[SR-Users] Kamailio Stop Responding Randomly

M Arqum CH marqumch at gmail.com
Wed May 18 12:41:57 CEST 2022


Kamailio  first  gives timeout on ctl unix socket as I am exporting data
using prometheus exporter,  after a few minutes it stops responding to any
sip request  on default/production  udp port  binded with multiple IP
addresses for sip traffic.

The other listing port which is used by keepalived check script   for
 bing-pong keeps responding to option messages.

Its very random behaviour occurs after a few days or after a few months,
the system having max load 350 concurrent calls with load average 200-300.

I am attaching core dump which is collected before restarting the process.

Please let me know if more information is required.

version: kamailio 5.4.1 (x86_64/linux) 2ca223
flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE,
USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC,
TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT,
USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST,
HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024,
BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: 2ca223

Thankyou in advance.
-- 
Regards
M Arqum
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-users/attachments/20220518/8177f2d6/attachment-0001.htm>
-------------- next part --------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007fc7fdacd78d in futex_get (lock=0x7fc80def9dd0) at ../../core/parser/../mem/../futexlock.h:121
        v = 1
        i = 0
#2  0x00007fc7fdacf75b in _lock (s=0x7fc80def9dd0) at lock.h:77
No locals.
#3  0x00007fc7fdaf2da7 in tm_reply_mutex_lock (t=0x7fc80def9b88) at t_reply.c:3063
        mypid = 67117
#4  0x00007fc7fdad8868 in _reply_light (trans=0x7fc80def9b88, buf=0x7fc937f956a0 "SIP/2.0 487 Request canceled\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nVia: SIP/2.0/UDP 191.0.0.1;branch=z9hG4bKsr-j4IPOlV7MGQKatycM.y7M.3wOBFsMmZ4Wx1LNSQL"..., len=536, code=487, to_tag=0x7fc7fddc04e0 <tm_tags> "fc3d4179ffdbaeed3a8b1e97891311fe-1e620000", to_tag_len=41, lock=1, bm=0x7ffcc6738150) at t_reply.c:480
        rb = 0x0
        buf_len = 4294967295
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}}
        onsend_params = {req = 0x7ffcc67380d0, rpl = 0x7fc7fddc0509, param = 0x0, code = 0, flags = 0, branch = 0, t_rbuf = 0xc6738070, dst = 0x0, send_buf = {s = 0x7fc700000000 <error: Cannot access memory at address 0x7fc700000000>, len = 76549264}}
        rt = 0
        backup_rt = 0
        ctx = {rec_lev = 279641888, run_flags = 21851, last_retcode = -965509168, jmp_env = {{__jmpbuf = {140723637944432, 300647710721, 0, 140502204241512, 93849606854707, 140502199881744, 140723637944240, 93849606559368}, __mask_was_saved = 0, __saved_mask = {__val = {140502477644288, 93849606854707, 5255462912, 140723637944592, 93849604452410, 140723637944656, 140723637944684, 140496957832080, 140496934186848, 140723637944752, 2094978531368, 0, 562949953421312, 140723637944496, 93849603943132, 1}}}}}
        bctx = 0x0
        pmsg = {id = 276469811, pid = 21851, tval = {tv_sec = 5255462912, tv_usec = 140723637942864}, fwd_send_flags = {f = 53068, blst_imask = 64948}, rpl_send_flags = {f = 32711, blst_imask = 0}, first_line = {type = 30992, flags = -14733, len = 32764, u = {request = {method = {s = 0x555b1040c449 <run_actions+2110> "\211E\304H\307\005\361gc", len = -965510872}, uri = {s = 0x30d00000000 <error: Cannot access memory at address 0x30d00000000>, len = 238842400}, version = {s = 0x7fc80e3c1d60 "", len = 32816}, method_value = 940355048}, reply = {version = {s = 0x555b1040c449 <run_actions+2110> "\211E\304H\307\005\361gc", len = -965510872}, status = {s = 0x30d00000000 <error: Cannot access memory at address 0x30d00000000>, len = 238842400}, reason = {s = 0x7fc80e3c1d60 "", len = 32816}, statuscode = 940355048}}}, via1 = 0x7fc937ffeb68, via2 = 0x7ffcc6737990, headers = 0x0, last_header = 0x488, parsed_flag = 7624423456, h_via1 = 0x7fc804900c10, h_via2 = 0x7ffcc6737820, callid = 0x7fc7f55e40e0 <futex_release+29>, to = 0x555b107ee6db, cseq = 0x7fc804900c10, from = 0x0, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0x0, authorization = 0x0, expires = 0x0, proxy_auth = 0x7fc800000000, supported = 0x0, require = 0x0, proxy_require = 0x7ffcc67378b0, unsupported = 0xf55ed173, allow = 0x510a4400b, event = 0x7fc9380cade8, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x7ffcc67378f0, user_agent = 0x0, server = 0x0, content_disposition = 0x0, diversion = 0x7fc80e3c1d60, rpid = 0x0, refer_to = 0x800000000, session_expires = 0x7fc80e3c1d30, min_se = 0x7fc937f950d0, sipifmatch = 0x30d, subscription_state = 0x0, date = 0x7fc80e3c1d60, identity = 0x7fc937f950d0, identity_info = 0x555b0000030d, pai = 0x30d00000000, ppi = 0x7fc80e3c7220, path = 0x7fc80e3c1d60, privacy = 0x7fc9380cade8, min_expires = 0x1, body = 0x7fc9380cb490, eoh = 0x2 <error: Cannot access memory at address 0x2>, unparsed = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, rcv = {src_ip = {af = 276469811, len = 1, u = {addrl = {140496934516032, 140723637942688}, addr32 = {4259296576, 32711, 3329456544, 32764}, addr16 = {46400, 64991, 32711, 0, 31136, 50803, 32764, 0}, addr = "@\265\337\375\307\177\000\000\240ys\306\374\177\000"}}, dst_ip = {af = 273077447, len = 21851, u = {addrl = {140497209007408, 140496934516032}, addr32 = {238820656, 32712, 4259296576, 32711}, addr16 = {7472, 3644, 32712, 0, 46400, 64991, 32711, 0}, addr = "0\035<\016\310\177\000\000@\265\337\375\307\177\000"}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 940356752, src_su = {s = {sa_family = 31312, sa_data = "s\306\374\177\000\000\352\037G\020[U\000"}, sin = {sin_family = 31312, sin_port = 50803, sin_addr = {s_addr = 32764}, sin_zero = "\352\037G\020[U\000"}, sin6 = {sin6_family = 31312, sin6_port = 50803, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 = "\352\037G\020[U\000\000\002\000\000\000\000\000\000", __u6_addr16 = {8170, 4167, 21851, 0, 2, 0, 0, 0}, __u6_addr32 = {273096682, 21851, 2, 0}}}, sin6_scope_id = 1212490240}, sas = {ss_family = 31312, __ss_padding = "s\306\374\177\000\000\352\037G\020[U\000\000\002\000\000\000\000\000\000\000\000\"EH\311\177\000\000\063\230z\020\b\000\000\000\060\035<\016\310\177\000\000f\242\221\203)~\252uf\242\321\354N\322\345 ", '\000' <repeats 32 times>, "\340\000\000\000\000\000\000\000\000\020\334\375", '\000' <repeats 11 times>, __ss_align = 0}}, bind_address = 0xc6737b50, proto = -112 '\220', proto_pad0 = -76 '\264', proto_pad1 = 14348}, buf = 0x2 <error: Cannot access memory at address 0x2>, len = 1212490240, new_uri = {s = 0x555b107a9833 "INFO", len = 960495616}, dst_uri = {s = 0x7ffcc6737b00 "\020|s\306\374\177", len = -38377848}, parsed_uri_ok = 279200227, parsed_uri = {user = {s = 0x7fc80e3c1d10 "", len = 238842400}, passwd = {s = 0x7fc80e3c1d10 "", len = 935333888}, host = {s = 0x7fc80e3c7220 "UPDATE sip:03101064233 at 172.17.3.12:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.6.14;branch=z9hG4bK0bc5.1cb4bcee359864991d244f651ff24bf2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK0bc5.2ecdd1653af798851"..., len = 781}, port = {s = 0x7fc9380cade8 "\373E\001", len = 0}, params = {s = 0x7fc9380cb490 "", len = 2}, sip_params = {s = 0x148452200 <error: Cannot access memory at address 0x148452200>, len = 8}, headers = {s = 0x502cc9a074 <error: Cannot access memory at address 0x502cc9a074>, len = -965510192}, port_no = 46224, proto = 14348, type = 32713, flags = URI_SIP_USER_PHONE, transport = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, ttl = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965510128}, user_param = {s = 0x7fc7fdb78d32 <t_send_branch+9771> "\205\300\017\204l\003", len = -965510192}, maddr = {s = 0x7fc7fdb70041 <add_uac+2493> "\017\267Eʃ\300\001\211\302H\213\205x\377\377\377f\211P\032H\203\275P\377\377\377", len = 0}, method = {s = 0x7fc9380cb490 "", len = 0}, lr = {s = 0x7fc9380cade8 "\373E\001", len = 1}, r2 = {s = 0x7fc80e3c1a70 "(\357\366\375\307\177", len = -965510128}, gr = {s = 0x7fc7fdb40ed2 <save_msg_lumps+2722> "\211Eă", <incomplete sequence \304>, len = 940355048}, transport_val = {s = 0x7fc80e3c5be8 "\372E\001", len = 0}, ttl_val = {s = 0x7fc7fdb7d7f8 "tm", len = 279642272}, user_param_val = {s = 0x555b10ab07b8 <def_list+24> "", len = -965510000}, maddr_val = {s = 0x1a70 <error: Cannot access memory at address 0x1a70>, len = 238836712}, method_val = {s = 0x7fc9380cb490 "", len = 2}, lr_val = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, r2_val = {s = 0x555b10420534 <get_branch_data+54> "\213\005\346)b", len = -965510016}, gr_val = {s = 0x7fc80e3c1d00 "", len = -965510128}}, parsed_orig_ruri_ok = 940356752, parsed_orig_ruri = {user = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1212490240}, passwd = {s = 0x555b107a9833 "INFO", len = 960495616}, host = {s = 0x7ffcc6737d70 "\020\177s\306'", len = -38297042}, port = {s = 0xc6737c50 <error: Cannot access memory at address 0xc6737c50>, len = 0}, params = {s = 0x7fc9380cade8 "\373E\001", len = 238819952}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, headers = {s = 0x7fc93807a9a8 "\001", len = 276598617}, port_no = 31904, proto = 50803, type = SIP_URI_T, flags = (unknown: 76549136), transport = {s = 0x7ffcc6737ca0 "\340|s\306\374\177", len = -178372384}, ttl = {s = 0x555b107c8f58 "", len = 76549136}, user_param = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = -252645136}, maddr = {s = 0x7ffcc6737ce0 "\020}s\306\374\177", len = -178335373}, method = {s = 0x8700000000 <error: Cannot access memory at address 0x8700000000>, len = -965509876}, lr = {s = 0x4fdb9d123 <error: Cannot access memory at address 0x4fdb9d123>, len = 276598612}, r2 = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, gr = {s = 0x7ffcc6737d10 "", len = 274214092}, transport_val = {s = 0x403e8c978 <error: Cannot access memory at address 0x403e8c978>, len = 276598612}, ttl_val = {s = 0x7ffcc6737e00 "\377\020z\020[U", len = 275030558}, user_param_val = {s = 0x7ffcc6737e00 "\377\020z\020[U", len = 275030754}, maddr_val = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = -38164549}, method_val = {s = 0x7fc7fdb9d120 "tm", len = 0}, lr_val = {s = 0x7fc7fdb9d238 <__func__.10856> "insert_tmcb", len = -38153949}, r2_val = {s = 0x28 <error: Cannot access memory at address 0x28>, len = -35909632}, gr_val = {s = 0x555b107a9833 "INFO", len = 960495616}}, add_rm = 0x27c6737f10, body_lumps = 0x555b10aaff20 <buff.5856>, reply_lump = 0x7fc7ff437d98, add_to_branch_s = "\000\000\000\000\000\000\000\000\003\000\000\000\r\000\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000`~s\306\374\177\000\000\213\005S\020[U\000\000\001", add_to_branch_len = 0, hash_index = 76549136, msg_flags = 32712, flags = 279641888, xflags = {21851, 4282613136}, set_global_address = {s = 0x1c6737e20 <error: Cannot access memory at address 0x1c6737e20>, len = 76549136}, set_global_port = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, force_send_socket = 0x555b107a10ff, path_vec = {s = 0x555b10653c7e <qm_info+46> "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b", len = -965509552}, instance = {s = 0x7fc937b6d010 "\001", len = -965509552}, reg_id = 934727696, ruid = {s = 0x7ffcc6737e90 "\300~s\306\374\177", len = -57849891}, location_ua = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, otcpid = 276824064, ldv = {flow = {decoded = 271266696, rcv = {src_ip = {af = 4198080, len = 0, u = {addrl = {5557368, 17856448}, addr32 = {5557368, 0, 17856448, 0}, addr16 = {52344, 84, 0, 0, 30656, 272, 0, 0}, addr = "x\314T\000\000\000\000\000\300w\020\001\000\000\000"}}, dst_ip = {af = 8, len = 0, u = {addrl = {65, 0}, addr32 = {65, 0, 0, 0}, addr16 = {65, 0, 0, 0, 0, 0, 0, 0}, addr = "A", '\000' <repeats 14 times>}}, src_port = 32448, dst_port = 50803, proto_reserved1 = 32764, proto_reserved2 = 273118466, src_su = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000T\217|\020\005\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "T\217|\020\005\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "T\217|\020\005\000\000\000\260\177s\306\374\177\000", __u6_addr16 = {36692, 4220, 5, 0, 32688, 50803, 32764, 0}, __u6_addr32 = {276598612, 5, 3329458096, 32764}}}, sin6_scope_id = 275030558}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000T\217|\020\005\000\000\000\260\177s\306\374\177\000\000\036\242d\020\000\000\000\000\260\177s\306\374\177\000\000\230\246d\020[U\000\000\210\026v\020[U\000\000\210\026v\020\001\000\000\000\373\020z\020[U\000\000s\321^\365\263\t\000\000\300Dz\020[U\000\000\261\027z\020[U\000\000 \002\000\000\000\000\000\000\020ж7\311\177\000\000\016\000\000\000n\365\023o", __ss_align = 0}}, bind_address = 0x7ffcc6737f50, proto = -52 '\314', proto_pad0 = 44 ',', proto_pad1 = 4184}}, vdata = 0x4c6737fd0}}
        keng = 0x0
        evname = {s = 0x7fc7fdb8a105 "tm:local-response-sent", len = 22}
        __func__ = "_reply_light"
#5  0x00007fc7fdadaa88 in _reply (trans=0x7fc80def9b88, p_msg=0x7fc7ff437b90, code=487, reason=0x7ffcc67381b0, lock=1) at t_reply.c:692
        len = 536
        buf = 0x7fc937f956a0 "SIP/2.0 487 Request canceled\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nVia: SIP/2.0/UDP 191.0.0.1;branch=z9hG4bKsr-j4IPOlV7MGQKatycM.y7M.3wOBFsMmZ4Wx1LNSQL"...
        dset = 0x110761688 <error: Cannot access memory at address 0x110761688>
        bm = {to_tag_val = {s = 0x7fc937f95820 "fc3d4179ffdbaeed3a8b1e97891311fe-1e620000\r\nCall-ID: hipertelM.MZMBjuMBMsPxFAOBV7W.y7M.c*\r\nCSeq: 20 INVITE\r\nServer: HiperTel v2.15\r\nContent-Length: 0\r\n\r\n", len = 41}}
        dset_len = 32712
#6  0x00007fc7fdae6764 in t_reply (t=0x7fc80def9b88, p_msg=0x7fc7ff437b90, code=487, text=0x7fc7fdba0a2b "Request canceled") at t_reply.c:1717
        reason = {s = 0x7fc7fdba0a2b "Request canceled", len = 16}
#7  0x00007fc7fdb756ee in e2e_cancel (cancel_msg=0x7fc9380cade8, t_cancel=0x7fc80e3c7818, t_invite=0x7fc80def9b88) at t_fwd.c:1315
        cancel_bm = 0
        reason = 0xb27
        free_reason = 32764
        i = -965508272
        lowest_error = 0
        ret = 940025184
        tmcb = {req = 0x101800000000, rpl = 0x7fc7fdb7d7f8, param = 0x555b10ab00a0 <_xavi_list_head>, code = 279644088, flags = 21851, branch = 0, t_rbuf = 0xc6738350, dst = 0x7fc80def9b88, send_buf = {s = 0x7fc80e3cb990 "\373E\001", len = 276174472}}
        __func__ = "e2e_cancel"
#8  0x00007fc7fdb79162 in t_forward_nonack (t=0x7fc80e3c7818, p_msg=0x7fc9380cade8, proxy=0x0, proto=0) at t_fwd.c:1647
        branch_ret = 0
        lowest_ret = 1
        added_branches = 1213011861
        first_branch = 0
        i = 32764
        t_invite = 0x7fc80def9b88
        success_branch = -965506688
        try_new = 21851
        lock_replies = 273118466
        backup_bflags = 0
        obranch = {uri = {s = 0x555b107a9833 "INFO", len = 960495616}, dst_uri = {s = 0x7ffcc6738430 "\260\205s\306\374\177", len = -39223825}, q = -965508160, path = {s = 0x7fc7fc8d47dd <pkg_proc_update_stats+115> "H\213\r\034[ ", len = -252645136}, flags = 0, force_socket = 0x10800000, ruid = {s = 0x7fc9380cade8 "\373E\001", len = 4198584}, instance = {s = 0x54ce70 <error: Cannot access memory at address 0x54ce70>, len = 17856448}, location_ua = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 65}, otcpid = 0}
        __func__ = "t_forward_nonack"
#9  0x00007fc7fdb7a6b3 in t_forward_cancel (p_msg=0x7fc9380cade8, proxy=0x0, proto=0, tran=0x7ffcc67386f0) at t_fwd.c:1853
        t_invite = 0x7fc70000000e
        t = 0x7fc80e3c7818
        ret = 32713
        new_tran = 1
        dst = {send_sock = 0xd68, to = {s = {sa_family = 64441, sa_data = "^\365\307\177\000\000`\212s\306\374\177\000"}, sin = {sin_family = 64441, sin_port = 62814, sin_addr = {s_addr = 32711}, sin_zero = "`\212s\306\374\177\000"}, sin6 = {sin6_family = 64441, sin6_port = 62814, sin6_flowinfo = 32711, sin6_addr = {__in6_u = {__u6_addr8 = "`\212s\306\374\177\000\000\260'\361\067\311\177\000", __u6_addr16 = {35424, 50803, 32764, 0, 10160, 14321, 32713, 0}, __u6_addr32 = {3329460832, 32764, 938551216, 32713}}}, sin6_scope_id = 935414184}, sas = {ss_family = 64441, __ss_padding = "^\365\307\177\000\000`\212s\306\374\177\000\000\260'\361\067\311\177\000\000\250I\301\067\311\177\000\000\000\000\000\000\000\000\000\000\240\206s\306\374\177\000\000\341S^\365\307\177\000\000\220\211s\306\374\177\000\000`\213s\306\374\177\000\000\220x\360\067\311\177\000\000\200\211s\306\374\177\000\000ȅs\306\374\177\000\000\020\000\000\000\060\000\000\000\360\205s\306\374\177\000\000P\207s\306\374\177\000", __ss_align = 0}}, id = 0, send_flags = {f = 32711, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        host = {s = 0x7ffcc6738560 "", len = 46}
        port = 0
        comp = 32713
        __func__ = "t_forward_cancel"
#10 0x00007fc7fdb501a0 in t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, proto=0, replicate=0) at t_funcs.c:239
        ret = 0
        new_tran = 939088312
        t = 0x7ffcc6738900
        dst = {send_sock = 0x7fc937c05468, to = {s = {sa_family = 10160, sa_data = "\361\067\311\177\000\000\020\210s\306\374\177\000"}, sin = {sin_family = 10160, sin_port = 14321, sin_addr = {s_addr = 32713}, sin_zero = "\020\210s\306\374\177\000"}, sin6 = {sin6_family = 10160, sin6_port = 14321, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "\020\210s\306\374\177\000\000\341S^\365\307\177\000", __u6_addr16 = {34832, 50803, 32764, 0, 21473, 62814, 32711, 0}, __u6_addr32 = {3329460240, 32764, 4116599777, 32711}}}, sin6_scope_id = 23}, sas = {ss_family = 10160, __ss_padding = "\361\067\311\177\000\000\020\210s\306\374\177\000\000\341S^\365\307\177\000\000\027\000\000\000W\024\365h\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\262\336\067\311\177\000\000Іs\306\374\177\000\000\300\210s\306\374\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000", __ss_align = 140723637947776}}, id = 272622906, send_flags = {f = 21851, blst_imask = 0}, proto = -32 '\340', proto_pad0 = -120 '\210', proto_pad1 = -14733}
        port = 0
        host = {s = 0x555b10761688 "", len = -178324551}
        comp = 0
        __func__ = "t_relay_to"
#11 0x00007fc7fdb054da in _w_t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, force_proto=0) at tm.c:1752
        t = 0x0
        res = 32764
        __func__ = "_w_t_relay_to"
#12 0x00007fc7fdb06825 in w_t_relay (p_msg=0x7fc9380cade8, _foo=0x0, _bar=0x0) at tm.c:1952
No locals.
#13 0x0000555b103fe4b2 in do_action (h=0x7ffcc67390b0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1076
        ret = -5
        v = 1
        dst = {send_sock = 0x7fc937deaff0, to = {s = {sa_family = 44520, sa_data = "\f8\311\177\000\000\253'\021\375\307\177\000"}, sin = {sin_family = 44520, sin_port = 14348, sin_addr = {s_addr = 32713}, sin_zero = "\253'\021\375\307\177\000"}, sin6 = {sin6_family = 44520, sin6_port = 14348, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "\253'\021\375\307\177\000\000\320\n\220\004\310\177\000", __u6_addr16 = {10155, 64785, 32711, 0, 2768, 1168, 32712, 0}, __u6_addr32 = {4245759915, 32711, 76548816, 32712}}}, sin6_scope_id = 276174472}, sas = {ss_family = 44520, __ss_padding = "\f8\311\177\000\000\253'\021\375\307\177\000\000\320\n\220\004\310\177\000\000\210\026v\020[U\000\000\210\026v\020\001\000\000\000\000\215s\306\374\177\000\000s\321^\365\307\177\000\000\000\000\000\000\000\000\000\000,\215s\306\374\177\000\000\200'\f8\311\177\000\000.\000\000\000\307\177\000\000\004\000\000\000\002", '\000' <repeats 11 times>, "\060\215s\306\374\177\000\000\210\026v\020[U\000", __ss_align = 0}}, id = 1212490240, send_flags = {f = 32713, blst_imask = 0}, proto = 51 '3', proto_pad0 = -104 '\230', proto_pad1 = 4218}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7fc937c05468
        len = 0
        user = 0
        uri = {user = {s = 0x555b10d24db0 "UTC", len = 938506384}, passwd = {s = 0x7fc937deb068 "\360\036\361\067\311\177", len = -49207158}, host = {s = 0x7ffcc6738d30 "\373\377\377\377\374\177", len = 0}, port = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, params = {s = 0x2e <error: Cannot access memory at address 0x2e>, len = 1212490383}, sip_params = {s = 0x0, len = 48}, headers = {s = 0x7ffcc6738c60 "\250I\301\067\311\177", len = -965506176}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (unknown: 76548816), transport = {s = 0x555b107a9833 "INFO", len = 0}, ttl = {s = 0x7fc7fd11288a "", len = 935534040}, user_param = {s = 0x7ffcc6738be0 " \214s\306\374\177", len = -178372384}, maddr = {s = 0x7fc7ffffffff "", len = 76548816}, method = {s = 0x555b10761688 "", len = 276174472}, lr = {s = 0x7ffcc6738c20 "P\214s\306\374\177", len = -178335373}, r2 = {s = 0x7ffcc6738c20 "P\214s\306\374\177", len = -965505972}, gr = {s = 0x4c6738ce8 <error: Cannot access memory at address 0x4c6738ce8>, len = -49207385}, transport_val = {s = 0x77748ac400000004 <error: Cannot access memory at address 0x77748ac400000004>, len = 0}, ttl_val = {s = 0x7ffcc6738c50 ".", len = 274214092}, user_param_val = {s = 0x4c6738ce8 <error: Cannot access memory at address 0x4c6738ce8>, len = -49236417}, maddr_val = {s = 0x7fc7fd11288a "", len = -49207158}, method_val = {s = 0x2e <error: Cannot access memory at address 0x2e>, len = 940320640}, lr_val = {s = 0x7fc937c149a8 "\341\236\377\373\307\177", len = 6}, r2_val = {s = 0x7fc937c31dd8 "LPB41KT ", len = 940320640}, gr_val = {s = 0x88c6738cc0 <error: Cannot access memory at address 0x88c6738cc0>, len = 0}}
        next_hop = {user = {s = 0x7fc9484cfa0b "%H:%M:%S", len = 24}, passwd = {s = 0x7ffcc6738a70 "3\230z\020[U", len = 282777392}, host = {s = 0x555b10dad720 "", len = 1215316096}, port = {s = 0x7fc948707b00 <main_arena> "", len = 8208}, params = {s = 0x79 <error: Cannot access memory at address 0x79>, len = 1212061465}, sip_params = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1212034094}, headers = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 282761040}, port_no = 35472, proto = 50803, type = 32764, flags = (unknown: 1215316096), transport = {s = 0x555b00000001 <error: Cannot access memory at address 0x555b00000001>, len = 282761040}, ttl = {s = 0x0, len = 1215316096}, user_param = {s = 0x555b10da9750 "X{pH\311\177", len = 1}, maddr = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 11}, method = {s = 0x555b10da9750 "X{pH\311\177", len = -965506200}, lr = {s = 0x15 <error: Cannot access memory at address 0x15>, len = 1212489561}, r2 = {s = 0x555b107a9833 "INFO", len = -49206466}, gr = {s = 0x7ffcc6738bf0 " \214s\306\374\177", len = 1652854916}, transport_val = {s = 0x555b10dad730 "<142>May 18 06:21:56 /root/mykamailio/sbin/kamailio[67117]: INFO: LPB41KT [d94ad953] RELAY: Relaying to 10.64.1.44 (ru)\n", len = 120}, ttl_val = {s = 0x0, len = 276598612}, user_param_val = {s = 0x7fc937f08840 "\031", len = -965505768}, maddr_val = {s = 0x7fc9380cade8 "\373E\001", len = 276174472}, method_val = {s = 0x0, len = 1212490240}, lr_val = {s = 0x1500000038 <error: Cannot access memory at address 0x1500000038>, len = 6}, r2_val = {s = 0x7a00000004 <error: Cannot access memory at address 0x7a00000004>, len = 3}, gr_val = {s = 0x0, len = 0}}
        u = 0x0
        port = 0
        dst_host = 0x7fc804900c10
        i = 934727696
        flags = 32713
        avp = 0x7ffcc6738ec0
        st = {flags = 282785584, id = 21851, name = {n = 1215331072, s = {s = 0x7fc948707b00 <main_arena> "", len = 0}, re = 0x7fc948707b00 <main_arena>}, avp = 0x90}
        sct = 0x555b107a9833
        sjt = 0x7fc948452200 <__syslog>
        rve = 0x7ffcc6738ec0
        mct = 0x0
        rv = 0x555b10dad720
        rv1 = 0x7fc937b6d010
        c1 = {cache_type = 1215326240, val_type = 32713, c = {avp_val = {n = 8, s = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, re = 0x8}, pval = {rs = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, ri = 1212272350, flags = 32713}}, i2s = "3\230z67117\373\037", '\000' <repeats 11 times>}
        s = {s = 0x555b10dad73c "06:21:56 /root/mykamailio/sbin/kamailio[67117]: INFO: LPB41KT [d94ad953] RELAY: Relaying to 10.64.1.44 (ru)\n", len = 1213011858}
        srevp = {0x7fc937f161a0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6738900, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#14 0x0000555b1040c449 in run_actions (h=0x7ffcc67390b0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f161a0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 939040248, tz_dsttime = 32713}
        tdiff = 960495616
        __func__ = "run_actions"
#15 0x0000555b1040caf6 in run_actions_safe (h=0x7ffcc673b6d0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {93849606559368, 8478727960045658726, 0, 140502477644288, 93849606854707, 5255462912, 8478727960666415718, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {140723637949416, 0, 0, 140502204241990, 93849606559368, 0, 140502477644288, 93849606854707, 5255462912, 140723637949120, 93849602810890, 7624429984, 140497046735760, 140723637948832, 140496791814368, 140502203705832}}}}}
        ret = -965504028
        ign_on_break = 0
#16 0x0000555b103c9569 in rval_get_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, i=0x7ffcc6739558, rv=0x7fc937f162f8, cache=0x0) at core/rvalue.c:915
        r_avp = 0x7fc93807dfe0
        avp_val = {n = 1, s = {s = 0x7ffc00000001 <error: Cannot access memory at address 0x7ffc00000001>, len = -97950189}, re = 0x7ffc00000001}
        pval = {rs = {s = 0x7fc937f0ffc8 "Y\377\360\067\311\177", len = 940355048}, ri = 0, flags = 0}
        tmp = {s = 0x7fc7fa2d2866 "rtpengine", len = -965504064}
        s = 0x0
        r = 32711
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#17 0x0000555b103ce40a in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc6739558, rve=0x7fc937f162f0) at core/rvalue.c:1913
        i1 = 1
        i2 = 0
        ret = -1
        c1 = {cache_type = 940355048, val_type = 32713, c = {avp_val = {n = 938570632, s = {s = 0x7fc937f17388 "\232\a", len = 935352296}, re = 0x7fc937f17388}, pval = {rs = {s = 0x7fc937f17388 "\232\a", len = 935352296}, ri = -97805992, flags = 14}}, i2s = "p\225s\306\374\177\000\000\341S^\365\307\177\000\000\000\000\000\000\001"}
        c2 = {cache_type = 276469811, val_type = 21851, c = {avp_val = {n = 960495616, s = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965504000}, re = 0x139400000}, pval = {rs = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965504000}, ri = 272425654, flags = 21851}}, i2s = "\020\224s\306\374\177\000\000\000\000\000\000\000\000\000\000h\000\361\067\311\177"}
        rv1 = 0x7fc948452200 <__syslog>
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#18 0x0000555b103ce84f in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc6739a8c, rve=0x7fc937f16a20) at core/rvalue.c:1921
        i1 = 1212490240
        i2 = 0
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = -176175080, s = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, re = 0x7fc7f57fc818 <_dbg_action_list+344>}, pval = {rs = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, ri = 938570632, flags = 32713}}, i2s = "`\226s\306\374\177\000\000\000\000\000\000\000\000\000\000p\225s\306\374\177"}
        c2 = {cache_type = 4197187347, val_type = 32711, c = {avp_val = {n = 940355048, s = {s = 0x7fc9380cade8 "\373E\001", len = -49207381}, re = 0x7fc9380cade8}, pval = {rs = {s = 0x7fc9380cade8 "\373E\001", len = -49207381}, ri = 76548816, flags = 32712}}, i2s = "\210\026v\020[U\000\000\210\026v\020\001\000\000\000@\225s\306\374\177"}
        rv1 = 0x7fc93802a510
        rv2 = 0x100000011
        __func__ = "rval_expr_eval_int"
#19 0x0000555b103fdf6e in do_action (h=0x7ffcc673b6d0, a=0x7fc937f17388, msg=0x7fc9380cade8) at core/action.c:1052
        ret = -5
        v = 0
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "@9\001\000\000\000\060\232s\306\374\177\000"}, sin = {sin_family = 0, sin_port = 14656, sin_addr = {s_addr = 1}, sin_zero = "0\232s\306\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 14656, sin6_flowinfo = 1, sin6_addr = {__in6_u = {__u6_addr8 = "0\232s\306\374\177\000\000\214\242\260\375\307\177\000", __u6_addr16 = {39472, 50803, 32764, 0, 41612, 64944, 32711, 0}, __u6_addr32 = {3329464880, 32764, 4256211596, 32711}}}, sin6_scope_id = 3329465008}, sas = {ss_family = 0, __ss_padding = "@9\001\000\000\000\060\232s\306\374\177\000\000\214\242\260\375\307\177\000\000\260\232s\306\374\177", '\000' <repeats 18 times>, "\350\255\f8\311\177\000\000\340\240s\306\374\177\000\000\262\344?\020[U\000\000\000\000\000\000\000\000\000\000\340ֶ7\000\000\000\000`\233s\306\374\177\000\000\350\255\f8\311\177\000\000\060/\305\067\311\177\000\000\240\242s\306\374\177\000", __ss_align = 140723637953056}}, id = -965500576, send_flags = {f = 32764, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -32 '\340', proto_pad1 = 18545}
        tmp = 0x7fc937c74ab8 "\002"
        new_uri = 0x7fc937c48800 "\001"
        end = 0xfe380cade8 <error: Cannot access memory at address 0xfe380cade8>
        crt = 0x7fc937c74b50 "\001"
        cmd = 0x7fc937c057e8
        len = 32711
        user = -178367519
        uri = {user = {s = 0x7ffcc67398b0 "\340\230s\306\374\177", len = -178335373}, passwd = {s = 0x555b107a9833 "INFO", len = -965502756}, host = {s = 0x2c67398c0 <error: Cannot access memory at address 0x2c67398c0>, len = -38215845}, port = {s = 0x7af200000012 <error: Cannot access memory at address 0x7af200000012>, len = 0}, params = {s = 0x7ffcc67398e0 "\200\231s\306\374\177", len = 274214092}, sip_params = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 233806760}, headers = {s = 0x555b107a9833 "INFO", len = 960495616}, port_no = 39296, proto = 50803, type = 32764, flags = (unknown: 4256166576), transport = {s = 0x37c6f930 <error: Cannot access memory at address 0x37c6f930>, len = 940355048}, ttl = {s = 0x7ffcc673a010 "\346\017MH\311\177", len = 80}, user_param = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1211905118}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x7ffcc6739980 "\300\231s\306\374\177", len = 233806728}, r2 = {s = 0x0, len = 276174472}, gr = {s = 0x0, len = 1212490240}, transport_val = {s = 0x555b107a9833 "INFO", len = 960495616}, ttl_val = {s = 0x7ffcc67399c0 "", len = -38799735}, user_param_val = {s = 0x7ffcc673a020 "\001\200\255", <incomplete sequence \373>, len = 0}, maddr_val = {s = 0x0, len = 940355048}, method_val = {s = 0x7fc9380cade8 "\373E\001", len = 935669552}, lr_val = {s = 0x7ffcc6739a00 "0\232s\306\374\177", len = -38755968}, r2_val = {s = 0x555b00000000 <error: Cannot access memory at address 0x555b00000000>, len = 940355048}, gr_val = {s = 0x0, len = 1212490240}}
        next_hop = {user = {s = 0x7ffcc6739800 "\340\230s\306\374\177", len = -39278603}, passwd = {s = 0x0, len = 0}, host = {s = 0x44c67397d0 <error: Cannot access memory at address 0x44c67397d0>, len = 935764248}, port = {s = 0x7ffcc6739864 "[U", len = 940355048}, params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549264}, sip_params = {s = 0x555b107a9833 "INFO", len = 960495616}, headers = {s = 0x1c6739790 <error: Cannot access memory at address 0x1c6739790>, len = 76549264}, port_no = 38800, proto = 50803, type = 32764, flags = (unknown: 4116594912), transport = {s = 0x7fc7fdb7d7fa "", len = 76549264}, ttl = {s = 0x555b10761688 "", len = 276174472}, user_param = {s = 0x7ffcc67397d0 "", len = -178335373}, maddr = {s = 0x7fc7fdecbe08 "\030x<\016\310\177", len = -965502980}, method = {s = 0x23807a9a8 <error: Cannot access memory at address 0x23807a9a8>, len = -38283272}, lr = {s = 0x7af200000012 <error: Cannot access memory at address 0x7af200000012>, len = 0}, r2 = {s = 0x7ffcc6739800 "\340\230s\306\374\177", len = 274214092}, gr = {s = 0x2c6739800 <error: Cannot access memory at address 0x2c6739800>, len = -38283272}, transport_val = {s = 0x555b107a9833 "INFO", len = 233806760}, ttl_val = {s = 0x7ffcc67398e0 "\200\231s\306\374\177", len = -39258348}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549264}, maddr_val = {s = 0x7fc937c7e4a0 "0\344\307\067\311\177", len = -178324551}, method_val = {s = 0x1c6739870 <error: Cannot access memory at address 0x1c6739870>, len = 76549264}, lr_val = {s = 0x7ffcc6739870 "\260\230s\306\374\177", len = -178372384}, r2_val = {s = 0x7fc7fdb8df5d "", len = 76549264}, gr_val = {s = 0x555b10761688 "", len = 276174472}}
        u = 0x7ffcc6739db0
        port = 0
        dst_host = 0x7ffcc6739fe0
        i = 38
        flags = 32711
        avp = 0x555b107a9833
        st = {flags = 3329464048, id = 32764, name = {n = 274214092, s = {s = 0x555b10582ccc <get_debug_level+74> "\205\300u\005\213E\374\353\036\213\005\231\264K", len = 935457704}, re = 0x555b10582ccc <get_debug_level+74>}, avp = 0x7fc7fdb7d7f8}
        sct = 0x0
        sjt = 0x0
        rve = 0x7fc937f16a20
        mct = 0x0
        rv = 0x0
        rv1 = 0x7fc937c53eb0
        c1 = {cache_type = 3329464000, val_type = 32764, c = {avp_val = {n = -178335373, s = {s = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416> "\307\005G\001!", len = 279200042}, re = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416>}, pval = {rs = {s = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416> "\307\005G\001!", len = 279200042}, ri = -965503252, flags = 32764}}, i2s = "P\227s\306\002\000\000\000\370\327\267\375\307\177\000\000\022\000\000\000\362z"}
        s = {s = 0x555b10761688 "", len = 276174472}
        srevp = {0x7fc937f17388, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739660, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#20 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937f0fca0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f17388
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935673520, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#21 0x0000555b103fa952 in do_action (h=0x7ffcc673b6d0, a=0x7fc937c53eb0, msg=0x7fc9380cade8) at core/action.c:700
        ret = -5
        v = 32713
        dst = {send_sock = 0x100000000, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000v\000\000\000\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "v\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "v\000\000\000\000\000\000\000\210\026v\020[U\000", __u6_addr16 = {118, 0, 0, 0, 5768, 4214, 21851, 0}, __u6_addr32 = {118, 0, 276174472, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000v\000\000\000\000\000\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000\200\243s\306\374\177\000\000\366\312@\020[U\000\000\000{pH\311\177\000\000\350\255\f8\311\177\000\000\060/\305\067\311\177\000\000жs\306\374\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\311\177\000", __ss_align = 93849606559368}}, id = 676438630, send_flags = {f = 32296, blst_imask = 30122}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x1500000038 <error: Cannot access memory at address 0x1500000038>
        end = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>
        crt = 0x555b107a9833 "INFO"
        cmd = 0x7fc937c73b70
        len = 32711
        user = -178367519
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 276174472}, passwd = {s = 0x0, len = 1212490240}, host = {s = 0x555b107a9833 "INFO", len = 960495616}, port = {s = 0x7ffcc673a270 "\200\243s\306\374\177", len = 272680009}, params = {s = 0x6c673a130 <error: Cannot access memory at address 0x6c673a130>, len = 8180}, sip_params = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 276174472}, headers = {s = 0x7ffcc673a3a0 "8", len = 940355048}, port_no = 12080, proto = 14277, type = 32713, flags = (unknown: 3329467040), transport = {s = 0x555b10d24db0 "UTC", len = -965500544}, ttl = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 0}, user_param = {s = 0x7ffcc673a220 "0\367\332\020[U", len = -965500576}, maddr = {s = 0x10000043b <error: Cannot access memory at address 0x10000043b>, len = 67667272}, method = {s = 0x3635c673a236 <error: Cannot access memory at address 0x3635c673a236>, len = -965500356}, lr = {s = 0x7ffcc673a238 "", len = -965500356}, r2 = {s = 0x0, len = 67667272}, gr = {s = 0x2700000000 <error: Cannot access memory at address 0x2700000000>, len = -41657984}, transport_val = {s = 0x7fc9380caff0 "\n\247\277\062", len = 10}, ttl_val = {s = 0xd00000003 <error: Cannot access memory at address 0xd00000003>, len = 282777404}, user_param_val = {s = 0x555b10dad73c "06:21:56 /root/mykamailio/sbin/kamailio[67117]: INFO: LPB41KT [d94ad953] RELAY: Relaying to 10.64.1.44 (ru)\n", len = 1213011858}, maddr_val = {s = 0x7fc948706820 <_nl_C_locobj> " GpH\311\177", len = 8}, method_val = {s = 0x0, len = 1212272350}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x555b10daf730 "", len = 1215331072}}
        next_hop = {user = {s = 0x68f5145700000017 <error: Cannot access memory at address 0x68f5145700000017>, len = 0}, passwd = {s = 0x7ffcc6739f70 "P\240s\306\374\177", len = 274214092}, host = {s = 0x6c673a1a0 <error: Cannot access memory at address 0x6c673a1a0>, len = -107129541}, port = {s = 0x7ffcc673a1c0 "\003", len = 67667272}, params = {s = 0x7ffcc673a050 "\313\320\323\020[U", len = -107759048}, sip_params = {s = 0x7ffcc6739fb0 "\300\241s\306\374\177", len = 274214092}, headers = {s = 0x6c673a1e0 <error: Cannot access memory at address 0x6c673a1e0>, len = -965500516}, port_no = 41376, proto = 50803, type = 32764, flags = (unknown: 3329466800), transport = {s = 0x7ffcc673a1c0 "\003", len = 0}, ttl = {s = 0x7fc937c05e40 "k\345\270\375\307\177", len = 940355048}, user_param = {s = 0x555b1076c64b "core", len = -965500452}, maddr = {s = 0x7ffcc673a020 "\001\200\255", <incomplete sequence \373>, len = 282317003}, method = {s = 0x7ffcc673a148 "", len = 282317003}, lr = {s = 0x7ffcc673a428 "\350@\305\067\311\177", len = -965500000}, r2 = {s = 0x7fc9484d0fe6 "%hu%n:%hu%n:%hu%n", len = 1211988903}, gr = {s = 0xfbad8001 <error: Cannot access memory at address 0xfbad8001>, len = 282317004}, transport_val = {s = 0x555b10d3d0cc "", len = 282317003}, ttl_val = {s = 0x555b10d3d0cb "0", len = 282317003}, user_param_val = {s = 0x555b10d3d0cb "0", len = 282317003}, maddr_val = {s = 0x555b10d3d0cc "", len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x10761688 <error: Cannot access memory at address 0x10761688>, len = 276174472}, gr_val = {s = 0x7ffcc6730000 "", len = 0}}
        u = 0x7ffcc673a5f0
        port = 0
        dst_host = 0x555b107a9833
        i = 29
        flags = 32711
        avp = 0x7ffcc673a520
        st = {flags = 3329466176, id = 32764, name = {n = -178335373, s = {s = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416> "\307\005G\001!", len = 1}, re = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416>}, avp = 0x7ffcc6739f6c}
        sct = 0x555b10da9750
        sjt = 0xb
        rve = 0x7fc9380c0030
        mct = 0xffffffff
        rv = 0x110761688
        rv1 = 0x7fc937c540e8
        c1 = {cache_type = 3329466112, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, ri = -965499840, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = 274517235}
        srevp = {0x7fc937c53eb0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739ea0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#22 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c53080, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c53eb0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935674088, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#23 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937c540e8, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x100000000, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\367\000\000\000\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\367\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\367\000\000\000\000\000\000\000\210\026v\020[U\000", __u6_addr16 = {247, 0, 0, 0, 5768, 4214, 21851, 0}, __u6_addr32 = {247, 0, 276174472, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\367\000\000\000\000\000\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000\300\253s\306\374\177\000\000\366\312@\020[U\000\000\000{pH\311\177\000\000\350\255\f8\311\177\000\000\300!\305\067\311\177\000\000жs\306\374\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\311\177\000", __ss_align = 93849606559368}}, id = 970039910, send_flags = {f = 32296, blst_imask = 30122}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x1500000038 <error: Cannot access memory at address 0x1500000038>
        end = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>
        crt = 0x555b107a982c "NOTICE"
        cmd = 0x7fc937c10c18
        len = 32711
        user = -178367519
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 276174472}, passwd = {s = 0x0, len = 1212490240}, host = {s = 0x555b107a9833 "INFO", len = 960495616}, port = {s = 0x7ffcc673aab0 "\300\253s\306\374\177", len = 272680009}, params = {s = 0x6c673a970 <error: Cannot access memory at address 0x6c673a970>, len = 8180}, sip_params = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 276174472}, headers = {s = 0x7ffcc673abe0 "8", len = 940355048}, port_no = 8640, proto = 14277, type = 32713, flags = (unknown: 3329469152), transport = {s = 0x555b10d24db0 "UTC", len = -965498432}, ttl = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = -965497688}, user_param = {s = 0x7ffcc673aa60 "0\367\332\020[U", len = -965498464}, maddr = {s = 0x7fc937f0f368 "", len = 940355048}, method = {s = 0x3635c673aa76 <error: Cannot access memory at address 0x3635c673aa76>, len = -965498244}, lr = {s = 0x7ffcc673aa78 "", len = -965498244}, r2 = {s = 0x7fc937f95ab8 "\001", len = -965497744}, gr = {s = 0x2737f0f368 <error: Cannot access memory at address 0x2737f0f368>, len = 276174472}, transport_val = {s = 0x0, len = 1212490240}, ttl_val = {s = 0x555b107a9833 "INFO", len = 960495616}, user_param_val = {s = 0x7ffcc673ab80 "\360\254s\306\374\177", len = 272427137}, maddr_val = {s = 0x7fc948706820 <_nl_C_locobj> " GpH\311\177", len = 8}, method_val = {s = 0x0, len = 1212272350}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x555b10daf730 "", len = 1215331072}}
        next_hop = {user = {s = 0x7ffcc673a8a0 "\020\252s\306\374\177", len = 272406603}, passwd = {s = 0x7ffcc673a7b0 "\350\255\f8\311\177", len = 274214092}, host = {s = 0x6c673a9e0 <error: Cannot access memory at address 0x6c673a9e0>, len = 0}, port = {s = 0x7fc937c4d3f8 "\a", len = -965498056}, params = {s = 0x7fc9380cade8 "\373E\001", len = -965495088}, sip_params = {s = 0x4c673a820 <error: Cannot access memory at address 0x4c673a820>, len = 276653360}, headers = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = -965498404}, port_no = 43488, proto = 50803, type = 32764, flags = (unknown: 3329468912), transport = {s = 0x7ffcc673aa00 "3\230z\020[U", len = 0}, ttl = {s = 0x7fc937c149a8 "\341\236\377\373\307\177", len = 940355048}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 282317003}, method = {s = 0x7ffcc673a988 "\250\254s\306\374\177", len = 282317003}, lr = {s = 0x7ffcc673ac68 "\300E\305\067\311\177", len = -965497888}, r2 = {s = 0x7fc9484d0fe6 "%hu%n:%hu%n:%hu%n", len = 1211988903}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x555b10d3d0cc "", len = 276174472}, ttl_val = {s = 0x0, len = 1212490240}, user_param_val = {s = 0x555b107a9833 "INFO", len = 960495616}, maddr_val = {s = 0x7ffcc673aa10 "\200\253s\306\374\177", len = 272425994}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x7fc937c4d3f0 "\001", len = -965498056}, gr_val = {s = 0x7fc9380cade8 "\373E\001", len = -965495088}}
        u = 0x7ffcc673ae30
        port = 0
        dst_host = 0x555b107a982c
        i = -965497728
        flags = 32764
        avp = 0x7ffcc673ad60
        st = {flags = 3329468288, id = 32764, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x555b105cf57c <pv_value_destroy+175>}
        sct = 0x555b10da9750
        sjt = 0xb
        rve = 0x7fc937c53698
        mct = 0xffffffff
        rv = 0x10761688
        rv1 = 0x7fc937c545c0
        c1 = {cache_type = 3329468224, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, ri = -965497728, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = 76549136}
        srevp = {0x7fc937c540e8, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673a6e0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#24 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c52c10, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c540e8
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935675328, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#25 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937c545c0, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "@9\001\000\000\000\200\264s\306\374\177\000"}, sin = {sin_family = 0, sin_port = 14656, sin_addr = {s_addr = 1}, sin_zero = "\200\264s\306\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 14656, sin6_flowinfo = 1, sin6_addr = {__in6_u = {__u6_addr8 = "\200\264s\306\374\177\000\000\374:i\020[U\000", __u6_addr16 = {46208, 50803, 32764, 0, 15100, 4201, 21851, 0}, __u6_addr32 = {3329471616, 32764, 275331836, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "@9\001\000\000\000\200\264s\306\374\177\000\000\374:i\020[U\000\000\000\000\000\000\000\000\000\000\250\251\a8\311\177\000\000AA\244\020[U\000\000\062@\244\020[U\000\000 \263s\306\374\177\000\000\020ж7\311\177\000\000`\263s\306\374\177\000\000\335G\215\374\307\177\000\000\360\360\360\360", '\000' <repeats 14 times>, "\200\020\000\000\000\000\220>+\020\000\000\000", __ss_align = 4195464}}, id = 5554544, send_flags = {f = 0, blst_imask = 0}, proto = -64 '\300', proto_pad0 = 119 'w', proto_pad1 = 1285}
        tmp = 0x7fc804900c10 ""
        new_uri = 0x7fc937f9daf8 "\002"
        end = 0x555b106d4545 <parse_method_name+2608> "\205\300\017\224\300\017\266\300H\205\300\017\204\261\003"
        crt = 0x1c673b510 <error: Cannot access memory at address 0x1c673b510>
        cmd = 0x7fc937c10c50
        len = 0
        user = 939121360
        uri = {user = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -965496436}, passwd = {s = 0x4c673b1a0 <error: Cannot access memory at address 0x4c673b1a0>, len = 276653360}, host = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, port = {s = 0x7ffcc673b190 "\300\262s\306\374\177", len = 274214092}, params = {s = 0x4004004f8 <error: Cannot access memory at address 0x4004004f8>, len = 276653360}, sip_params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, headers = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275281682}, port_no = 45520, proto = 50803, type = 32764, flags = (URI_SIP_USER_PHONE | unknown: 273118464), transport = {s = 0x0, len = 276598612}, ttl = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275030558}, user_param = {s = 0x7fc93807a9a8 "\001", len = 940025184}, maddr = {s = 0x7ffcc673b342 "\005\005", len = -965495997}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x555b107d6d88 <__func__.6797> "parse_via", len = 276659112}, r2 = {s = 0x1c673b250 <error: Cannot access memory at address 0x1c673b250>, len = 76549136}, gr = {s = 0x7ffcc673b250 "\220\262s\306\374\177", len = -178372384}, transport_val = {s = 0x555b107d6534 "", len = 76549136}, ttl_val = {s = 0x555b10761688 "", len = 276174472}, user_param_val = {s = 0x7ffcc673b290 "\300\262s\306\374\177", len = -178335373}, maddr_val = {s = 0x0, len = -965496132}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}, lr_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, r2_val = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 274214092}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}}
        next_hop = {user = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 2}, passwd = {s = 0x7fc93807a9a8 "\001", len = 0}, host = {s = 0x7fc93807ecc8 "\001", len = 939039512}, port = {s = 0x7a <error: Cannot access memory at address 0x7a>, len = 940043464}, params = {s = 0x0, len = 940026872}, sip_params = {s = 0x7fc937f89cd0 "\004", len = 939039512}, headers = {s = 0x7fc937f73958 "\003", len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x1c673b120 <error: Cannot access memory at address 0x1c673b120>, len = 76549136}, method_val = {s = 0x7ffcc673b120 "`\261s\306\374\177", len = -178372384}, lr_val = {s = 0x555b107d6534 "", len = 76549136}, r2_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 16}, gr_val = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -178335373}}
        u = 0x555b107df530 <__func__.6625>
        port = 0
        dst_host = 0x555b10761688
        i = 2
        flags = 21851
        avp = 0x1
        st = {flags = 65537, id = 45, name = {n = 279199744, s = {s = 0x555b10a44000 <buf> "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"..., len = 6}, re = 0x555b10a44000 <buf>}, avp = 0x555b10a44007 <buf+7>}
        sct = 0x7ffcc673b480
        sjt = 0x7fc804900c10
        rve = 0x7fc937c523f8
        mct = 0x1
        rv = 0x0
        rv1 = 0x555b10a44118 <buf+280>
        c1 = {cache_type = 279644096, val_type = 21851, c = {avp_val = {n = -965496932, s = {s = 0x7ffcc673af9c "[U", len = 279644080}, re = 0x7ffcc673af9c}, pval = {rs = {s = 0x7ffcc673af9c "[U", len = 279644080}, ri = -38237829, flags = 32711}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x7ffcc673af70 "", len = -178335373}
        srevp = {0x7fc937c545c0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673af20, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#26 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c473c0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c545c0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 276690800, tz_dsttime = 21851}
        tdiff = 4116631923
        __func__ = "run_actions"
#27 0x0000555b1040cbbe in run_top_route (a=0x7fc937c473c0, msg=0x7fc9380cade8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {93849603950067, 4571428513, 140502205509096, 93849606559368, 4571141768, 140723637958544, 140496791851379, 140723637958560, 140723637958588, 18118908696, 93849606846109, 8004010816636452865, 0, 140723637958592, 93849606559368, 0}}}}}
        p = 0x7ffcc673b6d0
        ret = 276469811
        sfbk = 0
#28 0x0000555b1057b6e8 in receive_msg (buf=0x555b10a44000 <buf> "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"..., len=321, rcv_info=0x7ffcc673bd40) at core/receive.c:423
        msg = 0x7fc9380cade8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 15 times>, 1}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x555b10a44000 <buf> "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"..., len = 321}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcc673b8b0, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcc673bd40, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#29 0x0000555b10447d59 in udp_rcv_loop () at core/udp_server.c:543
        len = 321
        buf = "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"...
