Description

We have random kamailio crashes with Segmentation Fault. It happens when ACK for canceled call is received by Kamailio SIP proxy and forwarded to trace server using siptrace module.

Troubleshooting

Reproduction

So far the problem happens only in live environment, we are unable to reproduce it in our Dev environment.

Debugging Data

#0  0x00007f3a0fa747b4 in msg_send_buffer (dst=0x7f3924d6ba60,
    buf=0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len=605, flags=1) at ../../core/forward.h:220
        new_dst = {send_sock = 0x2000000, to = {s = {sa_family = 0, sa_data = "\000\000\001\000\000\000\020\374 \004\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 1}, sin_zero = "\020\374 \004\000\000"},
            sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 1, sin6_addr = {__in6_u = {__u6_addr8 = "\020\374 \004\000\000\000\257\335\017\241\373U\000", __u6_addr16 = {64528, 41154, 4, 0, 56751, 41231, 22011, 0},
                  __u6_addr32 = {2697133072, 4, 2702171567, 22011}}}, sin6_scope_id = 0}, sas = {ss_family = 0,
              __ss_padding = "\000\000\001\000\000\000\020\374 \004\000\000\000\257\335\017\241\373U", '\000' <repeats 11 times>, "\244\066\246\324.\301\351\300$}n\374\177\000\000\021\006\371\240\373U\000\000\360#}n\374\177\000\000\223\vΠ\373U\000\000\000\000\000\000\000\000\000\000@$}n\374\177\000\000\067(}n5060\000\244\066\246\324.\301\351\374'}n\374\177\000\000\000\000\000\000\000\000\000", __ss_align = 140722162182140}}, id = 59, send_flags = {f = 0,
            blst_imask = 0}, proto = 64 '@', proto_pad0 = 36 '$', proto_pad1 = 28285}
        outb = {
          s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 605}
        netinfo = {data = {s = 0xb000003a8 <error: Cannot access memory at address 0xb000003a8>, len = 29}, bufsize = 1853694672, rcv = 0x7c101230db, dst = 0x1}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        port = -1597834224
        ip = {af = 2697133072, len = 0, u = {addrl = {3221225482794, 1512}, addr32 = {10794, 750, 1512, 0}, addr16 = {10794, 0, 750, 0, 1512, 0, 0, 0}, addr = "**\000\000\356\002\000\000\350\005\000\000\000\000\000"}}
        from = 0x0
        local_addr = {s = {sa_family = 18112, sa_data = "\235\037\071\177\000\000\320[~\033\071\177\000"}, sin = {sin_family = 18112, sin_port = 8093, sin_addr = {s_addr = 32569}, sin_zero = "\320[~\033\071\177\000"}, sin6 = {
            sin6_family = 18112, sin6_port = 8093, sin6_flowinfo = 32569, sin6_addr = {__in6_u = {__u6_addr8 = "\320[~\033\071\177\000\000\210\006w\021:\177\000", __u6_addr16 = {23504, 7038, 32569, 0, 1672, 4471, 32570, 0},
                __u6_addr32 = {461265872, 32569, 293013128, 32570}}}, sin6_scope_id = 291708464}, sas = {ss_family = 18112,
            __ss_padding = "\235\037\071\177\000\000\320[~\033\071\177\000\000\210\006w\021:\177\000\000\060\036c\021:\177\000\000\000\000\000\000\000\000\000\000\005\304\"\241\373U\000\000\207\001\000\000?\000\000\000@\033\366\240\373U\000\000\200#}n\374\177\000\000\020\300\274\020:\177\000\000\330\001\000\000\000\000\000\000\060'}n\374\177\000\000\300#}n\374\177\000\000\324#V\020:\177\000\000\320$}n\374\177\000", __ss_align = 16843795572198908928}}
        con = 0x0
        wsev = {type = 0, buf = 0xe9c12ed4a636a400 <error: Cannot access memory at address 0xe9c12ed4a636a400>, len = 1853694896, id = 32764}
        ret = 32764
        __func__ = "msg_send_buffer"
#1  0x00007f3a0fa7ca80 in trace_send_duplicate (
    buf=0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len=605, dst2=0x7f3924d6ba60) at siptrace_send.c:356
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0,
              sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0,
              __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        pdst = 0x7f3924d6ba60
        p = 0x0
        __func__ = "trace_send_duplicate"
#2  0x00007f3a0fa3f730 in sip_trace_store (sto=0x7ffc6e7d2730, dst=0x7f3924d6ba60, correlation_id_str=0x0) at siptrace.c:593
        ret = 1
        __func__ = "sip_trace_store"
#3  0x00007f3a0fa49101 in sip_trace (msg=0x7f3a1189d500, dst=0x7f3924d6ba60, correlation_id_str=0x0, dir=0x0) at siptrace.c:1303
        sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}, body = {
            s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 605}, alloc_body = 0, callid = {s = 0x55fba122c45d <buf+477> "19C4ED5E658858CF@ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (May  8 2024)\r\nContent-Length: 0\r\n\r\n", len = 31},
          method = {
            s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 3}, status = {s = 0x7f3a0fa7d065 "", len = 0}, dir = 0x7f3a0fa7ffb5 "in", fromtag = {
            s = 0x55fba122c3f4 <buf+372> "2041847FA948DA9D\r\nTo: <sip:49yyyyyyyyyy@sip.proxy.de>;tag=8e46bdec-8fb1-4814-b516-575f5cd3315c\r\nCall-ID: 19C4ED5E658858CF@ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (Ma"..., len = 16}, fromip = {s = 0x7ffc6e7d2838 "udp:aa.bb.cc.dd:5060", len = 24}, totag = {
            s = 0x55fba122c42e <buf+430> "8e46bdec-8fb1-4814-b516-575f5cd3315c\r\nCall-ID: 19C4ED5E658858CF@ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (May  8 2024)\r\nContent-Length: 0\r\n\r\n",
            len = 36}, toip = {s = 0x7ffc6e7d27fc "udp:aa.bb.cc.dd:5060", len = 23}, alloc_headers = 0, toip_buff = "udp:aa.bb.cc.dd:5060", '\000' <repeats 36 times>,
          fromip_buff = "udp:aa.bb.cc.dd:5060", '\000' <repeats 35 times>, tv = {tv_sec = 1725002318, tv_usec = 379190}, stat = 0x92}
        snd_inf = 0x0
        __func__ = "sip_trace"
#4  0x00007f3a0fa51497 in trace_tm_neg_ack_in (t=0x7f3921846038, type=4096, ps=0x7ffc6e7d2ad0) at siptrace.c:1769
        info = 0x7f3924d6ba50
        __func__ = "trace_tm_neg_ack_in"
#5  0x00007f3a10659002 in run_trans_callbacks_internal (cb_lst=0x7f39218460b0, type=4096, trans=0x7f3921846038, params=0x7ffc6e7d2ad0) at t_hooks.c:258
        cbp = 0x7f39205f2fb8
        backup_from = 0x55fba123c2b0 <def_list+16>
        backup_to = 0x55fba123c2b8 <def_list+24>
        backup_dom_from = 0x55fba123c2c0 <def_list+32>
        backup_dom_to = 0x55fba123c2c8 <def_list+40>
        backup_uri_from = 0x55fba123c2a0 <def_list>
        backup_uri_to = 0x55fba123c2a8 <def_list+8>
        backup_xavps = 0x55fba123c3f8 <_xavp_list_head>
        backup_xavus = 0x55fba123c400 <_xavu_list_head>
        backup_xavis = 0x55fba123c408 <_xavi_list_head>
        __func__ = "run_trans_callbacks_internal"
