### Description
We upgrade Kamailio from  V5.6.5 to V5.8.2 . When call out , out of credit and 
drop calls. Kamailio v5.8.2 crashed . We think our system not enough memory so  
we up to memory  but the same issue. Anyone met this issue , please help us. 
Thanks 
 
 Our system : 
- OS: Centos 9 stream
-  Kamailo vesion 5.8.2

#### Reproduction



#### Debugging Data

<Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007f0f1f38902c in __delete_call (call=0x7f0f207d4d90, 
credit_data=0x7f0f203d42e0) at cnxcc_mod.c:879
879             clist_rm(call, next, prev);
Missing separate debuginfos, use: dnf debuginfo-install 
MariaDB-shared-10.5.25-1.el9.x86_64 hiredis-1.0.2-2.el9.x86_64
(gdb) bt full
#0  0x00007f0f1f38902c in __delete_call (call=0x7f0f207d4d90, 
credit_data=0x7f0f203d42e0) at cnxcc_mod.c:879
        __func__ = "__delete_call"
#1  0x00007f0f1f383f27 in __stop_billing (callid=0x7f0f207d7378) at 
cnxcc_mod.c:643
        cd_entry = 0x7f0f204f8360
        call = 0x7f0f207d4d90
        hts = 0x7f0f1f3bf910 <_data+48>
        credit_data = 0x7f0f203d42e0
        __func__ = "__stop_billing"
#2  0x00007f0f1f381928 in __dialog_terminated_callback (cell=0x7f0f207d7300, 
type=64, _params=0x7f0f1f7a8800 <params>) at cnxcc_mod.c:479
        __func__ = "__dialog_terminated_callback"
#3  0x00007f0f1f6f7490 in run_dlg_callbacks (type=64, dlg=0x7f0f207d7300, 
req=0x7f0f40eda090, rpl=0x0, dir=2, dlg_data=0x0) at dlg_cb.c:269
        cb = 0x7f0f207d7860
        __func__ = "run_dlg_callbacks"
#4  0x00007f0f1f725c84 in dlg_terminated (req=0x7f0f40eda090, 
dlg=0x7f0f207d7300, dir=2) at dlg_handlers.c:404
        iuid = 0x0
        __func__ = "dlg_terminated"
#5  0x00007f0f1f735844 in dlg_onroute (req=0x7f0f40eda090, 
route_params=0x7ffe01fc4a70, param=0x0) at dlg_handlers.c:1502
        dlg = 0x7f0f207d7300
        iuid = 0x7f0f20cfc690
        val = {s = 0x9f4ae7 <buf+775> "2e3.2d72>\r\nP-SR-XUID: 
atpsh-6722434b-b03-6\r\n\r\n", len = 8}
        callid = {
          s = 0x9f4924 <buf+324> "3506e2a7-0fdc-123e-aebc-00505697ee23\r\nCSeq: 
90509168 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, 
OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, 
SUBSCRIBE\r\nSupporte"..., len = 36}
        ftag = {
          s = 0x9f48ce <buf+238> "FF27yjy610cZS\r\nTo: \"sipp\" 
<sip:0999999990@172.16.172.221>;tag=BU30ZvQFDtgHS\r\nCall-ID: 
3506e2a7-0fdc-123e-aebc-00505697ee23\r\nCSeq: 90509168 BYE\r\nUser-Agent: 
FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL,"..., len = 13}
        ttag = {
          s = 0x9f490c <buf+300> "BU30ZvQFDtgHS\r\nCall-ID: 
3506e2a7-0fdc-123e-aebc-00505697ee23\r\nCSeq: 90509168 BYE\r\nUser-Agent: 
FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, 
REGISTER, REFER, NOTIFY, PUBL"..., len = 13}
        h_entry = 994
        h_id = 10194
        new_state = 5
        old_state = 4
        unref = 2
        event = 7
        timeout = 0
        reset = 0
        dir = 2
        ret = 0
        __func__ = "dlg_onroute"
#6  0x00007f0f1fae7e88 in run_rr_callbacks (req=0x7f0f40eda090, 
rr_param=0x7ffe01fc4b30) at rr_cb.c:96
        l_param = {
          s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 
times>, "BgM-;vst=", 'A' <repeats 37 times>, 
"QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 
132}
--Type <RET> for more, q to quit, c to continue without paging--c
        cbp = 0x7f0f40edfa10
        __func__ = "run_rr_callbacks"
#7  0x00007f0f1fad6e59 in after_loose (_m=0x7f0f40eda090, preloaded=0) at 
loose.c:1021
        hdr = 0x7f0f40e08460
        puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
            s = 0x9f4a56 <buf+630> 
"172.16.172.221:65000;lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, 
"BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: 
atpsh-6722434b-b03-6\r\n\r\n", len = 14}, port = {
            s = 0x9f4a65 <buf+645> "65000;lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' 
<repeats 36 times>, "BgM-;vst=", 'A' <repeats 37 times>, 
"QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 
5}, params = {
            s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 
36 times>, "BgM-;vst=", 'A' <repeats 37 times>, 
"QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 
132}, sip_params = {
            s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 
36 times>, "BgM-;vst=", 'A' <repeats 37 times>, 
"QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 
132}, headers = {s = 0x0, len = 0}, port_no = 65000, proto = 0,
