its existing C code, ask on sr-dev mailing list
* http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
Please try to fill this template as much as possible for any issue. It helps the developers to troubleshoot the issue.
If you submit a feature request (or enhancement), you can delete the text of the template and only add the description of what you would like to be added.
If there is no content to be filled in a section, the entire section can be removed.
You can delete the comments from the template sections when filling.
You can delete next line and everything above before submitting (it is a comment). -->
### Description
<!-- Explain what you did, what you expected to happen, and what actually happened. -->
Kamailio dies every few hours, apparently trying to delete a finished dialog. After crash it always shows the message: 'dlg_clean_run(): dialog in delete state is too old'
### Troubleshooting
#### Reproduction
<!-- If the issue can be reproduced, describe how it can be done. -->
#### Debugging Data
<!-- If you got a core dump, use gdb to extract troubleshooting data - full backtrace, local variables and the list of the code at the issue location.
gdb /path/to/kamailio /path/to/corefile bt full info locals list
If you are familiar with gdb, feel free to attach more of what you consider to be relevant. -->
``` # gdb /usr/sbin/kamailio /tmp/core.22773 GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: http://www.gnu.org/software/gdb/bugs/. Find the GDB manual and other documentation resources online at: http://www.gnu.org/software/gdb/documentation/. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/a2/2b21a61e95b0b11a767bd32090a1083560a3dd.debug...done. done. [New LWP 22773] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/kamailio.'. Program terminated with signal SIGSEGV, Segmentation fault. #0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74 74 ../../mem/../atomic/atomic_common.h: No such file or directory. (gdb) bt full #0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74 No locals. #1 dlg_unref_helper (dlg=0x7fde1fec6ff0, cnt=1, fname=0x58f5 <error: Cannot #access memory at address 0x58f5>, fline=1637) at dlg_hash.c:925 mypid = 22773 d_entry = 0x7fe819d53bf0 __FUNCTION__ = "dlg_unref_helper" #2 0x00007fde0ba72e12 in dlg_run_event_route (dlg=0x7fde1fec6ff0, msg=0x7fde325bfa10, ostate=290317344, nstate=1) at dlg_handlers.c:1637 rt = 10129124 bkroute = 1 __FUNCTION__ = "dlg_run_event_route" #3 0x00007fde0ba761cf in dlg_onroute (req=0x7fde325bfa10, route_params=0x7fde114dce10, param=0x7fde114de420) at dlg_handlers.c:1314 val = { s = 0x9aacfa <buf+186> "001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY"..., len = 6} ftag = { s = 0x9aad51 <buf+273> "as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-Hangu"..., len = 10} old_state = 4 dir = 2 ret = 22773 callid = { s = 0x9aada9 <buf+361> "141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 55} new_state = 5 unref = 1 event = 7 dlg = 0x7fde1fec6ff0 ttag = { s = 0x9aad96 <buf+342> "58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Leng"..., len = 8} h_id = 198013376 dlg = 0x58f5 #4 0x00007fde0e34f28d in run_rr_callbacks (req=0x7fde325bfa10, rr_param=0x7ffe9c8fa6e0) at rr_cb.c:96 l_param = { s = 0x9aace5 <buf+165> "lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 1413"..., len = 35} cbp = 0x7fde325b27d0 __FUNCTION__ = "run_rr_callbacks" #5 0x00007fde0e3418a2 in after_loose (_m=0x7fde325bfa10, preloaded=2) at loose.c:928 puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x9aacd8 <buf+152> "185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\n"..., len = 12}, port = {s = 0x0, len = 0}, params = { s = 0x9aace5 <buf+165> "lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 1413"..., len = 35}, sip_params = { s = 0x9aace5 <buf+165> "lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 1413"..., len = 35}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = { s = 0x9aace5 <buf+165> "lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 1413"..., len = 2}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, ---Type <return> to continue, or q <return> to quit--- maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} rt = 0x0 status = 22773 uri = { s = 0x9aacd4 <buf+148> "sip:185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f"..., len = 52} use_ob = 0 rparams = { s = 0x9aace5 <buf+165> "lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 1413"..., len = 35} __FUNCTION__ = "after_loose" #6 0x0000000000454b60 in do_action (h=0x7ffe9c8fae00, a=0x7fde323f7d98, msg=0x7fde325bfa10) at action.c:1060 ret = -5 v = 25 dst = {send_sock = 0x7ffe9c8fa950, to = {s = {sa_family = 9055, sa_data = "B\000\000\000\000\000\060\033\2\336\177\000"}, sin = {sin_family = 9055, sin_port = 66, sin_addr = {s_addr = 0}, sin_zero = "0\033\2\336\177\000"}, sin6 = {sin6_family = 9055, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "0\033\2\336\177\000\000[TB\000\000\000\000", __u6_addr16 = {6960, 12892, 32734, 0, 21595, 66, 0, 0}, __u6_addr32 = {844897072, 32734, 4346971, 0}}}, sin6_scope_id = 13909984}}, id = 0, proto = 10 '\n', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7ffe9c8fae00 "\001" uri = {user = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13911000}, passwd = {s = 0x23a790 <error: Cannot access memory at address 0x23a790>, len = -1668306428}, host = { s = 0x2bd8c8 <error: Cannot access memory at address 0x2bd8c8>, len = 535588848}, port = {s = 0xa <error: Cannot access memory at address 0xa>, len = 0}, params = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 290108944}, sip_params = {s = 0x7ffe9c8fab30 "Q\255\232", len = 5781511}, headers = {s = 0x0, len = 798682880}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 195350440), transport = {s = 0x7ffe9c8fab20 "\251\255\232", len = -1668306148}, ttl = { s = 0x7fde00000000 <error: Cannot access memory at address 0x7fde00000000>, len = 290108944}, user_param = { s = 0x9aada9 <buf+361> "141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 55}, maddr = {s = 0x10001000000 <error: Cannot access memory at address 0x10001000000>, len = 8}, method = {s = 0x23a4d0 <error: Cannot access memory at address 0x23a4d0>, len = -1668306144}, lr = {s = 0x49 <error: Cannot access memory at address 0x49>, len = 10137053}, r2 = {s = 0x1893d2 <error: Cannot access memory at address 0x1893d2>, len = 87}, gr = { s = 0x1eb8c6 <error: Cannot access memory at address 0x1eb8c6>, len = -1668306204}, transport_val = {s = 0x0, len = 535588848}, ttl_val = {s = 0x7fde114ab610 "", len = 22773}, user_param_val = { s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, maddr_val = {s = 0x7fde114ab624 "", len = 5781511}, method_val = { s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route: sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589\r\nRecord-Route: <sips:185.xx.xx.51;r2="..., len = 798682880}, lr_val = {s = 0x7fde12ec1678 " ,x\021\336\177", len = 195403485}, r2_val = {s = 0x0, len = 798682880}, gr_val = {s = 0x0, len = 195754177}} next_hop = {user = { s = 0x9aada9 <buf+361> "141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 55}, passwd = { s = 0x9aad51 <buf+273> "as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-Hangu"..., len = 10}, host = { s = 0x9aad96 <buf+342> "58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Leng"..., len = 535588848}, port = {s = 0x0, len = 798682880}, params = {s = 0x0, len = 842977936}, sip_params = {s = 0x7fde325bfa10 "yb\004", len = -1668305776}, headers = { s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route: sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589\r\nRecord-Route: <sips:185.xx.xx.51;r2="..., len = 290100736}, port_no = 5752, proto = 4844, type = 32734, flags = (URI_USER_NORMALIZE | unknown: 195759988), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x7fde32315910 "1", len = 1}, method = {s = 0x0, len = 798682880}, lr = {s = 0x6632430c90 <error: Cannot access memory at address 0x6632430c90>, len = 842977912}, r2 = {s = 0x7ffe9c8fac90 "", len = 844888592}, gr = {s = 0x7ffe9c8fc0d0 "\003", len = -1668305308}, transport_val = {s = 0x0, len = 5736030}, ttl_val = {s = 0x7ffe9c8fae64 "\001", len = -1668300592}, user_param_val = {s = 0x7fde325bfa10 "yb\004", len = -1668300592}, maddr_val = {s = 0x7ffe9c8fae64 "\001", len = 4337637}, method_val = { s = 0xa00000000 <error: Cannot access memory at address 0xa00000000>, len = 535588848}, lr_val = {s = 0xa <error: Cannot access memory at address 0xa>, len = 0}, r2_val = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 290108944}, gr_val = {s = 0x0, len = 0}} u = 0x7ffe9c8fae00 flags = 0 st = {flags = 10137001, id = 0, name = {n = 55, s = {s = 0x37 <error: Cannot access memory at address 0x37>, len = 10136913}, re = 0x37}, avp = 0xa} sct = 0x7ffe9c8fae00 ---Type <return> to continue, or q <return> to quit--- sjt = 0x7ffe9c8fae00 mct = 0x0 rv = 0x7fde325bfa10 rv1 = 0x7fde325bfa10 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = -1668305944}, re = 0x0}, pval = {rs = {s = 0x0, len = -1668305944}, ri = -1668305976, flags = 32766}}, i2s = "諏\234\376\177\000\000\324\251\217\234\376\177\000\000\310\330+\000\000"} s = {s = 0x7ffe9c8fc0d0 "\003", len = -1668305152} srevp = {0x7fde323f7d98, 0x7fde325bfa10} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140592304344264, string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s = 0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr = 0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #7 0x0000000000453625 in run_actions (h=0x1, h@entry=0x7ffe9c8fae00, a=0x7fde114dce10, msg=0x7fde114de420) at action.c:1549 ret = -1668300592 mod = 0x7fde323f7d98 __FUNCTION__ = "run_actions" #8 0x000000000045fff7 in run_actions_safe (h=0x7ffe9c8fc0d0, a=<optimized out>, msg=<optimized out>) at action.c:1614 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140731525082624, 1693443033458036444, 140592304355856, 140731525087440, 140731525083440, 0, 1693443034133319388, -1694082562576986404}, __mask_was_saved = 0, __saved_mask = -{__val = {1893732767588085504, 4294967566, 140592302729920, -140592301545600, 140591459467265, 0, 1893732767588085504, -0, 140592303006032, 140731525082928, 140592304355856, 140731525087440, 140731525083440, 0, 5736030, 140731525083440}}}}} ret = <optimized out> ign_on_break = 0 #9 0x0000000000423030 in rval_get_int (h=0x7ffe9c8fc0d0, msg=0x1, i=0x7ffe9c8fb130, rv=0x3d4, cache=0x67) at rvalue.c:912 r_avp = 0x58f5 avp_val = {n = 267, s = {s = 0x10b <error: Cannot access memory at address 0x10b>, len = 844356336}, re = 0x10b} pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0} tmp = {s = 0xa489c0 <_pkg_root> "\v\017p", len = 842586088} s = 0x7fde325bfa10 r = 22773 ret = 22773 destroy_pval = -1668300592 __FUNCTION__ = "rval_get_int" #10 0x0000000000428dbc in rval_expr_eval_int (h=0x7ffe9c8fc0d0, msg=0x7fde325bfa10, res=0x7ffe9c8fb130, rve=0x7fde323f7230) at rvalue.c:1910 i1 = 0 i2 = 0 ret = -1 c1 = {cache_type = 2626666704, val_type = 32766, c = {avp_val = {n = 0, s = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 843191600}, re = 0x300000000}, pval = {rs = { s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 843191600}, ri = 844888592, flags = 32734}}, i2s = "\000\000\000\000\004\000\000\000gV\023\f\336\177\000\000;\232\061\062\336\177"} c2 = {cache_type = 842345632, val_type = 32734, c = {avp_val = {n = 5740203, s = {s = 0x5796ab <pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\223\366B", len = 10136872}, re = 0x5796ab <pv_printf+267>}, pval = {rs = {s = 0x5796ab <pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\223\366B", len = 10136872}, ri = 9, flags = 0}}, i2s = "\360\332S2\336\177\000\000\000\357\232/\353\343G\032\001\000\000\000\000"} rv1 = 0x7fde325bfa10 rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" ---Type <return> to continue, or q <return> to quit--- #11 0x0000000000455037 in do_action (h=0x7ffe9c8fc0d0, a=0x7fde323fe300, #msg=0x7fde325bfa10) at action.c:1030 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 61184, sa_data = "\232/\353\343G\032\020\372[2\336\177\000"}, sin = {sin_family = 61184, sin_port = 12186, sin_addr = {s_addr = 440919019}, sin_zero = "\020\372[2\336\177\000"}, sin6 = {sin6_family = 61184, sin6_port = 12186, sin6_flowinfo = 440919019, sin6_addr = {__in6_u = { __u6_addr8 = "\020\372[2\336\177\000\000\301\370\252\v\336\177\000", __u6_addr16 = {64016, 12891, 32734, 0, 63681, 2986, 32734, 0}, __u6_addr32 = {844888592, 32734, 195754177, 32734}}}, sin6_scope_id = 10137001}}, id = 0, proto = 55 '7', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7fde323f7230 "\001" uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 290108944}, passwd = {s = 0x7ffe9c8fb320 "Q\255\232", len = 5781511}, host = {s = 0x0, len = 798682880}, port = {s = 0x0, len = 195350441}, params = {s = 0x7ffe9c8fb310 "\251\255\232", len = -1668304116}, sip_params = {s = 0x7ffe00000000 <error: Cannot access memory at address 0x7ffe00000000>, len = 290108944}, headers = { s = 0x9aada9 <buf+361> "141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 55}, port_no = 45904, proto = 40079, type = 256, flags = (unknown: 8), transport = {s = 0x7fde3246f350 "\224\004", len = -1668304112}, ttl = { s = 0x49 <error: Cannot access memory at address 0x49>, len = 10137053}, user_param = {s = 0x1893d2 <error: Cannot access memory at address 0x1893d2>, len = 87}, maddr = { s = 0x1eb8c6 <error: Cannot access memory at address 0x1eb8c6>, len = -1668304172}, method = {s = 0x7fde3248b930 "\001", len = 535588848}, lr = {s = 0x7fde114ab610 "", len = 22773}, r2 = { s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, gr = {s = 0x7fde114ab624 "", len = 5781511}, transport_val = { s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route: sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589\r\nRecord-Route: <sips:185.xx.xx.51;r2="..., len = 798682880}, ttl_val = {s = 0x7fde13decf68 "\210\317\336\023\336\177", len = 195403485}, user_param_val = {s = 0x7ffe9c8fc0d0 "\003", len = 798682880}, maddr_val = { s = 0x18faa <error: Cannot access memory at address 0x18faa>, len = 195754177}, method_val = { s = 0x9aada9 <buf+361> "141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 55}, lr_val = { s = 0x9aad51 <buf+273> "as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-Hangu"..., len = 10}, r2_val = { s = 0x9aad96 <buf+342> "58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Leng"..., len = 535588848}, gr_val = {s = 0x0, len = 798682880}} next_hop = {user = {s = 0x0, len = 842388880}, passwd = {s = 0x7fde325bfa10 "yb\004", len = -1668303744}, host = { s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route: sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589\r\nRecord-Route: <sips:185.xx.xx.51;r2="..., len = 290100736}, port = {s = 0x7fde13decf68 "\210\317\336\023\336\177", len = 195759989}, params = { s = 0x178051779d804edc <error: Cannot access memory at address 0x178051779d804edc>, len = -1922412836}, sip_params = {s = 0x0, len = 36}, headers = { s = 0x9aad9e <buf+350> "\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r"..., len = 843626808}, port_no = 14536, proto = 12849, type = 32734, flags = URI_USER_NORMALIZE, transport = {s = 0x0, len = 798682880}, ttl = {s = 0x0, len = 842388856}, user_param = {s = 0x7ffe9c8fb480 "", len = 844888592}, maddr = {s = 0x7ffe9c8fc0d0 "\003", len = -1668303232}, method = {s = 0x0, len = 5736030}, lr = {s = 0x7ffe9c8fb680 "", len = -1668300592}, r2 = {s = 0x7fde325bfa10 "yb\004", len = -1668300592}, gr = {s = 0x7ffe9c8fb680 "", len = 4337637}, transport_val = {s = 0x0, len = 340527640}, ttl_val = {s = 0x7fde32353ff0 "", len = 798682880}, user_param_val = {s = 0x7ffe9c8fb5c0 "\310\003", len = 843727864}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 798682880}, lr_val = {s = 0x0, len = 842388840}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 844888592}, gr_val = {s = 0x7ffe9c8fc0d0 "\003", len = -1668303232}} u = 0x7fde323f7230 flags = 32734 st = {flags = 0, id = 0, name = {n = 842388880, s = {s = 0x7fde3235d590 "", len = 844888592}, re = 0x7fde3235d590}, avp = 0x7ffe9c8fb480} sct = 0x7fde323f7230 sjt = 0x7fde323f7230 mct = 0x0 rv = 0x583807 <get_debug_level+103> rv1 = 0x7fde325bfa10 c1 = {cache_type = 10136913, val_type = RV_NONE, c = {avp_val = {n = 10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len = 10136982}, re = 0xa}, pval = {rs = { s = 0xa <error: Cannot access memory at address 0xa>, len = 10136982}, ri = -1668304396, flags = 32766}}, i2s = "\000\000\000\000\000\000\000\000\360o\354\037\336\177\000\000\n\000\000\000\000"} s = { s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route: sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589\r\nRecord-Route: <sips:185.xx.xx.51;r2="..., len = 798682880} srevp = {0x7fde323fe300, 0x7fde325bfa10} ---Type <return> to continue, or q <return> to quit--- mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140592304344264, string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s = 0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr = 0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #12 0x0000000000453625 in run_actions (h=0x1, a=0x7fde114dce10, msg=0x7fde114de420) at action.c:1549 ret = 1 mod = 0x7fde323fe300 __FUNCTION__ = "run_actions" #13 0x0000000000455250 in do_action (h=0x7ffe9c8fc0d0, a=0x7fde325a0768, msg=0x7fde325bfa10) at action.c:678 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\240\344=\037\336\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\240\344=\037\336\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\240\344=\037\336\177\000\000\230Z23\336\177\000", __u6_addr16 = {58528, 7997, 32734, 0, 23192, 13106, 32734, 0}, __u6_addr32 = {524149920, 32734, 858938008, 32734}}}, sin6_scope_id = 720}}, id = 0, proto = -96 '\240', send_flags = { f = 134 '\206', blst_imask = 143 '\217'}} end = 0x8 <error: Cannot access memory at address 0x8> uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 290108944}, passwd = {s = 0x7ffe9c8fb870 "\320\300\217\234\376\177", len = 5781511}, host = { s = 0x100000002 <error: Cannot access memory at address 0x100000002>, len = 798682880}, port = {s = 0x0, len = 842385936}, params = {s = 0x7ffe9c8fc0d0 "\003", len = -5}, sip_params = { s = 0x7ffe9c8fb8a0 "", len = 844888592}, headers = {s = 0x0, len = 4535845}, port_no = 47264, proto = 40079, type = 32766, flags = (unknown: 2626664656), transport = {s = 0x7fde3235ca10 "\267\001", len = 844888592}, ttl = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 859634415}, user_param = { s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, len = 0}, maddr = {s = 0x7ffe9c8fb898 "\367\377E", len = 14512472}, method = {s = 0xdd2d20 "", len = 14494752}, lr = { s = 0x0, len = 14494752}, r2 = {s = 0x100000003 <error: Cannot access memory at address 0x100000003>, len = -1668302096}, gr = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, transport_val = {s = 0x200000001 <error: Cannot access memory at address 0x200000001>, len = -1668302688}, ttl_val = {s = 0xdd7380 "O\206", <incomplete sequence \335>, len = 0}, user_param_val = { s = 0x7fde325c1e7e "ast.zs PBX", len = 1}, maddr_val = {s = 0xdd7140 <incomplete sequence \335>, len = 859613985}, method_val = {s = 0x7ffe9c8fb89c "", len = 0}, lr_val = { s = 0x7ffe9c8fc0d0 "\003", len = 844888592}, r2_val = {s = 0x7ffe9c8fc0d0 "\003", len = -1668301872}, gr_val = {s = 0x0, len = 4587511}} next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffe9c8fb8a0 "", len = 2023771868}, host = {s = 0x7fde325bfa10 "yb\004", len = -1668300592}, port = {s = 0x7ffe9c8fbbd0 "\001", len = 0}, params = {s = 0x1780517796204edc <error: Cannot access memory at address 0x1780517796204edc>, len = -1922412836}, sip_params = {s = 0x0, len = 0}, headers = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, port_no = 3, proto = 0, type = TEL_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = {s = 0x0, len = 14494920}, ttl = {s = 0x1000001 <error: Cannot access memory at address 0x1000001>, len = -1668302460}, user_param = {s = 0xdd2c20 "@\206", <incomplete sequence \335>, len = 249889158}, maddr = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13911176}, method = {s = 0x23a6e0 <error: Cannot access memory at address 0x23a6e0>, len = 2866040}, lr = { s = 0x2bd8c8 <error: Cannot access memory at address 0x2bd8c8>, len = 798682880}, r2 = {s = 0x10f <error: Cannot access memory at address 0x10f>, len = -1668301872}, gr = { s = 0x7ffe9c8fc0d0 "\003", len = 4337712}, transport_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 844898032}, ttl_val = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 14495104}, user_param_val = {s = 0xdd2c20 "@\206", <incomplete sequence \335>, len = 8}, maddr_val = { s = 0x80 <error: Cannot access memory at address 0x80>, len = 859605510}, method_val = {s = 0x0, len = 798682880}, lr_val = {s = 0x0, len = 842386696}, r2_val = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 844888592}, gr_val = {s = 0x7ffe9c8fc0d0 "\003", len = -1668301872}} u = 0x8 flags = 0 st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1668302688}, re = 0x1}, avp = 0x1780517778a04edc} sct = 0x8 sjt = 0x8 mct = 0x0 rv = 0x7ffe9c8fb940 rv1 = 0x7fde325bfa10 c1 = {cache_type = 2626651800, val_type = 32766, c = {avp_val = {n = -1668311360, s = {s = 0x7ffe9c8f96c0 "\356\215L2\336\177", len = --1668315456}, re = 0x7ffe9c8f96c0}, pval = {rs = { s = 0x7ffe9c8f96c0 "\356\215L2\336\177", len = -1668315456}, ri = -1668303036, flags = 32766}}, i2s = "`.\335\000\000\000\000\000\360o\354\037\336\177\000\000\n\000\000\000\000"} ---Type <return> to continue, or q <return> to quit--- s = {s = 0x43b2fc <tsend_stream+2204> "\351\243\375\377\377\350j\324\005", len = -1668302564} srevp = {0x7fde3235e198, 0x7fde325bfa10} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140592304344264, string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s = 0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr = 0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #14 0x0000000000453625 in run_actions (h=0x1, a=0x7fde114dce10, msg=0x7fde114de420) at action.c:1549 ret = 1 mod = 0x7fde3235e198 __FUNCTION__ = "run_actions" #15 0x0000000000455088 in do_action (h=0x7ffe9c8fc0d0, a=0x7fde3235e2c8, msg=0x7fde325bfa10) at action.c:1049 ret = 1 v = 1 dst = {send_sock = 0x7fde325bfa10, to = {s = {sa_family = 19294, sa_data = "\364\020\336\177\000\000\310\000\000\000\376\177\000"}, sin = {sin_family = 19294, sin_port = 4340, sin_addr = { s_addr = 32734}, sin_zero = "\310\000\000\000\376\177\000"}, sin6 = {sin6_family = 19294, sin6_port = 4340, sin6_flowinfo = 32734, sin6_addr = {__in6_u = { __u6_addr8 = "\310\000\000\000\376\177\000\000\370\026\032 \336\177\000", __u6_addr16 = {200, 0, 32766, 0, 5880, 8218, 32734, 0}, __u6_addr32 = {200, 32766, 538580728, 32734}}}, sin6_scope_id = 844897072}}, id = 32734, proto = 16 '\020', send_flags = {f = 250 '\372', blst_imask = 91 '['}} end = 0x7fde3235cd08 "\001" uri = {user = {s = 0x7ffe9c8fbe7c "", len = -1668301628}, passwd = {s = 0x7fde202251d0 "\306_\004", len = 538580448}, host = {s = 0x9 <error: Cannot access memory at address 0x9>, len = 0}, port = { s = 0x7fde11446610 "\340\025\032 \336\177", len = 55150}, params = {s = 0x7ffe9c8fbe7c "", len = 5781511}, sip_params = {s = 0xd76e <error: Cannot access memory at address 0xd76e>, len = 798682880}, headers = {s = 0x7fde201a16f8 "\002", len = 842171456}, port_no = 6960, proto = 12892, type = 32734, flags = (unknown: 696), transport = {s = 0x7fde325bfa10 "yb\004", len = 843938568}, ttl = {s = 0x7fde325bfa10 "yb\004", len = 538580968}, user_param = {s = 0x0, len = -1}, maddr = {s = 0x7ffe9c8fbd10 "", len = -759148836}, method = { s = 0x4 <error: Cannot access memory at address 0x4>, len = 10129124}, lr = {s = 0x9a9a80 <p_onsend> "", len = 844888592}, r2 = { s = 0x178051778f004edc <error: Cannot access memory at address 0x178051778f004edc>, len = -1922412836}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fde111da1f0 <tm_cfg> "\b\226N\021\336\177", len = 5781511}, ttl_val = {s = 0x7ffe9c8fbe7c "", len = -1668301356}, user_param_val = {s = 0x7fde111da1f0 <tm_cfg> "\b\226N\021\336\177", len = 1}, maddr_val = { s = 0x7fde201a15e0 "\020fD\021\336\177", len = 844888592}, method_val = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 538580968}, lr_val = {s = 0x7fde201a15e0 "\020fD\021\336\177", len = 5781511}, r2_val = {s = 0x7fde200ac1a8 "\260yD\021\336\177", len = 284185226}, gr_val = {s = 0x0, len = 284422397}} next_hop = {user = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len = -1668301184}, passwd = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 844888592}, host = { s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 