#6  0x00007f3a10659179 in run_trans_callbacks (type=4096, trans=0x7f3921846038, req=0x7f3a1189d500, rpl=0x0, code=4) at t_hooks.c:285
        params = {req = 0x7f3a1189d500, rpl = 0x0, param = 0x7f39205f2fc8, code = 4, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#7  0x00007f3a106ec1bb in t_check_trans (msg=0x7f3a1189d500) at tm.c:2488
        t = 0x7f3921846038
        branch = 292764808
        ret = 32570
#8  0x00007f3a106ec257 in w_t_check_trans (msg=0x7f3a1189d500, foo=0x0, bar=0x0) at tm.c:2509
No locals.
#9  0x000055fba0c58367 in do_action (h=0x7ffc6e7d3400, a=0x7f3a10d8e8d0, msg=0x7f3a1189d500) at core/action.c:1079
        ret = -5
        v = 481060096
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000 2}n\374\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = " 2}n\374\177\000"}, sin6 = {sin6_family = 0,
              sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = " 2}n\374\177\000\000ouڠ\373U\000", __u6_addr16 = {12832, 28285, 32764, 0, 30063, 41178, 22011, 0}, __u6_addr32 = {1853698592, 32764, 2698671471,
                    22011}}}, sin6_scope_id = 1853698656}, sas = {ss_family = 0,
              __ss_padding = "\000\000\000\000\000\000 2}n\374\177\000\000ouڠ\373U\000\000`2}n\374\177\000\000P2}n\374\177\000\000pmN\021:\177\000\000\000Չ\021:\177\000\000\001", '\000' <repeats 11 times>, "\324.\301\351\060\214+\021:\177\000\000\000\000\000\000\001\000\000\000\020\374 \373U", '\000' <repeats 25 times>, __ss_align = 140722162184688}}, id = 1853699008, send_flags = {f = 32764, blst_imask = 0}, proto = 64 '@', proto_pad0 = 108 'l',
          proto_pad1 = 4430}
        tmp = 0xe9c12ed4a636a400 <error: Cannot access memory at address 0xe9c12ed4a636a400>
        new_uri = 0x7f390fa416c8 ""
        end = 0x7f3a1012a2eb "dialog"
        crt = 0x7f391ff27010 "0"
        cmd = 0x7f3a10c68118
        len = 262176768
        user = 32569
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 461265892}, passwd = {s = 0x7ffc6e7d2f80 "", len = 536880704}, host = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 461265892}, port = {
            s = 0x7ffc6e7d2e60 "p/}n\006", len = 269282911}, params = {s = 0x16e7d2e80 <error: Cannot access memory at address 0x16e7d2e80>, len = 461265892}, sip_params = {s = 0x7ffc6e7d2e80 "@/}n\374\177", len = 269282911},
          headers = {s = 0x66e7d2f70 <error: Cannot access memory at address 0x66e7d2f70>, len = 269627611}, port_no = 41707, proto = 4114, type = 32570, flags = (unknown: 0xa636a400), transport = {s = 0x7ffc6e7d2f40 "`/}n\374\177",
            len = 269321843}, ttl = {s = 0x1ff27048 <error: Cannot access memory at address 0x1ff27048>, len = 10794}, user_param = {s = 0x7ffc000005e8 <error: Cannot access memory at address 0x7ffc000005e8>, len = 269526667},
          maddr = {s = 0x7f391f9d46c0 "\002", len = 461265872}, method = {s = 0x100000478 <error: Cannot access memory at address 0x100000478>, len = 530400960}, lr = {
            s = 0x5e8112b6508 <error: Cannot access memory at address 0x5e8112b6508>, len = 530400960}, r2 = {s = 0x7ffc6e7d2f30 "", len = 461265872}, gr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 461265892},
          transport_val = {s = 0x7f391d7ffc08 "\240\374\177\035\071\177", len = -1506368512}, ttl_val = {s = 0x16e7d2f50 <error: Cannot access memory at address 0x16e7d2f50>, len = 461265892}, user_param_val = {
            s = 0x7ffc6e7d2f50 "`0}n\374\177", len = 269282911}, maddr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 461265892}, method_val = {s = 0x7ffc6e7d2f60 "p/}n\374\177", len = -1506368512},
          lr_val = {s = 0x7ffc6e7d3060 "\200\060}n\374\177", len = 269351486}, r2_val = {s = 0x7ffc6e7d2f70 "`0}n\374\177", len = 269554093}, gr_val = {s = 0x7ffc6e7d3060 "\200\060}n\374\177", len = 269242067}}
        next_hop = {user = {s = 0x0, len = 530400960}, passwd = {s = 0x0, len = 294245632}, host = {s = 0x0, len = 269627637}, port = {s = 0x100000478 <error: Cannot access memory at address 0x100000478>, len = 530400960}, params = {
            s = 0x5e86e7d2ff0 <error: Cannot access memory at address 0x5e86e7d2ff0>, len = 269282911}, sip_params = {s = 0x608012157 <error: Cannot access memory at address 0x608012157>, len = 461265872}, headers = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = -1506368512}, port_no = 12464, proto = 28285, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0x100d8670),
          transport = {s = 0x3e0 <error: Cannot access memory at address 0x3e0>, len = 10794}, ttl = {s = 0x7f3a000005e8 "", len = 0}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1506368512}, maddr = {
            s = 0x0, len = 0}, method = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x7ffc6e7d3080 "`1}n\374\177", len = 1853698640}, gr = {
            s = 0x7f3a114e6d88 "", len = 294245632}, transport_val = {s = 0x7ffc6e7d3160 " 2}n\374\177", len = 269543303}, ttl_val = {s = 0x7ffc6e7d30c0 "\300F\235\037\071\177", len = 1853698640}, user_param_val = {
            s = 0x7f3a114e6d88 "", len = 294245632}, maddr_val = {s = 0x5e86e7d30d0 <error: Cannot access memory at address 0x5e86e7d30d0>, len = -1506368512}, method_val = {s = 0x7f391f9d46c0 "\002", len = 0}, lr_val = {s = 0x0,
            len = 269554093}, r2_val = {s = 0x7ffc6e7d31d0 "\360\061}n\374\177", len = 269242067}, gr_val = {s = 0x0, len = 0}}
        u = 0x7f390fa08000
        port = 4114
        dst_host = 0xcfa0f542d7
        i = 16
        flags = 32569
        avp = 0x4a0c2fc10
        st = {flags = 48, id = 0, name = {n = 262176768, s = {s = 0x7f390fa08000 "", len = 535981944}, re = 0x7f390fa08000}, avp = 0x7f391ff270a8}
        sct = 0x55fba0f5a088 <qm_free+8063>
        sjt = 0x16e7d2d90
        rve = 0x7f390fa082e0
        mct = 0x7ffc6e7d2e60
        rv = 0x7f390fa08000
        rv1 = 0x6a10f4e54
        c1 = {cache_type = 290, val_type = RV_NONE, c = {avp_val = {n = 269627637, s = {s = 0x7f3a101230f5 "dlg_hash.c", len = 1144}, re = 0x7f3a101230f5}, pval = {rs = {s = 0x7f3a101230f5 "dlg_hash.c", len = 1144}, ri = -1506368512,
              flags = -373215532}}, i2s = "\300YO\021\350\005\000\000\000\000\000\000\001\000\000\000\020\374 \373U"}
        s = {s = 0x7f3a1012a770 <__func__.11> "set_dlg_variable_unsafe", len = 269657780}
        srevp = {0x0, 0x7f3a1189d500}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>,
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#10 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d3400, a=0x7f3a10d8e8d0, msg=0x7f3a1189d500) at core/action.c:1584