          type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s 
= 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {
            s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {
            s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 
36 times>, "BgM-;vst=", 'A' <repeats 37 times>, 
"QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 
2}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {
            s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = 
{s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
          method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val 
= {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        rt = 0x7f0f40e08660
        res = 1
        status = 1
        uri = {
          s = 0x9f4a52 <buf+626> 
"sip:172.16.172.221:65000;lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 times>, 
"BgM-;vst=", 'A' <repeats 37 times>, "QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: 
atpsh-6722434b-b03-6\r\n\r\n", len = 157}
        uri_is_myself = 1
        use_ob = 0
        rparams = {
          s = 0x9f4a6b <buf+651> "lr;ftag=BU30ZvQFDtgHS;vsf=", 'A' <repeats 36 
times>, "BgM-;vst=", 'A' <repeats 37 times>, 
"QEAAwUIADA-;did=2e3.2d72>\r\nP-SR-XUID: atpsh-6722434b-b03-6\r\n\r\n", len = 
132}
        __func__ = "after_loose"
#8  0x00007f0f1fad75e5 in loose_route_mode (_m=0x7f0f40eda090, _mode=0) at 
loose.c:1056
        ret = 0
        __func__ = "loose_route_mode"
#9  0x00007f0f1fae9cfb in w_loose_route (msg=0x7f0f40eda090, p1=0x0, p2=0x0) at 
rr_mod.c:273
No locals.
#10 0x0000000000443202 in do_action (h=0x7ffe01fc56e0, a=0x7f0f40e9d320, 
msg=0x7f0f40eda090) at core/action.c:1121
        ret = -5
        li = 0
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' 
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0,
              sin_addr = {s_addr = 0}, sin_zero = 
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' 
<repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
                  __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = 
{ss_family = 0,
              __ss_padding = '\000' <repeats 86 times>, 
"\020\016\272@\017\177", '\000' <repeats 25 times>, __ss_align = 0}}, id = 0,
          send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 
0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7f0f40b91310
        len = 0
        user = 0
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = 
{s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {
            s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 
0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T,
          flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, 
user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0},
          method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, 
len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0,
            len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, 
len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {
            s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, 
len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, 
host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {
            s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 
0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T,
          flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, 
user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0},
          method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, 
len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0,
            len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, 
len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {
            s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, 
len = 0}, gr_val = {s = 0x0, len = 0}}
        u = 0x0
        port = 0
        dst_host = 0x0
        i = 0
        flags = 0
        avp = 0x7f0f40eda090
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 
0x0}, avp = 0x0}
        sct = 0x7ffe01fc5570
        sjt = 0x7f0f40e9bdb0
        rve = 0x0
        mct = 0x0
        rv = 0x0
        rv1 = 0x7f0f40e65470
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {
                s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 
21 times>}
        s = {s = 0x0, len = 0}
        srevp = {0x0, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
          {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len 
