The issue still same 

Debug log 
Using host libthread_db library "/lib64/libthread_db.so.1".
Core was generated by `/usr/local/sbin/kamailio -DD -P 
/run/kamailio/kamailio.pid -f /usr/local/etc/ka'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007fbd1e10502c in __delete_call (call=0x7fbd1f0cdae0, 
credit_data=0x7fbd1ef4fe80) at cnxcc_mod.c:880
880             if(call->prev && call->next) {
Missing separate debuginfos, use: dnf debuginfo-install 
krb5-libs-1.21.1-3.el9.x86_64 libevent-2.1.12-8.el9.x86_64 
libselinux-3.6-2.el9.x86_64 libssh-0.10.4-13.el9.x86_64 
libunistring-0.9.10-15.el9.x86_64 openldap-2.6.6-3.el9.x86_64 
openssl-libs-3.2.2-6.el9.x86_64 pcre2-10.40-6.el9.x86_64
(gdb) bt full
#0  0x00007fbd1e10502c in __delete_call (call=0x7fbd1f0cdae0, 
credit_data=0x7fbd1ef4fe80) at cnxcc_mod.c:880
        __func__ = "__delete_call"
#1  0x00007fbd1e0fff27 in __stop_billing (callid=0x7fbd1efedd88) at 
cnxcc_mod.c:643
        cd_entry = 0x7fbd1f1f9890
        call = 0x7fbd1f0cdae0
        hts = 0x7fbd1e13b910 <_data+48>
        credit_data = 0x7fbd1ef4fe80
        __func__ = "__stop_billing"
#2  0x00007fbd1e0fd928 in __dialog_terminated_callback (cell=0x7fbd1efedd10, 
type=64, _params=0x7fbd1e591800 <params>) at cnxcc_mod.c:479
        __func__ = "__dialog_terminated_callback"
#3  0x00007fbd1e4e0490 in run_dlg_callbacks (type=64, dlg=0x7fbd1efedd10, 
req=0x7fbd3fc8ee50, rpl=0x0, dir=2, dlg_data=0x0) at dlg_cb.c:269
        cb = 0x7fbd1f138c60
        __func__ = "run_dlg_callbacks"
#4  0x00007fbd1e50ec84 in dlg_terminated (req=0x7fbd3fc8ee50, 
dlg=0x7fbd1efedd10, dir=2) at dlg_handlers.c:404
        iuid = 0x0
        __func__ = "dlg_terminated"
#5  0x00007fbd1e51e844 in dlg_onroute (req=0x7fbd3fc8ee50, 
route_params=0x7ffeeaceb990, param=0x0) at dlg_handlers.c:1502
        dlg = 0x7fbd1efedd10
        iuid = 0x7fbd1f12cf20
        val = {s = 0x9f4af3 <buf+787> "547.56e1>\r\nP-SR-XUID: 
atpsh-67330196-97f2-2\r\n\r\n", len = 8}
        callid = {
          s = 0x9f4930 <buf+336> "cdb12b30-1b6f-123e-0b83-00505697ee23\r\nCSeq: 
91145595 BYE\r\nUser-Agent: FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, 
OPTIONS, MESSAGE, INFO, UPDATE, REGISTER, REFER, NOTIFY, PUBLISH, 
SUBSCRIBE\r\nSupporte"..., len = 36}
        ftag = {
          s = 0x9f48da <buf+250> "KXDNpKy3y2ZgQ\r\nTo: \"sipp\" 
<sip:0999999998@172.16.172.220>;tag=QFp7eFB43KeFp\r\nCall-ID: 
cdb12b30-1b6f-123e-0b83-00505697ee23\r\nCSeq: 91145595 BYE\r\nUser-Agent: 
FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL,"..., len = 13}
        ttag = {
          s = 0x9f4918 <buf+312> "QFp7eFB43KeFp\r\nCall-ID: 
cdb12b30-1b6f-123e-0b83-00505697ee23\r\nCSeq: 91145595 BYE\r\nUser-Agent: 
FreeSWITCH\r\nAllow: INVITE, ACK, BYE, CANCEL, OPTIONS, MESSAGE, INFO, UPDATE, 
REGISTER, REFER, NOTIFY, PUBL"..., len = 13}
        h_entry = 1861
        h_id = 7781
        new_state = 5
        old_state = 4
        unref = 2
        event = 7
        timeout = 0
        reset = 0
        dir = 2
        ret = 0
        __func__ = "dlg_onroute"