        t = 0x7f3a10d8e8d0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 294245632, tz_dsttime = 32570}
        tdiff = 294245632
        __func__ = "run_actions"
#11 0x000055fba0c67aff in run_actions_safe (h=0x7ffc6e7d5890, a=0x7f3a10d8e8d0, msg=0x7f3a1189d500) at core/action.c:1648
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, 6741736921070007646, 94539222285328, 0, 0, 0, 6741736921084687710, 684806027146655070}, __mask_was_saved = 0, __saved_mask = {__val = {
                  139887379076352, 0, 0, 0, 0, 0, 0, 0, 0, 140722162185472, 139887358911444, 140722162185440, 0, 33554432, 20328504, 10576624}}}}}
        ret = 32764
        ign_on_break = 0
#12 0x000055fba0e1226d in rval_get_int (h=0x7ffc6e7d5890, msg=0x7f3a1189d500, i=0x7ffc6e7d37e0, rv=0x7f3a10d8ea28, cache=0x0) at core/rvalue.c:949
        r_avp = 0xf6a0c67aff
        avp_val = {n = 281523440, s = {s = 0x7f3a10c7b4f0 "ou\003\020:\177", len = -1593034239}, re = 0x7f3a10c7b4f0}
        pval = {rs = {s = 0x7f3a10c6c4a0 "\346\024S\020:\177", len = 0}, ri = 1, flags = 22011}
        tmp = {s = 0x3a8 <error: Cannot access memory at address 0x3a8>, len = 280805392}
        s = 0x0
        r = 32764
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#13 0x000055fba0e17841 in rval_expr_eval_int (h=0x7ffc6e7d5890, msg=0x7f3a1189d500, res=0x7ffc6e7d37e0, rve=0x7f3a10d8ea20) at core/rvalue.c:1947
        i1 = -1506368512
        i2 = -373215532
        ret = -1
        c1 = {cache_type = 1853699856, val_type = 32764, c = {avp_val = {n = -1595865264, s = {s = 0x55fba0e10750 <rval_new_str+136> "H\213E\370H\213P\bH\213E\350\213@\bH\230H\001\320", <incomplete sequence \306>, len = -1597834224},
              re = 0x55fba0e10750 <rval_new_str+136>}, pval = {rs = {s = 0x55fba0e10750 <rval_new_str+136> "H\213E\370H\213P\bH\213E\350\213@\bH\230H\001\320", <incomplete sequence \306>, len = -1597834224}, ri = 1853699936,
              flags = 32764}}, i2s = "\001\000\000\000\000\000\000\000X\026s\021:\177\000\000\335\304\"\241\373U"}
        c2 = {cache_type = 13, val_type = 17, c = {avp_val = {n = 0, s = {s = 0x0, len = 290409088}, re = 0x0}, pval = {rs = {s = 0x0, len = 290409088}, ri = 1853700172, flags = 32764}},
          i2s = "\335\304\"\241\373U\000\000\330\304\"\241\373U\000\000\000\000\000\000\001"}
        rv1 = 0x0
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#14 0x000055fba0c57dbd in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d925d8, msg=0x7f3a1189d500) at core/action.c:1055
        ret = -5
        v = 14401040
        dst = {send_sock = 0x7f3a1189d500, to = {s = {sa_family = 22672, sa_data = "}n\374\177\000\000\000\000\000\000:\177\000"}, sin = {sin_family = 22672, sin_port = 28285, sin_addr = {s_addr = 32764},
              sin_zero = "\000\000\000\000:\177\000"}, sin6 = {sin6_family = 22672, sin6_port = 28285, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000:\177\000\000\000\000\000\000\000\000\000",
                  __u6_addr16 = {0, 0, 32570, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 32570, 0, 0}}}, sin6_scope_id = 294245632}, sas = {ss_family = 22672,
              __ss_padding = "}n\374\177\000\000\000\000\000\000:\177", '\000' <repeats 11 times>, "Չ\021:\177\000\000\240V}n\374\177\000\000\000\000\000\000\000\000\000\000<\310\"\241\373U\000\000XP\307\020:\177\000\000>\310\"\241\373U\000\000\000\000\000\000\000\000\000\000@\022\060\021\377\377\377\377pA}\021:\177\000\000\000\000\000\000\001", '\000' <repeats 11 times>, "\020\274\241\242\373U\000", __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0},
          proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x55fba0c67391 <run_actions+2339> "\211\205\274\376\377\377H\307\005F\243P"
        new_uri = 0x55fba0f78206 <parse_headers+2307> "\351\021\066"
        end = 0x7ffc6e7d3990 ""
        crt = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE"
        cmd = 0x55fba0c2fc10 <_start>
        len = 8
        user = 0
        uri = {user = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, passwd = {s = 0x0, len = -1506368512}, host = {s = 0x7f3a114f4a80 "\002", len = 0}, port = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x7ffc6e7d3bf0 "\020=}n\374\177", len = -1597607023}, headers = {
            s = 0x7ffc6e7d3b10 "\300;}n\374\177", len = 272678193}, port_no = 15376, proto = 28285, type = 32764, flags = (unknown: 0x1189d500), transport = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 294245632}, ttl = {s = 0x7f3a10d8db28 "\272\002", len = 1853701168}, user_param = {s = 0x7ffc6e7d3bc0 "\360;}n\374\177",
            len = -1597605121}, maddr = {s = 0x7f3a114f9a60 "\b\021", len = 294245632}, method = {s = 0x0, len = 1853707936}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {
            s = 0x2a0c2fc10 <error: Cannot access memory at address 0x2a0c2fc10>, len = 272871469}, transport_val = {s = 0x0, len = -1506368512}, ttl_val = {s = 0x7ffc6e7d3bc0 "\360;}n\374\177", len = 272753303}, user_param_val = {
            s = 0xb823755e <error: Cannot access memory at address 0xb823755e>, len = 294245632}, maddr_val = {s = 0x7ffc00000000 <error: Cannot access memory at address 0x7ffc00000000>, len = -1506368512}, method_val = {
            s = 0x1a113016f0 <error: Cannot access memory at address 0x1a113016f0>, len = 0}, lr_val = {s = 0x7f3a118ba988 "", len = 294245632}, r2_val = {s = 0x0, len = 294365576}, gr_val = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}}
        next_hop = {user = {s = 0x0, len = -1506368512}, passwd = {s = 0x7ffc6e7d3d00 "p>}n\374\177", len = 0}, host = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port = {s = 0x0,
            len = -1506368512}, params = {s = 0x7ffc6e7d3bf0 "\020=}n\374\177", len = 0}, sip_params = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, headers = {s = 0x0, len = 0},
          port_no = 15632, proto = 28285, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0xa0c67afc), transport = {s = 0x7f3a1189d500 ">D%", len = 294245632}, ttl = {s = 0x7f3a10d8db28 "\272\002",
            len = 1853708432}, user_param = {s = 0x7f3a10d27680 "\370\001", len = 0}, maddr = {s = 0x0, len = 1}, method = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1109166754}, lr = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x5d8f7602bec3755e <error: Cannot access memory at address 0x5d8f7602bec3755e>,