= 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#11 0x0000000000450a6d in run_actions (h=0x7ffe01fc56e0, a=0x7f0f40e9d320, 
msg=0x7f0f40eda090) at core/action.c:1618
        t = 0x7f0f40e9d320
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 533967288
        __func__ = "run_actions"
#12 0x000000000045110f in run_actions_safe (h=0x7ffe01fc6b70, a=0x7f0f40e9d320, 
msg=0x7f0f40eda090) at core/action.c:1681
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = 
{{__jmpbuf = {4294967296, 7972416043526547515, 140728931744408,
                4394786, 9616872, 139703624372224, 7972416043509770299, 
-7971453441872074693}, __mask_was_saved = 0, __saved_mask = {
                __val = {139702937259984, 0, 0, 140728931735408, 4294967296, 
140728931744408, 4394786, 9616872, 139703624372224,
                  140728931735792, 6261792, 140728931735696, 139702934448925, 
0, 140728931735836, 139703490298096}}}}}
        ret = 33315352
        ign_on_break = 0
#13 0x00000000005f3e0c in rval_get_long (h=0x7ffe01fc6b70, msg=0x7f0f40eda090, 
i=0x7ffe01fc5f60, rv=0x7f0f40e9d488, cache=0x0)
    at core/rvalue.c:973
        r_avp = 0x0
        avp_val = {n = 9616872, s = {s = 0x92bde8 "\340\334A", len = 
1223135232}, re = 0x92bde8}
        pval = {rs = {s = 0x400000000 <error: Cannot access memory at address 
0x400000000>, len = 33316704}, ri = 8623258264,
          flags = 533967288}
        tmp = {s = 0x0, len = 1}
        s = 0x0
        r = 0
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_long"
#14 0x00000000005f8c20 in rval_expr_eval_long (h=0x7ffe01fc6b70, 
msg=0x7f0f40eda090, res=0x7ffe01fc5f60, rve=0x7f0f40e9d480)
    at core/rvalue.c:1854
        i1 = 1
        i2 = 140728931744408
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {
                s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 
20 times>, "\001"}
        c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 139703490551952, s = {s = 0x7f0f40eda090 "@", len = 0},
              re = 0x7f0f40eda090}, pval = {rs = {s = 0x7f0f40eda090 "@", len = 
0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>}
        rv1 = 0x7f0f1fcb3b77 <t_check_trans+249>
        rv2 = 0x7ffe01fc5a30
        __func__ = "rval_expr_eval_long"
#15 0x0000000000442c83 in do_action (h=0x7ffe01fc6b70, a=0x7f0f40ea0e60, 
msg=0x7f0f40eda090) at core/action.c:1097
        ret = -5
        li = 7972416043847411771
        v = 0
        dst = {send_sock = 0x7ffe01fc5ff0, to = {s = {sa_family = 15884, 
sa_data = "_", '\000' <repeats 12 times>}, sin = {
              sin_family = 15884, sin_port = 95, sin_addr = {s_addr = 0}, 
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 15884, sin6_port = 95, sin6_flowinfo = 0, sin6_addr 
= {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
                  __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 
0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 15884,
              __ss_padding = "_", '\000' <repeats 25 times>, 
"\377\377\377\377\000\000\000\000\000\000\000\000(^\346@\017\177\000\000\210b\374\001\376\177\000\000\220\240\355@\017\177\000\000pk\374\001\376\177\000\000轒\000\000\000\000\000\000\220\347H\017\177\000\0000`\374\001\376\177\000\000\017\021E\000\000\000\000\000\240`\374\001\376\177\000\000\220\240\355@\017\177\000",
 __ss_align = 139703490068560}},
          id = 33319792, send_flags = {f = 32766, blst_imask = 0}, proto = 0 
'\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x8000000 <error: Cannot access memory at address 0x8000000>
        new_uri = 0x7ffe01fc6160 "\b"
        end = 0x7f0f40ee3f60 "X-FS-Support"
        crt = 0x7f0f1fdcfaa6 <pkg_proc_update_stats+115> "H\213\r\203l"
        cmd = 0x7ffe01fc6120
        len = 32766
        user = 33317200
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = 
{s = 0x0, len = 0}, port = {
            s = 0xffffffff01fc7a98 <error: Cannot access memory at address 
0xffffffff01fc7a98>, len = 0}, params = {
            s = 0x92bde8 "\340\334A", len = 0}, sip_params = {s = 
0x7ffe01fc7a98 "?~\374\001\376\177", len = 4394786}, headers = {
            s = 0x92bde8 "\340\334A", len = 1223135232}, port_no = 24256, proto 
= 508, type = 32766,
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 
0x45110c), transport = {s = 0x0, len = 1089314960}, ttl = {
            s = 0x7f0f40e65bd0 "\200\001", len = 33319792}, user_param = {s = 
0x0, len = -1}, maddr = {
            s = 0x100000000 <error: Cannot access memory at address 
0x100000000>, len = -234461125}, method = {
