[sr-dev] [kamailio/kamailio] Kamailio 4.4.5 crash at receive_fd() (#1069)

Pepelux notifications at github.com
Wed Apr 12 10:56:48 CEST 2017


<!--
Kamailio Project uses GitHub Issues only for bugs in the code or feature requests.

If you have questions about using Kamailio or related to its configuration file,
ask on sr-users mailing list:

  * http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

If you have questions about developing extensions to Kamailio or its existing
C code, ask on sr-dev mailing list

  * http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev

Please try to fill this template as much as possible for any issue. It helps the
developers to troubleshoot the issue.

If you submit a feature request (or enhancement), you can delete the text of
the template and only add the description of what you would like to be added.

If there is no content to be filled in a section, the entire section can be removed.

You can delete the comments from the template sections when filling.

You can delete next line and everything above before submitting (it is a comment).
-->

### Description

<!--
Explain what you did, what you expected to happen, and what actually happened.
-->

Kamailio dies every few hours, apparently trying to delete a finished dialog. After crash it always shows the message: 'dlg_clean_run(): dialog in delete state is too old'

### Troubleshooting

#### Reproduction

<!--
If the issue can be reproduced, describe how it can be done.
-->

#### Debugging Data

<!--
If you got a core dump, use gdb to extract troubleshooting data - full backtrace,
local variables and the list of the code at the issue location.

