[sr-dev] [kamailio/kamailio] crash on run_rr_callbacks() from dlg_onroute() (#1059)

Victor Seva notifications at github.com
Wed Apr 5 18:08:25 CEST 2017


It seems that kamailio received two BYE messages at the same time and dlg was gone? 

#### Debugging Data

```
# gdb `which kamailio` core.kamailio.sig11.19255 
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/ac/30bd0b9cd954ea6a966ccc9d55affb6291beb5.debug...done.
done.
[New LWP 19255]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -f /etc/kamailio/proxy/kamailio.cfg -P /var/run/kamailio/kam'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007f8c1d999565 in remove_dialog_timer () from /usr/lib/x86_64-linux-gnu/kamailio/modules/dialog.so
(gdb) 
(gdb) bt full
#0  0x00007f8c1d999565 in remove_dialog_timer () from /usr/lib/x86_64-linux-gnu/kamailio/modules/dialog.so
No symbol table info available.
#1  0x00007f8c1d97b4e5 in dlg_onroute () from /usr/lib/x86_64-linux-gnu/kamailio/modules/dialog.so
No symbol table info available.
#2  0x00007f8c2551728d in run_rr_callbacks (req=0x7f8c28bea120, rr_param=0x7ffc7e4bee40) at rr_cb.c:96
        l_param = {
          s = 0x9aab6a <buf+426> "lr=on;ftag=922229c699;did=793.53a;ice_caller=strip;ice_callee=strip;aset=50;rtpprx=yes;vsf=cTdyd2pyYnZLVHc3VmI0VmQ3aGJxN3J3anJidktUdzdWYjRWXgJYVEE->\r\nProxy-Authorization: Digest username=\"anumber\""..., len = 147}
        cbp = 0x7f8c290558c0
        __FUNCTION__ = "run_rr_callbacks"
#3  0x00007f8c255098a2 in after_loose (_m=0x7f8c28bea120, preloaded=2) at loose.c:928
        puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
            s = 0x9aab5a <buf+410> "Y.Y.Y.Y:5062;lr=on;ftag=922229c699;did=793.53a;ice_caller=strip;ice_callee=strip;aset=50;rtpprx=yes;vsf=cTdyd2pyYnZLVHc3VmI0VmQ3aGJxN3J3anJidktUdzdWYjRWXgJYVEE->\r\nProxy-Authorization: Digest userna"..., len = 10}, port = {
            s = 0x9aab65 <buf+421> "5062;lr=on;ftag=922229c699;did=793.53a;ice_caller=strip;ice_callee=strip;aset=50;rtpprx=yes;vsf=cTdyd2pyYnZLVHc3VmI0VmQ3aGJxN3J3anJidktUdzdWYjRWXgJYVEE->\r\nProxy-Authorization: Digest username=\"3562741"..., len = 4}, params = {
            s = 0x9aab6a <buf+426> "lr=on;ftag=922229c699;did=793.53a;ice_caller=strip;ice_callee=strip;aset=50;rtpprx=yes;vsf=cTdyd2pyYnZLVHc3VmI0VmQ3aGJxN3J3anJidktUdzdWYjRWXgJYVEE->\r\nProxy-Authorization: Digest username=\"anumber\""..., len = 147}, sip_params = {
            s = 0x9aab6a <buf+426> "lr=on;ftag=922229c699;did=793.53a;ice_caller=strip;ice_callee=strip;aset=50;rtpprx=yes;vsf=cTdyd2pyYnZLVHc3VmI0VmQ3aGJxN3J3anJidktUdzdWYjRWXgJYVEE->\r\nProxy-Authorization: Digest username=\"anumber\""..., len = 147}, headers = {s = 0x0, len = 0}, port_no = 5062, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, 
            len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {
            s = 0x9aab6a <buf+426> "lr=on;ftag=922229c699;did=793.53a;ice_caller=strip;ice_callee=strip;aset=50;rtpprx=yes;vsf=cTdyd2pyYnZLVHc3VmI0VmQ3aGJxN3J3anJidktUdzdWYjRWXgJYVEE->\r\nProxy-Authorization: Digest username=\"anumber\""..., len = 5}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, 
          maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {
            s = 0x9aab6d <buf+429> "on;ftag=922229c699;did=793.53a;ice_caller=strip;ice_callee=strip;aset=50;rtpprx=yes;vsf=cTdyd2pyYnZLVHc3VmI0VmQ3aGJxN3J3anJidktUdzdWYjRWXgJYVEE->\r\nProxy-Authorization: Digest username=\"anumber\",re"..., len = 2}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        rt = 0x0
        status = 0
        uri = {
          s = 0x9aab56 <buf+406> "sip:Y.Y.Y.Y:5062;lr=on;ftag=922229c699;did=793.53a;ice_caller=strip;ice_callee=strip;aset=50;rtpprx=yes;vsf=cTdyd2pyYnZLVHc3VmI0VmQ3aGJxN3J3anJidktUdzdWYjRWXgJYVEE->\r\nProxy-Authorization: Digest us"..., len = 167}
        use_ob = 0
        rparams = {
          s = 0x9aab6a <buf+426> "lr=on;ftag=922229c699;did=793.53a;ice_caller=strip;ice_callee=strip;aset=50;rtpprx=yes;vsf=cTdyd2pyYnZLVHc3VmI0VmQ3aGJxN3J3anJidktUdzdWYjRWXgJYVEE->\r\nProxy-Authorization: Digest username=\"anumber\""..., len = 147}
        __FUNCTION__ = "after_loose"
#4  0x0000000000446650 in do_action (h=0x7ffc7e4bf560, a=0x7f8c27f994c8, msg=0x7f8c28bea120) at action.c:1060
        ret = -5
        v = 24865014
        dst = {send_sock = 0x17b6aab, to = {s = {sa_family = 52142, sa_data = "B\000\000\000\000\000\253j{\001\000\000\000"}, sin = {sin_family = 52142, sin_port = 66, sin_addr = {s_addr = 0}, 