        tmp = 0x1e <error: Cannot access memory at address 0x1e>
        fromaddr = 0x7fc93807e930
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {851420938, 0}, addr32 = {851420938, 0, 0, 0}, addr16 = {42762, 12991, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277\062", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1019193098, 0}, addr32 = {1019193098, 0, 0, 0}, addr16 = {42762, 15551, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277<", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\247\277\062\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 851420938}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 851420938, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\247\277\062", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fc937bfff30, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "t\027\221\004\310\177\000\000t\027\221\004\001\000\000\000P\273s\306\374\177\000\000s\321^\365\307\177\000\000P\273s\306\374\177\000\000\220\267\331\020[U\000\000@\263\331\020[U\000\000\247\261s\306\374\177\000\000\220\261s\306\374\177\000\000\000\000\000\000\000\000\000\001", '\000' <repeats 20 times>, "\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000\000t\027\221\004\310\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000@\274s\306\374\177\000\000\005\067\346\356\307\177\000\000\177\252y\020[U\000\000\020\f\220\004\v\000\000\000t\027\221\004\310\177\000\000"...
        i = -1
        j = 130560
        l = 0
        __func__ = "udp_rcv_loop"
#30 0x0000555b1038de84 in main_loop () at main.c:1683
        i = 10
        pid = 0
        si = 0x7fc937bfff30
        si_desc = "udp receiver child=10 sock=edge.hipertel.local:5060\000EH\311\177\000\000\000\000\000\000\000\000\000\000\060\000\000\000\060\000\000\000\070\300s\306\374\177\000\000P\277s\306\374\177\000\000\250Nx\020[U\000\000\370\226\r8k\000\000\000\063\230z\020[U\000\000\360\226\n8\311\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#31 0x0000555b10398511 in main (argc=11, argv=0x7ffcc673c568) at main.c:2856
        cfg_stream = 0x555b10bef010
        c = -1
        r = 0
        tmp = 0x7ffcc673deba ""
        tmp_len = 32764
        port = -965491792
        proto = 32713
        ahost = 0x0
        aport = 0
        options = 0x555b10764348 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 900928915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7fc94926d040 <_rtld_global>
        p = 0x7ffcc673de72 "edge"
        st = {st_dev = 19, st_ino = 23307, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1641492636, tv_nsec = 884483965}, st_mtim = {tv_sec = 1599774907, tv_nsec = 42281020}, st_ctim = {tv_sec = 1599774907, tv_nsec = 42281020}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000 \232\004I\311\177\000\000\330\331&I\311\177\000\000\a\000\000\000\000\000\000\000\a\000\000\000\a\000\000\000\070\224\004I\311\177\000\000\060\302s\306\374\177\000\000\215F\005I\311\177\000\000\000\000\000\000\000\000\000\000\272J\005I\311\177", '\000' <repeats 11 times>, "\200\065\020[U", '\000' <repeats 13 times>, "\377\000\000\000\000", '\377' <repeats 11 times>, "\000\377\377\377\377GLIBC_2.2.5\000GLIB\000__f", '\000' <repeats 12 times>, "inite\000getpriorit", '\000' <repeats 136 times>...
        option_index = 0
        long_options = {{name = 0x555b107663d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x555b10761b1c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x555b107663db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x555b107663e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x555b107663e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x555b107663f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x555b107663fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x555b10766404 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x555b1076640f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x555b10766418 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x555b10766423 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007fc7fdacd78d in futex_get (lock=0x7fc80def9dd0) at ../../core/parser/../mem/../futexlock.h:121
        v = 1
        i = 0
#2  0x00007fc7fdacf75b in _lock (s=0x7fc80def9dd0) at lock.h:77
No locals.
#3  0x00007fc7fdaf2da7 in tm_reply_mutex_lock (t=0x7fc80def9b88) at t_reply.c:3063
        mypid = 67117
#4  0x00007fc7fdad8868 in _reply_light (trans=0x7fc80def9b88, buf=0x7fc937f956a0 "SIP/2.0 487 Request canceled\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nVia: SIP/2.0/UDP 191.0.0.1;branch=z9hG4bKsr-j4IPOlV7MGQKatycM.y7M.3wOBFsMmZ4Wx1LNSQL"..., len=536, code=487, to_tag=0x7fc7fddc04e0 <tm_tags> "fc3d4179ffdbaeed3a8b1e97891311fe-1e620000", to_tag_len=41, lock=1, bm=0x7ffcc6738150) at t_reply.c:480
        rb = 0x0
        buf_len = 4294967295
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}}
        onsend_params = {req = 0x7ffcc67380d0, rpl = 0x7fc7fddc0509, param = 0x0, code = 0, flags = 0, branch = 0, t_rbuf = 0xc6738070, dst = 0x0, send_buf = {s = 0x7fc700000000 <error: Cannot access memory at address 0x7fc700000000>, len = 76549264}}
        rt = 0
        backup_rt = 0
        ctx = {rec_lev = 279641888, run_flags = 21851, last_retcode = -965509168, jmp_env = {{__jmpbuf = {140723637944432, 300647710721, 0, 140502204241512, 93849606854707, 140502199881744, 140723637944240, 93849606559368}, __mask_was_saved = 0, __saved_mask = {__val = {140502477644288, 93849606854707, 5255462912, 140723637944592, 93849604452410, 140723637944656, 140723637944684, 140496957832080, 140496934186848, 140723637944752, 2094978531368, 0, 562949953421312, 140723637944496, 93849603943132, 1}}}}}
        bctx = 0x0
        pmsg = {id = 276469811, pid = 21851, tval = {tv_sec = 5255462912, tv_usec = 140723637942864}, fwd_send_flags = {f = 53068, blst_imask = 64948}, rpl_send_flags = {f = 32711, blst_imask = 0}, first_line = {type = 30992, flags = -14733, len = 32764, u = {request = {method = {s = 0x555b1040c449 <run_actions+2110> "\211E\304H\307\005\361gc", len = -965510872}, uri = {s = 0x30d00000000 <error: Cannot access memory at address 0x30d00000000>, len = 238842400}, version = {s = 0x7fc80e3c1d60 "", len = 32816}, method_value = 940355048}, reply = {version = {s = 0x555b1040c449 <run_actions+2110> "\211E\304H\307\005\361gc", len = -965510872}, status = {s = 0x30d00000000 <error: Cannot access memory at address 0x30d00000000>, len = 238842400}, reason = {s = 0x7fc80e3c1d60 "", len = 32816}, statuscode = 940355048}}}, via1 = 0x7fc937ffeb68, via2 = 0x7ffcc6737990, headers = 0x0, last_header = 0x488, parsed_flag = 7624423456, h_via1 = 0x7fc804900c10, h_via2 = 0x7ffcc6737820, callid = 0x7fc7f55e40e0 <futex_release+29>, to = 0x555b107ee6db, cseq = 0x7fc804900c10, from = 0x0, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0x0, authorization = 0x0, expires = 0x0, proxy_auth = 0x7fc800000000, supported = 0x0, require = 0x0, proxy_require = 0x7ffcc67378b0, unsupported = 0xf55ed173, allow = 0x510a4400b, event = 0x7fc9380cade8, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x7ffcc67378f0, user_agent = 0x0, server = 0x0, content_disposition = 0x0, diversion = 0x7fc80e3c1d60, rpid = 0x0, refer_to = 0x800000000, session_expires = 0x7fc80e3c1d30, min_se = 0x7fc937f950d0, sipifmatch = 0x30d, subscription_state = 0x0, date = 0x7fc80e3c1d60, identity = 0x7fc937f950d0, identity_info = 0x555b0000030d, pai = 0x30d00000000, ppi = 0x7fc80e3c7220, path = 0x7fc80e3c1d60, privacy = 0x7fc9380cade8, min_expires = 0x1, body = 0x7fc9380cb490, eoh = 0x2 <error: Cannot access memory at address 0x2>, unparsed = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, rcv = {src_ip = {af = 276469811, len = 1, u = {addrl = {140496934516032, 140723637942688}, addr32 = {4259296576, 32711, 3329456544, 32764}, addr16 = {46400, 64991, 32711, 0, 31136, 50803, 32764, 0}, addr = "@\265\337\375\307\177\000\000\240ys\306\374\177\000"}}, dst_ip = {af = 273077447, len = 21851, u = {addrl = {140497209007408, 140496934516032}, addr32 = {238820656, 32712, 4259296576, 32711}, addr16 = {7472, 3644, 32712, 0, 46400, 64991, 32711, 0}, addr = "0\035<\016\310\177\000\000@\265\337\375\307\177\000"}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 940356752, src_su = {s = {sa_family = 31312, sa_data = "s\306\374\177\000\000\352\037G\020[U\000"}, sin = {sin_family = 31312, sin_port = 50803, sin_addr = {s_addr = 32764}, sin_zero = "\352\037G\020[U\000"}, sin6 = {sin6_family = 31312, sin6_port = 50803, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 = "\352\037G\020[U\000\000\002\000\000\000\000\000\000", __u6_addr16 = {8170, 4167, 21851, 0, 2, 0, 0, 0}, __u6_addr32 = {273096682, 21851, 2, 0}}}, sin6_scope_id = 1212490240}, sas = {ss_family = 31312, __ss_padding = "s\306\374\177\000\000\352\037G\020[U\000\000\002\000\000\000\000\000\000\000\000\"EH\311\177\000\000\063\230z\020\b\000\000\000\060\035<\016\310\177\000\000f\242\221\203)~\252uf\242\321\354N\322\345 ", '\000' <repeats 32 times>, "\340\000\000\000\000\000\000\000\000\020\334\375", '\000' <repeats 11 times>, __ss_align = 0}}, bind_address = 0xc6737b50, proto = -112 '\220', proto_pad0 = -76 '\264', proto_pad1 = 14348}, buf = 0x2 <error: Cannot access memory at address 0x2>, len = 1212490240, new_uri = {s = 0x555b107a9833 "INFO", len = 960495616}, dst_uri = {s = 0x7ffcc6737b00 "\020|s\306\374\177", len = -38377848}, parsed_uri_ok = 279200227, parsed_uri = {user = {s = 0x7fc80e3c1d10 "", len = 238842400}, passwd = {s = 0x7fc80e3c1d10 "", len = 935333888}, host = {s = 0x7fc80e3c7220 "UPDATE sip:03101064233 at 172.17.3.12:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.6.14;branch=z9hG4bK0bc5.1cb4bcee359864991d244f651ff24bf2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK0bc5.2ecdd1653af798851"..., len = 781}, port = {s = 0x7fc9380cade8 "\373E\001", len = 0}, params = {s = 0x7fc9380cb490 "", len = 2}, sip_params = {s = 0x148452200 <error: Cannot access memory at address 0x148452200>, len = 8}, headers = {s = 0x502cc9a074 <error: Cannot access memory at address 0x502cc9a074>, len = -965510192}, port_no = 46224, proto = 14348, type = 32713, flags = URI_SIP_USER_PHONE, transport = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, ttl = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965510128}, user_param = {s = 0x7fc7fdb78d32 <t_send_branch+9771> "\205\300\017\204l\003", len = -965510192}, maddr = {s = 0x7fc7fdb70041 <add_uac+2493> "\017\267Eʃ\300\001\211\302H\213\205x\377\377\377f\211P\032H\203\275P\377\377\377", len = 0}, method = {s = 0x7fc9380cb490 "", len = 0}, lr = {s = 0x7fc9380cade8 "\373E\001", len = 1}, r2 = {s = 0x7fc80e3c1a70 "(\357\366\375\307\177", len = -965510128}, gr = {s = 0x7fc7fdb40ed2 <save_msg_lumps+2722> "\211Eă", <incomplete sequence \304>, len = 940355048}, transport_val = {s = 0x7fc80e3c5be8 "\372E\001", len = 0}, ttl_val = {s = 0x7fc7fdb7d7f8 "tm", len = 279642272}, user_param_val = {s = 0x555b10ab07b8 <def_list+24> "", len = -965510000}, maddr_val = {s = 0x1a70 <error: Cannot access memory at address 0x1a70>, len = 238836712}, method_val = {s = 0x7fc9380cb490 "", len = 2}, lr_val = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, r2_val = {s = 0x555b10420534 <get_branch_data+54> "\213\005\346)b", len = -965510016}, gr_val = {s = 0x7fc80e3c1d00 "", len = -965510128}}, parsed_orig_ruri_ok = 940356752, parsed_orig_ruri = {user = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1212490240}, passwd = {s = 0x555b107a9833 "INFO", len = 960495616}, host = {s = 0x7ffcc6737d70 "\020\177s\306'", len = -38297042}, port = {s = 0xc6737c50 <error: Cannot access memory at address 0xc6737c50>, len = 0}, params = {s = 0x7fc9380cade8 "\373E\001", len = 238819952}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, headers = {s = 0x7fc93807a9a8 "\001", len = 276598617}, port_no = 31904, proto = 50803, type = SIP_URI_T, flags = (unknown: 76549136), transport = {s = 0x7ffcc6737ca0 "\340|s\306\374\177", len = -178372384}, ttl = {s = 0x555b107c8f58 "", len = 76549136}, user_param = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = -252645136}, maddr = {s = 0x7ffcc6737ce0 "\020}s\306\374\177", len = -178335373}, method = {s = 0x8700000000 <error: Cannot access memory at address 0x8700000000>, len = -965509876}, lr = {s = 0x4fdb9d123 <error: Cannot access memory at address 0x4fdb9d123>, len = 276598612}, r2 = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, gr = {s = 0x7ffcc6737d10 "", len = 274214092}, transport_val = {s = 0x403e8c978 <error: Cannot access memory at address 0x403e8c978>, len = 276598612}, ttl_val = {s = 0x7ffcc6737e00 "\377\020z\020[U", len = 275030558}, user_param_val = {s = 0x7ffcc6737e00 "\377\020z\020[U", len = 275030754}, maddr_val = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = -38164549}, method_val = {s = 0x7fc7fdb9d120 "tm", len = 0}, lr_val = {s = 0x7fc7fdb9d238 <__func__.10856> "insert_tmcb", len = -38153949}, r2_val = {s = 0x28 <error: Cannot access memory at address 0x28>, len = -35909632}, gr_val = {s = 0x555b107a9833 "INFO", len = 960495616}}, add_rm = 0x27c6737f10, body_lumps = 0x555b10aaff20 <buff.5856>, reply_lump = 0x7fc7ff437d98, add_to_branch_s = "\000\000\000\000\000\000\000\000\003\000\000\000\r\000\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000`~s\306\374\177\000\000\213\005S\020[U\000\000\001", add_to_branch_len = 0, hash_index = 76549136, msg_flags = 32712, flags = 279641888, xflags = {21851, 4282613136}, set_global_address = {s = 0x1c6737e20 <error: Cannot access memory at address 0x1c6737e20>, len = 76549136}, set_global_port = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, force_send_socket = 0x555b107a10ff, path_vec = {s = 0x555b10653c7e <qm_info+46> "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b", len = -965509552}, instance = {s = 0x7fc937b6d010 "\001", len = -965509552}, reg_id = 934727696, ruid = {s = 0x7ffcc6737e90 "\300~s\306\374\177", len = -57849891}, location_ua = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, otcpid = 276824064, ldv = {flow = {decoded = 271266696, rcv = {src_ip = {af = 4198080, len = 0, u = {addrl = {5557368, 17856448}, addr32 = {5557368, 0, 17856448, 0}, addr16 = {52344, 84, 0, 0, 30656, 272, 0, 0}, addr = "x\314T\000\000\000\000\000\300w\020\001\000\000\000"}}, dst_ip = {af = 8, len = 0, u = {addrl = {65, 0}, addr32 = {65, 0, 0, 0}, addr16 = {65, 0, 0, 0, 0, 0, 0, 0}, addr = "A", '\000' <repeats 14 times>}}, src_port = 32448, dst_port = 50803, proto_reserved1 = 32764, proto_reserved2 = 273118466, src_su = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000T\217|\020\005\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "T\217|\020\005\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "T\217|\020\005\000\000\000\260\177s\306\374\177\000", __u6_addr16 = {36692, 4220, 5, 0, 32688, 50803, 32764, 0}, __u6_addr32 = {276598612, 5, 3329458096, 32764}}}, sin6_scope_id = 275030558}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000T\217|\020\005\000\000\000\260\177s\306\374\177\000\000\036\242d\020\000\000\000\000\260\177s\306\374\177\000\000\230\246d\020[U\000\000\210\026v\020[U\000\000\210\026v\020\001\000\000\000\373\020z\020[U\000\000s\321^\365\263\t\000\000\300Dz\020[U\000\000\261\027z\020[U\000\000 \002\000\000\000\000\000\000\020ж7\311\177\000\000\016\000\000\000n\365\023o", __ss_align = 0}}, bind_address = 0x7ffcc6737f50, proto = -52 '\314', proto_pad0 = 44 ',', proto_pad1 = 4184}}, vdata = 0x4c6737fd0}}
        keng = 0x0
        evname = {s = 0x7fc7fdb8a105 "tm:local-response-sent", len = 22}
        __func__ = "_reply_light"
#5  0x00007fc7fdadaa88 in _reply (trans=0x7fc80def9b88, p_msg=0x7fc7ff437b90, code=487, reason=0x7ffcc67381b0, lock=1) at t_reply.c:692
        len = 536
        buf = 0x7fc937f956a0 "SIP/2.0 487 Request canceled\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nVia: SIP/2.0/UDP 191.0.0.1;branch=z9hG4bKsr-j4IPOlV7MGQKatycM.y7M.3wOBFsMmZ4Wx1LNSQL"...
        dset = 0x110761688 <error: Cannot access memory at address 0x110761688>
        bm = {to_tag_val = {s = 0x7fc937f95820 "fc3d4179ffdbaeed3a8b1e97891311fe-1e620000\r\nCall-ID: hipertelM.MZMBjuMBMsPxFAOBV7W.y7M.c*\r\nCSeq: 20 INVITE\r\nServer: HiperTel v2.15\r\nContent-Length: 0\r\n\r\n", len = 41}}
        dset_len = 32712
#6  0x00007fc7fdae6764 in t_reply (t=0x7fc80def9b88, p_msg=0x7fc7ff437b90, code=487, text=0x7fc7fdba0a2b "Request canceled") at t_reply.c:1717
        reason = {s = 0x7fc7fdba0a2b "Request canceled", len = 16}
#7  0x00007fc7fdb756ee in e2e_cancel (cancel_msg=0x7fc9380cade8, t_cancel=0x7fc80e3c7818, t_invite=0x7fc80def9b88) at t_fwd.c:1315
        cancel_bm = 0
        reason = 0xb27
        free_reason = 32764
        i = -965508272
        lowest_error = 0
        ret = 940025184
        tmcb = {req = 0x101800000000, rpl = 0x7fc7fdb7d7f8, param = 0x555b10ab00a0 <_xavi_list_head>, code = 279644088, flags = 21851, branch = 0, t_rbuf = 0xc6738350, dst = 0x7fc80def9b88, send_buf = {s = 0x7fc80e3cb990 "\373E\001", len = 276174472}}
        __func__ = "e2e_cancel"
#8  0x00007fc7fdb79162 in t_forward_nonack (t=0x7fc80e3c7818, p_msg=0x7fc9380cade8, proxy=0x0, proto=0) at t_fwd.c:1647
        branch_ret = 0
        lowest_ret = 1
        added_branches = 1213011861
        first_branch = 0
        i = 32764
        t_invite = 0x7fc80def9b88
        success_branch = -965506688
        try_new = 21851
        lock_replies = 273118466
        backup_bflags = 0
        obranch = {uri = {s = 0x555b107a9833 "INFO", len = 960495616}, dst_uri = {s = 0x7ffcc6738430 "\260\205s\306\374\177", len = -39223825}, q = -965508160, path = {s = 0x7fc7fc8d47dd <pkg_proc_update_stats+115> "H\213\r\034[ ", len = -252645136}, flags = 0, force_socket = 0x10800000, ruid = {s = 0x7fc9380cade8 "\373E\001", len = 4198584}, instance = {s = 0x54ce70 <error: Cannot access memory at address 0x54ce70>, len = 17856448}, location_ua = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 65}, otcpid = 0}
        __func__ = "t_forward_nonack"
#9  0x00007fc7fdb7a6b3 in t_forward_cancel (p_msg=0x7fc9380cade8, proxy=0x0, proto=0, tran=0x7ffcc67386f0) at t_fwd.c:1853
        t_invite = 0x7fc70000000e
        t = 0x7fc80e3c7818
        ret = 32713
        new_tran = 1
        dst = {send_sock = 0xd68, to = {s = {sa_family = 64441, sa_data = "^\365\307\177\000\000`\212s\306\374\177\000"}, sin = {sin_family = 64441, sin_port = 62814, sin_addr = {s_addr = 32711}, sin_zero = "`\212s\306\374\177\000"}, sin6 = {sin6_family = 64441, sin6_port = 62814, sin6_flowinfo = 32711, sin6_addr = {__in6_u = {__u6_addr8 = "`\212s\306\374\177\000\000\260'\361\067\311\177\000", __u6_addr16 = {35424, 50803, 32764, 0, 10160, 14321, 32713, 0}, __u6_addr32 = {3329460832, 32764, 938551216, 32713}}}, sin6_scope_id = 935414184}, sas = {ss_family = 64441, __ss_padding = "^\365\307\177\000\000`\212s\306\374\177\000\000\260'\361\067\311\177\000\000\250I\301\067\311\177\000\000\000\000\000\000\000\000\000\000\240\206s\306\374\177\000\000\341S^\365\307\177\000\000\220\211s\306\374\177\000\000`\213s\306\374\177\000\000\220x\360\067\311\177\000\000\200\211s\306\374\177\000\000ȅs\306\374\177\000\000\020\000\000\000\060\000\000\000\360\205s\306\374\177\000\000P\207s\306\374\177\000", __ss_align = 0}}, id = 0, send_flags = {f = 32711, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        host = {s = 0x7ffcc6738560 "", len = 46}
        port = 0
        comp = 32713
        __func__ = "t_forward_cancel"
#10 0x00007fc7fdb501a0 in t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, proto=0, replicate=0) at t_funcs.c:239
        ret = 0
        new_tran = 939088312
        t = 0x7ffcc6738900
        dst = {send_sock = 0x7fc937c05468, to = {s = {sa_family = 10160, sa_data = "\361\067\311\177\000\000\020\210s\306\374\177\000"}, sin = {sin_family = 10160, sin_port = 14321, sin_addr = {s_addr = 32713}, sin_zero = "\020\210s\306\374\177\000"}, sin6 = {sin6_family = 10160, sin6_port = 14321, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "\020\210s\306\374\177\000\000\341S^\365\307\177\000", __u6_addr16 = {34832, 50803, 32764, 0, 21473, 62814, 32711, 0}, __u6_addr32 = {3329460240, 32764, 4116599777, 32711}}}, sin6_scope_id = 23}, sas = {ss_family = 10160, __ss_padding = "\361\067\311\177\000\000\020\210s\306\374\177\000\000\341S^\365\307\177\000\000\027\000\000\000W\024\365h\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\262\336\067\311\177\000\000Іs\306\374\177\000\000\300\210s\306\374\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000", __ss_align = 140723637947776}}, id = 272622906, send_flags = {f = 21851, blst_imask = 0}, proto = -32 '\340', proto_pad0 = -120 '\210', proto_pad1 = -14733}
        port = 0
        host = {s = 0x555b10761688 "", len = -178324551}
        comp = 0
        __func__ = "t_relay_to"
#11 0x00007fc7fdb054da in _w_t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, force_proto=0) at tm.c:1752
        t = 0x0
        res = 32764
        __func__ = "_w_t_relay_to"
#12 0x00007fc7fdb06825 in w_t_relay (p_msg=0x7fc9380cade8, _foo=0x0, _bar=0x0) at tm.c:1952
No locals.
#13 0x0000555b103fe4b2 in do_action (h=0x7ffcc67390b0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1076
        ret = -5
        v = 1
        dst = {send_sock = 0x7fc937deaff0, to = {s = {sa_family = 44520, sa_data = "\f8\311\177\000\000\253'\021\375\307\177\000"}, sin = {sin_family = 44520, sin_port = 14348, sin_addr = {s_addr = 32713}, sin_zero = "\253'\021\375\307\177\000"}, sin6 = {sin6_family = 44520, sin6_port = 14348, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "\253'\021\375\307\177\000\000\320\n\220\004\310\177\000", __u6_addr16 = {10155, 64785, 32711, 0, 2768, 1168, 32712, 0}, __u6_addr32 = {4245759915, 32711, 76548816, 32712}}}, sin6_scope_id = 276174472}, sas = {ss_family = 44520, __ss_padding = "\f8\311\177\000\000\253'\021\375\307\177\000\000\320\n\220\004\310\177\000\000\210\026v\020[U\000\000\210\026v\020\001\000\000\000\000\215s\306\374\177\000\000s\321^\365\307\177\000\000\000\000\000\000\000\000\000\000,\215s\306\374\177\000\000\200'\f8\311\177\000\000.\000\000\000\307\177\000\000\004\000\000\000\002", '\000' <repeats 11 times>, "\060\215s\306\374\177\000\000\210\026v\020[U\000", __ss_align = 0}}, id = 1212490240, send_flags = {f = 32713, blst_imask = 0}, proto = 51 '3', proto_pad0 = -104 '\230', proto_pad1 = 4218}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7fc937c05468
        len = 0
        user = 0
        uri = {user = {s = 0x555b10d24db0 "UTC", len = 938506384}, passwd = {s = 0x7fc937deb068 "\360\036\361\067\311\177", len = -49207158}, host = {s = 0x7ffcc6738d30 "\373\377\377\377\374\177", len = 0}, port = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, params = {s = 0x2e <error: Cannot access memory at address 0x2e>, len = 1212490383}, sip_params = {s = 0x0, len = 48}, headers = {s = 0x7ffcc6738c60 "\250I\301\067\311\177", len = -965506176}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (unknown: 76548816), transport = {s = 0x555b107a9833 "INFO", len = 0}, ttl = {s = 0x7fc7fd11288a "", len = 935534040}, user_param = {s = 0x7ffcc6738be0 " \214s\306\374\177", len = -178372384}, maddr = {s = 0x7fc7ffffffff "", len = 76548816}, method = {s = 0x555b10761688 "", len = 276174472}, lr = {s = 0x7ffcc6738c20 "P\214s\306\374\177", len = -178335373}, r2 = {s = 0x7ffcc6738c20 "P\214s\306\374\177", len = -965505972}, gr = {s = 0x4c6738ce8 <error: Cannot access memory at address 0x4c6738ce8>, len = -49207385}, transport_val = {s = 0x77748ac400000004 <error: Cannot access memory at address 0x77748ac400000004>, len = 0}, ttl_val = {s = 0x7ffcc6738c50 ".", len = 274214092}, user_param_val = {s = 0x4c6738ce8 <error: Cannot access memory at address 0x4c6738ce8>, len = -49236417}, maddr_val = {s = 0x7fc7fd11288a "", len = -49207158}, method_val = {s = 0x2e <error: Cannot access memory at address 0x2e>, len = 940320640}, lr_val = {s = 0x7fc937c149a8 "\341\236\377\373\307\177", len = 6}, r2_val = {s = 0x7fc937c31dd8 "LPB41KT ", len = 940320640}, gr_val = {s = 0x88c6738cc0 <error: Cannot access memory at address 0x88c6738cc0>, len = 0}}
        next_hop = {user = {s = 0x7fc9484cfa0b "%H:%M:%S", len = 24}, passwd = {s = 0x7ffcc6738a70 "3\230z\020[U", len = 282777392}, host = {s = 0x555b10dad720 "", len = 1215316096}, port = {s = 0x7fc948707b00 <main_arena> "", len = 8208}, params = {s = 0x79 <error: Cannot access memory at address 0x79>, len = 1212061465}, sip_params = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1212034094}, headers = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 282761040}, port_no = 35472, proto = 50803, type = 32764, flags = (unknown: 1215316096), transport = {s = 0x555b00000001 <error: Cannot access memory at address 0x555b00000001>, len = 282761040}, ttl = {s = 0x0, len = 1215316096}, user_param = {s = 0x555b10da9750 "X{pH\311\177", len = 1}, maddr = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 11}, method = {s = 0x555b10da9750 "X{pH\311\177", len = -965506200}, lr = {s = 0x15 <error: Cannot access memory at address 0x15>, len = 1212489561}, r2 = {s = 0x555b107a9833 "INFO", len = -49206466}, gr = {s = 0x7ffcc6738bf0 " \214s\306\374\177", len = 1652854916}, transport_val = {s = 0x555b10dad730 "<142>May 18 06:21:56 /root/mykamailio/sbin/kamailio[67117]: INFO: LPB41KT [d94ad953] RELAY: Relaying to 10.64.1.44 (ru)\n", len = 120}, ttl_val = {s = 0x0, len = 276598612}, user_param_val = {s = 0x7fc937f08840 "\031", len = -965505768}, maddr_val = {s = 0x7fc9380cade8 "\373E\001", len = 276174472}, method_val = {s = 0x0, len = 1212490240}, lr_val = {s = 0x1500000038 <error: Cannot access memory at address 0x1500000038>, len = 6}, r2_val = {s = 0x7a00000004 <error: Cannot access memory at address 0x7a00000004>, len = 3}, gr_val = {s = 0x0, len = 0}}
        u = 0x0
        port = 0
        dst_host = 0x7fc804900c10
        i = 934727696
        flags = 32713
        avp = 0x7ffcc6738ec0
        st = {flags = 282785584, id = 21851, name = {n = 1215331072, s = {s = 0x7fc948707b00 <main_arena> "", len = 0}, re = 0x7fc948707b00 <main_arena>}, avp = 0x90}
        sct = 0x555b107a9833
        sjt = 0x7fc948452200 <__syslog>
        rve = 0x7ffcc6738ec0
        mct = 0x0
        rv = 0x555b10dad720
        rv1 = 0x7fc937b6d010
        c1 = {cache_type = 1215326240, val_type = 32713, c = {avp_val = {n = 8, s = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, re = 0x8}, pval = {rs = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, ri = 1212272350, flags = 32713}}, i2s = "3\230z67117\373\037", '\000' <repeats 11 times>}
        s = {s = 0x555b10dad73c "06:21:56 /root/mykamailio/sbin/kamailio[67117]: INFO: LPB41KT [d94ad953] RELAY: Relaying to 10.64.1.44 (ru)\n", len = 1213011858}
        srevp = {0x7fc937f161a0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6738900, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#14 0x0000555b1040c449 in run_actions (h=0x7ffcc67390b0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f161a0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 939040248, tz_dsttime = 32713}
        tdiff = 960495616
        __func__ = "run_actions"
#15 0x0000555b1040caf6 in run_actions_safe (h=0x7ffcc673b6d0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {93849606559368, 8478727960045658726, 0, 140502477644288, 93849606854707, 5255462912, 8478727960666415718, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {140723637949416, 0, 0, 140502204241990, 93849606559368, 0, 140502477644288, 93849606854707, 5255462912, 140723637949120, 93849602810890, 7624429984, 140497046735760, 140723637948832, 140496791814368, 140502203705832}}}}}
        ret = -965504028
        ign_on_break = 0
#16 0x0000555b103c9569 in rval_get_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, i=0x7ffcc6739558, rv=0x7fc937f162f8, cache=0x0) at core/rvalue.c:915
        r_avp = 0x7fc93807dfe0
        avp_val = {n = 1, s = {s = 0x7ffc00000001 <error: Cannot access memory at address 0x7ffc00000001>, len = -97950189}, re = 0x7ffc00000001}
        pval = {rs = {s = 0x7fc937f0ffc8 "Y\377\360\067\311\177", len = 940355048}, ri = 0, flags = 0}
        tmp = {s = 0x7fc7fa2d2866 "rtpengine", len = -965504064}
        s = 0x0
        r = 32711
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#17 0x0000555b103ce40a in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc6739558, rve=0x7fc937f162f0) at core/rvalue.c:1913
        i1 = 1
        i2 = 0
        ret = -1
        c1 = {cache_type = 940355048, val_type = 32713, c = {avp_val = {n = 938570632, s = {s = 0x7fc937f17388 "\232\a", len = 935352296}, re = 0x7fc937f17388}, pval = {rs = {s = 0x7fc937f17388 "\232\a", len = 935352296}, ri = -97805992, flags = 14}}, i2s = "p\225s\306\374\177\000\000\341S^\365\307\177\000\000\000\000\000\000\001"}
        c2 = {cache_type = 276469811, val_type = 21851, c = {avp_val = {n = 960495616, s = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965504000}, re = 0x139400000}, pval = {rs = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965504000}, ri = 272425654, flags = 21851}}, i2s = "\020\224s\306\374\177\000\000\000\000\000\000\000\000\000\000h\000\361\067\311\177"}
        rv1 = 0x7fc948452200 <__syslog>
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#18 0x0000555b103ce84f in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc6739a8c, rve=0x7fc937f16a20) at core/rvalue.c:1921
        i1 = 1212490240
        i2 = 0
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = -176175080, s = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, re = 0x7fc7f57fc818 <_dbg_action_list+344>}, pval = {rs = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, ri = 938570632, flags = 32713}}, i2s = "`\226s\306\374\177\000\000\000\000\000\000\000\000\000\000p\225s\306\374\177"}
        c2 = {cache_type = 4197187347, val_type = 32711, c = {avp_val = {n = 940355048, s = {s = 0x7fc9380cade8 "\373E\001", len = -49207381}, re = 0x7fc9380cade8}, pval = {rs = {s = 0x7fc9380cade8 "\373E\001", len = -49207381}, ri = 76548816, flags = 32712}}, i2s = "\210\026v\020[U\000\000\210\026v\020\001\000\000\000@\225s\306\374\177"}
        rv1 = 0x7fc93802a510
        rv2 = 0x100000011
        __func__ = "rval_expr_eval_int"
#19 0x0000555b103fdf6e in do_action (h=0x7ffcc673b6d0, a=0x7fc937f17388, msg=0x7fc9380cade8) at core/action.c:1052
        ret = -5
        v = 0
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "@9\001\000\000\000\060\232s\306\374\177\000"}, sin = {sin_family = 0, sin_port = 14656, sin_addr = {s_addr = 1}, sin_zero = "0\232s\306\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 14656, sin6_flowinfo = 1, sin6_addr = {__in6_u = {__u6_addr8 = "0\232s\306\374\177\000\000\214\242\260\375\307\177\000", __u6_addr16 = {39472, 50803, 32764, 0, 41612, 64944, 32711, 0}, __u6_addr32 = {3329464880, 32764, 4256211596, 32711}}}, sin6_scope_id = 3329465008}, sas = {ss_family = 0, __ss_padding = "@9\001\000\000\000\060\232s\306\374\177\000\000\214\242\260\375\307\177\000\000\260\232s\306\374\177", '\000' <repeats 18 times>, "\350\255\f8\311\177\000\000\340\240s\306\374\177\000\000\262\344?\020[U\000\000\000\000\000\000\000\000\000\000\340ֶ7\000\000\000\000`\233s\306\374\177\000\000\350\255\f8\311\177\000\000\060/\305\067\311\177\000\000\240\242s\306\374\177\000", __ss_align = 140723637953056}}, id = -965500576, send_flags = {f = 32764, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -32 '\340', proto_pad1 = 18545}
        tmp = 0x7fc937c74ab8 "\002"
        new_uri = 0x7fc937c48800 "\001"
        end = 0xfe380cade8 <error: Cannot access memory at address 0xfe380cade8>
        crt = 0x7fc937c74b50 "\001"
        cmd = 0x7fc937c057e8
        len = 32711
        user = -178367519
        uri = {user = {s = 0x7ffcc67398b0 "\340\230s\306\374\177", len = -178335373}, passwd = {s = 0x555b107a9833 "INFO", len = -965502756}, host = {s = 0x2c67398c0 <error: Cannot access memory at address 0x2c67398c0>, len = -38215845}, port = {s = 0x7af200000012 <error: Cannot access memory at address 0x7af200000012>, len = 0}, params = {s = 0x7ffcc67398e0 "\200\231s\306\374\177", len = 274214092}, sip_params = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 233806760}, headers = {s = 0x555b107a9833 "INFO", len = 960495616}, port_no = 39296, proto = 50803, type = 32764, flags = (unknown: 4256166576), transport = {s = 0x37c6f930 <error: Cannot access memory at address 0x37c6f930>, len = 940355048}, ttl = {s = 0x7ffcc673a010 "\346\017MH\311\177", len = 80}, user_param = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1211905118}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x7ffcc6739980 "\300\231s\306\374\177", len = 233806728}, r2 = {s = 0x0, len = 276174472}, gr = {s = 0x0, len = 1212490240}, transport_val = {s = 0x555b107a9833 "INFO", len = 960495616}, ttl_val = {s = 0x7ffcc67399c0 "", len = -38799735}, user_param_val = {s = 0x7ffcc673a020 "\001\200\255", <incomplete sequence \373>, len = 0}, maddr_val = {s = 0x0, len = 940355048}, method_val = {s = 0x7fc9380cade8 "\373E\001", len = 935669552}, lr_val = {s = 0x7ffcc6739a00 "0\232s\306\374\177", len = -38755968}, r2_val = {s = 0x555b00000000 <error: Cannot access memory at address 0x555b00000000>, len = 940355048}, gr_val = {s = 0x0, len = 1212490240}}
        next_hop = {user = {s = 0x7ffcc6739800 "\340\230s\306\374\177", len = -39278603}, passwd = {s = 0x0, len = 0}, host = {s = 0x44c67397d0 <error: Cannot access memory at address 0x44c67397d0>, len = 935764248}, port = {s = 0x7ffcc6739864 "[U", len = 940355048}, params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549264}, sip_params = {s = 0x555b107a9833 "INFO", len = 960495616}, headers = {s = 0x1c6739790 <error: Cannot access memory at address 0x1c6739790>, len = 76549264}, port_no = 38800, proto = 50803, type = 32764, flags = (unknown: 4116594912), transport = {s = 0x7fc7fdb7d7fa "", len = 76549264}, ttl = {s = 0x555b10761688 "", len = 276174472}, user_param = {s = 0x7ffcc67397d0 "", len = -178335373}, maddr = {s = 0x7fc7fdecbe08 "\030x<\016\310\177", len = -965502980}, method = {s = 0x23807a9a8 <error: Cannot access memory at address 0x23807a9a8>, len = -38283272}, lr = {s = 0x7af200000012 <error: Cannot access memory at address 0x7af200000012>, len = 0}, r2 = {s = 0x7ffcc6739800 "\340\230s\306\374\177", len = 274214092}, gr = {s = 0x2c6739800 <error: Cannot access memory at address 0x2c6739800>, len = -38283272}, transport_val = {s = 0x555b107a9833 "INFO", len = 233806760}, ttl_val = {s = 0x7ffcc67398e0 "\200\231s\306\374\177", len = -39258348}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549264}, maddr_val = {s = 0x7fc937c7e4a0 "0\344\307\067\311\177", len = -178324551}, method_val = {s = 0x1c6739870 <error: Cannot access memory at address 0x1c6739870>, len = 76549264}, lr_val = {s = 0x7ffcc6739870 "\260\230s\306\374\177", len = -178372384}, r2_val = {s = 0x7fc7fdb8df5d "", len = 76549264}, gr_val = {s = 0x555b10761688 "", len = 276174472}}
        u = 0x7ffcc6739db0
        port = 0
        dst_host = 0x7ffcc6739fe0
        i = 38
        flags = 32711
        avp = 0x555b107a9833
        st = {flags = 3329464048, id = 32764, name = {n = 274214092, s = {s = 0x555b10582ccc <get_debug_level+74> "\205\300u\005\213E\374\353\036\213\005\231\264K", len = 935457704}, re = 0x555b10582ccc <get_debug_level+74>}, avp = 0x7fc7fdb7d7f8}
        sct = 0x0
        sjt = 0x0
        rve = 0x7fc937f16a20
        mct = 0x0
        rv = 0x0
        rv1 = 0x7fc937c53eb0
        c1 = {cache_type = 3329464000, val_type = 32764, c = {avp_val = {n = -178335373, s = {s = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416> "\307\005G\001!", len = 279200042}, re = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416>}, pval = {rs = {s = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416> "\307\005G\001!", len = 279200042}, ri = -965503252, flags = 32764}}, i2s = "P\227s\306\002\000\000\000\370\327\267\375\307\177\000\000\022\000\000\000\362z"}
        s = {s = 0x555b10761688 "", len = 276174472}
        srevp = {0x7fc937f17388, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739660, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#20 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937f0fca0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f17388
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935673520, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#21 0x0000555b103fa952 in do_action (h=0x7ffcc673b6d0, a=0x7fc937c53eb0, msg=0x7fc9380cade8) at core/action.c:700
        ret = -5
        v = 32713
        dst = {send_sock = 0x100000000, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000v\000\000\000\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "v\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "v\000\000\000\000\000\000\000\210\026v\020[U\000", __u6_addr16 = {118, 0, 0, 0, 5768, 4214, 21851, 0}, __u6_addr32 = {118, 0, 276174472, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000v\000\000\000\000\000\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000\200\243s\306\374\177\000\000\366\312@\020[U\000\000\000{pH\311\177\000\000\350\255\f8\311\177\000\000\060/\305\067\311\177\000\000жs\306\374\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\311\177\000", __ss_align = 93849606559368}}, id = 676438630, send_flags = {f = 32296, blst_imask = 30122}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x1500000038 <error: Cannot access memory at address 0x1500000038>
        end = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>
        crt = 0x555b107a9833 "INFO"
        cmd = 0x7fc937c73b70
        len = 32711
        user = -178367519
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 276174472}, passwd = {s = 0x0, len = 1212490240}, host = {s = 0x555b107a9833 "INFO", len = 960495616}, port = {s = 0x7ffcc673a270 "\200\243s\306\374\177", len = 272680009}, params = {s = 0x6c673a130 <error: Cannot access memory at address 0x6c673a130>, len = 8180}, sip_params = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 276174472}, headers = {s = 0x7ffcc673a3a0 "8", len = 940355048}, port_no = 12080, proto = 14277, type = 32713, flags = (unknown: 3329467040), transport = {s = 0x555b10d24db0 "UTC", len = -965500544}, ttl = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 0}, user_param = {s = 0x7ffcc673a220 "0\367\332\020[U", len = -965500576}, maddr = {s = 0x10000043b <error: Cannot access memory at address 0x10000043b>, len = 67667272}, method = {s = 0x3635c673a236 <error: Cannot access memory at address 0x3635c673a236>, len = -965500356}, lr = {s = 0x7ffcc673a238 "", len = -965500356}, r2 = {s = 0x0, len = 67667272}, gr = {s = 0x2700000000 <error: Cannot access memory at address 0x2700000000>, len = -41657984}, transport_val = {s = 0x7fc9380caff0 "\n\247\277\062", len = 10}, ttl_val = {s = 0xd00000003 <error: Cannot access memory at address 0xd00000003>, len = 282777404}, user_param_val = {s = 0x555b10dad73c "06:21:56 /root/mykamailio/sbin/kamailio[67117]: INFO: LPB41KT [d94ad953] RELAY: Relaying to 10.64.1.44 (ru)\n", len = 1213011858}, maddr_val = {s = 0x7fc948706820 <_nl_C_locobj> " GpH\311\177", len = 8}, method_val = {s = 0x0, len = 1212272350}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x555b10daf730 "", len = 1215331072}}
        next_hop = {user = {s = 0x68f5145700000017 <error: Cannot access memory at address 0x68f5145700000017>, len = 0}, passwd = {s = 0x7ffcc6739f70 "P\240s\306\374\177", len = 274214092}, host = {s = 0x6c673a1a0 <error: Cannot access memory at address 0x6c673a1a0>, len = -107129541}, port = {s = 0x7ffcc673a1c0 "\003", len = 67667272}, params = {s = 0x7ffcc673a050 "\313\320\323\020[U", len = -107759048}, sip_params = {s = 0x7ffcc6739fb0 "\300\241s\306\374\177", len = 274214092}, headers = {s = 0x6c673a1e0 <error: Cannot access memory at address 0x6c673a1e0>, len = -965500516}, port_no = 41376, proto = 50803, type = 32764, flags = (unknown: 3329466800), transport = {s = 0x7ffcc673a1c0 "\003", len = 0}, ttl = {s = 0x7fc937c05e40 "k\345\270\375\307\177", len = 940355048}, user_param = {s = 0x555b1076c64b "core", len = -965500452}, maddr = {s = 0x7ffcc673a020 "\001\200\255", <incomplete sequence \373>, len = 282317003}, method = {s = 0x7ffcc673a148 "", len = 282317003}, lr = {s = 0x7ffcc673a428 "\350@\305\067\311\177", len = -965500000}, r2 = {s = 0x7fc9484d0fe6 "%hu%n:%hu%n:%hu%n", len = 1211988903}, gr = {s = 0xfbad8001 <error: Cannot access memory at address 0xfbad8001>, len = 282317004}, transport_val = {s = 0x555b10d3d0cc "", len = 282317003}, ttl_val = {s = 0x555b10d3d0cb "0", len = 282317003}, user_param_val = {s = 0x555b10d3d0cb "0", len = 282317003}, maddr_val = {s = 0x555b10d3d0cc "", len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x10761688 <error: Cannot access memory at address 0x10761688>, len = 276174472}, gr_val = {s = 0x7ffcc6730000 "", len = 0}}
        u = 0x7ffcc673a5f0
        port = 0
        dst_host = 0x555b107a9833
        i = 29
        flags = 32711
        avp = 0x7ffcc673a520
        st = {flags = 3329466176, id = 32764, name = {n = -178335373, s = {s = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416> "\307\005G\001!", len = 1}, re = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416>}, avp = 0x7ffcc6739f6c}
        sct = 0x555b10da9750
        sjt = 0xb
        rve = 0x7fc9380c0030
        mct = 0xffffffff
        rv = 0x110761688
        rv1 = 0x7fc937c540e8
        c1 = {cache_type = 3329466112, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, ri = -965499840, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = 274517235}
        srevp = {0x7fc937c53eb0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739ea0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#22 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c53080, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c53eb0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935674088, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#23 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937c540e8, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x100000000, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\367\000\000\000\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\367\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\367\000\000\000\000\000\000\000\210\026v\020[U\000", __u6_addr16 = {247, 0, 0, 0, 5768, 4214, 21851, 0}, __u6_addr32 = {247, 0, 276174472, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\367\000\000\000\000\000\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000\300\253s\306\374\177\000\000\366\312@\020[U\000\000\000{pH\311\177\000\000\350\255\f8\311\177\000\000\300!\305\067\311\177\000\000жs\306\374\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\311\177\000", __ss_align = 93849606559368}}, id = 970039910, send_flags = {f = 32296, blst_imask = 30122}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x1500000038 <error: Cannot access memory at address 0x1500000038>
        end = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>
        crt = 0x555b107a982c "NOTICE"
        cmd = 0x7fc937c10c18
        len = 32711
        user = -178367519
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 276174472}, passwd = {s = 0x0, len = 1212490240}, host = {s = 0x555b107a9833 "INFO", len = 960495616}, port = {s = 0x7ffcc673aab0 "\300\253s\306\374\177", len = 272680009}, params = {s = 0x6c673a970 <error: Cannot access memory at address 0x6c673a970>, len = 8180}, sip_params = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 276174472}, headers = {s = 0x7ffcc673abe0 "8", len = 940355048}, port_no = 8640, proto = 14277, type = 32713, flags = (unknown: 3329469152), transport = {s = 0x555b10d24db0 "UTC", len = -965498432}, ttl = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = -965497688}, user_param = {s = 0x7ffcc673aa60 "0\367\332\020[U", len = -965498464}, maddr = {s = 0x7fc937f0f368 "", len = 940355048}, method = {s = 0x3635c673aa76 <error: Cannot access memory at address 0x3635c673aa76>, len = -965498244}, lr = {s = 0x7ffcc673aa78 "", len = -965498244}, r2 = {s = 0x7fc937f95ab8 "\001", len = -965497744}, gr = {s = 0x2737f0f368 <error: Cannot access memory at address 0x2737f0f368>, len = 276174472}, transport_val = {s = 0x0, len = 1212490240}, ttl_val = {s = 0x555b107a9833 "INFO", len = 960495616}, user_param_val = {s = 0x7ffcc673ab80 "\360\254s\306\374\177", len = 272427137}, maddr_val = {s = 0x7fc948706820 <_nl_C_locobj> " GpH\311\177", len = 8}, method_val = {s = 0x0, len = 1212272350}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x555b10daf730 "", len = 1215331072}}
        next_hop = {user = {s = 0x7ffcc673a8a0 "\020\252s\306\374\177", len = 272406603}, passwd = {s = 0x7ffcc673a7b0 "\350\255\f8\311\177", len = 274214092}, host = {s = 0x6c673a9e0 <error: Cannot access memory at address 0x6c673a9e0>, len = 0}, port = {s = 0x7fc937c4d3f8 "\a", len = -965498056}, params = {s = 0x7fc9380cade8 "\373E\001", len = -965495088}, sip_params = {s = 0x4c673a820 <error: Cannot access memory at address 0x4c673a820>, len = 276653360}, headers = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = -965498404}, port_no = 43488, proto = 50803, type = 32764, flags = (unknown: 3329468912), transport = {s = 0x7ffcc673aa00 "3\230z\020[U", len = 0}, ttl = {s = 0x7fc937c149a8 "\341\236\377\373\307\177", len = 940355048}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 282317003}, method = {s = 0x7ffcc673a988 "\250\254s\306\374\177", len = 282317003}, lr = {s = 0x7ffcc673ac68 "\300E\305\067\311\177", len = -965497888}, r2 = {s = 0x7fc9484d0fe6 "%hu%n:%hu%n:%hu%n", len = 1211988903}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x555b10d3d0cc "", len = 276174472}, ttl_val = {s = 0x0, len = 1212490240}, user_param_val = {s = 0x555b107a9833 "INFO", len = 960495616}, maddr_val = {s = 0x7ffcc673aa10 "\200\253s\306\374\177", len = 272425994}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x7fc937c4d3f0 "\001", len = -965498056}, gr_val = {s = 0x7fc9380cade8 "\373E\001", len = -965495088}}
        u = 0x7ffcc673ae30
        port = 0
        dst_host = 0x555b107a982c
        i = -965497728
        flags = 32764
        avp = 0x7ffcc673ad60
        st = {flags = 3329468288, id = 32764, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x555b105cf57c <pv_value_destroy+175>}
        sct = 0x555b10da9750
        sjt = 0xb
        rve = 0x7fc937c53698
        mct = 0xffffffff
        rv = 0x10761688
        rv1 = 0x7fc937c545c0
        c1 = {cache_type = 3329468224, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, ri = -965497728, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = 76549136}
        srevp = {0x7fc937c540e8, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673a6e0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#24 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c52c10, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c540e8
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935675328, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#25 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937c545c0, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "@9\001\000\000\000\200\264s\306\374\177\000"}, sin = {sin_family = 0, sin_port = 14656, sin_addr = {s_addr = 1}, sin_zero = "\200\264s\306\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 14656, sin6_flowinfo = 1, sin6_addr = {__in6_u = {__u6_addr8 = "\200\264s\306\374\177\000\000\374:i\020[U\000", __u6_addr16 = {46208, 50803, 32764, 0, 15100, 4201, 21851, 0}, __u6_addr32 = {3329471616, 32764, 275331836, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "@9\001\000\000\000\200\264s\306\374\177\000\000\374:i\020[U\000\000\000\000\000\000\000\000\000\000\250\251\a8\311\177\000\000AA\244\020[U\000\000\062@\244\020[U\000\000 \263s\306\374\177\000\000\020ж7\311\177\000\000`\263s\306\374\177\000\000\335G\215\374\307\177\000\000\360\360\360\360", '\000' <repeats 14 times>, "\200\020\000\000\000\000\220>+\020\000\000\000", __ss_align = 4195464}}, id = 5554544, send_flags = {f = 0, blst_imask = 0}, proto = -64 '\300', proto_pad0 = 119 'w', proto_pad1 = 1285}
        tmp = 0x7fc804900c10 ""
        new_uri = 0x7fc937f9daf8 "\002"
        end = 0x555b106d4545 <parse_method_name+2608> "\205\300\017\224\300\017\266\300H\205\300\017\204\261\003"
        crt = 0x1c673b510 <error: Cannot access memory at address 0x1c673b510>
        cmd = 0x7fc937c10c50
        len = 0
        user = 939121360
        uri = {user = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -965496436}, passwd = {s = 0x4c673b1a0 <error: Cannot access memory at address 0x4c673b1a0>, len = 276653360}, host = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, port = {s = 0x7ffcc673b190 "\300\262s\306\374\177", len = 274214092}, params = {s = 0x4004004f8 <error: Cannot access memory at address 0x4004004f8>, len = 276653360}, sip_params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, headers = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275281682}, port_no = 45520, proto = 50803, type = 32764, flags = (URI_SIP_USER_PHONE | unknown: 273118464), transport = {s = 0x0, len = 276598612}, ttl = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275030558}, user_param = {s = 0x7fc93807a9a8 "\001", len = 940025184}, maddr = {s = 0x7ffcc673b342 "\005\005", len = -965495997}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x555b107d6d88 <__func__.6797> "parse_via", len = 276659112}, r2 = {s = 0x1c673b250 <error: Cannot access memory at address 0x1c673b250>, len = 76549136}, gr = {s = 0x7ffcc673b250 "\220\262s\306\374\177", len = -178372384}, transport_val = {s = 0x555b107d6534 "", len = 76549136}, ttl_val = {s = 0x555b10761688 "", len = 276174472}, user_param_val = {s = 0x7ffcc673b290 "\300\262s\306\374\177", len = -178335373}, maddr_val = {s = 0x0, len = -965496132}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}, lr_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, r2_val = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 274214092}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}}
        next_hop = {user = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 2}, passwd = {s = 0x7fc93807a9a8 "\001", len = 0}, host = {s = 0x7fc93807ecc8 "\001", len = 939039512}, port = {s = 0x7a <error: Cannot access memory at address 0x7a>, len = 940043464}, params = {s = 0x0, len = 940026872}, sip_params = {s = 0x7fc937f89cd0 "\004", len = 939039512}, headers = {s = 0x7fc937f73958 "\003", len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x1c673b120 <error: Cannot access memory at address 0x1c673b120>, len = 76549136}, method_val = {s = 0x7ffcc673b120 "`\261s\306\374\177", len = -178372384}, lr_val = {s = 0x555b107d6534 "", len = 76549136}, r2_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 16}, gr_val = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -178335373}}
        u = 0x555b107df530 <__func__.6625>
        port = 0
        dst_host = 0x555b10761688
        i = 2
        flags = 21851
        avp = 0x1
        st = {flags = 65537, id = 45, name = {n = 279199744, s = {s = 0x555b10a44000 <buf> "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"..., len = 6}, re = 0x555b10a44000 <buf>}, avp = 0x555b10a44007 <buf+7>}
        sct = 0x7ffcc673b480
        sjt = 0x7fc804900c10
        rve = 0x7fc937c523f8
        mct = 0x1
        rv = 0x0
        rv1 = 0x555b10a44118 <buf+280>
        c1 = {cache_type = 279644096, val_type = 21851, c = {avp_val = {n = -965496932, s = {s = 0x7ffcc673af9c "[U", len = 279644080}, re = 0x7ffcc673af9c}, pval = {rs = {s = 0x7ffcc673af9c "[U", len = 279644080}, ri = -38237829, flags = 32711}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x7ffcc673af70 "", len = -178335373}
        srevp = {0x7fc937c545c0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673af20, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#26 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c473c0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c545c0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 276690800, tz_dsttime = 21851}
        tdiff = 4116631923
        __func__ = "run_actions"
#27 0x0000555b1040cbbe in run_top_route (a=0x7fc937c473c0, msg=0x7fc9380cade8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {93849603950067, 4571428513, 140502205509096, 93849606559368, 4571141768, 140723637958544, 140496791851379, 140723637958560, 140723637958588, 18118908696, 93849606846109, 8004010816636452865, 0, 140723637958592, 93849606559368, 0}}}}}
        p = 0x7ffcc673b6d0
        ret = 276469811
        sfbk = 0
#28 0x0000555b1057b6e8 in receive_msg (buf=0x555b10a44000 <buf> "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"..., len=321, rcv_info=0x7ffcc673bd40) at core/receive.c:423
        msg = 0x7fc9380cade8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 15 times>, 1}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x555b10a44000 <buf> "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"..., len = 321}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcc673b8b0, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcc673bd40, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#29 0x0000555b10447d59 in udp_rcv_loop () at core/udp_server.c:543
        len = 321
        buf = "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"...