            len = 337605982}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x5d8f7602bf03755e <error: Cannot access memory at address 0x5d8f7602bf03755e>, len = 337605982}, user_param_val = {s = 0x0, len = 0}, maddr_val = {
            s = 0x0, len = 0}, method_val = {s = 0x0, len = -1506368512}, lr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, r2_val = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, gr_val = {s = 0x0, len = 0}}
        u = 0xe9c12ed4a636a400
        port = 201
        dst_host = 0x10476dde
        i = 298
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 0, name = {n = -1591556899, s = {s = 0x55fba122c4dd <buf+605> "", len = 293390512}, re = 0x55fba122c4dd <buf+605>}, avp = 0x55fba122c4db <buf+603>}
        sct = 0x0
        sjt = 0x7ffc6e7d3a60
        rve = 0x7f3a10d8ea20
        mct = 0x0
        rv = 0x7ffc6e7d3aa0
        rv1 = 0x100000000
        c1 = {cache_type = 1853701712, val_type = 32764, c = {avp_val = {n = -1595858323, s = {
                s = 0x55fba0e1226d <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 1853701712},
              re = 0x55fba0e1226d <rval_get_int+341>}, pval = {rs = {
                s = 0x55fba0e1226d <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 1853701712},
              ri = -1506368512, flags = -373215532}}, i2s = "H\266O\021:\177\000\000\000\000\000\000\000\000\000\000\300\337\330\020:\177"}
        s = {s = 0x200 <error: Cannot access memory at address 0x200>, len = 294245632}
        srevp = {0x7ffc6e7d3e70, 0xe9c12ed4a636a400}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>,
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#15 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d925d8, msg=0x7f3a1189d500) at core/action.c:1584
        t = 0x7f3a10d925d8
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 1853708432, tz_dsttime = 32764}
        tdiff = 1853702160
        __func__ = "run_actions"
#16 0x000055fba0c582d3 in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d95ce8, msg=0x7f3a1189d500) at core/action.c:1070
        ret = 1
        v = 1
        dst = {send_sock = 0x7f3a1189d500, to = {s = {sa_family = 22672, sa_data = "}n\374\177\000\000\330S}\021:\177\000"}, sin = {sin_family = 22672, sin_port = 28285, sin_addr = {s_addr = 32764}, sin_zero = "\330S}\021:\177\000"},
            sin6 = {sin6_family = 22672, sin6_port = 28285, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 = "\330S}\021:\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {21464, 4477, 32570, 0, 0, 0, 0, 0},
                  __u6_addr32 = {293426136, 32570, 0, 0}}}, sin6_scope_id = 294245632}, sas = {ss_family = 22672,
              __ss_padding = "}n\374\177\000\000\330S}\021:\177", '\000' <repeats 11 times>, "Չ\021:\177\000\000\240V}n\374\177", '\000' <repeats 11 times>, "Չ\021:\177\000\000P\001\310\020:\177\000\000`G}n\374\177\000\000\000\000\000\000\000\000\000\000\240V}n\377\377\377\377\200\346\301\020:\177\000\000\000\000\000\000\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000", __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0},
          proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7f3a1189d500 ">D%"
        new_uri = 0x7ffc6e7d4310 ""
        end = 0x7f3a1189d500 ">D%"
        crt = 0x0
        cmd = 0x55fba122c2c6 <buf+70>
        len = 1853702572
        user = 32764
        uri = {user = {s = 0x7f3a1189d500 ">D%", len = 293462816}, passwd = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = -1506368512}, host = {s = 0x0, len = 0}, port = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x7ffc6e7d4420 "@E}n\374\177", len = -1597607023}, headers = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x7ffc6e7d4940 "\340J}n\374\177", len = 294245632},
          ttl = {s = 0x7f3a10d27680 "\370\001", len = 1853703264}, user_param = {s = 0x0, len = 294245632}, maddr = {s = 0x7f3a10d21f18 "\340\001", len = 1853704992}, method = {s = 0x0, len = 1853707936}, lr = {s = 0x0, len = 0},
          r2 = {s = 0x0, len = 0}, gr = {s = 0x30 <error: Cannot access memory at address 0x30>, len = -1506368512}, transport_val = {s = 0x7ffc6e7d43f0 " D}n\374\177", len = 266269062}, ttl_val = {
            s = 0x55fb00000000 <error: Cannot access memory at address 0x55fb00000000>, len = 294245632}, user_param_val = {s = 0x55fba10c3df8 <__func__.25> "rval_new_empty", len = -1593034239}, maddr_val = {
            s = 0x55fba122c42e <buf+430> "8e46bdec-8fb1-4814-b516-575f5cd3315c\r\nCall-ID: 19C4ED5E658858CF@ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (May  8 2024)\r\nContent-Length: 0\r\n\r\n",
            len = 36}, method_val = {s = 0x7f3a11866718 "\026", len = 0}, lr_val = {s = 0x7f3a10d11f38 "", len = 294245632}, r2_val = {s = 0x0, len = 282140472}, gr_val = {s = 0x7ffc6e7d4510 "\200F}n\374\177", len = -1595836351}}
        next_hop = {user = {s = 0x55fb000005e8 <error: Cannot access memory at address 0x55fb000005e8>, len = -1506368512}, passwd = {s = 0x7f391e380230 "\002", len = 0}, host = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port = {s = 0x0, len = -1506368512}, params = {s = 0x7ffc6e7d4420 "@E}n\374\177", len = 0}, sip_params = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, headers = {s = 0x0, len = 0}, port_no = 17728, proto = 28285, type = 32764,
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0xa0c67afc), transport = {s = 0x0, len = 294245632}, ttl = {s = 0x7f3a10d27680 "\370\001", len = 1853708432}, user_param = {s = 0x7f3a10d25078 "\354\001", len = 0},
          maddr = {s = 0x0, len = -1}, method = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 1111717214}, lr = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE",
            len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x5d8f76024f23755e <error: Cannot access memory at address 0x5d8f76024f23755e>, len = 337605982}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0},
          user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0x7ffc6e7d4680 "\360G}n\374\177", len = -1595834862}, gr_val = {s = 0x7f3a11866710 "\a", len = -1506368512}}
        u = 0x1400000000
        port = 42550
        dst_host = 0x7ffc6e7d56a0
        i = 294245632
        flags = 32570
        avp = 0x7ffc00000046
        st = {flags = 1853702832, id = 32764, name = {n = 268744002, s = {s = 0x7f3a1004b542 <w_process_maxfwd_header+982> "H\213M\310dH+\f%(", len = 293462808}, re = 0x7f3a1004b542 <w_process_maxfwd_header+982>}, avp = 0x0}