  gdb /path/to/kamailio /path/to/corefile
  bt full
  info locals
  list

If you are familiar with gdb, feel free to attach more of what you consider to
be relevant.
-->

```
# gdb /usr/sbin/kamailio /tmp/core.22773
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later
<http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from
/usr/lib/debug/.build-id/a2/2b21a61e95b0b11a767bd32090a1083560a3dd.debug...done.
done.
[New LWP 22773]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio.pid
-f /etc/kamailio/kamailio.'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74
74      ../../mem/../atomic/atomic_common.h: No such file or directory.
(gdb) bt full
#0  atomic_get (v=<optimized out>) at ../../mem/../atomic/atomic_common.h:74
No locals.
#1  dlg_unref_helper (dlg=0x7fde1fec6ff0, cnt=1, fname=0x58f5 <error: Cannot
#access memory at address 0x58f5>, fline=1637) at dlg_hash.c:925
        mypid = 22773
        d_entry = 0x7fe819d53bf0
        __FUNCTION__ = "dlg_unref_helper"
#2  0x00007fde0ba72e12 in dlg_run_event_route (dlg=0x7fde1fec6ff0,
msg=0x7fde325bfa10, ostate=290317344, nstate=1) at dlg_handlers.c:1637
        rt = 10129124
        bkroute = 1
        __FUNCTION__ = "dlg_run_event_route"
#3  0x00007fde0ba761cf in dlg_onroute (req=0x7fde325bfa10,
route_params=0x7fde114dce10, param=0x7fde114de420) at dlg_handlers.c:1314
        val = {
          s = 0x9aacfa <buf+186> "001.dc;nat=yes>\r\nMax-Forwards:
69\r\nFrom: <sip:677xxxxxx at customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx at customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY"..., len = 6}
        ftag = {
          s = 0x9aad51 <buf+273> "as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx at customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-Hangu"..., len = 10}
        old_state = 4
        dir = 2
        ret = 22773
        callid = {
          s = 0x9aada9 <buf+361>
"141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n",
len = 55}
        new_state = 5
        unref = 1
        event = 7
        dlg = 0x7fde1fec6ff0
        ttag = {
          s = 0x9aad96 <buf+342> "58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Leng"..., len = 8}
        h_id = 198013376
        dlg = 0x58f5
#4  0x00007fde0e34f28d in run_rr_callbacks (req=0x7fde325bfa10,
rr_param=0x7ffe9c8fa6e0) at rr_cb.c:96
        l_param = {
          s = 0x9aace5 <buf+165>
"lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
<sip:677xxxxxx at customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx at customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
1413"..., len = 35}
        cbp = 0x7fde325b27d0
        __FUNCTION__ = "run_rr_callbacks"
#5  0x00007fde0e3418a2 in after_loose (_m=0x7fde325bfa10, preloaded=2) at
loose.c:928
        puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host
= {
            s = 0x9aacd8 <buf+152>
"185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards:
69\r\nFrom: <sip:677xxxxxx at customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx at customers.xxxxxxxxxxx.com>;tag=58b18f69\r\n"..., len =
12}, port = {s = 0x0, len = 0}, params = {
            s = 0x9aace5 <buf+165>
"lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
<sip:677xxxxxx at customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx at customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
1413"..., len = 35}, sip_params = {
            s = 0x9aace5 <buf+165>
"lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
<sip:677xxxxxx at customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx at customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
1413"..., len = 35}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0,
type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl
= {s = 0x0, len = 0},
          user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0},
method = {s = 0x0, len = 0}, lr = {
            s = 0x9aace5 <buf+165>
"lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
<sip:677xxxxxx at customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx at customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
1413"..., len = 2}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0},
transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0},
user_param_val = {s = 0x0, len = 0},
---Type <return> to continue, or q <return> to quit---
          maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0},
lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0,
len = 0}}
        rt = 0x0
        status = 22773
        uri = {
          s = 0x9aacd4 <buf+148>
"sip:185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards:
69\r\nFrom: <sip:677xxxxxx at customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx at customers.xxxxxxxxxxx.com>;tag=58b18f"..., len = 52}
        use_ob = 0
        rparams = {
          s = 0x9aace5 <buf+165>
"lr;ftag=58b18f69;did=001.dc;nat=yes>\r\nMax-Forwards: 69\r\nFrom:
<sip:677xxxxxx at customers.xxxxxxxxxxx.com>;tag=as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx at customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
1413"..., len = 35}
        __FUNCTION__ = "after_loose"
#6  0x0000000000454b60 in do_action (h=0x7ffe9c8fae00, a=0x7fde323f7d98,
msg=0x7fde325bfa10) at action.c:1060
        ret = -5
        v = 25
        dst = {send_sock = 0x7ffe9c8fa950, to = {s = {sa_family = 9055,
        sa_data = "B\000\000\000\000\000\060\033\\2\336\177\000"}, sin =
        {sin_family = 9055, sin_port = 66, sin_addr = {s_addr = 0},
              sin_zero = "0\033\\2\336\177\000"}, sin6 = {sin6_family =
9055, sin6_port = 66, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8
= "0\033\\2\336\177\000\000[TB\000\000\000\000",
                  __u6_addr16 = {6960, 12892, 32734, 0, 21595, 66, 0, 0},
__u6_addr32 = {844897072, 32734, 4346971, 0}}}, sin6_scope_id = 13909984}},
id = 0, proto = 10 '\n', send_flags = {f = 0 '\000',
            blst_imask = 0 '\000'}}
        end = 0x7ffe9c8fae00 "\001"
        uri = {user = {s = 0x1000000 <error: Cannot access memory at address
        0x1000000>, len = 13911000}, passwd = {s = 0x23a790 <error: Cannot
        access memory at address 0x23a790>, len = -1668306428}, host = {
