<!--
Kamailio Project uses GitHub Issues only for bugs in the code or feature requests.
If you have questions about using Kamailio or related to its configuration file,
ask on sr-users mailing list:
*
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
If you have questions about developing extensions to Kamailio or its existing
C code, ask on sr-dev mailing list
*
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
Please try to fill this template as much as possible for any issue. It helps the
developers to troubleshoot the issue.
If you submit a feature request (or enhancement), you can delete the text of
the template and only add the description of what you would like to be added.
If there is no content to be filled in a section, the entire section can be removed.
You can delete the comments from the template sections when filling.
You can delete next line and everything above before submitting (it is a comment).
-->
### Description
<!--
Explain what you did, what you expected to happen, and what actually happened.
-->
Kamailio dies every few hours, apparently trying to delete a finished dialog. After crash
it always shows the message: 'dlg_clean_run(): dialog in delete state is too old'
### Troubleshooting
#### Reproduction
<!--
If the issue can be reproduced, describe how it can be done.
-->
#### Debugging Data
<!--
If you got a core dump, use gdb to extract troubleshooting data - full backtrace,
local variables and the list of the code at the issue location.
gdb /path/to/kamailio /path/to/corefile
bt full
info locals
list
If you are familiar with gdb, feel free to attach more of what you consider to
be relevant.
-->
```
# gdb /usr/sbin/kamailio /tmp/core.22773
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later
<http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from
/usr/lib/debug/.build-id/a2/2b21a61e95b0b11a767bd32090a1083560a3dd.debug...done.
done.
[New LWP 22773]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid
-f /etc/kamailio/kamailio.'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74
74 ../../mem/../atomic/atomic_common.h: No such file or directory.
(gdb) bt full
#0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74
No locals.
#1 dlg_unref_helper (dlg=0x7fde1fec6ff0, cnt=1, fname=0x58f5 <error: Cannot
#access memory at address 0x58f5>, fline=1637) at dlg_hash.c:925
mypid = 22773
d_entry = 0x7fe819d53bf0
__FUNCTION__ = "dlg_unref_helper"
#2 0x00007fde0ba72e12 in dlg_run_event_route (dlg=0x7fde1fec6ff0,
msg=0x7fde325bfa10, ostate=290317344, nstate=1) at dlg_handlers.c:1637
rt = 10129124
bkroute = 1
__FUNCTION__ = "dlg_run_event_route"
#3 0x00007fde0ba761cf in dlg_onroute (req=0x7fde325bfa10,
route_params=0x7fde114dce10, param=0x7fde114de420) at dlg_handlers.c:1314
val = {
s = 0x9aacfa <buf+186> "001.dc;nat=yes>\r\nMax-Forwards:
69\r\nFrom: <sip:677xxxxxx@customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY"..., len = 6}
ftag = {
s = 0x9aad51 <buf+273> "as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-Hangu"..., len = 10}
old_state = 4
dir = 2
ret = 22773
callid = {
s = 0x9aada9 <buf+361>
"141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n",
len = 55}
new_state = 5
unref = 1
event = 7
dlg = 0x7fde1fec6ff0
ttag = {
s = 0x9aad96 <buf+342> "58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Leng"..., len = 8}
h_id = 198013376
dlg = 0x58f5
#4 0x00007fde0e34f28d in run_rr_callbacks (req=0x7fde325bfa10,
rr_param=0x7ffe9c8fa6e0) at rr_cb.c:96
l_param = {
s = 0x9aace5 <buf+165>
"lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
<sip:677xxxxxx@customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
1413"..., len = 35}
cbp = 0x7fde325b27d0
__FUNCTION__ = "run_rr_callbacks"
#5 0x00007fde0e3418a2 in after_loose (_m=0x7fde325bfa10, preloaded=2) at
loose.c:928
puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host
= {
s = 0x9aacd8 <buf+152>
"185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards:
69\r\nFrom: <sip:677xxxxxx@customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com>;tag=58b18f69\r\n"..., len =
12}, port = {s = 0x0, len = 0}, params = {
s = 0x9aace5 <buf+165>
"lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
<sip:677xxxxxx@customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
1413"..., len = 35}, sip_params = {
s = 0x9aace5 <buf+165>
"lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
<sip:677xxxxxx@customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
1413"..., len = 35}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0,
