[SR-Users] Kamailio Stop processing SIP traffic

pwerspire pwerspire at gmail.com
Mon Dec 20 15:05:46 CET 2021


Hi,

I have been doing some load testing with Kamailio and having some issues.

I have been trying with 100 CPS and at the beginning, everything is working
well but after some time (it can be 10 minutes or for example 40 minutes,
is just random but normally happens more in the first 10 minutes) Kamailio
stop replying to all SIP messages but still processing HTTP requests, some
commands, etc.

If I use  "kamcmd dlg.list" no output happens and after that, all kamcmd
commands just keep loading with no output.

Kamailio is sharing Dialogs and htables using DMQ with other Kamailio that
is the failover, if I shut down the failover one (so no DMQ replication),
the test works well with the 100 CPS.

Also tried with modparam("dmq", "worker_usleep", 1000) but the behavior is
the same, it will stop processing traffic.

This is some of configuration used:

# ----------------- setting module-specific parameters ---------------
modparam("dmq", "server_address", "sip:INTERNAL_INSTANCE_IP:5060")
modparam("dmq", "notification_address", "DMQ_NOTIFICATION_ADDRESS")

modparam("dmq", "multi_notify", 1)
modparam("dmq", "ping_interval", 10)
modparam("dmq", "num_workers",4)


modparam("htable", "enable_dmq", 1)
modparam("htable", "dmq_init_sync", 1)


# ----- dialog params -----
modparam("dialog", "dlg_flag", FLD_DLG)
modparam("dialog", "dlg_match_mode", 1)
modparam("dialog", "db_url", DBURL_RW)
modparam("dialog", "db_mode", 0)
modparam("dialog", "enable_dmq", 1)
modparam("dialog", "db_update_period", 10)
modparam("dialog", "h_id_start", H_ID_START)
modparam("dialog", "h_id_step", H_ID_STEP)

 Memory:

Shared: 4096
Private: 512

kamailio -v
version: kamailio 5.5.3 (x86_64/linux) 473cef
flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE,
USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC,
TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT,
USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST,
HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024,
BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: 473cef
compiled on 09:34:57 Dec 20 2021 with gcc 10.2.1


In attach is the trap collected after the issue happens.
Any more logs or configurations that can help identify or solve the issue?

Thanks for the help,
Regards,
Tiago
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-users/attachments/20211220/347a2229/attachment-0001.htm>
-------------- next part --------------
cat /tmp/gdb_kamailio_20211220_120036.txt
{
  "jsonrpc":  "2.0",
  "result": [
    {
      "IDX":  0,
      "PID":  2,
      "DSC":  "main process - attendant"
    }, {
      "IDX":  1,
      "PID":  5,
      "DSC":  "udp receiver child=0 sock=90.30.20.32:5060"
    }, {
      "IDX":  2,
      "PID":  6,
      "DSC":  "udp receiver child=1 sock=90.30.20.32:5060"
    }, {
      "IDX":  3,
      "PID":  7,
      "DSC":  "udp receiver child=2 sock=90.30.20.32:5060"
    }, {
      "IDX":  4,
      "PID":  8,
      "DSC":  "udp receiver child=3 sock=90.30.20.32:5060"
    }, {
      "IDX":  5,
      "PID":  9,
      "DSC":  "udp receiver child=4 sock=90.30.20.32:5060"
    }, {
      "IDX":  6,
      "PID":  10,
      "DSC":  "udp receiver child=5 sock=90.30.20.32:5060"
    }, {
      "IDX":  7,
      "PID":  11,
      "DSC":  "udp receiver child=6 sock=90.30.20.32:5060"
    }, {
      "IDX":  8,
      "PID":  12,
      "DSC":  "udp receiver child=7 sock=90.30.20.32:5060"
    }, {
      "IDX":  9,
      "PID":  13,
      "DSC":  "udp receiver child=0 sock=10.10.120.41:5060"
    }, {
      "IDX":  10,
      "PID":  14,
      "DSC":  "udp receiver child=1 sock=10.10.120.41:5060"
    }, {
      "IDX":  11,
      "PID":  15,
      "DSC":  "udp receiver child=2 sock=10.10.120.41:5060"
    }, {
      "IDX":  12,
      "PID":  16,
      "DSC":  "udp receiver child=3 sock=10.10.120.41:5060"
    }, {
      "IDX":  13,
      "PID":  17,
      "DSC":  "udp receiver child=4 sock=10.10.120.41:5060"
    }, {
      "IDX":  14,
      "PID":  18,
      "DSC":  "udp receiver child=5 sock=10.10.120.41:5060"
    }, {
      "IDX":  15,
      "PID":  19,
      "DSC":  "udp receiver child=6 sock=10.10.120.41:5060"
    }, {
      "IDX":  16,
      "PID":  20,
      "DSC":  "udp receiver child=7 sock=10.10.120.41:5060"
    }, {
      "IDX":  17,
      "PID":  21,
      "DSC":  "udp receiver child=0 sock=10.10.120.29:5060"
    }, {
      "IDX":  18,
      "PID":  22,
      "DSC":  "udp receiver child=1 sock=10.10.120.29:5060"
    }, {
      "IDX":  19,
      "PID":  23,
      "DSC":  "udp receiver child=2 sock=10.10.120.29:5060"
    }, {
      "IDX":  20,
      "PID":  24,
      "DSC":  "udp receiver child=3 sock=10.10.120.29:5060"
    }, {
      "IDX":  21,
      "PID":  25,
      "DSC":  "udp receiver child=4 sock=10.10.120.29:5060"
    }, {
      "IDX":  22,
      "PID":  26,
      "DSC":  "udp receiver child=5 sock=10.10.120.29:5060"
    }, {
      "IDX":  23,
      "PID":  27,
      "DSC":  "udp receiver child=6 sock=10.10.120.29:5060"
    }, {
      "IDX":  24,
      "PID":  28,
      "DSC":  "udp receiver child=7 sock=10.10.120.29:5060"
    }, {
      "IDX":  25,
      "PID":  29,
      "DSC":  "udp receiver child=0 sock=127.0.0.1:5060"
    }, {
      "IDX":  26,
      "PID":  30,
      "DSC":  "udp receiver child=1 sock=127.0.0.1:5060"
    }, {
      "IDX":  27,
      "PID":  31,
      "DSC":  "udp receiver child=2 sock=127.0.0.1:5060"
    }, {
      "IDX":  28,
      "PID":  32,
      "DSC":  "udp receiver child=3 sock=127.0.0.1:5060"
    }, {
      "IDX":  29,
      "PID":  33,
      "DSC":  "udp receiver child=4 sock=127.0.0.1:5060"
    }, {
      "IDX":  30,
      "PID":  34,
      "DSC":  "udp receiver child=5 sock=127.0.0.1:5060"
    }, {
      "IDX":  31,
      "PID":  35,
      "DSC":  "udp receiver child=6 sock=127.0.0.1:5060"
    }, {
      "IDX":  32,
      "PID":  36,
      "DSC":  "udp receiver child=7 sock=127.0.0.1:5060"
    }, {
      "IDX":  33,
      "PID":  37,
      "DSC":  "slow timer"
    }, {
      "IDX":  34,
      "PID":  38,
      "DSC":  "timer"
    }, {
      "IDX":  35,
      "PID":  39,
      "DSC":  "secondary timer"
    }, {
      "IDX":  36,
      "PID":  40,
      "DSC":  "ctl handler"
    }, {
      "IDX":  37,
      "PID":  41,
      "DSC":  "DMQ WORKER"
    }, {
      "IDX":  38,
      "PID":  42,
      "DSC":  "DMQ WORKER"
    }, {
      "IDX":  39,
      "PID":  43,
      "DSC":  "DMQ WORKER"
    }, {
      "IDX":  40,
      "PID":  44,
      "DSC":  "DMQ WORKER"
    }, {
      "IDX":  41,
      "PID":  45,
      "DSC":  "Http Async Worker"
    }, {
      "IDX":  42,
      "PID":  46,
      "DSC":  "Http Async Worker"
    }, {
      "IDX":  43,
      "PID":  47,
      "DSC":  "Http Async Worker"
    }, {
      "IDX":  44,
      "PID":  48,
      "DSC":  "Http Async Worker"
    }, {
      "IDX":  45,
      "PID":  49,
      "DSC":  "Http Async Worker"
    }, {
      "IDX":  46,
      "PID":  50,
      "DSC":  "Http Async Worker"
    }, {
      "IDX":  47,
      "PID":  51,
      "DSC":  "Http Async Worker"
    }, {
      "IDX":  48,
      "PID":  52,
      "DSC":  "Http Async Worker"
    }, {
      "IDX":  49,
      "PID":  53,
      "DSC":  "Dialog Clean Timer"
    }, {
      "IDX":  50,
      "PID":  54,
      "DSC":  "JSONRPCS FIFO"
    }, {
      "IDX":  51,
      "PID":  55,
      "DSC":  "JSONRPCS DATAGRAM"
    }, {
      "IDX":  52,
      "PID":  56,
      "DSC":  "RTIMER EXEC child=0 timer=refresh_token"
    }, {
      "IDX":  53,
      "PID":  57,
      "DSC":  "TIMER NH"
    }, {
      "IDX":  54,
      "PID":  58,
      "DSC":  "tcp receiver (generic) child=0"
    }, {
      "IDX":  55,
      "PID":  59,
      "DSC":  "tcp receiver (generic) child=1"
    }, {
      "IDX":  56,
      "PID":  60,
      "DSC":  "tcp receiver (generic) child=2"
    }, {
      "IDX":  57,
      "PID":  61,
      "DSC":  "tcp receiver (generic) child=3"
    }, {
      "IDX":  58,
      "PID":  62,
      "DSC":  "tcp receiver (generic) child=4"
    }, {
      "IDX":  59,
      "PID":  63,
      "DSC":  "tcp receiver (generic) child=5"
    }, {
      "IDX":  60,
      "PID":  64,
      "DSC":  "tcp receiver (generic) child=6"
    }, {
      "IDX":  61,
      "PID":  65,
      "DSC":  "tcp receiver (generic) child=7"
    }, {
      "IDX":  62,
      "PID":  66,
      "DSC":  "tcp main process"
    }
  ],
  "id": 3179
}

---start 2 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc290872 in __libc_pause () at ../sysdeps/unix/sysv/linux/pause.c:29
29	../sysdeps/unix/sysv/linux/pause.c: No such file or directory.
#0  0x00007ff2bc290872 in __libc_pause () at ../sysdeps/unix/sysv/linux/pause.c:29
        resultvar = 18446744073709551102
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab79d6d95e in main_loop () at main.c:1904
        i = 8
        pid = 66
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#2  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 2) detached]
---end 2 -------------------------------------------------------

---start 5 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa42848, body=0x7fff2b358e80, except=0x0, resp_cback=0x7ff29aae1330 <ht_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aae12f0 <ht_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa42848, body=0x7fff2b358e80, except=0x0, resp_cback=0x7ff29aae1330 <ht_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aae12f0 <ht_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29aab01c5 in ht_dmq_send (body=0x7fff2b358e80, node=0x0) at ht_dmq.c:237
        __func__ = "ht_dmq_send"
#5  0x00007ff29aab3316 in ht_dmq_replicate_action (action=HT_DMQ_SET_CELL, htname=0x7ff29c2b9f20, cname=0x7fff2b358f80, type=2, val=0x7fff2b358f70, mode=1) at ht_dmq.c:391
        jdoc = {root = 0x55ab7b32bc70, flags = 0, buf = {s = 0x55ab7b3317a0 "{\"action\":2,\"htname\":\"uas\",\"cname\":\"120433-28104 at 10.10.120.20 + \\\"-SRC\\\"\",\"type\":2,\"strval\":\"sip:90.30.30.52:5070\",\"mode\":1}", len = 127}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        __func__ = "ht_dmq_replicate_action"
#6  0x00007ff29aab8dd5 in pv_set_ht_cell (msg=0x7ff29c40a148, param=0x7ff29c2b9e58, op=254, val=0x7fff2b359070) at ht_var.c:119
        htname = {s = 0x7ff29c100290 "120433-28104 at 10.10.120.20 + \"-SRC\"", len = 34}
        isval = {n = -1676680664, s = {s = 0x7ff29c0fe228 "sip:90.30.30.52:5070", len = 23}, re = 0x7ff29c0fe228}
        hpv = 0x7ff29c2b9f20
        __func__ = "pv_set_ht_cell"
#7  0x000055ab79e53a6e in lval_pvar_assign (h=0x7fff2b35aaf0, msg=0x7ff29c40a148, lv=0x7ff29c2ba0b8, rv=0x7ff29c2ba320) at core/lvalue.c:352
        pvar = 0x7ff29c2b9e40
        pval = {rs = {s = 0x7ff29c0fe228 "sip:90.30.30.52:5070", len = 23}, ri = 0, flags = 4}
        r_avp = 0x7fff2b359170
        avp_val = {n = 2044674038, s = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, re = 0x55ab79df3ff6 <ksr_slog_json>}
        ret = 1
        v = 32754
        destroy_pval = 1
        __func__ = "lval_pvar_assign"
#8  0x000055ab79e5468a in lval_assign (h=0x7fff2b35aaf0, msg=0x7ff29c40a148, lv=0x7ff29c2ba0b8, rve=0x7ff29c2ba318) at core/lvalue.c:400
        rv = 0x7ff29c2ba320
        ret = -1
        __func__ = "lval_assign"
#9  0x000055ab79d8d7b9 in do_action (h=0x7fff2b35aaf0, a=0x7ff29c2baa48, msg=0x7ff29c40a148) at core/action.c:1455
        ret = -5
        v = 32767
        dst = {send_sock = 0x7fff2b3596d0, to = {s = {sa_family = 4762, sa_data = "\354y\253U\000\000\300\301\017\234\362\177\000"}, sin = {sin_family = 4762, sin_port = 31212, sin_addr = {s_addr = 21931}, sin_zero = "\300\301\017\234\362\177\000"}, sin6 = {sin6_family = 4762, sin6_port = 31212, sin6_flowinfo = 21931, sin6_addr = {__in6_u = {__u6_addr8 = "\300\301\017\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {49600, 39951, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618278336, 32754, 36, 0}}}, sin6_scope_id = 2620091632}, sas = {ss_family = 4762, __ss_padding = "\354y\253U\000\000\300\301\017\234\362\177\000\000$\000\000\000\000\000\000\000\360l+\234\362\177\000\000x\244S\263\361\177\000\000H\241@\234\005\000\000\000\340-x\256\361\177\000\000\001", '\000' <repeats 11 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "@\227\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140733918320352}}, id = 724932544, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "0c8e3e47-5c0b-41f6-9a55-b9af24301df9"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b359840 "p\230\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x0
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b3594b0 "\240\225\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b3595a0 "0\226\065+\377\177", len = -1700679327}, host = {s = 0x10000000a <error: Cannot access memory at address 0x10000000a>, len = 0}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1367855648}, headers = {s = 0x7fff2b359610 "@\227\065+\377\177", len = 2044264333}, port_no = 12751, proto = 24576, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c2b5d38 "\221\004", len = -1367855648}, ttl = {s = 0x0, len = 1}, user_param = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 360547218}, maddr = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, method = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1700421084}, lr = {s = 0xdc68a89a187d8392 <error: Cannot access memory at address 0xdc68a89a187d8392>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b359630 "\300\301\017\234\362\177", len = 724932544}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b359690 "@\227\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b3598c0 "\306\262/\234\362\177", len = 724932544}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b3597e0 "", len = 0}, r2_val = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 1}, gr_val = {s = 0x7fff2b359740 "@\230\065+\377\177", len = 2045941225}}
        next_hop = {user = {s = 0x7fff2b359350 "p\223\065+\377\177", len = 2045519573}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b359370 "\001", len = 2044673277}, params = {s = 0x0, len = -1673486008}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, headers = {s = 0x0, len = -1674596488}, port_no = 37840, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa5a224), transport = {s = 0x7fff2b3593d0 "\200\224\065+\377\177", len = -1700641618}, ttl = {s = 0x69c2b5d38 <error: Cannot access memory at address 0x69c2b5d38>, len = -1700319957}, user_param = {s = 0x7ff29c40a148 "\005\260", len = 0}, maddr = {s = 0x7fff2b359480 "\240\224\065+\377\177", len = -1700603816}, method = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 39469}, lr = {s = 0x0, len = 1}, r2 = {s = 0x14780a0a00000002 <error: Cannot access memory at address 0x14780a0a00000002>, len = -1345332104}, gr = {s = 0x55ab7a331e80 <def_list> "(\327\266\260\361\177", len = 2045509579}, transport_val = {s = 0x7fff2b359568 "$\242\245\232\361\177", len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, user_param_val = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1367855648}, maddr_val = {s = 0x12b359490 <error: Cannot access memory at address 0x12b359490>, len = -1700421084}, method_val = {s = 0x7fff2b359490 "\240\225\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700421084}, r2_val = {s = 0x7fff2b3594a0 "\260\224\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b3595a0 "0\226\065+\377\177", len = -1700582475}}
        u = 0x7fff2b359870
        port = 0
        dst_host = 0x7ff29c0b5010
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, re = 0x100000000}, avp = 0x20000000}
        sct = 0x7ff29c3d2880
        sjt = 0x19c0ba370
        rve = 0x7fff2b35aaf0
        mct = 0x7ff29c40a148
        rv = 0x2400000000
        rv1 = 0x20000000
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_ACTION_ST, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = -1676234792, flags = 32754}}, i2s = "\000\000\000\000\000\000\000\000\204\232&z\253U\000\000\000\000\000\000\000"}
        s = {s = 0x7ff29c0f6088 "0c8e3e47-5c0b-41f6-9a55-b9af24301df9", len = 36}
        srevp = {0x0, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#10 0x000055ab79d8f89f in run_actions (h=0x7fff2b35aaf0, a=0x7ff29c2baa48, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2baa48
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 536870912
        __func__ = "run_actions"
#11 0x000055ab79d7d151 in do_action (h=0x7fff2b35aaf0, a=0x7ff29c2b91f0, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000X\241\017\234\362\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "X\241\017\234\362\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "X\241\017\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {41304, 39951, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618270040, 32754, 36, 0}}}, sin6_scope_id = 2620056624}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000X\241\017\234\362\177\000\000$\000\000\000\000\000\000\000\060\344*\234\362\177\000\000x\244S\263\361\177\000\000H\241@\234\005\000\000\000\340-x\256\361\177\000\000\300\021\062\234\362\177\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\220\237\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140733918322480}}, id = 724934672, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "0c8e3e47-5c0b-41f6-9a55-b9af24301df9"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35a090 "\300\240\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29c160798
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b359d00 "\360\235\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b359df0 "\200\236\065+\377\177", len = -1700679327}, host = {s = 0x0, len = 0}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1367855648}, headers = {s = 0x7fff2b359e60 "\220\237\065+\377\177", len = 2044264333}, port_no = 16374, proto = 31199, type = 21931, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c2adba8 "~\004", len = -1367855648}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 98403218}, maddr = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, method = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1700421084}, lr = {s = 0xdc68a89a08dd8392 <error: Cannot access memory at address 0xdc68a89a08dd8392>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b359e80 "X\241\017\234\362\177", len = 724934672}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b359ee0 "\220\237\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7ff29c2fab20 "src", len = 724934672}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700421084}, r2_val = {s = 0x7fff2b359e70 "", len = 0}, gr_val = {s = 0x7fff2b359f90 "\220\240\065+\377\177", len = 2045941225}}
        next_hop = {user = {s = 0x7fff2b359ba0 "\300\233\065+\377\177", len = 2045519573}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b359bc0 "\001", len = 2044673277}, params = {s = 0x0, len = -1673486008}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, headers = {s = 0x55ab7b32bc70 "", len = 724933808}, port_no = 39968, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa5a224), transport = {s = 0x7fff2b359c20 "\320\234\065+\377\177", len = -1700641618}, ttl = {s = 0x69c2adba8 <error: Cannot access memory at address 0x69c2adba8>, len = -1700319957}, user_param = {s = 0x7ff29a8da3a0 <_handle_GeoIP> "\001", len = 0}, maddr = {s = 0x7fff2b359cd0 "\360\234\065+\377\177", len = -1700603816}, method = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 39469}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7fff2b359c90 "\020\242\245\232\361\177", len = 1142327296}, transport_val = {s = 0x69c322f50 <error: Cannot access memory at address 0x69c322f50>, len = -1702005549}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, user_param_val = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1367855648}, maddr_val = {s = 0x12b359ce0 <error: Cannot access memory at address 0x12b359ce0>, len = -1700421084}, method_val = {s = 0x7fff2b359ce0 "\360\235\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700421084}, r2_val = {s = 0x7fff2b359cf0 "", len = 0}, gr_val = {s = 0x7fff2b359df0 "\200\236\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35a0c0
        port = 0
        dst_host = 0x0
        i = 24
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, re = 0x100000000}, avp = 0x20000000}
        sct = 0x7ff29c3d2880
        sjt = 0x17a1ecef4
        rve = 0x7ff29c2b7418
        mct = 0x7ff29c40a148
        rv = 0x2400000000
        rv1 = 0x20000000
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_ACTION_ST, c = {avp_val = {n = -1673486008, s = {s = 0x7ff29c40a148 "\005\260", len = 0}, re = 0x7ff29c40a148}, pval = {rs = {s = 0x7ff29c40a148 "\005\260", len = 0}, ri = 0, flags = 0}}, i2s = "\000\000\000\000\000\000\000\000\204\232&z\253U\000\000\000\000\000\000\000"}
        s = {s = 0x7ff29c10c500 "0c8e3e47-5c0b-41f6-9a55-b9af24301df9", len = 36}
        srevp = {0x7fff2b359b90, 0x55ab79ec129a <pv_get_spec_value+950>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x000055ab79d8f89f in run_actions (h=0x7fff2b35aaf0, a=0x7ff29c2b3af8, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2b91f0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 3362264, tz_dsttime = 0}
        tdiff = 0
        __func__ = "run_actions"
#13 0x000055ab79d7d151 in do_action (h=0x7fff2b35aaf0, a=0x7ff29c2a5d88, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x7fff2b35a6d0, to = {s = {sa_family = 37416, sa_data = "{\255\361\177\000\000P\f\023\234\362\177\000"}, sin = {sin_family = 37416, sin_port = 44411, sin_addr = {s_addr = 32753}, sin_zero = "P\f\023\234\362\177\000"}, sin6 = {sin6_family = 37416, sin6_port = 44411, sin6_flowinfo = 32753, sin6_addr = {__in6_u = {__u6_addr8 = "P\f\023\234\362\177\000\000$\000\000\000\001\000\000", __u6_addr16 = {3152, 39955, 32754, 0, 36, 0, 1, 0}, __u6_addr32 = {2618494032, 32754, 36, 1}}}, sin6_scope_id = 2044674038}, sas = {ss_family = 37416, __ss_padding = "{\255\361\177\000\000P\f\023\234\362\177\000\000$\000\000\000\001\000\000\000\366?\337y\253U\000\000x\244S\263\361\177\000\000\000\000\000\000\005\000\000\000\340-x\256\361\177\000\000\340\247\065+\377\177\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\340\247\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 15882129467277935506}}, id = 724936800, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "0c8e3e47-5c0b-41f6-9a55-b9af24301df9"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35a8e0 "\020\251\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x0
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35a550 "@\246\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35a640 "\320\246\065+\377\177", len = -1700679327}, host = {s = 0x7fff2b35a680 "x\217\031\234\362\177", len = -1673486008}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7ff29c3211c0 "\241\005", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1367855648}, headers = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1}, port_no = 42480, proto = 11061, type = SIP_URI_T, flags = (unknown: 0xb3328158), transport = {s = 0x12b35a600 <error: Cannot access memory at address 0x12b35a600>, len = -1367855648}, ttl = {s = 0x7fff2b35a600 "\020\242\245\232\361\177", len = 2047209688}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1705654584}, maddr = {s = 0x0, len = 0}, method = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1700421084}, lr = {s = 0x7ff29aa7981b "dialog", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35a6d0 "P\f\023\234\362\177", len = 724936800}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35a730 "\340\247\065+\377\177", len = -1700401500}, maddr_val = {s = 0x12b35a6b0 <error: Cannot access memory at address 0x12b35a6b0>, len = 724936800}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700421084}, r2_val = {s = 0x7fff2b35a6c0 "\320\246\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35a7c0 "\366?\337y\253U", len = -1700582475}}
        next_hop = {user = {s = 0x7ff1b0ac8870 "\220\210\254\260\361\177", len = 0}, passwd = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, host = {s = 0x0, len = 0}, port = {s = 0x7fff2b35a4f0 "0\245\065+\001", len = 2045517645}, params = {s = 0x0, len = 2049351272}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, headers = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port_no = 42096, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa5a224), transport = {s = 0x7fff2b35a470 " \245\065+\377\177", len = -1700641618}, ttl = {s = 0x679df3ff6 <error: Cannot access memory at address 0x679df3ff6>, len = -1700319957}, user_param = {s = 0x7f00000187 <error: Cannot access memory at address 0x7f00000187>, len = 0}, maddr = {s = 0x7fff2b35a520 "@\245\065+\377\177", len = -1700603816}, method = {s = 0x0, len = 39469}, lr = {s = 0x3200000001 <error: Cannot access memory at address 0x3200000001>, len = -1676241136}, r2 = {s = 0x55ab7a331e80 <def_list> "(\327\266\260\361\177", len = 2049350276}, gr = {s = 0x7f00000000 <error: Cannot access memory at address 0x7f00000000>, len = 2048842849}, transport_val = {s = 0x7ff29aa79be4 "dialog: dlg_var.c", len = 8}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, user_param_val = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1367855648}, maddr_val = {s = 0x12b35a530 <error: Cannot access memory at address 0x12b35a530>, len = -1700421084}, method_val = {s = 0x7fff2b35a530 "@\246\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700421084}, r2_val = {s = 0x7fff2b35a540 "P\245\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35a640 "\320\246\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35a910
        port = 0
        dst_host = 0x500000000
        i = 23
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 1, name = {n = 2050105595, s = {s = 0x55ab7a3220fb <buf+667> "", len = 2050105595}, re = 0x55ab7a3220fb <buf+667>}, avp = 0x55ab7a3220fb <buf+667>}
        sct = 0x7ff29c3d2880
        sjt = 0x19c40a148
        rve = 0x139c2b3010
        mct = 0x7ff29c40a148
        rv = 0x10000015f
        rv1 = 0x20000000
        c1 = {cache_type = 724935696, val_type = 32767, c = {avp_val = {n = 724935792, s = {s = 0x7fff2b35a470 " \245\065+\377\177", len = -1676046496}, re = 0x7fff2b35a470}, pval = {rs = {s = 0x7fff2b35a470 " \245\065+\377\177", len = -1676046496}, ri = -1673486008, flags = 32754}}, i2s = "y 2z\253U\000\000\376\377\377\377\377\177\000\000\373 2z\253U"}
        s = {s = 0x7fff2b35a3f0 "\360\244\065+\377\177", len = 2045514394}
        srevp = {0x0, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#14 0x000055ab79d8f89f in run_actions (h=0x7fff2b35aaf0, a=0x7ff29c2a5d88, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2a5d88
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 2594647339
        __func__ = "run_actions"
#15 0x000055ab79d8ff8d in run_actions_safe (h=0x7fff2b35c6d0, a=0x7ff29c2a5d88, msg=0x7ff29c40a148) at core/action.c:1645
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614606614068334, 94194972442614, 536870912, 0, 0, -2564614606563736686, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {140733918332624, 0, 0, 0, 0, 0, 0, 0, 0, 25769803776, 140679953487899, 1, 140675658392100, 107374182400, 724939428, 5019905024}}}}}
        ret = -1700421084
        ign_on_break = 0
#16 0x000055ab79e53158 in lval_pvar_assign (h=0x7fff2b35c6d0, msg=0x7ff29c40a148, lv=0x7ff29c2a5c10, rv=0x7ff29c2a5ee0) at core/lvalue.c:284
        pvar = 0x7ff29c2a5a30
        pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 24}
        r_avp = 0x12b35acc0
        avp_val = {n = 724938160, s = {s = 0x7fff2b35adb0 "p\264\065+\377\177", len = 2045964241}, re = 0x7fff2b35adb0}
        ret = 0
        v = 0
        destroy_pval = 0
        __func__ = "lval_pvar_assign"
#17 0x000055ab79e5468a in lval_assign (h=0x7fff2b35c6d0, msg=0x7ff29c40a148, lv=0x7ff29c2a5c10, rve=0x7ff29c2a5ed8) at core/lvalue.c:400
        rv = 0x7ff29c2a5ee0
        ret = -1
        __func__ = "lval_assign"
#18 0x000055ab79d8d7b9 in do_action (h=0x7fff2b35c6d0, a=0x7ff29c2a6608, msg=0x7ff29c40a148) at core/action.c:1455
        ret = -5
        v = 21931
        dst = {send_sock = 0x55ab79df3ff6 <ksr_slog_json>, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000\350\353\022\234\362\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\350\353\022\234\362\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\350\353\022\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {60392, 39954, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618485736, 32754, 36, 0}}}, sin6_scope_id = 2619998056}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000\350\353\022\234\362\177\000\000$\000\000\000\000\000\000\000h\377)\234\362\177\000\000x\244S\263\361\177\000\000\366?\337y\005\000\000\000\340-x\256\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, " \263\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 0}}, id = 724939680, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "0c8e3e47-5c0b-41f6-9a55-b9af24301df9"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35b420 "P\264\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x20000000
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35b090 "\200\261\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35b180 "\020\262\065+\377\177", len = -1700679327}, host = {s = 0x7fff2b35b0c0 "P\262\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35b250 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1367855648}, headers = {s = 0x7fff2b35b1f0 "", len = 2049350276}, port_no = 8148, proto = 31283, type = 21931, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c2a50b0 "b\004", len = -1367855648}, ttl = {s = 0x7fff2b35b15c "\001", len = 0}, user_param = {s = 0x7fff2b35b170 "", len = -1684890055}, maddr = {s = 0x7fff2b35b160 "\366?\337y\253U", len = 724940152}, method = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1700421084}, lr = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35b210 "\350\353\022\234\362\177", len = 724939680}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35b270 " \263\065+\377\177", len = -1700401500}, maddr_val = {s = 0x0, len = 724939680}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35af30 "P\257\065+\377\177", len = 2045519573}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c1146a0 "0c8e3e47-5c0b-41f6-9a55-b9af24301df9", len = 36}, port = {s = 0x7fff2b35af50 "\001", len = -1286364040}, params = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = 0}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, headers = {s = 0x0, len = 0}, port_no = 44976, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa5a224), transport = {s = 0x7fff2b35afb0 "`\260\065+\377\177", len = -1700641618}, ttl = {s = 0x67a269a60 <error: Cannot access memory at address 0x67a269a60>, len = -1700319957}, user_param = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = 0}, maddr = {s = 0x7fff2b35b060 "\200\260\065+\377\177", len = -1700603816}, method = {s = 0x0, len = 39469}, lr = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7ff29c12cb80 "0c8e3e47-5c0b-41f6-9a55-b9af24301df9", len = 36}, transport_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, user_param_val = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1367855648}, maddr_val = {s = 0x12b35b070 <error: Cannot access memory at address 0x12b35b070>, len = -1700421084}, method_val = {s = 0x7fff2b35b070 "\200\261\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700421084}, r2_val = {s = 0x7fff2b35b080 "\220\260\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35b180 "\020\262\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35b450
        port = 0
        dst_host = 0x0
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = 724938736, s = {s = 0x7fff2b35aff0 "\200\313\022\234\362\177", len = -1676046496}, re = 0x7fff2b35aff0}, avp = 0x7ff29c40a148}
        sct = 0x7ff29c3d2880
        sjt = 0x179f32685
        rve = 0x55ab79f295e9 <rval_get_int+314>
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724938528, val_type = 32767, c = {avp_val = {n = 0, s = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, re = 0x100000000}, pval = {rs = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, ri = 536870912, flags = 0}}, i2s = '\000' <repeats 16 times>, "p\257\065+\377\177"}
        s = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1367855648}
        srevp = {0x55ab79df3ff6 <ksr_slog_json>, 0x7ff1b353a478}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#19 0x000055ab79d8f89f in run_actions (h=0x7fff2b35c6d0, a=0x7ff29c2a6608, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2a6608
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 2594325678
        __func__ = "run_actions"
#20 0x000055ab79d80f8a in do_action (h=0x7fff2b35c6d0, a=0x7ff29c2a6cb0, msg=0x7ff29c40a148) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x7ff29c40a148, to = {s = {sa_family = 49214, sa_data = "L\232\361\177\000\000\260\212\022\234\362\177\000"}, sin = {sin_family = 49214, sin_port = 39500, sin_addr = {s_addr = 32753}, sin_zero = "\260\212\022\234\362\177\000"}, sin6 = {sin6_family = 49214, sin6_port = 39500, sin6_flowinfo = 32753, sin6_addr = {__in6_u = {__u6_addr8 = "\260\212\022\234\362\177\000\000$\000\000\000\377\177\000", __u6_addr16 = {35504, 39954, 32754, 0, 36, 0, 32767, 0}, __u6_addr32 = {2618460848, 32754, 36, 32767}}}, sin6_scope_id = 2588721211}, sas = {ss_family = 49214, __ss_padding = "L\232\361\177\000\000\260\212\022\234\362\177\000\000$\000\000\000\377\177\000\000;\300L\232\361\177\000\000x\244S\263\361\177\000\000\240\201'\274\005\000\000\000\340-x\256\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "p\273\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 94192927768586}}, id = 724941808, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "0c8e3e47-5c0b-41f6-9a55-b9af24301df9"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35bc70 "\240\274\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x20000000
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35b8e0 "\320\271\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35b9d0 "`\272\065+\377\177", len = -1700679327}, host = {s = 0x7ff29c126a48 "0c8e3e47-5c0b-41f6-9a55-b9af24301df9", len = 32}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x6400000001 <error: Cannot access memory at address 0x6400000001>, len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1367855648}, headers = {s = 0x0, len = 2045525429}, port_no = 47472, proto = 11061, type = 32767, flags = (unknown: 0x2b35bd48), transport = {s = 0x7fff2b35b970 "\300\275\065+\377\177", len = -1367855648}, ttl = {s = 0x0, len = 724942144}, user_param = {s = 0x7fff2b35bdc0 "\300\276\065+\377\177", len = 2045950421}, maddr = {s = 0x0, len = 0}, method = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1700421084}, lr = {s = 0x7ff29c40a148 "\005\260", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35ba60 "\260\212\022\234\362\177", len = 724941808}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35bac0 "p\273\065+\377\177", len = -1700401500}, maddr_val = {s = 0x0, len = 724941808}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b35ba40 "", len = 2045930574}, r2_val = {s = 0x0, len = -1674566736}, gr_val = {s = 0x0, len = -1674539320}}
        next_hop = {user = {s = 0x3641b0 <error: Cannot access memory at address 0x3641b0>, len = 8}, passwd = {s = 0x5f <error: Cannot access memory at address 0x5f>, len = -1676980208}, host = {s = 0x7fff2b35b7a0 "\001", len = 2044739546}, port = {s = 0x0, len = 2048839412}, params = {s = 0x7fff2b35b890 "\300\270\065+\377\177", len = 2047222937}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, headers = {s = 0x7ff29c2ed290 "", len = 0}, port_no = 47104, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa5a224), transport = {s = 0x7fff2b35b800 "\260\270\065+\377\177", len = -1700641618}, ttl = {s = 0x6000003a8 <error: Cannot access memory at address 0x6000003a8>, len = -1700319957}, user_param = {s = 0x7ff29c2ed290 "", len = 0}, maddr = {s = 0x7fff2b35b8b0 "\320\270\065+\377\177", len = -1700603816}, method = {s = 0x0, len = 39469}, lr = {s = 0x7ff29c2ed278 "\021", len = -1673486008}, r2 = {s = 0x0, len = 1}, gr = {s = 0x7fff2b35b940 "p\271\065+\377\177", len = -1674596880}, transport_val = {s = 0x0, len = -1676980208}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, user_param_val = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1367855648}, maddr_val = {s = 0x12b35b8c0 <error: Cannot access memory at address 0x12b35b8c0>, len = -1700421084}, method_val = {s = 0x7fff2b35b8c0 "\320\271\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700421084}, r2_val = {s = 0x7fff2b35b8d0 "\340\270\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35b9d0 "`\272\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35bca0
        port = 0
        dst_host = 0xd68
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 2620375944, id = 32754, name = {n = 0, s = {s = 0x0, len = 536870912}, re = 0x0}, avp = 0x1fcca6f0}
        sct = 0x7ff29c3d2880
        sjt = 0x100000018
        rve = 0x7ff29c2a5200
        mct = 0x7ff29c40a148
        rv = 0x7ff29bbf094a <pkg_proc_update_stats+115>
        rv1 = 0x20000000
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 2047264002, s = {s = 0x55ab7a06c502 <qm_info+46> "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b", len = 724940592}, re = 0x55ab7a06c502 <qm_info+46>}, pval = {rs = {s = 0x55ab7a06c502 <qm_info+46> "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b", len = 724940592}, ri = -1676980208, flags = 32754}}, i2s = "\360\255/\234\362\177\000\000\020P\v\234\362\177\000\000p\267\065+\377\177"}
        s = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}
        srevp = {0xe00000003, 0x100000000}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x000055ab79d8f89f in run_actions (h=0x7fff2b35c6d0, a=0x7ff29c29e9c0, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2a6cb0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1674539312, tz_dsttime = 32754}
        tdiff = 2594287969
        __func__ = "run_actions"
#22 0x000055ab79d7d151 in do_action (h=0x7fff2b35c6d0, a=0x7ff29c20fb18, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x7ff29c35d900, to = {s = {sa_family = 20496, sa_data = "\v\234\362\177\000\000\270\037\017\234\362\177\000"}, sin = {sin_family = 20496, sin_port = 39947, sin_addr = {s_addr = 32754}, sin_zero = "\270\037\017\234\362\177\000"}, sin6 = {sin6_family = 20496, sin6_port = 39947, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "\270\037\017\234\362\177\000\000$\000\000\000\253U\000", __u6_addr16 = {8120, 39951, 32754, 0, 36, 0, 21931, 0}, __u6_addr32 = {2618236856, 32754, 36, 21931}}}, sin6_scope_id = 2620386656}, sas = {ss_family = 20496, __ss_padding = "\v\234\362\177\000\000\270\037\017\234\362\177\000\000$\000\000\000\253U\000\000`\355/\234\001\000\000\000x\244S\263\361\177\000\000H\241@\234\005\000\000\000\340-x\256\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\300\303\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679979587840}}, id = 724943936, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "0c8e3e47-5c0b-41f6-9a55-b9af24301df9"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35c4c0 "\360\304\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29c40a148
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35c130 " \302\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35c220 "\260\302\065+\377\177", len = -1700679327}, host = {s = 0x253448 <error: Cannot access memory at address 0x253448>, len = 0}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1367855648}, headers = {s = 0x3000000020 <error: Cannot access memory at address 0x3000000020>, len = 724943456}, port_no = 55096, proto = 45238, type = 32753, flags = (unknown: 0xb0b6d728), transport = {s = 0x7fff2b35c2b0 "\270\037\017\234\362\177", len = -1367855648}, ttl = {s = 0x7fff2b35c1f0 "", len = -1676980208}, user_param = {s = 0x7ff29c35d948 " \002", len = -1676980208}, maddr = {s = 0x7fff2b35c230 "x\217\031\234\362\177", len = -1681979062}, method = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1700421084}, lr = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35c2b0 "\270\037\017\234\362\177", len = 724943936}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35c310 "\300\303\065+\377\177", len = -1700401500}, maddr_val = {s = 0x549c0b6e10 <error: Cannot access memory at address 0x549c0b6e10>, len = 724943936}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab7a331e80 <def_list> "(\327\266\260\361\177", len = 619289}, r2_val = {s = 0x55ab7a18557b "core", len = 0}, gr_val = {s = 0x55ab7a185608 <__func__.3> "do_action", len = 2048418986}}
        next_hop = {user = {s = 0x7fff2b35c0a0 "\360\300\065+\377\177", len = 2047222937}, passwd = {s = 0x7fff2b35c0a0 "\360\300\065+\377\177", len = 2047223133}, host = {s = 0x14 <error: Cannot access memory at address 0x14>, len = 724942848}, port = {s = 0x55ab7a1e6cea "core", len = 724943232}, params = {s = 0x55ab7a1e6df8 <__func__.17> "create_avp", len = 2048814319}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, headers = {s = 0x7ff2fbad8001 <error: Cannot access memory at address 0x7ff2fbad8001>, len = 724943600}, port_no = 49232, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa5a224), transport = {s = 0x7fff2b35c050 "", len = -1700641618}, ttl = {s = 0x62b35c304 <error: Cannot access memory at address 0x62b35c304>, len = -1700319957}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, maddr = {s = 0x7fff2b35c100 " \301\065+\377\177", len = -1700603816}, method = {s = 0x2b35c0a0 <error: Cannot access memory at address 0x2b35c0a0>, len = 39469}, lr = {s = 0x7fff2b35c0a0 "\360\300\065+\377\177", len = 2047209688}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1705654584}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35c0f0 "", len = 2047274097}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, user_param_val = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1367855648}, maddr_val = {s = 0x12b35c110 <error: Cannot access memory at address 0x12b35c110>, len = -1700421084}, method_val = {s = 0x7fff2b35c110 " \302\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700421084}, r2_val = {s = 0x7fff2b35c120 "0\301\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35c220 "\260\302\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35c4f0
        port = 0
        dst_host = 0x20000000
        i = 19
        flags = 21931
        avp = 0x0
        st = {flags = 2964772592, id = 32753, name = {n = -1705889792, s = {s = 0x7ff19a523000 "", len = -1676456672}, re = 0x7ff19a523000}, avp = 0xd}
        sct = 0x7ff29c3d2880
        sjt = 0x1ffffffff
        rve = 0x0
        mct = 0x7ff29c40a148
        rv = 0x58
        rv1 = 0x20000000
        c1 = {cache_type = 2618920824, val_type = 32754, c = {avp_val = {n = -1673486008, s = {s = 0x7ff29c40a148 "\005\260", len = 1}, re = 0x7ff29c40a148}, pval = {rs = {s = 0x7ff29c40a148 "\005\260", len = 1}, ri = -1700421084, flags = 32753}}, i2s = "\000\000\000\000\260\000\000\000a\334\036z\253U\000\000\357l\036z\253U"}
        s = {s = 0x12 <error: Cannot access memory at address 0x12>, len = 724943120}
        srevp = {0x7ff1b0b6d6f0, 0x7ff19a523000}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#23 0x000055ab79d8f89f in run_actions (h=0x7fff2b35c6d0, a=0x7ff29c20fb18, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c20fb18
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 1}
        tdiff = 2594287969
        __func__ = "run_actions"
#24 0x000055ab79d8ff8d in run_actions_safe (h=0x7fff2b35e4e0, a=0x7ff29c20fb18, msg=0x7ff29c40a148) at core/action.c:1645
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614605418691694, 94194972442614, 536870912, 0, 0, -2564614605368360046, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {536870912, 0, 0, 140733918332880, 140733918333280, 140679977734008, 140679980294472, 140733918332976, 140679953378980, 140679978210952, 140733918333280, 140679977734008, 140679980294472, 140733918333408, 140679978210952, 140679980295248}}}}}
        ret = -1673486008
        ign_on_break = 0
#25 0x000055ab79f295e9 in rval_get_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, i=0x7fff2b35cb74, rv=0x7ff29c20fc70, cache=0x0) at core/rvalue.c:949
        r_avp = 0x7ff29c37f390
        avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}
        pval = {rs = {s = 0x7ff29c198f60 "\026", len = -1673486008}, ri = 0, flags = 1}
        tmp = {s = 0x0, len = 724945248}
        s = 0x0
        r = -1674088120
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#26 0x000055ab79f2e7da in rval_expr_eval_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, res=0x7fff2b35cb74, rve=0x7ff29c20fc68) at core/rvalue.c:1947
        i1 = 32754
        i2 = -1673713536
        ret = -1
        c1 = {cache_type = 2044674038, val_type = 21931, c = {avp_val = {n = 536870912, s = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, re = 0x20000000}, pval = {rs = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, ri = 0, flags = 0}}, i2s = "\020\312\065+\377\177\000\000\325&\354y\253U\000\000h\236&z\253U"}
        c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = -1676212696, s = {s = 0x7ff29c170628 "\r\267L\232\361\177", len = 724945440}, re = 0x7ff29c170628}, pval = {rs = {s = 0x7ff29c170628 "\r\267L\232\361\177", len = 724945440}, ri = 2049350276, flags = 21931}}, i2s = '\000' <repeats 12 times>, "$\000\000\000h\326 \234\362\177"}
        rv1 = 0x55ab79ec3db5 <pv_value_destroy+183>
        rv2 = 0x400000000
        __func__ = "rval_expr_eval_int"
#27 0x000055ab79f2ecf0 in rval_expr_eval_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, res=0x7fff2b35d0b4, rve=0x7ff29c210ac8) at core/rvalue.c:1980
        i1 = 6
        i2 = 0
        ret = -1
        c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_NONE, c = {avp_val = {n = -1700421084, s = {s = 0x19aa5a224 <error: Cannot access memory at address 0x19aa5a224>, len = -1700421104}, re = 0x19aa5a224}, pval = {rs = {s = 0x19aa5a224 <error: Cannot access memory at address 0x19aa5a224>, len = -1700421104}, ri = -1367855648, flags = 0}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 724945888, val_type = 32767, c = {avp_val = {n = -1700678896, s = {s = 0x7ff29aa1b310 <dlg_lookup_msg_dialog+478> "\203\370\002\017\216\317\003", len = 0}, re = 0x7ff29aa1b310 <dlg_lookup_msg_dialog+478>}, pval = {rs = {s = 0x7ff29aa1b310 <dlg_lookup_msg_dialog+478> "\203\370\002\017\216\317\003", len = 0}, ri = 2048485859, flags = 21931}}, i2s = "\000\000\000\000\006\000\000\000\033\230\247\232\362\177\000\000\227\201\201\233\362\177"}
        rv1 = 0xbac00009a2d
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#28 0x000055ab79d80a74 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c2118a0, msg=0x7ff29c40a148) at core/action.c:1052
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 41288, sa_data = "@\234\362\177\000\000P\377\016\234\362\177\000"}, sin = {sin_family = 41288, sin_port = 40000, sin_addr = {s_addr = 32754}, sin_zero = "P\377\016\234\362\177\000"}, sin6 = {sin6_family = 41288, sin6_port = 40000, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "P\377\016\234\362\177\000\000$\000\000\000\362\177\000", __u6_addr16 = {65360, 39950, 32754, 0, 36, 0, 32754, 0}, __u6_addr32 = {2618228560, 32754, 36, 32754}}}, sin6_scope_id = 724947040}, sas = {ss_family = 41288, __ss_padding = "@\234\362\177\000\000P\377\016\234\362\177\000\000$\000\000\000\362\177\000\000`\320\065+\377\177\000\000x\244S\263\361\177\000\000\366?\337y\005\000\000\000\340-x\256\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\321\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679978161920}}, id = 724947376, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "0c8e3e47-5c0b-41f6-9a55-b9af24301df9"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35d230 "`\322\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x0
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700679327}, host = {s = 0x7ff29ba43694 <trim+36> "\220\311\303UH\211\345AWAVAUATSH\203\354X\350\243\273\376\377\211E\310\203}\310", len = 0}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1367855648}, headers = {s = 0x7fff2b35d5b0 "\001", len = 2049350246}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c284970 "\n\004", len = -1367855648}, ttl = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, user_param = {s = 0x55ab7a321ee2 <buf+130> "z9hG4bK-28104-120433-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag00120433\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1039.sip-review.test.com:5060>\r\nCall-I"..., len = 22}, maddr = {s = 0x55ab7a321f38 <buf+216> "28104SIPpTag00120433\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1039.sip-review.test.com:5060>\r\nCall-ID: 120433-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:"..., len = 20}, method = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1700421084}, lr = {s = 0x55ab7a321fd0 <buf+368> "INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test\r\nContent-Type: application/sdp\r\nContent-Length:   135\r\nTH: dih\r\n\r\nv=0\r\no=user1 53655765 2353687637 IN "..., len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d020 "P\377\016\234\362\177", len = 724947376}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d080 "0\321\065+\377\177", len = -1700401500}, maddr_val = {s = 0x0, len = 724947376}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35d030 "`\320\065+\377\177", len = -1683738574}}
        next_hop = {user = {s = 0x7fff2b35cf40 "8\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x0, len = -1673486008}, port = {s = 0x7fff2b35cd60 "\001", len = 0}, params = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1367855648}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, headers = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, port_no = 52672, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa5a224), transport = {s = 0x7fff2b35cdc0 "p\316\065+\377\177", len = -1700641618}, ttl = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700319957}, user_param = {s = 0x7ff29c198f60 "\026", len = 0}, maddr = {s = 0x7fff2b35ce70 "\220\316\065+\377\177", len = -1700603816}, method = {s = 0x2b35cea0 <error: Cannot access memory at address 0x2b35cea0>, len = 39469}, lr = {s = 0x72 <error: Cannot access memory at address 0x72>, len = -1673486008}, r2 = {s = 0x7fff2b35cf1c "\361\177", len = 724946720}, gr = {s = 0x7fff2b35cf30 "\342\036\062z\253U", len = 724946752}, transport_val = {s = 0x7fff2b35cf40 "8\037\062z\253U", len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, user_param_val = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1367855648}, maddr_val = {s = 0x12b35ce80 <error: Cannot access memory at address 0x12b35ce80>, len = -1700421084}, method_val = {s = 0x7fff2b35ce80 "\220\317\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700421084}, r2_val = {s = 0x7fff2b35ce90 "\240\316\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35d260
        port = 0
        dst_host = 0x0
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = -1673486008, s = {s = 0x7ff29c40a148 "\005\260", len = -1676046496}, re = 0x7ff29c40a148}, avp = 0x7fff2b35cf1c}
        sct = 0x7ff29c3d2880
        sjt = 0x12b35d9a0
        rve = 0x7ff29c210ac8
        mct = 0x7ff29c40a148
        rv = 0x7fff2b35cec0
        rv1 = 0x20000000
        c1 = {cache_type = 724946112, val_type = 32767, c = {avp_val = {n = 724946624, s = {s = 0x7fff2b35cec0 "", len = -1676046472}, re = 0x7fff2b35cec0}, pval = {rs = {s = 0x7fff2b35cec0 "", len = -1676046472}, ri = -1673486008, flags = 32754}}, i2s = "\220\315\065+\377\177\000\000\306\356\245\232\362\177\000\000\200\315\065+\377\177"}
        s = {s = 0x0, len = 0}
        srevp = {0x55ab79df3ff6 <ksr_slog_json>, 0x20000000}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#29 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c20c390, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2118a0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1367855648, tz_dsttime = 0}
        tdiff = 2594546212
        __func__ = "run_actions"
#30 0x000055ab79d7d151 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c202230, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 21931
        dst = {send_sock = 0x55ab79df3ff6 <ksr_slog_json>, to = {s = {sa_family = 0, sa_data = "\000 ", '\000' <repeats 11 times>}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 724949200}, sas = {ss_family = 0, __ss_padding = "\000 ", '\000' <repeats 20 times>, "\320\330\065+\377\177\000\000\000\000\000\000\000\000\000\000\366?\337y\005\000\000\000\340-x\256\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\200\331\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 0}}, id = 724949504, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "0c8e3e47-5c0b-41f6-9a55-b9af24301df9"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35da80 "\260\332\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7fff2b35db9c
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35d7e0 "", len = -1700679327}, host = {s = 0x7fff2b35d720 "\260\330\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d8b0 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1367855648}, headers = {s = 0x7ff29c40a148 "\005\260", len = 724952288}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c201700 "J\002", len = -1367855648}, ttl = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, user_param = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, maddr = {s = 0x7fff2b35d7c0 "\366?\337y\253U", len = 2045519573}, method = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1700421084}, lr = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d800 "\320\330\065+\377\177", len = 724949504}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d8d0 "\200\331\065+\377\177", len = -1700401466}, maddr_val = {s = 0x7fff2b35d980 "\200\332\065+\377\177", len = 724949504}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b35d980 "\200\332\065+\377\177", len = 2045978245}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35d590 "", len = 2045519573}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 0}, host = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, port = {s = 0x0, len = 0}, params = {s = 0x7fff2b35d5f0 "`\232&z\006", len = 0}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, headers = {s = 0x0, len = 0}, port_no = 54800, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa5a224), transport = {s = 0x7fff2b35d610 "\300\326\065+\377\177", len = -1700641618}, ttl = {s = 0x67a269a60 <error: Cannot access memory at address 0x67a269a60>, len = -1700319957}, user_param = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = 0}, maddr = {s = 0x7fff2b35d6c0 "\340\326\065+\377\177", len = -1700603816}, method = {s = 0x2b35d6f0 <error: Cannot access memory at address 0x2b35d6f0>, len = 39469}, lr = {s = 0x7ff29c1fd7c8 "\001", len = -1673486008}, r2 = {s = 0x7ff1b321bb10 " ", len = 1}, gr = {s = 0x55ab7a285ed0 <pv_str_null_buf> "<null>", len = 6}, transport_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2045514394}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, user_param_val = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1367855648}, maddr_val = {s = 0x12b35d6d0 <error: Cannot access memory at address 0x12b35d6d0>, len = -1700421084}, method_val = {s = 0x7fff2b35d6d0 "\340\327\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700421084}, r2_val = {s = 0x7fff2b35d6e0 "\360\326\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35d7e0 "", len = -1700582475}}
        u = 0x7fff2b35dab0
        port = 0
        dst_host = 0x0
        i = 5
        flags = 0
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = 724948560, s = {s = 0x7fff2b35d650 "\320^(z\253U", len = -1676046496}, re = 0x7fff2b35d650}, avp = 0x7ff29c40a148}
        sct = 0x7ff29c3d2880
        sjt = 0x19ba6d31a
        rve = 0x55ab79f295e9 <rval_get_int+314>
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724948240, val_type = 32767, c = {avp_val = {n = 0, s = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, re = 0x100000000}, pval = {rs = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, ri = 536870912, flags = 0}}, i2s = '\000' <repeats 16 times>, "\320\325\065+\377\177"}
        s = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1367855648}
        srevp = {0x55ab79df3ff6 <ksr_slog_json>, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#31 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c202230, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c202230
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 536870912, tz_dsttime = 0}
        tdiff = 2619288264
        __func__ = "run_actions"
#32 0x000055ab79d80f8a in do_action (h=0x7fff2b35e4e0, a=0x7ff29c2024d0, msg=0x7ff29c40a148) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x55ab7a321ed3 <buf+115>, to = {s = {sa_family = 4, sa_data = "\000\000\000\000\316\023\000\000\000\000\000\000\000"}, sin = {sin_family = 4, sin_port = 0, sin_addr = {s_addr = 332267520}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 4, sin6_port = 0, sin6_flowinfo = 332267520, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000,\235\016z\005\000\000", __u6_addr16 = {0, 0, 0, 0, 40236, 31246, 5, 0}, __u6_addr32 = {0, 0, 2047778092, 5}}}, sin6_scope_id = 2594546192}, sas = {ss_family = 4, __ss_padding = "\000\000\000\000\316\023\000\000\000\000\000\000\000\000,\235\016z\005\000\000\000\020\242\245\232\361\177", '\000' <repeats 14 times>, "\005\000\000\000\340-x\256\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\320\341\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140733918339568}}, id = 724951632, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "0c8e3e47-5c0b-41f6-9a55-b9af24301df9"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35e2d0 ""
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29c1608b0
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35e030 "P\340\065+\377\177", len = -1700679327}, host = {s = 0x7fff2b35df80 "U\004", len = 2044739546}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x55ab7a321f4d <buf+237> "\nTo: +351888888888 <sip:+351888888888 at load-tests-1039.sip-review.test.com:5060>\r\nCall-ID: 120433-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 6"..., len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1367855648}, headers = {s = 0x7fff2b35e0c0 "", len = 2047722808}, port_no = 44642, proto = 31263, type = 21931, flags = (URI_SIP_USER_PHONE | unknown: 0x79e03fd8), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1367855648}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab7a321f38 <buf+216> "28104SIPpTag00120433\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1039.sip-review.test.com:5060>\r\nCall-ID: 120433-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:"..., len = 20}, maddr = {s = 0x55ab7a321fad <buf+333> "120433-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test\r\nContent-Type: application/sdp\r\nContent-Length:   135\r\nTH: dih\r\n\r\nv"..., len = 25}, method = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1700421084}, lr = {s = 0x55ab7a321f4d <buf+237> "\nTo: +351888888888 <sip:+351888888888 at load-tests-1039.sip-review.test.com:5060>\r\nCall-ID: 120433-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 6"..., len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35e050 " \341\065+\377\177", len = 724951632}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35e120 "\320\341\065+\377\177", len = -1700401466}, maddr_val = {s = 0x7fff2b35e290 "", len = 724951632}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x500000000000000 <error: Cannot access memory at address 0x500000000000000>, len = 724951352}, r2_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1673486008}, gr_val = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 2050105043}}
        next_hop = {user = {s = 0x7fff2b35dfe0 "\255\037\062z\253U", len = 0}, passwd = {s = 0x7ff29c19cdc8 "\001", len = 0}, host = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 2048875599}, port = {s = 0x0, len = -1673486008}, params = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = 2047406657}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, headers = {s = 0x7ff29c1a7f58 "\350", len = 724950980}, port_no = 56928, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa5a224), transport = {s = 0x7fff2b35de60 "\020\337\065+\377\177", len = -1700641618}, ttl = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700319957}, user_param = {s = 0x679df3ff6 <error: Cannot access memory at address 0x679df3ff6>, len = 0}, maddr = {s = 0x7fff2b35df10 "0\337\065+\377\177", len = -1700603816}, method = {s = 0x2b35df40 <error: Cannot access memory at address 0x2b35df40>, len = 39469}, lr = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35dfbc "\361\177", len = 724950976}, gr = {s = 0x7fff2b35dfd0 "8\037\062z\253U", len = 724951008}, transport_val = {s = 0x7fff2b35dfe0 "\255\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700421084}, user_param_val = {s = 0x7ff19aa5a210 "\340-x\256\361\177", len = -1367855648}, maddr_val = {s = 0x12b35df20 <error: Cannot access memory at address 0x12b35df20>, len = -1700421084}, method_val = {s = 0x7fff2b35df20 "0\340\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700421084}, r2_val = {s = 0x7fff2b35df30 "@\337\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35e030 "P\340\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35e300
        port = 0
        dst_host = 0x7ff29c40a148
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 65537, id = 81, name = {n = 2050104928, s = {s = 0x55ab7a321e60 <buf> "INVITE sip:+351888888888 at load-tests-1039.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120433-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"..., len = 6}, re = 0x55ab7a321e60 <buf>}, avp = 0x7fff2b35dfbc}
        sct = 0x7ff29c3d2880
        sjt = 0x19aa1b310
        rve = 0x7ff29c201938
        mct = 0x7ff29c40a148
        rv = 0x0
        rv1 = 0x20000000
        c1 = {cache_type = 48, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, ri = 0, flags = 1}}, i2s = "p\336\065+\377\177\000\000\274\362\242\232\362\177\000\000\000\000\000\000\000"}
        s = {s = 0x7fff2b35dd60 "p\336\065+\377\177", len = -1700641618}
        srevp = {0x12b35dd60, 0x7ff19aa5a224}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#33 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1ec068, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2024d0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1673486008, tz_dsttime = 32754}
        tdiff = 536870912
        __func__ = "run_actions"
#34 0x000055ab79d90055 in run_top_route (a=0x7ff29c1ec068, msg=0x7ff29c40a148, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {94194973861652, 4294967296, 140679980294472, 94192927768576, 4294967296, 94194972442614, 536870912, 0, 0, 140733918340528, 0, 4611686022722355200, 0, 140679980066944, 4294967296, 94194972442614}}}}}
        p = 0x7fff2b35e4e0
        ret = 0
        sfbk = 0
#35 0x000055ab79edcf35 in receive_msg (buf=0x55ab7a321e60 <buf> "INVITE sip:+351888888888 at load-tests-1039.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120433-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"..., len=667, rcv_info=0x7fff2b35eb50) at core/receive.c:501
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 724952880, run_flags = 32767, last_retcode = -1676980208, jmp_env = {{__jmpbuf = {140679977805072, 140679976800272, 140733918340976, 140679971801418, 868308346720, 0, 536870912, 533529128}, __mask_was_saved = 2423352, __saved_mask = {__val = {3341784, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 24092824528, 94194976575339}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "INVITE sip:+351888888888 at load-tests-1039.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120433-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"..., len = 667}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "INVITE sip:+351888888888 at load-tests-1039.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120433-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"..., len = 651}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#36 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 651
        buf = "INVITE sip:+351888888888 at load-tests-1039.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120433-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1aa460
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {2842882083, 0}, addr32 = {2842882083, 0, 0, 0}, addr16 = {61475, 43378, 0, 0, 0, 0, 0, 0}, addr = "#\360r\251", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {4066168099, 0}, addr32 = {4066168099, 0, 0, 0}, addr16 = {52515, 62044, 0, 0, 0, 0, 0, 0}, addr = "#\315\\\362", '\000' <repeats 11 times>}}, src_port = 5070, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\316#\360r\251\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 52755, sin_addr = {s_addr = 2842882083}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 52755, sin6_flowinfo = 2842882083, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\316#\360r\251", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14e530, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "\020\352\065+\377\177\000\000\231$\006z\000\000\000\000\020\352\065+\377\177\000\000D)\006z\253U", '\000' <repeats 18 times>, "KR\033z\253U\000\000\000\000\000\000|\000\000\000\210T\033z\253U\000\000oT\033z\253U\000\000\060\000\000\000\000\000\000\000\020P\v\234\362\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 12 times>, "\330>\033\234\362\177\000\000\310y>\234\362\177\000\000@\000\000\000\000\000\000\000@", '\000' <repeats 19 times>, "\024\000\000\000\271y\030z\253U\000\000\000\000\000\000\001\000\000\000\315y\030z\253U\000\000\000\000\000\000\001\000\000\000"...
        i = 8
        j = 80640
        l = 1
        __func__ = "udp_rcv_loop"
#37 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 0
        pid = 0
        si = 0x7ff29c14e530
        si_desc = "udp receiver child=0 sock=90.30.20.32:5060\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 0
        __func__ = "main_loop"
#38 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 5) detached]
---end 5 -------------------------------------------------------