        sct = 0x1a636a400
        sjt = 0x7f3a114fd540
        rve = 0x7f3a10d8dfb8
        mct = 0x7ffc6e7d41a0
        rv = 0x14a0c2fc10
        rv1 = 0x55fba0e17ea4 <rval_expr_eval_int+1806>
        c1 = {cache_type = 1853703808, val_type = 32764, c = {avp_val = {n = -1595858323, s = {
                s = 0x55fba0e1226d <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 0},
              re = 0x55fba0e1226d <rval_get_int+341>}, pval = {rs = {
                s = 0x55fba0e1226d <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 0}, ri = 0,
              flags = 1}}, i2s = "\020\374 \373U\000\000\000\000\000\000\000\000\000\000\330w\322\020:\177"}
        s = {s = 0x0, len = 1}
        srevp = {0x7f3a1189d500, 0xe9c12ed4a636a400}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>,
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#17 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d95ce8, msg=0x7f3a1189d500) at core/action.c:1584
        t = 0x7f3a10d95ce8
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 1853708432, tz_dsttime = 32764}
        tdiff = 1853704256
        __func__ = "run_actions"
#18 0x000055fba0c58329 in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d95e38, msg=0x7f3a1189d500) at core/action.c:1074
        ret = 1
        v = 0
        dst = {send_sock = 0x7f3a1189d500, to = {s = {sa_family = 22672, sa_data = "}n\374\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 22672, sin_port = 28285, sin_addr = {s_addr = 32764},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 22672, sin6_port = 28285, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
                  __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 1853705952}, sas = {ss_family = 22672,
              __ss_padding = "}n\374\177", '\000' <repeats 18 times>, "\340N}n\374\177\000\000\006\202\367\240\373U", '\000' <repeats 11 times>, "\244\066\246\324.\301\351\377\377\377\377\006\000\000\000\000\000\000\000\001\000\000\000\020\374 \373U", '\000' <repeats 26 times>, "\060O}n\374\177\000\000\242lӠ\373U\000", __ss_align = 139887367046936}}, id = 282216064, send_flags = {f = 32570, blst_imask = 0}, proto = 0 '\000', proto_pad0 = -43 '\325',
          proto_pad1 = 4489}
        tmp = 0x180000000000 <error: Cannot access memory at address 0x180000000000>
        new_uri = 0x101f0ccbd0 <error: Cannot access memory at address 0x101f0ccbd0>
        end = 0x0
        crt = 0x0
        cmd = 0x7f391f0ccbd0
        len = -1595858323
        user = 22011
        uri = {user = {s = 0x55fba10eec6a "core", len = 293419024}, passwd = {s = 0x55fba10eed78 <__func__.17> "create_avp", len = -1506368512}, host = {s = 0x48 <error: Cannot access memory at address 0x48>, len = 0}, port = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x7ffc6e7d4c50 "pM}n\374\177", len = -1597607023}, headers = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x7ffc6e7d4c00 "@M}n\374\177", len = 294245632}, ttl = {
            s = 0x7f3a10d25078 "\354\001", len = 1853705360}, user_param = {s = 0x7f3a10d21f18 "\340\001", len = 1853708432}, maddr = {s = 0x7ffc6e7d4b40 "", len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {
            s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x5d8f760258a3755e <error: Cannot access memory at address 0x5d8f760258a3755e>, len = 337605982}, ttl_val = {s = 0x0, len = 1853705136}, user_param_val = {
            s = 0x7f7ffc6e7d4c40 <error: Cannot access memory at address 0x7f7ffc6e7d4c40>, len = 282179676}, maddr_val = {s = 0x7ffc6e7d4c80 "\320L}n\374\177", len = -1594708756}, method_val = {s = 0x7f3a10d1c180 "", len = 0},
          lr_val = {s = 0x7f3a10d1b85d "target_geo_number)", len = 17}, r2_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 280805392}, gr_val = {s = 0x100000043 <error: Cannot access memory at address 0x100000043>,
            len = 274080724}}
        next_hop = {user = {s = 0x7f391f0ccc08 "\177", len = 520932376}, passwd = {s = 0x7f3a10bcc010 "\001", len = -1506368512}, host = {s = 0x7ffc6e7d4d40 "\260N}n\374\177", len = -1595858323}, port = {
            s = 0x14800000187 <error: Cannot access memory at address 0x14800000187>, len = -1506368512}, params = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, sip_params = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, headers = {s = 0x0, len = 0}, port_no = 19824, proto = 28285, type = 32764,
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0xa0c67afc), transport = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 294245632}, ttl = {s = 0x7f3a10d25078 "\354\001",
            len = 1853708432}, user_param = {s = 0x7ffc6e7d4cd0 "^u\203_\002v\217]^u\037\024t\353\200\t", len = 0}, maddr = {s = 0x0, len = 1}, method = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>,
            len = 1386444126}, lr = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, r2 = {s = 0x0, len = 0}, gr = {
            s = 0x5d8f76025f83755e <error: Cannot access memory at address 0x5d8f76025f83755e>, len = 337605982}, transport_val = {s = 0x7f3a00000000 "", len = 0}, ttl_val = {s = 0x7f3a10d1b85d "target_geo_number)", len = 17},
          user_param_val = {s = 0x1a00000101 <error: Cannot access memory at address 0x1a00000101>, len = -1506368512}, maddr_val = {s = 0x10a0c2fc10 <error: Cannot access memory at address 0x10a0c2fc10>, len = 0}, method_val = {
            s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x7ffc6e7d4eb0 " P}n\374\177", len = -1595836351}, gr_val = {s = 0x7f3a10d1b810 "",
            len = 294245632}}
        u = 0x7f3a1189d500
        port = 42550
        dst_host = 0x0
        i = 294245632
        flags = 32764
        avp = 0x7f3a10d21f18
        st = {flags = 520932432, id = 4, name = {n = -1592832428, s = {s = 0x55fba10f4e54 "core", len = 1853705024}, re = 0x55fba10f4e54}, avp = 0xe9c12ed4a636a400}
        sct = 0x7f390fa08000
        sjt = 0x0
        rve = 0x7f3a10d277d0
        mct = 0x7f391f0ccc80
        rv = 0x55fba0c2fc10 <_start>
        rv1 = 0x7ffc6e7d4b20
        c1 = {cache_type = 1853705904, val_type = 32764, c = {avp_val = {n = -1595858323, s = {
                s = 0x55fba0e1226d <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 282215880},
              re = 0x55fba0e1226d <rval_get_int+341>}, pval = {rs = {
                s = 0x55fba0e1226d <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 282215880},