type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl
= {s = 0x0, len = 0},
user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0},
method = {s = 0x0, len = 0}, lr = {
s = 0x9aace5 <buf+165>
"lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
<sip:677xxxxxx@customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
1413"..., len = 2}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0},
transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0},
user_param_val = {s = 0x0, len = 0},
---Type <return> to continue, or q <return> to quit---
maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0},
lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0,
len = 0}}
rt = 0x0
status = 22773
uri = {
s = 0x9aacd4 <buf+148>
"sip:185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards:
69\r\nFrom: <sip:677xxxxxx@customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com>;tag=58b18f"..., len = 52}
use_ob = 0
rparams = {
s = 0x9aace5 <buf+165>
"lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
<sip:677xxxxxx@customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
1413"..., len = 35}
__FUNCTION__ = "after_loose"
#6 0x0000000000454b60 in do_action (h=0x7ffe9c8fae00, a=0x7fde323f7d98,
msg=0x7fde325bfa10) at action.c:1060
ret = -5
v = 25
dst = {send_sock = 0x7ffe9c8fa950, to = {s = {sa_family = 9055,
sa_data = "B\000\000\000\000\000\060\033\\2\336\177\000"}, sin =
{sin_family = 9055, sin_port = 66, sin_addr = {s_addr = 0},
sin_zero = "0\033\\2\336\177\000"}, sin6 = {sin6_family =
9055, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8
= "0\033\\2\336\177\000\000[TB\000\000\000\000",
__u6_addr16 = {6960, 12892, 32734, 0, 21595, 66, 0, 0},
__u6_addr32 = {844897072, 32734, 4346971, 0}}}, sin6_scope_id = 13909984}},
id = 0, proto = 10 '\n', send_flags = {f = 0 '\000',
blst_imask = 0 '\000'}}
end = 0x7ffe9c8fae00 "\001"
uri = {user = {s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 13911000}, passwd = {s = 0x23a790 <error: Cannot
access memory at address 0x23a790>, len = -1668306428}, host = {
s = 0x2bd8c8 <error: Cannot access memory at address 0x2bd8c8>,
len = 535588848}, port = {s = 0xa <error: Cannot access memory at address
0xa>, len = 0}, params = {
s = 0x1 <error: Cannot access memory at address 0x1>, len =
290108944}, sip_params = {s = 0x7ffe9c8fab30 "Q\255\232", len = 5781511},
headers = {s = 0x0, len = 798682880}, port_no = 0, proto = 0,
type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown:
195350440), transport = {s = 0x7ffe9c8fab20 "\251\255\232", len =
-1668306148}, ttl = {
s = 0x7fde00000000 <error: Cannot access memory at address
0x7fde00000000>, len = 290108944}, user_param = {
s = 0x9aada9 <buf+361>
"141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n",
len = 55}, maddr = {s = 0x10001000000 <error: Cannot access memory at
address 0x10001000000>, len = 8}, method = {s = 0x23a4d0 <error: Cannot
access memory at address 0x23a4d0>,
len = -1668306144}, lr = {s = 0x49 <error: Cannot access memory
at address 0x49>, len = 10137053}, r2 = {s = 0x1893d2 <error: Cannot access
memory at address 0x1893d2>, len = 87}, gr = {
s = 0x1eb8c6 <error: Cannot access memory at address 0x1eb8c6>,
len = -1668306204}, transport_val = {s = 0x0, len = 535588848}, ttl_val = {s
= 0x7fde114ab610 "", len = 22773}, user_param_val = {
s = 0x3ac <error: Cannot access memory at address 0x3ac>, len =
1}, maddr_val = {s = 0x7fde114ab624 "", len = 5781511}, method_val = {
s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route:
<sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589>\r\nRecord-Route:
<sips:185.xx.xx.51;r2="..., len = 798682880}, lr_val = {s = 0x7fde12ec1678 "
,x\021\336\177", len = 195403485}, r2_val = {s = 0x0, len = 798682880},
gr_val = {s = 0x0, len = 195754177}}
next_hop = {user = {
s = 0x9aada9 <buf+361>
"141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n",
len = 55}, passwd = {
s = 0x9aad51 <buf+273> "as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-Hangu"..., len = 10}, host = {
s = 0x9aad96 <buf+342> "58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Leng"..., len =
535588848}, port = {s = 0x0, len = 798682880}, params = {s = 0x0, len =
842977936}, sip_params = {s = 0x7fde325bfa10 "yb\004", len = -1668305776},
headers = {
s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route:
<sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589>\r\nRecord-Route:
<sips:185.xx.xx.51;r2="..., len = 290100736}, port_no = 5752, proto = 4844,
type = 32734, flags = (URI_USER_NORMALIZE | unknown: 195759988), transport =