        tmp = 0x1e <error: Cannot access memory at address 0x1e>
        fromaddr = 0x7fc93807e930
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {851420938, 0}, addr32 = {851420938, 0, 0, 0}, addr16 = {42762, 12991, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277\062", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1019193098, 0}, addr32 = {1019193098, 0, 0, 0}, addr16 = {42762, 15551, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277<", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\247\277\062\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 851420938}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 851420938, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\247\277\062", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fc937bfff30, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "t\027\221\004\310\177\000\000t\027\221\004\001\000\000\000P\273s\306\374\177\000\000s\321^\365\307\177\000\000P\273s\306\374\177\000\000\220\267\331\020[U\000\000@\263\331\020[U\000\000\247\261s\306\374\177\000\000\220\261s\306\374\177\000\000\000\000\000\000\000\000\000\001", '\000' <repeats 20 times>, "\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000\000t\027\221\004\310\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000@\274s\306\374\177\000\000\005\067\346\356\307\177\000\000\177\252y\020[U\000\000\020\f\220\004\v\000\000\000t\027\221\004\310\177\000\000"...
        i = -1
        j = 130560
        l = 0
        __func__ = "udp_rcv_loop"
#30 0x0000555b1038de84 in main_loop () at main.c:1683
        i = 10
        pid = 0
        si = 0x7fc937bfff30
        si_desc = "udp receiver child=10 sock=edge.hipertel.local:5060\000EH\311\177\000\000\000\000\000\000\000\000\000\000\060\000\000\000\060\000\000\000\070\300s\306\374\177\000\000P\277s\306\374\177\000\000\250Nx\020[U\000\000\370\226\r8k\000\000\000\063\230z\020[U\000\000\360\226\n8\311\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#31 0x0000555b10398511 in main (argc=11, argv=0x7ffcc673c568) at main.c:2856
        cfg_stream = 0x555b10bef010
        c = -1
        r = 0
        tmp = 0x7ffcc673deba ""
        tmp_len = 32764
        port = -965491792
        proto = 32713
        ahost = 0x0
        aport = 0
        options = 0x555b10764348 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 900928915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7fc94926d040 <_rtld_global>
        p = 0x7ffcc673de72 "edge"
        st = {st_dev = 19, st_ino = 23307, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1641492636, tv_nsec = 884483965}, st_mtim = {tv_sec = 1599774907, tv_nsec = 42281020}, st_ctim = {tv_sec = 1599774907, tv_nsec = 42281020}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000 \232\004I\311\177\000\000\330\331&I\311\177\000\000\a\000\000\000\000\000\000\000\a\000\000\000\a\000\000\000\070\224\004I\311\177\000\000\060\302s\306\374\177\000\000\215F\005I\311\177\000\000\000\000\000\000\000\000\000\000\272J\005I\311\177", '\000' <repeats 11 times>, "\200\065\020[U", '\000' <repeats 13 times>, "\377\000\000\000\000", '\377' <repeats 11 times>, "\000\377\377\377\377GLIBC_2.2.5\000GLIB\000__f", '\000' <repeats 12 times>, "inite\000getpriorit", '\000' <repeats 136 times>...
        option_index = 0
        long_options = {{name = 0x555b107663d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x555b10761b1c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x555b107663db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x555b107663e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x555b107663e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x555b107663f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x555b107663fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x555b10766404 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x555b1076640f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x555b10766418 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x555b10766423 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007fc7fdacd78d in futex_get (lock=0x7fc80def9dd0) at ../../core/parser/../mem/../futexlock.h:121
        v = 1
        i = 0
#2  0x00007fc7fdacf75b in _lock (s=0x7fc80def9dd0) at lock.h:77
No locals.
#3  0x00007fc7fdaf2da7 in tm_reply_mutex_lock (t=0x7fc80def9b88) at t_reply.c:3063
        mypid = 67117
#4  0x00007fc7fdad8868 in _reply_light (trans=0x7fc80def9b88, buf=0x7fc937f956a0 "SIP/2.0 487 Request canceled\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nVia: SIP/2.0/UDP 191.0.0.1;branch=z9hG4bKsr-j4IPOlV7MGQKatycM.y7M.3wOBFsMmZ4Wx1LNSQL"..., len=536, code=487, to_tag=0x7fc7fddc04e0 <tm_tags> "fc3d4179ffdbaeed3a8b1e97891311fe-1e620000", to_tag_len=41, lock=1, bm=0x7ffcc6738150) at t_reply.c:480
        rb = 0x0
        buf_len = 4294967295
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}}
        onsend_params = {req = 0x7ffcc67380d0, rpl = 0x7fc7fddc0509, param = 0x0, code = 0, flags = 0, branch = 0, t_rbuf = 0xc6738070, dst = 0x0, send_buf = {s = 0x7fc700000000 <error: Cannot access memory at address 0x7fc700000000>, len = 76549264}}
        rt = 0
        backup_rt = 0
        ctx = {rec_lev = 279641888, run_flags = 21851, last_retcode = -965509168, jmp_env = {{__jmpbuf = {140723637944432, 300647710721, 0, 140502204241512, 93849606854707, 140502199881744, 140723637944240, 93849606559368}, __mask_was_saved = 0, __saved_mask = {__val = {140502477644288, 93849606854707, 5255462912, 140723637944592, 93849604452410, 140723637944656, 140723637944684, 140496957832080, 140496934186848, 140723637944752, 2094978531368, 0, 562949953421312, 140723637944496, 93849603943132, 1}}}}}
        bctx = 0x0
        pmsg = {id = 276469811, pid = 21851, tval = {tv_sec = 5255462912, tv_usec = 140723637942864}, fwd_send_flags = {f = 53068, blst_imask = 64948}, rpl_send_flags = {f = 32711, blst_imask = 0}, first_line = {type = 30992, flags = -14733, len = 32764, u = {request = {method = {s = 0x555b1040c449 <run_actions+2110> "\211E\304H\307\005\361gc", len = -965510872}, uri = {s = 0x30d00000000 <error: Cannot access memory at address 0x30d00000000>, len = 238842400}, version = {s = 0x7fc80e3c1d60 "", len = 32816}, method_value = 940355048}, reply = {version = {s = 0x555b1040c449 <run_actions+2110> "\211E\304H\307\005\361gc", len = -965510872}, status = {s = 0x30d00000000 <error: Cannot access memory at address 0x30d00000000>, len = 238842400}, reason = {s = 0x7fc80e3c1d60 "", len = 32816}, statuscode = 940355048}}}, via1 = 0x7fc937ffeb68, via2 = 0x7ffcc6737990, headers = 0x0, last_header = 0x488, parsed_flag = 7624423456, h_via1 = 0x7fc804900c10, h_via2 = 0x7ffcc6737820, callid = 0x7fc7f55e40e0 <futex_release+29>, to = 0x555b107ee6db, cseq = 0x7fc804900c10, from = 0x0, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0x0, authorization = 0x0, expires = 0x0, proxy_auth = 0x7fc800000000, supported = 0x0, require = 0x0, proxy_require = 0x7ffcc67378b0, unsupported = 0xf55ed173, allow = 0x510a4400b, event = 0x7fc9380cade8, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x7ffcc67378f0, user_agent = 0x0, server = 0x0, content_disposition = 0x0, diversion = 0x7fc80e3c1d60, rpid = 0x0, refer_to = 0x800000000, session_expires = 0x7fc80e3c1d30, min_se = 0x7fc937f950d0, sipifmatch = 0x30d, subscription_state = 0x0, date = 0x7fc80e3c1d60, identity = 0x7fc937f950d0, identity_info = 0x555b0000030d, pai = 0x30d00000000, ppi = 0x7fc80e3c7220, path = 0x7fc80e3c1d60, privacy = 0x7fc9380cade8, min_expires = 0x1, body = 0x7fc9380cb490, eoh = 0x2 <error: Cannot access memory at address 0x2>, unparsed = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, rcv = {src_ip = {af = 276469811, len = 1, u = {addrl = {140496934516032, 140723637942688}, addr32 = {4259296576, 32711, 3329456544, 32764}, addr16 = {46400, 64991, 32711, 0, 31136, 50803, 32764, 0}, addr = "@\265\337\375\307\177\000\000\240ys\306\374\177\000"}}, dst_ip = {af = 273077447, len = 21851, u = {addrl = {140497209007408, 140496934516032}, addr32 = {238820656, 32712, 4259296576, 32711}, addr16 = {7472, 3644, 32712, 0, 46400, 64991, 32711, 0}, addr = "0\035<\016\310\177\000\000@\265\337\375\307\177\000"}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 940356752, src_su = {s = {sa_family = 31312, sa_data = "s\306\374\177\000\000\352\037G\020[U\000"}, sin = {sin_family = 31312, sin_port = 50803, sin_addr = {s_addr = 32764}, sin_zero = "\352\037G\020[U\000"}, sin6 = {sin6_family = 31312, sin6_port = 50803, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 = "\352\037G\020[U\000\000\002\000\000\000\000\000\000", __u6_addr16 = {8170, 4167, 21851, 0, 2, 0, 0, 0}, __u6_addr32 = {273096682, 21851, 2, 0}}}, sin6_scope_id = 1212490240}, sas = {ss_family = 31312, __ss_padding = "s\306\374\177\000\000\352\037G\020[U\000\000\002\000\000\000\000\000\000\000\000\"EH\311\177\000\000\063\230z\020\b\000\000\000\060\035<\016\310\177\000\000f\242\221\203)~\252uf\242\321\354N\322\345 ", '\000' <repeats 32 times>, "\340\000\000\000\000\000\000\000\000\020\334\375", '\000' <repeats 11 times>, __ss_align = 0}}, bind_address = 0xc6737b50, proto = -112 '\220', proto_pad0 = -76 '\264', proto_pad1 = 14348}, buf = 0x2 <error: Cannot access memory at address 0x2>, len = 1212490240, new_uri = {s = 0x555b107a9833 "INFO", len = 960495616}, dst_uri = {s = 0x7ffcc6737b00 "\020|s\306\374\177", len = -38377848}, parsed_uri_ok = 279200227, parsed_uri = {user = {s = 0x7fc80e3c1d10 "", len = 238842400}, passwd = {s = 0x7fc80e3c1d10 "", len = 935333888}, host = {s = 0x7fc80e3c7220 "UPDATE sip:03101064233 at 172.17.3.12:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.6.14;branch=z9hG4bK0bc5.1cb4bcee359864991d244f651ff24bf2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK0bc5.2ecdd1653af798851"..., len = 781}, port = {s = 0x7fc9380cade8 "\373E\001", len = 0}, params = {s = 0x7fc9380cb490 "", len = 2}, sip_params = {s = 0x148452200 <error: Cannot access memory at address 0x148452200>, len = 8}, headers = {s = 0x502cc9a074 <error: Cannot access memory at address 0x502cc9a074>, len = -965510192}, port_no = 46224, proto = 14348, type = 32713, flags = URI_SIP_USER_PHONE, transport = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, ttl = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965510128}, user_param = {s = 0x7fc7fdb78d32 <t_send_branch+9771> "\205\300\017\204l\003", len = -965510192}, maddr = {s = 0x7fc7fdb70041 <add_uac+2493> "\017\267Eʃ\300\001\211\302H\213\205x\377\377\377f\211P\032H\203\275P\377\377\377", len = 0}, method = {s = 0x7fc9380cb490 "", len = 0}, lr = {s = 0x7fc9380cade8 "\373E\001", len = 1}, r2 = {s = 0x7fc80e3c1a70 "(\357\366\375\307\177", len = -965510128}, gr = {s = 0x7fc7fdb40ed2 <save_msg_lumps+2722> "\211Eă", <incomplete sequence \304>, len = 940355048}, transport_val = {s = 0x7fc80e3c5be8 "\372E\001", len = 0}, ttl_val = {s = 0x7fc7fdb7d7f8 "tm", len = 279642272}, user_param_val = {s = 0x555b10ab07b8 <def_list+24> "", len = -965510000}, maddr_val = {s = 0x1a70 <error: Cannot access memory at address 0x1a70>, len = 238836712}, method_val = {s = 0x7fc9380cb490 "", len = 2}, lr_val = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, r2_val = {s = 0x555b10420534 <get_branch_data+54> "\213\005\346)b", len = -965510016}, gr_val = {s = 0x7fc80e3c1d00 "", len = -965510128}}, parsed_orig_ruri_ok = 940356752, parsed_orig_ruri = {user = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1212490240}, passwd = {s = 0x555b107a9833 "INFO", len = 960495616}, host = {s = 0x7ffcc6737d70 "\020\177s\306'", len = -38297042}, port = {s = 0xc6737c50 <error: Cannot access memory at address 0xc6737c50>, len = 0}, params = {s = 0x7fc9380cade8 "\373E\001", len = 238819952}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, headers = {s = 0x7fc93807a9a8 "\001", len = 276598617}, port_no = 31904, proto = 50803, type = SIP_URI_T, flags = (unknown: 76549136), transport = {s = 0x7ffcc6737ca0 "\340|s\306\374\177", len = -178372384}, ttl = {s = 0x555b107c8f58 "", len = 76549136}, user_param = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = -252645136}, maddr = {s = 0x7ffcc6737ce0 "\020}s\306\374\177", len = -178335373}, method = {s = 0x8700000000 <error: Cannot access memory at address 0x8700000000>, len = -965509876}, lr = {s = 0x4fdb9d123 <error: Cannot access memory at address 0x4fdb9d123>, len = 276598612}, r2 = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, gr = {s = 0x7ffcc6737d10 "", len = 274214092}, transport_val = {s = 0x403e8c978 <error: Cannot access memory at address 0x403e8c978>, len = 276598612}, ttl_val = {s = 0x7ffcc6737e00 "\377\020z\020[U", len = 275030558}, user_param_val = {s = 0x7ffcc6737e00 "\377\020z\020[U", len = 275030754}, maddr_val = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = -38164549}, method_val = {s = 0x7fc7fdb9d120 "tm", len = 0}, lr_val = {s = 0x7fc7fdb9d238 <__func__.10856> "insert_tmcb", len = -38153949}, r2_val = {s = 0x28 <error: Cannot access memory at address 0x28>, len = -35909632}, gr_val = {s = 0x555b107a9833 "INFO", len = 960495616}}, add_rm = 0x27c6737f10, body_lumps = 0x555b10aaff20 <buff.5856>, reply_lump = 0x7fc7ff437d98, add_to_branch_s = "\000\000\000\000\000\000\000\000\003\000\000\000\r\000\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000`~s\306\374\177\000\000\213\005S\020[U\000\000\001", add_to_branch_len = 0, hash_index = 76549136, msg_flags = 32712, flags = 279641888, xflags = {21851, 4282613136}, set_global_address = {s = 0x1c6737e20 <error: Cannot access memory at address 0x1c6737e20>, len = 76549136}, set_global_port = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, force_send_socket = 0x555b107a10ff, path_vec = {s = 0x555b10653c7e <qm_info+46> "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b", len = -965509552}, instance = {s = 0x7fc937b6d010 "\001", len = -965509552}, reg_id = 934727696, ruid = {s = 0x7ffcc6737e90 "\300~s\306\374\177", len = -57849891}, location_ua = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, otcpid = 276824064, ldv = {flow = {decoded = 271266696, rcv = {src_ip = {af = 4198080, len = 0, u = {addrl = {5557368, 17856448}, addr32 = {5557368, 0, 17856448, 0}, addr16 = {52344, 84, 0, 0, 30656, 272, 0, 0}, addr = "x\314T\000\000\000\000\000\300w\020\001\000\000\000"}}, dst_ip = {af = 8, len = 0, u = {addrl = {65, 0}, addr32 = {65, 0, 0, 0}, addr16 = {65, 0, 0, 0, 0, 0, 0, 0}, addr = "A", '\000' <repeats 14 times>}}, src_port = 32448, dst_port = 50803, proto_reserved1 = 32764, proto_reserved2 = 273118466, src_su = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000T\217|\020\005\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "T\217|\020\005\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "T\217|\020\005\000\000\000\260\177s\306\374\177\000", __u6_addr16 = {36692, 4220, 5, 0, 32688, 50803, 32764, 0}, __u6_addr32 = {276598612, 5, 3329458096, 32764}}}, sin6_scope_id = 275030558}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000T\217|\020\005\000\000\000\260\177s\306\374\177\000\000\036\242d\020\000\000\000\000\260\177s\306\374\177\000\000\230\246d\020[U\000\000\210\026v\020[U\000\000\210\026v\020\001\000\000\000\373\020z\020[U\000\000s\321^\365\263\t\000\000\300Dz\020[U\000\000\261\027z\020[U\000\000 \002\000\000\000\000\000\000\020ж7\311\177\000\000\016\000\000\000n\365\023o", __ss_align = 0}}, bind_address = 0x7ffcc6737f50, proto = -52 '\314', proto_pad0 = 44 ',', proto_pad1 = 4184}}, vdata = 0x4c6737fd0}}
        keng = 0x0
        evname = {s = 0x7fc7fdb8a105 "tm:local-response-sent", len = 22}
        __func__ = "_reply_light"
#5  0x00007fc7fdadaa88 in _reply (trans=0x7fc80def9b88, p_msg=0x7fc7ff437b90, code=487, reason=0x7ffcc67381b0, lock=1) at t_reply.c:692
        len = 536
        buf = 0x7fc937f956a0 "SIP/2.0 487 Request canceled\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nVia: SIP/2.0/UDP 191.0.0.1;branch=z9hG4bKsr-j4IPOlV7MGQKatycM.y7M.3wOBFsMmZ4Wx1LNSQL"...
        dset = 0x110761688 <error: Cannot access memory at address 0x110761688>
        bm = {to_tag_val = {s = 0x7fc937f95820 "fc3d4179ffdbaeed3a8b1e97891311fe-1e620000\r\nCall-ID: hipertelM.MZMBjuMBMsPxFAOBV7W.y7M.c*\r\nCSeq: 20 INVITE\r\nServer: HiperTel v2.15\r\nContent-Length: 0\r\n\r\n", len = 41}}
        dset_len = 32712
#6  0x00007fc7fdae6764 in t_reply (t=0x7fc80def9b88, p_msg=0x7fc7ff437b90, code=487, text=0x7fc7fdba0a2b "Request canceled") at t_reply.c:1717
        reason = {s = 0x7fc7fdba0a2b "Request canceled", len = 16}
#7  0x00007fc7fdb756ee in e2e_cancel (cancel_msg=0x7fc9380cade8, t_cancel=0x7fc80e3c7818, t_invite=0x7fc80def9b88) at t_fwd.c:1315
        cancel_bm = 0
        reason = 0xb27
        free_reason = 32764
        i = -965508272
        lowest_error = 0
        ret = 940025184
        tmcb = {req = 0x101800000000, rpl = 0x7fc7fdb7d7f8, param = 0x555b10ab00a0 <_xavi_list_head>, code = 279644088, flags = 21851, branch = 0, t_rbuf = 0xc6738350, dst = 0x7fc80def9b88, send_buf = {s = 0x7fc80e3cb990 "\373E\001", len = 276174472}}
        __func__ = "e2e_cancel"
#8  0x00007fc7fdb79162 in t_forward_nonack (t=0x7fc80e3c7818, p_msg=0x7fc9380cade8, proxy=0x0, proto=0) at t_fwd.c:1647
        branch_ret = 0
        lowest_ret = 1
        added_branches = 1213011861
        first_branch = 0
        i = 32764
        t_invite = 0x7fc80def9b88
        success_branch = -965506688
        try_new = 21851
        lock_replies = 273118466
        backup_bflags = 0
        obranch = {uri = {s = 0x555b107a9833 "INFO", len = 960495616}, dst_uri = {s = 0x7ffcc6738430 "\260\205s\306\374\177", len = -39223825}, q = -965508160, path = {s = 0x7fc7fc8d47dd <pkg_proc_update_stats+115> "H\213\r\034[ ", len = -252645136}, flags = 0, force_socket = 0x10800000, ruid = {s = 0x7fc9380cade8 "\373E\001", len = 4198584}, instance = {s = 0x54ce70 <error: Cannot access memory at address 0x54ce70>, len = 17856448}, location_ua = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 65}, otcpid = 0}
        __func__ = "t_forward_nonack"
#9  0x00007fc7fdb7a6b3 in t_forward_cancel (p_msg=0x7fc9380cade8, proxy=0x0, proto=0, tran=0x7ffcc67386f0) at t_fwd.c:1853
        t_invite = 0x7fc70000000e
        t = 0x7fc80e3c7818
        ret = 32713
        new_tran = 1
        dst = {send_sock = 0xd68, to = {s = {sa_family = 64441, sa_data = "^\365\307\177\000\000`\212s\306\374\177\000"}, sin = {sin_family = 64441, sin_port = 62814, sin_addr = {s_addr = 32711}, sin_zero = "`\212s\306\374\177\000"}, sin6 = {sin6_family = 64441, sin6_port = 62814, sin6_flowinfo = 32711, sin6_addr = {__in6_u = {__u6_addr8 = "`\212s\306\374\177\000\000\260'\361\067\311\177\000", __u6_addr16 = {35424, 50803, 32764, 0, 10160, 14321, 32713, 0}, __u6_addr32 = {3329460832, 32764, 938551216, 32713}}}, sin6_scope_id = 935414184}, sas = {ss_family = 64441, __ss_padding = "^\365\307\177\000\000`\212s\306\374\177\000\000\260'\361\067\311\177\000\000\250I\301\067\311\177\000\000\000\000\000\000\000\000\000\000\240\206s\306\374\177\000\000\341S^\365\307\177\000\000\220\211s\306\374\177\000\000`\213s\306\374\177\000\000\220x\360\067\311\177\000\000\200\211s\306\374\177\000\000ȅs\306\374\177\000\000\020\000\000\000\060\000\000\000\360\205s\306\374\177\000\000P\207s\306\374\177\000", __ss_align = 0}}, id = 0, send_flags = {f = 32711, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        host = {s = 0x7ffcc6738560 "", len = 46}
        port = 0
        comp = 32713
        __func__ = "t_forward_cancel"
#10 0x00007fc7fdb501a0 in t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, proto=0, replicate=0) at t_funcs.c:239
        ret = 0
        new_tran = 939088312
        t = 0x7ffcc6738900
        dst = {send_sock = 0x7fc937c05468, to = {s = {sa_family = 10160, sa_data = "\361\067\311\177\000\000\020\210s\306\374\177\000"}, sin = {sin_family = 10160, sin_port = 14321, sin_addr = {s_addr = 32713}, sin_zero = "\020\210s\306\374\177\000"}, sin6 = {sin6_family = 10160, sin6_port = 14321, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "\020\210s\306\374\177\000\000\341S^\365\307\177\000", __u6_addr16 = {34832, 50803, 32764, 0, 21473, 62814, 32711, 0}, __u6_addr32 = {3329460240, 32764, 4116599777, 32711}}}, sin6_scope_id = 23}, sas = {ss_family = 10160, __ss_padding = "\361\067\311\177\000\000\020\210s\306\374\177\000\000\341S^\365\307\177\000\000\027\000\000\000W\024\365h\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\262\336\067\311\177\000\000Іs\306\374\177\000\000\300\210s\306\374\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000", __ss_align = 140723637947776}}, id = 272622906, send_flags = {f = 21851, blst_imask = 0}, proto = -32 '\340', proto_pad0 = -120 '\210', proto_pad1 = -14733}
        port = 0
        host = {s = 0x555b10761688 "", len = -178324551}
        comp = 0
        __func__ = "t_relay_to"
#11 0x00007fc7fdb054da in _w_t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, force_proto=0) at tm.c:1752
        t = 0x0
        res = 32764
        __func__ = "_w_t_relay_to"
#12 0x00007fc7fdb06825 in w_t_relay (p_msg=0x7fc9380cade8, _foo=0x0, _bar=0x0) at tm.c:1952
No locals.