              ri = 294245632, flags = 32570}}, i2s = "\200\301\321\020:\177\000\000\000\000\000\000\000\000\000\000\320Q\322\020:\177"}
        s = {s = 0x0, len = 0}
        srevp = {0x400014e90, 0xe9c12ed4a636a400}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>,
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#19 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d27448, msg=0x7f3a1189d500) at core/action.c:1584
        t = 0x7f3a10d95e38
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 1853708432, tz_dsttime = 32764}
        tdiff = 1853706352
        __func__ = "run_actions"
#20 0x000055fba0c582d3 in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d9a5d0, msg=0x7f3a1189d500) at core/action.c:1070
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 41984, sa_data = "6\246\324.\301\351\000W}n\374\177\000"}, sin = {sin_family = 41984, sin_port = 42550, sin_addr = {s_addr = 3921751764}, sin_zero = "\000W}n\374\177\000"},
            sin6 = {sin6_family = 41984, sin6_port = 42550, sin6_flowinfo = 3921751764, sin6_addr = {__in6_u = {__u6_addr8 = "\000W}n\374\177\000\000\000\000\000\000\001\000\000", __u6_addr16 = {22272, 28285, 32764, 0, 0, 0, 1, 0},
                  __u6_addr32 = {1853708032, 32764, 0, 1}}}, sin6_scope_id = 2697133072}, sas = {ss_family = 41984,
              __ss_padding = "6\246\324.\301\351\000W}n\374\177\000\000\000\000\000\000\001\000\000\000\020\374 \373U\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\000Չ\021:\177\000\000\000W}n\374\177\000\000\234\236\371\240\373U\000\000\270\266\017\241\373U\000\000`cn\021:\177\000\000\335\304\"\241\373U\000\000\204\304\"\241\373U\000\000`W}n\374\177\000\000\213\304\"\241\373U\000", __ss_align = 0}}, id = -1591556899, send_flags = {
            f = 22011, blst_imask = 0}, proto = -122 '\206', proto_pad0 = -60 '\304', proto_pad1 = -24286}
        tmp = 0x5a10f4e54 <error: Cannot access memory at address 0x5a10f4e54>
        new_uri = 0x7f3a10721b45 "tm: t_reply.c"
        end = 0x7f3a11629608 "SIP/2.0 181 Call Is Being Forwarded\r\nVia: SIP/2.0/UDP 212.227.124.146;branch=z9hG4bK5233.276159011cb03ac27a88b9214d0464e1.0\r\nVia: SIP/2.0/UDP 89.246.251.196:5060;branch=z9hG4bKobcj3a20101lnev2u0f0.1\r\n"...
        crt = 0x7f3a116283e0 "8\a"
        cmd = 0x55fba123c400 <_xavu_list_head>
        len = 270422824
        user = 32570
        uri = {user = {s = 0x7ffc6e7d52d0 "0S}n\374\177", len = -1592832423}, passwd = {s = 0x12c00000187 <error: Cannot access memory at address 0x12c00000187>, len = -1594483904}, host = {s = 0x7ffc6e7d52f0 "", len = 280805392},
          port = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 280805392}, params = {s = 0x7ffc6e7d5330 "`S}n\374\177", len = 274080724}, sip_params = {
            s = 0x400a15238 <error: Cannot access memory at address 0x400a15238>, len = 0}, headers = {s = 0x2000000 <error: Cannot access memory at address 0x2000000>, len = 20331672}, port_no = 22264, proto = 161,
          type = ERROR_URI_T, flags = (unknown: 0xc9c368), transport = {s = 0xdbbe10 <error: Cannot access memory at address 0xdbbe10>, len = 8}, ttl = {s = 0x130 <error: Cannot access memory at address 0x130>, len = -1506368512},
          user_param = {s = 0x7ffc6e7d5360 "`T}n\374\177", len = -1597109357}, maddr = {s = 0x0, len = -1592832428}, method = {s = 0x7ffc6e7d5460 "\300U}n\374\177", len = 0}, lr = {s = 0x7ffc6e7d5460 "\300U}n\374\177",
            len = -1594524464}, r2 = {s = 0x55fba110b760 <__func__.3> "parse_via", len = -1592832423}, gr = {s = 0x55fba10fddaf "core", len = -1594483904}, transport_val = {s = 0x55fba10fdda0 <__func__.3> "parse_to_param",
            len = -1592794504}, ttl_val = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 280805392}, user_param_val = {s = 0x7ffc6e7d5410 "@T}n\374\177", len = 274080724}, maddr_val = {
            s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = 0}, method_val = {s = 0x7f3a10bcc010 "\001", len = 292437752}, lr_val = {s = 0x400a15450 <error: Cannot access memory at address 0x400a15450>,
            len = -1592742288}, r2_val = {s = 0xdbbe10 <error: Cannot access memory at address 0xdbbe10>, len = -1506368512}, gr_val = {s = 0x7ffc6e7d5540 "\207\001", len = -1593999801}}
        next_hop = {user = {s = 0x7ffc6e7d5440 "\020\374 \004", len = -1597109357}, passwd = {s = 0x0, len = -1506368512}, host = {s = 0x7ffc6e7d5540 "\207\001", len = 0}, port = {
            s = 0x4a0c2fc10 <error: Cannot access memory at address 0x4a0c2fc10>, len = -1592795729}, params = {s = 0x0, len = -1506368512}, sip_params = {s = 0x7ffc6e7d55c0 "-\001", len = -1594334232}, headers = {
            s = 0x55fba110b760 <__func__.3> "parse_via", len = -1592736384}, port_no = 64, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x6e7d5608), transport = {s = 0x2000000 <error: Cannot access memory at address 0x2000000>,
            len = 291681256}, ttl = {s = 0x55fba122c4dd <buf+605> "", len = -1591557079}, user_param = {s = 0xd10bcc010 <error: Cannot access memory at address 0xd10bcc010>, len = 29}, maddr = {
            s = 0x13a <error: Cannot access memory at address 0x13a>, len = -1506368512}, method = {s = 0x7ffc6e7d5500 "", len = -1597109357}, lr = {s = 0x0, len = -1592832428}, r2 = {s = 0x7ffc6e7d5600 "\020\374 \373U", len = 0},
          gr = {s = 0x7ffc6e7d5600 "\020\374 \373U", len = 1853707636}, transport_val = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = -1591557245}, ttl_val = {
            s = 0x4a0c2fc10 <error: Cannot access memory at address 0x4a0c2fc10>, len = 292437808}, user_param_val = {s = 0x0, len = -1592832423}, maddr_val = {s = 0x8900000187 <error: Cannot access memory at address 0x8900000187>,
            len = -1594483904}, method_val = {s = 0x7ffc6e7d5590 "", len = 280805392}, lr_val = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 280805392}, r2_val = {s = 0x7ffc6e7d55d0 "", len = -1594175840}, gr_val = {
            s = 0x7f3a116e6388 "\004", len = 292447096}}
        u = 0x7f3a00000000
        port = 0
        dst_host = 0x7f3a10bcc010
        i = 520577136
        flags = 32764
        avp = 0x7ffc6e7d52d0
        st = {flags = 294245632, id = 1, name = {n = 520577432, s = {s = 0x7f391f076198 "\001", len = 1853706896}, re = 0x7f391f076198}, avp = 0x7f3a1068f69d <futex_release+29>}
        sct = 0x87ea636a400
        sjt = 0x7f3a107244f0 <__func__.7>
        rve = 0x7f3a10d251c8
        mct = 0x7f3a10720a2b
        rv = 0x0
        rv1 = 0x55fba0f5a0a5 <qm_free+8092>