#6  0x00007fbd1e8d9e88 in run_rr_callbacks (req=0x7fbd3fc8ee50, 
rr_param=0x7ffeeaceba50) at rr_cb.c:96
        l_param = {
          s = 0x9f4a77 <buf+663> 
"lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' 
<repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: 
atpsh-67330196-97f2-2\r\n\r\n", len = 132}
--Type <RET> for more, q to quit, c to continue without paging--c
        cbp = 0x7fbd3fd0c8d0
        __func__ = "run_rr_callbacks"
#7  0x00007fbd1e8c8e59 in after_loose (_m=0x7fbd3fc8ee50, preloaded=0) at 
loose.c:1021
        hdr = 0x7fbd3facecf0
        puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {
            s = 0x9f4a62 <buf+642> 
"172.16.172.220:65000;lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=",
 'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: 
atpsh-67330196-97f2-2\r\n\r\n", len = 14}, port = {
            s = 0x9f4a71 <buf+657> 
"65000;lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=",
 'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: 
atpsh-67330196-97f2-2\r\n\r\n", len = 5}, params = {
            s = 0x9f4a77 <buf+663> 
"lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' 
<repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: 
atpsh-67330196-97f2-2\r\n\r\n", len = 132}, sip_params = {
            s = 0x9f4a77 <buf+663> 
"lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' 
<repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: 
atpsh-67330196-97f2-2\r\n\r\n", len = 132}, headers = {s = 0x0, len = 0}, 
port_no = 65000, proto = 0, type = SIP_URI_T,
          flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, 
user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {
            s = 0x0, len = 0}, lr = {
            s = 0x9f4a77 <buf+663> 
"lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' 
<repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: 
atpsh-67330196-97f2-2\r\n\r\n", len = 2}, r2 = {s = 0x0, len = 0}, gr = {s = 
0x0, len = 0}, transport_val = {s = 0x0, len = 0},
          ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, 
maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {
            s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, 
len = 0}}
        rt = 0x7fbd3fc86300
        res = 1
        status = 1
        uri = {
          s = 0x9f4a5e <buf+638> 
"sip:172.16.172.220:65000;lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=",
 'A' <repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: 
atpsh-67330196-97f2-2\r\n\r\n", len = 157}
        uri_is_myself = 1
        use_ob = 0
        rparams = {
          s = 0x9f4a77 <buf+663> 
"lr;ftag=QFp7eFB43KeFp;vsf=AAAAAAgNAAAAAAAAAAF4cQYFHB8HGB8GBRwcAAE2;vst=", 'A' 
<repeats 37 times>, "QAAAwUIADA-;did=547.56e1>\r\nP-SR-XUID: 
atpsh-67330196-97f2-2\r\n\r\n", len = 132}
        __func__ = "after_loose"
#8  0x00007fbd1e8c95e5 in loose_route_mode (_m=0x7fbd3fc8ee50, _mode=0) at 
loose.c:1056
        ret = 0
        __func__ = "loose_route_mode"
#9  0x00007fbd1e8dbcfb in w_loose_route (msg=0x7fbd3fc8ee50, p1=0x0, p2=0x0) at 
rr_mod.c:273
No locals.