{s = 0x0, len = 0}, ttl = {s = 0x0, len = 0},
user_param = {s = 0x0, len = 0}, maddr = {s = 0x7fde32315910 "1",
len = 1}, method = {s = 0x0, len = 798682880}, lr = {s = 0x6632430c90
<error: Cannot access memory at address 0x6632430c90>,
len = 842977912}, r2 = {s = 0x7ffe9c8fac90 "", len = 844888592},
gr = {s = 0x7ffe9c8fc0d0 "\003", len = -1668305308}, transport_val = {s =
0x0, len = 5736030}, ttl_val = {s = 0x7ffe9c8fae64 "\001",
len = -1668300592}, user_param_val = {s = 0x7fde325bfa10
"yb\004", len = -1668300592}, maddr_val = {s = 0x7ffe9c8fae64 "\001",
len =
4337637}, method_val = {
s = 0xa00000000 <error: Cannot access memory at address
0xa00000000>, len = 535588848}, lr_val = {s = 0xa <error: Cannot access
memory at address 0xa>, len = 0}, r2_val = {
s = 0x1 <error: Cannot access memory at address 0x1>, len =
290108944}, gr_val = {s = 0x0, len = 0}}
u = 0x7ffe9c8fae00
flags = 0
st = {flags = 10137001, id = 0, name = {n = 55, s = {s = 0x37
<error: Cannot access memory at address 0x37>, len = 10136913}, re =
0x37}, avp = 0xa}
sct = 0x7ffe9c8fae00
---Type <return> to continue, or q <return> to quit---
sjt = 0x7ffe9c8fae00
mct = 0x0
rv = 0x7fde325bfa10
rv1 = 0x7fde325bfa10
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val
= {n = 0, s = {s = 0x0, len = -1668305944}, re = 0x0}, pval = {rs =
{s = 0x0, len = -1668305944}, ri = -1668305976, flags = 32766}},
i2s =
"諏\234\376\177\000\000\324\251\217\234\376\177\000\000\310\330+\000\000"}
s = {s = 0x7ffe9c8fc0d0 "\003", len = -1668305152}
srevp = {0x7fde323f7d98, 0x7fde325bfa10}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
{type = NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140592304344264,
string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s =
0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr =
0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type
= NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#7 0x0000000000453625 in run_actions (h=0x1, h@entry=0x7ffe9c8fae00,
a=0x7fde114dce10, msg=0x7fde114de420) at action.c:1549
ret = -1668300592
mod = 0x7fde323f7d98
__FUNCTION__ = "run_actions"
#8 0x000000000045fff7 in run_actions_safe (h=0x7ffe9c8fc0d0, a=<optimized
out>, msg=<optimized out>) at action.c:1614
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env =
{{__jmpbuf = {140731525082624, 1693443033458036444, 140592304355856,
140731525087440, 140731525083440, 0, 1693443034133319388,
-1694082562576986404}, __mask_was_saved = 0, __saved_mask =
-{__val = {1893732767588085504, 4294967566, 140592302729920,
-140592301545600, 140591459467265, 0, 1893732767588085504,
-0,
140592303006032, 140731525082928, 140592304355856,
140731525087440, 140731525083440, 0, 5736030, 140731525083440}}}}}
ret = <optimized out>
ign_on_break = 0
#9 0x0000000000423030 in rval_get_int (h=0x7ffe9c8fc0d0, msg=0x1,
i=0x7ffe9c8fb130, rv=0x3d4, cache=0x67) at rvalue.c:912
r_avp = 0x58f5
avp_val = {n = 267, s = {s = 0x10b <error: Cannot access memory at
address 0x10b>, len = 844356336}, re = 0x10b}
pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}
tmp = {s = 0xa489c0 <_pkg_root> "\v\017p", len = 842586088}
s = 0x7fde325bfa10
r = 22773
ret = 22773
destroy_pval = -1668300592
__FUNCTION__ = "rval_get_int"
#10 0x0000000000428dbc in rval_expr_eval_int (h=0x7ffe9c8fc0d0,
msg=0x7fde325bfa10, res=0x7ffe9c8fb130, rve=0x7fde323f7230) at rvalue.c:1910
i1 = 0
i2 = 0
ret = -1
c1 = {cache_type = 2626666704, val_type = 32766, c = {avp_val = {n =
0, s = {s = 0x300000000 <error: Cannot access memory at address
0x300000000>, len = 843191600}, re = 0x300000000}, pval = {rs = {
s = 0x300000000 <error: Cannot access memory at address
0x300000000>, len = 843191600}, ri = 844888592, flags = 32734}},
i2s =
"\000\000\000\000\004\000\000\000gV\023\f\336\177\000\000;\232\061\062\336\177"}
c2 = {cache_type = 842345632, val_type = 32734, c = {avp_val = {n =
5740203, s = {s = 0x5796ab <pv_printf+267>
"\205\300u\210\366D$\024\001t\027H\213\065\223\366B", len = 10136872},
re = 0x5796ab <pv_printf+267>}, pval = {rs = {s = 0x5796ab
<pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\223\366B", len
=
10136872}, ri = 9, flags = 0}},
i2s =
"\360\332S2\336\177\000\000\000\357\232/\353\343G\032\001\000\000\000\000"}
rv1 = 0x7fde325bfa10
rv2 = 0x0
__FUNCTION__ = "rval_expr_eval_int"
---Type <return> to continue, or q <return> to quit---
#11 0x0000000000455037 in do_action (h=0x7ffe9c8fc0d0, a=0x7fde323fe300,
#msg=0x7fde325bfa10) at action.c:1030
ret = -5
v = 0
dst = {send_sock = 0x0, to = {s = {sa_family = 61184, sa_data =