              sin_zero = "\253j{\001\000\000\000"}, sin6 = {sin6_family = 52142, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\253j{\001\000\000\000\000\205RD\000\000\000\000", 
                  __u6_addr16 = {27307, 379, 0, 0, 21125, 68, 0, 0}, __u6_addr32 = {24865451, 0, 4477573, 0}}}, sin6_scope_id = 2118906304}}, id = 32764, proto = -16 '\360', send_flags = {f = 241 '\361', 
            blst_imask = 75 'K'}}
        end = 0x7ffc7e4bf560 "\001"
        uri = {user = {s = 0x7ffc7e4c0830 "\003", len = 938514842}, passwd = {s = 0xa00000000 <error: Cannot access memory at address 0xa00000000>, len = 22844112}, host = {
            s = 0x100000003 <error: Cannot access memory at address 0x100000003>, len = 681881128}, port = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, params = {
            s = 0x200000001 <error: Cannot access memory at address 0x200000001>, len = 2118906304}, sip_params = {s = 0x15c91c0 "", len = -1642256896}, headers = {
            s = 0x9aa9c8 <buf+8> "Y.Y.Y.Y:5080;prxroute=1 SIP/2.0\r\nRecord-Route: <sip:10.64.0.14;r2=on;lr=on;ftag=922229c699;ngcplb=yes;socket=udp:84.255.4.7:5060>\r\nRecord-Route: <sip:84.255.4.7;r2=on;lr=on;ftag=922229c699;ngcplb=y"..., len = 671147880}, port_no = 65535, proto = 65535, type = ERROR_URI_T, flags = (unknown: 683581728), transport = {s = 0x7ffc7e4c0830 "\003", len = 2118906688}, ttl = {
            s = 0x17b6aea "{\001", len = 4377518}, user_param = {s = 0x7f8c27f6ae20 "\001", len = 671137416}, maddr = {s = 0x7f8c28bea120 "+-\002", len = 671137528}, method = {
            s = 0x7e4bf280 <error: Cannot access memory at address 0x7e4bf280>, len = 623674360}, lr = {s = 0x7ffc7e4c0670 "\277\001", len = 2118906724}, r2 = {s = 0x7f8c00000000 "", len = 0}, gr = {
            s = 0x7ffc7e4bf4c4 "\214\177", len = -1642256896}, transport_val = {s = 0xd0de87bdb0391519 <error: Cannot access memory at address 0xd0de87bdb0391519>, len = 671137536}, ttl_val = {s = 0x0, 
            len = 671137416}, user_param_val = {s = 0x7f8c28bea120 "+-\002", len = 671137528}, maddr_val = {s = 0x7ffc7e4bf280 "", len = 4589069}, method_val = {s = 0x0, len = 519504614}, lr_val = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 250335224}, r2_val = {s = 0xe9a188 <error: Cannot access memory at address 0xe9a188>, len = 18100232}, gr_val = {
            s = 0x11993f0 <error: Cannot access memory at address 0x11993f0>, len = 8}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x1800000000 <error: Cannot access memory at address 0x1800000000>, len = 6243476}, host = {
            s = 0xe98ed8 <error: Cannot access memory at address 0xe98ed8>, len = -1642256896}, port = {s = 0x6afc59 <__FUNCTION__.8262> "rval_new_empty", len = 671154536}, params = {
            s = 0x7ffc7e4c0830 "\003", len = 683581728}, sip_params = {s = 0x7f8c2800e768 "\017", len = 683581728}, headers = {s = 0x17b6aea "{\001", len = 4479757}, port_no = 0, proto = 4096, 
          type = ERROR_URI_T, flags = (unknown: 936), transport = {s = 0x19 <error: Cannot access memory at address 0x19>, len = 683581728}, ttl = {s = 0x7ffc7e4c0830 "\003", len = 2118908048}, 
---Type <return> to continue, or q <return> to quit---
          user_param = {s = 0x7f8c287c7320 "\002", len = 4349792}, maddr = {s = 0x7ffc7e4bf350 "\224\363K~\374\177", len = 4349855}, method = {s = 0x7f8c00000000 "", len = 4362395}, lr = {
            s = 0x7ffc7e4bf394 "6", len = 1}, r2 = {s = 0x0, len = -1642256896}, gr = {s = 0x1141e58 <error: Cannot access memory at address 0x1141e58>, len = -1642256896}, transport_val = {
            s = 0x1d <error: Cannot access memory at address 0x1d>, len = 0}, ttl_val = {s = 0x3600000064 <error: Cannot access memory at address 0x3600000064>, len = 532}, user_param_val = {s = 0x0, 
            len = 1}, maddr_val = {s = 0x7f8c28bea120 "+-\002", len = 939161967}, method_val = {s = 0x0, len = 5665286}, lr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, 
            len = 250337280}, r2_val = {s = 0xe99938 <error: Cannot access memory at address 0xe99938>, len = -1642256896}, gr_val = {s = 0x11993f0 <error: Cannot access memory at address 0x11993f0>, 
            len = 497}}
        u = 0x7ffc7e4bf560
        flags = 0
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x5f4494 <fm_malloc+3044>}
        sct = 0x7ffc7e4bf560
        sjt = 0x7ffc7e4bf560
        mct = 0x17b6aea
        rv = 0x7f8c28a9d728
        rv1 = 0x7f8c28bea120