#13 0x0000555b103fe4b2 in do_action (h=0x7ffcc67390b0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1076
        ret = -5
        v = 1
        dst = {send_sock = 0x7fc937deaff0, to = {s = {sa_family = 44520, sa_data = "\f8\311\177\000\000\253'\021\375\307\177\000"}, sin = {sin_family = 44520, sin_port = 14348, sin_addr = {s_addr = 32713}, sin_zero = "\253'\021\375\307\177\000"}, sin6 = {sin6_family = 44520, sin6_port = 14348, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "\253'\021\375\307\177\000\000\320\n\220\004\310\177\000", __u6_addr16 = {10155, 64785, 32711, 0, 2768, 1168, 32712, 0}, __u6_addr32 = {4245759915, 32711, 76548816, 32712}}}, sin6_scope_id = 276174472}, sas = {ss_family = 44520, __ss_padding = "\f8\311\177\000\000\253'\021\375\307\177\000\000\320\n\220\004\310\177\000\000\210\026v\020[U\000\000\210\026v\020\001\000\000\000\000\215s\306\374\177\000\000s\321^\365\307\177\000\000\000\000\000\000\000\000\000\000,\215s\306\374\177\000\000\200'\f8\311\177\000\000.\000\000\000\307\177\000\000\004\000\000\000\002", '\000' <repeats 11 times>, "\060\215s\306\374\177\000\000\210\026v\020[U\000", __ss_align = 0}}, id = 1212490240, send_flags = {f = 32713, blst_imask = 0}, proto = 51 '3', proto_pad0 = -104 '\230', proto_pad1 = 4218}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7fc937c05468
        len = 0
        user = 0
        uri = {user = {s = 0x555b10d24db0 "UTC", len = 938506384}, passwd = {s = 0x7fc937deb068 "\360\036\361\067\311\177", len = -49207158}, host = {s = 0x7ffcc6738d30 "\373\377\377\377\374\177", len = 0}, port = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, params = {s = 0x2e <error: Cannot access memory at address 0x2e>, len = 1212490383}, sip_params = {s = 0x0, len = 48}, headers = {s = 0x7ffcc6738c60 "\250I\301\067\311\177", len = -965506176}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (unknown: 76548816), transport = {s = 0x555b107a9833 "INFO", len = 0}, ttl = {s = 0x7fc7fd11288a "", len = 935534040}, user_param = {s = 0x7ffcc6738be0 " \214s\306\374\177", len = -178372384}, maddr = {s = 0x7fc7ffffffff "", len = 76548816}, method = {s = 0x555b10761688 "", len = 276174472}, lr = {s = 0x7ffcc6738c20 "P\214s\306\374\177", len = -178335373}, r2 = {s = 0x7ffcc6738c20 "P\214s\306\374\177", len = -965505972}, gr = {s = 0x4c6738ce8 <error: Cannot access memory at address 0x4c6738ce8>, len = -49207385}, transport_val = {s = 0x77748ac400000004 <error: Cannot access memory at address 0x77748ac400000004>, len = 0}, ttl_val = {s = 0x7ffcc6738c50 ".", len = 274214092}, user_param_val = {s = 0x4c6738ce8 <error: Cannot access memory at address 0x4c6738ce8>, len = -49236417}, maddr_val = {s = 0x7fc7fd11288a "", len = -49207158}, method_val = {s = 0x2e <error: Cannot access memory at address 0x2e>, len = 940320640}, lr_val = {s = 0x7fc937c149a8 "\341\236\377\373\307\177", len = 6}, r2_val = {s = 0x7fc937c31dd8 "LPB41KT ", len = 940320640}, gr_val = {s = 0x88c6738cc0 <error: Cannot access memory at address 0x88c6738cc0>, len = 0}}
        next_hop = {user = {s = 0x7fc9484cfa0b "%H:%M:%S", len = 24}, passwd = {s = 0x7ffcc6738a70 "3\230z\020[U", len = 282777392}, host = {s = 0x555b10dad720 "", len = 1215316096}, port = {s = 0x7fc948707b00 <main_arena> "", len = 8208}, params = {s = 0x79 <error: Cannot access memory at address 0x79>, len = 1212061465}, sip_params = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1212034094}, headers = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 282761040}, port_no = 35472, proto = 50803, type = 32764, flags = (unknown: 1215316096), transport = {s = 0x555b00000001 <error: Cannot access memory at address 0x555b00000001>, len = 282761040}, ttl = {s = 0x0, len = 1215316096}, user_param = {s = 0x555b10da9750 "X{pH\311\177", len = 1}, maddr = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 11}, method = {s = 0x555b10da9750 "X{pH\311\177", len = -965506200}, lr = {s = 0x15 <error: Cannot access memory at address 0x15>, len = 1212489561}, r2 = {s = 0x555b107a9833 "INFO", len = -49206466}, gr = {s = 0x7ffcc6738bf0 " \214s\306\374\177", len = 1652854916}, transport_val = {s = 0x555b10dad730 "<142>May 18 06:21:56 /root/mykamailio/sbin/kamailio[67117]: INFO: LPB41KT [d94ad953] RELAY: Relaying to 10.64.1.44 (ru)\n", len = 120}, ttl_val = {s = 0x0, len = 276598612}, user_param_val = {s = 0x7fc937f08840 "\031", len = -965505768}, maddr_val = {s = 0x7fc9380cade8 "\373E\001", len = 276174472}, method_val = {s = 0x0, len = 1212490240}, lr_val = {s = 0x1500000038 <error: Cannot access memory at address 0x1500000038>, len = 6}, r2_val = {s = 0x7a00000004 <error: Cannot access memory at address 0x7a00000004>, len = 3}, gr_val = {s = 0x0, len = 0}}
        u = 0x0
        port = 0
        dst_host = 0x7fc804900c10
        i = 934727696
        flags = 32713
        avp = 0x7ffcc6738ec0
        st = {flags = 282785584, id = 21851, name = {n = 1215331072, s = {s = 0x7fc948707b00 <main_arena> "", len = 0}, re = 0x7fc948707b00 <main_arena>}, avp = 0x90}
        sct = 0x555b107a9833
        sjt = 0x7fc948452200 <__syslog>
        rve = 0x7ffcc6738ec0
        mct = 0x0
        rv = 0x555b10dad720
        rv1 = 0x7fc937b6d010
        c1 = {cache_type = 1215326240, val_type = 32713, c = {avp_val = {n = 8, s = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, re = 0x8}, pval = {rs = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, ri = 1212272350, flags = 32713}}, i2s = "3\230z67117\373\037", '\000' <repeats 11 times>}
        s = {s = 0x555b10dad73c "06:21:56 /root/mykamailio/sbin/kamailio[67117]: INFO: LPB41KT [d94ad953] RELAY: Relaying to 10.64.1.44 (ru)\n", len = 1213011858}
        srevp = {0x7fc937f161a0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6738900, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#14 0x0000555b1040c449 in run_actions (h=0x7ffcc67390b0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f161a0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 939040248, tz_dsttime = 32713}
        tdiff = 960495616
        __func__ = "run_actions"
#15 0x0000555b1040caf6 in run_actions_safe (h=0x7ffcc673b6d0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {93849606559368, 8478727960045658726, 0, 140502477644288, 93849606854707, 5255462912, 8478727960666415718, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {140723637949416, 0, 0, 140502204241990, 93849606559368, 0, 140502477644288, 93849606854707, 5255462912, 140723637949120, 93849602810890, 7624429984, 140497046735760, 140723637948832, 140496791814368, 140502203705832}}}}}
        ret = -965504028
        ign_on_break = 0
#16 0x0000555b103c9569 in rval_get_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, i=0x7ffcc6739558, rv=0x7fc937f162f8, cache=0x0) at core/rvalue.c:915
        r_avp = 0x7fc93807dfe0
        avp_val = {n = 1, s = {s = 0x7ffc00000001 <error: Cannot access memory at address 0x7ffc00000001>, len = -97950189}, re = 0x7ffc00000001}
        pval = {rs = {s = 0x7fc937f0ffc8 "Y\377\360\067\311\177", len = 940355048}, ri = 0, flags = 0}
        tmp = {s = 0x7fc7fa2d2866 "rtpengine", len = -965504064}
        s = 0x0
        r = 32711
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#17 0x0000555b103ce40a in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc6739558, rve=0x7fc937f162f0) at core/rvalue.c:1913
        i1 = 1
        i2 = 0
        ret = -1
        c1 = {cache_type = 940355048, val_type = 32713, c = {avp_val = {n = 938570632, s = {s = 0x7fc937f17388 "\232\a", len = 935352296}, re = 0x7fc937f17388}, pval = {rs = {s = 0x7fc937f17388 "\232\a", len = 935352296}, ri = -97805992, flags = 14}}, i2s = "p\225s\306\374\177\000\000\341S^\365\307\177\000\000\000\000\000\000\001"}
        c2 = {cache_type = 276469811, val_type = 21851, c = {avp_val = {n = 960495616, s = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965504000}, re = 0x139400000}, pval = {rs = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965504000}, ri = 272425654, flags = 21851}}, i2s = "\020\224s\306\374\177\000\000\000\000\000\000\000\000\000\000h\000\361\067\311\177"}
        rv1 = 0x7fc948452200 <__syslog>
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#18 0x0000555b103ce84f in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc6739a8c, rve=0x7fc937f16a20) at core/rvalue.c:1921
        i1 = 1212490240
        i2 = 0
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = -176175080, s = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, re = 0x7fc7f57fc818 <_dbg_action_list+344>}, pval = {rs = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, ri = 938570632, flags = 32713}}, i2s = "`\226s\306\374\177\000\000\000\000\000\000\000\000\000\000p\225s\306\374\177"}
        c2 = {cache_type = 4197187347, val_type = 32711, c = {avp_val = {n = 940355048, s = {s = 0x7fc9380cade8 "\373E\001", len = -49207381}, re = 0x7fc9380cade8}, pval = {rs = {s = 0x7fc9380cade8 "\373E\001", len = -49207381}, ri = 76548816, flags = 32712}}, i2s = "\210\026v\020[U\000\000\210\026v\020\001\000\000\000@\225s\306\374\177"}
        rv1 = 0x7fc93802a510
        rv2 = 0x100000011
        __func__ = "rval_expr_eval_int"
#19 0x0000555b103fdf6e in do_action (h=0x7ffcc673b6d0, a=0x7fc937f17388, msg=0x7fc9380cade8) at core/action.c:1052
        ret = -5
        v = 0
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "@9\001\000\000\000\060\232s\306\374\177\000"}, sin = {sin_family = 0, sin_port = 14656, sin_addr = {s_addr = 1}, sin_zero = "0\232s\306\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 14656, sin6_flowinfo = 1, sin6_addr = {__in6_u = {__u6_addr8 = "0\232s\306\374\177\000\000\214\242\260\375\307\177\000", __u6_addr16 = {39472, 50803, 32764, 0, 41612, 64944, 32711, 0}, __u6_addr32 = {3329464880, 32764, 4256211596, 32711}}}, sin6_scope_id = 3329465008}, sas = {ss_family = 0, __ss_padding = "@9\001\000\000\000\060\232s\306\374\177\000\000\214\242\260\375\307\177\000\000\260\232s\306\374\177", '\000' <repeats 18 times>, "\350\255\f8\311\177\000\000\340\240s\306\374\177\000\000\262\344?\020[U\000\000\000\000\000\000\000\000\000\000\340ֶ7\000\000\000\000`\233s\306\374\177\000\000\350\255\f8\311\177\000\000\060/\305\067\311\177\000\000\240\242s\306\374\177\000", __ss_align = 140723637953056}}, id = -965500576, send_flags = {f = 32764, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -32 '\340', proto_pad1 = 18545}
        tmp = 0x7fc937c74ab8 "\002"
        new_uri = 0x7fc937c48800 "\001"
        end = 0xfe380cade8 <error: Cannot access memory at address 0xfe380cade8>
        crt = 0x7fc937c74b50 "\001"
        cmd = 0x7fc937c057e8
        len = 32711
        user = -178367519
        uri = {user = {s = 0x7ffcc67398b0 "\340\230s\306\374\177", len = -178335373}, passwd = {s = 0x555b107a9833 "INFO", len = -965502756}, host = {s = 0x2c67398c0 <error: Cannot access memory at address 0x2c67398c0>, len = -38215845}, port = {s = 0x7af200000012 <error: Cannot access memory at address 0x7af200000012>, len = 0}, params = {s = 0x7ffcc67398e0 "\200\231s\306\374\177", len = 274214092}, sip_params = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 233806760}, headers = {s = 0x555b107a9833 "INFO", len = 960495616}, port_no = 39296, proto = 50803, type = 32764, flags = (unknown: 4256166576), transport = {s = 0x37c6f930 <error: Cannot access memory at address 0x37c6f930>, len = 940355048}, ttl = {s = 0x7ffcc673a010 "\346\017MH\311\177", len = 80}, user_param = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1211905118}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x7ffcc6739980 "\300\231s\306\374\177", len = 233806728}, r2 = {s = 0x0, len = 276174472}, gr = {s = 0x0, len = 1212490240}, transport_val = {s = 0x555b107a9833 "INFO", len = 960495616}, ttl_val = {s = 0x7ffcc67399c0 "", len = -38799735}, user_param_val = {s = 0x7ffcc673a020 "\001\200\255", <incomplete sequence \373>, len = 0}, maddr_val = {s = 0x0, len = 940355048}, method_val = {s = 0x7fc9380cade8 "\373E\001", len = 935669552}, lr_val = {s = 0x7ffcc6739a00 "0\232s\306\374\177", len = -38755968}, r2_val = {s = 0x555b00000000 <error: Cannot access memory at address 0x555b00000000>, len = 940355048}, gr_val = {s = 0x0, len = 1212490240}}
        next_hop = {user = {s = 0x7ffcc6739800 "\340\230s\306\374\177", len = -39278603}, passwd = {s = 0x0, len = 0}, host = {s = 0x44c67397d0 <error: Cannot access memory at address 0x44c67397d0>, len = 935764248}, port = {s = 0x7ffcc6739864 "[U", len = 940355048}, params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549264}, sip_params = {s = 0x555b107a9833 "INFO", len = 960495616}, headers = {s = 0x1c6739790 <error: Cannot access memory at address 0x1c6739790>, len = 76549264}, port_no = 38800, proto = 50803, type = 32764, flags = (unknown: 4116594912), transport = {s = 0x7fc7fdb7d7fa "", len = 76549264}, ttl = {s = 0x555b10761688 "", len = 276174472}, user_param = {s = 0x7ffcc67397d0 "", len = -178335373}, maddr = {s = 0x7fc7fdecbe08 "\030x<\016\310\177", len = -965502980}, method = {s = 0x23807a9a8 <error: Cannot access memory at address 0x23807a9a8>, len = -38283272}, lr = {s = 0x7af200000012 <error: Cannot access memory at address 0x7af200000012>, len = 0}, r2 = {s = 0x7ffcc6739800 "\340\230s\306\374\177", len = 274214092}, gr = {s = 0x2c6739800 <error: Cannot access memory at address 0x2c6739800>, len = -38283272}, transport_val = {s = 0x555b107a9833 "INFO", len = 233806760}, ttl_val = {s = 0x7ffcc67398e0 "\200\231s\306\374\177", len = -39258348}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549264}, maddr_val = {s = 0x7fc937c7e4a0 "0\344\307\067\311\177", len = -178324551}, method_val = {s = 0x1c6739870 <error: Cannot access memory at address 0x1c6739870>, len = 76549264}, lr_val = {s = 0x7ffcc6739870 "\260\230s\306\374\177", len = -178372384}, r2_val = {s = 0x7fc7fdb8df5d "", len = 76549264}, gr_val = {s = 0x555b10761688 "", len = 276174472}}
        u = 0x7ffcc6739db0
        port = 0
        dst_host = 0x7ffcc6739fe0
        i = 38
        flags = 32711
        avp = 0x555b107a9833
        st = {flags = 3329464048, id = 32764, name = {n = 274214092, s = {s = 0x555b10582ccc <get_debug_level+74> "\205\300u\005\213E\374\353\036\213\005\231\264K", len = 935457704}, re = 0x555b10582ccc <get_debug_level+74>}, avp = 0x7fc7fdb7d7f8}
        sct = 0x0
        sjt = 0x0
        rve = 0x7fc937f16a20
        mct = 0x0
        rv = 0x0
        rv1 = 0x7fc937c53eb0
        c1 = {cache_type = 3329464000, val_type = 32764, c = {avp_val = {n = -178335373, s = {s = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416> "\307\005G\001!", len = 279200042}, re = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416>}, pval = {rs = {s = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416> "\307\005G\001!", len = 279200042}, ri = -965503252, flags = 32764}}, i2s = "P\227s\306\002\000\000\000\370\327\267\375\307\177\000\000\022\000\000\000\362z"}
        s = {s = 0x555b10761688 "", len = 276174472}
        srevp = {0x7fc937f17388, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739660, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#20 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937f0fca0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f17388
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935673520, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#21 0x0000555b103fa952 in do_action (h=0x7ffcc673b6d0, a=0x7fc937c53eb0, msg=0x7fc9380cade8) at core/action.c:700
        ret = -5
        v = 32713
        dst = {send_sock = 0x100000000, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000v\000\000\000\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "v\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "v\000\000\000\000\000\000\000\210\026v\020[U\000", __u6_addr16 = {118, 0, 0, 0, 5768, 4214, 21851, 0}, __u6_addr32 = {118, 0, 276174472, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000v\000\000\000\000\000\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000\200\243s\306\374\177\000\000\366\312@\020[U\000\000\000{pH\311\177\000\000\350\255\f8\311\177\000\000\060/\305\067\311\177\000\000жs\306\374\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\311\177\000", __ss_align = 93849606559368}}, id = 676438630, send_flags = {f = 32296, blst_imask = 30122}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x1500000038 <error: Cannot access memory at address 0x1500000038>
        end = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>
        crt = 0x555b107a9833 "INFO"
        cmd = 0x7fc937c73b70
        len = 32711
        user = -178367519
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 276174472}, passwd = {s = 0x0, len = 1212490240}, host = {s = 0x555b107a9833 "INFO", len = 960495616}, port = {s = 0x7ffcc673a270 "\200\243s\306\374\177", len = 272680009}, params = {s = 0x6c673a130 <error: Cannot access memory at address 0x6c673a130>, len = 8180}, sip_params = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 276174472}, headers = {s = 0x7ffcc673a3a0 "8", len = 940355048}, port_no = 12080, proto = 14277, type = 32713, flags = (unknown: 3329467040), transport = {s = 0x555b10d24db0 "UTC", len = -965500544}, ttl = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 0}, user_param = {s = 0x7ffcc673a220 "0\367\332\020[U", len = -965500576}, maddr = {s = 0x10000043b <error: Cannot access memory at address 0x10000043b>, len = 67667272}, method = {s = 0x3635c673a236 <error: Cannot access memory at address 0x3635c673a236>, len = -965500356}, lr = {s = 0x7ffcc673a238 "", len = -965500356}, r2 = {s = 0x0, len = 67667272}, gr = {s = 0x2700000000 <error: Cannot access memory at address 0x2700000000>, len = -41657984}, transport_val = {s = 0x7fc9380caff0 "\n\247\277\062", len = 10}, ttl_val = {s = 0xd00000003 <error: Cannot access memory at address 0xd00000003>, len = 282777404}, user_param_val = {s = 0x555b10dad73c "06:21:56 /root/mykamailio/sbin/kamailio[67117]: INFO: LPB41KT [d94ad953] RELAY: Relaying to 10.64.1.44 (ru)\n", len = 1213011858}, maddr_val = {s = 0x7fc948706820 <_nl_C_locobj> " GpH\311\177", len = 8}, method_val = {s = 0x0, len = 1212272350}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x555b10daf730 "", len = 1215331072}}
        next_hop = {user = {s = 0x68f5145700000017 <error: Cannot access memory at address 0x68f5145700000017>, len = 0}, passwd = {s = 0x7ffcc6739f70 "P\240s\306\374\177", len = 274214092}, host = {s = 0x6c673a1a0 <error: Cannot access memory at address 0x6c673a1a0>, len = -107129541}, port = {s = 0x7ffcc673a1c0 "\003", len = 67667272}, params = {s = 0x7ffcc673a050 "\313\320\323\020[U", len = -107759048}, sip_params = {s = 0x7ffcc6739fb0 "\300\241s\306\374\177", len = 274214092}, headers = {s = 0x6c673a1e0 <error: Cannot access memory at address 0x6c673a1e0>, len = -965500516}, port_no = 41376, proto = 50803, type = 32764, flags = (unknown: 3329466800), transport = {s = 0x7ffcc673a1c0 "\003", len = 0}, ttl = {s = 0x7fc937c05e40 "k\345\270\375\307\177", len = 940355048}, user_param = {s = 0x555b1076c64b "core", len = -965500452}, maddr = {s = 0x7ffcc673a020 "\001\200\255", <incomplete sequence \373>, len = 282317003}, method = {s = 0x7ffcc673a148 "", len = 282317003}, lr = {s = 0x7ffcc673a428 "\350@\305\067\311\177", len = -965500000}, r2 = {s = 0x7fc9484d0fe6 "%hu%n:%hu%n:%hu%n", len = 1211988903}, gr = {s = 0xfbad8001 <error: Cannot access memory at address 0xfbad8001>, len = 282317004}, transport_val = {s = 0x555b10d3d0cc "", len = 282317003}, ttl_val = {s = 0x555b10d3d0cb "0", len = 282317003}, user_param_val = {s = 0x555b10d3d0cb "0", len = 282317003}, maddr_val = {s = 0x555b10d3d0cc "", len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x10761688 <error: Cannot access memory at address 0x10761688>, len = 276174472}, gr_val = {s = 0x7ffcc6730000 "", len = 0}}
        u = 0x7ffcc673a5f0
        port = 0
        dst_host = 0x555b107a9833
        i = 29
        flags = 32711
        avp = 0x7ffcc673a520
        st = {flags = 3329466176, id = 32764, name = {n = -178335373, s = {s = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416> "\307\005G\001!", len = 1}, re = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416>}, avp = 0x7ffcc6739f6c}
        sct = 0x555b10da9750
        sjt = 0xb
        rve = 0x7fc9380c0030
        mct = 0xffffffff
        rv = 0x110761688
        rv1 = 0x7fc937c540e8
        c1 = {cache_type = 3329466112, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, ri = -965499840, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = 274517235}
        srevp = {0x7fc937c53eb0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739ea0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#22 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c53080, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c53eb0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935674088, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#23 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937c540e8, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x100000000, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\367\000\000\000\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\367\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\367\000\000\000\000\000\000\000\210\026v\020[U\000", __u6_addr16 = {247, 0, 0, 0, 5768, 4214, 21851, 0}, __u6_addr32 = {247, 0, 276174472, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\367\000\000\000\000\000\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000\300\253s\306\374\177\000\000\366\312@\020[U\000\000\000{pH\311\177\000\000\350\255\f8\311\177\000\000\300!\305\067\311\177\000\000жs\306\374\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\311\177\000", __ss_align = 93849606559368}}, id = 970039910, send_flags = {f = 32296, blst_imask = 30122}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x1500000038 <error: Cannot access memory at address 0x1500000038>
        end = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>
        crt = 0x555b107a982c "NOTICE"
        cmd = 0x7fc937c10c18
        len = 32711
        user = -178367519
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 276174472}, passwd = {s = 0x0, len = 1212490240}, host = {s = 0x555b107a9833 "INFO", len = 960495616}, port = {s = 0x7ffcc673aab0 "\300\253s\306\374\177", len = 272680009}, params = {s = 0x6c673a970 <error: Cannot access memory at address 0x6c673a970>, len = 8180}, sip_params = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 276174472}, headers = {s = 0x7ffcc673abe0 "8", len = 940355048}, port_no = 8640, proto = 14277, type = 32713, flags = (unknown: 3329469152), transport = {s = 0x555b10d24db0 "UTC", len = -965498432}, ttl = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = -965497688}, user_param = {s = 0x7ffcc673aa60 "0\367\332\020[U", len = -965498464}, maddr = {s = 0x7fc937f0f368 "", len = 940355048}, method = {s = 0x3635c673aa76 <error: Cannot access memory at address 0x3635c673aa76>, len = -965498244}, lr = {s = 0x7ffcc673aa78 "", len = -965498244}, r2 = {s = 0x7fc937f95ab8 "\001", len = -965497744}, gr = {s = 0x2737f0f368 <error: Cannot access memory at address 0x2737f0f368>, len = 276174472}, transport_val = {s = 0x0, len = 1212490240}, ttl_val = {s = 0x555b107a9833 "INFO", len = 960495616}, user_param_val = {s = 0x7ffcc673ab80 "\360\254s\306\374\177", len = 272427137}, maddr_val = {s = 0x7fc948706820 <_nl_C_locobj> " GpH\311\177", len = 8}, method_val = {s = 0x0, len = 1212272350}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x555b10daf730 "", len = 1215331072}}
        next_hop = {user = {s = 0x7ffcc673a8a0 "\020\252s\306\374\177", len = 272406603}, passwd = {s = 0x7ffcc673a7b0 "\350\255\f8\311\177", len = 274214092}, host = {s = 0x6c673a9e0 <error: Cannot access memory at address 0x6c673a9e0>, len = 0}, port = {s = 0x7fc937c4d3f8 "\a", len = -965498056}, params = {s = 0x7fc9380cade8 "\373E\001", len = -965495088}, sip_params = {s = 0x4c673a820 <error: Cannot access memory at address 0x4c673a820>, len = 276653360}, headers = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = -965498404}, port_no = 43488, proto = 50803, type = 32764, flags = (unknown: 3329468912), transport = {s = 0x7ffcc673aa00 "3\230z\020[U", len = 0}, ttl = {s = 0x7fc937c149a8 "\341\236\377\373\307\177", len = 940355048}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 282317003}, method = {s = 0x7ffcc673a988 "\250\254s\306\374\177", len = 282317003}, lr = {s = 0x7ffcc673ac68 "\300E\305\067\311\177", len = -965497888}, r2 = {s = 0x7fc9484d0fe6 "%hu%n:%hu%n:%hu%n", len = 1211988903}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x555b10d3d0cc "", len = 276174472}, ttl_val = {s = 0x0, len = 1212490240}, user_param_val = {s = 0x555b107a9833 "INFO", len = 960495616}, maddr_val = {s = 0x7ffcc673aa10 "\200\253s\306\374\177", len = 272425994}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x7fc937c4d3f0 "\001", len = -965498056}, gr_val = {s = 0x7fc9380cade8 "\373E\001", len = -965495088}}
        u = 0x7ffcc673ae30
        port = 0
        dst_host = 0x555b107a982c
        i = -965497728
        flags = 32764
        avp = 0x7ffcc673ad60
        st = {flags = 3329468288, id = 32764, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x555b105cf57c <pv_value_destroy+175>}
        sct = 0x555b10da9750
        sjt = 0xb
        rve = 0x7fc937c53698
        mct = 0xffffffff
        rv = 0x10761688
        rv1 = 0x7fc937c545c0
        c1 = {cache_type = 3329468224, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, ri = -965497728, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = 76549136}
        srevp = {0x7fc937c540e8, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673a6e0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#24 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c52c10, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c540e8
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935675328, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#25 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937c545c0, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "@9\001\000\000\000\200\264s\306\374\177\000"}, sin = {sin_family = 0, sin_port = 14656, sin_addr = {s_addr = 1}, sin_zero = "\200\264s\306\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 14656, sin6_flowinfo = 1, sin6_addr = {__in6_u = {__u6_addr8 = "\200\264s\306\374\177\000\000\374:i\020[U\000", __u6_addr16 = {46208, 50803, 32764, 0, 15100, 4201, 21851, 0}, __u6_addr32 = {3329471616, 32764, 275331836, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "@9\001\000\000\000\200\264s\306\374\177\000\000\374:i\020[U\000\000\000\000\000\000\000\000\000\000\250\251\a8\311\177\000\000AA\244\020[U\000\000\062@\244\020[U\000\000 \263s\306\374\177\000\000\020ж7\311\177\000\000`\263s\306\374\177\000\000\335G\215\374\307\177\000\000\360\360\360\360", '\000' <repeats 14 times>, "\200\020\000\000\000\000\220>+\020\000\000\000", __ss_align = 4195464}}, id = 5554544, send_flags = {f = 0, blst_imask = 0}, proto = -64 '\300', proto_pad0 = 119 'w', proto_pad1 = 1285}
        tmp = 0x7fc804900c10 ""
        new_uri = 0x7fc937f9daf8 "\002"
        end = 0x555b106d4545 <parse_method_name+2608> "\205\300\017\224\300\017\266\300H\205\300\017\204\261\003"
        crt = 0x1c673b510 <error: Cannot access memory at address 0x1c673b510>
        cmd = 0x7fc937c10c50
        len = 0
        user = 939121360
        uri = {user = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -965496436}, passwd = {s = 0x4c673b1a0 <error: Cannot access memory at address 0x4c673b1a0>, len = 276653360}, host = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, port = {s = 0x7ffcc673b190 "\300\262s\306\374\177", len = 274214092}, params = {s = 0x4004004f8 <error: Cannot access memory at address 0x4004004f8>, len = 276653360}, sip_params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, headers = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275281682}, port_no = 45520, proto = 50803, type = 32764, flags = (URI_SIP_USER_PHONE | unknown: 273118464), transport = {s = 0x0, len = 276598612}, ttl = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275030558}, user_param = {s = 0x7fc93807a9a8 "\001", len = 940025184}, maddr = {s = 0x7ffcc673b342 "\005\005", len = -965495997}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x555b107d6d88 <__func__.6797> "parse_via", len = 276659112}, r2 = {s = 0x1c673b250 <error: Cannot access memory at address 0x1c673b250>, len = 76549136}, gr = {s = 0x7ffcc673b250 "\220\262s\306\374\177", len = -178372384}, transport_val = {s = 0x555b107d6534 "", len = 76549136}, ttl_val = {s = 0x555b10761688 "", len = 276174472}, user_param_val = {s = 0x7ffcc673b290 "\300\262s\306\374\177", len = -178335373}, maddr_val = {s = 0x0, len = -965496132}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}, lr_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, r2_val = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 274214092}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}}
        next_hop = {user = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 2}, passwd = {s = 0x7fc93807a9a8 "\001", len = 0}, host = {s = 0x7fc93807ecc8 "\001", len = 939039512}, port = {s = 0x7a <error: Cannot access memory at address 0x7a>, len = 940043464}, params = {s = 0x0, len = 940026872}, sip_params = {s = 0x7fc937f89cd0 "\004", len = 939039512}, headers = {s = 0x7fc937f73958 "\003", len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x1c673b120 <error: Cannot access memory at address 0x1c673b120>, len = 76549136}, method_val = {s = 0x7ffcc673b120 "`\261s\306\374\177", len = -178372384}, lr_val = {s = 0x555b107d6534 "", len = 76549136}, r2_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 16}, gr_val = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -178335373}}
        u = 0x555b107df530 <__func__.6625>
        port = 0
        dst_host = 0x555b10761688
        i = 2
        flags = 21851
        avp = 0x1
        st = {flags = 65537, id = 45, name = {n = 279199744, s = {s = 0x555b10a44000 <buf> "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"..., len = 6}, re = 0x555b10a44000 <buf>}, avp = 0x555b10a44007 <buf+7>}
        sct = 0x7ffcc673b480
        sjt = 0x7fc804900c10
        rve = 0x7fc937c523f8
        mct = 0x1
        rv = 0x0
        rv1 = 0x555b10a44118 <buf+280>
        c1 = {cache_type = 279644096, val_type = 21851, c = {avp_val = {n = -965496932, s = {s = 0x7ffcc673af9c "[U", len = 279644080}, re = 0x7ffcc673af9c}, pval = {rs = {s = 0x7ffcc673af9c "[U", len = 279644080}, ri = -38237829, flags = 32711}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x7ffcc673af70 "", len = -178335373}
        srevp = {0x7fc937c545c0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673af20, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#26 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c473c0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c545c0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 276690800, tz_dsttime = 21851}
        tdiff = 4116631923
        __func__ = "run_actions"
#27 0x0000555b1040cbbe in run_top_route (a=0x7fc937c473c0, msg=0x7fc9380cade8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {93849603950067, 4571428513, 140502205509096, 93849606559368, 4571141768, 140723637958544, 140496791851379, 140723637958560, 140723637958588, 18118908696, 93849606846109, 8004010816636452865, 0, 140723637958592, 93849606559368, 0}}}}}
        p = 0x7ffcc673b6d0
        ret = 276469811
        sfbk = 0
#28 0x0000555b1057b6e8 in receive_msg (buf=0x555b10a44000 <buf> "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"..., len=321, rcv_info=0x7ffcc673bd40) at core/receive.c:423
        msg = 0x7fc9380cade8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 15 times>, 1}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x555b10a44000 <buf> "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"..., len = 321}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcc673b8b0, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcc673bd40, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#29 0x0000555b10447d59 in udp_rcv_loop () at core/udp_server.c:543
        len = 321
        buf = "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"...
        tmp = 0x1e <error: Cannot access memory at address 0x1e>
        fromaddr = 0x7fc93807e930
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {851420938, 0}, addr32 = {851420938, 0, 0, 0}, addr16 = {42762, 12991, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277\062", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1019193098, 0}, addr32 = {1019193098, 0, 0, 0}, addr16 = {42762, 15551, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277<", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\247\277\062\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 851420938}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 851420938, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\247\277\062", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fc937bfff30, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "t\027\221\004\310\177\000\000t\027\221\004\001\000\000\000P\273s\306\374\177\000\000s\321^\365\307\177\000\000P\273s\306\374\177\000\000\220\267\331\020[U\000\000@\263\331\020[U\000\000\247\261s\306\374\177\000\000\220\261s\306\374\177\000\000\000\000\000\000\000\000\000\001", '\000' <repeats 20 times>, "\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000\000t\027\221\004\310\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000@\274s\306\374\177\000\000\005\067\346\356\307\177\000\000\177\252y\020[U\000\000\020\f\220\004\v\000\000\000t\027\221\004\310\177\000\000"...
        i = -1
        j = 130560
        l = 0
        __func__ = "udp_rcv_loop"
#30 0x0000555b1038de84 in main_loop () at main.c:1683
        i = 10
        pid = 0
        si = 0x7fc937bfff30
        si_desc = "udp receiver child=10 sock=edge.hipertel.local:5060\000EH\311\177\000\000\000\000\000\000\000\000\000\000\060\000\000\000\060\000\000\000\070\300s\306\374\177\000\000P\277s\306\374\177\000\000\250Nx\020[U\000\000\370\226\r8k\000\000\000\063\230z\020[U\000\000\360\226\n8\311\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#31 0x0000555b10398511 in main (argc=11, argv=0x7ffcc673c568) at main.c:2856
        cfg_stream = 0x555b10bef010
        c = -1
        r = 0
        tmp = 0x7ffcc673deba ""
        tmp_len = 32764
        port = -965491792
        proto = 32713
        ahost = 0x0
        aport = 0
        options = 0x555b10764348 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 900928915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7fc94926d040 <_rtld_global>
        p = 0x7ffcc673de72 "edge"
        st = {st_dev = 19, st_ino = 23307, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1641492636, tv_nsec = 884483965}, st_mtim = {tv_sec = 1599774907, tv_nsec = 42281020}, st_ctim = {tv_sec = 1599774907, tv_nsec = 42281020}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000 \232\004I\311\177\000\000\330\331&I\311\177\000\000\a\000\000\000\000\000\000\000\a\000\000\000\a\000\000\000\070\224\004I\311\177\000\000\060\302s\306\374\177\000\000\215F\005I\311\177\000\000\000\000\000\000\000\000\000\000\272J\005I\311\177", '\000' <repeats 11 times>, "\200\065\020[U", '\000' <repeats 13 times>, "\377\000\000\000\000", '\377' <repeats 11 times>, "\000\377\377\377\377GLIBC_2.2.5\000GLIB\000__f", '\000' <repeats 12 times>, "inite\000getpriorit", '\000' <repeats 136 times>...
        option_index = 0
        long_options = {{name = 0x555b107663d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x555b10761b1c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x555b107663db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x555b107663e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x555b107663e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x555b107663f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x555b107663fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x555b10766404 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x555b1076640f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x555b10766418 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x555b10766423 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007fc7fdacd78d in futex_get (lock=0x7fc80def9dd0) at ../../core/parser/../mem/../futexlock.h:121
        v = 1
        i = 0
#2  0x00007fc7fdacf75b in _lock (s=0x7fc80def9dd0) at lock.h:77
No locals.
#3  0x00007fc7fdaf2da7 in tm_reply_mutex_lock (t=0x7fc80def9b88) at t_reply.c:3063
        mypid = 67117
#4  0x00007fc7fdad8868 in _reply_light (trans=0x7fc80def9b88, buf=0x7fc937f956a0 "SIP/2.0 487 Request canceled\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nVia: SIP/2.0/UDP 191.0.0.1;branch=z9hG4bKsr-j4IPOlV7MGQKatycM.y7M.3wOBFsMmZ4Wx1LNSQL"..., len=536, code=487, to_tag=0x7fc7fddc04e0 <tm_tags> "fc3d4179ffdbaeed3a8b1e97891311fe-1e620000", to_tag_len=41, lock=1, bm=0x7ffcc6738150) at t_reply.c:480
        rb = 0x0
        buf_len = 4294967295
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}}
        onsend_params = {req = 0x7ffcc67380d0, rpl = 0x7fc7fddc0509, param = 0x0, code = 0, flags = 0, branch = 0, t_rbuf = 0xc6738070, dst = 0x0, send_buf = {s = 0x7fc700000000 <error: Cannot access memory at address 0x7fc700000000>, len = 76549264}}
        rt = 0
        backup_rt = 0
        ctx = {rec_lev = 279641888, run_flags = 21851, last_retcode = -965509168, jmp_env = {{__jmpbuf = {140723637944432, 300647710721, 0, 140502204241512, 93849606854707, 140502199881744, 140723637944240, 93849606559368}, __mask_was_saved = 0, __saved_mask = {__val = {140502477644288, 93849606854707, 5255462912, 140723637944592, 93849604452410, 140723637944656, 140723637944684, 140496957832080, 140496934186848, 140723637944752, 2094978531368, 0, 562949953421312, 140723637944496, 93849603943132, 1}}}}}
        bctx = 0x0
        pmsg = {id = 276469811, pid = 21851, tval = {tv_sec = 5255462912, tv_usec = 140723637942864}, fwd_send_flags = {f = 53068, blst_imask = 64948}, rpl_send_flags = {f = 32711, blst_imask = 0}, first_line = {type = 30992, flags = -14733, len = 32764, u = {request = {method = {s = 0x555b1040c449 <run_actions+2110> "\211E\304H\307\005\361gc", len = -965510872}, uri = {s = 0x30d00000000 <error: Cannot access memory at address 0x30d00000000>, len = 238842400}, version = {s = 0x7fc80e3c1d60 "", len = 32816}, method_value = 940355048}, reply = {version = {s = 0x555b1040c449 <run_actions+2110> "\211E\304H\307\005\361gc", len = -965510872}, status = {s = 0x30d00000000 <error: Cannot access memory at address 0x30d00000000>, len = 238842400}, reason = {s = 0x7fc80e3c1d60 "", len = 32816}, statuscode = 940355048}}}, via1 = 0x7fc937ffeb68, via2 = 0x7ffcc6737990, headers = 0x0, last_header = 0x488, parsed_flag = 7624423456, h_via1 = 0x7fc804900c10, h_via2 = 0x7ffcc6737820, callid = 0x7fc7f55e40e0 <futex_release+29>, to = 0x555b107ee6db, cseq = 0x7fc804900c10, from = 0x0, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0x0, authorization = 0x0, expires = 0x0, proxy_auth = 0x7fc800000000, supported = 0x0, require = 0x0, proxy_require = 0x7ffcc67378b0, unsupported = 0xf55ed173, allow = 0x510a4400b, event = 0x7fc9380cade8, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x7ffcc67378f0, user_agent = 0x0, server = 0x0, content_disposition = 0x0, diversion = 0x7fc80e3c1d60, rpid = 0x0, refer_to = 0x800000000, session_expires = 0x7fc80e3c1d30, min_se = 0x7fc937f950d0, sipifmatch = 0x30d, subscription_state = 0x0, date = 0x7fc80e3c1d60, identity = 0x7fc937f950d0, identity_info = 0x555b0000030d, pai = 0x30d00000000, ppi = 0x7fc80e3c7220, path = 0x7fc80e3c1d60, privacy = 0x7fc9380cade8, min_expires = 0x1, body = 0x7fc9380cb490, eoh = 0x2 <error: Cannot access memory at address 0x2>, unparsed = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, rcv = {src_ip = {af = 276469811, len = 1, u = {addrl = {140496934516032, 140723637942688}, addr32 = {4259296576, 32711, 3329456544, 32764}, addr16 = {46400, 64991, 32711, 0, 31136, 50803, 32764, 0}, addr = "@\265\337\375\307\177\000\000\240ys\306\374\177\000"}}, dst_ip = {af = 273077447, len = 21851, u = {addrl = {140497209007408, 140496934516032}, addr32 = {238820656, 32712, 4259296576, 32711}, addr16 = {7472, 3644, 32712, 0, 46400, 64991, 32711, 0}, addr = "0\035<\016\310\177\000\000@\265\337\375\307\177\000"}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 940356752, src_su = {s = {sa_family = 31312, sa_data = "s\306\374\177\000\000\352\037G\020[U\000"}, sin = {sin_family = 31312, sin_port = 50803, sin_addr = {s_addr = 32764}, sin_zero = "\352\037G\020[U\000"}, sin6 = {sin6_family = 31312, sin6_port = 50803, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 = "\352\037G\020[U\000\000\002\000\000\000\000\000\000", __u6_addr16 = {8170, 4167, 21851, 0, 2, 0, 0, 0}, __u6_addr32 = {273096682, 21851, 2, 0}}}, sin6_scope_id = 1212490240}, sas = {ss_family = 31312, __ss_padding = "s\306\374\177\000\000\352\037G\020[U\000\000\002\000\000\000\000\000\000\000\000\"EH\311\177\000\000\063\230z\020\b\000\000\000\060\035<\016\310\177\000\000f\242\221\203)~\252uf\242\321\354N\322\345 ", '\000' <repeats 32 times>, "\340\000\000\000\000\000\000\000\000\020\334\375", '\000' <repeats 11 times>, __ss_align = 0}}, bind_address = 0xc6737b50, proto = -112 '\220', proto_pad0 = -76 '\264', proto_pad1 = 14348}, buf = 0x2 <error: Cannot access memory at address 0x2>, len = 1212490240, new_uri = {s = 0x555b107a9833 "INFO", len = 960495616}, dst_uri = {s = 0x7ffcc6737b00 "\020|s\306\374\177", len = -38377848}, parsed_uri_ok = 279200227, parsed_uri = {user = {s = 0x7fc80e3c1d10 "", len = 238842400}, passwd = {s = 0x7fc80e3c1d10 "", len = 935333888}, host = {s = 0x7fc80e3c7220 "UPDATE sip:03101064233 at 172.17.3.12:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 172.16.6.14;branch=z9hG4bK0bc5.1cb4bcee359864991d244f651ff24bf2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK0bc5.2ecdd1653af798851"..., len = 781}, port = {s = 0x7fc9380cade8 "\373E\001", len = 0}, params = {s = 0x7fc9380cb490 "", len = 2}, sip_params = {s = 0x148452200 <error: Cannot access memory at address 0x148452200>, len = 8}, headers = {s = 0x502cc9a074 <error: Cannot access memory at address 0x502cc9a074>, len = -965510192}, port_no = 46224, proto = 14348, type = 32713, flags = URI_SIP_USER_PHONE, transport = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, ttl = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965510128}, user_param = {s = 0x7fc7fdb78d32 <t_send_branch+9771> "\205\300\017\204l\003", len = -965510192}, maddr = {s = 0x7fc7fdb70041 <add_uac+2493> "\017\267Eʃ\300\001\211\302H\213\205x\377\377\377f\211P\032H\203\275P\377\377\377", len = 0}, method = {s = 0x7fc9380cb490 "", len = 0}, lr = {s = 0x7fc9380cade8 "\373E\001", len = 1}, r2 = {s = 0x7fc80e3c1a70 "(\357\366\375\307\177", len = -965510128}, gr = {s = 0x7fc7fdb40ed2 <save_msg_lumps+2722> "\211Eă", <incomplete sequence \304>, len = 940355048}, transport_val = {s = 0x7fc80e3c5be8 "\372E\001", len = 0}, ttl_val = {s = 0x7fc7fdb7d7f8 "tm", len = 279642272}, user_param_val = {s = 0x555b10ab07b8 <def_list+24> "", len = -965510000}, maddr_val = {s = 0x1a70 <error: Cannot access memory at address 0x1a70>, len = 238836712}, method_val = {s = 0x7fc9380cb490 "", len = 2}, lr_val = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, r2_val = {s = 0x555b10420534 <get_branch_data+54> "\213\005\346)b", len = -965510016}, gr_val = {s = 0x7fc80e3c1d00 "", len = -965510128}}, parsed_orig_ruri_ok = 940356752, parsed_orig_ruri = {user = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1212490240}, passwd = {s = 0x555b107a9833 "INFO", len = 960495616}, host = {s = 0x7ffcc6737d70 "\020\177s\306'", len = -38297042}, port = {s = 0xc6737c50 <error: Cannot access memory at address 0xc6737c50>, len = 0}, params = {s = 0x7fc9380cade8 "\373E\001", len = 238819952}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, headers = {s = 0x7fc93807a9a8 "\001", len = 276598617}, port_no = 31904, proto = 50803, type = SIP_URI_T, flags = (unknown: 76549136), transport = {s = 0x7ffcc6737ca0 "\340|s\306\374\177", len = -178372384}, ttl = {s = 0x555b107c8f58 "", len = 76549136}, user_param = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = -252645136}, maddr = {s = 0x7ffcc6737ce0 "\020}s\306\374\177", len = -178335373}, method = {s = 0x8700000000 <error: Cannot access memory at address 0x8700000000>, len = -965509876}, lr = {s = 0x4fdb9d123 <error: Cannot access memory at address 0x4fdb9d123>, len = 276598612}, r2 = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, gr = {s = 0x7ffcc6737d10 "", len = 274214092}, transport_val = {s = 0x403e8c978 <error: Cannot access memory at address 0x403e8c978>, len = 276598612}, ttl_val = {s = 0x7ffcc6737e00 "\377\020z\020[U", len = 275030558}, user_param_val = {s = 0x7ffcc6737e00 "\377\020z\020[U", len = 275030754}, maddr_val = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = -38164549}, method_val = {s = 0x7fc7fdb9d120 "tm", len = 0}, lr_val = {s = 0x7fc7fdb9d238 <__func__.10856> "insert_tmcb", len = -38153949}, r2_val = {s = 0x28 <error: Cannot access memory at address 0x28>, len = -35909632}, gr_val = {s = 0x555b107a9833 "INFO", len = 960495616}}, add_rm = 0x27c6737f10, body_lumps = 0x555b10aaff20 <buff.5856>, reply_lump = 0x7fc7ff437d98, add_to_branch_s = "\000\000\000\000\000\000\000\000\003\000\000\000\r\000\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000`~s\306\374\177\000\000\213\005S\020[U\000\000\001", add_to_branch_len = 0, hash_index = 76549136, msg_flags = 32712, flags = 279641888, xflags = {21851, 4282613136}, set_global_address = {s = 0x1c6737e20 <error: Cannot access memory at address 0x1c6737e20>, len = 76549136}, set_global_port = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, force_send_socket = 0x555b107a10ff, path_vec = {s = 0x555b10653c7e <qm_info+46> "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b", len = -965509552}, instance = {s = 0x7fc937b6d010 "\001", len = -965509552}, reg_id = 934727696, ruid = {s = 0x7ffcc6737e90 "\300~s\306\374\177", len = -57849891}, location_ua = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, otcpid = 276824064, ldv = {flow = {decoded = 271266696, rcv = {src_ip = {af = 4198080, len = 0, u = {addrl = {5557368, 17856448}, addr32 = {5557368, 0, 17856448, 0}, addr16 = {52344, 84, 0, 0, 30656, 272, 0, 0}, addr = "x\314T\000\000\000\000\000\300w\020\001\000\000\000"}}, dst_ip = {af = 8, len = 0, u = {addrl = {65, 0}, addr32 = {65, 0, 0, 0}, addr16 = {65, 0, 0, 0, 0, 0, 0, 0}, addr = "A", '\000' <repeats 14 times>}}, src_port = 32448, dst_port = 50803, proto_reserved1 = 32764, proto_reserved2 = 273118466, src_su = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000T\217|\020\005\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "T\217|\020\005\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "T\217|\020\005\000\000\000\260\177s\306\374\177\000", __u6_addr16 = {36692, 4220, 5, 0, 32688, 50803, 32764, 0}, __u6_addr32 = {276598612, 5, 3329458096, 32764}}}, sin6_scope_id = 275030558}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000T\217|\020\005\000\000\000\260\177s\306\374\177\000\000\036\242d\020\000\000\000\000\260\177s\306\374\177\000\000\230\246d\020[U\000\000\210\026v\020[U\000\000\210\026v\020\001\000\000\000\373\020z\020[U\000\000s\321^\365\263\t\000\000\300Dz\020[U\000\000\261\027z\020[U\000\000 \002\000\000\000\000\000\000\020ж7\311\177\000\000\016\000\000\000n\365\023o", __ss_align = 0}}, bind_address = 0x7ffcc6737f50, proto = -52 '\314', proto_pad0 = 44 ',', proto_pad1 = 4184}}, vdata = 0x4c6737fd0}}
        keng = 0x0
        evname = {s = 0x7fc7fdb8a105 "tm:local-response-sent", len = 22}
        __func__ = "_reply_light"
#5  0x00007fc7fdadaa88 in _reply (trans=0x7fc80def9b88, p_msg=0x7fc7ff437b90, code=487, reason=0x7ffcc67381b0, lock=1) at t_reply.c:692
        len = 536
        buf = 0x7fc937f956a0 "SIP/2.0 487 Request canceled\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nVia: SIP/2.0/UDP 191.0.0.1;branch=z9hG4bKsr-j4IPOlV7MGQKatycM.y7M.3wOBFsMmZ4Wx1LNSQL"...
        dset = 0x110761688 <error: Cannot access memory at address 0x110761688>
        bm = {to_tag_val = {s = 0x7fc937f95820 "fc3d4179ffdbaeed3a8b1e97891311fe-1e620000\r\nCall-ID: hipertelM.MZMBjuMBMsPxFAOBV7W.y7M.c*\r\nCSeq: 20 INVITE\r\nServer: HiperTel v2.15\r\nContent-Length: 0\r\n\r\n", len = 41}}
        dset_len = 32712
#6  0x00007fc7fdae6764 in t_reply (t=0x7fc80def9b88, p_msg=0x7fc7ff437b90, code=487, text=0x7fc7fdba0a2b "Request canceled") at t_reply.c:1717
        reason = {s = 0x7fc7fdba0a2b "Request canceled", len = 16}
#7  0x00007fc7fdb756ee in e2e_cancel (cancel_msg=0x7fc9380cade8, t_cancel=0x7fc80e3c7818, t_invite=0x7fc80def9b88) at t_fwd.c:1315
        cancel_bm = 0
        reason = 0xb27
        free_reason = 32764
        i = -965508272
        lowest_error = 0
        ret = 940025184
        tmcb = {req = 0x101800000000, rpl = 0x7fc7fdb7d7f8, param = 0x555b10ab00a0 <_xavi_list_head>, code = 279644088, flags = 21851, branch = 0, t_rbuf = 0xc6738350, dst = 0x7fc80def9b88, send_buf = {s = 0x7fc80e3cb990 "\373E\001", len = 276174472}}
        __func__ = "e2e_cancel"
#8  0x00007fc7fdb79162 in t_forward_nonack (t=0x7fc80e3c7818, p_msg=0x7fc9380cade8, proxy=0x0, proto=0) at t_fwd.c:1647
        branch_ret = 0
        lowest_ret = 1
        added_branches = 1213011861
        first_branch = 0
        i = 32764
        t_invite = 0x7fc80def9b88
        success_branch = -965506688
        try_new = 21851
        lock_replies = 273118466
        backup_bflags = 0
        obranch = {uri = {s = 0x555b107a9833 "INFO", len = 960495616}, dst_uri = {s = 0x7ffcc6738430 "\260\205s\306\374\177", len = -39223825}, q = -965508160, path = {s = 0x7fc7fc8d47dd <pkg_proc_update_stats+115> "H\213\r\034[ ", len = -252645136}, flags = 0, force_socket = 0x10800000, ruid = {s = 0x7fc9380cade8 "\373E\001", len = 4198584}, instance = {s = 0x54ce70 <error: Cannot access memory at address 0x54ce70>, len = 17856448}, location_ua = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 65}, otcpid = 0}
        __func__ = "t_forward_nonack"
#9  0x00007fc7fdb7a6b3 in t_forward_cancel (p_msg=0x7fc9380cade8, proxy=0x0, proto=0, tran=0x7ffcc67386f0) at t_fwd.c:1853
        t_invite = 0x7fc70000000e
        t = 0x7fc80e3c7818
        ret = 32713
        new_tran = 1
        dst = {send_sock = 0xd68, to = {s = {sa_family = 64441, sa_data = "^\365\307\177\000\000`\212s\306\374\177\000"}, sin = {sin_family = 64441, sin_port = 62814, sin_addr = {s_addr = 32711}, sin_zero = "`\212s\306\374\177\000"}, sin6 = {sin6_family = 64441, sin6_port = 62814, sin6_flowinfo = 32711, sin6_addr = {__in6_u = {__u6_addr8 = "`\212s\306\374\177\000\000\260'\361\067\311\177\000", __u6_addr16 = {35424, 50803, 32764, 0, 10160, 14321, 32713, 0}, __u6_addr32 = {3329460832, 32764, 938551216, 32713}}}, sin6_scope_id = 935414184}, sas = {ss_family = 64441, __ss_padding = "^\365\307\177\000\000`\212s\306\374\177\000\000\260'\361\067\311\177\000\000\250I\301\067\311\177\000\000\000\000\000\000\000\000\000\000\240\206s\306\374\177\000\000\341S^\365\307\177\000\000\220\211s\306\374\177\000\000`\213s\306\374\177\000\000\220x\360\067\311\177\000\000\200\211s\306\374\177\000\000ȅs\306\374\177\000\000\020\000\000\000\060\000\000\000\360\205s\306\374\177\000\000P\207s\306\374\177\000", __ss_align = 0}}, id = 0, send_flags = {f = 32711, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        host = {s = 0x7ffcc6738560 "", len = 46}
        port = 0
        comp = 32713
        __func__ = "t_forward_cancel"
#10 0x00007fc7fdb501a0 in t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, proto=0, replicate=0) at t_funcs.c:239
        ret = 0
        new_tran = 939088312
        t = 0x7ffcc6738900
        dst = {send_sock = 0x7fc937c05468, to = {s = {sa_family = 10160, sa_data = "\361\067\311\177\000\000\020\210s\306\374\177\000"}, sin = {sin_family = 10160, sin_port = 14321, sin_addr = {s_addr = 32713}, sin_zero = "\020\210s\306\374\177\000"}, sin6 = {sin6_family = 10160, sin6_port = 14321, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "\020\210s\306\374\177\000\000\341S^\365\307\177\000", __u6_addr16 = {34832, 50803, 32764, 0, 21473, 62814, 32711, 0}, __u6_addr32 = {3329460240, 32764, 4116599777, 32711}}}, sin6_scope_id = 23}, sas = {ss_family = 10160, __ss_padding = "\361\067\311\177\000\000\020\210s\306\374\177\000\000\341S^\365\307\177\000\000\027\000\000\000W\024\365h\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\262\336\067\311\177\000\000Іs\306\374\177\000\000\300\210s\306\374\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000", __ss_align = 140723637947776}}, id = 272622906, send_flags = {f = 21851, blst_imask = 0}, proto = -32 '\340', proto_pad0 = -120 '\210', proto_pad1 = -14733}
        port = 0
        host = {s = 0x555b10761688 "", len = -178324551}
        comp = 0
        __func__ = "t_relay_to"
#11 0x00007fc7fdb054da in _w_t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, force_proto=0) at tm.c:1752
        t = 0x0
        res = 32764
        __func__ = "_w_t_relay_to"
#12 0x00007fc7fdb06825 in w_t_relay (p_msg=0x7fc9380cade8, _foo=0x0, _bar=0x0) at tm.c:1952
No locals.