            s = 0x7ffe01fc7a98 "?~\374\001\376\177", len = 4394786}, lr = {s = 
0x92bde8 "\340\334A", len = 1223135232}, r2 = {
            s = 0x6ea3b626f106683b <error: Cannot access memory at address 
0x6ea3b626f106683b>, len = 1168533563}, gr = {s = 0x0, len = 0},
          transport_val = {s = 0x0, len = 5531605}, ttl_val = {s = 0x0, len = 
0}, user_param_val = {s = 0x7ffe01fc62f0 "\200\003",
            len = 33317320}, maddr_val = {s = 0x7ffe01fc61cc "", len = 
1088756432}, method_val = {s = 0x0, len = 33317872}, lr_val = {
            s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, 
len = -1}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, 
host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {
            s = 0x7ffe01fc7a98 "?~\374\001\376\177", len = 4394786}, sip_params 
= {s = 0x92bde8 "\340\334A", len = 1223135232}, headers = {
            s = 0x7ffe01fc5db0 "\300^\374\001\376\177", len = 4524653}, port_no 
= 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {
            s = 0x0, len = 0}, ttl = {s = 0x0, len = 1089314960}, user_param = 
{s = 0x7f0f40e65bd0 "\200\001", len = 33316320}, maddr = {
            s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len 
= 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0},
          transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, 
user_param_val = {s = 0x7f0f40b9f568 "~\365\216\037\017\177",
            len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, 
len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0,
            len = 0}, gr_val = {s = 0x0, len = 0}}
        u = 0x7f0f409ff010
        port = 0
        dst_host = 0x92bde8
        i = 1088720928
        flags = 0
        avp = 0x7f0f40e496c8
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 
0x0}, avp = 0x0}
        sct = 0x0
        sjt = 0x0
        rve = 0x7f0f40e9d480
        mct = 0x7f0f40e65e20
        rv = 0x0
        rv1 = 0x7f0f40e68340
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {
                s = 0x0, len = 0}, ri = 0, flags = 0}},
          i2s = 
"\000\000\000\000\000\000\000\000h\365\271@\017\177\000\000\000\000\000\000\000"}
        s = {s = 0x0, len = 0}
        srevp = {0x0, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
          {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len 
= 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#16 0x0000000000450a6d in run_actions (h=0x7ffe01fc6b70, a=0x7f0f40e9d0d0, 
msg=0x7f0f40eda090) at core/action.c:1618
        t = 0x7f0f40ea0e60
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 8725541, tz_dsttime = 0}
        tdiff = 1088848992
        __func__ = "run_actions"
#17 0x000000000043f70a in do_action (h=0x7ffe01fc6b70, a=0x7f0f40e696e0, 
msg=0x7f0f40eda090) at core/action.c:709
        ret = -5
        li = 16
        v = 1
        dst = {send_sock = 0x92bde8, to = {s = {sa_family = 36864, sa_data = 
"\347H\017\177\000\000@h\374\001\376\177\000"}, sin = {
              sin_family = 36864, sin_port = 18663, sin_addr = {s_addr = 
32527}, sin_zero = "@h\374\001\376\177\000"}, sin6 = {
              sin6_family = 36864, sin6_port = 18663, sin6_flowinfo = 32527, 
sin6_addr = {__in6_u = {
                  __u6_addr8 = 
"@h\374\001\376\177\000\000\361=t\000\000\000\000", __u6_addr16 = {26688, 508, 
32766, 0, 15857, 116, 0, 0},
                  __u6_addr32 = {33318976, 32766, 7618033, 0}}}, sin6_scope_id 
= 28}, sas = {ss_family = 36864,
              __ss_padding = 
"\347H\017\177\000\000@h\374\001\376\177\000\000\361=t\000\000\000\000\000\034",
 '\000' <repeats 15 times>, 
"\377\377\377\377\377\377\377\377\220\240\355@\017\177\000\000轒\000\000\000\000\000\000\220\347H\017\177\000\000\320h\374\001\376\177\000\000H\ru\000\000\000\000\000\360g\374\001\376\177\000\000\246\372\334\037\017\177\000\000\000\000\000\000\000\000\000\000di\374\001\376\177\000",
              __ss_align = 134217728}}, id = 1086994592, send_flags = {f = 
32527, blst_imask = 0}, proto = 21 '\025', proto_pad0 = 75 'K',
          proto_pad1 = 159}
        tmp = 0x7ffe01fc6a60 "\020k\374\001\376\177"
        new_uri = 0x7ffe01fc69f0 ""
        end = 0x4 <error: Cannot access memory at address 0x4>
        crt = 0x7f0f40eda090 "@"
        cmd = 0x7f0f40b9f0d0
        len = 32527
        user = 1089145792
        uri = {user = {s = 0x7f0f40e08630 "", len = 0}, passwd = {s = 0x8000000 
<error: Cannot access memory at address 0x8000000>,
            len = 129248720}, host = {s = 0x3a5670 <error: Cannot access memory 