---start 6 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35b920, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35b920, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35b920, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1b3801be0, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b2c4990, flags = 0, buf = {s = 0x55ab7b2b5d70 "{\"action\":2,\"h_entry\":307,\"h_id\":65542,\"state\":4,\"start_ts\":1640001510,\"lifetime\":43200,\"tag1\":\"28104SIPpTag00120378\",\"tag2\":\"1934SIPpTag01120483\",\"cseq1\":\"1\",\"cseq2\":\"0\",\"route_set1\":\"\",\"route_set2\":"..., len = 329}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x0, flags = 0, buf = {s = 0x7fff2b35b9b0 "\200\273\065+\377\177", len = -1700916072}, malloc_fn = 0x7fff2b35b9b0, free_fn = 0x0}
        var = 0x0
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa21261 in dlg_onroute (req=0x7ff29c40a148, route_params=0x7fff2b35bbf0, param=0x0) at dlg_handlers.c:1559
        dlg = 0x7ff1b3801be0
        iuid = 0x0
        val = {s = 0x55ab7a322093 <buf+563> "331.60001>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120378;did=331.60001>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 9}
        callid = {s = 0x55ab7a321fa6 <buf+326> "120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}
        ftag = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00120378\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1033.sip-review.test.com:5060>;tag=1934SIPpTag01120483\r\nCall-ID: 120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+35192"..., len = 20}
        ttag = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01120483\r\nCall-ID: 120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}
        h_entry = 307
        h_id = 65542
        new_state = 4
        old_state = 3
        unref = 0
        event = 6
        timeout = 43200
        reset = 1
        dir = 1
        ret = 0
        __func__ = "dlg_onroute"
#7  0x00007ff29b9f76dc in run_rr_callbacks (req=0x7ff29c40a148, rr_param=0x7fff2b35bcb0) at rr_cb.c:96
        l_param = {s = 0x55ab7a322069 <buf+521> "r2=on;lr=on;ftag=28104SIPpTag00120378;did=331.60001>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120378;did=331.60001>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 51}
        cbp = 0x7ff29c40fab8
        __func__ = "run_rr_callbacks"
#8  0x00007ff29b9e6a9d in after_loose (_m=0x7ff29c40a148, preloaded=0) at loose.c:989
        hdr = 0x7ff29c1aa9d8
        puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x55ab7a3220a4 <buf+580> "10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120378;did=331.60001>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 12}, port = {s = 0x0, len = 0}, params = {s = 0x55ab7a3220b1 <buf+593> "r2=on;lr=on;ftag=28104SIPpTag00120378;did=331.60001>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 51}, sip_params = {s = 0x55ab7a3220b1 <buf+593> "r2=on;lr=on;ftag=28104SIPpTag00120378;did=331.60001>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 51}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x55ab7a3220b7 <buf+599> "lr=on;ftag=28104SIPpTag00120378;did=331.60001>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 5}, r2 = {s = 0x55ab7a3220b1 <buf+593> "r2=on;lr=on;ftag=28104SIPpTag00120378;did=331.60001>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 5}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x55ab7a3220ba <buf+602> "on;ftag=28104SIPpTag00120378;did=331.60001>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 2}, r2_val = {s = 0x55ab7a3220b4 <buf+596> "on;lr=on;ftag=28104SIPpTag00120378;did=331.60001>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 2}, gr_val = {s = 0x0, len = 0}}
        rt = 0x7ff29c1983d8
        res = 1
        status = 1
        uri = {s = 0x55ab7a322057 <buf+503> "sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00120378;did=331.60001>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120378;did=331.60001>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 69}
        uri_is_myself = 1
        use_ob = 0
        rparams = {s = 0x55ab7a322069 <buf+521> "r2=on;lr=on;ftag=28104SIPpTag00120378;did=331.60001>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120378;did=331.60001>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 51}
        __func__ = "after_loose"
#9  0x00007ff29b9e7211 in loose_route_mode (_m=0x7ff29c40a148, _mode=0) at loose.c:1024
        ret = 0
        __func__ = "loose_route_mode"
#10 0x00007ff29b9f94e9 in w_loose_route (msg=0x7ff29c40a148, p1=0x0, p2=0x0) at rr_mod.c:278
No locals.
#11 0x000055ab79d8101e in do_action (h=0x7fff2b35c840, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1076
        ret = -5
        v = 0
        dst = {send_sock = 0x1, to = {s = {sa_family = 21252, sa_data = "\244\232\361\177\000\000\210m\023\234\362\177\000"}, sin = {sin_family = 21252, sin_port = 39588, sin_addr = {s_addr = 32753}, sin_zero = "\210m\023\234\362\177\000"}, sin6 = {sin6_family = 21252, sin6_port = 39588, sin6_flowinfo = 32753, sin6_addr = {__in6_u = {__u6_addr8 = "\210m\023\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {28040, 39955, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618518920, 32754, 36, 0}}}, sin6_scope_id = 724943984}, sas = {ss_family = 21252, __ss_padding = "\244\232\361\177\000\000\210m\023\234\362\177\000\000$\000\000\000\000\000\000\000p\304\065+\001\000\000\000\360\340Z\255\361\177\000\000\200\313\022\234\006\000\000\000\340\033\200\263\361\177\000\000\000\000\000\000\004\000\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\305\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679977734008}}, id = 724944304, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "452a6458-9e28-4794-8979-144c9c4fd385"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35c630 "`\306\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29c156c50
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35c390 " \304\065+\377\177", len = -1700678945}, host = {s = 0x7ff29c12cb80 "452a6458-9e28-4794-8979-144c9c4fd385", len = 36}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7ff29c130c50 "452a6458-9e28-4794-8979-144c9c4fd385", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1283449888}, headers = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1676250696}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x7a269a84), transport = {s = 0x0, len = -1283449888}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01120483\r\nCall-ID: 120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00120378\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1033.sip-review.test.com:5060>;tag=1934SIPpTag01120483\r\nCall-ID: 120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa452f0 "\340\033\200\263\361\177", len = -1700506876}, lr = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35c420 "\210m\023\234\362\177", len = 724944304}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35c480 "0\305\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35c4c0 "", len = 724944304}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7ff29c24b0b8 "J\003", len = 724944224}, r2_val = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35c340 "\246\037\062z\253U", len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x7fff2b35c220 "\001", len = -1700678945}, port = {s = 0x7ff29c130c50 "452a6458-9e28-4794-8979-144c9c4fd385", len = -1673486008}, params = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1386553104}, sip_params = {s = 0x679df3ff6 <error: Cannot access memory at address 0x679df3ff6>, len = -1283449888}, headers = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = 0}, port_no = 21232, proto = 39588, type = 32753, flags = (unknown: 0x20000000), transport = {s = 0x0, len = -1283449888}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35c2a0 "\220\303\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35c2a0 "\220\303\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35c31c "\361\177", len = 724943648}, gr = {s = 0x7fff2b35c330 "\031\037\062z\253U", len = 724943680}, transport_val = {s = 0x7fff2b35c340 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700506876}, user_param_val = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr_val = {s = 0x12b35c280 <error: Cannot access memory at address 0x12b35c280>, len = -1700506876}, method_val = {s = 0x7fff2b35c280 "\220\303\065+\377\177", len = -1700641618}, lr_val = {s = 0x6b3801be0 <error: Cannot access memory at address 0x6b3801be0>, len = -1700506876}, r2_val = {s = 0x55ab7a269a60 <log_prefix_buf> "452a6458-9e28-4794-8979-144c9c4fd385", len = 0}, gr_val = {s = 0x7fff2b35c390 " \304\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35c660
        port = 0
        dst_host = 0x0
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 724943120, id = 32767, name = {n = 724943568, s = {s = 0x7fff2b35c2d0 "P\f\023\234\362\177", len = -1676046472}, re = 0x7fff2b35c2d0}, avp = 0x7fff2b35c31c}
        sct = 0x7ff29c3d2880
        sjt = 0x12b35e4e0
        rve = 0xdc68a89ab51d8392
        mct = 0x7ff29c40a148
        rv = 0x7ff29aa5eea4 <pv_get_dlg_variable+2524>
        rv1 = 0x20000000
        c1 = {cache_type = 724943648, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724943680}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724943680}, ri = -1283449888, flags = 1}}, i2s = "\320\301\065+\377\177\000\000\276\345\242\232\362\177\000\000\240\301\065+\377\177"}
        s = {s = 0x7fff2b35c0c0 "\320\301\065+\377\177", len = -1700641618}
        srevp = {0x12b35c0c0, 0x7ff19aa45304}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x000055ab79d8f89f in run_actions (h=0x7fff2b35c840, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c24ef48
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1283449888, tz_dsttime = 1}
        tdiff = 2594325678
        __func__ = "run_actions"
#13 0x000055ab79d8ff8d in run_actions_safe (h=0x7fff2b35e4e0, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614605466926190, 94194972442614, 536870912, 0, 0, -2564614605416594542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 1, 4294967296, 94194972442614, 536870912, 0, 0, 140733918333520, 94194973731987, 26494749552, 94194977119848, 94194977118816, 7306484704, 140679978465592}}}}}
        ret = 724945776
        ign_on_break = 0
#14 0x000055ab79f295e9 in rval_get_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, i=0x7fff2b35d0b4, rv=0x7ff29c24f0a0, cache=0x0) at core/rvalue.c:949
        r_avp = 0x7ff29c40a148
        avp_val = {n = 724945424, s = {s = 0x7fff2b35ca10 "", len = 2045519573}, re = 0x7fff2b35ca10}
        pval = {rs = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 724947124}, ri = 0, flags = 0}
        tmp = {s = 0x439c20d668 <error: Cannot access memory at address 0x439c20d668>, len = 0}
        s = 0x0
        r = -1673713536
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#15 0x000055ab79f2e7da in rval_expr_eval_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, res=0x7fff2b35d0b4, rve=0x7ff29c24f098) at core/rvalue.c:1947
        i1 = 1
        i2 = 0
        ret = -1
        c1 = {cache_type = 1109, val_type = RV_INT, c = {avp_val = {n = -1283449888, s = {s = 0x5b3801be0 <error: Cannot access memory at address 0x5b3801be0>, len = 2044674038}, re = 0x5b3801be0}, pval = {rs = {s = 0x5b3801be0 <error: Cannot access memory at address 0x5b3801be0>, len = 2044674038}, ri = 536870912, flags = 0}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 724945888, val_type = 32767, c = {avp_val = {n = -1700678945, s = {s = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429> "H\211E\310H\203}\310", len = -1676481560}, re = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429>}, pval = {rs = {s = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429> "H\211E\310H\203}\310", len = -1676481560}, ri = 36, flags = 21931}}, i2s = "\000\000\000\000\006\000\000\000\033\230\247\232\362\177\000\000\227\201\201\233\006"}
        rv1 = 0x0
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#16 0x000055ab79d80a74 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c25b240, msg=0x7ff29c40a148) at core/action.c:1052
        ret = -5
        v = 0
        dst = {send_sock = 0x55ab79df3ff6 <ksr_slog_json>, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000 M\023\234\362\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = " M\023\234\362\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = " M\023\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {19744, 39955, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618510624, 32754, 36, 0}}}, sin6_scope_id = 724947040}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000 M\023\234\362\177\000\000$\000\000\000\000\000\000\000`\320\065+\377\177\000\000\360\340Z\255\361\177\000\000\366?\337y\006\000\000\000\340\033\200\263\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\321\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679978086672}}, id = 724947376, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "452a6458-9e28-4794-8979-144c9c4fd385"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35d230 "`\322\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429>
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35ced0 "`\320\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d060 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1283449888}, headers = {s = 0x7fff2b35d5b0 "\366?\337y\253U", len = 2044186961}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c284970 "\n\004", len = -1283449888}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01120483\r\nCall-ID: 120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00120378\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1033.sip-review.test.com:5060>;tag=1934SIPpTag01120483\r\nCall-ID: 120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa452f0 "\340\033\200\263\361\177", len = -1700506876}, lr = {s = 0x87a321fd0 <error: Cannot access memory at address 0x87a321fd0>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d020 " M\023\234\362\177", len = 724947376}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d080 "0\321\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35cff0 "", len = 724947376}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01120483\r\nCall-ID: 120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35cf40 "\246\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b35cd60 "\366?\337y\253U", len = -1673486008}, params = {s = 0x0, len = 0}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, headers = {s = 0x0, len = 0}, port_no = 21232, proto = 39588, type = 32753, flags = (URI_USER_NORMALIZE | unknown: 0x79ec1f4c), transport = {s = 0x0, len = -1283449888}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35cf1c "\361\177", len = 724946720}, gr = {s = 0x7fff2b35cf30 "\031\037\062z\253U", len = 724946752}, transport_val = {s = 0x7fff2b35cf40 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700506876}, user_param_val = {s = 0x7ff19aa5a670 "PsK\265\361\177", len = 2049350276}, maddr_val = {s = 0x12b35ce80 <error: Cannot access memory at address 0x12b35ce80>, len = -1700506876}, method_val = {s = 0x7fff2b35ce80 "\220\317\065+\377\177", len = -1700641618}, lr_val = {s = 0x6b3801be0 <error: Cannot access memory at address 0x6b3801be0>, len = -1700506876}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35d260
        port = 0
        dst_host = 0x0
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = 724946432, s = {s = 0x7fff2b35ce00 "0\317\065+\377\177", len = -1676046496}, re = 0x7fff2b35ce00}, avp = 0x7fff2b35cf1c}
        sct = 0x7ff29c3d2880
        sjt = 0x1b3801be0
        rve = 0x7ff29c24f098
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724946720, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724946752}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724946752}, ri = -1283449888, flags = 1}}, i2s = "\320\315\065+\377\177\000\000\276\345\242\232\362\177\000\000\200\315\065+\377\177"}
        s = {s = 0x7fff2b35ccc0 "\320\315\065+\377\177", len = -1700641618}
        srevp = {0x12b35ccc0, 0x7ff19aa45304}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#17 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c24a350, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c25b240
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 536870912, tz_dsttime = 0}
        tdiff = 19
        __func__ = "run_actions"
#18 0x000055ab79d7d151 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c1efa78, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 21931
        dst = {send_sock = 0x7fff2b35d8a0, to = {s = {sa_family = 20496, sa_data = "\v\234\362\177\000\000\250\350\021\234\362\177\000"}, sin = {sin_family = 20496, sin_port = 39947, sin_addr = {s_addr = 32754}, sin_zero = "\250\350\021\234\362\177\000"}, sin6 = {sin6_family = 20496, sin6_port = 39947, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "\250\350\021\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {59560, 39953, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618419368, 32754, 36, 0}}}, sin6_scope_id = 2619264352}, sas = {ss_family = 20496, __ss_padding = "\v\234\362\177\000\000\250\350\021\234\362\177\000\000$\000\000\000\000\000\000\000`\315\036\234\362\177\000\000\360\340Z\255\361\177\000\000\366?\337y\006\000\000\000\340\033\200\263\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\200\331\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 0}}, id = 724949504, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "452a6458-9e28-4794-8979-144c9c4fd385"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35da80 "\260\332\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x55ab7a06c502 <qm_info+46>
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35d7e0 "p\330\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35d720 "\260\330\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d8b0 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1283449888}, headers = {s = 0x7fff2b35d850 "", len = 2044264333}, port_no = 0, proto = 8192, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c1ef110 "\020\002", len = -1283449888}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01120483\r\nCall-ID: 120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00120378\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1033.sip-review.test.com:5060>;tag=1934SIPpTag01120483\r\nCall-ID: 120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa452f0 "\340\033\200\263\361\177", len = -1700506876}, lr = {s = 0xdc68a89a94fd8392 <error: Cannot access memory at address 0xdc68a89a94fd8392>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d870 "\250\350\021\234\362\177", len = 724949504}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d8d0 "\200\331\065+\377\177", len = -1700401500}, maddr_val = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 724949504}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b35d8f0 "`\217\031\234\362\177", len = 2047586128}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35d790 "\246\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b35d5b0 "\366?\337y\253U", len = -1673486008}, params = {s = 0x0, len = 0}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, headers = {s = 0x0, len = 0}, port_no = 21232, proto = 39588, type = 32753, flags = (URI_USER_NORMALIZE | unknown: 0x79ec1f4c), transport = {s = 0x0, len = -1283449888}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35d76c "\361\177", len = 724948848}, gr = {s = 0x7fff2b35d780 "\031\037\062z\253U", len = 724948880}, transport_val = {s = 0x7fff2b35d790 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700506876}, user_param_val = {s = 0x55ab7a1f5c4f "core", len = 2049350276}, maddr_val = {s = 0x12b35d6d0 <error: Cannot access memory at address 0x12b35d6d0>, len = -1700506876}, method_val = {s = 0x7fff2b35d6d0 "\340\327\065+\377\177", len = -1700641618}, lr_val = {s = 0x6b3801be0 <error: Cannot access memory at address 0x6b3801be0>, len = -1700506876}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35d7e0 "p\330\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35dab0
        port = 0
        dst_host = 0x0
        i = 10
        flags = 32767
        avp = 0x0
        st = {flags = 2431800, id = 0, name = {n = 724948560, s = {s = 0x7fff2b35d650 "\200\327\065+\377\177", len = -1676046496}, re = 0x7fff2b35d650}, avp = 0x7fff2b35d76c}
        sct = 0x7ff29c3d2880
        sjt = 0x100000293
        rve = 0x55ab79f295e9 <rval_get_int+314>
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724948848, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724948880}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724948880}, ri = -1283449888, flags = 1}}, i2s = " \326\065+\377\177\000\000\276\345\242\232\362\177\000\000\320\325\065+\377\177"}
        s = {s = 0x7fff2b35d510 " \326\065+\377\177", len = -1700641618}
        srevp = {0x12b35d510, 0x7ff19aa45304}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#19 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1efa78, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c1efa78
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 2618919768
        __func__ = "run_actions"
#20 0x000055ab79d80f8a in do_action (h=0x7fff2b35e4e0, a=0x7ff29c1efe00, msg=0x7ff29c40a148) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x55ab7a321eb3 <buf+83>, to = {s = {sa_family = 32544, sa_data = "\032\234\362\177\000\000p\207\021\234\362\177\000"}, sin = {sin_family = 32544, sin_port = 39962, sin_addr = {s_addr = 32754}, sin_zero = "p\207\021\234\362\177\000"}, sin6 = {sin6_family = 32544, sin6_port = 39962, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "p\207\021\234\362\177\000\000$\000\000\000\006\000\000", __u6_addr16 = {34672, 39953, 32754, 0, 36, 0, 6, 0}, __u6_addr32 = {2618394480, 32754, 36, 6}}}, sin6_scope_id = 2594460400}, sas = {ss_family = 32544, __ss_padding = "\032\234\362\177\000\000p\207\021\234\362\177\000\000$\000\000\000\006\000\000\000\360R\244\232\361\177\000\000\360\340Z\255\361\177\000\000\000\000\000\000\006\000\000\000\340\033\200\263\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\320\341\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140733918339568}}, id = 724951632, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "452a6458-9e28-4794-8979-144c9c4fd385"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35e2d0 ""
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x13
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35e030 "\300\340\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35df80 "U\004", len = 2044739546}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x55ab7a321f2e <buf+206> "\nTo: +351888888888 <sip:+351888888888 at load-tests-1033.sip-review.test.com:5060>;tag=1934SIPpTag01120483\r\nCall-ID: 120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:"..., len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1283449888}, headers = {s = 0x7fff2b35e0c0 "p\207\021\234\362\177", len = 0}, port_no = 44642, proto = 31263, type = 21931, flags = (unknown: 0x1fccd028), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1283449888}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01120483\r\nCall-ID: 120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00120378\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1033.sip-review.test.com:5060>;tag=1934SIPpTag01120483\r\nCall-ID: 120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "120378-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa452f0 "\340\033\200\263\361\177", len = -1700506876}, lr = {s = 0x7fff2b35e290 "", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35e0c0 "p\207\021\234\362\177", len = 724951632}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35e120 "\320\341\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35e290 "", len = 724951632}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x500000000000000 <error: Cannot access memory at address 0x500000000000000>, len = 724951352}, r2_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1673486008}, gr_val = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 1}}
        next_hop = {user = {s = 0x7fff2b35dfe0 "\246\037\062z\253U", len = 0}, passwd = {s = 0x7ff29c1aa460 "\350", len = 0}, host = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 2048875599}, port = {s = 0x0, len = -1673486008}, params = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = 2047406657}, sip_params = {s = 0x7ff29c1a17a0 "`\244\032\234\362\177", len = -1676013072}, headers = {s = 0x7ff29c1a16f8 "\001", len = 724950980}, port_no = 21232, proto = 39588, type = 32753, flags = (unknown: 0x9c198a08), transport = {s = 0x0, len = -1283449888}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35dfbc "\361\177", len = 724950976}, gr = {s = 0x7fff2b35dfd0 "\031\037\062z\253U", len = 724951008}, transport_val = {s = 0x7fff2b35dfe0 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700506876}, user_param_val = {s = 0x7fff2b35df10 "", len = -1676980208}, maddr_val = {s = 0x12b35df20 <error: Cannot access memory at address 0x12b35df20>, len = -1700506876}, method_val = {s = 0x7fff2b35df20 "0\340\065+\377\177", len = -1700641618}, lr_val = {s = 0x6b3801be0 <error: Cannot access memory at address 0x6b3801be0>, len = -1700506876}, r2_val = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, gr_val = {s = 0x7fff2b35e030 "\300\340\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35e300
        port = 0
        dst_host = 0x7ff29c40a148
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 65537, id = 49, name = {n = 2050104928, s = {s = 0x55ab7a321e60 <buf> "ACK sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-120378-5\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 3}, re = 0x55ab7a321e60 <buf>}, avp = 0x7fff2b35dfbc}
        sct = 0x7ff29c3d2880
        sjt = 0x19aa1b2df
        rve = 0x7ff29c1ef260
        mct = 0x7ff29c40a148
        rv = 0x0
        rv1 = 0x20000000
        c1 = {cache_type = 724950976, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, ri = -1283449888, flags = 1}}, i2s = "p\336\065+\377\177\000\000\276\345\242\232\362\177\000\000\000\000\000\000\000"}
        s = {s = 0x7fff2b35dd60 "p\336\065+\377\177", len = -1700641618}
        srevp = {0x12b35dd60, 0x7ff19aa45304}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1ec068, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c1efe00
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1673486008, tz_dsttime = 32754}
        tdiff = 536870912
        __func__ = "run_actions"
#22 0x000055ab79d90055 in run_top_route (a=0x7ff29c1ec068, msg=0x7ff29c40a148, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {94194973861652, 4294967296, 140679980294472, 94192927768577, 4294967296, 94194972442614, 536870912, 0, 0, 140733918340528, 0, 4611686022722355200, 0, 140679980066944, 4294967296, 94194972442614}}}}}
        p = 0x7fff2b35e4e0
        ret = 0
        sfbk = 0
#23 0x000055ab79edcf35 in receive_msg (buf=0x55ab7a321e60 <buf> "ACK sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-120378-5\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len=677, rcv_info=0x7fff2b35eb50) at core/receive.c:501
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 724952880, run_flags = 32767, last_retcode = -1676980208, jmp_env = {{__jmpbuf = {140679977844384, 140679976800272, 140733918340976, 140679971801418, 140679976516045, 0, 536870912, 533529360}, __mask_was_saved = 2423224, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660308208, 94194976575339}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "ACK sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-120378-5\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 677}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "ACK sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-120378-5\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 661}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#24 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 661
        buf = "ACK sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-120378-5\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {2842882083, 0}, addr32 = {2842882083, 0, 0, 0}, addr16 = {61475, 43378, 0, 0, 0, 0, 0, 0}, addr = "#\360r\251", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {4066168099, 0}, addr32 = {4066168099, 0, 0, 0}, addr16 = {52515, 62044, 0, 0, 0, 0, 0, 0}, addr = "#\315\\\362", '\000' <repeats 11 times>}}, src_port = 5070, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\316#\360r\251\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 52755, sin_addr = {s_addr = 2842882083}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 52755, sin6_flowinfo = 2842882083, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\316#\360r\251", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14e530, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\360\336\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\002\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 2
        __func__ = "udp_rcv_loop"
#25 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 1
        pid = 0
        si = 0x7ff29c14e530
        si_desc = "udp receiver child=1 sock=90.30.20.32:5060\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#26 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 6) detached]
---end 6 -------------------------------------------------------