#13 0x0000555b103fe4b2 in do_action (h=0x7ffcc67390b0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1076
        ret = -5
        v = 1
        dst = {send_sock = 0x7fc937deaff0, to = {s = {sa_family = 44520, sa_data = "\f8\311\177\000\000\253'\021\375\307\177\000"}, sin = {sin_family = 44520, sin_port = 14348, sin_addr = {s_addr = 32713}, sin_zero = "\253'\021\375\307\177\000"}, sin6 = {sin6_family = 44520, sin6_port = 14348, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "\253'\021\375\307\177\000\000\320\n\220\004\310\177\000", __u6_addr16 = {10155, 64785, 32711, 0, 2768, 1168, 32712, 0}, __u6_addr32 = {4245759915, 32711, 76548816, 32712}}}, sin6_scope_id = 276174472}, sas = {ss_family = 44520, __ss_padding = "\f8\311\177\000\000\253'\021\375\307\177\000\000\320\n\220\004\310\177\000\000\210\026v\020[U\000\000\210\026v\020\001\000\000\000\000\215s\306\374\177\000\000s\321^\365\307\177\000\000\000\000\000\000\000\000\000\000,\215s\306\374\177\000\000\200'\f8\311\177\000\000.\000\000\000\307\177\000\000\004\000\000\000\002", '\000' <repeats 11 times>, "\060\215s\306\374\177\000\000\210\026v\020[U\000", __ss_align = 0}}, id = 1212490240, send_flags = {f = 32713, blst_imask = 0}, proto = 51 '3', proto_pad0 = -104 '\230', proto_pad1 = 4218}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7fc937c05468
        len = 0
        user = 0
        uri = {user = {s = 0x555b10d24db0 "UTC", len = 938506384}, passwd = {s = 0x7fc937deb068 "\360\036\361\067\311\177", len = -49207158}, host = {s = 0x7ffcc6738d30 "\373\377\377\377\374\177", len = 0}, port = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, params = {s = 0x2e <error: Cannot access memory at address 0x2e>, len = 1212490383}, sip_params = {s = 0x0, len = 48}, headers = {s = 0x7ffcc6738c60 "\250I\301\067\311\177", len = -965506176}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (unknown: 76548816), transport = {s = 0x555b107a9833 "INFO", len = 0}, ttl = {s = 0x7fc7fd11288a "", len = 935534040}, user_param = {s = 0x7ffcc6738be0 " \214s\306\374\177", len = -178372384}, maddr = {s = 0x7fc7ffffffff "", len = 76548816}, method = {s = 0x555b10761688 "", len = 276174472}, lr = {s = 0x7ffcc6738c20 "P\214s\306\374\177", len = -178335373}, r2 = {s = 0x7ffcc6738c20 "P\214s\306\374\177", len = -965505972}, gr = {s = 0x4c6738ce8 <error: Cannot access memory at address 0x4c6738ce8>, len = -49207385}, transport_val = {s = 0x77748ac400000004 <error: Cannot access memory at address 0x77748ac400000004>, len = 0}, ttl_val = {s = 0x7ffcc6738c50 ".", len = 274214092}, user_param_val = {s = 0x4c6738ce8 <error: Cannot access memory at address 0x4c6738ce8>, len = -49236417}, maddr_val = {s = 0x7fc7fd11288a "", len = -49207158}, method_val = {s = 0x2e <error: Cannot access memory at address 0x2e>, len = 940320640}, lr_val = {s = 0x7fc937c149a8 "\341\236\377\373\307\177", len = 6}, r2_val = {s = 0x7fc937c31dd8 "LPB41KT ", len = 940320640}, gr_val = {s = 0x88c6738cc0 <error: Cannot access memory at address 0x88c6738cc0>, len = 0}}
        next_hop = {user = {s = 0x7fc9484cfa0b "%H:%M:%S", len = 24}, passwd = {s = 0x7ffcc6738a70 "3\230z\020[U", len = 282777392}, host = {s = 0x555b10dad720 "", len = 1215316096}, port = {s = 0x7fc948707b00 <main_arena> "", len = 8208}, params = {s = 0x79 <error: Cannot access memory at address 0x79>, len = 1212061465}, sip_params = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1212034094}, headers = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 282761040}, port_no = 35472, proto = 50803, type = 32764, flags = (unknown: 1215316096), transport = {s = 0x555b00000001 <error: Cannot access memory at address 0x555b00000001>, len = 282761040}, ttl = {s = 0x0, len = 1215316096}, user_param = {s = 0x555b10da9750 "X{pH\311\177", len = 1}, maddr = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 11}, method = {s = 0x555b10da9750 "X{pH\311\177", len = -965506200}, lr = {s = 0x15 <error: Cannot access memory at address 0x15>, len = 1212489561}, r2 = {s = 0x555b107a9833 "INFO", len = -49206466}, gr = {s = 0x7ffcc6738bf0 " \214s\306\374\177", len = 1652854916}, transport_val = {s = 0x555b10dad730 "<142>May 18 06:21:56 /root/mykamailio/sbin/kamailio[67117]: INFO: LPB41KT [d94ad953] RELAY: Relaying to 10.64.1.44 (ru)\n", len = 120}, ttl_val = {s = 0x0, len = 276598612}, user_param_val = {s = 0x7fc937f08840 "\031", len = -965505768}, maddr_val = {s = 0x7fc9380cade8 "\373E\001", len = 276174472}, method_val = {s = 0x0, len = 1212490240}, lr_val = {s = 0x1500000038 <error: Cannot access memory at address 0x1500000038>, len = 6}, r2_val = {s = 0x7a00000004 <error: Cannot access memory at address 0x7a00000004>, len = 3}, gr_val = {s = 0x0, len = 0}}
        u = 0x0
        port = 0
        dst_host = 0x7fc804900c10
        i = 934727696
        flags = 32713
        avp = 0x7ffcc6738ec0
        st = {flags = 282785584, id = 21851, name = {n = 1215331072, s = {s = 0x7fc948707b00 <main_arena> "", len = 0}, re = 0x7fc948707b00 <main_arena>}, avp = 0x90}
        sct = 0x555b107a9833
        sjt = 0x7fc948452200 <__syslog>
        rve = 0x7ffcc6738ec0
        mct = 0x0
        rv = 0x555b10dad720
        rv1 = 0x7fc937b6d010
        c1 = {cache_type = 1215326240, val_type = 32713, c = {avp_val = {n = 8, s = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, re = 0x8}, pval = {rs = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, ri = 1212272350, flags = 32713}}, i2s = "3\230z67117\373\037", '\000' <repeats 11 times>}
        s = {s = 0x555b10dad73c "06:21:56 /root/mykamailio/sbin/kamailio[67117]: INFO: LPB41KT [d94ad953] RELAY: Relaying to 10.64.1.44 (ru)\n", len = 1213011858}
        srevp = {0x7fc937f161a0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6738900, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#14 0x0000555b1040c449 in run_actions (h=0x7ffcc67390b0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f161a0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 939040248, tz_dsttime = 32713}
        tdiff = 960495616
        __func__ = "run_actions"
#15 0x0000555b1040caf6 in run_actions_safe (h=0x7ffcc673b6d0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {93849606559368, 8478727960045658726, 0, 140502477644288, 93849606854707, 5255462912, 8478727960666415718, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {140723637949416, 0, 0, 140502204241990, 93849606559368, 0, 140502477644288, 93849606854707, 5255462912, 140723637949120, 93849602810890, 7624429984, 140497046735760, 140723637948832, 140496791814368, 140502203705832}}}}}
        ret = -965504028
        ign_on_break = 0
#16 0x0000555b103c9569 in rval_get_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, i=0x7ffcc6739558, rv=0x7fc937f162f8, cache=0x0) at core/rvalue.c:915
        r_avp = 0x7fc93807dfe0
        avp_val = {n = 1, s = {s = 0x7ffc00000001 <error: Cannot access memory at address 0x7ffc00000001>, len = -97950189}, re = 0x7ffc00000001}
        pval = {rs = {s = 0x7fc937f0ffc8 "Y\377\360\067\311\177", len = 940355048}, ri = 0, flags = 0}
        tmp = {s = 0x7fc7fa2d2866 "rtpengine", len = -965504064}
        s = 0x0
        r = 32711
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#17 0x0000555b103ce40a in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc6739558, rve=0x7fc937f162f0) at core/rvalue.c:1913
        i1 = 1
        i2 = 0
        ret = -1
        c1 = {cache_type = 940355048, val_type = 32713, c = {avp_val = {n = 938570632, s = {s = 0x7fc937f17388 "\232\a", len = 935352296}, re = 0x7fc937f17388}, pval = {rs = {s = 0x7fc937f17388 "\232\a", len = 935352296}, ri = -97805992, flags = 14}}, i2s = "p\225s\306\374\177\000\000\341S^\365\307\177\000\000\000\000\000\000\001"}
        c2 = {cache_type = 276469811, val_type = 21851, c = {avp_val = {n = 960495616, s = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965504000}, re = 0x139400000}, pval = {rs = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965504000}, ri = 272425654, flags = 21851}}, i2s = "\020\224s\306\374\177\000\000\000\000\000\000\000\000\000\000h\000\361\067\311\177"}
        rv1 = 0x7fc948452200 <__syslog>
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#18 0x0000555b103ce84f in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc6739a8c, rve=0x7fc937f16a20) at core/rvalue.c:1921
        i1 = 1212490240
        i2 = 0
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = -176175080, s = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, re = 0x7fc7f57fc818 <_dbg_action_list+344>}, pval = {rs = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, ri = 938570632, flags = 32713}}, i2s = "`\226s\306\374\177\000\000\000\000\000\000\000\000\000\000p\225s\306\374\177"}
        c2 = {cache_type = 4197187347, val_type = 32711, c = {avp_val = {n = 940355048, s = {s = 0x7fc9380cade8 "\373E\001", len = -49207381}, re = 0x7fc9380cade8}, pval = {rs = {s = 0x7fc9380cade8 "\373E\001", len = -49207381}, ri = 76548816, flags = 32712}}, i2s = "\210\026v\020[U\000\000\210\026v\020\001\000\000\000@\225s\306\374\177"}
        rv1 = 0x7fc93802a510
        rv2 = 0x100000011
        __func__ = "rval_expr_eval_int"
#19 0x0000555b103fdf6e in do_action (h=0x7ffcc673b6d0, a=0x7fc937f17388, msg=0x7fc9380cade8) at core/action.c:1052
        ret = -5
        v = 0
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "@9\001\000\000\000\060\232s\306\374\177\000"}, sin = {sin_family = 0, sin_port = 14656, sin_addr = {s_addr = 1}, sin_zero = "0\232s\306\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 14656, sin6_flowinfo = 1, sin6_addr = {__in6_u = {__u6_addr8 = "0\232s\306\374\177\000\000\214\242\260\375\307\177\000", __u6_addr16 = {39472, 50803, 32764, 0, 41612, 64944, 32711, 0}, __u6_addr32 = {3329464880, 32764, 4256211596, 32711}}}, sin6_scope_id = 3329465008}, sas = {ss_family = 0, __ss_padding = "@9\001\000\000\000\060\232s\306\374\177\000\000\214\242\260\375\307\177\000\000\260\232s\306\374\177", '\000' <repeats 18 times>, "\350\255\f8\311\177\000\000\340\240s\306\374\177\000\000\262\344?\020[U\000\000\000\000\000\000\000\000\000\000\340ֶ7\000\000\000\000`\233s\306\374\177\000\000\350\255\f8\311\177\000\000\060/\305\067\311\177\000\000\240\242s\306\374\177\000", __ss_align = 140723637953056}}, id = -965500576, send_flags = {f = 32764, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -32 '\340', proto_pad1 = 18545}
        tmp = 0x7fc937c74ab8 "\002"
        new_uri = 0x7fc937c48800 "\001"
        end = 0xfe380cade8 <error: Cannot access memory at address 0xfe380cade8>
        crt = 0x7fc937c74b50 "\001"
        cmd = 0x7fc937c057e8
        len = 32711
        user = -178367519
        uri = {user = {s = 0x7ffcc67398b0 "\340\230s\306\374\177", len = -178335373}, passwd = {s = 0x555b107a9833 "INFO", len = -965502756}, host = {s = 0x2c67398c0 <error: Cannot access memory at address 0x2c67398c0>, len = -38215845}, port = {s = 0x7af200000012 <error: Cannot access memory at address 0x7af200000012>, len = 0}, params = {s = 0x7ffcc67398e0 "\200\231s\306\374\177", len = 274214092}, sip_params = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 233806760}, headers = {s = 0x555b107a9833 "INFO", len = 960495616}, port_no = 39296, proto = 50803, type = 32764, flags = (unknown: 4256166576), transport = {s = 0x37c6f930 <error: Cannot access memory at address 0x37c6f930>, len = 940355048}, ttl = {s = 0x7ffcc673a010 "\346\017MH\311\177", len = 80}, user_param = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1211905118}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x7ffcc6739980 "\300\231s\306\374\177", len = 233806728}, r2 = {s = 0x0, len = 276174472}, gr = {s = 0x0, len = 1212490240}, transport_val = {s = 0x555b107a9833 "INFO", len = 960495616}, ttl_val = {s = 0x7ffcc67399c0 "", len = -38799735}, user_param_val = {s = 0x7ffcc673a020 "\001\200\255", <incomplete sequence \373>, len = 0}, maddr_val = {s = 0x0, len = 940355048}, method_val = {s = 0x7fc9380cade8 "\373E\001", len = 935669552}, lr_val = {s = 0x7ffcc6739a00 "0\232s\306\374\177", len = -38755968}, r2_val = {s = 0x555b00000000 <error: Cannot access memory at address 0x555b00000000>, len = 940355048}, gr_val = {s = 0x0, len = 1212490240}}
        next_hop = {user = {s = 0x7ffcc6739800 "\340\230s\306\374\177", len = -39278603}, passwd = {s = 0x0, len = 0}, host = {s = 0x44c67397d0 <error: Cannot access memory at address 0x44c67397d0>, len = 935764248}, port = {s = 0x7ffcc6739864 "[U", len = 940355048}, params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549264}, sip_params = {s = 0x555b107a9833 "INFO", len = 960495616}, headers = {s = 0x1c6739790 <error: Cannot access memory at address 0x1c6739790>, len = 76549264}, port_no = 38800, proto = 50803, type = 32764, flags = (unknown: 4116594912), transport = {s = 0x7fc7fdb7d7fa "", len = 76549264}, ttl = {s = 0x555b10761688 "", len = 276174472}, user_param = {s = 0x7ffcc67397d0 "", len = -178335373}, maddr = {s = 0x7fc7fdecbe08 "\030x<\016\310\177", len = -965502980}, method = {s = 0x23807a9a8 <error: Cannot access memory at address 0x23807a9a8>, len = -38283272}, lr = {s = 0x7af200000012 <error: Cannot access memory at address 0x7af200000012>, len = 0}, r2 = {s = 0x7ffcc6739800 "\340\230s\306\374\177", len = 274214092}, gr = {s = 0x2c6739800 <error: Cannot access memory at address 0x2c6739800>, len = -38283272}, transport_val = {s = 0x555b107a9833 "INFO", len = 233806760}, ttl_val = {s = 0x7ffcc67398e0 "\200\231s\306\374\177", len = -39258348}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549264}, maddr_val = {s = 0x7fc937c7e4a0 "0\344\307\067\311\177", len = -178324551}, method_val = {s = 0x1c6739870 <error: Cannot access memory at address 0x1c6739870>, len = 76549264}, lr_val = {s = 0x7ffcc6739870 "\260\230s\306\374\177", len = -178372384}, r2_val = {s = 0x7fc7fdb8df5d "", len = 76549264}, gr_val = {s = 0x555b10761688 "", len = 276174472}}
        u = 0x7ffcc6739db0
        port = 0
        dst_host = 0x7ffcc6739fe0
        i = 38
        flags = 32711
        avp = 0x555b107a9833
        st = {flags = 3329464048, id = 32764, name = {n = 274214092, s = {s = 0x555b10582ccc <get_debug_level+74> "\205\300u\005\213E\374\353\036\213\005\231\264K", len = 935457704}, re = 0x555b10582ccc <get_debug_level+74>}, avp = 0x7fc7fdb7d7f8}
        sct = 0x0
        sjt = 0x0
        rve = 0x7fc937f16a20
        mct = 0x0
        rv = 0x0
        rv1 = 0x7fc937c53eb0
        c1 = {cache_type = 3329464000, val_type = 32764, c = {avp_val = {n = -178335373, s = {s = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416> "\307\005G\001!", len = 279200042}, re = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416>}, pval = {rs = {s = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416> "\307\005G\001!", len = 279200042}, ri = -965503252, flags = 32764}}, i2s = "P\227s\306\002\000\000\000\370\327\267\375\307\177\000\000\022\000\000\000\362z"}
        s = {s = 0x555b10761688 "", len = 276174472}
        srevp = {0x7fc937f17388, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739660, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#20 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937f0fca0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f17388
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935673520, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#21 0x0000555b103fa952 in do_action (h=0x7ffcc673b6d0, a=0x7fc937c53eb0, msg=0x7fc9380cade8) at core/action.c:700
        ret = -5
        v = 32713
        dst = {send_sock = 0x100000000, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000v\000\000\000\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "v\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "v\000\000\000\000\000\000\000\210\026v\020[U\000", __u6_addr16 = {118, 0, 0, 0, 5768, 4214, 21851, 0}, __u6_addr32 = {118, 0, 276174472, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000v\000\000\000\000\000\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000\200\243s\306\374\177\000\000\366\312@\020[U\000\000\000{pH\311\177\000\000\350\255\f8\311\177\000\000\060/\305\067\311\177\000\000жs\306\374\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\311\177\000", __ss_align = 93849606559368}}, id = 676438630, send_flags = {f = 32296, blst_imask = 30122}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x1500000038 <error: Cannot access memory at address 0x1500000038>
        end = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>
        crt = 0x555b107a9833 "INFO"
        cmd = 0x7fc937c73b70
        len = 32711
        user = -178367519
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 276174472}, passwd = {s = 0x0, len = 1212490240}, host = {s = 0x555b107a9833 "INFO", len = 960495616}, port = {s = 0x7ffcc673a270 "\200\243s\306\374\177", len = 272680009}, params = {s = 0x6c673a130 <error: Cannot access memory at address 0x6c673a130>, len = 8180}, sip_params = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 276174472}, headers = {s = 0x7ffcc673a3a0 "8", len = 940355048}, port_no = 12080, proto = 14277, type = 32713, flags = (unknown: 3329467040), transport = {s = 0x555b10d24db0 "UTC", len = -965500544}, ttl = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 0}, user_param = {s = 0x7ffcc673a220 "0\367\332\020[U", len = -965500576}, maddr = {s = 0x10000043b <error: Cannot access memory at address 0x10000043b>, len = 67667272}, method = {s = 0x3635c673a236 <error: Cannot access memory at address 0x3635c673a236>, len = -965500356}, lr = {s = 0x7ffcc673a238 "", len = -965500356}, r2 = {s = 0x0, len = 67667272}, gr = {s = 0x2700000000 <error: Cannot access memory at address 0x2700000000>, len = -41657984}, transport_val = {s = 0x7fc9380caff0 "\n\247\277\062", len = 10}, ttl_val = {s = 0xd00000003 <error: Cannot access memory at address 0xd00000003>, len = 282777404}, user_param_val = {s = 0x555b10dad73c "06:21:56 /root/mykamailio/sbin/kamailio[67117]: INFO: LPB41KT [d94ad953] RELAY: Relaying to 10.64.1.44 (ru)\n", len = 1213011858}, maddr_val = {s = 0x7fc948706820 <_nl_C_locobj> " GpH\311\177", len = 8}, method_val = {s = 0x0, len = 1212272350}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x555b10daf730 "", len = 1215331072}}
        next_hop = {user = {s = 0x68f5145700000017 <error: Cannot access memory at address 0x68f5145700000017>, len = 0}, passwd = {s = 0x7ffcc6739f70 "P\240s\306\374\177", len = 274214092}, host = {s = 0x6c673a1a0 <error: Cannot access memory at address 0x6c673a1a0>, len = -107129541}, port = {s = 0x7ffcc673a1c0 "\003", len = 67667272}, params = {s = 0x7ffcc673a050 "\313\320\323\020[U", len = -107759048}, sip_params = {s = 0x7ffcc6739fb0 "\300\241s\306\374\177", len = 274214092}, headers = {s = 0x6c673a1e0 <error: Cannot access memory at address 0x6c673a1e0>, len = -965500516}, port_no = 41376, proto = 50803, type = 32764, flags = (unknown: 3329466800), transport = {s = 0x7ffcc673a1c0 "\003", len = 0}, ttl = {s = 0x7fc937c05e40 "k\345\270\375\307\177", len = 940355048}, user_param = {s = 0x555b1076c64b "core", len = -965500452}, maddr = {s = 0x7ffcc673a020 "\001\200\255", <incomplete sequence \373>, len = 282317003}, method = {s = 0x7ffcc673a148 "", len = 282317003}, lr = {s = 0x7ffcc673a428 "\350@\305\067\311\177", len = -965500000}, r2 = {s = 0x7fc9484d0fe6 "%hu%n:%hu%n:%hu%n", len = 1211988903}, gr = {s = 0xfbad8001 <error: Cannot access memory at address 0xfbad8001>, len = 282317004}, transport_val = {s = 0x555b10d3d0cc "", len = 282317003}, ttl_val = {s = 0x555b10d3d0cb "0", len = 282317003}, user_param_val = {s = 0x555b10d3d0cb "0", len = 282317003}, maddr_val = {s = 0x555b10d3d0cc "", len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x10761688 <error: Cannot access memory at address 0x10761688>, len = 276174472}, gr_val = {s = 0x7ffcc6730000 "", len = 0}}
        u = 0x7ffcc673a5f0
        port = 0
        dst_host = 0x555b107a9833
        i = 29
        flags = 32711
        avp = 0x7ffcc673a520
        st = {flags = 3329466176, id = 32764, name = {n = -178335373, s = {s = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416> "\307\005G\001!", len = 1}, re = 0x7fc7f55ed173 <dbg_get_mod_debug_level+416>}, avp = 0x7ffcc6739f6c}
        sct = 0x555b10da9750
        sjt = 0xb
        rve = 0x7fc9380c0030
        mct = 0xffffffff
        rv = 0x110761688
        rv1 = 0x7fc937c540e8
        c1 = {cache_type = 3329466112, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, ri = -965499840, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = 274517235}
        srevp = {0x7fc937c53eb0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739ea0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#22 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c53080, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c53eb0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935674088, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#23 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937c540e8, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x100000000, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\367\000\000\000\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\367\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\367\000\000\000\000\000\000\000\210\026v\020[U\000", __u6_addr16 = {247, 0, 0, 0, 5768, 4214, 21851, 0}, __u6_addr32 = {247, 0, 276174472, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\367\000\000\000\000\000\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000\300\253s\306\374\177\000\000\366\312@\020[U\000\000\000{pH\311\177\000\000\350\255\f8\311\177\000\000\300!\305\067\311\177\000\000жs\306\374\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\311\177\000", __ss_align = 93849606559368}}, id = 970039910, send_flags = {f = 32296, blst_imask = 30122}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x1500000038 <error: Cannot access memory at address 0x1500000038>
        end = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>
        crt = 0x555b107a982c "NOTICE"
        cmd = 0x7fc937c10c18
        len = 32711
        user = -178367519
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 276174472}, passwd = {s = 0x0, len = 1212490240}, host = {s = 0x555b107a9833 "INFO", len = 960495616}, port = {s = 0x7ffcc673aab0 "\300\253s\306\374\177", len = 272680009}, params = {s = 0x6c673a970 <error: Cannot access memory at address 0x6c673a970>, len = 8180}, sip_params = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 276174472}, headers = {s = 0x7ffcc673abe0 "8", len = 940355048}, port_no = 8640, proto = 14277, type = 32713, flags = (unknown: 3329469152), transport = {s = 0x555b10d24db0 "UTC", len = -965498432}, ttl = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = -965497688}, user_param = {s = 0x7ffcc673aa60 "0\367\332\020[U", len = -965498464}, maddr = {s = 0x7fc937f0f368 "", len = 940355048}, method = {s = 0x3635c673aa76 <error: Cannot access memory at address 0x3635c673aa76>, len = -965498244}, lr = {s = 0x7ffcc673aa78 "", len = -965498244}, r2 = {s = 0x7fc937f95ab8 "\001", len = -965497744}, gr = {s = 0x2737f0f368 <error: Cannot access memory at address 0x2737f0f368>, len = 276174472}, transport_val = {s = 0x0, len = 1212490240}, ttl_val = {s = 0x555b107a9833 "INFO", len = 960495616}, user_param_val = {s = 0x7ffcc673ab80 "\360\254s\306\374\177", len = 272427137}, maddr_val = {s = 0x7fc948706820 <_nl_C_locobj> " GpH\311\177", len = 8}, method_val = {s = 0x0, len = 1212272350}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x555b10daf730 "", len = 1215331072}}
        next_hop = {user = {s = 0x7ffcc673a8a0 "\020\252s\306\374\177", len = 272406603}, passwd = {s = 0x7ffcc673a7b0 "\350\255\f8\311\177", len = 274214092}, host = {s = 0x6c673a9e0 <error: Cannot access memory at address 0x6c673a9e0>, len = 0}, port = {s = 0x7fc937c4d3f8 "\a", len = -965498056}, params = {s = 0x7fc9380cade8 "\373E\001", len = -965495088}, sip_params = {s = 0x4c673a820 <error: Cannot access memory at address 0x4c673a820>, len = 276653360}, headers = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = -965498404}, port_no = 43488, proto = 50803, type = 32764, flags = (unknown: 3329468912), transport = {s = 0x7ffcc673aa00 "3\230z\020[U", len = 0}, ttl = {s = 0x7fc937c149a8 "\341\236\377\373\307\177", len = 940355048}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 282317003}, method = {s = 0x7ffcc673a988 "\250\254s\306\374\177", len = 282317003}, lr = {s = 0x7ffcc673ac68 "\300E\305\067\311\177", len = -965497888}, r2 = {s = 0x7fc9484d0fe6 "%hu%n:%hu%n:%hu%n", len = 1211988903}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x555b10d3d0cc "", len = 276174472}, ttl_val = {s = 0x0, len = 1212490240}, user_param_val = {s = 0x555b107a9833 "INFO", len = 960495616}, maddr_val = {s = 0x7ffcc673aa10 "\200\253s\306\374\177", len = 272425994}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x7fc937c4d3f0 "\001", len = -965498056}, gr_val = {s = 0x7fc9380cade8 "\373E\001", len = -965495088}}
        u = 0x7ffcc673ae30
        port = 0
        dst_host = 0x555b107a982c
        i = -965497728
        flags = 32764
        avp = 0x7ffcc673ad60
        st = {flags = 3329468288, id = 32764, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x555b105cf57c <pv_value_destroy+175>}
        sct = 0x555b10da9750
        sjt = 0xb
        rve = 0x7fc937c53698
        mct = 0xffffffff
        rv = 0x10761688
        rv1 = 0x7fc937c545c0
        c1 = {cache_type = 3329468224, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, ri = -965497728, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = 76549136}
        srevp = {0x7fc937c540e8, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673a6e0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#24 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c52c10, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c540e8
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935675328, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#25 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937c545c0, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "@9\001\000\000\000\200\264s\306\374\177\000"}, sin = {sin_family = 0, sin_port = 14656, sin_addr = {s_addr = 1}, sin_zero = "\200\264s\306\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 14656, sin6_flowinfo = 1, sin6_addr = {__in6_u = {__u6_addr8 = "\200\264s\306\374\177\000\000\374:i\020[U\000", __u6_addr16 = {46208, 50803, 32764, 0, 15100, 4201, 21851, 0}, __u6_addr32 = {3329471616, 32764, 275331836, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "@9\001\000\000\000\200\264s\306\374\177\000\000\374:i\020[U\000\000\000\000\000\000\000\000\000\000\250\251\a8\311\177\000\000AA\244\020[U\000\000\062@\244\020[U\000\000 \263s\306\374\177\000\000\020ж7\311\177\000\000`\263s\306\374\177\000\000\335G\215\374\307\177\000\000\360\360\360\360", '\000' <repeats 14 times>, "\200\020\000\000\000\000\220>+\020\000\000\000", __ss_align = 4195464}}, id = 5554544, send_flags = {f = 0, blst_imask = 0}, proto = -64 '\300', proto_pad0 = 119 'w', proto_pad1 = 1285}
        tmp = 0x7fc804900c10 ""
        new_uri = 0x7fc937f9daf8 "\002"
        end = 0x555b106d4545 <parse_method_name+2608> "\205\300\017\224\300\017\266\300H\205\300\017\204\261\003"
        crt = 0x1c673b510 <error: Cannot access memory at address 0x1c673b510>
        cmd = 0x7fc937c10c50
        len = 0
        user = 939121360
        uri = {user = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -965496436}, passwd = {s = 0x4c673b1a0 <error: Cannot access memory at address 0x4c673b1a0>, len = 276653360}, host = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, port = {s = 0x7ffcc673b190 "\300\262s\306\374\177", len = 274214092}, params = {s = 0x4004004f8 <error: Cannot access memory at address 0x4004004f8>, len = 276653360}, sip_params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, headers = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275281682}, port_no = 45520, proto = 50803, type = 32764, flags = (URI_SIP_USER_PHONE | unknown: 273118464), transport = {s = 0x0, len = 276598612}, ttl = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275030558}, user_param = {s = 0x7fc93807a9a8 "\001", len = 940025184}, maddr = {s = 0x7ffcc673b342 "\005\005", len = -965495997}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x555b107d6d88 <__func__.6797> "parse_via", len = 276659112}, r2 = {s = 0x1c673b250 <error: Cannot access memory at address 0x1c673b250>, len = 76549136}, gr = {s = 0x7ffcc673b250 "\220\262s\306\374\177", len = -178372384}, transport_val = {s = 0x555b107d6534 "", len = 76549136}, ttl_val = {s = 0x555b10761688 "", len = 276174472}, user_param_val = {s = 0x7ffcc673b290 "\300\262s\306\374\177", len = -178335373}, maddr_val = {s = 0x0, len = -965496132}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}, lr_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, r2_val = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 274214092}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}}
        next_hop = {user = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 2}, passwd = {s = 0x7fc93807a9a8 "\001", len = 0}, host = {s = 0x7fc93807ecc8 "\001", len = 939039512}, port = {s = 0x7a <error: Cannot access memory at address 0x7a>, len = 940043464}, params = {s = 0x0, len = 940026872}, sip_params = {s = 0x7fc937f89cd0 "\004", len = 939039512}, headers = {s = 0x7fc937f73958 "\003", len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x1c673b120 <error: Cannot access memory at address 0x1c673b120>, len = 76549136}, method_val = {s = 0x7ffcc673b120 "`\261s\306\374\177", len = -178372384}, lr_val = {s = 0x555b107d6534 "", len = 76549136}, r2_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 16}, gr_val = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -178335373}}
        u = 0x555b107df530 <__func__.6625>
        port = 0
        dst_host = 0x555b10761688
        i = 2
        flags = 21851
        avp = 0x1
        st = {flags = 65537, id = 45, name = {n = 279199744, s = {s = 0x555b10a44000 <buf> "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"..., len = 6}, re = 0x555b10a44000 <buf>}, avp = 0x555b10a44007 <buf+7>}
        sct = 0x7ffcc673b480
        sjt = 0x7fc804900c10
        rve = 0x7fc937c523f8
        mct = 0x1
        rv = 0x0
        rv1 = 0x555b10a44118 <buf+280>
        c1 = {cache_type = 279644096, val_type = 21851, c = {avp_val = {n = -965496932, s = {s = 0x7ffcc673af9c "[U", len = 279644080}, re = 0x7ffcc673af9c}, pval = {rs = {s = 0x7ffcc673af9c "[U", len = 279644080}, ri = -38237829, flags = 32711}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x7ffcc673af70 "", len = -178335373}
        srevp = {0x7fc937c545c0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673af20, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#26 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c473c0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c545c0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 276690800, tz_dsttime = 21851}
        tdiff = 4116631923
        __func__ = "run_actions"
#27 0x0000555b1040cbbe in run_top_route (a=0x7fc937c473c0, msg=0x7fc9380cade8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {93849603950067, 4571428513, 140502205509096, 93849606559368, 4571141768, 140723637958544, 140496791851379, 140723637958560, 140723637958588, 18118908696, 93849606846109, 8004010816636452865, 0, 140723637958592, 93849606559368, 0}}}}}
        p = 0x7ffcc673b6d0
        ret = 276469811
        sfbk = 0
#28 0x0000555b1057b6e8 in receive_msg (buf=0x555b10a44000 <buf> "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"..., len=321, rcv_info=0x7ffcc673bd40) at core/receive.c:423
        msg = 0x7fc9380cade8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 15 times>, 1}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x555b10a44000 <buf> "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"..., len = 321}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcc673b8b0, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcc673bd40, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#29 0x0000555b10447d59 in udp_rcv_loop () at core/udp_server.c:543
        len = 321
        buf = "CANCEL sip:+923008090076 at 10.64.1.44 SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.16;branch=z9hG4bK3228.1de14c70e31abccd4a3f420e29cf5166.0\r\nFrom: <sip:+924238353154 at 10.2.50.18>;tag=3489159201\r\nTo: <sip:0300809"...
        tmp = 0x1e <error: Cannot access memory at address 0x1e>
        fromaddr = 0x7fc93807e930
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {851420938, 0}, addr32 = {851420938, 0, 0, 0}, addr16 = {42762, 12991, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277\062", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1019193098, 0}, addr32 = {1019193098, 0, 0, 0}, addr16 = {42762, 15551, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277<", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\n\247\277\062\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 851420938}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 851420938, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\n\247\277\062", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fc937bfff30, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "t\027\221\004\310\177\000\000t\027\221\004\001\000\000\000P\273s\306\374\177\000\000s\321^\365\307\177\000\000P\273s\306\374\177\000\000\220\267\331\020[U\000\000@\263\331\020[U\000\000\247\261s\306\374\177\000\000\220\261s\306\374\177\000\000\000\000\000\000\000\000\000\001", '\000' <repeats 20 times>, "\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000\000t\027\221\004\310\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000@\274s\306\374\177\000\000\005\067\346\356\307\177\000\000\177\252y\020[U\000\000\020\f\220\004\v\000\000\000t\027\221\004\310\177\000\000"...
        i = -1
        j = 130560
        l = 0
        __func__ = "udp_rcv_loop"
#30 0x0000555b1038de84 in main_loop () at main.c:1683
        i = 10
        pid = 0
        si = 0x7fc937bfff30
        si_desc = "udp receiver child=10 sock=edge.hipertel.local:5060\000EH\311\177\000\000\000\000\000\000\000\000\000\000\060\000\000\000\060\000\000\000\070\300s\306\374\177\000\000P\277s\306\374\177\000\000\250Nx\020[U\000\000\370\226\r8k\000\000\000\063\230z\020[U\000\000\360\226\n8\311\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#31 0x0000555b10398511 in main (argc=11, argv=0x7ffcc673c568) at main.c:2856
        cfg_stream = 0x555b10bef010
        c = -1
        r = 0
        tmp = 0x7ffcc673deba ""
        tmp_len = 32764
        port = -965491792
        proto = 32713
        ahost = 0x0
        aport = 0
        options = 0x555b10764348 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 900928915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7fc94926d040 <_rtld_global>
        p = 0x7ffcc673de72 "edge"
        st = {st_dev = 19, st_ino = 23307, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1641492636, tv_nsec = 884483965}, st_mtim = {tv_sec = 1599774907, tv_nsec = 42281020}, st_ctim = {tv_sec = 1599774907, tv_nsec = 42281020}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000 \232\004I\311\177\000\000\330\331&I\311\177\000\000\a\000\000\000\000\000\000\000\a\000\000\000\a\000\000\000\070\224\004I\311\177\000\000\060\302s\306\374\177\000\000\215F\005I\311\177\000\000\000\000\000\000\000\000\000\000\272J\005I\311\177", '\000' <repeats 11 times>, "\200\065\020[U", '\000' <repeats 13 times>, "\377\000\000\000\000", '\377' <repeats 11 times>, "\000\377\377\377\377GLIBC_2.2.5\000GLIB\000__f", '\000' <repeats 12 times>, "inite\000getpriorit", '\000' <repeats 136 times>...
        option_index = 0
        long_options = {{name = 0x555b107663d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x555b10761b1c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x555b107663db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x555b107663e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x555b107663e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x555b107663f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x555b107663fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x555b10766404 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x555b1076640f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x555b10766418 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x555b10766423 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
-------------- next part --------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007fc7f9e53741 in futex_get (lock=0x7fc7fe0c8a20) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007fc7f9e55819 in bcast_dmq_message1 (peer=0x7fc7fe1cb440, body=0x7ffcc6739250, except=0x0, resp_cback=0x7fc7f9e4e4f0 <ht_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9e4e4b0 <ht_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:156
        node = 0x7fc804900ad0
        __func__ = "bcast_dmq_message1"
#3  0x00007fc7f9e56072 in bcast_dmq_message (peer=0x7fc7fe1cb440, body=0x7ffcc6739250, except=0x0, resp_cback=0x7fc7f9e4e4f0 <ht_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9e4e4b0 <ht_dmq_content_type>) at dmq_funcs.c:188
No locals.
#4  0x00007fc7f9c3a640 in ht_dmq_send (body=0x7ffcc6739250, node=0x0) at ht_dmq.c:237
        __func__ = "ht_dmq_send"
#5  0x00007fc7f9c3d4b5 in ht_dmq_replicate_action (action=HT_DMQ_SET_CELL, htname=0x7fc937ec0bf8, cname=0x7ffcc6739350, type=2, val=0x7ffcc6739340, mode=1) at ht_dmq.c:388
        jdoc = {root = 0x555b10da7b10, flags = 0, buf = {s = 0x555b10dad530 "{\"action\":1,\"htname\":\"tcompanydata\",\"cname\":\"94587 at maxCallsCompany\",\"type\":2,\"strval\":\"2\",\"mode\":1}", len = 99}, malloc_fn = 0x7fc9483e8f10 <__GI___libc_malloc>, free_fn = 0x7fc9483e9510 <__GI___libc_free>}
        __func__ = "ht_dmq_replicate_action"
#6  0x00007fc7f9c07cdb in pv_set_ht_cell (msg=0x7fc9380cade8, param=0x7fc937ec0b18, op=254, val=0x7ffcc6739440) at ht_var.c:119
        htname = {s = 0x7fc937bead28 "94587 at maxCallsCompany", len = 21}
        isval = {n = 935234752, s = {s = 0x7fc937be8cc0 "2", len = 1}, re = 0x7fc937be8cc0}
        hpv = 0x7fc937ec0bf8
        __func__ = "pv_set_ht_cell"
#7  0x0000555b1041d5e9 in lval_pvar_assign (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, lv=0x7fc937ec0d08, rv=0x7fc937ec0e88) at core/lvalue.c:352
        pvar = 0x7fc937ec0b00
        pval = {rs = {s = 0x7fc937be8cc0 "2", len = 1}, ri = 0, flags = 4}
        r_avp = 0x7fc937c33258
        avp_val = {n = 937990368, s = {s = 0x7fc937e898e0 "\b\232\353\067\311\177", len = 938213768}, re = 0x7fc937e898e0}
        ret = 1
        v = 32712
        destroy_pval = 1
        __func__ = "lval_pvar_assign"
#8  0x0000555b1041e161 in lval_assign (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, lv=0x7fc937ec0d08, rve=0x7fc937ec0e80) at core/lvalue.c:400
        rv = 0x7fc937ec0e88
        ret = 0
        __func__ = "lval_assign"
#9  0x0000555b1040a515 in do_action (h=0x7ffcc673b6d0, a=0x7fc937ec15b0, msg=0x7fc9380cade8) at core/action.c:1455
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 8704, sa_data = "EH\311\177\000\000\063\230z\020[U\000"}, sin = {sin_family = 8704, sin_port = 18501, sin_addr = {s_addr = 32713}, sin_zero = "3\230z\020[U\000"}, sin6 = {sin6_family = 8704, sin6_port = 18501, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "3\230z\020[U\000\000\000\000 at 9\001\000\000", __u6_addr16 = {38963, 4218, 21851, 0, 0, 14656, 1, 0}, __u6_addr32 = {276469811, 21851, 960495616, 1}}}, sin6_scope_id = 3329464880}, sas = {ss_family = 8704, __ss_padding = "EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000\060\232s\306\374\177\000\000\000\234s\306\374\177\000\000\370\216\353\067\311\177\000\000\350\255\f8\311\177\000\000\000\233s\306\374\177\000\000ji\300\371\307\177", '\000' <repeats 11 times>, "\234s\306\374\177\000\000\370\216\353\067\311\177\000\000\350\255\f8\311\177\000\000\260\232s\306\374\177\000\000\314]Y\020[U\000", __ss_align = 140502204194406}}, id = 19, send_flags = {f = 0, blst_imask = 0}, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937b6d010 "\001"
        new_uri = 0x38 <error: Cannot access memory at address 0x38>
        end = 0x555b1064cae7 <qm_free+8293> "\353\n\220\353\a\220\353\004\220\353\001\220H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>
        crt = 0x0
        cmd = 0x7fc937c16cb0
        len = 0
        user = 0
        uri = {user = {s = 0x7ffcc67398d0 "", len = -57849891}, passwd = {s = 0x555b10761688 "", len = 0}, host = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 271258488}, port = {s = 0x401d58 <error: Cannot access memory at address 0x401d58>, len = 5565576}, params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, sip_params = {s = 0x38 <error: Cannot access memory at address 0x38>, len = 0}, headers = {s = 0x7ffcc6739900 "\020\232s\306\374\177", len = 273118466}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 934729216), transport = {s = 0xd107a9833 <error: Cannot access memory at address 0xd107a9833>, len = 934729216}, ttl = {s = 0x7ffcc6739a10 "0\232s\306\374\177", len = 275040999}, user_param = {s = 0x1107a9833 <error: Cannot access memory at address 0x1107a9833>, len = -32080472}, maddr = {s = 0x7fc7f9c43443 "htable", len = -104809343}, method = {s = 0x7fc7f9c45a00 <__func__.8058> "ht_cell_pkg_free", len = -104581580}, lr = {s = 0x7fc937f6ae40 "", len = 934727696}, r2 = {s = 0x7ffcc6739970 "0\232s\306\374\177", len = -104803908}, gr = {s = 0xf6210761688 <error: Cannot access memory at address 0xf6210761688>, len = -35672280}, transport_val = {s = 0x7ffcc6739a30 "", len = -104772743}, ttl_val = {s = 0x7fc937f89e66 "*prepaid", len = 938913344}, user_param_val = {s = 0x7ffcc6739aa0 " \v\276\067\311\177", len = -35672280}, maddr_val = {s = 0x7fc937f6aed8 "\b", len = 938913056}, method_val = {s = 0x0, len = 1212490240}, lr_val = {s = 0x555b107a9833 "INFO", len = 934727696}, r2_val = {s = 0x68 <error: Cannot access memory at address 0x68>, len = 938913288}, gr_val = {s = 0x7ffcc6739aa8 "\023", len = 276174472}}
        next_hop = {user = {s = 0x7fc937eacc20 "", len = 940355048}, passwd = {s = 0x7fc937de7098 "\a", len = 276174472}, host = {s = 0x0, len = 276174472}, port = {s = 0x0, len = 939039512}, params = {s = 0x555b107a9833 "INFO", len = 276174472}, sip_params = {s = 0x6000000111 <error: Cannot access memory at address 0x6000000111>, len = 938134637}, headers = {s = 0x7fc90000000b "", len = 0}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (unknown: 4), transport = {s = 0x0, len = 276598617}, ttl = {s = 0x7fc8040bd29c "94587 at billingMethod", len = 19}, user_param = {s = 0x7fc937eacc6d "hcgrReqType)", len = 11}, maddr = {s = 0x1555b107c8f58 <error: Cannot access memory at address 0x1555b107c8f58>, len = 76549136}, method = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = -252645136}, lr = {s = 0x7ffcc6739800 "", len = -178335373}, r2 = {s = 0xafc6739800 <error: Cannot access memory at address 0xafc6739800>, len = -965502932}, gr = {s = 0x4107ac97f <error: Cannot access memory at address 0x4107ac97f>, len = 67883616}, transport_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 276174472}, ttl_val = {s = 0x0, len = 1212490240}, user_param_val = {s = 0x555b107a9833 "INFO", len = 960495616}, maddr_val = {s = 0x7ffcc67398d0 "", len = 274517235}, method_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr_val = {s = 0x7fc937eacc08 "\004", len = 275070078}, r2_val = {s = 0x7ffcc6739890 "", len = 934727696}, gr_val = {s = 0x7ffcc6739890 "", len = 934727696}}
        u = 0x0
        port = 0
        dst_host = 0x0
        i = 939039224
        flags = 32764
        avp = 0x7fc937f8a288
        st = {flags = 11, id = 32713, name = {n = 960495616, s = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965502944}, re = 0x139400000}, avp = 0x7fc7fd5f5969 <pv_get_avp+1913>}
        sct = 0x555b10761688
        sjt = 0x0
        rve = 0x7fc9380cade8
        mct = 0x7fc937eb8dc0
        rv = 0x7fc937eacc6d
        rv1 = 0x7ffcc673b6d0
        c1 = {cache_type = 276469811, val_type = 21851, c = {avp_val = {n = -965503168, s = {s = 0x7ffcc6739740 "\021\001", len = 938134637}, re = 0x7ffcc6739740}, pval = {rs = {s = 0x7ffcc6739740 "\021\001", len = 938134637}, ri = 11, flags = 32713}}, i2s = "\200\227s\306\374\177\000\000\210\026v\020\001\000\000\000\001\000\000\000\000"}
        s = {s = 0x7fc90000000b "", len = 960495616}
        srevp = {0x7fc937ec15b0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739660, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#10 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937eb97d0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937ec15b0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 938260488, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#11 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937ecb808, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x7ffcc673a260, to = {s = {sa_family = 7831, sa_data = "\223\371\307\177\000\000\200\242s\306\006\000\000"}, sin = {sin_family = 7831, sin_port = 63891, sin_addr = {s_addr = 32711}, sin_zero = "\200\242s\306\006\000\000"}, sin6 = {sin6_family = 7831, sin6_port = 63891, sin6_flowinfo = 32711, sin6_addr = {__in6_u = {__u6_addr8 = "\200\242s\306\006\000\000\000\274=\035\376\307\177\000", __u6_addr16 = {41600, 50803, 6, 0, 15804, 65053, 32711, 0}, __u6_addr32 = {3329467008, 6, 4263329212, 32711}}}, sin6_scope_id = 940355824}, sas = {ss_family = 7831, __ss_padding = "\223\371\307\177\000\000\200\242s\306\006\000\000\000\274=\035\376\307\177\000\000\360\260\f8\311\177\000\000\210\026v\020\001\000\000\000`\243s\306\374\177\000\000,\365\223\371\307\177\000\000\027\000\000\000W\024\365h\000\000\000\000\000\000\000\000\260\242s\306\374\177\000\000\314,X\020[U\000\000\063\230z\020\006\000\000\000Kʞ\371\307\177\000\000\200\243s\306\374\177\000\000UU\235\371\307\177\000", __ss_align = 4294968379}}, id = 237164320, send_flags = {f = 32712, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937f356a8 "\002"
        new_uri = 0x7fc937f355e0 ""
        end = 0xfe105cccf3 <error: Cannot access memory at address 0xfe105cccf3>
        crt = 0x7fc937f35828 "\a"
        cmd = 0x7fc937c145b8
        len = 32711
        user = -178367519
        uri = {user = {s = 0x7ffcc673a1a0 "\360\241s\306\374\177", len = 275030754}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549424}, host = {s = 0x7fc7f99eca4b "dialog", len = 938694688}, port = {s = 0x7fc7f99ece08 <__func__.11151> "new_dlg_var", len = -107033068}, params = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -35909632}, sip_params = {s = 0x7fc7f99d5541 "", len = 76549424}, headers = {s = 0x555b10761688 "", len = 276174472}, port_no = 41312, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 4116631920), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -965500532}, ttl = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1}, user_param = {s = 0x68f5145700000017 <error: Cannot access memory at address 0x68f5145700000017>, len = 42925352}, maddr = {s = 0x1c673a1a0 <error: Cannot access memory at address 0x1c673a1a0>, len = -35674424}, method = {s = 0x7ffcc673a1a0 "\360\241s\306\374\177", len = 275017917}, lr = {s = 0x0, len = -35674424}, r2 = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549424}, gr = {s = 0x7ffcc673a1f0 "0\242s\306\374\177", len = 275079674}, transport_val = {s = 0x1c673a1f0 <error: Cannot access memory at address 0x1c673a1f0>, len = 76549424}, ttl_val = {s = 0x7ffcc673a1f0 "0\242s\306\374\177", len = -178372384}, user_param_val = {s = 0x7fc7f99d5541 "", len = 76549424}, maddr_val = {s = 0x555b10761688 "", len = 276174472}, method_val = {s = 0x7ffcc673a230 "`\242s\306\374\177", len = -178335373}, lr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -965500324}, r2_val = {s = 0x6c673a240 <error: Cannot access memory at address 0x6c673a240>, len = -107129541}, gr_val = {s = 0x100000017 <error: Cannot access memory at address 0x100000017>, len = -31638084}}
        next_hop = {user = {s = 0x7ffcc6739fc0 "8\344\273\067\311\177", len = -965499864}, passwd = {s = 0x7fc938002378 "", len = 940355048}, host = {s = 0x7ffcc673a020 "X\217|\020[U", len = -107139900}, port = {s = 0x7fc937bb21c8 "residential", len = -965499864}, params = {s = 0x7fc938002378 "", len = 940355048}, sip_params = {s = 0x7ffcc673a030 "\360\360\360", <incomplete sequence \360>, len = -107152281}, headers = {s = 0x1c6739fd0 <error: Cannot access memory at address 0x1c6739fd0>, len = 76549424}, port_no = 40912, proto = 50803, type = 32764, flags = (unknown: 4116594912), transport = {s = 0x7fc7f99d5541 "", len = 76549424}, ttl = {s = 0x7fc937bbe438 "residential", len = 11}, user_param = {s = 0x7ffcc673a010 "@\240s\306\374\177", len = 91938872}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, method = {s = 0x7ffcc673a148 "\001", len = 276598617}, lr = {s = 0x1c673a040 <error: Cannot access memory at address 0x1c673a040>, len = 76549136}, r2 = {s = 0x7ffcc673a040 "\200\240s\306\374\177", len = -178372384}, gr = {s = 0x555b107c8f58 "", len = 76549136}, transport_val = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = -252645136}, ttl_val = {s = 0x7ffcc673a080 "\260\240s\306\374\177", len = -178335373}, user_param_val = {s = 0x7f00000001 <error: Cannot access memory at address 0x7f00000001>, len = -965500756}, maddr_val = {s = 0x4f99ece14 <error: Cannot access memory at address 0x4f99ece14>, len = 276598612}, method_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, lr_val = {s = 0x7ffcc673a0b0 "\240\241s\306\374\177", len = 274214092}, r2_val = {s = 0x4028efd70 <error: Cannot access memory at address 0x4028efd70>, len = 276598612}, gr_val = {s = 0x7ffcc673a1a0 "\360\241s\306\374\177", len = 275030558}}
        u = 0x7ffcc673a5f0
        port = 0
        dst_host = 0x7fc80e22d720
        i = 14
        flags = 1
        avp = 0x555b107a9833
        st = {flags = 938629984, id = 32713, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x7fc948452200 <__syslog>}
        sct = 0x555b10d79c30
        sjt = 0x7fc9380cade8
        rve = 0x7fc937eb9e18
        mct = 0x7fc937f35848
        rv = 0x7fc7fe1d3dbc
        rv1 = 0x7fc937c60060
        c1 = {cache_type = 255, val_type = RV_NONE, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, ri = 939535208, flags = 32713}}, i2s = "\350\255\f8\311\177\000\000жs\306\374\177\000\000\250=\035\376\307\177"}
        s = {s = 0x7fc9380cade8 "mH\001", len = -965495088}
        srevp = {0x7fc937ecb808, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739ea0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937eae4d8, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937ecb808
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935723104, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#13 0x0000555b103fa952 in do_action (h=0x7ffcc673b6d0, a=0x7fc937c60060, msg=0x7fc9380cade8) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\350\356\305\067\311\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\350\356\305\067\311\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\350\356\305\067\311\177\000\000\024\256s\306\374\177\000", __u6_addr16 = {61160, 14277, 32713, 0, 44564, 50803, 32764, 0}, __u6_addr32 = {935718632, 32713, 3329469972, 32764}}}, sin6_scope_id = 940355048}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\350\356\305\067\311\177\000\000\024\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\270\347\305\067\311\177\000\000\030\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\210\026v\020[U\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000", __ss_align = 140723637955568}}, id = -64824879, send_flags = {f = 32711, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937f96488 ""
        new_uri = 0x7ffcc673ae18 "\001"
        end = 0x7fc937c5e7b0 "\001"
        crt = 0x7fc937c5e7b8 "\a"
        cmd = 0x7fc937c5eee0
        len = 32711
        user = -178367519
        uri = {user = {s = 0x0, len = 1212490240}, passwd = {s = 0x555b107a9833 "INFO", len = 960495616}, host = {s = 0x7ffcc673a960 "\200\251s\306\374\177", len = -44162673}, port = {s = 0x7ffcc673a9bc "\001", len = 273118466}, params = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 1}, sip_params = {s = 0x7ffcc673aa40 "\360\252s\306\374\177", len = 275030558}, headers = {s = 0x555b10b141d4 <ut_buf_int2str+20> "0", len = 275031704}, port_no = 43392, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4250804744), transport = {s = 0x7ffcc673a9bc "\001", len = 1}, ttl = {s = 0x7ffcc673a9d0 "\200\252s\306\374\177", len = -44068401}, user_param = {s = 0x38 <error: Cannot access memory at address 0x38>, len = -965497384}, maddr = {s = 0x7fc937c5e7d8 "\001", len = 940355048}, method = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, lr = {s = 0x7fc937c488c8 "`\211\304\067\311\177", len = 280052180}, r2 = {s = 0x7ffcc673aa80 "\350\356\305\067\311\177", len = 274517235}, gr = {s = 0x0, len = -965497384}, transport_val = {s = 0x7fc937c5e7c0 "\017", len = 940355048}, ttl_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 934727696}, user_param_val = {s = 0x0, len = 276174472}, maddr_val = {s = 0x0, len = 1212490240}, method_val = {s = 0x555b107a9833 "INFO", len = 960495616}, lr_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 274387908}, r2_val = {s = 0x7fc7fc440d20 <rr_param_buf_ptr> ";did=3f3.daf1", len = 276174472}, gr_val = {s = 0x0, len = 1212490240}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffcc673a7b0 "", len = 276174472}, host = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, port = {s = 0x555b107a9833 "INFO", len = 276174472}, params = {s = 0x0, len = 1212490240}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, headers = {s = 0x7ffcc673a8e0 "", len = 275070078}, port_no = 43040, proto = 50803, type = 32764, flags = (unknown: 934727696), transport = {s = 0x7ffcc673a820 "", len = 934727696}, ttl = {s = 0x7ffcc673a860 "\220\250s\306\374\177", len = -57849891}, user_param = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, maddr = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 271259688}, method = {s = 0x401b80 <error: Cannot access memory at address 0x401b80>, len = 5564376}, lr = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, r2 = {s = 0x38 <error: Cannot access memory at address 0x38>, len = 0}, gr = {s = 0x7ffcc673a890 "\200\251s\306\374\177", len = 273118466}, transport_val = {s = 0x7ffcc673a94c "\001", len = 276598612}, ttl_val = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 0}, user_param_val = {s = 0x7ffcc673a980 "Щs\306\374\177", len = 275070078}, maddr_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, method_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, lr_val = {s = 0x7ffcc673a920 "\274\251s\306\374\177", len = -57849891}, r2_val = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, gr_val = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 276174472}}
        u = 0x7ffcc673ae30
        port = 0
        dst_host = 0x555b107a982c
        i = 24
        flags = 0
        avp = 0x0
        st = {flags = 3329468288, id = 32764, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x555b105cf57c <pv_value_destroy+175>}
        sct = 0x1c673ab90
        sjt = 0x0
        rve = 0x1900000001
        mct = 0x0
        rv = 0x10761688
        rv1 = 0x7ffcc673b34c
        c1 = {cache_type = 3329468224, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, ri = -965497728, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = 0}
        srevp = {0x7fc937c60060, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673a6e0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#14 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c5fe28, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c60060
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 1
        __func__ = "run_actions"
#15 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937c6f3d8, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x555b10a4405f <buf+95>, to = {s = {sa_family = 4, sa_data = "\000\000\001\000\254\027\200\264s\306\374\177\000"}, sin = {sin_family = 4, sin_port = 0, sin_addr = {s_addr = 397148161}, sin_zero = "\200\264s\306\374\177\000"}, sin6 = {sin6_family = 4, sin6_port = 0, sin6_flowinfo = 397148161, sin6_addr = {__in6_u = {__u6_addr8 = "\200\264s\306\374\177\000\000\020Bi\020[U\000", __u6_addr16 = {46208, 50803, 32764, 0, 16912, 4201, 21851, 0}, __u6_addr32 = {3329471616, 32764, 275333648, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 4, __ss_padding = "\000\000\001\000\254\027\200\264s\306\374\177\000\000\020Bi\020[U\000\000\000\000\000\000\000\000\000\000\200P\371\067\311\177\000\000\203D\244\020[U\000\000A@\244\020[U\000\000 \263s\306\374\177\000\000\020ж7\311\177\000\000`\263s\306\374\177\000\000\335G\215\374\307\177\000\000\360\360\360\360", '\000' <repeats 14 times>, "\200\020\000\000\000\000X>+\020\000\000\000", __ss_align = 4195832}}, id = 5554600, send_flags = {f = 0, blst_imask = 0}, proto = -64 '\300', proto_pad0 = 119 'w', proto_pad1 = 1285}
        tmp = 0x7fc804900c10 ""
        new_uri = 0x7fc937f94ee0 "\001"
        end = 0x555b106d42fd <parse_method_name+2024> "\205\300\017\224\300\017\266\300H\205\300t\027H\213\205p\377\377\377", <incomplete sequence \307>
        crt = 0x1c673b510 <error: Cannot access memory at address 0x1c673b510>
        cmd = 0x7fc937c137c0
        len = 0
        user = 939085496
        uri = {user = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -965496436}, passwd = {s = 0x4c673b1a0 <error: Cannot access memory at address 0x4c673b1a0>, len = 276653360}, host = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, port = {s = 0x7ffcc673b190 "\300\262s\306\374\177", len = 274214092}, params = {s = 0x400400748 <error: Cannot access memory at address 0x400400748>, len = 276653360}, sip_params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, headers = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275281682}, port_no = 45520, proto = 50803, type = 32764, flags = (URI_SIP_USER_PHONE | unknown: 273118464), transport = {s = 0x0, len = 276598612}, ttl = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275030558}, user_param = {s = 0x7fc937f95080 "\001", len = 940032816}, maddr = {s = 0x7ffcc673b342 "\005\005", len = -965495997}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x555b107d6d88 <__func__.6797> "parse_via", len = 276659112}, r2 = {s = 0x1c673b250 <error: Cannot access memory at address 0x1c673b250>, len = 76549136}, gr = {s = 0x7ffcc673b250 "\220\262s\306\374\177", len = -178372384}, transport_val = {s = 0x555b107d6534 "", len = 76549136}, ttl_val = {s = 0x555b10761688 "", len = 276174472}, user_param_val = {s = 0x7ffcc673b290 "\300\262s\306\004", len = -178335373}, maddr_val = {s = 0x0, len = -965496132}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}, lr_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = -965496004}, r2_val = {s = 0x4c673b2c0 <error: Cannot access memory at address 0x4c673b2c0>, len = 279199835}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 279199839}}
        next_hop = {user = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1}, passwd = {s = 0x7fc93807c158 "\a", len = 0}, host = {s = 0x7fc937f73fb8 "\001", len = 939085328}, port = {s = 0xfa <error: Cannot access memory at address 0xfa>, len = 938950584}, params = {s = 0x0, len = 939086120}, sip_params = {s = 0x7fc937f73d10 "\003", len = 939085328}, headers = {s = 0x7fc93807c330 <incomplete sequence \350>, len = 939085952}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x1c673b120 <error: Cannot access memory at address 0x1c673b120>, len = 76549136}, method_val = {s = 0x7ffcc673b120 "`\261s\306\374\177", len = -178372384}, lr_val = {s = 0x555b107d6534 "", len = 76549136}, r2_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 16}, gr_val = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -178335373}}
        u = 0x555b107df530 <__func__.6625>
        port = 0
        dst_host = 0x555b10761688
        i = 31
        flags = 21851
        avp = 0x1
        st = {flags = 65537, id = 60, name = {n = 279199744, s = {s = 0x555b10a44000 <buf> "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"..., len = 6}, re = 0x555b10a44000 <buf>}, avp = 0x555b10a44007 <buf+7>}
        sct = 0x7ffcc673b480
        sjt = 0x7fc804900c10
        rve = 0x7fc937c5f610
        mct = 0x1
        rv = 0x0
        rv1 = 0x555b10a4419c <buf+412>
        c1 = {cache_type = 276174472, val_type = 21851, c = {avp_val = {n = 0, s = {s = 0x0, len = 276824064}, re = 0x0}, pval = {rs = {s = 0x0, len = 276824064}, ri = 271261120, flags = 0}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x7ffcc673af90 "\006", len = -57849891}
        srevp = {0x7fc937c6f3d8, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673af20, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#16 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c473c0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c6f3d8
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 276690800, tz_dsttime = 21851}
        tdiff = 4116631923
        __func__ = "run_actions"
#17 0x0000555b1040cbbe in run_top_route (a=0x7fc937c473c0, msg=0x7fc9380cade8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {93849603950067, 4571428513, 140502205509096, 93849606559368, 4571141768, 140723637958544, 140496791851379, 140723637958560, 140723637958588, 18118954512, 93849606846109, 8004010816636452865, 0, 140723637958592, 93849606559368, 0}}}}}
        p = 0x7ffcc673b6d0
        ret = 276469811
        sfbk = 0
#18 0x0000555b1057b6e8 in receive_msg (buf=0x555b10a44000 <buf> "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"..., len=1155, rcv_info=0x7ffcc673bd40) at core/receive.c:423
        msg = 0x7fc9380cade8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 15 times>, 1}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x555b10a44000 <buf> "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"..., len = 1155}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcc673b8b0, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcc673bd40, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#19 0x0000555b10447d59 in udp_rcv_loop () at core/udp_server.c:543
        len = 1155
        buf = "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"...
