<!-- Kamailio Project uses GitHub Issues only for bugs in the code or feature requests.
If you have questions about using Kamailio or related to its configuration file, ask on sr-users mailing list:
* http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
If you have questions about developing extensions to Kamailio or its existing C code, ask on sr-dev mailing list
* http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
Please try to fill this template as much as possible for any issue. It helps the developers to troubleshoot the issue.
If you submit a feature request (or enhancement), you can delete the text of the template and only add the description of what you would like to be added.
If there is no content to be filled in a section, the entire section can be removed.
You can delete the comments from the template sections when filling.
You can delete next line and everything above before submitting (it is a comment). -->
### Description
<!-- Explain what you did, what you expected to happen, and what actually happened. -->
Kamailio dies every few hours, apparently trying to delete a finished dialog. After crash it always shows the message: 'dlg_clean_run(): dialog in delete state is too old'
### Troubleshooting
#### Reproduction
<!-- If the issue can be reproduced, describe how it can be done. -->
#### Debugging Data
<!-- If you got a core dump, use gdb to extract troubleshooting data - full backtrace, local variables and the list of the code at the issue location.
gdb /path/to/kamailio /path/to/corefile bt full info locals list
If you are familiar with gdb, feel free to attach more of what you consider to be relevant. -->
``` # gdb /usr/sbin/kamailio /tmp/core.22773 GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: http://www.gnu.org/software/gdb/bugs/. Find the GDB manual and other documentation resources online at: http://www.gnu.org/software/gdb/documentation/. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/a2/2b21a61e95b0b11a767bd32090a1083560a3dd.debug...done. done. [New LWP 22773] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /etc/kamailio/kamailio.'. Program terminated with signal SIGSEGV, Segmentation fault. #0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74 74 ../../mem/../atomic/atomic_common.h: No such file or directory. (gdb) bt full #0 atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74 No locals. #1 dlg_unref_helper (dlg=0x7fde1fec6ff0, cnt=1, fname=0x58f5 <error: Cannot #access memory at address 0x58f5>, fline=1637) at dlg_hash.c:925 mypid = 22773 d_entry = 0x7fe819d53bf0 __FUNCTION__ = "dlg_unref_helper" #2 0x00007fde0ba72e12 in dlg_run_event_route (dlg=0x7fde1fec6ff0, msg=0x7fde325bfa10, ostate=290317344, nstate=1) at dlg_handlers.c:1637 rt = 10129124 bkroute = 1 __FUNCTION__ = "dlg_run_event_route" #3 0x00007fde0ba761cf in dlg_onroute (req=0x7fde325bfa10, route_params=0x7fde114dce10, param=0x7fde114de420) at dlg_handlers.c:1314 val = { s = 0x9aacfa <buf+186> "001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY"..., len = 6} ftag = { s = 0x9aad51 <buf+273> "as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-Hangu"..., len = 10} old_state = 4 dir = 2 ret = 22773 callid = { s = 0x9aada9 <buf+361> "141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 55} new_state = 5 unref = 1 event = 7 dlg = 0x7fde1fec6ff0 ttag = { s = 0x9aad96 <buf+342> "58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Leng"..., len = 8} h_id = 198013376 dlg = 0x58f5 #4 0x00007fde0e34f28d in run_rr_callbacks (req=0x7fde325bfa10, rr_param=0x7ffe9c8fa6e0) at rr_cb.c:96 l_param = { s = 0x9aace5 <buf+165> "lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 1413"..., len = 35} cbp = 0x7fde325b27d0 __FUNCTION__ = "run_rr_callbacks" #5 0x00007fde0e3418a2 in after_loose (_m=0x7fde325bfa10, preloaded=2) at loose.c:928 puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x9aacd8 <buf+152> "185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\n"..., len = 12}, port = {s = 0x0, len = 0}, params = { s = 0x9aace5 <buf+165> "lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 1413"..., len = 35}, sip_params = { s = 0x9aace5 <buf+165> "lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 1413"..., len = 