at address 0x3a5670>, len = 4969008}, port = {
            s = 0x57e920 <fork_tcp_process+5074> ";", len = 16}, params = {s = 
0x4e <error: Cannot access memory at address 0x4e>,
            len = 7598071}, sip_params = {s = 0x7ffe01fc6630 
"@g\374\001\376\177", len = 4978977}, headers = {s = 0x0, len = 1084226000},
          port_no = 62544, proto = 16543, type = 19, flags = (unknown: 
0x409ff9d0), transport = {s = 0x7ffe01fc6740 "@h\374\001\376\177",
            len = 7502474}, ttl = {s = 0x7ffe01fc6740 "@h\374\001\376\177", len 
= 7492948}, user_param = {s = 0x8bb92b "core",
            len = 7494079}, maddr = {s = 0x8bc708 <__func__.21> 
"parse_headers", len = 9157624}, method = {s = 0x7f0f40e085c0 "\220\001",
            len = 1084223504}, lr = {s = 0x8bc708 <__func__.21> 
"parse_headers", len = 9157624}, r2 = {
            s = 0x40 <error: Cannot access memory at address 0x40>, len = 
1084223504}, gr = {s = 0x0, len = 0}, transport_val = {
            s = 0x9f4b13 <buf+819> "\r\n", len = 0}, ttl_val = {s = 0x8be270 
<__func__.3> "parse_to_param", len = 9168712},
          user_param_val = {s = 0x30 <error: Cannot access memory at address 
0x30>, len = 1084223504}, maddr_val = {s = 0x7f0f40e08630 "",
            len = 1088455888}, method_val = {s = 0x0, len = 1084223504}, lr_val 
= {
            s = 0x130 <error: Cannot access memory at address 0x130>, len = 
1088456064}, r2_val = {
            s = 0x400000000 <error: Cannot access memory at address 
0x400000000>, len = 0}, gr_val = {
            s = 0x7ffe01fc7a98 "?~\374\001\376\177", len = 4394786}}
        next_hop = {user = {s = 0x4a <error: Cannot access memory at address 
0x4a>, len = 10438703}, passwd = {
            s = 0x7 <error: Cannot access memory at address 0x7>, len = 8}, 
host = {s = 0x7f0f40cc6060 "\001", len = 0}, port = {
            s = 0x7f0f40e521c0 "\001", len = 1088827984}, params = {
            s = 0xffffffffffffffff <error: Cannot access memory at address 
0xffffffffffffffff>, len = 1088758208}, sip_params = {s = 0x0,
            len = 1086993056}, headers = {s = 0x7f0f40e07b30 "\003", len = 
1088454800}, port_no = 40176, proto = 16617, type = 32527,
          flags = 0, transport = {s = 0x7f0f40ca3db0 <incomplete sequence 
\353>, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {
            s = 0x440e631a0 <error: Cannot access memory at address 
0x440e631a0>, len = 9193958}, maddr = {s = 0x0, len = 0}, method = {
            s = 0x7ffe01fc65c0 "", len = 7807783}, lr = {s = 0x0, len = 0}, r2 
= {s = 0x1 <error: Cannot access memory at address 0x1>,
            len = 1088455952}, gr = {s = 0x9f4b15 <buf+821> "", len = 
10439410}, transport_val = {s = 0x0, len = 33318544}, ttl_val = {
            s = 0x9f4b15 <buf+821> "", len = 10439230}, user_param_val = {s = 
0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {
            s = 0x0, len = 7534444}, lr_val = {s = 0x7ffe01fc65c0 "", len = 
1084223504}, r2_val = {s = 0x7f0f40e08630 "",
            len = 1084223504}, gr_val = {s = 0x7ffe01fc6600 
"0f\374\001\376\177", len = 534575782}}
        u = 0x7ffe01fc6b90
        port = 0
        dst_host = 0x7f0f40e085c0
        i = 41
        flags = 0
        avp = 0x7627ed <parse_cseq+2542>
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 65537}, re 
= 0x0}, avp = 0x9f47e0 <buf>}
        sct = 0x7f0f40eda090
        sjt = 0x7f0f40eb0bc0
        rve = 0x7f0f40e66660
        mct = 0x7ffe01fc68f0
        rv = 0x0
        rv1 = 0x7ffe01fc6a10
        c1 = {cache_type = 10504224, val_type = RV_NONE, c = {avp_val = {n = 
10504232, s = {s = 0xa04828 <def_list+40> "",
                len = 1085943864}, re = 0xa04828 <def_list+40>}, pval = {rs = 
{s = 0xa04828 <def_list+40> "", len = 1085943864},
              ri = 10504544, flags = 10504552}},
          i2s = 
"\200\371\253\037\017\177\000\000p\371\253\037\017\177\000\000\020\362\253\037\017\177"}
        s = {s = 0xa04810 <def_list+16> "", len = 33320176}
        srevp = {0x7ffe01fc6c30, 0x7f0f1fa499ae <tps_msg_received+3364>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}},
          {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len 
= 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#18 0x0000000000450a6d in run_actions (h=0x7ffe01fc6b70, a=0x7f0f40e63e00, 
msg=0x7f0f40eda090) at core/action.c:1618
        t = 0x7f0f40e696e0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 1089314960, tz_dsttime = 32527}
        tdiff = 4394786
        __func__ = "run_actions"