        c1 = {cache_type = 681970264, val_type = RV_NONE, c = {avp_val = {n = 683581728, s = {s = 0x7f8c28bea120 "+-\002", len = 0}, re = 0x7f8c28bea120}, pval = {rs = {s = 0x7f8c28bea120 "+-\002", 
                len = 0}, ri = 939035407, flags = 32652}}, i2s = '\000' <repeats 16 times>, "\270\361K~\374\177"}
        s = {s = 0x1ffffffff <error: Cannot access memory at address 0x1ffffffff>, len = 683581728}
        srevp = {0x7ffc7e4c0670, 0x7ffc7e4bf214}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, 
              string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
            type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 15}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 36}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#5  0x0000000000445115 in run_actions (h=0x7f8b5fb23500, h at entry=0x7ffc7e4bf560, a=0x6, msg=0x1) at action.c:1549
        ret = 2118912048
        mod = 0x7f8c27f994c8
        __FUNCTION__ = "run_actions"
#6  0x0000000000451ae7 in run_actions_safe (h=0x7ffc7e4c0830, a=<optimized out>, msg=<optimized out>) at action.c:1614
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140722427393376, -3396127869322586855, 140239955730720, 140722427398192, 140722427394192, 24865514, 
                -3396127820052097767, 3397538908824868121}, __mask_was_saved = 0, __saved_mask = {__val = {5665521, 140722427393848, 140239955730720, 140722427393848, 7568605033954878976, 140722427393812, 
                  497, 140239942814231, 140239942814231, 140722427393744, 0, 99, 5666971, 15310176, 18099168, 18453488}}}}}
        ret = <optimized out>
        ign_on_break = 0
#7  0x0000000000426c70 in rval_get_int (h=0x7ffc7e4c0830, msg=0x7f8b5fb23500, i=0x7ffc7e4bf890, rv=0x0, cache=0x9d6460 <tcp_main_ltimer+112672>) at rvalue.c:912
        r_avp = 0x0
        avp_val = {n = 2118907856, s = {s = 0x7ffc7e4bf7d0 "", len = 5668051}, re = 0x7ffc7e4bf7d0}
        pval = {rs = {s = 0x6909162d0000001f <error: Cannot access memory at address 0x6909162d0000001f>, len = 683540480}, ri = 1, flags = 32764}
        tmp = {s = 0x7ffc00000001 <error: Cannot access memory at address 0x7ffc00000001>, len = 670665240}
        s = 0x7f8c28bea120
        r = 0
        ret = 0
        destroy_pval = 2118912048
        __FUNCTION__ = "rval_get_int"
#8  0x000000000042c9fc in rval_expr_eval_int (h=0x7ffc7e4c0830, msg=0x7f8c28bea120, res=0x7ffc7e4bf890, rve=0x7f8c27f995f8) at rvalue.c:1910
        i1 = 32652
        i2 = 1
        ret = -1
        c1 = {cache_type = 670665240, val_type = 32652, c = {avp_val = {n = 31, s = {s = 0x6909162d0000001f <error: Cannot access memory at address 0x6909162d0000001f>, len = 670994688}, 
              re = 0x6909162d0000001f}, pval = {rs = {s = 0x6909162d0000001f <error: Cannot access memory at address 0x6909162d0000001f>, len = 670994688}, ri = -1642256896, flags = 1762203181}}, 
          i2s = "\000\000\000\000\004\000\000\000ȋ\371'\214\177\000\000\000\000\000\000\000"}
        c2 = {cache_type = 683581728, val_type = 32652, c = {avp_val = {n = 670665664, s = {s = 0x7f8c27f98bc0 "\001", len = 670665672}, re = 0x7f8c27f98bc0}, pval = {rs = {s = 0x7f8c27f98bc0 "\001", 
                len = 670665672}, ri = 4589069, flags = 0}}, i2s = "\304\023\000\000\001\000\000\000\260\211\371'\214\177\000\000\000\000\000\000\000"}
        rv1 = 0x7f8c252c7f66 <pv_set_avp+1270>
        rv2 = 0x10000017b6aea
        __FUNCTION__ = "rval_expr_eval_int"
#9  0x0000000000446b27 in do_action (h=0x7ffc7e4c0830, a=0x7f8c27fe6830, msg=0x7f8c28bea120) at action.c:1030
        ret = -5
---Type <return> to continue, or q <return> to quit---
        v = 0
        dst = {send_sock = 0x7f8c28bea120, to = {s = {sa_family = 7, sa_data = "\000\000\000\000\000\000\260\376K~\374\177\000"}, sin = {sin_family = 7, sin_port = 0, sin_addr = {s_addr = 0}, 
              sin_zero = "\260\376K~\374\177\000"}, sin6 = {sin6_family = 7, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\260\376K~\374\177\000\000 \241\276(\214\177\000", 
                  __u6_addr16 = {65200, 32331, 32764, 0, 41248, 10430, 32652, 0}, __u6_addr32 = {2118909616, 32764, 683581728, 32652}}}, sin6_scope_id = 24865514}}, id = 0, proto = 91 '[', send_flags = {
            f = 119 'w', blst_imask = 87 'W'}}
        end = 0x7f8c27f995f8 "\001"
        uri = {user = {s = 0x7ffc7e4bfeb0 " \241\276(\214\177", len = 683581728}, passwd = {s = 0x7ffc7e4bfeb0 " \241\276(\214\177", len = 683581728}, host = {s = 0x17b6aea "{\001", len = 4482640}, 