#10 0x0000000000443202 in do_action (h=0x7ffeeacec600, a=0x7fbd3fcc8f30, 
msg=0x7fbd3fc8ee50) at core/action.c:1121
        ret = -5
        li = 0
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' 
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {
                s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = 
{sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {
                __in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 
= {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
              sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' 
<repeats 86 times>, "\200\b\232?\275\177", '\000' <repeats 25 times>,
              __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, 
proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7fbd3f990f60
        len = 0
        user = 0
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = 
{s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0,
            len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len 
= 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0,
          transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param 
= {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0,
            len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s 
= 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {
            s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = 
{s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0,
            len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, 
host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0,
            len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len 
= 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0,
          transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param 
= {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0,
            len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s 
= 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {
            s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = 
{s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0,
            len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        u = 0x0
        port = 0
        dst_host = 0x0
        i = 0
        flags = 0
        avp = 0x7fbd3fc8ee50
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 
0x0}, avp = 0x0}
        sct = 0x7ffeeacec490
        sjt = 0x7fbd3fcc79c0
        rve = 0x0
        mct = 0x0
        rv = 0x0
        rv1 = 0x7fbd3fc911d0
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0,
                len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x0, len = 0}
        srevp = {0x0, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}}
        __func__ = "do_action"
#11 0x0000000000450a6d in run_actions (h=0x7ffeeacec600, a=0x7fbd3fcc8f30, 
msg=0x7fbd3fc8ee50) at core/action.c:1618
        t = 0x7fbd3fcc8f30
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 515035576
        __func__ = "run_actions"
#12 0x000000000045110f in run_actions_safe (h=0x7ffeeaceda90, a=0x7fbd3fcc8f30, 
msg=0x7fbd3fc8ee50) at core/action.c:1681
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = 
{{__jmpbuf = {4294967296, 100897437188840159, 268, 536870912, 134217728, 0,
                100897437172062943, -100309851447272737}, __mask_was_saved = 0, 
__saved_mask = {__val = {140450242764528, 0, 0, 140732837840528,
                  4294967296, 268, 536870912, 134217728, 0, 140732837840912, 
6261792, 140732837840816, 140450239826717, 0, 140732837840956,
                  140450795912448}}}}}
        ret = -355546824
        ign_on_break = 0
#13 0x00000000005f3e0c in rval_get_long (h=0x7ffeeaceda90, msg=0x7fbd3fc8ee50, 
i=0x7ffeeacece80, rv=0x7fbd3fcc9098, cache=0x0) at core/rvalue.c:973
        r_avp = 0x0
        avp_val = {n = 134217728, s = {s = 0x8000000 <error: Cannot access 
memory at address 0x8000000>, len = 0}, re = 0x8000000}
        pval = {rs = {s = 0x400000000 <error: Cannot access memory at address 
0x400000000>, len = -355545472}, ri = 8589934860, flags = 515035576}
        tmp = {s = 0x0, len = 1}
        s = 0x0
        r = 0
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_long"
#14 0x00000000005f8c20 in rval_expr_eval_long (h=0x7ffeeaceda90, 
msg=0x7fbd3fc8ee50, res=0x7ffeeacece80, rve=0x7fbd3fcc9090) at 
core/rvalue.c:1854
        i1 = 1
        i2 = 268
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0,
                len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 20 times>, 
"\001"}