        c1 = {cache_type = 10573800, val_type = RV_NONE, c = {avp_val = {n = 13223000, s = {s = 0xc9c458 <error: Cannot access memory at address 0xc9c458>, len = 14401040}, re = 0xc9c458}, pval = {rs = {
                s = 0xc9c458 <error: Cannot access memory at address 0xc9c458>, len = 14401040}, ri = 8, flags = 0}}, i2s = "-\001\000\000\000\000\000\000\000\244\066\246\324.\301\351\000V}n\374\177"}
        s = {s = 0x0, len = -1506368512}
        srevp = {0x2000000, 0x1363ba8}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>,
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d103d8, msg=0x7f3a1189d500) at core/action.c:1584
        t = 0x7f3a10d9a5d0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 294245632, tz_dsttime = 32570}
        tdiff = 0
        __func__ = "run_actions"
#22 0x000055fba0c67c0b in run_top_route (a=0x7f3a10d103d8, msg=0x7f3a1189d500, c=0x0) at core/action.c:1669
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, 6741736920216466782, 94539222285328, 0, 0, 0, 6741736919895602526, 684806027146655070}, __mask_was_saved = 0, __saved_mask = {__val = {0,
                  94539222285328, 0, 0, 0, 140722162194768, 94539222747906, 140722162194768, 139887376539184, 0, 16843795572198908928, 4294967296, 4294967296, 94539222285328, 0, 0}}}}}
        p = 0x7ffc6e7d5890
        ret = 0
        sfbk = 0
#23 0x000055fba0dc51b2 in receive_msg (
    buf=0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len=605, rcv_info=0x7ffc6e7d5d60) at core/receive.c:515
        msg = 0x7f3a1189d500
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, 6741736920216466782, 94539222285328, 0, 0, 0, 6741736919895602526, 684806027146655070}, __mask_was_saved = 0, __saved_mask = {__val = {
                  139887403032960, 76, 94539225362399, 139887379090320, 139887379090320, 139887365636112, 294259544, 6148676624, 139883052278512, 140722162195472, 16843795572198908928, 0, 0, 94539222285328, 0, 0}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {
          s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 605}
        netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffc6e7d5a80, obuf = {s = 0x0, len = 0}, rcv = 0x7ffc6e7d5d60, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#24 0x000055fba0f28a26 in udp_rcv_loop () at core/udp_server.c:544
        len = 605
        buf = "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"...
        tmp = 0x55fba11871a0 <buff> "aa.bb.cc.dd"
        fromaddr = 0x7f3a118a0b90
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {2189222868, 0}, addr32 = {2189222868, 0, 0, 0}, addr16 = {58324, 33404, 0, 0, 0, 0, 0, 0}, addr = "\324\343|\202", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {
              addrl = {3809666004, 0}, addr32 = {3809666004, 0, 0, 0}, addr16 = {58324, 58130, 0, 0, 0, 0, 0, 0}, addr = "\324\343\022\343", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0,
          proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\324\343|\202\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 2189222868},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 2189222868, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
                  __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\324\343|\202", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7f3a11892470, rflags = 0,
          proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = " \b%\241<\000\000\000\030\204\310\020:\177\000\000\210\347p6\000\000\000\000\001\000\000\000 \000\000\000\000\376$\241\373U\000\000x\a%\241\373U\000\000\205\337X\341r\177\017Z\000\244\066\246\324.\301\351\240^}n\374\177\000\000\234\036\001\241\373U\000\000\200\a%\241\373U\000\000\200\b%\241\373U\000\000\300^}n\374\177\000\000\000\244\066\246\324.\301\351\300^}n\374\177\000\000\300\032\337\033\071\177\000\000\020\374 \373U", '\000' <repeats 26 times>, "\200_}n\374\177\000\000\315\336\347\240\373U\000\000 _}n\374\177\000\000H'\001\241<", '\000' <repeats 11 times>, "J"...
        i = 0
        j = 0
        l = 0
        __func__ = "udp_rcv_loop"
#25 0x000055fba0c4109b in main_loop () at main.c:1722
        i = 11
        pid = 0
        si = 0x7f3a11892470
        si_desc = "udp receiver child=11 sock=aa.bb.cc.dd:5060\000\000\002\000\000\000I\000\000\000\000\244\066\246\324.\301\351\000\000\000\000\000\000\000\000\352\004\000\000\000\000\000\000\020\374 \373U", '\000' <repeats 26 times>, "\060b}n\374\177\000\000sOߠ\373U\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#26 0x000055fba0c4e20c in main (argc=10, argv=0x7ffc6e7d6788) at main.c:3078
        cfg_stream = 0x55fba28dc2a0
        c = -1
        r = 0
        tmp = 0x7ffc6e7d6e51 ""
        tmp_len = 316488736
        port = 32570
        proto = 316400256
        ahost = 0x0
        aport = 0
        options = 0x55fba1089258 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 3674059014
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0x0
        st = {st_dev = 23, st_ino = 1615, st_nlink = 2, st_mode = 16888, st_uid = 5061, st_gid = 5061, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1722351337, tv_nsec = 496334843},
          st_mtim = {tv_sec = 1722351337, tv_nsec = 496334843}, st_ctim = {tv_sec = 1722351337, tv_nsec = 496334843}, __glibc_reserved = {0, 0, 0}}
        tbuf = '\000' <repeats 20 times>, " ", '\000' <repeats 35 times>, "\006\000\000\000\000\000\000\200", '\000' <repeats 56 times>, "\006\000\000\000\000\000\000\200", '\000' <repeats 168 times>...
        option_index = 12
        long_options = {{name = 0x55fba108b6c6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fba108650c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fba108b6cb "alias", has_arg = 1, flag = 0x0, val = 1024}, {
            name = 0x55fba108b6d1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fba108b6d7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fba108b6e0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
            name = 0x55fba108b6ea "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fba108b6f4 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fba108b6ff "modparam", has_arg = 1, flag = 0x0, val = 1030}, {
            name = 0x55fba108b708 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fba108b713 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fba108b719 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {
            name = 0x55fba108b723 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"