          port = {s = 0x7f8c2818fe58 "\220\001", len = 687376112}, params = {s = 0x7ffc7e4c0830 "\003", len = -5}, sip_params = {s = 0x7ffc7e4bfab0 "", len = 683581728}, headers = {
            s = 0x1666830 "\220m\177\001", len = 2118909840}, port_no = 13540, proto = 14338, type = 32652, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 939668708), transport = {s = 0x0, 
            len = 938508137}, ttl = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 4349792}, user_param = {s = 0x7ffc7e4bfb20 "", len = 4349855}, maddr = {
            s = 0x7f8c287c7320 "\002", len = 4362395}, method = {s = 0x7f8b5fb95036 "udp", len = 3}, lr = {s = 0x7f8c37f0999a <vfprintf+22490> "\200\275(\373\377\377", len = 2118909824}, r2 = {
            s = 0x7f8c287c7320 "\002", len = 540189421}, gr = {s = 0x7f8c20547260 <log_flag> "\377\377\377\377\001", len = 4349855}, transport_val = {s = 0x7f8c285b4f00 "\002", len = 4362395}, ttl_val = {
            s = 0x7ffc00000000 <error: Cannot access memory at address 0x7ffc00000000>, len = -5}, user_param_val = {s = 0x4b37 <error: Cannot access memory at address 0x4b37>, len = 10}, maddr_val = {
            s = 0x10000020 <error: Cannot access memory at address 0x10000020>, len = 938689182}, method_val = {s = 0x1666830 "\220m\177\001", len = 687260760}, lr_val = {s = 0x7ffc7e4c0000 "", 
            len = 683581728}, r2_val = {s = 0x7ffc7e4c0000 "", len = 683581728}, gr_val = {s = 0x17b6aea "{\001", len = 4482640}}
        next_hop = {user = {s = 0x7ffc7e4bfc00 "Y\374j", len = -1642256896}, passwd = {s = 0x0, len = 687213120}, host = {s = 0x7ffc7e4c0830 "\003", len = -5}, port = {s = 0x7ffc7e4bfc10 "", 
            len = 683581728}, params = {s = 0x17b6aea "{\001", len = 4477573}, sip_params = {s = 0x7ffc7e4bfc10 "", len = 2118908992}, headers = {s = 0x7f8c28f60a40 "\334\001", len = 683581728}, 
          port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x7ffc00000000 <error: Cannot access memory at address 0x7ffc00000000>, len = 0}, ttl = {
            s = 0x7ffc7e4c0020 " \241\276(\214\177", len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 938514842}, method = {s = 0x7f8c37f0999a <vfprintf+22490> "\200\275(\373\377\377", 
            len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 519504614}, gr = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 250336336}, transport_val = {s = 0xe99d30 <error: Cannot access memory at address 0xe99d30>, len = 18099120}, 
          ttl_val = {s = 0x11993f0 <error: Cannot access memory at address 0x11993f0>, len = 8}, user_param_val = {s = 0x19b <error: Cannot access memory at address 0x19b>, len = -1642256896}, 
          maddr_val = {s = 0x1142bb0 <error: Cannot access memory at address 0x1142bb0>, len = 6243476}, method_val = {s = 0x7ffc7e4c0830 "\003", len = 6978301}, lr_val = {
            s = 0x6afc59 <__FUNCTION__.8262> "rval_new_empty", len = -1642256896}, r2_val = {s = 0x0, len = 687224008}, gr_val = {s = 0x7ffc7e4c0830 "\003", len = -5}}
        u = 0x7f8c27f995f8
        flags = 0
        st = {flags = 2118908928, id = 32764, name = {n = -1642256896, s = {s = 0x6909162d9e1d2600 <error: Cannot access memory at address 0x6909162d9e1d2600>, len = 0}, re = 0x6909162d9e1d2600}, 
          avp = 0x7f8c28f60a40}
        sct = 0x7f8c27f995f8
        sjt = 0x7f8c27f995f8
        mct = 0x17b6aea
        rv = 0x0
        rv1 = 0x7f8c28bea120
        c1 = {cache_type = 687185704, val_type = 32652, c = {avp_val = {n = -1642256896, s = {s = 0x6909162d9e1d2600 <error: Cannot access memory at address 0x6909162d9e1d2600>, len = 683581728}, 
              re = 0x6909162d9e1d2600}, pval = {rs = {s = 0x6909162d9e1d2600 <error: Cannot access memory at address 0x6909162d9e1d2600>, len = 683581728}, ri = 542603232, flags = 32652}}, 
          i2s = "\360\223\031\001F\000\000\000\000&\035\236-\026\ti\243\001\000\000\000"}
        s = {s = 0x186b4f57011424d8 <error: Cannot access memory at address 0x186b4f57011424d8>, len = -1642256896}
        srevp = {0x9aad1a <buf+858>, 0x5e7}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, 
              string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
            type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 15}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 36}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#10 0x0000000000445115 in run_actions (h=0x7f8b5fb23500, a=0x6, msg=0x1) at action.c:1549
        ret = 1
        mod = 0x7f8c27fe6830
