### Description We upgrade Kamailio from V5.6.5 to V5.8.2 . When call out , out of credit and drop calls. Kamailio v5.8.2 crashed . We think our system not enough memory so we up to memory but the same issue. Anyone met this issue , please help us. Thanks
Our system : - OS: Centos 9 stream - Kamailo vesion 5.8.2
#### Reproduction
#### Debugging Data
<Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007f0f1f38902c in __delete_call (call=0x7f0f207d4d90, credit_data=0x7f0f203d42e0) at cnxcc_mod.c:879 879 clist_rm(call, next, prev); Missing separate debuginfos, use: dnf debuginfo-install MariaDB-shared-10.5.25-1.el9.x86_64 hiredis-1.0.2-2.el9.x86_64 (gdb) bt full #0 0x00007f0f1f38902c in __delete_call (call=0x7f0f207d4d90, credit_data=0x7f0f203d42e0) at cnxcc_mod.c:879 __func__ = "__delete_call" #1 0x00007f0f1f383f27 in __stop_billing (callid=0x7f0f207d7378) at cnxcc_mod.c:643 cd_entry = 0x7f0f204f8360 call = 0x7f0f207d4d90 hts = 0x7f0f1f3bf910 <_data+48> credit_data = 0x7f0f203d42e0 __func__ = "__stop_billing" #2 0x00007f0f1f381928 in __dialog_terminated_callback (cell=0x7f0f207d7300, type=64, _params=0x7f0f1f7a8800 <params>) at cnxcc_mod.c:479 __func__ = "__dialog_terminated_callback" #3 0x00007f0f1f6f7490 in run_dlg_callbacks (type=64, dlg=0x7f0f207d7300, req=0x7f0f40eda090, rpl=0x0, dir=2, dlg_data=0x0) at dlg_cb.c:269 cb = 0x7f0f207d7860 __func__ = "run_dlg_callbacks" #4 0x00007f0f1f725c84 in dlg_terminated (req=0x7f0f40eda090, dlg=0x7f0f207d7300, dir=2) at dlg_handlers.c:404 iuid = 0x0 __func__ = "dlg_terminated" #5 0x00007f0f1f735844 in dlg_onroute (req=0x7f0f40eda090, route_params=0x7ffe01fc4a70, param=0x0) at dlg_handlers.c:1502 dlg = 0x7f0f207d7300 iuid = 0x7f0f20cfc690 val = {s = 0x9f4ae7 <buf+775> "2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 8} callid = { s = 0x9f4924 <buf+324> "3506e2a7-0fdc-123e-aebc-00505697ee23\r\nCSeq: 90509168 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE\r\nSupporte"..., len = 36} ftag = { s = 0x9f48ce <buf+238> "FF27yjy610cZS\r\nTo: "sipp" sip:0999999990@172.16.172.221;tag=BU30ZvQFDtgHS\r\nCall-ID: 3506e2a7-0fdc-123e-aebc-00505697ee23\r\nCSeq: 90509168 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL,"..., len = 13} ttag = { s = 0x9f490c <buf+300> "BU30ZvQFDtgHS\r\nCall-ID: 3506e2a7-0fdc-123e-aebc-00505697ee23\r\nCSeq: 90509168 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBL"..., len = 13} h_entry = 994 h_id = 10194 new_state = 5 old_state = 4 unref = 2 event = 7 timeout = 0 reset = 0 dir = 2 ret = 0 __func__ = "dlg_onroute" #6 0x00007f0f1fae7e88 in run_rr_callbacks (req=0x7f0f40eda090, rr_param=0x7ffe01fc4b30) at rr_cb.c:96 l_param = { s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 132} --Type <RET> for more, q to quit, c to continue without paging--c cbp = 0x7f0f40edfa10 __func__ = "run_rr_callbacks" #7 0x00007f0f1fad6e59 in after_loose (_m=0x7f0f40eda090, preloaded=0) at loose.c:1021 hdr = 0x7f0f40e08460 puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x9f4a56 <buf+630> "172.16.172.221:65000;lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 14}, port = { s = 0x9f4a65 <buf+645> "65000;lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 5}, params = { s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 132}, sip_params = { s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 132}, headers = {s = 0x0, len = 0}, port_no = 65000, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = { s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = { s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 2}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} rt = 0x7f0f40e08660 res = 1 status = 1 uri = { s = 0x9f4a52 <buf+626> "sip:172.16.172.221:65000;lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 157} uri_is_myself = 1 use_ob = 0 rparams = { s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 132} __func__ = "after_loose" #8 0x00007f0f1fad75e5 in loose_route_mode (_m=0x7f0f40eda090, _mode=0) at loose.c:1056 ret = 0 __func__ = "loose_route_mode" #9 0x00007f0f1fae9cfb in w_loose_route (msg=0x7f0f40eda090, p1=0x0, p2=0x0) at rr_mod.c:273 No locals. #10 0x0000000000443202 in do_action (h=0x7ffe01fc56e0, a=0x7f0f40e9d320, msg=0x7f0f40eda090) at core/action.c:1121 ret = -5 li = 0 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 86 times>, "\020\016\272@\017\177", '\000' <repeats 25 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x0 new_uri = 0x0 end = 0x0 crt = 0x0 cmd = 0x7f0f40b91310 len = 0 user = 0 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = { s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = { s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x0 port = 0 dst_host = 0x0 i = 0 flags = 0 avp = 0x7f0f40eda090 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x7ffe01fc5570 sjt = 0x7f0f40e9bdb0 rve = 0x0 mct = 0x0 rv = 0x0 rv1 = 0x7f0f40e65470 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = { s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #11 0x0000000000450a6d in run_actions (h=0x7ffe01fc56e0, a=0x7f0f40e9d320, msg=0x7f0f40eda090) at core/action.c:1618 t = 0x7f0f40e9d320 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 533967288 __func__ = "run_actions" #12 0x000000000045110f in run_actions_safe (h=0x7ffe01fc6b70, a=0x7f0f40e9d320, msg=0x7f0f40eda090) at core/action.c:1681 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, 7972416043526547515, 140728931744408, 4394786, 9616872, 139703624372224, 7972416043509770299, -7971453441872074693}, __mask_was_saved = 0, __saved_mask = { __val = {139702937259984, 0, 0, 140728931735408, 4294967296, 140728931744408, 4394786, 9616872, 139703624372224, 140728931735792, 6261792, 140728931735696, 139702934448925, 0, 140728931735836, 139703490298096}}}}} ret = 33315352 ign_on_break = 0 #13 0x00000000005f3e0c in rval_get_long (h=0x7ffe01fc6b70, msg=0x7f0f40eda090, i=0x7ffe01fc5f60, rv=0x7f0f40e9d488, cache=0x0) at core/rvalue.c:973 r_avp = 0x0 avp_val = {n = 9616872, s = {s = 0x92bde8 "\340\334A", len = 1223135232}, re = 0x92bde8} pval = {rs = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 33316704}, ri = 8623258264, flags = 533967288} tmp = {s = 0x0, len = 1} s = 0x0 r = 0 ret = 0 destroy_pval = 0 __func__ = "rval_get_long" #14 0x00000000005f8c20 in rval_expr_eval_long (h=0x7ffe01fc6b70, msg=0x7f0f40eda090, res=0x7ffe01fc5f60, rve=0x7f0f40e9d480) at core/rvalue.c:1854 i1 = 1 i2 = 140728931744408 ret = -1 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = { s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 20 times>, "\001"} c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 139703490551952, s = {s = 0x7f0f40eda090 "@", len = 0}, re = 0x7f0f40eda090}, pval = {rs = {s = 0x7f0f40eda090 "@", len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} rv1 = 0x7f0f1fcb3b77 <t_check_trans+249> rv2 = 0x7ffe01fc5a30 __func__ = "rval_expr_eval_long" #15 0x0000000000442c83 in do_action (h=0x7ffe01fc6b70, a=0x7f0f40ea0e60, msg=0x7f0f40eda090) at core/action.c:1097 ret = -5 li = 7972416043847411771 v = 0 dst = {send_sock = 0x7ffe01fc5ff0, to = {s = {sa_family = 15884, sa_data = "_", '\000' <repeats 12 times>}, sin = { sin_family = 15884, sin_port = 95, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 15884, sin6_port = 95, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 15884, __ss_padding = "_", '\000' <repeats 25 times>, "\377\377\377\377\000\000\000\000\000\000\000\000(^\346@\017\177\000\000\210b\374\001\376\177\000\000\220\240\355@\017\177\000\000pk\374\001\376\177\000\000轒\000\000\000\000\000\000\220\347H\017\177\000\0000`\374\001\376\177\000\000\017\021E\000\000\000\000\000\240`\374\001\376\177\000\000\220\240\355@\017\177\000", __ss_align = 139703490068560}}, id = 33319792, send_flags = {f = 32766, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x8000000 <error: Cannot access memory at address 0x8000000> new_uri = 0x7ffe01fc6160 "\b" end = 0x7f0f40ee3f60 "X-FS-Support" crt = 0x7f0f1fdcfaa6 <pkg_proc_update_stats+115> "H\213\r\203l" cmd = 0x7ffe01fc6120 len = 32766 user = 33317200 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = { s = 0xffffffff01fc7a98 <error: Cannot access memory at address 0xffffffff01fc7a98>, len = 0}, params = { s = 0x92bde8 "\340\334A", len = 0}, sip_params = {s = 0x7ffe01fc7a98 "?~\374\001\376\177", len = 4394786}, headers = { s = 0x92bde8 "\340\334A", len = 1223135232}, port_no = 24256, proto = 508, type = 32766, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0x45110c), transport = {s = 0x0, len = 1089314960}, ttl = { s = 0x7f0f40e65bd0 "\200\001", len = 33319792}, user_param = {s = 0x0, len = -1}, maddr = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -234461125}, method = { s = 0x7ffe01fc7a98 "?~\374\001\376\177", len = 4394786}, lr = {s = 0x92bde8 "\340\334A", len = 1223135232}, r2 = { s = 0x6ea3b626f106683b <error: Cannot access memory at address 0x6ea3b626f106683b>, len = 1168533563}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 5531605}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7ffe01fc62f0 "\200\003", len = 33317320}, maddr_val = {s = 0x7ffe01fc61cc "", len = 1088756432}, method_val = {s = 0x0, len = 33317872}, lr_val = { s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = -1}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = { s = 0x7ffe01fc7a98 "?~\374\001\376\177", len = 4394786}, sip_params = {s = 0x92bde8 "\340\334A", len = 1223135232}, headers = { s = 0x7ffe01fc5db0 "\300^\374\001\376\177", len = 4524653}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = { s = 0x0, len = 0}, ttl = {s = 0x0, len = 1089314960}, user_param = {s = 0x7f0f40e65bd0 "\200\001", len = 33316320}, maddr = { s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7f0f40b9f568 "~\365\216\037\017\177", len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7f0f409ff010 port = 0 dst_host = 0x92bde8 i = 1088720928 flags = 0 avp = 0x7f0f40e496c8 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x0 sjt = 0x0 rve = 0x7f0f40e9d480 mct = 0x7f0f40e65e20 rv = 0x0 rv1 = 0x7f0f40e68340 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = { s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = "\000\000\000\000\000\000\000\000h\365\271@\017\177\000\000\000\000\000\000\000"} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #16 0x0000000000450a6d in run_actions (h=0x7ffe01fc6b70, a=0x7f0f40e9d0d0, msg=0x7f0f40eda090) at core/action.c:1618 t = 0x7f0f40ea0e60 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 8725541, tz_dsttime = 0} tdiff = 1088848992 __func__ = "run_actions" #17 0x000000000043f70a in do_action (h=0x7ffe01fc6b70, a=0x7f0f40e696e0, msg=0x7f0f40eda090) at core/action.c:709 ret = -5 li = 16 v = 1 dst = {send_sock = 0x92bde8, to = {s = {sa_family = 36864, sa_data = "\347H\017\177\000\000@h\374\001\376\177\000"}, sin = { sin_family = 36864, sin_port = 18663, sin_addr = {s_addr = 32527}, sin_zero = "@h\374\001\376\177\000"}, sin6 = { sin6_family = 36864, sin6_port = 18663, sin6_flowinfo = 32527, sin6_addr = {__in6_u = { __u6_addr8 = "@h\374\001\376\177\000\000\361=t\000\000\000\000", __u6_addr16 = {26688, 508, 32766, 0, 15857, 116, 0, 0}, __u6_addr32 = {33318976, 32766, 7618033, 0}}}, sin6_scope_id = 28}, sas = {ss_family = 36864, __ss_padding = "\347H\017\177\000\000@h\374\001\376\177\000\000\361=t\000\000\000\000\000\034", '\000' <repeats 15 times>, "\377\377\377\377\377\377\377\377\220\240\355@\017\177\000\000轒\000\000\000\000\000\000\220\347H\017\177\000\000\320h\374\001\376\177\000\000H\ru\000\000\000\000\000\360g\374\001\376\177\000\000\246\372\334\037\017\177\000\000\000\000\000\000\000\000\000\000di\374\001\376\177\000", __ss_align = 134217728}}, id = 1086994592, send_flags = {f = 32527, blst_imask = 0}, proto = 21 '\025', proto_pad0 = 75 'K', proto_pad1 = 159} tmp = 0x7ffe01fc6a60 "\020k\374\001\376\177" new_uri = 0x7ffe01fc69f0 "" end = 0x4 <error: Cannot access memory at address 0x4> crt = 0x7f0f40eda090 "@" cmd = 0x7f0f40b9f0d0 len = 32527 user = 1089145792 uri = {user = {s = 0x7f0f40e08630 "", len = 0}, passwd = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 129248720}, host = {s = 0x3a5670 <error: Cannot access memory at address 0x3a5670>, len = 4969008}, port = { s = 0x57e920 <fork_tcp_process+5074> ";", len = 16}, params = {s = 0x4e <error: Cannot access memory at address 0x4e>, len = 7598071}, sip_params = {s = 0x7ffe01fc6630 "@g\374\001\376\177", len = 4978977}, headers = {s = 0x0, len = 1084226000}, port_no = 62544, proto = 16543, type = 19, flags = (unknown: 0x409ff9d0), transport = {s = 0x7ffe01fc6740 "@h\374\001\376\177", len = 7502474}, ttl = {s = 0x7ffe01fc6740 "@h\374\001\376\177", len = 7492948}, user_param = {s = 0x8bb92b "core", len = 7494079}, maddr = {s = 0x8bc708 <__func__.21> "parse_headers", len = 9157624}, method = {s = 0x7f0f40e085c0 "\220\001", len = 1084223504}, lr = {s = 0x8bc708 <__func__.21> "parse_headers", len = 9157624}, r2 = { s = 0x40 <error: Cannot access memory at address 0x40>, len = 1084223504}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x9f4b13 <buf+819> "\r\n", len = 0}, ttl_val = {s = 0x8be270 <__func__.3> "parse_to_param", len = 9168712}, user_param_val = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 1084223504}, maddr_val = {s = 0x7f0f40e08630 "", len = 1088455888}, method_val = {s = 0x0, len = 1084223504}, lr_val = { s = 0x130 <error: Cannot access memory at address 0x130>, len = 1088456064}, r2_val = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, gr_val = { s = 0x7ffe01fc7a98 "?