538580968}, port = {s = 0x7fde201a15e0 "\020fD\021\336\177", len = 284462986}, params = { s = 0x7fde00000000 <error: Cannot access memory at address 0x7fde00000000>, len = 10484192}, sip_params = {s = 0x9ff9e8 <def_list+8> "", len = 10484208}, headers = {s = 0x9ff9f8 <def_list+24> "", len = 10484232}, port_no = 63320, proto = 159, type = ERROR_URI_T, flags = (unknown: 2626666112), transport = {s = 0xa8428197 <error: Cannot access memory at address 0xa8428197>, len = 397}, ttl = { s = 0x0, len = -1668349752}, user_param = {s = 0x0, len = 249889158}, maddr = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13912792}, method = { s = 0x23a090 <error: Cannot access memory at address 0x23a090>, len = -1668301052}, lr = {s = 0x2bd8c8 <error: Cannot access memory at address 0x2bd8c8>, len = -1668301036}, r2 = { s = 0x7fde325bfa10 "yb\004", len = 249889158}, gr = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13913504}, transport_val = { s = 0x239dc8 <error: Cannot access memory at address 0x239dc8>, len = 2863712}, ttl_val = {s = 0x2bd8c8 <error: Cannot access memory at address 0x2bd8c8>, len = 8}, user_param_val = { s = 0x119 <error: Cannot access memory at address 0x119>, len = 798682880}, maddr_val = {s = 0x2bb260 <error: Cannot access memory at address 0x2bb260>, len = 6243540}, method_val = { s = 0x7fde324d7b08 "\\005", len = 6978116}, lr_val = {s = 0x71ca40 <__FUNCTION__.7459> "parse_via", len = 538580448}, r2_val = { s = 0x1780517781204edc <error: Cannot access memory at address 0x1780517781204edc>, len = -1668300892}, gr_val = {s = 0x0, len = 10136780}} u = 0x7fde3235cd08 flags = 32734 st = {flags = 200, id = 0, name = {n = -1668301184, s = {s = 0x7ffe9c8fbe80 "", len = 4}, re = 0x7ffe9c8fbe80}, avp = 0x7fde325bfa10} sct = 0x7fde3235cd08 sjt = 0x7fde3235cd08 mct = 0x0 rv = 0x1 ---Type <return> to continue, or q <return> to quit--- rv1 = 0x7fde325bfa10 c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val = {n = 538580640, s = {s = 0x7fde201a16a0 <incomplete sequence \310>, len = 10482688}, re = 0x7fde201a16a0}, pval = {rs = { s = 0x7fde201a16a0 <incomplete sequence \310>, len = 10482688}, ri = 4, flags = 1}}, i2s = "\000\276\217\234\376\177\000\000\000\063' \336\177\000\000\000n=\021\336\177"} s = {s = 0xa489c0 <_pkg_root> "\v\017p", len = 4} srevp = {0x7fde3235e2c8, 0x7fde325bfa10} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140592304344264, string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s = 0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr = 0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #16 0x0000000000453625 in run_actions (h=0x1, h@entry=0x7ffe9c8fc0d0, a=0x7fde114dce10, a@entry=0x7fde32353dc8, msg=0x7fde114de420, #msg@entry=0x7fde325bfa10) at action.c:1549 ret = 1 mod = 0x7fde3235e2c8 __FUNCTION__ = "run_actions" #17 0x0000000000460095 in run_top_route (a=0x7fde32353dc8, msg=0x7fde325bfa10, c=<optimized out>) at action.c:1635 ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140731525087440, -1694083084758004004, 140592301817288, 140592304355856, 0, 0, 1693443033690820316, -1694082562576986404}, __mask_was_saved = 0, __saved_mask = {__val = {10136780, 551, 140592304355856, 10136721, 10136640, 551, 140592304355856, 10136721, 10136640, 551, 1893732767588085504, 0, 140592304287008, 1073741825, 140591744222280, 140592304271872}}}}} p = <optimized out> ret = <optimized out> sfbk = 0 #18 0x000000000054473e in receive_msg (buf=0x0, len=844888592, rcv_info=0x7ffe9c8fc3b0) at receive.c:240 msg = 0x7fde325bfa10 ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140731525087808, -1694083084758004004, 140592303381560, 140592304355856, 0, 0, 1693443033690820316, -1694082562576986404}, __mask_was_saved = 0, __saved_mask = {__val = {10105736, 0, 140731525088198, 6, 1, 140592301637472, 140592326479303, 140591459467269, 0, 7071780, 140592318318440, 140592303177032, 140731525088068, 140592328607376, 140592303177032, 11}}}}} inb = { s = 0x9aac40 <buf> "BYE sip:o9_xxxxxxxxxxxxx@192.168.1.63:5110;alias=188.79.210.242~38892~1 SIP/2.0\r\nVia: SIP/2.0/UDP 185.xx.xx.56:5080;branch=z9hG4bK44092255\r\nRoute: <sip:185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes"..., len = 551} netinfo = {data = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 2}, dst = 0x7fde33310768, rcv = 0x7fde33ce1000} __FUNCTION__ = "receive_msg" #19 0x000000000048a410 in udp_rcv_loop () at udp_server.c:495 len = 551 buf = "BYE sip:o9_xxxxxxxxxxxxx@192.168.1.63:5110;alias=188.79.210.242~38892~1 SIP/2.0\r\nVia: SIP/2.0/UDP 185.xx.xx.56:5080;branch=z9hG4bK44092255\r\nRoute: <sip:185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes"... from = 0x7fde3249fd48 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {940519353, 140591749785588}, addr32 = {940519353, 0, 290318324, 32734}, addr16 = {12217, 14351, 0, 0, 59380, 4429, 32734, 0}, addr = "\271/\017\070\000\000\000\000\364\347M\021\336\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {856633273, 0}, addr32 = {856633273, 0, 0, 0}, addr16 = {12217, 13071, 0, 0, 0, 0, 0, 0}, addr = "\271/\017\063", '\000' <repeats 11 times>}}, src_port = 5080, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023ع/\017\070\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 940519353}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 940519353, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7fde32327f60, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #20 0x000000000050ac19 in main_loop () at main.c:1614 si_desc = "udp receiver child=6 sock=185.xx.xx.51:5060\000\000\000\000\000\350=R2\336\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000\rg_", '\000' <repeats 14 times>, "\357\232/---Type <return> to continue, or q <return> to quit--- 353\343G\032\260\024\r2\336\177\000\000\000\357\232/\353\343G\032\210\002\245\000\000\000\000\000\004\000\000\000\000\000\000" woneinit = 1 __FUNCTION__ = "main_loop" #21 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631 cfg_stream = 0x0 r = 22773 tmp = 0x7ffe9c8fdee5 "" tmp_len = 0 port = 0 proto = 869144016 ret = 0 seed = 661187045 debug_save = 0 debug_flag = 8 dont_fork_cnt = 0 st = {st_dev = 15, st_ino = 12624, st_nlink = 2, st_mode = 16832, st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 60, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1490193544, tv_nsec = 929429960}, st_mtim = {tv_sec = 1491929843, tv_nsec = 907871616}, st_ctim = {tv_sec = 1491929843, tv_nsec = 907871616}, __glibc_reserved = {0, 0, 0}} __FUNCTION__ = "main" (gdb) (gdb) (gdb) (gdb) (gdb) (gdb) info locals No locals. (gdb) list 69 in ../../mem/../atomic/atomic_common.h (gdb) ```
#### Log Messages
<!-- Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
``` Apr 12 10:19:08 customers /usr/sbin/kamailio[22773]: INFO: Dialog ended, delete keys from dialogs htable starting with 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI Apr 12 10:19:09 customers /usr/sbin/kamailio[22785]: NOTICE: dialog [dlg_hash.c:245]: dlg_clean_run(): dialog in delete state is too old (0x7fde1fec6ff0 ref 4) Apr 12 10:19:11 customers /usr/sbin/kamailio[22794]: CRITICAL: <core> [pass_fd.c:277]: receive_fd(): EOF on 20 Apr 12 10:19:12 customers /usr/sbin/kamailio[22774]: INFO: Dialog ended, delete keys from dialogs htable starting with 84253NWFkZmFjZTExM2Y4ZDBjNDNhMGZlZjQ5M2UxZWNmOTI Apr 12 10:19:16 customers /usr/sbin/kamailio[22765]: ALERT: <core> [main.c:740]: handle_sigs(): child process 22773 exited by a signal 11 Apr 12 10:19:16 customers /usr/sbin/kamailio[22765]: ALERT: <core> [main.c:743]: handle_sigs(): core was generated Apr 12 10:19:16 customers /usr/sbin/kamailio[22765]: INFO: <core> [main.c:755]: handle_sigs(): terminating due to SIGCHLD Apr 12 10:19:16 customers /usr/sbin/kamailio[22788]: INFO: <core> [main.c:810]: sig_usr(): signal 15 received
```
#### SIP Traffic
<!-- If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
``` (paste your sip traffic here) ```
### Possible Solutions
<!-- If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix. -->
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
``` version: kamailio 4.4.5 (x86_64/linux) flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: unknown compiled with gcc 4.9.2
```
* **Operating System**:
<!-- Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...; Kernel details (output of `uname -a`) -->
``` Linux customers 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u2 (2016-10-19) x86_64 GNU/Linux ```
Closed #1069.
Reopened #1069.
Seems a bit similar with #1059 -- can you try with patch e4a11d7?
Also, what is executed in the event_route[dialog:end]? Are there operations that could take long time?
event_route[dialog:end] { sht_rm_name_re("dialogs=>$ci::.*"); }
Patch applied. I'm going to test it a few days and I'll send feedbacks
Thanks
Another crash ....
# gdb /usr/sbin/kamailio /tmp/core GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: http://www.gnu.org/software/gdb/bugs/. Find the GDB manual and other documentation resources online at: http://www.gnu.org/software/gdb/documentation/. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/ff/dca0b3c4e5ce21804735c74ee480e9abd4c6a6.debug...done. done. [New LWP 26162] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/kamailio.'. Program terminated with signal SIGSEGV, Segmentation fault. #0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74 74 ../../mem/../atomic/atomic_common.h: No such file or directory. (gdb) bt full #0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74 No locals. #1 dlg_unref_helper (dlg=0x7f37572ad3a0, cnt=1, fname=0x6632 <error: Cannot access memory at address 0x6632>, fline=1650) at dlg_hash.c:925 mypid = 26162 d_entry = 0x7f453f1b2470 __FUNCTION__ = "dlg_unref_helper" #2 0x00007f374fb38e12 in dlg_run_event_route (dlg=0x7f37572ad3a0, msg=0x7f37966874f8, ostate=1431987232, nstate=1) at dlg_handlers.c:1650 rt = 10133176 bkroute = 1 __FUNCTION__ = "dlg_run_event_route" #3 0x00007f374fb3c21e in dlg_onroute (req=0x7f37966874f8, route_params=0x7f37555a4e10, param=0x7f37555a6420) at dlg_handlers.c:1318 dlg0 = 0x6632 val = { s = 0x9ab8cb <buf+203> "bb6.e74;nat=yes>,sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" sip:XXXXXXXXX@XX.XX.XX.53:5080;tag=as485ea82a\r\nTo: <sip:xxxx"..., len = 7} callid = { s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50} ftag = { s = 0x9ab97a <buf+378> "as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: No"..., len = 10} ttag = { s = 0x9ab9ba <buf+442> "45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0"..., len = 8} new_state = 5 old_state = 4 unref = 1 event = 7 dir = 1 ret = 26162 __FUNCTION__ = "dlg_onroute" #4 0x00007f375241628d in run_rr_callbacks (req=0x7f37966874f8, rr_param=0x7ffcb7bbf3d0) at rr_cb.c:96 l_param = { s = 0x9ab8ae <buf+174> "r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>,sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" sip:XXXXXXXXX@XX.XX.XX.53:5080;"..., len = 44} cbp = 0x7f379667a2b8 __FUNCTION__ = "run_rr_callbacks" #5 0x00007f37524088a2 in after_loose (_m=0x7f37966874f8, preloaded=2) at loose.c:928 puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x9ab8e1 <buf+225> "XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" sip:XXXXXXXXX@XX.XX.XX.53:5080;tag=as485ea82a\r\nTo: <sip:xxxxxx601@customers.xxxx"..., len = 12}, port = { s = 0x9ab8ee <buf+238> "5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" sip:XXXXXXXXX@XX.XX.XX.53:5080;tag=as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;"..., len = 4}, params = { s = 0x9ab8f3 <buf+243> "transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" sip:XXXXXXXXX@XX.XX.XX.53:5080;tag=as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=4"..., len = 58}, sip_params = { s = 0x9ab8f3 <buf+243> "transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" sip:XXXXXXXXX@XX.XX.XX.53:5080;tag=as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=4"..., len = 58}, headers = {s = 0x0, len = 0}, port_no = 5061, proto = 3, type = SIP_URI_T, flags = (unknown: 0), transport = { s = 0x9ab8f3 <buf+243> "transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" sip:XXXXXXXXX@XX.XX.XX.53:5080;tag=as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=4"..., len = 13}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = { ---Type <return> to continue, or q <return> to quit--- s = 0x9ab907 <buf+263> "lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" sip:XXXXXXXXX@XX.XX.XX.53:5080;tag=as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=45248699\r\nCall-ID: 47"..., len = 2}, r2 = { s = 0x9ab901 <buf+257> "r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" sip:XXXXXXXXX@XX.XX.XX.53:5080;tag=as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=45248699\r\nCall-"..., len = 5}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x9ab8fd <buf+253> "tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" sip:XXXXXXXXX@XX.XX.XX.53:5080;tag=as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=45248699\r\nC"..., len = 3}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = { s = 0x9ab904 <buf+260> "on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" sip:XXXXXXXXX@XX.XX.XX.53:5080;tag=as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=45248699\r\nCall-ID:"..., len = 2}, gr_val = {s = 0x0, len = 0}} lecom.com>;tag=45248699\r\nCall-ID:"..., len = 2}, gr_val = {s = 0x0, len = 0}} rt = 0x0 status = 26162 uri = { s = 0x9ab89d <buf+157> "sip:XX.XX.XX.51;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>,sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" <sip:XXXXXXXXX@18"..., len = 61} use_ob = 0 rparams = { s = 0x9ab8ae <buf+174> "r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes>,sip:XX.XX.XX.51:5061;transport=tls;r2=on;lr;ftag=as485ea82a;did=bb6.e74;nat=yes\r\nMax-Forwards: 69\r\nFrom: "XXXXXXXXX" sip:XXXXXXXXX@XX.XX.XX.53:5080;"..., len = 44} __FUNCTION__ = "after_loose" #6 0x0000000000541cf0 in do_action (h=0x7ffcb7bbfaf0, a=0x7f37964bfd98, msg=0x7f37966874f8) at action.c:1060 ret = -5 v = 25 dst = {send_sock = 0x7ffcb7bbf640, to = {s = {sa_family = 1215, sa_data = "B\000\000\000\000\000\370\227h\226\067\177\000"}, sin = {sin_family = 1215, sin_port = 66, sin_addr = {s_addr = 0}, sin_zero = "\370\227h\226\067\177\000"}, sin6 = {sin6_family = 1215, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = "\370\227h\226\067\177\000\000\273\065B\000\000\000\000", __u6_addr16 = {38904, 38504, 32567, 0, 13755, 66, 0, 0}, __u6_addr32 = {2523437048, 32567, 4339131, 0}}}, sin6_scope_id = 36286432}}, id = 0, proto = 10 '\n', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7ffcb7bbfaf0 "\001" uri = {user = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13913760}, passwd = {s = 0x23a070 <error: Cannot access memory at address 0x23a070>, len = -1212418316}, host = { s = 0x2bcbb8 <error: Cannot access memory at address 0x2bcbb8>, len = 1462424480}, port = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, params = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776}, sip_params = {s = 0x7ffcb7bbf820 "z\271\232", len = 5615623}, headers = {s = 0x0, len = -2002407168}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 1337012136), transport = {s = 0x7ffcb7bbf810 "\315\271\232", len = -1212418036}, ttl = { s = 0x7f3700000000 <error: Cannot access memory at address 0x7f3700000000>, len = 1431825776}, user_param = { s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}, maddr = {s = 0x6bb01000000 <error: Cannot access memory at address 0x6bb01000000>, len = 13914448}, method = { s = 0x239dc0 <error: Cannot access memory at address 0x239dc0>, len = -1212418032}, lr = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 10140157}, r2 = { s = 0x4f7f4 <error: Cannot access memory at address 0x4f7f4>, len = 1}, gr = {s = 0x635f1 <error: Cannot access memory at address 0x635f1>, len = -1212418092}, transport_val = {s = 0x0, len = 1462424480}, ttl_val = {s = 0x7f375557ed70 "", len = 26162}, user_param_val = {s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, maddr_val = {s = 0x7f375557ed84 "", len = 5615623}, method_val = { s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: sip:601@customers.xxxxxxxxxxx.com:5061;tag=as3e9ce588\r\nTo: <sip:xxxxxx620@custo"..., len = -2002407168}, lr_val = {s = 0x7f3755b74078 "\t", len = 1337065181}, r2_val = {s = 0x0, len = -2002407168}, gr_val = {s = 0x0, len = 1337417873}} next_hop = {user = { s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}, passwd = { s = 0x9ab97a <buf+378> "as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: No"..., len = 10}, host = { s = 0x9ab9ba <buf+442> "45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0"..., len = 1462424480}, port = {s = 0x0, len = -2002407168}, params = {s = 0x0, len = -1773448560}, sip_params = {s = 0x7f37966874f8 "\277T", len = -1212417664}, headers = { s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: sip:601@customers.xxxxxxxxxxx.com:5061;tag=as3e9ce588\r\ ---Type <return> to continue, or q <return> to quit--- nTo: <sip:xxxxxx620@custo"..., len = 1431770624}, port_no = 16504, proto = 21943, type = 32567, flags = (URI_USER_NORMALIZE | unknown: 1337423684), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x7f37963e7a78 "1", len = 1}, method = {s = 0x0, len = -2002407168}, lr = {s = 0x67964f8c90 <error: Cannot access memory at address 0x67964f8c90>, len = -1773448584}, r2 = {s = 0x7ffcb7bbf980 "", len = -1771539208}, gr = {s = 0x7ffcb7bc0dc0 "\003", len = -1212417196}, transport_val = {s = 0x0, len = 5795166}, ttl_val = { s = 0x7ffcb7bbfb54 "\001", len = -1212412480}, user_param_val = {s = 0x7f37966874f8 "\277T", len = -1212412480}, maddr_val = {s = 0x7ffcb7bbfb54 "\001", len = 4329797}, method_val = { s = 0xa00000000 <error: Cannot access memory at address 0xa00000000>, len = 1462424480}, lr_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, r2_val = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776}, gr_val = {s = 0x0, len = 0}} u = 0x7ffcb7bbfaf0 flags = 0 st = {flags = 10140109, id = 0, name = {n = 50, s = {s = 0x32 <error: Cannot access memory at address 0x32>, len = 10140026}, re = 0x32}, avp = 0xa} sct = 0x7ffcb7bbfaf0 sjt = 0x7ffcb7bbfaf0 mct = 0x0 rv = 0x7f37966874f8 rv1 = 0x7f37966874f8 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = -1212417832}, re = 0x0}, pval = {rs = {s = 0x0, len = -1212417832}, ri = -1212417864, flags = 32764}}, i2s = "\330\370\273\267\374\177\000\000\304\366\273\267\374\177\000\000\270\313+\000\000"} s = {s = 0x7ffcb7bc0dc0 "\003", len = -1212417040} srevp = {0x7f37964bfd98, 0x7f37966874f8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 139876723345328, string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s = 0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr = 0x7f37966847b0, select = 0x7f37966847b0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #7 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffcb7bbfaf0, a=0x7f37555a4e10, msg=0x7f37555a6420) at action.c:1549 ret = -1212412480 mod = 0x7f37964bfd98 __FUNCTION__ = "run_actions" #8 0x000000000054d187 in run_actions_safe (h=0x7ffcb7bc0dc0, a=<optimized out>, msg=<optimized out>) at action.c:1614 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140723391036144, -6256338930039500370, 139876723356920, 140723391040960, 140723391036960, 0, -6256338896078220882, 6256743653617062318}, __mask_was_saved = 0, __saved_mask = {__val = {2436122589503271168, 4294967565, 139876721732288, 139876720589288, 139874199928833, 0, 2436122589503271168, 0, 139876722008400, 140723391036448, 139876723356920, 140723391040960, 140723391036960, 0, 5795166, 140723391036960}}}}} ret = <optimized out> ign_on_break = 0 #9 0x0000000000421190 in rval_get_int (h=0x7ffcb7bc0dc0, msg=0x1, i=0x7ffcb7bbfe20, rv=0x3d4, cache=0x67) at rvalue.c:912 r_avp = 0x6632 avp_val = {n = 266, s = {s = 0x10a <error: Cannot access memory at address 0x10a>, len = -1772630408}, re = 0x10a} pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0} tmp = {s = 0xa49900 <_pkg_root> "\313\030p", len = -1773840408} s = 0x7f37966874f8 r = 26162 ret = 26162 destroy_pval = -1212412480 __FUNCTION__ = "rval_get_int" #10 0x0000000000426f1c in rval_expr_eval_int (h=0x7ffcb7bc0dc0, msg=0x7f37966874f8, res=0x7ffcb7bbfe20, rve=0x7f37964bf230) at rvalue.c:1910 i1 = 0 i2 = 0 ---Type <return> to continue, or q <return> to quit--- ret = -1 c1 = {cache_type = 3082554816, val_type = 32764, c = {avp_val = {n = 0, s = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -1773234896}, re = 0x300000000}, pval = {rs = { s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -1773234896}, ri = -1771539208, flags = 32567}}, i2s = "\000\000\000\000\004\000\000\000g\306\037P7\177\000\000\323x=\226\067\177"} c2 = {cache_type = 2520886432, val_type = 32567, c = {avp_val = {n = 5799339, s = {s = 0x587dab <pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\323 B", len = 10139993}, re = 0x587dab <pv_printf+267>}, pval = {rs = {s = 0x587dab <pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\323 B", len = 10139993}, ri = 9, flags = 0}}, i2s = "x\316W\226\067\177\000\000\000\261\245\210\226\330\316!\001\000\000\000\000"} rv1 = 0x7f37966874f8 rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" #11 0x00000000005421c7 in do_action (h=0x7ffcb7bc0dc0, a=0x7f37964c6300, msg=0x7f37966874f8) at action.c:1030 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 45312, sa_data = "\245\210\226\330\316!\370th\226\067\177\000"}, sin = {sin_family = 45312, sin_port = 34981, sin_addr = {s_addr = 567203990}, sin_zero = "\370th\226\067\177\000"}, sin6 = {sin6_family = 45312, sin6_port = 34981, sin6_flowinfo = 567203990, sin6_addr = {__in6_u = { __u6_addr8 = "\370th\226\067\177\000\000\221`\267O7\177\000", __u6_addr16 = {29944, 38504, 32567, 0, 24721, 20407, 32567, 0}, __u6_addr32 = {2523428088, 32567, 1337417873, 32567}}}, sin6_scope_id = 10140109}}, id = 0, proto = 50 '2', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7f37964bf230 "\001" uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776}, passwd = {s = 0x7ffcb7bc0010 "z\271\232", len = 5615623}, host = {s = 0x0, len = -2002407168}, port = {s = 0x0, len = 1337012137}, params = {s = 0x7ffcb7bc0000 "\315\271\232", len = -1212416004}, sip_params = {s = 0x7ffc00000000 <error: Cannot access memory at address 0x7ffc00000000>, len = 1431825776}, headers = { s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}, port_no = 64, proto = 47036, type = 1723, flags = (URI_SIP_USER_PHONE | unknown: 210129324), transport = {s = 0x7f3796537350 "\224\004", len = -1212416000}, ttl = { s = 0x30 <error: Cannot access memory at address 0x30>, len = 10140157}, user_param = {s = 0x4f7f4 <error: Cannot access memory at address 0x4f7f4>, len = 1}, maddr = { s = 0x635f1 <error: Cannot access memory at address 0x635f1>, len = -1212416060}, method = {s = 0x7f3796553930 "\001", len = 1462424480}, lr = {s = 0x7f375557ed70 "", len = 26162}, r2 = { s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, gr = {s = 0x7f375557ed84 "", len = 5615623}, transport_val = { s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: sip:601@customers.xxxxxxxxxxx.com:5061;tag=as3e9ce588\r\nTo: <sip:xxxxxx620@custo"..., len = -2002407168}, ttl_val = {s = 0x7f37559e7178 "\b\220\325U7\177", len = 1337065181}, user_param_val = {s = 0x7ffcb7bc0dc0 "\003", len = -2002407168}, maddr_val = { s = 0x28ac9 <error: Cannot access memory at address 0x28ac9>, len = 1337417873}, method_val = { s = 0x9ab9cd <buf+461> "4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 50}, lr_val = { s = 0x9ab97a <buf+378> "as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: No"..., len = 10}, r2_val = { s = 0x9ab9ba <buf+442> "45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-Han gupCauseCode: 16\r\nContent-Length: 0"..., len = 1462424480}, gr_val = {s = 0x0, len = -2002407168}} next_hop = {user = {s = 0x0, len = -1774037616}, passwd = {s = 0x7f37966874f8 "\277T", len = -1212415632}, host = { s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: sip:601@customers.xxxxxxxxxxx.com:5061;tag=as3e9ce588\r\nTo: <sip:xxxxxx620@custo"..., len = 1431770624}, port = {s = 0x7f37559e7178 "\b\220\325U7\177", len = 1337423685}, params = { s = 0xa92d04ebe56c51ae <error: Cannot access memory at address 0xa92d04ebe56c51ae>, len = 210129326}, sip_params = {s = 0x0, len = 37}, headers = { s = 0x9ab963 <buf+355> "XX.XX.XX.53:5080>;tag=as485ea82a\r\nTo: sip:xxxxxx601@customers.xxxxxxxxxxx.com;tag=45248699\r\nCall-ID: 4710f4dd71b59fc66e2ea33b6735fa25@XX.XX.XX.53:5080\r\nCSeq: 103 BYE\r\nUser-Agent: ast.zs PBX\r\nX-A"..., len = -1772799688}, port_no = 23088, proto = 38462, type = 32567, flags = URI_USER_NORMALIZE, transport = {s = 0x0, len = -2002407168}, ttl = {s = 0x0, len = -1774037640}, user_param = {s = 0x7ffcb7bc0170 "", len = -1771539208}, maddr = {s = 0x7ffcb7bc0dc0 "\003", len = -1212415120}, method = {s = 0x0, len = 5795166}, lr = {s = 0x7ffcb7bc0370 "", len = -1212412480}, r2 = {s = 0x7f37966874f8 "\277T", len = -1212412480}, gr = {s = 0x7ffcb7bc0370 "", len = 4329797}, transport_val = {s = 0x0, len = 1441022624}, ttl_val = {s = 0x7f379641bff0 "", len = -2002407168}, user_param_val = {s = 0x7ffcb7bc02b0 "\310\003", len = -1772698632}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = -2002407168}, lr_val = {s = 0x0, len = -1774037656}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1771539208}, gr_val = {s = 0x7ffcb7bc0dc0 "\003", len = -1212415120}} u = 0x7f37964bf230 flags = 32567 st = {flags = 0, id = 0, name = {n = -1774037616, s = {s = 0x7f3796425590 "", len = -1771539208}, re = 0x7f3796425590}, avp = 0x7ffcb7bc0170} sct = 0x7f37964bf230 ---Type <return> to continue, or q <return> to quit--- sjt = 0x7f37964bf230 mct = 0x0 rv = 0x55b007 <get_debug_level+103> rv1 = 0x7f37966874f8 c1 = {cache_type = 10140026, val_type = RV_NONE, c = {avp_val = {n = 10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len = 10140090}, re = 0xa}, pval = {rs = { s = 0xa <error: Cannot access memory at address 0xa>, len = 10140090}, ri = -1212416284, flags = 32764}}, i2s = "\000\000\000\000\000\000\000\000\240\323*W7\177\000\000\b\000\000\000\000"} s = { s = 0x7f37572ad3a0 "SIP/2.0 481 Subscription Does Not Exist\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;rport=5080;branch=z9hG4bK64b033af\r\nFrom: sip:601@customers.xxxxxxxxxxx.com:5061;tag=as3e9ce588\r\nTo: <sip:xxxxxx620@custo"..., len = -2002407168} srevp = {0x7f37964c6300, 0x7f37966874f8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 139876723345328, string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s = 0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr = 0x7f37966847b0, select = 0x7f37966847b0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #12 0x00000000005407b5 in run_actions (h=0x1, a=0x7f37555a4e10, msg=0x7f37555a6420) at action.c:1549 ret = 1 mod = 0x7f37964c6300 __FUNCTION__ = "run_actions" #13 0x00000000005423e0 in do_action (h=0x7ffcb7bc0dc0, a=0x7f3796668250, msg=0x7f37966874f8) at action.c:678 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\070o\321U7\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "8o\321U7\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "8o\321U7\177\000\000\230\332>\227\067\177\000", __u6_addr16 = {28472, 21969, 32567, 0, 55960, 38718, 32567, 0}, __u6_addr32 = {1439788856, 32567, 2537478808, 32567}}}, sin6_scope_id = 528}}, id = 0, proto = -112 '\220', send_flags = {f = 211 '\323', blst_imask = 187 '\273'}} end = 0x8 <error: Cannot access memory at address 0x8> uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1431825776}, passwd = {s = 0x7ffcb7bc0560 "\300\r\274\267\374\177", len = 5615623}, host = { s = 0x100000002 <error: Cannot access memory at address 0x100000002>, len = -2002407168}, port = {s = 0x0, len = -1774040560}, params = {s = 0x7ffcb7bc0dc0 "\003", len = -5}, sip_params = { s = 0x7ffcb7bc0590 "", len = -1771539208}, headers = {s = 0x0, len = 5506997}, port_no = 1424, proto = 47036, type = 32764, flags = (unknown: 3082552768), transport = { s = 0x7f3796424a10 "\267\001", len = -1771539208}, ttl = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1756792081}, user_param = { s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, len = 0}, maddr = {s = 0x7ffcb7bc0588 "\207\321T", len = 36888808}, method = {s = 0x2328ee0 "\005", len = 36867552}, lr = { s = 0x0, len = 36867552}, r2 = {s = 0x100000003 <error: Cannot access memory at address 0x100000003>, len = -1212413984}, gr = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, transport_val = {s = 0x200000001 <error: Cannot access memory at address 0x200000001>, len = -1212414576}, ttl_val = {s = 0x232dfc0 "Ѝ2\002", len = 0}, user_param_val = {s = 0x7f3796689366 "BYE", len = 1}, maddr_val = {s = 0x32e0d0 <error: Cannot access memory at address 0x32e0d0>, len = -1756812511}, method_val = {s = 0x7ffcb7bc058c "", len = 0}, lr_val = {s = 0x7ffcb7bc0dc0 "\003", len = -1771539208}, r2_val = {s = 0x7ffcb7bc0dc0 "\003", len = -1212413760}, gr_val = {s = 0x0, len = 5558663}} next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffcb7bc0590 "", len = 9195950}, host = {s = 0x7f37966874f8 "\277T", len = -1212412480}, port = {s = 0x7ffcb7bc08c0 "\001", len = 0}, params = { s = 0xa92d04e4120c51ae <error: Cannot access memory at address 0xa92d04e4120c51ae>, len = 210129326}, sip_params = {s = 0x0, len = 0}, headers = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, port_no = 3, proto = 0, type = TEL_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = {s = 0x0, len = 36867720}, ttl = {s = 0x1000001 <error: Cannot access memory at address 0x1000001>, len = -1212414348}, user_param = {s = 0x2328de0 "", len = 1391525782}, maddr = { s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13913952}, method = {s = 0x239fb0 <error: Cannot access memory at address 0x239fb0>, len = 2863264}, lr = { s = 0x2bcbb8 <error: Cannot access memory at address 0x2bcbb8>, len = -2002407168}, r2 = {s = 0x10e <error: Cannot access memory at address 0x10e>, len = -1212413760}, gr = { s = 0x7ffcb7bc0dc0 "\003", len = 4329872}, transport_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = -1771531328}, ttl_val = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 36867904}, user_param_val = {s = 0x2328de0 "", len = 8}, maddr_val = { s = 0x80 <error: Cannot access memory at address 0x80>, len = -1756820986}, method_val = {s = 0x0, len = -2002407168}, lr_val = {s = 0x0, len = -1774039800}, r2_val = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1771539208}, gr_val = {s = 0x7ffcb7bc0dc0 "\003", len = -1212413760}} u = 0x8 ---Type <return> to continue, or q <return> to quit--- flags = 0 st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1212414576}, re = 0x1}, avp = 0xa92d04e4008c51ae} sct = 0x8 sjt = 0x8 mct = 0x0 rv = 0x7ffcb7bc0630 rv1 = 0x7f37966874f8 c1 = {cache_type = 3082539912, val_type = 32764, c = {avp_val = {n = -1212423248, s = {s = 0x7ffcb7bbe3b0 "'\312W\226\067\177", len = -1212427344}, re = 0x7ffcb7bbe3b0}, pval = {rs = { s = 0x7ffcb7bbe3b0 "'\312W\226\067\177", len = -1212427344}, ri = -1212414924, flags = 32764}}, i2s = "\200\352\062\002\000\000\000\000\240\323*W7\177\000\000\b\000\000\000\000"} s = { s = 0x43b2fc <grp_hash_lookup+1420> "1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200", len = -1212414452} srevp = {0x7f3796426198, 0x7f37966874f8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 139876723345328, string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s = 0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr = 0x7f37966847b0, select = 0x7f37966847b0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #14 0x00000000005407b5 in run_actions (h=0x1, a=0x7f37555a4e10, msg=0x7f37555a6420) at action.c:1549 ret = 1 mod = 0x7f3796426198 __FUNCTION__ = "run_actions" #15 0x0000000000542218 in do_action (h=0x7ffcb7bc0dc0, a=0x7f37964262c8, msg=0x7f37966874f8) at action.c:1049 ret = 1 v = 1 dst = {send_sock = 0x7f37966874f8, to = {s = {sa_family = 34958, sa_data = "\000U7\177\000\000\341\001\000\000\374\177\000"}, sin = {sin_family = 34958, sin_port = 21760, sin_addr = {s_addr = 32567}, sin_zero = "\341\001\000\000\374\177\000"}, sin6 = {sin6_family = 34958, sin6_port = 21760, sin6_flowinfo = 32567, sin6_addr = {__in6_u = { __u6_addr8 = "\341\001\000\000\374\177\000\000\310@XW7\177\000", __u6_addr16 = {481, 0, 32764, 0, 16584, 22360, 32567, 0}, __u6_addr32 = {481, 32764, 1465401544, 32567}}}, sin6_scope_id = 2522107376}}, id = 32567, proto = -8 '\370', send_flags = {f = 116 't', blst_imask = 104 'h'}} end = 0x7f3796424d08 "\001" uri = {user = {s = 0x7ffcb7bc0b6c "", len = -1212413516}, passwd = {s = 0x7f37563803c0 "\363T", len = 1465401264}, host = {s = 0x9 <error: Cannot access memory at address 0x9>, len = 0}, port = { s = 0x7f375539d330 "\260?XW7\177", len = 7895}, params = {s = 0x7ffcb7bc0b6c "", len = 5615623}, sip_params = {s = 0x1ed7 <error: Cannot access memory at address 0x1ed7>, len = -2002407168}, headers = {s = 0x7f37575840c8 "\002", len = -1774255040}, port_no = 19952, proto = 38484, type = 32567, flags = (URI_SIP_USER_PHONE | unknown: 492), transport = {s = 0x7f37966874f8 "\277T", len = -1772487928}, ttl = {s = 0x7f37966874f8 "\277T", len = 1465401784}, user_param = {s = 0x0, len = -1}, maddr = {s = 0x7ffcb7bc0a00 "", len = 1684820398}, method = { s = 0x4 <error: Cannot access memory at address 0x4>, len = 10133176}, lr = {s = 0xa02840 <p_onsend> "", len = -1771539208}, r2 = { s = 0xa92d04e414ec51ae <error: Cannot access memory at address 0xa92d04e414ec51ae>, len = 210129326}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7f37552a21f0 <tm_cfg> "\b\026[U7\177", len = 5615623}, ttl_val = {s = 0x7ffcb7bc0b6c "", len = -1212413244}, user_param_val = {s = 0x7f37552a21f0 <tm_cfg> "\b\026[U7\177", len = 1}, maddr_val = {s = 0x7f3757583fb0 "0\323\071U7\177", len = -1771539208}, method_val = {s = 0x1e1 <error: Cannot access memory at address 0x1e1>, len = 1465401784}, lr_val = {s = 0x7f3757583fb0 "0\323\071U7\177", len = 5615623}, r2_val = { s = 0x7f37572f3388 "\360\247\067U7\177", len = 1425852922}, gr_val = {s = 0x0, len = 1426075181}} next_hop = {user = {s = 0x1e1 <error: Cannot access memory at address 0x1e1>, len = -1212413072}, passwd = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -1771539208}, host = { s = 0x1e1 <error: Cannot access memory at address 0x1e1>, len = 1465401784}, port = {s = 0x7f3757583fb0 "0\323\071U7\177", len = 1426115770}, params = {s = 0x0, len = 10498080}, sip_params = { s = 0xa03028 <def_list+8> "", len = 10498096}, headers = {s = 0xa03038 <def_list+24> "", len = 10498120}, port_no = 10568, proto = 160, type = ERROR_URI_T, flags = (unknown: 0), transport = { s = 0x7f37963bbc80 <wr_buf> "\027\003\001\004\060\375**.N\354\367\271\252ȴ\302\353\351\065Ә\364\342W\213$c\356'N\232پ\365\300\025\310\t\033e\222\345\204\067\351\344\026\304\033j\363j\203Ky\371\254\254n}\022}\255\224\066\017\256NmĦ\353\367\247\252\360\255\300\214)\002\016)\003\221\375o@\265{\273d\356K\245\031qh/J\326\305XQ\025e\363z\242&\342a\330\356o\330@\220\232]yvh\344\035&\331\327od\026\060\340!ˁ\217\200\031\vd\377\062TZ\357?\240\n\320g\307\033\030\317\334\326&Kɢ\002g\236*5A\335\356Lu\236\254\005\363\206\231Zվ\374\254\212\236\020\255\343\024\061\323\a\264H\263\340\245\021ni"..., len = 395}, ttl = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1212416000}, user_param = {s = 0x0, len = 1391525782}, maddr = { ---Type <return> to continue, or q <return> to quit--- s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13915544}, method = {s = 0x2399c0 <error: Cannot access memory at address 0x2399c0>, len = -1212412940}, lr = { s = 0x2bcb70 <error: Cannot access memory at address 0x2bcb70>, len = -1212412924}, r2 = {s = 0x7f37966874f8 "\277T", len = 1391525782}, gr = { s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13916264}, transport_val = {s = 0x2396a8 <error: Cannot access memory at address 0x2396a8>, len = 2860952}, ttl_val = { s = 0x2bcbb8 <error: Cannot access memory at address 0x2bcbb8>, len = 8}, user_param_val = {s = 0x118 <error: Cannot access memory at address 0x118>, len = -2002407168}, maddr_val = { s = 0x2ba798 <error: Cannot access memory at address 0x2ba798>, len = 6245668}, method_val = {s = 0x7f379659fb08 "\\005", len = 6999923}, lr_val = {s = 0x715640 <__FUNCTION__.7459> "parse_via", len = 1465401264}, r2_val = {s = 0xa92d04e4090c51ae <error: Cannot access memory at address 0xa92d04e4090c51ae>, len = -1212412780}, gr_val = {s = 0x0, len = 10139797}} u = 0x7f3796424d08 flags = 32567 st = {flags = 481, id = 0, name = {n = -1212413072, s = {s = 0x7ffcb7bc0b70 "", len = 4}, re = 0x7ffcb7bc0b70}, avp = 0x7f37966874f8} sct = 0x7f3796424d08 sjt = 0x7f3796424d08 mct = 0x0 rv = 0x1 rv1 = 0x7f37966874f8 c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val = {n = 1465401456, s = {s = 0x7f3757584070 "\341\001", len = 10485504}, re = 0x7f3757584070}, pval = {rs = { s = 0x7f3757584070 "\341\001", len = 10485504}, ri = 4, flags = 1}}, i2s = "\000\v\274\267\374\177", '\000' <repeats 11 times>, "\313;U7\177"} s = {s = 0xa49900 <_pkg_root> "\313\030p", len = 4} srevp = {0x7f37964262c8, 