        __FUNCTION__ = "run_actions"
#11 0x0000000000446d40 in do_action (h=0x7ffc7e4c0830, a=0x7f8c288d33a8, msg=0x7f8c28bea120) at action.c:678
        ret = -5
        v = 0
        dst = {send_sock = 0x17b6aab, to = {s = {sa_family = 21125, sa_data = "D\000\000\000\000\000\300y\020(\214\177\000"}, sin = {sin_family = 21125, sin_port = 68, sin_addr = {s_addr = 0}, 
              sin_zero = "\300y\020(\214\177\000"}, sin6 = {sin6_family = 21125, sin6_port = 68, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\300y\020(\214\177\000\000/\000\000\000\000\000\000", __u6_addr16 = {31168, 10256, 32652, 0, 47, 0, 0, 0}, __u6_addr32 = {672168384, 32652, 47, 0}}}, 
              sin6_scope_id = 980445555}}, id = 32652, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        end = 0x6 <error: Cannot access memory at address 0x6>
        uri = {user = {s = 0x7ffc7e4c0064 "", len = 6404846}, passwd = {s = 0x7ffc7e4c0830 "\003", len = 2118910388}, host = {s = 0x17b6aea "{\001", len = -1642256896}, port = {
            s = 0x7f8c28bea120 "+-\002", len = 687260760}, params = {s = 0x7ffc7e4c0830 "\003", len = -5}, sip_params = {s = 0x7ffc7e4c0000 "", len = 683581728}, headers = {s = 0x17b6aea "{\001", 
---Type <return> to continue, or q <return> to quit---
            len = 4477573}, port_no = 0, proto = 32332, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4212331800), transport = {s = 0x7f8c28f6c458 ")\002", len = 683581728}, ttl = {
            s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 683581728}, user_param = {s = 0x7ffc7e4c0088 "", len = 2118910056}, maddr = {s = 0x7ffc7e4c0064 "", len = 5800526}, 
          method = {s = 0x7f8c28f68630 "\001", len = 683581728}, lr = {s = 0x7ffc7e4c0830 "\003", len = 519504614}, r2 = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, 
            len = 250336336}, gr = {s = 0xe99d30 <error: Cannot access memory at address 0xe99d30>, len = 18099120}, transport_val = {s = 0x11993f0 <error: Cannot access memory at address 0x11993f0>, 
            len = 8}, ttl_val = {s = 0x19b <error: Cannot access memory at address 0x19b>, len = -1642256896}, user_param_val = {s = 0x7f8c287c7320 "\002", len = 6233684}, maddr_val = {
            s = 0x7ffc7e4c0080 "", len = 679244504}, method_val = {s = 0x7f8c38263620 "", len = 0}, lr_val = {s = 0x7ffc7e4c0830 "\003", len = 683581728}, r2_val = {s = 0x7ffc7e4c0830 "\003", 
            len = 2118910768}, gr_val = {s = 0x17b6aea "{\001", len = 4528871}}
        next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffc7e4c0000 "", len = 1094259993}, host = {s = 0x7f8c28bea120 "+-\002", len = 2118912048}, port = {s = 0x7ffc7e4c0330 "\001", 
            len = 24865514}, params = {s = 0xd0de87bdacb91519 <error: Cannot access memory at address 0xd0de87bdacb91519>, len = -82635495}, sip_params = {s = 0x0, len = 544780589}, headers = {
            s = 0x7e4c0168 <error: Cannot access memory at address 0x7e4c0168>, len = 687244856}, port_no = 36328, proto = 10486, type = 32652, 
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 939139724), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x7ffc7e4c0140 "h\345\230 \214\177", 
            len = 2118910240}, maddr = {s = 0x7f8c3a706973 <error: Cannot access memory at address 0x7f8c3a706973>, len = 683581728}, method = {s = 0x1816f60 "\340hm\001", len = 0}, lr = {
            s = 0x40 <error: Cannot access memory at address 0x40>, len = -1642256896}, r2 = {s = 0x300000039 <error: Cannot access memory at address 0x300000039>, len = 2118910768}, gr = {
            s = 0x7ffc7e4c0830 "\003", len = 4353136}, transport_val = {s = 0x1000000000000 <error: Cannot access memory at address 0x1000000000000>, len = 7200}, ttl_val = {s = 0x1541c40 "CEST", 
            len = 623629966}, user_param_val = {s = 0x7f8b5fc10115 "5060", len = 10498376}, maddr_val = {s = 0x9a9790 <_km_log_func> "\340jA", len = 0}, method_val = {
            s = 0x7f8c2098e568 <_xlog_prefix> "\242\263x \214\177", len = -1642256896}, lr_val = {s = 0x416ae0 <syslog at plt> "\377%\222\310X", len = 687262272}, r2_val = {
            s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 683581728}, gr_val = {s = 0x7ffc7e4c0830 "\003", len = 2118910768}}
        u = 0x6
        flags = 32652
        st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x7f8c00000001 "", len = 2118909952}, re = 0x7f8c00000001}, avp = 0xd0de87b241391519}
        sct = 0x6
        sjt = 0x6
        mct = 0x17b6aea