            s = 0x2bd8c8 <error: Cannot access memory at address 0x2bd8c8>,
len = 535588848}, port = {s = 0xa <error: Cannot access memory at address
0xa>, len = 0}, params = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len =
290108944}, sip_params = {s = 0x7ffe9c8fab30 "Q\255\232", len = 5781511},
headers = {s = 0x0, len = 798682880}, port_no = 0, proto = 0,
          type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown:
195350440), transport = {s = 0x7ffe9c8fab20 "\251\255\232", len =
-1668306148}, ttl = {
            s = 0x7fde00000000 <error: Cannot access memory at address
0x7fde00000000>, len = 290108944}, user_param = {
            s = 0x9aada9 <buf+361>
"141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n",
len = 55}, maddr = {s = 0x10001000000 <error: Cannot access memory at
address 0x10001000000>, len = 8}, method = {s = 0x23a4d0 <error: Cannot
access memory at address 0x23a4d0>,
            len = -1668306144}, lr = {s = 0x49 <error: Cannot access memory
at address 0x49>, len = 10137053}, r2 = {s = 0x1893d2 <error: Cannot access
memory at address 0x1893d2>, len = 87}, gr = {
            s = 0x1eb8c6 <error: Cannot access memory at address 0x1eb8c6>,
len = -1668306204}, transport_val = {s = 0x0, len = 535588848}, ttl_val = {s
= 0x7fde114ab610 "", len = 22773}, user_param_val = {
            s = 0x3ac <error: Cannot access memory at address 0x3ac>, len =
1}, maddr_val = {s = 0x7fde114ab624 "", len = 5781511}, method_val = {
            s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route:
<sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589>\r\nRecord-Route:
<sips:185.xx.xx.51;r2="..., len = 798682880}, lr_val = {s = 0x7fde12ec1678 "
,x\021\336\177", len = 195403485}, r2_val = {s = 0x0, len = 798682880},
gr_val = {s = 0x0, len = 195754177}}
        next_hop = {user = {
            s = 0x9aada9 <buf+361>
"141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n",
len = 55}, passwd = {
            s = 0x9aad51 <buf+273> "as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx at customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-Hangu"..., len = 10}, host = {
            s = 0x9aad96 <buf+342> "58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Leng"..., len =
535588848}, port = {s = 0x0, len = 798682880}, params = {s = 0x0, len =
842977936}, sip_params = {s = 0x7fde325bfa10 "yb\004", len = -1668305776},
headers = {
            s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route:
<sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589>\r\nRecord-Route:
<sips:185.xx.xx.51;r2="..., len = 290100736}, port_no = 5752, proto = 4844,
type = 32734, flags = (URI_USER_NORMALIZE | unknown: 195759988), transport =
{s = 0x0, len = 0}, ttl = {s = 0x0, len = 0},
          user_param = {s = 0x0, len = 0}, maddr = {s = 0x7fde32315910 "1",
len = 1}, method = {s = 0x0, len = 798682880}, lr = {s = 0x6632430c90
<error: Cannot access memory at address 0x6632430c90>,
            len = 842977912}, r2 = {s = 0x7ffe9c8fac90 "", len = 844888592},
gr = {s = 0x7ffe9c8fc0d0 "\003", len = -1668305308}, transport_val = {s =
0x0, len = 5736030}, ttl_val = {s = 0x7ffe9c8fae64 "\001",
            len = -1668300592}, user_param_val = {s = 0x7fde325bfa10
"yb\004", len = -1668300592}, maddr_val = {s = 0x7ffe9c8fae64 "\001", len =
4337637}, method_val = {
            s = 0xa00000000 <error: Cannot access memory at address
0xa00000000>, len = 535588848}, lr_val = {s = 0xa <error: Cannot access
memory at address 0xa>, len = 0}, r2_val = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len =
290108944}, gr_val = {s = 0x0, len = 0}}
        u = 0x7ffe9c8fae00
        flags = 0
        st = {flags = 10137001, id = 0, name = {n = 55, s = {s = 0x37
        <error: Cannot access memory at address 0x37>, len = 10136913}, re =
        0x37}, avp = 0xa}
        sct = 0x7ffe9c8fae00
---Type <return> to continue, or q <return> to quit---
        sjt = 0x7ffe9c8fae00
        mct = 0x0
        rv = 0x7fde325bfa10
        rv1 = 0x7fde325bfa10
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val
        = {n = 0, s = {s = 0x0, len = -1668305944}, re = 0x0}, pval = {rs =
        {s = 0x0, len = -1668305944}, ri = -1668305976, flags = 32766}},
          i2s =
"諏\234\376\177\000\000\324\251\217\234\376\177\000\000\310\330+\000\000"}
        s = {s = 0x7ffe9c8fc0d0 "\003", len = -1668305152}
        srevp = {0x7fde323f7d98, 0x7fde325bfa10}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
        str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
        {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140592304344264,
              string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s =
0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr =
0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE,
            u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type
= NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#7  0x0000000000453625 in run_actions (h=0x1, h at entry=0x7ffe9c8fae00,
a=0x7fde114dce10, msg=0x7fde114de420) at action.c:1549
        ret = -1668300592
        mod = 0x7fde323f7d98
        __FUNCTION__ = "run_actions"
#8  0x000000000045fff7 in run_actions_safe (h=0x7ffe9c8fc0d0, a=<optimized
out>, msg=<optimized out>) at action.c:1614
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env =
{{__jmpbuf = {140731525082624, 1693443033458036444, 140592304355856,
140731525087440, 140731525083440, 0, 1693443034133319388,
                -1694082562576986404}, __mask_was_saved = 0, __saved_mask =
                -{__val = {1893732767588085504, 4294967566, 140592302729920,
                -140592301545600, 140591459467265, 0, 1893732767588085504,
                -0,
                  140592303006032, 140731525082928, 140592304355856,
140731525087440, 140731525083440, 0, 5736030, 140731525083440}}}}}
        ret = <optimized out>
        ign_on_break = 0
#9  0x0000000000423030 in rval_get_int (h=0x7ffe9c8fc0d0, msg=0x1,
i=0x7ffe9c8fb130, rv=0x3d4, cache=0x67) at rvalue.c:912
        r_avp = 0x58f5
        avp_val = {n = 267, s = {s = 0x10b <error: Cannot access memory at
address 0x10b>, len = 844356336}, re = 0x10b}
        pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}