---start 7 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa42848, body=0x7fff2b358e80, except=0x0, resp_cback=0x7ff29aae1330 <ht_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aae12f0 <ht_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa42848, body=0x7fff2b358e80, except=0x0, resp_cback=0x7ff29aae1330 <ht_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aae12f0 <ht_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29aab01c5 in ht_dmq_send (body=0x7fff2b358e80, node=0x0) at ht_dmq.c:237
        __func__ = "ht_dmq_send"
#5  0x00007ff29aab3316 in ht_dmq_replicate_action (action=HT_DMQ_SET_CELL, htname=0x7ff29c2b9f20, cname=0x7fff2b358f80, type=2, val=0x7fff2b358f70, mode=1) at ht_dmq.c:391
        jdoc = {root = 0x55ab7b2c41b0, flags = 0, buf = {s = 0x55ab7b2aa980 "{\"action\":2,\"htname\":\"uas\",\"cname\":\"120434-28104 at 10.10.120.20 + \\\"-SRC\\\"\",\"type\":2,\"strval\":\"sip:90.30.30.52:5070\",\"mode\":1}", len = 127}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        __func__ = "ht_dmq_replicate_action"
#6  0x00007ff29aab8dd5 in pv_set_ht_cell (msg=0x7ff29c40a148, param=0x7ff29c2b9e58, op=254, val=0x7fff2b359070) at ht_var.c:119
        htname = {s = 0x7ff29c118770 "120434-28104 at 10.10.120.20 + \"-SRC\"", len = 34}
        isval = {n = -1676581112, s = {s = 0x7ff29c116708 "sip:90.30.30.52:5070", len = 23}, re = 0x7ff29c116708}
        hpv = 0x7ff29c2b9f20
        __func__ = "pv_set_ht_cell"
#7  0x000055ab79e53a6e in lval_pvar_assign (h=0x7fff2b35aaf0, msg=0x7ff29c40a148, lv=0x7ff29c2ba0b8, rv=0x7ff29c2ba320) at core/lvalue.c:352
        pvar = 0x7ff29c2b9e40
        pval = {rs = {s = 0x7ff29c116708 "sip:90.30.30.52:5070", len = 23}, ri = 0, flags = 4}
        r_avp = 0x7fff2b359170
        avp_val = {n = 2044674038, s = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, re = 0x55ab79df3ff6 <ksr_slog_json>}
        ret = 1
        v = 32754
        destroy_pval = 1
        __func__ = "lval_pvar_assign"
#8  0x000055ab79e5468a in lval_assign (h=0x7fff2b35aaf0, msg=0x7ff29c40a148, lv=0x7ff29c2ba0b8, rve=0x7ff29c2ba318) at core/lvalue.c:400
        rv = 0x7ff29c2ba320
        ret = -1
        __func__ = "lval_assign"
#9  0x000055ab79d8d7b9 in do_action (h=0x7fff2b35aaf0, a=0x7ff29c2baa48, msg=0x7ff29c40a148) at core/action.c:1455
        ret = -5
        v = 32767
        dst = {send_sock = 0x7fff2b3596d0, to = {s = {sa_family = 4762, sa_data = "\354y\253U\000\000\240F\021\234\362\177\000"}, sin = {sin_family = 4762, sin_port = 31212, sin_addr = {s_addr = 21931}, sin_zero = "\240F\021\234\362\177\000"}, sin6 = {sin6_family = 4762, sin6_port = 31212, sin6_flowinfo = 21931, sin6_addr = {__in6_u = {__u6_addr8 = "\240F\021\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {18080, 39953, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618377888, 32754, 36, 0}}}, sin6_scope_id = 2620091632}, sas = {ss_family = 4762, __ss_padding = "\354y\253U\000\000\240F\021\234\362\177\000\000$\000\000\000\000\000\000\000\360l+\234\362\177\000\000\270^\335\253\361\177\000\000H\241@\234\a\000\000\000H\203\016\257\361\177\000\000\001", '\000' <repeats 11 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "@\227\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140733918320352}}, id = 724932544, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "98f7801b-b9ba-4344-a6cf-0c08633d596f"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b359840 "p\230\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x0
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b3594b0 "\240\225\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b3595a0 "0\226\065+\377\177", len = -1700679327}, host = {s = 0x10000000a <error: Cannot access memory at address 0x10000000a>, len = 0}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1358003384}, headers = {s = 0x7fff2b359610 "@\227\065+\377\177", len = 2044264333}, port_no = 12751, proto = 24576, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c2b5d38 "\221\004", len = -1358003384}, ttl = {s = 0x0, len = 1}, user_param = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 360547218}, maddr = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, method = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1700424444}, lr = {s = 0xdc68a89a187d8392 <error: Cannot access memory at address 0xdc68a89a187d8392>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b359630 "\240F\021\234\362\177", len = 724932544}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b359690 "@\227\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b3598c0 "\356\024(\234\362\177", len = 724932544}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b3597e0 "", len = 0}, r2_val = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 1}, gr_val = {s = 0x7fff2b359740 "@\230\065+\377\177", len = 2045941225}}
        next_hop = {user = {s = 0x7fff2b359350 "p\223\065+\377\177", len = 2045519573}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b359370 "\001", len = 2044673277}, params = {s = 0x0, len = -1673486008}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, headers = {s = 0x0, len = -1675095648}, port_no = 37840, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59504), transport = {s = 0x7fff2b3593d0 "\200\224\065+\377\177", len = -1700641618}, ttl = {s = 0x69c2b5d38 <error: Cannot access memory at address 0x69c2b5d38>, len = -1700319957}, user_param = {s = 0x7ff29c40a148 "\345\257", len = 0}, maddr = {s = 0x7fff2b359480 "\240\224\065+\377\177", len = -1700603816}, method = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 75811}, lr = {s = 0x0, len = 1}, r2 = {s = 0x14780a0a00000002 <error: Cannot access memory at address 0x14780a0a00000002>, len = -1328901808}, gr = {s = 0x55ab7a331e80 <def_list> "\330\222\312\260\361\177", len = 2045509579}, transport_val = {s = 0x7fff2b359568 "\004\225\245\232\361\177", len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, user_param_val = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1358003384}, maddr_val = {s = 0x12b359490 <error: Cannot access memory at address 0x12b359490>, len = -1700424444}, method_val = {s = 0x7fff2b359490 "\240\225\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700424444}, r2_val = {s = 0x7fff2b3594a0 "\260\224\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b3595a0 "0\226\065+\377\177", len = -1700582475}}
        u = 0x7fff2b359870
        port = 0
        dst_host = 0x7ff29c0b5010
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, re = 0x100000000}, avp = 0x20000000}
        sct = 0x7ff29c3d2880
        sjt = 0x19c0ba370
        rve = 0x7fff2b35aaf0
        mct = 0x7ff29c40a148
        rv = 0x2400000000
        rv1 = 0x20000000
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_ACTION_ST, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = -1676234792, flags = 32754}}, i2s = "\000\000\000\000\000\000\000\000\204\232&z\253U\000\000\000\000\000\000\000"}
        s = {s = 0x7ff29c10e568 "98f7801b-b9ba-4344-a6cf-0c08633d596f", len = 36}
        srevp = {0x0, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#10 0x000055ab79d8f89f in run_actions (h=0x7fff2b35aaf0, a=0x7ff29c2baa48, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2baa48
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 536870912
        __func__ = "run_actions"
#11 0x000055ab79d7d151 in do_action (h=0x7fff2b35aaf0, a=0x7ff29c2b91f0, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\070&\021\234\362\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "8&\021\234\362\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "8&\021\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {9784, 39953, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618369592, 32754, 36, 0}}}, sin6_scope_id = 2620056624}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\070&\021\234\362\177\000\000$\000\000\000\000\000\000\000\060\344*\234\362\177\000\000\270^\335\253\361\177\000\000H\241@\234\a\000\000\000H\203\016\257\361\177\000\000\300\021\062\234\362\177\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\220\237\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140733918322480}}, id = 724934672, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "98f7801b-b9ba-4344-a6cf-0c08633d596f"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35a090 "\300\240\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29c160798
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b359d00 "\360\235\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b359df0 "\200\236\065+\377\177", len = -1700679327}, host = {s = 0x0, len = 0}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1358003384}, headers = {s = 0x7fff2b359e60 "\220\237\065+\377\177", len = 2044264333}, port_no = 16374, proto = 31199, type = 21931, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c2adba8 "~\004", len = -1358003384}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 98403218}, maddr = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, method = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1700424444}, lr = {s = 0xdc68a89a08dd8392 <error: Cannot access memory at address 0xdc68a89a08dd8392>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b359e80 "8&\021\234\362\177", len = 724934672}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b359ee0 "\220\237\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7ff29c2fab20 "src", len = 724934672}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700424444}, r2_val = {s = 0x7fff2b359e70 "", len = 0}, gr_val = {s = 0x7fff2b359f90 "\220\240\065+\377\177", len = 2045941225}}
        next_hop = {user = {s = 0x7fff2b359ba0 "\300\233\065+\377\177", len = 2045519573}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b359bc0 "\001", len = 2044673277}, params = {s = 0x0, len = -1673486008}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, headers = {s = 0x55ab7b2c41b0 "", len = 724933808}, port_no = 39968, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59504), transport = {s = 0x7fff2b359c20 "\320\234\065+\377\177", len = -1700641618}, ttl = {s = 0x69c2adba8 <error: Cannot access memory at address 0x69c2adba8>, len = -1700319957}, user_param = {s = 0x7ff29a8da3a0 <_handle_GeoIP> "\001", len = 0}, maddr = {s = 0x7fff2b359cd0 "\360\234\065+\377\177", len = -1700603816}, method = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 75811}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7fff2b359c90 "\360\224\245\232\361\177", len = 1142327296}, transport_val = {s = 0x69c322f50 <error: Cannot access memory at address 0x69c322f50>, len = -1702005549}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, user_param_val = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1358003384}, maddr_val = {s = 0x12b359ce0 <error: Cannot access memory at address 0x12b359ce0>, len = -1700424444}, method_val = {s = 0x7fff2b359ce0 "\360\235\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700424444}, r2_val = {s = 0x7fff2b359cf0 "", len = 0}, gr_val = {s = 0x7fff2b359df0 "\200\236\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35a0c0
        port = 0
        dst_host = 0x0
        i = 24
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, re = 0x100000000}, avp = 0x20000000}
        sct = 0x7ff29c3d2880
        sjt = 0x17a1ecef4
        rve = 0x7ff29c2b7418
        mct = 0x7ff29c40a148
        rv = 0x2400000000
        rv1 = 0x20000000
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_ACTION_ST, c = {avp_val = {n = -1673486008, s = {s = 0x7ff29c40a148 "\345\257", len = 0}, re = 0x7ff29c40a148}, pval = {rs = {s = 0x7ff29c40a148 "\345\257", len = 0}, ri = 0, flags = 0}}, i2s = "\000\000\000\000\000\000\000\000\204\232&z\253U\000\000\000\000\000\000\000"}
        s = {s = 0x7ff29c1249e0 "98f7801b-b9ba-4344-a6cf-0c08633d596f", len = 36}
        srevp = {0x7fff2b359b90, 0x55ab79ec129a <pv_get_spec_value+950>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x000055ab79d8f89f in run_actions (h=0x7fff2b35aaf0, a=0x7ff29c2b3af8, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2b91f0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 3362264, tz_dsttime = 0}
        tdiff = 0
        __func__ = "run_actions"
#13 0x000055ab79d7d151 in do_action (h=0x7fff2b35aaf0, a=0x7ff29c2a5d88, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x7fff2b35a6d0, to = {s = {sa_family = 35712, sa_data = "D\255\361\177\000\000\360\200\017\234\362\177\000"}, sin = {sin_family = 35712, sin_port = 44356, sin_addr = {s_addr = 32753}, sin_zero = "\360\200\017\234\362\177\000"}, sin6 = {sin6_family = 35712, sin6_port = 44356, sin6_flowinfo = 32753, sin6_addr = {__in6_u = {__u6_addr8 = "\360\200\017\234\362\177\000\000$\000\000\000\001\000\000", __u6_addr16 = {33008, 39951, 32754, 0, 36, 0, 1, 0}, __u6_addr32 = {2618261744, 32754, 36, 1}}}, sin6_scope_id = 2044674038}, sas = {ss_family = 35712, __ss_padding = "D\255\361\177\000\000\360\200\017\234\362\177\000\000$\000\000\000\001\000\000\000\366?\337y\253U\000\000\270^\335\253\361\177\000\000\000\000\000\000\a\000\000\000H\203\016\257\361\177\000\000\340\247\065+\377\177\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\340\247\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 15882129467277935506}}, id = 724936800, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "98f7801b-b9ba-4344-a6cf-0c08633d596f"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35a8e0 "\020\251\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x0
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35a550 "@\246\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35a640 "\320\246\065+\377\177", len = -1700679327}, host = {s = 0x7fff2b35a680 "x\217\031\234\362\177", len = -1673486008}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7ff29c3211c0 "\241\005", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1358003384}, headers = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1}, port_no = 42480, proto = 11061, type = SIP_URI_T, flags = (unknown: 0xb42f7b90), transport = {s = 0x12b35a600 <error: Cannot access memory at address 0x12b35a600>, len = -1358003384}, ttl = {s = 0x7fff2b35a600 "\360\224\245\232\361\177", len = 2047209688}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1705654584}, maddr = {s = 0x0, len = 0}, method = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1700424444}, lr = {s = 0x7ff29aa7981b "dialog", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35a6d0 "\360\200\017\234\362\177", len = 724936800}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35a730 "\340\247\065+\377\177", len = -1700401500}, maddr_val = {s = 0x12b35a6b0 <error: Cannot access memory at address 0x12b35a6b0>, len = 724936800}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700424444}, r2_val = {s = 0x7fff2b35a6c0 "\320\246\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35a7c0 "\366?\337y\253U", len = -1700582475}}
        next_hop = {user = {s = 0x7ff1b0ca9230 "P\222\312\260\361\177", len = 0}, passwd = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, host = {s = 0x0, len = 0}, port = {s = 0x7fff2b35a4f0 "0\245\065+\001", len = 2045517645}, params = {s = 0x0, len = 2049351272}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, headers = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port_no = 42096, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59504), transport = {s = 0x7fff2b35a470 " \245\065+\377\177", len = -1700641618}, ttl = {s = 0x679df3ff6 <error: Cannot access memory at address 0x679df3ff6>, len = -1700319957}, user_param = {s = 0x7f00000187 <error: Cannot access memory at address 0x7f00000187>, len = 0}, maddr = {s = 0x7fff2b35a520 "@\245\065+\377\177", len = -1700603816}, method = {s = 0x0, len = 75811}, lr = {s = 0x3200000001 <error: Cannot access memory at address 0x3200000001>, len = -1676241136}, r2 = {s = 0x55ab7a331e80 <def_list> "\330\222\312\260\361\177", len = 2049350276}, gr = {s = 0x7f00000000 <error: Cannot access memory at address 0x7f00000000>, len = 2048842849}, transport_val = {s = 0x7ff29aa79be4 "dialog: dlg_var.c", len = 8}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, user_param_val = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1358003384}, maddr_val = {s = 0x12b35a530 <error: Cannot access memory at address 0x12b35a530>, len = -1700424444}, method_val = {s = 0x7fff2b35a530 "@\246\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700424444}, r2_val = {s = 0x7fff2b35a540 "P\245\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35a640 "\320\246\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35a910
        port = 0
        dst_host = 0x700000000
        i = 23
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 1, name = {n = 2050105595, s = {s = 0x55ab7a3220fb <buf+667> "", len = 2050105595}, re = 0x55ab7a3220fb <buf+667>}, avp = 0x55ab7a3220fb <buf+667>}
        sct = 0x7ff29c3d2880
        sjt = 0x19c40a148
        rve = 0x139c2b3010
        mct = 0x7ff29c40a148
        rv = 0x10000015f
        rv1 = 0x20000000
        c1 = {cache_type = 724935696, val_type = 32767, c = {avp_val = {n = 724935792, s = {s = 0x7fff2b35a470 " \245\065+\377\177", len = -1676046496}, re = 0x7fff2b35a470}, pval = {rs = {s = 0x7fff2b35a470 " \245\065+\377\177", len = -1676046496}, ri = -1673486008, flags = 32754}}, i2s = "y 2z\253U\000\000\376\377\377\377\377\177\000\000\373 2z\253U"}
        s = {s = 0x7fff2b35a3f0 "\360\244\065+\377\177", len = 2045514394}
        srevp = {0x0, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#14 0x000055ab79d8f89f in run_actions (h=0x7fff2b35aaf0, a=0x7ff29c2a5d88, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2a5d88
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 2594647339
        __func__ = "run_actions"
#15 0x000055ab79d8ff8d in run_actions_safe (h=0x7fff2b35c6d0, a=0x7ff29c2a5d88, msg=0x7ff29c40a148) at core/action.c:1645
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614606614068334, 94194972442614, 536870912, 0, 0, -2564614606563736686, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {140733918332624, 0, 0, 0, 0, 0, 0, 0, 0, 25769803776, 140679953487899, 1, 140675658388740, 107374182400, 724939428, 5019905024}}}}}
        ret = -1700424444
        ign_on_break = 0
#16 0x000055ab79e53158 in lval_pvar_assign (h=0x7fff2b35c6d0, msg=0x7ff29c40a148, lv=0x7ff29c2a5c10, rv=0x7ff29c2a5ee0) at core/lvalue.c:284
        pvar = 0x7ff29c2a5a30
        pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 24}
        r_avp = 0x12b35acc0
        avp_val = {n = 724938160, s = {s = 0x7fff2b35adb0 "p\264\065+\377\177", len = 2045964241}, re = 0x7fff2b35adb0}
        ret = 0
        v = 0
        destroy_pval = 0
        __func__ = "lval_pvar_assign"
#17 0x000055ab79e5468a in lval_assign (h=0x7fff2b35c6d0, msg=0x7ff29c40a148, lv=0x7ff29c2a5c10, rve=0x7ff29c2a5ed8) at core/lvalue.c:400
        rv = 0x7ff29c2a5ee0
        ret = -1
        __func__ = "lval_assign"
#18 0x000055ab79d8d7b9 in do_action (h=0x7fff2b35c6d0, a=0x7ff29c2a6608, msg=0x7ff29c40a148) at core/action.c:1455
        ret = -5
        v = 21931
        dst = {send_sock = 0x55ab79df3ff6 <ksr_slog_json>, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000\210`\017\234\362\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\210`\017\234\362\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\210`\017\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {24712, 39951, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618253448, 32754, 36, 0}}}, sin6_scope_id = 2619998056}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000\210`\017\234\362\177\000\000$\000\000\000\000\000\000\000h\377)\234\362\177\000\000\270^\335\253\361\177\000\000\366?\337y\a\000\000\000H\203\016\257\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, " \263\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 0}}, id = 724939680, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "98f7801b-b9ba-4344-a6cf-0c08633d596f"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35b420 "P\264\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x20000000
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35b090 "\200\261\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35b180 "\020\262\065+\377\177", len = -1700679327}, host = {s = 0x7fff2b35b0c0 "P\262\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35b250 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1358003384}, headers = {s = 0x7fff2b35b1f0 "", len = 2049350276}, port_no = 8148, proto = 31283, type = 21931, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c2a50b0 "b\004", len = -1358003384}, ttl = {s = 0x7fff2b35b15c "\001", len = 0}, user_param = {s = 0x7fff2b35b170 "", len = -1684890055}, maddr = {s = 0x7fff2b35b160 "\366?\337y\253U", len = 724940152}, method = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1700424444}, lr = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35b210 "\210`\017\234\362\177", len = 724939680}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35b270 " \263\065+\377\177", len = -1700401500}, maddr_val = {s = 0x0, len = 724939680}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35af30 "P\257\065+\377\177", len = 2045519573}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c12cb80 "98f7801b-b9ba-4344-a6cf-0c08633d596f", len = 36}, port = {s = 0x7fff2b35af50 "\001", len = -1411555656}, params = {s = 0x700000000 <error: Cannot access memory at address 0x700000000>, len = 0}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, headers = {s = 0x0, len = 0}, port_no = 44976, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59504), transport = {s = 0x7fff2b35afb0 "`\260\065+\377\177", len = -1700641618}, ttl = {s = 0x67a269a60 <error: Cannot access memory at address 0x67a269a60>, len = -1700319957}, user_param = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = 0}, maddr = {s = 0x7fff2b35b060 "\200\260\065+\377\177", len = -1700603816}, method = {s = 0x0, len = 75811}, lr = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7ff29c0f4020 "98f7801b-b9ba-4344-a6cf-0c08633d596f", len = 36}, transport_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, user_param_val = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1358003384}, maddr_val = {s = 0x12b35b070 <error: Cannot access memory at address 0x12b35b070>, len = -1700424444}, method_val = {s = 0x7fff2b35b070 "\200\261\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700424444}, r2_val = {s = 0x7fff2b35b080 "\220\260\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35b180 "\020\262\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35b450
        port = 0
        dst_host = 0x0
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = 724938736, s = {s = 0x7fff2b35aff0 " @\017\234\362\177", len = -1676046496}, re = 0x7fff2b35aff0}, avp = 0x7ff29c40a148}
        sct = 0x7ff29c3d2880
        sjt = 0x179f32685
        rve = 0x55ab79f295e9 <rval_get_int+314>
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724938528, val_type = 32767, c = {avp_val = {n = 0, s = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, re = 0x100000000}, pval = {rs = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, ri = 536870912, flags = 0}}, i2s = '\000' <repeats 16 times>, "p\257\065+\377\177"}
        s = {s = 0x700000000 <error: Cannot access memory at address 0x700000000>, len = -1358003384}
        srevp = {0x55ab79df3ff6 <ksr_slog_json>, 0x7ff1abdd5eb8}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#19 0x000055ab79d8f89f in run_actions (h=0x7fff2b35c6d0, a=0x7ff29c2a6608, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2a6608
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 2594325678
        __func__ = "run_actions"
#20 0x000055ab79d80f8a in do_action (h=0x7fff2b35c6d0, a=0x7ff29c2a6cb0, msg=0x7ff29c40a148) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x7ff29c40a148, to = {s = {sa_family = 49214, sa_data = "L\232\361\177\000\000P\377\016\234\362\177\000"}, sin = {sin_family = 49214, sin_port = 39500, sin_addr = {s_addr = 32753}, sin_zero = "P\377\016\234\362\177\000"}, sin6 = {sin6_family = 49214, sin6_port = 39500, sin6_flowinfo = 32753, sin6_addr = {__in6_u = {__u6_addr8 = "P\377\016\234\362\177\000\000$\000\000\000\377\177\000", __u6_addr16 = {65360, 39950, 32754, 0, 36, 0, 32767, 0}, __u6_addr32 = {2618228560, 32754, 36, 32767}}}, sin6_scope_id = 2588721211}, sas = {ss_family = 49214, __ss_padding = "L\232\361\177\000\000P\377\016\234\362\177\000\000$\000\000\000\377\177\000\000;\300L\232\361\177\000\000\270^\335\253\361\177\000\000\240\201'\274\a\000\000\000H\203\016\257\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "p\273\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 94192927768586}}, id = 724941808, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "98f7801b-b9ba-4344-a6cf-0c08633d596f"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35bc70 "\240\274\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x20000000
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35b8e0 "\320\271\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35b9d0 "`\272\065+\377\177", len = -1700679327}, host = {s = 0x7ff29c13ef28 "98f7801b-b9ba-4344-a6cf-0c08633d596f", len = 32}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x6400000001 <error: Cannot access memory at address 0x6400000001>, len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1358003384}, headers = {s = 0x0, len = 2045525429}, port_no = 47472, proto = 11061, type = 32767, flags = (unknown: 0x2b35bd48), transport = {s = 0x7fff2b35b970 "\300\275\065+\377\177", len = -1358003384}, ttl = {s = 0x0, len = 724942144}, user_param = {s = 0x7fff2b35bdc0 "\300\276\065+\377\177", len = 2045950421}, maddr = {s = 0x0, len = 0}, method = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1700424444}, lr = {s = 0x7ff29c40a148 "\345\257", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35ba60 "P\377\016\234\362\177", len = 724941808}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35bac0 "p\273\065+\377\177", len = -1700401500}, maddr_val = {s = 0x0, len = 724941808}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b35ba40 "", len = 2045930574}, r2_val = {s = 0x0, len = -1674566736}, gr_val = {s = 0x0, len = -1674539320}}
        next_hop = {user = {s = 0x3641b0 <error: Cannot access memory at address 0x3641b0>, len = 8}, passwd = {s = 0x5f <error: Cannot access memory at address 0x5f>, len = -1676980208}, host = {s = 0x7fff2b35b7a0 "\001", len = 2044739546}, port = {s = 0x0, len = 2048839412}, params = {s = 0x7fff2b35b890 "\300\270\065+\377\177", len = 2047222937}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, headers = {s = 0x7ff29c2ed290 "", len = 0}, port_no = 47104, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59504), transport = {s = 0x7fff2b35b800 "\260\270\065+\377\177", len = -1700641618}, ttl = {s = 0x6000003a8 <error: Cannot access memory at address 0x6000003a8>, len = -1700319957}, user_param = {s = 0x7ff29c2ed290 "", len = 0}, maddr = {s = 0x7fff2b35b8b0 "\320\270\065+\377\177", len = -1700603816}, method = {s = 0x0, len = 75811}, lr = {s = 0x7ff29c2ed278 "\021", len = -1673486008}, r2 = {s = 0x0, len = 1}, gr = {s = 0x7fff2b35b940 "p\271\065+\377\177", len = -1675096040}, transport_val = {s = 0x0, len = -1676980208}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, user_param_val = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1358003384}, maddr_val = {s = 0x12b35b8c0 <error: Cannot access memory at address 0x12b35b8c0>, len = -1700424444}, method_val = {s = 0x7fff2b35b8c0 "\320\271\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700424444}, r2_val = {s = 0x7fff2b35b8d0 "\340\270\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35b9d0 "`\272\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35bca0
        port = 0
        dst_host = 0xd68
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 2620375944, id = 32754, name = {n = 0, s = {s = 0x0, len = 536870912}, re = 0x0}, avp = 0x1fcca6f0}
        sct = 0x7ff29c3d2880
        sjt = 0x100000018
        rve = 0x7ff29c2a5200
        mct = 0x7ff29c40a148
        rv = 0x7ff29bbf094a <pkg_proc_update_stats+115>
        rv1 = 0x20000000
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 2047264002, s = {s = 0x55ab7a06c502 <qm_info+46> "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b", len = 724940592}, re = 0x55ab7a06c502 <qm_info+46>}, pval = {rs = {s = 0x55ab7a06c502 <qm_info+46> "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b", len = 724940592}, ri = -1676980208, flags = 32754}}, i2s = "\030\020(\234\362\177\000\000\020P\v\234\362\177\000\000p\267\065+\377\177"}
        s = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}
        srevp = {0xe00000003, 0x100000000}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x000055ab79d8f89f in run_actions (h=0x7fff2b35c6d0, a=0x7ff29c29e9c0, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2a6cb0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1674539312, tz_dsttime = 32754}
        tdiff = 2594287969
        __func__ = "run_actions"
#22 0x000055ab79d7d151 in do_action (h=0x7fff2b35c6d0, a=0x7ff29c20fb18, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x7ff29c35d900, to = {s = {sa_family = 20496, sa_data = "\v\234\362\177\000\000\230\244\020\234\362\177\000"}, sin = {sin_family = 20496, sin_port = 39947, sin_addr = {s_addr = 32754}, sin_zero = "\230\244\020\234\362\177\000"}, sin6 = {sin6_family = 20496, sin6_port = 39947, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "\230\244\020\234\362\177\000\000$\000\000\000\253U\000", __u6_addr16 = {42136, 39952, 32754, 0, 36, 0, 21931, 0}, __u6_addr32 = {2618336408, 32754, 36, 21931}}}, sin6_scope_id = 2620386656}, sas = {ss_family = 20496, __ss_padding = "\v\234\362\177\000\000\230\244\020\234\362\177\000\000$\000\000\000\253U\000\000`\355/\234\001\000\000\000\270^\335\253\361\177\000\000H\241@\234\a\000\000\000H\203\016\257\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\300\303\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679979587840}}, id = 724943936, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "98f7801b-b9ba-4344-a6cf-0c08633d596f"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35c4c0 "\360\304\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29c40a148
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35c130 " \302\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35c220 "\260\302\065+\377\177", len = -1700679327}, host = {s = 0x2534b0 <error: Cannot access memory at address 0x2534b0>, len = 0}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1358003384}, headers = {s = 0x3000000020 <error: Cannot access memory at address 0x3000000020>, len = 724943456}, port_no = 37608, proto = 45258, type = 32753, flags = (unknown: 0xb0ca92d8), transport = {s = 0x7fff2b35c2b0 "\230\244\020\234\362\177", len = -1358003384}, ttl = {s = 0x7fff2b35c1f0 "", len = -1676980208}, user_param = {s = 0x7ff29c35d948 " \002", len = -1676980208}, maddr = {s = 0x7fff2b35c230 "x\217\031\234\362\177", len = -1681979062}, method = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1700424444}, lr = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35c2b0 "\230\244\020\234\362\177", len = 724943936}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35c310 "\300\303\065+\377\177", len = -1700401500}, maddr_val = {s = 0x549c0b6e10 <error: Cannot access memory at address 0x549c0b6e10>, len = 724943936}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab7a331e80 <def_list> "\330\222\312\260\361\177", len = 631518}, r2_val = {s = 0x55ab7a18557b "core", len = 0}, gr_val = {s = 0x55ab7a185608 <__func__.3> "do_action", len = 2048418986}}
        next_hop = {user = {s = 0x7fff2b35c0a0 "\360\300\065+\377\177", len = 2047222937}, passwd = {s = 0x7fff2b35c0a0 "\360\300\065+\377\177", len = 2047223133}, host = {s = 0x14 <error: Cannot access memory at address 0x14>, len = 724942848}, port = {s = 0x55ab7a1e6cea "core", len = 724943232}, params = {s = 0x55ab7a1e6df8 <__func__.17> "create_avp", len = 2048814319}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, headers = {s = 0x7ff2fbad8001 <error: Cannot access memory at address 0x7ff2fbad8001>, len = 724943600}, port_no = 49232, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59504), transport = {s = 0x7fff2b35c050 "", len = -1700641618}, ttl = {s = 0x62b35c304 <error: Cannot access memory at address 0x62b35c304>, len = -1700319957}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, maddr = {s = 0x7fff2b35c100 " \301\065+\377\177", len = -1700603816}, method = {s = 0x2b35c0a0 <error: Cannot access memory at address 0x2b35c0a0>, len = 75811}, lr = {s = 0x7fff2b35c0a0 "\360\300\065+\377\177", len = 2047209688}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1705654584}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35c0f0 "", len = 2047274097}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, user_param_val = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1358003384}, maddr_val = {s = 0x12b35c110 <error: Cannot access memory at address 0x12b35c110>, len = -1700424444}, method_val = {s = 0x7fff2b35c110 " \302\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700424444}, r2_val = {s = 0x7fff2b35c120 "0\301\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35c220 "\260\302\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35c4f0
        port = 0
        dst_host = 0x20000000
        i = 19
        flags = 21931
        avp = 0x0
        st = {flags = 2966065824, id = 32753, name = {n = -1705889792, s = {s = 0x7ff19a523000 "", len = -1676688960}, re = 0x7ff19a523000}, avp = 0xd}
        sct = 0x7ff29c3d2880
        sjt = 0x1ffffffff
        rve = 0x0
        mct = 0x7ff29c40a148
        rv = 0x58
        rv1 = 0x20000000
        c1 = {cache_type = 2618920824, val_type = 32754, c = {avp_val = {n = -1673486008, s = {s = 0x7ff29c40a148 "\345\257", len = 1}, re = 0x7ff29c40a148}, pval = {rs = {s = 0x7ff29c40a148 "\345\257", len = 1}, ri = -1700424444, flags = 32753}}, i2s = "\000\000\000\000\260\000\000\000a\334\036z\253U\000\000\357l\036z\253U"}
        s = {s = 0x12 <error: Cannot access memory at address 0x12>, len = 724943120}
        srevp = {0x7ff1b0ca92a0, 0x7ff19a523000}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#23 0x000055ab79d8f89f in run_actions (h=0x7fff2b35c6d0, a=0x7ff29c20fb18, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c20fb18
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 1}
        tdiff = 2594287969
        __func__ = "run_actions"
#24 0x000055ab79d8ff8d in run_actions_safe (h=0x7fff2b35e4e0, a=0x7ff29c20fb18, msg=0x7ff29c40a148) at core/action.c:1645
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614605418691694, 94194972442614, 536870912, 0, 0, -2564614605368360046, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {536870912, 0, 0, 140733918332880, 140733918333280, 140679977734008, 140679980294472, 140733918332976, 140679953378980, 140679978210952, 140733918333280, 140679977734008, 140679980294472, 140733918333408, 140679978210952, 140679980295248}}}}}
        ret = -1673486008
        ign_on_break = 0
#25 0x000055ab79f295e9 in rval_get_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, i=0x7fff2b35cb74, rv=0x7ff29c20fc70, cache=0x0) at core/rvalue.c:949
        r_avp = 0x7ff29c37f390
        avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}
        pval = {rs = {s = 0x7ff29c198f60 "\026", len = -1673486008}, ri = 0, flags = 1}
        tmp = {s = 0x0, len = 724945248}
        s = 0x0
        r = -1674088120
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#26 0x000055ab79f2e7da in rval_expr_eval_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, res=0x7fff2b35cb74, rve=0x7ff29c20fc68) at core/rvalue.c:1947
        i1 = 32754
        i2 = -1673713536
        ret = -1
        c1 = {cache_type = 2044674038, val_type = 21931, c = {avp_val = {n = 536870912, s = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, re = 0x20000000}, pval = {rs = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, ri = 0, flags = 0}}, i2s = "\020\312\065+\377\177\000\000\325&\354y\253U\000\000h\236&z\253U"}
        c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = -1676212696, s = {s = 0x7ff29c170628 "\r\267L\232\361\177", len = 724945440}, re = 0x7ff29c170628}, pval = {rs = {s = 0x7ff29c170628 "\r\267L\232\361\177", len = 724945440}, ri = 2049350276, flags = 21931}}, i2s = '\000' <repeats 12 times>, "$\000\000\000h\326 \234\362\177"}
        rv1 = 0x55ab79ec3db5 <pv_value_destroy+183>
        rv2 = 0x400000000
        __func__ = "rval_expr_eval_int"
#27 0x000055ab79f2ecf0 in rval_expr_eval_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, res=0x7fff2b35d0b4, rve=0x7ff29c210ac8) at core/rvalue.c:1980
        i1 = 6
        i2 = 0
        ret = -1
        c1 = {cache_type = RV_CACHE_PVAR, val_type = RV_NONE, c = {avp_val = {n = -1700424444, s = {s = 0x19aa59504 <error: Cannot access memory at address 0x19aa59504>, len = -1700424464}, re = 0x19aa59504}, pval = {rs = {s = 0x19aa59504 <error: Cannot access memory at address 0x19aa59504>, len = -1700424464}, ri = -1358003384, flags = 0}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 724945888, val_type = 32767, c = {avp_val = {n = -1700678896, s = {s = 0x7ff29aa1b310 <dlg_lookup_msg_dialog+478> "\203\370\002\017\216\317\003", len = 0}, re = 0x7ff29aa1b310 <dlg_lookup_msg_dialog+478>}, pval = {rs = {s = 0x7ff29aa1b310 <dlg_lookup_msg_dialog+478> "\203\370\002\017\216\317\003", len = 0}, ri = 2048485859, flags = 21931}}, i2s = "\000\000\000\000\006\000\000\000\033\230\247\232\362\177\000\000\227\201\201\233\362\177"}
        rv1 = 0xb4300012823
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#28 0x000055ab79d80a74 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c2118a0, msg=0x7ff29c40a148) at core/action.c:1052
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 41288, sa_data = "@\234\362\177\000\000\060\204\020\234\362\177\000"}, sin = {sin_family = 41288, sin_port = 40000, sin_addr = {s_addr = 32754}, sin_zero = "0\204\020\234\362\177\000"}, sin6 = {sin6_family = 41288, sin6_port = 40000, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "0\204\020\234\362\177\000\000$\000\000\000\362\177\000", __u6_addr16 = {33840, 39952, 32754, 0, 36, 0, 32754, 0}, __u6_addr32 = {2618328112, 32754, 36, 32754}}}, sin6_scope_id = 724947040}, sas = {ss_family = 41288, __ss_padding = "@\234\362\177\000\000\060\204\020\234\362\177\000\000$\000\000\000\362\177\000\000`\320\065+\377\177\000\000\270^\335\253\361\177\000\000\366?\337y\a\000\000\000H\203\016\257\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\321\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679978161920}}, id = 724947376, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "98f7801b-b9ba-4344-a6cf-0c08633d596f"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35d230 "`\322\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x0
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700679327}, host = {s = 0x7ff29ba43694 <trim+36> "\220\311\303UH\211\345AWAVAUATSH\203\354X\350\243\273\376\377\211E\310\203}\310", len = 0}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1358003384}, headers = {s = 0x7fff2b35d5b0 "\001", len = 2049350246}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c284970 "\n\004", len = -1358003384}, ttl = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, user_param = {s = 0x55ab7a321ee2 <buf+130> "z9hG4bK-28104-120434-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag00120434\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1040.sip-review.test.com:5060>\r\nCall-I"..., len = 22}, maddr = {s = 0x55ab7a321f38 <buf+216> "28104SIPpTag00120434\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1040.sip-review.test.com:5060>\r\nCall-ID: 120434-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:"..., len = 20}, method = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1700424444}, lr = {s = 0x55ab7a321fd0 <buf+368> "INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test\r\nContent-Type: application/sdp\r\nContent-Length:   135\r\nTH: dih\r\n\r\nv=0\r\no=user1 53655765 2353687637 IN "..., len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d020 "0\204\020\234\362\177", len = 724947376}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d080 "0\321\065+\377\177", len = -1700401500}, maddr_val = {s = 0x0, len = 724947376}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35d030 "`\320\065+\377\177", len = -1683738574}}
        next_hop = {user = {s = 0x7fff2b35cf40 "8\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x0, len = -1673486008}, port = {s = 0x7fff2b35cd60 "\001", len = 0}, params = {s = 0x700000000 <error: Cannot access memory at address 0x700000000>, len = -1358003384}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, headers = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, port_no = 52672, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59504), transport = {s = 0x7fff2b35cdc0 "p\316\065+\377\177", len = -1700641618}, ttl = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700319957}, user_param = {s = 0x7ff29c198f60 "\026", len = 0}, maddr = {s = 0x7fff2b35ce70 "\220\316\065+\377\177", len = -1700603816}, method = {s = 0x2b35cea0 <error: Cannot access memory at address 0x2b35cea0>, len = 75811}, lr = {s = 0x72 <error: Cannot access memory at address 0x72>, len = -1673486008}, r2 = {s = 0x7fff2b35cf1c "\361\177", len = 724946720}, gr = {s = 0x7fff2b35cf30 "\342\036\062z\253U", len = 724946752}, transport_val = {s = 0x7fff2b35cf40 "8\037\062z\253U", len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, user_param_val = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1358003384}, maddr_val = {s = 0x12b35ce80 <error: Cannot access memory at address 0x12b35ce80>, len = -1700424444}, method_val = {s = 0x7fff2b35ce80 "\220\317\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700424444}, r2_val = {s = 0x7fff2b35ce90 "\240\316\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35d260
        port = 0
        dst_host = 0x0
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = -1673486008, s = {s = 0x7ff29c40a148 "\345\257", len = -1676046496}, re = 0x7ff29c40a148}, avp = 0x7fff2b35cf1c}
        sct = 0x7ff29c3d2880
        sjt = 0x12b35d9a0
        rve = 0x7ff29c210ac8
        mct = 0x7ff29c40a148
        rv = 0x7fff2b35cec0
        rv1 = 0x20000000
        c1 = {cache_type = 724946112, val_type = 32767, c = {avp_val = {n = 724946624, s = {s = 0x7fff2b35cec0 "", len = -1676046472}, re = 0x7fff2b35cec0}, pval = {rs = {s = 0x7fff2b35cec0 "", len = -1676046472}, ri = -1673486008, flags = 32754}}, i2s = "\220\315\065+\377\177\000\000\306\356\245\232\362\177\000\000\200\315\065+\377\177"}
        s = {s = 0x0, len = 0}
        srevp = {0x55ab79df3ff6 <ksr_slog_json>, 0x20000000}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#29 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c20c390, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2118a0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1358003384, tz_dsttime = 0}
        tdiff = 2594542852
        __func__ = "run_actions"
#30 0x000055ab79d7d151 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c202230, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 21931
        dst = {send_sock = 0x55ab79df3ff6 <ksr_slog_json>, to = {s = {sa_family = 0, sa_data = "\000 ", '\000' <repeats 11 times>}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 724949200}, sas = {ss_family = 0, __ss_padding = "\000 ", '\000' <repeats 20 times>, "\320\330\065+\377\177\000\000\000\000\000\000\000\000\000\000\366?\337y\a\000\000\000H\203\016\257\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\200\331\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 0}}, id = 724949504, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "98f7801b-b9ba-4344-a6cf-0c08633d596f"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35da80 "\260\332\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7fff2b35db9c
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35d7e0 "", len = -1700679327}, host = {s = 0x7fff2b35d720 "\260\330\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d8b0 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1358003384}, headers = {s = 0x7ff29c40a148 "\345\257", len = 724952288}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c201700 "J\002", len = -1358003384}, ttl = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, user_param = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, maddr = {s = 0x7fff2b35d7c0 "\366?\337y\253U", len = 2045519573}, method = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1700424444}, lr = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d800 "\320\330\065+\377\177", len = 724949504}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d8d0 "\200\331\065+\377\177", len = -1700401466}, maddr_val = {s = 0x7fff2b35d980 "\200\332\065+\377\177", len = 724949504}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b35d980 "\200\332\065+\377\177", len = 2045978245}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35d590 "", len = 2045519573}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 0}, host = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, port = {s = 0x0, len = 0}, params = {s = 0x7fff2b35d5f0 "`\232&z\006", len = 0}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, headers = {s = 0x0, len = 0}, port_no = 54800, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59504), transport = {s = 0x7fff2b35d610 "\300\326\065+\377\177", len = -1700641618}, ttl = {s = 0x67a269a60 <error: Cannot access memory at address 0x67a269a60>, len = -1700319957}, user_param = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = 0}, maddr = {s = 0x7fff2b35d6c0 "\340\326\065+\377\177", len = -1700603816}, method = {s = 0x2b35d6f0 <error: Cannot access memory at address 0x2b35d6f0>, len = 75811}, lr = {s = 0x7ff29c1fd7c8 "\001", len = -1673486008}, r2 = {s = 0x7ff1ad6b2198 "\020", len = 1}, gr = {s = 0x55ab7a285ed0 <pv_str_null_buf> "<null>", len = 6}, transport_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2045514394}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, user_param_val = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1358003384}, maddr_val = {s = 0x12b35d6d0 <error: Cannot access memory at address 0x12b35d6d0>, len = -1700424444}, method_val = {s = 0x7fff2b35d6d0 "\340\327\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700424444}, r2_val = {s = 0x7fff2b35d6e0 "\360\326\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35d7e0 "", len = -1700582475}}
        u = 0x7fff2b35dab0
        port = 0
        dst_host = 0x0
        i = 5
        flags = 0
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = 724948560, s = {s = 0x7fff2b35d650 "\320^(z\253U", len = -1676046496}, re = 0x7fff2b35d650}, avp = 0x7ff29c40a148}
        sct = 0x7ff29c3d2880
        sjt = 0x19ba6d31a
        rve = 0x55ab79f295e9 <rval_get_int+314>
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724948240, val_type = 32767, c = {avp_val = {n = 0, s = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, re = 0x100000000}, pval = {rs = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, ri = 536870912, flags = 0}}, i2s = '\000' <repeats 16 times>, "\320\325\065+\377\177"}
        s = {s = 0x700000000 <error: Cannot access memory at address 0x700000000>, len = -1358003384}
        srevp = {0x55ab79df3ff6 <ksr_slog_json>, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#31 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c202230, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c202230
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 536870912, tz_dsttime = 0}
        tdiff = 2619288264
        __func__ = "run_actions"
#32 0x000055ab79d80f8a in do_action (h=0x7fff2b35e4e0, a=0x7ff29c2024d0, msg=0x7ff29c40a148) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x55ab7a321ed3 <buf+115>, to = {s = {sa_family = 4, sa_data = "\000\000\000\000\316\023\000\000\000\000\000\000\000"}, sin = {sin_family = 4, sin_port = 0, sin_addr = {s_addr = 332267520}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 4, sin6_port = 0, sin6_flowinfo = 332267520, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000,\235\016z\a\000\000", __u6_addr16 = {0, 0, 0, 0, 40236, 31246, 7, 0}, __u6_addr32 = {0, 0, 2047778092, 7}}}, sin6_scope_id = 2594542832}, sas = {ss_family = 4, __ss_padding = "\000\000\000\000\316\023\000\000\000\000\000\000\000\000,\235\016z\a\000\000\000\360\224\245\232\361\177", '\000' <repeats 14 times>, "\a\000\000\000H\203\016\257\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\320\341\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140733918339568}}, id = 724951632, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "98f7801b-b9ba-4344-a6cf-0c08633d596f"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35e2d0 ""
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29c1608b0
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35e030 "P\340\065+\377\177", len = -1700679327}, host = {s = 0x7fff2b35df80 "U\004", len = 2044739546}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x55ab7a321f4d <buf+237> "\nTo: +351888888888 <sip:+351888888888 at load-tests-1040.sip-review.test.com:5060>\r\nCall-ID: 120434-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 6"..., len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1358003384}, headers = {s = 0x7fff2b35e0c0 "", len = 2047722808}, port_no = 44642, proto = 31263, type = 21931, flags = (URI_SIP_USER_PHONE | unknown: 0x79e03fd8), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1358003384}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab7a321f38 <buf+216> "28104SIPpTag00120434\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1040.sip-review.test.com:5060>\r\nCall-ID: 120434-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:"..., len = 20}, maddr = {s = 0x55ab7a321fad <buf+333> "120434-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test\r\nContent-Type: application/sdp\r\nContent-Length:   135\r\nTH: dih\r\n\r\nv"..., len = 25}, method = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1700424444}, lr = {s = 0x7fff2b35e290 "", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35e050 " \341\065+\377\177", len = 724951632}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35e120 "\320\341\065+\377\177", len = -1700401466}, maddr_val = {s = 0x7fff2b35e290 "", len = 724951632}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x500000000000000 <error: Cannot access memory at address 0x500000000000000>, len = 724951352}, r2_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1673486008}, gr_val = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 2050105043}}
        next_hop = {user = {s = 0x7fff2b35dfe0 "\255\037\062z\253U", len = 0}, passwd = {s = 0x7ff29c198460 "\001", len = 0}, host = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 2048875599}, port = {s = 0x0, len = -1673486008}, params = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = 2047406657}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, headers = {s = 0x7ff29c1aaac0 "\350", len = 724950980}, port_no = 56928, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59504), transport = {s = 0x7fff2b35de60 "\020\337\065+\377\177", len = -1700641618}, ttl = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700319957}, user_param = {s = 0x679df3ff6 <error: Cannot access memory at address 0x679df3ff6>, len = 0}, maddr = {s = 0x7fff2b35df10 "0\337\065+\377\177", len = -1700603816}, method = {s = 0x2b35df40 <error: Cannot access memory at address 0x2b35df40>, len = 75811}, lr = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35dfbc "\361\177", len = 724950976}, gr = {s = 0x7fff2b35dfd0 "8\037\062z\253U", len = 724951008}, transport_val = {s = 0x7fff2b35dfe0 "\255\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700424444}, user_param_val = {s = 0x7ff19aa594f0 "0\276V\261\361\177", len = -1358003384}, maddr_val = {s = 0x12b35df20 <error: Cannot access memory at address 0x12b35df20>, len = -1700424444}, method_val = {s = 0x7fff2b35df20 "0\340\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700424444}, r2_val = {s = 0x7fff2b35df30 "@\337\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35e030 "P\340\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35e300
        port = 0
        dst_host = 0x7ff29c40a148
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 65537, id = 81, name = {n = 2050104928, s = {s = 0x55ab7a321e60 <buf> "INVITE sip:+351888888888 at load-tests-1040.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120434-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"..., len = 6}, re = 0x55ab7a321e60 <buf>}, avp = 0x7fff2b35dfbc}
        sct = 0x7ff29c3d2880
        sjt = 0x19aa1b310
        rve = 0x7ff29c201938
        mct = 0x7ff29c40a148
        rv = 0x0
        rv1 = 0x20000000
        c1 = {cache_type = 724950976, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, ri = -1319715280, flags = 1}}, i2s = "p\336\065+\377\177\000\000\274\362\242\232\362\177\000\000\000\000\000\000\000"}
        s = {s = 0x7fff2b35dd60 "p\336\065+\377\177", len = -1700641618}
        srevp = {0x12b35dd60, 0x7ff19aa59504}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#33 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1ec068, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2024d0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1673486008, tz_dsttime = 32754}
        tdiff = 536870912
        __func__ = "run_actions"
#34 0x000055ab79d90055 in run_top_route (a=0x7ff29c1ec068, msg=0x7ff29c40a148, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {94194973861652, 4294967296, 140679980294472, 94192927768576, 4294967296, 94194972442614, 536870912, 0, 0, 140733918340528, 0, 4611686022722355200, 0, 140679980066944, 4294967296, 94194972442614}}}}}
        p = 0x7fff2b35e4e0
        ret = 0
        sfbk = 0
#35 0x000055ab79edcf35 in receive_msg (buf=0x55ab7a321e60 <buf> "INVITE sip:+351888888888 at load-tests-1040.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120434-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"..., len=667, rcv_info=0x7fff2b35eb50) at core/receive.c:501
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 724952880, run_flags = 32767, last_retcode = -1676980208, jmp_env = {{__jmpbuf = {140679977844384, 140679976800272, 140733918340976, 140679971801418, 140679976516045, 0, 536870912, 533529360}, __mask_was_saved = 2423224, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660308356, 94194976575339}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "INVITE sip:+351888888888 at load-tests-1040.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120434-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"..., len = 667}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "INVITE sip:+351888888888 at load-tests-1040.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120434-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"..., len = 651}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#36 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 651
        buf = "INVITE sip:+351888888888 at load-tests-1040.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120434-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {2842882083, 0}, addr32 = {2842882083, 0, 0, 0}, addr16 = {61475, 43378, 0, 0, 0, 0, 0, 0}, addr = "#\360r\251", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {4066168099, 0}, addr32 = {4066168099, 0, 0, 0}, addr16 = {52515, 62044, 0, 0, 0, 0, 0, 0}, addr = "#\315\\\362", '\000' <repeats 11 times>}}, src_port = 5070, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\316#\360r\251\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 52755, sin_addr = {s_addr = 2842882083}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 52755, sin6_flowinfo = 2842882083, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\316#\360r\251", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14e530, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\204\337\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\003\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 3
        __func__ = "udp_rcv_loop"
#37 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 2
        pid = 0
        si = 0x7ff29c14e530
        si_desc = "udp receiver child=2 sock=90.30.20.32:5060\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#38 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 7) detached]
---end 7 -------------------------------------------------------

---start 8 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35b920, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35b920, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35b920, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1b63be1a0, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b2c3fc0, flags = 0, buf = {s = 0x55ab7b2c8260 "{\"action\":2,\"h_entry\":262,\"h_id\":2722,\"state\":4,\"start_ts\":1640001510,\"lifetime\":43200,\"tag1\":\"28104SIPpTag00120379\",\"tag2\":\"1934SIPpTag01120484\",\"cseq1\":\"1\",\"cseq2\":\"0\",\"route_set1\":\"\",\"route_set2\":\""..., len = 328}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x0, flags = 0, buf = {s = 0x7fff2b35b9b0 "\200\273\065+\377\177", len = -1700916072}, malloc_fn = 0x7fff2b35b9b0, free_fn = 0x0}
        var = 0x0
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa21261 in dlg_onroute (req=0x7ff29c40a148, route_params=0x7fff2b35bbf0, param=0x0) at dlg_handlers.c:1559
        dlg = 0x7ff1b63be1a0
        iuid = 0x0
        val = {s = 0x55ab7a322093 <buf+563> "601.2aa>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120379;did=601.2aa>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 7}
        callid = {s = 0x55ab7a321fa6 <buf+326> "120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}
        ftag = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00120379\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1034.sip-review.test.com:5060>;tag=1934SIPpTag01120484\r\nCall-ID: 120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+35192"..., len = 20}
        ttag = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01120484\r\nCall-ID: 120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}
        h_entry = 262
        h_id = 2722
        new_state = 4
        old_state = 3
        unref = 0
        event = 6
        timeout = 43200
        reset = 1
        dir = 1
        ret = 0
        __func__ = "dlg_onroute"
#7  0x00007ff29b9f76dc in run_rr_callbacks (req=0x7ff29c40a148, rr_param=0x7fff2b35bcb0) at rr_cb.c:96
        l_param = {s = 0x55ab7a322069 <buf+521> "r2=on;lr=on;ftag=28104SIPpTag00120379;did=601.2aa>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120379;did=601.2aa>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 49}
        cbp = 0x7ff29c40fab8
        __func__ = "run_rr_callbacks"
#8  0x00007ff29b9e6a9d in after_loose (_m=0x7ff29c40a148, preloaded=0) at loose.c:989
        hdr = 0x7ff29c1a1680
        puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x55ab7a3220a2 <buf+578> "10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120379;did=601.2aa>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 12}, port = {s = 0x0, len = 0}, params = {s = 0x55ab7a3220af <buf+591> "r2=on;lr=on;ftag=28104SIPpTag00120379;did=601.2aa>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 49}, sip_params = {s = 0x55ab7a3220af <buf+591> "r2=on;lr=on;ftag=28104SIPpTag00120379;did=601.2aa>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 49}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x55ab7a3220b5 <buf+597> "lr=on;ftag=28104SIPpTag00120379;did=601.2aa>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 5}, r2 = {s = 0x55ab7a3220af <buf+591> "r2=on;lr=on;ftag=28104SIPpTag00120379;did=601.2aa>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 5}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x55ab7a3220b8 <buf+600> "on;ftag=28104SIPpTag00120379;did=601.2aa>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 2}, r2_val = {s = 0x55ab7a3220b2 <buf+594> "on;lr=on;ftag=28104SIPpTag00120379;did=601.2aa>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 2}, gr_val = {s = 0x0, len = 0}}
        rt = 0x7ff29c2816e8
        res = 1
        status = 1
        uri = {s = 0x55ab7a322057 <buf+503> "sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00120379;did=601.2aa>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120379;did=601.2aa>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 67}
        uri_is_myself = 1
        use_ob = 0
        rparams = {s = 0x55ab7a322069 <buf+521> "r2=on;lr=on;ftag=28104SIPpTag00120379;did=601.2aa>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120379;did=601.2aa>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 49}
        __func__ = "after_loose"
#9  0x00007ff29b9e7211 in loose_route_mode (_m=0x7ff29c40a148, _mode=0) at loose.c:1024
        ret = 0
        __func__ = "loose_route_mode"
#10 0x00007ff29b9f94e9 in w_loose_route (msg=0x7ff29c40a148, p1=0x0, p2=0x0) at rr_mod.c:278
No locals.
#11 0x000055ab79d8101e in do_action (h=0x7fff2b35c840, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1076
        ret = -5
        v = 0
        dst = {send_sock = 0x1, to = {s = {sa_family = 19812, sa_data = "\244\232\361\177\000\000(\342\017\234\362\177\000"}, sin = {sin_family = 19812, sin_port = 39588, sin_addr = {s_addr = 32753}, sin_zero = "(\342\017\234\362\177\000"}, sin6 = {sin6_family = 19812, sin6_port = 39588, sin6_flowinfo = 32753, sin6_addr = {__in6_u = {__u6_addr8 = "(\342\017\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {57896, 39951, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618286632, 32754, 36, 0}}}, sin6_scope_id = 724943984}, sas = {ss_family = 19812, __ss_padding = "\244\232\361\177\000\000(\342\017\234\362\177\000\000$\000\000\000\000\000\000\000p\304\065+\001\000\000\000\240w=\257\361\177\000\000 @\017\234\b\000\000\000\240\341;\266\361\177\000\000\000\000\000\000\004\000\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\305\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679977734008}}, id = 724944304, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "8fd384ac-f504-406c-ae7b-838b68c52217"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35c630 "`\306\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29c156c50
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35c390 " \304\065+\377\177", len = -1700678945}, host = {s = 0x7ff29c0f4020 "8fd384ac-f504-406c-ae7b-838b68c52217", len = 36}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7ff29c0f80f0 "8fd384ac-f504-406c-ae7b-838b68c52217", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1237589600}, headers = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1676250696}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x7a269a84), transport = {s = 0x0, len = -1237589600}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01120484\r\nCall-ID: 120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00120379\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1034.sip-review.test.com:5060>;tag=1934SIPpTag01120484\r\nCall-ID: 120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa44d50 "p~\213\264\361\177", len = -1700508316}, lr = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35c420 "(\342\017\234\362\177", len = 724944304}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35c480 "0\305\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35c4c0 "", len = 724944304}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7ff29c24b0b8 "J\003", len = 724944224}, r2_val = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35c340 "\246\037\062z\253U", len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x7fff2b35c220 "\001", len = -1700678945}, port = {s = 0x7ff29c0f80f0 "8fd384ac-f504-406c-ae7b-838b68c52217", len = -1673486008}, params = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1354926176}, sip_params = {s = 0x879df3ff6 <error: Cannot access memory at address 0x879df3ff6>, len = -1237589600}, headers = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = 0}, port_no = 19792, proto = 39588, type = 32753, flags = (unknown: 0x20000000), transport = {s = 0x0, len = -1237589600}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35c2a0 "\220\303\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35c2a0 "\220\303\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35c31c "\361\177", len = 724943648}, gr = {s = 0x7fff2b35c330 "\031\037\062z\253U", len = 724943680}, transport_val = {s = 0x7fff2b35c340 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700508316}, user_param_val = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr_val = {s = 0x12b35c280 <error: Cannot access memory at address 0x12b35c280>, len = -1700508316}, method_val = {s = 0x7fff2b35c280 "\220\303\065+\377\177", len = -1700641618}, lr_val = {s = 0x6b63be1a0 <error: Cannot access memory at address 0x6b63be1a0>, len = -1700508316}, r2_val = {s = 0x55ab7a269a60 <log_prefix_buf> "8fd384ac-f504-406c-ae7b-838b68c52217", len = 0}, gr_val = {s = 0x7fff2b35c390 " \304\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35c660
        port = 0
        dst_host = 0x0
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 724943120, id = 32767, name = {n = 724943568, s = {s = 0x7fff2b35c2d0 "\360\200\017\234\362\177", len = -1676046472}, re = 0x7fff2b35c2d0}, avp = 0x7fff2b35c31c}
        sct = 0x7ff29c3d2880
        sjt = 0x12b35e4e0
        rve = 0xdc68a89ab51d8392
        mct = 0x7ff29c40a148
        rv = 0x7ff29aa5eea4 <pv_get_dlg_variable+2524>
        rv1 = 0x20000000
        c1 = {cache_type = 724943648, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724943680}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724943680}, ri = -1237589600, flags = 1}}, i2s = "\320\301\065+\377\177\000\000\276\345\242\232\362\177\000\000\240\301\065+\377\177"}
        s = {s = 0x7fff2b35c0c0 "\320\301\065+\377\177", len = -1700641618}
        srevp = {0x12b35c0c0, 0x7ff19aa44d64}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x000055ab79d8f89f in run_actions (h=0x7fff2b35c840, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c24ef48
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1237589600, tz_dsttime = 1}
        tdiff = 2594325678
        __func__ = "run_actions"
#13 0x000055ab79d8ff8d in run_actions_safe (h=0x7fff2b35e4e0, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614605466926190, 94194972442614, 536870912, 0, 0, -2564614605416594542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 1, 4294967296, 94194972442614, 536870912, 0, 0, 140733918333520, 94194973731987, 26494749552, 94194977119848, 94194977118816, 7352344992, 140679978465592}}}}}
        ret = 724945776
        ign_on_break = 0
#14 0x000055ab79f295e9 in rval_get_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, i=0x7fff2b35d0b4, rv=0x7ff29c24f0a0, cache=0x0) at core/rvalue.c:949
        r_avp = 0x7ff29c40a148
        avp_val = {n = 724945424, s = {s = 0x7fff2b35ca10 "", len = 2045519573}, re = 0x7fff2b35ca10}
        pval = {rs = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 724947124}, ri = 0, flags = 0}
        tmp = {s = 0x439c20d668 <error: Cannot access memory at address 0x439c20d668>, len = 0}
        s = 0x0
        r = -1673713536
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#15 0x000055ab79f2e7da in rval_expr_eval_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, res=0x7fff2b35d0b4, rve=0x7ff29c24f098) at core/rvalue.c:1947
        i1 = 1
        i2 = 0
        ret = -1
        c1 = {cache_type = 1109, val_type = RV_INT, c = {avp_val = {n = -1237589600, s = {s = 0x5b63be1a0 <error: Cannot access memory at address 0x5b63be1a0>, len = 2044674038}, re = 0x5b63be1a0}, pval = {rs = {s = 0x5b63be1a0 <error: Cannot access memory at address 0x5b63be1a0>, len = 2044674038}, ri = 536870912, flags = 0}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 724945888, val_type = 32767, c = {avp_val = {n = -1700678945, s = {s = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429> "H\211E\310H\203}\310", len = -1676713848}, re = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429>}, pval = {rs = {s = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429> "H\211E\310H\203}\310", len = -1676713848}, ri = 36, flags = 21931}}, i2s = "\000\000\000\000\006\000\000\000\033\230\247\232\362\177\000\000\227\201\201\233\b"}
        rv1 = 0x0
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#16 0x000055ab79d80a74 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c25b240, msg=0x7ff29c40a148) at core/action.c:1052
        ret = -5
        v = 0
        dst = {send_sock = 0x55ab79df3ff6 <ksr_slog_json>, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000\300\301\017\234\362\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\300\301\017\234\362\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\300\301\017\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {49600, 39951, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618278336, 32754, 36, 0}}}, sin6_scope_id = 724947040}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000\300\301\017\234\362\177\000\000$\000\000\000\000\000\000\000`\320\065+\377\177\000\000\240w=\257\361\177\000\000\366?\337y\b\000\000\000\240\341;\266\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\321\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679978086672}}, id = 724947376, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "8fd384ac-f504-406c-ae7b-838b68c52217"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35d230 "`\322\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429>
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35ced0 "`\320\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d060 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1237589600}, headers = {s = 0x7fff2b35d5b0 "\366?\337y\253U", len = 2044186961}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c284970 "\n\004", len = -1237589600}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01120484\r\nCall-ID: 120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00120379\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1034.sip-review.test.com:5060>;tag=1934SIPpTag01120484\r\nCall-ID: 120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa44d50 "p~\213\264\361\177", len = -1700508316}, lr = {s = 0x87a321fd0 <error: Cannot access memory at address 0x87a321fd0>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d020 "\300\301\017\234\362\177", len = 724947376}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d080 "0\321\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35cff0 "", len = 724947376}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01120484\r\nCall-ID: 120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35cf40 "\246\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b35cd60 "\366?\337y\253U", len = -1673486008}, params = {s = 0x0, len = 0}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, headers = {s = 0x0, len = 0}, port_no = 19792, proto = 39588, type = 32753, flags = (URI_USER_NORMALIZE | unknown: 0x79ec1f4c), transport = {s = 0x0, len = -1237589600}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35cf1c "\361\177", len = 724946720}, gr = {s = 0x7fff2b35cf30 "\031\037\062z\253U", len = 724946752}, transport_val = {s = 0x7fff2b35cf40 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700508316}, user_param_val = {s = 0x7ff19aa5aad0 "\320\241\331\265\361\177", len = 2049350276}, maddr_val = {s = 0x12b35ce80 <error: Cannot access memory at address 0x12b35ce80>, len = -1700508316}, method_val = {s = 0x7fff2b35ce80 "\220\317\065+\377\177", len = -1700641618}, lr_val = {s = 0x6b63be1a0 <error: Cannot access memory at address 0x6b63be1a0>, len = -1700508316}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35d260
        port = 0
        dst_host = 0x0
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = 724946432, s = {s = 0x7fff2b35ce00 "0\317\065+\377\177", len = -1676046496}, re = 0x7fff2b35ce00}, avp = 0x7fff2b35cf1c}
        sct = 0x7ff29c3d2880
        sjt = 0x1b63be1a0
        rve = 0x7ff29c24f098
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724946720, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724946752}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724946752}, ri = -1237589600, flags = 1}}, i2s = "\320\315\065+\377\177\000\000\276\345\242\232\362\177\000\000\200\315\065+\377\177"}
        s = {s = 0x7fff2b35ccc0 "\320\315\065+\377\177", len = -1700641618}
        srevp = {0x12b35ccc0, 0x7ff19aa44d64}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#17 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c24a350, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c25b240
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 536870912, tz_dsttime = 0}
        tdiff = 19
        __func__ = "run_actions"
#18 0x000055ab79d7d151 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c1efa78, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 21931
        dst = {send_sock = 0x7fff2b35d8a0, to = {s = {sa_family = 20496, sa_data = "\v\234\362\177\000\000\210m\023\234\362\177\000"}, sin = {sin_family = 20496, sin_port = 39947, sin_addr = {s_addr = 32754}, sin_zero = "\210m\023\234\362\177\000"}, sin6 = {sin6_family = 20496, sin6_port = 39947, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "\210m\023\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {28040, 39955, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618518920, 32754, 36, 0}}}, sin6_scope_id = 2619264352}, sas = {ss_family = 20496, __ss_padding = "\v\234\362\177\000\000\210m\023\234\362\177\000\000$\000\000\000\000\000\000\000`\315\036\234\362\177\000\000\240w=\257\361\177\000\000\366?\337y\b\000\000\000\240\341;\266\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\200\331\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 0}}, id = 724949504, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "8fd384ac-f504-406c-ae7b-838b68c52217"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35da80 "\260\332\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x55ab7a06c502 <qm_info+46>
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35d7e0 "p\330\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35d720 "\260\330\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d8b0 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1237589600}, headers = {s = 0x7fff2b35d850 "", len = 2044264333}, port_no = 0, proto = 8192, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c1ef110 "\020\002", len = -1237589600}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01120484\r\nCall-ID: 120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00120379\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1034.sip-review.test.com:5060>;tag=1934SIPpTag01120484\r\nCall-ID: 120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa44d50 "p~\213\264\361\177", len = -1700508316}, lr = {s = 0xdc68a89a94fd8392 <error: Cannot access memory at address 0xdc68a89a94fd8392>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d870 "\210m\023\234\362\177", len = 724949504}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d8d0 "\200\331\065+\377\177", len = -1700401500}, maddr_val = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 724949504}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b35d8f0 "`\217\031\234\362\177", len = 2047586128}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35d790 "\246\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b35d5b0 "\366?\337y\253U", len = -1673486008}, params = {s = 0x0, len = 0}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, headers = {s = 0x0, len = 0}, port_no = 19792, proto = 39588, type = 32753, flags = (URI_USER_NORMALIZE | unknown: 0x79ec1f4c), transport = {s = 0x0, len = -1237589600}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35d76c "\361\177", len = 724948848}, gr = {s = 0x7fff2b35d780 "\031\037\062z\253U", len = 724948880}, transport_val = {s = 0x7fff2b35d790 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700508316}, user_param_val = {s = 0x55ab7a1f5c4f "core", len = 2049350276}, maddr_val = {s = 0x12b35d6d0 <error: Cannot access memory at address 0x12b35d6d0>, len = -1700508316}, method_val = {s = 0x7fff2b35d6d0 "\340\327\065+\377\177", len = -1700641618}, lr_val = {s = 0x6b63be1a0 <error: Cannot access memory at address 0x6b63be1a0>, len = -1700508316}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35d7e0 "p\330\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35dab0
        port = 0
        dst_host = 0x0
        i = 10
        flags = 32767
        avp = 0x0
        st = {flags = 2430864, id = 0, name = {n = 724948560, s = {s = 0x7fff2b35d650 "\200\327\065+\377\177", len = -1676046496}, re = 0x7fff2b35d650}, avp = 0x7fff2b35d76c}
        sct = 0x7ff29c3d2880
        sjt = 0x10000028f
        rve = 0x55ab79f295e9 <rval_get_int+314>
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724948848, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724948880}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724948880}, ri = -1237589600, flags = 1}}, i2s = " \326\065+\377\177\000\000\276\345\242\232\362\177\000\000\320\325\065+\377\177"}
        s = {s = 0x7fff2b35d510 " \326\065+\377\177", len = -1700641618}
        srevp = {0x12b35d510, 0x7ff19aa44d64}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#19 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1efa78, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c1efa78
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 2618935672
        __func__ = "run_actions"
#20 0x000055ab79d80f8a in do_action (h=0x7fff2b35e4e0, a=0x7ff29c1efe00, msg=0x7ff29c40a148) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x55ab7a321eb3 <buf+83>, to = {s = {sa_family = 42024, sa_data = "\032\234\362\177\000\000P\f\023\234\362\177\000"}, sin = {sin_family = 42024, sin_port = 39962, sin_addr = {s_addr = 32754}, sin_zero = "P\f\023\234\362\177\000"}, sin6 = {sin6_family = 42024, sin6_port = 39962, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "P\f\023\234\362\177\000\000$\000\000\000\b\000\000", __u6_addr16 = {3152, 39955, 32754, 0, 36, 0, 8, 0}, __u6_addr32 = {2618494032, 32754, 36, 8}}}, sin6_scope_id = 2594458960}, sas = {ss_family = 42024, __ss_padding = "\032\234\362\177\000\000P\f\023\234\362\177\000\000$\000\000\000\b\000\000\000PM\244\232\361\177\000\000\240w=\257\361\177\000\000\000\000\000\000\b\000\000\000\240\341;\266\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\320\341\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140733918339568}}, id = 724951632, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "8fd384ac-f504-406c-ae7b-838b68c52217"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35e2d0 ""
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x13
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35e030 "\300\340\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35df80 "U\004", len = 2044739546}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x55ab7a321f2e <buf+206> "\nTo: +351888888888 <sip:+351888888888 at load-tests-1034.sip-review.test.com:5060>;tag=1934SIPpTag01120484\r\nCall-ID: 120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:"..., len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1237589600}, headers = {s = 0x7fff2b35e0c0 "P\f\023\234\362\177", len = 0}, port_no = 44642, proto = 31263, type = 21931, flags = (unknown: 0x1fccd4d0), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1237589600}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01120484\r\nCall-ID: 120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00120379\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1034.sip-review.test.com:5060>;tag=1934SIPpTag01120484\r\nCall-ID: 120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "120379-28104 at 10.10.120.20\r\nCSeq: 1 ACK\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa44d50 "p~\213\264\361\177", len = -1700508316}, lr = {s = 0x7fff2b35e290 "", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35e0c0 "P\f\023\234\362\177", len = 724951632}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35e120 "\320\341\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35e290 "", len = 724951632}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x500000000000000 <error: Cannot access memory at address 0x500000000000000>, len = 724951352}, r2_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1673486008}, gr_val = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 1}}
        next_hop = {user = {s = 0x7fff2b35dfe0 "\246\037\062z\253U", len = 0}, passwd = {s = 0x7ff29c281050 "\001", len = 0}, host = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 2048875599}, port = {s = 0x0, len = -1673486008}, params = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = 2047406657}, sip_params = {s = 0x7ff29c35d730 "\004", len = -1676013072}, headers = {s = 0x7ff29c35d688 "\350", len = 724950980}, port_no = 19792, proto = 39588, type = 32753, flags = (unknown: 0x9c19c978), transport = {s = 0x0, len = -1237589600}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35dfbc "\361\177", len = 724950976}, gr = {s = 0x7fff2b35dfd0 "\031\037\062z\253U", len = 724951008}, transport_val = {s = 0x7fff2b35dfe0 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700508316}, user_param_val = {s = 0x7fff2b35df10 "", len = -1676980208}, maddr_val = {s = 0x12b35df20 <error: Cannot access memory at address 0x12b35df20>, len = -1700508316}, method_val = {s = 0x7fff2b35df20 "0\340\065+\377\177", len = -1700641618}, lr_val = {s = 0x6b63be1a0 <error: Cannot access memory at address 0x6b63be1a0>, len = -1700508316}, r2_val = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, gr_val = {s = 0x7fff2b35e030 "\300\340\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35e300
        port = 0
        dst_host = 0x7ff29c40a148
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 65537, id = 49, name = {n = 2050104928, s = {s = 0x55ab7a321e60 <buf> "ACK sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-120379-5\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 3}, re = 0x55ab7a321e60 <buf>}, avp = 0x7fff2b35dfbc}
        sct = 0x7ff29c3d2880
        sjt = 0x19aa1b2df
        rve = 0x7ff29c1ef260
        mct = 0x7ff29c40a148
        rv = 0x0
        rv1 = 0x20000000
        c1 = {cache_type = 724950976, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, ri = -1237589600, flags = 1}}, i2s = "p\336\065+\377\177\000\000\276\345\242\232\362\177\000\000\000\000\000\000\000"}
        s = {s = 0x7fff2b35dd60 "p\336\065+\377\177", len = -1700641618}
        srevp = {0x12b35dd60, 0x7ff19aa44d64}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1ec068, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c1efe00
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1673486008, tz_dsttime = 32754}
        tdiff = 536870912
        __func__ = "run_actions"
#22 0x000055ab79d90055 in run_top_route (a=0x7ff29c1ec068, msg=0x7ff29c40a148, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {94194973861652, 4294967296, 140679980294472, 94192927768577, 4294967296, 94194972442614, 536870912, 0, 0, 140733918340528, 0, 4611686022722355200, 0, 140679980066944, 4294967296, 94194972442614}}}}}
        p = 0x7fff2b35e4e0
        ret = 0
        sfbk = 0
#23 0x000055ab79edcf35 in receive_msg (buf=0x55ab7a321e60 <buf> "ACK sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-120379-5\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len=673, rcv_info=0x7fff2b35eb50) at core/receive.c:501
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 724952880, run_flags = 32767, last_retcode = -1676980208, jmp_env = {{__jmpbuf = {140679977844384, 140679976800272, 140733918340976, 140679971801418, 140679976516045, 0, 536870912, 533529360}, __mask_was_saved = 2423224, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660308504, 94194976575339}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "ACK sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-120379-5\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 673}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "ACK sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-120379-5\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 657}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#24 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 657
        buf = "ACK sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-120379-5\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {2842882083, 0}, addr32 = {2842882083, 0, 0, 0}, addr16 = {61475, 43378, 0, 0, 0, 0, 0, 0}, addr = "#\360r\251", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {4066168099, 0}, addr32 = {4066168099, 0, 0, 0}, addr16 = {52515, 62044, 0, 0, 0, 0, 0, 0}, addr = "#\315\\\362", '\000' <repeats 11 times>}}, src_port = 5070, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\316#\360r\251\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 52755, sin_addr = {s_addr = 2842882083}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 52755, sin6_flowinfo = 2842882083, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\316#\360r\251", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14e530, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\030\340\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\004\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 4
        __func__ = "udp_rcv_loop"
#25 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 3
        pid = 0
        si = 0x7ff29c14e530
        si_desc = "udp receiver child=3 sock=90.30.20.32:5060\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#26 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 8) detached]
---end 8 -------------------------------------------------------