        rv = 0x7f8c28f79ba8
        rv1 = 0x7f8c28bea120
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 5060, s = {s = 0x29000013c4 <error: Cannot access memory at address 0x29000013c4>, len = 2118912048}, re = 0x29000013c4}, 
            pval = {rs = {s = 0x29000013c4 <error: Cannot access memory at address 0x29000013c4>, len = 2118912048}, ri = 672168304, flags = 32652}}, 
          i2s = "\270y\020(\214\177\000\000\210\000L~\374\177\000\000\210\000L~\374\177"}
        s = {s = 0x7f8c287c766e "4", len = 3}
        srevp = {0x7ffc7e4c0670, 0x7f8c28bea120}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, 
              string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
            type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 15}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 36}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#12 0x0000000000445115 in run_actions (h=0x7f8b5fb23500, a=0x6, msg=0x1) at action.c:1549
        ret = 2118912048
        mod = 0x7f8c28f6c808
        __FUNCTION__ = "run_actions"
#13 0x0000000000446b78 in do_action (h=0x7ffc7e4c0830, a=0x7f8c28f6ee18, msg=0x7f8c28bea120) at action.c:1049
        ret = 1
        v = 1
        dst = {send_sock = 0x7f8c28bea120, to = {s = {sa_family = 51646, sa_data = "\334%\214\177\000\000\264\000\000\000\374\177\000"}, sin = {sin_family = 51646, sin_port = 9692, sin_addr = {
                s_addr = 32652}, sin_zero = "\264\000\000\000\374\177\000"}, sin6 = {sin6_family = 51646, sin6_port = 9692, sin6_flowinfo = 32652, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\264\000\000\000\374\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {180, 0, 32764, 0, 0, 0, 0, 0}, __u6_addr32 = {180, 32764, 0, 0}}}, 
              sin6_scope_id = 674766208}}, id = 32652, proto = 32 ' ', send_flags = {f = 161 '\241', blst_imask = 190 '\276'}}
        end = 0x7f8c28f6ca40 "\001"
        uri = {user = {s = 0x7ffc7e4c05dc "", len = 635512766}, passwd = {s = 0x7f8b5fdb1890 "\224*\002", len = 683581728}, host = {s = 0x5fcdb5d8 <error: Cannot access memory at address 0x5fcdb5d8>, 
            len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x4881 <error: Cannot access memory at address 0x4881>, len = -1642256896}, headers = {
            s = 0x6 <error: Cannot access memory at address 0x6>, len = 634972939}, port_no = 180, proto = 0, type = 32651, flags = (unknown: 2118911600), transport = {s = 0x0, len = 681887176}, ttl = {
            s = 0x7f8c28bea120 "+-\002", len = 1610866240}, user_param = {s = 0x7f8b6003dc38 "\240\377h_\213\177", len = 4529039}, maddr = {s = 0x0, len = 0}, method = {
            s = 0x4 <error: Cannot access memory at address 0x4>, len = 635512766}, lr = {s = 0x0, len = 683581728}, r2 = {s = 0x7f8b5ff2fff8 "", len = 200}, gr = {s = 0x0, len = 683581728}, 
          transport_val = {s = 0x7f8c28837df0 <incomplete sequence \350>, len = 638037828}, ttl_val = {s = 0x7ffc7e4c05dc "", len = -1642256896}, user_param_val = {
            s = 0x7f8c260671f0 <tm_cfg> "h\371\220_\213\177", len = 634977214}, maddr_val = {s = 0x7f8b00000004 <error: Cannot access memory at address 0x7f8b00000004>, len = 1609884936}, method_val = {
            s = 0x4 <error: Cannot access memory at address 0x4>, len = 683581728}, lr_val = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len = 1609885456}, r2_val = {s = 0x7f8b5ff4e508 "", 
            len = 634984442}, gr_val = {s = 0x0, len = -1642256896}}
        next_hop = {user = {s = 0x7f8c28bea120 "+-\002", len = 2118911456}, passwd = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 683581728}, host = {
---Type <return> to continue, or q <return> to quit---
            s = 0xb4 <error: Cannot access memory at address 0xb4>, len = 1610866240}, port = {s = 0x7f8b6003dc38 "\240\377h_\213\177", len = 635245418}, params = {
            s = 0x7ffc000000b7 <error: Cannot access memory at address 0x7ffc000000b7>, len = 10493856}, sip_params = {s = 0xa01fa8 <def_list+8> "", len = 10493872}, headers = {
            s = 0xa01fb8 <def_list+24> "", len = 10493896}, port_no = 7448, proto = 160, type = ERROR_URI_T, flags = (URI_SIP_USER_PHONE | unknown: 519504612), transport = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 519504614}, ttl = {s = 0x0, len = 250281984}, user_param = {s = 0x0, len = 519504614}, maddr = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 250338176}, method = {s = 0xe98c70 <error: Cannot access memory at address 0xe98c70>, len = 18097280}, lr = {