        tmp = {s = 0xa489c0 <_pkg_root> "\v\017p", len = 842586088}
        s = 0x7fde325bfa10
        r = 22773
        ret = 22773
        destroy_pval = -1668300592
        __FUNCTION__ = "rval_get_int"
#10 0x0000000000428dbc in rval_expr_eval_int (h=0x7ffe9c8fc0d0,
msg=0x7fde325bfa10, res=0x7ffe9c8fb130, rve=0x7fde323f7230) at rvalue.c:1910
        i1 = 0
        i2 = 0
        ret = -1
        c1 = {cache_type = 2626666704, val_type = 32766, c = {avp_val = {n =
        0, s = {s = 0x300000000 <error: Cannot access memory at address
        0x300000000>, len = 843191600}, re = 0x300000000}, pval = {rs = {
                s = 0x300000000 <error: Cannot access memory at address
0x300000000>, len = 843191600}, ri = 844888592, flags = 32734}},
          i2s =
"\000\000\000\000\004\000\000\000gV\023\f\336\177\000\000;\232\061\062\336\177"}
        c2 = {cache_type = 842345632, val_type = 32734, c = {avp_val = {n =
5740203, s = {s = 0x5796ab <pv_printf+267>
"\205\300u\210\366D$\024\001t\027H\213\065\223\366B", len = 10136872},
              re = 0x5796ab <pv_printf+267>}, pval = {rs = {s = 0x5796ab
<pv_printf+267> "\205\300u\210\366D$\024\001t\027H\213\065\223\366B", len =
10136872}, ri = 9, flags = 0}},
          i2s =
"\360\332S2\336\177\000\000\000\357\232/\353\343G\032\001\000\000\000\000"}
        rv1 = 0x7fde325bfa10
        rv2 = 0x0
        __FUNCTION__ = "rval_expr_eval_int"
---Type <return> to continue, or q <return> to quit---
#11 0x0000000000455037 in do_action (h=0x7ffe9c8fc0d0, a=0x7fde323fe300,
#msg=0x7fde325bfa10) at action.c:1030
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 61184, sa_data =
        "\232/\353\343G\032\020\372[2\336\177\000"}, sin = {sin_family =
        61184, sin_port = 12186, sin_addr = {s_addr = 440919019},
              sin_zero = "\020\372[2\336\177\000"}, sin6 = {sin6_family =
61184, sin6_port = 12186, sin6_flowinfo = 440919019, sin6_addr = {__in6_u =
{
                  __u6_addr8 =
"\020\372[2\336\177\000\000\301\370\252\v\336\177\000", __u6_addr16 =
{64016, 12891, 32734, 0, 63681, 2986, 32734, 0}, __u6_addr32 = {844888592,
32734, 195754177, 32734}}},
              sin6_scope_id = 10137001}}, id = 0, proto = 55 '7', send_flags
= {f = 0 '\000', blst_imask = 0 '\000'}}
        end = 0x7fde323f7230 "\001"
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>,
len = 290108944}, passwd = {s = 0x7ffe9c8fb320 "Q\255\232", len = 5781511},
host = {s = 0x0, len = 798682880}, port = {s = 0x0,
            len = 195350441}, params = {s = 0x7ffe9c8fb310 "\251\255\232",
len = -1668304116}, sip_params = {s = 0x7ffe00000000 <error: Cannot access
memory at address 0x7ffe00000000>, len = 290108944},
          headers = {
            s = 0x9aada9 <buf+361>
"141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n",
len = 55}, port_no = 45904, proto = 40079, type = 256, flags = (unknown: 8),
transport = {s = 0x7fde3246f350 "\224\004", len = -1668304112}, ttl = {
            s = 0x49 <error: Cannot access memory at address 0x49>, len =
10137053}, user_param = {s = 0x1893d2 <error: Cannot access memory at
address 0x1893d2>, len = 87}, maddr = {
            s = 0x1eb8c6 <error: Cannot access memory at address 0x1eb8c6>,
len = -1668304172}, method = {s = 0x7fde3248b930 "\001", len = 535588848},
lr = {s = 0x7fde114ab610 "", len = 22773}, r2 = {
            s = 0x3ac <error: Cannot access memory at address 0x3ac>, len =
1}, gr = {s = 0x7fde114ab624 "", len = 5781511}, transport_val = {
            s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route:
<sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589>\r\nRecord-Route:
<sips:185.xx.xx.51;r2="..., len = 798682880}, ttl_val = {s = 0x7fde13decf68
"\210\317\336\023\336\177", len = 195403485}, user_param_val = {s =
0x7ffe9c8fc0d0 "\003", len = 798682880}, maddr_val = {
            s = 0x18faa <error: Cannot access memory at address 0x18faa>,
len = 195754177}, method_val = {
            s = 0x9aada9 <buf+361>
"141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r\n",
len = 55}, lr_val = {
            s = 0x9aad51 <buf+273> "as2ad67a1d\r\nTo:
<sip:o9_xxxxxxxxxxxxx at customers.xxxxxxxxxxx.com>;tag=58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-Hangu"..., len = 10}, r2_val = {
            s = 0x9aad96 <buf+342> "58b18f69\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Leng"..., len =
535588848}, gr_val = {s = 0x0, len = 798682880}}
        next_hop = {user = {s = 0x0, len = 842388880}, passwd = {s =
0x7fde325bfa10 "yb\004", len = -1668303744}, host = {
            s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route:
<sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589>\r\nRecord-Route:
<sips:185.xx.xx.51;r2="..., len = 290100736}, port = {s = 0x7fde13decf68
"\210\317\336\023\336\177", len = 195759989}, params = {
            s = 0x178051779d804edc <error: Cannot access memory at address
0x178051779d804edc>, len = -1922412836}, sip_params = {s = 0x0, len = 36},
headers = {
            s = 0x9aad9e <buf+350> "\r\nCall-ID:
141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI\r\nCSeq: 102
BYE\r\nUser-Agent: ast.zs PBX\r\nX-Asterisk-HangupCause: Normal
Clearing\r\nX-Asterisk-HangupCauseCode: 16\r\nContent-Length: 0\r\n\r"...,
len = 843626808}, port_no = 14536, proto = 12849, type = 32734, flags =
URI_USER_NORMALIZE, transport = {s = 0x0, len = 798682880}, ttl = {s = 0x0,
            len = 842388856}, user_param = {s = 0x7ffe9c8fb480 "", len =
844888592}, maddr = {s = 0x7ffe9c8fc0d0 "\003", len = -1668303232}, method =
{s = 0x0, len = 5736030}, lr = {s = 0x7ffe9c8fb680 "",
            len = -1668300592}, r2 = {s = 0x7fde325bfa10 "yb\004", len =
-1668300592}, gr = {s = 0x7ffe9c8fb680 "", len = 4337637}, transport_val =
{s = 0x0, len = 340527640}, ttl_val = {s = 0x7fde32353ff0 "",
            len = 798682880}, user_param_val = {s = 0x7ffe9c8fb5c0
"\310\003", len = 843727864}, maddr_val = {s = 0x0, len = 0}, method_val =
{s = 0x0, len = 798682880}, lr_val = {s = 0x0, len = 842388840},
          r2_val = {s = 0xffffffff <error: Cannot access memory at address
0xffffffff>, len = 844888592}, gr_val = {s = 0x7ffe9c8fc0d0 "\003", len =
-1668303232}}
        u = 0x7fde323f7230
        flags = 32734