---start 9 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35b920, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35b920, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35b920, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1b2ca7d00, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b2c8aa0, flags = 0, buf = {s = 0x55ab7b2c4ad0 "{\"action\":2,\"h_entry\":2381,\"h_id\":26824,\"state\":5}", len = 50}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x0, flags = 0, buf = {s = 0x7fff2b35b9b0 "\200\273\065+\377\177", len = -1700337055}, malloc_fn = 0x2000005c4, free_fn = 0x7ff1b2ca7d00}
        var = 0x947ff1ffffffff
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa21261 in dlg_onroute (req=0x7ff29c40a148, route_params=0x7fff2b35bbf0, param=0x0) at dlg_handlers.c:1559
        dlg = 0x7ff1b2ca7d00
        iuid = 0x7ff1b21d6658
        val = {s = 0x55ab7a322093 <buf+563> "d49.8c86>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 8}
        callid = {s = 0x55ab7a321fa6 <buf+326> "119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}
        ftag = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119479\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1016.sip-review.test.com:5060>;tag=1934SIPpTag01119583\r\nCall-ID: 119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}
        ttag = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119583\r\nCall-ID: 119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}
        h_entry = 2381
        h_id = 26824
        new_state = 5
        old_state = 4
        unref = 2
        event = 7
        timeout = 0
        reset = 0
        dir = 1
        ret = 0
        __func__ = "dlg_onroute"
#7  0x00007ff29b9f76dc in run_rr_callbacks (req=0x7ff29c40a148, rr_param=0x7fff2b35bcb0) at rr_cb.c:96
        l_param = {s = 0x55ab7a322069 <buf+521> "r2=on;lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 50}
        cbp = 0x7ff29c40fab8
        __func__ = "run_rr_callbacks"
#8  0x00007ff29b9e6a9d in after_loose (_m=0x7ff29c40a148, preloaded=0) at loose.c:989
        hdr = 0x7ff29c1aa600
        puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x55ab7a3220a3 <buf+579> "10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 12}, port = {s = 0x0, len = 0}, params = {s = 0x55ab7a3220b0 <buf+592> "r2=on;lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 50}, sip_params = {s = 0x55ab7a3220b0 <buf+592> "r2=on;lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 50}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x55ab7a3220b6 <buf+598> "lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 5}, r2 = {s = 0x55ab7a3220b0 <buf+592> "r2=on;lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 5}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x55ab7a3220b9 <buf+601> "on;ftag=28104SIPpTag00119479;did=d49.8c86>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 2}, r2_val = {s = 0x55ab7a3220b3 <buf+595> "on;lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 2}, gr_val = {s = 0x0, len = 0}}
        rt = 0x7ff29c1a13e8
        res = 1
        status = 1
        uri = {s = 0x55ab7a322057 <buf+503> "sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 68}
        uri_is_myself = 1
        use_ob = 0
        rparams = {s = 0x55ab7a322069 <buf+521> "r2=on;lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119479;did=d49.8c86>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 50}
        __func__ = "after_loose"
#9  0x00007ff29b9e7211 in loose_route_mode (_m=0x7ff29c40a148, _mode=0) at loose.c:1024
        ret = 0
        __func__ = "loose_route_mode"
#10 0x00007ff29b9f94e9 in w_loose_route (msg=0x7ff29c40a148, p1=0x0, p2=0x0) at rr_mod.c:278
No locals.
#11 0x000055ab79d8101e in do_action (h=0x7fff2b35c840, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1076
        ret = -5
        v = 0
        dst = {send_sock = 0x1, to = {s = {sa_family = 22084, sa_data = "\245\232\361\177\000\000\060\204\020\234\362\177\000"}, sin = {sin_family = 22084, sin_port = 39589, sin_addr = {s_addr = 32753}, sin_zero = "0\204\020\234\362\177\000"}, sin6 = {sin6_family = 22084, sin6_port = 39589, sin6_flowinfo = 32753, sin6_addr = {__in6_u = {__u6_addr8 = "0\204\020\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {33840, 39952, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618328112, 32754, 36, 0}}}, sin6_scope_id = 724943984}, sas = {ss_family = 22084, __ss_padding = "\245\232\361\177\000\000\060\204\020\234\362\177\000\000$\000\000\000\000\000\000\000p\304\065+\001\000\000\000H\360\204\254\361\177\000\000\370\"\020\234\t\000\000\000\000}\312\262\361\177\000\000\000\000\000\000\004\000\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\305\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679977734008}}, id = 724944304, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "c572c10c-077d-44c8-b611-a6369c0d207a"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35c630 "`\306\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29c156c50
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35c390 " \304\065+\377\177", len = -1700678945}, host = {s = 0x7ff29c1022f8 "c572c10c-077d-44c8-b611-a6369c0d207a", len = 36}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x99c40a148 <error: Cannot access memory at address 0x99c40a148>, len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1295352576}, headers = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x7fff2b35c3c0 "\300\304\065+\377\177", len = -1295352576}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119583\r\nCall-ID: 119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119479\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1016.sip-review.test.com:5060>;tag=1934SIPpTag01119583\r\nCall-ID: 119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa55630 "\300\255\347\254\361\177", len = -1700440508}, lr = {s = 0x0, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35c420 "0\204\020\234\362\177", len = 724944304}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35c480 "0\305\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35c4c0 "\360\304\065+\377\177", len = 724944304}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab7a269a60 <log_prefix_buf> "c572c10c-077d-44c8-b611-a6369c0d207a", len = 724944224}, r2_val = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35c340 "\246\037\062z\253U", len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x7fff2b35c220 "\001", len = -1700678945}, port = {s = 0x12b35c160 <error: Cannot access memory at address 0x12b35c160>, len = -1673486008}, params = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1700319931}, headers = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1295352576}, port_no = 22064, proto = 39589, type = 32753, flags = 0, transport = {s = 0x0, len = -1295352576}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35c2a0 "\220\303\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35c2a0 "\220\303\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35c31c "\361\177", len = 724943648}, gr = {s = 0x7fff2b35c330 "\031\037\062z\253U", len = 724943680}, transport_val = {s = 0x7fff2b35c340 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700440508}, user_param_val = {s = 0x7ff29c198f78 "", len = -1673486008}, maddr_val = {s = 0x12b35c280 <error: Cannot access memory at address 0x12b35c280>, len = -1700440508}, method_val = {s = 0x7fff2b35c280 "\220\303\065+\377\177", len = -1700641618}, lr_val = {s = 0x6b2ca7d00 <error: Cannot access memory at address 0x6b2ca7d00>, len = -1700440508}, r2_val = {s = 0x7fff2b35c290 "", len = 0}, gr_val = {s = 0x7fff2b35c390 " \304\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35c660
        port = 0
        dst_host = 0x55ab79ec26d5 <pv_printf+59>
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 724943120, id = 32767, name = {n = -1700641618, s = {s = 0x7ff29aa244ae <futex_release+29> "\211E\374\203}\374\002\017\224\300\017\266\300H\205\300t6H\213E\350H\203\354\bj", len = -1295352576}, re = 0x7ff29aa244ae <futex_release+29>}, avp = 0x7fff2b35c31c}
        sct = 0x7ff29c3d2880
        sjt = 0x12b35c6d0
        rve = 0x0
        mct = 0x7ff29c40a148
        rv = 0x7ff19aa55644
        rv1 = 0x20000000
        c1 = {cache_type = 724943648, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724943680}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724943680}, ri = -1295352576, flags = 1}}, i2s = "\320\301\065+\377\177\000\000\276\345\242\232\362\177\000\000\020\301\065+\001"}
        s = {s = 0x7fff2b35c0c0 "\320\301\065+\377\177", len = -1700641618}
        srevp = {0x12b35c0c0, 0x7ff19aa55644}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140679977981016, string = 0x7ff29c1d5458 "\350S\035\234\362\177", str = {s = 0x7ff29c1d5458 "\350S\035\234\362\177", len = 3}, data = 0x7ff29c1d5458, attr = 0x7ff29c1d5458, select = 0x7ff29c1d5458}}, {type = MODFIXUP_ST, u = {number = 140679977998576, string = 0x7ff29c1d98f0 "x\230\035\234\362\177", str = {s = 0x7ff29c1d98f0 "x\230\035\234\362\177", len = 8}, data = 0x7ff29c1d98f0, attr = 0x7ff29c1d98f0, select = 0x7ff29c1d98f0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x000055ab79d8f89f in run_actions (h=0x7fff2b35c840, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c24ef48
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1295352576, tz_dsttime = 1}
        tdiff = 2594325678
        __func__ = "run_actions"
#13 0x000055ab79d8ff8d in run_actions_safe (h=0x7fff2b35e4e0, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614605466926190, 94194972442614, 536870912, 0, 0, -2564614605416594542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 1, 4294967296, 94194972442614, 536870912, 0, 0, 140733918333520, 94194973730778, 26494749552, 94194977119848, 94194977118816, 7294582016, 140679978461120}}}}}
        ret = 724945780
        ign_on_break = 0
#14 0x000055ab79f295e9 in rval_get_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, i=0x7fff2b35d0b4, rv=0x7ff29c24f0a0, cache=0x0) at core/rvalue.c:949
        r_avp = 0x7ff29c40a148
        avp_val = {n = 724945424, s = {s = 0x7fff2b35ca10 "", len = 2045519573}, re = 0x7fff2b35ca10}
        pval = {rs = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 724947124}, ri = 0, flags = 0}
        tmp = {s = 0x439c20d668 <error: Cannot access memory at address 0x439c20d668>, len = 0}
        s = 0x0
        r = -1673713536
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#15 0x000055ab79f2e7da in rval_expr_eval_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, res=0x7fff2b35d0b4, rve=0x7ff29c24f098) at core/rvalue.c:1947
        i1 = 0
        i2 = 2050105224
        ret = -1
        c1 = {cache_type = 1109, val_type = RV_INT, c = {avp_val = {n = -1295352576, s = {s = 0x5b2ca7d00 <error: Cannot access memory at address 0x5b2ca7d00>, len = 2044674038}, re = 0x5b2ca7d00}, pval = {rs = {s = 0x5b2ca7d00 <error: Cannot access memory at address 0x5b2ca7d00>, len = 2044674038}, ri = 536870912, flags = 0}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 724945888, val_type = 32767, c = {avp_val = {n = -1700678945, s = {s = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429> "H\211E\310H\203}\310", len = -1676655776}, re = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429>}, pval = {rs = {s = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429> "H\211E\310H\203}\310", len = -1676655776}, ri = 36, flags = 21931}}, i2s = "\000\000\000\000\006\000\000\000\033\230\247\232\362\177\000\000\227\201\201\233\t"}
        rv1 = 0x0
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#16 0x000055ab79d80a74 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c25b240, msg=0x7ff29c40a148) at core/action.c:1052
        ret = -5
        v = 0
        dst = {send_sock = 0x55ab79df3ff6 <ksr_slog_json>, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000\310c\020\234\362\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\310c\020\234\362\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\310c\020\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {25544, 39952, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618319816, 32754, 36, 0}}}, sin6_scope_id = 724947040}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000\310c\020\234\362\177\000\000$\000\000\000\000\000\000\000`\320\065+\377\177\000\000H\360\204\254\361\177\000\000\366?\337y\t\000\000\000\000}\312\262\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\321\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679978086672}}, id = 724947376, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "c572c10c-077d-44c8-b611-a6369c0d207a"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35d230 "`\322\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429>
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35ced0 "`\320\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d060 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1295352576}, headers = {s = 0x7fff2b35d5b0 "\366?\337y\253U", len = 2044186961}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c284970 "\n\004", len = -1295352576}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119583\r\nCall-ID: 119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119479\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1016.sip-review.test.com:5060>;tag=1934SIPpTag01119583\r\nCall-ID: 119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa55630 "\300\255\347\254\361\177", len = -1700440508}, lr = {s = 0x87a321fd0 <error: Cannot access memory at address 0x87a321fd0>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d020 "\310c\020\234\362\177", len = 724947376}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d080 "0\321\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35cff0 "", len = 724947376}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119583\r\nCall-ID: 119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35cf40 "\246\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b35cd60 "\366?\337y\253U", len = -1673486008}, params = {s = 0x0, len = 0}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, headers = {s = 0x0, len = 0}, port_no = 22064, proto = 39589, type = 32753, flags = (URI_USER_NORMALIZE | unknown: 0x79ec1f4c), transport = {s = 0x0, len = -1295352576}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35cf1c "\361\177", len = 724946720}, gr = {s = 0x7fff2b35cf30 "\031\037\062z\253U", len = 724946752}, transport_val = {s = 0x7fff2b35cf40 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700440508}, user_param_val = {s = 0x7ff19aa61010 "\260)'\264\361\177", len = 2049350276}, maddr_val = {s = 0x12b35ce80 <error: Cannot access memory at address 0x12b35ce80>, len = -1700440508}, method_val = {s = 0x7fff2b35ce80 "\220\317\065+\377\177", len = -1700641618}, lr_val = {s = 0x6b2ca7d00 <error: Cannot access memory at address 0x6b2ca7d00>, len = -1700440508}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35d260
        port = 0
        dst_host = 0x0
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = 724946432, s = {s = 0x7fff2b35ce00 "0\317\065+\377\177", len = -1676046496}, re = 0x7fff2b35ce00}, avp = 0x7fff2b35cf1c}
        sct = 0x7ff29c3d2880
        sjt = 0x1b2ca7d00
        rve = 0x7ff29c24f098
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724946720, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724946752}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724946752}, ri = -1295352576, flags = 1}}, i2s = "\320\315\065+\377\177\000\000\276\345\242\232\362\177\000\000\200\315\065+\377\177"}
        s = {s = 0x7fff2b35ccc0 "\320\315\065+\377\177", len = -1700641618}
        srevp = {0x12b35ccc0, 0x7ff19aa55644}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140679977981016, string = 0x7ff29c1d5458 "\350S\035\234\362\177", str = {s = 0x7ff29c1d5458 "\350S\035\234\362\177", len = 3}, data = 0x7ff29c1d5458, attr = 0x7ff29c1d5458, select = 0x7ff29c1d5458}}, {type = MODFIXUP_ST, u = {number = 140679977998576, string = 0x7ff29c1d98f0 "x\230\035\234\362\177", str = {s = 0x7ff29c1d98f0 "x\230\035\234\362\177", len = 8}, data = 0x7ff29c1d98f0, attr = 0x7ff29c1d98f0, select = 0x7ff29c1d98f0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#17 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c24a350, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c25b240
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 536870912, tz_dsttime = 0}
        tdiff = 19
        __func__ = "run_actions"
#18 0x000055ab79d7d151 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c1efa78, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 21931
        dst = {send_sock = 0x7fff2b35d8a0, to = {s = {sa_family = 20496, sa_data = "\v\234\362\177\000\000 @\017\234\362\177\000"}, sin = {sin_family = 20496, sin_port = 39947, sin_addr = {s_addr = 32754}, sin_zero = " @\017\234\362\177\000"}, sin6 = {sin6_family = 20496, sin6_port = 39947, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = " @\017\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {16416, 39951, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618245152, 32754, 36, 0}}}, sin6_scope_id = 2619264352}, sas = {ss_family = 20496, __ss_padding = "\v\234\362\177\000\000 @\017\234\362\177\000\000$\000\000\000\000\000\000\000`\315\036\234\362\177\000\000H\360\204\254\361\177\000\000\366?\337y\t\000\000\000\000}\312\262\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\200\331\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 0}}, id = 724949504, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "c572c10c-077d-44c8-b611-a6369c0d207a"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35da80 "\260\332\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x55ab7a06c502 <qm_info+46>
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35d7e0 "p\330\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35d720 "\260\330\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d8b0 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1295352576}, headers = {s = 0x7fff2b35d850 "", len = 2044264333}, port_no = 0, proto = 8192, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c1ef110 "\020\002", len = -1295352576}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119583\r\nCall-ID: 119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119479\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1016.sip-review.test.com:5060>;tag=1934SIPpTag01119583\r\nCall-ID: 119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa55630 "\300\255\347\254\361\177", len = -1700440508}, lr = {s = 0xdc68a89a94fd8392 <error: Cannot access memory at address 0xdc68a89a94fd8392>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d870 " @\017\234\362\177", len = 724949504}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d8d0 "\200\331\065+\377\177", len = -1700401500}, maddr_val = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 724949504}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b35d8f0 "`\217\031\234\362\177", len = 2047586128}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35d790 "\246\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b35d5b0 "\366?\337y\253U", len = -1673486008}, params = {s = 0x0, len = 0}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, headers = {s = 0x0, len = 0}, port_no = 22064, proto = 39589, type = 32753, flags = (URI_USER_NORMALIZE | unknown: 0x79ec1f4c), transport = {s = 0x0, len = -1295352576}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35d76c "\361\177", len = 724948848}, gr = {s = 0x7fff2b35d780 "\031\037\062z\253U", len = 724948880}, transport_val = {s = 0x7fff2b35d790 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700440508}, user_param_val = {s = 0x55ab7a1f5c4f "core", len = 2049350276}, maddr_val = {s = 0x12b35d6d0 <error: Cannot access memory at address 0x12b35d6d0>, len = -1700440508}, method_val = {s = 0x7fff2b35d6d0 "\340\327\065+\377\177", len = -1700641618}, lr_val = {s = 0x6b2ca7d00 <error: Cannot access memory at address 0x6b2ca7d00>, len = -1700440508}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35d7e0 "p\330\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35dab0
        port = 0
        dst_host = 0x0
        i = 10
        flags = 32767
        avp = 0x0
        st = {flags = 2431728, id = 0, name = {n = 724948560, s = {s = 0x7fff2b35d650 "\200\327\065+\377\177", len = -1676046496}, re = 0x7fff2b35d650}, avp = 0x7fff2b35d76c}
        sct = 0x7ff29c3d2880
        sjt = 0x100000291
        rve = 0x55ab79f295e9 <rval_get_int+314>
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724948848, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724948880}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724948880}, ri = -1295352576, flags = 1}}, i2s = " \326\065+\377\177\000\000\276\345\242\232\362\177\000\000\320\325\065+\377\177"}
        s = {s = 0x7fff2b35d510 " \326\065+\377\177", len = -1700641618}
        srevp = {0x12b35d510, 0x7ff19aa55644}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140679977981016, string = 0x7ff29c1d5458 "\350S\035\234\362\177", str = {s = 0x7ff29c1d5458 "\350S\035\234\362\177", len = 3}, data = 0x7ff29c1d5458, attr = 0x7ff29c1d5458, select = 0x7ff29c1d5458}}, {type = MODFIXUP_ST, u = {number = 140679977998576, string = 0x7ff29c1d98f0 "x\230\035\234\362\177", str = {s = 0x7ff29c1d98f0 "x\230\035\234\362\177", len = 8}, data = 0x7ff29c1d98f0, attr = 0x7ff29c1d98f0, select = 0x7ff29c1d98f0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#19 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1efa78, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c1efa78
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 2618919592
        __func__ = "run_actions"
#20 0x000055ab79d80f8a in do_action (h=0x7fff2b35e4e0, a=0x7ff29c1efe00, msg=0x7ff29c40a148) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x55ab7a321eb3 <buf+83>, to = {s = {sa_family = 33656, sa_data = "\032\234\362\177\000\000(\357\023\234\362\177\000"}, sin = {sin_family = 33656, sin_port = 39962, sin_addr = {s_addr = 32754}, sin_zero = "(\357\023\234\362\177\000"}, sin6 = {sin6_family = 33656, sin6_port = 39962, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "(\357\023\234\362\177\000\000$\000\000\000\t\000\000", __u6_addr16 = {61224, 39955, 32754, 0, 36, 0, 9, 0}, __u6_addr32 = {2618552104, 32754, 36, 9}}}, sin6_scope_id = 2594526768}, sas = {ss_family = 33656, __ss_padding = "\032\234\362\177\000\000(\357\023\234\362\177\000\000$\000\000\000\t\000\000\000\060V\245\232\361\177\000\000H\360\204\254\361\177\000\000\000\000\000\000\t\000\000\000\000}\312\262\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\320\341\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140733918339568}}, id = 724951632, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "c572c10c-077d-44c8-b611-a6369c0d207a"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35e2d0 ""
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x13
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35e030 "\300\340\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35df80 "U\004", len = 2044739546}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x55ab7a321f2e <buf+206> "\nTo: +351888888888 <sip:+351888888888 at load-tests-1016.sip-review.test.com:5060>;tag=1934SIPpTag01119583\r\nCall-ID: 119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:"..., len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1295352576}, headers = {s = 0x7fff2b35e0c0 "(\357\023\234\362\177", len = 0}, port_no = 44642, proto = 31263, type = 21931, flags = (unknown: 0x1fccd080), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1295352576}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119583\r\nCall-ID: 119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119479\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1016.sip-review.test.com:5060>;tag=1934SIPpTag01119583\r\nCall-ID: 119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "119479-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa55630 "\300\255\347\254\361\177", len = -1700440508}, lr = {s = 0x7fff2b35e290 "", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35e0c0 "(\357\023\234\362\177", len = 724951632}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35e120 "\320\341\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35e290 "", len = 724951632}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x500000000000000 <error: Cannot access memory at address 0x500000000000000>, len = 724951352}, r2_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1673486008}, gr_val = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 1}}
        next_hop = {user = {s = 0x7fff2b35dfe0 "\246\037\062z\253U", len = 0}, passwd = {s = 0x7ff29c198460 "\001", len = 0}, host = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 2048875599}, port = {s = 0x0, len = -1673486008}, params = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = 2047406657}, sip_params = {s = 0x7ff29c1a84f0 "\004", len = -1675983296}, headers = {s = 0x7ff29c1aaac0 "\350", len = 724950980}, port_no = 22064, proto = 39589, type = 32753, flags = (unknown: 0x9c198aa8), transport = {s = 0x0, len = -1295352576}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35dfbc "\361\177", len = 724950976}, gr = {s = 0x7fff2b35dfd0 "\031\037\062z\253U", len = 724951008}, transport_val = {s = 0x7fff2b35dfe0 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700440508}, user_param_val = {s = 0x7fff2b35df10 "", len = -1676980208}, maddr_val = {s = 0x12b35df20 <error: Cannot access memory at address 0x12b35df20>, len = -1700440508}, method_val = {s = 0x7fff2b35df20 "0\340\065+\377\177", len = -1700641618}, lr_val = {s = 0x6b2ca7d00 <error: Cannot access memory at address 0x6b2ca7d00>, len = -1700440508}, r2_val = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, gr_val = {s = 0x7fff2b35e030 "\300\340\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35e300
        port = 0
        dst_host = 0x7ff29c40a148
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 65537, id = 49, name = {n = 2050104928, s = {s = 0x55ab7a321e60 <buf> "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119479-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 3}, re = 0x55ab7a321e60 <buf>}, avp = 0x7fff2b35dfbc}
        sct = 0x7ff29c3d2880
        sjt = 0x19aa1b2df
        rve = 0x7ff29c1ef260
        mct = 0x7ff29c40a148
        rv = 0x0
        rv1 = 0x20000000
        c1 = {cache_type = 724950976, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, ri = -1295352576, flags = 1}}, i2s = "p\336\065+\377\177\000\000\276\345\242\232\362\177\000\000\000\000\000\000\000"}
        s = {s = 0x7fff2b35dd60 "p\336\065+\377\177", len = -1700641618}
        srevp = {0x12b35dd60, 0x7ff19aa55644}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140679977981016, string = 0x7ff29c1d5458 "\350S\035\234\362\177", str = {s = 0x7ff29c1d5458 "\350S\035\234\362\177", len = 3}, data = 0x7ff29c1d5458, attr = 0x7ff29c1d5458, select = 0x7ff29c1d5458}}, {type = MODFIXUP_ST, u = {number = 140679977998576, string = 0x7ff29c1d98f0 "x\230\035\234\362\177", str = {s = 0x7ff29c1d98f0 "x\230\035\234\362\177", len = 8}, data = 0x7ff29c1d98f0, attr = 0x7ff29c1d98f0, select = 0x7ff29c1d98f0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1ec068, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c1efe00
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1673486008, tz_dsttime = 32754}
        tdiff = 536870912
        __func__ = "run_actions"
#22 0x000055ab79d90055 in run_top_route (a=0x7ff29c1ec068, msg=0x7ff29c40a148, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {94194973861652, 4294967296, 140679980294472, 94192927768577, 4294967296, 94194972442614, 536870912, 0, 0, 140733918340528, 0, 4611686022722355200, 0, 140679980066944, 4294967296, 94194972442614}}}}}
        p = 0x7fff2b35e4e0
        ret = 0
        sfbk = 0
#23 0x000055ab79edcf35 in receive_msg (buf=0x55ab7a321e60 <buf> "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119479-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len=675, rcv_info=0x7fff2b35eb50) at core/receive.c:501
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 724952880, run_flags = 32767, last_retcode = -1676980208, jmp_env = {{__jmpbuf = {140679977844384, 140679976800272, 140733918340976, 140679971801418, 140679976516045, 0, 536870912, 533529360}, __mask_was_saved = 2423224, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660308652, 94194976575339}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119479-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 675}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119479-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 659}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#24 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 659
        buf = "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119479-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag0011"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {2842882083, 0}, addr32 = {2842882083, 0, 0, 0}, addr16 = {61475, 43378, 0, 0, 0, 0, 0, 0}, addr = "#\360r\251", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {4066168099, 0}, addr32 = {4066168099, 0, 0, 0}, addr16 = {52515, 62044, 0, 0, 0, 0, 0, 0}, addr = "#\315\\\362", '\000' <repeats 11 times>}}, src_port = 5070, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\316#\360r\251\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 52755, sin_addr = {s_addr = 2842882083}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 52755, sin6_flowinfo = 2842882083, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\316#\360r\251", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14e530, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\254\340\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\005\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 5
        __func__ = "udp_rcv_loop"
#25 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 4
        pid = 0
        si = 0x7ff29c14e530
        si_desc = "udp receiver child=4 sock=90.30.20.32:5060\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#26 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 9) detached]
---end 9 -------------------------------------------------------

---start 10 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35b920, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35b920, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35b920, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1aef497e8, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b2c9740, flags = 0, buf = {s = 0x55ab7b2c8950 "{\"action\":2,\"h_entry\":1891,\"h_id\":35365,\"state\":5}", len = 50}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x0, flags = 0, buf = {s = 0x7fff2b35b9b0 "\200\273\065+\377\177", len = -1700337055}, malloc_fn = 0x2000005c4, free_fn = 0x7ff1aef497e8}
        var = 0x947ff1ffffffff
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa21261 in dlg_onroute (req=0x7ff29c40a148, route_params=0x7fff2b35bbf0, param=0x0) at dlg_handlers.c:1559
        dlg = 0x7ff1aef497e8
        iuid = 0x7ff1ae7d5310
        val = {s = 0x55ab7a322093 <buf+563> "367.52a8>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119477;did=367.52a8>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 8}
        callid = {s = 0x55ab7a321fa6 <buf+326> "119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}
        ftag = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119477\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1014.sip-review.test.com:5060>;tag=1934SIPpTag01119581\r\nCall-ID: 119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}
        ttag = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119581\r\nCall-ID: 119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}
        h_entry = 1891
        h_id = 35365
        new_state = 5
        old_state = 4
        unref = 2
        event = 7
        timeout = 0
        reset = 0
        dir = 1
        ret = 0
        __func__ = "dlg_onroute"
#7  0x00007ff29b9f76dc in run_rr_callbacks (req=0x7ff29c40a148, rr_param=0x7fff2b35bcb0) at rr_cb.c:96
        l_param = {s = 0x55ab7a322069 <buf+521> "r2=on;lr=on;ftag=28104SIPpTag00119477;did=367.52a8>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119477;did=367.52a8>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 50}
        cbp = 0x7ff29c40fab8
        __func__ = "run_rr_callbacks"
#8  0x00007ff29b9e6a9d in after_loose (_m=0x7ff29c40a148, preloaded=0) at loose.c:989
        hdr = 0x7ff29c1a80f8
        puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x55ab7a3220a3 <buf+579> "10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119477;did=367.52a8>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 12}, port = {s = 0x0, len = 0}, params = {s = 0x55ab7a3220b0 <buf+592> "r2=on;lr=on;ftag=28104SIPpTag00119477;did=367.52a8>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 50}, sip_params = {s = 0x55ab7a3220b0 <buf+592> "r2=on;lr=on;ftag=28104SIPpTag00119477;did=367.52a8>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 50}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x55ab7a3220b6 <buf+598> "lr=on;ftag=28104SIPpTag00119477;did=367.52a8>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 5}, r2 = {s = 0x55ab7a3220b0 <buf+592> "r2=on;lr=on;ftag=28104SIPpTag00119477;did=367.52a8>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 5}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x55ab7a3220b9 <buf+601> "on;ftag=28104SIPpTag00119477;did=367.52a8>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 2}, r2_val = {s = 0x55ab7a3220b3 <buf+595> "on;lr=on;ftag=28104SIPpTag00119477;did=367.52a8>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 2}, gr_val = {s = 0x0, len = 0}}
        rt = 0x7ff29c1aa700
        res = 1
        status = 1
        uri = {s = 0x55ab7a322057 <buf+503> "sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00119477;did=367.52a8>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119477;did=367.52a8>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 68}
        uri_is_myself = 1
        use_ob = 0
        rparams = {s = 0x55ab7a322069 <buf+521> "r2=on;lr=on;ftag=28104SIPpTag00119477;did=367.52a8>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119477;did=367.52a8>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 50}
        __func__ = "after_loose"
#9  0x00007ff29b9e7211 in loose_route_mode (_m=0x7ff29c40a148, _mode=0) at loose.c:1024
        ret = 0
        __func__ = "loose_route_mode"
#10 0x00007ff29b9f94e9 in w_loose_route (msg=0x7ff29c40a148, p1=0x0, p2=0x0) at rr_mod.c:278
No locals.
#11 0x000055ab79d8101e in do_action (h=0x7fff2b35c840, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1076
        ret = -5
        v = 0
        dst = {send_sock = 0x1, to = {s = {sa_family = 6404, sa_data = "\245\232\361\177\000\000\300\316\023\234\362\177\000"}, sin = {sin_family = 6404, sin_port = 39589, sin_addr = {s_addr = 32753}, sin_zero = "\300\316\023\234\362\177\000"}, sin6 = {sin6_family = 6404, sin6_port = 39589, sin6_flowinfo = 32753, sin6_addr = {__in6_u = {__u6_addr8 = "\300\316\023\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {52928, 39955, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618543808, 32754, 36, 0}}}, sin6_scope_id = 724943984}, sas = {ss_family = 6404, __ss_padding = "\245\232\361\177\000\000\300\316\023\234\362\177\000\000$\000\000\000\000\000\000\000p\304\065+\001\000\000\000\320\250\t\261\361\177\000\000\210m\023\234\n\000\000\000\350\227\364\256\361\177\000\000\000\000\000\000\004\000\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\305\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679977734008}}, id = 724944304, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "770705ea-8e5a-41e5-a7bc-94dd6f90f375"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35c630 "`\306\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29c156c50
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35c390 " \304\065+\377\177", len = -1700678945}, host = {s = 0x7ff29c136d88 "770705ea-8e5a-41e5-a7bc-94dd6f90f375", len = 36}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0xa9c40a148 <error: Cannot access memory at address 0xa9c40a148>, len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1359702040}, headers = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x7fff2b35c3c0 "\300\304\065+\377\177", len = -1359702040}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119581\r\nCall-ID: 119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119477\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1014.sip-review.test.com:5060>;tag=1934SIPpTag01119581\r\nCall-ID: 119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa518f0 "\350\227\364\256\361\177", len = -1700456188}, lr = {s = 0x0, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35c420 "\300\316\023\234\362\177", len = 724944304}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35c480 "0\305\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35c4c0 "\360\304\065+\377\177", len = 724944304}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab7a269a60 <log_prefix_buf> "770705ea-8e5a-41e5-a7bc-94dd6f90f375", len = 724944224}, r2_val = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35c340 "\246\037\062z\253U", len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x7fff2b35c220 "\001", len = -1700678945}, port = {s = 0x12b35c160 <error: Cannot access memory at address 0x12b35c160>, len = -1673486008}, params = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1700319931}, headers = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1359702040}, port_no = 6384, proto = 39589, type = 32753, flags = 0, transport = {s = 0x0, len = -1359702040}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35c2a0 "\220\303\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35c2a0 "\220\303\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35c31c "\361\177", len = 724943648}, gr = {s = 0x7fff2b35c330 "\031\037\062z\253U", len = 724943680}, transport_val = {s = 0x7fff2b35c340 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700456188}, user_param_val = {s = 0x7ff29c198f78 "", len = -1673486008}, maddr_val = {s = 0x12b35c280 <error: Cannot access memory at address 0x12b35c280>, len = -1700456188}, method_val = {s = 0x7fff2b35c280 "\220\303\065+\377\177", len = -1700641618}, lr_val = {s = 0x6aef497e8 <error: Cannot access memory at address 0x6aef497e8>, len = -1700456188}, r2_val = {s = 0x7fff2b35c290 "", len = 0}, gr_val = {s = 0x7fff2b35c390 " \304\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35c660
        port = 0
        dst_host = 0x55ab79ec26d5 <pv_printf+59>
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 724943120, id = 32767, name = {n = -1700641618, s = {s = 0x7ff29aa244ae <futex_release+29> "\211E\374\203}\374\002\017\224\300\017\266\300H\205\300t6H\213E\350H\203\354\bj", len = -1359702040}, re = 0x7ff29aa244ae <futex_release+29>}, avp = 0x7fff2b35c31c}
        sct = 0x7ff29c3d2880
        sjt = 0x12b35c6d0
        rve = 0x0
        mct = 0x7ff29c40a148
        rv = 0x7ff19aa51904
        rv1 = 0x20000000
        c1 = {cache_type = 724943648, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724943680}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724943680}, ri = -1359702040, flags = 1}}, i2s = "\320\301\065+\377\177\000\000\276\345\242\232\362\177\000\000\020\301\065+\001"}
        s = {s = 0x7fff2b35c0c0 "\320\301\065+\377\177", len = -1700641618}
        srevp = {0x12b35c0c0, 0x7ff19aa51904}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140679977981016, string = 0x7ff29c1d5458 "\350S\035\234\362\177", str = {s = 0x7ff29c1d5458 "\350S\035\234\362\177", len = 3}, data = 0x7ff29c1d5458, attr = 0x7ff29c1d5458, select = 0x7ff29c1d5458}}, {type = MODFIXUP_ST, u = {number = 140679977998576, string = 0x7ff29c1d98f0 "x\230\035\234\362\177", str = {s = 0x7ff29c1d98f0 "x\230\035\234\362\177", len = 8}, data = 0x7ff29c1d98f0, attr = 0x7ff29c1d98f0, select = 0x7ff29c1d98f0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x000055ab79d8f89f in run_actions (h=0x7fff2b35c840, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c24ef48
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1359702040, tz_dsttime = 1}
        tdiff = 2594325678
        __func__ = "run_actions"
#13 0x000055ab79d8ff8d in run_actions_safe (h=0x7fff2b35e4e0, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614605466926190, 94194972442614, 536870912, 0, 0, -2564614605416594542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 1, 4294967296, 94194972442614, 536870912, 0, 0, 140733918333520, 94194973730778, 26494749552, 94194977119848, 94194977118816, 7230232552, 140679978461120}}}}}
        ret = 724945780
        ign_on_break = 0
#14 0x000055ab79f295e9 in rval_get_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, i=0x7fff2b35d0b4, rv=0x7ff29c24f0a0, cache=0x0) at core/rvalue.c:949
        r_avp = 0x7ff29c40a148
        avp_val = {n = 724945424, s = {s = 0x7fff2b35ca10 "", len = 2045519573}, re = 0x7fff2b35ca10}
        pval = {rs = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 724947124}, ri = 0, flags = 0}
        tmp = {s = 0x439c20d668 <error: Cannot access memory at address 0x439c20d668>, len = 0}
        s = 0x0
        r = -1673713536
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#15 0x000055ab79f2e7da in rval_expr_eval_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, res=0x7fff2b35d0b4, rve=0x7ff29c24f098) at core/rvalue.c:1947
        i1 = 0
        i2 = 2050105224
        ret = -1
        c1 = {cache_type = 1109, val_type = RV_INT, c = {avp_val = {n = -1359702040, s = {s = 0x5aef497e8 <error: Cannot access memory at address 0x5aef497e8>, len = 2044674038}, re = 0x5aef497e8}, pval = {rs = {s = 0x5aef497e8 <error: Cannot access memory at address 0x5aef497e8>, len = 2044674038}, ri = 536870912, flags = 0}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 724945888, val_type = 32767, c = {avp_val = {n = -1700678945, s = {s = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429> "H\211E\310H\203}\310", len = -1676440080}, re = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429>}, pval = {rs = {s = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429> "H\211E\310H\203}\310", len = -1676440080}, ri = 36, flags = 21931}}, i2s = "\000\000\000\000\006\000\000\000\033\230\247\232\362\177\000\000\227\201\201\233\n"}
        rv1 = 0x0
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#16 0x000055ab79d80a74 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c25b240, msg=0x7ff29c40a148) at core/action.c:1052
        ret = -5
        v = 0
        dst = {send_sock = 0x55ab79df3ff6 <ksr_slog_json>, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000X\256\023\234\362\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "X\256\023\234\362\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "X\256\023\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {44632, 39955, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618535512, 32754, 36, 0}}}, sin6_scope_id = 724947040}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000X\256\023\234\362\177\000\000$\000\000\000\000\000\000\000`\320\065+\377\177\000\000\320\250\t\261\361\177\000\000\366?\337y\n\000\000\000\350\227\364\256\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\321\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679978086672}}, id = 724947376, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "770705ea-8e5a-41e5-a7bc-94dd6f90f375"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35d230 "`\322\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429>
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35ced0 "`\320\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d060 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1359702040}, headers = {s = 0x7fff2b35d5b0 "\366?\337y\253U", len = 2044186961}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c284970 "\n\004", len = -1359702040}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119581\r\nCall-ID: 119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119477\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1014.sip-review.test.com:5060>;tag=1934SIPpTag01119581\r\nCall-ID: 119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa518f0 "\350\227\364\256\361\177", len = -1700456188}, lr = {s = 0x87a321fd0 <error: Cannot access memory at address 0x87a321fd0>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d020 "X\256\023\234\362\177", len = 724947376}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d080 "0\321\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35cff0 "", len = 724947376}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119581\r\nCall-ID: 119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35cf40 "\246\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b35cd60 "\366?\337y\253U", len = -1673486008}, params = {s = 0x0, len = 0}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, headers = {s = 0x0, len = 0}, port_no = 6384, proto = 39589, type = 32753, flags = (URI_USER_NORMALIZE | unknown: 0x79ec1f4c), transport = {s = 0x0, len = -1359702040}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35cf1c "\361\177", len = 724946720}, gr = {s = 0x7fff2b35cf30 "\031\037\062z\253U", len = 724946752}, transport_val = {s = 0x7fff2b35cf40 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700456188}, user_param_val = {s = 0x7ff19aa618d0 "pS[\261\361\177", len = 2049350276}, maddr_val = {s = 0x12b35ce80 <error: Cannot access memory at address 0x12b35ce80>, len = -1700456188}, method_val = {s = 0x7fff2b35ce80 "\220\317\065+\377\177", len = -1700641618}, lr_val = {s = 0x6aef497e8 <error: Cannot access memory at address 0x6aef497e8>, len = -1700456188}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35d260
        port = 0
        dst_host = 0x0
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = 724946432, s = {s = 0x7fff2b35ce00 "0\317\065+\377\177", len = -1676046496}, re = 0x7fff2b35ce00}, avp = 0x7fff2b35cf1c}
        sct = 0x7ff29c3d2880
        sjt = 0x1aef497e8
        rve = 0x7ff29c24f098
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724946720, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724946752}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724946752}, ri = -1359702040, flags = 1}}, i2s = "\320\315\065+\377\177\000\000\276\345\242\232\362\177\000\000\200\315\065+\377\177"}
        s = {s = 0x7fff2b35ccc0 "\320\315\065+\377\177", len = -1700641618}
        srevp = {0x12b35ccc0, 0x7ff19aa51904}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140679977981016, string = 0x7ff29c1d5458 "\350S\035\234\362\177", str = {s = 0x7ff29c1d5458 "\350S\035\234\362\177", len = 3}, data = 0x7ff29c1d5458, attr = 0x7ff29c1d5458, select = 0x7ff29c1d5458}}, {type = MODFIXUP_ST, u = {number = 140679977998576, string = 0x7ff29c1d98f0 "x\230\035\234\362\177", str = {s = 0x7ff29c1d98f0 "x\230\035\234\362\177", len = 8}, data = 0x7ff29c1d98f0, attr = 0x7ff29c1d98f0, select = 0x7ff29c1d98f0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#17 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c24a350, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c25b240
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 536870912, tz_dsttime = 0}
        tdiff = 19
        __func__ = "run_actions"
#18 0x000055ab79d7d151 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c1efa78, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 21931
        dst = {send_sock = 0x7fff2b35d8a0, to = {s = {sa_family = 20496, sa_data = "\v\234\362\177\000\000\260\212\022\234\362\177\000"}, sin = {sin_family = 20496, sin_port = 39947, sin_addr = {s_addr = 32754}, sin_zero = "\260\212\022\234\362\177\000"}, sin6 = {sin6_family = 20496, sin6_port = 39947, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "\260\212\022\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {35504, 39954, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618460848, 32754, 36, 0}}}, sin6_scope_id = 2619264352}, sas = {ss_family = 20496, __ss_padding = "\v\234\362\177\000\000\260\212\022\234\362\177\000\000$\000\000\000\000\000\000\000`\315\036\234\362\177\000\000\320\250\t\261\361\177\000\000\366?\337y\n\000\000\000\350\227\364\256\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\200\331\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 0}}, id = 724949504, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "770705ea-8e5a-41e5-a7bc-94dd6f90f375"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35da80 "\260\332\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x55ab7a06c502 <qm_info+46>
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35d7e0 "p\330\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35d720 "\260\330\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d8b0 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1359702040}, headers = {s = 0x7fff2b35d850 "", len = 2044264333}, port_no = 0, proto = 8192, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c1ef110 "\020\002", len = -1359702040}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119581\r\nCall-ID: 119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119477\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1014.sip-review.test.com:5060>;tag=1934SIPpTag01119581\r\nCall-ID: 119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa518f0 "\350\227\364\256\361\177", len = -1700456188}, lr = {s = 0xdc68a89a94fd8392 <error: Cannot access memory at address 0xdc68a89a94fd8392>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d870 "\260\212\022\234\362\177", len = 724949504}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d8d0 "\200\331\065+\377\177", len = -1700401500}, maddr_val = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 724949504}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b35d8f0 "`\217\031\234\362\177", len = 2047586128}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35d790 "\246\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b35d5b0 "\366?\337y\253U", len = -1673486008}, params = {s = 0x0, len = 0}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, headers = {s = 0x0, len = 0}, port_no = 6384, proto = 39589, type = 32753, flags = (URI_USER_NORMALIZE | unknown: 0x79ec1f4c), transport = {s = 0x0, len = -1359702040}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35d76c "\361\177", len = 724948848}, gr = {s = 0x7fff2b35d780 "\031\037\062z\253U", len = 724948880}, transport_val = {s = 0x7fff2b35d790 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700456188}, user_param_val = {s = 0x55ab7a1f5c4f "core", len = 2049350276}, maddr_val = {s = 0x12b35d6d0 <error: Cannot access memory at address 0x12b35d6d0>, len = -1700456188}, method_val = {s = 0x7fff2b35d6d0 "\340\327\065+\377\177", len = -1700641618}, lr_val = {s = 0x6aef497e8 <error: Cannot access memory at address 0x6aef497e8>, len = -1700456188}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35d7e0 "p\330\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35dab0
        port = 0
        dst_host = 0x0
        i = 10
        flags = 32767
        avp = 0x0
        st = {flags = 2431728, id = 0, name = {n = 724948560, s = {s = 0x7fff2b35d650 "\200\327\065+\377\177", len = -1676046496}, re = 0x7fff2b35d650}, avp = 0x7fff2b35d76c}
        sct = 0x7ff29c3d2880
        sjt = 0x100000291
        rve = 0x55ab79f295e9 <rval_get_int+314>
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724948848, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724948880}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724948880}, ri = -1359702040, flags = 1}}, i2s = " \326\065+\377\177\000\000\276\345\242\232\362\177\000\000\320\325\065+\377\177"}
        s = {s = 0x7fff2b35d510 " \326\065+\377\177", len = -1700641618}
        srevp = {0x12b35d510, 0x7ff19aa51904}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140679977981016, string = 0x7ff29c1d5458 "\350S\035\234\362\177", str = {s = 0x7ff29c1d5458 "\350S\035\234\362\177", len = 3}, data = 0x7ff29c1d5458, attr = 0x7ff29c1d5458, select = 0x7ff29c1d5458}}, {type = MODFIXUP_ST, u = {number = 140679977998576, string = 0x7ff29c1d98f0 "x\230\035\234\362\177", str = {s = 0x7ff29c1d98f0 "x\230\035\234\362\177", len = 8}, data = 0x7ff29c1d98f0, attr = 0x7ff29c1d98f0, select = 0x7ff29c1d98f0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#19 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1efa78, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c1efa78
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 2618919592
        __func__ = "run_actions"
#20 0x000055ab79d80f8a in do_action (h=0x7fff2b35e4e0, a=0x7ff29c1efe00, msg=0x7ff29c40a148) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x55ab7a321eb3 <buf+83>, to = {s = {sa_family = 14952, sa_data = "\032\234\362\177\000\000x)\022\234\362\177\000"}, sin = {sin_family = 14952, sin_port = 39962, sin_addr = {s_addr = 32754}, sin_zero = "x)\022\234\362\177\000"}, sin6 = {sin6_family = 14952, sin6_port = 39962, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "x)\022\234\362\177\000\000$\000\000\000\n\000\000", __u6_addr16 = {10616, 39954, 32754, 0, 36, 0, 10, 0}, __u6_addr32 = {2618435960, 32754, 36, 10}}}, sin6_scope_id = 2594511088}, sas = {ss_family = 14952, __ss_padding = "\032\234\362\177\000\000x)\022\234\362\177\000\000$\000\000\000\n\000\000\000\360\030\245\232\361\177\000\000\320\250\t\261\361\177\000\000\000\000\000\000\n\000\000\000\350\227\364\256\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\320\341\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140733918339568}}, id = 724951632, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "770705ea-8e5a-41e5-a7bc-94dd6f90f375"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35e2d0 ""
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x13
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35e030 "\300\340\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35df80 "U\004", len = 2044739546}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x55ab7a321f2e <buf+206> "\nTo: +351888888888 <sip:+351888888888 at load-tests-1014.sip-review.test.com:5060>;tag=1934SIPpTag01119581\r\nCall-ID: 119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:"..., len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1359702040}, headers = {s = 0x7fff2b35e0c0 "x)\022\234\362\177", len = 0}, port_no = 44642, proto = 31263, type = 21931, flags = (unknown: 0x1fccd080), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1359702040}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119581\r\nCall-ID: 119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119477\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1014.sip-review.test.com:5060>;tag=1934SIPpTag01119581\r\nCall-ID: 119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "119477-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa518f0 "\350\227\364\256\361\177", len = -1700456188}, lr = {s = 0x7fff2b35e290 "", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35e0c0 "x)\022\234\362\177", len = 724951632}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35e120 "\320\341\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35e290 "", len = 724951632}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x500000000000000 <error: Cannot access memory at address 0x500000000000000>, len = 724951352}, r2_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1673486008}, gr_val = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 1}}
        next_hop = {user = {s = 0x7fff2b35dfe0 "\246\037\062z\253U", len = 0}, passwd = {s = 0x7ff29c198460 "\001", len = 0}, host = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 2048875599}, port = {s = 0x0, len = -1673486008}, params = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = 2047406657}, sip_params = {s = 0x7ff29c1a3be0 "\004", len = -1676002000}, headers = {s = 0x7ff29c1aaac0 "\350", len = 724950980}, port_no = 6384, proto = 39589, type = 32753, flags = (unknown: 0x9c198aa8), transport = {s = 0x0, len = -1359702040}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35dfbc "\361\177", len = 724950976}, gr = {s = 0x7fff2b35dfd0 "\031\037\062z\253U", len = 724951008}, transport_val = {s = 0x7fff2b35dfe0 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700456188}, user_param_val = {s = 0x7fff2b35df10 "", len = -1676980208}, maddr_val = {s = 0x12b35df20 <error: Cannot access memory at address 0x12b35df20>, len = -1700456188}, method_val = {s = 0x7fff2b35df20 "0\340\065+\377\177", len = -1700641618}, lr_val = {s = 0x6aef497e8 <error: Cannot access memory at address 0x6aef497e8>, len = -1700456188}, r2_val = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, gr_val = {s = 0x7fff2b35e030 "\300\340\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35e300
        port = 0
        dst_host = 0x7ff29c40a148
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 65537, id = 49, name = {n = 2050104928, s = {s = 0x55ab7a321e60 <buf> "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119477-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 3}, re = 0x55ab7a321e60 <buf>}, avp = 0x7fff2b35dfbc}
        sct = 0x7ff29c3d2880
        sjt = 0x19aa1b2df
        rve = 0x7ff29c1ef260
        mct = 0x7ff29c40a148
        rv = 0x0
        rv1 = 0x20000000
        c1 = {cache_type = 724950976, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, ri = -1359702040, flags = 1}}, i2s = "p\336\065+\377\177\000\000\276\345\242\232\362\177\000\000\000\000\000\000\000"}
        s = {s = 0x7fff2b35dd60 "p\336\065+\377\177", len = -1700641618}
        srevp = {0x12b35dd60, 0x7ff19aa51904}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140679977981016, string = 0x7ff29c1d5458 "\350S\035\234\362\177", str = {s = 0x7ff29c1d5458 "\350S\035\234\362\177", len = 3}, data = 0x7ff29c1d5458, attr = 0x7ff29c1d5458, select = 0x7ff29c1d5458}}, {type = MODFIXUP_ST, u = {number = 140679977998576, string = 0x7ff29c1d98f0 "x\230\035\234\362\177", str = {s = 0x7ff29c1d98f0 "x\230\035\234\362\177", len = 8}, data = 0x7ff29c1d98f0, attr = 0x7ff29c1d98f0, select = 0x7ff29c1d98f0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1ec068, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c1efe00
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1673486008, tz_dsttime = 32754}
        tdiff = 536870912
        __func__ = "run_actions"
#22 0x000055ab79d90055 in run_top_route (a=0x7ff29c1ec068, msg=0x7ff29c40a148, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {94194973861652, 4294967296, 140679980294472, 94192927768577, 4294967296, 94194972442614, 536870912, 0, 0, 140733918340528, 0, 4611686022722355200, 0, 140679980066944, 4294967296, 94194972442614}}}}}
        p = 0x7fff2b35e4e0
        ret = 0
        sfbk = 0
#23 0x000055ab79edcf35 in receive_msg (buf=0x55ab7a321e60 <buf> "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119477-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len=675, rcv_info=0x7fff2b35eb50) at core/receive.c:501
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 724952880, run_flags = 32767, last_retcode = -1676980208, jmp_env = {{__jmpbuf = {140679977844384, 140679976800272, 140733918340976, 140679971801418, 140679976516045, 0, 536870912, 533529360}, __mask_was_saved = 2423224, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660308800, 94194976575339}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119477-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 675}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119477-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 659}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#24 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 659
        buf = "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119477-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag0011"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {2842882083, 0}, addr32 = {2842882083, 0, 0, 0}, addr16 = {61475, 43378, 0, 0, 0, 0, 0, 0}, addr = "#\360r\251", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {4066168099, 0}, addr32 = {4066168099, 0, 0, 0}, addr16 = {52515, 62044, 0, 0, 0, 0, 0, 0}, addr = "#\315\\\362", '\000' <repeats 11 times>}}, src_port = 5070, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\316#\360r\251\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 52755, sin_addr = {s_addr = 2842882083}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 52755, sin6_flowinfo = 2842882083, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\316#\360r\251", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14e530, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "@\341\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\006\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 6
        __func__ = "udp_rcv_loop"
#25 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 5
        pid = 0
        si = 0x7ff29c14e530
        si_desc = "udp receiver child=5 sock=90.30.20.32:5060\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#26 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 10) detached]
---end 10 -------------------------------------------------------