"\232/\353\343G\032\020\372[2\336\177\000"}, sin = {sin_family =
61184, sin_port = 12186, sin_addr = {s_addr = 440919019},
sin_zero = "\020\372[2\336\177\000"}, sin6 = {sin6_family =
61184, sin6_port = 12186, sin6_flowinfo = 440919019, sin6_addr = {__in6_u =
{
__u6_addr8 =
"\020\372[2\336\177\000\000\301\370\252\v\336\177\000", __u6_addr16 =
{64016, 12891, 32734, 0, 63681, 2986, 32734, 0}, __u6_addr32 = {844888592,
32734, 195754177, 32734}}},
sin6_scope_id = 10137001}}, id = 0, proto = 55 '7', send_flags
= {f = 0 '\000', blst_imask = 0 '\000'}}
end = 0x7fde323f7230 "\001"
uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>,
len = 290108944}, passwd = {s = 0x7ffe9c8fb320 "Q\255\232", len = 5781511},
host = {s = 0x0, len = 798682880}, port = {s = 0x0,
len = 195350441}, params = {s = 0x7ffe9c8fb310 "\251\255\232",
len = -1668304116}, sip_params = {s = 0x7ffe00000000 <error: Cannot access
memory at address 0x7ffe00000000>, len = 290108944},
headers = {
s = 0x9aada9 <buf+361>
"141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n",
len = 55}, port_no = 45904, proto = 40079, type = 256, flags = (unknown: 8),
transport = {s = 0x7fde3246f350 "\224\004", len = -1668304112}, ttl = {
s = 0x49 <error: Cannot access memory at address 0x49>, len =
10137053}, user_param = {s = 0x1893d2 <error: Cannot access memory at
address 0x1893d2>, len = 87}, maddr = {
s = 0x1eb8c6 <error: Cannot access memory at address 0x1eb8c6>,
len = -1668304172}, method = {s = 0x7fde3248b930 "\001", len = 535588848},
lr = {s = 0x7fde114ab610 "", len = 22773}, r2 = {
s = 0x3ac <error: Cannot access memory at address 0x3ac>, len =
1}, gr = {s = 0x7fde114ab624 "", len = 5781511}, transport_val = {
s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route:
<sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589>\r\nRecord-Route:
<sips:185.xx.xx.51;r2="..., len = 798682880}, ttl_val = {s = 0x7fde13decf68
"\210\317\336\023\336\177", len = 195403485}, user_param_val = {s =
0x7ffe9c8fc0d0 "\003", len = 798682880}, maddr_val = {
s = 0x18faa <error: Cannot access memory at address 0x18faa>,
len = 195754177}, method_val = {
s = 0x9aada9 <buf+361>
"141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n",
len = 55}, lr_val = {
s = 0x9aad51 <buf+273> "as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-Hangu"..., len = 10}, r2_val = {
s = 0x9aad96 <buf+342> "58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Leng"..., len =
535588848}, gr_val = {s = 0x0, len = 798682880}}
next_hop = {user = {s = 0x0, len = 842388880}, passwd = {s =
0x7fde325bfa10 "yb\004", len = -1668303744}, host = {
s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route:
<sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589>\r\nRecord-Route:
<sips:185.xx.xx.51;r2="..., len = 290100736}, port = {s = 0x7fde13decf68
"\210\317\336\023\336\177", len = 195759989}, params = {
s = 0x178051779d804edc <error: Cannot access memory at address
0x178051779d804edc>, len = -1922412836}, sip_params = {s = 0x0, len = 36},
headers = {
s = 0x9aad9e <buf+350> "\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r"...,
len = 843626808}, port_no = 14536, proto = 12849, type = 32734, flags =
URI_USER_NORMALIZE, transport = {s = 0x0, len = 798682880}, ttl = {s = 0x0,
len = 842388856}, user_param = {s = 0x7ffe9c8fb480 "", len =
844888592}, maddr = {s = 0x7ffe9c8fc0d0 "\003", len = -1668303232}, method =
{s = 0x0, len = 5736030}, lr = {s = 0x7ffe9c8fb680 "",
len = -1668300592}, r2 = {s = 0x7fde325bfa10 "yb\004", len =
-1668300592}, gr = {s = 0x7ffe9c8fb680 "", len = 4337637}, transport_val =
{s = 0x0, len = 340527640}, ttl_val = {s = 0x7fde32353ff0 "",
len = 798682880}, user_param_val = {s = 0x7ffe9c8fb5c0
"\310\003", len = 843727864}, maddr_val = {s = 0x0, len = 0}, method_val =
{s = 0x0, len = 798682880}, lr_val = {s = 0x0, len = 842388840},
r2_val = {s = 0xffffffff <error: Cannot access memory at address
0xffffffff>, len = 844888592}, gr_val = {s = 0x7ffe9c8fc0d0 "\003", len =
-1668303232}}
u = 0x7fde323f7230
flags = 32734
st = {flags = 0, id = 0, name = {n = 842388880, s = {s =
0x7fde3235d590 "", len = 844888592}, re = 0x7fde3235d590}, avp =
0x7ffe9c8fb480}
sct = 0x7fde323f7230
sjt = 0x7fde323f7230
mct = 0x0
rv = 0x583807 <get_debug_level+103>
rv1 = 0x7fde325bfa10
c1 = {cache_type = 10136913, val_type = RV_NONE, c = {avp_val = {n =
10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len =
10136982}, re = 0xa}, pval = {rs = {
s = 0xa <error: Cannot access memory at address 0xa>, len =
10136982}, ri = -1668304396, flags = 32766}}, i2s =