#19 0x00000000004511d7 in run_top_route (a=0x7f0f40e63e00, msg=0x7f0f40eda090, 
c=0x0) at core/action.c:1701
        ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = 
{{__jmpbuf = {4294967296, 7972416042383599675, 140728931744408,
                4394786, 9616872, 139703624372224, 7972416042299713595, 
-7971453441872074693}, __mask_was_saved = 0, __saved_mask = {
                __val = {6379359, 4294967296, 139703490551952, 140728898420737, 
4294967296, 140728931744408, 4394786, 9616872,
                  139703624372224, 140728931740736, 0, 4611686022722355200, 0, 
139703490412128, 4294967296, 140728931744408}}}}}
        p = 0x7ffe01fc6b70
        ret = 9616872
        sfbk = 0
#20 0x00000000005ab16e in receive_msg (
    buf=0x9f47e0 <buf> "BYE 
sip:gw+internal_sip_gw03@172.16.172.242:65000;transport=udp;gw=internal_sip_gw03
 SIP/2.0\r\nVia: SIP/2.0/UDP 
172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bKX9Zm25Xe6316g\r\nMax-Forwards: 
69\r\nFrom: <si"..., len=821, rcv_info=0x7ffe01fc7200)
    at core/receive.c:518
        msg = 0x7f0f40eda090
        ctx = {rec_lev = 0, run_flags = 2, last_retcode = 1, jmp_env = 
{{__jmpbuf = {4294967296, 7972416042383599675, 140728931744408,
                4394786, 9616872, 139703624372224, 7972416042299713595, 
-7971453441872074693}, __mask_was_saved = 0, __saved_mask = {
                __val = {0, 0, 0, 1880844493789993498, 1880844493789993498, 
1880844493789993498, 1880844493789993498, 0, 0, 0, 0,
                  2314885530818453536, 2314885530818453536, 
2314885530818453536, 2314885530818453536, 0}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {
          s = 0x9f47e0 <buf> "BYE 
sip:gw+internal_sip_gw03@172.16.172.242:65000;transport=udp;gw=internal_sip_gw03
 SIP/2.0\r\nVia: SIP/2.0/UDP 
172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bKX9Zm25Xe6316g\r\nMax-Forwards: 
69\r\nFrom: <si"..., len = 821}
        netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffe01fc6d60, obuf = {s = 0x0, len = 0}, rcv = 
0x7ffe01fc7200, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0,
          mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#21 0x00000000006f9272 in udp_rcv_loop () at core/udp_server.c:751
        len = 598
        buf = "BYE 
sip:gw+internal_sip_gw03@172.16.172.242:65000;transport=udp;gw=internal_sip_gw03
 SIP/2.0\r\nVia: SIP/2.0/UDP 
172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bKX9Zm25Xe6316g\r\nMax-Forwards: 
69\r\nFrom: <si"...
        tmp = 0x1201ae640 <error: Cannot access memory at address 0x1201ae640>
        fromaddr = 0x7f0f40e99c00
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {3870036140, 0}, addr32 
= {3870036140, 0, 0, 0}, addr16 = {4268, 59052, 0, 0, 0, 0,
                0, 0}, addr = "\254\020\254\346", '\000' <repeats 11 times>}}, 
dst_ip = {af = 2, len = 4, u = {addrl = {3719041196, 0},
              addr32 = {3719041196, 0, 0, 0}, addr16 = {4268, 56748, 0, 0, 0, 
0, 0, 0},
              addr = "\254\020\254\335", '\000' <repeats 11 times>}}, src_port 
= 5080, dst_port = 65000, proto_reserved1 = 0,
          proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = 
"\023ج\020\254\346\000\000\000\000\000\000\000"}, sin = {
              sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 
3870036140}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 2, sin6_port = 55315, sin6_flowinfo = 3870036140, 
sin6_addr = {__in6_u = {
                  __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 
0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
              sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = 
"\023ج\020\254\346", '\000' <repeats 111 times>, __ss_align = 0}},
          bind_address = 0x7f0f40b88fa0, rflags = 0, proto = 1 '\001', 
proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = 
"\340o\374\001\376\177\000\000f*\260\037\017\177\000\000)\262\272\037\017\177\000\000\340b5\037\017\177\000\000\020p\374\001\376\177\000\000\322\v\272\037\017\177\000\000\000\000\000\000\000\000\000\000\340b5\037\017\177\000\000\000\000\000\000\000\000\000\000p\233\351@\017\177\000\000@p\374\001\376\177\000\000
 e\032 
\017\177\000\000\230z\374\001\376\177\000\000\"\017C\000\000\000\000\000轒\000\000\000\000\000\000\220\347H\017\177\000\000`p\374\001\376\177\000\000ǥ\272\037\017\177\000\000\360b5\037\017\177\000\000p\233\351@\017\177\000\000\000q\374\001\376\177\000\000\257:3\037\017\177\000\000\000\000\000\000\260\000\000\000p/\306@\260",
 '\000' <repeats 91 times>...