---start 11 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35b920, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35b920, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35b920, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1afad21a0, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b2c6be0, flags = 0, buf = {s = 0x55ab7b3ec8c0 "{\"action\":2,\"h_entry\":2426,\"h_id\":67261,\"state\":5}", len = 50}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x0, flags = 0, buf = {s = 0x7fff2b35b9b0 "\200\273\065+\377\177", len = -1700337055}, malloc_fn = 0x2000005c4, free_fn = 0x7ff1afad21a0}
        var = 0x947ff1ffffffff
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa21261 in dlg_onroute (req=0x7ff29c40a148, route_params=0x7fff2b35bbf0, param=0x0) at dlg_handlers.c:1559
        dlg = 0x7ff1afad21a0
        iuid = 0x7ff1b187a0c0
        val = {s = 0x55ab7a322093 <buf+563> "a79.db601>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119478;did=a79.db601>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 9}
        callid = {s = 0x55ab7a321fa6 <buf+326> "119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}
        ftag = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119478\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1015.sip-review.test.com:5060>;tag=1934SIPpTag01119582\r\nCall-ID: 119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}
        ttag = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119582\r\nCall-ID: 119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}
        h_entry = 2426
        h_id = 67261
        new_state = 5
        old_state = 4
        unref = 2
        event = 7
        timeout = 0
        reset = 0
        dir = 1
        ret = 0
        __func__ = "dlg_onroute"
#7  0x00007ff29b9f76dc in run_rr_callbacks (req=0x7ff29c40a148, rr_param=0x7fff2b35bcb0) at rr_cb.c:96
        l_param = {s = 0x55ab7a322069 <buf+521> "r2=on;lr=on;ftag=28104SIPpTag00119478;did=a79.db601>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119478;did=a79.db601>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 51}
        cbp = 0x7ff29c40fab8
        __func__ = "run_rr_callbacks"
#8  0x00007ff29b9e6a9d in after_loose (_m=0x7ff29c40a148, preloaded=0) at loose.c:989
        hdr = 0x7ff29c1aa940
        puri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x55ab7a3220a4 <buf+580> "10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119478;did=a79.db601>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 12}, port = {s = 0x0, len = 0}, params = {s = 0x55ab7a3220b1 <buf+593> "r2=on;lr=on;ftag=28104SIPpTag00119478;did=a79.db601>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 51}, sip_params = {s = 0x55ab7a3220b1 <buf+593> "r2=on;lr=on;ftag=28104SIPpTag00119478;did=a79.db601>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 51}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x55ab7a3220b7 <buf+599> "lr=on;ftag=28104SIPpTag00119478;did=a79.db601>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 5}, r2 = {s = 0x55ab7a3220b1 <buf+593> "r2=on;lr=on;ftag=28104SIPpTag00119478;did=a79.db601>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 5}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x55ab7a3220ba <buf+602> "on;ftag=28104SIPpTag00119478;did=a79.db601>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 2}, r2_val = {s = 0x55ab7a3220b4 <buf+596> "on;lr=on;ftag=28104SIPpTag00119478;did=a79.db601>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 2}, gr_val = {s = 0x0, len = 0}}
        rt = 0x7ff29c198328
        res = 1
        status = 1
        uri = {s = 0x55ab7a322057 <buf+503> "sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00119478;did=a79.db601>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119478;did=a79.db601>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 69}
        uri_is_myself = 1
        use_ob = 0
        rparams = {s = 0x55ab7a322069 <buf+521> "r2=on;lr=on;ftag=28104SIPpTag00119478;did=a79.db601>, <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00119478;did=a79.db601>\r\nContent-Length: 0\r\nTH: dch\r\n\r\n", len = 51}
        __func__ = "after_loose"
#9  0x00007ff29b9e7211 in loose_route_mode (_m=0x7ff29c40a148, _mode=0) at loose.c:1024
        ret = 0
        __func__ = "loose_route_mode"
#10 0x00007ff29b9f94e9 in w_loose_route (msg=0x7ff29c40a148, p1=0x0, p2=0x0) at rr_mod.c:278
No locals.
#11 0x000055ab79d8101e in do_action (h=0x7fff2b35c840, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1076
        ret = -5
        v = 0
        dst = {send_sock = 0x1, to = {s = {sa_family = 23524, sa_data = "\245\232\361\177\000\000P\377\016\234\362\177\000"}, sin = {sin_family = 23524, sin_port = 39589, sin_addr = {s_addr = 32753}, sin_zero = "P\377\016\234\362\177\000"}, sin6 = {sin6_family = 23524, sin6_port = 39589, sin6_flowinfo = 32753, sin6_addr = {__in6_u = {__u6_addr8 = "P\377\016\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {65360, 39950, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618228560, 32754, 36, 0}}}, sin6_scope_id = 724943984}, sas = {ss_family = 23524, __ss_padding = "\245\232\361\177\000\000P\377\016\234\362\177\000\000$\000\000\000\000\000\000\000p\304\065+\001\000\000\000\320\207\360\257\361\177\000\000X\256\023\234\v\000\000\000\240!\255\257\361\177\000\000\000\000\000\000\004\000\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\305\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679977734008}}, id = 724944304, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "29bc8c06-2f95-45f2-85a5-27463d1c7b7b"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35c630 "`\306\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29c156c50
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35c390 " \304\065+\377\177", len = -1700678945}, host = {s = 0x7ff29c13ae58 "29bc8c06-2f95-45f2-85a5-27463d1c7b7b", len = 36}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0xb9c40a148 <error: Cannot access memory at address 0xb9c40a148>, len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1347608160}, headers = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x7fff2b35c3c0 "\300\304\065+\377\177", len = -1347608160}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119582\r\nCall-ID: 119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119478\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1015.sip-review.test.com:5060>;tag=1934SIPpTag01119582\r\nCall-ID: 119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa55bd0 "\240!\255\257\361\177", len = -1700439068}, lr = {s = 0x0, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35c420 "P\377\016\234\362\177", len = 724944304}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35c480 "0\305\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35c4c0 "\360\304\065+\377\177", len = 724944304}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab7a269a60 <log_prefix_buf> "29bc8c06-2f95-45f2-85a5-27463d1c7b7b", len = 724944224}, r2_val = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35c340 "\246\037\062z\253U", len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x7fff2b35c220 "\001", len = -1700678945}, port = {s = 0x12b35c160 <error: Cannot access memory at address 0x12b35c160>, len = -1673486008}, params = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = -1700319931}, headers = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1347608160}, port_no = 23504, proto = 39589, type = 32753, flags = 0, transport = {s = 0x0, len = -1347608160}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35c2a0 "\220\303\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35c2a0 "\220\303\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35c31c "\361\177", len = 724943648}, gr = {s = 0x7fff2b35c330 "\031\037\062z\253U", len = 724943680}, transport_val = {s = 0x7fff2b35c340 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700439068}, user_param_val = {s = 0x7ff29c198f78 "", len = -1673486008}, maddr_val = {s = 0x12b35c280 <error: Cannot access memory at address 0x12b35c280>, len = -1700439068}, method_val = {s = 0x7fff2b35c280 "\220\303\065+\377\177", len = -1700641618}, lr_val = {s = 0x6afad21a0 <error: Cannot access memory at address 0x6afad21a0>, len = -1700439068}, r2_val = {s = 0x7fff2b35c290 "", len = 0}, gr_val = {s = 0x7fff2b35c390 " \304\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35c660
        port = 0
        dst_host = 0x55ab79ec26d5 <pv_printf+59>
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 724943120, id = 32767, name = {n = -1700641618, s = {s = 0x7ff29aa244ae <futex_release+29> "\211E\374\203}\374\002\017\224\300\017\266\300H\205\300t6H\213E\350H\203\354\bj", len = -1347608160}, re = 0x7ff29aa244ae <futex_release+29>}, avp = 0x7fff2b35c31c}
        sct = 0x7ff29c3d2880
        sjt = 0x12b35c6d0
        rve = 0x0
        mct = 0x7ff29c40a148
        rv = 0x7ff19aa55be4
        rv1 = 0x20000000
        c1 = {cache_type = 724943648, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724943680}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724943680}, ri = -1347608160, flags = 1}}, i2s = "\320\301\065+\377\177\000\000\276\345\242\232\362\177\000\000\020\301\065+\001"}
        s = {s = 0x7fff2b35c0c0 "\320\301\065+\377\177", len = -1700641618}
        srevp = {0x12b35c0c0, 0x7ff19aa55be4}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140679977981016, string = 0x7ff29c1d5458 "\350S\035\234\362\177", str = {s = 0x7ff29c1d5458 "\350S\035\234\362\177", len = 3}, data = 0x7ff29c1d5458, attr = 0x7ff29c1d5458, select = 0x7ff29c1d5458}}, {type = MODFIXUP_ST, u = {number = 140679977998576, string = 0x7ff29c1d98f0 "x\230\035\234\362\177", str = {s = 0x7ff29c1d98f0 "x\230\035\234\362\177", len = 8}, data = 0x7ff29c1d98f0, attr = 0x7ff29c1d98f0, select = 0x7ff29c1d98f0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x000055ab79d8f89f in run_actions (h=0x7fff2b35c840, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c24ef48
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1347608160, tz_dsttime = 1}
        tdiff = 2594325678
        __func__ = "run_actions"
#13 0x000055ab79d8ff8d in run_actions_safe (h=0x7fff2b35e4e0, a=0x7ff29c24ef48, msg=0x7ff29c40a148) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614605466926190, 94194972442614, 536870912, 0, 0, -2564614605416594542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 1, 4294967296, 94194972442614, 536870912, 0, 0, 140733918333520, 94194973730778, 26494749552, 94194977119848, 94194977118816, 7242326432, 140679978461120}}}}}
        ret = 724945780
        ign_on_break = 0
#14 0x000055ab79f295e9 in rval_get_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, i=0x7fff2b35d0b4, rv=0x7ff29c24f0a0, cache=0x0) at core/rvalue.c:949
        r_avp = 0x7ff29c40a148
        avp_val = {n = 724945424, s = {s = 0x7fff2b35ca10 "", len = 2045519573}, re = 0x7fff2b35ca10}
        pval = {rs = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 724947124}, ri = 0, flags = 0}
        tmp = {s = 0x439c20d668 <error: Cannot access memory at address 0x439c20d668>, len = 0}
        s = 0x0
        r = -1673713536
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#15 0x000055ab79f2e7da in rval_expr_eval_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, res=0x7fff2b35d0b4, rve=0x7ff29c24f098) at core/rvalue.c:1947
        i1 = 0
        i2 = 2050105224
        ret = -1
        c1 = {cache_type = 1109, val_type = RV_INT, c = {avp_val = {n = -1347608160, s = {s = 0x5afad21a0 <error: Cannot access memory at address 0x5afad21a0>, len = 2044674038}, re = 0x5afad21a0}, pval = {rs = {s = 0x5afad21a0 <error: Cannot access memory at address 0x5afad21a0>, len = 2044674038}, ri = 536870912, flags = 0}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 724945888, val_type = 32767, c = {avp_val = {n = -1700678945, s = {s = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429> "H\211E\310H\203}\310", len = -1676423488}, re = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429>}, pval = {rs = {s = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429> "H\211E\310H\203}\310", len = -1676423488}, ri = 36, flags = 21931}}, i2s = "\000\000\000\000\006\000\000\000\033\230\247\232\362\177\000\000\227\201\201\233\v"}
        rv1 = 0x0
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#16 0x000055ab79d80a74 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c25b240, msg=0x7ff29c40a148) at core/action.c:1052
        ret = -5
        v = 0
        dst = {send_sock = 0x55ab79df3ff6 <ksr_slog_json>, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000(\357\023\234\362\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "(\357\023\234\362\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "(\357\023\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {61224, 39955, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618552104, 32754, 36, 0}}}, sin6_scope_id = 724947040}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000(\357\023\234\362\177\000\000$\000\000\000\000\000\000\000`\320\065+\377\177\000\000\320\207\360\257\361\177\000\000\366?\337y\v\000\000\000\240!\255\257\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\321\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679978086672}}, id = 724947376, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "29bc8c06-2f95-45f2-85a5-27463d1c7b7b"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35d230 "`\322\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x7ff29aa1b2df <dlg_lookup_msg_dialog+429>
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35ced0 "`\320\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d060 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1347608160}, headers = {s = 0x7fff2b35d5b0 "\366?\337y\253U", len = 2044186961}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c284970 "\n\004", len = -1347608160}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119582\r\nCall-ID: 119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119478\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1015.sip-review.test.com:5060>;tag=1934SIPpTag01119582\r\nCall-ID: 119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa55bd0 "\240!\255\257\361\177", len = -1700439068}, lr = {s = 0x87a321fd0 <error: Cannot access memory at address 0x87a321fd0>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d020 "(\357\023\234\362\177", len = 724947376}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d080 "0\321\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35cff0 "", len = 724947376}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119582\r\nCall-ID: 119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35cf40 "\246\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b35cd60 "\366?\337y\253U", len = -1673486008}, params = {s = 0x0, len = 0}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, headers = {s = 0x0, len = 0}, port_no = 23504, proto = 39589, type = 32753, flags = (URI_USER_NORMALIZE | unknown: 0x79ec1f4c), transport = {s = 0x0, len = -1347608160}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35cf1c "\361\177", len = 724946720}, gr = {s = 0x7fff2b35cf30 "\031\037\062z\253U", len = 724946752}, transport_val = {s = 0x7fff2b35cf40 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700439068}, user_param_val = {s = 0x7ff19aa60bb0 "p\274\345\260\361\177", len = 2049350276}, maddr_val = {s = 0x12b35ce80 <error: Cannot access memory at address 0x12b35ce80>, len = -1700439068}, method_val = {s = 0x7fff2b35ce80 "\220\317\065+\377\177", len = -1700641618}, lr_val = {s = 0x6afad21a0 <error: Cannot access memory at address 0x6afad21a0>, len = -1700439068}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35d260
        port = 0
        dst_host = 0x0
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = 724946432, s = {s = 0x7fff2b35ce00 "0\317\065+\377\177", len = -1676046496}, re = 0x7fff2b35ce00}, avp = 0x7fff2b35cf1c}
        sct = 0x7ff29c3d2880
        sjt = 0x1afad21a0
        rve = 0x7ff29c24f098
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724946720, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724946752}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724946752}, ri = -1347608160, flags = 1}}, i2s = "\320\315\065+\377\177\000\000\276\345\242\232\362\177\000\000\200\315\065+\377\177"}
        s = {s = 0x7fff2b35ccc0 "\320\315\065+\377\177", len = -1700641618}
        srevp = {0x12b35ccc0, 0x7ff19aa55be4}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140679977981016, string = 0x7ff29c1d5458 "\350S\035\234\362\177", str = {s = 0x7ff29c1d5458 "\350S\035\234\362\177", len = 3}, data = 0x7ff29c1d5458, attr = 0x7ff29c1d5458, select = 0x7ff29c1d5458}}, {type = MODFIXUP_ST, u = {number = 140679977998576, string = 0x7ff29c1d98f0 "x\230\035\234\362\177", str = {s = 0x7ff29c1d98f0 "x\230\035\234\362\177", len = 8}, data = 0x7ff29c1d98f0, attr = 0x7ff29c1d98f0, select = 0x7ff29c1d98f0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#17 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c24a350, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c25b240
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 536870912, tz_dsttime = 0}
        tdiff = 19
        __func__ = "run_actions"
#18 0x000055ab79d7d151 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c1efa78, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 21931
        dst = {send_sock = 0x7fff2b35d8a0, to = {s = {sa_family = 20496, sa_data = "\v\234\362\177\000\000\200\313\022\234\362\177\000"}, sin = {sin_family = 20496, sin_port = 39947, sin_addr = {s_addr = 32754}, sin_zero = "\200\313\022\234\362\177\000"}, sin6 = {sin6_family = 20496, sin6_port = 39947, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "\200\313\022\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {52096, 39954, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618477440, 32754, 36, 0}}}, sin6_scope_id = 2619264352}, sas = {ss_family = 20496, __ss_padding = "\v\234\362\177\000\000\200\313\022\234\362\177\000\000$\000\000\000\000\000\000\000`\315\036\234\362\177\000\000\320\207\360\257\361\177\000\000\366?\337y\v\000\000\000\240!\255\257\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\200\331\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 0}}, id = 724949504, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "29bc8c06-2f95-45f2-85a5-27463d1c7b7b"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35da80 "\260\332\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x55ab7a06c502 <qm_info+46>
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35d7e0 "p\330\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35d720 "\260\330\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d8b0 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1347608160}, headers = {s = 0x7fff2b35d850 "", len = 2044264333}, port_no = 0, proto = 8192, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c1ef110 "\020\002", len = -1347608160}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119582\r\nCall-ID: 119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119478\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1015.sip-review.test.com:5060>;tag=1934SIPpTag01119582\r\nCall-ID: 119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa55bd0 "\240!\255\257\361\177", len = -1700439068}, lr = {s = 0xdc68a89a94fd8392 <error: Cannot access memory at address 0xdc68a89a94fd8392>, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d870 "\200\313\022\234\362\177", len = 724949504}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d8d0 "\200\331\065+\377\177", len = -1700401500}, maddr_val = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 724949504}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b35d8f0 "`\217\031\234\362\177", len = 2047586128}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35d790 "\246\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "$", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b35d5b0 "\366?\337y\253U", len = -1673486008}, params = {s = 0x0, len = 0}, sip_params = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, headers = {s = 0x0, len = 0}, port_no = 23504, proto = 39589, type = 32753, flags = (URI_USER_NORMALIZE | unknown: 0x79ec1f4c), transport = {s = 0x0, len = -1347608160}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35d76c "\361\177", len = 724948848}, gr = {s = 0x7fff2b35d780 "\031\037\062z\253U", len = 724948880}, transport_val = {s = 0x7fff2b35d790 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700439068}, user_param_val = {s = 0x55ab7a1f5c4f "core", len = 2049350276}, maddr_val = {s = 0x12b35d6d0 <error: Cannot access memory at address 0x12b35d6d0>, len = -1700439068}, method_val = {s = 0x7fff2b35d6d0 "\340\327\065+\377\177", len = -1700641618}, lr_val = {s = 0x6afad21a0 <error: Cannot access memory at address 0x6afad21a0>, len = -1700439068}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35d7e0 "p\330\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35dab0
        port = 0
        dst_host = 0x0
        i = 10
        flags = 32767
        avp = 0x0
        st = {flags = 2431800, id = 0, name = {n = 724948560, s = {s = 0x7fff2b35d650 "\200\327\065+\377\177", len = -1676046496}, re = 0x7fff2b35d650}, avp = 0x7fff2b35d76c}
        sct = 0x7ff29c3d2880
        sjt = 0x100000293
        rve = 0x55ab79f295e9 <rval_get_int+314>
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724948848, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724948880}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724948880}, ri = -1347608160, flags = 1}}, i2s = " \326\065+\377\177\000\000\276\345\242\232\362\177\000\000\320\325\065+\377\177"}
        s = {s = 0x7fff2b35d510 " \326\065+\377\177", len = -1700641618}
        srevp = {0x12b35d510, 0x7ff19aa55be4}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140679977981016, string = 0x7ff29c1d5458 "\350S\035\234\362\177", str = {s = 0x7ff29c1d5458 "\350S\035\234\362\177", len = 3}, data = 0x7ff29c1d5458, attr = 0x7ff29c1d5458, select = 0x7ff29c1d5458}}, {type = MODFIXUP_ST, u = {number = 140679977998576, string = 0x7ff29c1d98f0 "x\230\035\234\362\177", str = {s = 0x7ff29c1d98f0 "x\230\035\234\362\177", len = 8}, data = 0x7ff29c1d98f0, attr = 0x7ff29c1d98f0, select = 0x7ff29c1d98f0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#19 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1efa78, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c1efa78
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 2618919768
        __func__ = "run_actions"
#20 0x000055ab79d80f8a in do_action (h=0x7fff2b35e4e0, a=0x7ff29c1efe00, msg=0x7ff29c40a148) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x55ab7a321eb3 <buf+83>, to = {s = {sa_family = 44528, sa_data = "/\234\362\177\000\000Hj\022\234\362\177\000"}, sin = {sin_family = 44528, sin_port = 39983, sin_addr = {s_addr = 32754}, sin_zero = "Hj\022\234\362\177\000"}, sin6 = {sin6_family = 44528, sin6_port = 39983, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "Hj\022\234\362\177\000\000$\000\000\000\v\000\000", __u6_addr16 = {27208, 39954, 32754, 0, 36, 0, 11, 0}, __u6_addr32 = {2618452552, 32754, 36, 11}}}, sin6_scope_id = 2594528208}, sas = {ss_family = 44528, __ss_padding = "/\234\362\177\000\000Hj\022\234\362\177\000\000$\000\000\000\v\000\000\000\320[\245\232\361\177\000\000\320\207\360\257\361\177\000\000\000\000\000\000\v\000\000\000\240!\255\257\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\320\341\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140733918339568}}, id = 724951632, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> "29bc8c06-2f95-45f2-85a5-27463d1c7b7b"
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35e2d0 ""
        crt = 0x55ab7a269e68 <log_prefix_str+8> "$"
        cmd = 0x13
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x7fff2b35e030 "\300\340\065+\377\177", len = -1700678945}, host = {s = 0x7fff2b35df80 "U\004", len = 2044739546}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x55ab7a321f2e <buf+206> "\nTo: +351888888888 <sip:+351888888888 at load-tests-1015.sip-review.test.com:5060>;tag=1934SIPpTag01119582\r\nCall-ID: 119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:"..., len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1347608160}, headers = {s = 0x7fff2b35e0c0 "Hj\022\234\362\177", len = 0}, port_no = 44642, proto = 31263, type = 21931, flags = (unknown: 0x1fccd070), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1347608160}, ttl = {s = 0x55ab7a321f88 <buf+296> "1934SIPpTag01119582\r\nCall-ID: 119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nR"..., len = 19}, user_param = {s = 0x55ab7a321f19 <buf+185> "28104SIPpTag00119478\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1015.sip-review.test.com:5060>;tag=1934SIPpTag01119582\r\nCall-ID: 119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+35192"..., len = 20}, maddr = {s = 0x55ab7a321fa6 <buf+326> "119478-28104 at 10.10.120.20\r\nCSeq: 2 BYE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test <sip:10.10.120.19:5060;transport=UDP>\r\nRoute: <sip:90.30.20.32;r2=on"..., len = 25}, method = {s = 0x7ff19aa55bd0 "\240!\255\257\361\177", len = -1700439068}, lr = {s = 0x7fff2b35e290 "", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35e0c0 "Hj\022\234\362\177", len = 724951632}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35e120 "\320\341\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35e290 "", len = 724951632}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x500000000000000 <error: Cannot access memory at address 0x500000000000000>, len = 724951352}, r2_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1673486008}, gr_val = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 1}}
        next_hop = {user = {s = 0x7fff2b35dfe0 "\246\037\062z\253U", len = 0}, passwd = {s = 0x7ff29c1a13f8 "\001", len = 0}, host = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 2048875599}, port = {s = 0x0, len = -1673486008}, params = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = 2047406657}, sip_params = {s = 0x7ff29c1a16f8 "\375", len = -1676013240}, headers = {s = 0x7ff29c1aa508 "\003", len = 724950980}, port_no = 23504, proto = 39589, type = 32753, flags = (unknown: 0x9c198a08), transport = {s = 0x0, len = -1347608160}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, maddr = {s = 0x0, len = 0}, method = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700595101}, lr = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35dfbc "\361\177", len = 724950976}, gr = {s = 0x7fff2b35dfd0 "\031\037\062z\253U", len = 724951008}, transport_val = {s = 0x7fff2b35dfe0 "\246\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700439068}, user_param_val = {s = 0x7fff2b35df10 "", len = -1676980208}, maddr_val = {s = 0x12b35df20 <error: Cannot access memory at address 0x12b35df20>, len = -1700439068}, method_val = {s = 0x7fff2b35df20 "0\340\065+\377\177", len = -1700641618}, lr_val = {s = 0x6afad21a0 <error: Cannot access memory at address 0x6afad21a0>, len = -1700439068}, r2_val = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, gr_val = {s = 0x7fff2b35e030 "\300\340\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35e300
        port = 0
        dst_host = 0x7ff29c40a148
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 65537, id = 49, name = {n = 2050104928, s = {s = 0x55ab7a321e60 <buf> "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119478-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 3}, re = 0x55ab7a321e60 <buf>}, avp = 0x7fff2b35dfbc}
        sct = 0x7ff29c3d2880
        sjt = 0x19aa1b2df
        rve = 0x7ff29c1ef260
        mct = 0x7ff29c40a148
        rv = 0x0
        rv1 = 0x20000000
        c1 = {cache_type = 724950976, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, ri = -1347608160, flags = 1}}, i2s = "p\336\065+\377\177\000\000\276\345\242\232\362\177\000\000\000\000\000\000\000"}
        s = {s = 0x7fff2b35dd60 "p\336\065+\377\177", len = -1700641618}
        srevp = {0x12b35dd60, 0x7ff19aa55be4}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 4, string = 0x4 <error: Cannot access memory at address 0x4>, str = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 0}, data = 0x4, attr = 0x4, select = 0x4}}, {type = MODFIXUP_ST, u = {number = 140679977981016, string = 0x7ff29c1d5458 "\350S\035\234\362\177", str = {s = 0x7ff29c1d5458 "\350S\035\234\362\177", len = 3}, data = 0x7ff29c1d5458, attr = 0x7ff29c1d5458, select = 0x7ff29c1d5458}}, {type = MODFIXUP_ST, u = {number = 140679977998576, string = 0x7ff29c1d98f0 "x\230\035\234\362\177", str = {s = 0x7ff29c1d98f0 "x\230\035\234\362\177", len = 8}, data = 0x7ff29c1d98f0, attr = 0x7ff29c1d98f0, select = 0x7ff29c1d98f0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1ec068, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c1efe00
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1673486008, tz_dsttime = 32754}
        tdiff = 536870912
        __func__ = "run_actions"
#22 0x000055ab79d90055 in run_top_route (a=0x7ff29c1ec068, msg=0x7ff29c40a148, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {94194973861652, 4294967296, 140679980294472, 94192927768577, 4294967296, 94194972442614, 536870912, 0, 0, 140733918340528, 0, 4611686022722355200, 0, 140679980066944, 4294967296, 94194972442614}}}}}
        p = 0x7fff2b35e4e0
        ret = 0
        sfbk = 0
#23 0x000055ab79edcf35 in receive_msg (buf=0x55ab7a321e60 <buf> "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119478-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len=677, rcv_info=0x7fff2b35eb50) at core/receive.c:501
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 724952880, run_flags = 32767, last_retcode = -1676980208, jmp_env = {{__jmpbuf = {140679977844384, 140679976800272, 140733918340976, 140679971801418, 140679976516045, 0, 536870912, 533529360}, __mask_was_saved = 2423224, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660308948, 94194976575339}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119478-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 677}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119478-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag001"..., len = 661}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#24 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 661
        buf = "BYE sip:10.10.120.19:5060;transport=UDP SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=dcv;branch=z9hG4bK-28104-119478-7\r\nFrom:  +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag0011"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {2842882083, 0}, addr32 = {2842882083, 0, 0, 0}, addr16 = {61475, 43378, 0, 0, 0, 0, 0, 0}, addr = "#\360r\251", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {4066168099, 0}, addr32 = {4066168099, 0, 0, 0}, addr16 = {52515, 62044, 0, 0, 0, 0, 0, 0}, addr = "#\315\\\362", '\000' <repeats 11 times>}}, src_port = 5070, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\316#\360r\251\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 52755, sin_addr = {s_addr = 2842882083}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 52755, sin6_flowinfo = 2842882083, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\316#\360r\251", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14e530, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\324\341\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\a\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 7
        __func__ = "udp_rcv_loop"
#25 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 6
        pid = 0
        si = 0x7ff29c14e530
        si_desc = "udp receiver child=6 sock=90.30.20.32:5060\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#26 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 11) detached]
---end 11 -------------------------------------------------------

---start 12 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29aa2446a in futex_get (lock=0x7ff19aa59dc4) at ../../core/mem/../futexlock.h:121
        v = 1
        i = 0
#2  0x00007ff29aa2d3fc in dlg_lookup_mode (h_entry=2953, h_id=90949, lmode=0) at dlg_hash.c:781
        mypid = 12
        dlg = 0x7ff29c0f8109
        d_entry = 0x7ff19aa59db0
        __func__ = "dlg_lookup_mode"
#3  0x00007ff29aa2e05f in dlg_get_by_iuid (diuid=0x7ff29aa82860 <_dlg_ctx+64>) at dlg_hash.c:849
No locals.
#4  0x00007ff29aa6176f in dlg_get_ctx_dialog () at dlg_var.c:940
No locals.
#5  0x00007ff29aa1b161 in dlg_lookup_msg_dialog (msg=0x55ab7a27b4c0 <_faked_msg>, dir=0x0) at dlg_handlers.c:1227
        dlg = 0x0
        callid = {s = 0x55ab7a27b4c0 <_faked_msg> "\350\220\002", len = 724933280}
        ftag = {s = 0x7ff29c3d3d88 "\017", len = 724931940}
        ttag = {s = 0x7ff29c3d2110 "\037\a", len = 724933280}
        vdir = 21931
        __func__ = "dlg_lookup_msg_dialog"
#6  0x00007ff29aa1b735 in dlg_get_msg_dialog (msg=0x55ab7a27b4c0 <_faked_msg>) at dlg_handlers.c:1267
No locals.
#7  0x00007ff29aa5e8a2 in pv_get_dlg_variable (msg=0x55ab7a27b4c0 <_faked_msg>, param=0x7ff29c198f78, res=0x7fff2b3591b0) at dlg_var.c:343
        dlg = 0x100000000
        value = 0x7ff29c3d2110
        spv = {s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = 724937456}
        __func__ = "pv_get_dlg_variable"
#8  0x000055ab79ec129a in pv_get_spec_value (msg=0x55ab7a27b4c0 <_faked_msg>, sp=0x7ff29c198f60, value=0x7fff2b3591b0) at core/pvapi.c:1411
        ret = 0
        __func__ = "pv_get_spec_value"
#9  0x000055ab79ec1eec in pv_printf_mode (msg=0x55ab7a27b4c0 <_faked_msg>, list=0x7ff29c3d2880, mode=1, buf=0x55ab7a269a60 <log_prefix_buf> "", len=0x55ab7a269e68 <log_prefix_str+8>) at core/pvapi.c:1477
        n = 0
        tok = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}
        it = 0x7ff29c3d2880
        cur = 0x55ab7a269a60 <log_prefix_buf> ""
        __func__ = "pv_printf_mode"
#10 0x000055ab79ec26d5 in pv_printf (msg=0x55ab7a27b4c0 <_faked_msg>, list=0x7ff29c3d2880, buf=0x55ab7a269a60 <log_prefix_buf> "", len=0x55ab7a269e68 <log_prefix_str+8>) at core/pvapi.c:1521
No locals.
#11 0x000055ab79df3cfd in log_prefix_set (msg=0x55ab7a27b4c0 <_faked_msg>) at core/dprint.c:479
No locals.
#12 0x000055ab79d8f882 in run_actions (h=0x7fff2b3595f0, a=0x7ff29c3d2260, msg=0x55ab7a27b4c0 <_faked_msg>) at core/action.c:1579
        t = 0x7ff29c3d2260
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 724932624, tz_dsttime = 32767}
        tdiff = 2045699728
        __func__ = "run_actions"
#13 0x000055ab79d90055 in run_top_route (a=0x7ff29c3d2260, msg=0x55ab7a27b4c0 <_faked_msg>, c=0x7fff2b3595f0) at core/action.c:1666
        ctx = {rec_lev = -1674614744, run_flags = 32754, last_retcode = -1676980208, jmp_env = {{__jmpbuf = {140733918319792, 140679971801418, 724931904, 0, 536870912, 94194975032578, 140733918319808, 140679976800272}, __mask_was_saved = -1674651264, __saved_mask = {__val = {140679976800272, 140733918319872, 140679971801418, 140733918319840, 0, 536870912, 533502344, 2442128, 3368568, 3555760, 8, 95, 94194974005585, 140733918319904, 94194972518638, 21474836480}}}}}
        p = 0x7fff2b3595f0
        ret = 724931888
        sfbk = 0
#14 0x00007ff29a920593 in th_execute_event_route (msg=0x0, evp=0x7fff2b35a140, evtype=1, evidx=2, evname=0x7ff29a929250 <_th_eventrt_outgoing_name>) at topoh_mod.c:593
        fmsg = 0x55ab7a27b4c0 <_faked_msg>
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140675987189520, -2564614608017063022, 0, 536870912, 0, 0, -2564614607966731374, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {536870912, 0, 0, 140733918320384, 140679968276554, 140679977881880, 140679980294472, 0, 140733918323424, 140733918323392, 140733918323304, 0, 155343755200, 140679977733984, 4294967296, 94194972442614}}}}}
        rtb = 8
        keng = 0x0
        onsnd_info = {dst = 0x0, to = 0x7ff1b3be6668, send_sock = 0x7ff29c14fac0, buf = 0x55ab7a26b4a0 <_faked_sip_buf> "OPTIONS sip:you at kamailio.org SIP/2.0\r\nVia: SIP/2.0/UDP 127.0.0.1\r\nFrom: <sip:you at kamailio.org>;tag=123\r\nTo: <sip:you at kamailio.org>\r\nCall-ID: 123\r\nCSeq: 1 OPTIONS\r\nContent-Length: 0\r\n\r\n", len = 184, msg = 0x55ab7a27b4c0 <_faked_msg>, rmode = 0, rplcode = 0}
        __func__ = "th_execute_event_route"
#15 0x00007ff29a91eda4 in th_msg_sent (evp=0x7fff2b35a140) at topoh_mod.c:436
        msg = {id = 0, pid = 0, tval = {tv_sec = 0, tv_usec = 0}, fwd_send_flags = {f = 0, blst_imask = 0}, rpl_send_flags = {f = 0, blst_imask = 0}, first_line = {type = 0, flags = 0, len = 0, u = {request = {method = {s = 0x0, len = 0}, uri = {s = 0x0, len = 0}, version = {s = 0x0, len = 0}, method_value = 0}, reply = {version = {s = 0x0, len = 0}, status = {s = 0x0, len = 0}, reason = {s = 0x0, len = 0}, statuscode = 0}}}, via1 = 0x0, via2 = 0x0, headers = 0x7ff29c14fac0, last_header = 0xd780a0a64230002, parsed_flag = 0, h_via1 = 0x0, h_via2 = 0x0, callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0x0, authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x1, require = 0x1d600000011, proxy_require = 0x7ff19a5159aa, unsupported = 0xc, allow = 0x7fff2b3599e0, event = 0x7ff29c14fac0, accept = 0x1, accept_language = 0x7ff19aa59dc4, organization = 0x7ff29c2edb8e, priority = 0x9c2c1850, subject = 0x12b359930, user_agent = 0x7ff19aa59dc4, server = 0x7fff2b359930, content_disposition = 0x7ff29aa244ae <futex_release+29>, diversion = 0x6000013ce, rpid = 0x7ff29aa72d2b, refer_to = 0x0, session_expires = 0x19c40a7f0, min_se = 0x7fff2b3599e0, sipifmatch = 0x7ff29aa2d858 <dlg_lookup_mode+1285>, subscription_state = 0x2b359a20, date = 0xb8900016345, identity = 0x0, identity_info = 0x7fff2b35a2e0, pai = 0x7fff2b35a2c0, ppi = 0x7fff2b35a268, path = 0x7ff29c2b53d0, privacy = 0x7ff29c2b4050, min_expires = 0xf9c40a148, body = 0x55ab7a27ce40 <buf>, eoh = 0x1 <error: Cannot access memory at address 0x1>, unparsed = 0x7ff19aa59dc4 "\002", rcv = {src_ip = {af = 2594545072, len = 32753, u = {addrl = {3060085768, 5019900400}, addr32 = {3060085768, 0, 724933104, 1}, addr16 = {13320, 46693, 0, 0, 39408, 11061, 1, 0}, addr = "\b4e\266\000\000\000\000\360\231\065+\001\000\000"}}, dst_ip = {af = 2594545092, len = 32753, u = {addrl = {140733918321136, 140679953138862}, addr32 = {724933104, 32767, 2594325678, 32754}, addr16 = {39408, 11061, 32767, 0, 17582, 39586, 32754, 0}, addr = "\360\231\065+\377\177\000\000\256D\242\232\362\177\000"}}, src_port = 0, dst_port = 0, proto_reserved1 = 6, proto_reserved2 = -1700422204, src_su = {s = {sa_family = 39424, sa_data = "5+\377\177\000\000\360\247@\234\001\000\000"}, sin = {sin_family = 39424, sin_port = 11061, sin_addr = {s_addr = 32767}, sin_zero = "\360\247@\234\001\000\000"}, sin6 = {sin6_family = 39424, sin6_port = 11061, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "\360\247@\234\001\000\000\000\000\233\065+\377\177\000", __u6_addr16 = {42992, 40000, 1, 0, 39680, 11061, 32767, 0}, __u6_addr32 = {2621482992, 1, 724933376, 32767}}}, sin6_scope_id = 2594384821}, sas = {ss_family = 39424, __ss_padding = "5+\377\177\000\000\360\247@\234\001\000\000\000\000\233\065+\377\177\000\000\265+\243\232\362\177\000\000\020\232\065+\377\177\000\000o\027\246\232\362\177\000\000\000\233\065+\377\177\000\000a\261\241\232\362\177\000\000\340\240\065+\377\177\000\000\036~\327y\253U\000\000\000\000\000\000\006\000\000\000\033\230\247\232\362\177\000\000\000\000\000\000\000\000\000\000E-\247\232\362\177\000\000U\004\000\000\001\000\000", __ss_align = 140676123931656}}, bind_address = 0x0, rflags = (unknown: 0xb5fb4b88), proto = -15 '\361', proto_pad0 = 127 '\177', proto_pad1 = 0}, buf = 0x7ff29c14e530 "\t", len = 2049356960, new_uri = {s = 0xb8 <error: Cannot access memory at address 0xb8>, len = -1234881528}, dst_uri = {s = 0x0, len = -1275302440}, parsed_uri_ok = 0, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0xc0efd8392 <error: Cannot access memory at address 0xc0efd8392>, len = -1700422224}, host = {s = 0x7ff19aa59dc4 "\002", len = 0}, port = {s = 0x7ff29c40a7f0 "", len = 0}, params = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, sip_params = {s = 0x0, len = 724933520}, headers = {s = 0x7fff2b359d20 "\020\236\065+\377\177", len = -1676046472}, port_no = 41288, proto = 40000, type = 32754, flags = (unknown: 0x2b359bf0), transport = {s = 0x7ff29aa5eea4 <pv_get_dlg_variable+2524> "\353 H\213\225H\377\377\377H\213\215P\377\377\377H\213\205X\377\377\377H\211\316H\211\307\350\272V\365\377H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354\210", len = 0}, ttl = {s = 0x7fff2b359d20 "\020\236\065+\377\177", len = -1676046472}, user_param = {s = 0x7ff29c40a148 "\335\257", len = 2044674038}, maddr = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, method = {s = 0x0, len = 724933536}, lr = {s = 0x55ab79ec26d5 <pv_printf+59> "\311\303UH\211\345H\203\354 at H\211}\310H\211u\300H\203}\310", len = 2049351272}, r2 = {s = 0x55ab7a27b4c0 <_faked_msg> "\350\220\002", len = -1676456672}, gr = {s = 0x24 <error: Cannot access memory at address 0x24>, len = 724933568}, transport_val = {s = 0x7ff1b1ee09d0 "h+\003\266\361\177", len = 2044674038}, ttl_val = {s = 0x55ab79eee690 <str2ip6buf+1208> "\351P\001", len = 0}, user_param_val = {s = 0x7ff29c40a7f0 "", len = 2049535000}, maddr_val = {s = 0x7fff2b35a060 "", len = 0}, method_val = {s = 0x0, len = 724933792}, lr_val = {s = 0x55ab79ec129a <pv_get_spec_value+950> "\211E\314\203}\314", len = -1674912856}, r2_val = {s = 0x7fff2b359d20 "\020\236\065+\377\177", len = 2049535024}, gr_val = {s = 0x7fff2b35a060 "", len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 90949}, passwd = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 2049535008}, host = {s = 0x0, len = -1674620659}, port = {s = 0x7ff29c2f5117 ":5060", len = 2047264002}, params = {s = 0x7fff2b359cb0 "", len = -1676980208}, sip_params = {s = 0x7ff29c2f8808 "10.10.120.33:5060>\r\nFrom: <sip:dialog at 10.10.120.29:5060>;tag=1f5200afc6af2aadb0905b1e02502545-d048331e\r\nCSeq: 10 KDMQ\r\nCall-ID: 4a9afae1243460d0-12 at 90.30.20.32\r\nContent-Length: 1117\r\nMax-Forwards: 1"..., len = -1676980208}, headers = {s = 0x7fff2b359cf0 " \235\065+\377\177", len = -1681979062}, port_no = 0, proto = 0, type = 207, flags = 0, transport = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 533497480}, ttl = {s = 0x2549f8 <error: Cannot access memory at address 0x2549f8>, len = 3373432}, user_param = {s = 0x3641b0 <error: Cannot access memory at address 0x3641b0>, len = 8}, maddr = {s = 0x5a <error: Cannot access memory at address 0x5a>, len = -1676980208}, method = {s = 0x7fff2b359d20 "\020\236\065+\377\177", len = 2044739546}, lr = {s = 0x0, len = 2048839412}, r2 = {s = 0x7fff2b359e10 "\340\237\065+\377\177", len = 2047222937}, gr = {s = 0x7fff2b359e10 "\340\237\065+\377\177", len = 2047224132}, transport_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 724934752}, ttl_val = {s = 0x55ab7a1a5c2b "core", len = 2049429408}, user_param_val = {s = 0x55ab7a1a9118 <__func__.8> "via_builder", len = 2048549505}, maddr_val = {s = 0x60 <error: Cannot access memory at address 0x60>, len = -1676980208}, method_val = {s = 0x7fff2b359e8c "\362\177", len = 724934752}, lr_val = {s = 0x0, len = 536870912}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b359dd0 "\240\317'z\253U", len = 2045519573}}, add_rm = 0x55ab7a269e68 <log_prefix_str+8>, body_lumps = 0xe800000001, reply_lump = 0x7ff29c3d2880, add_to_branch_s = "@\207/\234\362\177\000\000\240\317'z\253U\000\000\020P\v\234\362\177", '\000' <repeats 14 times>, "\004", '\000' <repeats 14 times>, " \000\000\000\000\000", add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 724934624, xflags = {32767, 2045344288}, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x7fff2b35a060 "", len = 0}, force_send_socket = 0x7fff2b35a070, path_vec = {s = 0x7fff2b35a360 "\300\372\024\234\362\177", len = 0}, instance = {s = 0x55ab7a06c502 <qm_info+46> "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b", len = 724934304}, reg_id = 2617987088, ruid = {s = 0x7ff29c2f8740 "@\a", len = -1676980208}, location_ua = {s = 0x7fff2b359ee0 "\020\237\065+\377\177", len = -1681979062}, otcpid = 724934752, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 536870912, len = 0, u = {addrl = {533495824, 2445528}, addr32 = {533495824, 0, 2445528, 0}, addr16 = {32784, 8140, 0, 0, 20696, 37, 0, 0}, addr = "\020\200\314\037\000\000\000\000\330P%\000\000\000\000"}}, dst_ip = {af = 3375088, len = 0, u = {addrl = {3555760, 8}, addr32 = {3555760, 0, 8, 0}, addr16 = {16816, 54, 0, 0, 8, 0, 0, 0}, addr = "\260A6\000\000\000\000\000\b\000\000\000\000\000\000"}}, src_port = 89, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = -1676980208, src_su = {s = {sa_family = 40720, sa_data = "5+\377\177\000\000\332?\340y\253U\000"}, sin = {sin_family = 40720, sin_port = 11061, sin_addr = {s_addr = 32767}, sin_zero = "\332?\340y\253U\000"}, sin6 = {sin6_family = 40720, sin6_port = 11061, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "\332?\340y\253U\000\000\000\000\000\000\000\000\000", __u6_addr16 = {16346, 31200, 21931, 0, 0, 0, 0, 0}, __u6_addr32 = {2044739546, 21931, 0, 0}}}, sin6_scope_id = 2048839412}, sas = {ss_family = 40720, __ss_padding = "5+\377\177\000\000\332?\340y\253U\000\000\000\000\000\000\000\000\000\000\364\316\036z\005\000\000\000\000\240\065+\377\177\000\000\231$\006z\000\000\000\000\000\240\065+\377\177\000\000D)\006z\253U\000\000\b\210/\234\362\177\000\000\020P\v\234\362\177\000\000\233\256\267\233\362\177\000\000J\t\277\233\213\000\000\000\300\257\267\233\362\177\000\000\320\257\267\233\362\177\000\000\340\005\000\000\000\000\000", __ss_align = 140679976800272}}, bind_address = 0x8700000187, rflags = (RECV_F_INTERNAL | RECV_F_PREROUTING | unknown: 0x9bb7f510), proto = -14 '\362', proto_pad0 = 127 '\177', proto_pad1 = 0}}, vdata = 0x7ff1b30b51c0}}
        obuf = 0x7fff2b35a1a0
        direction = 2047222937
        dialog = 0
        local = 21931
        nbuf = {s = 0x0, len = 0}
        __func__ = "th_msg_sent"
#16 0x000055ab79e03f22 in sr_event_exec (type=2, evp=0x7fff2b35a140) at core/events.c:249
        ret = 0
        i = 7
#17 0x00007ff29ba9f53b in msg_send_buffer (dst=0x7ff1b3be6660, buf=0x7ff1ad09e598 "KDMQ sip:dialog at 10.10.120.33:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.29;branch=z9hG4bK26da.42632d77", '0' <repeats 24 times>, ".0\r\nTo: <sip:dialog at 10.10.120.33:5060>\r\nFrom: <sip:dialog at 10.10.120.29:5060>"..., len=1497, flags=0) at ../../core/forward.h:148
        new_dst = {send_sock = 0x7fff2b35a1e0, to = {s = {sa_family = 58776, sa_data = "\t\255\361\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 58776, sin_port = 44297, sin_addr = {s_addr = 32753}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 58776, sin6_port = 44297, sin6_flowinfo = 32753, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\220\243x\232\001\000\000", __u6_addr16 = {0, 0, 0, 0, 41872, 39544, 1, 0}, __u6_addr32 = {0, 0, 2591597456, 1}}}, sin6_scope_id = 1}, sas = {ss_family = 58776, __ss_padding = "\t\255\361\177\000\000\000\000\000\000\000\000\000\000\220\243x\232\001\000\000\000\001\000\000\000\000\000\000\000r\353\t\255\361\177\000\000\370Q\v\263\361\177", '\000' <repeats 22 times>, "\004", '\000' <repeats 14 times>, " ", '\000' <repeats 20 times>, "\200\244\065+\377\177\000\000\276\276\266\233\362\177\000", __ss_align = 140733918323488}}, id = 2047223133, send_flags = {f = 21931, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        outb = {s = 0x7ff29c2f8778 "KDMQ sip:dialog at 10.10.120.33:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.29;branch=z9hG4bK26da.42632d77", '0' <repeats 24 times>, ".0\r\nTo: <sip:dialog at 10.10.120.33:5060>\r\nFrom: <sip:dialog at 10.10.120.29:5060>"..., len = 1497}
        netinfo = {data = {s = 0x4009bba76a0 <error: Cannot access memory at address 0x4009bba76a0>, len = -1279368216}, rcv = 0x7ff29bba7688 <content_length>, dst = 0x7ff200000004}
        evp = {data = 0x7fff2b35a1a0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x7ff1b3be6660, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        port = -1371623720
        ip = {af = 2612524584, len = 32754, u = {addrl = {140676067709432, 0}, addr32 = {3003863544, 32753, 0, 0}, addr16 = {20984, 45835, 32753, 0, 0, 0, 0, 0}, addr = "\370Q\v\263\361\177\000\000\000\000\000\000\000\000\000"}}
        from = 0x0
        local_addr = {s = {sa_family = 1, sa_data = "\000\000\000\000\000\000\001\000\000\000\005\000\000"}, sin = {sin_family = 1, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\001\000\000\000\005\000\000"}, sin6 = {sin6_family = 1, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\001\000\000\000\005\000\000\000\000\000\000\000\000\000\000", __u6_addr16 = {1, 0, 5, 0, 0, 0, 0, 0}, __u6_addr32 = {1, 5, 0, 0}}}, sin6_scope_id = 3003863488}, sas = {ss_family = 1, __ss_padding = "\000\000\000\000\000\000\001\000\000\000\005", '\000' <repeats 11 times>, "\300Q\v\263\361\177\000\000\000\241\065+\001\000\000\000\310\306U\232\361\177\000\000\000\241\065+\377\177\000\000\330\360\005z\253U\000\000\000\000\000\000\000\000\000\000\310\306U\232\361\177", '\000' <repeats 14 times>, "\001\000\000\000P\241\065+\377\177\000\000q\354\006z\253U\000\000\020\365\267\233\362\177\000", __ss_align = 579820584960}}
        con = 0x0
        wsev = {type = -1241803176, buf = 0x7ff29c0b5010 "\001", len = 1856, id = 0}
        ret = 32753
        __func__ = "msg_send_buffer"
#18 0x00007ff29baa5033 in send_pr_buffer (rb=0x7ff1b3be6610, buf=0x7ff1ad09e598, len=1497) at t_funcs.c:69
        __func__ = "send_pr_buffer"
#19 0x00007ff29bb6cc48 in send_prepared_request_impl (request=0x7ff1b3be6610, retransmit=1, branch=0) at uac.c:676
        t = 0x7ff1b3be6370
        p_msg = 0x0
        uac = 0x7ff1b3be6600
        ip = {af = 724893697, len = 5060, u = {addrl = {140733918323944, 140733918323968}, addr32 = {724935912, 32767, 724935936, 32767}, addr16 = {42216, 11061, 32767, 0, 42240, 11061, 32767, 0}, addr = "\350\244\065+\377\177\000\000\000\245\065+\377\177\000"}}
        ret = 32767
        __func__ = "send_prepared_request_impl"
#20 0x00007ff29bb6e298 in t_uac_with_ids (uac_r=0x7fff2b35a6b0, ret_index=0x0, ret_label=0x0) at uac.c:760
        request = 0x7ff1b3be6610
        cell = 0x7ff1b3be6370
        ret = 1
        is_ack = 0
        branch_ret = 21931
        i = 0
        added_branches = 1
#21 0x00007ff29bb6e1c4 in t_uac (uac_r=0x7fff2b35a6b0) at uac.c:728
No locals.
#22 0x00007ff29bb71730 in request (uac_r=0x7fff2b35a6b0, ruri=0x7fff2b35a680, to=0x7fff2b35a680, from=0x7fff2b35a690, next_hop=0x0) at uac.c:1096
        callid = {s = 0x7ff29bba5c80 <callid_buf> "4a9afae1243460d0-12 at 90.30.20.32", len = 33}
        fromtag = {s = 0x7ff29bbb7cc0 <from_tag> "1f5200afc6af2aadb0905b1e02502545-d048331e", len = 41}
        dialog = 0x7ff1ae3eaf10
        res = 45
        __func__ = "request"
#23 0x00007ff29b74deb3 in dmq_send_message (peer=0x7ff19aa62cf8, body=0x7fff2b35a9e0, node=0x7ff1abab0560, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:268
        uac_r = {method = 0x7ff29b77a220 <dmq_request_method>, headers = 0x7fff2b35a6a0, body = 0x7fff2b35a9e0, ssock = 0x7ff29b77aa60 <dmq_server_socket>, ssockname = 0x0, dialog = 0x7ff1ae3eaf10, cb_flags = 1024, cb = 0x7ff29b749f88 <dmq_tm_callback>, cbp = 0x7ff1b03e2700, callid = 0x0}
        str_hdr = {s = 0x7ff29c2f4fc8 "Max-Forwards: 1\r\nContent-Type: application/json\r\n", len = 49}
        from = {s = 0x7ff29c2f5068 "sip:dialog at 10.10.120.29:5060", len = 28}
        to = {s = 0x7ff29c2f5100 "sip:dialog at 10.10.120.33:5060", len = 28}
        cb_param = 0x7ff1b03e2700
        result = 0
        len = 49
        __func__ = "dmq_send_message"
#24 0x00007ff29b74c21e in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35a9e0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:187
        node = 0x7ff1abab0560
        __func__ = "bcast_dmq_message1"
#25 0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35a9e0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#26 0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35a9e0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#27 0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_UPDATE, dlg=0x7ff1b6653408, needlock=1, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b2c7070, flags = 0, buf = {s = 0x55ab7b2ca720 "{\"action\":1,\"h_entry\":2953,\"h_id\":90949,\"init_ts\":1640001510,\"callid\":\"120432-28104 at 10.10.120.20\",\"from_uri\":\"sip:+351555555555 at 10.10.120.20:5070\",\"to_uri\":\"sip:+351888888888 at load-tests-1038.sip-revie"..., len = 1117}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x7fff2b35aa50, flags = -1700603816, buf = {s = 0x7a269e68 <error: Cannot access memory at address 0x7a269e68>, len = 90949}, malloc_fn = 0x7ff29c3d2880, free_fn = 0x7ff29c40a148}
        var = 0x0
        __func__ = "dlg_dmq_replicate_action"
#28 0x00007ff29aa14021 in dlg_on_send (t=0x7ff1b5fb4a60, type=16, param=0x7fff2b35ac60) at dlg_handlers.c:760
        dlg = 0x7ff1b6653408
        iuid = 0x7ff1b321b318
        __func__ = "dlg_on_send"
#29 0x00007ff29bac5399 in run_trans_callbacks_internal (cb_lst=0x7ff1b5fb4ad8, type=16, trans=0x7ff1b5fb4a60, params=0x7fff2b35ac60) at t_hooks.c:258
        cbp = 0x7ff1ad5d1768
        backup_from = 0x7ff1b5fb4c70
        backup_to = 0x7ff1b5fb4c78
        backup_dom_from = 0x55ab7a331ea0 <def_list+32>
        backup_dom_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x7ff1b5fb4c60
        backup_uri_to = 0x7ff1b5fb4c68
        backup_xavps = 0x7ff1b5fb4c90
        backup_xavus = 0x7ff1b5fb4c98
        backup_xavis = 0x7ff1b5fb4ca0
        __func__ = "run_trans_callbacks_internal"
#30 0x00007ff29bac54c9 in run_trans_callbacks (type=16, trans=0x7ff1b5fb4a60, req=0x7ff29c40a148, rpl=0x0, code=-1) at t_hooks.c:285
        params = {req = 0x7ff29c40a148, rpl = 0x0, param = 0x7ff1ad5d1778, code = -1, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#31 0x00007ff29bab19bd in prepare_new_uac (t=0x7ff1b5fb4a60, i_req=0x7ff29c40a148, branch=0, uri=0x7fff2b35ae60, path=0x7fff2b35ae40, next_hop=0x7fff2b35ae50, fsocket=0x7ff29c14eff8, snd_flags=..., fproto=0, flags=0, instance=0x7fff2b35ae30, ruid=0x7fff2b35ae20, location_ua=0x7fff2b35ae10) at t_fwd.c:380
        shbuf = 0x0
        add_rm_backup = 0x7ff29c198428
        body_lumps_backup = 0x7ff29c2c14c0
        parsed_uri_bak = {user = {s = 0x7ff29c281054 "1007+351888888888 at load-tests-1038.sip-review.test.com:5060", len = 17}, passwd = {s = 0x0, len = 0}, host = {s = 0x7ff29c281066 "load-tests-1038.sip-review.test.com:5060", len = 41}, port = {s = 0x7ff29c281090 "5060", len = 4}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 5060, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        ret = -1
        len = 21931
        parsed_uri_ok_bak = 1
        free_new_uri = 1
        msg_uri_bak = {s = 0x7ff29c281050 "sip:1007+351888888888 at load-tests-1038.sip-review.test.com:5060", len = 68}
        dst_uri_bak = {s = 0x7ff29c2c1440 "sip:10.10.120.19:5060", len = 21}
        dst_uri_backed_up = 1
        path_bak = {s = 0x0, len = 0}
        free_path = 1
        instance_bak = {s = 0x0, len = 0}
        free_instance = 1
        ruid_bak = {s = 0x0, len = 0}
        free_ruid = 1
        ua_bak = {s = 0x0, len = 0}
        free_ua = 1
        backup_route_type = 1
        test_dst = 32767
        fwd_snd_flags_bak = {f = 4, blst_imask = 0}
        rpl_snd_flags_bak = {f = 0, blst_imask = 0}
        force_send_socket_bak = 0x7ff29c14eff8
        dst = 0x7ff1b5fb4d50
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {140679980296176, -2564614606656011374, 0, 536870912, 0, 0, -2564614606605679726, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {94194975714355, 140733918326568, 140733918326544, 4049348816752887656, 3760560875647545393, 550564082227, 0, 0, 0, 0, 1184, 109939064470949551, 12494387265012046764, 140733918326320, 94194975713746, 3328215311436493102}}}}}
        bctx = 0x7fff2b35b1b8
        keng = 0x0
        __func__ = "prepare_new_uac"
#32 0x00007ff29bab7078 in add_uac (t=0x7ff1b5fb4a60, request=0x7ff29c40a148, uri=0x7ff29c40a428, next_hop=0x7ff29c40a438, path=0x7ff29c40a7f0, proxy=0x0, fsocket=0x7ff29c14eff8, snd_flags=..., proto=0, flags=0, instance=0x7ff29c40a800, ruid=0x7ff29c40a818, location_ua=0x7ff29c40a828) at t_fwd.c:814
        ret = 100
        branch = 0
        __func__ = "add_uac"
#33 0x00007ff29bac0f1c in t_forward_nonack (t=0x7ff1b5fb4a60, p_msg=0x7ff29c40a148, proxy=0x0, proto=0) at t_fwd.c:1694
        branch_ret = 0
        lowest_ret = -1
        added_branches = 0
        first_branch = 0
        i = 32767
        t_invite = 0x7ff29c2ed5f8
        success_branch = 724939632
        try_new = 1
        lock_replies = 724939744
        backup_bflags = 0
        obranch = {uri = {s = 0x17300000000 <error: Cannot access memory at address 0x17300000000>, len = 0}, dst_uri = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, q = 0, path = {s = 0x0, len = 724939568}, flags = 2612028690, force_socket = 0x1, ruid = {s = 0x7fff2b35b300 "", len = 724939616}, instance = {s = 0x6400000001 <error: Cannot access memory at address 0x6400000001>, len = -1673486008}, location_ua = {s = 0x7ff1b5fb4a60 "@ol\232\361\177", len = 724939648}, otcpid = -1673486008}
        __func__ = "t_forward_nonack"
#34 0x00007ff29baa82ad in t_relay_to (p_msg=0x7ff29c40a148, proxy=0x0, proto=0, replicate=0) at t_funcs.c:335
        ret = 0
        new_tran = 1
        t = 0x7ff1b5fb4a60
        dst = {send_sock = 0x0, to = {s = {sa_family = 1, sa_data = "\000\000\000\000\000\000P\264\065+\377\177\000"}, sin = {sin_family = 1, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "P\264\065+\377\177\000"}, sin6 = {sin6_family = 1, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "P\264\065+\377\177\000\000\325&\354y\253U\000", __u6_addr16 = {46160, 11061, 32767, 0, 9941, 31212, 21931, 0}, __u6_addr32 = {724939856, 32767, 2045519573, 21931}}}, sin6_scope_id = 2049351272}, sas = {ss_family = 1, __ss_padding = "\000\000\000\000\000\000P\264\065+\377\177\000\000\325&\354y\253U\000\000h\236&z\253U\000\000`\232&z\253U\000\000\200(=\234\362\177\000\000H\241@\234\362\177\000\000p\264\065+\377\177\000\000\375<\337y", '\000' <repeats 16 times>, "\001\000\000\000\001\000\000\000\000\000\000\000\304\235\245\232\361\177", '\000' <repeats 17 times>, __ss_align = 5019907280}}, id = -1700422204, send_flags = {f = 32753, blst_imask = 0}, proto = -48 '\320', proto_pad0 = -76 '\264', proto_pad1 = 11061}
        port = 0
        host = {s = 0x7ff29c198f78 "", len = 724940048}
        comp = 0
        __func__ = "t_relay_to"
#35 0x00007ff29bb4e671 in _w_t_relay_to (p_msg=0x7ff29c40a148, proxy=0x0, force_proto=0) at tm.c:1762
        t = 0x7fff2b35b6a0
        res = 1
        __func__ = "_w_t_relay_to"
#36 0x00007ff29bb4fa8c in w_t_relay (p_msg=0x7ff29c40a148, _foo=0x0, _bar=0x0) at tm.c:1962
No locals.
#37 0x000055ab79d8101e in do_action (h=0x7fff2b35be80, a=0x7ff29c23ab70, msg=0x7ff29c40a148) at core/action.c:1076
        ret = -5
        v = 1
        dst = {send_sock = 0x7fff2b35bb40, to = {s = {sa_family = 45409, sa_data = "\241\232\362\177\000\000\020\t\022\234\362\177\000"}, sin = {sin_family = 45409, sin_port = 39585, sin_addr = {s_addr = 32754}, sin_zero = "\020\t\022\234\362\177\000"}, sin6 = {sin6_family = 45409, sin6_port = 39585, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "\020\t\022\234\362\177\000\000$\000\000\000\377\177\000", __u6_addr16 = {2320, 39954, 32754, 0, 36, 0, 32767, 0}, __u6_addr32 = {2618427664, 32754, 36, 32767}}}, sin6_scope_id = 0}, sas = {ss_family = 45409, __ss_padding = "\241\232\362\177\000\000\020\t\022\234\362\177\000\000$\000\000\000\377\177\000\000\000\000\000\000\006\000\000\000\320\t\356\261\361\177\000\000\240\201'\274\f\000\000\000\b4e\266\361\177\000\000U\004\000\000\001\000\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "p\273\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 10}}, id = 724941808, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> ""
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35bc70 "\240\274\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> ""
        cmd = 0x7ff29c153bc0
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35b8e0 "\320\271\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35b9d0 "`\272\065+\377\177", len = -1700679327}, host = {s = 0x7ff29c10a498 "3279a1fd-f5d0-4698-ad6f-ac850968420e", len = 2049350276}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1234881528}, headers = {s = 0x0, len = 0}, port_no = 47472, proto = 11061, type = 32767, flags = (URI_USER_NORMALIZE | unknown: 0x79ec26d4), transport = {s = 0x55ab7a269e68 <log_prefix_str+8> "", len = -1234881528}, ttl = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, user_param = {s = 0x7fff2b35b990 "\260\235\245\232\361\177", len = 2044673277}, maddr = {s = 0x0, len = -1673486008}, method = {s = 0x7ff19aa59db0 "\b4e\266\361\177", len = -1700422204}, lr = {s = 0x0, len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35ba60 "\020\t\022\234\362\177", len = 724941808}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35bac0 "p\273\065+\377\177", len = -1700401500}, maddr_val = {s = 0x7fff2b35ba30 "@\273\065+\377\177", len = 724941808}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b35ba40 "P\272\065+\377\177", len = 0}, r2_val = {s = 0x7fff2b35bb40 "\320\273\065+\377\177", len = -1700582475}, gr_val = {s = 0x7fff2b35ba50 "@\273\065+\377\177", len = -1700391057}}
        next_hop = {user = {s = 0xc79df3ff6 <error: Cannot access memory at address 0xc79df3ff6>, len = -1234881528}, passwd = {s = 0x0, len = 0}, host = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, port = {s = 0x0, len = 0}, params = {s = 0x7fff2b35b840 "@\271\065+\377\177", len = 2045514394}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700422204}, headers = {s = 0x7ff29c198f60 "\026", len = -1673486008}, port_no = 47104, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59dc4), transport = {s = 0x7fff2b35b800 "\260\270\065+\377\177", len = -1700641618}, ttl = {s = 0x6549d8392 <error: Cannot access memory at address 0x6549d8392>, len = -1700319957}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x7fff2b35b8b0 "\320\270\065+\377\177", len = -1700603816}, method = {s = 0x0, len = 90949}, lr = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7fff2b35b940 "p\271\065+\377\177", len = 2045517645}, transport_val = {s = 0x0, len = 2049351272}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700422204}, user_param_val = {s = 0x7ff19aa59db0 "\b4e\266\361\177", len = -1234881528}, maddr_val = {s = 0x12b35b8c0 <error: Cannot access memory at address 0x12b35b8c0>, len = -1700422204}, method_val = {s = 0x7fff2b35b8c0 "\320\271\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700422204}, r2_val = {s = 0x7fff2b35b8d0 "\340\270\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35b9d0 "`\272\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35bca0
        port = 0
        dst_host = 0x20000000
        i = 0
        flags = 32753
        avp = 0x0
        st = {flags = 2620375944, id = 32754, name = {n = 0, s = {s = 0x0, len = -1676572816}, re = 0x0}, avp = 0x24}
        sct = 0x7ff29c3d2880
        sjt = 0x100000018
        rve = 0x0
        mct = 0x7ff29c40a148
        rv = 0x0
        rv1 = 0x20000000
        c1 = {cache_type = 2618920824, val_type = 32754, c = {avp_val = {n = -1673486008, s = {s = 0x7ff29c40a148 "\335\257", len = 724940592}, re = 0x7ff29c40a148}, pval = {rs = {s = 0x7ff29c40a148 "\335\257", len = 724940592}, ri = -1676980208, flags = 32754}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 724940992}
        srevp = {0x7fff2b35b790, 0x7ff29aa5eea4 <pv_get_dlg_variable+2524>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#38 0x000055ab79d8f89f in run_actions (h=0x7fff2b35be80, a=0x7ff29c23ab70, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c23ab70
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 1}
        tdiff = 2594287969
        __func__ = "run_actions"
#39 0x000055ab79d8ff8d in run_actions_safe (h=0x7fff2b35e4e0, a=0x7ff29c23ab70, msg=0x7ff29c40a148) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614607270476910, 94194972442614, 536870912, 0, 0, -2564614607220145262, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {536870912, 0, 0, 140733918330752, 140733918331152, 140679977734008, 140679980294472, 140733918330848, 140679953378980, 18, 140733918331152, 140679977734008, 140679980294472, 1, 140675658390980, 0}}}}}
        ret = 0
        ign_on_break = 0
#40 0x000055ab79f295e9 in rval_get_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, i=0x7fff2b35c324, rv=0x7ff29c23acc8, cache=0x0) at core/rvalue.c:949
        r_avp = 0x0
        avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}
        pval = {rs = {s = 0x7ff29c198f60 "\026", len = -1673486008}, ri = 2044674038, flags = 1}
        tmp = {s = 0x0, len = 724943120}
        s = 0x0
        r = 0
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#41 0x000055ab79f2e7da in rval_expr_eval_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, res=0x7fff2b35c324, rve=0x7ff29c23acc0) at core/rvalue.c:1947
        i1 = 32754
        i2 = -1673713536
        ret = -1
        c1 = {cache_type = 2044674038, val_type = 21931, c = {avp_val = {n = 536870912, s = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, re = 0x20000000}, pval = {rs = {s = 0x20000000 <error: Cannot access memory at address 0x20000000>, len = 0}, ri = 0, flags = 0}}, i2s = "\300\301\065+\377\177\000\000\325&\354y\253U\000\000h\236&z\253U"}
        c2 = {cache_type = 724943392, val_type = 32767, c = {avp_val = {n = -1700679327, s = {s = 0x7ff29aa1b161 <dlg_lookup_msg_dialog+47> "H\211E\310H\203}\310", len = 2438640}, re = 0x7ff29aa1b161 <dlg_lookup_msg_dialog+47>}, pval = {rs = {s = 0x7ff29aa1b161 <dlg_lookup_msg_dialog+47> "H\211E\310H\203}\310", len = 2438640}, ri = 2049350276, flags = 21931}}, i2s = "\000\000\000\000\000\000\000\000\033\230\247\232$\000\000\000\001\000\000\000\000"}
        rv1 = 0x7ff29aa6176f <dlg_get_ctx_dialog+20>
        rv2 = 0x400000000
        __func__ = "rval_expr_eval_int"
#42 0x000055ab79f2ec61 in rval_expr_eval_int (h=0x7fff2b35e4e0, msg=0x7ff29c40a148, res=0x7fff2b35c864, rve=0x7ff29c23b3f0) at core/rvalue.c:1955
        i1 = 1
        i2 = -1674423704
        ret = -1
        c1 = {cache_type = 1109, val_type = RV_INT, c = {avp_val = {n = -1234881528, s = {s = 0x7ff1b6653408 "\002", len = 2044674038}, re = 0x7ff1b6653408}, pval = {rs = {s = 0x7ff1b6653408 "\002", len = 2044674038}, ri = 536870912, flags = 0}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 724943760, val_type = 32767, c = {avp_val = {n = -1700679327, s = {s = 0x7ff29aa1b161 <dlg_lookup_msg_dialog+47> "H\211E\310H\203}\310", len = -1676547928}, re = 0x7ff29aa1b161 <dlg_lookup_msg_dialog+47>}, pval = {rs = {s = 0x7ff29aa1b161 <dlg_lookup_msg_dialog+47> "H\211E\310H\203}\310", len = -1676547928}, ri = 36, flags = 21931}}, i2s = "\000\000\000\000\006\000\000\000\033\230\247\232\362\177\000\000H\241@\234\f"}
        rv1 = 0x7ff29aa6176f <dlg_get_ctx_dialog+20>
        rv2 = 0x7fff2b35c2a0
        __func__ = "rval_expr_eval_int"
#43 0x000055ab79d80a74 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c23bd58, msg=0x7ff29c40a148) at core/action.c:1052
        ret = -5
        v = 1
        dst = {send_sock = 0x7fff2b35c7f0, to = {s = {sa_family = 17582, sa_data = "\242\232\362\177\000\000\250\350\021\234\362\177\000"}, sin = {sin_family = 17582, sin_port = 39586, sin_addr = {s_addr = 32754}, sin_zero = "\250\350\021\234\362\177\000"}, sin6 = {sin6_family = 17582, sin6_port = 39586, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "\250\350\021\234\362\177\000\000$\000\000\000\000\000\000", __u6_addr16 = {59560, 39953, 32754, 0, 36, 0, 0, 0}, __u6_addr32 = {2618419368, 32754, 36, 0}}}, sin6_scope_id = 724944896}, sas = {ss_family = 17582, __ss_padding = "\242\232\362\177\000\000\250\350\021\234\362\177\000\000$\000\000\000\000\000\000\000\000\310\065+\377\177\000\000\320\t\356\261\361\177\000\000\366?\337y\f\000\000\000\b4e\266\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\340\310\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 0}}, id = 724945248, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> ""
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35c9e0 "\020\312\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> ""
        cmd = 0x7ff29c153f40
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35c650 "@\307\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35c740 "\320\307\065+\377\177", len = -1700679327}, host = {s = 0x7fff2b35c680 "\020\310\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35c810 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1234881528}, headers = {s = 0x7fff2b35c7b0 "", len = 2044264333}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c212e00 "\214\002", len = -1234881528}, ttl = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700422204}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1}, maddr = {s = 0x12b35c730 <error: Cannot access memory at address 0x12b35c730>, len = -1392735840}, method = {s = 0x7ff19aa59db0 "\b4e\266\361\177", len = -1700422204}, lr = {s = 0x7fff2b35c740 "\320\307\065+\377\177", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35c7d0 "\250\350\021\234\362\177", len = 724945248}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35c830 "\340\310\065+\377\177", len = -1700401500}, maddr_val = {s = 0x2a <error: Cannot access memory at address 0x2a>, len = 724945248}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700422204}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35c4f0 "\020\305\065+\377\177", len = 2045519573}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "", len = 2049350240}, host = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = -1673486008}, port = {s = 0x7fff2b35c510 "\001", len = 2044673277}, params = {s = 0x0, len = 0}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700422204}, headers = {s = 0x0, len = 0}, port_no = 50544, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59dc4), transport = {s = 0x7fff2b35c570 " \306\065+\377\177", len = -1700641618}, ttl = {s = 0x67a269a60 <error: Cannot access memory at address 0x67a269a60>, len = -1700319957}, user_param = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = 0}, maddr = {s = 0x7fff2b35c620 "@\306\065+\377\177", len = -1700603816}, method = {s = 0x0, len = 90949}, lr = {s = 0x7fff2b35c6a0 "\260\307\065+\377\177", len = 2048839417}, r2 = {s = 0x7f00000187 <error: Cannot access memory at address 0x7f00000187>, len = -1700291612}, gr = {s = 0x7ff29c12ab18 "3279a1fd-f5d0-4698-ad6f-ac850968420e", len = 36}, transport_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700422204}, user_param_val = {s = 0x7ff19aa59db0 "\b4e\266\361\177", len = -1234881528}, maddr_val = {s = 0x12b35c630 <error: Cannot access memory at address 0x12b35c630>, len = -1700422204}, method_val = {s = 0x7fff2b35c630 "@\307\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700422204}, r2_val = {s = 0x7fff2b35c640 "P\306\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35c740 "\320\307\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35ca10
        port = 0
        dst_host = 0x0
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = 724944304, s = {s = 0x7fff2b35c5b0 "\030\253\022\234\362\177", len = -1676046496}, re = 0x7fff2b35c5b0}, avp = 0x7ff29c40a148}
        sct = 0x7ff29c3d2880
        sjt = 0x19aa32c08
        rve = 0x7ff29c23b3f0
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_ACTION_ST, c = {avp_val = {n = 0, s = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, re = 0x100000000}, pval = {rs = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, ri = 536870912, flags = 0}}, i2s = '\000' <repeats 16 times>, "\060\305\065+\377\177"}
        s = {s = 0xc9c11e8a8 <error: Cannot access memory at address 0xc9c11e8a8>, len = -1234881528}
        srevp = {0x55ab79df3ff6 <ksr_slog_json>, 0x7ff1b1ee09d0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#44 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c231348, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c23bd58
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1234881528, tz_dsttime = 0}
        tdiff = 2594545092
        __func__ = "run_actions"
#45 0x000055ab79d7d151 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c215728, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 41288, sa_data = "@\234\362\177\000\000\320\005\021\234\362\177\000"}, sin = {sin_family = 41288, sin_port = 40000, sin_addr = {s_addr = 32754}, sin_zero = "\320\005\021\234\362\177\000"}, sin6 = {sin6_family = 41288, sin6_port = 40000, sin6_flowinfo = 32754, sin6_addr = {__in6_u = {__u6_addr8 = "\320\005\021\234\362\177\000\000$\000\000\000\362\177\000", __u6_addr16 = {1488, 39953, 32754, 0, 36, 0, 32754, 0}, __u6_addr32 = {2618361296, 32754, 36, 32754}}}, sin6_scope_id = 724947040}, sas = {ss_family = 41288, __ss_padding = "@\234\362\177\000\000\320\005\021\234\362\177\000\000$\000\000\000\362\177\000\000`\320\065+\377\177\000\000\320\t\356\261\361\177\000\000\366?\337y\f\000\000\000\b4e\266\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\321\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140679978161920}}, id = 724947376, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> ""
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35d230 "`\322\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> ""
        cmd = 0x0
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35cea0 "\220\317\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700679327}, host = {s = 0x7ff29ba43694 <trim+36> "\220\311\303UH\211\345AWAVAUATSH\203\354X\350\243\273\376\377\211E\310\203}\310", len = 0}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1234881528}, headers = {s = 0x7fff2b35d5b0 "\001", len = 2049350246}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c284970 "\n\004", len = -1234881528}, ttl = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, user_param = {s = 0x55ab7a321ee2 <buf+130> "z9hG4bK-28104-120432-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPpTag00120432\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1038.sip-review.test.com:5060>\r\nCall-I"..., len = 22}, maddr = {s = 0x55ab7a321f38 <buf+216> "28104SIPpTag00120432\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1038.sip-review.test.com:5060>\r\nCall-ID: 120432-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:"..., len = 20}, method = {s = 0x7ff19aa59db0 "\b4e\266\361\177", len = -1700422204}, lr = {s = 0x55ab7a321fd0 <buf+368> "INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test\r\nContent-Type: application/sdp\r\nContent-Length:   135\r\nTH: dih\r\n\r\nv=0\r\no=user1 53655765 2353687637 IN "..., len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d020 "\320\005\021\234\362\177", len = 724947376}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d080 "0\321\065+\377\177", len = -1700401500}, maddr_val = {s = 0x0, len = 724947376}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x7fff2b35d030 "`\320\065+\377\177", len = -1683738574}}
        next_hop = {user = {s = 0x7fff2b35cf40 "8\037\062z\253U", len = 0}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "", len = 2049350240}, host = {s = 0x0, len = -1673486008}, port = {s = 0x7fff2b35cd60 "\001", len = 0}, params = {s = 0xc00000000 <error: Cannot access memory at address 0xc00000000>, len = -1234881528}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700422204}, headers = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, port_no = 52672, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59dc4), transport = {s = 0x7fff2b35cdc0 "p\316\065+\377\177", len = -1700641618}, ttl = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700319957}, user_param = {s = 0x7ff29c198f60 "\026", len = 0}, maddr = {s = 0x7fff2b35ce70 "\220\316\065+\377\177", len = -1700603816}, method = {s = 0x2b35cea0 <error: Cannot access memory at address 0x2b35cea0>, len = 90949}, lr = {s = 0x72 <error: Cannot access memory at address 0x72>, len = -1673486008}, r2 = {s = 0x7fff2b35cf1c "\361\177", len = 724946720}, gr = {s = 0x7fff2b35cf30 "\342\036\062z\253U", len = 724946752}, transport_val = {s = 0x7fff2b35cf40 "8\037\062z\253U", len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700422204}, user_param_val = {s = 0x7ff19aa59db0 "\b4e\266\361\177", len = -1234881528}, maddr_val = {s = 0x12b35ce80 <error: Cannot access memory at address 0x12b35ce80>, len = -1700422204}, method_val = {s = 0x7fff2b35ce80 "\220\317\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700422204}, r2_val = {s = 0x7fff2b35ce90 "\240\316\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35cf90 " \320\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35d260
        port = 0
        dst_host = 0x0
        i = 8
        flags = 32767
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = -1673486008, s = {s = 0x7ff29c40a148 "\335\257", len = -1676046496}, re = 0x7ff29c40a148}, avp = 0x7fff2b35cf1c}
        sct = 0x7ff29c3d2880
        sjt = 0x12b35d9a0
        rve = 0x7ff29c212f50
        mct = 0x7ff29c40a148
        rv = 0x7fff2b35cec0
        rv1 = 0x20000000
        c1 = {cache_type = 724946112, val_type = 32767, c = {avp_val = {n = 724946624, s = {s = 0x7fff2b35cec0 "", len = -1676046472}, re = 0x7fff2b35cec0}, pval = {rs = {s = 0x7fff2b35cec0 "", len = -1676046472}, ri = -1673486008, flags = 32754}}, i2s = "\220\315\065+\377\177\000\000\306\356\245\232\362\177\000\000\200\315\065+\377\177"}
        s = {s = 0x0, len = 0}
        srevp = {0x55ab79df3ff6 <ksr_slog_json>, 0x20000000}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#46 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c20c390, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c215728
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1234881528, tz_dsttime = 0}
        tdiff = 2594545092
        __func__ = "run_actions"
#47 0x000055ab79d7d151 in do_action (h=0x7fff2b35e4e0, a=0x7ff29c202230, msg=0x7ff29c40a148) at core/action.c:700
        ret = -5
        v = 21931
        dst = {send_sock = 0x55ab79df3ff6 <ksr_slog_json>, to = {s = {sa_family = 0, sa_data = "\000 ", '\000' <repeats 11 times>}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 724949200}, sas = {ss_family = 0, __ss_padding = "\000 ", '\000' <repeats 20 times>, "\320\330\065+\377\177\000\000\000\000\000\000\000\000\000\000\366?\337y\f\000\000\000\b4e\266\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\200\331\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 0}}, id = 724949504, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> ""
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35da80 "\260\332\065+\377\177"
        crt = 0x55ab7a269e68 <log_prefix_str+8> ""
        cmd = 0x7fff2b35db9c
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35d6f0 "\340\327\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35d7e0 "", len = -1700679327}, host = {s = 0x7fff2b35d720 "\260\330\065+\377\177", len = 2044673277}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x7fff2b35d8b0 "\366?\337y\253U", len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1234881528}, headers = {s = 0x7ff29c40a148 "\335\257", len = 724952288}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x9c40a148), transport = {s = 0x7ff29c201700 "J\002", len = -1234881528}, ttl = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, user_param = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, maddr = {s = 0x7fff2b35d7c0 "\366?\337y\253U", len = 2045519573}, method = {s = 0x7ff19aa59db0 "\b4e\266\361\177", len = -1700422204}, lr = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35d800 "\320\330\065+\377\177", len = 724949504}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35d8d0 "\200\331\065+\377\177", len = -1700401466}, maddr_val = {s = 0x7fff2b35d980 "\200\332\065+\377\177", len = 724949504}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x7fff2b35d980 "\200\332\065+\377\177", len = 2045978245}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fff2b35d590 "", len = 2045519573}, passwd = {s = 0x55ab7a269e68 <log_prefix_str+8> "", len = 0}, host = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, port = {s = 0x0, len = 0}, params = {s = 0x7fff2b35d5f0 "`\232&z\006", len = 0}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700422204}, headers = {s = 0x0, len = 0}, port_no = 54800, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59dc4), transport = {s = 0x7fff2b35d610 "\300\326\065+\377\177", len = -1700641618}, ttl = {s = 0x67a269a60 <error: Cannot access memory at address 0x67a269a60>, len = -1700319957}, user_param = {s = 0x7ff29c3d2880 "\210\332\024\234\362\177", len = 0}, maddr = {s = 0x7fff2b35d6c0 "\340\326\065+\377\177", len = -1700603816}, method = {s = 0x2b35d6f0 <error: Cannot access memory at address 0x2b35d6f0>, len = 90949}, lr = {s = 0x7ff29c1fd7c8 "\001", len = -1673486008}, r2 = {s = 0x7ff1b098cbf8 "(", len = 1}, gr = {s = 0x55ab7a285ed0 <pv_str_null_buf> "<null>", len = 6}, transport_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2045514394}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700422204}, user_param_val = {s = 0x7ff19aa59db0 "\b4e\266\361\177", len = -1234881528}, maddr_val = {s = 0x12b35d6d0 <error: Cannot access memory at address 0x12b35d6d0>, len = -1700422204}, method_val = {s = 0x7fff2b35d6d0 "\340\327\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700422204}, r2_val = {s = 0x7fff2b35d6e0 "\360\326\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35d7e0 "", len = -1700582475}}
        u = 0x7fff2b35dab0
        port = 0
        dst_host = 0x0
        i = 5
        flags = 0
        avp = 0x0
        st = {flags = 2618920824, id = 32754, name = {n = 724948560, s = {s = 0x7fff2b35d650 "\320^(z\253U", len = -1676046496}, re = 0x7fff2b35d650}, avp = 0x7ff29c40a148}
        sct = 0x7ff29c3d2880
        sjt = 0x19ba6d31a
        rve = 0x55ab79f295e9 <rval_get_int+314>
        mct = 0x7ff29c40a148
        rv = 0x55ab79ec129a <pv_get_spec_value+950>
        rv1 = 0x20000000
        c1 = {cache_type = 724948240, val_type = 32767, c = {avp_val = {n = 0, s = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, re = 0x100000000}, pval = {rs = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2044674038}, ri = 536870912, flags = 0}}, i2s = '\000' <repeats 16 times>, "\320\325\065+\377\177"}
        s = {s = 0xc00000000 <error: Cannot access memory at address 0xc00000000>, len = -1234881528}
        srevp = {0x55ab79df3ff6 <ksr_slog_json>, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#48 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c202230, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c202230
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 536870912, tz_dsttime = 0}
        tdiff = 2619288264
        __func__ = "run_actions"
#49 0x000055ab79d80f8a in do_action (h=0x7fff2b35e4e0, a=0x7ff29c2024d0, msg=0x7ff29c40a148) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x55ab7a321ed3 <buf+115>, to = {s = {sa_family = 4, sa_data = "\000\000\000\000\316\023\000\000\000\000\000\000\000"}, sin = {sin_family = 4, sin_port = 0, sin_addr = {s_addr = 332267520}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 4, sin6_port = 0, sin6_flowinfo = 332267520, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000,\235\016z\f\000\000", __u6_addr16 = {0, 0, 0, 0, 40236, 31246, 12, 0}, __u6_addr32 = {0, 0, 2047778092, 12}}}, sin6_scope_id = 2594545072}, sas = {ss_family = 4, __ss_padding = "\000\000\000\000\316\023\000\000\000\000\000\000\000\000,\235\016z\f\000\000\000\260\235\245\232\361\177", '\000' <repeats 14 times>, "\f\000\000\000\b4e\266\361\177", '\000' <repeats 14 times>, "\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\320\341\065+\377\177\000\000\232\022\354y\253U\000", __ss_align = 140733918339568}}, id = 724951632, send_flags = {f = 32767, blst_imask = 0}, proto = 96 '`', proto_pad0 = -113 '\217', proto_pad1 = -25575}
        tmp = 0x55ab7a269a60 <log_prefix_buf> ""
        new_uri = 0x55ab79ec1f4d <pv_printf_mode+3038> "\213E\210\001E\314\213E\210H\230H\001E\270\351\244\003"
        end = 0x7fff2b35e2d0 ""
        crt = 0x55ab7a269e68 <log_prefix_str+8> ""
        cmd = 0x7ff29c1608b0
        len = 21931
        user = 2045519573
        uri = {user = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700391057}, passwd = {s = 0x7fff2b35e030 "P\340\065+\377\177", len = -1700679327}, host = {s = 0x7fff2b35df80 "U\004", len = 2044739546}, port = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700292581}, params = {s = 0x55ab7a321f4d <buf+237> "\nTo: +351888888888 <sip:+351888888888 at load-tests-1038.sip-review.test.com:5060>\r\nCall-ID: 120432-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 6"..., len = -1700319931}, sip_params = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1234881528}, headers = {s = 0x7fff2b35e0c0 "", len = 2047722808}, port_no = 44642, proto = 31263, type = 21931, flags = (URI_SIP_USER_PHONE | unknown: 0x79e03fd8), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1234881528}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x55ab7a321f38 <buf+216> "28104SIPpTag00120432\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1038.sip-review.test.com:5060>\r\nCall-ID: 120432-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:"..., len = 20}, maddr = {s = 0x55ab7a321fad <buf+333> "120432-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nContact: sip:+351555555555 at 10.10.120.20:5070\r\nMax-Forwards: 69\r\nSubject: Performance Test\r\nContent-Type: application/sdp\r\nContent-Length:   135\r\nTH: dih\r\n\r\nv"..., len = 25}, method = {s = 0x7ff19aa59db0 "\b4e\266\361\177", len = -1700422204}, lr = {s = 0x7fff2b35e290 "", len = 0}, r2 = {s = 0x55ab79df3ff6 <ksr_slog_json> "UH\211\345AWAVAUATSH\201\354h\201", len = 536870912}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x7fff2b35e050 " \341\065+\377\177", len = 724951632}, ttl_val = {s = 0x7ff29c198f78 "", len = -1673486008}, user_param_val = {s = 0x7fff2b35e120 "\320\341\065+\377\177", len = -1700401466}, maddr_val = {s = 0x7fff2b35e290 "", len = 724951632}, method_val = {s = 0x7ff29c198f78 "", len = -1673486008}, lr_val = {s = 0x500000000000000 <error: Cannot access memory at address 0x500000000000000>, len = 724951352}, r2_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1673486008}, gr_val = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 2050105043}}
        next_hop = {user = {s = 0x7fff2b35dfe0 "\255\037\062z\253U", len = 0}, passwd = {s = 0x7ff29c1a13f8 "\001", len = 0}, host = {s = 0x479df3ff6 <error: Cannot access memory at address 0x479df3ff6>, len = 2048875599}, port = {s = 0x0, len = -1673486008}, params = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = 2047406657}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700422204}, headers = {s = 0x7ff29c1aa508 "\003", len = 724950980}, port_no = 56928, proto = 11061, type = SIP_URI_T, flags = (unknown: 0x9aa59dc4), transport = {s = 0x7fff2b35de60 "\020\337\065+\377\177", len = -1700641618}, ttl = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700319957}, user_param = {s = 0x679df3ff6 <error: Cannot access memory at address 0x679df3ff6>, len = 0}, maddr = {s = 0x7fff2b35df10 "0\337\065+\377\177", len = -1700603816}, method = {s = 0x2b35df40 <error: Cannot access memory at address 0x2b35df40>, len = 90949}, lr = {s = 0x7fff2b35df40 "0\340\065+\377\177", len = -1700709373}, r2 = {s = 0x7fff2b35dfbc "\361\177", len = 724950976}, gr = {s = 0x7fff2b35dfd0 "8\037\062z\253U", len = 724951008}, transport_val = {s = 0x7fff2b35dfe0 "\255\037\062z\253U", len = -1673486008}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1700422204}, user_param_val = {s = 0x7ff19aa59db0 "\b4e\266\361\177", len = -1234881528}, maddr_val = {s = 0x12b35df20 <error: Cannot access memory at address 0x12b35df20>, len = -1700422204}, method_val = {s = 0x7fff2b35df20 "0\340\065+\377\177", len = -1700641618}, lr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = -1700422204}, r2_val = {s = 0x7fff2b35df30 "@\337\065+\377\177", len = 0}, gr_val = {s = 0x7fff2b35e030 "P\340\065+\377\177", len = -1700582475}}
        u = 0x7fff2b35e300
        port = 0
        dst_host = 0x7ff29c40a148
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 65537, id = 81, name = {n = 2050104928, s = {s = 0x55ab7a321e60 <buf> "INVITE sip:+351888888888 at load-tests-1038.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120432-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"..., len = 6}, re = 0x55ab7a321e60 <buf>}, avp = 0x7fff2b35dfbc}
        sct = 0x7ff29c3d2880
        sjt = 0x19aa1b310
        rve = 0x7ff29c201938
        mct = 0x7ff29c40a148
        rv = 0x0
        rv1 = 0x20000000
        c1 = {cache_type = 724950976, val_type = RV_AVP, c = {avp_val = {n = -1700319957, s = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, re = 0x7ff29aa72d2b}, pval = {rs = {s = 0x7ff29aa72d2b "dialog", len = 724951008}, ri = -1262846864, flags = 1}}, i2s = "p\336\065+\377\177\000\000\274\362\242\232\362\177\000\000\000\000\000\000\000"}
        s = {s = 0x7fff2b35dd60 "p\336\065+\377\177", len = -1700641618}
        srevp = {0x12b35dd60, 0x7ff19aa59dc4}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679979344472, string = 0x7ff29c322258 "\350!2\234\362\177", str = {s = 0x7ff29c322258 "\350!2\234\362\177", len = 3}, data = 0x7ff29c322258, attr = 0x7ff29c322258, select = 0x7ff29c322258}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1045}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {number = 140679977998864, string = 0x7ff29c1d9a10 "\017", str = {s = 0x7ff29c1d9a10 "\017", len = 21}, data = 0x7ff29c1d9a10, attr = 0x7ff29c1d9a10, select = 0x7ff29c1d9a10}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#50 0x000055ab79d8f89f in run_actions (h=0x7fff2b35e4e0, a=0x7ff29c1ec068, msg=0x7ff29c40a148) at core/action.c:1581
        t = 0x7ff29c2024d0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1673486008, tz_dsttime = 32754}
        tdiff = 536870912
        __func__ = "run_actions"
#51 0x000055ab79d90055 in run_top_route (a=0x7ff29c1ec068, msg=0x7ff29c40a148, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {94194973861652, 4294967296, 140679980294472, 94192927768576, 4294967296, 94194972442614, 536870912, 0, 0, 140733918340528, 0, 4611686022722355200, 0, 140679980066944, 4294967296, 94194972442614}}}}}
        p = 0x7fff2b35e4e0
        ret = 0
        sfbk = 0
#52 0x000055ab79edcf35 in receive_msg (buf=0x55ab7a321e60 <buf> "INVITE sip:+351888888888 at load-tests-1038.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120432-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"..., len=667, rcv_info=0x7fff2b35eb50) at core/receive.c:501
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 724952880, run_flags = 32767, last_retcode = -1676980208, jmp_env = {{__jmpbuf = {140679977844384, 140679976800272, 140733918340976, 140679971801418, 140679976516045, 0, 536870912, 533529360}, __mask_was_saved = 2423224, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660309096, 94194976575339}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "INVITE sip:+351888888888 at load-tests-1038.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120432-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"..., len = 667}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "INVITE sip:+351888888888 at load-tests-1038.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120432-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"..., len = 651}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#53 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 651
        buf = "INVITE sip:+351888888888 at load-tests-1038.sip-review.test.com:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;TH=div;branch=z9hG4bK-28104-120432-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.1"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {2842882083, 0}, addr32 = {2842882083, 0, 0, 0}, addr16 = {61475, 43378, 0, 0, 0, 0, 0, 0}, addr = "#\360r\251", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {4066168099, 0}, addr32 = {4066168099, 0, 0, 0}, addr16 = {52515, 62044, 0, 0, 0, 0, 0, 0}, addr = "#\315\\\362", '\000' <repeats 11 times>}}, src_port = 5070, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\316#\360r\251\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 52755, sin_addr = {s_addr = 2842882083}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 52755, sin6_flowinfo = 2842882083, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\316#\360r\251", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14e530, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "h\342\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\b\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 8
        __func__ = "udp_rcv_loop"
#54 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 7
        pid = 0
        si = 0x7ff29c14e530
        si_desc = "udp receiver child=7 sock=90.30.20.32:5060\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#55 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 12) detached]
---end 12 -------------------------------------------------------