        c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 140450795679312, s = {s = 0x7fbd3fc8ee50 "(", len = 0},
              re = 0x7fbd3fc8ee50}, pval = {rs = {s = 0x7fbd3fc8ee50 "(", len = 
0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>}
        rv1 = 0x7fbd1eaa5b77 <t_check_trans+249>
        rv2 = 0x7ffeeacec950
        __func__ = "rval_expr_eval_long"
#15 0x0000000000442c83 in do_action (h=0x7ffeeaceda90, a=0x7fbd3fccca70, 
msg=0x7fbd3fc8ee50) at core/action.c:1097
        ret = -5
        li = 100897436834421471
        v = 0
        dst = {send_sock = 0x7ffeeacecf10, to = {s = {sa_family = 15884, 
sa_data = "_", '\000' <repeats 12 times>}, sin = {sin_family = 15884,
              sin_port = 95, sin_addr = {s_addr = 0}, sin_zero = 
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 15884, sin6_port = 95,
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' 
<repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {
                    0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 15884,
              __ss_padding = "_", '\000' <repeats 25 times>, 
"\377\377\377\377\000\000\000\000\000\000\000\000\210\033\311?\275\177\000\000\250\321\316\352\376\177\000\000P\356\310?\275\177\000\000\220\332\316\352\376\177\000\000\000\000\000\b",
 '\000' <repeats 12 times>, 
"P\317\316\352\376\177\000\000\017\021E\000\000\000\000\000\300\317\316\352\376\177\000\000P\356\310?\275\177\000",
 __ss_align = 140450795683248}}, id = -355542384, send_flags = {
            f = 32766, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 
'\000', proto_pad1 = 0}
        tmp = 0x8000000 <error: Cannot access memory at address 0x8000000>
        new_uri = 0x7ffeeaced080 "\b"
        end = 0x7fbd3fd14870 "X-FS-Support"
        crt = 0x7fbd1ebc1aa6 <pkg_proc_update_stats+115> "H\213\r\203l"
        cmd = 0x7ffeeaced040
        len = 32766
        user = -355544976
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = 
{s = 0x0, len = 0}, port = {
            s = 0xffffffff0000010c <error: Cannot access memory at address 
0xffffffff0000010c>, len = 0}, params = {
            s = 0x8000000 <error: Cannot access memory at address 0x8000000>, 
len = 0}, sip_params = {
            s = 0x10c <error: Cannot access memory at address 0x10c>, len = 
536870912}, headers = {
            s = 0x8000000 <error: Cannot access memory at address 0x8000000>, 
len = 0}, port_no = 52704, proto = 60110, type = 32766,
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 
0x45110c), transport = {s = 0x0, len = 1070132816}, ttl = {
            s = 0x7fbd3fc91930 "\200\001", len = -355542384}, user_param = {s = 
0x0, len = -1}, maddr = {
            s = 0x100000000 <error: Cannot access memory at address 
0x100000000>, len = 744708831}, method = {
            s = 0x10c <error: Cannot access memory at address 0x10c>, len = 
536870912}, lr = {
            s = 0x8000000 <error: Cannot access memory at address 0x8000000>, 
len = 0}, r2 = {
            s = 0x16675af23635adf <error: Cannot access memory at address 
0x16675af23635adf>, len = -1190962465}, gr = {s = 0x0, len = 0},
          transport_val = {s = 0x0, len = 5531605}, ttl_val = {s = 0x0, len = 
0}, user_param_val = {s = 0x7ffeeaced210 "", len = -355544856},
          maddr_val = {s = 0x7ffeeaced0ec "", len = 1070062736}, method_val = 
{s = 0x0, len = -355544304}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0x0, len = 0}, gr_val = {s = 0x0, len = -1}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, 
host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {
            s = 0x10c <error: Cannot access memory at address 0x10c>, len = 
536870912}, sip_params = {
            s = 0x8000000 <error: Cannot access memory at address 0x8000000>, 
len = 0}, headers = {s = 0x7ffeeaceccd0 "\340\315\316\352\376\177",
            len = 4524653}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 
0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 1070132816},
          user_param = {s = 0x7fbd3fc91930 "\200\001", len = -355545856}, maddr 
= {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0,
            len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, 
transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0},
          user_param_val = {s = 0x7fbd3f99efd8 "~\205m\036\275\177", len = 0}, 
maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0},
          lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s 
= 0x0, len = 0}}
        u = 0x7fbd3f7ff010
        port = 0
        dst_host = 0x8000000
        i = 1070097552
        flags = 0
        avp = 0x7fbd3fc4e848