        i = -1
        j = 506880
        l = 176
        __func__ = "udp_rcv_loop"
#22 0x000000000042dcb6 in main_loop () at main.c:1815
        i = 47
        pid = 0
        si = 0x7f0f40b88fa0
        si_desc = "udp receiver child=47 
sock=172.16.172.221:65000\0000\000\000\000\000\000\000\000\000\345\032 
\017\177\000\000@t\374\001\001\000\000\000\200\211\341\037\017\177\000\000\310/\272@\017\177\000\000\037%r\000\000\000\000\000\230z\374\001\376\177\000\000\200\211\341\037\017\177\000\000轒\000\000\000\000\000\000\220\347H\001\000\000"
        nrprocs = 128
        woneinit = 1
        __func__ = "main_loop"
#23 0x0000000000439e7d in main (argc=10, argv=0x7ffe01fc7a98) at main.c:3256
        cfg_stream = 0xfa5380
        c = -1
        r = 0
        tmp = 0x7ffe01fc7ea8 ""
        tmp_len = 0
        port = 5060
        proto = 0
        aproto = 0
        ahost = 0x0
        aport = 0
        options = 0x8433f8 
":f:cm:M:dVIhEeb:B:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1463919274
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x7ffe01fc7980
        p = 0x1800000 <error: Cannot access memory at address 0x1800000>
        st = {st_dev = 24, st_ino = 1005, st_nlink = 2, st_mode = 16832, st_uid 
= 991, st_gid = 988, __pad0 = 0, st_rdev = 0, st_size = 40,
          st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1730298568, 
tv_nsec = 63999933}, st_mtim = {tv_sec = 1730298573,
            tv_nsec = 240999872}, st_ctim = {tv_sec = 1730298573, tv_nsec = 
240999872}, __glibc_reserved = {0, 0, 0}}
        l1 = 512
        tbuf = 
"B\215\347H\017\177\000\000\210J\344H\017\177\000\000\020w\374\001\376\177\000\000\006\000\000\000\000\000\000\000\b7\344H\017\177\000\000\006\000\000\000\020\000\000\0000\232\347H\017\177\000\000\325\031\345H\017\177\000\000\000\000\000\000\000\000\000\000\240,\345H\017\177\000\000\370\377\240H\017\177\000\000\020\033\344H\017\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\340v\374\001\376\177\000\000\240J\344H\017\177\000\000\240J\344H\017\177\000\000\000\000\000\000\000\000\000\000p)\344H\017\177\000\000\340v\374\001\376\177\000\000\200\245\347H\017\177\000\000\0000\344H\017\177\000\000\342;\344H\017\177\000\000v\344\344H\017\177\000\000\334#\240H\017\177\000\000"...