Log Messages

Aug 30 09:18:53 proxy-kamailio[1276]: ALERT: <core> [main.c:774]: handle_sigs(): child process 1512 exited by a signal 11
Aug 30 09:18:53 proxy-kamailio[1276]: ALERT: <core> [main.c:777]: handle_sigs(): core was generated

SIP Traffic

Full SIP trace is not available. I gathered following SIP message from core dump.

ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0
Max-Forwards: 19
Record-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>
Via: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00d1232a60e4be6125f6753a4.0
Via: SIP/2.0/UDP ab.bc.cd.da:5060;received=ab.bc.cd.da;rport=5060;branch=z9hG4bK1086835C2F91ECAC
From: <sip:49xxxxxxxxxx@sip.proxy.de>;tag=2041847FA948DA9D
To: <sip:49yyyyyyyyyy@sip.proxy.de>;tag=8e46bdec-8fb1-4814-b516-575f5cd3315c
Call-ID: 19C4ED5E658858CF@ab.bc.cd.da
CSeq: 9 ACK
User-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (May  8 2024)
Content-Length: 0


Possible Solutions

For the moment we have no solution except may be to remove the siptrace module and relevant config. However, we can not do that either as sip trace is required for many other reasons.

Additional Information

version: kamailio 5.6.4 (x86_64/linux) 
flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id:  
compiled with gcc 10.2.1

Linux sip-proxy 5.10.0-31-amd64 #1 SMP Debian 5.10.221-1 (2024-07-14) x86_64 GNU/Linux


Reply to this email directly, view it on GitHub, or unsubscribe.
You are receiving this because you are subscribed to this thread.Message ID: <kamailio/kamailio/issues/3970@github.com>