        tmp = 0x1b <error: Cannot access memory at address 0x1b>
        fromaddr = 0x7fc93807e930
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {918529802, 0}, addr32 = {918529802, 0, 0, 0}, addr16 = {42762, 14015, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277\066", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1019193098, 0}, addr32 = {1019193098, 0, 0, 0}, addr16 = {42762, 15551, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277<", '\000' <repeats 11 times>}}, src_port = 6060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\027\254\n\247\277\066\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 44055, sin_addr = {s_addr = 918529802}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 44055, sin6_flowinfo = 918529802, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\027\254\n\247\277\066", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fc937bfff30, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "\270\025\221\004\310\177\000\000\270\025\221\004\001\000\000\000P\273s\306\374\177\000\000s\321^\365\307\177\000\000P\273s\306\374\177\000\000\220\267\331\020[U\000\000@\263\331\020[U\000\000\247\261s\306\374\177\000\000\220\261s\306\374\177\000\000\000\000\000\000\000\000\000\001", '\000' <repeats 20 times>, "\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000\000\270\025\221\004\310\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000@\274s\306\374\177\000\000\005\067\346\356\307\177\000\000\177\252y\020[U\000\000\020\f\220\004\b\000\000\000\270\025\221\004\310\177\000\000"...
        i = -1
        j = 130560
        l = 0
        __func__ = "udp_rcv_loop"
#20 0x0000555b1038de84 in main_loop () at main.c:1683
        i = 7
        pid = 0
        si = 0x7fc937bfff30
        si_desc = "udp receiver child=7 sock=edge.hipertel.local:5060\000\"EH\311\177\000\000\000\000\000\000\000\000\000\000\060\000\000\000\060\000\000\000\070\300s\306\374\177\000\000P\277s\306\374\177\000\000\250Nx\020[U\000\000\370\226\r8k\000\000\000\063\230z\020[U\000\000\360\226\n8\311\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#21 0x0000555b10398511 in main (argc=11, argv=0x7ffcc673c568) at main.c:2856
        cfg_stream = 0x555b10bef010
        c = -1
        r = 0
        tmp = 0x7ffcc673deba ""
        tmp_len = 32764
        port = -965491792
        proto = 32713
        ahost = 0x0
        aport = 0
        options = 0x555b10764348 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 900928915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7fc94926d040 <_rtld_global>
        p = 0x7ffcc673de72 "edge"
        st = {st_dev = 19, st_ino = 23307, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1641492636, tv_nsec = 884483965}, st_mtim = {tv_sec = 1599774907, tv_nsec = 42281020}, st_ctim = {tv_sec = 1599774907, tv_nsec = 42281020}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000 \232\004I\311\177\000\000\330\331&I\311\177\000\000\a\000\000\000\000\000\000\000\a\000\000\000\a\000\000\000\070\224\004I\311\177\000\000\060\302s\306\374\177\000\000\215F\005I\311\177\000\000\000\000\000\000\000\000\000\000\272J\005I\311\177", '\000' <repeats 11 times>, "\200\065\020[U", '\000' <repeats 13 times>, "\377\000\000\000\000", '\377' <repeats 11 times>, "\000\377\377\377\377GLIBC_2.2.5\000GLIB\000__f", '\000' <repeats 12 times>, "inite\000getpriorit", '\000' <repeats 136 times>...
        option_index = 0
        long_options = {{name = 0x555b107663d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x555b10761b1c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x555b107663db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x555b107663e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x555b107663e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x555b107663f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x555b107663fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x555b10766404 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x555b1076640f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x555b10766418 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x555b10766423 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007fc7f9e53741 in futex_get (lock=0x7fc7fe0c8a20) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007fc7f9e55819 in bcast_dmq_message1 (peer=0x7fc7fe1cb440, body=0x7ffcc6739250, except=0x0, resp_cback=0x7fc7f9e4e4f0 <ht_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9e4e4b0 <ht_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:156
        node = 0x7fc804900ad0
        __func__ = "bcast_dmq_message1"
#3  0x00007fc7f9e56072 in bcast_dmq_message (peer=0x7fc7fe1cb440, body=0x7ffcc6739250, except=0x0, resp_cback=0x7fc7f9e4e4f0 <ht_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9e4e4b0 <ht_dmq_content_type>) at dmq_funcs.c:188
No locals.
#4  0x00007fc7f9c3a640 in ht_dmq_send (body=0x7ffcc6739250, node=0x0) at ht_dmq.c:237
        __func__ = "ht_dmq_send"
#5  0x00007fc7f9c3d4b5 in ht_dmq_replicate_action (action=HT_DMQ_SET_CELL, htname=0x7fc937ec0bf8, cname=0x7ffcc6739350, type=2, val=0x7ffcc6739340, mode=1) at ht_dmq.c:388
        jdoc = {root = 0x555b10da7b10, flags = 0, buf = {s = 0x555b10dad530 "{\"action\":1,\"htname\":\"tcompanydata\",\"cname\":\"94587 at maxCallsCompany\",\"type\":2,\"strval\":\"2\",\"mode\":1}", len = 99}, malloc_fn = 0x7fc9483e8f10 <__GI___libc_malloc>, free_fn = 0x7fc9483e9510 <__GI___libc_free>}
        __func__ = "ht_dmq_replicate_action"
#6  0x00007fc7f9c07cdb in pv_set_ht_cell (msg=0x7fc9380cade8, param=0x7fc937ec0b18, op=254, val=0x7ffcc6739440) at ht_var.c:119
        htname = {s = 0x7fc937bead28 "94587 at maxCallsCompany", len = 21}
        isval = {n = 935234752, s = {s = 0x7fc937be8cc0 "2", len = 1}, re = 0x7fc937be8cc0}
        hpv = 0x7fc937ec0bf8
        __func__ = "pv_set_ht_cell"
#7  0x0000555b1041d5e9 in lval_pvar_assign (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, lv=0x7fc937ec0d08, rv=0x7fc937ec0e88) at core/lvalue.c:352
        pvar = 0x7fc937ec0b00
        pval = {rs = {s = 0x7fc937be8cc0 "2", len = 1}, ri = 0, flags = 4}
        r_avp = 0x7fc937c33258
        avp_val = {n = 937990368, s = {s = 0x7fc937e898e0 "\b\232\353\067\311\177", len = 938213768}, re = 0x7fc937e898e0}
        ret = 1
        v = 32712
        destroy_pval = 1
        __func__ = "lval_pvar_assign"
#8  0x0000555b1041e161 in lval_assign (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, lv=0x7fc937ec0d08, rve=0x7fc937ec0e80) at core/lvalue.c:400
        rv = 0x7fc937ec0e88
        ret = 0
        __func__ = "lval_assign"
#9  0x0000555b1040a515 in do_action (h=0x7ffcc673b6d0, a=0x7fc937ec15b0, msg=0x7fc9380cade8) at core/action.c:1455
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 8704, sa_data = "EH\311\177\000\000\063\230z\020[U\000"}, sin = {sin_family = 8704, sin_port = 18501, sin_addr = {s_addr = 32713}, sin_zero = "3\230z\020[U\000"}, sin6 = {sin6_family = 8704, sin6_port = 18501, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "3\230z\020[U\000\000\000\000 at 9\001\000\000", __u6_addr16 = {38963, 4218, 21851, 0, 0, 14656, 1, 0}, __u6_addr32 = {276469811, 21851, 960495616, 1}}}, sin6_scope_id = 3329464880}, sas = {ss_family = 8704, __ss_padding = "EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000\060\232s\306\374\177\000\000\000\234s\306\374\177\000\000\370\216\353\067\311\177\000\000\350\255\f8\311\177\000\000\000\233s\306\374\177\000\000ji\300\371\307\177", '\000' <repeats 11 times>, "\234s\306\374\177\000\000\370\216\353\067\311\177\000\000\350\255\f8\311\177\000\000\260\232s\306\374\177\000\000\314]Y\020[U\000", __ss_align = 140502204194406}}, id = 19, send_flags = {f = 0, blst_imask = 0}, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937b6d010 "\001"
        new_uri = 0x38 <error: Cannot access memory at address 0x38>
        end = 0x555b1064cae7 <qm_free+8293> "\353\n\220\353\a\220\353\004\220\353\001\220H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>
        crt = 0x0
        cmd = 0x7fc937c16cb0
        len = 0
        user = 0
        uri = {user = {s = 0x7ffcc67398d0 "", len = -57849891}, passwd = {s = 0x555b10761688 "", len = 0}, host = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 271258488}, port = {s = 0x401d58 <error: Cannot access memory at address 0x401d58>, len = 5565576}, params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, sip_params = {s = 0x38 <error: Cannot access memory at address 0x38>, len = 0}, headers = {s = 0x7ffcc6739900 "\020\232s\306\374\177", len = 273118466}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 934729216), transport = {s = 0xd107a9833 <error: Cannot access memory at address 0xd107a9833>, len = 934729216}, ttl = {s = 0x7ffcc6739a10 "0\232s\306\374\177", len = 275040999}, user_param = {s = 0x1107a9833 <error: Cannot access memory at address 0x1107a9833>, len = -32080472}, maddr = {s = 0x7fc7f9c43443 "htable", len = -104809343}, method = {s = 0x7fc7f9c45a00 <__func__.8058> "ht_cell_pkg_free", len = -104581580}, lr = {s = 0x7fc937f6ae40 "", len = 934727696}, r2 = {s = 0x7ffcc6739970 "0\232s\306\374\177", len = -104803908}, gr = {s = 0xf6210761688 <error: Cannot access memory at address 0xf6210761688>, len = -35672280}, transport_val = {s = 0x7ffcc6739a30 "", len = -104772743}, ttl_val = {s = 0x7fc937f89e66 "*prepaid", len = 938913344}, user_param_val = {s = 0x7ffcc6739aa0 " \v\276\067\311\177", len = -35672280}, maddr_val = {s = 0x7fc937f6aed8 "\b", len = 938913056}, method_val = {s = 0x0, len = 1212490240}, lr_val = {s = 0x555b107a9833 "INFO", len = 934727696}, r2_val = {s = 0x68 <error: Cannot access memory at address 0x68>, len = 938913288}, gr_val = {s = 0x7ffcc6739aa8 "\023", len = 276174472}}
        next_hop = {user = {s = 0x7fc937eacc20 "", len = 940355048}, passwd = {s = 0x7fc937de7098 "\a", len = 276174472}, host = {s = 0x0, len = 276174472}, port = {s = 0x0, len = 939039512}, params = {s = 0x555b107a9833 "INFO", len = 276174472}, sip_params = {s = 0x6000000111 <error: Cannot access memory at address 0x6000000111>, len = 938134637}, headers = {s = 0x7fc90000000b "", len = 0}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (unknown: 4), transport = {s = 0x0, len = 276598617}, ttl = {s = 0x7fc8040bd29c "94587 at billingMethod", len = 19}, user_param = {s = 0x7fc937eacc6d "hcgrReqType)", len = 11}, maddr = {s = 0x1555b107c8f58 <error: Cannot access memory at address 0x1555b107c8f58>, len = 76549136}, method = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = -252645136}, lr = {s = 0x7ffcc6739800 "", len = -178335373}, r2 = {s = 0xafc6739800 <error: Cannot access memory at address 0xafc6739800>, len = -965502932}, gr = {s = 0x4107ac97f <error: Cannot access memory at address 0x4107ac97f>, len = 67883616}, transport_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 276174472}, ttl_val = {s = 0x0, len = 1212490240}, user_param_val = {s = 0x555b107a9833 "INFO", len = 960495616}, maddr_val = {s = 0x7ffcc67398d0 "", len = 274517235}, method_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr_val = {s = 0x7fc937eacc08 "\004", len = 275070078}, r2_val = {s = 0x7ffcc6739890 "", len = 934727696}, gr_val = {s = 0x7ffcc6739890 "", len = 934727696}}
        u = 0x0
        port = 0
        dst_host = 0x0
        i = 939039224
        flags = 32764
        avp = 0x7fc937f8a288
        st = {flags = 11, id = 32713, name = {n = 960495616, s = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965502944}, re = 0x139400000}, avp = 0x7fc7fd5f5969 <pv_get_avp+1913>}
        sct = 0x555b10761688
        sjt = 0x0
        rve = 0x7fc9380cade8
        mct = 0x7fc937eb8dc0
        rv = 0x7fc937eacc6d
        rv1 = 0x7ffcc673b6d0
        c1 = {cache_type = 276469811, val_type = 21851, c = {avp_val = {n = -965503168, s = {s = 0x7ffcc6739740 "\021\001", len = 938134637}, re = 0x7ffcc6739740}, pval = {rs = {s = 0x7ffcc6739740 "\021\001", len = 938134637}, ri = 11, flags = 32713}}, i2s = "\200\227s\306\374\177\000\000\210\026v\020\001\000\000\000\001\000\000\000\000"}
        s = {s = 0x7fc90000000b "", len = 960495616}
        srevp = {0x7fc937ec15b0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739660, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#10 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937eb97d0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937ec15b0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 938260488, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#11 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937ecb808, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x7ffcc673a260, to = {s = {sa_family = 7831, sa_data = "\223\371\307\177\000\000\200\242s\306\006\000\000"}, sin = {sin_family = 7831, sin_port = 63891, sin_addr = {s_addr = 32711}, sin_zero = "\200\242s\306\006\000\000"}, sin6 = {sin6_family = 7831, sin6_port = 63891, sin6_flowinfo = 32711, sin6_addr = {__in6_u = {__u6_addr8 = "\200\242s\306\006\000\000\000\274=\035\376\307\177\000", __u6_addr16 = {41600, 50803, 6, 0, 15804, 65053, 32711, 0}, __u6_addr32 = {3329467008, 6, 4263329212, 32711}}}, sin6_scope_id = 940355824}, sas = {ss_family = 7831, __ss_padding = "\223\371\307\177\000\000\200\242s\306\006\000\000\000\274=\035\376\307\177\000\000\360\260\f8\311\177\000\000\210\026v\020\001\000\000\000`\243s\306\374\177\000\000,\365\223\371\307\177\000\000\027\000\000\000W\024\365h\000\000\000\000\000\000\000\000\260\242s\306\374\177\000\000\314,X\020[U\000\000\063\230z\020\006\000\000\000Kʞ\371\307\177\000\000\200\243s\306\374\177\000\000UU\235\371\307\177\000", __ss_align = 4294968379}}, id = 237164320, send_flags = {f = 32712, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937f356a8 "\002"
        new_uri = 0x7fc937f355e0 ""
        end = 0xfe105cccf3 <error: Cannot access memory at address 0xfe105cccf3>
        crt = 0x7fc937f35828 "\a"
        cmd = 0x7fc937c145b8
        len = 32711
        user = -178367519
        uri = {user = {s = 0x7ffcc673a1a0 "\360\241s\306\374\177", len = 275030754}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549424}, host = {s = 0x7fc7f99eca4b "dialog", len = 938694688}, port = {s = 0x7fc7f99ece08 <__func__.11151> "new_dlg_var", len = -107033068}, params = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -35909632}, sip_params = {s = 0x7fc7f99d5541 "", len = 76549424}, headers = {s = 0x555b10761688 "", len = 276174472}, port_no = 41312, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 4116631920), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -965500532}, ttl = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1}, user_param = {s = 0x68f5145700000017 <error: Cannot access memory at address 0x68f5145700000017>, len = 42925352}, maddr = {s = 0x1c673a1a0 <error: Cannot access memory at address 0x1c673a1a0>, len = -35674424}, method = {s = 0x7ffcc673a1a0 "\360\241s\306\374\177", len = 275017917}, lr = {s = 0x0, len = -35674424}, r2 = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549424}, gr = {s = 0x7ffcc673a1f0 "0\242s\306\374\177", len = 275079674}, transport_val = {s = 0x1c673a1f0 <error: Cannot access memory at address 0x1c673a1f0>, len = 76549424}, ttl_val = {s = 0x7ffcc673a1f0 "0\242s\306\374\177", len = -178372384}, user_param_val = {s = 0x7fc7f99d5541 "", len = 76549424}, maddr_val = {s = 0x555b10761688 "", len = 276174472}, method_val = {s = 0x7ffcc673a230 "`\242s\306\374\177", len = -178335373}, lr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -965500324}, r2_val = {s = 0x6c673a240 <error: Cannot access memory at address 0x6c673a240>, len = -107129541}, gr_val = {s = 0x100000017 <error: Cannot access memory at address 0x100000017>, len = -31638084}}
        next_hop = {user = {s = 0x7ffcc6739fc0 "8\344\273\067\311\177", len = -965499864}, passwd = {s = 0x7fc938002378 "", len = 940355048}, host = {s = 0x7ffcc673a020 "X\217|\020[U", len = -107139900}, port = {s = 0x7fc937bb21c8 "residential", len = -965499864}, params = {s = 0x7fc938002378 "", len = 940355048}, sip_params = {s = 0x7ffcc673a030 "\360\360\360", <incomplete sequence \360>, len = -107152281}, headers = {s = 0x1c6739fd0 <error: Cannot access memory at address 0x1c6739fd0>, len = 76549424}, port_no = 40912, proto = 50803, type = 32764, flags = (unknown: 4116594912), transport = {s = 0x7fc7f99d5541 "", len = 76549424}, ttl = {s = 0x7fc937bbe438 "residential", len = 11}, user_param = {s = 0x7ffcc673a010 "@\240s\306\374\177", len = 91938872}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, method = {s = 0x7ffcc673a148 "\001", len = 276598617}, lr = {s = 0x1c673a040 <error: Cannot access memory at address 0x1c673a040>, len = 76549136}, r2 = {s = 0x7ffcc673a040 "\200\240s\306\374\177", len = -178372384}, gr = {s = 0x555b107c8f58 "", len = 76549136}, transport_val = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = -252645136}, ttl_val = {s = 0x7ffcc673a080 "\260\240s\306\374\177", len = -178335373}, user_param_val = {s = 0x7f00000001 <error: Cannot access memory at address 0x7f00000001>, len = -965500756}, maddr_val = {s = 0x4f99ece14 <error: Cannot access memory at address 0x4f99ece14>, len = 276598612}, method_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, lr_val = {s = 0x7ffcc673a0b0 "\240\241s\306\374\177", len = 274214092}, r2_val = {s = 0x4028efd70 <error: Cannot access memory at address 0x4028efd70>, len = 276598612}, gr_val = {s = 0x7ffcc673a1a0 "\360\241s\306\374\177", len = 275030558}}
        u = 0x7ffcc673a5f0
        port = 0
        dst_host = 0x7fc80e22d720
        i = 14
        flags = 1
        avp = 0x555b107a9833
        st = {flags = 938629984, id = 32713, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x7fc948452200 <__syslog>}
        sct = 0x555b10d79c30
        sjt = 0x7fc9380cade8
        rve = 0x7fc937eb9e18
        mct = 0x7fc937f35848
        rv = 0x7fc7fe1d3dbc
        rv1 = 0x7fc937c60060
        c1 = {cache_type = 255, val_type = RV_NONE, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, ri = 939535208, flags = 32713}}, i2s = "\350\255\f8\311\177\000\000жs\306\374\177\000\000\250=\035\376\307\177"}
        s = {s = 0x7fc9380cade8 "mH\001", len = -965495088}
        srevp = {0x7fc937ecb808, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739ea0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937eae4d8, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937ecb808
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935723104, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#13 0x0000555b103fa952 in do_action (h=0x7ffcc673b6d0, a=0x7fc937c60060, msg=0x7fc9380cade8) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\350\356\305\067\311\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\350\356\305\067\311\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\350\356\305\067\311\177\000\000\024\256s\306\374\177\000", __u6_addr16 = {61160, 14277, 32713, 0, 44564, 50803, 32764, 0}, __u6_addr32 = {935718632, 32713, 3329469972, 32764}}}, sin6_scope_id = 940355048}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\350\356\305\067\311\177\000\000\024\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\270\347\305\067\311\177\000\000\030\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\210\026v\020[U\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000", __ss_align = 140723637955568}}, id = -64824879, send_flags = {f = 32711, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937f96488 ""
        new_uri = 0x7ffcc673ae18 "\001"
        end = 0x7fc937c5e7b0 "\001"
        crt = 0x7fc937c5e7b8 "\a"
        cmd = 0x7fc937c5eee0
        len = 32711
        user = -178367519
        uri = {user = {s = 0x0, len = 1212490240}, passwd = {s = 0x555b107a9833 "INFO", len = 960495616}, host = {s = 0x7ffcc673a960 "\200\251s\306\374\177", len = -44162673}, port = {s = 0x7ffcc673a9bc "\001", len = 273118466}, params = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 1}, sip_params = {s = 0x7ffcc673aa40 "\360\252s\306\374\177", len = 275030558}, headers = {s = 0x555b10b141d4 <ut_buf_int2str+20> "0", len = 275031704}, port_no = 43392, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4250804744), transport = {s = 0x7ffcc673a9bc "\001", len = 1}, ttl = {s = 0x7ffcc673a9d0 "\200\252s\306\374\177", len = -44068401}, user_param = {s = 0x38 <error: Cannot access memory at address 0x38>, len = -965497384}, maddr = {s = 0x7fc937c5e7d8 "\001", len = 940355048}, method = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, lr = {s = 0x7fc937c488c8 "`\211\304\067\311\177", len = 280052180}, r2 = {s = 0x7ffcc673aa80 "\350\356\305\067\311\177", len = 274517235}, gr = {s = 0x0, len = -965497384}, transport_val = {s = 0x7fc937c5e7c0 "\017", len = 940355048}, ttl_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 934727696}, user_param_val = {s = 0x0, len = 276174472}, maddr_val = {s = 0x0, len = 1212490240}, method_val = {s = 0x555b107a9833 "INFO", len = 960495616}, lr_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 274387908}, r2_val = {s = 0x7fc7fc440d20 <rr_param_buf_ptr> ";did=3f3.daf1", len = 276174472}, gr_val = {s = 0x0, len = 1212490240}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffcc673a7b0 "", len = 276174472}, host = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, port = {s = 0x555b107a9833 "INFO", len = 276174472}, params = {s = 0x0, len = 1212490240}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, headers = {s = 0x7ffcc673a8e0 "", len = 275070078}, port_no = 43040, proto = 50803, type = 32764, flags = (unknown: 934727696), transport = {s = 0x7ffcc673a820 "", len = 934727696}, ttl = {s = 0x7ffcc673a860 "\220\250s\306\374\177", len = -57849891}, user_param = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, maddr = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 271259688}, method = {s = 0x401b80 <error: Cannot access memory at address 0x401b80>, len = 5564376}, lr = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, r2 = {s = 0x38 <error: Cannot access memory at address 0x38>, len = 0}, gr = {s = 0x7ffcc673a890 "\200\251s\306\374\177", len = 273118466}, transport_val = {s = 0x7ffcc673a94c "\001", len = 276598612}, ttl_val = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 0}, user_param_val = {s = 0x7ffcc673a980 "Щs\306\374\177", len = 275070078}, maddr_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, method_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, lr_val = {s = 0x7ffcc673a920 "\274\251s\306\374\177", len = -57849891}, r2_val = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, gr_val = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 276174472}}
        u = 0x7ffcc673ae30
        port = 0
        dst_host = 0x555b107a982c
        i = 24
        flags = 0
        avp = 0x0
        st = {flags = 3329468288, id = 32764, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x555b105cf57c <pv_value_destroy+175>}
        sct = 0x1c673ab90
        sjt = 0x0
        rve = 0x1900000001
        mct = 0x0
        rv = 0x10761688
        rv1 = 0x7ffcc673b34c
        c1 = {cache_type = 3329468224, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, ri = -965497728, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = 0}
        srevp = {0x7fc937c60060, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673a6e0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#14 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c5fe28, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c60060
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 1
        __func__ = "run_actions"
#15 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937c6f3d8, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x555b10a4405f <buf+95>, to = {s = {sa_family = 4, sa_data = "\000\000\001\000\254\027\200\264s\306\374\177\000"}, sin = {sin_family = 4, sin_port = 0, sin_addr = {s_addr = 397148161}, sin_zero = "\200\264s\306\374\177\000"}, sin6 = {sin6_family = 4, sin6_port = 0, sin6_flowinfo = 397148161, sin6_addr = {__in6_u = {__u6_addr8 = "\200\264s\306\374\177\000\000\020Bi\020[U\000", __u6_addr16 = {46208, 50803, 32764, 0, 16912, 4201, 21851, 0}, __u6_addr32 = {3329471616, 32764, 275333648, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 4, __ss_padding = "\000\000\001\000\254\027\200\264s\306\374\177\000\000\020Bi\020[U\000\000\000\000\000\000\000\000\000\000\200P\371\067\311\177\000\000\203D\244\020[U\000\000A@\244\020[U\000\000 \263s\306\374\177\000\000\020ж7\311\177\000\000`\263s\306\374\177\000\000\335G\215\374\307\177\000\000\360\360\360\360", '\000' <repeats 14 times>, "\200\020\000\000\000\000X>+\020\000\000\000", __ss_align = 4195832}}, id = 5554600, send_flags = {f = 0, blst_imask = 0}, proto = -64 '\300', proto_pad0 = 119 'w', proto_pad1 = 1285}
        tmp = 0x7fc804900c10 ""
        new_uri = 0x7fc937f94ee0 "\001"
        end = 0x555b106d42fd <parse_method_name+2024> "\205\300\017\224\300\017\266\300H\205\300t\027H\213\205p\377\377\377", <incomplete sequence \307>
        crt = 0x1c673b510 <error: Cannot access memory at address 0x1c673b510>
        cmd = 0x7fc937c137c0
        len = 0
        user = 939085496
        uri = {user = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -965496436}, passwd = {s = 0x4c673b1a0 <error: Cannot access memory at address 0x4c673b1a0>, len = 276653360}, host = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, port = {s = 0x7ffcc673b190 "\300\262s\306\374\177", len = 274214092}, params = {s = 0x400400748 <error: Cannot access memory at address 0x400400748>, len = 276653360}, sip_params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, headers = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275281682}, port_no = 45520, proto = 50803, type = 32764, flags = (URI_SIP_USER_PHONE | unknown: 273118464), transport = {s = 0x0, len = 276598612}, ttl = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275030558}, user_param = {s = 0x7fc937f95080 "\001", len = 940032816}, maddr = {s = 0x7ffcc673b342 "\005\005", len = -965495997}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x555b107d6d88 <__func__.6797> "parse_via", len = 276659112}, r2 = {s = 0x1c673b250 <error: Cannot access memory at address 0x1c673b250>, len = 76549136}, gr = {s = 0x7ffcc673b250 "\220\262s\306\374\177", len = -178372384}, transport_val = {s = 0x555b107d6534 "", len = 76549136}, ttl_val = {s = 0x555b10761688 "", len = 276174472}, user_param_val = {s = 0x7ffcc673b290 "\300\262s\306\004", len = -178335373}, maddr_val = {s = 0x0, len = -965496132}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}, lr_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = -965496004}, r2_val = {s = 0x4c673b2c0 <error: Cannot access memory at address 0x4c673b2c0>, len = 279199835}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 279199839}}
        next_hop = {user = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1}, passwd = {s = 0x7fc93807c158 "\a", len = 0}, host = {s = 0x7fc937f73fb8 "\001", len = 939085328}, port = {s = 0xfa <error: Cannot access memory at address 0xfa>, len = 938950584}, params = {s = 0x0, len = 939086120}, sip_params = {s = 0x7fc937f73d10 "\003", len = 939085328}, headers = {s = 0x7fc93807c330 <incomplete sequence \350>, len = 939085952}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x1c673b120 <error: Cannot access memory at address 0x1c673b120>, len = 76549136}, method_val = {s = 0x7ffcc673b120 "`\261s\306\374\177", len = -178372384}, lr_val = {s = 0x555b107d6534 "", len = 76549136}, r2_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 16}, gr_val = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -178335373}}
        u = 0x555b107df530 <__func__.6625>
        port = 0
        dst_host = 0x555b10761688
        i = 31
        flags = 21851
        avp = 0x1
        st = {flags = 65537, id = 60, name = {n = 279199744, s = {s = 0x555b10a44000 <buf> "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"..., len = 6}, re = 0x555b10a44000 <buf>}, avp = 0x555b10a44007 <buf+7>}
        sct = 0x7ffcc673b480
        sjt = 0x7fc804900c10
        rve = 0x7fc937c5f610
        mct = 0x1
        rv = 0x0
        rv1 = 0x555b10a4419c <buf+412>
        c1 = {cache_type = 276174472, val_type = 21851, c = {avp_val = {n = 0, s = {s = 0x0, len = 276824064}, re = 0x0}, pval = {rs = {s = 0x0, len = 276824064}, ri = 271261120, flags = 0}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x7ffcc673af90 "\006", len = -57849891}
        srevp = {0x7fc937c6f3d8, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673af20, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#16 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c473c0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c6f3d8
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 276690800, tz_dsttime = 21851}
        tdiff = 4116631923
        __func__ = "run_actions"
#17 0x0000555b1040cbbe in run_top_route (a=0x7fc937c473c0, msg=0x7fc9380cade8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {93849603950067, 4571428513, 140502205509096, 93849606559368, 4571141768, 140723637958544, 140496791851379, 140723637958560, 140723637958588, 18118954512, 93849606846109, 8004010816636452865, 0, 140723637958592, 93849606559368, 0}}}}}
        p = 0x7ffcc673b6d0
        ret = 276469811
        sfbk = 0
#18 0x0000555b1057b6e8 in receive_msg (buf=0x555b10a44000 <buf> "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"..., len=1155, rcv_info=0x7ffcc673bd40) at core/receive.c:423
        msg = 0x7fc9380cade8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 15 times>, 1}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x555b10a44000 <buf> "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"..., len = 1155}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcc673b8b0, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcc673bd40, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#19 0x0000555b10447d59 in udp_rcv_loop () at core/udp_server.c:543
        len = 1155
        buf = "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"...
        tmp = 0x1b <error: Cannot access memory at address 0x1b>
        fromaddr = 0x7fc93807e930
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {918529802, 0}, addr32 = {918529802, 0, 0, 0}, addr16 = {42762, 14015, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277\066", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1019193098, 0}, addr32 = {1019193098, 0, 0, 0}, addr16 = {42762, 15551, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277<", '\000' <repeats 11 times>}}, src_port = 6060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\027\254\n\247\277\066\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 44055, sin_addr = {s_addr = 918529802}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 44055, sin6_flowinfo = 918529802, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\027\254\n\247\277\066", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fc937bfff30, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "\270\025\221\004\310\177\000\000\270\025\221\004\001\000\000\000P\273s\306\374\177\000\000s\321^\365\307\177\000\000P\273s\306\374\177\000\000\220\267\331\020[U\000\000@\263\331\020[U\000\000\247\261s\306\374\177\000\000\220\261s\306\374\177\000\000\000\000\000\000\000\000\000\001", '\000' <repeats 20 times>, "\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000\000\270\025\221\004\310\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000@\274s\306\374\177\000\000\005\067\346\356\307\177\000\000\177\252y\020[U\000\000\020\f\220\004\b\000\000\000\270\025\221\004\310\177\000\000"...
        i = -1
        j = 130560
        l = 0
        __func__ = "udp_rcv_loop"
#20 0x0000555b1038de84 in main_loop () at main.c:1683
        i = 7
        pid = 0
        si = 0x7fc937bfff30
        si_desc = "udp receiver child=7 sock=edge.hipertel.local:5060\000\"EH\311\177\000\000\000\000\000\000\000\000\000\000\060\000\000\000\060\000\000\000\070\300s\306\374\177\000\000P\277s\306\374\177\000\000\250Nx\020[U\000\000\370\226\r8k\000\000\000\063\230z\020[U\000\000\360\226\n8\311\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#21 0x0000555b10398511 in main (argc=11, argv=0x7ffcc673c568) at main.c:2856
        cfg_stream = 0x555b10bef010
        c = -1
        r = 0
        tmp = 0x7ffcc673deba ""
        tmp_len = 32764
        port = -965491792
        proto = 32713
        ahost = 0x0
        aport = 0
        options = 0x555b10764348 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 900928915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7fc94926d040 <_rtld_global>
        p = 0x7ffcc673de72 "edge"
        st = {st_dev = 19, st_ino = 23307, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1641492636, tv_nsec = 884483965}, st_mtim = {tv_sec = 1599774907, tv_nsec = 42281020}, st_ctim = {tv_sec = 1599774907, tv_nsec = 42281020}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000 \232\004I\311\177\000\000\330\331&I\311\177\000\000\a\000\000\000\000\000\000\000\a\000\000\000\a\000\000\000\070\224\004I\311\177\000\000\060\302s\306\374\177\000\000\215F\005I\311\177\000\000\000\000\000\000\000\000\000\000\272J\005I\311\177", '\000' <repeats 11 times>, "\200\065\020[U", '\000' <repeats 13 times>, "\377\000\000\000\000", '\377' <repeats 11 times>, "\000\377\377\377\377GLIBC_2.2.5\000GLIB\000__f", '\000' <repeats 12 times>, "inite\000getpriorit", '\000' <repeats 136 times>...
        option_index = 0
        long_options = {{name = 0x555b107663d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x555b10761b1c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x555b107663db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x555b107663e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x555b107663e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x555b107663f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x555b107663fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x555b10766404 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x555b1076640f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x555b10766418 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x555b10766423 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007fc7f9e53741 in futex_get (lock=0x7fc7fe0c8a20) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007fc7f9e55819 in bcast_dmq_message1 (peer=0x7fc7fe1cb440, body=0x7ffcc6739250, except=0x0, resp_cback=0x7fc7f9e4e4f0 <ht_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9e4e4b0 <ht_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:156
        node = 0x7fc804900ad0
        __func__ = "bcast_dmq_message1"
#3  0x00007fc7f9e56072 in bcast_dmq_message (peer=0x7fc7fe1cb440, body=0x7ffcc6739250, except=0x0, resp_cback=0x7fc7f9e4e4f0 <ht_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9e4e4b0 <ht_dmq_content_type>) at dmq_funcs.c:188
No locals.