"\000\000\000\000\000\000\000\000\360o\354\037\336\177\000\000\n\000\000\000\000"}
s = {
s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route:
<sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589>\r\nRecord-Route:
<sips:185.xx.xx.51;r2="..., len = 798682880}
srevp = {0x7fde323fe300, 0x7fde325bfa10}
---Type <return> to continue, or q <return> to quit---
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140592304344264,
string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s =
0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr =
0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type
= NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#12 0x0000000000453625 in run_actions (h=0x1, a=0x7fde114dce10,
msg=0x7fde114de420) at action.c:1549
ret = 1
mod = 0x7fde323fe300
__FUNCTION__ = "run_actions"
#13 0x0000000000455250 in do_action (h=0x7ffe9c8fc0d0, a=0x7fde325a0768,
msg=0x7fde325bfa10) at action.c:678
ret = -5
v = 0
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
"\000\000\000\000\000\000\240\344=\037\336\177\000"}, sin =
{sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "\240\344=\037\336\177\000"}, sin6 = {sin6_family =
0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"\240\344=\037\336\177\000\000\230Z23\336\177\000",
__u6_addr16 = {58528, 7997, 32734, 0, 23192, 13106, 32734,
0}, __u6_addr32 = {524149920, 32734, 858938008, 32734}}}, sin6_scope_id =
720}}, id = 0, proto = -96 '\240', send_flags = {
f = 134 '\206', blst_imask = 143 '\217'}}
end = 0x8 <error: Cannot access memory at address 0x8>
uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>,
len = 290108944}, passwd = {s = 0x7ffe9c8fb870
"\320\300\217\234\376\177", len = 5781511}, host = {
s = 0x100000002 <error: Cannot access memory at address
0x100000002>, len = 798682880}, port = {s = 0x0, len = 842385936}, params =
{s = 0x7ffe9c8fc0d0 "\003", len = -5}, sip_params = {
s = 0x7ffe9c8fb8a0 "", len = 844888592}, headers = {s = 0x0, len
= 4535845}, port_no = 47264, proto = 40079, type = 32766, flags = (unknown:
2626664656), transport = {s = 0x7fde3235ca10 "\267\001",
len = 844888592}, ttl = {s = 0x100000000 <error: Cannot access
memory at address 0x100000000>, len = 859634415}, user_param = {
s = 0x770000006e <error: Cannot access memory at address
0x770000006e>, len = 0}, maddr = {s = 0x7ffe9c8fb898 "\367\377E", len =
14512472}, method = {s = 0xdd2d20 "", len = 14494752}, lr = {
s = 0x0, len = 14494752}, r2 = {s = 0x100000003 <error: Cannot
access memory at address 0x100000003>, len = -1668302096}, gr = {s = 0x3
<error: Cannot access memory at address 0x3>, len = 0},
transport_val = {s = 0x200000001 <error: Cannot access memory at
address 0x200000001>, len = -1668302688}, ttl_val = {s = 0xdd7380 "O\206",
<incomplete sequence \335>, len = 0}, user_param_val = {
s = 0x7fde325c1e7e "ast.zs PBX", len = 1}, maddr_val = {s =
0xdd7140 <incomplete sequence \335>, len = 859613985}, method_val = {s =
0x7ffe9c8fb89c "", len = 0}, lr_val = {
s = 0x7ffe9c8fc0d0 "\003", len = 844888592}, r2_val = {s =
0x7ffe9c8fc0d0 "\003", len = -1668301872}, gr_val = {s = 0x0, len =
4587511}}
next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffe9c8fb8a0
"", len = 2023771868}, host = {s = 0x7fde325bfa10 "yb\004", len =
-1668300592}, port = {s = 0x7ffe9c8fbbd0 "\001", len = 0},
params = {s = 0x1780517796204edc <error: Cannot access memory at
address 0x1780517796204edc>, len = -1922412836}, sip_params = {s = 0x0, len
= 0}, headers = {
s = 0x400000000 <error: Cannot access memory at address
0x400000000>, len = 0}, port_no = 3, proto = 0, type = TEL_URI_T, flags =
(URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = {s = 0x0,
len = 14494920}, ttl = {s = 0x1000001 <error: Cannot access
memory at address 0x1000001>, len = -1668302460}, user_param = {s = 0xdd2c20
"@\206", <incomplete sequence \335>, len = 249889158},
maddr = {s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 13911176}, method = {s = 0x23a6e0 <error: Cannot access
memory at address 0x23a6e0>, len = 2866040}, lr = {
s = 0x2bd8c8 <error: Cannot access memory at address 0x2bd8c8>,
len = 798682880}, r2 = {s = 0x10f <error: Cannot access memory at address
0x10f>, len = -1668301872}, gr = {
s = 0x7ffe9c8fc0d0 "\003", len = 4337712}, transport_val = {s =
0x8 <error: Cannot access memory at address 0x8>, len = 844898032}, ttl_val
= {
s = 0x100000000 <error: Cannot access memory at address
0x100000000>, len = 14495104}, user_param_val = {s = 0xdd2c20 "@\206",
<incomplete sequence \335>, len = 8}, maddr_val = {