        st = {flags = 0, id = 0, name = {n = 842388880, s = {s =
        0x7fde3235d590 "", len = 844888592}, re = 0x7fde3235d590}, avp =
        0x7ffe9c8fb480}
        sct = 0x7fde323f7230
        sjt = 0x7fde323f7230
        mct = 0x0
        rv = 0x583807 <get_debug_level+103>
        rv1 = 0x7fde325bfa10
        c1 = {cache_type = 10136913, val_type = RV_NONE, c = {avp_val = {n =
        10, s = {s = 0xa <error: Cannot access memory at address 0xa>, len =
        10136982}, re = 0xa}, pval = {rs = {
                s = 0xa <error: Cannot access memory at address 0xa>, len =
10136982}, ri = -1668304396, flags = 32766}}, i2s =
"\000\000\000\000\000\000\000\000\360o\354\037\336\177\000\000\n\000\000\000\000"}
        s = {
          s = 0x7fde1fec6ff0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP
185.xx.xx.53:5080;rport=5080;branch=z9hG4bK57ed24bb\r\nRecord-Route:
<sips:185.xx.xx.51:5061;transport=tls;r2=on;lr;ftag=693575589>\r\nRecord-Route:
<sips:185.xx.xx.51;r2="..., len = 798682880}
        srevp = {0x7fde323fe300, 0x7fde325bfa10}
---Type <return> to continue, or q <return> to quit---
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140592304344264,
              string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s =
0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr =
0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE,
            u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type
= NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#12 0x0000000000453625 in run_actions (h=0x1, a=0x7fde114dce10,
msg=0x7fde114de420) at action.c:1549
        ret = 1
        mod = 0x7fde323fe300
        __FUNCTION__ = "run_actions"
#13 0x0000000000455250 in do_action (h=0x7ffe9c8fc0d0, a=0x7fde325a0768,
msg=0x7fde325bfa10) at action.c:678
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
        "\000\000\000\000\000\000\240\344=\037\336\177\000"}, sin =
        {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0},
              sin_zero = "\240\344=\037\336\177\000"}, sin6 = {sin6_family =
0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"\240\344=\037\336\177\000\000\230Z23\336\177\000",
                  __u6_addr16 = {58528, 7997, 32734, 0, 23192, 13106, 32734,
0}, __u6_addr32 = {524149920, 32734, 858938008, 32734}}}, sin6_scope_id =
720}}, id = 0, proto = -96 '\240', send_flags = {
            f = 134 '\206', blst_imask = 143 '\217'}}
        end = 0x8 <error: Cannot access memory at address 0x8>
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>,
        len = 290108944}, passwd = {s = 0x7ffe9c8fb870
        "\320\300\217\234\376\177", len = 5781511}, host = {
            s = 0x100000002 <error: Cannot access memory at address
0x100000002>, len = 798682880}, port = {s = 0x0, len = 842385936}, params =
{s = 0x7ffe9c8fc0d0 "\003", len = -5}, sip_params = {
            s = 0x7ffe9c8fb8a0 "", len = 844888592}, headers = {s = 0x0, len
= 4535845}, port_no = 47264, proto = 40079, type = 32766, flags = (unknown:
2626664656), transport = {s = 0x7fde3235ca10 "\267\001",
            len = 844888592}, ttl = {s = 0x100000000 <error: Cannot access
memory at address 0x100000000>, len = 859634415}, user_param = {
            s = 0x770000006e <error: Cannot access memory at address
0x770000006e>, len = 0}, maddr = {s = 0x7ffe9c8fb898 "\367\377E", len =
14512472}, method = {s = 0xdd2d20 "", len = 14494752}, lr = {
            s = 0x0, len = 14494752}, r2 = {s = 0x100000003 <error: Cannot
access memory at address 0x100000003>, len = -1668302096}, gr = {s = 0x3
<error: Cannot access memory at address 0x3>, len = 0},
          transport_val = {s = 0x200000001 <error: Cannot access memory at
address 0x200000001>, len = -1668302688}, ttl_val = {s = 0xdd7380 "O\206",
<incomplete sequence \335>, len = 0}, user_param_val = {
            s = 0x7fde325c1e7e "ast.zs PBX", len = 1}, maddr_val = {s =
0xdd7140 <incomplete sequence \335>, len = 859613985}, method_val = {s =
0x7ffe9c8fb89c "", len = 0}, lr_val = {
            s = 0x7ffe9c8fc0d0 "\003", len = 844888592}, r2_val = {s =
0x7ffe9c8fc0d0 "\003", len = -1668301872}, gr_val = {s = 0x0, len =
4587511}}
        next_hop = {user = {s = 0x0, len = 1}, passwd = {s = 0x7ffe9c8fb8a0
"", len = 2023771868}, host = {s = 0x7fde325bfa10 "yb\004", len =
-1668300592}, port = {s = 0x7ffe9c8fbbd0 "\001", len = 0},
          params = {s = 0x1780517796204edc <error: Cannot access memory at
address 0x1780517796204edc>, len = -1922412836}, sip_params = {s = 0x0, len
= 0}, headers = {
            s = 0x400000000 <error: Cannot access memory at address
0x400000000>, len = 0}, port_no = 3, proto = 0, type = TEL_URI_T, flags =
(URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = {s = 0x0,
            len = 14494920}, ttl = {s = 0x1000001 <error: Cannot access
memory at address 0x1000001>, len = -1668302460}, user_param = {s = 0xdd2c20
"@\206", <incomplete sequence \335>, len = 249889158},
          maddr = {s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 13911176}, method = {s = 0x23a6e0 <error: Cannot access
memory at address 0x23a6e0>, len = 2866040}, lr = {
            s = 0x2bd8c8 <error: Cannot access memory at address 0x2bd8c8>,
len = 798682880}, r2 = {s = 0x10f <error: Cannot access memory at address
0x10f>, len = -1668301872}, gr = {
            s = 0x7ffe9c8fc0d0 "\003", len = 4337712}, transport_val = {s =
0x8 <error: Cannot access memory at address 0x8>, len = 844898032}, ttl_val
= {
            s = 0x100000000 <error: Cannot access memory at address
0x100000000>, len = 14495104}, user_param_val = {s = 0xdd2c20 "@\206",
<incomplete sequence \335>, len = 8}, maddr_val = {
            s = 0x80 <error: Cannot access memory at address 0x80>, len =
859605510}, method_val = {s = 0x0, len = 798682880}, lr_val = {s = 0x0, len
= 842386696}, r2_val = {
            s = 0xffffffff <error: Cannot access memory at address
0xffffffff>, len = 844888592}, gr_val = {s = 0x7ffe9c8fc0d0 "\003", len =
-1668301872}}
        u = 0x8
        flags = 0
        st = {flags = 0, id = 0, name = {n = 1, s = {s = 0x1 <error: Cannot
        access memory at address 0x1>, len = -1668302688}, re = 0x1}, avp =
        0x1780517778a04edc}
        sct = 0x8
        sjt = 0x8