            s = 0x11993f0 <error: Cannot access memory at address 0x11993f0>, len = 8}, r2 = {s = 0x1dc <error: Cannot access memory at address 0x1dc>, len = 519504614}, gr = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 250341208}, transport_val = {s = 0xe989e0 <error: Cannot access memory at address 0xe989e0>, len = 18094248}, 
          ttl_val = {s = 0x11993f0 <error: Cannot access memory at address 0x11993f0>, len = 8}, user_param_val = {s = 0x1bf <error: Cannot access memory at address 0x1bf>, len = -1642256896}, 
          maddr_val = {s = 0x11418a8 <error: Cannot access memory at address 0x11418a8>, len = 6243476}, method_val = {s = 0x7f8c28a4c5c8 "\231\034", len = 6978301}, lr_val = {
            s = 0x71c670 <__FUNCTION__.7459> "parse_via", len = 1610865720}, r2_val = {s = 0xd0de87b257b91519 <error: Cannot access memory at address 0xd0de87b257b91519>, len = -82635495}, gr_val = {
            s = 0x0, len = -1642256896}}
        u = 0x7f8c28f6ca40
        flags = 32651
        st = {flags = 683581728, id = 32652, name = {n = 2118911456, s = {s = 0x7ffc7e4c05e0 "", len = 5}, re = 0x7ffc7e4c05e0}, avp = 0x7f8c28bea120}
        sct = 0x7f8c28f6ca40
        sjt = 0x7f8c28f6ca40
        mct = 0x17b6aea
        rv = 0x1
        rv1 = 0x7f8c28bea120
        c1 = {cache_type = 180, val_type = RV_NONE, c = {avp_val = {n = 1610865912, s = {s = 0x7f8b6003dcf8 "\264", len = 10482636}, re = 0x7f8b6003dcf8}, pval = {rs = {s = 0x7f8b6003dcf8 "\264", 
                len = 10482636}, ri = 5, flags = 1}}, i2s = "\340\005L~\374\177\000\000\070\334\003`\213\177\000\000\240\377h_\213\177"}
        s = {s = 0xa48980 <_pkg_root> "\344\016p", len = 808857653}
        srevp = {0x7f8c27ede430, 0x7f8b6003de40}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 2, 
              string = 0x2 <error: Cannot access memory at address 0x2>, str = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {
            type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 15}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, 
                len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 36}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#14 0x0000000000445115 in run_actions (h=0x7f8b5fb23500, h at entry=0x7ffc7e4c0830, a=0x6, a at entry=0x7f8c28f1b930, msg=0x1, msg at entry=0x7f8c28bea120) at action.c:1549
        ret = 1
        mod = 0x7f8c28f6ee18
        __FUNCTION__ = "run_actions"
#15 0x0000000000451b85 in run_top_route (a=0x7f8c28f1b930, msg=0x7f8c28bea120, c=<optimized out>) at action.c:1635
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140722427398192, 3397538390581253401, 140239959079216, 140239955730720, 0, 0, -3396127868821367527, 
                3397538908824868121}, __mask_was_saved = 0, __saved_mask = {__val = {10136323, 1354, 7568605033954878976, 10136001, 6243476, 140239948066720, 140239955730720, 10136044, 10136000, 1354, 
                  7568605033954878976, 0, 140239960257184, 1073741825, 140239907703544, 140239960247216}}}}}
        p = <optimized out>
        ret = <optimized out>
        sfbk = 0
#16 0x0000000000556f9e in receive_msg (buf=0x0, len=683581728, rcv_info=0x7ffc7e4c0b10) at receive.c:240
        msg = 0x7f8c28bea120
        ctx = {rec_lev = 23098816, run_flags = 0, last_retcode = 23098816, jmp_env = {{__jmpbuf = {0, 6, 140236580472680, 140236549023960, 140722427398688, 140239791653606, 268435456, 250568360}, 
              __mask_was_saved = 15165008, __saved_mask = {__val = {10105736, 0, 140722427398950, 5, 1, 140239942050864, 140240218561991, 5, 0, 7063492, 140240210401128, 140239955456248, 140239942050864, 
                  140240220669584, 140240218587877, 140240220669584}}}}}
        inb = {
          s = 0x9aa9c0 <buf> "BYE sip:Y.Y.Y.Y:5080;prxroute=1 SIP/2.0\r\nRecord-Route: <sip:10.64.0.14;r2=on;lr=on;ftag=922229c699;ngcplb=yes;socket=udp:84.255.4.7:5060>\r\nRecord-Route: <sip:84.255.4.7;r2=on;lr=on;ftag=922229c699;"..., len = 1354}
        netinfo = {data = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1571855534}, dst = 0x7f8c37ec9768, rcv = 0x7f8c38895000}
        __FUNCTION__ = "receive_msg"
#17 0x0000000000479f10 in udp_rcv_loop () at udp_server.c:495
        len = 1354
        buf = "BYE sip:Y.Y.Y.Y:5080;prxroute=1 SIP/2.0\r\nRecord-Route: <sip:10.64.0.14;r2=on;lr=on;ftag=922229c699;ngcplb=yes;socket=udp:84.255.4.7:5060>\r\nRecord-Route: <sip:84.255.4.7;r2=on;lr=on;ftag=922229c699;"...
