### Description
We have a Kamailio running with a sipcapture module, then handling everything in app_lua and writing some information to a redis server. This Kamailio crashed after running for about a day.
### Troubleshooting
#### Debugging Data
This is the gdb output of bt full:
``` GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1 Copyright (C) 2014 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: http://www.gnu.org/software/gdb/bugs/. Find the GDB manual and other documentation resources online at: http://www.gnu.org/software/gdb/documentation/. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/98/6903c27311ebc3717be5ca53d70d130c092eea.debug...done. done. [New LWP 120921] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio_li_sniffer.pid -f /etc/kamaili'. Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007ff05e2d5c3a in strlen () from /lib/x86_64-linux-gnu/libc.so.6 #0 0x00007ff05e2d5c3a in strlen () from /lib/x86_64-linux-gnu/libc.so.6 No symbol table info available. #1 0x00007ff05783f2aa in redisvFormatCommand () from /usr/lib/x86_64-linux-gnu/libhiredis.so.0.10 No symbol table info available. #2 0x00007ff0578400a2 in redisvAppendCommand () from /usr/lib/x86_64-linux-gnu/libhiredis.so.0.10 No symbol table info available. #3 0x00007ff057840289 in redisvCommand () from /usr/lib/x86_64-linux-gnu/libhiredis.so.0.10 No symbol table info available. #4 0x00007ff057a4d6ac in redisc_exec (srv=0x7ffd7df680d0, res=0x7ffd7df680f0, cmd=0x7ffd7df680e0) at redis_client.c:402 rsrv = 0x7ff05d2bdba0 rpl = 0x7ff05d2eb020 c = 0 '\000' ap = {{gp_offset = 40, fp_offset = 48, overflow_arg_area = 0x7ffd7df680a0, reg_save_area = 0x7ffd7df67fb0}} ap2 = {{gp_offset = 24, fp_offset = 48, overflow_arg_area = 0x7ffd7df680a0, reg_save_area = 0x7ffd7df67fb0}} __FUNCTION__ = "redisc_exec" #5 0x00007ff057a51156 in w_redis_cmd3 (msg=0x7ff05d30ca28, ssrv=0x7ff05d2d6088 "p\270-]\360\177", scmd=0x7ff05d2d61b0 "\360\237-]\360\177", sres=0x7ff05d2d62d8 "\030z-]\360\177") at ndb_redis_mod.c:160 s = {{s = 0x7ff05d2db870 "liRedis", len = 7}, { s = 0x7ff05d2a00a0 "SETEX ACTIVECHANNELS_swp3pvm7jqpnu6ixphj1jc7c24@sipgate.de 21600 \n%swp3pvm7jqpnu6ixphj1jc7c24@sipgate.de\022\n2457742e16\032\n4923256980"%swp3pvm7jqpnu6ixphj1jc7c24@sipgate.de", len = 167}, { s = 0x7ff05d2d7a18 "r", len = 1}} __FUNCTION__ = "w_redis_cmd3" #6 0x000000000045ceac in do_action (h=0x7ffd7df68800, a=0x7ff05d2d6f78, msg=0x7ff05d30ca28) at core/action.c:1072 ret = -5 v = 1583322656 dst = {send_sock = 0x770000006e, to = {s = {sa_family = 38432, sa_data = "_^\360\177\000\000\060\217\000\000\000\000\000"}, sin = {sin_family = 38432, sin_port = 24159, sin_addr = {s_addr = 32752}, sin_zero = "0\217\000\000\000\000\000"}, sin6 = {sin6_family = 38432, sin6_port = 24159, sin6_flowinfo = 32752, sin6_addr = {__in6_u = {__u6_addr8 = "0\217\000\000\000\000\000\000 \226_^\360\177\000", __u6_addr16 = {36656, 0, 0, 0, 38432, 24159, 32752, 0}, __u6_addr32 = {36656, 0, 1583322656, 32752}}}, sin6_scope_id = 3}}, id = 0, proto = -104 '\230', send_flags = {f = 191 '\277', blst_imask = 241 '\361'}} tmp = 0x1ef559c "" new_uri = 0x0 end = 0x0 crt = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff> cmd = 0x7ff05d2b9940 len = 131296 user = 0 uri = {user = {s = 0x7ffd7df68530 "\220\207\366}\375\177", len = 0}, passwd = {s = 0x7ffd7df68430 " ", len = 32620272}, host = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 2113307744}, port = { s = 0x7ffd7df684b0 "\330\204\366}\375\177", len = 32620440}, params = {s = 0x7c <error: Cannot access memory at address 0x7c>, len = 0}, sip_params = {s = 0x770000006e <error: Cannot access memory at address 0x770000006e>, len = 31080512}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1583322656}, port_no = 16480, proto = 474, type = ERROR_URI_T, flags = (unknown: 32462272), transport = { s = 0x20 <error: Cannot access memory at address 0x20>, len = 1580005056}, ttl = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 240}, user_param = {s = 0x7ff05e5f9620 "", len = 1583322656}, maddr = { s = 0x9 <error: Cannot access memory at address 0x9>, len = 0}, method = {s = 0x7ff057842acf "", len = 0}, lr = {s = 0x0, len = 1580007456}, r2 = {s = 0x7ffd7df684d8 "0\205\366}\375\177", len = -24651520}, gr = {s = 0x0, len = 33205536}, transport_val = {s = 0x7ffd7df68570 "\377\377\377\177", len = 2113307952}, ttl_val = {s = 0x7ffd7df68618 "", len = 1579810305}, user_param_val = {s = 0x32 <error: Cannot access memory at address 0x32>, len = 2113310080}, maddr_val = {s = 0x7ffd7df68790 "", len = 1579814957}, method_val = {s = 0x7ffd7df68628 "", len = 1579810305}, lr_val = {s = 0x7ffd7df68731 "\206\366}\375\177", len = 2113310080}, r2_val = { s = 0x7ffd7df68790 "", len = -24651520}, gr_val = {s = 0x3000000030 <error: Cannot access memory at address 0x3000000030>, len = 32418038}} next_hop = {user = {s = 0x1eea8f6 "", len = 32418028}, passwd = {s = 0x0, len = 10}, host = {s = 0x7fffffff <error: Cannot access memory at address 0x7fffffff>, len = 1375378619}, port = { s = 0x3 <error: Cannot access memory at address 0x3>, len = 48}, params = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 2113309744}, sip_params = {s = 0x1d8ff12 "x", len = 32418038}, headers = { s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 2113308496}, port_no = 43240, proto = 494, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x7ffd7df68730 " \206\366}\375\177", len = 0}, ttl = {s = 0x7ffd7df68630 "", len = 12}, user_param = {s = 0x7ff000000009 <error: Cannot access memory at address 0x7ff000000009>, len = 2113308256}, maddr = {s = 0x7ffd7df686b0 "", len = 0}, method = { s = 0x7ffd7df68c5c "", len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x3ff0000000000000 <error: Cannot