        mct = 0x0
        rv = 0x7ffe9c8fb940
        rv1 = 0x7fde325bfa10
        c1 = {cache_type = 2626651800, val_type = 32766, c = {avp_val = {n =
        -1668311360, s = {s = 0x7ffe9c8f96c0 "\356\215L2\336\177", len =
        --1668315456}, re = 0x7ffe9c8f96c0}, pval = {rs = {
                s = 0x7ffe9c8f96c0 "\356\215L2\336\177", len = -1668315456},
ri = -1668303036, flags = 32766}}, i2s =
"`.\335\000\000\000\000\000\360o\354\037\336\177\000\000\n\000\000\000\000"}
---Type <return> to continue, or q <return> to quit---
        s = {s = 0x43b2fc <tsend_stream+2204>
"\351\243\375\377\377\350j\324\005", len = -1668302564}
        srevp = {0x7fde3235e198, 0x7fde325bfa10}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140592304344264,
              string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s =
0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr =
0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE,
            u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type
= NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#14 0x0000000000453625 in run_actions (h=0x1, a=0x7fde114dce10,
msg=0x7fde114de420) at action.c:1549
        ret = 1
        mod = 0x7fde3235e198
        __FUNCTION__ = "run_actions"
#15 0x0000000000455088 in do_action (h=0x7ffe9c8fc0d0, a=0x7fde3235e2c8,
msg=0x7fde325bfa10) at action.c:1049
        ret = 1
        v = 1
        dst = {send_sock = 0x7fde325bfa10, to = {s = {sa_family = 19294,
        sa_data = "\364\020\336\177\000\000\310\000\000\000\376\177\000"},
        sin = {sin_family = 19294, sin_port = 4340, sin_addr = {
                s_addr = 32734}, sin_zero = "\310\000\000\000\376\177\000"},
sin6 = {sin6_family = 19294, sin6_port = 4340, sin6_flowinfo = 32734,
sin6_addr = {__in6_u = {
                  __u6_addr8 = "\310\000\000\000\376\177\000\000\370\026\032
\336\177\000", __u6_addr16 = {200, 0, 32766, 0, 5880, 8218, 32734, 0},
__u6_addr32 = {200, 32766, 538580728, 32734}}},
              sin6_scope_id = 844897072}}, id = 32734, proto = 16 '\020',
send_flags = {f = 250 '\372', blst_imask = 91 '['}}
        end = 0x7fde3235cd08 "\001"
        uri = {user = {s = 0x7ffe9c8fbe7c "", len = -1668301628}, passwd =
{s = 0x7fde202251d0 "\306_\004", len = 538580448}, host = {s = 0x9 <error:
Cannot access memory at address 0x9>, len = 0}, port = {
            s = 0x7fde11446610 "\340\025\032 \336\177", len = 55150}, params
= {s = 0x7ffe9c8fbe7c "", len = 5781511}, sip_params = {s = 0xd76e <error:
Cannot access memory at address 0xd76e>,
            len = 798682880}, headers = {s = 0x7fde201a16f8 "\002", len =
842171456}, port_no = 6960, proto = 12892, type = 32734, flags = (unknown:
696), transport = {s = 0x7fde325bfa10 "yb\004",
            len = 843938568}, ttl = {s = 0x7fde325bfa10 "yb\004", len =
538580968}, user_param = {s = 0x0, len = -1}, maddr = {s = 0x7ffe9c8fbd10
"", len = -759148836}, method = {
            s = 0x4 <error: Cannot access memory at address 0x4>, len =
10129124}, lr = {s = 0x9a9a80 <p_onsend> "", len = 844888592}, r2 = {
            s = 0x178051778f004edc <error: Cannot access memory at address
0x178051778f004edc>, len = -1922412836}, gr = {s = 0x0, len = 0},
transport_val = {s = 0x7fde111da1f0 <tm_cfg> "\b\226N\021\336\177",
            len = 5781511}, ttl_val = {s = 0x7ffe9c8fbe7c "", len =
-1668301356}, user_param_val = {s = 0x7fde111da1f0 <tm_cfg>
"\b\226N\021\336\177", len = 1}, maddr_val = {
            s = 0x7fde201a15e0 "\020fD\021\336\177", len = 844888592},
method_val = {s = 0xc8 <error: Cannot access memory at address 0xc8>, len =
538580968}, lr_val = {s = 0x7fde201a15e0 "\020fD\021\336\177",
            len = 5781511}, r2_val = {s = 0x7fde200ac1a8
"\260yD\021\336\177", len = 284185226}, gr_val = {s = 0x0, len = 284422397}}
        next_hop = {user = {s = 0xc8 <error: Cannot access memory at address
0xc8>, len = -1668301184}, passwd = {s = 0x4 <error: Cannot access memory at
address 0x4>, len = 844888592}, host = {
            s = 0xc8 <error: Cannot access memory at address 0xc8>, len =
538580968}, port = {s = 0x7fde201a15e0 "\020fD\021\336\177", len =
284462986}, params = {
            s = 0x7fde00000000 <error: Cannot access memory at address
0x7fde00000000>, len = 10484192}, sip_params = {s = 0x9ff9e8 <def_list+8>
"", len = 10484208}, headers = {s = 0x9ff9f8 <def_list+24> "",
            len = 10484232}, port_no = 63320, proto = 159, type =
ERROR_URI_T, flags = (unknown: 2626666112), transport = {s = 0xa8428197
<error: Cannot access memory at address 0xa8428197>, len = 397}, ttl = {
            s = 0x0, len = -1668349752}, user_param = {s = 0x0, len =
249889158}, maddr = {s = 0x1000000 <error: Cannot access memory at address
0x1000000>, len = 13912792}, method = {
            s = 0x23a090 <error: Cannot access memory at address 0x23a090>,
len = -1668301052}, lr = {s = 0x2bd8c8 <error: Cannot access memory at
address 0x2bd8c8>, len = -1668301036}, r2 = {
            s = 0x7fde325bfa10 "yb\004", len = 249889158}, gr = {s =
0x1000000 <error: Cannot access memory at address 0x1000000>, len =
13913504}, transport_val = {
            s = 0x239dc8 <error: Cannot access memory at address 0x239dc8>,
len = 2863712}, ttl_val = {s = 0x2bd8c8 <error: Cannot access memory at
address 0x2bd8c8>, len = 8}, user_param_val = {
            s = 0x119 <error: Cannot access memory at address 0x119>, len =
798682880}, maddr_val = {s = 0x2bb260 <error: Cannot access memory at
address 0x2bb260>, len = 6243540}, method_val = {
            s = 0x7fde324d7b08 "\\\005", len = 6978116}, lr_val = {s =
0x71ca40 <__FUNCTION__.7459> "parse_via", len = 538580448}, r2_val = {
            s = 0x1780517781204edc <error: Cannot access memory at address
0x1780517781204edc>, len = -1668300892}, gr_val = {s = 0x0, len = 10136780}}
        u = 0x7fde3235cd08
        flags = 32734
        st = {flags = 200, id = 0, name = {n = -1668301184, s = {s =
        0x7ffe9c8fbe80 "", len = 4}, re = 0x7ffe9c8fbe80}, avp =
        0x7fde325bfa10}
        sct = 0x7fde3235cd08
        sjt = 0x7fde3235cd08
        mct = 0x0
        rv = 0x1
---Type <return> to continue, or q <return> to quit---
        rv1 = 0x7fde325bfa10