~\374\001\376\177", len = 4394786}} next_hop = {user = {s = 0x4a <error: Cannot access memory at address 0x4a>, len = 10438703}, passwd = { s = 0x7 <error: Cannot access memory at address 0x7>, len = 8}, host = {s = 0x7f0f40cc6060 "\001", len = 0}, port = { s = 0x7f0f40e521c0 "\001", len = 1088827984}, params = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 1088758208}, sip_params = {s = 0x0, len = 1086993056}, headers = {s = 0x7f0f40e07b30 "\003", len = 1088454800}, port_no = 40176, proto = 16617, type = 32527, flags = 0, transport = {s = 0x7f0f40ca3db0 <incomplete sequence \353>, len = 0}, ttl = {s = 0x0, len = 0}, user_param = { s = 0x440e631a0 <error: Cannot access memory at address 0x440e631a0>, len = 9193958}, maddr = {s = 0x0, len = 0}, method = { s = 0x7ffe01fc65c0 "", len = 7807783}, lr = {s = 0x0, len = 0}, r2 = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1088455952}, gr = {s = 0x9f4b15 <buf+821> "", len = 10439410}, transport_val = {s = 0x0, len = 33318544}, ttl_val = { s = 0x9f4b15 <buf+821> "", len = 10439230}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x0, len = 7534444}, lr_val = {s = 0x7ffe01fc65c0 "", len = 1084223504}, r2_val = {s = 0x7f0f40e08630 "", len = 1084223504}, gr_val = {s = 0x7ffe01fc6600 "0f\374\001\376\177", len = 534575782}} u = 0x7ffe01fc6b90 port = 0 dst_host = 0x7f0f40e085c0 i = 41 flags = 0 avp = 0x7627ed <parse_cseq+2542> st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 65537}, re = 0x0}, avp = 0x9f47e0 <buf>} sct = 0x7f0f40eda090 sjt = 0x7f0f40eb0bc0 rve = 0x7f0f40e66660 mct = 0x7ffe01fc68f0 rv = 0x0 rv1 = 0x7ffe01fc6a10 c1 = {cache_type = 10504224, val_type = RV_NONE, c = {avp_val = {n = 10504232, s = {s = 0xa04828 <def_list+40> "", len = 1085943864}, re = 0xa04828 <def_list+40>}, pval = {rs = {s = 0xa04828 <def_list+40> "", len = 1085943864}, ri = 10504544, flags = 10504552}}, i2s = "\200\371\253\037\017\177\000\000p\371\253\037\017\177\000\000\020\362\253\037\017\177"} s = {s = 0xa04810 <def_list+16> "", len = 33320176} srevp = {0x7ffe01fc6c30, 0x7f0f1fa499ae <tps_msg_received+3364>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #18 0x0000000000450a6d in run_actions (h=0x7ffe01fc6b70, a=0x7f0f40e63e00, msg=0x7f0f40eda090) at core/action.c:1618 t = 0x7f0f40e696e0 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 1089314960, tz_dsttime = 32527} tdiff = 4394786 __func__ = "run_actions" #19 0x00000000004511d7 in run_top_route (a=0x7f0f40e63e00, msg=0x7f0f40eda090, c=0x0) at core/action.c:1701 ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, 7972416042383599675, 140728931744408, 4394786, 9616872, 139703624372224, 7972416042299713595, -7971453441872074693}, __mask_was_saved = 0, __saved_mask = { __val = {6379359, 4294967296, 139703490551952, 140728898420737, 4294967296, 140728931744408, 4394786, 9616872, 139703624372224, 140728931740736, 0, 4611686022722355200, 0, 139703490412128, 4294967296, 140728931744408}}}}} p = 0x7ffe01fc6b70 ret = 9616872 sfbk = 0 #20 0x00000000005ab16e in receive_msg ( buf=0x9f47e0 <buf> "BYE sip:gw+internal_sip_gw03@172.16.172.242:65000;transport=udp;gw=internal_sip_gw03 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bKX9Zm25Xe6316g\r\nMax-Forwards: 69\r\nFrom: <si"..., len=821, rcv_info=0x7ffe01fc7200) at core/receive.c:518 msg = 0x7f0f40eda090 ctx = {rec_lev = 0, run_flags = 2, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, 7972416042383599675, 140728931744408, 4394786, 9616872, 139703624372224, 7972416042299713595, -7971453441872074693}, __mask_was_saved = 0, __saved_mask = { __val = {0, 0, 0, 1880844493789993498, 1880844493789993498, 1880844493789993498, 1880844493789993498, 0, 0, 0, 0, 2314885530818453536, 2314885530818453536, 2314885530818453536, 2314885530818453536, 0}}}}} bctx = 0x0 ret = 0 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} diff = 0 inb = { s = 0x9f47e0 <buf> "BYE sip:gw+internal_sip_gw03@172.16.172.242:65000;transport=udp;gw=internal_sip_gw03 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bKX9Zm25Xe6316g\r\nMax-Forwards: 69\r\nFrom: <si"..., len = 821} netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0} keng = 0x0 evp = {data = 0x7ffe01fc6d60, obuf = {s = 0x0, len = 0}, rcv = 0x7ffe01fc7200, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 exectime = 0 __func__ = "receive_msg" #21 0x00000000006f9272 in udp_rcv_loop () at core/udp_server.c:751 len = 598 buf = "BYE sip:gw+internal_sip_gw03@172.16.172.242:65000;transport=udp;gw=internal_sip_gw03 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bKX9Zm25Xe6316g\r\nMax-Forwards: 69\r\nFrom: <si"... tmp = 0x1201ae640 <error: Cannot access memory at address 0x1201ae640> fromaddr = 0x7f0f40e99c00 fromaddrlen = 16 rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {3870036140, 0}, addr32 = {3870036140, 0, 0, 0}, addr16 = {4268, 59052, 0, 0, 0, 0, 0, 0}, addr = "\254\020\254\346", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {3719041196, 0}, addr32 = {3719041196, 0, 0, 0}, addr16 = {4268, 56748, 0, 0, 0, 0, 0, 0}, addr = "\254\020\254\335", '\000' <repeats 11 times>}}, src_port = 5080, dst_port = 65000, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023ج\020\254\346\000\000\000\000\000\000\000"}, sin = { sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 3870036140}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 3870036140, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023ج\020\254\346", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7f0f40b88fa0, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} printbuf = "\340o\374\001\376\177\000\000f*\260\037\017\177\000\000)\262\272\037\017\177\000\000\340b5\037\017\177\000\000\020p\374\001\376\177\000\000\322\v\272\037\017\177\000\000\000\000\000\000\000\000\000\000\340b5\037\017\177\000\000\000\000\000\000\000\000\000\000p\233\351@\017\177\000\000@p\374\001\376\177\000\000 e\032 \017\177\000\000\230z\374\001\376\177\000\000"\017C\000\000\000\000\000轒\000\000\000\000\000\000\220\347H\017\177\000\000`p\374\001\376\177\000\000ǥ\272\037\017\177\000\000\360b5\037\017\177\000\000p\233\351@\017\177\000\000\000q\374\001\376\177\000\000\257:3\037\017\177\000\000\000\000\000\000\260\000\000\000p/\306@\260", '\000' <repeats 91 times>... i = -1 j = 506880 l = 176 __func__ = "udp_rcv_loop" #22 0x000000000042dcb6 in main_loop () at main.c:1815 i = 47 pid = 0 si = 0x7f0f40b88fa0 si_desc = "udp receiver child=47 sock=172.16.172.221:65000\0000\000\000\000\000\000\000\000\000\345\032 \017\177\000\000@t\374\001\001\000\000\000\200\211\341\037\017\177\000\000\310/\272@\017\177\000\000\037%r\000\000\000\000\000\230z\374\001\376\177\000\000\200\211\341\037\017\177\000\000轒\000\000\000\000\000\000\220\347H\001\000\000" nrprocs = 128 woneinit = 1 __func__ = "main_loop" #23 0x0000000000439e7d in main (argc=10, argv=0x7ffe01fc7a98) at main.c:3256 cfg_stream = 0xfa5380 c = -1 r = 0 tmp = 0x7ffe01fc7ea8 "" tmp_len = 0 port = 5060 proto = 0 aproto = 0 ahost = 0x0 aport = 0 options = 0x8433f8 ":f:cm:M:dVIhEeb:B:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1463919274 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x7ffe01fc7980 p = 0x1800000 <error: Cannot access memory at address 0x1800000> st = {st_dev = 24, st_ino = 1005, st_nlink = 2, st_mode = 16832, st_uid = 991, st_gid = 988, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1730298568, tv_nsec = 63999933}, st_mtim = {tv_sec = 1730298573, tv_nsec = 240999872}, st_ctim = {tv_sec = 1730298573, tv_nsec = 240999872}, __glibc_reserved = {0, 0, 0}} l1 = 512 tbuf = "B\215\347H\017\177\000\000\210J\344H\017\177\000\000\020w\374\001\376\177\000\000\006\000\000\000\000\000\000\000\b7\344H\017\177\000\000\006\000\000\000\020\000\000\0000\232\347H\017\177\000\000\325\031\345H\017\177\000\000\000\000\000\000\000\000\000\000\240,\345H\017\177\000\000\370\377\240H\017\177\000\000\020\033\344H\017\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\340v\374\001\376\177\000\000\240J\344H\017\177\000\000\240J\344H\017\177\000\000\000\000\000\000\000\000\000\000p)\344H\017\177\000\000\340v\374\001\376\177\000\000\200\245\347H\017\177\000\000\0000\344H\017\177\000\000\342;\344H\017\177\000\000v\344\344H\017\177\000\000\334#\240H\017\177\000\000"... option_index = 0 long_options = {{name = 0x845b26 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x84054c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x845b2b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x845b31 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x845b37 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x845b40 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x845b4a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x845b54 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x845b5f "modparam", has_arg = 1, flag = 0x0, val = 1030}, { name = 0x845b68 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x845b73 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x845b79 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x845b83 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x845b8a "all-errors", has_arg = 0, flag = 0x0, val = 1035}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" (gdb) ) ```
#### Log Messages
Oct 30 21:32:19 KAM-V2-02 kamailio[2711]: 188(2711) ERROR: {1 90509167 INVITE 3b4b542a-0fdc-123e-aebc-00505697ee23} <script>: cut prefix : 172.16.172.230:5080 Oct 30 21:32:23 KAM-V2-02 kamailio[2687]: 176(2687) BUG: {1 90509168 BYE 3506e2a7-0fdc-123e-aebc-00505697ee23} cnxcc [cnxcc_mod.c:869]: __delete_call(): number of concurrent calls dropped to negative value: -1 Oct 30 21:32:23 KAM-V2-02 kamailio[2687]: 176(2687) BUG: {1 90509168 BYE 3506e2a7-0fdc-123e-aebc-00505697ee23} cnxcc [cnxcc_mod.c:874]: __delete_call(): number of calls dropped to negative value: -1 Oct 30 21:32:23 KAM-V2-02 kernel: kamailio[2687]: segfault at 8 ip 00007f0f1f38902c sp 00007ffe01fc4470 error 6 in cnxcc.so[7f0f1f377000+3c000] likely on CPU 10 (core 0, socket 5) Oct 30 21:32:23 KAM-V2-02 kernel: Code: 48 8b 05 c7 5f 03 00 8b 00 8d 50 ff 48 8b 05 bb 5f 03 00 89 10 48 8b 85 78 ff ff ff 48 8b 00 48 8b 95 78 ff ff ff 48 8b 52 08 <48> 89 50 08 48 8b 85 78 ff ff ff 48 8b 40 08 48 8b 95 78 ff ff ff Oct 30 21:32:23 KAM-V2-02 mariadbd[1313]: 2024-10-30 21:32:23 189 [Warning] Aborted connection 189 to db: 'kamailio' user: 'kamailio' host: 'localhost' (Got an error reading communication packets) Oct 30 21:32:23 KAM-V2-02 kamailio[3130]: 395(3130) CRITICAL: <core> [core/pass_fd.c:281]: receive_fd(): EOF on 186 Oct 30 21:32:23 KAM-V2-02 kamailio[2331]: 0(2331) ALERT: <core> [main.c:805]: handle_sigs(): child process 2687 exited by a signal 11 Oct 30 21:32:23 KAM-V2-02 kamailio[2331]: 0(2331) ALERT: <core> [main.c:809]: handle_sigs(): core was generated
#### SIP Traffic
<!-- If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
``` (paste your sip traffic here) ```
### Possible Solutions
<!-- If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix. -->
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
version: kamailio 5.8.2 (x86_64/linux) 3fa5f4 flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, MEM_JOIN_FREE, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_SEND_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 3fa5f4 compiled on 22:03:02 Oct 28 2024 with gcc 11.5.0
* **Operating System**:
CentOS Stream release 9 NAME="CentOS Stream" VERSION="9" ID="centos" ID_LIKE="rhel fedora" VERSION_ID="9" PLATFORM_ID="platform:el9" PRETTY_NAME="CentOS Stream 9" ANSI_COLOR="0;31" LOGO="fedora-logo-icon" CPE_NAME="cpe:/o:centos:centos:9" HOME_URL="https://centos.org/" BUG_REPORT_URL="https://issues.redhat.com/" REDHAT_SUPPORT_PRODUCT="Red Hat Enterprise Linux 9" REDHAT_SUPPORT_PRODUCT_VERSION="CentOS Stream" CentOS Stream release 9 CentOS Stream release 9
can you give me the value of ``*call`` at frame ``#0``?
what is the output of: ``p *call``
Thank you for your support so much. We update backtrack.
--Type <RET> for more, q to quit, c to continue without paging--y Missing separate debuginfos, use: dnf debuginfo-install MariaDB-shared-10.5.25-1.el9.x86_64 hiredis-1.0.2-2.el9.x86_64[Thread debugging using libthread_db enabled] Using host libthread_db library "/lib64/libthread_db.so.1". Core was generated by `/usr/local/sbin/kamailio -DD -P /run/kamailio/kamailio.pid -f /usr/local/etc/ka'. **
Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007f9bbc82e02c in __delete_call (call=0x7f9bbd65e6f0, credit_data=0x7f9bbd65e480) at cnxcc_mod.c:879 879 clist_rm(call, next, prev);
** (gdb) bt full #0 0x00007f9bbc82e02c in __delete_call (call=0x7f9bbd65e6f0, credit_data=0x7f9bbd65e480) at cnxcc_mod.c:879 __func__ = "__delete_call" #1 0x00007f9bbc828f27 in __stop_billing (callid=0x7f9bbd665bc8) at cnxcc_mod.c:643 cd_entry = 0x7f9bbd65e360 call = 0x7f9bbd65e6f0 hts = 0x7f9bbc864910 <_data+48> credit_data = 0x7f9bbd65e480 __func__ = "__stop_billing" #2 0x00007f9bbc826928 in __dialog_terminated_callback (cell=0x7f9bbd665b50, type=64, _params=0x7f9bbcc4d800 <params>) at cnxcc_mod.c:479 __func__ = "__dialog_terminated_callback" #3 0x00007f9bbcb9c490 in run_dlg_callbacks (type=64, dlg=0x7f9bbd665b50, req=0x7f9bde2e50f0, rpl=0x0, dir=2, dlg_data=0x0) at dlg_cb.c:269 cb = 0x7f9bbd6660b0 __func__ = "run_dlg_callbacks" #4 0x00007f9bbcbcac84 in dlg_terminated (req=0x7f9bde2e50f0, dlg=0x7f9bbd665b50, dir=2) at dlg_handlers.c:404 iuid = 0x0 __func__ = "dlg_terminated" #5 0x00007f9bbcbda844 in dlg_onroute (req=0x7f9bde2e50f0, route_params=0x7fff005f8cc0, param=0x0) at dlg_handlers.c:1502 dlg = 0x7f9bbd665b50 iuid = 0x7f9bbd68ab90 val = {s = 0x9f4ae7 <buf+775> "e0b.d79>\r\nP-SR-XUID: atpsh-6724ed61-45c0e-1\r\n\r\n", len = 7} callid = { s = 0x9f4924 <buf+324> "43beb02e-1173-123e-0b83-00505697ee23\r\nCSeq: 90596582 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE\r\nSupporte"..., len = 36} ftag = { s = 0x9f48ce <buf+238> "eZjgv3r2yv1Xc\r\nTo: "sipp" sip:0999999990@172.16.172.221;tag=cFHcUvtX0H27Q\r\nCall-ID: 43beb02e-1173-123e-0b83-00505697ee23\r\nCSeq: 90596582 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL,"..., len = 13} ttag = { s = 0x9f490c <buf+300> "cFHcUvtX0H27Q\r\nCall-ID: 43beb02e-1173-123e-0b83-00505697ee23\r\nCSeq: 90596582 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBL"..., len = 13} h_entry = 2830 h_id = 2429 new_state = 5 old_state = 4 unref = 2 event = 7 timeout = 0 reset = 0 dir = 2 ret = 0 __func__ = "dlg_onroute" #6 0x00007f9bbcf95e88 in run_rr_callbacks (req=0x7f9bde2e50f0, rr_param=0x7fff005f8d80) at rr_cb.c:96 l_param = { s = 0x9f4a6b <buf+651> "lr;ftag=cFHcUvtX0H27Q;vsf=", 'A' <repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=e0b.d79>\r\nP-SR-XUID: atpsh-6724ed61-45c0e-1\r\n\r\n", len = 131} --Type <RET> for more, q to quit, c to continue without paging--
@itpanda2024
I need the output of ``p *call`` command when you're inside gdb
We update backtrack again :
GNU gdb (CentOS Stream) 14.2-3.el9 Copyright (C) 2023 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-redhat-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: https://www.gnu.org/software/gdb/bugs/. Find the GDB manual and other documentation resources online at: http://www.gnu.org/software/gdb/documentation/.