s = 0x80 <error: Cannot access memory at address 0x80>, len =
859605510}, method_val = {s = 0x0, len = 798682880}, lr_val = {s = 0x0, len
= 842386696}, r2_val = {
s = 0xffffffff <error: Cannot access memory at address
0xffffffff>, len = 844888592}, gr_val = {s = 0x7ffe9c8fc0d0 "\003", len =
-1668301872}}
u = 0x8
flags = 0
st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x1 <error: Cannot
access memory at address 0x1>, len = -1668302688}, re = 0x1}, avp =
0x1780517778a04edc}
sct = 0x8
sjt = 0x8
mct = 0x0
rv = 0x7ffe9c8fb940
rv1 = 0x7fde325bfa10
c1 = {cache_type = 2626651800, val_type = 32766, c = {avp_val = {n =
-1668311360, s = {s = 0x7ffe9c8f96c0 "\356\215L2\336\177", len =
--1668315456}, re = 0x7ffe9c8f96c0}, pval = {rs = {
s = 0x7ffe9c8f96c0 "\356\215L2\336\177", len = -1668315456},
ri = -1668303036, flags = 32766}}, i2s =
"`.\335\000\000\000\000\000\360o\354\037\336\177\000\000\n\000\000\000\000"}
---Type <return> to continue, or q <return> to quit---
s = {s = 0x43b2fc <tsend_stream+2204>
"\351\243\375\377\377\350j\324\005", len = -1668302564}
srevp = {0x7fde3235e198, 0x7fde325bfa10}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140592304344264,
string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s =
0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr =
0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type
= NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#14 0x0000000000453625 in run_actions (h=0x1, a=0x7fde114dce10,
msg=0x7fde114de420) at action.c:1549
ret = 1
mod = 0x7fde3235e198
__FUNCTION__ = "run_actions"
#15 0x0000000000455088 in do_action (h=0x7ffe9c8fc0d0, a=0x7fde3235e2c8,
msg=0x7fde325bfa10) at action.c:1049
ret = 1
v = 1
dst = {send_sock = 0x7fde325bfa10, to = {s = {sa_family = 19294,
sa_data = "\364\020\336\177\000\000\310\000\000\000\376\177\000"},
sin = {sin_family = 19294, sin_port = 4340, sin_addr = {
s_addr = 32734}, sin_zero = "\310\000\000\000\376\177\000"},
sin6 = {sin6_family = 19294, sin6_port = 4340, sin6_flowinfo = 32734,
sin6_addr = {__in6_u = {
__u6_addr8 = "\310\000\000\000\376\177\000\000\370\026\032
\336\177\000", __u6_addr16 = {200, 0, 32766, 0, 5880, 8218, 32734, 0},
__u6_addr32 = {200, 32766, 538580728, 32734}}},
sin6_scope_id = 844897072}}, id = 32734, proto = 16 '\020',
send_flags = {f = 250 '\372', blst_imask = 91 '['}}
end = 0x7fde3235cd08 "\001"
uri = {user = {s = 0x7ffe9c8fbe7c "", len = -1668301628}, passwd =
{s = 0x7fde202251d0 "\306_\004", len = 538580448}, host = {s = 0x9 <error:
Cannot access memory at address 0x9>, len = 0}, port = {
s = 0x7fde11446610 "\340\025\032 \336\177", len = 55150}, params
= {s = 0x7ffe9c8fbe7c "", len = 5781511}, sip_params = {s = 0xd76e <error:
Cannot access memory at address 0xd76e>,
len = 798682880}, headers = {s = 0x7fde201a16f8 "\002", len =
842171456}, port_no = 6960, proto = 12892, type = 32734, flags = (unknown:
696), transport = {s = 0x7fde325bfa10 "yb\004",
len = 843938568}, ttl = {s = 0x7fde325bfa10 "yb\004", len =
538580968}, user_param = {s = 0x0, len = -1}, maddr = {s = 0x7ffe9c8fbd10
"", len = -759148836}, method = {
s = 0x4 <error: Cannot access memory at address 0x4>, len =
10129124}, lr = {s = 0x9a9a80 <p_onsend> "", len = 844888592}, r2 = {
s = 0x178051778f004edc <error: Cannot access memory at address
0x178051778f004edc>, len = -1922412836}, gr = {s = 0x0, len = 0},
transport_val = {s = 0x7fde111da1f0 <tm_cfg> "\b\226N\021\336\177",
len = 5781511}, ttl_val = {s = 0x7ffe9c8fbe7c "", len =
-1668301356}, user_param_val = {s = 0x7fde111da1f0 <tm_cfg>
"\b\226N\021\336\177", len = 1}, maddr_val = {
s = 0x7fde201a15e0 "\020fD\021\336\177", len = 844888592},
method_val = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len =
538580968}, lr_val = {s = 0x7fde201a15e0 "\020fD\021\336\177",
len = 5781511}, r2_val = {s = 0x7fde200ac1a8
"\260yD\021\336\177", len = 284185226}, gr_val = {s = 0x0, len = 284422397}}
next_hop = {user = {s = 0xc8 <error: Cannot access memory at address
0xc8>, len = -1668301184}, passwd = {s = 0x4 <error: Cannot access memory at
address 0x4>, len = 844888592}, host = {
s = 0xc8 <error: Cannot access memory at address 0xc8>, len =
538580968}, port = {s = 0x7fde201a15e0 "\020fD\021\336\177", len =
284462986}, params = {
s = 0x7fde00000000 <error: Cannot access memory at address
0x7fde00000000>, len = 10484192}, sip_params = {s = 0x9ff9e8 <def_list+8>
"", len = 10484208}, headers = {s = 0x9ff9f8 <def_list+24> "",
len = 10484232}, port_no = 63320, proto = 159, type =
ERROR_URI_T, flags = (unknown: 2626666112), transport = {s = 0xa8428197