#4  0x00007fc7f9c3a640 in ht_dmq_send (body=0x7ffcc6739250, node=0x0) at ht_dmq.c:237
        __func__ = "ht_dmq_send"
#5  0x00007fc7f9c3d4b5 in ht_dmq_replicate_action (action=HT_DMQ_SET_CELL, htname=0x7fc937ec0bf8, cname=0x7ffcc6739350, type=2, val=0x7ffcc6739340, mode=1) at ht_dmq.c:388
        jdoc = {root = 0x555b10da7b10, flags = 0, buf = {s = 0x555b10dad530 "{\"action\":1,\"htname\":\"tcompanydata\",\"cname\":\"94587 at maxCallsCompany\",\"type\":2,\"strval\":\"2\",\"mode\":1}", len = 99}, malloc_fn = 0x7fc9483e8f10 <__GI___libc_malloc>, free_fn = 0x7fc9483e9510 <__GI___libc_free>}
        __func__ = "ht_dmq_replicate_action"
#6  0x00007fc7f9c07cdb in pv_set_ht_cell (msg=0x7fc9380cade8, param=0x7fc937ec0b18, op=254, val=0x7ffcc6739440) at ht_var.c:119
        htname = {s = 0x7fc937bead28 "94587 at maxCallsCompany", len = 21}
        isval = {n = 935234752, s = {s = 0x7fc937be8cc0 "2", len = 1}, re = 0x7fc937be8cc0}
        hpv = 0x7fc937ec0bf8
        __func__ = "pv_set_ht_cell"
#7  0x0000555b1041d5e9 in lval_pvar_assign (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, lv=0x7fc937ec0d08, rv=0x7fc937ec0e88) at core/lvalue.c:352
        pvar = 0x7fc937ec0b00
        pval = {rs = {s = 0x7fc937be8cc0 "2", len = 1}, ri = 0, flags = 4}
        r_avp = 0x7fc937c33258
        avp_val = {n = 937990368, s = {s = 0x7fc937e898e0 "\b\232\353\067\311\177", len = 938213768}, re = 0x7fc937e898e0}
        ret = 1
        v = 32712
        destroy_pval = 1
        __func__ = "lval_pvar_assign"
#8  0x0000555b1041e161 in lval_assign (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, lv=0x7fc937ec0d08, rve=0x7fc937ec0e80) at core/lvalue.c:400
        rv = 0x7fc937ec0e88
        ret = 0
        __func__ = "lval_assign"
#9  0x0000555b1040a515 in do_action (h=0x7ffcc673b6d0, a=0x7fc937ec15b0, msg=0x7fc9380cade8) at core/action.c:1455
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 8704, sa_data = "EH\311\177\000\000\063\230z\020[U\000"}, sin = {sin_family = 8704, sin_port = 18501, sin_addr = {s_addr = 32713}, sin_zero = "3\230z\020[U\000"}, sin6 = {sin6_family = 8704, sin6_port = 18501, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "3\230z\020[U\000\000\000\000 at 9\001\000\000", __u6_addr16 = {38963, 4218, 21851, 0, 0, 14656, 1, 0}, __u6_addr32 = {276469811, 21851, 960495616, 1}}}, sin6_scope_id = 3329464880}, sas = {ss_family = 8704, __ss_padding = "EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000\060\232s\306\374\177\000\000\000\234s\306\374\177\000\000\370\216\353\067\311\177\000\000\350\255\f8\311\177\000\000\000\233s\306\374\177\000\000ji\300\371\307\177", '\000' <repeats 11 times>, "\234s\306\374\177\000\000\370\216\353\067\311\177\000\000\350\255\f8\311\177\000\000\260\232s\306\374\177\000\000\314]Y\020[U\000", __ss_align = 140502204194406}}, id = 19, send_flags = {f = 0, blst_imask = 0}, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937b6d010 "\001"
        new_uri = 0x38 <error: Cannot access memory at address 0x38>
        end = 0x555b1064cae7 <qm_free+8293> "\353\n\220\353\a\220\353\004\220\353\001\220H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>
        crt = 0x0
        cmd = 0x7fc937c16cb0
        len = 0
        user = 0
        uri = {user = {s = 0x7ffcc67398d0 "", len = -57849891}, passwd = {s = 0x555b10761688 "", len = 0}, host = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 271258488}, port = {s = 0x401d58 <error: Cannot access memory at address 0x401d58>, len = 5565576}, params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, sip_params = {s = 0x38 <error: Cannot access memory at address 0x38>, len = 0}, headers = {s = 0x7ffcc6739900 "\020\232s\306\374\177", len = 273118466}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 934729216), transport = {s = 0xd107a9833 <error: Cannot access memory at address 0xd107a9833>, len = 934729216}, ttl = {s = 0x7ffcc6739a10 "0\232s\306\374\177", len = 275040999}, user_param = {s = 0x1107a9833 <error: Cannot access memory at address 0x1107a9833>, len = -32080472}, maddr = {s = 0x7fc7f9c43443 "htable", len = -104809343}, method = {s = 0x7fc7f9c45a00 <__func__.8058> "ht_cell_pkg_free", len = -104581580}, lr = {s = 0x7fc937f6ae40 "", len = 934727696}, r2 = {s = 0x7ffcc6739970 "0\232s\306\374\177", len = -104803908}, gr = {s = 0xf6210761688 <error: Cannot access memory at address 0xf6210761688>, len = -35672280}, transport_val = {s = 0x7ffcc6739a30 "", len = -104772743}, ttl_val = {s = 0x7fc937f89e66 "*prepaid", len = 938913344}, user_param_val = {s = 0x7ffcc6739aa0 " \v\276\067\311\177", len = -35672280}, maddr_val = {s = 0x7fc937f6aed8 "\b", len = 938913056}, method_val = {s = 0x0, len = 1212490240}, lr_val = {s = 0x555b107a9833 "INFO", len = 934727696}, r2_val = {s = 0x68 <error: Cannot access memory at address 0x68>, len = 938913288}, gr_val = {s = 0x7ffcc6739aa8 "\023", len = 276174472}}
        next_hop = {user = {s = 0x7fc937eacc20 "", len = 940355048}, passwd = {s = 0x7fc937de7098 "\a", len = 276174472}, host = {s = 0x0, len = 276174472}, port = {s = 0x0, len = 939039512}, params = {s = 0x555b107a9833 "INFO", len = 276174472}, sip_params = {s = 0x6000000111 <error: Cannot access memory at address 0x6000000111>, len = 938134637}, headers = {s = 0x7fc90000000b "", len = 0}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (unknown: 4), transport = {s = 0x0, len = 276598617}, ttl = {s = 0x7fc8040bd29c "94587 at billingMethod", len = 19}, user_param = {s = 0x7fc937eacc6d "hcgrReqType)", len = 11}, maddr = {s = 0x1555b107c8f58 <error: Cannot access memory at address 0x1555b107c8f58>, len = 76549136}, method = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = -252645136}, lr = {s = 0x7ffcc6739800 "", len = -178335373}, r2 = {s = 0xafc6739800 <error: Cannot access memory at address 0xafc6739800>, len = -965502932}, gr = {s = 0x4107ac97f <error: Cannot access memory at address 0x4107ac97f>, len = 67883616}, transport_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 276174472}, ttl_val = {s = 0x0, len = 1212490240}, user_param_val = {s = 0x555b107a9833 "INFO", len = 960495616}, maddr_val = {s = 0x7ffcc67398d0 "", len = 274517235}, method_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr_val = {s = 0x7fc937eacc08 "\004", len = 275070078}, r2_val = {s = 0x7ffcc6739890 "", len = 934727696}, gr_val = {s = 0x7ffcc6739890 "", len = 934727696}}
        u = 0x0
        port = 0
        dst_host = 0x0
        i = 939039224
        flags = 32764
        avp = 0x7fc937f8a288
        st = {flags = 11, id = 32713, name = {n = 960495616, s = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965502944}, re = 0x139400000}, avp = 0x7fc7fd5f5969 <pv_get_avp+1913>}
        sct = 0x555b10761688
        sjt = 0x0
        rve = 0x7fc9380cade8
        mct = 0x7fc937eb8dc0
        rv = 0x7fc937eacc6d
        rv1 = 0x7ffcc673b6d0
        c1 = {cache_type = 276469811, val_type = 21851, c = {avp_val = {n = -965503168, s = {s = 0x7ffcc6739740 "\021\001", len = 938134637}, re = 0x7ffcc6739740}, pval = {rs = {s = 0x7ffcc6739740 "\021\001", len = 938134637}, ri = 11, flags = 32713}}, i2s = "\200\227s\306\374\177\000\000\210\026v\020\001\000\000\000\001\000\000\000\000"}
        s = {s = 0x7fc90000000b "", len = 960495616}
        srevp = {0x7fc937ec15b0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739660, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#10 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937eb97d0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937ec15b0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 938260488, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#11 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937ecb808, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x7ffcc673a260, to = {s = {sa_family = 7831, sa_data = "\223\371\307\177\000\000\200\242s\306\006\000\000"}, sin = {sin_family = 7831, sin_port = 63891, sin_addr = {s_addr = 32711}, sin_zero = "\200\242s\306\006\000\000"}, sin6 = {sin6_family = 7831, sin6_port = 63891, sin6_flowinfo = 32711, sin6_addr = {__in6_u = {__u6_addr8 = "\200\242s\306\006\000\000\000\274=\035\376\307\177\000", __u6_addr16 = {41600, 50803, 6, 0, 15804, 65053, 32711, 0}, __u6_addr32 = {3329467008, 6, 4263329212, 32711}}}, sin6_scope_id = 940355824}, sas = {ss_family = 7831, __ss_padding = "\223\371\307\177\000\000\200\242s\306\006\000\000\000\274=\035\376\307\177\000\000\360\260\f8\311\177\000\000\210\026v\020\001\000\000\000`\243s\306\374\177\000\000,\365\223\371\307\177\000\000\027\000\000\000W\024\365h\000\000\000\000\000\000\000\000\260\242s\306\374\177\000\000\314,X\020[U\000\000\063\230z\020\006\000\000\000Kʞ\371\307\177\000\000\200\243s\306\374\177\000\000UU\235\371\307\177\000", __ss_align = 4294968379}}, id = 237164320, send_flags = {f = 32712, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937f356a8 "\002"
        new_uri = 0x7fc937f355e0 ""
        end = 0xfe105cccf3 <error: Cannot access memory at address 0xfe105cccf3>
        crt = 0x7fc937f35828 "\a"
        cmd = 0x7fc937c145b8
        len = 32711
        user = -178367519
        uri = {user = {s = 0x7ffcc673a1a0 "\360\241s\306\374\177", len = 275030754}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549424}, host = {s = 0x7fc7f99eca4b "dialog", len = 938694688}, port = {s = 0x7fc7f99ece08 <__func__.11151> "new_dlg_var", len = -107033068}, params = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -35909632}, sip_params = {s = 0x7fc7f99d5541 "", len = 76549424}, headers = {s = 0x555b10761688 "", len = 276174472}, port_no = 41312, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 4116631920), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -965500532}, ttl = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1}, user_param = {s = 0x68f5145700000017 <error: Cannot access memory at address 0x68f5145700000017>, len = 42925352}, maddr = {s = 0x1c673a1a0 <error: Cannot access memory at address 0x1c673a1a0>, len = -35674424}, method = {s = 0x7ffcc673a1a0 "\360\241s\306\374\177", len = 275017917}, lr = {s = 0x0, len = -35674424}, r2 = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549424}, gr = {s = 0x7ffcc673a1f0 "0\242s\306\374\177", len = 275079674}, transport_val = {s = 0x1c673a1f0 <error: Cannot access memory at address 0x1c673a1f0>, len = 76549424}, ttl_val = {s = 0x7ffcc673a1f0 "0\242s\306\374\177", len = -178372384}, user_param_val = {s = 0x7fc7f99d5541 "", len = 76549424}, maddr_val = {s = 0x555b10761688 "", len = 276174472}, method_val = {s = 0x7ffcc673a230 "`\242s\306\374\177", len = -178335373}, lr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -965500324}, r2_val = {s = 0x6c673a240 <error: Cannot access memory at address 0x6c673a240>, len = -107129541}, gr_val = {s = 0x100000017 <error: Cannot access memory at address 0x100000017>, len = -31638084}}
        next_hop = {user = {s = 0x7ffcc6739fc0 "8\344\273\067\311\177", len = -965499864}, passwd = {s = 0x7fc938002378 "", len = 940355048}, host = {s = 0x7ffcc673a020 "X\217|\020[U", len = -107139900}, port = {s = 0x7fc937bb21c8 "residential", len = -965499864}, params = {s = 0x7fc938002378 "", len = 940355048}, sip_params = {s = 0x7ffcc673a030 "\360\360\360", <incomplete sequence \360>, len = -107152281}, headers = {s = 0x1c6739fd0 <error: Cannot access memory at address 0x1c6739fd0>, len = 76549424}, port_no = 40912, proto = 50803, type = 32764, flags = (unknown: 4116594912), transport = {s = 0x7fc7f99d5541 "", len = 76549424}, ttl = {s = 0x7fc937bbe438 "residential", len = 11}, user_param = {s = 0x7ffcc673a010 "@\240s\306\374\177", len = 91938872}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, method = {s = 0x7ffcc673a148 "\001", len = 276598617}, lr = {s = 0x1c673a040 <error: Cannot access memory at address 0x1c673a040>, len = 76549136}, r2 = {s = 0x7ffcc673a040 "\200\240s\306\374\177", len = -178372384}, gr = {s = 0x555b107c8f58 "", len = 76549136}, transport_val = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = -252645136}, ttl_val = {s = 0x7ffcc673a080 "\260\240s\306\374\177", len = -178335373}, user_param_val = {s = 0x7f00000001 <error: Cannot access memory at address 0x7f00000001>, len = -965500756}, maddr_val = {s = 0x4f99ece14 <error: Cannot access memory at address 0x4f99ece14>, len = 276598612}, method_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, lr_val = {s = 0x7ffcc673a0b0 "\240\241s\306\374\177", len = 274214092}, r2_val = {s = 0x4028efd70 <error: Cannot access memory at address 0x4028efd70>, len = 276598612}, gr_val = {s = 0x7ffcc673a1a0 "\360\241s\306\374\177", len = 275030558}}
        u = 0x7ffcc673a5f0
        port = 0
        dst_host = 0x7fc80e22d720
        i = 14
        flags = 1
        avp = 0x555b107a9833
        st = {flags = 938629984, id = 32713, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x7fc948452200 <__syslog>}
        sct = 0x555b10d79c30
        sjt = 0x7fc9380cade8
        rve = 0x7fc937eb9e18
        mct = 0x7fc937f35848
        rv = 0x7fc7fe1d3dbc
        rv1 = 0x7fc937c60060
        c1 = {cache_type = 255, val_type = RV_NONE, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, ri = 939535208, flags = 32713}}, i2s = "\350\255\f8\311\177\000\000жs\306\374\177\000\000\250=\035\376\307\177"}
        s = {s = 0x7fc9380cade8 "mH\001", len = -965495088}
        srevp = {0x7fc937ecb808, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739ea0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937eae4d8, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937ecb808
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935723104, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#13 0x0000555b103fa952 in do_action (h=0x7ffcc673b6d0, a=0x7fc937c60060, msg=0x7fc9380cade8) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\350\356\305\067\311\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\350\356\305\067\311\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\350\356\305\067\311\177\000\000\024\256s\306\374\177\000", __u6_addr16 = {61160, 14277, 32713, 0, 44564, 50803, 32764, 0}, __u6_addr32 = {935718632, 32713, 3329469972, 32764}}}, sin6_scope_id = 940355048}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\350\356\305\067\311\177\000\000\024\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\270\347\305\067\311\177\000\000\030\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\210\026v\020[U\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000", __ss_align = 140723637955568}}, id = -64824879, send_flags = {f = 32711, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937f96488 ""
        new_uri = 0x7ffcc673ae18 "\001"
        end = 0x7fc937c5e7b0 "\001"
        crt = 0x7fc937c5e7b8 "\a"
        cmd = 0x7fc937c5eee0
        len = 32711
        user = -178367519
        uri = {user = {s = 0x0, len = 1212490240}, passwd = {s = 0x555b107a9833 "INFO", len = 960495616}, host = {s = 0x7ffcc673a960 "\200\251s\306\374\177", len = -44162673}, port = {s = 0x7ffcc673a9bc "\001", len = 273118466}, params = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 1}, sip_params = {s = 0x7ffcc673aa40 "\360\252s\306\374\177", len = 275030558}, headers = {s = 0x555b10b141d4 <ut_buf_int2str+20> "0", len = 275031704}, port_no = 43392, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4250804744), transport = {s = 0x7ffcc673a9bc "\001", len = 1}, ttl = {s = 0x7ffcc673a9d0 "\200\252s\306\374\177", len = -44068401}, user_param = {s = 0x38 <error: Cannot access memory at address 0x38>, len = -965497384}, maddr = {s = 0x7fc937c5e7d8 "\001", len = 940355048}, method = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, lr = {s = 0x7fc937c488c8 "`\211\304\067\311\177", len = 280052180}, r2 = {s = 0x7ffcc673aa80 "\350\356\305\067\311\177", len = 274517235}, gr = {s = 0x0, len = -965497384}, transport_val = {s = 0x7fc937c5e7c0 "\017", len = 940355048}, ttl_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 934727696}, user_param_val = {s = 0x0, len = 276174472}, maddr_val = {s = 0x0, len = 1212490240}, method_val = {s = 0x555b107a9833 "INFO", len = 960495616}, lr_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 274387908}, r2_val = {s = 0x7fc7fc440d20 <rr_param_buf_ptr> ";did=3f3.daf1", len = 276174472}, gr_val = {s = 0x0, len = 1212490240}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffcc673a7b0 "", len = 276174472}, host = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, port = {s = 0x555b107a9833 "INFO", len = 276174472}, params = {s = 0x0, len = 1212490240}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, headers = {s = 0x7ffcc673a8e0 "", len = 275070078}, port_no = 43040, proto = 50803, type = 32764, flags = (unknown: 934727696), transport = {s = 0x7ffcc673a820 "", len = 934727696}, ttl = {s = 0x7ffcc673a860 "\220\250s\306\374\177", len = -57849891}, user_param = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, maddr = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 271259688}, method = {s = 0x401b80 <error: Cannot access memory at address 0x401b80>, len = 5564376}, lr = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, r2 = {s = 0x38 <error: Cannot access memory at address 0x38>, len = 0}, gr = {s = 0x7ffcc673a890 "\200\251s\306\374\177", len = 273118466}, transport_val = {s = 0x7ffcc673a94c "\001", len = 276598612}, ttl_val = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 0}, user_param_val = {s = 0x7ffcc673a980 "Щs\306\374\177", len = 275070078}, maddr_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, method_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, lr_val = {s = 0x7ffcc673a920 "\274\251s\306\374\177", len = -57849891}, r2_val = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, gr_val = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 276174472}}
        u = 0x7ffcc673ae30
        port = 0
        dst_host = 0x555b107a982c
        i = 24
        flags = 0
        avp = 0x0
        st = {flags = 3329468288, id = 32764, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x555b105cf57c <pv_value_destroy+175>}
        sct = 0x1c673ab90
        sjt = 0x0
        rve = 0x1900000001
        mct = 0x0
        rv = 0x10761688
        rv1 = 0x7ffcc673b34c
        c1 = {cache_type = 3329468224, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, ri = -965497728, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = 0}
        srevp = {0x7fc937c60060, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673a6e0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#14 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c5fe28, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c60060
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 1
        __func__ = "run_actions"
#15 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937c6f3d8, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x555b10a4405f <buf+95>, to = {s = {sa_family = 4, sa_data = "\000\000\001\000\254\027\200\264s\306\374\177\000"}, sin = {sin_family = 4, sin_port = 0, sin_addr = {s_addr = 397148161}, sin_zero = "\200\264s\306\374\177\000"}, sin6 = {sin6_family = 4, sin6_port = 0, sin6_flowinfo = 397148161, sin6_addr = {__in6_u = {__u6_addr8 = "\200\264s\306\374\177\000\000\020Bi\020[U\000", __u6_addr16 = {46208, 50803, 32764, 0, 16912, 4201, 21851, 0}, __u6_addr32 = {3329471616, 32764, 275333648, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 4, __ss_padding = "\000\000\001\000\254\027\200\264s\306\374\177\000\000\020Bi\020[U\000\000\000\000\000\000\000\000\000\000\200P\371\067\311\177\000\000\203D\244\020[U\000\000A@\244\020[U\000\000 \263s\306\374\177\000\000\020ж7\311\177\000\000`\263s\306\374\177\000\000\335G\215\374\307\177\000\000\360\360\360\360", '\000' <repeats 14 times>, "\200\020\000\000\000\000X>+\020\000\000\000", __ss_align = 4195832}}, id = 5554600, send_flags = {f = 0, blst_imask = 0}, proto = -64 '\300', proto_pad0 = 119 'w', proto_pad1 = 1285}
        tmp = 0x7fc804900c10 ""
        new_uri = 0x7fc937f94ee0 "\001"
        end = 0x555b106d42fd <parse_method_name+2024> "\205\300\017\224\300\017\266\300H\205\300t\027H\213\205p\377\377\377", <incomplete sequence \307>
        crt = 0x1c673b510 <error: Cannot access memory at address 0x1c673b510>
        cmd = 0x7fc937c137c0
        len = 0
        user = 939085496
        uri = {user = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -965496436}, passwd = {s = 0x4c673b1a0 <error: Cannot access memory at address 0x4c673b1a0>, len = 276653360}, host = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, port = {s = 0x7ffcc673b190 "\300\262s\306\374\177", len = 274214092}, params = {s = 0x400400748 <error: Cannot access memory at address 0x400400748>, len = 276653360}, sip_params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, headers = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275281682}, port_no = 45520, proto = 50803, type = 32764, flags = (URI_SIP_USER_PHONE | unknown: 273118464), transport = {s = 0x0, len = 276598612}, ttl = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275030558}, user_param = {s = 0x7fc937f95080 "\001", len = 940032816}, maddr = {s = 0x7ffcc673b342 "\005\005", len = -965495997}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x555b107d6d88 <__func__.6797> "parse_via", len = 276659112}, r2 = {s = 0x1c673b250 <error: Cannot access memory at address 0x1c673b250>, len = 76549136}, gr = {s = 0x7ffcc673b250 "\220\262s\306\374\177", len = -178372384}, transport_val = {s = 0x555b107d6534 "", len = 76549136}, ttl_val = {s = 0x555b10761688 "", len = 276174472}, user_param_val = {s = 0x7ffcc673b290 "\300\262s\306\004", len = -178335373}, maddr_val = {s = 0x0, len = -965496132}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}, lr_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = -965496004}, r2_val = {s = 0x4c673b2c0 <error: Cannot access memory at address 0x4c673b2c0>, len = 279199835}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 279199839}}
        next_hop = {user = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1}, passwd = {s = 0x7fc93807c158 "\a", len = 0}, host = {s = 0x7fc937f73fb8 "\001", len = 939085328}, port = {s = 0xfa <error: Cannot access memory at address 0xfa>, len = 938950584}, params = {s = 0x0, len = 939086120}, sip_params = {s = 0x7fc937f73d10 "\003", len = 939085328}, headers = {s = 0x7fc93807c330 <incomplete sequence \350>, len = 939085952}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x1c673b120 <error: Cannot access memory at address 0x1c673b120>, len = 76549136}, method_val = {s = 0x7ffcc673b120 "`\261s\306\374\177", len = -178372384}, lr_val = {s = 0x555b107d6534 "", len = 76549136}, r2_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 16}, gr_val = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -178335373}}
        u = 0x555b107df530 <__func__.6625>
        port = 0
        dst_host = 0x555b10761688
        i = 31
        flags = 21851
        avp = 0x1
        st = {flags = 65537, id = 60, name = {n = 279199744, s = {s = 0x555b10a44000 <buf> "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"..., len = 6}, re = 0x555b10a44000 <buf>}, avp = 0x555b10a44007 <buf+7>}
        sct = 0x7ffcc673b480
        sjt = 0x7fc804900c10
        rve = 0x7fc937c5f610
        mct = 0x1
        rv = 0x0
        rv1 = 0x555b10a4419c <buf+412>
        c1 = {cache_type = 276174472, val_type = 21851, c = {avp_val = {n = 0, s = {s = 0x0, len = 276824064}, re = 0x0}, pval = {rs = {s = 0x0, len = 276824064}, ri = 271261120, flags = 0}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x7ffcc673af90 "\006", len = -57849891}
        srevp = {0x7fc937c6f3d8, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673af20, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#16 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c473c0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c6f3d8
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 276690800, tz_dsttime = 21851}
        tdiff = 4116631923
        __func__ = "run_actions"
#17 0x0000555b1040cbbe in run_top_route (a=0x7fc937c473c0, msg=0x7fc9380cade8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {93849603950067, 4571428513, 140502205509096, 93849606559368, 4571141768, 140723637958544, 140496791851379, 140723637958560, 140723637958588, 18118954512, 93849606846109, 8004010816636452865, 0, 140723637958592, 93849606559368, 0}}}}}
        p = 0x7ffcc673b6d0
        ret = 276469811
        sfbk = 0
#18 0x0000555b1057b6e8 in receive_msg (buf=0x555b10a44000 <buf> "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"..., len=1155, rcv_info=0x7ffcc673bd40) at core/receive.c:423
        msg = 0x7fc9380cade8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 15 times>, 1}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x555b10a44000 <buf> "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"..., len = 1155}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcc673b8b0, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcc673bd40, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#19 0x0000555b10447d59 in udp_rcv_loop () at core/udp_server.c:543
        len = 1155
        buf = "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"...
        tmp = 0x1b <error: Cannot access memory at address 0x1b>
        fromaddr = 0x7fc93807e930
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {918529802, 0}, addr32 = {918529802, 0, 0, 0}, addr16 = {42762, 14015, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277\066", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1019193098, 0}, addr32 = {1019193098, 0, 0, 0}, addr16 = {42762, 15551, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277<", '\000' <repeats 11 times>}}, src_port = 6060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\027\254\n\247\277\066\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 44055, sin_addr = {s_addr = 918529802}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 44055, sin6_flowinfo = 918529802, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\027\254\n\247\277\066", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fc937bfff30, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "\270\025\221\004\310\177\000\000\270\025\221\004\001\000\000\000P\273s\306\374\177\000\000s\321^\365\307\177\000\000P\273s\306\374\177\000\000\220\267\331\020[U\000\000@\263\331\020[U\000\000\247\261s\306\374\177\000\000\220\261s\306\374\177\000\000\000\000\000\000\000\000\000\001", '\000' <repeats 20 times>, "\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000\000\270\025\221\004\310\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000@\274s\306\374\177\000\000\005\067\346\356\307\177\000\000\177\252y\020[U\000\000\020\f\220\004\b\000\000\000\270\025\221\004\310\177\000\000"...
        i = -1
        j = 130560
        l = 0
        __func__ = "udp_rcv_loop"
#20 0x0000555b1038de84 in main_loop () at main.c:1683
        i = 7
        pid = 0
        si = 0x7fc937bfff30
        si_desc = "udp receiver child=7 sock=edge.hipertel.local:5060\000\"EH\311\177\000\000\000\000\000\000\000\000\000\000\060\000\000\000\060\000\000\000\070\300s\306\374\177\000\000P\277s\306\374\177\000\000\250Nx\020[U\000\000\370\226\r8k\000\000\000\063\230z\020[U\000\000\360\226\n8\311\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#21 0x0000555b10398511 in main (argc=11, argv=0x7ffcc673c568) at main.c:2856
        cfg_stream = 0x555b10bef010
        c = -1
        r = 0
        tmp = 0x7ffcc673deba ""
        tmp_len = 32764
        port = -965491792
        proto = 32713
        ahost = 0x0
        aport = 0
        options = 0x555b10764348 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 900928915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7fc94926d040 <_rtld_global>
        p = 0x7ffcc673de72 "edge"
        st = {st_dev = 19, st_ino = 23307, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1641492636, tv_nsec = 884483965}, st_mtim = {tv_sec = 1599774907, tv_nsec = 42281020}, st_ctim = {tv_sec = 1599774907, tv_nsec = 42281020}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000 \232\004I\311\177\000\000\330\331&I\311\177\000\000\a\000\000\000\000\000\000\000\a\000\000\000\a\000\000\000\070\224\004I\311\177\000\000\060\302s\306\374\177\000\000\215F\005I\311\177\000\000\000\000\000\000\000\000\000\000\272J\005I\311\177", '\000' <repeats 11 times>, "\200\065\020[U", '\000' <repeats 13 times>, "\377\000\000\000\000", '\377' <repeats 11 times>, "\000\377\377\377\377GLIBC_2.2.5\000GLIB\000__f", '\000' <repeats 12 times>, "inite\000getpriorit", '\000' <repeats 136 times>...
        option_index = 0
        long_options = {{name = 0x555b107663d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x555b10761b1c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x555b107663db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x555b107663e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x555b107663e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x555b107663f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x555b107663fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x555b10766404 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x555b1076640f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x555b10766418 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x555b10766423 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007fc7f9e53741 in futex_get (lock=0x7fc7fe0c8a20) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007fc7f9e55819 in bcast_dmq_message1 (peer=0x7fc7fe1cb440, body=0x7ffcc6739250, except=0x0, resp_cback=0x7fc7f9e4e4f0 <ht_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9e4e4b0 <ht_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:156
        node = 0x7fc804900ad0
        __func__ = "bcast_dmq_message1"
#3  0x00007fc7f9e56072 in bcast_dmq_message (peer=0x7fc7fe1cb440, body=0x7ffcc6739250, except=0x0, resp_cback=0x7fc7f9e4e4f0 <ht_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9e4e4b0 <ht_dmq_content_type>) at dmq_funcs.c:188
No locals.
#4  0x00007fc7f9c3a640 in ht_dmq_send (body=0x7ffcc6739250, node=0x0) at ht_dmq.c:237
        __func__ = "ht_dmq_send"
#5  0x00007fc7f9c3d4b5 in ht_dmq_replicate_action (action=HT_DMQ_SET_CELL, htname=0x7fc937ec0bf8, cname=0x7ffcc6739350, type=2, val=0x7ffcc6739340, mode=1) at ht_dmq.c:388
        jdoc = {root = 0x555b10da7b10, flags = 0, buf = {s = 0x555b10dad530 "{\"action\":1,\"htname\":\"tcompanydata\",\"cname\":\"94587 at maxCallsCompany\",\"type\":2,\"strval\":\"2\",\"mode\":1}", len = 99}, malloc_fn = 0x7fc9483e8f10 <__GI___libc_malloc>, free_fn = 0x7fc9483e9510 <__GI___libc_free>}
        __func__ = "ht_dmq_replicate_action"
#6  0x00007fc7f9c07cdb in pv_set_ht_cell (msg=0x7fc9380cade8, param=0x7fc937ec0b18, op=254, val=0x7ffcc6739440) at ht_var.c:119
        htname = {s = 0x7fc937bead28 "94587 at maxCallsCompany", len = 21}
        isval = {n = 935234752, s = {s = 0x7fc937be8cc0 "2", len = 1}, re = 0x7fc937be8cc0}
        hpv = 0x7fc937ec0bf8
        __func__ = "pv_set_ht_cell"
#7  0x0000555b1041d5e9 in lval_pvar_assign (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, lv=0x7fc937ec0d08, rv=0x7fc937ec0e88) at core/lvalue.c:352
        pvar = 0x7fc937ec0b00
        pval = {rs = {s = 0x7fc937be8cc0 "2", len = 1}, ri = 0, flags = 4}
        r_avp = 0x7fc937c33258
        avp_val = {n = 937990368, s = {s = 0x7fc937e898e0 "\b\232\353\067\311\177", len = 938213768}, re = 0x7fc937e898e0}
        ret = 1
        v = 32712
        destroy_pval = 1
        __func__ = "lval_pvar_assign"
#8  0x0000555b1041e161 in lval_assign (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, lv=0x7fc937ec0d08, rve=0x7fc937ec0e80) at core/lvalue.c:400
        rv = 0x7fc937ec0e88
        ret = 0
        __func__ = "lval_assign"
#9  0x0000555b1040a515 in do_action (h=0x7ffcc673b6d0, a=0x7fc937ec15b0, msg=0x7fc9380cade8) at core/action.c:1455
        ret = -5
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 8704, sa_data = "EH\311\177\000\000\063\230z\020[U\000"}, sin = {sin_family = 8704, sin_port = 18501, sin_addr = {s_addr = 32713}, sin_zero = "3\230z\020[U\000"}, sin6 = {sin6_family = 8704, sin6_port = 18501, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "3\230z\020[U\000\000\000\000 at 9\001\000\000", __u6_addr16 = {38963, 4218, 21851, 0, 0, 14656, 1, 0}, __u6_addr32 = {276469811, 21851, 960495616, 1}}}, sin6_scope_id = 3329464880}, sas = {ss_family = 8704, __ss_padding = "EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000\060\232s\306\374\177\000\000\000\234s\306\374\177\000\000\370\216\353\067\311\177\000\000\350\255\f8\311\177\000\000\000\233s\306\374\177\000\000ji\300\371\307\177", '\000' <repeats 11 times>, "\234s\306\374\177\000\000\370\216\353\067\311\177\000\000\350\255\f8\311\177\000\000\260\232s\306\374\177\000\000\314]Y\020[U\000", __ss_align = 140502204194406}}, id = 19, send_flags = {f = 0, blst_imask = 0}, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937b6d010 "\001"
        new_uri = 0x38 <error: Cannot access memory at address 0x38>
        end = 0x555b1064cae7 <qm_free+8293> "\353\n\220\353\a\220\353\004\220\353\001\220H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>
        crt = 0x0
        cmd = 0x7fc937c16cb0
        len = 0
        user = 0
        uri = {user = {s = 0x7ffcc67398d0 "", len = -57849891}, passwd = {s = 0x555b10761688 "", len = 0}, host = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 271258488}, port = {s = 0x401d58 <error: Cannot access memory at address 0x401d58>, len = 5565576}, params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, sip_params = {s = 0x38 <error: Cannot access memory at address 0x38>, len = 0}, headers = {s = 0x7ffcc6739900 "\020\232s\306\374\177", len = 273118466}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 934729216), transport = {s = 0xd107a9833 <error: Cannot access memory at address 0xd107a9833>, len = 934729216}, ttl = {s = 0x7ffcc6739a10 "0\232s\306\374\177", len = 275040999}, user_param = {s = 0x1107a9833 <error: Cannot access memory at address 0x1107a9833>, len = -32080472}, maddr = {s = 0x7fc7f9c43443 "htable", len = -104809343}, method = {s = 0x7fc7f9c45a00 <__func__.8058> "ht_cell_pkg_free", len = -104581580}, lr = {s = 0x7fc937f6ae40 "", len = 934727696}, r2 = {s = 0x7ffcc6739970 "0\232s\306\374\177", len = -104803908}, gr = {s = 0xf6210761688 <error: Cannot access memory at address 0xf6210761688>, len = -35672280}, transport_val = {s = 0x7ffcc6739a30 "", len = -104772743}, ttl_val = {s = 0x7fc937f89e66 "*prepaid", len = 938913344}, user_param_val = {s = 0x7ffcc6739aa0 " \v\276\067\311\177", len = -35672280}, maddr_val = {s = 0x7fc937f6aed8 "\b", len = 938913056}, method_val = {s = 0x0, len = 1212490240}, lr_val = {s = 0x555b107a9833 "INFO", len = 934727696}, r2_val = {s = 0x68 <error: Cannot access memory at address 0x68>, len = 938913288}, gr_val = {s = 0x7ffcc6739aa8 "\023", len = 276174472}}
        next_hop = {user = {s = 0x7fc937eacc20 "", len = 940355048}, passwd = {s = 0x7fc937de7098 "\a", len = 276174472}, host = {s = 0x0, len = 276174472}, port = {s = 0x0, len = 939039512}, params = {s = 0x555b107a9833 "INFO", len = 276174472}, sip_params = {s = 0x6000000111 <error: Cannot access memory at address 0x6000000111>, len = 938134637}, headers = {s = 0x7fc90000000b "", len = 0}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (unknown: 4), transport = {s = 0x0, len = 276598617}, ttl = {s = 0x7fc8040bd29c "94587 at billingMethod", len = 19}, user_param = {s = 0x7fc937eacc6d "hcgrReqType)", len = 11}, maddr = {s = 0x1555b107c8f58 <error: Cannot access memory at address 0x1555b107c8f58>, len = 76549136}, method = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = -252645136}, lr = {s = 0x7ffcc6739800 "", len = -178335373}, r2 = {s = 0xafc6739800 <error: Cannot access memory at address 0xafc6739800>, len = -965502932}, gr = {s = 0x4107ac97f <error: Cannot access memory at address 0x4107ac97f>, len = 67883616}, transport_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 276174472}, ttl_val = {s = 0x0, len = 1212490240}, user_param_val = {s = 0x555b107a9833 "INFO", len = 960495616}, maddr_val = {s = 0x7ffcc67398d0 "", len = 274517235}, method_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr_val = {s = 0x7fc937eacc08 "\004", len = 275070078}, r2_val = {s = 0x7ffcc6739890 "", len = 934727696}, gr_val = {s = 0x7ffcc6739890 "", len = 934727696}}
        u = 0x0
        port = 0
        dst_host = 0x0
        i = 939039224
        flags = 32764
        avp = 0x7fc937f8a288
        st = {flags = 11, id = 32713, name = {n = 960495616, s = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965502944}, re = 0x139400000}, avp = 0x7fc7fd5f5969 <pv_get_avp+1913>}
        sct = 0x555b10761688
        sjt = 0x0
        rve = 0x7fc9380cade8
        mct = 0x7fc937eb8dc0
        rv = 0x7fc937eacc6d
        rv1 = 0x7ffcc673b6d0
        c1 = {cache_type = 276469811, val_type = 21851, c = {avp_val = {n = -965503168, s = {s = 0x7ffcc6739740 "\021\001", len = 938134637}, re = 0x7ffcc6739740}, pval = {rs = {s = 0x7ffcc6739740 "\021\001", len = 938134637}, ri = 11, flags = 32713}}, i2s = "\200\227s\306\374\177\000\000\210\026v\020\001\000\000\000\001\000\000\000\000"}
        s = {s = 0x7fc90000000b "", len = 960495616}
        srevp = {0x7fc937ec15b0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739660, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#10 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937eb97d0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937ec15b0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 938260488, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#11 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937ecb808, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x7ffcc673a260, to = {s = {sa_family = 7831, sa_data = "\223\371\307\177\000\000\200\242s\306\006\000\000"}, sin = {sin_family = 7831, sin_port = 63891, sin_addr = {s_addr = 32711}, sin_zero = "\200\242s\306\006\000\000"}, sin6 = {sin6_family = 7831, sin6_port = 63891, sin6_flowinfo = 32711, sin6_addr = {__in6_u = {__u6_addr8 = "\200\242s\306\006\000\000\000\274=\035\376\307\177\000", __u6_addr16 = {41600, 50803, 6, 0, 15804, 65053, 32711, 0}, __u6_addr32 = {3329467008, 6, 4263329212, 32711}}}, sin6_scope_id = 940355824}, sas = {ss_family = 7831, __ss_padding = "\223\371\307\177\000\000\200\242s\306\006\000\000\000\274=\035\376\307\177\000\000\360\260\f8\311\177\000\000\210\026v\020\001\000\000\000`\243s\306\374\177\000\000,\365\223\371\307\177\000\000\027\000\000\000W\024\365h\000\000\000\000\000\000\000\000\260\242s\306\374\177\000\000\314,X\020[U\000\000\063\230z\020\006\000\000\000Kʞ\371\307\177\000\000\200\243s\306\374\177\000\000UU\235\371\307\177\000", __ss_align = 4294968379}}, id = 237164320, send_flags = {f = 32712, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937f356a8 "\002"
        new_uri = 0x7fc937f355e0 ""
        end = 0xfe105cccf3 <error: Cannot access memory at address 0xfe105cccf3>
        crt = 0x7fc937f35828 "\a"
        cmd = 0x7fc937c145b8
        len = 32711
        user = -178367519
        uri = {user = {s = 0x7ffcc673a1a0 "\360\241s\306\374\177", len = 275030754}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549424}, host = {s = 0x7fc7f99eca4b "dialog", len = 938694688}, port = {s = 0x7fc7f99ece08 <__func__.11151> "new_dlg_var", len = -107033068}, params = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -35909632}, sip_params = {s = 0x7fc7f99d5541 "", len = 76549424}, headers = {s = 0x555b10761688 "", len = 276174472}, port_no = 41312, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 4116631920), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -965500532}, ttl = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1}, user_param = {s = 0x68f5145700000017 <error: Cannot access memory at address 0x68f5145700000017>, len = 42925352}, maddr = {s = 0x1c673a1a0 <error: Cannot access memory at address 0x1c673a1a0>, len = -35674424}, method = {s = 0x7ffcc673a1a0 "\360\241s\306\374\177", len = 275017917}, lr = {s = 0x0, len = -35674424}, r2 = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549424}, gr = {s = 0x7ffcc673a1f0 "0\242s\306\374\177", len = 275079674}, transport_val = {s = 0x1c673a1f0 <error: Cannot access memory at address 0x1c673a1f0>, len = 76549424}, ttl_val = {s = 0x7ffcc673a1f0 "0\242s\306\374\177", len = -178372384}, user_param_val = {s = 0x7fc7f99d5541 "", len = 76549424}, maddr_val = {s = 0x555b10761688 "", len = 276174472}, method_val = {s = 0x7ffcc673a230 "`\242s\306\374\177", len = -178335373}, lr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -965500324}, r2_val = {s = 0x6c673a240 <error: Cannot access memory at address 0x6c673a240>, len = -107129541}, gr_val = {s = 0x100000017 <error: Cannot access memory at address 0x100000017>, len = -31638084}}
        next_hop = {user = {s = 0x7ffcc6739fc0 "8\344\273\067\311\177", len = -965499864}, passwd = {s = 0x7fc938002378 "", len = 940355048}, host = {s = 0x7ffcc673a020 "X\217|\020[U", len = -107139900}, port = {s = 0x7fc937bb21c8 "residential", len = -965499864}, params = {s = 0x7fc938002378 "", len = 940355048}, sip_params = {s = 0x7ffcc673a030 "\360\360\360", <incomplete sequence \360>, len = -107152281}, headers = {s = 0x1c6739fd0 <error: Cannot access memory at address 0x1c6739fd0>, len = 76549424}, port_no = 40912, proto = 50803, type = 32764, flags = (unknown: 4116594912), transport = {s = 0x7fc7f99d5541 "", len = 76549424}, ttl = {s = 0x7fc937bbe438 "residential", len = 11}, user_param = {s = 0x7ffcc673a010 "@\240s\306\374\177", len = 91938872}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, method = {s = 0x7ffcc673a148 "\001", len = 276598617}, lr = {s = 0x1c673a040 <error: Cannot access memory at address 0x1c673a040>, len = 76549136}, r2 = {s = 0x7ffcc673a040 "\200\240s\306\374\177", len = -178372384}, gr = {s = 0x555b107c8f58 "", len = 76549136}, transport_val = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = -252645136}, ttl_val = {s = 0x7ffcc673a080 "\260\240s\306\374\177", len = -178335373}, user_param_val = {s = 0x7f00000001 <error: Cannot access memory at address 0x7f00000001>, len = -965500756}, maddr_val = {s = 0x4f99ece14 <error: Cannot access memory at address 0x4f99ece14>, len = 276598612}, method_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, lr_val = {s = 0x7ffcc673a0b0 "\240\241s\306\374\177", len = 274214092}, r2_val = {s = 0x4028efd70 <error: Cannot access memory at address 0x4028efd70>, len = 276598612}, gr_val = {s = 0x7ffcc673a1a0 "\360\241s\306\374\177", len = 275030558}}
        u = 0x7ffcc673a5f0
        port = 0
        dst_host = 0x7fc80e22d720
        i = 14
        flags = 1
        avp = 0x555b107a9833
        st = {flags = 938629984, id = 32713, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x7fc948452200 <__syslog>}
        sct = 0x555b10d79c30
        sjt = 0x7fc9380cade8
        rve = 0x7fc937eb9e18
        mct = 0x7fc937f35848
        rv = 0x7fc7fe1d3dbc
        rv1 = 0x7fc937c60060
        c1 = {cache_type = 255, val_type = RV_NONE, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965499648}, ri = 939535208, flags = 32713}}, i2s = "\350\255\f8\311\177\000\000жs\306\374\177\000\000\250=\035\376\307\177"}
        s = {s = 0x7fc9380cade8 "mH\001", len = -965495088}
        srevp = {0x7fc937ecb808, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739ea0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937eae4d8, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937ecb808
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935723104, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#13 0x0000555b103fa952 in do_action (h=0x7ffcc673b6d0, a=0x7fc937c60060, msg=0x7fc9380cade8) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\350\356\305\067\311\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\350\356\305\067\311\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\350\356\305\067\311\177\000\000\024\256s\306\374\177\000", __u6_addr16 = {61160, 14277, 32713, 0, 44564, 50803, 32764, 0}, __u6_addr32 = {935718632, 32713, 3329469972, 32764}}}, sin6_scope_id = 940355048}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\350\356\305\067\311\177\000\000\024\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\270\347\305\067\311\177\000\000\030\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\210\026v\020[U\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000", __ss_align = 140723637955568}}, id = -64824879, send_flags = {f = 32711, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937f96488 ""
        new_uri = 0x7ffcc673ae18 "\001"
        end = 0x7fc937c5e7b0 "\001"
        crt = 0x7fc937c5e7b8 "\a"
        cmd = 0x7fc937c5eee0
        len = 32711
        user = -178367519
        uri = {user = {s = 0x0, len = 1212490240}, passwd = {s = 0x555b107a9833 "INFO", len = 960495616}, host = {s = 0x7ffcc673a960 "\200\251s\306\374\177", len = -44162673}, port = {s = 0x7ffcc673a9bc "\001", len = 273118466}, params = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 1}, sip_params = {s = 0x7ffcc673aa40 "\360\252s\306\374\177", len = 275030558}, headers = {s = 0x555b10b141d4 <ut_buf_int2str+20> "0", len = 275031704}, port_no = 43392, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4250804744), transport = {s = 0x7ffcc673a9bc "\001", len = 1}, ttl = {s = 0x7ffcc673a9d0 "\200\252s\306\374\177", len = -44068401}, user_param = {s = 0x38 <error: Cannot access memory at address 0x38>, len = -965497384}, maddr = {s = 0x7fc937c5e7d8 "\001", len = 940355048}, method = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, lr = {s = 0x7fc937c488c8 "`\211\304\067\311\177", len = 280052180}, r2 = {s = 0x7ffcc673aa80 "\350\356\305\067\311\177", len = 274517235}, gr = {s = 0x0, len = -965497384}, transport_val = {s = 0x7fc937c5e7c0 "\017", len = 940355048}, ttl_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 934727696}, user_param_val = {s = 0x0, len = 276174472}, maddr_val = {s = 0x0, len = 1212490240}, method_val = {s = 0x555b107a9833 "INFO", len = 960495616}, lr_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 274387908}, r2_val = {s = 0x7fc7fc440d20 <rr_param_buf_ptr> ";did=3f3.daf1", len = 276174472}, gr_val = {s = 0x0, len = 1212490240}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffcc673a7b0 "", len = 276174472}, host = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, port = {s = 0x555b107a9833 "INFO", len = 276174472}, params = {s = 0x0, len = 1212490240}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, headers = {s = 0x7ffcc673a8e0 "", len = 275070078}, port_no = 43040, proto = 50803, type = 32764, flags = (unknown: 934727696), transport = {s = 0x7ffcc673a820 "", len = 934727696}, ttl = {s = 0x7ffcc673a860 "\220\250s\306\374\177", len = -57849891}, user_param = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, maddr = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 271259688}, method = {s = 0x401b80 <error: Cannot access memory at address 0x401b80>, len = 5564376}, lr = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, r2 = {s = 0x38 <error: Cannot access memory at address 0x38>, len = 0}, gr = {s = 0x7ffcc673a890 "\200\251s\306\374\177", len = 273118466}, transport_val = {s = 0x7ffcc673a94c "\001", len = 276598612}, ttl_val = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 0}, user_param_val = {s = 0x7ffcc673a980 "Щs\306\374\177", len = 275070078}, maddr_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, method_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, lr_val = {s = 0x7ffcc673a920 "\274\251s\306\374\177", len = -57849891}, r2_val = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, gr_val = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 276174472}}
        u = 0x7ffcc673ae30
        port = 0
        dst_host = 0x555b107a982c
        i = 24
        flags = 0
        avp = 0x0
        st = {flags = 3329468288, id = 32764, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x555b105cf57c <pv_value_destroy+175>}
        sct = 0x1c673ab90
        sjt = 0x0
        rve = 0x1900000001
        mct = 0x0
        rv = 0x10761688
        rv1 = 0x7ffcc673b34c
        c1 = {cache_type = 3329468224, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, ri = -965497728, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = 0}
        srevp = {0x7fc937c60060, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673a6e0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#14 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c5fe28, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c60060
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 1
        __func__ = "run_actions"
#15 0x0000555b103fe41e in do_action (h=0x7ffcc673b6d0, a=0x7fc937c6f3d8, msg=0x7fc9380cade8) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x555b10a4405f <buf+95>, to = {s = {sa_family = 4, sa_data = "\000\000\001\000\254\027\200\264s\306\374\177\000"}, sin = {sin_family = 4, sin_port = 0, sin_addr = {s_addr = 397148161}, sin_zero = "\200\264s\306\374\177\000"}, sin6 = {sin6_family = 4, sin6_port = 0, sin6_flowinfo = 397148161, sin6_addr = {__in6_u = {__u6_addr8 = "\200\264s\306\374\177\000\000\020Bi\020[U\000", __u6_addr16 = {46208, 50803, 32764, 0, 16912, 4201, 21851, 0}, __u6_addr32 = {3329471616, 32764, 275333648, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 4, __ss_padding = "\000\000\001\000\254\027\200\264s\306\374\177\000\000\020Bi\020[U\000\000\000\000\000\000\000\000\000\000\200P\371\067\311\177\000\000\203D\244\020[U\000\000A@\244\020[U\000\000 \263s\306\374\177\000\000\020ж7\311\177\000\000`\263s\306\374\177\000\000\335G\215\374\307\177\000\000\360\360\360\360", '\000' <repeats 14 times>, "\200\020\000\000\000\000X>+\020\000\000\000", __ss_align = 4195832}}, id = 5554600, send_flags = {f = 0, blst_imask = 0}, proto = -64 '\300', proto_pad0 = 119 'w', proto_pad1 = 1285}
        tmp = 0x7fc804900c10 ""
        new_uri = 0x7fc937f94ee0 "\001"
        end = 0x555b106d42fd <parse_method_name+2024> "\205\300\017\224\300\017\266\300H\205\300t\027H\213\205p\377\377\377", <incomplete sequence \307>
        crt = 0x1c673b510 <error: Cannot access memory at address 0x1c673b510>
        cmd = 0x7fc937c137c0
        len = 0
        user = 939085496
        uri = {user = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -965496436}, passwd = {s = 0x4c673b1a0 <error: Cannot access memory at address 0x4c673b1a0>, len = 276653360}, host = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, port = {s = 0x7ffcc673b190 "\300\262s\306\374\177", len = 274214092}, params = {s = 0x400400748 <error: Cannot access memory at address 0x400400748>, len = 276653360}, sip_params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, headers = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275281682}, port_no = 45520, proto = 50803, type = 32764, flags = (URI_SIP_USER_PHONE | unknown: 273118464), transport = {s = 0x0, len = 276598612}, ttl = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275030558}, user_param = {s = 0x7fc937f95080 "\001", len = 940032816}, maddr = {s = 0x7ffcc673b342 "\005\005", len = -965495997}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x555b107d6d88 <__func__.6797> "parse_via", len = 276659112}, r2 = {s = 0x1c673b250 <error: Cannot access memory at address 0x1c673b250>, len = 76549136}, gr = {s = 0x7ffcc673b250 "\220\262s\306\374\177", len = -178372384}, transport_val = {s = 0x555b107d6534 "", len = 76549136}, ttl_val = {s = 0x555b10761688 "", len = 276174472}, user_param_val = {s = 0x7ffcc673b290 "\300\262s\306\004", len = -178335373}, maddr_val = {s = 0x0, len = -965496132}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}, lr_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = -965496004}, r2_val = {s = 0x4c673b2c0 <error: Cannot access memory at address 0x4c673b2c0>, len = 279199835}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 279199839}}
        next_hop = {user = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1}, passwd = {s = 0x7fc93807c158 "\a", len = 0}, host = {s = 0x7fc937f73fb8 "\001", len = 939085328}, port = {s = 0xfa <error: Cannot access memory at address 0xfa>, len = 938950584}, params = {s = 0x0, len = 939086120}, sip_params = {s = 0x7fc937f73d10 "\003", len = 939085328}, headers = {s = 0x7fc93807c330 <incomplete sequence \350>, len = 939085952}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x1c673b120 <error: Cannot access memory at address 0x1c673b120>, len = 76549136}, method_val = {s = 0x7ffcc673b120 "`\261s\306\374\177", len = -178372384}, lr_val = {s = 0x555b107d6534 "", len = 76549136}, r2_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 16}, gr_val = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -178335373}}
        u = 0x555b107df530 <__func__.6625>
        port = 0
        dst_host = 0x555b10761688
        i = 31
        flags = 21851
        avp = 0x1
        st = {flags = 65537, id = 60, name = {n = 279199744, s = {s = 0x555b10a44000 <buf> "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"..., len = 6}, re = 0x555b10a44000 <buf>}, avp = 0x555b10a44007 <buf+7>}
        sct = 0x7ffcc673b480
        sjt = 0x7fc804900c10
        rve = 0x7fc937c5f610
        mct = 0x1
        rv = 0x0
        rv1 = 0x555b10a4419c <buf+412>
        c1 = {cache_type = 276174472, val_type = 21851, c = {avp_val = {n = 0, s = {s = 0x0, len = 276824064}, re = 0x0}, pval = {rs = {s = 0x0, len = 276824064}, ri = 271261120, flags = 0}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x7ffcc673af90 "\006", len = -57849891}
        srevp = {0x7fc937c6f3d8, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673af20, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 140502201087312, string = 0x7fc937c93550 "1", str = {s = 0x7fc937c93550 "1", len = 1}, data = 0x7fc937c93550, attr = 0x7fc937c93550, select = 0x7fc937c93550}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = STRING_RVE_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 9}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#16 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c473c0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c6f3d8
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 276690800, tz_dsttime = 21851}
        tdiff = 4116631923
        __func__ = "run_actions"
#17 0x0000555b1040cbbe in run_top_route (a=0x7fc937c473c0, msg=0x7fc9380cade8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {93849603950067, 4571428513, 140502205509096, 93849606559368, 4571141768, 140723637958544, 140496791851379, 140723637958560, 140723637958588, 18118954512, 93849606846109, 8004010816636452865, 0, 140723637958592, 93849606559368, 0}}}}}
        p = 0x7ffcc673b6d0
        ret = 276469811
        sfbk = 0
#18 0x0000555b1057b6e8 in receive_msg (buf=0x555b10a44000 <buf> "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"..., len=1155, rcv_info=0x7ffcc673bd40) at core/receive.c:423
        msg = 0x7fc9380cade8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 15 times>, 1}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x555b10a44000 <buf> "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"..., len = 1155}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcc673b8b0, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcc673bd40, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#19 0x0000555b10447d59 in udp_rcv_loop () at core/udp_server.c:543
        len = 1155
        buf = "INVITE sip:+333459455573 at edge.hipertel.local SIP/2.0\r\nVia: SIP/2.0/UDP 10.16.19.54:6060;rport;branch=z9hG4bKPjfa6c08b2-93cc-46a2-adb1-9bf1504a364c\r\nFrom: \"0721238640021\" <sip:+334238640021 at 10.16"...
        tmp = 0x1b <error: Cannot access memory at address 0x1b>
        fromaddr = 0x7fc93807e930
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {918529802, 0}, addr32 = {918529802, 0, 0, 0}, addr16 = {42762, 14015, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277\066", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {1019193098, 0}, addr32 = {1019193098, 0, 0, 0}, addr16 = {42762, 15551, 0, 0, 0, 0, 0, 0}, addr = "\n\247\277<", '\000' <repeats 11 times>}}, src_port = 6060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\027\254\n\247\277\066\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 44055, sin_addr = {s_addr = 918529802}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 44055, sin6_flowinfo = 918529802, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\027\254\n\247\277\066", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fc937bfff30, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "\270\025\221\004\310\177\000\000\270\025\221\004\001\000\000\000P\273s\306\374\177\000\000s\321^\365\307\177\000\000P\273s\306\374\177\000\000\220\267\331\020[U\000\000@\263\331\020[U\000\000\247\261s\306\374\177\000\000\220\261s\306\374\177\000\000\000\000\000\000\000\000\000\001", '\000' <repeats 20 times>, "\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000\000\270\025\221\004\310\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000@\274s\306\374\177\000\000\005\067\346\356\307\177\000\000\177\252y\020[U\000\000\020\f\220\004\b\000\000\000\270\025\221\004\310\177\000\000"...
        i = -1
        j = 130560
        l = 0
        __func__ = "udp_rcv_loop"
#20 0x0000555b1038de84 in main_loop () at main.c:1683
        i = 7
        pid = 0
        si = 0x7fc937bfff30
        si_desc = "udp receiver child=7 sock=edge.hipertel.local:5060\000\"EH\311\177\000\000\000\000\000\000\000\000\000\000\060\000\000\000\060\000\000\000\070\300s\306\374\177\000\000P\277s\306\374\177\000\000\250Nx\020[U\000\000\370\226\r8k\000\000\000\063\230z\020[U\000\000\360\226\n8\311\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#21 0x0000555b10398511 in main (argc=11, argv=0x7ffcc673c568) at main.c:2856
        cfg_stream = 0x555b10bef010
        c = -1
        r = 0
        tmp = 0x7ffcc673deba ""
        tmp_len = 32764
        port = -965491792
        proto = 32713
        ahost = 0x0
        aport = 0
        options = 0x555b10764348 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 900928915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7fc94926d040 <_rtld_global>
        p = 0x7ffcc673de72 "edge"
        st = {st_dev = 19, st_ino = 23307, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1641492636, tv_nsec = 884483965}, st_mtim = {tv_sec = 1599774907, tv_nsec = 42281020}, st_ctim = {tv_sec = 1599774907, tv_nsec = 42281020}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000 \232\004I\311\177\000\000\330\331&I\311\177\000\000\a\000\000\000\000\000\000\000\a\000\000\000\a\000\000\000\070\224\004I\311\177\000\000\060\302s\306\374\177\000\000\215F\005I\311\177\000\000\000\000\000\000\000\000\000\000\272J\005I\311\177", '\000' <repeats 11 times>, "\200\065\020[U", '\000' <repeats 13 times>, "\377\000\000\000\000", '\377' <repeats 11 times>, "\000\377\377\377\377GLIBC_2.2.5\000GLIB\000__f", '\000' <repeats 12 times>, "inite\000getpriorit", '\000' <repeats 136 times>...
        option_index = 0
        long_options = {{name = 0x555b107663d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x555b10761b1c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x555b107663db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x555b107663e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x555b107663e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x555b107663f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x555b107663fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x555b10766404 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x555b1076640f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x555b10766418 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x555b10766423 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
-------------- next part --------------
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007fc7f9e53741 in futex_get (lock=0x7fc7fe0c8a20) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007fc7f9e55819 in bcast_dmq_message1 (peer=0x7fc7fe1ebfb0, body=0x7ffcc6738ca0, except=0x0, resp_cback=0x7fc7f9bf2790 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9bf2750 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:156
        node = 0x7fc804900d30
        __func__ = "bcast_dmq_message1"
#3  0x00007fc7f9e56072 in bcast_dmq_message (peer=0x7fc7fe1ebfb0, body=0x7ffcc6738ca0, except=0x0, resp_cback=0x7fc7f9bf2790 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9bf2750 <dlg_dmq_content_type>) at dmq_funcs.c:188
No locals.