For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/local/sbin/kamailio...
warning: Can't open file /dev/zero (deleted) during file-backed mapping note processing [New LWP 309540]
This GDB supports auto-downloading debuginfo from the following URLs: https://debuginfod.centos.org/ Enable debuginfod for this session? (y or [n]) y Debuginfod has been enabled. To make this setting permanent, add 'set debuginfod enabled on' to .gdbinit. --Type <RET> for more, q to quit, c to continue without paging--c [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib64/libthread_db.so.1". Core was generated by `/usr/local/sbin/kamailio -DD -P /run/kamailio/kamailio.pid -f /usr/local/etc/ka'. Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007efc5d38902c in __delete_call (call=0x7efc5e2cd710, credit_data=0x7efc5e2cd4a0) at cnxcc_mod.c:879 879 clist_rm(call, next, prev); (gdb) bt #0 0x00007efc5d38902c in __delete_call (call=0x7efc5e2cd710, credit_data=0x7efc5e2cd4a0) at cnxcc_mod.c:879 #1 0x00007efc5d383f27 in __stop_billing (callid=0x7efc5e2cfe38) at cnxcc_mod.c:643 #2 0x00007efc5d381928 in __dialog_terminated_callback (cell=0x7efc5e2cfdc0, type=64, _params=0x7efc5d7a8800 <params>) at cnxcc_mod.c:479 #3 0x00007efc5d6f7490 in run_dlg_callbacks (type=64, dlg=0x7efc5e2cfdc0, req=0x7efc7eee50f0, rpl=0x0, dir=2, dlg_data=0x0) at dlg_cb.c:269 #4 0x00007efc5d725c84 in dlg_terminated (req=0x7efc7eee50f0, dlg=0x7efc5e2cfdc0, dir=2) at dlg_handlers.c:404 #5 0x00007efc5d735844 in dlg_onroute (req=0x7efc7eee50f0, route_params=0x7ffced179310, param=0x0) at dlg_handlers.c:1502 #6 0x00007efc5dae7e88 in run_rr_callbacks (req=0x7efc7eee50f0, rr_param=0x7ffced1793d0) at rr_cb.c:96 #7 0x00007efc5dad6e59 in after_loose (_m=0x7efc7eee50f0, preloaded=0) at loose.c:1021 #8 0x00007efc5dad75e5 in loose_route_mode (_m=0x7efc7eee50f0, _mode=0) at loose.c:1056 #9 0x00007efc5dae9cfb in w_loose_route (msg=0x7efc7eee50f0, p1=0x0, p2=0x0) at rr_mod.c:273 #10 0x0000000000443202 in do_action (h=0x7ffced179f80, a=0x7efc7eea8380, msg=0x7efc7eee50f0) at core/action.c:1121 #11 0x0000000000450a6d in run_actions (h=0x7ffced179f80, a=0x7efc7eea8380, msg=0x7efc7eee50f0) at core/action.c:1618 #12 0x000000000045110f in run_actions_safe (h=0x7ffced17b410, a=0x7efc7eea8380, msg=0x7efc7eee50f0) at core/action.c:1681 #13 0x00000000005f3e0c in rval_get_long (h=0x7ffced17b410, msg=0x7efc7eee50f0, i=0x7ffced17a800, rv=0x7efc7eea84e8, cache=0x0) at core/rvalue.c:973 #14 0x00000000005f8c20 in rval_expr_eval_long (h=0x7ffced17b410, msg=0x7efc7eee50f0, res=0x7ffced17a800, rve=0x7efc7eea84e0) at core/rvalue.c:1854 #15 0x0000000000442c83 in do_action (h=0x7ffced17b410, a=0x7efc7eeabec0, msg=0x7efc7eee50f0) at core/action.c:1097 #16 0x0000000000450a6d in run_actions (h=0x7ffced17b410, a=0x7efc7eea8130, msg=0x7efc7eee50f0) at core/action.c:1618 #17 0x000000000043f70a in do_action (h=0x7ffced17b410, a=0x7efc7ee74730, msg=0x7efc7eee50f0) at core/action.c:709 #18 0x0000000000450a6d in run_actions (h=0x7ffced17b410, a=0x7efc7ee6ee50, msg=0x7efc7eee50f0) at core/action.c:1618 #19 0x00000000004511d7 in run_top_route (a=0x7efc7ee6ee50, msg=0x7efc7eee50f0, c=0x0) at core/action.c:1701 #20 0x00000000005ab16e in receive_msg ( buf=0x9f47e0 <buf> "BYE sip:gw+internal_sip_gw03@172.16.172.242:65000;transport=udp;gw=internal_sip_gw03 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bKUygrHZ097B80N\r\nMax-Forwards: 69\r\nFrom: <si"..., len=823, rcv_info=0x7ffced17baa0) at core/receive.c:518 #21 0x00000000006f9272 in udp_rcv_loop () at core/udp_server.c:751 #22 0x000000000042dcb6 in main_loop () at main.c:1815 #23 0x0000000000439e7d in main (argc=10, argv=0x7ffced17c338) at main.c:3256 (gdb) info locals __func__ = "__delete_call" (gdb) list 874 LM_BUG("number of calls dropped to negative value: %d\n", 875 credit_data->number_of_calls); 876 } 877 878 // Remove (and free) the call from the list of calls of the current credit_data 879 clist_rm(call, next, prev); 880 __free_call(call); 881 } 882 883 // must be called with lock held on credit_data (gdb) Quit (gdb) p *call $1 = {prev = 0x0, next = 0x0, lock = {lock = {val = 0}, locker_pid = {val = 0}, rec_lock_level = 0}, confirmed = 1 '\001', max_amount = 10396.000093000001, money_based = {connect_cost = 1, cost_per_second = 15.217000000000001, initial_pulse = 6, final_pulse = 1}, start_timestamp = 1730481102, consumed_amount = 91.302000000000007, connect_amount = 1, dlg_h_entry = 1117, dlg_h_id = 7339, client_id = {s = 0x7efc5e2cd690 "53", len = 2}, sip_data = {callid = {s = 0x0, len = 0}, from_uri = {s = 0x0, len = 0}, from_tag = {s = 0x0, len = 0}, to_uri = {s = 0x0, len = 0}, to_tag = {s = 0x0, len = 0}}} (gdb)
@itpanda2024 can you try with changes at [vseva/cnxcc](https://github.com/kamailio/kamailio/tree/vseva/cnxcc)?
@linuxmaniac we try it and respond to you. Thanks so much
The issue still same
Debug log Using host libthread_db library "/lib64/libthread_db.so.1". Core was generated by `/usr/local/sbin/kamailio -DD -P /run/kamailio/kamailio.pid -f /usr/local/etc/ka'. Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007fbd1e10502c in __delete_call (call=0x7fbd1f0cdae0, credit_data=0x7fbd1ef4fe80) at cnxcc_mod.c:880 880 if(call->prev && call->next) { Missing separate debuginfos, use: dnf debuginfo-install krb5-libs-1.21.1-3.el9.x86_64 libevent-2.1.12-8.el9.x86_64 libselinux-3.6-2.el9.x86_64 libssh-0.10.4-13.el9.x86_64 libunistring-0.9.10-15.el9.x86_64 openldap-2.6.6-3.el9.x86_64 openssl-libs-3.2.2-6.el9.x86_64 pcre2-10.40-6.el9.x86_64 (gdb) bt full #0 0x00007fbd1e10502c in __delete_call (call=0x7fbd1f0cdae0, credit_data=0x7fbd1ef4fe80) at cnxcc_mod.c:880 __func__ = "__delete_call" #1 0x00007fbd1e0fff27 in __stop_billing (callid=0x7fbd1efedd88) at cnxcc_mod.c:643 cd_entry = 0x7fbd1f1f9890 call = 0x7fbd1f0cdae0 hts = 0x7fbd1e13b910 <_data+48> credit_data = 0x7fbd1ef4fe80 __func__ = "__stop_billing" #2 0x00007fbd1e0fd928 in __dialog_terminated_callback (cell=0x7fbd1efedd10, type=64, _params=0x7fbd1e591800 <params>) at cnxcc_mod.c:479 __func__ = "__dialog_terminated_callback" #3 0x00007fbd1e4e0490 in run_dlg_callbacks (type=64, dlg=0x7fbd1efedd10, req=0x7fbd3fc8ee50, rpl=0x0, dir=2, dlg_data=0x0) at dlg_cb.c:269 cb = 0x7fbd1f138c60 __func__ = "run_dlg_callbacks" #4 0x00007fbd1e50ec84 in dlg_terminated (req=0x7fbd3fc8ee50, dlg=0x7fbd1efedd10, dir=2) at dlg_handlers.c:404 iuid = 0x0 __func__ = "dlg_terminated" #5 0x00007fbd1e51e844 in dlg_onroute (req=0x7fbd3fc8ee50, route_params=0x7ffeeaceb990, param=0x0) at dlg_handlers.c:1502 dlg = 0x7fbd1efedd10 iuid = 0x7fbd1f12cf20 val = {s = 0x9f4af3 <buf+787> "547.56e1>\r\nP-SR-XUID: atpsh-67330196-97f2-2\r\n\r\n", len = 8} callid = { s = 0x9f4930 <buf+336> "cdb12b30-1b6f-123e-0b83-00505697ee23\r\nCSeq: 91145595 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, SUBSCRIBE\r\nSupporte"..., len = 36} ftag = { s = 0x9f48da <buf+250> "KXDNpKy3y2ZgQ\r\nTo: "sipp" sip:0999999998@172.16.172.220;tag=QFp7eFB43KeFp\r\nCall-ID: cdb12b30-1b6f-123e-0b83-00505697ee23\r\nCSeq: 91145595 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL,"..., len = 13} ttag = { s = 0x9f4918 <buf+312> "QFp7eFB43KeFp\r\nCall-ID: cdb12b30-1b6f-123e-0b83-00505697ee23\r\nCSeq: 91145595 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBL"..., len = 13} h_entry = 1861 h_id = 7781 new_state = 5 old_state = 4 unref = 2 event = 7 timeout = 0 reset = 0 dir = 2 ret = 0 __func__ = "dlg_onroute" #6 0x00007fbd1e8d9e88 in run_rr_callbacks (req=0x7fbd3fc8ee50, rr_param=0x7ffeeaceba50) at