        from = 0x7f8c28ba70f8
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {234897418, 140236580472680}, addr32 = {234897418, 0, 1603290984, 32651}, addr16 = {16394, 3584, 0, 0, 18280, 24464, 32651, 0}, 
              addr = "\n@\000\016\000\000\000\000hG\220_\213\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {335560714, 0}, addr32 = {335560714, 0, 0, 0}, addr16 = {16394, 5120, 0, 0, 0, 0, 0, 0}, 
---Type <return> to continue, or q <return> to quit---
              addr = "\n@\000\024", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5062, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, 
              sa_data = "\023\304\n@\000\016\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 234897418}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 234897418, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 
                    0}}}, sin6_scope_id = 0}}, bind_address = 0x7f8c27ede430, proto = 1 '\001'}
        __FUNCTION__ = "udp_rcv_loop"
#18 0x00000000004ffe39 in main_loop () at main.c:1614
        si_desc = "udp receiver child=5 sock=Y.Y.Y.Y:5062\000\000\000\001\000\000\000pX\300(\214\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000\315f_\000\000\000\000\000\003\000\000\000\000\000\000\000\000&\035\236-\026\ti\000\000\000\000\000\000\000\000\000&\035\236-\026\ti\310\002\245\000\000\000\000\000\005\000\000\000\000\000\000"
        woneinit = 1
        __FUNCTION__ = "main_loop"
#19 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631
        cfg_stream = 0x0
        r = 0
        tmp = 0x7ffc7e4c2ee4 ""
        tmp_len = 0
        port = 0
        proto = 948524496
        ret = 0
        seed = 1296618944
        debug_save = 0
        debug_flag = 4
        dont_fork_cnt = 0
        st = {st_dev = 15, st_ino = 122623671, st_nlink = 2, st_mode = 16877, st_uid = 106, st_gid = 108, __pad0 = 0, st_rdev = 0, st_size = 60, st_blksize = 4096, st_blocks = 0, st_atim = {
            tv_sec = 1488564228, tv_nsec = 817944387}, st_mtim = {tv_sec = 1490749503, tv_nsec = 811780252}, st_ctim = {tv_sec = 1490749503, tv_nsec = 811780252}, __glibc_reserved = {0, 0, 0}}
        __FUNCTION__ = "main"
(gdb) 
```

#### Log Messages

<!--
Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->

```
Mar 29 09:02:14 sp2 proxy[19254]: NOTICE: <script>: New request on proxy - M=ACK R=sip:Y.Y.Y.Y:5080;prxroute=1 F=sip:anumber at sipwise.hello.local:5060 T=sip:bnumber at sipwise.hello.local:5060 IP=X.X.X.X:5060 (10.64.0.14:5060) ID=bf8e1a679ee462a4 UA='EPC2425-110715'
Mar 29 09:03:57 sp2 proxy[19255]: NOTICE: <script>: New request on proxy - M=BYE R=sip:Y.Y.Y.Y:5080;prxroute=1 F=sip:anumber at sipwise.hello.local:5060 T=sip:bnumber at sipwise.hello.local:5060 IP=X.X.X.X:5060 (10.64.0.14:5060) ID=bf8e1a679ee462a4 UA='EPC2425-110715'
Mar 29 09:03:57 sp2 proxy[19257]: NOTICE: <script>: New request on proxy - M=BYE R=sip:Y.Y.Y.Y:5080;prxroute=1 F=sip:anumber at sipwise.hello.local:5060 T=sip:bnumber at sipwise.hello.local:5060 IP=X.X.X.X:5060 (10.64.0.14:5060) ID=bf8e1a679ee462a4 UA='EPC2425-110715'
Mar 29 09:03:57 sp2 proxy[19257]: NOTICE: <script>: NAT-Reply - S=200 - OK M=BYE IP=X.X.X.X:5060 (Y.Y.Y.Y:5080) ID=bf8e1a679ee462a4 UA='<null>'
```

### Additional Information

  * **Kamailio Version** - output of `kamailio -v`

```
version: kamailio 4.4.4 (x86_64/linux) 
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: unknown 
compiled with gcc 4.9.2
```

This is ``NGCP`` based on 4.4.4 with tm deep cloning edb9df8ace8ff74 backported 


-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1059
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-dev/attachments/20170405/fd25c6ba/attachment-0001.html>


More information about the sr-dev mailing list