35}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = { s = 0x9aace5 <buf+165> "lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 1413"..., len = 2}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, ---Type <return> to continue, or q <return> to quit--- maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} rt = 0x0 status = 22773 uri = { s = 0x9aacd4 <buf+148> "sip:185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f"..., len = 52} use_ob = 0 rparams = { s = 0x9aace5 <buf+165> "lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom: sip:677xxxxxx@customers.xxxxxxxxxxx.com;tag=as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 1413"..., len = 35} __FUNCTION__ = "after_loose" #6 0x0000000000454b60 in do_action (h=0x7ffe9c8fae00, a=0x7fde323f7d98, msg=0x7fde325bfa10) at action.c:1060 ret = -5 v = 25 dst = {send_sock = 0x7ffe9c8fa950, to = {s = {sa_family = 9055, sa_data = "B\000\000\000\000\000\060\033\2\336\177\000"}, sin = {sin_family = 9055, sin_port = 66, sin_addr = {s_addr = 0}, sin_zero = "0\033\2\336\177\000"}, sin6 = {sin6_family = 9055, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "0\033\2\336\177\000\000[TB\000\000\000\000", __u6_addr16 = {6960, 12892, 32734, 0, 21595, 66, 0, 0}, __u6_addr32 = {844897072, 32734, 4346971, 0}}}, sin6_scope_id = 13909984}}, id = 0, proto = 10 '\n', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7ffe9c8fae00 "\001" uri = {user = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13911000}, passwd = {s = 0x23a790 <error: Cannot access memory at address 0x23a790>, len = -1668306428}, host = { s = 0x2bd8c8 <error: Cannot access memory at address 0x2bd8c8>, len = 535588848}, port = {s = 0xa <error: Cannot access memory at address 0xa>, len = 0}, params = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 290108944}, sip_params = {s = 0x7ffe9c8fab30 "Q\255\232", len = 5781511}, headers = {s = 0x0, len = 798682880}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 195350440), transport = {s = 0x7ffe9c8fab20 "\251\255\232", len = -1668306148}, ttl = { s = 0x7fde00000000 <error: Cannot access memory at address 0x7fde00000000>, len = 290108944}, user_param = { s = 0x9aada9 <buf+361> "141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 55}, maddr = {s = 0x10001000000 <error: Cannot access memory at address 0x10001000000>, len = 8}, method = {s = 0x23a4d0 <error: Cannot access memory at address 0x23a4d0>, len = -1668306144}, lr = {s = 0x49 <error: Cannot access memory at address 0x49>, len = 10137053}, r2 = {s = 0x1893d2 <error: Cannot access memory at address 0x1893d2>, len = 87}, gr = { s = 0x1eb8c6 <error: Cannot access memory at address 0x1eb8c6>, len = -1668306204}, transport_val = {s = 0x0, len = 535588848}, ttl_val = {s = 0x7fde114ab610 "", len = 22773}, user_param_val = { s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, maddr_val = {s = 0x7fde114ab624 "", len = 5781511}, method_val = { s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route: sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589\r\nRecord-Route: <sips:185.xx.xx.51;r2="..., len = 798682880}, lr_val = {s = 0x7fde12ec1678 " ,x\021\336\177", len = 195403485}, r2_val = {s = 0x0, len = 798682880}, gr_val = {s = 0x0, len = 195754177}} next_hop = {user = { s = 0x9aada9 <buf+361> "141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 55}, passwd = { s = 0x9aad51 <buf+273> "as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-Hangu"..., len = 10}, host = { s = 0x9aad96 <buf+342> "58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Leng"..., len = 535588848}, port = {s = 0x0, len = 798682880}, params = {s = 0x0, len = 842977936}, sip_params = {s = 0x7fde325bfa10 "yb\004", len = -1668305776}, headers = { s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route: sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589\r\nRecord-Route: <sips:185.xx.xx.51;r2="..., len = 290100736}, port_no = 5752, proto = 4844, type = 32734, flags = (URI_USER_NORMALIZE | unknown: 195759988), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x7fde32315910 "1", len = 1}, method = {s = 0x0, len = 798682880}, lr = {s = 0x6632430c90 <error: Cannot access memory at address 0x6632430c90>, len = 842977912}, r2 = {s = 0x7ffe9c8fac90 "", len = 844888592}, gr = {s = 0x7ffe9c8fc0d0 "\003", len = -1668305308}, transport_val = {s = 0x0, len = 5736030}, ttl_val = {s = 0x7ffe9c8fae64 "\001", len = -1668300592}, user_param_val = {s = 0x7fde325bfa10 "yb\004", len = -1668300592}, maddr_val = {s = 0x7ffe9c8fae64 "\001", len = 4337637}, method_val = { s = 0xa00000000 <error: Cannot access memory at address 0xa00000000>, len = 535588848}, lr_val = {s = 0xa <error: Cannot access memory at address 0xa>, len = 0}, r2_val = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 290108944}, gr_val = {s = 0x0, len = 0}} u = 0x7ffe9c8fae00 flags = 0 st = {flags = 10137001, id = 0, name = {n = 55, s = {s = 0x37 <error: Cannot access memory at address 0x37>, len = 10136913}, re = 0x37}, avp = 0xa} sct = 0x7ffe9c8fae00 ---Type <return> to continue, or q <return> to quit--- sjt = 0x7ffe9c8fae00 mct = 0x0 rv = 0x7fde325bfa10 rv1 = 0x7fde325bfa10 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = -1668305944}, re = 0x0}, pval = {rs = {s = 0x0, len = -1668305944}, ri = -1668305976, flags = 32766}}, i2s = "諏\234\376\177\000\000\324\251\217\234\376\177\000\000\310\330+\000\000"} s = {s = 0x7ffe9c8fc0d0 "\003", len = -1668305152} srevp = {0x7fde323f7d98, 0x7fde325bfa10} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140592304344264, string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s = 0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr = 0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #7 0x0000000000453625 in run_actions (h=0x1, h@entry=0x7ffe9c8fae00, a=0x7fde114dce10, msg=0x7fde114de420) at action.c:1549 ret = -1668300592 mod = 0x7fde323f7d98 __FUNCTION__ = "run_actions" #8 0x000000000045fff7 in run_actions_safe (h=0x7ffe9c8fc0d0, a=<optimized out>, msg=<optimized out>) at action.c:1614 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140731525082624, 1693443033458036444, 140592304355856, 140731525087440, 140731525083440, 0, 1693443034133319388, -1694082562576986404}, __mask_was_saved = 0, __saved_mask = -{__val = {1893732767588085504, 4294967566, 140592302729920, -140592301545600, 140591459467265, 0, 1893732767588085504, -0, 140592303006032, 140731525082928, 140592304355856, 140731525087440, 140731525083440, 0, 5736030, 140731525083440}}}}} ret = <optimized out> ign_on_break = 0 #9 0x0000000000423030 in rval_get_int (h=0x7ffe9c8fc0d0, msg=0x1, i=0x7ffe9c8fb130, rv=0x3d4, cache=0x67) at rvalue.c:912 r_avp = 0x58f5 avp_val = {n = 267, s = {s = 0x10b <error: Cannot access memory at address 0x10b>, len = 844356336}, re = 0x10b} pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0} tmp = {s = 0xa489c0 <_pkg_root> "\v\017p", len = 842586088} s = 0x7fde325bfa10 r = 22773 ret = 22773 destroy_pval = -1668300592 __FUNCTION__ = "rval_get_int" #10 0x0000000000428dbc in rval_expr_eval_int (h=0x7ffe9c8fc0d0, msg=0x7fde325bfa10, res=0x7ffe9c8fb130, rve=0x7fde323f7230) at rvalue.c:1910 i1 = 0 i2 = 0 ret = -1 c1 = {cache_type = 2626666704, val_type = 32766, c = {avp_val = {n = 0, s = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 843191600}, re = 0x300000000}, pval = {rs = { s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 843191600}, ri = 844888592, flags = 32734}}, i2s = "\000\000\000\000\004\000\000\000gV\023\f\336\177\000\000;\232\061\062\336\177"} c2 = {cache_type = 842345632, val_type = 32734, c = {avp_val = {n = 5740203, s = {s = 0x5796ab <pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\223\366B", len = 10136872}, re = 0x5796ab <pv_printf+267>}, pval = {rs = {s = 0x5796ab <pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\223\366B", len = 10136872}, ri = 9, flags = 0}}, i2s = "\360\332S2\336\177\000\000\000\357\232/\353\343G\032\001\000\000\000\000"} rv1 = 0x7fde325bfa10 rv2 = 0x0 __FUNCTION__ = "rval_expr_eval_int" ---Type <return> to continue, or q <return> to quit--- #11 0x0000000000455037 in do_action (h=0x7ffe9c8fc0d0, a=0x7fde323fe300, #msg=0x7fde325bfa10) at action.c:1030 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 61184, sa_data = "\232/\353\343G\032\020\372[2\336\177\000"}, sin = {sin_family = 61184, sin_port = 12186, sin_addr = {s_addr = 440919019}, sin_zero = "\020\372[2\336\177\000"}, sin6 = {sin6_family = 61184, sin6_port = 12186, sin6_flowinfo = 440919019, sin6_addr = {__in6_u = { __u6_addr8 = "\020\372[2\336\177\000\000\301\370\252\v\336\177\000", __u6_addr16 = {64016, 12891, 32734, 0, 63681, 2986, 32734, 0}, __u6_addr32 = {844888592, 32734, 195754177, 32734}}}, sin6_scope_id = 10137001}}, id = 0, proto = 55 '7', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7fde323f7230 "\001" uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 290108944}, passwd = {s = 0x7ffe9c8fb320 "Q\255\232", len = 5781511}, host = {s = 0x0, len = 798682880}, port = {s = 0x0, len = 195350441}, params = {s = 0x7ffe9c8fb310 "\251\255\232", len = -1668304116}, sip_params = {s = 0x7ffe00000000 <error: Cannot access memory at address 0x7ffe00000000>, len = 290108944}, headers = { s = 0x9aada9 <buf+361> "141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 55}, port_no = 45904, proto = 40079, type = 256, flags = (unknown: 8), transport = {s = 0x7fde3246f350 "\224\004", len = -1668304112}, ttl = { s = 0x49 <error: Cannot access memory at address 0x49>, len = 10137053}, user_param = {s = 0x1893d2 <error: Cannot access memory at address 0x1893d2>, len = 87}, maddr = { s = 0x1eb8c6 <error: Cannot access memory at address 0x1eb8c6>, len = -1668304172}, method = {s = 0x7fde3248b930 "\001", len = 535588848}, lr = {s = 0x7fde114ab610 "", len = 22773}, r2 = { s = 0x3ac <error: Cannot access memory at address 0x3ac>, len = 1}, gr = {s = 0x7fde114ab624 "", len = 5781511}, transport_val = { s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route: sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589\r\nRecord-Route: <sips:185.xx.xx.51;r2="..., len = 798682880}, ttl_val = {s = 0x7fde13decf68 "\210\317\336\023\336\177", len = 195403485}, user_param_val = {s = 0x7ffe9c8fc0d0 "\003", len = 798682880}, maddr_val = { s = 0x18faa <error: Cannot access memory at address 0x18faa>, len = 195754177}, method_val = { s = 0x9aada9 <buf+361> "141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n", len = 55}, lr_val = { s = 0x9aad51 <buf+273> "as2ad67a1d\r\nTo: sip:o9_xxxxxxxxxxxxx@customers.xxxxxxxxxxx.com;tag=58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-Hangu"..., len = 10}, r2_val = { s = 0x9aad96 <buf+342> "58b18f69\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Leng"..., len = 535588848}, gr_val = {s = 0x0, len = 798682880}} next_hop = {user = {s = 0x0, len = 842388880}, passwd = {s = 0x7fde325bfa10 "yb\004", len = -1668303744}, host = { s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route: sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589\r\nRecord-Route: <sips:185.xx.xx.51;r2="..., len = 290100736}, port = {s = 0x7fde13decf68 "\210\317\336\023\336\177", len = 195759989}, params = { s = 0x178051779d804edc <error: Cannot access memory at address 0x178051779d804edc>, len = -1922412836}, sip_params = {s = 0x0, len = 36}, headers = { s = 0x9aad9e <buf+350> "\r\nCall-ID: 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102 BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r"..., len = 843626808}, port_no = 14536, proto = 12849, type = 32734, flags = URI_USER_NORMALIZE, transport = {s = 0x0, len = 798682880}, ttl = {s = 0x0, len = 842388856}, user_param = {s = 0x7ffe9c8fb480 "", len = 844888592}, maddr = {s = 0x7ffe9c8fc0d0 "\003", len = -1668303232}, method = {s = 0x0, len = 5736030}, lr = {s = 0x7ffe9c8fb680 "", len = -1668300592}, r2 = {s = 0x7fde325bfa10 "yb\004", len = -1668300592}, gr = {s = 0x7ffe9c8fb680 "", len = 4337637}, transport_val = {s = 0x0, len = 340527640}, ttl_val = {s = 0x7fde32353ff0 "", len = 798682880}, user_param_val = {s = 0x7ffe9c8fb5c0 "\310\003", len = 843727864}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 798682880}, lr_val = {s = 0x0, len = 842388840}, r2_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 844888592}, gr_val = {s = 0x7ffe9c8fc0d0 "\003", len = -1668303232}} u = 0x7fde323f7230 flags = 32734 st = {flags = 0, id = 0, name = {n = 842388880, s = {s = 0x7fde3235d590 "", len = 844888592}, re = 0x7fde3235d590}, avp = 0x7ffe9c8fb480} sct = 0x7fde323f7230 sjt = 0x7fde323f7230 mct = 0x0 rv = 0x583807 <get_debug_level+103> rv1 = 0x7fde325bfa10 c1 = {cache_type = 10136913, val_type = RV_NONE, c = {avp_val = {n = 