        option_index = 0
        long_options = {{name = 0x845b26 "help", has_arg = 0, flag = 0x0, val = 
104}, {name = 0x84054c "version", has_arg = 0, flag = 0x0,
            val = 118}, {name = 0x845b2b "alias", has_arg = 1, flag = 0x0, val 
= 1024}, {name = 0x845b31 "subst", has_arg = 1, flag = 0x0,
            val = 1025}, {name = 0x845b37 "substdef", has_arg = 1, flag = 0x0, 
val = 1026}, {name = 0x845b40 "substdefs", has_arg = 1,
            flag = 0x0, val = 1027}, {name = 0x845b4a "server-id", has_arg = 1, 
flag = 0x0, val = 1028}, {name = 0x845b54 "loadmodule",
            has_arg = 1, flag = 0x0, val = 1029}, {name = 0x845b5f "modparam", 
has_arg = 1, flag = 0x0, val = 1030}, {
            name = 0x845b68 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, 
{name = 0x845b73 "debug", has_arg = 1, flag = 0x0,
            val = 1032}, {name = 0x845b79 "cfg-print", has_arg = 0, flag = 0x0, 
val = 1033}, {name = 0x845b83 "atexit", has_arg = 1,
            flag = 0x0, val = 1034}, {name = 0x845b8a "all-errors", has_arg = 
0, flag = 0x0, val = 1035}, {name = 0x0, has_arg = 0,
            flag = 0x0, val = 0}}
        __func__ = "main"
(gdb)
)
```

#### Log Messages

Oct 30 21:32:19 KAM-V2-02 kamailio[2711]: 188(2711) ERROR: {1 90509167 INVITE 
3b4b542a-0fdc-123e-aebc-00505697ee23} <script>: cut prefix : 172.16.172.230:5080
Oct 30 21:32:23 KAM-V2-02 kamailio[2687]: 176(2687) BUG: {1 90509168 BYE 
3506e2a7-0fdc-123e-aebc-00505697ee23} cnxcc [cnxcc_mod.c:869]: __delete_call(): 
number of concurrent calls dropped to negative value: -1
Oct 30 21:32:23 KAM-V2-02 kamailio[2687]: 176(2687) BUG: {1 90509168 BYE 
3506e2a7-0fdc-123e-aebc-00505697ee23} cnxcc [cnxcc_mod.c:874]: __delete_call(): 
number of calls dropped to negative value: -1
Oct 30 21:32:23 KAM-V2-02 kernel: kamailio[2687]: segfault at 8 ip 
00007f0f1f38902c sp 00007ffe01fc4470 error 6 in cnxcc.so[7f0f1f377000+3c000] 
likely on CPU 10 (core 0, socket 5)
Oct 30 21:32:23 KAM-V2-02 kernel: Code: 48 8b 05 c7 5f 03 00 8b 00 8d 50 ff 48 
8b 05 bb 5f 03 00 89 10 48 8b 85 78 ff ff ff 48 8b 00 48 8b 95 78 ff ff ff 48 
8b 52 08 <48> 89 50 08 48 8b 85 78 ff ff ff 48 8b 40 08 48 8b 95 78 ff ff ff
Oct 30 21:32:23 KAM-V2-02 mariadbd[1313]: 2024-10-30 21:32:23 189 [Warning] 
Aborted connection 189 to db: 'kamailio' user: 'kamailio' host: 'localhost' 
(Got an error reading communication packets)
Oct 30 21:32:23 KAM-V2-02 kamailio[3130]: 395(3130) CRITICAL: <core> 
[core/pass_fd.c:281]: receive_fd(): EOF on 186
Oct 30 21:32:23 KAM-V2-02 kamailio[2331]: 0(2331) ALERT: <core> [main.c:805]: 
handle_sigs(): child process 2687 exited by a signal 11
Oct 30 21:32:23 KAM-V2-02 kamailio[2331]: 0(2331) ALERT: <core> [main.c:809]: 
handle_sigs(): core was generated

#### SIP Traffic

<!--
If the issue is exposed by processing specific SIP messages, grab them with 
ngrep or save in a pcap file, then add them next, or attach to issue, or 
provide a link to download them (e.g., to a pastebin site).
-->

```
(paste your sip traffic here)
```

### Possible Solutions

<!--
If you found a solution or workaround for the issue, describe it. Ideally, 
provide a pull request with a fix.
-->

### Additional Information

  * **Kamailio Version** - output of `kamailio -v`

version: kamailio 5.8.2 (x86_64/linux) 3fa5f4
flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, 
USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, MEM_JOIN_FREE, Q_MALLOC, 
F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, 
USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, 
TLS_PTHREAD_MUTEX_SHARED
ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_SEND_BUFFER_SIZE 
262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: 3fa5f4
compiled on 22:03:02 Oct 28 2024 with gcc 11.5.0


* **Operating System**:

CentOS Stream release 9
NAME="CentOS Stream"
VERSION="9"
ID="centos"
ID_LIKE="rhel fedora"
VERSION_ID="9"
PLATFORM_ID="platform:el9"
PRETTY_NAME="CentOS Stream 9"
ANSI_COLOR="0;31"
LOGO="fedora-logo-icon"
CPE_NAME="cpe:/o:centos:centos:9"
HOME_URL="https://centos.org/";
BUG_REPORT_URL="https://issues.redhat.com/";
REDHAT_SUPPORT_PRODUCT="Red Hat Enterprise Linux 9"
REDHAT_SUPPORT_PRODUCT_VERSION="CentOS Stream"
CentOS Stream release 9
CentOS Stream release 9



-- 
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/4009
You are receiving this because you are subscribed to this thread.

Message ID: <kamailio/kamailio/issues/4...@github.com>
_______________________________________________
Kamailio (SER) - Development Mailing List
To unsubscribe send an email to sr-dev-le...@lists.kamailio.org

Reply via email to