0x7f37966874f8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 139876723345328, string = 0x7f37966847b0 "\200\223M\226\067\177", str = {s = 0x7f37966847b0 "\200\223M\226\067\177", len = 3}, data = 0x7f37966847b0, attr = 0x7f37966847b0, select = 0x7f37966847b0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #16 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffcb7bc0dc0, a=0x7f37555a4e10, a@entry=0x7f379641bdc8, msg=0x7f37555a6420, msg@entry=0x7f37966874f8) at action.c:1549 ret = 1 mod = 0x7f37964262c8 __FUNCTION__ = "run_actions" #17 0x000000000054d225 in run_top_route (a=0x7f379641bdc8, msg=0x7f37966874f8, c=<optimized out>) at action.c:1635 ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140723391040960, 6256744100537323950, 139876720819656, 139876723356920, 0, 0, -6256338930008043090, 6256743653617062318}, __mask_was_saved = 0, __saved_mask = {__val = {10139797, 646, 139876723356920, 10139738, 10139648, 646, 139876723356920, 10139738, 10139648, 646, 2436122589503271168, 0, 139876723288072, 1073741825, 139875626353736, 139876723272936}}}}} p = <optimized out> ret = <optimized out> sfbk = 0 #18 0x000000000055501e in receive_msg (buf=0x0, len=2523428088, rcv_info=0x7ffcb7bc10a0) at receive.c:240 msg = 0x7f37966874f8 ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140723391041328, 6256744100537323950, 139876722383928, 139876723356920, 0, 0, -6256338930008043090, 6256743653617062318}, __mask_was_saved = 0, __saved_mask = {__val = {10109832, 0, 140723391041718, 6, 1, 139876720639840, 139876745481671, 139874199928837, 0, 7048948, 139876737320808, 139876722179400, 140723391041588, 139876747609744, 139876722179400, 12}}}}} inb = { s = 0x9ab800 <buf> "BYE sips:xxxxxx601@192.168.1.17:15077;alias=62.93.160.62~47967~3;transport=tls SIP/2.0\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;branch=z9hG4bK05a78335\r\nRoute: <sip:XX.XX.XX.51;r2=on;lr;ftag=as485ea82a;d"..., len = 646} netinfo = {data = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 2}, dst = 0x7f37973d8768, rcv = 0x7f3797da9000} __FUNCTION__ = "receive_msg" #19 0x0000000000467630 in udp_rcv_loop () at udp_server.c:495 len = 646 ---Type <return> to continue, or q <return> to quit--- buf = "BYE sips:xxxxxx601@192.168.1.17:15077;alias=62.93.160.62~47967~3;transport=tls SIP/2.0\r\nVia: SIP/2.0/UDP XX.XX.XX.53:5080;branch=z9hG4bK05a78335\r\nRoute: <sip:XX.XX.XX.51;r2=on;lr;ftag=as485ea82a;d"... from = 0x7f3796567d48 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {890187705, 139875631917044}, addr32 = {890187705, 0, 1431988212, 32567}, addr16 = {12217, 13583, 0, 0, 26612, 21850, 32567, 0}, addr = "\271/\017\065\000\000\000\000\364gZU7\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {856633273, 0}, addr32 = {856633273, 0, 0, 0}, addr16 = {12217, 13071, 0, 0, 0, 0, 0, 0}, addr = "\271/\017\063", '\000' <repeats 11 times>}}, src_port = 5080, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023ع/\017\065\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 890187705}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 890187705, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f37963eff60, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #20 0x00000000004eec99 in main_loop () at main.c:1614 si_desc = "udp receiver child=6 sock=XX.XX.XX.51:5060\000\000\000\000\000и^\226\067\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000]o_", '\000' <repeats 14 times>, "\261\245\210\226\330\316!\260\224\031\226\067\177\000\000\000\261\245\210\226\330\316!\b\022\245\000\000\000\000\000\004\000\000\000\000\000\000" woneinit = 1 __FUNCTION__ = "main_loop" #21 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631 cfg_stream = 0x0 r = 26162 tmp = 0x7ffcb7bc1ee4 "" tmp_len = 0 port = 0 proto = -1747282480 ret = 0 seed = 810405613 debug_save = 0 debug_flag = 8 dont_fork_cnt = 0 st = {st_dev = 15, st_ino = 10167, st_nlink = 2, st_mode = 16832, st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1492119111, tv_nsec = 264028111}, st_mtim = {tv_sec = 1492495469, tv_nsec = 702131134}, st_ctim = {tv_sec = 1492495469, tv_nsec = 702131134}, __glibc_reserved = {0, 0, 0}} __FUNCTION__ = "main" (gdb) info locals No locals. (gdb) list 69 in ../../mem/../atomic/atomic_common.h
The crash is with the patch, right?
Yes, with the patch.
Linuxmaniac suggested to me to try this other patch: https://github.com/kamailio/kamailio/commit/edb9df8ace8ff74e11e025a37645aebe...
I'm going to try it and send feedbacks
After applying the linuxmaniac's patch, I have a new crash
``` # gdb /usr/sbin/kamailio /tmp/core GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: http://www.gnu.org/software/gdb/bugs/. Find the GDB manual and other documentation resources online at: http://www.gnu.org/software/gdb/documentation/. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/4e/fae9c9a848e19a554209666ff42a678720280e.debug...done. done. [New LWP 15013] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/kamailio.'. Program terminated with signal SIGSEGV, Segmentation fault. #0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74 74 ../../mem/../atomic/atomic_common.h: No such file or directory. (gdb) bt full #0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74 No locals. #1 dlg_unref_helper (dlg=0x7f4b606c5008, cnt=1, fname=0x3aa5 <error: Cannot #access memory at address 0x3aa5>, fline=1650) at dlg_hash.c:925 mypid = 15013 d_entry = 0x7f555b6b2bf0 __FUNCTION__ = "dlg_unref_helper" #2 0x00007f4b4d3d0e12 in dlg_run_event_route (dlg=0x7f4b606c5008, msg=0x7f4b93f32aa8, ostate=1390662688, nstate=1) at dlg_handlers.c:1650 rt = 10133176 bkroute = 1 __FUNCTION__ = "dlg_run_event_route" #3 0x00007f4b4d3d421e in dlg_onroute (req=0x7f4b93f32aa8, route_params=0x7f4b52e3be10, param=0x7f4b52e3d420) at dlg_handlers.c:1318 dlg0 = 0x3aa5 val = { s = 0x119535a "da8.12b2;nat=yes>\r\nRoute: sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: <sip:XXXXXXXXX@customer"..., len = 8} callid = { s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3"..., len = 32} ftag = { s = 0x11953fb "1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall-ID: 510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax"..., len = 10} ttag = { s = 0x119543e "as695cd3d4\r\nCall-ID: 510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Ag"..., len = 10} new_state = 5 old_state = 4 unref = 1 event = 7 dir = 1 ret = 15013 __FUNCTION__ = "dlg_onroute" #4 0x00007f4b4fcae28d in run_rr_callbacks (req=0x7f4b93f32aa8, rr_param=0x7ffe5b58c860) at rr_cb.c:96 l_param = { s = 0x119532f "transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nRoute: sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;"..., len = 59} cbp = 0x7f4b93f12208 __FUNCTION__ = "run_rr_callbacks" #5 0x00007f4b4fca08a2 in after_loose (_m=0x7f4b93f32aa8, preloaded=2) at loose.c:928 puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x1195379 "xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as6"..., len = 12}, port = {s = 0x0, len = 0}, params = { s = 0x1195386 "r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall"..., len = 45}, sip_params = { s = 0x1195386 "r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall"..., len = 45}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = { s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = { s = 0x119538c "lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall-ID: 5"..., len = 2}, r2 = { s = 0x1195386 "r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: <sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061---Type <return> to continue, or q <return> to quit---
;tag=as695cd3d4\r\nCall"..., len = 5}, gr = {s = 0x0, len = 0}, ;transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, ;user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = { s = 0x1195389 "on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;tag=1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall-ID"..., len = 2}, gr_val = {s = 0x0, len = 0}} rt = 0x0 status = 15013 uri = { s = 0x1195319 "sip:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nRoute: sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes\r\nFrom: "IbsVoip02" <sip:xxxxxx02@customers."..., len = 81} use_ob = 0 rparams = { s = 0x119532f "transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes>\r\nRoute: sip:xx.xx.xx.51;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=yes\r\nFrom: "IbsVoip02" sip:xxxxxx02@customers.xxxxxxxxxxx.com:5061;"..., len = 59} __FUNCTION__ = "after_loose" #6 0x0000000000541cf0 in do_action (h=0x7ffe5b58cf80, a=0x7f4b93d577b8, msg=0x7f4b93f32aa8) at action.c:1060 ret = -5 v = 0 dst = {send_sock = 0x7ffe5b58cad0, to = {s = {sa_family = 1215, sa_data = "B\000\000\000\000\000\300Y\363\223K\177\000"}, sin = {sin_family = 1215, sin_port = 66, sin_addr = {s_addr = 0}, sin_zero = "\300Y\363\223K\177\000"}, sin6 = {sin6_family = 1215, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\300Y\363\223K\177\000\000\273\065B\000\000\000\000", __u6_addr16 = {22976, 37875, 32587, 0, 13755, 66, 0, 0}, __u6_addr32 = {2482198976, 32587, 4339131, 0}}}, sin6_scope_id = 18437387}}, id = 0, proto = 15 '\017', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7ffe5b58cf80 "\001" uri = {user = {s = 0x7ffe5b58e250 "\003", len = 4329872}, passwd = {s = 0x24f2c0 <error: Cannot access memory at address 0x24f2c0>, len = 1532545924}, host = { s = 0x2d2028 <error: Cannot access memory at address 0x2d2028>, len = 1617711112}, port = {s = 0xa <error: Cannot access memory at address 0xa>, len = 0}, params = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 1390517168}, sip_params = {s = 0x7ffe5b58ccb0 "\373S\031\001", len = 5615623}, headers = {s = 0x0, len = 1774088704}, port_no = 65535, proto = 65535, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 1295691688), transport = {s = 0x7ffe5b58cca0 "ST\031\001", len = 1532546204}, ttl = {s = 0x0, len = 1390517168}, user_param = { s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3"..., len = 32}, maddr = {s = 0x8ad00000001 <error: Cannot access memory at address 0x8ad00000001>, len = 10}, method = {s = 0x7ffe5b58e250 "\003", len = 1532546208}, lr = { s = 0x1195473 "\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3240 1.0.3.162\r\nAllow: INVITE, AC"..., len = 18437235}, r2 = {s = 0x1c4fd8 <error: Cannot access memory at address 0x1c4fd8>, len = 8}, gr = {s = 0x2363ce <error: Cannot access memory at address 0x2363ce>, len = 1532546148}, transport_val = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = 1617711112}, ttl_val = {s = 0x7f4b52e19bb0 "", len = 15013}, user_param_val = { s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, maddr_val = {s = 0x7f4b52e19bc4 "", len = 5615623}, method_val = { s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route: sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068\r\nRecord-Route: <sips:xx.xx.xx.51;r2"..., len = 1774088704}, lr_val = {s = 0x7f4b5eac2050 "P\036\241SK\177", len = 1295744733}, r2_val = {s = 0x0, len = 1774088704}, gr_val = {s = 0x0, len = 1296097425}} next_hop = {user = { s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3"..., len = 32}, passwd = { s = 0x11953fb "1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall-ID: 510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax"..., len = 10}, host = { s = 0x119543e "as695cd3d4\r\nCall-ID: 510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Ag"..., len = 1617711112}, port = {s = 0x0, len = 1774088704}, params = {s = 0x7ffe5b58e250 "\003", len = -1814770512}, sip_params = {s = 0x7f4b93f32aa8 "}\346\003", len = 1532546576}, headers = { s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route: sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068\r\nRecord-Route: <sips:xx.xx.xx.51;r2"..., len = 1390446080}, port_no = 8272, proto = 24236, type = 32587, flags = (URI_USER_NORMALIZE | unknown: 1296103236), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x7f4b93c7ea78 "1", len = 1}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1774088704}, lr = { s = 0x7fa93d906b0 <error: Cannot access memory at address 0x7fa93d906b0>, len = -1814770536}, r2 = {s = 0x7ffe5b58ce10 "", len = -1812780376}, gr = {s = 0x7ffe5b58e250 "\003", len = 1532547044}, transport_val = {s = 0x0, len = 5795166}, ttl_val = {s = 0x7ffe5b58cfe4 "\001", len = 1532551760}, user_param_val = {s = 0x7f4b93f32aa8 "}\346\003", len = 1532551760}, maddr_val = { s = 0x7ffe5b58cfe4 "\001", len = 4329797}, method_val = {s = 0xa00000000 <error: Cannot access memory at address 0xa00000000>, len = 1617711112}, lr_val = { ---Type <return> to continue, or q <return> to quit--- s = 0xa <error: Cannot access memory at address 0xa>, len = 0}, r2_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1390517168}, gr_val = {s = 0x0, len = 0}} u = 0x7ffe5b58cf80 flags = 0 st = {flags = 18437203, id = 0, name = {n = 32, s = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 18437115}, re = 0x20}, avp = 0xa} sct = 0x7ffe5b58cf80 sjt = 0x7ffe5b58cf80 mct = 0x0 rv = 0x7f4b93f32aa8 rv1 = 0x7f4b93f32aa8 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 1532546408}, re = 0x0}, pval = {rs = {s = 0x0, len = 1532546408}, ri = 1532546376, flags = 32766}}, i2s = "h\315X[\376\177\000\000\000r\276io;\351\273( -\000\000"} s = {s = 0x7ffe5b58e250 "\003", len = 1532547200} srevp = {0x7f4b93d577b8, 0x7f4b93f32aa8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #7 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffe5b58cf80, a=0x7f4b52e3be10, msg=0x7f4b52e3d420) at action.c:1549 ret = 1532551760 mod = 0x7f4b93d577b8 __FUNCTION__ = "run_actions" #8 0x000000000054d187 in run_actions_safe (h=0x7ffe5b58e250, a=<optimized out>, msg=<optimized out>) at action.c:1614 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140730430967680, 2679121111027585546, 139962581461672, 140730430972496, 140730430968496, 0, 2679121111971303946, -2678920028792385014}, __mask_was_saved = 0, __saved_mask = -{__val = {13540419104367604224, 4297924648, -139962579756256, 139962578602400, 139960099274753, 0, -13540419104367604224, 0, 139962580007312, 140730430967984, 139962581461672, 140730430972496, 140730430968496, 0, 5795166, 140730430968496}}}}} ret = <optimized out> ign_on_break = 0 #9 0x0000000000421190 in rval_get_int (h=0x7ffe5b58e250, msg=0x1, i=0x7ffe5b58d2b0, rv=0xb7c, cache=0x67) at rvalue.c:912 r_avp = 0x3aa5 avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1814181456}, re = 0x1} pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0} tmp = {s = 0xa49900 <_pkg_root> "\313\030p", len = 0} s = 0x7f4b93f32aa8 r = 15013 ret = 15013 destroy_pval = 1532551760 __FUNCTION__ = "rval_get_int" #10 0x0000000000426f1c in rval_expr_eval_int (h=0x7ffe5b58e250, msg=0x7f4b93f32aa8, res=0x7ffe5b58d2b0, rve=0x7f4b93d56c50) at rvalue.c:1910 i1 = 0 i2 = 0 ret = -1 c1 = {cache_type = 1532551760, val_type = 32766, c = {avp_val = {n = 0, s = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -1814207504}, re = 0x300000000}, pval = {rs = { s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -1814207504}, ri = -1812780376, flags = 32587}}, i2s = "\000\000\000\000\004\000\000\000\217J\251MK\177\000\000\213\310ƓK\177"} c2 = {cache_type = 2479561888, val_type = 32587, c = {avp_val = {n = 5799339, s = {s = 0x100587dab <error: Cannot access memory at address 0x100587dab>, len = 18437069}, re = 0x100587dab}, pval = { rs = {s = 0x100587dab <error: Cannot access memory at address 0x100587dab>, len = 18437069}, ri = 9, flags = 0}}, i2s = "\260\311ݓK\177\000\000\000r\276io;\351\273\001\000\000\000\000"} ---Type <return> to continue, or q <return> to quit--- rv1 = 0x7f4b93f32aa8 rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" #11 0x00000000005421c7 in do_action (h=0x7ffe5b58e250, a=0x7f4b93d5dd20, msg=0x7f4b93f32aa8) at action.c:1030 ret = -5 v = 0 dst = {send_sock = 0x7ffe5b58d430, to = {s = {sa_family = 29184, sa_data = "\276io;\351\273\000\326X[\376\177\000"}, sin = {sin_family = 29184, sin_port = 27070, sin_addr = {s_addr = 3152624495}, sin_zero = "\000\326X[\376\177\000"}, sin6 = {sin6_family = 29184, sin6_port = 27070, sin6_flowinfo = 3152624495, sin6_addr = {__in6_u = { __u6_addr8 = "\000\326X[\376\177\000\000\221\340@MK\177\000", __u6_addr16 = {54784, 23384, 32766, 0, 57489, 19776, 32587, 0}, __u6_addr32 = {1532548608, 32766, 1296097425, 32587}}}, sin6_scope_id = 18437203}}, id = 0, proto = 32 ' ', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7f4b93d56c50 "\001" uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1390517168}, passwd = {s = 0x7ffe5b58d4a0 "\373S\031\001", len = 5615623}, host = {s = 0x0, len = 1774088704}, port = { s = 0x0, len = 1295691689}, params = {s = 0x7ffe5b58d490 "ST\031\001", len = 1532548236}, sip_params = {s = 0x7ffe00000000 <error: Cannot access memory at address 0x7ffe00000000>, len = 1390517168}, headers = { s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3"..., len = 32}, port_no = 54480, proto = 23384, type = 2221, flags = (URI_SIP_USER_PHONE | unknown: 8), transport = {s = 0x7f4b93dced70 "\225\004", len = 1532548240}, ttl = { s = 0x1195473 "\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3240 1.0.3.162\r\nAllow: INVITE, AC"..., len = 18437235}, user_param = {s = 0x1c4fd8 <error: Cannot access memory at address 0x1c4fd8>, len = 8}, maddr = { s = 0x2363ce <error: Cannot access memory at address 0x2363ce>, len = 1532548180}, method = {s = 0x7f4b93deb350 "\001", len = 1617711112}, lr = {s = 0x7f4b52e19bb0 "", len = 15013}, r2 = { s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, gr = {s = 0x7f4b52e19bc4 "", len = 5615623}, transport_val = { s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route: sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068\r\nRecord-Route: <sips:xx.xx.xx.51;r2"..., len = 1774088704}, ttl_val = {s = 0x7f4b5338cc58 "p\314\070SK\177", len = 1295744733}, user_param_val = {s = 0x7ffe5b58e250 "\003", len = 1774088704}, maddr_val = { s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, len = 1296097425}, method_val = { s = 0x1195453 "510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Agent: Grandstream GXV3"..., len = 32}, lr_val = { s = 0x11953fb "1567533218\r\nTo: sip:XXXXXXXXX@customers.xxxxxxxxxxx.com:5061;tag=as695cd3d4\r\nCall-ID: 510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax"..., len = 10}, r2_val = { s = 0x119543e "as695cd3d4\r\nCall-ID: 510932234-31301-205@BJC.BGI.A.DC\r\nCSeq: 2042 BYE\r\nContact: sip:xxxxxx02@192.168.0.32:31301;transport=tls\r\nMax-Forwards: 69\r\nSupported: replaces, path, timer, eventlist\r\nUser-Ag"..., len = 1617711112}, gr_val = {s = 0x0, len = 1774088704}} next_hop = {user = {s = 0x0, len = -1815362160}, passwd = {s = 0x7f4b93f32aa8 "}\346\003", len = 1532548608}, host = { s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route: sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068\r\nRecord-Route: <sips:xx.xx.xx.51;r2"..., len = 1390446080}, port = {s = 0x7f4b5338cc58 "p\314\070SK\177", len = 1296103237}, params = { s = 0x252e2674d62c920a <error: Cannot access memory at address 0x252e2674d62c920a>, len = 1713803786}, sip_params = {s = 0x7ffe00000000 <error: Cannot access memory at address 0x7ffe00000000>, len = 1532549040}, headers = {s = 0x11a9360 "\r", len = -1814121640}, port_no = 51760, proto = 37831, type = 32587, flags = URI_USER_NORMALIZE, transport = {s = 0x0, len = 1774088704}, ttl = { s = 0x0, len = -1815362184}, user_param = {s = 0x7ffe5b58d600 "", len = -1812780376}, maddr = {s = 0x7ffe5b58e250 "\003", len = 1532549120}, method = {s = 0x0, len = 5795166}, lr = { s = 0x7ffe5b58d800 "", len = 1532551760}, r2 = {s = 0x7f4b93f32aa8 "}\346\003", len = 1532551760}, gr = {s = 0x7ffe5b58d800 "", len = 4329797}, transport_val = { s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 18537344}, ttl_val = {s = 0x1f480 <error: Cannot access memory at address 0x1f480>, len = -1795123680}, user_param_val = { s = 0x11ae390 "", len = 1532548676}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 1774088704}, lr_val = {s = 0x24f9d0 <error: Cannot access memory at address 0x24f9d0>, len = -1815362200}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1812780376}, gr_val = {s = 0x7ffe5b58e250 "\003", len = 1532549120}} u = 0x7f4b93d56c50 flags = 32587 st = {flags = 0, id = 0, name = {n = -1815362160, s = {s = 0x7f4b93cbc590 "", len = -1812780376}, re = 0x7f4b93cbc590}, avp = 0x7ffe5b58d600} sct = 0x7f4b93d56c50 sjt = 0x7f4b93d56c50 mct = 0x0 rv = 0x55b007 <get_debug_level+103> rv1 = 0x7f4b93f32aa8 c1 = {cache_type = 18437115, val_type = RV_NONE, c = {avp_val = {n = 10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len = 18437182}, re = 0xa}, pval = {rs = { s = 0xa <error: Cannot access memory at address 0xa>, len = 18437182}, ri = 1532547956, flags = 32766}}, i2s = "`\323X[\376\177\000\000\bPl`K\177\000\000\n\000\000\000\000"} ---Type <return> to continue, or q <return> to quit--- s = { s = 0x7f4b606c5008 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP xx.xx.xx.53:5080;rport=5080;branch=z9hG4bK0e4ed4b6\r\nRecord-Route: sips:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1771206068\r\nRecord-Route: <sips:xx.xx.xx.51;r2"..., len = 1774088704} srevp = {0x7f4b93d5dd20, 0x7f4b93f32aa8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #12 0x00000000005407b5 in run_actions (h=0x1, a=0x7f4b52e3be10, msg=0x7f4b52e3d420) at action.c:1549 ret = 1 mod = 0x7f4b93d5dd20 __FUNCTION__ = "run_actions" #13 0x00000000005423e0 in do_action (h=0x7ffe5b58e250, a=0x7f4b93f001a0, msg=0x7f4b93f32aa8) at action.c:678 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\220\340X[\376\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\220\340X[\376\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\340X[\376\177\000\000\230JȔ\001\000\000", __u6_addr16 = {57488, 23384, 32766, 0, 19096, 38088, 1, 0}, __u6_addr32 = {1532551312, 32766, 2496154264, 1}}}, sin6_scope_id = 2481185840}}, id = 32587, proto = -88 '\250', send_flags = { f = 42 '*', blst_imask = 243 '\363'}} end = 0x8 <error: Cannot access memory at address 0x8> uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1390517168}, passwd = {s = 0x7ffe5b58d9f0 "P\342X[\376\177", len = 5615623}, host = {s = 0x0, len = 1774088704}, port = { s = 0x0, len = -1815365104}, params = {s = 0x7ffe5b58e250 "\003", len = -5}, sip_params = {s = 0x7ffe5b58da20 "", len = -1812780376}, headers = {s = 0x0, len = 5506997}, port_no = 55840, proto = 23384, type = 32766, flags = (unknown: 1532549712), transport = {s = 0x7f4b93cbba10 "\267\001", len = -1812780376}, ttl = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1798116625}, user_param = {s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, len = 0}, maddr = { s = 0x7ffe5b58da18 "\207\321T", len = 18536232}, method = {s = 0x11951b0 "\001", len = 18436272}, lr = {s = 0x0, len = 18436272}, r2 = { s = 0x100000003 <error: Cannot access memory at address 0x100000003>, len = 1532550256}, gr = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, transport_val = { s = 0x200000001 <error: Cannot access memory at address 0x200000001>, len = 1532549664}, ttl_val = {s = 0x11a9220 "\240P\031\001", len = 0}, user_param_val = {s = 0x7f4b93f35d0e "Grandstream GXV", len = 1}, maddr_val = {s = 0x1ad710 <error: Cannot access memory at address 0x1ad710>, len = -1798137055}, method_val = {s = 0x7ffe5b58da1c "", len = 0}, lr_val = {s = 0x7ffe5b58e250 "\003", len = -1812780376}, r2_val = {s = 0x7ffe5b58e250 "\003", len = 1532550480}, gr_val = {s = 0x0, len = 5558663}} next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffe5b58da20 "", len = -1257467382}, host = {s = 0x7f4b93f32aa8 "}\346\003", len = 1532551760}, port = {s = 0x7ffe5b58dd50 "\001", len = 0}, params = {s = 0x252e2674c38c920a <error: Cannot access memory at address 0x252e2674c38c920a>, len = 1713803786}, sip_params = {s = 0x0, len = 0}, headers = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, port_no = 3, proto = 0, type = TEL_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = {s = 0x0, len = 18436440}, ttl = {s = 0x1000001 <error: Cannot access memory at address 0x1000001>, len = 1532549892}, user_param = {s = 0x11950b0 "", len = 1350205334}, maddr = { s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13826376}, method = {s = 0x24f148 <error: Cannot access memory at address 0x24f148>, len = 2950840}, lr = { s = 0x2d2028 <error: Cannot access memory at address 0x2d2028>, len = 1774088704}, r2 = {s = 0x108 <error: Cannot access memory at address 0x108>, len = 1532550480}, gr = { s = 0x7ffe5b58e250 "\003", len = 4329872}, transport_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = -1812767376}, ttl_val = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 18436624}, user_param_val = {s = 0x11950b0 "", len = 8}, maddr_val = { s = 0x80 <error: Cannot access memory at address 0x80>, len = -1798145530}, method_val = {s = 0x0, len = 1774088704}, lr_val = {s = 0x0, len = -1815364344}, r2_val = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1812780376}, gr_val = {s = 0x7ffe5b58e250 "\003", len = 1532550480}} u = 0x8 flags = 0 st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1532549664}, re = 0x1}, avp = 0x252e2674b50c920a} sct = 0x8 sjt = 0x8 mct = 0x0 rv = 0x7ffe5b58dac0 ---Type <return> to continue, or q <return> to quit--- rv1 = 0x7f4b93f32aa8 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_STR, c = {avp_val = {n = 1532540992, s = {s = 0x7ffe5b58b840 "", len = 1532536896}, re = 0x7ffe5b58b840}, pval = {rs = {s = 0x7ffe5b58b840 "", len = 1532536896}, ri = 1532549316, flags = 32766}}, i2s = "\320\310\032\001\000\000\000\000\bPl`K\177\000\000\n\000\000\000\000"} s = { s = 0x43b2fc <grp_hash_lookup+1420> "1҉\307A\211\302\301\357\vA\301\352\rA\001\372A\001\302\301\350\027D\001\320A\367\361Lc\312I\301\341\004O\215\064\bI\213\036I9\336u\f\353Jf\220H\213\033I9\336t@D;k\030u\362H\213{\020L\211\342H\211\356\350c\265\375\377\205\300u\337H\203\304\020H\215C([]A\A]A^\303D\017\276\021D\211\326\301\356\003A1\362\353\210\017\037\200", len = 1532549788} srevp = {0x7f4b93cbd198, 0x7f4b93f32aa8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #14 0x00000000005407b5 in run_actions (h=0x1, a=0x7f4b52e3be10, msg=0x7f4b52e3d420) at action.c:1549 ret = 1 mod = 0x7f4b93cbd198 __FUNCTION__ = "run_actions" #15 0x0000000000542218 in do_action (h=0x7ffe5b58e250, a=0x7f4b93cbd2c8, msg=0x7f4b93f32aa8) at action.c:1049 ret = 1 v = 1 dst = {send_sock = 0x7f4b93f32aa8, to = {s = {sa_family = 3038, sa_data = "\212RK\177\000\000\310\000\000\000\376\177\000"}, sin = {sin_family = 3038, sin_port = 21130, sin_addr = {s_addr = 32587}, sin_zero = "\310\000\000\000\376\177\000"}, sin6 = {sin6_family = 3038, sin6_port = 21130, sin6_flowinfo = 32587, sin6_addr = {__in6_u = { __u6_addr8 = "\310\000\000\000\376\177\000\000@Ӗ`K\177\000", __u6_addr16 = {200, 0, 32766, 0, 54080, 24726, 32587, 0}, __u6_addr32 = {200, 32766, 1620497216, 32587}}}, sin6_scope_id = 2482198976}}, id = 32587, proto = -88 '\250', send_flags = {f = 42 '*', blst_imask = 243 '\363'}} end = 0x7f4b93cbbd08 "\001" uri = {user = {s = 0x7ffe5b58e2bc "K\177", len = 1532550724}, passwd = {s = 0x7f4b00000000 <error: Cannot access memory at address 0x7f4b00000000>, len = 1620496936}, host = { s = 0x6 <error: Cannot access memory at address 0x6>, len = 0}, port = {s = 0x7f4b52c1d090 "(Җ`K\177", len = 4930}, params = {s = 0x7ffe5b58dffc "", len = 5615623}, sip_params = { s = 0x1342 <error: Cannot access memory at address 0x1342>, len = 1774088704}, headers = {s = 0x7f4b6096d340 "\002", len = -1815580832}, port_no = 22976, proto = 37875, type = 32587, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 696), transport = {s = 0x7f4b93f32aa8 "}\346\003", len = -1813809880}, ttl = {s = 0x7f4b93f32aa8 "}\346\003", len = 1620497456}, user_param = {s = 0x0, len = -1}, maddr = {s = 0x7ffe5b58de90 "", len = -704867830}, method = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 10133176}, lr = {s = 0xa02840 <p_onsend> "", len = -1812780376}, r2 = {s = 0x252e2674c8ac920a <error: Cannot access memory at address 0x252e2674c8ac920a>, len = 1713803786}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x7f4b52b3b1f0 <tm_cfg> "\b\206\344RK\177", len = 5615623}, ttl_val = {s = 0x7ffe5b58dffc "", len = 1532550996}, user_param_val = {s = 0x7f4b52b3b1f0 <tm_cfg> "\b\206\344RK\177", len = 1}, maddr_val = {s = 0x7f4b6096d228 "\220\320\301RK\177", len = -1812780376}, method_val = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 1620497456}, lr_val = { s = 0x7f4b6096d228 "\220\320\301RK\177", len = 5615623}, r2_val = {s = 0x8b8 <error: Cannot access memory at address 0x8b8>, len = 1384533946}, gr_val = {s = 0x0, len = 1384755581}} next_hop = {user = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 1532551168}, passwd = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -1812780376}, host = { s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 1620497456}, port = {s = 0x7f4b6096d228 "\220\320\301RK\177", len = 1384797578}, params = { s = 0x7ffe00000000 <error: Cannot access memory at address 0x7ffe00000000>, len = 10498080}, sip_params = {s = 0xa03028 <def_list+8> "", len = 10498096}, headers = {s = 0xa03038 <def_list+24> "", len = 10498120}, port_no = 10568, proto = 160, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 4176515656), transport = { s = 0x3b078d3919c985fc <error: Cannot access memory at address 0x3b078d3919c985fc>, len = 1937935116}, ttl = {s = 0x7f4b00000000 <error: Cannot access memory at address 0x7f4b00000000>, len = 1561592008}, user_param = {s = 0x0, len = -1824518765}, maddr = { s = 0x7f4b5d142bb8 "ʉ\317\v\230\211\221\271\024\024\357\253\246;\366\004\346\062\322\033\227\177\263\274\360\225Oq\307\v&o\340~g\315x\367\366tl\343\031\337\312\330\357ےS\r\242\005,\276\036\365\271\361o2\262", <incomplete sequence \327>, len = 32}, method = {s = 0x7f4b5d142d6c "z\035\236\bΒ\b\025\317R\360\245-\244R\343\307A>1\240\002", len = -1823902561}, lr = { s = 0x7f4b5d55eda8 "\261=i\\235&>\352\246W(\336:N~\025", len = 1532551316}, r2 = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1350205334}, gr = { s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13828752}, transport_val = {s = 0x24e800 <error: Cannot access memory at address 0x24e800>, len = 2948464}, ttl_val = { s = 0x2d2028 <error: Cannot access memory at address 0x2d2028>, len = 8}, user_param_val = {s = 0x112 <error: Cannot access memory at address 0x112>, len = 1774088704}, maddr_val = { s = 0x2cfd70 <error: Cannot access memory at address 0x2cfd70>, len = 6245668}, method_val = {s = 0x7f4b93e37528 "]\005", len = 6999923}, lr_val = {s = 0x715640 <__FUNCTION__.7459> "parse_via", len = 1620496936}, r2_val = {s = 0x252e2674ca8c920a <error: Cannot access memory at address 0x252e2674ca8c920a>, len = 1532551460}, gr_val = {s = 0x0, len = 18436881}} u = 0x7f4b93cbbd08 ---Type <return> to continue, or q <return> to quit--- flags = 32587 st = {flags = 200, id = 0, name = {n = 1532551168, s = {s = 0x7ffe5b58e000 "", len = 4}, re = 0x7ffe5b58e000}, avp = 0x7f4b93f32aa8} sct = 0x7f4b93cbbd08 sjt = 0x7f4b93cbbd08 mct = 0x0 rv = 0x1 rv1 = 0x7f4b93f32aa8 c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val = {n = 1620497128, s = {s = 0x7f4b6096d2e8 <incomplete sequence \310>, len = 10485504}, re = 0x7f4b6096d2e8}, pval = {rs = { s = 0x7f4b6096d2e8 <incomplete sequence \310>, len = 10485504}, ri = 4, flags = 1}}, i2s = "\000\340X[\376\177\000\000\000\000\000\000\376\177\000\000\000\000\000\000K\177"} s = {s = 0xa49900 <_pkg_root> "\313\030p", len = 4} srevp = {0x7f4b93cbd2c8, 0x7f4b93f32aa8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 5}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #16 0x00000000005407b5 in run_actions (h=0x1, h@entry=0x7ffe5b58e250, a=0x7f4b52e3be10, a@entry=0x7f4b93cb2dc8, msg=0x7f4b52e3d420, #msg@entry=0x7f4b93f32aa8) at action.c:1549 ret = 1 mod = 0x7f4b93cbd2c8 __FUNCTION__ = "run_actions" #17 0x000000000054d225 in run_top_route (a=0x7f4b93cb2dc8, msg=0x7f4b93f32aa8, c=<optimized out>) at action.c:1635 ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140730430972496, -2678919650641931766, 139962578841032, 139962581461672, 0, 0, 2679121110996128266, -2678920028792385014}, __mask_was_saved = 0, __saved_mask = {__val = {18436881, 762, 139962581461672, 18436813, 18436768, 762, 139962581461672, 18436813, 18436768, 762, 13540419104367604224, 0, 139962581313368, 1073741825, 139961484381464, 139962581298232}}}}} p = <optimized out> ret = <optimized out> sfbk = 0 #18 0x000000000055501e in receive_msg (buf=0x0, len=2482186920, rcv_info=0x7f4b56f76b60) at receive.c:240 msg = 0x7f4b93f32aa8 ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140730430972864, -2678919650641931766, 139962580407896, 139962581461672, 0, 0, 2679121110996128266, -2678920028792385014}, __mask_was_saved = 0, __saved_mask = {__val = {140730430973152, 16, 13540419104367604224, 7328512, 139961558330936, 140730430973408, 140730430973416, 139961558330184, 4294967295, 139961558330936, 6026966, 139961503056656, 140730430973124, 38, 762, 140730430973408}}}}} inb = { s = 0x11952a0 "BYE sip:XXXXXXXXX@xx.xx.xx.56:5080 SIP/2.0\r\nVia: SIP/2.0/TLS 192.168.0.32:31301;branch=z9hG4bK1829228487;rport\r\nRoute: <sip:xx.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=1567533218;did=da8.12b2;nat=y"..., len = 762} netinfo = {data = {s = 0x0, len = 2}, dst = 0x7f4b56f76b48, rcv = 0x49cdf4 <tcp_send+228>} __FUNCTION__ = "receive_msg" #19 0x00000000005c164d in tcp_read_req (con=0x7f4b56f76b48, bytes_read=0x7ffe5b58e5e0, read_flags=0x7ffe5b58e5e8) at tcp_read.c:1428 bytes = 15013 total_bytes = 762 resp = 15013 size = 139961489937440 req = 0x7ffe5b58e5e8 dst = {send_sock = 0x7f4b93c87440, to = {s = {sa_family = 2, sa_data = "\237\244S=\n\353\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 42143, sin_addr = {s_addr = 3943316819}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 42143, sin6_flowinfo = 3943316819, sin6_addr = {__in6_u = { __u6_addr8 = "\000\000\000\000\000\000\000\000\000>\227SK\177\000", __u6_addr16 = {0, 0, 0, 0, 15872, 21399, 32587, 0}, __u6_addr32 = {0, 0, 1402420736, 32587}}}, sin6_scope_id = 8193}}, id = -1812859568, proto = 75 'K', send_flags = {f = 127 '\177', blst_imask = 0 '\000'}} ---Type <return> to continue, or q <return> to quit--- c = 116 't' ret = 15013 __FUNCTION__ = "tcp_read_req" #20 0x00000000005c65a9 in handle_io (fm=0x0, events=-16880, idx=-1) at tcp_read.c:1679 ret = 762 n = 4 read_flags = 1 con = 0x7f4b56f76b48 s = 11 t = 15013 __FUNCTION__ = "handle_io" #21 0x00000000005ccc4e in io_wait_loop_epoll (h=<optimized out>, t=<optimized out>, repeat=<optimized out>) at io_wait.h:1065 revents = 1390657040 n = 1 fm = 0x1 #22 tcp_receive_loop (unix_sock=1) at tcp_read.c:1791 __FUNCTION__ = "tcp_receive_loop" #23 0x00000000004bd0e7 in tcp_init_children () at tcp_main.c:4796 reader_fd_1 = 38 pid = 15013 si_desc = "tcp receiver (generic)\000\000\b\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\350\034O", '\000' <repeats 14 times>, "r\276io;\351\273\b\000\000\000\000\000\000\000\000AʓK\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\350\034O\000\000\000\000" __FUNCTION__ = "tcp_init_children" #24 0x00000000004f01a0 in main_loop () at main.c:1704 si_desc = "udp receiver child=7 sock=xx.xx.xx.51:5060\000\000\000\000\000 8\350\223K\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000]o_", '\000' <repeats 14 times>, "r\276io;黰\004\243\223K\177\000\000\000r\276io;\351\273\b\022\245\000\000\000\000\000\004\000\000\000\000\000\000" woneinit = 1 __FUNCTION__ = "main_loop" #25 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631 cfg_stream = 0x0 r = 15013 tmp = 0x7ffe5b58eee4 "" tmp_len = 0 port = 0 proto = -1788607024 ret = 0 seed = 2215009822 debug_save = 0 debug_flag = 8 dont_fork_cnt = 0 st = {st_dev = 15, st_ino = 10167, st_nlink = 2, st_mode = 16832, st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1492601340, tv_nsec = 987819248}, st_mtim = {tv_sec = 1492629152, tv_nsec = 187196612}, st_ctim = {tv_sec = 1492629152, tv_nsec = 187196612}, __glibc_reserved = {0, 0, 0}} __FUNCTION__ = "main" (gdb) info locals No locals. (gdb) list 69 in ../../mem/../atomic/atomic_common.h (gdb) ```
Thanks for trying all these options and reporting back. I will analyze all the backtraces and see if I can spot something.
Does it happen to have the SIP traffic stored for the call that caused the crash?
I think the problem happens when I have a lot of records in htable. I have reduced the number of data stored and reduce the expire. At the moment it doesn't crash ... I'll tell you if occurs again
Thanks
I pushed some patches that tries to catch the situation when the event route execution takes very long and dialog is gone -- it is also in branch 4.4. Maybe you can try with it and report the results.
Anyhow, in general, if you have a cfg operation like this, which is going to take long and it is not related to sip routing, it is recommended to delegate the operation to rtimer process using mqueue.
Thanks a lot miconda. Since I reduced the number of values stored on htable all works fine.
If I have another crash I'll report it
Closed #1069.