rr_cb.c:96 l_param = { s = 0x9f4a77 <buf+663> "lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: atpsh-67330196-97f2-2\r\n\r\n", len = 132} --Type <RET> for more, q to quit, c to continue without paging--c cbp = 0x7fbd3fd0c8d0 __func__ = "run_rr_callbacks" #7 0x00007fbd1e8c8e59 in after_loose (_m=0x7fbd3fc8ee50, preloaded=0) at loose.c:1021 hdr = 0x7fbd3facecf0 puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = { s = 0x9f4a62 <buf+642> "172.16.172.220:65000;lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: atpsh-67330196-97f2-2\r\n\r\n", len = 14}, port = { s = 0x9f4a71 <buf+657> "65000;lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: atpsh-67330196-97f2-2\r\n\r\n", len = 5}, params = { s = 0x9f4a77 <buf+663> "lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: atpsh-67330196-97f2-2\r\n\r\n", len = 132}, sip_params = { s = 0x9f4a77 <buf+663> "lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: atpsh-67330196-97f2-2\r\n\r\n", len = 132}, headers = {s = 0x0, len = 0}, port_no = 65000, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = { s = 0x0, len = 0}, lr = { s = 0x9f4a77 <buf+663> "lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: atpsh-67330196-97f2-2\r\n\r\n", len = 2}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = { s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} rt = 0x7fbd3fc86300 res = 1 status = 1 uri = { s = 0x9f4a5e <buf+638> "sip:172.16.172.220:65000;lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: atpsh-67330196-97f2-2\r\n\r\n", len = 157} uri_is_myself = 1 use_ob = 0 rparams = { s = 0x9f4a77 <buf+663> "lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: atpsh-67330196-97f2-2\r\n\r\n", len = 132} __func__ = "after_loose" #8 0x00007fbd1e8c95e5 in loose_route_mode (_m=0x7fbd3fc8ee50, _mode=0) at loose.c:1056 ret = 0 __func__ = "loose_route_mode" #9 0x00007fbd1e8dbcfb in w_loose_route (msg=0x7fbd3fc8ee50, p1=0x0, p2=0x0) at rr_mod.c:273 No locals. #10 0x0000000000443202 in do_action (h=0x7ffeeacec600, a=0x7fbd3fcc8f30, msg=0x7fbd3fc8ee50) at core/action.c:1121 ret = -5 li = 0 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = { s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = { __in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 86 times>, "\200\b\232?\275\177", '\000' <repeats 25 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x0 new_uri = 0x0 end = 0x0 crt = 0x0 cmd = 0x7fbd3f990f60 len = 0 user = 0 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = { s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = { s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x0 port = 0 dst_host = 0x0 i = 0 flags = 0 avp = 0x7fbd3fc8ee50 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x7ffeeacec490 sjt = 0x7fbd3fcc79c0 rve = 0x0 mct = 0x0 rv = 0x0 rv1 = 0x7fbd3fc911d0 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #11 0x0000000000450a6d in run_actions (h=0x7ffeeacec600, a=0x7fbd3fcc8f30, msg=0x7fbd3fc8ee50) at core/action.c:1618 t = 0x7fbd3fcc8f30 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 515035576 __func__ = "run_actions" #12 0x000000000045110f in run_actions_safe (h=0x7ffeeaceda90, a=0x7fbd3fcc8f30, msg=0x7fbd3fc8ee50) at core/action.c:1681 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, 100897437188840159, 268, 536870912, 134217728, 0, 100897437172062943, -100309851447272737}, __mask_was_saved = 0, __saved_mask = {__val = {140450242764528, 0, 0, 140732837840528, 4294967296, 268, 536870912, 134217728, 0, 140732837840912, 6261792, 140732837840816, 140450239826717, 0, 140732837840956, 140450795912448}}}}} ret = -355546824 ign_on_break = 0 #13 0x00000000005f3e0c in rval_get_long (h=0x7ffeeaceda90, msg=0x7fbd3fc8ee50, i=0x7ffeeacece80, rv=0x7fbd3fcc9098, cache=0x0) at core/rvalue.c:973 r_avp = 0x0 avp_val = {n = 134217728, s = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 0}, re = 0x8000000} pval = {rs = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -355545472}, ri = 8589934860, flags = 515035576} tmp = {s = 0x0, len = 1} s = 0x0 r = 0 ret = 0 destroy_pval = 0 __func__ = "rval_get_long" #14 0x00000000005f8c20 in rval_expr_eval_long (h=0x7ffeeaceda90, msg=0x7fbd3fc8ee50, res=0x7ffeeacece80, rve=0x7fbd3fcc9090) at core/rvalue.c:1854 i1 = 1 i2 = 268 ret = -1 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 20 times>, "\001"} c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 140450795679312, s = {s = 0x7fbd3fc8ee50 "(", len = 0}, re = 0x7fbd3fc8ee50}, pval = {rs = {s = 0x7fbd3fc8ee50 "(", len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} rv1 = 0x7fbd1eaa5b77 <t_check_trans+249> rv2 = 0x7ffeeacec950 __func__ = "rval_expr_eval_long" #15 0x0000000000442c83 in do_action (h=0x7ffeeaceda90, a=0x7fbd3fccca70, msg=0x7fbd3fc8ee50) at core/action.c:1097 ret = -5 li = 100897436834421471 v = 0 dst = {send_sock = 0x7ffeeacecf10, to = {s = {sa_family = 15884, sa_data = "_", '\000' <repeats 12 times>}, sin = {sin_family = 15884, sin_port = 95, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 15884, sin6_port = 95, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = { 0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 15884, __ss_padding = "_", '\000' <repeats 25 times>, "\377\377\377\377\000\000\000\000\000\000\000\000\210\033\311?\275\177\000\000\250\321\316\352\376\177\000\000P\356\310?\275\177\000\000\220\332\316\352\376\177\000\000\000\000\000\b", '\000' <repeats 12 times>, "P\317\316\352\376\177\000\000\017\021E\000\000\000\000\000\300\317\316\352\376\177\000\000P\356\310?\275\177\000", __ss_align = 140450795683248}}, id = -355542384, send_flags = { f = 32766, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x8000000 <error: Cannot access memory at address 0x8000000> new_uri = 0x7ffeeaced080 "\b" end = 0x7fbd3fd14870 "X-FS-Support" crt = 0x7fbd1ebc1aa6 <pkg_proc_update_stats+115> "H\213\r\203l" cmd = 0x7ffeeaced040 len = 32766 user = -355544976 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = { s = 0xffffffff0000010c <error: Cannot access memory at address 0xffffffff0000010c>, len = 0}, params = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 0}, sip_params = { s = 0x10c <error: Cannot access memory at address 0x10c>, len = 536870912}, headers = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 0}, port_no = 52704, proto = 60110, type = 32766, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0x45110c), transport = {s = 0x0, len = 1070132816}, ttl = { s = 0x7fbd3fc91930 "\200\001", len = -355542384}, user_param = {s = 0x0, len = -1}, maddr = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 744708831}, method = { s = 0x10c <error: Cannot access memory at address 0x10c>, len = 536870912}, lr = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 0}, r2 = { s = 0x16675af23635adf <error: Cannot access memory at address 0x16675af23635adf>, len = -1190962465}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 5531605}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7ffeeaced210 "", len = -355544856}, maddr_val = {s = 0x7ffeeaced0ec "", len = 1070062736}, method_val = {s = 0x0, len = -355544304}, lr_val = {s = 0x0, len = 0}, r2_val = { s = 0x0, len = 0}, gr_val = {s = 0x0, len = -1}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = { s = 0x10c <error: Cannot access memory at address 0x10c>, len = 536870912}, sip_params = { s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 0}, headers = {s = 0x7ffeeaceccd0 "\340\315\316\352\376\177", len = 4524653}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 1070132816}, user_param = {s = 0x7fbd3fc91930 "\200\001", len = -355545856}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7fbd3f99efd8 "~\205m\036\275\177", len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7fbd3f7ff010 port = 0 dst_host = 0x8000000 i = 1070097552 flags = 0 avp = 0x7fbd3fc4e848 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x0 sjt = 0x0 rve = 0x7fbd3fcc9090 mct = 0x7fbd3fc91b80 rv = 0x0 rv1 = 0x7fbd3fc940a0 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = "\000\000\000\000\000\000\000\000\330\357\231?