---start 13 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35dba0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1b55a5cf8, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b24e4c0, flags = 0, buf = {s = 0x55ab7b242ed0 "{\"action\":2,\"h_entry\":2149,\"h_id\":54877,\"state\":2,\"start_ts\":0,\"lifetime\":43200,\"tag1\":\"28104SIPpTag00120425\",\"cseq1\":\"1\",\"route_set1\":\"\",\"contact1\":\"sip:+351555555555 at 10.10.120.20:5070;alias=90.30.3"..., len = 215}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x7ff29c40a148, flags = -1252369160, buf = {s = 0x2b35dbd0 <error: Cannot access memory at address 0x2b35dbd0>, len = 54877}, malloc_fn = 0xbe2b35dc90, free_fn = 0x0}
        var = 0x957ff100000001
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa124f9 in dlg_onreply (t=0x7ff1adbe2910, type=1048576, param=0x7fff2b35dea0) at dlg_handlers.c:594
        dlg = 0x7ff1b55a5cf8
        iuid = 0x7ff1afe91b80
        new_state = 2
        old_state = 1
        unref = 0
        event = 2
        tag = {s = 0x80d000001ff <error: Cannot access memory at address 0x80d000001ff>, len = -1682406331}
        req = 0x7ff1af1d3eb0
        rpl = 0x7ff29c40a148
        __func__ = "dlg_onreply"
#7  0x00007ff29bac5399 in run_trans_callbacks_internal (cb_lst=0x7ff1adbe2988, type=1048576, trans=0x7ff1adbe2910, params=0x7fff2b35dea0) at t_hooks.c:258
        cbp = 0x7ff1adc869e0
        backup_from = 0x55ab7a331e90 <def_list+16>
        backup_to = 0x55ab7a331e98 <def_list+24>
        backup_dom_from = 0x55ab7a331ea0 <def_list+32>
        backup_dom_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        __func__ = "run_trans_callbacks_internal"
#8  0x00007ff29bac55b2 in run_trans_callbacks_with_buf (type=1048576, rbuf=0x7ff1adbe29e0, req=0x7ff1af1d3eb0, repl=0x7ff29c40a148, flags=0) at t_hooks.c:303
        params = {req = 0x7ff1af1d3eb0, rpl = 0x7ff29c40a148, param = 0x7ff1adc869f0, code = 180, flags = 0, branch = 0, t_rbuf = 0x7ff1adbe29e0, dst = 0x7ff1adbe2a30, send_buf = {s = 0x7ff1b67f6e40 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120425-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"..., len = 610}}
        trans = 0x7ff1adbe2910
#9  0x00007ff29bb15bc4 in relay_reply (t=0x7ff1adbe2910, p_msg=0x7ff29c40a148, branch=0, msg_status=180, cancel_data=0x7fff2b35e2e0, do_put_on_wait=1) at t_reply.c:2094
        relay = 0
        save_clone = 0
        buf = 0x7ff29c197f80 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120425-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"...
        res_len = 610
        relayed_code = 180
        relayed_msg = 0x7ff29c40a148
        reply_bak = 0x7fff2b35e0c0
        bm = {to_tag_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1380045992}}
        totag_retr = 0
        reply_status = RPS_PROVISIONAL
        uas_rb = 0x7ff1adbe29e0
        to_tag = 0x100000000
        reason = {s = 0x55ab7a322003 <buf+419> "120425-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120425;did=568.d56d>, <sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00120425;did=568.d56d>\r\n"..., len = 25}
        onsend_params = {req = 0x7ff29c40a148, rpl = 0x7ff29c277650, param = 0x7fff2b35e308, code = -1673486008, flags = 32754, branch = 0, t_rbuf = 0x55ab7a321fe5 <buf+389>, dst = 0x13, send_buf = {s = 0x55ab7a321f76 <buf+278> "28104SIPpTag00120425\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1031.sip-review.test.com:5060>;tag=1934SIPpTag01120530\r\nCall-ID: 120425-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <s"..., len = 20}}
        ip = {af = 724951200, len = 32767, u = {addrl = {94194972033122, 911258017984}, addr32 = {2044264546, 21931, 724951232, 212}, addr16 = {98, 31193, 21931, 0, 57536, 11061, 212, 0}, addr = "b\000\331y\253U\000\000\300\340\065+\324\000\000"}}
        __func__ = "relay_reply"
#10 0x00007ff29bb1b58e in reply_received (p_msg=0x7ff29c40a148) at t_reply.c:2680
        msg_status = 180
        last_uac_status = 0
        ack = 0x7fff2b35e4d0 ""
        ack_len = 21931
        branch = 0
        reply_status = 2045514394
        onreply_route = 1
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = -1673486008}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = -1673486008}}}}
        uac = 0x7ff1adbe2ba0
        t = 0x7ff1adbe2910
        lack_dst = {send_sock = 0x3641b0, to = {s = {sa_family = 8, sa_data = "\000\000\000\000\000\000Hj\022\234\362\177\000"}, sin = {sin_family = 8, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "Hj\022\234\362\177\000"}, sin6 = {sin6_family = 8, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "Hj\022\234\362\177\000\000$\000\000\000\r\000\000", __u6_addr16 = {27208, 39954, 32754, 0, 36, 0, 13, 0}, __u6_addr32 = {2618452552, 32754, 36, 13}}}, sin6_scope_id = 0}, sas = {ss_family = 8, __ss_padding = "\000\000\000\000\000\000Hj\022\234\362\177\000\000$\000\000\000\r\000\000\000\000\000\000\000\004\000\000\000\370\\Z\265\361\177\000\000\345\037\062z\253U\000\000\023\000\000\000\000\000\000\000v\037\062z\253U\000\000\204\232&z\253U\000\000\000\000\000\000\000\000\000\000\031\000\000\000$\000\000\000\060\071\245\232\361\177\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 \000\000\000", __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = -29 '\343', proto_pad1 = 11061}
        backup_user_from = 0x55ab7a331e90 <def_list+16>
        backup_user_to = 0x55ab7a331e98 <def_list+24>
        backup_domain_from = 0x55ab7a331ea0 <def_list+32>
        backup_domain_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        replies_locked = 1
        branch_ret = 724952192
        prev_branch = 0
        blst_503_timeout = 0
        hf = 0x0
        onsend_params = {req = 0x7ff29c3d2880, rpl = 0x7ff29c40a148, param = 0x600000000, code = -1675437664, flags = 32754, branch = 0, t_rbuf = 0x7ff29c1a3858, dst = 0x7ff29aa72d45, send_buf = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1252369160}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614606253358190, 94194972442614, 536870912, 0, 0, -2564614606203026542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {140675658365252, 140733918339712, 2047222937, 5019918800, 2594519364, 140733918339536, 4294967296, 94194972442614, 536870912, 0, 0, 140733918339792, 94194973286221, 0, 94194977119848, 94194977118816}}}}}
        bctx = 0x7ff29c40a148
        keng = 0x0
        ret = -1673486008
        evname = {s = 0x7ff29bb8b66f "on_sl_reply", len = 11}
        __func__ = "reply_received"
#11 0x000055ab79e18ce0 in do_forward_reply (msg=0x7ff29c40a148, mode=0) at core/forward.c:764
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        new_len = 0
        r = 2
        ip = {af = 2048597221, len = 21931, u = {addrl = {4294967296, 94194972442614}, addr32 = {0, 1, 2044674038, 21931}, addr16 = {0, 0, 1, 0, 16374, 31199, 21931, 0}, addr = "\000\000\000\000\001\000\000\000\366?\337y\253U\000"}}
        s = 0x20000000 <error: Cannot access memory at address 0x20000000>
        len = 21931
        __func__ = "do_forward_reply"
#12 0x000055ab79e1ad4a in forward_reply (msg=0x7ff29c40a148) at core/forward.c:865
No locals.
#13 0x000055ab79ede2d6 in receive_msg (buf=0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bKc984.7bd85c331e69f38afd69516d3c249df8.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len=697, rcv_info=0x7fff2b35eb50) at core/receive.c:587
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660309244, 94194976575339}}}}}
        bctx = 0x0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bKc984.7bd85c331e69f38afd69516d3c249df8.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len = 697}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bKc984.7bd85c331e69f38afd69516d3c249df8.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len = 681}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#14 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 681
        buf = "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bKc984.7bd85c331e69f38afd69516d3c249df8.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {326633994, 0}, addr32 = {326633994, 0, 0, 0}, addr16 = {2570, 4984, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\023", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {695732746, 0}, addr32 = {695732746, 0, 0, 0}, addr16 = {2570, 10616, 0, 0, 0, 0, 0, 0}, addr = "\n\nx)", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx\023\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 326633994}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 326633994, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx\023", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14eff8, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\374\342\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\t\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 9
        __func__ = "udp_rcv_loop"
#15 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 0
        pid = 0
        si = 0x7ff29c14eff8
        si_desc = "udp receiver child=0 sock=10.10.120.41:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#16 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 13) detached]
---end 13 -------------------------------------------------------

---start 14 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35dba0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1b53f48c8, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b24e800, flags = 0, buf = {s = 0x55ab7b242ed0 "{\"action\":2,\"h_entry\":2614,\"h_id\":90166,\"state\":2,\"start_ts\":0,\"lifetime\":43200,\"tag1\":\"28104SIPpTag00120428\",\"cseq1\":\"1\",\"route_set1\":\"\",\"contact1\":\"sip:+351555555555 at 10.10.120.20:5070;alias=90.30.3"..., len = 215}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x7ff29c40a148, flags = -1254143800, buf = {s = 0x2b35dbd0 <error: Cannot access memory at address 0x2b35dbd0>, len = 90166}, malloc_fn = 0xbe2b35dc90, free_fn = 0x0}
        var = 0x957ff100000001
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa124f9 in dlg_onreply (t=0x7ff1b3aa0b08, type=1048576, param=0x7fff2b35dea0) at dlg_handlers.c:594
        dlg = 0x7ff1b53f48c8
        iuid = 0x7ff1b0f74e00
        new_state = 2
        old_state = 1
        unref = 0
        event = 2
        tag = {s = 0x80d000001ff <error: Cannot access memory at address 0x80d000001ff>, len = -1682406331}
        req = 0x7ff1b36cd978
        rpl = 0x7ff29c40a148
        __func__ = "dlg_onreply"
#7  0x00007ff29bac5399 in run_trans_callbacks_internal (cb_lst=0x7ff1b3aa0b80, type=1048576, trans=0x7ff1b3aa0b08, params=0x7fff2b35dea0) at t_hooks.c:258
        cbp = 0x7ff1b0d02340
        backup_from = 0x55ab7a331e90 <def_list+16>
        backup_to = 0x55ab7a331e98 <def_list+24>
        backup_dom_from = 0x55ab7a331ea0 <def_list+32>
        backup_dom_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        __func__ = "run_trans_callbacks_internal"
#8  0x00007ff29bac55b2 in run_trans_callbacks_with_buf (type=1048576, rbuf=0x7ff1b3aa0bd8, req=0x7ff1b36cd978, repl=0x7ff29c40a148, flags=0) at t_hooks.c:303
        params = {req = 0x7ff1b36cd978, rpl = 0x7ff29c40a148, param = 0x7ff1b0d02350, code = 180, flags = 0, branch = 0, t_rbuf = 0x7ff1b3aa0bd8, dst = 0x7ff1b3aa0c28, send_buf = {s = 0x7ff1b67f6940 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120428-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"..., len = 612}}
        trans = 0x7ff1b3aa0b08
#9  0x00007ff29bb15bc4 in relay_reply (t=0x7ff1b3aa0b08, p_msg=0x7ff29c40a148, branch=0, msg_status=180, cancel_data=0x7fff2b35e2e0, do_put_on_wait=1) at t_reply.c:2094
        relay = 0
        save_clone = 0
        buf = 0x7ff29c1a3790 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120428-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"...
        res_len = 612
        relayed_code = 180
        relayed_msg = 0x7ff29c40a148
        reply_bak = 0x7fff2b35e0c0
        bm = {to_tag_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1280701104}}
        totag_retr = 0
        reply_status = RPS_PROVISIONAL
        uas_rb = 0x7ff1b3aa0bd8
        to_tag = 0x100000000
        reason = {s = 0x55ab7a322003 <buf+419> "120428-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120428;did=63a.63061>, <sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00120428;did=63a.63061>"..., len = 25}
        onsend_params = {req = 0x7ff29c40a148, rpl = 0x7ff29c277650, param = 0x7fff2b35e308, code = -1673486008, flags = 32754, branch = 0, t_rbuf = 0x55ab7a321fe5 <buf+389>, dst = 0x13, send_buf = {s = 0x55ab7a321f76 <buf+278> "28104SIPpTag00120428\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1034.sip-review.test.com:5060>;tag=1934SIPpTag01120533\r\nCall-ID: 120428-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <s"..., len = 20}}
        ip = {af = 724951200, len = 32767, u = {addrl = {94194972033122, 911258017984}, addr32 = {2044264546, 21931, 724951232, 212}, addr16 = {98, 31193, 21931, 0, 57536, 11061, 212, 0}, addr = "b\000\331y\253U\000\000\300\340\065+\324\000\000"}}
        __func__ = "relay_reply"
#10 0x00007ff29bb1b58e in reply_received (p_msg=0x7ff29c40a148) at t_reply.c:2680
        msg_status = 180
        last_uac_status = 0
        ack = 0x7fff2b35e4d0 ""
        ack_len = 21931
        branch = 0
        reply_status = 2045514394
        onreply_route = 1
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = -1673486008}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = -1673486008}}}}
        uac = 0x7ff1b3aa0d98
        t = 0x7ff1b3aa0b08
        lack_dst = {send_sock = 0x3641b0, to = {s = {sa_family = 8, sa_data = "\000\000\000\000\000\000\260\212\022\234\362\177\000"}, sin = {sin_family = 8, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\260\212\022\234\362\177\000"}, sin6 = {sin6_family = 8, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\260\212\022\234\362\177\000\000$\000\000\000\016\000\000", __u6_addr16 = {35504, 39954, 32754, 0, 36, 0, 14, 0}, __u6_addr32 = {2618460848, 32754, 36, 14}}}, sin6_scope_id = 0}, sas = {ss_family = 8, __ss_padding = "\000\000\000\000\000\000\260\212\022\234\362\177\000\000$\000\000\000\016\000\000\000\000\000\000\000\004\000\000\000\310H?\265\361\177\000\000\345\037\062z\253U\000\000\023\000\000\000\000\000\000\000v\037\062z\253U\000\000\204\232&z\253U\000\000\000\000\000\000\000\000\000\000\031\000\000\000$\000\000\000Ps\245\232\361\177\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 \000\000\000", __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = -29 '\343', proto_pad1 = 11061}
        backup_user_from = 0x55ab7a331e90 <def_list+16>
        backup_user_to = 0x55ab7a331e98 <def_list+24>
        backup_domain_from = 0x55ab7a331ea0 <def_list+32>
        backup_domain_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        replies_locked = 1
        branch_ret = 724952192
        prev_branch = 0
        blst_503_timeout = 0
        hf = 0x0
        onsend_params = {req = 0x7ff29c3d2880, rpl = 0x7ff29c40a148, param = 0x600000000, code = -1675437664, flags = 32754, branch = 0, t_rbuf = 0x7ff29c1988d0, dst = 0x7ff29aa72d45, send_buf = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1254143800}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614606253358190, 94194972442614, 536870912, 0, 0, -2564614606203026542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {140675658380132, 140733918339712, 2047222937, 5019918800, 2594534244, 140733918339536, 4294967296, 94194972442614, 536870912, 0, 0, 140733918339792, 94194973286221, 0, 94194977119848, 94194977118816}}}}}
        bctx = 0x7ff29c40a148
        keng = 0x0
        ret = -1673486008
        evname = {s = 0x7ff29bb8b66f "on_sl_reply", len = 11}
        __func__ = "reply_received"
#11 0x000055ab79e18ce0 in do_forward_reply (msg=0x7ff29c40a148, mode=0) at core/forward.c:764
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        new_len = 0
        r = 2
        ip = {af = 2048597221, len = 21931, u = {addrl = {4294967296, 94194972442614}, addr32 = {0, 1, 2044674038, 21931}, addr16 = {0, 0, 1, 0, 16374, 31199, 21931, 0}, addr = "\000\000\000\000\001\000\000\000\366?\337y\253U\000"}}
        s = 0x20000000 <error: Cannot access memory at address 0x20000000>
        len = 21931
        __func__ = "do_forward_reply"
#12 0x000055ab79e1ad4a in forward_reply (msg=0x7ff29c40a148) at core/forward.c:865
No locals.
#13 0x000055ab79ede2d6 in receive_msg (buf=0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bKd6ae.9c512cb1ce29a7e2ee29718be1c63094.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len=699, rcv_info=0x7fff2b35eb50) at core/receive.c:587
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660309392, 94194976575339}}}}}
        bctx = 0x0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bKd6ae.9c512cb1ce29a7e2ee29718be1c63094.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len = 699}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bKd6ae.9c512cb1ce29a7e2ee29718be1c63094.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len = 683}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#14 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 683
        buf = "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bKd6ae.9c512cb1ce29a7e2ee29718be1c63094.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {326633994, 0}, addr32 = {326633994, 0, 0, 0}, addr16 = {2570, 4984, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\023", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {695732746, 0}, addr32 = {695732746, 0, 0, 0}, addr16 = {2570, 10616, 0, 0, 0, 0, 0, 0}, addr = "\n\nx)", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx\023\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 326633994}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 326633994, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx\023", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14eff8, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\220\343\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\n\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 10
        __func__ = "udp_rcv_loop"
#15 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 1
        pid = 0
        si = 0x7ff29c14eff8
        si_desc = "udp receiver child=1 sock=10.10.120.41:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#16 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 14) detached]
---end 14 -------------------------------------------------------

---start 15 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35dba0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1b68a3048, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b303ec0, flags = 0, buf = {s = 0x55ab7b242ed0 "{\"action\":2,\"h_entry\":2079,\"h_id\":45400,\"state\":2,\"start_ts\":0,\"lifetime\":43200,\"tag1\":\"28104SIPpTag00120427\",\"cseq1\":\"1\",\"route_set1\":\"\",\"contact1\":\"sip:+351555555555 at 10.10.120.20:5070;alias=90.30.3"..., len = 215}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x7ff29c40a148, flags = -1232457656, buf = {s = 0x2b35dbd0 <error: Cannot access memory at address 0x2b35dbd0>, len = 45400}, malloc_fn = 0xbe2b35dc90, free_fn = 0x0}
        var = 0x957ff100000001
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa124f9 in dlg_onreply (t=0x7ff1b5d44988, type=1048576, param=0x7fff2b35dea0) at dlg_handlers.c:594
        dlg = 0x7ff1b68a3048
        iuid = 0x7ff1b09ec8b0
        new_state = 2
        old_state = 1
        unref = 0
        event = 2
        tag = {s = 0x80d000001ff <error: Cannot access memory at address 0x80d000001ff>, len = -1682406331}
        req = 0x7ff1b0f64988
        rpl = 0x7ff29c40a148
        __func__ = "dlg_onreply"
#7  0x00007ff29bac5399 in run_trans_callbacks_internal (cb_lst=0x7ff1b5d44a00, type=1048576, trans=0x7ff1b5d44988, params=0x7fff2b35dea0) at t_hooks.c:258
        cbp = 0x7ff1acc2a640
        backup_from = 0x55ab7a331e90 <def_list+16>
        backup_to = 0x55ab7a331e98 <def_list+24>
        backup_dom_from = 0x55ab7a331ea0 <def_list+32>
        backup_dom_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        __func__ = "run_trans_callbacks_internal"
#8  0x00007ff29bac55b2 in run_trans_callbacks_with_buf (type=1048576, rbuf=0x7ff1b5d44a58, req=0x7ff1b0f64988, repl=0x7ff29c40a148, flags=0) at t_hooks.c:303
        params = {req = 0x7ff1b0f64988, rpl = 0x7ff29c40a148, param = 0x7ff1acc2a650, code = 180, flags = 0, branch = 0, t_rbuf = 0x7ff1b5d44a58, dst = 0x7ff1b5d44aa8, send_buf = {s = 0x7ff1b6c9cee0 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120427-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"..., len = 610}}
        trans = 0x7ff1b5d44988
#9  0x00007ff29bb15bc4 in relay_reply (t=0x7ff1b5d44988, p_msg=0x7ff29c40a148, branch=0, msg_status=180, cancel_data=0x7fff2b35e2e0, do_put_on_wait=1) at t_reply.c:2094
        relay = 0
        save_clone = 0
        buf = 0x7ff29c1a80a0 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120427-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"...
        res_len = 610
        relayed_code = 180
        relayed_msg = 0x7ff29c40a148
        reply_bak = 0x7fff2b35e0c0
        bm = {to_tag_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1244378160}}
        totag_retr = 0
        reply_status = RPS_PROVISIONAL
        uas_rb = 0x7ff1b5d44a58
        to_tag = 0x100000000
        reason = {s = 0x55ab7a322003 <buf+419> "120427-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120427;did=f18.851b>, <sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00120427;did=f18.851b>\r\n"..., len = 25}
        onsend_params = {req = 0x7ff29c40a148, rpl = 0x7ff29c277650, param = 0x7fff2b35e308, code = -1673486008, flags = 32754, branch = 0, t_rbuf = 0x55ab7a321fe5 <buf+389>, dst = 0x13, send_buf = {s = 0x55ab7a321f76 <buf+278> "28104SIPpTag00120427\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1033.sip-review.test.com:5060>;tag=1934SIPpTag01120532\r\nCall-ID: 120427-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <s"..., len = 20}}
        ip = {af = 724951200, len = 32767, u = {addrl = {94194972033122, 911258017984}, addr32 = {2044264546, 21931, 724951232, 212}, addr16 = {98, 31193, 21931, 0, 57536, 11061, 212, 0}, addr = "b\000\331y\253U\000\000\300\340\065+\324\000\000"}}
        __func__ = "relay_reply"
#10 0x00007ff29bb1b58e in reply_received (p_msg=0x7ff29c40a148) at t_reply.c:2680
        msg_status = 180
        last_uac_status = 0
        ack = 0x7fff2b35e4d0 ""
        ack_len = 21931
        branch = 0
        reply_status = 2045514394
        onreply_route = 1
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = -1673486008}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = -1673486008}}}}
        uac = 0x7ff1b5d44c18
        t = 0x7ff1b5d44988
        lack_dst = {send_sock = 0x3641b0, to = {s = {sa_family = 8, sa_data = "\000\000\000\000\000\000\370\"\020\234\362\177\000"}, sin = {sin_family = 8, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\370\"\020\234\362\177\000"}, sin6 = {sin6_family = 8, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\370\"\020\234\362\177\000\000$\000\000\000\017\000\000", __u6_addr16 = {8952, 39952, 32754, 0, 36, 0, 15, 0}, __u6_addr32 = {2618303224, 32754, 36, 15}}}, sin6_scope_id = 0}, sas = {ss_family = 8, __ss_padding = "\000\000\000\000\000\000\370\"\020\234\362\177\000\000$\000\000\000\017\000\000\000\000\000\000\000\004\000\000\000H0\212\266\361\177\000\000\345\037\062z\253U\000\000\023\000\000\000\000\000\000\000v\037\062z\253U\000\000\204\232&z\253U\000\000\000\000\000\000\000\000\000\000\031\000\000\000$\000\000\000p0\245\232\361\177\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 \000\000\000", __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = -29 '\343', proto_pad1 = 11061}
        backup_user_from = 0x55ab7a331e90 <def_list+16>
        backup_user_to = 0x55ab7a331e98 <def_list+24>
        backup_domain_from = 0x55ab7a331ea0 <def_list+32>
        backup_domain_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        replies_locked = 1
        branch_ret = 724952192
        prev_branch = 0
        blst_503_timeout = 0
        hf = 0x0
        onsend_params = {req = 0x7ff29c3d2880, rpl = 0x7ff29c40a148, param = 0x600000000, code = -1675437664, flags = 32754, branch = 0, t_rbuf = 0x7ff29c1988d0, dst = 0x7ff29aa72d45, send_buf = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1232457656}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614606253358190, 94194972442614, 536870912, 0, 0, -2564614606203026542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {140675658363012, 140733918339712, 2047222937, 5019918800, 2594517124, 140733918339536, 4294967296, 94194972442614, 536870912, 0, 0, 140733918339792, 94194973286221, 0, 94194977119848, 94194977118816}}}}}
        bctx = 0x7ff29c40a148
        keng = 0x0
        ret = -1673486008
        evname = {s = 0x7ff29bb8b66f "on_sl_reply", len = 11}
        __func__ = "reply_received"
#11 0x000055ab79e18ce0 in do_forward_reply (msg=0x7ff29c40a148, mode=0) at core/forward.c:764
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        new_len = 0
        r = 2
        ip = {af = 2048597221, len = 21931, u = {addrl = {4294967296, 94194972442614}, addr32 = {0, 1, 2044674038, 21931}, addr16 = {0, 0, 1, 0, 16374, 31199, 21931, 0}, addr = "\000\000\000\000\001\000\000\000\366?\337y\253U\000"}}
        s = 0x20000000 <error: Cannot access memory at address 0x20000000>
        len = 21931
        __func__ = "do_forward_reply"
#12 0x000055ab79e1ad4a in forward_reply (msg=0x7ff29c40a148) at core/forward.c:865
No locals.
#13 0x000055ab79ede2d6 in receive_msg (buf=0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK6588.ae9556daab74f2b169b4ae5ba863f568.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len=697, rcv_info=0x7fff2b35eb50) at core/receive.c:587
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660309540, 94194976575339}}}}}
        bctx = 0x0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK6588.ae9556daab74f2b169b4ae5ba863f568.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len = 697}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK6588.ae9556daab74f2b169b4ae5ba863f568.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len = 681}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#14 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 681
        buf = "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK6588.ae9556daab74f2b169b4ae5ba863f568.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {326633994, 0}, addr32 = {326633994, 0, 0, 0}, addr16 = {2570, 4984, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\023", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {695732746, 0}, addr32 = {695732746, 0, 0, 0}, addr16 = {2570, 10616, 0, 0, 0, 0, 0, 0}, addr = "\n\nx)", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx\023\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 326633994}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 326633994, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx\023", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14eff8, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "$\344\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\v\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 11
        __func__ = "udp_rcv_loop"
#15 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 2
        pid = 0
        si = 0x7ff29c14eff8
        si_desc = "udp receiver child=2 sock=10.10.120.41:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#16 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 15) detached]
---end 15 -------------------------------------------------------