        c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_INT, c = {avp_val =
{n = 538580640, s = {s = 0x7fde201a16a0 <incomplete sequence \310>, len =
10482688}, re = 0x7fde201a16a0}, pval = {rs = {
                s = 0x7fde201a16a0 <incomplete sequence \310>, len =
10482688}, ri = 4, flags = 1}}, i2s =
"\000\276\217\234\376\177\000\000\000\063'
\336\177\000\000\000n=\021\336\177"}
        s = {s = 0xa489c0 <_pkg_root> "\v\017p", len = 4}
        srevp = {0x7fde3235e2c8, 0x7fde325bfa10}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0,
        str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
        {type = NUMBER_ST, u = {number = 2,
              string = 0x2 <error: Cannot access memory at address 0x2>, str
= {s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data =
0x2, attr = 0x2, select = 0x2}}, {
            type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str =
{s = 0x0, len = 12}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
MODFIXUP_ST, u = {number = 140592304344264,
              string = 0x7fde325bccc8 "\200\023A2\336\177", str = {s =
0x7fde325bccc8 "\200\023A2\336\177", len = 3}, data = 0x7fde325bccc8, attr =
0x7fde325bccc8, select = 0x7fde325bccc8}}, {type = NOSUBTYPE,
            u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data =
0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string
= 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type
= NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __FUNCTION__ = "do_action"
#16 0x0000000000453625 in run_actions (h=0x1, h at entry=0x7ffe9c8fc0d0,
a=0x7fde114dce10, a at entry=0x7fde32353dc8, msg=0x7fde114de420,
#msg at entry=0x7fde325bfa10) at action.c:1549
        ret = 1
        mod = 0x7fde3235e2c8
        __FUNCTION__ = "run_actions"
#17 0x0000000000460095 in run_top_route (a=0x7fde32353dc8,
msg=0x7fde325bfa10, c=<optimized out>) at action.c:1635
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env =
{{__jmpbuf = {140731525087440, -1694083084758004004, 140592301817288,
140592304355856, 0, 0, 1693443033690820316, -1694082562576986404},
              __mask_was_saved = 0, __saved_mask = {__val = {10136780, 551,
140592304355856, 10136721, 10136640, 551, 140592304355856, 10136721,
10136640, 551, 1893732767588085504, 0, 140592304287008,
                  1073741825, 140591744222280, 140592304271872}}}}}
        p = <optimized out>
        ret = <optimized out>
        sfbk = 0
#18 0x000000000054473e in receive_msg (buf=0x0, len=844888592,
rcv_info=0x7ffe9c8fc3b0) at receive.c:240
        msg = 0x7fde325bfa10
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env =
{{__jmpbuf = {140731525087808, -1694083084758004004, 140592303381560,
140592304355856, 0, 0, 1693443033690820316, -1694082562576986404},
              __mask_was_saved = 0, __saved_mask = {__val = {10105736, 0,
140731525088198, 6, 1, 140592301637472, 140592326479303, 140591459467269, 0,
7071780, 140592318318440, 140592303177032,
                  140731525088068, 140592328607376, 140592303177032, 11}}}}}
        inb = {
          s = 0x9aac40 <buf> "BYE
sip:o9_xxxxxxxxxxxxx at 192.168.1.63:5110;alias=188.79.210.242~38892~1
SIP/2.0\r\nVia: SIP/2.0/UDP
185.xx.xx.56:5080;branch=z9hG4bK44092255\r\nRoute:
<sip:185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes"..., len = 551}
        netinfo = {data = {s = 0xffffffff <error: Cannot access memory at
address 0xffffffff>, len = 2}, dst = 0x7fde33310768, rcv = 0x7fde33ce1000}
        __FUNCTION__ = "receive_msg"
#19 0x000000000048a410 in udp_rcv_loop () at udp_server.c:495
        len = 551
        buf = "BYE
sip:o9_xxxxxxxxxxxxx at 192.168.1.63:5110;alias=188.79.210.242~38892~1
SIP/2.0\r\nVia: SIP/2.0/UDP
185.xx.xx.56:5080;branch=z9hG4bK44092255\r\nRoute:
<sip:185.xx.xx.51;lr;ftag=58b18f69;did=001.dc;nat=yes"...
        from = 0x7fde3249fd48
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {940519353,
        140591749785588}, addr32 = {940519353, 0, 290318324, 32734}, addr16
        = {12217, 14351, 0, 0, 59380, 4429, 32734, 0},
              addr =
"\271/\017\070\000\000\000\000\364\347M\021\336\177\000"}}, dst_ip = {af =
2, len = 4, u = {addrl = {856633273, 0}, addr32 = {856633273, 0, 0, 0},
addr16 = {12217, 13071, 0, 0, 0, 0, 0,
                0}, addr = "\271/\017\063", '\000' <repeats 11 times>}},
src_port = 5080, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0,
src_su = {s = {sa_family = 2,
              sa_data = "\023ع/\017\070\000\000\000\000\000\000\000"}, sin =
{sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 940519353}, sin_zero
= "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 940519353,
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16
= {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0,
                    0}}}, sin6_scope_id = 0}}, bind_address =
0x7fde32327f60, proto = 1 '\001'}
        __FUNCTION__ = "udp_rcv_loop"
#20 0x000000000050ac19 in main_loop () at main.c:1614
        si_desc = "udp receiver child=6
sock=185.xx.xx.51:5060\000\000\000\000\000\350=R2\336\177\000\000\000\000\000\000\000\000\000\000n\000\000\000\000\000\000\000\rg_",
'\000' <repeats 14 times>, "\357\232/\---Type <return> to continue, or q
<return> to quit---
353\343G\032\260\024\r2\336\177\000\000\000\357\232/\353\343G\032\210\002\245\000\000\000\000\000\004\000\000\000\000\000\000"
        woneinit = 1
        __FUNCTION__ = "main_loop"
#21 0x000000000041cd6c in main (argc=0, argv=0x0) at main.c:2631
        cfg_stream = 0x0
        r = 22773
        tmp = 0x7ffe9c8fdee5 ""
        tmp_len = 0
        port = 0
        proto = 869144016
        ret = 0
        seed = 661187045
        debug_save = 0
        debug_flag = 8
        dont_fork_cnt = 0
        st = {st_dev = 15, st_ino = 12624, st_nlink = 2, st_mode = 16832,
        st_uid = 108, st_gid = 113, __pad0 = 0, st_rdev = 0, st_size = 60,
        st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1490193544,
            tv_nsec = 929429960}, st_mtim = {tv_sec = 1491929843, tv_nsec =
907871616}, st_ctim = {tv_sec = 1491929843, tv_nsec = 907871616},
__glibc_reserved = {0, 0, 0}}
        __FUNCTION__ = "main"
(gdb)
(gdb)
(gdb)
(gdb)
(gdb)
(gdb) info locals
No locals.
(gdb) list
69      in ../../mem/../atomic/atomic_common.h
(gdb)
```