<error: Cannot access memory at address 0xa8428197>, len = 397}, ttl = {
s = 0x0, len = -1668349752}, user_param = {s = 0x0, len =
249889158}, maddr = {s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 13912792}, method = {
s = 0x23a090 <error: Cannot access memory at address 0x23a090>,
len = -1668301052}, lr = {s = 0x2bd8c8 <error: Cannot access memory at
address 0x2bd8c8>, len = -1668301036}, r2 = {
s = 0x7fde325bfa10 "yb\004", len = 249889158}, gr = {s =
0x1000000 <error: Cannot access memory at address 0x1000000>, len =
13913504}, transport_val = {
s = 0x239dc8 <error: Cannot access memory at address 0x239dc8>,
len = 2863712}, ttl_val = {s = 0x2bd8c8 <error: Cannot access memory at
address 0x2bd8c8>, len = 8}, user_param_val = {
s = 0x119 <error: Cannot access memory at address 0x119>, len =
798682880}, maddr_val = {s = 0x2bb260 <error: Cannot access memory at
address 0x2bb260>, len = 6243540}, method_val = {
s = 0x7fde324d7b08 "\\\005", len = 6978116}, lr_val = {s =
0x71ca40 <__FUNCTION__.7459> "parse_via", len = 538580448}, r2_val = {
s = 0x1780517781204edc <error: Cannot access memory at address
0x1780517781204edc>, len = -1668300892}, gr_val = {s = 0x0, len = 10136780}}
u = 0x7fde3235cd08
flags = 32734
st = {flags = 200, id = 0, name = {n = -1668301184, s = {s =
0x7ffe9c8fbe80 "", len = 4}, re = 0x7ffe9c8fbe80}, avp =
0x7fde325bfa10}
sct = 0x7fde3235cd08
sjt = 0x7fde3235cd08
mct = 0x0
rv = 0x1
---Type <return> to continue, or q <return> to quit---
rv1 = 0x7fde325bfa10
c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val =
{n = 538580640, s = {s = 0x7fde201a16a0 <incomplete sequence \310>, len =
10482688}, re = 0x7fde201a16a0}, pval = {rs = {
s = 0x7fde201a16a0 <incomplete sequence \310>, len =
10482688}, ri = 4, flags = 1}}, i2s =
"\000\276\217\234\376\177\000\000\000\063'
\336\177\000\000\000n=\021\336\177"}
s = {s = 0xa489c0 <_pkg_root> "\v\017p", len = 4}
srevp = {0x7fde3235e2c8, 0x7fde325bfa10}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
{type = NUMBER_ST, u = {number = 2,
string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140592304344264,
string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s =
0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr =
0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE,
u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type
= NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#16 0x0000000000453625 in run_actions (h=0x1, h@entry=0x7ffe9c8fc0d0,
a=0x7fde114dce10, a@entry=0x7fde32353dc8, msg=0x7fde114de420,
#msg@entry=0x7fde325bfa10) at action.c:1549
ret = 1
mod = 0x7fde3235e2c8
__FUNCTION__ = "run_actions"
#17 0x0000000000460095 in run_top_route (a=0x7fde32353dc8,
msg=0x7fde325bfa10, c=<optimized out>) at action.c:1635
ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env =
{{__jmpbuf = {140731525087440, -1694083084758004004, 140592301817288,
140592304355856, 0, 0, 1693443033690820316, -1694082562576986404},
__mask_was_saved = 0, __saved_mask = {__val = {10136780, 551,
140592304355856, 10136721, 10136640, 551, 140592304355856, 10136721,
10136640, 551, 1893732767588085504, 0, 140592304287008,
1073741825, 140591744222280, 140592304271872}}}}}
p = <optimized out>
ret = <optimized out>
sfbk = 0
#18 0x000000000054473e in receive_msg (buf=0x0, len=844888592,
rcv_info=0x7ffe9c8fc3b0) at receive.c:240
msg = 0x7fde325bfa10
ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env =
{{__jmpbuf = {140731525087808, -1694083084758004004, 140592303381560,
140592304355856, 0, 0, 1693443033690820316, -1694082562576986404},
__mask_was_saved = 0, __saved_mask = {__val = {10105736, 0,
140731525088198, 6, 1, 140592301637472, 140592326479303, 140591459467269, 0,
7071780, 140592318318440, 140592303177032,
140731525088068, 140592328607376, 140592303177032, 11}}}}}
inb = {
s = 0x9aac40 <buf> "BYE
sip:o9_xxxxxxxxxxxxx@192.168.1.63:5110;alias=188.79.210.242~38892~1
SIP/2.0\r\nVia: SIP/2.0/UDP
185.xx.xx.56:5080;branch=z9hG4bK44092255\r\nRoute:
<sip:185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes"..., len = 551}
netinfo = {data = {s = 0xffffffff <error: Cannot access memory at
address 0xffffffff>, len = 2}, dst = 0x7fde33310768, rcv = 0x7fde33ce1000}
__FUNCTION__ = "receive_msg"
#19 0x000000000048a410 in udp_rcv_loop () at udp_server.c:495
len = 551
buf = "BYE
sip:o9_xxxxxxxxxxxxx@192.168.1.63:5110;alias=188.79.210.242~38892~1
SIP/2.0\r\nVia: SIP/2.0/UDP
185.xx.xx.56:5080;branch=z9hG4bK44092255\r\nRoute:
<sip:185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes"...