---start 16 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35dba0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1b160f8e0, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b303ba0, flags = 0, buf = {s = 0x55ab7b242ed0 "{\"action\":2,\"h_entry\":2569,\"h_id\":111145,\"state\":2,\"start_ts\":0,\"lifetime\":43200,\"tag1\":\"28104SIPpTag00120429\",\"cseq1\":\"1\",\"route_set1\":\"\",\"contact1\":\"sip:+351555555555 at 10.10.120.20:5070;alias=90.30."..., len = 216}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x7ff29c40a148, flags = -1319044896, buf = {s = 0x2b35dbd0 <error: Cannot access memory at address 0x2b35dbd0>, len = 111145}, malloc_fn = 0xbe2b35dc90, free_fn = 0x0}
        var = 0x957ff100000001
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa124f9 in dlg_onreply (t=0x7ff1af3f2c70, type=1048576, param=0x7fff2b35dea0) at dlg_handlers.c:594
        dlg = 0x7ff1b160f8e0
        iuid = 0x7ff1af3f64a8
        new_state = 2
        old_state = 1
        unref = 0
        event = 2
        tag = {s = 0x80d000001ff <error: Cannot access memory at address 0x80d000001ff>, len = -1682406331}
        req = 0x7ff1b6ae3358
        rpl = 0x7ff29c40a148
        __func__ = "dlg_onreply"
#7  0x00007ff29bac5399 in run_trans_callbacks_internal (cb_lst=0x7ff1af3f2ce8, type=1048576, trans=0x7ff1af3f2c70, params=0x7fff2b35dea0) at t_hooks.c:258
        cbp = 0x7ff1afcf5480
        backup_from = 0x55ab7a331e90 <def_list+16>
        backup_to = 0x55ab7a331e98 <def_list+24>
        backup_dom_from = 0x55ab7a331ea0 <def_list+32>
        backup_dom_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        __func__ = "run_trans_callbacks_internal"
#8  0x00007ff29bac55b2 in run_trans_callbacks_with_buf (type=1048576, rbuf=0x7ff1af3f2d40, req=0x7ff1b6ae3358, repl=0x7ff29c40a148, flags=0) at t_hooks.c:303
        params = {req = 0x7ff1b6ae3358, rpl = 0x7ff29c40a148, param = 0x7ff1afcf5490, code = 180, flags = 0, branch = 0, t_rbuf = 0x7ff1af3f2d40, dst = 0x7ff1af3f2d90, send_buf = {s = 0x7ff1b41c5090 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120429-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"..., len = 612}}
        trans = 0x7ff1af3f2c70
#9  0x00007ff29bb15bc4 in relay_reply (t=0x7ff1af3f2c70, p_msg=0x7ff29c40a148, branch=0, msg_status=180, cancel_data=0x7fff2b35e2e0, do_put_on_wait=1) at t_reply.c:2094
        relay = 0
        save_clone = 0
        buf = 0x7ff29c1a3790 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120429-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"...
        res_len = 612
        relayed_code = 180
        relayed_msg = 0x7ff29c40a148
        reply_bak = 0x7fff2b35e0c0
        bm = {to_tag_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1354813768}}
        totag_retr = 0
        reply_status = RPS_PROVISIONAL
        uas_rb = 0x7ff1af3f2d40
        to_tag = 0x100000000
        reason = {s = 0x55ab7a322003 <buf+419> "120429-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120429;did=90a.922b1>, <sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00120429;did=90a.922b1>"..., len = 25}
        onsend_params = {req = 0x7ff29c40a148, rpl = 0x7ff29c277650, param = 0x7fff2b35e308, code = -1673486008, flags = 32754, branch = 0, t_rbuf = 0x55ab7a321fe5 <buf+389>, dst = 0x13, send_buf = {s = 0x55ab7a321f76 <buf+278> "28104SIPpTag00120429\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1035.sip-review.test.com:5060>;tag=1934SIPpTag01120534\r\nCall-ID: 120429-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <s"..., len = 20}}
        ip = {af = 724951200, len = 32767, u = {addrl = {94194972033122, 911258017984}, addr32 = {2044264546, 21931, 724951232, 212}, addr16 = {98, 31193, 21931, 0, 57536, 11061, 212, 0}, addr = "b\000\331y\253U\000\000\300\340\065+\324\000\000"}}
        __func__ = "relay_reply"
#10 0x00007ff29bb1b58e in reply_received (p_msg=0x7ff29c40a148) at t_reply.c:2680
        msg_status = 180
        last_uac_status = 0
        ack = 0x7fff2b35e4d0 ""
        ack_len = 21931
        branch = 0
        reply_status = 2045514394
        onreply_route = 1
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = -1673486008}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = -1673486008}}}}
        uac = 0x7ff1af3f2f00
        t = 0x7ff1af3f2c70
        lack_dst = {send_sock = 0x3641b0, to = {s = {sa_family = 8, sa_data = "\000\000\000\000\000\000@\310\021\234\362\177\000"}, sin = {sin_family = 8, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "@\310\021\234\362\177\000"}, sin6 = {sin6_family = 8, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "@\310\021\234\362\177\000\000$\000\000\000\020\000\000", __u6_addr16 = {51264, 39953, 32754, 0, 36, 0, 16, 0}, __u6_addr32 = {2618411072, 32754, 36, 16}}}, sin6_scope_id = 0}, sas = {ss_family = 8, __ss_padding = "\000\000\000\000\000\000@\310\021\234\362\177\000\000$\000\000\000\020\000\000\000\000\000\000\000\004\000\000\000\340\370`\261\361\177\000\000\345\037\062z\253U\000\000\023\000\000\000\000\000\000\000v\037\062z\253U\000\000\204\232&z\253U\000\000\000\000\000\000\000\000\000\000\031\000\000\000$\000\000\000\260m\245\232\361\177\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 \000\000\000", __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = -29 '\343', proto_pad1 = 11061}
        backup_user_from = 0x55ab7a331e90 <def_list+16>
        backup_user_to = 0x55ab7a331e98 <def_list+24>
        backup_domain_from = 0x55ab7a331ea0 <def_list+32>
        backup_domain_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        replies_locked = 1
        branch_ret = 724952192
        prev_branch = 0
        blst_503_timeout = 0
        hf = 0x0
        onsend_params = {req = 0x7ff29c3d2880, rpl = 0x7ff29c40a148, param = 0x600000000, code = -1675437664, flags = 32754, branch = 0, t_rbuf = 0x7ff29c19ca40, dst = 0x7ff29aa72d45, send_buf = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1319044896}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614606253358190, 94194972442614, 536870912, 0, 0, -2564614606203026542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {140675658378692, 140733918339712, 2047222937, 5019918800, 2594532804, 140733918339536, 4294967296, 94194972442614, 536870912, 0, 0, 140733918339792, 94194973286221, 0, 94194977119848, 94194977118816}}}}}
        bctx = 0x7ff29c40a148
        keng = 0x0
        ret = -1673486008
        evname = {s = 0x7ff29bb8b66f "on_sl_reply", len = 11}
        __func__ = "reply_received"
#11 0x000055ab79e18ce0 in do_forward_reply (msg=0x7ff29c40a148, mode=0) at core/forward.c:764
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        new_len = 0
        r = 2
        ip = {af = 2048597221, len = 21931, u = {addrl = {4294967296, 94194972442614}, addr32 = {0, 1, 2044674038, 21931}, addr16 = {0, 0, 1, 0, 16374, 31199, 21931, 0}, addr = "\000\000\000\000\001\000\000\000\366?\337y\253U\000"}}
        s = 0x20000000 <error: Cannot access memory at address 0x20000000>
        len = 21931
        __func__ = "do_forward_reply"
#12 0x000055ab79e1ad4a in forward_reply (msg=0x7ff29c40a148) at core/forward.c:865
No locals.
#13 0x000055ab79ede2d6 in receive_msg (buf=0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK04ac.864af94b2eb02b715a1bff53f0df2776.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len=699, rcv_info=0x7fff2b35eb50) at core/receive.c:587
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660309688, 94194976575339}}}}}
        bctx = 0x0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK04ac.864af94b2eb02b715a1bff53f0df2776.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len = 699}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK04ac.864af94b2eb02b715a1bff53f0df2776.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len = 683}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#14 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 683
        buf = "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK04ac.864af94b2eb02b715a1bff53f0df2776.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {326633994, 0}, addr32 = {326633994, 0, 0, 0}, addr16 = {2570, 4984, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\023", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {695732746, 0}, addr32 = {695732746, 0, 0, 0}, addr16 = {2570, 10616, 0, 0, 0, 0, 0, 0}, addr = "\n\nx)", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx\023\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 326633994}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 326633994, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx\023", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14eff8, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\270\344\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\f\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 12
        __func__ = "udp_rcv_loop"
#15 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 3
        pid = 0
        si = 0x7ff29c14eff8
        si_desc = "udp receiver child=3 sock=10.10.120.41:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#16 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 16) detached]
---end 16 -------------------------------------------------------

---start 17 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35dba0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1b54b7350, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b303ba0, flags = 0, buf = {s = 0x55ab7b242ed0 "{\"action\":2,\"h_entry\":3023,\"h_id\":100237,\"state\":2,\"start_ts\":0,\"lifetime\":43200,\"tag1\":\"28104SIPpTag00120430\",\"cseq1\":\"1\",\"route_set1\":\"\",\"contact1\":\"sip:+351555555555 at 10.10.120.20:5070;alias=90.30."..., len = 216}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x7ff29c40a148, flags = -1253346480, buf = {s = 0x2b35dbd0 <error: Cannot access memory at address 0x2b35dbd0>, len = 100237}, malloc_fn = 0xbe2b35dc90, free_fn = 0x0}
        var = 0x957ff100000001
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa124f9 in dlg_onreply (t=0x7ff1ad2f9f78, type=1048576, param=0x7fff2b35dea0) at dlg_handlers.c:594
        dlg = 0x7ff1b54b7350
        iuid = 0x7ff1af2fdc78
        new_state = 2
        old_state = 1
        unref = 0
        event = 2
        tag = {s = 0x80d000001ff <error: Cannot access memory at address 0x80d000001ff>, len = -1682406331}
        req = 0x7ff1b12fe890
        rpl = 0x7ff29c40a148
        __func__ = "dlg_onreply"
#7  0x00007ff29bac5399 in run_trans_callbacks_internal (cb_lst=0x7ff1ad2f9ff0, type=1048576, trans=0x7ff1ad2f9f78, params=0x7fff2b35dea0) at t_hooks.c:258
        cbp = 0x7ff1adc8b3b8
        backup_from = 0x55ab7a331e90 <def_list+16>
        backup_to = 0x55ab7a331e98 <def_list+24>
        backup_dom_from = 0x55ab7a331ea0 <def_list+32>
        backup_dom_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        __func__ = "run_trans_callbacks_internal"
#8  0x00007ff29bac55b2 in run_trans_callbacks_with_buf (type=1048576, rbuf=0x7ff1ad2fa048, req=0x7ff1b12fe890, repl=0x7ff29c40a148, flags=0) at t_hooks.c:303
        params = {req = 0x7ff1b12fe890, rpl = 0x7ff29c40a148, param = 0x7ff1adc8b3c8, code = 180, flags = 0, branch = 0, t_rbuf = 0x7ff1ad2fa048, dst = 0x7ff1ad2fa098, send_buf = {s = 0x7ff1acbc1530 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120430-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"..., len = 612}}
        trans = 0x7ff1ad2f9f78
#9  0x00007ff29bb15bc4 in relay_reply (t=0x7ff1ad2f9f78, p_msg=0x7ff29c40a148, branch=0, msg_status=180, cancel_data=0x7fff2b35e2e0, do_put_on_wait=1) at t_reply.c:2094
        relay = 0
        save_clone = 0
        buf = 0x7ff29c197f80 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120430-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"...
        res_len = 612
        relayed_code = 180
        relayed_msg = 0x7ff29c40a148
        reply_bak = 0x7fff2b35e0c0
        bm = {to_tag_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1389387328}}
        totag_retr = 0
        reply_status = RPS_PROVISIONAL
        uas_rb = 0x7ff1ad2fa048
        to_tag = 0x100000000
        reason = {s = 0x55ab7a322002 <buf+418> "120430-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120430;did=fcb.d8781>, <sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00120430;did=fcb.d8781>"..., len = 25}
        onsend_params = {req = 0x7ff29c40a148, rpl = 0x7ff29c277650, param = 0x7fff2b35e308, code = -1673486008, flags = 32754, branch = 0, t_rbuf = 0x55ab7a321fe4 <buf+388>, dst = 0x13, send_buf = {s = 0x55ab7a321f75 <buf+277> "28104SIPpTag00120430\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1036.sip-review.test.com:5060>;tag=1934SIPpTag01120535\r\nCall-ID: 120430-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <s"..., len = 20}}
        ip = {af = 724951200, len = 32767, u = {addrl = {94194972033122, 911258017984}, addr32 = {2044264546, 21931, 724951232, 212}, addr16 = {98, 31193, 21931, 0, 57536, 11061, 212, 0}, addr = "b\000\331y\253U\000\000\300\340\065+\324\000\000"}}
        __func__ = "relay_reply"
#10 0x00007ff29bb1b58e in reply_received (p_msg=0x7ff29c40a148) at t_reply.c:2680
        msg_status = 180
        last_uac_status = 0
        ack = 0x7fff2b35e4d0 ""
        ack_len = 21931
        branch = 0
        reply_status = 2045514394
        onreply_route = 1
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = -1673486008}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = -1673486008}}}}
        uac = 0x7ff1ad2fa208
        t = 0x7ff1ad2f9f78
        lack_dst = {send_sock = 0x3641b0, to = {s = {sa_family = 8, sa_data = "\000\000\000\000\000\000\350\353\022\234\362\177\000"}, sin = {sin_family = 8, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\350\353\022\234\362\177\000"}, sin6 = {sin6_family = 8, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\350\353\022\234\362\177\000\000$\000\000\000\021\000\000", __u6_addr16 = {60392, 39954, 32754, 0, 36, 0, 17, 0}, __u6_addr32 = {2618485736, 32754, 36, 17}}}, sin6_scope_id = 0}, sas = {ss_family = 8, __ss_padding = "\000\000\000\000\000\000\350\353\022\234\362\177\000\000$\000\000\000\021\000\000\000\000\000\000\000\004\000\000\000PsK\265\361\177\000\000\344\037\062z\253U\000\000\023\000\000\000\000\000\000\000u\037\062z\253U\000\000\204\232&z\253U\000\000\000\000\000\000\000\000\000\000\031\000\000\000$\000\000\000p\246\245\232\361\177\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 \000\000\000", __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = -29 '\343', proto_pad1 = 11061}
        backup_user_from = 0x55ab7a331e90 <def_list+16>
        backup_user_to = 0x55ab7a331e98 <def_list+24>
        backup_domain_from = 0x55ab7a331ea0 <def_list+32>
        backup_domain_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        replies_locked = 1
        branch_ret = 724952192
        prev_branch = 0
        blst_503_timeout = 0
        hf = 0x0
        onsend_params = {req = 0x7ff29c3d2880, rpl = 0x7ff29c40a148, param = 0x600000000, code = -1675437664, flags = 32754, branch = 0, t_rbuf = 0x7ff29c19ca40, dst = 0x7ff29aa72d45, send_buf = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1253346480}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614606253358190, 94194972442614, 536870912, 0, 0, -2564614606203026542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {140675658393220, 140733918339712, 2047222937, 5019918800, 2594547332, 140733918339536, 4294967296, 94194972442614, 536870912, 0, 0, 140733918339792, 94194973286221, 0, 94194977119848, 94194977118816}}}}}
        bctx = 0x7ff29c40a148
        keng = 0x0
        ret = -1673486008
        evname = {s = 0x7ff29bb8b66f "on_sl_reply", len = 11}
        __func__ = "reply_received"
#11 0x000055ab79e18ce0 in do_forward_reply (msg=0x7ff29c40a148, mode=0) at core/forward.c:764
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        new_len = 0
        r = 2
        ip = {af = 2048597221, len = 21931, u = {addrl = {4294967296, 94194972442614}, addr32 = {0, 1, 2044674038, 21931}, addr16 = {0, 0, 1, 0, 16374, 31199, 21931, 0}, addr = "\000\000\000\000\001\000\000\000\366?\337y\253U\000"}}
        s = 0x20000000 <error: Cannot access memory at address 0x20000000>
        len = 21931
        __func__ = "do_forward_reply"
#12 0x000055ab79e1ad4a in forward_reply (msg=0x7ff29c40a148) at core/forward.c:865
No locals.
#13 0x000055ab79ede2d6 in receive_msg (buf=0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK60c.87b9fc128d06ad214ca0e7c55681064e.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-2"..., len=698, rcv_info=0x7fff2b35eb50) at core/receive.c:587
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660309836, 94194976575339}}}}}
        bctx = 0x0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK60c.87b9fc128d06ad214ca0e7c55681064e.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-2"..., len = 698}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK60c.87b9fc128d06ad214ca0e7c55681064e.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-2"..., len = 682}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#14 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 682
        buf = "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK60c.87b9fc128d06ad214ca0e7c55681064e.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-2"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {326633994, 0}, addr32 = {326633994, 0, 0, 0}, addr16 = {2570, 4984, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\023", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {695732746, 0}, addr32 = {695732746, 0, 0, 0}, addr16 = {2570, 10616, 0, 0, 0, 0, 0, 0}, addr = "\n\nx)", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx\023\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 326633994}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 326633994, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx\023", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14eff8, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "L\345\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\r\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 13
        __func__ = "udp_rcv_loop"
#15 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 4
        pid = 0
        si = 0x7ff29c14eff8
        si_desc = "udp receiver child=4 sock=10.10.120.41:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#16 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 17) detached]
---end 17 -------------------------------------------------------

---start 18 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35dba0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1af13cbe8, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b24e4c0, flags = 0, buf = {s = 0x55ab7b242ed0 "{\"action\":2,\"h_entry\":2114,\"h_id\":109489,\"state\":2,\"start_ts\":0,\"lifetime\":43200,\"tag1\":\"28104SIPpTag00120424\",\"cseq1\":\"1\",\"route_set1\":\"\",\"contact1\":\"sip:+351555555555 at 10.10.120.20:5070;alias=90.30."..., len = 216}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x7ff29c40a148, flags = -1357657112, buf = {s = 0x2b35dbd0 <error: Cannot access memory at address 0x2b35dbd0>, len = 109489}, malloc_fn = 0xbe2b35dc90, free_fn = 0x0}
        var = 0x957ff100000001
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa124f9 in dlg_onreply (t=0x7ff1ae81dfa0, type=1048576, param=0x7fff2b35dea0) at dlg_handlers.c:594
        dlg = 0x7ff1af13cbe8
        iuid = 0x7ff1aea41fb0
        new_state = 2
        old_state = 1
        unref = 0
        event = 2
        tag = {s = 0x80d000001ff <error: Cannot access memory at address 0x80d000001ff>, len = -1682406331}
        req = 0x7ff1adaef530
        rpl = 0x7ff29c40a148
        __func__ = "dlg_onreply"
#7  0x00007ff29bac5399 in run_trans_callbacks_internal (cb_lst=0x7ff1ae81e018, type=1048576, trans=0x7ff1ae81dfa0, params=0x7fff2b35dea0) at t_hooks.c:258
        cbp = 0x7ff1b0d51db8
        backup_from = 0x55ab7a331e90 <def_list+16>
        backup_to = 0x55ab7a331e98 <def_list+24>
        backup_dom_from = 0x55ab7a331ea0 <def_list+32>
        backup_dom_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        __func__ = "run_trans_callbacks_internal"
#8  0x00007ff29bac55b2 in run_trans_callbacks_with_buf (type=1048576, rbuf=0x7ff1ae81e070, req=0x7ff1adaef530, repl=0x7ff29c40a148, flags=0) at t_hooks.c:303
        params = {req = 0x7ff1adaef530, rpl = 0x7ff29c40a148, param = 0x7ff1b0d51dc8, code = 180, flags = 0, branch = 0, t_rbuf = 0x7ff1ae81e070, dst = 0x7ff1ae81e0c0, send_buf = {s = 0x7ff1b471b4b0 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120424-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"..., len = 612}}
        trans = 0x7ff1ae81dfa0
#9  0x00007ff29bb15bc4 in relay_reply (t=0x7ff1ae81dfa0, p_msg=0x7ff29c40a148, branch=0, msg_status=180, cancel_data=0x7fff2b35e2e0, do_put_on_wait=1) at t_reply.c:2094
        relay = 0
        save_clone = 0
        buf = 0x7ff29c19c978 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120424-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"...
        res_len = 612
        relayed_code = 180
        relayed_msg = 0x7ff29c40a148
        reply_bak = 0x7fff2b35e0c0
        bm = {to_tag_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1367219736}}
        totag_retr = 0
        reply_status = RPS_PROVISIONAL
        uas_rb = 0x7ff1ae81e070
        to_tag = 0x100000000
        reason = {s = 0x55ab7a322003 <buf+419> "120424-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120424;did=248.1bba1>, <sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00120424;did=248.1bba1>"..., len = 25}
        onsend_params = {req = 0x7ff29c40a148, rpl = 0x7ff29c277650, param = 0x7fff2b35e308, code = -1673486008, flags = 32754, branch = 0, t_rbuf = 0x55ab7a321fe5 <buf+389>, dst = 0x13, send_buf = {s = 0x55ab7a321f76 <buf+278> "28104SIPpTag00120424\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1030.sip-review.test.com:5060>;tag=1934SIPpTag01120529\r\nCall-ID: 120424-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <s"..., len = 20}}
        ip = {af = 724951200, len = 32767, u = {addrl = {94194972033122, 911258017984}, addr32 = {2044264546, 21931, 724951232, 212}, addr16 = {98, 31193, 21931, 0, 57536, 11061, 212, 0}, addr = "b\000\331y\253U\000\000\300\340\065+\324\000\000"}}
        __func__ = "relay_reply"
#10 0x00007ff29bb1b58e in reply_received (p_msg=0x7ff29c40a148) at t_reply.c:2680
        msg_status = 180
        last_uac_status = 0
        ack = 0x7fff2b35e4d0 ""
        ack_len = 21931
        branch = 0
        reply_status = 2045514394
        onreply_route = 1
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = -1673486008}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = -1673486008}}}}
        uac = 0x7ff1ae81e230
        t = 0x7ff1ae81dfa0
        lack_dst = {send_sock = 0x3641b0, to = {s = {sa_family = 8, sa_data = "\000\000\000\000\000\000\300\301\017\234\362\177\000"}, sin = {sin_family = 8, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\300\301\017\234\362\177\000"}, sin6 = {sin6_family = 8, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\300\301\017\234\362\177\000\000$\000\000\000\022\000\000", __u6_addr16 = {49600, 39951, 32754, 0, 36, 0, 18, 0}, __u6_addr32 = {2618278336, 32754, 36, 18}}}, sin6_scope_id = 0}, sas = {ss_family = 8, __ss_padding = "\000\000\000\000\000\000\300\301\017\234\362\177\000\000$\000\000\000\022\000\000\000\000\000\000\000\004\000\000\000\350\313\023\257\361\177\000\000\345\037\062z\253U\000\000\023\000\000\000\000\000\000\000v\037\062z\253U\000\000\204\232&z\253U\000\000\000\000\000\000\000\000\000\000\031\000\000\000$\000\000\000\320\064\245\232\361\177\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 \000\000\000", __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = -29 '\343', proto_pad1 = 11061}
        backup_user_from = 0x55ab7a331e90 <def_list+16>
        backup_user_to = 0x55ab7a331e98 <def_list+24>
        backup_domain_from = 0x55ab7a331ea0 <def_list+32>
        backup_domain_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        replies_locked = 1
        branch_ret = 724952192
        prev_branch = 0
        blst_503_timeout = 0
        hf = 0x0
        onsend_params = {req = 0x7ff29c3d2880, rpl = 0x7ff29c40a148, param = 0x600000000, code = -1675437664, flags = 32754, branch = 0, t_rbuf = 0x7ff29c198048, dst = 0x7ff29aa72d45, send_buf = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1357657112}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614606253358190, 94194972442614, 536870912, 0, 0, -2564614606203026542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {140675658364132, 140733918339712, 2047222937, 5019918800, 2594518244, 140733918339536, 4294967296, 94194972442614, 536870912, 0, 0, 140733918339792, 94194973286221, 0, 94194977119848, 94194977118816}}}}}
        bctx = 0x7ff29c40a148
        keng = 0x0
        ret = -1673486008
        evname = {s = 0x7ff29bb8b66f "on_sl_reply", len = 11}
        __func__ = "reply_received"
#11 0x000055ab79e18ce0 in do_forward_reply (msg=0x7ff29c40a148, mode=0) at core/forward.c:764
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        new_len = 0
        r = 2
        ip = {af = 2048597221, len = 21931, u = {addrl = {4294967296, 94194972442614}, addr32 = {0, 1, 2044674038, 21931}, addr16 = {0, 0, 1, 0, 16374, 31199, 21931, 0}, addr = "\000\000\000\000\001\000\000\000\366?\337y\253U\000"}}
        s = 0x20000000 <error: Cannot access memory at address 0x20000000>
        len = 21931
        __func__ = "do_forward_reply"
#12 0x000055ab79e1ad4a in forward_reply (msg=0x7ff29c40a148) at core/forward.c:865
No locals.
#13 0x000055ab79ede2d6 in receive_msg (buf=0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK9786.b0ec56106255627e16473f0a46851397.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len=699, rcv_info=0x7fff2b35eb50) at core/receive.c:587
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660309984, 94194976575339}}}}}
        bctx = 0x0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK9786.b0ec56106255627e16473f0a46851397.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len = 699}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK9786.b0ec56106255627e16473f0a46851397.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len = 683}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#14 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 683
        buf = "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK9786.b0ec56106255627e16473f0a46851397.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {326633994, 0}, addr32 = {326633994, 0, 0, 0}, addr16 = {2570, 4984, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\023", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {695732746, 0}, addr32 = {695732746, 0, 0, 0}, addr16 = {2570, 10616, 0, 0, 0, 0, 0, 0}, addr = "\n\nx)", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx\023\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 326633994}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 326633994, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx\023", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14eff8, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\340\345\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\016\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 14
        __func__ = "udp_rcv_loop"
#15 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 5
        pid = 0
        si = 0x7ff29c14eff8
        si_desc = "udp receiver child=5 sock=10.10.120.41:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#16 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 18) detached]
---end 18 -------------------------------------------------------

---start 19 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35dba0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1b0a7c388, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b24e4c0, flags = 0, buf = {s = 0x55ab7b242ed0 "{\"action\":2,\"h_entry\":2043,\"h_id\":99040,\"state\":2,\"start_ts\":0,\"lifetime\":43200,\"tag1\":\"28104SIPpTag00120426\",\"cseq1\":\"1\",\"route_set1\":\"\",\"contact1\":\"sip:+351555555555 at 10.10.120.20:5070;alias=90.30.3"..., len = 215}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x7ff29c40a148, flags = -1331182712, buf = {s = 0x2b35dbd0 <error: Cannot access memory at address 0x2b35dbd0>, len = 99040}, malloc_fn = 0xbe2b35dc90, free_fn = 0x0}
        var = 0x957ff100000001
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa124f9 in dlg_onreply (t=0x7ff1b1a1cb10, type=1048576, param=0x7fff2b35dea0) at dlg_handlers.c:594
        dlg = 0x7ff1b0a7c388
        iuid = 0x7ff1ac91d6d8
        new_state = 2
        old_state = 1
        unref = 0
        event = 2
        tag = {s = 0x80d000001ff <error: Cannot access memory at address 0x80d000001ff>, len = -1682406331}
        req = 0x7ff1b33651f0
        rpl = 0x7ff29c40a148
        __func__ = "dlg_onreply"
#7  0x00007ff29bac5399 in run_trans_callbacks_internal (cb_lst=0x7ff1b1a1cb88, type=1048576, trans=0x7ff1b1a1cb10, params=0x7fff2b35dea0) at t_hooks.c:258
        cbp = 0x7ff1b5dd5ed8
        backup_from = 0x55ab7a331e90 <def_list+16>
        backup_to = 0x55ab7a331e98 <def_list+24>
        backup_dom_from = 0x55ab7a331ea0 <def_list+32>
        backup_dom_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        __func__ = "run_trans_callbacks_internal"
#8  0x00007ff29bac55b2 in run_trans_callbacks_with_buf (type=1048576, rbuf=0x7ff1b1a1cbe0, req=0x7ff1b33651f0, repl=0x7ff29c40a148, flags=0) at t_hooks.c:303
        params = {req = 0x7ff1b33651f0, rpl = 0x7ff29c40a148, param = 0x7ff1b5dd5ee8, code = 180, flags = 0, branch = 0, t_rbuf = 0x7ff1b1a1cbe0, dst = 0x7ff1b1a1cc30, send_buf = {s = 0x7ff1b4f9dbf0 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120426-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"..., len = 612}}
        trans = 0x7ff1b1a1cb10
#9  0x00007ff29bb15bc4 in relay_reply (t=0x7ff1b1a1cb10, p_msg=0x7ff29c40a148, branch=0, msg_status=180, cancel_data=0x7fff2b35e2e0, do_put_on_wait=1) at t_reply.c:2094
        relay = 0
        save_clone = 0
        buf = 0x7ff29c1a3790 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120426-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"...
        res_len = 612
        relayed_code = 180
        relayed_msg = 0x7ff29c40a148
        reply_bak = 0x7fff2b35e0c0
        bm = {to_tag_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1314796200}}
        totag_retr = 0
        reply_status = RPS_PROVISIONAL
        uas_rb = 0x7ff1b1a1cbe0
        to_tag = 0x100000000
        reason = {s = 0x55ab7a322003 <buf+419> "120426-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120426;did=bf7.0e281>, <sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00120426;did=bf7.0e281>"..., len = 25}
        onsend_params = {req = 0x7ff29c40a148, rpl = 0x7ff29c277650, param = 0x7fff2b35e308, code = -1673486008, flags = 32754, branch = 0, t_rbuf = 0x55ab7a321fe5 <buf+389>, dst = 0x13, send_buf = {s = 0x55ab7a321f76 <buf+278> "28104SIPpTag00120426\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1032.sip-review.test.com:5060>;tag=1934SIPpTag01120531\r\nCall-ID: 120426-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <s"..., len = 20}}
        ip = {af = 724951200, len = 32767, u = {addrl = {94194972033122, 911258017984}, addr32 = {2044264546, 21931, 724951232, 212}, addr16 = {98, 31193, 21931, 0, 57536, 11061, 212, 0}, addr = "b\000\331y\253U\000\000\300\340\065+\324\000\000"}}
        __func__ = "relay_reply"
#10 0x00007ff29bb1b58e in reply_received (p_msg=0x7ff29c40a148) at t_reply.c:2680
        msg_status = 180
        last_uac_status = 0
        ack = 0x7fff2b35e4d0 ""
        ack_len = 21931
        branch = 0
        reply_status = 2045514394
        onreply_route = 1
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = -1673486008}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = -1673486008}}}}
        uac = 0x7ff1b1a1cda0
        t = 0x7ff1b1a1cb10
        lack_dst = {send_sock = 0x3641b0, to = {s = {sa_family = 8, sa_data = "\000\000\000\000\000\000\000\305\020\234\362\177\000"}, sin = {sin_family = 8, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\305\020\234\362\177\000"}, sin6 = {sin6_family = 8, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\305\020\234\362\177\000\000$\000\000\000\023\000\000", __u6_addr16 = {50432, 39952, 32754, 0, 36, 0, 19, 0}, __u6_addr32 = {2618344704, 32754, 36, 19}}}, sin6_scope_id = 0}, sas = {ss_family = 8, __ss_padding = "\000\000\000\000\000\000\000\305\020\234\362\177\000\000$\000\000\000\023\000\000\000\000\000\000\000\004\000\000\000\210\303\247\260\361\177\000\000\345\037\062z\253U\000\000\023\000\000\000\000\000\000\000v\037\062z\253U\000\000\204\232&z\253U\000\000\000\000\000\000\000\000\000\000\031\000\000\000$\000\000\000\360+\245\232\361\177\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 \000\000\000", __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = -29 '\343', proto_pad1 = 11061}
        backup_user_from = 0x55ab7a331e90 <def_list+16>
        backup_user_to = 0x55ab7a331e98 <def_list+24>
        backup_domain_from = 0x55ab7a331ea0 <def_list+32>
        backup_domain_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        replies_locked = 1
        branch_ret = 724952192
        prev_branch = 0
        blst_503_timeout = 0
        hf = 0x0
        onsend_params = {req = 0x7ff29c3d2880, rpl = 0x7ff29c40a148, param = 0x600000000, code = -1675437664, flags = 32754, branch = 0, t_rbuf = 0x7ff29c1988d0, dst = 0x7ff29aa72d45, send_buf = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1331182712}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614606253358190, 94194972442614, 536870912, 0, 0, -2564614606203026542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {140675658361860, 140733918339712, 2047222937, 5019918800, 2594515972, 140733918339536, 4294967296, 94194972442614, 536870912, 0, 0, 140733918339792, 94194973286221, 0, 94194977119848, 94194977118816}}}}}
        bctx = 0x7ff29c40a148
        keng = 0x0
        ret = -1673486008
        evname = {s = 0x7ff29bb8b66f "on_sl_reply", len = 11}
        __func__ = "reply_received"
#11 0x000055ab79e18ce0 in do_forward_reply (msg=0x7ff29c40a148, mode=0) at core/forward.c:764
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        new_len = 0
        r = 2
        ip = {af = 2048597221, len = 21931, u = {addrl = {4294967296, 94194972442614}, addr32 = {0, 1, 2044674038, 21931}, addr16 = {0, 0, 1, 0, 16374, 31199, 21931, 0}, addr = "\000\000\000\000\001\000\000\000\366?\337y\253U\000"}}
        s = 0x20000000 <error: Cannot access memory at address 0x20000000>
        len = 21931
        __func__ = "do_forward_reply"
#12 0x000055ab79e1ad4a in forward_reply (msg=0x7ff29c40a148) at core/forward.c:865
No locals.
#13 0x000055ab79ede2d6 in receive_msg (buf=0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK238a.b556bb84bb0a019dbbc77c4b67b5fc22.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len=699, rcv_info=0x7fff2b35eb50) at core/receive.c:587
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660310132, 94194976575339}}}}}
        bctx = 0x0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK238a.b556bb84bb0a019dbbc77c4b67b5fc22.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len = 699}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK238a.b556bb84bb0a019dbbc77c4b67b5fc22.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"..., len = 683}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#14 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 683
        buf = "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK238a.b556bb84bb0a019dbbc77c4b67b5fc22.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {326633994, 0}, addr32 = {326633994, 0, 0, 0}, addr16 = {2570, 4984, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\023", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {695732746, 0}, addr32 = {695732746, 0, 0, 0}, addr16 = {2570, 10616, 0, 0, 0, 0, 0, 0}, addr = "\n\nx)", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx\023\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 326633994}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 326633994, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx\023", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14eff8, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "t\346\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\017\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 15
        __func__ = "udp_rcv_loop"
#15 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 6
        pid = 0
        si = 0x7ff29c14eff8
        si_desc = "udp receiver child=6 sock=10.10.120.41:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#16 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 19) detached]
---end 19 -------------------------------------------------------

---start 20 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b749662 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35dba0, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35dba0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_STATE, dlg=0x7ff1b0da18e0, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b33a9d0, flags = 0, buf = {s = 0x55ab7b242ed0 "{\"action\":2,\"h_entry\":2219,\"h_id\":69709,\"state\":2,\"start_ts\":0,\"lifetime\":43200,\"tag1\":\"28104SIPpTag00120423\",\"cseq1\":\"1\",\"route_set1\":\"\",\"contact1\":\"sip:+351555555555 at 10.10.120.20:5070;alias=90.30.3"..., len = 215}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x7ff29c40a148, flags = -1327884064, buf = {s = 0x2b35dbd0 <error: Cannot access memory at address 0x2b35dbd0>, len = 69709}, malloc_fn = 0xbe2b35dc90, free_fn = 0x0}
        var = 0x957ff100000001
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa124f9 in dlg_onreply (t=0x7ff1b35db630, type=1048576, param=0x7fff2b35dea0) at dlg_handlers.c:594
        dlg = 0x7ff1b0da18e0
        iuid = 0x7ff1b306aeb0
        new_state = 2
        old_state = 1
        unref = 0
        event = 2
        tag = {s = 0x80d000001ff <error: Cannot access memory at address 0x80d000001ff>, len = -1682406331}
        req = 0x7ff1b52ccbd0
        rpl = 0x7ff29c40a148
        __func__ = "dlg_onreply"
#7  0x00007ff29bac5399 in run_trans_callbacks_internal (cb_lst=0x7ff1b35db6a8, type=1048576, trans=0x7ff1b35db630, params=0x7fff2b35dea0) at t_hooks.c:258
        cbp = 0x7ff1b37b8200
        backup_from = 0x55ab7a331e90 <def_list+16>
        backup_to = 0x55ab7a331e98 <def_list+24>
        backup_dom_from = 0x55ab7a331ea0 <def_list+32>
        backup_dom_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        __func__ = "run_trans_callbacks_internal"
#8  0x00007ff29bac55b2 in run_trans_callbacks_with_buf (type=1048576, rbuf=0x7ff1b35db700, req=0x7ff1b52ccbd0, repl=0x7ff29c40a148, flags=0) at t_hooks.c:303
        params = {req = 0x7ff1b52ccbd0, rpl = 0x7ff29c40a148, param = 0x7ff1b37b8210, code = 180, flags = 0, branch = 0, t_rbuf = 0x7ff1b35db700, dst = 0x7ff1b35db750, send_buf = {s = 0x7ff1b4bb68f0 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120423-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"..., len = 612}}
        trans = 0x7ff1b35db630
#9  0x00007ff29bb15bc4 in relay_reply (t=0x7ff1b35db630, p_msg=0x7ff29c40a148, branch=0, msg_status=180, cancel_data=0x7fff2b35e2e0, do_put_on_wait=1) at t_reply.c:2094
        relay = 0
        save_clone = 0
        buf = 0x7ff29c198808 "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-28104-120423-0\r\nFrom: +351555555555 <sip:+351555555555 at 10.10.120.20:5070>;tag=28104SIPp"...
        res_len = 612
        relayed_code = 180
        relayed_msg = 0x7ff29c40a148
        reply_bak = 0x7fff2b35e0c0
        bm = {to_tag_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1285703560}}
        totag_retr = 0
        reply_status = RPS_PROVISIONAL
        uas_rb = 0x7ff1b35db700
        to_tag = 0x100000000
        reason = {s = 0x55ab7a322002 <buf+418> "120423-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <sip:10.10.120.41;r2=on;lr=on;ftag=28104SIPpTag00120423;did=ba8.d4011>, <sip:90.30.20.32;r2=on;lr=on;ftag=28104SIPpTag00120423;did=ba8.d4011>"..., len = 25}
        onsend_params = {req = 0x7ff29c40a148, rpl = 0x7ff29c277650, param = 0x7fff2b35e308, code = -1673486008, flags = 32754, branch = 0, t_rbuf = 0x55ab7a321fe4 <buf+388>, dst = 0x13, send_buf = {s = 0x55ab7a321f75 <buf+277> "28104SIPpTag00120423\r\nTo: +351888888888 <sip:+351888888888 at load-tests-1029.sip-review.test.com:5060>;tag=1934SIPpTag01120528\r\nCall-ID: 120423-28104 at 10.10.120.20\r\nCSeq: 1 INVITE\r\nRecord-Route: <s"..., len = 20}}
        ip = {af = 724951200, len = 32767, u = {addrl = {94194972033122, 911258017984}, addr32 = {2044264546, 21931, 724951232, 212}, addr16 = {98, 31193, 21931, 0, 57536, 11061, 212, 0}, addr = "b\000\331y\253U\000\000\300\340\065+\324\000\000"}}
        __func__ = "relay_reply"
#10 0x00007ff29bb1b58e in reply_received (p_msg=0x7ff29c40a148) at t_reply.c:2680
        msg_status = 180
        last_uac_status = 0
        ack = 0x7fff2b35e4d0 ""
        ack_len = 21931
        branch = 0
        reply_status = 2045514394
        onreply_route = 1
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = -1673486008}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = -1673486008}}}}
        uac = 0x7ff1b35db8c0
        t = 0x7ff1b35db630
        lack_dst = {send_sock = 0x3641b0, to = {s = {sa_family = 8, sa_data = "\000\000\000\000\000\000\270,\023\234\362\177\000"}, sin = {sin_family = 8, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\270,\023\234\362\177\000"}, sin6 = {sin6_family = 8, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\270,\023\234\362\177\000\000$\000\000\000\024\000\000", __u6_addr16 = {11448, 39955, 32754, 0, 36, 0, 20, 0}, __u6_addr32 = {2618502328, 32754, 36, 20}}}, sin6_scope_id = 0}, sas = {ss_family = 8, __ss_padding = "\000\000\000\000\000\000\270,\023\234\362\177\000\000$\000\000\000\024\000\000\000\000\000\000\000\004\000\000\000\340\030\332\260\361\177\000\000\344\037\062z\253U\000\000\023\000\000\000\000\000\000\000u\037\062z\253U\000\000\204\232&z\253U\000\000\000\000\000\000\000\000\000\000\031\000\000\000$\000\000\000\360A\245\232\361\177\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 \000\000\000", __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = -29 '\343', proto_pad1 = 11061}
        backup_user_from = 0x55ab7a331e90 <def_list+16>
        backup_user_to = 0x55ab7a331e98 <def_list+24>
        backup_domain_from = 0x55ab7a331ea0 <def_list+32>
        backup_domain_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        replies_locked = 1
        branch_ret = 724952192
        prev_branch = 0
        blst_503_timeout = 0
        hf = 0x0
        onsend_params = {req = 0x7ff29c3d2880, rpl = 0x7ff29c40a148, param = 0x600000000, code = -1675437664, flags = 32754, branch = 0, t_rbuf = 0x7ff29c1a3858, dst = 0x7ff29aa72d45, send_buf = {s = 0x100000455 <error: Cannot access memory at address 0x100000455>, len = -1327884064}}
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -2564614606253358190, 94194972442614, 536870912, 0, 0, -2564614606203026542, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {140675658367492, 140733918339712, 2047222937, 5019918800, 2594521604, 140733918339536, 4294967296, 94194972442614, 536870912, 0, 0, 140733918339792, 94194973286221, 0, 94194977119848, 94194977118816}}}}}
        bctx = 0x7ff29c40a148
        keng = 0x0
        ret = -1673486008
        evname = {s = 0x7ff29bb8b66f "on_sl_reply", len = 11}
        __func__ = "reply_received"
#11 0x000055ab79e18ce0 in do_forward_reply (msg=0x7ff29c40a148, mode=0) at core/forward.c:764
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        new_len = 0
        r = 2
        ip = {af = 2048597221, len = 21931, u = {addrl = {4294967296, 94194972442614}, addr32 = {0, 1, 2044674038, 21931}, addr16 = {0, 0, 1, 0, 16374, 31199, 21931, 0}, addr = "\000\000\000\000\001\000\000\000\366?\337y\253U\000"}}
        s = 0x20000000 <error: Cannot access memory at address 0x20000000>
        len = 21931
        __func__ = "do_forward_reply"
#12 0x000055ab79e1ad4a in forward_reply (msg=0x7ff29c40a148) at core/forward.c:865
No locals.
#13 0x000055ab79ede2d6 in receive_msg (buf=0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK2e8.a32b8a5a14a6f50f6b945eb4e6dfbe45.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-2"..., len=698, rcv_info=0x7fff2b35eb50) at core/receive.c:587
        msg = 0x7ff29c40a148
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, -2564614604279938158, 94194972442614, 536870912, 0, 0, -2564614604229606510, -8592853516871040110}, __mask_was_saved = 0, __saved_mask = {__val = {3341552, 3555760, 8, 107, 140679976800272, 140733918341024, 94194972508122, 0, 23523675892, 140733918341264, 2047222937, 140733918341264, 94194974992708, 0, 140675660310280, 94194976575339}}}}}
        bctx = 0x0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK2e8.a32b8a5a14a6f50f6b945eb4e6dfbe45.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-2"..., len = 698}
        netinfo = {data = {s = 0x55ab7a321e60 <buf> "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK2e8.a32b8a5a14a6f50f6b945eb4e6dfbe45.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-2"..., len = 682}, rcv = 0x7fff2b35eb50, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff2b35e6c0, obuf = {s = 0x0, len = 0}, rcv = 0x7fff2b35eb50, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#14 0x000055ab7a034c51 in udp_rcv_loop () at core/udp_server.c:543
        len = 682
        buf = "SIP/2.0 180 Ringing\r\nVia: SIP/2.0/UDP 10.10.120.41;TH=ucv;branch=z9hG4bK2e8.a32b8a5a14a6f50f6b945eb4e6dfbe45.0, SIP/2.0/UDP 10.10.120.20:5070;rport=5070;received=90.30.30.52;TH=div;branch=z9hG4bK-2"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {326633994, 0}, addr32 = {326633994, 0, 0, 0}, addr16 = {2570, 4984, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\023", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {695732746, 0}, addr32 = {695732746, 0, 0, 0}, addr16 = {2570, 10616, 0, 0, 0, 0, 0, 0}, addr = "\n\nx)", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx\023\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 326633994}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 326633994, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx\023", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14eff8, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\b\347\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\020\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 16
        __func__ = "udp_rcv_loop"
#15 0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 7
        pid = 0
        si = 0x7ff29c14eff8
        si_desc = "udp receiver child=7 sock=10.10.120.41:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#16 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 20) detached]
---end 20 -------------------------------------------------------

---start 21 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 442
        buf = "KDMQ sip:notification_peer at 10.10.120.29:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.33;TH=div;branch=z9hG4bKf18b.5e1d3dc5", '0' <repeats 24 times>, ".0\r\nTo: <sip:notification_peer at 10.10.120.29:5060>\r\nFrom: <"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {561515018, 0}, addr32 = {561515018, 0, 0, 0}, addr16 = {2570, 8568, 0, 0, 0, 0, 0, 0}, addr = "\n\nx!", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {494406154, 0}, addr32 = {494406154, 0, 0, 0}, addr16 = {2570, 7544, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\035", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx!\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 561515018}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 561515018, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx!", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14fac0, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\234\347\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\021\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 17
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 0
        pid = 0
        si = 0x7ff29c14fac0
        si_desc = "udp receiver child=0 sock=10.10.120.29:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 21) detached]
---end 21 -------------------------------------------------------

---start 22 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 442
        buf = "KDMQ sip:notification_peer at 10.10.120.29:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.33;TH=div;branch=z9hG4bK868b.fccb3a5", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer at 10.10.120.29:5060>\r\nFrom: <"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {561515018, 0}, addr32 = {561515018, 0, 0, 0}, addr16 = {2570, 8568, 0, 0, 0, 0, 0, 0}, addr = "\n\nx!", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {494406154, 0}, addr32 = {494406154, 0, 0, 0}, addr16 = {2570, 7544, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\035", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx!\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 561515018}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 561515018, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx!", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14fac0, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\060\350\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\022\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 18
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 1
        pid = 0
        si = 0x7ff29c14fac0
        si_desc = "udp receiver child=1 sock=10.10.120.29:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 22) detached]
---end 22 -------------------------------------------------------

---start 23 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 442
        buf = "KDMQ sip:notification_peer at 10.10.120.29:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.33;TH=div;branch=z9hG4bK868b.fccb3a5", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer at 10.10.120.29:5060>\r\nFrom: <"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {561515018, 0}, addr32 = {561515018, 0, 0, 0}, addr16 = {2570, 8568, 0, 0, 0, 0, 0, 0}, addr = "\n\nx!", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {494406154, 0}, addr32 = {494406154, 0, 0, 0}, addr16 = {2570, 7544, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\035", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx!\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 561515018}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 561515018, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx!", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14fac0, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\304\350\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\023\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 19
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 2
        pid = 0
        si = 0x7ff29c14fac0
        si_desc = "udp receiver child=2 sock=10.10.120.29:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 23) detached]
---end 23 -------------------------------------------------------

---start 24 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 442
        buf = "KDMQ sip:notification_peer at 10.10.120.29:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.33;TH=div;branch=z9hG4bKec5c.98376d6", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer at 10.10.120.29:5060>\r\nFrom: <"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {561515018, 0}, addr32 = {561515018, 0, 0, 0}, addr16 = {2570, 8568, 0, 0, 0, 0, 0, 0}, addr = "\n\nx!", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {494406154, 0}, addr32 = {494406154, 0, 0, 0}, addr16 = {2570, 7544, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\035", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx!\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 561515018}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 561515018, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx!", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14fac0, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "X\351\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\024\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 20
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 3
        pid = 0
        si = 0x7ff29c14fac0
        si_desc = "udp receiver child=3 sock=10.10.120.29:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 24) detached]
---end 24 -------------------------------------------------------

---start 25 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 442
        buf = "KDMQ sip:notification_peer at 10.10.120.29:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.33;TH=div;branch=z9hG4bKfc5c.68fb42a7", '0' <repeats 24 times>, ".0\r\nTo: <sip:notification_peer at 10.10.120.29:5060>\r\nFrom: <"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {561515018, 0}, addr32 = {561515018, 0, 0, 0}, addr16 = {2570, 8568, 0, 0, 0, 0, 0, 0}, addr = "\n\nx!", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {494406154, 0}, addr32 = {494406154, 0, 0, 0}, addr16 = {2570, 7544, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\035", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx!\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 561515018}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 561515018, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx!", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14fac0, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\354\351\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\025\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 21
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 4
        pid = 0
        si = 0x7ff29c14fac0
        si_desc = "udp receiver child=4 sock=10.10.120.29:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 25) detached]
---end 25 -------------------------------------------------------

---start 26 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 442
        buf = "KDMQ sip:notification_peer at 10.10.120.29:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.33;TH=div;branch=z9hG4bKec5c.98376d6", '0' <repeats 25 times>, ".0\r\nTo: <sip:notification_peer at 10.10.120.29:5060>\r\nFrom: <"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {561515018, 0}, addr32 = {561515018, 0, 0, 0}, addr16 = {2570, 8568, 0, 0, 0, 0, 0, 0}, addr = "\n\nx!", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {494406154, 0}, addr32 = {494406154, 0, 0, 0}, addr16 = {2570, 7544, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\035", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx!\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 561515018}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 561515018, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx!", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14fac0, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\200\352\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\026\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 22
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 5
        pid = 0
        si = 0x7ff29c14fac0
        si_desc = "udp receiver child=5 sock=10.10.120.29:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 26) detached]
---end 26 -------------------------------------------------------

---start 27 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 442
        buf = "KDMQ sip:notification_peer at 10.10.120.29:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.33;TH=div;branch=z9hG4bKfc5c.68fb42a7", '0' <repeats 24 times>, ".0\r\nTo: <sip:notification_peer at 10.10.120.29:5060>\r\nFrom: <"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {561515018, 0}, addr32 = {561515018, 0, 0, 0}, addr16 = {2570, 8568, 0, 0, 0, 0, 0, 0}, addr = "\n\nx!", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {494406154, 0}, addr32 = {494406154, 0, 0, 0}, addr16 = {2570, 7544, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\035", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx!\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 561515018}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 561515018, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx!", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14fac0, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\024\353\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\027\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 23
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 6
        pid = 0
        si = 0x7ff29c14fac0
        si_desc = "udp receiver child=6 sock=10.10.120.29:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 27) detached]
---end 27 -------------------------------------------------------

---start 28 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=11, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 442
        buf = "KDMQ sip:notification_peer at 10.10.120.29:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 10.10.120.33;TH=div;branch=z9hG4bKf18b.5e1d3dc5", '0' <repeats 24 times>, ".0\r\nTo: <sip:notification_peer at 10.10.120.29:5060>\r\nFrom: <"...
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {561515018, 0}, addr32 = {561515018, 0, 0, 0}, addr16 = {2570, 8568, 0, 0, 0, 0, 0, 0}, addr = "\n\nx!", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {494406154, 0}, addr32 = {494406154, 0, 0, 0}, addr16 = {2570, 7544, 0, 0, 0, 0, 0, 0}, addr = "\n\nx\035", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\nx!\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 561515018}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 561515018, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\nx!", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7ff29c14fac0, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\250\353\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\030\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 24
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 7
        pid = 0
        si = 0x7ff29c14fac0
        si_desc = "udp receiver child=7 sock=10.10.120.29:5060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 28) detached]
---end 28 -------------------------------------------------------