10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len = 10136982}, re = 0xa}, pval = {rs = { s = 0xa <error: Cannot access memory at address 0xa>, len = 10136982}, ri = -1668304396, flags = 32766}}, i2s = "\000\000\000\000\000\000\000\000\360o\354\037\336\177\000\000\n\000\000\000\000"} s = { s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route: sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589\r\nRecord-Route: <sips:185.xx.xx.51;r2="..., len = 798682880} srevp = {0x7fde323fe300, 0x7fde325bfa10} ---Type <return> to continue, or q <return> to quit--- mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140592304344264, string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s = 0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr = 0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #12 0x0000000000453625 in run_actions (h=0x1, a=0x7fde114dce10, msg=0x7fde114de420) at action.c:1549 ret = 1 mod = 0x7fde323fe300 __FUNCTION__ = "run_actions" #13 0x0000000000455250 in do_action (h=0x7ffe9c8fc0d0, a=0x7fde325a0768, msg=0x7fde325bfa10) at action.c:678 ret = -5 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\240\344=\037\336\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\240\344=\037\336\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\240\344=\037\336\177\000\000\230Z23\336\177\000", __u6_addr16 = {58528, 7997, 32734, 0, 23192, 13106, 32734, 0}, __u6_addr32 = {524149920, 32734, 858938008, 32734}}}, sin6_scope_id = 720}}, id = 0, proto = -96 '\240', send_flags = { f = 134 '\206', blst_imask = 143 '\217'}} end = 0x8 <error: Cannot access memory at address 0x8> uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 290108944}, passwd = {s = 0x7ffe9c8fb870 "\320\300\217\234\376\177", len = 5781511}, host = { s = 0x100000002 <error: Cannot access memory at address 0x100000002>, len = 798682880}, port = {s = 0x0, len = 842385936}, params = {s = 0x7ffe9c8fc0d0 "\003", len = -5}, sip_params = { s = 0x7ffe9c8fb8a0 "", len = 844888592}, headers = {s = 0x0, len = 4535845}, port_no = 47264, proto = 40079, type = 32766, flags = (unknown: 2626664656), transport = {s = 0x7fde3235ca10 "\267\001", len = 844888592}, ttl = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 859634415}, user_param = { s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, len = 0}, maddr = {s = 0x7ffe9c8fb898 "\367\377E", len = 14512472}, method = {s = 0xdd2d20 "", len = 14494752}, lr = { s = 0x0, len = 14494752}, r2 = {s = 0x100000003 <error: Cannot access memory at address 0x100000003>, len = -1668302096}, gr = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, transport_val = {s = 0x200000001 <error: Cannot access memory at address 0x200000001>, len = -1668302688}, ttl_val = {s = 0xdd7380 "O\206", <incomplete sequence \335>, len = 0}, user_param_val = { s = 0x7fde325c1e7e "ast.zs PBX", len = 1}, maddr_val = {s = 0xdd7140 <incomplete sequence \335>, len = 859613985}, method_val = {s = 0x7ffe9c8fb89c "", len = 0}, lr_val = { s = 0x7ffe9c8fc0d0 "\003", len = 844888592}, r2_val = {s = 0x7ffe9c8fc0d0 "\003", len = -1668301872}, gr_val = {s = 0x0, len = 4587511}} next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffe9c8fb8a0 "", len = 2023771868}, host = {s = 0x7fde325bfa10 "yb\004", len = -1668300592}, port = {s = 0x7ffe9c8fbbd0 "\001", len = 0}, params = {s = 0x1780517796204edc <error: Cannot access memory at address 0x1780517796204edc>, len = -1922412836}, sip_params = {s = 0x0, len = 0}, headers = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, port_no = 3, proto = 0, type = TEL_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = {s = 0x0, len = 14494920}, ttl = {s = 0x1000001 <error: Cannot access memory at address 0x1000001>, len = -1668302460}, user_param = {s = 0xdd2c20 "@\206", <incomplete sequence \335>, len = 249889158}, maddr = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13911176}, method = {s = 0x23a6e0 <error: Cannot access memory at address 0x23a6e0>, len = 2866040}, lr = { s = 0x2bd8c8 <error: Cannot access memory at address 0x2bd8c8>, len = 798682880}, r2 = {s = 0x10f <error: Cannot access memory at address 0x10f>, len = -1668301872}, gr = { s = 0x7ffe9c8fc0d0 "\003", len = 