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 
0x0}, avp = 0x0}
        sct = 0x0
        sjt = 0x0
        rve = 0x7fbd3fcc9090
        mct = 0x7fbd3fc91b80
        rv = 0x0
        rv1 = 0x7fbd3fc940a0
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0,
                len = 0}, ri = 0, flags = 0}}, i2s = 
"\000\000\000\000\000\000\000\000\330\357\231?\275\177\000\000\000\000\000\000\000"}
        s = {s = 0x0, len = 0}
        srevp = {0x0, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}}
        __func__ = "do_action"
#16 0x0000000000450a6d in run_actions (h=0x7ffeeaceda90, a=0x7fbd3fcc8ce0, 
msg=0x7fbd3fc8ee50) at core/action.c:1618
        t = 0x7fbd3fccca70
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 8725541, tz_dsttime = 0}
        tdiff = 1070154176
        __func__ = "run_actions"
#17 0x000000000043f70a in do_action (h=0x7ffeeaceda90, a=0x7fbd3fc95440, 
msg=0x7fbd3fc8ee50) at core/action.c:709
        ret = -5
        li = 16
        v = 1
        dst = {send_sock = 0x8000000, to = {s = {sa_family = 0, sa_data = 
"\000\000\000\000\000\000`\327\316\352\376\177\000"}, sin = {sin_family = 0,
              sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = 
"`\327\316\352\376\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = 
"`\327\316\352\376\177\000\000\361=t\000\000\000\000", __u6_addr16 = {55136,
                    60110, 32766, 0, 15857, 116, 0, 0}, __u6_addr32 = 
{3939424096, 32766, 7618033, 0}}}, sin6_scope_id = 29}, sas = {ss_family = 0,
              __ss_padding = 
"\000\000\000\000\000\000`\327\316\352\376\177\000\000\361=t\000\000\000\000\000\035",
 '\000' <repeats 15 times>, 
"\377\377\377\377\377\377\377\377P\356\310?\275\177\000\000\000\000\000\b", 
'\000' <repeats 12 times>, 
"\360\327\316\352\376\177\000\000H\ru\000\000\000\000\000\020\327\316\352\376\177\000\000\246\032\274\036\275\177\000\000\000\000\000\000\000\000\000\000\204\330\316\352\376\177\000",
 __ss_align = 134217728}},
          id = 1069871744, send_flags = {f = 32701, blst_imask = 0}, proto = 34 
'"', proto_pad0 = 75 'K', proto_pad1 = 159}
        tmp = 0x7ffeeaced980 "0\332\316\352\376\177"
        new_uri = 0x7ffeeaced910 "`\373\310?\275\177"
        end = 0x4 <error: Cannot access memory at address 0x4>
        crt = 0x7fbd3fc8ee50 "("
        cmd = 0x7fbd3f99eb40
        len = 32701
        user = 1070475744
        uri = {user = {s = 0x7fbd3facee10 "0", len = 0}, passwd = {s = 
0x8000000 <error: Cannot access memory at address 0x8000000>, len = 129059344},
          host = {s = 0x3c6910 <error: Cannot access memory at address 
0x3c6910>, len = 5158384}, port = {
            s = 0x5ab7e0 <receive_msg+20280> 
"\230H\301\340\004H\005\350\005\223", len = 16}, params = {
            s = 0x4f <error: Cannot access memory at address 0x4f>, len = 
7598071}, sip_params = {s = 0x7ffeeaced550 "`\326\316\352\376\177",
            len = 4978977}, headers = {s = 0x0, len = 1065350864}, port_no = 0, 
proto = 2048, type = 13, flags = (unknown: 0x3f7ff6d0), transport = {
            s = 0x7ffeeaced660 "`\327\316\352\376\177", len = 7502474}, ttl = 
{s = 0x7ffeeaced660 "`\327\316\352\376\177", len = 7492948},
          user_param = {s = 0x8bb92b "core", len = 7494079}, maddr = {s = 
0x8bc708 <__func__.21> "parse_headers", len = 9157624}, method = {
            s = 0x7fbd3facee50 "\220\001", len = 1065349136}, lr = {s = 
0x8bc708 <__func__.21> "parse_headers", len = 9157624}, r2 = {
            s = 0x40 <error: Cannot access memory at address 0x40>, len = 
1065349136}, gr = {s = 0x0, len = 0}, transport_val = {
            s = 0x9f4b20 <buf+832> "\r\n", len = 0}, ttl_val = {s = 0x8be270 
<__func__.3> "parse_to_param", len = 9168712}, user_param_val = {
            s = 0x30 <error: Cannot access memory at address 0x30>, len = 
1065349136}, maddr_val = {s = 0x7fbd3facef50 "\020", len = 1068297568},
          method_val = {s = 0x0, len = 1065349136}, lr_val = {s = 0xd0 <error: 
Cannot access memory at address 0xd0>, len = 1068297744}, r2_val = {
            s = 0x400000000 <error: Cannot access memory at address 
0x400000000>, len = 0}, gr_val = {
            s = 0x10c <error: Cannot access memory at address 0x10c>, len = 
536870912}}
        next_hop = {user = {s = 0x51 <error: Cannot access memory at address 
0x51>, len = 10438710}, passwd = {
            s = 0x7 <error: Cannot access memory at address 0x7>, len = 8}, 
host = {s = 0x7fbd3fc4ed10 "\003", len = 0}, port = {
            s = 0x7fbd3fc5af70 "\001", len = 1070061840}, params = {s = 