---start 29 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 21931
        buf = '\000' <repeats 65535 times>
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0, 0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0}, addr = "\177\000\000\001", '\000' <repeats 11 times>}}, src_port = 0, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, bind_address = 0x7ff29c150c78, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "<\354\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\031\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 25
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 0
        pid = 0
        si = 0x7ff29c150c78
        si_desc = "udp receiver child=0 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 29) detached]
---end 29 -------------------------------------------------------

---start 30 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 21931
        buf = '\000' <repeats 65535 times>
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0, 0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0}, addr = "\177\000\000\001", '\000' <repeats 11 times>}}, src_port = 0, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, bind_address = 0x7ff29c150c78, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\320\354\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\032\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 26
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 1
        pid = 0
        si = 0x7ff29c150c78
        si_desc = "udp receiver child=1 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 30) detached]
---end 30 -------------------------------------------------------

---start 31 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 21931
        buf = '\000' <repeats 65535 times>
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0, 0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0}, addr = "\177\000\000\001", '\000' <repeats 11 times>}}, src_port = 0, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, bind_address = 0x7ff29c150c78, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "d\355\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\033\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 27
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 2
        pid = 0
        si = 0x7ff29c150c78
        si_desc = "udp receiver child=2 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 31) detached]
---end 31 -------------------------------------------------------

---start 32 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 21931
        buf = '\000' <repeats 65535 times>
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0, 0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0}, addr = "\177\000\000\001", '\000' <repeats 11 times>}}, src_port = 0, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, bind_address = 0x7ff29c150c78, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\370\355\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\034\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 28
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 3
        pid = 0
        si = 0x7ff29c150c78
        si_desc = "udp receiver child=3 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 32) detached]
---end 32 -------------------------------------------------------

---start 33 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 21931
        buf = '\000' <repeats 65535 times>
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0, 0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0}, addr = "\177\000\000\001", '\000' <repeats 11 times>}}, src_port = 0, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, bind_address = 0x7ff29c150c78, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\214\356\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\035\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 29
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 4
        pid = 0
        si = 0x7ff29c150c78
        si_desc = "udp receiver child=4 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 33) detached]
---end 33 -------------------------------------------------------

---start 34 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 21931
        buf = '\000' <repeats 65535 times>
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0, 0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0}, addr = "\177\000\000\001", '\000' <repeats 11 times>}}, src_port = 0, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, bind_address = 0x7ff29c150c78, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, " \357\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\036\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 30
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 5
        pid = 0
        si = 0x7ff29c150c78
        si_desc = "udp receiver child=5 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 34) detached]
---end 34 -------------------------------------------------------

---start 35 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 21931
        buf = '\000' <repeats 65535 times>
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0, 0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0}, addr = "\177\000\000\001", '\000' <repeats 11 times>}}, src_port = 0, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, bind_address = 0x7ff29c150c78, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\264\357\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, "\037\000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 31
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 6
        pid = 0
        si = 0x7ff29c150c78
        si_desc = "udp receiver child=6 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 35) detached]
---end 35 -------------------------------------------------------

---start 36 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
27	../sysdeps/unix/sysv/linux/recvfrom.c: No such file or directory.
#0  0x00007ff2bc2903da in __libc_recvfrom (fd=12, buf=0x55ab7a321e60 <buf>, len=65535, flags=0, addr=..., addrlen=0x7fff2b35ec28) at ../sysdeps/unix/sysv/linux/recvfrom.c:27
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a03301c in udp_rcv_loop () at core/udp_server.c:457
        len = 21931
        buf = '\000' <repeats 65535 times>
        tmp = 0x19ac30478 <error: Cannot access memory at address 0x19ac30478>
        fromaddr = 0x7ff29c1b3ed8
        fromaddrlen = 128
        rcvi = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {16777343, 0}, addr32 = {16777343, 0, 0, 0}, addr16 = {127, 256, 0, 0, 0, 0, 0, 0}, addr = "\177\000\000\001", '\000' <repeats 11 times>}}, src_port = 0, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, bind_address = 0x7ff29c150c78, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "H\360\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "P\352\065+\377\177\000\000U\332\370y\253U", '\000' <repeats 38 times>, " \000\000\000\260\062\027\234\362\177", '\000' <repeats 90 times>...
        i = -1
        j = 80640
        l = 32
        __func__ = "udp_rcv_loop"
#2  0x000055ab79d6a8f5 in main_loop () at main.c:1730
        i = 7
        pid = 0
        si = 0x7ff29c150c78
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 36) detached]
---end 36 -------------------------------------------------------

---start 37 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc0f4ba2 in __GI___sigtimedwait (set=0x55ab7a321d60 <slow_timer_sset>, info=0x0, timeout=0x0) at ../sysdeps/unix/sysv/linux/sigtimedwait.c:29
29	../sysdeps/unix/sysv/linux/sigtimedwait.c: No such file or directory.
#0  0x00007ff2bc0f4ba2 in __GI___sigtimedwait (set=0x55ab7a321d60 <slow_timer_sset>, info=0x0, timeout=0x0) at ../sysdeps/unix/sysv/linux/sigtimedwait.c:29
        resultvar = 18446744073709551612
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
        result = <optimized out>
#1  0x000055ab7a024c06 in slow_timer_main () at core/timer.c:1066
        n = 12
        ret = 4294967295
        tl = 0x7ff19aa42988
        i = 665
        __func__ = "slow_timer_main"
#2  0x000055ab79d6c319 in main_loop () at main.c:1823
        i = 8
        pid = 0
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#3  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 37) detached]
---end 37 -------------------------------------------------------

---start 38 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b7496d6 in futex_get (lock=0x7ff19a82f9f8) at ../../modules/tm/../../core/mem/../futexlock.h:121
        v = 1
        i = 0
#2  0x00007ff29b74bd68 in bcast_dmq_message1 (peer=0x7ff19aa62cf8, body=0x7fff2b35e580, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:173
        node = 0xf6ae4c2044168800
        __func__ = "bcast_dmq_message1"
#3  0x00007ff29b74c60d in bcast_dmq_message (peer=0x7ff19aa62cf8, body=0x7fff2b35e580, except=0x0, resp_cback=0x7ff29aa82050 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7ff29aa82010 <dlg_dmq_content_type>) at dmq_funcs.c:205
No locals.
#4  0x00007ff29a9ff5d8 in dlg_dmq_send (body=0x7fff2b35e580, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007ff29aa095f1 in dlg_dmq_replicate_action (action=DLG_DMQ_RM, dlg=0x7ff1b4ba7c70, needlock=0, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x55ab7b245770, flags = 0, buf = {s = 0x55ab7b2e4b20 "{\"action\":3,\"h_entry\":2953,\"h_id\":90940,\"state\":5}", len = 50}, malloc_fn = 0x7ff2bc1420f0 <__GI___libc_malloc>, free_fn = 0x7ff2bc142720 <__GI___libc_free>}
        prof_jdoc = {root = 0x0, flags = 0, buf = {s = 0x7fff2b35e610 "\360\346\065+\377\177", len = -1700916072}, malloc_fn = 0x7fff2b35e610, free_fn = 0x0}
        var = 0x0
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007ff29aa2873a in destroy_dlg (dlg=0x7ff1b4ba7c70) at dlg_hash.c:367
        ret = 1
        var = 0x0
        __func__ = "destroy_dlg"
#7  0x00007ff29aa32b80 in dlg_unref_helper (dlg=0x7ff1b4ba7c70, cnt=2, fname=0x7ff29aa6ea61 "dlg_handlers.c", fline=1212) at dlg_hash.c:1095
        d_entry = 0x7ff19aa59db0
        __func__ = "dlg_unref_helper"
#8  0x00007ff29aa1b12a in unref_dlg_from_cb (t=0x7ff1b41452f8, type=131072, param=0x7fff2b35e970) at dlg_handlers.c:1212
        dlg = 0x7ff1b4ba7c70
        iuid = 0x7ff1acfa03f8
#9  0x00007ff29bac5399 in run_trans_callbacks_internal (cb_lst=0x7ff1b4145370, type=131072, trans=0x7ff1b41452f8, params=0x7fff2b35e970) at t_hooks.c:258
        cbp = 0x7ff1acb12728
        backup_from = 0x55ab7a331e90 <def_list+16>
        backup_to = 0x55ab7a331e98 <def_list+24>
        backup_dom_from = 0x55ab7a331ea0 <def_list+32>
        backup_dom_to = 0x55ab7a331ea8 <def_list+40>
        backup_uri_from = 0x55ab7a331e80 <def_list>
        backup_uri_to = 0x55ab7a331e88 <def_list+8>
        backup_xavps = 0x55ab7a331fd8 <_xavp_list_head>
        backup_xavus = 0x55ab7a331fe0 <_xavu_list_head>
        backup_xavis = 0x55ab7a331fe8 <_xavi_list_head>
        __func__ = "run_trans_callbacks_internal"
#10 0x00007ff29bac54c9 in run_trans_callbacks (type=131072, trans=0x7ff1b41452f8, req=0x0, rpl=0x0, code=0) at t_hooks.c:285
        params = {req = 0x0, rpl = 0x0, param = 0x7ff1acb12738, code = 0, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#11 0x00007ff29ba6f79c in free_cell_helper (dead_cell=0x7ff1b41452f8, silent=0, fname=0x7ff29bb8fb72 "timer.c", fline=643) at h_table.c:165
        b = 0x7ff29ba6d31a <futex_release+29> "\211E\374\203}\374\002\017\224\300\017\266\300H\205\300t6H\213E\350H\203\354\bj"
        i = 1
        rpl = 0x7fff2b35ea90
        tt = 0x7fff2b35eab0
        foo = 0x0
        cbs = 0x7ff1b41452f8
        cbs_tmp = 0x1b30b51f8
        __func__ = "free_cell_helper"
#12 0x00007ff29bb3ac3a in wait_handler (ti=1105272448, wait_tl=0x7ff1b4145380, data=0x7ff1b41452f8) at timer.c:643
        p_cell = 0x7ff1b41452f8
        ret = 2589317528
        unlinked = 0
        rcount = 1
        __func__ = "wait_handler"
#13 0x000055ab7a023a2e in timer_list_expire (t=1105272448, h=0x7ff19a5a1a78, slow_l=0x7ff19a5a4650, slow_mark=1690) at core/timer.c:857
        tl = 0x7ff1b4145380
        ret = 0
#14 0x000055ab7a023f38 in timer_handler () at core/timer.c:922
        saved_ticks = 1105272448
        run_slow_timer = 0
        i = 666
        __func__ = "timer_handler"
#15 0x000055ab7a02443b in timer_main () at core/timer.c:961
No locals.
#16 0x000055ab79d6c6cf in main_loop () at main.c:1839
        i = 8
        pid = 0
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#17 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 38) detached]
---end 38 -------------------------------------------------------

---start 39 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1ad8b3 in __GI___select (nfds=0, readfds=0x0, writefds=0x0, exceptfds=0x0, timeout=0x7fff2b35eba0) at ../sysdeps/unix/sysv/linux/select.c:41
41	../sysdeps/unix/sysv/linux/select.c: No such file or directory.
#0  0x00007ff2bc1ad8b3 in __GI___select (nfds=0, readfds=0x0, writefds=0x0, exceptfds=0x0, timeout=0x7fff2b35eba0) at ../sysdeps/unix/sysv/linux/select.c:41
        resultvar = 18446744073709551102
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x000055ab7a025bda in sleep_us (nusecs=1000000) at core/ut.h:513
        tval = {tv_sec = 0, tv_usec = 490299}
#2  0x000055ab7a0260f5 in fork_sync_timer (child_id=-1, desc=0x55ab7a1e4381 "secondary timer", make_sock=1, f=0x55ab7a026e08 <sr_wtimer_exec>, param=0x0, interval=1000) at core/timer_proc.c:264
        pid = 0
        ts1 = 1105274896
        ts2 = 1000
#3  0x000055ab7a027594 in sr_wtimer_start () at core/timer_proc.c:459
        __func__ = "sr_wtimer_start"
#4  0x000055ab79d6c6d4 in main_loop () at main.c:1841
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#5  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 39) detached]
---end 39 -------------------------------------------------------

---start 40 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29a9b481c in futex_get (lock=0x7ff19aa59dc4) at ../../core/parser/../mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29a9d752b in internal_rpc_print_dlgs (rpc=0x7ff29b7ce600 <binrpc_callbacks>, c=0x7fff2b35cce0, with_context=0) at dialog.c:2436
        mypid = 40
        dlg = 0x0
        i = 2953
#3  0x00007ff29a9d7a83 in rpc_print_dlgs (rpc=0x7ff29b7ce600 <binrpc_callbacks>, c=0x7fff2b35cce0) at dialog.c:2607
No locals.
#4  0x00007ff29b7861b1 in process_rpc_req (buf=0x55ab7b2c2c34 "\241\003\vh\304k\237\221\tdlg.list", size=18, bytes_needed=0x7fff2b35cefc, sh=0x7fff2b35ce60, saved_state=0x55ab7b2d2c38) at binrpc_run.c:688
        err = 0
        val = {name = {s = 0x100c8 <error: Cannot access memory at address 0x100c8>, len = -1138267264}, type = 1, u = {strval = {s = 0x55ab7b2c2c3d "dlg.list", len = 8}, fval = 4.6538510674599662e-310, intval = 2066492477, end = 2066492477}}
        rpc_e = 0x7ff29c40e9d0
        f_ctx = {in = {ctx = {tlen = 11, cookie = 1757703071, type = 0, flags = 1, offset = 11, in_struct = 0, in_array = 0}, s = 0x55ab7b2c2c46 "", end = 0x55ab7b2c2c46 "", record_no = 0, in_struct = 0}, out = {pkt = {body = 0x55ab7b2d2cd0 "\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203\003\203"..., end = 0x55ab7b2dacd0 "", crt = 0x55ab7b2d3532 ""}, structs = {next = 0x55ab7b2dace0, prev = 0x55ab85e486c0}}, send_h = 0x7fff2b35ce60, method = 0x55ab7b2c2c3d "dlg.list", gc = 0x0, replied = 0, err_code = 0, err_phrase = {s = 0x0, len = 0}}
        ctx = 0x7fff2b35cce0
        __func__ = "process_rpc_req"
#5  0x00007ff29b7bc9df in handle_stream_read (s_c=0x55ab7b2c2c00, idx=-1) at io_listener.c:512
        bytes_free = 65535
        bytes_read = 18
        bytes_needed = 0
        bytes_processed = 1
        r = 0x55ab7b2c2c20
        sh = {fd = 18, type = 0, from = {sa_in = {s = {sa_family = 50434, sa_data = "\006z\253U\000\000\260\316\065+\377\177\000"}, sin = {sin_family = 50434, sin_port = 31238, sin_addr = {s_addr = 21931}, sin_zero = "\260\316\065+\377\177\000"}, sin6 = {sin6_family = 50434, sin6_port = 31238, sin6_flowinfo = 21931, sin6_addr = {__in6_u = {__u6_addr8 = "\260\316\065+\377\177\000\000\020P\v\234\020\000\000", __u6_addr16 = {52912, 11061, 32767, 0, 20496, 39947, 16, 0}, __u6_addr32 = {724946608, 32767, 2617987088, 16}}}, sin6_scope_id = 1558839298}, sas = {ss_family = 50434, __ss_padding = "\006z\253U\000\000\260\316\065+\377\177\000\000\020P\v\234\020\000\000\000\002\000\352\\\177\000\000\001\000\000\000\000\000\000\000\000\360\316\065+\377\177\000\000J\t\277\233\362\177\000\000\366?\337y\017\b", '\000' <repeats 13 times>, " \000\000\000\000(\315\314\037\000\000\000\000\001\000\000\000\000\000\000\000\300\326U\232\361\177\000\000\260A6\000\000\000\000\000\b\000\000\000\000\000\000", __ss_align = 5019914016}}, sa_un = {sun_family = 50434, sun_path = "\006z\253U\000\000\260\316\065+\377\177\000\000\020P\v\234\020\000\000\000\002\000\352\\\177\000\000\001\000\000\000\000\000\000\000\000\360\316\065+\377\177\000\000J\t\277\233\362\177\000\000\366?\337y\017\b", '\000' <repeats 13 times>, " \000\000\000\000(\315\314\037\000\000\000\000\001\000\000\000\000\000\000\000\300\326U\232\361\177\000\000\260A6\000\000"}}, from_len = 0}
        __func__ = "handle_stream_read"
#6  0x00007ff29b7be8d4 in handle_io (fm=0x7ff29c4184c0, events=1, idx=-1) at io_listener.c:708
        ret = 1
        __func__ = "handle_io"
#7  0x00007ff29b7b508b in io_wait_loop_epoll (h=0x7ff29b7cf3e0 <ctl_io_h>, t=10, repeat=0) at ../../core/io_wait.h:1070
        n = 1
        r = 0
        fm = 0x7ff29c4184c0
        revents = 1
        __func__ = "io_wait_loop_epoll"
#8  0x00007ff29b7b9483 in io_listen_loop (fd_no=1, cs_lst=0x55ab7b2b75c0) at io_listener.c:281
        max_fd_no = 384
        poll_err = 0x0
        poll_method = 2
        cs = 0x0
        type = 2
        __func__ = "io_listen_loop"
#9  0x00007ff29b790bf2 in mod_child (rank=0) at ctl.c:338
        pid = 0
        cs = 0x7ff1abaaf8a8
        rpc_handler = 1
        __func__ = "mod_child"
#10 0x000055ab79f8de27 in init_mod_child (m=0x7ff29c162e78, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1634a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c163a28, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1644b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#36 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#37 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#38 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#39 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#40 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#41 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#42 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#43 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#44 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#45 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#46 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 40) detached]
---end 40 -------------------------------------------------------

---start 41 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b76196b in futex_get (lock=0x7ff19a82f9f8) at ../../core/parser/../mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b766590 in extract_node_list (update_list=0x7ff19a82f9f8, msg=0x7ff1b3bc07e0) at notification_peer.c:389
        content_length = 74
        total_nodes = 0
        body = {s = 0x7ff1b3bc115d "sip:10.10.120.29:5060;status=active\r\nsip:10.10.120.33:5060;status=active\r\n", len = 74}
        tmp_uri = {s = 0x0, len = 0}
        cur = 0x0
        ret = 0x0
        find = 0x0
        tmp = 0x7ff1b3bc115d "sip:10.10.120.29:5060;status=active\r\nsip:10.10.120.33:5060;status=active\r\n"
        end = 0x7ff1b3bc11a7 ""
        match = 0x0
        __func__ = "extract_node_list"
#3  0x00007ff29b767af2 in dmq_notification_callback_f (msg=0x7ff1b3bc07e0, resp=0x7fff2b35d1e0, dmq_node=0x7ff1abab0560) at notification_peer.c:481
        nodes_recv = 724947328
        response_body = 0x0
        maxforwards = 0
        __func__ = "dmq_notification_callback_f"
#4  0x00007ff29b76ca36 in worker_loop (id=0) at worker.c:80
        worker = 0x7ff19a82fa78
        current_job = 0x7ff1b3f376b0
        peer_response = {resp_code = 0, content_type = {s = 0x0, len = 0}, reason = {s = 0x0, len = 0}, body = {s = 0x0, len = 0}}
        ret_value = 0
        not_parsed = 0
        dmq_node = 0x7ff1abab0560
        __func__ = "worker_loop"
#5  0x00007ff29b747282 in child_init (rank=0) at dmq.c:319
        i = 0
        newpid = 0
        __func__ = "child_init"
#6  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c1634a0, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c163a28, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1644b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#36 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#37 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#38 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#39 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#40 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#41 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 41) detached]
---end 41 -------------------------------------------------------

---start 42 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b76196b in futex_get (lock=0x7ff19a82f9f8) at ../../core/parser/../mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b766590 in extract_node_list (update_list=0x7ff19a82f9f8, msg=0x7ff1b4ae61e8) at notification_peer.c:389
        content_length = 74
        total_nodes = 0
        body = {s = 0x7ff1b4ae6b65 "sip:10.10.120.29:5060;status=active\r\nsip:10.10.120.33:5060;status=active\r\n", len = 74}
        tmp_uri = {s = 0x0, len = 0}
        cur = 0x0
        ret = 0x0
        find = 0x0
        tmp = 0x7ff1b4ae6b65 "sip:10.10.120.29:5060;status=active\r\nsip:10.10.120.33:5060;status=active\r\n"
        end = 0x7ff1b4ae6baf ""
        match = 0x0
        __func__ = "extract_node_list"
#3  0x00007ff29b767af2 in dmq_notification_callback_f (msg=0x7ff1b4ae61e8, resp=0x7fff2b35d1e0, dmq_node=0x7ff1abab0560) at notification_peer.c:481
        nodes_recv = 724947328
        response_body = 0x0
        maxforwards = 0
        __func__ = "dmq_notification_callback_f"
#4  0x00007ff29b76ca36 in worker_loop (id=1) at worker.c:80
        worker = 0x7ff19a82fa90
        current_job = 0x7ff1b37b7dc8
        peer_response = {resp_code = 0, content_type = {s = 0x0, len = 0}, reason = {s = 0x0, len = 0}, body = {s = 0x0, len = 0}}
        ret_value = 0
        not_parsed = 0
        dmq_node = 0x7ff1abab0560
        __func__ = "worker_loop"
#5  0x00007ff29b747282 in child_init (rank=0) at dmq.c:319
        i = 1
        newpid = 0
        __func__ = "child_init"
#6  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c1634a0, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c163a28, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1644b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#36 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#37 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#38 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#39 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#40 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#41 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 42) detached]
---end 42 -------------------------------------------------------

---start 43 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b76196b in futex_get (lock=0x7ff19a82f9f8) at ../../core/parser/../mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b766590 in extract_node_list (update_list=0x7ff19a82f9f8, msg=0x7ff1b63f9b48) at notification_peer.c:389
        content_length = 74
        total_nodes = 0
        body = {s = 0x7ff1b63fa4c5 "sip:10.10.120.29:5060;status=active\r\nsip:10.10.120.33:5060;status=active\r\n", len = 74}
        tmp_uri = {s = 0x0, len = 0}
        cur = 0x0
        ret = 0x0
        find = 0x0
        tmp = 0x7ff1b63fa4c5 "sip:10.10.120.29:5060;status=active\r\nsip:10.10.120.33:5060;status=active\r\n"
        end = 0x7ff1b63fa50f ""
        match = 0x0
        __func__ = "extract_node_list"
#3  0x00007ff29b767af2 in dmq_notification_callback_f (msg=0x7ff1b63f9b48, resp=0x7fff2b35d1e0, dmq_node=0x7ff1abab0560) at notification_peer.c:481
        nodes_recv = 724947328
        response_body = 0x0
        maxforwards = 0
        __func__ = "dmq_notification_callback_f"
#4  0x00007ff29b76ca36 in worker_loop (id=2) at worker.c:80
        worker = 0x7ff19a82faa8
        current_job = 0x7ff1b17f5d60
        peer_response = {resp_code = 0, content_type = {s = 0x0, len = 0}, reason = {s = 0x0, len = 0}, body = {s = 0x0, len = 0}}
        ret_value = 0
        not_parsed = 0
        dmq_node = 0x7ff1abab0560
        __func__ = "worker_loop"
#5  0x00007ff29b747282 in child_init (rank=0) at dmq.c:319
        i = 2
        newpid = 0
        __func__ = "child_init"
#6  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c1634a0, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c163a28, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1644b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#36 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#37 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#38 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#39 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#40 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#41 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 43) detached]
---end 43 -------------------------------------------------------

---start 44 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29b76196b in futex_get (lock=0x7ff19a82f9f8) at ../../core/parser/../mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29b766590 in extract_node_list (update_list=0x7ff19a82f9f8, msg=0x7ff1b1875960) at notification_peer.c:389
        content_length = 74
        total_nodes = 0
        body = {s = 0x7ff1b18762dd "sip:10.10.120.29:5060;status=active\r\nsip:10.10.120.33:5060;status=active\r\n", len = 74}
        tmp_uri = {s = 0x0, len = 0}
        cur = 0x0
        ret = 0x0
        find = 0x0
        tmp = 0x7ff1b18762dd "sip:10.10.120.29:5060;status=active\r\nsip:10.10.120.33:5060;status=active\r\n"
        end = 0x7ff1b1876327 ""
        match = 0x0
        __func__ = "extract_node_list"
#3  0x00007ff29b767af2 in dmq_notification_callback_f (msg=0x7ff1b1875960, resp=0x7fff2b35d1e0, dmq_node=0x7ff1abab0560) at notification_peer.c:481
        nodes_recv = 724947328
        response_body = 0x0
        maxforwards = 0
        __func__ = "dmq_notification_callback_f"
#4  0x00007ff29b76ca36 in worker_loop (id=3) at worker.c:80
        worker = 0x7ff19a82fac0
        current_job = 0x7ff1adedef70
        peer_response = {resp_code = 0, content_type = {s = 0x0, len = 0}, reason = {s = 0x0, len = 0}, body = {s = 0x0, len = 0}}
        ret_value = 77
        not_parsed = 0
        dmq_node = 0x7ff1abab0560
        __func__ = "worker_loop"
#5  0x00007ff29b747282 in child_init (rank=0) at dmq.c:319
        i = 3
        newpid = 0
        __func__ = "child_init"
#6  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c1634a0, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c163a28, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1644b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#36 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#37 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#38 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#39 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#40 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#41 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 44) detached]
---end 44 -------------------------------------------------------

---start 45 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=77, events=0x55ab7b263070, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=77, events=0x55ab7b263070, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x00007ff29b5a6e29 in ?? () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#2  0x00007ff29b59d035 in event_base_loop () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#3  0x00007ff29b674517 in async_http_run_worker (worker=0x7ff19a830290) at async_http.c:93
No locals.
#4  0x00007ff29b68933a in child_init (rank=0) at http_async_client_mod.c:381
        pid = 0
        i = 0
        __func__ = "child_init"
#5  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#6  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#36 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#37 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 45) detached]
---end 45 -------------------------------------------------------

---start 46 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=81, events=0x55ab7b263240, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=81, events=0x55ab7b263240, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x00007ff29b5a6e29 in ?? () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#2  0x00007ff29b59d035 in event_base_loop () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#3  0x00007ff29b674517 in async_http_run_worker (worker=0x7ff19a8302b0) at async_http.c:93
No locals.
#4  0x00007ff29b68933a in child_init (rank=0) at http_async_client_mod.c:381
        pid = 0
        i = 1
        __func__ = "child_init"
#5  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#6  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#36 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#37 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 46) detached]
---end 46 -------------------------------------------------------

---start 47 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=85, events=0x55ab7b2aa270, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=85, events=0x55ab7b2aa270, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x00007ff29b5a6e29 in ?? () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#2  0x00007ff29b59d035 in event_base_loop () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#3  0x00007ff29b674517 in async_http_run_worker (worker=0x7ff19a8302d0) at async_http.c:93
No locals.
#4  0x00007ff29b68933a in child_init (rank=0) at http_async_client_mod.c:381
        pid = 0
        i = 2
        __func__ = "child_init"
#5  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#6  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#36 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#37 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 47) detached]
---end 47 -------------------------------------------------------

---start 48 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=89, events=0x55ab7b2aa810, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=89, events=0x55ab7b2aa810, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x00007ff29b5a6e29 in ?? () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#2  0x00007ff29b59d035 in event_base_loop () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#3  0x00007ff29b674517 in async_http_run_worker (worker=0x7ff19a8302f0) at async_http.c:93
No locals.
#4  0x00007ff29b68933a in child_init (rank=0) at http_async_client_mod.c:381
        pid = 0
        i = 3
        __func__ = "child_init"
#5  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#6  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#36 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#37 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 48) detached]
---end 48 -------------------------------------------------------

---start 49 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=93, events=0x55ab7b278070, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=93, events=0x55ab7b278070, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x00007ff29b5a6e29 in ?? () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#2  0x00007ff29b59d035 in event_base_loop () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#3  0x00007ff29b674517 in async_http_run_worker (worker=0x7ff19a830310) at async_http.c:93
No locals.
#4  0x00007ff29b68933a in child_init (rank=0) at http_async_client_mod.c:381
        pid = 0
        i = 4
        __func__ = "child_init"
#5  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#6  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#36 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#37 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 49) detached]
---end 49 -------------------------------------------------------

---start 50 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=97, events=0x55ab7b2ba990, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=97, events=0x55ab7b2ba990, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x00007ff29b5a6e29 in ?? () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#2  0x00007ff29b59d035 in event_base_loop () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#3  0x00007ff29b674517 in async_http_run_worker (worker=0x7ff19a830330) at async_http.c:93
No locals.
#4  0x00007ff29b68933a in child_init (rank=0) at http_async_client_mod.c:381
        pid = 0
        i = 5
        __func__ = "child_init"
#5  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#6  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#36 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#37 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 50) detached]
---end 50 -------------------------------------------------------

---start 51 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=101, events=0x55ab7b2aca40, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=101, events=0x55ab7b2aca40, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x00007ff29b5a6e29 in ?? () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#2  0x00007ff29b59d035 in event_base_loop () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#3  0x00007ff29b674517 in async_http_run_worker (worker=0x7ff19a830350) at async_http.c:93
No locals.
#4  0x00007ff29b68933a in child_init (rank=0) at http_async_client_mod.c:381
        pid = 0
        i = 6
        __func__ = "child_init"
#5  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#6  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#36 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#37 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 51) detached]
---end 51 -------------------------------------------------------

---start 52 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=105, events=0x55ab7b2aced0, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=105, events=0x55ab7b2aced0, maxevents=32, timeout=-1) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x00007ff29b5a6e29 in ?? () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#2  0x00007ff29b59d035 in event_base_loop () from /usr/lib/x86_64-linux-gnu/libevent-2.1.so.7
No symbol table info available.
#3  0x00007ff29b674517 in async_http_run_worker (worker=0x7ff19a830370) at async_http.c:93
No locals.
#4  0x00007ff29b68933a in child_init (rank=0) at http_async_client_mod.c:381
        pid = 0
        i = 7
        __func__ = "child_init"
#5  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c164b28, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#6  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1657c0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c165f90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#35 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#36 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#37 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 52) detached]
---end 52 -------------------------------------------------------

---start 53 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007ff29aa243f6 in futex_get (lock=0x7ff19aa59dc4) at ../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007ff29aa259c4 in dlg_clean_run (ti=69079606) at dlg_hash.c:233
        mypid = 53
        i = 2953
        tm = 1640001588
        dlg = 0x0
        tdlg = 0x7ff1b5d650e8
        __func__ = "dlg_clean_run"
#3  0x00007ff29a9c94a2 in dlg_clean_timer_exec (ticks=69079606, param=0x0) at dialog.c:1432
No locals.
#4  0x000055ab7a026155 in fork_sync_timer (child_id=-1, desc=0x7ff29aa649bb "Dialog Clean Timer", make_sock=1, f=0x7ff29a9c9489 <dlg_clean_timer_exec>, param=0x0, interval=90000) at core/timer_proc.c:267
        pid = 0
        ts1 = 1105273697
        ts2 = 90000
#5  0x00007ff29a9bfab0 in child_init (rank=0) at dialog.c:771
        __func__ = "child_init"
#6  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c166d68, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c167bf8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168088, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#34 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#35 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 53) detached]
---end 53 -------------------------------------------------------

---start 54 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
__GI___libc_read (nbytes=4096, buf=0x55ab7b109120, fd=5) at ../sysdeps/unix/sysv/linux/read.c:26
26	../sysdeps/unix/sysv/linux/read.c: No such file or directory.
#0  __GI___libc_read (nbytes=4096, buf=0x55ab7b109120, fd=5) at ../sysdeps/unix/sysv/linux/read.c:26
        resultvar = 18446744073709551104
        sc_cancel_oldtype = 0
        __arg3 = <optimized out>
        _a2 = <optimized out>
        sc_ret = <optimized out>
        __value = <optimized out>
        __arg1 = <optimized out>
        _a3 = <optimized out>
        resultvar = <optimized out>
        resultvar = <optimized out>
        __arg2 = <optimized out>
        _a1 = <optimized out>
#1  __GI___libc_read (fd=5, buf=0x55ab7b109120, nbytes=4096) at ../sysdeps/unix/sysv/linux/read.c:24
No locals.
#2  0x00007ff2bc13989a in _IO_new_file_underflow (fp=0x55ab7b089410) at libioP.h:948
        count = <optimized out>
#3  0x00007ff2bc1389a0 in __GI__IO_file_xsgetn (fp=0x55ab7b089410, data=<optimized out>, n=1) at fileops.c:1322
        want = 1
        have = 0
        count = <optimized out>
        s = <optimized out>
#4  0x00007ff2bc12d11f in __GI__IO_fread (buf=0x7fff2b35b7c1, size=1, count=1, fp=0x55ab7b089410) at iofread.c:38
        _IO_acquire_lock_file = 0x55ab7b089410
        bytes_requested = 1
        bytes_read = <optimized out>
#5  0x00007ff29a93348f in jsonrpc_read_stream (b=0x7fff2b35b7c0 "\n{\"jsonrpc\": \"2.0\", \"method\": \"core.psx\", \"reply_name\": \"kamailio_receiver_3179\", \"id\": 3179}", max=8192, stream=0x55ab7b089410, lread=0x7fff2b35b73c) at jsonrpcs_fifo.c:243
        retry_cnt = 0
        len = 1
        p = 0x7fff2b35b7c1 "{\"jsonrpc\": \"2.0\", \"method\": \"core.psx\", \"reply_name\": \"kamailio_receiver_3179\", \"id\": 3179}"
        sstate = 0
        pcount = 0
        pfound = 0
        stype = 0
        __func__ = "jsonrpc_read_stream"
#6  0x00007ff29a9375c4 in jsonrpc_fifo_server (fifo_stream=0x55ab7b089410) at jsonrpcs_fifo.c:449
        reply_stream = 0x0
        buf_in = "\n{\"jsonrpc\": \"2.0\", \"method\": \"core.psx\", \"reply_name\": \"kamailio_receiver_3179\", \"id\": 3179}", '\000' <repeats 19 times>, "p\270\065+\001\000\000\000\214\324U\232\361\177\000\000p\270\065+\377\177\000\000\260\372\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\060\271\065+\377\177\000\000U\332\370y\253U\000\000\000\000\000\000\000\000\000\000"...
        buf_rpath = "kamailio_receiver_3179\000\000\310\306U\232\361\177\000\000\220\267\065+\377\177\000\000\330\360\005z\253U\000\000\366?\337y\253U\000\000\310\306U\232\361\177\000\000\000\000\000\000\000\000\000\000\260\372\302\232\361\177\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "p\270\065+\377\177\000\000'\336\370y\253U\000"
        lread = 1
        scmd = {s = 0x7fff2b35b7c1 "{\"jsonrpc\": \"2.0\", \"method\": \"core.psx\", \"reply_name\": \"kamailio_receiver_3179\", \"id\": 3179}", len = 92}
        srpath = {s = 0x7fff2b35b740 "kamailio_receiver_3179", len = 22}
        nw = 5007
        jr = 0x7ff29a96bb80 <_jsonrpc_plain_reply>
        __func__ = "jsonrpc_fifo_server"
#7  0x00007ff29a93943b in jsonrpc_fifo_process (rank=1) at jsonrpcs_fifo.c:497
        __func__ = "jsonrpc_fifo_process"
#8  0x00007ff29a93aa6d in jsonrpc_fifo_child_init (rank=0) at jsonrpcs_fifo.c:569
        pid = 0
        __func__ = "jsonrpc_fifo_child_init"
#9  0x00007ff29a949371 in child_init (rank=0) at jsonrpcs_mod.c:1210
        __func__ = "child_init"
#10 0x000055ab79f8de27 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#30 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#31 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#32 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#33 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#34 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#35 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#36 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 54) detached]
---end 54 -------------------------------------------------------

---start 55 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1ad8b3 in __GI___select (nfds=8, readfds=0x7fff2b35d720, writefds=0x0, exceptfds=0x0, timeout=0x0) at ../sysdeps/unix/sysv/linux/select.c:41
41	../sysdeps/unix/sysv/linux/select.c: No such file or directory.
#0  0x00007ff2bc1ad8b3 in __GI___select (nfds=8, readfds=0x7fff2b35d720, writefds=0x0, exceptfds=0x0, timeout=0x0) at ../sysdeps/unix/sysv/linux/select.c:41
        resultvar = 18446744073709551102
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
#1  0x00007ff29a95d17b in jsonrpc_dgram_server (rx_sock=7) at jsonrpcs_sock.c:577
        ret = 0
        scmd = {s = 0x42b35d7d0 <error: Cannot access memory at address 0x42b35d7d0>, len = -1698497724}
        jr = 0x0
        readfds = {__fds_bits = {128, 0 <repeats 15 times>}}
        n = 2045431915
        __func__ = "jsonrpc_dgram_server"
#2  0x00007ff29a95b813 in jsonrpc_dgram_process (rank=0) at jsonrpcs_sock.c:452
        __func__ = "jsonrpc_dgram_process"
#3  0x00007ff29a95b896 in jsonrpc_dgram_child_init (rank=0) at jsonrpcs_sock.c:475
        i = 0
        pid = 0
        __func__ = "jsonrpc_dgram_child_init"
#4  0x00007ff29a9496e3 in child_init (rank=0) at jsonrpcs_mod.c:1216
        __func__ = "child_init"
#5  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c1685a8, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#6  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168a38, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c168dd8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169220, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169640, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#25 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#26 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#27 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#28 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#29 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#30 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#31 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 55) detached]
---end 55 -------------------------------------------------------

---start 56 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc17dc61 in __GI___clock_nanosleep (clock_id=clock_id at entry=0, flags=flags at entry=0, req=req at entry=0x7fff2b35dc00, rem=rem at entry=0x7fff2b35dc00) at ../sysdeps/unix/sysv/linux/clock_nanosleep.c:48
48	../sysdeps/unix/sysv/linux/clock_nanosleep.c: No such file or directory.
#0  0x00007ff2bc17dc61 in __GI___clock_nanosleep (clock_id=clock_id at entry=0, flags=flags at entry=0, req=req at entry=0x7fff2b35dc00, rem=rem at entry=0x7fff2b35dc00) at ../sysdeps/unix/sysv/linux/clock_nanosleep.c:48
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
        r = <optimized out>
#1  0x00007ff2bc183443 in __GI___nanosleep (requested_time=requested_time at entry=0x7fff2b35dc00, remaining=remaining at entry=0x7fff2b35dc00) at nanosleep.c:27
        ret = <optimized out>
#2  0x00007ff2bc18337a in __sleep (seconds=0) at ../sysdeps/posix/sleep.c:55
        save_errno = 0
        max = 4294967295
        ts = {tv_sec = 211, tv_nsec = 281855866}
#3  0x000055ab7a025d30 in fork_basic_timer_w (child_id=-1, desc=0x7fff2b35dcf0 "RTIMER EXEC child=0 timer=refresh_token", make_sock=1, f=0x7ff29a8c1387 <stm_timer_exec>, worker=0, param=0x7ff29c18a8c0, interval=240) at core/timer_proc.c:98
        pid = 0
#4  0x00007ff29a8c0f9b in child_init (rank=0) at rtimer_mod.c:172
        it = 0x7ff29c18a8c0
        i = 0
        si_desc = "RTIMER EXEC child=0 timer=refresh_token\000\310\306U\232\361\177", '\000' <repeats 14 times>, "\001\000\000\000p\335\065+\000\000\000\000@\226\026\234\362\177\000\000\260\220Y\232\362\177\000\000\360\364\316\233C\001\000\000\000\251Y\232\362\177\000\000\264\220Y\232\362\177\000\000\200,\256\253\361\177\000\000\000\060R\232\361\177\000"
        __func__ = "child_init"
#5  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c169a98, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#6  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c169eb8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a4c8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16a908, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16ae98, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16b7f0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16bde8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#18 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#19 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#20 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#21 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#22 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#23 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#24 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#25 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#26 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 56) detached]
---end 56 -------------------------------------------------------

---start 57 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc17dc61 in __GI___clock_nanosleep (clock_id=clock_id at entry=0, flags=flags at entry=0, req=req at entry=0x7fff2b35e1e0, rem=rem at entry=0x7fff2b35e1e0) at ../sysdeps/unix/sysv/linux/clock_nanosleep.c:48
48	../sysdeps/unix/sysv/linux/clock_nanosleep.c: No such file or directory.
#0  0x00007ff2bc17dc61 in __GI___clock_nanosleep (clock_id=clock_id at entry=0, flags=flags at entry=0, req=req at entry=0x7fff2b35e1e0, rem=rem at entry=0x7fff2b35e1e0) at ../sysdeps/unix/sysv/linux/clock_nanosleep.c:48
        sc_cancel_oldtype = 0
        sc_ret = <optimized out>
        r = <optimized out>
#1  0x00007ff2bc183443 in __GI___nanosleep (requested_time=requested_time at entry=0x7fff2b35e1e0, remaining=remaining at entry=0x7fff2b35e1e0) at nanosleep.c:27
        ret = <optimized out>
#2  0x00007ff2bc18337a in __sleep (seconds=0) at ../sysdeps/posix/sleep.c:55
        save_errno = 11
        max = 4294967295
        ts = {tv_sec = 0, tv_nsec = 889089954}
#3  0x000055ab7a025c70 in fork_basic_timer (child_id=-1, desc=0x7ff29a643933 "TIMER NH", make_sock=1, f=0x7ff29a6312ed <nh_timer>, param=0x0, interval=1) at core/timer_proc.c:77
        pid = 0
#4  0x00007ff29a61b07c in child_init (rank=0) at nathelper.c:575
        i = 0
        __func__ = "child_init"
#5  0x000055ab79f8de27 in init_mod_child (m=0x7ff29c16c180, rank=0) at core/sr_module.c:873
        __func__ = "init_mod_child"
#6  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16c970, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#7  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c16d1b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#8  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170038, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#9  0x000055ab79f8da55 in init_mod_child (m=0x7ff29c170520, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#10 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1709d0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#11 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1714a0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#12 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c171ea8, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#13 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172758, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#14 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c172d90, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#15 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c1732b0, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#16 0x000055ab79f8da55 in init_mod_child (m=0x7ff29c173760, rank=0) at core/sr_module.c:869
        __func__ = "init_mod_child"
#17 0x000055ab79f8e6b8 in init_child (rank=0) at core/sr_module.c:918
        ret = -1673486008
        type = 0x55ab7a1cc1eb "PROC_MAIN"
        __func__ = "init_child"
#18 0x000055ab79d6ca34 in main_loop () at main.c:1849
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#19 0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 57) detached]
---end 57 -------------------------------------------------------

---start 58 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x000055ab7a005711 in io_wait_loop_epoll (h=0x55ab7a2ddaa0 <io_w>, t=2, repeat=0) at core/io_wait.h:1039
        n = 1
        r = 1
        fm = 0x7ff29c418490
        revents = 8193
        __func__ = "io_wait_loop_epoll"
#2  0x000055ab7a01cd00 in tcp_receive_loop (unix_sock=116) at core/tcp_read.c:1978
        __func__ = "tcp_receive_loop"
#3  0x000055ab79ffa150 in tcp_init_children (woneinit=0x7fff2b35ed0c) at core/tcp_main.c:5153
        r = 0
        i = 7
        reader_fd_1 = 116
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\240\354\065+\377\177\000\000\270\346\370y\253U\000\000\240\354\065+\377\177\000\000\224u\002z\000\000\000\000P\354\065+\377\177\000\000\366\342\023z\253U\000\000\366?\337y\253U\000\000\300\326U\232G\000\000"
        si = 0x0
        __func__ = "tcp_init_children"
#4  0x000055ab79d6cda7 in main_loop () at main.c:1857
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#5  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 58) detached]
---end 58 -------------------------------------------------------

---start 59 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x000055ab7a005711 in io_wait_loop_epoll (h=0x55ab7a2ddaa0 <io_w>, t=2, repeat=0) at core/io_wait.h:1039
        n = 1
        r = 1
        fm = 0x7ff29c418490
        revents = 8193
        __func__ = "io_wait_loop_epoll"
#2  0x000055ab7a01cd00 in tcp_receive_loop (unix_sock=118) at core/tcp_read.c:1978
        __func__ = "tcp_receive_loop"
#3  0x000055ab79ffa150 in tcp_init_children (woneinit=0x7fff2b35ed0c) at core/tcp_main.c:5153
        r = 1
        i = 7
        reader_fd_1 = 118
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\240\354\065+\377\177\000\000\270\346\370y\253U\000\000\240\354\065+\377\177\000\000\224u\002z\000\000\000\000P\354\065+\377\177\000\000\366\342\023z\253U\000\000\366?\337y\253U\000\000\300\326U\232G\000\000"
        si = 0x0
        __func__ = "tcp_init_children"
#4  0x000055ab79d6cda7 in main_loop () at main.c:1857
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#5  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 59) detached]
---end 59 -------------------------------------------------------

---start 60 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x000055ab7a005711 in io_wait_loop_epoll (h=0x55ab7a2ddaa0 <io_w>, t=2, repeat=0) at core/io_wait.h:1039
        n = 1
        r = 1
        fm = 0x7ff29c418490
        revents = 8193
        __func__ = "io_wait_loop_epoll"
#2  0x000055ab7a01cd00 in tcp_receive_loop (unix_sock=120) at core/tcp_read.c:1978
        __func__ = "tcp_receive_loop"
#3  0x000055ab79ffa150 in tcp_init_children (woneinit=0x7fff2b35ed0c) at core/tcp_main.c:5153
        r = 2
        i = 7
        reader_fd_1 = 120
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\240\354\065+\377\177\000\000\270\346\370y\253U\000\000\240\354\065+\377\177\000\000\224u\002z\000\000\000\000P\354\065+\377\177\000\000\366\342\023z\253U\000\000\366?\337y\253U\000\000\300\326U\232G\000\000"
        si = 0x0
        __func__ = "tcp_init_children"
#4  0x000055ab79d6cda7 in main_loop () at main.c:1857
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#5  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 60) detached]
---end 60 -------------------------------------------------------

---start 61 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x000055ab7a005711 in io_wait_loop_epoll (h=0x55ab7a2ddaa0 <io_w>, t=2, repeat=0) at core/io_wait.h:1039
        n = 1
        r = 1
        fm = 0x7ff29c418490
        revents = 8193
        __func__ = "io_wait_loop_epoll"
#2  0x000055ab7a01cd00 in tcp_receive_loop (unix_sock=122) at core/tcp_read.c:1978
        __func__ = "tcp_receive_loop"
#3  0x000055ab79ffa150 in tcp_init_children (woneinit=0x7fff2b35ed0c) at core/tcp_main.c:5153
        r = 3
        i = 7
        reader_fd_1 = 122
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\240\354\065+\377\177\000\000\270\346\370y\253U\000\000\240\354\065+\377\177\000\000\224u\002z\000\000\000\000P\354\065+\377\177\000\000\366\342\023z\253U\000\000\366?\337y\253U\000\000\300\326U\232G\000\000"
        si = 0x0
        __func__ = "tcp_init_children"
#4  0x000055ab79d6cda7 in main_loop () at main.c:1857
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#5  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 61) detached]
---end 61 -------------------------------------------------------

---start 62 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x000055ab7a005711 in io_wait_loop_epoll (h=0x55ab7a2ddaa0 <io_w>, t=2, repeat=0) at core/io_wait.h:1039
        n = 536870912
        r = 0
        fm = 0x2
        revents = 21931
        __func__ = "io_wait_loop_epoll"
#2  0x000055ab7a01cd00 in tcp_receive_loop (unix_sock=124) at core/tcp_read.c:1978
        __func__ = "tcp_receive_loop"
#3  0x000055ab79ffa150 in tcp_init_children (woneinit=0x7fff2b35ed0c) at core/tcp_main.c:5153
        r = 4
        i = 7
        reader_fd_1 = 124
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\240\354\065+\377\177\000\000\270\346\370y\253U\000\000\240\354\065+\377\177\000\000\224u\002z\000\000\000\000P\354\065+\377\177\000\000\366\342\023z\253U\000\000\366?\337y\253U\000\000\300\326U\232G\000\000"
        si = 0x0
        __func__ = "tcp_init_children"
#4  0x000055ab79d6cda7 in main_loop () at main.c:1857
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#5  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 62) detached]
---end 62 -------------------------------------------------------

---start 63 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x000055ab7a005711 in io_wait_loop_epoll (h=0x55ab7a2ddaa0 <io_w>, t=2, repeat=0) at core/io_wait.h:1039
        n = 1
        r = 1
        fm = 0x7ff29c418490
        revents = 8193
        __func__ = "io_wait_loop_epoll"
#2  0x000055ab7a01cd00 in tcp_receive_loop (unix_sock=126) at core/tcp_read.c:1978
        __func__ = "tcp_receive_loop"
#3  0x000055ab79ffa150 in tcp_init_children (woneinit=0x7fff2b35ed0c) at core/tcp_main.c:5153
        r = 5
        i = 7
        reader_fd_1 = 126
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\240\354\065+\377\177\000\000\270\346\370y\253U\000\000\240\354\065+\377\177\000\000\224u\002z\000\000\000\000P\354\065+\377\177\000\000\366\342\023z\253U\000\000\366?\337y\253U\000\000\300\326U\232G\000\000"
        si = 0x0
        __func__ = "tcp_init_children"
#4  0x000055ab79d6cda7 in main_loop () at main.c:1857
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#5  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 63) detached]
---end 63 -------------------------------------------------------

---start 64 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x000055ab7a005711 in io_wait_loop_epoll (h=0x55ab7a2ddaa0 <io_w>, t=2, repeat=0) at core/io_wait.h:1039
        n = 1
        r = 1
        fm = 0x7ff29c418490
        revents = 8193
        __func__ = "io_wait_loop_epoll"
#2  0x000055ab7a01cd00 in tcp_receive_loop (unix_sock=128) at core/tcp_read.c:1978
        __func__ = "tcp_receive_loop"
#3  0x000055ab79ffa150 in tcp_init_children (woneinit=0x7fff2b35ed0c) at core/tcp_main.c:5153
        r = 6
        i = 7
        reader_fd_1 = 128
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\240\354\065+\377\177\000\000\270\346\370y\253U\000\000\240\354\065+\377\177\000\000\224u\002z\000\000\000\000P\354\065+\377\177\000\000\366\342\023z\253U\000\000\366?\337y\253U\000\000\300\326U\232G\000\000"
        si = 0x0
        __func__ = "tcp_init_children"
#4  0x000055ab79d6cda7 in main_loop () at main.c:1857
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#5  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 64) detached]
---end 64 -------------------------------------------------------

---start 65 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=15, events=0x7ff29c432208, maxevents=1, timeout=2000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x000055ab7a005711 in io_wait_loop_epoll (h=0x55ab7a2ddaa0 <io_w>, t=2, repeat=0) at core/io_wait.h:1039
        n = 1
        r = 1
        fm = 0x7ff29c418490
        revents = 8193
        __func__ = "io_wait_loop_epoll"
#2  0x000055ab7a01cd00 in tcp_receive_loop (unix_sock=130) at core/tcp_read.c:1978
        __func__ = "tcp_receive_loop"
#3  0x000055ab79ffa150 in tcp_init_children (woneinit=0x7fff2b35ed0c) at core/tcp_main.c:5153
        r = 7
        i = 7
        reader_fd_1 = 130
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\000\000\000\000\001\000\000\000\366?\337y\253U\000\000\000\000\000 ", '\000' <repeats 20 times>, "\240\354\065+\377\177\000\000\270\346\370y\253U\000\000\240\354\065+\377\177\000\000\224u\002z\000\000\000\000P\354\065+\377\177\000\000\366\342\023z\253U\000\000\366?\337y\253U\000\000\300\326U\232G\000\000"
        si = 0x0
        __func__ = "tcp_init_children"
#4  0x000055ab79d6cda7 in main_loop () at main.c:1857
        i = 8
        pid = 38
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#5  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 65) detached]
---end 65 -------------------------------------------------------

---start 66 -----------------------------------------------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
0x00007ff2bc1b6116 in epoll_wait (epfd=130, events=0x7ff29c432208, maxevents=77, timeout=5000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
30	../sysdeps/unix/sysv/linux/epoll_wait.c: No such file or directory.
#0  0x00007ff2bc1b6116 in epoll_wait (epfd=130, events=0x7ff29c432208, maxevents=77, timeout=5000) at ../sysdeps/unix/sysv/linux/epoll_wait.c:30
No locals.
#1  0x000055ab79fb4eb9 in io_wait_loop_epoll (h=0x55ab7a299800 <io_h>, t=5, repeat=0) at core/io_wait.h:1039
        n = -1676017352
        r = 32754
        fm = 0x7ff29c418e68
        revents = 32754
        __func__ = "io_wait_loop_epoll"
#2  0x000055ab79ff5154 in tcp_main_loop () at core/tcp_main.c:4822
        si = 0x0
        r = 8
        __func__ = "tcp_main_loop"
#3  0x000055ab79d6d15a in main_loop () at main.c:1865
        i = 8
        pid = 0
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.1:5060\000\066\060\000\000\000\374\000\300\355\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\355\065+\377\177\000\000(\000\000\000\060\000\000\000\030$\026\234\362\177\000\000\220\355\065+\377\177\000\000\204\000\000\000F\000\000\000(t\031z\253U\000\000\200s\031z\253U\000\000\315i\031z\253U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#4  0x000055ab79d772ab in main (argc=12, argv=0x7fff2b35f3b8) at main.c:3053
        cfg_stream = 0x55ab7b07e2d0
        c = -1
        r = 0
        tmp = 0x7fff2b360ef6 ""
        tmp_len = 896
        port = 896
        proto = 832
        ahost = 0x0
        aport = 0
        options = 0x55ab7a1830a8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1177355209
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x9c0000009c0
        p = 0xc2 <error: Cannot access memory at address 0xc2>
        st = {st_dev = 0, st_ino = 0, st_nlink = 0, st_mode = 0, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 0, st_blksize = 0, st_blocks = 0, st_atim = {tv_sec = 0, tv_nsec = 0}, st_mtim = {tv_sec = 0, tv_nsec = 0}, st_ctim = {tv_sec = 0, tv_nsec = 0}, __glibc_reserved = {0, 0, 0}}
        tbuf = "P\357\065+\377\177\000\000\300J\r\274\362\177\000\000\020D@\274\362\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177\000\000\000\000\000\000\000\000\000\000\320\357\065+\377\177", '\000' <repeats 18 times>, "`\207@\274\362\177\000\000\350DC\274\362\177\000\000\204\211@\274\362\177\000\000\060\204@\274\362\177\000\000H0C\274\362\177\000\000\000\200@\274\362\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\070\a\f\274\362\177", '\000' <repeats 66 times>...
        option_index = 9
        long_options = {{name = 0x55ab7a185506 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55ab7a180504 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55ab7a18550b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55ab7a185511 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55ab7a185517 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55ab7a185520 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55ab7a18552a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55ab7a185534 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55ab7a18553f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55ab7a185548 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55ab7a185553 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55ab7a185559 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55ab7a185563 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Inferior 1 (process 66) detached]
---end 66 --------------------------------------


More information about the sr-users mailing list