from = 0x7fde3249fd48
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {940519353,
140591749785588}, addr32 = {940519353, 0, 290318324, 32734}, addr16
= {12217, 14351, 0, 0, 59380, 4429, 32734, 0},
addr =
"\271/\017\070\000\000\000\000\364\347M\021\336\177\000"}}, dst_ip = {af =
2, len = 4, u = {addrl = {856633273, 0}, addr32 = {856633273, 0, 0, 0},
addr16 = {12217, 13071, 0, 0, 0, 0, 0,
0}, addr = "\271/\017\063", '\000' <repeats 11
times>}},
src_port = 5080, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0,
src_su = {s = {sa_family = 2,
sa_data = "\023ع/\017\070\000\000\000\000\000\000\000"}, sin =
{sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 940519353}, sin_zero
= "\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 940519353,
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16
= {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0,
0}}}, sin6_scope_id = 0}}, bind_address =
0x7fde32327f60, proto = 1 '\001'}
__FUNCTION__ = "udp_rcv_loop"
#20 0x000000000050ac19 in main_loop () at main.c:1614
si_desc = "udp receiver child=6
sock=185.xx.xx.51:5060\000\000\000\000\000\350=R2\336\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000\rg_",
'\000' <repeats 14 times>, "\357\232/\---Type <return> to
continue, or q
<return> to quit---
353\343G\032\260\024\r2\336\177\000\000\000\357\232/\353\343G\032\210\002\245\000\000\000\000\000\004\000\000\000\000\000\000"
woneinit = 1
__FUNCTION__ = "main_loop"
#21 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631
cfg_stream = 0x0
r = 22773
tmp = 0x7ffe9c8fdee5 ""
tmp_len = 0
port = 0
proto = 869144016
ret = 0
seed = 661187045
debug_save = 0
debug_flag = 8
dont_fork_cnt = 0
st = {st_dev = 15, st_ino = 12624, st_nlink = 2, st_mode = 16832,
st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 60,
st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1490193544,
tv_nsec = 929429960}, st_mtim = {tv_sec = 1491929843, tv_nsec =
907871616}, st_ctim = {tv_sec = 1491929843, tv_nsec = 907871616},
__glibc_reserved = {0, 0, 0}}
__FUNCTION__ = "main"
(gdb)
(gdb)
(gdb)
(gdb)
(gdb)
(gdb) info locals
No locals.
(gdb) list
69 in ../../mem/../atomic/atomic_common.h
(gdb)
```
#### Log Messages
<!--
Check the syslog file and if there are relevant log messages printed by Kamailio, add them
next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->
```
Apr 12 10:19:08 customers /usr/sbin/kamailio[22773]: INFO: Dialog ended, delete keys from
dialogs htable starting with 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI
Apr 12 10:19:09 customers /usr/sbin/kamailio[22785]: NOTICE: dialog [dlg_hash.c:245]:
dlg_clean_run(): dialog in delete state is too old (0x7fde1fec6ff0 ref 4)
Apr 12 10:19:11 customers /usr/sbin/kamailio[22794]: CRITICAL: <core>
[pass_fd.c:277]: receive_fd(): EOF on 20
Apr 12 10:19:12 customers /usr/sbin/kamailio[22774]: INFO: Dialog ended, delete keys from
dialogs htable starting with 84253NWFkZmFjZTExM2Y4ZDBjNDNhMGZlZjQ5M2UxZWNmOTI
Apr 12 10:19:16 customers /usr/sbin/kamailio[22765]: ALERT: <core> [main.c:740]:
handle_sigs(): child process 22773 exited by a signal 11
Apr 12 10:19:16 customers /usr/sbin/kamailio[22765]: ALERT: <core> [main.c:743]:
handle_sigs(): core was generated
Apr 12 10:19:16 customers /usr/sbin/kamailio[22765]: INFO: <core> [main.c:755]:
handle_sigs(): terminating due to SIGCHLD
Apr 12 10:19:16 customers /usr/sbin/kamailio[22788]: INFO: <core> [main.c:810]:
sig_usr(): signal 15 received
```
#### SIP Traffic
<!--
If the issue is exposed by processing specific SIP messages, grab them with ngrep or save
in a pcap file, then add them next, or attach to issue, or provide a link to download them
(e.g., to a pastebin site).
-->
```
(paste your sip traffic here)
```
### Possible Solutions
<!--
If you found a solution or workaround for the issue, describe it. Ideally, provide a pull
request with a fix.
-->
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
```
version: kamailio 4.4.5 (x86_64/linux)
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, DISABLE_NAGLE, USE_MCAST,
DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC,
DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER,
USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024,
BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: unknown
compiled with gcc 4.9.2
```
* **Operating System**:
<!--
Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04,
CentOS 7.1, ...), MacOS, xBSD, Solaris, ...;
Kernel details (output of `uname -a`)
-->
```
Linux customers 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u2 (2016-10-19) x86_64
GNU/Linux
```
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1069