4337712}, transport_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 844898032}, ttl_val = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 14495104}, user_param_val = {s = 0xdd2c20 "@\206", <incomplete sequence \335>, len = 8}, maddr_val = { s = 0x80 <error: Cannot access memory at address 0x80>, len = 859605510}, method_val = {s = 0x0, len = 798682880}, lr_val = {s = 0x0, len = 842386696}, r2_val = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 844888592}, gr_val = {s = 0x7ffe9c8fc0d0 "\003", len = -1668301872}} u = 0x8 flags = 0 st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1668302688}, re = 0x1}, avp = 0x1780517778a04edc} sct = 0x8 sjt = 0x8 mct = 0x0 rv = 0x7ffe9c8fb940 rv1 = 0x7fde325bfa10 c1 = {cache_type = 2626651800, val_type = 32766, c = {avp_val = {n = -1668311360, s = {s = 0x7ffe9c8f96c0 "\356\215L2\336\177", len = --1668315456}, re = 0x7ffe9c8f96c0}, pval = {rs = { s = 0x7ffe9c8f96c0 "\356\215L2\336\177", len = -1668315456}, ri = -1668303036, flags = 32766}}, i2s = "`.\335\000\000\000\000\000\360o\354\037\336\177\000\000\n\000\000\000\000"} ---Type <return> to continue, or q <return> to quit--- s = {s = 0x43b2fc <tsend_stream+2204> "\351\243\375\377\377\350j\324\005", len = -1668302564} srevp = {0x7fde3235e198, 0x7fde325bfa10} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140592304344264, string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s = 0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr = 0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #14 0x0000000000453625 in run_actions (h=0x1, a=0x7fde114dce10, msg=0x7fde114de420) at action.c:1549 ret = 1 mod = 0x7fde3235e198 __FUNCTION__ = "run_actions" #15 0x0000000000455088 in do_action (h=0x7ffe9c8fc0d0, a=0x7fde3235e2c8, msg=0x7fde325bfa10) at action.c:1049 ret = 1 v = 1 dst = {send_sock = 0x7fde325bfa10, to = {s = {sa_family = 19294, sa_data = "\364\020\336\177\000\000\310\000\000\000\376\177\000"}, sin = {sin_family = 19294, sin_port = 4340, sin_addr = { s_addr = 32734}, sin_zero = "\310\000\000\000\376\177\000"}, sin6 = {sin6_family = 19294, sin6_port = 4340, sin6_flowinfo = 32734, sin6_addr = {__in6_u = { __u6_addr8 = "\310\000\000\000\376\177\000\000\370\026\032 \336\177\000", __u6_addr16 = {200, 0, 32766, 0, 5880, 8218, 32734, 0}, __u6_addr32 = {200, 32766, 538580728, 32734}}}, sin6_scope_id = 844897072}}, id = 32734, proto = 16 '\020', send_flags = {f = 250 '\372', blst_imask = 91 '['}} end = 0x7fde3235cd08 "\001" uri = {user = {s = 0x7ffe9c8fbe7c "", len = -1668301628}, passwd = {s = 0x7fde202251d0 "\306_\004", len = 538580448}, host = {s = 0x9 <error: Cannot access memory at address 0x9>, len = 0}, port = { s = 0x7fde11446610 "\340\025\032 \336\177", len = 55150}, params = {s = 0x7ffe9c8fbe7c "", len = 5781511}, sip_params = {s = 0xd76e <error: Cannot access memory at address 0xd76e>, len = 798682880}, headers = {s = 0x7fde201a16f8 "\002", len = 842171456}, port_no = 6960, proto = 12892, type = 32734, flags = (unknown: 696), transport = {s = 0x7fde325bfa10 "yb\004", len = 843938568}, ttl = {s = 0x7fde325bfa10 "yb\004", len = 538580968}, user_param = {s = 0x0, len = -1}, maddr = {s = 0x7ffe9c8fbd10 "", len = -759148836}, method = { s = 0x4 <error: Cannot access memory at address 0x4>, len = 10129124}, lr = {s = 0x9a9a80 <p_onsend> "", len = 844888592}, r2 = { s = 0x178051778f004edc <error: Cannot access memory at address 0x178051778f004edc>, len = -1922412836}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fde111da1f0 <tm_cfg> "\b\226N\021\336\177", len = 5781511}, ttl_val = {s = 0x7ffe9c8fbe7c "", len = -1668301356}, user_param_val = {s = 0x7fde111da1f0 <tm_cfg> "\b\226N\021\336\177", len = 1}, maddr_val = { s = 0x7fde201a15e0 "\020fD\021\336\177", len = 844888592}, method_val = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 538580968}, lr_val = {s = 0x7fde201a15e0 "\020fD\021\336\177", len = 5781511}, r2_val = {s = 0x7fde200ac1a8 "\260yD\021\336\177", len = 284185226}, gr_val = {s = 0x0, len = 284422397}} next_hop = {user = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len = -1668301184}, passwd = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 844888592}, host = { s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 538580968}, port = {s = 0x7fde201a15e0 "\020fD\021\336\177", len = 284462986}, params = { s = 0x7fde00000000 <error: Cannot access memory at address 0x7fde00000000>, len = 10484192}, sip_params = {s = 0x9ff9e8 <def_list+8> "", len = 10484208}, headers = {s = 0x9ff9f8 <def_list+24> "", len = 10484232}, port_no = 63320, proto = 159, type = ERROR_URI_T, flags = (unknown: 2626666112), transport = {s = 0xa8428197 <error: Cannot access memory at address 0xa8428197>, len = 397}, ttl = { s = 0x0, len = -1668349752}, user_param = {s = 0x0, len = 249889158}, maddr = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13912792}, method = { s = 0x23a090 <error: Cannot access memory at address 0x23a090>, len = -1668301052}, lr = {s = 0x2bd8c8 <error: Cannot access memory at address 0x2bd8c8>, len = -1668301036}, r2 = { s = 0x7fde325bfa10 "yb\004", len = 249889158}, gr = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 13913504}, transport_val = { s = 0x239dc8 <error: Cannot access memory at address 0x239dc8>, len = 2863712}, ttl_val = {s = 0x2bd8c8 <error: Cannot access memory at address 0x2bd8c8>, len = 8}, user_param_val = { s = 0x119 <error: Cannot access memory at address 0x119>, len = 798682880}, maddr_val = {s = 0x2bb260 <error: Cannot access memory at address 0x2bb260>, len = 6243540}, method_val = { s = 0x7fde324d7b08 "\\005", len = 6978116}, lr_val = {s = 0x71ca40 <__FUNCTION__.7459> "parse_via", len = 538580448}, r2_val = { s = 0x1780517781204edc <error: Cannot access memory at address 0x1780517781204edc>, len = -1668300892}, gr_val = {s = 0x0, len = 10136780}} u = 0x7fde3235cd08 flags = 32734 st = {flags = 200, id = 0, name = {n = -1668301184, s = {s = 0x7ffe9c8fbe80 "", len = 4}, re = 0x7ffe9c8fbe80}, avp = 0x7fde325bfa10} sct = 0x7fde3235cd08 sjt = 0x7fde3235cd08 mct = 0x0 rv = 0x1 ---Type <return> to continue, or q <return> to quit--- rv1 = 0x7fde325bfa10 c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val = {n = 538580640, s = {s = 0x7fde201a16a0 <incomplete sequence \310>, len = 10482688}, re = 0x7fde201a16a0}, pval = {rs = { s = 0x7fde201a16a0 <incomplete sequence \310>, len = 10482688}, ri = 4, flags = 1}}, i2s = "\000\276\217\234\376\177\000\000\000\063' \336\177\000\000\000n=\021\336\177"} s = {s = 0xa489c0 <_pkg_root> "\v\017p", len = 4} srevp = {0x7fde3235e2c8, 0x7fde325bfa10} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, { type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140592304344264, string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s = 0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr = 0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #16 0x0000000000453625 in run_actions (h=0x1, h@entry=0x7ffe9c8fc0d0, a=0x7fde114dce10, a@entry=0x7fde32353dc8, msg=0x7fde114de420, #msg@entry=0x7fde325bfa10) at action.c:1549 ret = 1 mod = 0x7fde3235e2c8 __FUNCTION__ = "run_actions" #17 0x0000000000460095 in run_top_route (a=0x7fde32353dc8, msg=0x7fde325bfa10, c=<optimized out>) at action.c:1635 ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140731525087440, -1694083084758004004, 140592301817288, 140592304355856, 0, 0, 1693443033690820316, -1694082562576986404}, __mask_was_saved = 0, __saved_mask = {__val = {10136780, 551, 140592304355856, 10136721, 10136640, 551, 140592304355856, 10136721, 10136640, 551, 1893732767588085504, 0, 140592304287008, 1073741825, 140591744222280, 140592304271872}}}}} p = <optimized out> ret = <optimized out> sfbk = 0 #18 0x000000000054473e in receive_msg (buf=0x0, len=844888592, rcv_info=0x7ffe9c8fc3b0) at receive.c:240 msg = 0x7fde325bfa10 ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140731525087808, -1694083084758004004, 140592303381560, 140592304355856, 0, 0, 1693443033690820316, -1694082562576986404}, __mask_was_saved = 0, __saved_mask = {__val = {10105736, 0, 140731525088198, 6, 1, 140592301637472, 140592326479303, 140591459467269, 0, 7071780, 140592318318440, 140592303177032, 140731525088068, 140592328607376, 140592303177032, 11}}}}} inb = { s = 0x9aac40 <buf> "BYE sip:o9_xxxxxxxxxxxxx@192.168.1.63:5110;alias=188.79.210.242~38892~1 SIP/2.0\r\nVia: SIP/2.0/UDP 185.xx.xx.56:5080;branch=z9hG4bK44092255\r\nRoute: <sip:185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes"..., len = 