\275\177\000\000\000\000\000\000\000"} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #16 0x0000000000450a6d in run_actions (h=0x7ffeeaceda90, a=0x7fbd3fcc8ce0, msg=0x7fbd3fc8ee50) at core/action.c:1618 t = 0x7fbd3fccca70 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 8725541, tz_dsttime = 0} tdiff = 1070154176 __func__ = "run_actions" #17 0x000000000043f70a in do_action (h=0x7ffeeaceda90, a=0x7fbd3fc95440, msg=0x7fbd3fc8ee50) at core/action.c:709 ret = -5 li = 16 v = 1 dst = {send_sock = 0x8000000, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000`\327\316\352\376\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "`\327\316\352\376\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "`\327\316\352\376\177\000\000\361=t\000\000\000\000", __u6_addr16 = {55136, 60110, 32766, 0, 15857, 116, 0, 0}, __u6_addr32 = {3939424096, 32766, 7618033, 0}}}, sin6_scope_id = 29}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000`\327\316\352\376\177\000\000\361=t\000\000\000\000\000\035", '\000' <repeats 15 times>, "\377\377\377\377\377\377\377\377P\356\310?\275\177\000\000\000\000\000\b", '\000' <repeats 12 times>, "\360\327\316\352\376\177\000\000H\ru\000\000\000\000\000\020\327\316\352\376\177\000\000\246\032\274\036\275\177\000\000\000\000\000\000\000\000\000\000\204\330\316\352\376\177\000", __ss_align = 134217728}}, id = 1069871744, send_flags = {f = 32701, blst_imask = 0}, proto = 34 '"', proto_pad0 = 75 'K', proto_pad1 = 159} tmp = 0x7ffeeaced980 "0\332\316\352\376\177" new_uri = 0x7ffeeaced910 "`\373\310?\275\177" end = 0x4 <error: Cannot access memory at address 0x4> crt = 0x7fbd3fc8ee50 "(" cmd = 0x7fbd3f99eb40 len = 32701 user = 1070475744 uri = {user = {s = 0x7fbd3facee10 "0", len = 0}, passwd = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 129059344}, host = {s = 0x3c6910 <error: Cannot access memory at address 0x3c6910>, len = 5158384}, port = { s = 0x5ab7e0 <receive_msg+20280> "\230H\301\340\004H\005\350\005\223", len = 16}, params = { s = 0x4f <error: Cannot access memory at address 0x4f>, len = 7598071}, sip_params = {s = 0x7ffeeaced550 "`\326\316\352\376\177", len = 4978977}, headers = {s = 0x0, len = 1065350864}, port_no = 0, proto = 2048, type = 13, flags = (unknown: 0x3f7ff6d0), transport = { s = 0x7ffeeaced660 "`\327\316\352\376\177", len = 7502474}, ttl = {s = 0x7ffeeaced660 "`\327\316\352\376\177", len = 7492948}, user_param = {s = 0x8bb92b "core", len = 7494079}, maddr = {s = 0x8bc708 <__func__.21> "parse_headers", len = 9157624}, method = { s = 0x7fbd3facee50 "\220\001", len = 1065349136}, lr = {s = 0x8bc708 <__func__.21> "parse_headers", len = 9157624}, r2 = { s = 0x40 <error: Cannot access memory at address 0x40>, len = 1065349136}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x9f4b20 <buf+832> "\r\n", len = 0}, ttl_val = {s = 0x8be270 <__func__.3> "parse_to_param", len = 9168712}, user_param_val = { s = 0x30 <error: Cannot access memory at address 0x30>, len = 1065349136}, maddr_val = {s = 0x7fbd3facef50 "\020", len = 1068297568}, method_val = {s = 0x0, len = 1065349136}, lr_val = {s = 0xd0 <error: Cannot access memory at address 0xd0>, len = 1068297744}, r2_val = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, gr_val = { s = 0x10c <error: Cannot access memory at address 0x10c>, len = 536870912}} next_hop = {user = {s = 0x51 <error: Cannot access memory at address 0x51>, len = 10438710}, passwd = { s = 0x7 <error: Cannot access memory at address 0x7>, len = 8}, host = {s = 0x7fbd3fc4ed10 "\003", len = 0}, port = { s = 0x7fbd3fc5af70 "\001", len = 1070061840}, params = {s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 1069920112}, sip_params = {s = 0x0, len = 1068299680}, headers = {s = 0x7fbd3facf4f0 "\001", len = 1070027616}, port_no = 59456, proto = 16324, type = 32701, flags = 0, transport = {s = 0x7fbd3fc5b250 "\004", len = 0}, ttl = {s = 0x0, len = 0}, user_param = { s = 0x43fc7d860 <error: Cannot access memory at address 0x43fc7d860>, len = 9193958}, maddr = {s = 0x0, len = 0}, method = { s = 0x7ffeeaced4e0 "", len = 7807783}, lr = {s = 0x0, len = 0}, r2 = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1068297632}, gr = {s = 0x9f4b22 <buf+834> "", len = 10439422}, transport_val = {s = 0x0, len = -355543632}, ttl_val = { s = 0x9f4b22 <buf+834> "", len = 10439242}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 7534444}, lr_val = {s = 0x7ffeeaced4e0 "", len = 1065349136}, r2_val = {s = 0x7fbd3facee10 "0", len = 1065349136}, gr_val = { s = 0x7ffeeaced520 "P\325\316\352\376\177", len = 515644070}} u = 0x7ffeeacedab0 port = 0 dst_host = 0x7fbd3facee50 i = 41 flags = 0 avp = 0x7627ed <parse_cseq+2542> st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 65537}, re = 0x0}, avp = 0x9f47e0 <buf>} sct = 0x7fbd3fc8ee50 sjt = 0x7fbd3fce29e0 rve = 0x7fbd3fc923c0 mct = 0x7ffeeaced810 rv = 0x0 rv1 = 0x7ffeeaced930 c1 = {cache_type = 3939422992, val_type = 32766, c = {avp_val = {n = 140450790895632, s = {s = 0x7fbd3f7ff010 "\001", len = 1068532832}, re = 0x7fbd3f7ff010}, pval = {rs = {s = 0x7fbd3f7ff010 "\001", len = 1068532832}, ri = 140450790895632, flags = -355544240}}, i2s = "\200\031\213\036\275\177\000\000p\031\213\036\275\177\000\000\020\022\213\036\275\177"} s = {s = 0x893f988fe0 <error: Cannot access memory at address 0x893f988fe0>, len = -355542000} srevp = {0x7ffeeacedb50, 0x7fbd1e83b9ae <tps_msg_received+3364>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #18 0x0000000000450a6d in run_actions (h=0x7ffeeaceda90, a=0x7fbd3fc8fb60, msg=0x7fbd3fc8ee50) at core/action.c:1618 t = 0x7fbd3fc95440 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 1070132816, tz_dsttime = 32701} tdiff = 536870912 __func__ = "run_actions" #19 0x00000000004511d7 in run_top_route (a=0x7fbd3fc8fb60, msg=0x7fbd3fc8ee50, c=0x0) at core/action.c:1701 ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, 100897436159138527, 268, 536870912, 134217728, 0, 100897436209470175, -100309851447272737}, __mask_was_saved = 0, __saved_mask = {__val = {6379359, 4294967296, 140450795679312, 1, 4294967296, 268, 536870912, 134217728, 0, 140732837845856, 0, 4611686022722355200, 0, 140450796023248, 4294967296, 268}}}}} p = 0x7ffeeaceda90 ret = 134217728 sfbk = 0 #20 0x00000000005ab16e in receive_msg ( buf=0x9f47e0 <buf> "BYE sip:gw+internal_sip_gw04_sbc01@172.16.172.216:65000;transport=udp;gw=internal_sip_gw04_sbc01 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bK4BHUQ4D1gBaSS\r\nMax-Forwards: 6"..., len=834, rcv_info=0x7ffeeacee120) at core/receive.c:518 msg = 0x7fbd3fc8ee50 ctx = {rec_lev = 0, run_flags = 2, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, 100897436159138527, 268, 536870912, 134217728, 0, 100897436209470175, -100309851447272737}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 16 times>}}}}} bctx = 0x0 ret = 0 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} diff = 0 