0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>,
            len = 1069920112}, sip_params = {s = 0x0, len = 1068299680}, 
headers = {s = 0x7fbd3facf4f0 "\001", len = 1070027616}, port_no = 59456,
          proto = 16324, type = 32701, flags = 0, transport = {s = 
0x7fbd3fc5b250 "\004", len = 0}, ttl = {s = 0x0, len = 0}, user_param = {
            s = 0x43fc7d860 <error: Cannot access memory at address 
0x43fc7d860>, len = 9193958}, maddr = {s = 0x0, len = 0}, method = {
            s = 0x7ffeeaced4e0 "", len = 7807783}, lr = {s = 0x0, len = 0}, r2 
= {s = 0x1 <error: Cannot access memory at address 0x1>,
            len = 1068297632}, gr = {s = 0x9f4b22 <buf+834> "", len = 
10439422}, transport_val = {s = 0x0, len = -355543632}, ttl_val = {
            s = 0x9f4b22 <buf+834> "", len = 10439242}, user_param_val = {s = 
0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0,
            len = 7534444}, lr_val = {s = 0x7ffeeaced4e0 "", len = 1065349136}, 
r2_val = {s = 0x7fbd3facee10 "0", len = 1065349136}, gr_val = {
            s = 0x7ffeeaced520 "P\325\316\352\376\177", len = 515644070}}
        u = 0x7ffeeacedab0
        port = 0
        dst_host = 0x7fbd3facee50
        i = 41
        flags = 0
        avp = 0x7627ed <parse_cseq+2542>
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 65537}, re 
= 0x0}, avp = 0x9f47e0 <buf>}
        sct = 0x7fbd3fc8ee50
        sjt = 0x7fbd3fce29e0
        rve = 0x7fbd3fc923c0
        mct = 0x7ffeeaced810
        rv = 0x0
        rv1 = 0x7ffeeaced930
        c1 = {cache_type = 3939422992, val_type = 32766, c = {avp_val = {n = 
140450790895632, s = {s = 0x7fbd3f7ff010 "\001", len = 1068532832},
              re = 0x7fbd3f7ff010}, pval = {rs = {s = 0x7fbd3f7ff010 "\001", 
len = 1068532832}, ri = 140450790895632, flags = -355544240}},
          i2s = 
"\200\031\213\036\275\177\000\000p\031\213\036\275\177\000\000\020\022\213\036\275\177"}
        s = {s = 0x893f988fe0 <error: Cannot access memory at address 
0x893f988fe0>, len = -355542000}
        srevp = {0x7ffeeacedb50, 0x7fbd1e83b9ae <tps_msg_received+3364>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, 
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}}
        __func__ = "do_action"
#18 0x0000000000450a6d in run_actions (h=0x7ffeeaceda90, a=0x7fbd3fc8fb60, 
msg=0x7fbd3fc8ee50) at core/action.c:1618
        t = 0x7fbd3fc95440
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 1070132816, tz_dsttime = 32701}
        tdiff = 536870912
        __func__ = "run_actions"
#19 0x00000000004511d7 in run_top_route (a=0x7fbd3fc8fb60, msg=0x7fbd3fc8ee50, 
c=0x0) at core/action.c:1701
        ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = 
{{__jmpbuf = {4294967296, 100897436159138527, 268, 536870912, 134217728, 0,
                100897436209470175, -100309851447272737}, __mask_was_saved = 0, 
__saved_mask = {__val = {6379359, 4294967296, 140450795679312, 1,
                  4294967296, 268, 536870912, 134217728, 0, 140732837845856, 0, 
4611686022722355200, 0, 140450796023248, 4294967296, 268}}}}}
        p = 0x7ffeeaceda90
        ret = 134217728
        sfbk = 0
#20 0x00000000005ab16e in receive_msg (
    buf=0x9f47e0 <buf> "BYE 
sip:gw+internal_sip_gw04_sbc01@172.16.172.216:65000;transport=udp;gw=internal_sip_gw04_sbc01
 SIP/2.0\r\nVia: SIP/2.0/UDP 
172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bK4BHUQ4D1gBaSS\r\nMax-Forwards: 
6"..., len=834, rcv_info=0x7ffeeacee120) at core/receive.c:518
        msg = 0x7fbd3fc8ee50
        ctx = {rec_lev = 0, run_flags = 2, last_retcode = 1, jmp_env = 
{{__jmpbuf = {4294967296, 100897436159138527, 268, 536870912, 134217728, 0,
                100897436209470175, -100309851447272737}, __mask_was_saved = 0, 
__saved_mask = {__val = {0 <repeats 16 times>}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {
          s = 0x9f47e0 <buf> "BYE 
sip:gw+internal_sip_gw04_sbc01@172.16.172.216:65000;transport=udp;gw=internal_sip_gw04_sbc01
 SIP/2.0\r\nVia: SIP/2.0/UDP 
172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bK4BHUQ4D1gBaSS\r\nMax-Forwards: 
6"..., len = 834}
        netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffeeacedc80, obuf = {s = 0x0, len = 0}, rcv = 
0x7ffeeacee120, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#21 0x00000000006f9272 in udp_rcv_loop () at core/udp_server.c:751
        len = 605
        buf = "BYE 
sip:gw+internal_sip_gw04_sbc01@172.16.172.216:65000;transport=udp;gw=internal_sip_gw04_sbc01
 SIP/2.0\r\nVia: SIP/2.0/UDP 
172.16.172.230:5080;TH=dcv;rport;branch=z9hG4bK4BHUQ4D1gBaSS\r\nMax-Forwards: 
6"...