#### Log Messages

<!--
Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->

```
Apr 12 10:19:08 customers /usr/sbin/kamailio[22773]: INFO: Dialog ended, delete keys from dialogs htable starting with 141351_rel51YTMzZmJjOTcyY2FkZDk5Njg5ODYxNDg1MDgwNWRiNWI
Apr 12 10:19:09 customers /usr/sbin/kamailio[22785]: NOTICE: dialog [dlg_hash.c:245]: dlg_clean_run(): dialog in delete state is too old (0x7fde1fec6ff0 ref 4)
Apr 12 10:19:11 customers /usr/sbin/kamailio[22794]: CRITICAL: <core> [pass_fd.c:277]: receive_fd(): EOF on 20
Apr 12 10:19:12 customers /usr/sbin/kamailio[22774]: INFO: Dialog ended, delete keys from dialogs htable starting with 84253NWFkZmFjZTExM2Y4ZDBjNDNhMGZlZjQ5M2UxZWNmOTI
Apr 12 10:19:16 customers /usr/sbin/kamailio[22765]: ALERT: <core> [main.c:740]: handle_sigs(): child process 22773 exited by a signal 11
Apr 12 10:19:16 customers /usr/sbin/kamailio[22765]: ALERT: <core> [main.c:743]: handle_sigs(): core was generated
Apr 12 10:19:16 customers /usr/sbin/kamailio[22765]: INFO: <core> [main.c:755]: handle_sigs(): terminating due to SIGCHLD
Apr 12 10:19:16 customers /usr/sbin/kamailio[22788]: INFO: <core> [main.c:810]: sig_usr(): signal 15 received

```

#### SIP Traffic

<!--
If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->

```
(paste your sip traffic here)
```

### Possible Solutions

<!--
If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix.
-->

### Additional Information

  * **Kamailio Version** - output of `kamailio -v`

```
version: kamailio 4.4.5 (x86_64/linux) 
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: unknown 
compiled with gcc 4.9.2

```

* **Operating System**:

<!--
Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...;
Kernel details (output of `uname -a`)
-->

```
Linux customers 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u2 (2016-10-19) x86_64 GNU/Linux
```


-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1069
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-dev/attachments/20170412/af7910aa/attachment-0001.html>


More information about the sr-dev mailing list