inb = { s = 0x9f47e0 <buf> "BYE sip:gw+internal_sip_gw04_sbc01@172.16.172.216:65000;transport=udp;gw=internal_sip_gw04_sbc01 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bK4BHUQ4D1gBaSS\r\nMax-Forwards: 6"..., len = 834} netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0} keng = 0x0 evp = {data = 0x7ffeeacedc80, obuf = {s = 0x0, len = 0}, rcv = 0x7ffeeacee120, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 exectime = 0 __func__ = "receive_msg" #21 0x00000000006f9272 in udp_rcv_loop () at core/udp_server.c:751 len = 605 buf = "BYE sip:gw+internal_sip_gw04_sbc01@172.16.172.216:65000;transport=udp;gw=internal_sip_gw04_sbc01 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bK4BHUQ4D1gBaSS\r\nMax-Forwards: 6"... tmp = 0x11eeb7300 <error: Cannot access memory at address 0x11eeb7300> fromaddr = 0x7fbd3fd07070 fromaddrlen = 16 rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {3870036140, 0}, addr32 = {3870036140, 0, 0, 0}, addr16 = {4268, 59052, 0, 0, 0, 0, 0, 0}, addr = "\254\020\254\346", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {3702263980, 0}, addr32 = {3702263980, 0, 0, 0}, addr16 = {4268, 56492, 0, 0, 0, 0, 0, 0}, addr = "\254\020\254\334", '\000' <repeats 11 times>}}, src_port = 5080, dst_port = 65000, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023ج\020\254\346\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 3870036140}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 3870036140, sin6_addr = { __in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023ج\020\254\346", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fbd3f988fa0, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} printbuf = "\000\337\316\352\376\177\000\000fJ\217\036\275\177\000\000)ҙ\036\275\177\000\000\340"\r\036\275\177\000\0000\337\316\352\376\177\000\000\322+\231\036\275\177\000\000\000\000\000\000\000\000\000\000\340"\r\036\275\177\000\000\000\000\000\000\000\000\000\000\340o\320?\275\177\000\000`\337\316\352\376\177\000\000La\353\036\275\177\000\000\f\001\000\000\000\000\000\000\000\000\000 \000\000\000\000\000\000\000\b", '\000' <repeats 12 times>, "\200\337\316\352\376\177\000\000\307ř\036\275\177\000\000\360"\r\036\275\177\000\000\340o\320?\275\177\000\000 \340\316\352\376\177\000\000\257\372\n\036\275\177\000\000\000\000\000\000\357\000\000\000\200q\250?\357", '\000' <repeats 91 times>... i = -1 j = 343040 l = 239 __func__ = "udp_rcv_loop" #22 0x000000000042dcb6 in main_loop () at main.c:1815 i = 110 pid = 0 si = 0x7fbd3f988fa0 si_desc = "udp receiver child=110 sock=172.16.172.220:65000\000\000\204\000\000\000\000\000\240\350\316\352\376\177\000\000\f\001\000\000\000\000\000\000\000\000\000 \000\000\000\0008>\233?\275\177\000\000\232=\205G\275\177\000\0000\000\000\0000\000\000\000X\344\316\352\376\177\000\000`\343\316\352\376\177\000\000\000\252\000\3016\\321", <incomplete sequence \324> nrprocs = 128 woneinit = 1 __func__ = "main_loop" #23 0x0000000000439e7d in main (argc=10, argv=0x7ffeeacee9b8) at main.c:3256 cfg_stream = 0x1700380 c = -1 r = 0 tmp = 0x7ffeeacefe91 "" tmp_len = 0 port = 5060 proto = 0 aproto = 0 ahost = 0x0 aport = 0 options = 0x8433f8 ":f:cm:M:dVIhEeb:B:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 2922804141 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x7ffeeacee8a0 p = 0x1e00000 <error: Cannot access memory at address 0x1e00000> st = {st_dev = 24, st_ino = 987, st_nlink = 2, st_mode = 16832, st_uid = 991, st_gid = 988, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1730540752, tv_nsec = 312000234}, st_mtim = {tv_sec = 1731395989, tv_nsec = 734966496}, st_ctim = {tv_sec = 1731395989, tv_nsec = 734966496}, __glibc_reserved = {0, 0, 0}} l1 = 512 tbuf = "9\375\305G\275\177\000\000\210\272\302G\275\177\000\0000\346\316\352\376\177\000\000\006\000\000\000\000\000\000\000\b\247\302G\275\177\000\000\006\000\000\000\020\000\000\0000\n\306G\275\177\000\000Չ\303G\275\177\000\000\000\000\000\000\000\000\000\000\240\234\303G\275\177\000\000\370\377\200G\275\177\000\000\000\n\302G\275\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\000\346\316\352\376\177\000\000\240\272\302G\275\177\000\000\240\272\302G\275\177\000\000\000\000\000\000\000\000\000\000`\030\302G\275\177\000\000\000\346\316\352\376\177\000\000\200\025\306G\275\177\000\000\000\240\302G\275\177\000\000\342\253\302G\275\177\000\000vT\303G\275\177\000\000\334#\200G\275\177\000\000\232"... option_index = 0 long_options = {{name = 0x845b26 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x84054c "version", has_arg = 0, flag = 0x0, val = 118}, { name = 0x845b2b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x845b31 "subst", has_arg = 1, flag = 0x0, val = 1025}, { name = 0x845b37 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x845b40 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, { name = 0x845b4a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x845b54 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, { name = 0x845b5f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x845b68 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, { name = 0x845b73 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x845b79 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, { name = 0x845b83 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x845b8a "all-errors", has_arg = 0, flag = 0x0, val = 1035}, { name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" (gdb) (gdb) p*call $1 = {prev = 0x7fbd1e5db5d1 <pcre2_malloc>, next = 0x7fbd1e5db621 <pcre2_free>, lock = {lock = {val = 0}, locker_pid = {val = 0}, rec_lock_level = 518420048}, confirmed = -67 '\275', max_amount = 6.9391911253011244e-310, money_based = {connect_cost = 0, cost_per_second = 0, initial_pulse = 10, final_pulse = 0}, start_timestamp = 0, consumed_amount = 6.3664406801021389e-314, connect_amount = 0, dlg_h_entry = 10, dlg_h_id = 0, client_id = {s = 0x0, len = 10}, sip_data = {callid = {s = 0x0, len = 10}, from_uri = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = -1}, from_tag = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = -1}, to_uri = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = -1}, to_tag = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = -1}}} (gdb)
and what is the output of ``p *call`` ?
In debug and debug end
gdb) p*call $1 = {prev = 0x7fbd1e5db5d1 <pcre2_malloc>, next = 0x7fbd1e5db621 <pcre2_free>, lock = {lock = {val = 0}, locker_pid = {val = 0}, rec_lock_level = 518420048}, confirmed = -67 '\275', max_amount = 6.9391911253011244e-310, money_based = {connect_cost = 0, cost_per_second = 0, initial_pulse = 10, final_pulse = 0}, start_timestamp = 0, consumed_amount = 6.3664406801021389e-314, connect_amount = 0, dlg_h_entry = 10, dlg_h_id = 0, client_id = {s = 0x0, len = 10}, sip_data = {callid = {s = 0x0, len = 10}, from_uri = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = -1}, from_tag = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = -1}, to_uri = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = -1}, to_tag = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = -1}}} (gdb)
``prev = 0x7fbd1e5db5d1 <pcre2_malloc>, next = 0x7fbd1e5db621 <pcre2_free>``
That doesn't make any sense. I'm lost.
I don't use ``cnxcc`` myself and none of my current customers. So I don't have more spare time to spend here, sorry.
This issue is stale because it has been open 6 weeks with no activity. Remove stale label or comment or this will be closed in 2 weeks.
Closed #4009 as not planned.