        tmp = 0x11eeb7300 <error: Cannot access memory at address 0x11eeb7300>
        fromaddr = 0x7fbd3fd07070
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {3870036140, 0}, addr32 
= {3870036140, 0, 0, 0}, addr16 = {4268, 59052, 0, 0, 0, 0, 0, 0},
              addr = "\254\020\254\346", '\000' <repeats 11 times>}}, dst_ip = 
{af = 2, len = 4, u = {addrl = {3702263980, 0}, addr32 = {3702263980, 0,
                0, 0}, addr16 = {4268, 56492, 0, 0, 0, 0, 0, 0}, addr = 
"\254\020\254\334", '\000' <repeats 11 times>}}, src_port = 5080,
          dst_port = 65000, proto_reserved1 = 0, proto_reserved2 = 0, src_su = 
{s = {sa_family = 2,
              sa_data = "\023ج\020\254\346\000\000\000\000\000\000\000"}, sin = 
{sin_family = 2, sin_port = 55315, sin_addr = {s_addr = 3870036140},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 
2, sin6_port = 55315, sin6_flowinfo = 3870036140, sin6_addr = {
                __in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 
= {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
              sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = 
"\023ج\020\254\346", '\000' <repeats 111 times>, __ss_align = 0}},
          bind_address = 0x7fbd3f988fa0, rflags = 0, proto = 1 '\001', 
proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = 
"\000\337\316\352\376\177\000\000fJ\217\036\275\177\000\000)ҙ\036\275\177\000\000\340\"\r\036\275\177\000\0000\337\316\352\376\177\000\000\322+\231\036\275\177\000\000\000\000\000\000\000\000\000\000\340\"\r\036\275\177\000\000\000\000\000\000\000\000\000\000\340o\320?\275\177\000\000`\337\316\352\376\177\000\000La\353\036\275\177\000\000\f\001\000\000\000\000\000\000\000\000\000
 \000\000\000\000\000\000\000\b", '\000' <repeats 12 times>, 
"\200\337\316\352\376\177\000\000\307ř\036\275\177\000\000\360\"\r\036\275\177\000\000\340o\320?\275\177\000\000
 
\340\316\352\376\177\000\000\257\372\n\036\275\177\000\000\000\000\000\000\357\000\000\000\200q\250?\357",
 '\000' <repeats 91 times>...