access memory at address 0x3ff0000000000000>, len = 1579812146}, gr = { s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 2113308528}, transport_val = {s = 0x0, len = 2}, ttl_val = {s = 0xe00000067 <error: Cannot access memory at address 0xe00000067>, len = 1}, user_param_val = {s = 0x13 <error: Cannot access memory at address 0x13>, len = 2113307984}, maddr_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2113310080}, method_val = { s = 0x7ffd7df68520 "1\207\366}\375\177", len = 0}, lr_val = {s = 0x7ff05e3b8fea ".", len = 2113307992}, r2_val = {s = 0x0, len = 2113307958}, gr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 4}} u = 0x1ef5597 port = 24159 dst_host = 0x0 i = 1583322656 flags = 32752 avp = 0xffffffffffffffff st = {flags = 0, id = 0, name = {n = 91, s = {s = 0x5b <error: Cannot access memory at address 0x5b>, len = -1}, re = 0x5b}, avp = 0x0} sct = 0x60 sjt = 0x0 rve = 0x0 mct = 0x0 rv = 0x1ef5597 rv1 = 0x0 c1 = {cache_type = 5, val_type = RV_NONE, c = {avp_val = {n = 2113309744, s = {s = 0x7ffd7df68c30 "", len = 30998297}, re = 0x7ffd7df68c30}, pval = {rs = {s = 0x7ffd7df68c30 "", len = 30998297}, ri = 32418038, flags = 0}}, i2s = "\000\000\000\000\000\000\000\000\000\177\360\001\006\000\000\000\350\250\356\001\000"} s = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 112} srevp = {0xffffffffffffffff, 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #7 0x0000000000469afa in run_actions (h=0x7ffd7df68800, a=0x7ff05d2d6f78, msg=0x7ff05d30ca28) at core/action.c:1552 t = 0x7ff05d2d6f78 ret = -1 mod = 0x7ff057c7d3cd ms = 0 __FUNCTION__ = "run_actions" #8 0x000000000046a1b1 in run_actions_safe (h=0x7ffd7df6aee0, a=0x7ff05d2d6f78, msg=0x7ff05d30ca28) at core/action.c:1620 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140670332234288, 1667728728683687988, 4291248, 140726716774352, 0, 0, 1667728728687882292, -1666880443433635788}, __mask_was_saved = 0, __saved_mask = { __val = {140724603453440, 0, 140668768878606, 0, 0, 0, 0, 18446744073709551615, 140670348687719, 30759624, 140670348687770, 6, 140670241592264, 47260797760, 140724603453441, 140670241592269}}}}} ret = 32765 ign_on_break = 0 #9 0x000000000042dc6f in rval_get_int (h=0x7ffd7df6aee0, msg=0x7ff05d30ca28, i=0x7ffd7df68b54, rv=0x7ff05d2db0d8, cache=0x0) at core/rvalue.c:912 r_avp = 0x7ffd7df689c0 avp_val = {n = 2113309200, s = {s = 0x7ffd7df68a10 "(\312\060]\360\177", len = 133}, re = 0x7ffd7df68a10} pval = {rs = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 16005432}, ri = 384480, flags = 4} tmp = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 1375346761} s = 0x0 r = 2113309072 ret = 0 destroy_pval = 0 __FUNCTION__ = "rval_get_int" #10 0x0000000000432374 in rval_expr_eval_int (h=0x7ffd7df6aee0, msg=0x7ff05d30ca28, res=0x7ffd7df68b54, rve=0x7ff05d2db0d0) at core/rvalue.c:1906 i1 = 0 i2 = 1 ret = -1 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 1562718224, s = {s = 0x7ff05d253010 "\001", len = 2113309376}, re = 0x7ff05d253010}, pval = {rs = {s = 0x7ff05d253010 "\001", len = 2113309376}, ri = 1533206860, flags = 32752}}, i2s = "n\000\000\000w", '\000' <repeats 14 times>, "\001\000"} c2 = {cache_type = 386872, val_type = RV_NONE, c = {avp_val = {n = 774176, s = {s = 0xbd020 <error: Cannot access memory at address 0xbd020>, len = 777848}, re = 0xbd020}, pval = {rs = { s = 0xbd020 <error: Cannot access memory at address 0xbd020>, len = 777848}, ri = 8, flags = 0}}, i2s = "6\000\000\000\000\000\000\000\000\331\207\376s\325T\271\360\212\366}\375\177"} rv1 = 0x7ffd7df68a80 rv2 = 0x7ff05d253010 __FUNCTION__ = "rval_expr_eval_int" #11 0x00000000004327b9 in rval_expr_eval_int (h=0x7ffd7df6aee0, msg=0x7ff05d30ca28, res=0x7ffd7df68c88, rve=0x7ff05d2da808) at core/rvalue.c:1914 i1 = 0 i2 = 1562718224 ret = -1 c1 = {cache_type = 4291248, val_type = RV_NONE, c = {avp_val = {n = 2113320912, s = {s = 0x7ffd7df6b7d0 "\r", len = 0}, re = 0x7ffd7df6b7d0}, pval = {rs = {s = 0x7ffd7df6b7d0 "\r", len = 0}, ri = 0, flags = 0}}, i2s = "\320\213\366}\375\177\000\000\027\305B\000\000\000\000\000\364\373\350\001\000"} c2 = {cache_type = 2113310080, val_type = 936, c = {avp_val = {n = 1563496992, s = {s = 0x7ff05d311220 "\002", len = 2113309696}, re = 0x7ff05d311220}, pval = {rs = {s = 0x7ff05d311220 "\002", len = 2113309696}, ri = 4376047, flags = 0}}, i2s = "\260zA\000P\000\000\000P\214\366}\375\177\000\000\000\000\000\000\000"} rv1 = 0x1dbe558 rv2 = 0x7ff05d2eea30 __FUNCTION__ = "rval_expr_eval_int" #12 0x000000000045c7c5 in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2dc010, msg=0x7ff05d30ca28) at core/action.c:1030 ret = -5 v = 0 dst = {send_sock = 0x1000000, to = {s = {sa_family = 13192, sa_data = "\364\000\000\000\000\000\220\343\005\000\000\000\000"}, sin = {sin_family = 13192, sin_port = 244, sin_addr = {s_addr = 0}, sin_zero = "\220\343\005\000\000\000\000"}, sin6 = {sin6_family = 13192, sin6_port = 244, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\343\005\000\000\000\000\000x\314\v\000\000\000\000", __u6_addr16 = {58256, 5, 0, 0, 52344, 11, 0, 0}, __u6_addr32 = {385936, 0, 773240, 0}}}, sin6_scope_id = 777848}}, id = 0, proto = 8 '\b', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} tmp = 0x7ff057c6acae "H\205\300u\034H\205\333t\027\276\004" new_uri = 0x0 end = 0x0 crt = 0x1e8fbf4 "24" cmd = 0x7ff05d2c7a70 len = 2113310048 user = 32765 uri = {user = {s = 0x7ffd7df68f80 "", len = 6677782}, passwd = {s = 0x0, len = 0}, host = {s = 0x73e120 "core", len = 2113310720}, port = {s = 0x7ff05d2d89a0 "\001", len = 1563478568}, params = { s = 0x5d311220 <error: Cannot access memory at address 0x5d311220>, len = 0}, sip_params = {s = 0x7ff05d2c8780 "\030\210,]\360\177", len = -24651520}, headers = {s = 0x7ffd7df68f90 " \220\366}\375\177", len = 5981733}, port_no = 936, proto = 0, type = ERROR_URI_T, flags = (unknown: 2113310720), transport = {s = 0x7ff05d2d8988 "\017", len = 1563478568}, ttl = {s = 0x7ff05d311228 "n\025\061]\360\177", len = 0}, user_param = { s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 1563355696}, maddr = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 5989420}, method = {s = 0x0, len = 2113310720}, lr = {s = 0x7ffd7df69020 "P\220\366}\375\177", len = 4399688}, r2 = {s = 0x1ecbd70 "\020\321\334\001", len = 0}, gr = {s = 0x7ff05d2d8980 "\a", len = 2113311192}, transport_val = { s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7ffd7df69040 "(\312\060]\360\177", len = 4398966}, maddr_val = {s = 0x7ffd7df690d0 "", len = 1563259632}, method_val = { s = 0x0, len = 0}, lr_val = {s = 0x0, len = -24651520}, r2_val = {s = 0x7ffd7df69050 "\200\221\366}\375\177", len = 4399820}, gr_val = {s = 0x7ff05d2d8978 "\001", len = 2113311192}} next_hop = {user = {s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, passwd = {s = 0x7ffd7df69180 "\260\222\366}\375\177", len = 4405224}, host = {s = 0x0, len = 30759440}, port = {s = 0x7ffd7df69090 "(\312\060]\360\177", len = 1472711292}, params = {s = 0x7ff05d2d97d8 "!", len = 2113311192}, sip_params = {s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, headers = {s = 0x1d55a10 "\200\065\357\001", len = -24651520}, port_no = 37104, proto = 32246, type = 32765, flags = (unknown: 30759440), transport = {s = 0x7ff05d2d72f0 "\a", len = 1563261728}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x1df8de0 " \273\354\001", len = 1472632365}, method = {s = 0x1d55a10 "\200\065\357\001", len = 30759440}, lr = {s = 0x1df8de0 " \273\354\001", len = 1472620846}, r2 = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 30759440}, gr = { s = 0x7ff057c62030 "\213V\bH\213\066\351\225U", len = 2113311360}, transport_val = {s = 0x0, len = -24651520}, ttl_val = {s = 0xe8de0e2342a7b034 <error: Cannot access memory at address 0xe8de0e2342a7b034>, len = 1563355696}, user_param_val = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 2113320912}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x7ffd7df692b0 "\200\230\366}\375\177", len = 4401525}, lr_val = {s = 0x1f07f00 "\020]\337\001", len = 4291248}, r2_val = {s = 0x7ffd7df6b7d0 "\r", len = 1563355696}, gr_val = {s = 0x7ff05d2d90a8 "\017", len = 2113311496}} u = 0x2 port = 0 dst_host = 0x7ff05d30ca28 i = 1472702157 flags = 0 avp = 0x7ffd7df68e30 st = {flags = 2113310352, id = 32765, name = {n = 1533206860, s = {s = 0x7ff05b62e14c <pkg_proc_update_stats+130> "H\213\r\225M ", len = 2113310544}, re = 0x7ff05b62e14c <pkg_proc_update_stats+130>}, avp = 0x0} sct = 0xb954d573fe87d900 sjt = 0x7ffd7df68e70 rve = 0x7ff05d2da808 mct = 0x664969 <qm_info+46> rv = 0x1f0ec00 rv1 = 0x7ffd7df690d8 c1 = {cache_type = 55, val_type = RV_NONE, c = {avp_val = {n = -24651520, s = {s = 0xb954d573fe87d900 <error: Cannot access memory at address 0xb954d573fe87d900>, len = 2113310400}, re = 0xb954d573fe87d900}, pval = {rs = { s = 0xb954d573fe87d900 <error: Cannot access memory at address 0xb954d573fe87d900>, len = 2113310400}, ri = 4842663, flags = 0}}, i2s = "\000\000\000\000\000\000\000\000@z{\000\005\000\000\000\200c%]\360\177"} s = {s = 0x7ffd7df68e50 "", len = 1562718224} srevp = {0x7ff05d2d72f8, 0x7ff05d253010} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #13 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2dc010, msg=0x7ff05d30ca28) at core/action.c:1552 t = 0x7ff05d2dc010 ret = -1 mod = 0xb954d573fe87d900 ms = 0 __FUNCTION__ = "run_actions" #14 0x000000000045cc6c in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2deab8, msg=0x7ff05d30ca28) at core/action.c:1045 ret = 1 v = 1 dst = {send_sock = 0x2020200a2922676e, to = {s = {sa_family = 8224, sa_data = " end\n pos"}, sin = {sin_family = 8224, sin_port = 25888, sin_addr = {s_addr = 537551982}, sin_zero = " pos"}, sin6 = {sin6_family = 8224, sin6_port = 25888, sin6_flowinfo = 537551982, sin6_addr = {__in6_u = {__u6_addr8 = " posix.close", __u6_addr16 = {8224, 8224, 28704, 29551, 30825, 25390, 28524, 25971}, __u6_addr32 = {538976288, 1936683040, 1663989865, 1702063980}}}, sin6_scope_id = 1701980192}}, id = 1717527649, proto = 40 '(', send_flags = {f = 202 '\312', blst_imask = 48 '0'}} tmp = 0x206c696e203d3d20 <error: Cannot access memory at address 0x206c696e203d3d20> new_uri = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s" end = 0x7ffd7df6b7d0 "\r" crt = 0x7ff05d2cb210 "handle_packet" cmd = 0x7ff05d2b3568 len = 538976288 user = 538976288 uri = {user = {s = 0x665f65706970202c <error: Cannot access memory at address 0x665f65706970202c>, len = 539568494}, passwd = {s = 0x7720657372756365 <error: Cannot access memory at address 0x7720657372756365>, len = 543716457}, host = {s = 0x726120676e696e69 <error: Cannot access memory at address 0x726120676e696e69>, len = 1701672295}, port = {s = 0x65736c6520202020 <error: Cannot access memory at address 0x65736c6520202020>, len = 539831584}, params = { s = 0x65636f727020746e <error: Cannot access memory at address 0x65636f727020746e>, len = 537555827}, sip_params = {s = 0x74735f6576617320 <error: Cannot access memory at address 0x74735f6576617320>, len = 1953853284}, headers = {s = 0x7075642e7869736f <error: Cannot access memory at address 0x7075642e7869736f>, len = 1869621280}, port_no = 21587, proto = 20292, type = 1180652629, flags = (URI_USER_NORMALIZE | unknown: 1313164360), transport = { s = 0x2066692020202020 <error: Cannot access memory at address 0x2066692020202020>, len = 544501614}, ttl = {s = 0x2074756f6474735f <error: Cannot access memory at address 0x2074756f6474735f>, len = 1852139636}, user_param = { s = 0x6569642020202020 <error: Cannot access memory at address 0x6569642020202020>, len = 1696737312}, maddr = {s = 0x676e692d70756420 <error: Cannot access memory at address 0x676e692d70756420>, len = 537536802}, method = { s = 0x2020200a646e6520 <error: Cannot access memory at address 0x2020200a646e6520>, len = 1763713056}, lr = {s = 0x2e7869736f702074 <error: Cannot access memory at address 0x2e7869736f702074>, len = 846230884}, r2 = { s = 0x202c64665f657469 <error: Cannot access memory at address 0x202c64665f657469>, len = 1769172848}, gr = {s = 0x4c49465f54554f44 <error: Cannot access memory at address 0x4c49465f54554f44>, len = 693063237}, transport_val = { s = 0x2020202020200a6e <error: Cannot access memory at address 0x2020202020200a6e>, len = 1768169504}, ttl_val = {s = 0x756420726f727265 <error: Cannot access memory at address 0x756420726f727265>, len = 1764569712}, user_param_val = {s = 0x652020202020200a <error: Cannot access memory at address 0x652020202020200a>, len = 537551982}, maddr_val = {s = 0x632e7869736f7020 <error: Cannot access memory at address 0x632e7869736f7020>, len = 1702063980}, method_val = {s = 0x7ff05d2b94c0 "\267\344\360W\360\177", len = 538976288}, lr_val = {s = 0x65736f6c632e7869 <error: Cannot access memory at address 0x65736f6c632e7869>, len = 1920411680}, r2_val = { s = 0x202020200a296466 <error: Cannot access memory at address 0x202020200a296466>, len = 174354021}, gr_val = {s = 0x636f6c20200a0a64 <error: Cannot access memory at address 0x636f6c20200a0a64>, len = 1914727521}} next_hop = {user = {s = 0x6e776170732e4d20 <error: Cannot access memory at address 0x6e776170732e4d20>, len = 1534339104}, passwd = {s = 0x746f6e2066692020 <error: Cannot access memory at address 0x746f6e2066692020>, len = 1952805408}, host = {s = 0x6964202020200a6e <error: Cannot access memory at address 0x6964202020200a6e>, len = 573055077}, port = {s = 0x726f66206e692072 <error: Cannot access memory at address 0x726f66206e692072>, len = 1919885419}, params = {s = 0x6e6520200a292274 <error: Cannot access memory at address 0x6e6520200a292274>, len = 538970724}, sip_params = {s = 0x2065736f6c632e78 <error: Cannot access memory at address 0x2065736f6c632e78>, len = 1936683048}, headers = {s = 0xb554f4454 <error: Cannot access memory at address 0xb554f4454>, len = 1563353520}, port_no = 26912, proto = 8294, type = 1042314275, flags = (unknown: 1563353528), transport = { s = 0x7ff05d2eea30 "\034d\036Z]\025\r", len = 4291248}, ttl = {s = 0x7ffd7df69790 "\320\227\366}\375\177", len = 4522002}, user_param = {s = 0x6961772e7869736f <error: Cannot access memory at address 0x6961772e7869736f>, len = 1881677940}, maddr = {s = 0x7ff05d2ee1b0 "172.20.40.5", len = 10717792}, method = {s = 0x297075642e <error: Cannot access memory at address 0x297075642e>, len = 1563476872}, lr = { s = 0x7ffd7df697d0 "\020\230\366}\375\177", len = 4525774}, r2 = {s = 0x7ffd7df698e0 "", len = 2113312832}, gr = {s = 0x2065696420202020 <error: Cannot access memory at address 0x2065696420202020>, len = 1563476872}, transport_val = {s = 0x7ff05d30c3b0 "", len = 1563478568}, ttl_val = {s = 0x7ffd7df69810 "`\230\366}\375\177", len = 4528003}, user_param_val = {s = 0x7ff05d2c9478 "\310\246+]\360\177", len = 2113312992}, maddr_val = { s = 0x7ffd7df69840 "", len = 2113312816}, method_val = {s = 0x646e650a74657220 <error: Cannot access memory at address 0x646e650a74657220>, len = 1563476912}, lr_val = {s = 0x7ffd7df69860 "\260zA", len = 1463997149}, r2_val = { s = 0x66726550202d0056 <error: Cannot access memory at address 0x66726550202d0056>, len = 2113312992}, gr_val = {s = 0x7ffd7df69860 "\260zA", len = 1463997228}} u = 0xd port = 0 dst_host = 0x7ff05d2eea30 i = 1646403616 flags = 170664549 avp = 0x6620726f72726522 st = {flags = 1563206568, id = 32752, name = {n = 1563478568, s = {s = 0x7ff05d30ca28 "\243\221d", len = 2113313424}, re = 0x7ff05d30ca28}, avp = 0x45cd85 <do_action+31624>} sct = 0x0 sjt = 0x7ffd7df694c0 rve = 0x7ff05d2d90a8 mct = 0x7ff057e9815f <w_app_lua_run0+60> rv = 0x6469702066692020 rv1 = 0xb954d573fe87d900 c1 = {cache_type = 1563209688, val_type = 32752, c = {avp_val = {n = 2113313664, s = {s = 0x7ffd7df69b80 "", len = 1600484457}, re = 0x7ffd7df69b80}, pval = {rs = {s = 0x7ffd7df69b80 "", len = 1600484457}, ri = 538976288, flags = 1936662560}}, i2s = ".exit (pipeline (list."} s = {s = 0x6461657228203270 <error: Cannot access memory at address 0x6461657228203270>, len = 0} srevp = {0x7ff05d30ca28, 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #15 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2d6828, msg=0x7ff05d30ca28) at core/action.c:1552 t = 0x7ff05d2deab8 ret = 1 mod = 0xb954d573fe87d900 ms = 0 __FUNCTION__ = "run_actions" #16 0x000000000045958d in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2cdb18, msg=0x7ff05d30ca28) at core/action.c:678 ret = -5 v = 1948786802 dst = {send_sock = 0x24, to = {s = {sa_family = 51752, sa_data = "0]\360\177\000\000\330\257,]\360\177\000"}, sin = {sin_family = 51752, sin_port = 23856, sin_addr = {s_addr = 32752}, sin_zero = "\330\257,]\360\177\000"}, sin6 = { sin6_family = 51752, sin6_port = 23856, sin6_flowinfo = 32752, sin6_addr = {__in6_u = {__u6_addr8 = "\330\257,]\360\177\000\000\340\256\366}\375\177\000", __u6_addr16 = {45016, 23852, 32752, 0, 44768, 32246, 32765, 0}, __u6_addr32 = {1563209688, 32752, 2113318624, 32765}}}, sin6_scope_id = 2}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} tmp = 0x0 new_uri = 0x7ff05d30ca28 "\243\221d" end = 0x17df6aee0 <error: Cannot access memory at address 0x17df6aee0> crt = 0x2030203d00000005 <error: Cannot access memory at address 0x2030203d00000005> cmd = 0x7ff000000000 len = 1717527920 user = 537536878 uri = {user = {s = 0x1724f6716c27b034 <error: Cannot access