551} netinfo = {data = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 2}, dst = 0x7fde33310768, rcv = 0x7fde33ce1000} __FUNCTION__ = "receive_msg" #19 0x000000000048a410 in udp_rcv_loop () at udp_server.c:495 len = 551 buf = "BYE sip:o9_xxxxxxxxxxxxx@192.168.1.63:5110;alias=188.79.210.242~38892~1 SIP/2.0\r\nVia: SIP/2.0/UDP 185.xx.xx.56:5080;branch=z9hG4bK44092255\r\nRoute: <sip:185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes"... from = 0x7fde3249fd48 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {940519353, 140591749785588}, addr32 = {940519353, 0, 290318324, 32734}, addr16 = {12217, 14351, 0, 0, 59380, 4429, 32734, 0}, addr = "\271/\017\070\000\000\000\000\364\347M\021\336\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {856633273, 0}, addr32 = {856633273, 0, 0, 0}, addr16 = {12217, 13071, 0, 0, 0, 0, 0, 0}, addr = "\271/\017\063", '\000' <repeats 11 times>}}, src_port = 5080, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023ع/\017\070\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 940519353}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 940519353, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7fde32327f60, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #20 0x000000000050ac19 in main_loop () at main.c:1614 si_desc = "udp receiver child=6 sock=185.xx.xx.51:5060\000\000\000\000\000\350=R2\336\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000\rg_", '\000' <repeats 14 times>, "\357\232/---Type <return> to continue, or q <return> to quit--- 353\343G\032\260\024\r2\336\177\000\000\000\357\232/\353\343G\032\210\002\245\000\000\000\000\000\004\000\000\000\000\000\000" woneinit = 1 __FUNCTION__ = "main_loop" #21 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631 cfg_stream = 0x0 r = 22773 tmp = 0x7ffe9c8fdee5 "" tmp_len = 0 port = 0 proto = 869144016 ret = 0 seed = 661187045 debug_save = 0 debug_flag = 8 dont_fork_cnt = 0 st = {st_dev = 15, st_ino = 12624, st_nlink = 2, st_mode = 16832, st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 60, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1490193544, tv_nsec = 929429960}, st_mtim = {tv_sec = 1491929843, tv_nsec = 907871616}, st_ctim = {tv_sec = 1491929843, tv_nsec = 907871616}, __glibc_reserved = {0, 0, 0}} __FUNCTION__ = "main" (gdb) (gdb) (gdb) (gdb) (gdb) (gdb) info locals No locals. (gdb) list 69 in ../../mem/../atomic/atomic_common.h (gdb) ```
#### Log Messages
<!-- Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
``` Apr 12 10:19:08 customers /usr/sbin/kamailio[22773]: INFO: Dialog ended, delete keys from dialogs htable starting with 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI Apr 12 10:19:09 customers /usr/sbin/kamailio[22785]: NOTICE: dialog [dlg_hash.c:245]: dlg_clean_run(): dialog in delete state is too old (0x7fde1fec6ff0 ref 4) Apr 12 10:19:11 customers /usr/sbin/kamailio[22794]: CRITICAL: <core> [pass_fd.c:277]: receive_fd(): EOF on 20 Apr 12 10:19:12 customers /usr/sbin/kamailio[22774]: INFO: Dialog ended, delete keys from dialogs htable starting with 84253NWFkZmFjZTExM2Y4ZDBjNDNhMGZlZjQ5M2UxZWNmOTI Apr 12 10:19:16 customers /usr/sbin/kamailio[22765]: ALERT: <core> [main.c:740]: handle_sigs(): child process 22773 exited by a signal 11 Apr 12 10:19:16 customers /usr/sbin/kamailio[22765]: ALERT: <core> [main.c:743]: handle_sigs(): core was generated Apr 12 10:19:16 customers /usr/sbin/kamailio[22765]: INFO: <core> [main.c:755]: handle_sigs(): terminating due to SIGCHLD Apr 12 10:19:16 customers /usr/sbin/kamailio[22788]: INFO: <core> [main.c:810]: sig_usr(): signal 15 received
```
#### SIP Traffic
<!-- If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
``` (paste your sip traffic here) ```
### Possible Solutions
<!-- If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix. -->
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
``` version: kamailio 4.4.5 (x86_64/linux) flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: unknown compiled with gcc 4.9.2
```
* **Operating System**:
<!-- Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...; Kernel details (output of `uname -a`) -->
``` Linux customers 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u2 (2016-10-19) x86_64 GNU/Linux ```