        i = -1
        j = 343040
        l = 239
        __func__ = "udp_rcv_loop"
#22 0x000000000042dcb6 in main_loop () at main.c:1815
        i = 110
        pid = 0
        si = 0x7fbd3f988fa0
        si_desc = "udp receiver child=110 
sock=172.16.172.220:65000\000\000\204\000\000\000\000\000\240\350\316\352\376\177\000\000\f\001\000\000\000\000\000\000\000\000\000
 
\000\000\000\0008>\233?\275\177\000\000\232=\205G\275\177\000\0000\000\000\0000\000\000\000X\344\316\352\376\177\000\000`\343\316\352\376\177\000\000\000\252\000\3016\\\321",
 <incomplete sequence \324>
        nrprocs = 128
        woneinit = 1
        __func__ = "main_loop"
#23 0x0000000000439e7d in main (argc=10, argv=0x7ffeeacee9b8) at main.c:3256
        cfg_stream = 0x1700380
        c = -1
        r = 0
        tmp = 0x7ffeeacefe91 ""
        tmp_len = 0
        port = 5060
        proto = 0
        aproto = 0
        ahost = 0x0
        aport = 0
        options = 0x8433f8 
":f:cm:M:dVIhEeb:B:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 2922804141
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x7ffeeacee8a0
        p = 0x1e00000 <error: Cannot access memory at address 0x1e00000>
        st = {st_dev = 24, st_ino = 987, st_nlink = 2, st_mode = 16832, st_uid 
= 991, st_gid = 988, __pad0 = 0, st_rdev = 0, st_size = 40,
          st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1730540752, 
tv_nsec = 312000234}, st_mtim = {tv_sec = 1731395989, tv_nsec = 734966496},
          st_ctim = {tv_sec = 1731395989, tv_nsec = 734966496}, 
__glibc_reserved = {0, 0, 0}}
        l1 = 512
        tbuf = 
"9\375\305G\275\177\000\000\210\272\302G\275\177\000\0000\346\316\352\376\177\000\000\006\000\000\000\000\000\000\000\b\247\302G\275\177\000\000\006\000\000\000\020\000\000\0000\n\306G\275\177\000\000Չ\303G\275\177\000\000\000\000\000\000\000\000\000\000\240\234\303G\275\177\000\000\370\377\200G\275\177\000\000\000\n\302G\275\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\000\346\316\352\376\177\000\000\240\272\302G\275\177\000\000\240\272\302G\275\177\000\000\000\000\000\000\000\000\000\000`\030\302G\275\177\000\000\000\346\316\352\376\177\000\000\200\025\306G\275\177\000\000\000\240\302G\275\177\000\000\342\253\302G\275\177\000\000vT\303G\275\177\000\000\334#\200G\275\177\000\000\232"...
        option_index = 0
        long_options = {{name = 0x845b26 "help", has_arg = 0, flag = 0x0, val = 
104}, {name = 0x84054c "version", has_arg = 0, flag = 0x0, val = 118}, {
            name = 0x845b2b "alias", has_arg = 1, flag = 0x0, val = 1024}, 
{name = 0x845b31 "subst", has_arg = 1, flag = 0x0, val = 1025}, {
            name = 0x845b37 "substdef", has_arg = 1, flag = 0x0, val = 1026}, 
{name = 0x845b40 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
            name = 0x845b4a "server-id", has_arg = 1, flag = 0x0, val = 1028}, 
{name = 0x845b54 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {
            name = 0x845b5f "modparam", has_arg = 1, flag = 0x0, val = 1030}, 
{name = 0x845b68 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {
            name = 0x845b73 "debug", has_arg = 1, flag = 0x0, val = 1032}, 
{name = 0x845b79 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {
            name = 0x845b83 "atexit", has_arg = 1, flag = 0x0, val = 1034}, 
{name = 0x845b8a "all-errors", has_arg = 0, flag = 0x0, val = 1035}, {
            name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
(gdb) 
(gdb) p*call
$1 = {prev = 0x7fbd1e5db5d1 <pcre2_malloc>, next = 0x7fbd1e5db621 <pcre2_free>, 
lock = {lock = {val = 0}, locker_pid = {val = 0},
    rec_lock_level = 518420048}, confirmed = -67 '\275', max_amount = 
6.9391911253011244e-310, money_based = {connect_cost = 0, cost_per_second = 0,
    initial_pulse = 10, final_pulse = 0}, start_timestamp = 0, consumed_amount 
= 6.3664406801021389e-314, connect_amount = 0, dlg_h_entry = 10,
  dlg_h_id = 0, client_id = {s = 0x0, len = 10}, sip_data = {callid = {s = 0x0, 
len = 10}, from_uri = {
      s = 0xffffffffffffffff <error: Cannot access memory at address 
0xffffffffffffffff>, len = -1}, from_tag = {
      s = 0xffffffffffffffff <error: Cannot access memory at address 
0xffffffffffffffff>, len = -1}, to_uri = {
      s = 0xffffffffffffffff <error: Cannot access memory at address 
0xffffffffffffffff>, len = -1}, to_tag = {
      s = 0xffffffffffffffff <error: Cannot access memory at address 
0xffffffffffffffff>, len = -1}}}
(gdb)



-- 
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/4009#issuecomment-2470084931
You are receiving this because you are subscribed to this thread.

Message ID: <kamailio/kamailio/issues/4009/2470084...@github.com>
_______________________________________________
Kamailio (SER) - Development Mailing List
To unsubscribe send an email to sr-dev-le...@lists.kamailio.org

Reply via email to