memory at address 0x1724f6716c27b034>, len = 1981263924}, passwd = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 1562718224}, host = { s = 0x7ffd7df69d70 "\200\345,]\360\177", len = 1562718224}, port = {s = 0x7ffd7df69c50 "\200\234\366}\375\177", len = 1533206860}, params = {s = 0x7ffd7df69d70 "\200\345,]\360\177", len = 0}, sip_params = { s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 16004968}, headers = {s = 0x5dfb0 <error: Cannot access memory at address 0x5dfb0>, len = 772248}, port_no = 56952, proto = 11, type = ERROR_URI_T, flags = (unknown: 8), transport = {s = 0x41 <error: Cannot access memory at address 0x41>, len = -24651520}, ttl = {s = 0x7ffd7df69c80 "@\235\366}\375\177", len = -24651520}, user_param = { s = 0x7ffd7df69d50 "\300\235\366}\375\177", len = 4381807}, maddr = {s = 0x7ff05d2ee268 "\020", len = 0}, method = {s = 0x7ffd7df69d40 "pz,]\360\177", len = 0}, lr = {s = 0x7ff05d2cb6f8 "\004", len = 2113314516}, r2 = { s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, gr = {s = 0x7ffd7df69d20 "\230\345,]\360\177", len = 0}, transport_val = {s = 0x7ff05d2ee1b0 "172.20.40.5", len = 2113314288}, ttl_val = {s = 0x0, len = 1563478568}, user_param_val = {s = 0x8968 <error: Cannot access memory at address 0x8968>, len = 2113314352}, maddr_val = {s = 0x7ff05d2ccf70 "\001", len = 1563478568}, method_val = {s = 0x7ffd7df69d50 "\300\235\366}\375\177", len = 1520823051}, lr_val = {s = 0x0, len = 2113314352}, r2_val = {s = 0x7ff05d2ce598 "\001", len = 1563478568}, gr_val = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 0}} next_hop = {user = {s = 0x7ff05d2c7a70 "\b{,]\360\177", len = -24651520}, passwd = {s = 0x7ffd7df69dc0 "P\236\366}\375\177", len = 5981733}, host = {s = 0x0, len = 2113314352}, port = {s = 0x7ff05d2ce580 "\017", len = 1563478568}, params = {s = 0x7ff05d2cb6f0 "\001", len = 0}, sip_params = {s = 0x7ff05d30ca28 "\243\221d", len = 1563355696}, headers = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 5989420}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 2113314352), transport = {s = 0x7ffd7df69e50 "\200\236\366}\375\177", len = 4399688}, ttl = {s = 0x7ffd00000025 <error: Cannot access memory at address 0x7ffd00000025>, len = 0}, user_param = {s = 0x7ff05d2ce578 "\a", len = 2113314824}, maddr = {s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, method = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -24651520}, lr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1397494312}, r2 = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 2113320912}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x0, len = -24651520}, ttl_val = {s = 0x7ffd7df69e80 "\260\237\366}\375\177", len = 4399820}, user_param_val = {s = 0x7ff05d2ce570 "\001", len = 2113314824}, maddr_val = {s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, method_val = {s = 0x7ffd7df69fb0 "\200\245\366}\375\177", len = 4405224}, lr_val = {s = 0x6d80 <error: Cannot access memory at address 0x6d80>, len = 2113314608}, r2_val = {s = 0x7ff05d2c9398 "\017", len = 28}, gr_val = { s = 0x7ff05d2cf3d0 "!", len = 2113314824}} u = 0x207000 port = 25972 dst_host = 0x7ffd7df69b80 i = 4 flags = 1768955948 avp = 0x209000 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 2113313888}, re = 0x0}, avp = 0x46a1b1 <run_actions_safe+169>} sct = 0x2020202000000030 sjt = 0x0 rve = 0x7ff05d2cafd8 mct = 0x5b rv = 0x78e8 rv1 = 0x7ff05d30ca28 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 1, s = {s = 0x7ff000000001 <error: Cannot access memory at address 0x7ff000000001>, len = 1563355696}, re = 0x7ff000000001}, pval = {rs = { s = 0x7ff000000001 <error: Cannot access memory at address 0x7ff000000001>, len = 1563355696}, ri = 1877454900, flags = 388298353}}, i2s = "\260zA\000\000\000\000\000\320\267\366}\375\177\000\000\000\000\000\000\000"} s = {s = 0x0, len = 1563355696} srevp = {0x417ab0 <_start>, 0x7ffd7df6b7d0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #17 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2cdb18, msg=0x7ff05d30ca28) at core/action.c:1552 t = 0x7ff05d2cdb18 ret = -1 mod = 0xb954d573fe87d900 ms = 0 __FUNCTION__ = "run_actions" #18 0x000000000045cc6c in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2cdc68, msg=0x7ff05d30ca28) at core/action.c:1045 ret = 1 v = 1 dst = {send_sock = 0x7ff051355f71, to = {s = {sa_family = 45108, sa_data = "\347\033q\366$\027\064\260EL\331\260>\027"}, sin = {sin_family = 45108, sin_port = 7143, sin_addr = {s_addr = 388298353}, sin_zero = "4\260EL\331\260>\027"}, sin6 = {sin6_family = 45108, sin6_port = 7143, sin6_flowinfo = 388298353, sin6_addr = {__in6_u = {__u6_addr8 = "4\260EL\331\260>\027\000\000\000\000\000\000\000", __u6_addr16 = {45108, 19525, 45273, 5950, 0, 0, 0, 0}, __u6_addr32 = {1279635508, 389984473, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 104 'h', send_flags = {f = 170 '\252', blst_imask = 231 '\347'}} tmp = 0x0 new_uri = 0x7ffd7df6a380 "\360\314\343\001" end = 0x0 crt = 0x1d08580 "" cmd = 0x7ff05d2b3568 len = 7 user = 0 uri = {user = {s = 0x7ffd7df6a400 "", len = 1580671501}, passwd = {s = 0x0, len = 0}, host = {s = 0x7ffd7df6a100 "0\242\366}\375\177", len = 2113585744}, port = { s = 0x2000000000 <error: Cannot access memory at address 0x2000000000>, len = 0}, params = {s = 0x0, len = 30427152}, sip_params = {s = 0x7ffd7df6a250 "", len = 1362444288}, headers = {s = 0x7ff051359358 "HF!", len = 31958800}, port_no = 7, proto = 0, type = ERROR_URI_T, flags = (URI_SIP_USER_PHONE | unknown: 1587695352), transport = {s = 0x1e7a710 "", len = 1587696341}, ttl = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1587686988}, user_param = {s = 0x0, len = -2009157508}, maddr = {s = 0x1e35b60 "", len = 2113317104}, method = {s = 0x7ff05e3b91c4 "[%d]", len = 1580962247}, lr = {s = 0x0, len = 1579802473}, r2 = {s = 0x7ff05e257d28 "", len = 1579538456}, gr = {s = 0x7ffd7df6a480 "\200v\354\001", len = 35715777}, transport_val = {s = 0x7ffd7df6a450 " \221;^\360\177", len = 31959656}, ttl_val = {s = 0x0, len = 1589831120}, user_param_val = { s = 0x7ff05e29f99a <vfprintf+22490> "\200\275(\373\377\377", len = 4253399}, maddr_val = {s = 0x7ff05e264d78 "", len = 4210936}, method_val = {s = 0x1e3ccf0 "", len = 2113317248}, lr_val = {s = 0x7ff05e3b91c4 "[%d]", len = 1580962247}, r2_val = {s = 0x0, len = 1579802473}, gr_val = {s = 0x1d859 <error: Cannot access memory at address 0x1d859>, len = 10}} next_hop = {user = {s = 0x7ffd7df6a510 "", len = 1579983518}, passwd = {s = 0x1e35b60 "", len = 2113317328}, host = {s = 0x7c7a7f "%s: %s%s(): bad cseq\n", len = 8157831}, port = { s = 0x7ff05e29f99a <vfprintf+22490> "\200\275(\373\377\377", len = 1579802473}, params = {s = 0x0, len = 0}, sip_params = {s = 0x7ffd7df6a560 "\260zA", len = 1579809178}, headers = {s = 0x0, len = 1579809178}, port_no = 0, proto = 0, type = 32765, flags = (URI_SIP_USER_PHONE | unknown: 4294967288), transport = {s = 0x1d859 <error: Cannot access memory at address 0x1d859>, len = 10}, ttl = {s = 0x7ff05e3b9120 " != ((void *)0)", len = 1579983518}, user_param = {s = 0x1e3ccf0 "", len = 2113317472}, maddr = {s = 0x7d4720 "%s: %s%s(): bad cseq\n", len = 8210216}, method = {s = 0x1ec7680 " \206\330\001", len = 2113317504}, lr = {s = 0x7ff05e3b91c4 "[%d]", len = 1580962247}, r2 = {s = 0x0, len = 1579802473}, gr = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 1579809178}, transport_val = {s = 0x7ffd7df6a610 "\260zA", len = 1580962245}, ttl_val = { s = 0x7ffd7df6a5c0 "p\241,]\360\177", len = 8}, user_param_val = {s = 0x7ff05e3b91c8 "", len = 0}, maddr_val = {s = 0x7ff05e29f99a <vfprintf+22490> "\200\275(\373\377\377", len = 10}, method_val = { s = 0xa726f7200000005 <error: Cannot access memory at address 0xa726f7200000005>, len = 1579809178}, lr_val = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 0}, r2_val = { s = 0xb00000000 <error: Cannot access memory at address 0xb00000000>, len = 0}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1513578687}} u = 0x7ff051355cb0 port = 4391 dst_host = 0x1000000bd i = 144 flags = 0 avp = 0x7ff057c5cb90 st = {flags = 1, id = 32765, name = {n = 0, s = {s = 0x0, len = 1}, re = 0x0}, avp = 0x1e7a710} sct = 0x1e7aa68 sjt = 0x7ffd7df6a380 rve = 0x7ff05d2cf3d0 mct = 0x1e7a710 rv = 0x0 rv1 = 0x7ff051355670 c1 = {cache_type = 31961328, val_type = RV_NONE, c = {avp_val = {n = 2113315360, s = {s = 0x7ffd7df6a220 "\377\377\377\377", len = 1}, re = 0x7ffd7df6a220}, pval = {rs = {s = 0x7ffd7df6a220 "\377\377\377\377", len = 1}, ri = 1362451632, flags = 32752}}, i2s = "\377\377\377\377\000\000\000\000\020\247\347\001\000\000\000\000\210\307\305W\360\177"} s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1587689837} srevp = {0x0, 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #19 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2ca170, msg=0x7ff05d30ca28) at core/action.c:1552 t = 0x7ff05d2cdc68 ret = 1 mod = 0x0 ms = 0 __FUNCTION__ = "run_actions" #20 0x000000000045958d in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2c4920, msg=0x7ff05d30ca28) at core/action.c:678 ret = -5 v = 20 dst = {send_sock = 0x1000000, to = {s = {sa_family = 15624, sa_data = "\364\000\000\000\000\000\020\332\005\000\000\000\000"}, sin = {sin_family = 15624, sin_port = 244, sin_addr = {s_addr = 0}, sin_zero = "\020\332\005\000\000\000\000"}, sin6 = {sin6_family = 15624, sin6_port = 244, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\020\332\005\000\000\000\000\000\370\302\v\000\000\000\000", __u6_addr16 = { 55824, 5, 0, 0, 49912, 11, 0, 0}, __u6_addr32 = {383504, 0, 770808, 0}}}, sin6_scope_id = 777848}}, id = 0, proto = 105 'i', send_flags = {f = 73 'I', blst_imask = 102 'f'}} tmp = 0x1ff4 <error: Cannot access memory at address 0x1ff4> new_uri = 0x1d0f0b0 "CET" end = 0x7ffd7df6a830 "\220\250\366}\375\177" crt = 0x6 <error: Cannot access memory at address 0x6> cmd = 0x7ff05d2b3568 len = 0 user = 0 uri = {user = {s = 0x7ffd7df6a900 "", len = 1562718224}, passwd = {s = 0x40005d8b0 <error: Cannot access memory at address 0x40005d8b0>, len = 1562718224}, host = {s = 0x7ffd7df6a940 "p\251\366}\375\177", len = 1533206860}, port = { s = 0x7ffd7df6a9e0 "\300\250.]\360\177", len = 0}, params = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 16005136}, sip_params = {s = 0x5df08 <error: Cannot access memory at address 0x5df08>, len = 772080}, headers = {s = 0xbde78 <error: Cannot access memory at address 0xbde78>, len = 8}, port_no = 67, proto = 0, type = ERROR_URI_T, flags = (unknown: 4270315776), transport = {s = 0x7ffd7df6a970 " \252\366}\375\177", len = 4842663}, ttl = {s = 0x0, len = 8092224}, user_param = {s = 0x7ffd7df6aa20 "0\253\366}\375\177", len = 0}, maddr = {s = 0x7ffd7df6aa20 "0\253\366}\375\177", len = 6671236}, method = { s = 0x40005dc00 <error: Cannot access memory at address 0x40005dc00>, len = 8189744}, lr = {s = 0x7cd200 "core", len = -24651520}, r2 = {s = 0x7cf090 <__FUNCTION__.6198> "parse_to_param", len = 8181208}, gr = { s = 0x30 <error: Cannot access memory at address 0x30>, len = 1562718224}, transport_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 1}, ttl_val = {s = 0x7ffd7df6aa90 " \254\366}\375\177", len = 1562718224}, user_param_val = {s = 0x7ff05d2ea8c0 "0", len = -24651520}, maddr_val = {s = 0x7ffd7df6aadb "]\360\177", len = 1563355696}, method_val = {s = 0x400417ab0 <error: Cannot access memory at address 0x400417ab0>, len = 8180224}, lr_val = {s = 0x0, len = -24651520}, r2_val = {s = 0x7ffd7df6ab30 "@", len = 6919225}, gr_val = {s = 0x800000000 <error: Cannot access memory at address 0x800000000>, len = 1}} next_hop = {user = {s = 0x0, len = 2113317744}, passwd = {s = 0x5d30f1e8 <error: Cannot access memory at address 0x5d30f1e8>, len = 1563487888}, host = {s = 0xa39866 <buf+1254> "", len = 10720755}, port = { s = 0x400417ab0 <error: Cannot access memory at address 0x400417ab0>, len = 351336240}, params = {s = 0x1d <error: Cannot access memory at address 0x1d>, len = 10720488}, sip_params = {s = 0x7ffd7df6ac20 "0\255\366}\375\177", len = 7028980}, headers = {s = 0x0, len = 8092224}, port_no = 43888, proto = 32246, type = 32765, flags = (URI_USER_NORMALIZE | unknown: 6703464), transport = {s = 0x7ffd7df6ab00 "", len = 1562718224}, ttl = { s = 0xa3964a <buf+714> "low: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE\r\nSupported: replaces\r\nContact: sip:4923256980@217.10.77.115:5060\r\nContent-Type: application/sdp\r\nContent-Leng"..., len = 1562718224}, user_param = {s = 0x7ffd7df6ab40 "\210\025.]\360\177", len = 1533206860}, maddr = {s = 0x0, len = 0}, method = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 16004952}, lr = { s = 0x5dfc0 <error: Cannot access memory at address 0x5dfc0>, len = 772264}, r2 = {s = 0xbde78 <error: Cannot access memory at address 0xbde78>, len = 8}, gr = {s = 0x40 <error: Cannot access memory at address 0x40>, len = 7124329}, transport_val = {s = 0x7ff05d2e1588 "\001", len = 1563301240}, ttl_val = {s = 0x0, len = 8092224}, user_param_val = {s = 0x7ffd7df6ac20 "0\255\366}\375\177", len = 1563355696}, maddr_val = { s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 2113320912}, method_val = {s = 0xa39866 <buf+1254> "", len = 10720838}, lr_val = {s = 0x7ffd7df6ac20 "0\255\366}\375\177", len = 6839005}, r2_val = {s = 0x7d6faa <__FUNCTION__.6418> "get_hdr_field", len = 1563301216}, gr_val = {s = 0xa39866 <buf+1254> "", len = 10720826}} u = 0x157842ad1 port = 65535 dst_host = 0x7ffd7df6a9cf i = 2 flags = 0 avp = 0x7ffd7df6aa40 st = {flags = 2113317008, id = 32765, name = {n = 1533206860, s = {s = 0x7ff05b62e14c <pkg_proc_update_stats+130> "H\213\r\225M ", len = 6}, re = 0x7ff05b62e14c <pkg_proc_update_stats+130>}, avp = 0x0} sct = 0x7ff000000001 sjt = 0x7ffd7df6aee2 rve = 0x7ff05e5f7300 mct = 0x664969 <qm_info+46> rv = 0x7ffd00000000 rv1 = 0x7ffd7df6a810 c1 = {cache_type = 2113317056, val_type = 32765, c = {avp_val = {n = 1562718224, s = {s = 0x7ff05d253010 "\001", len = 2113317056}, re = 0x7ff05d253010}, pval = {rs = {s = 0x7ff05d253010 "\001", len = 2113317056}, ri = 1562718224, flags = 32752}}, i2s = "\000\251\366}\375\177\000\000L\341b[\360\177\000\000p\251\366}\375\177"} s = {s = 0x7ffd7df6a850 "", len = 1562718224} srevp = {0x39327df6ae90, 0x7ff05d253010} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #21 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2c39c0, msg=0x7ff05d30ca28) at core/action.c:1552 t = 0x7ff05d2c4920 ret = 1 mod = 0xb954d57300000000 ms = 0 __FUNCTION__ = "run_actions" #22 0x000000000046a2bd in run_top_route (a=0x7ff05d2c39c0, msg=0x7ff05d30ca28, c=0x7ffd7df6aee0) at core/action.c:1641 ctx = {rec_lev = 1563492736, run_flags = 32752, last_retcode = -24651520, jmp_env = {{__jmpbuf = {4291248, 140670332234288, 4291248, 140726716774352, 0, 0, 140726716727328, 4302026204}, __mask_was_saved = 2113318256, __saved_mask = { __val = {140670302069697, 4294967416, 32, 32, 140670331596816, 140726716771744, 140670302070636, 0, 0, 4611686037170749880, 140670332357160, 140726716771792, 5298061, 12889193136, 140670332357160, 4611686035607257088}}}}} p = 0x7ffd7df6aee0 ret = 32752 sfbk = 0 #23 0x0000000000580a69 in receive_msg ( buf=0xa393f7 <buf+119> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 172.20.40.5;branch=z9hG4bKe877.99be6a0f42b6af42ea04ccf5096212f6.0;received=172.20.40.5\r\nVia: SIP/2.0/UDP 217.10.68.147;branch=z9hG4bKe877.e34c617b86d11387c957efc71c542"..., len=1135, rcv_info=0x7ffd7df6b0f0) at core/receive.c:327 msg = 0x7ff05d30ca28 ctx = {rec_lev = 5, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140670332234288, 1667728727226167348, 4291248, 140726716774352, 0, 0, 1667728727247138868, -1666880443433635788}, __mask_was_saved = 0, __saved_mask = { __val = {140670332234288, 4291248, 140726716774352, 140726716772288, 140670275555975, 140670275624576, 169010473594, 140726716772376, 96052620480, 11417664, 0, 152437174176, 140668768878608, 4291248, 140670332234288, 4291248}}}}} bctx = 0x664969 <qm_info+46> ret = 1 stats_on = 0 tvb = {tv_sec = 140726716772048, tv_usec = 140670331596816} tve = {tv_sec = 140726716772096, tv_usec = 140670331596816} tz = {tz_minuteswest = 9, tz_dsttime = 0} diff = 0 inb = { s = 0xa393f7 <buf+119> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 172.20.40.5;branch=z9hG4bKe877.99be6a0f42b6af42ea04ccf5096212f6.0;received=172.20.40.5\r\nVia: SIP/2.0/UDP 217.10.68.147;branch=z9hG4bKe877.e34c617b86d11387c957efc71c542"..., len = 1135} netinfo = {data = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 0}, dst = 0x1000000, rcv = 0xf44700} keng = 0x0 __FUNCTION__ = "receive_msg" #24 0x00007ff059ce4cdf in parsing_hepv3_message (buf=0xa39380 <buf> "HEP3\004\346", len=1254) at hep.c:499 from = {s = {sa_family = 2, sa_data = "\023\304\331\nMs\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1934428889}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1934428889, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}} to = {s = {sa_family = 2, sa_data = "\023\304\254\024(\005\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 86512812}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 86512812, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}} ri = {src_ip = {af = 2, len = 4, u = {addrl = {140670703307481, 0}, addr32 = {1934428889, 32752, 0, 0}, addr16 = {2777, 29517, 32752, 0, 0, 0, 0, 0}, addr = "\331\nMs\360\177\000\000\000\000\000\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {140724689966252, 140726716772656}, addr32 = {86512812, 32765, 2113319216, 32765}, addr16 = {5292, 1320, 32765, 0, 45360, 32246, 32765, 0}, addr = "\254\024(\005\375\177\000\000\060\261\366}\375\177\000"}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 4254168, src_su = {s = {sa_family = 2, sa_data = "\023\304\331\nMs\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = { s_addr = 1934428889}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1934428889, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7ff05d2eaca8, proto = 1 '\001'} tmp = 0xa393f1 <buf+113> "" dst_ip = {af = 2, len = 4, u = {addrl = {140668855391404, 140726716772816}, addr32 = {86512812, 32752, 2113319376, 32765}, addr16 = {5292, 1320, 32752, 0, 45520, 32246, 32765, 0}, addr = "\254\024(\005\360\177\000\000\320\261\366}\375\177\000"}} src_ip = {af = 2, len = 4, u = {addrl = {140670703307481, 1}, addr32 = {1934428889, 32752, 1, 0}, addr16 = {2777, 29517, 32752, 0, 1, 0, 0, 0}, addr = "\331\nMs\360\177\000\000\001\000\000\000\000\000\000"}} si = 0x7ff05d2eaca8 tmp_len = 4 i = 1254 payload = 0xa393f7 <buf+119> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 172.20.40.5;branch=z9hG4bKe877.99be6a0f42b6af42ea04ccf5096212f6.0;received=172.20.40.5\r\nVia: SIP/2.0/UDP 217.10.68.147;branch=z9hG4bKe877.e34c617b86d11387c957efc71c542"... payload_len = 1135 chunk = 0xa393f1 <buf+113> hg = 0x7ff05d2eabb8 totelem = 11 chunk_vendor = 0 chunk_type = 15 chunk_length = 1141 total_length = 1254 __FUNCTION__ = "parsing_hepv3_message" #25 0x00007ff059ce3264 in hepv3_received (buf=0xa39380 <buf> "HEP3\004\346", len=1254, ri=0x7ffd7df6b330) at hep.c:231 __FUNCTION__ = "hepv3_received" #26 0x00007ff059ce19cb in hep_msg_received (data=0x7ffd7df6b310) at hep.c:85 srevp = 0x7ffd7df6b310 buf = 0xa39380 <buf> "HEP3\004\346" len = 0x7ffd7df6b2e4 ri = 0x7ffd7df6b330 __FUNCTION__ = "hep_msg_received" heph = 0xa39380 <buf> #27 0x000000000049e4e1 in sr_event_exec (type=7, data=0x7ffd7df6b310) at core/events.c:263 ret = 0 i = 7 #28 0x000000000048731a in udp_rcv_loop () at core/udp_server.c:466 sredp = {0xa39380 <buf>, 0x7ffd7df6b2e4, 0x7ffd7df6b330} len = 1254 buf = "HEP3\004\346\000\000\000\001\000\a\002\000\000\000\002\000\a\021\000\000\000\a\000\b\023\304\000\000\000\b\000\b\023\304\000\000\000\t\000\n\034d\036Z\000\000\000\n\000\n]\025\r\000\000\000\000\v\000\a\001\000\000\000\f\000\n\000\000\000\000\000\000\000\003\000\n\331\nMs\000\000\000\004\000\n\254\024(\005\000\000\000\016\000\024rodauMyHep2001\000\000\000\017\004uSIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 172.20.40.5;branch=z9hG4bKe877.99be6a0f42b6af42e"... tmp = 0x52fe33 <init_child+52> "\311\303UH\211\345AWAVAUATSH\203\354\070H\211}\270H\203}\270" from = 0x7ff05d2edfd8 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {16777343, 140670331935744}, addr32 = {16777343, 0, 1563057152, 32752}, addr16 = {127, 256, 0, 0, 23552, 23850, 32752, 0}, addr = "\177\000\000\001\000\000\000\000\000\*]\360\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 36988, dst_port = 9060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\220|\177\000\000\001\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 31888, sin_addr = {s_addr = 16777343}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 31888, sin6_flowinfo = 16777343, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7ff05d2a5a80, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #29 0x0000000000422d08 in main_loop () at main.c:1623 i = 23 pid = 0 si = 0x7ff05d2a5a80 si_desc = "udp receiver child=23 sock=0.0.0.0:9060\000\000\331\207\376q\000\000\000\261\200u\000\000\000\000\000\000\331\207\376s\325T\271\004\000\000\000\000\000\000\000\246\252\256\066\000\000\000\000\260zA\000\000\000\000\000\320\267\366}\375\177", '\000' <repeats 19 times>, "\265\366}\375\177\000\000!3_\000\000\000\000" nrprocs = 96 woneinit = 1 __FUNCTION__ = "main_loop" #30 0x000000000042a408 in main (argc=13, argv=0x7ffd7df6b7d8) at main.c:2643 cfg_stream = 0x1c95010 c = -1 r = 0 tmp = 0x7ffd7df6befe "" tmp_len = 1579565480 port = 32752 proto = 2113320592 options = 0x73b8f8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1271703746 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x0 p = 0x1 <error: Cannot access memory at address 0x1> st = {st_dev = 15, st_ino = 259871, st_nlink = 2, st_mode = 16877, st_uid = 117, st_gid = 122, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1506502981, tv_nsec = 691416812}, st_mtim = { tv_sec = 1511857903, tv_nsec = 184120552}, st_ctim = {tv_sec = 1511857903, tv_nsec = 184120552}, __glibc_reserved = {0, 0, 0}} __FUNCTION__ = "main" No symbol table info available. 1826 main.c: No such file or directory. ```
#### Log Messages
The log didn't say anything except this line:
``` ov 29 08:39:09 hostname /usr/sbin/kamailio[121099]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 34 Nov 29 08:39:09 hostname /usr/sbin/kamailio[120885]: ALERT: <core> [main.c:743]: handle_sigs(): child process 120921 exited by a signal 11 Nov 29 08:39:09 hostname /usr/sbin/kamailio[120885]: ALERT: <core> [main.c:746]: handle_sigs(): core was generated ```
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
``` version: kamailio 5.0.3 (x86_64/linux) flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: unknown compiled with gcc 4.9.2 ```
* **Operating System**:
<!-- Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...; Kernel details (output of `uname -a`) -->
Kamailio is running on a Debian Jessie system.
``` Linux hostname 3.16.0-4-amd64 #1 SMP Debian 3.16.43-2+deb8u5 (2017-09-19) x86_64 GNU/Linux ```