#4  0x00007fc7f999101a in dlg_dmq_send (body=0x7ffcc6738ca0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007fc7f999a7e4 in dlg_dmq_replicate_action (action=DLG_DMQ_UPDATE, dlg=0x7fc7fe7131f0, needlock=1, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x555b10d79c40, flags = 0, buf = {s = 0x555b10db4e20 "{\"action\":1,\"h_entry\":2664,\"h_id\":9792,\"init_ts\":1652854905,\"callid\":\"1460007659_57432438 at 102.7.3.12\",\"from_uri\":\"sip:03312586972 at 102.7.3.12;pstn-params=808482808883\",\"to_uri\":\"sip:0915061111 at 172.16"..., len = 1681}, malloc_fn = 0x7fc9483e8f10 <__GI___libc_malloc>, free_fn = 0x7fc9483e9510 <__GI___libc_free>}
        prof_jdoc = {root = 0x0, flags = 0, buf = {s = 0x0, len = 0}, malloc_fn = 0x0, free_fn = 0x0}
        var = 0x0
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007fc7f99696f7 in dlg_on_send (t=0x7fc80e363eb8, type=16, param=0x7ffcc6738f20) at dlg_handlers.c:760
        dlg = 0x7fc7fe7131f0
        iuid = 0x7fc80df503c0
        __func__ = "dlg_on_send"
#7  0x00007fc7fdb59d98 in run_trans_callbacks_internal (cb_lst=0x7fc80e363f30, type=16, trans=0x7fc80e363eb8, params=0x7ffcc6738f20) at t_hooks.c:258
        cbp = 0x7fc805b38488
        backup_from = 0x7fc80e3640c8
        backup_to = 0x7fc80e3640d0
        backup_dom_from = 0x555b10ab07c0 <def_list+32>
        backup_dom_to = 0x555b10ab07c8 <def_list+40>
        backup_uri_from = 0x7fc80e3640b8
        backup_uri_to = 0x7fc80e3640c0
        backup_xavps = 0x7fc80e3640e8
        backup_xavus = 0x7fc80e3640f0
        backup_xavis = 0x7fc80e3640f8
        __func__ = "run_trans_callbacks_internal"
#8  0x00007fc7fdb59ec8 in run_trans_callbacks (type=16, trans=0x7fc80e363eb8, req=0x7fc9380cade8, rpl=0x0, code=-1) at t_hooks.c:285
        params = {req = 0x7fc9380cade8, rpl = 0x0, param = 0x7fc805b38498, code = -1, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#9  0x00007fc7fdb6accf in prepare_new_uac (t=0x7fc80e363eb8, i_req=0x7fc9380cade8, branch=0, uri=0x7ffcc6739120, path=0x7ffcc6739100, next_hop=0x7ffcc6739110, fsocket=0x7fc937bfff30, snd_flags=..., fproto=0, flags=0, instance=0x7ffcc67390f0, ruid=0x7ffcc67390e0, location_ua=0x7ffcc67390d0) at t_fwd.c:388
        shbuf = 0x0
        add_rm_backup = 0x7fc937f71ab8
        body_lumps_backup = 0x7fc937f81470
        parsed_uri_bak = {user = {s = 0x7fc937f80f6c "411078033 at siptrunks.company.com", len = 9}, passwd = {s = 0x0, len = 0}, host = {s = 0x7fc937f80f76 "siptrunks.company.com", len = 21}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        ret = -1
        len = 32711
        parsed_uri_ok_bak = 1
        free_new_uri = 1
        msg_uri_bak = {s = 0x7fc937f80f68 "sip:411078033 at siptrunks.company.com", len = 35}
        dst_uri_bak = {s = 0x7fc937f72ac8 "sip:internal.hipertel.local", len = 28}
        dst_uri_backed_up = 1
        path_bak = {s = 0x0, len = 0}
        free_path = 1
        instance_bak = {s = 0x0, len = 0}
        free_instance = 1
        ruid_bak = {s = 0x0, len = 0}
        free_ruid = 1
        ua_bak = {s = 0x0, len = 0}
        free_ua = 1
        backup_route_type = 940355048
        test_dst = 32764
        fwd_snd_flags_bak = {f = 32712, blst_imask = 0}
        rpl_snd_flags_bak = {f = 3088, blst_imask = 1168}
        force_send_socket_bak = 0x7ffcc6739488
        dst = 0x7fc80e3641a8
        ctx = {rec_lev = -38153952, run_flags = 32711, last_retcode = 275030754, jmp_env = {{__jmpbuf = {140496932033080, 140497065837704, 140497204347696, 140497208622896, 72907341584, 140497204347696, 1, 140497046735888}, __mask_was_saved = -965504896, __saved_mask = {__val = {276598617, 140723637948904, 140723637948880, 3474017167730815278, 3328783759099507253, 3833180307342636849, 3767094209391113776, 1, 140497046735888, 141176534806585, 936, 7624429792, 140497046735888, 140723637948640, 140496791814368, 93849607136987}}}}}
        bctx = 0x7ffcc6739478
        keng = 0x7ffcc6739480
        __func__ = "prepare_new_uac"
#10 0x00007fc7fdb6ffe8 in add_uac (t=0x7fc80e363eb8, request=0x7fc9380cade8, uri=0x7fc9380cb0c8, next_hop=0x7fc9380cb0d8, path=0x7fc9380cb490, proxy=0x0, fsocket=0x7fc937bfff30, snd_flags=..., proto=0, flags=0, instance=0x7fc9380cb4a0, ruid=0x7fc9380cb4b8, location_ua=0x7fc9380cb4c8) at t_fwd.c:814
        ret = 100
        branch = 0
        __func__ = "add_uac"
#11 0x00007fc7fdb79725 in t_forward_nonack (t=0x7fc80e363eb8, p_msg=0x7fc9380cade8, proxy=0x0, proto=0) at t_fwd.c:1694
        branch_ret = 0
        lowest_ret = -1
        added_branches = 0
        first_branch = 0
        i = 32764
        t_invite = 0x7fc937fa1658
        success_branch = -965503440
        try_new = 1
        lock_replies = 0
        backup_bflags = 0
        obranch = {uri = {s = 0x13200000000 <error: Cannot access memory at address 0x13200000000>, len = 276174472}, dst_uri = {s = 0x0, len = 1212490240}, q = 276469811, path = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965503504}, flags = 4256017125, force_socket = 0x1, ruid = {s = 0x7ffcc67395c0 "", len = -965503456}, instance = {s = 0x6400000001 <error: Cannot access memory at address 0x6400000001>, len = 940355048}, location_ua = {s = 0x7fc80e363eb8 "H\323\376\375\307\177", len = 276174472}, otcpid = 276174472}
        __func__ = "t_forward_nonack"
#12 0x00007fc7fdb511f1 in t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, proto=0, replicate=0) at t_funcs.c:335
        ret = 0
        new_tran = 1
        t = 0x7fc80e363eb8
        dst = {send_sock = 0x7fc937c05468, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\220\230s\306\374\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\220\230s\306\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\230s\306\374\177\000\000\341S^\365\307\177\000", __u6_addr16 = {39056, 50803, 32764, 0, 21473, 62814, 32711, 0}, __u6_addr32 = {3329464464, 32764, 4116599777, 32711}}}, sin6_scope_id = 3329464080}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\220\230s\306\374\177\000\000\341S^\365\307\177\000\000\020\227s\306\374\177\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000P\227s\306\374\177\000\000@\231s\306\374\177\000\000Зs\306\374\177", '\000' <repeats 18 times>, "\350\255\f8\311\177\000", __ss_align = 140723637952000}}, id = 272622770, send_flags = {f = 21851, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -105 '\227', proto_pad1 = -14733}
        port = 0
        host = {s = 0x7fc7fe1e0c48 "\360\061q\376\307\177", len = -178324551}
        comp = 1
        __func__ = "t_relay_to"
#13 0x00007fc7fdb054da in _w_t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, force_proto=0) at tm.c:1752
        t = 0x7fc9380cade8
        res = 32764
        __func__ = "_w_t_relay_to"
#14 0x00007fc7fdb06825 in w_t_relay (p_msg=0x7fc9380cade8, _foo=0x0, _bar=0x0) at tm.c:1952
No locals.
#15 0x0000555b103fe4b2 in do_action (h=0x7ffcc673a130, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1076
        ret = -5
        v = 0
        dst = {send_sock = 0x7fc937deac70, to = {s = {sa_family = 44520, sa_data = "\f8\311\177\000\000\253'\021\375\307\177\000"}, sin = {sin_family = 44520, sin_port = 14348, sin_addr = {s_addr = 32713}, sin_zero = "\253'\021\375\307\177\000"}, sin6 = {sin6_family = 44520, sin6_port = 14348, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "\253'\021\375\307\177\000\000\320\n\220\004\310\177\000", __u6_addr16 = {10155, 64785, 32711, 0, 2768, 1168, 32712, 0}, __u6_addr32 = {4245759915, 32711, 76548816, 32712}}}, sin6_scope_id = 938562624}, sas = {ss_family = 44520, __ss_padding = "\f8\311\177\000\000\253'\021\375\307\177\000\000\320\n\220\004\310\177\000\000 at T\361\067\311\177\000\000\310R\361\067\311\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\200\235s\306\374\177\000\000\020\307\177\365\307\177\000\000\350\255\f8\311\177\000\000\030^\361\067\311\177", '\000' <repeats 33 times>, __ss_align = 0}}, id = 1212490240, send_flags = {f = 32713, blst_imask = 0}, proto = 51 '3', proto_pad0 = -104 '\230', proto_pad1 = 4218}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7fc937c05468
        len = 0
        user = 0
        uri = {user = {s = 0x555b10d24db0 "UTC", len = 938506384}, passwd = {s = 0x7fc937deace8 "H\f\361\067\311\177", len = -49207158}, host = {s = 0x7fc937f15b70 "Trying", len = 6}, port = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, params = {s = 0x41 <error: Cannot access memory at address 0x41>, len = 276174472}, sip_params = {s = 0x7fc937f5ace0 "!", len = 938565144}, headers = {s = 0x555b107a9833 "INFO", len = 960495616}, port_no = 40368, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4116599776), transport = {s = 0x7fc937f15448 "\002", len = 938562248}, ttl = {s = 0x7fc9380cade8 "\363\346\001", len = 276174472}, user_param = {s = 0x0, len = 1212490240}, maddr = {s = 0x555b107a9833 "INFO", len = 960495616}, method = {s = 0x7ffcc6739de0 "\220\244s\306\374\177", len = 272680009}, lr = {s = 0x7ffcc6739ca0 "Мs\306\374\177", len = -178335373}, r2 = {s = 0x7ffcc6739ca0 "Мs\306\374\177", len = 938562632}, gr = {s = 0x7fc937f15b70 "Trying", len = 940355048}, transport_val = {s = 0x7fc937f4fb80 "\024\b", len = -965495088}, ttl_val = {s = 0x7ffcc6739cd0 "A", len = 274214092}, user_param_val = {s = 0x4c6739d68 <error: Cannot access memory at address 0x4c6739d68>, len = 0}, maddr_val = {s = 0x7fc937f15180 "\017", len = 0}, method_val = {s = 0x41 <error: Cannot access memory at address 0x41>, len = 276174472}, lr_val = {s = 0x0, len = 1212490240}, r2_val = {s = 0x555b107a9833 "INFO", len = 960495616}, gr_val = {s = 0x7ffcc6739de0 "\220\244s\306\374\177", len = 272754088}}
        next_hop = {user = {s = 0x7fc9484cfa0b "%H:%M:%S", len = 24}, passwd = {s = 0x7ffcc6739af0 "3\230z\020[U", len = 282804960}, host = {s = 0x555b10db42d0 "", len = 1215316096}, port = {s = 0x7fc948707b00 <main_arena> "", len = 8208}, params = {s = 0x8c <error: Cannot access memory at address 0x8c>, len = 1212061465}, sip_params = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1212034094}, headers = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 282593440}, port_no = 39696, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4250416580), transport = {s = 0x555b00000001 <error: Cannot access memory at address 0x555b00000001>, len = 282593440}, ttl = {s = 0x7ffcc6739bb0 "p[\361\067\311\177", len = 938544024}, user_param = {s = 0x555b10d808a0 "1460007659_57432438 at 102.7.3.12", len = 1}, maddr = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 11}, method = {s = 0x555b10d808a0 "1460007659_57432438 at 102.7.3.12", len = -965501976}, lr = {s = 0x15 <error: Cannot access memory at address 0x15>, len = 1212489561}, r2 = {s = 0x555b107a9833 "INFO", len = -49206466}, gr = {s = 0x7ffcc6739c70 "\240\234s\306\374\177", len = 276174472}, transport_val = {s = 0x0, len = 1212490240}, ttl_val = {s = 0x555b107a9833 "INFO", len = 960495616}, user_param_val = {s = 0x7fc937c21468 "\017\261s\364\307\177", len = -44059272}, maddr_val = {s = 0x7fc9380cade8 "\363\346\001", len = 276174472}, method_val = {s = 0x7ffcc6739c80 "p[\361\067\311\177", len = 1212490240}, lr_val = {s = 0x7fc937f15198 "\001", len = 940355048}, r2_val = {s = 0x7a00000004 <error: Cannot access memory at address 0x7a00000004>, len = 3}, gr_val = {s = 0x0, len = 0}}
        u = 0x0
        port = 0
        dst_host = 0x7fc804900c10
        i = 934727696
        flags = 32713
        avp = 0x7ffcc6739f40
        st = {flags = 282813152, id = 21851, name = {n = 1215331072, s = {s = 0x7fc948707b00 <main_arena> "", len = 0}, re = 0x7fc948707b00 <main_arena>}, avp = 0xa0}
        sct = 0x555b107a9833
        sjt = 0x555b103fa952 <do_action+20285>
        rve = 0x7ffcc6739f40
        mct = 0x7ffcc673a490
        rv = 0x555b10db42d0
        rv1 = 0x7fc937b6d010
        c1 = {cache_type = 1215326240, val_type = 32713, c = {avp_val = {n = 8, s = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, re = 0x8}, pval = {rs = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, ri = 1212272350, flags = 32713}}, i2s = "\000\000\000\066\067\061\063\063\373\037", '\000' <repeats 11 times>}
        s = {s = 0x555b10db42ec "[U", len = 1213011858}
        srevp = {0x7fc937f161a0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739980, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#16 0x0000555b1040c449 in run_actions (h=0x7ffcc673a130, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f161a0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 939135680, tz_dsttime = 32713}
        tdiff = 940026468
        __func__ = "run_actions"
#17 0x0000555b1040caf6 in run_actions_safe (h=0x7ffcc673b6d0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {93849606559368, 8478727959525565030, 0, 140502477644288, 93849606854707, 5255462912, 8478727960146322022, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {140723637953640, 0, 0, 140723637953008, 93849606559368, 0, 140502477644288, 93849606854707, 5255462912, 140723637953344, 93849602810890, 93849606559368, 4571141768, 140723637953072, 140496791851379, 140502203710192}}}}}
        ret = -965499800
        ign_on_break = 0
#18 0x0000555b103c9569 in rval_get_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, i=0x7ffcc673a5d8, rv=0x7fc937f162f8, cache=0x0) at core/rvalue.c:915
        r_avp = 0x7ffcc673b6d0
        avp_val = {n = 1, s = {s = 0x7ffc00000001 <error: Cannot access memory at address 0x7ffc00000001>, len = 274772759}, re = 0x7ffc00000001}
        pval = {rs = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -965499436}, ri = 0, flags = 0}
        tmp = {s = 0x7ffcc673a380 "\350\255\f8\311\177", len = -965499840}
        s = 0x0
        r = 32713
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#19 0x0000555b103ce40a in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc673a5d8, rve=0x7fc937f162f0) at core/rvalue.c:1913
        i1 = 276174472
        i2 = 1
        ret = -1
        c1 = {cache_type = 940355048, val_type = 32713, c = {avp_val = {n = 938570632, s = {s = 0x7fc937f17388 "\232\a", len = 935352296}, re = 0x7fc937f17388}, pval = {rs = {s = 0x7fc937f17388 "\232\a", len = 935352296}, ri = 34, flags = 14}}, i2s = "\360\245s\306\374\177\000\000\341S^\365\307\177\000\000\000\000\000\000\000"}
        c2 = {cache_type = 276469811, val_type = 21851, c = {avp_val = {n = -965499840, s = {s = 0x7ffcc673a440 "\360\245s\306\374\177", len = -965499776}, re = 0x7ffcc673a440}, pval = {rs = {s = 0x7ffcc673a440 "\360\245s\306\374\177", len = -965499776}, ri = 272425709, flags = 21851}}, i2s = "=\006\001", '\000' <repeats 13 times>, "h\000\361\067\311\177"}
        rv1 = 0x555b105cf57c <pv_value_destroy+175>
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#20 0x0000555b103ce84f in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc673ab0c, rve=0x7fc937f16a20) at core/rvalue.c:1921
        i1 = 1212490240
        i2 = 0
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = -176175080, s = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, re = 0x7fc7f57fc818 <_dbg_action_list+344>}, pval = {rs = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, ri = 938570632, flags = 32713}}, i2s = "\340\246s\306\374\177", '\000' <repeats 15 times>}
        c2 = {cache_type = 938537056, val_type = 32713, c = {avp_val = {n = 940355048, s = {s = 0x7fc9380cade8 "\363\346\001", len = -49207381}, re = 0x7fc9380cade8}, pval = {rs = {s = 0x7fc9380cade8 "\363\346\001", len = -49207381}, ri = 76548816, flags = 32712}}, i2s = " X\363\067\311\177\000\000\250V\363\067\311\177\000\000\350\255\f8\311\177"}
        rv1 = 0x555b1041e5a8 <lval_assign+3169>
        rv2 = 0x7ffcc673a620
        __func__ = "rval_expr_eval_int"
#21 0x0000555b103fdf6e in do_action (h=0x7ffcc673b6d0, a=0x7fc937f17388, msg=0x7fc9380cade8) at core/action.c:1052
        ret = -5
        v = 1
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\350\356\305\067\311\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\350\356\305\067\311\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\350\356\305\067\311\177\000\000\024\256s\306\374\177\000", __u6_addr16 = {61160, 14277, 32713, 0, 44564, 50803, 32764, 0}, __u6_addr32 = {935718632, 32713, 3329469972, 32764}}}, sin6_scope_id = 940355048}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\350\356\305\067\311\177\000\000\024\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\270\347\305\067\311\177\000\000\030\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\210\026v\020[U\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000", __ss_align = 140723637955568}}, id = -64824879, send_flags = {f = 32711, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937f6f130 ""
        new_uri = 0x7ffcc673ae18 ""
        end = 0x7fc937c5e7b0 "\001"
        crt = 0x7fc937c5e7b8 "\a"
        cmd = 0x7fc937c057e8
        len = 32711
        user = -178367519
        uri = {user = {s = 0x0, len = 1212490240}, passwd = {s = 0x555b107a9833 "INFO", len = 960495616}, host = {s = 0x7ffcc673a960 "\200\251s\306\374\177", len = -44162673}, port = {s = 0x7ffcc673a9bc "\001", len = 273118466}, params = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 0}, sip_params = {s = 0x7ffcc673aa40 "\360\252s\306\374\177", len = 275030558}, headers = {s = 0x555b10b141d4 <ut_buf_int2str+20> "5", len = 275031704}, port_no = 43392, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4250804744), transport = {s = 0x7ffcc673a9bc "\001", len = 0}, ttl = {s = 0x7ffcc673a9d0 "\200\252s\306\374\177", len = -44068401}, user_param = {s = 0x38 <error: Cannot access memory at address 0x38>, len = -965497384}, maddr = {s = 0x7fc937c5e7d8 "\001", len = 940355048}, method = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, lr = {s = 0x7fc937c488c8 "`\211\304\067\311\177", len = 280052180}, r2 = {s = 0x7ffcc673aa80 "\350\356\305\067\311\177", len = 274517235}, gr = {s = 0x0, len = -965497384}, transport_val = {s = 0x7fc937c5e7c0 "\017", len = 940355048}, ttl_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 934727696}, user_param_val = {s = 0x0, len = 276174472}, maddr_val = {s = 0x0, len = 1212490240}, method_val = {s = 0x555b107a9833 "INFO", len = 960495616}, lr_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 274387908}, r2_val = {s = 0x7fc7fc440d20 <rr_param_buf_ptr> ";did=86a.0462", len = 276174472}, gr_val = {s = 0x0, len = 1212490240}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffcc673a7b0 "", len = 276174472}, host = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, port = {s = 0x555b107a9833 "INFO", len = 276174472}, params = {s = 0x0, len = 1212490240}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, headers = {s = 0x7ffcc673a8e0 "", len = 275070078}, port_no = 43040, proto = 50803, type = 32764, flags = (unknown: 934727696), transport = {s = 0x7ffcc673a820 "", len = 934727696}, ttl = {s = 0x7ffcc673a860 "\220\250s\306\374\177", len = -57849891}, user_param = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, maddr = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 271259184}, method = {s = 0x402050 <error: Cannot access memory at address 0x402050>, len = 5564880}, lr = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, r2 = {s = 0x37 <error: Cannot access memory at address 0x37>, len = 0}, gr = {s = 0x7ffcc673a890 "\200\251s\306\374\177", len = 273118466}, transport_val = {s = 0x7ffcc673a94c "\001", len = 276598612}, ttl_val = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 0}, user_param_val = {s = 0x7ffcc673a980 "Щs\306\374\177", len = 275070078}, maddr_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, method_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, lr_val = {s = 0x7ffcc673a920 "\274\251s\306\374\177", len = -57849891}, r2_val = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, gr_val = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 276174472}}
        u = 0x7ffcc673ae30
        port = 0
        dst_host = 0x555b107a982c
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 3329468288, id = 32764, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x555b105cf57c <pv_value_destroy+175>}
        sct = 0x1c673ab90
        sjt = 0x0
        rve = 0x7fc937f16a20
        mct = 0x0
        rv = 0x10761688
        rv1 = 0x7fc937c6f610
        c1 = {cache_type = 3329468224, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, ri = -965497728, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = -107129541}
        srevp = {0x7fc937f17388, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673a6e0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#22 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937f0fca0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f17388
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935786000, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#23 0x0000555b103fa952 in do_action (h=0x7ffcc673b6d0, a=0x7fc937c6f610, msg=0x7fc9380cade8) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x555b10a44051 <buf+81>, to = {s = {sa_family = 4, sa_data = "\000\000\001\000\304\023\200\264s\306\374\177\000"}, sin = {sin_family = 4, sin_port = 0, sin_addr = {s_addr = 331612161}, sin_zero = "\200\264s\306\374\177\000"}, sin6 = {sin6_family = 4, sin6_port = 0, sin6_flowinfo = 331612161, sin6_addr = {__in6_u = {__u6_addr8 = "\200\264s\306\374\177\000\000\020Bi\020[U\000", __u6_addr16 = {46208, 50803, 32764, 0, 16912, 4201, 21851, 0}, __u6_addr32 = {3329471616, 32764, 275333648, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 4, __ss_padding = "\000\000\001\000\304\023\200\264s\306\374\177\000\000\020Bi\020[U\000\000\000\000\000\000\000\000\000\000Hc\371\067\311\177\000\000UD\244\020[U\000\000\065@\244\020[U\000\000 \263s\306\374\177\000\000\020ж7\311\177\000\000`\263s\306\374\177\000\000\335G\215\374\307\177\000\000\360\360\360\360", '\000' <repeats 14 times>, "\200\020\000\000\000\000\000D+\020\000\000\000", __ss_align = 4195424}}, id = 5553152, send_flags = {f = 0, blst_imask = 0}, proto = -64 '\300', proto_pad0 = 119 'w', proto_pad1 = 1285}
        tmp = 0x7fc804900c10 ""
        new_uri = 0x7fc937f73b98 "\001"
        end = 0x555b106d42fd <parse_method_name+2024> "\205\300\017\224\300\017\266\300H\205\300t\027H\213\205p\377\377\377", <incomplete sequence \307>
        crt = 0x1c673b510 <error: Cannot access memory at address 0x1c673b510>
        cmd = 0x7fc937c137c0
        len = 0
        user = 938949488
        uri = {user = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -965496436}, passwd = {s = 0x4c673b1a0 <error: Cannot access memory at address 0x4c673b1a0>, len = 276653360}, host = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, port = {s = 0x7ffcc673b190 "\300\262s\306\374\177", len = 274214092}, params = {s = 0x4004004a0 <error: Cannot access memory at address 0x4004004a0>, len = 276653360}, sip_params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, headers = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275281682}, port_no = 45520, proto = 50803, type = 32764, flags = (URI_SIP_USER_PHONE | unknown: 273118464), transport = {s = 0x0, len = 276598612}, ttl = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275030558}, user_param = {s = 0x7fc937f96348 "\001", len = 939089824}, maddr = {s = 0x7ffcc673b342 "\005\005", len = -965495997}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x555b107d6d88 <__func__.6797> "parse_via", len = 276659112}, r2 = {s = 0x1c673b250 <error: Cannot access memory at address 0x1c673b250>, len = 76549136}, gr = {s = 0x7ffcc673b250 "\220\262s\306\374\177", len = -178372384}, transport_val = {s = 0x555b107d6534 "", len = 76549136}, ttl_val = {s = 0x555b10761688 "", len = 276174472}, user_param_val = {s = 0x7ffcc673b290 "\300\262s\306\004", len = -178335373}, maddr_val = {s = 0x0, len = -965496132}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}, lr_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = -965496004}, r2_val = {s = 0x4c673b2c0 <error: Cannot access memory at address 0x4c673b2c0>, len = 279199821}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 279199825}}
        next_hop = {user = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1}, passwd = {s = 0x7fc937f73c90 "\003", len = 0}, host = {s = 0x7fc937f96168 "\001", len = 938950232}, port = {s = 0x7a <error: Cannot access memory at address 0x7a>, len = 939090280}, params = {s = 0x0, len = 939090928}, sip_params = {s = 0x7fc937f96348 "\001", len = 938950232}, headers = {s = 0x7fc937f96048 "\004", len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x1c673b120 <error: Cannot access memory at address 0x1c673b120>, len = 76549136}, method_val = {s = 0x7ffcc673b120 "`\261s\306\374\177", len = -178372384}, lr_val = {s = 0x555b107d6534 "", len = 76549136}, r2_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 16}, gr_val = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -178335373}}
        u = 0x555b107df530 <__func__.6625>
        port = 0
        dst_host = 0x555b10761688
        i = 29
        flags = 21851
        avp = 0x1
        st = {flags = 65537, id = 48, name = {n = 279199744, s = {s = 0x555b10a44000 <buf> "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"..., len = 6}, re = 0x555b10a44000 <buf>}, avp = 0x555b10a44007 <buf+7>}
        sct = 0x7ffcc673b480
        sjt = 0x7fc804900c10
        rve = 0x7fc937c5f610
        mct = 0x1
        rv = 0x0
        rv1 = 0x555b10a4411f <buf+287>
        c1 = {cache_type = 276174472, val_type = 21851, c = {avp_val = {n = 0, s = {s = 0x0, len = 276824064}, re = 0x0}, pval = {rs = {s = 0x0, len = 276824064}, ri = 271261272, flags = 0}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x7ffcc673af90 "\006", len = -57849891}
        srevp = {0x7fc937c6f610, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673af20, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#24 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c473c0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c6f610
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 276690800, tz_dsttime = 21851}
        tdiff = 4116631923
        __func__ = "run_actions"
#25 0x0000555b1040cbbe in run_top_route (a=0x7fc937c473c0, msg=0x7fc9380cade8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {93849603950067, 4571428513, 140502205509096, 93849606559368, 4571141768, 140723637958544, 140496791851379, 140723637958560, 140723637958588, 18118819416, 93849606846109, 8004010816636452865, 0, 140723637958592, 93849606559368, 0}}}}}
        p = 0x7ffcc673b6d0
        ret = 276469811
        sfbk = 0
#26 0x0000555b1057b6e8 in receive_msg (buf=0x555b10a44000 <buf> "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"..., len=1109, rcv_info=0x7ffcc673bd40) at core/receive.c:423
        msg = 0x7fc9380cade8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 15 times>, 1}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x555b10a44000 <buf> "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"..., len = 1109}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcc673b8b0, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcc673bd40, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#27 0x0000555b10447d59 in udp_rcv_loop () at core/udp_server.c:543
        len = 1109
        buf = "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"...
        tmp = 0x2e <error: Cannot access memory at address 0x2e>
        fromaddr = 0x7fc93807e930
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {201527724, 0}, addr32 = {201527724, 0, 0, 0}, addr16 = {4524, 3075, 0, 0, 0, 0, 0, 0}, addr = "\254\021\003\f", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {235278508, 0}, addr32 = {235278508, 0, 0, 0}, addr16 = {4268, 3590, 0, 0, 0, 0, 0, 0}, addr = "\254\020\006\016", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023Ĭ\021\003\f\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 201527724}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 201527724, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023Ĭ\021\003\f", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fc937c01000, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "\264 \221\004\310\177\000\000\264 \221\004\001\000\000\000P\273s\306\374\177\000\000s\321^\365\307\177\000\000P\273s\306\374\177\000\000\220\267\331\020[U\000\000@\263\331\020[U\000\000\247\261s\306\374\177\000\000\220\261s\306\374\177\000\000\000\000\000\000\000\000\000\001", '\000' <repeats 20 times>, "\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000\000\264 \221\004\310\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000@\274s\306\374\177\000\000\005\067\346\356\307\177\000\000\177\252y\020[U\000\000\020\f\220\004\033\000\000\000\264 \221\004\310\177\000\000"...
        i = -1
        j = 130560
        l = 0
        __func__ = "udp_rcv_loop"
#28 0x0000555b1038de84 in main_loop () at main.c:1683
        i = 10
        pid = 0
        si = 0x7fc937c01000
        si_desc = "udp receiver child=10 sock=102.6.6.14:5060\000er.local:5060\000EH\311\177\000\000\000\000\000\000\000\000\000\000\060\000\000\000\060\000\000\000\070\300s\306\374\177\000\000P\277s\306\374\177\000\000\250Nx\020[U\000\000\370\226\r8k\000\000\000\063\230z\020[U\000\000\360\226\n8\311\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#29 0x0000555b10398511 in main (argc=11, argv=0x7ffcc673c568) at main.c:2856
        cfg_stream = 0x555b10bef010
        c = -1
        r = 0
        tmp = 0x7ffcc673deba ""
        tmp_len = 32764
        port = -965491792
        proto = 32713
        ahost = 0x0
        aport = 0
        options = 0x555b10764348 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 900928915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7fc94926d040 <_rtld_global>
        p = 0x7ffcc673de72 "trunks"
        st = {st_dev = 19, st_ino = 23307, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1641492636, tv_nsec = 884483965}, st_mtim = {tv_sec = 1599774907, tv_nsec = 42281020}, st_ctim = {tv_sec = 1599774907, tv_nsec = 42281020}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000 \232\004I\311\177\000\000\330\331&I\311\177\000\000\a\000\000\000\000\000\000\000\a\000\000\000\a\000\000\000\070\224\004I\311\177\000\000\060\302s\306\374\177\000\000\215F\005I\311\177\000\000\000\000\000\000\000\000\000\000\272J\005I\311\177", '\000' <repeats 11 times>, "\200\065\020[U", '\000' <repeats 13 times>, "\377\000\000\000\000", '\377' <repeats 11 times>, "\000\377\377\377\377GLIBC_2.2.5\000GLIB\000__f", '\000' <repeats 12 times>, "inite\000getpriorit", '\000' <repeats 136 times>...
        option_index = 0
        long_options = {{name = 0x555b107663d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x555b10761b1c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x555b107663db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x555b107663e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x555b107663e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x555b107663f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x555b107663fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x555b10766404 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x555b1076640f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x555b10766418 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x555b10766423 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007fc7f9e53741 in futex_get (lock=0x7fc7fe0c8a20) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007fc7f9e55819 in bcast_dmq_message1 (peer=0x7fc7fe1ebfb0, body=0x7ffcc6738ca0, except=0x0, resp_cback=0x7fc7f9bf2790 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9bf2750 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:156
        node = 0x7fc804900d30
        __func__ = "bcast_dmq_message1"
#3  0x00007fc7f9e56072 in bcast_dmq_message (peer=0x7fc7fe1ebfb0, body=0x7ffcc6738ca0, except=0x0, resp_cback=0x7fc7f9bf2790 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9bf2750 <dlg_dmq_content_type>) at dmq_funcs.c:188
No locals.
#4  0x00007fc7f999101a in dlg_dmq_send (body=0x7ffcc6738ca0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007fc7f999a7e4 in dlg_dmq_replicate_action (action=DLG_DMQ_UPDATE, dlg=0x7fc7fe7131f0, needlock=1, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x555b10d79c40, flags = 0, buf = {s = 0x555b10db4e20 "{\"action\":1,\"h_entry\":2664,\"h_id\":9792,\"init_ts\":1652854905,\"callid\":\"1460007659_57432438 at 102.7.3.12\",\"from_uri\":\"sip:03312586972 at 102.7.3.12;pstn-params=808482808883\",\"to_uri\":\"sip:0915061111 at 172.16"..., len = 1681}, malloc_fn = 0x7fc9483e8f10 <__GI___libc_malloc>, free_fn = 0x7fc9483e9510 <__GI___libc_free>}
        prof_jdoc = {root = 0x0, flags = 0, buf = {s = 0x0, len = 0}, malloc_fn = 0x0, free_fn = 0x0}
        var = 0x0
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007fc7f99696f7 in dlg_on_send (t=0x7fc80e363eb8, type=16, param=0x7ffcc6738f20) at dlg_handlers.c:760
        dlg = 0x7fc7fe7131f0
        iuid = 0x7fc80df503c0
        __func__ = "dlg_on_send"
#7  0x00007fc7fdb59d98 in run_trans_callbacks_internal (cb_lst=0x7fc80e363f30, type=16, trans=0x7fc80e363eb8, params=0x7ffcc6738f20) at t_hooks.c:258
        cbp = 0x7fc805b38488
        backup_from = 0x7fc80e3640c8
        backup_to = 0x7fc80e3640d0
        backup_dom_from = 0x555b10ab07c0 <def_list+32>
        backup_dom_to = 0x555b10ab07c8 <def_list+40>
        backup_uri_from = 0x7fc80e3640b8
        backup_uri_to = 0x7fc80e3640c0
        backup_xavps = 0x7fc80e3640e8
        backup_xavus = 0x7fc80e3640f0
        backup_xavis = 0x7fc80e3640f8
        __func__ = "run_trans_callbacks_internal"
#8  0x00007fc7fdb59ec8 in run_trans_callbacks (type=16, trans=0x7fc80e363eb8, req=0x7fc9380cade8, rpl=0x0, code=-1) at t_hooks.c:285
        params = {req = 0x7fc9380cade8, rpl = 0x0, param = 0x7fc805b38498, code = -1, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#9  0x00007fc7fdb6accf in prepare_new_uac (t=0x7fc80e363eb8, i_req=0x7fc9380cade8, branch=0, uri=0x7ffcc6739120, path=0x7ffcc6739100, next_hop=0x7ffcc6739110, fsocket=0x7fc937bfff30, snd_flags=..., fproto=0, flags=0, instance=0x7ffcc67390f0, ruid=0x7ffcc67390e0, location_ua=0x7ffcc67390d0) at t_fwd.c:388
        shbuf = 0x0
        add_rm_backup = 0x7fc937f71ab8
        body_lumps_backup = 0x7fc937f81470
        parsed_uri_bak = {user = {s = 0x7fc937f80f6c "411078033 at siptrunks.company.com", len = 9}, passwd = {s = 0x0, len = 0}, host = {s = 0x7fc937f80f76 "siptrunks.company.com", len = 21}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        ret = -1
        len = 32711
        parsed_uri_ok_bak = 1
        free_new_uri = 1
        msg_uri_bak = {s = 0x7fc937f80f68 "sip:411078033 at siptrunks.company.com", len = 35}
        dst_uri_bak = {s = 0x7fc937f72ac8 "sip:internal.hipertel.local", len = 28}
        dst_uri_backed_up = 1
        path_bak = {s = 0x0, len = 0}
        free_path = 1
        instance_bak = {s = 0x0, len = 0}
        free_instance = 1
        ruid_bak = {s = 0x0, len = 0}
        free_ruid = 1
        ua_bak = {s = 0x0, len = 0}
        free_ua = 1
        backup_route_type = 940355048
        test_dst = 32764
        fwd_snd_flags_bak = {f = 32712, blst_imask = 0}
        rpl_snd_flags_bak = {f = 3088, blst_imask = 1168}
        force_send_socket_bak = 0x7ffcc6739488
        dst = 0x7fc80e3641a8
        ctx = {rec_lev = -38153952, run_flags = 32711, last_retcode = 275030754, jmp_env = {{__jmpbuf = {140496932033080, 140497065837704, 140497204347696, 140497208622896, 72907341584, 140497204347696, 1, 140497046735888}, __mask_was_saved = -965504896, __saved_mask = {__val = {276598617, 140723637948904, 140723637948880, 3474017167730815278, 3328783759099507253, 3833180307342636849, 3767094209391113776, 1, 140497046735888, 141176534806585, 936, 7624429792, 140497046735888, 140723637948640, 140496791814368, 93849607136987}}}}}
        bctx = 0x7ffcc6739478
        keng = 0x7ffcc6739480
        __func__ = "prepare_new_uac"
#10 0x00007fc7fdb6ffe8 in add_uac (t=0x7fc80e363eb8, request=0x7fc9380cade8, uri=0x7fc9380cb0c8, next_hop=0x7fc9380cb0d8, path=0x7fc9380cb490, proxy=0x0, fsocket=0x7fc937bfff30, snd_flags=..., proto=0, flags=0, instance=0x7fc9380cb4a0, ruid=0x7fc9380cb4b8, location_ua=0x7fc9380cb4c8) at t_fwd.c:814
        ret = 100
        branch = 0
        __func__ = "add_uac"
#11 0x00007fc7fdb79725 in t_forward_nonack (t=0x7fc80e363eb8, p_msg=0x7fc9380cade8, proxy=0x0, proto=0) at t_fwd.c:1694
        branch_ret = 0
        lowest_ret = -1
        added_branches = 0
        first_branch = 0
        i = 32764
        t_invite = 0x7fc937fa1658
        success_branch = -965503440
        try_new = 1
        lock_replies = 0
        backup_bflags = 0
        obranch = {uri = {s = 0x13200000000 <error: Cannot access memory at address 0x13200000000>, len = 276174472}, dst_uri = {s = 0x0, len = 1212490240}, q = 276469811, path = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965503504}, flags = 4256017125, force_socket = 0x1, ruid = {s = 0x7ffcc67395c0 "", len = -965503456}, instance = {s = 0x6400000001 <error: Cannot access memory at address 0x6400000001>, len = 940355048}, location_ua = {s = 0x7fc80e363eb8 "H\323\376\375\307\177", len = 276174472}, otcpid = 276174472}
        __func__ = "t_forward_nonack"
#12 0x00007fc7fdb511f1 in t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, proto=0, replicate=0) at t_funcs.c:335
        ret = 0
        new_tran = 1
        t = 0x7fc80e363eb8
        dst = {send_sock = 0x7fc937c05468, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\220\230s\306\374\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\220\230s\306\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\230s\306\374\177\000\000\341S^\365\307\177\000", __u6_addr16 = {39056, 50803, 32764, 0, 21473, 62814, 32711, 0}, __u6_addr32 = {3329464464, 32764, 4116599777, 32711}}}, sin6_scope_id = 3329464080}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\220\230s\306\374\177\000\000\341S^\365\307\177\000\000\020\227s\306\374\177\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000P\227s\306\374\177\000\000@\231s\306\374\177\000\000Зs\306\374\177", '\000' <repeats 18 times>, "\350\255\f8\311\177\000", __ss_align = 140723637952000}}, id = 272622770, send_flags = {f = 21851, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -105 '\227', proto_pad1 = -14733}
        port = 0
        host = {s = 0x7fc7fe1e0c48 "\360\061q\376\307\177", len = -178324551}
        comp = 1
        __func__ = "t_relay_to"
#13 0x00007fc7fdb054da in _w_t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, force_proto=0) at tm.c:1752
        t = 0x7fc9380cade8
        res = 32764
        __func__ = "_w_t_relay_to"
#14 0x00007fc7fdb06825 in w_t_relay (p_msg=0x7fc9380cade8, _foo=0x0, _bar=0x0) at tm.c:1952
No locals.
#15 0x0000555b103fe4b2 in do_action (h=0x7ffcc673a130, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1076
        ret = -5
        v = 0
        dst = {send_sock = 0x7fc937deac70, to = {s = {sa_family = 44520, sa_data = "\f8\311\177\000\000\253'\021\375\307\177\000"}, sin = {sin_family = 44520, sin_port = 14348, sin_addr = {s_addr = 32713}, sin_zero = "\253'\021\375\307\177\000"}, sin6 = {sin6_family = 44520, sin6_port = 14348, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "\253'\021\375\307\177\000\000\320\n\220\004\310\177\000", __u6_addr16 = {10155, 64785, 32711, 0, 2768, 1168, 32712, 0}, __u6_addr32 = {4245759915, 32711, 76548816, 32712}}}, sin6_scope_id = 938562624}, sas = {ss_family = 44520, __ss_padding = "\f8\311\177\000\000\253'\021\375\307\177\000\000\320\n\220\004\310\177\000\000 at T\361\067\311\177\000\000\310R\361\067\311\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\200\235s\306\374\177\000\000\020\307\177\365\307\177\000\000\350\255\f8\311\177\000\000\030^\361\067\311\177", '\000' <repeats 33 times>, __ss_align = 0}}, id = 1212490240, send_flags = {f = 32713, blst_imask = 0}, proto = 51 '3', proto_pad0 = -104 '\230', proto_pad1 = 4218}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7fc937c05468
        len = 0
        user = 0
        uri = {user = {s = 0x555b10d24db0 "UTC", len = 938506384}, passwd = {s = 0x7fc937deace8 "H\f\361\067\311\177", len = -49207158}, host = {s = 0x7fc937f15b70 "Trying", len = 6}, port = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, params = {s = 0x41 <error: Cannot access memory at address 0x41>, len = 276174472}, sip_params = {s = 0x7fc937f5ace0 "!", len = 938565144}, headers = {s = 0x555b107a9833 "INFO", len = 960495616}, port_no = 40368, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4116599776), transport = {s = 0x7fc937f15448 "\002", len = 938562248}, ttl = {s = 0x7fc9380cade8 "\363\346\001", len = 276174472}, user_param = {s = 0x0, len = 1212490240}, maddr = {s = 0x555b107a9833 "INFO", len = 960495616}, method = {s = 0x7ffcc6739de0 "\220\244s\306\374\177", len = 272680009}, lr = {s = 0x7ffcc6739ca0 "Мs\306\374\177", len = -178335373}, r2 = {s = 0x7ffcc6739ca0 "Мs\306\374\177", len = 938562632}, gr = {s = 0x7fc937f15b70 "Trying", len = 940355048}, transport_val = {s = 0x7fc937f4fb80 "\024\b", len = -965495088}, ttl_val = {s = 0x7ffcc6739cd0 "A", len = 274214092}, user_param_val = {s = 0x4c6739d68 <error: Cannot access memory at address 0x4c6739d68>, len = 0}, maddr_val = {s = 0x7fc937f15180 "\017", len = 0}, method_val = {s = 0x41 <error: Cannot access memory at address 0x41>, len = 276174472}, lr_val = {s = 0x0, len = 1212490240}, r2_val = {s = 0x555b107a9833 "INFO", len = 960495616}, gr_val = {s = 0x7ffcc6739de0 "\220\244s\306\374\177", len = 272754088}}
        next_hop = {user = {s = 0x7fc9484cfa0b "%H:%M:%S", len = 24}, passwd = {s = 0x7ffcc6739af0 "3\230z\020[U", len = 282804960}, host = {s = 0x555b10db42d0 "", len = 1215316096}, port = {s = 0x7fc948707b00 <main_arena> "", len = 8208}, params = {s = 0x8c <error: Cannot access memory at address 0x8c>, len = 1212061465}, sip_params = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1212034094}, headers = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 282593440}, port_no = 39696, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4250416580), transport = {s = 0x555b00000001 <error: Cannot access memory at address 0x555b00000001>, len = 282593440}, ttl = {s = 0x7ffcc6739bb0 "p[\361\067\311\177", len = 938544024}, user_param = {s = 0x555b10d808a0 "1460007659_57432438 at 102.7.3.12", len = 1}, maddr = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 11}, method = {s = 0x555b10d808a0 "1460007659_57432438 at 102.7.3.12", len = -965501976}, lr = {s = 0x15 <error: Cannot access memory at address 0x15>, len = 1212489561}, r2 = {s = 0x555b107a9833 "INFO", len = -49206466}, gr = {s = 0x7ffcc6739c70 "\240\234s\306\374\177", len = 276174472}, transport_val = {s = 0x0, len = 1212490240}, ttl_val = {s = 0x555b107a9833 "INFO", len = 960495616}, user_param_val = {s = 0x7fc937c21468 "\017\261s\364\307\177", len = -44059272}, maddr_val = {s = 0x7fc9380cade8 "\363\346\001", len = 276174472}, method_val = {s = 0x7ffcc6739c80 "p[\361\067\311\177", len = 1212490240}, lr_val = {s = 0x7fc937f15198 "\001", len = 940355048}, r2_val = {s = 0x7a00000004 <error: Cannot access memory at address 0x7a00000004>, len = 3}, gr_val = {s = 0x0, len = 0}}
        u = 0x0
        port = 0
        dst_host = 0x7fc804900c10
        i = 934727696
        flags = 32713
        avp = 0x7ffcc6739f40
        st = {flags = 282813152, id = 21851, name = {n = 1215331072, s = {s = 0x7fc948707b00 <main_arena> "", len = 0}, re = 0x7fc948707b00 <main_arena>}, avp = 0xa0}
        sct = 0x555b107a9833
        sjt = 0x555b103fa952 <do_action+20285>
        rve = 0x7ffcc6739f40
        mct = 0x7ffcc673a490
        rv = 0x555b10db42d0
        rv1 = 0x7fc937b6d010
        c1 = {cache_type = 1215326240, val_type = 32713, c = {avp_val = {n = 8, s = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, re = 0x8}, pval = {rs = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, ri = 1212272350, flags = 32713}}, i2s = "\000\000\000\066\067\061\063\063\373\037", '\000' <repeats 11 times>}
        s = {s = 0x555b10db42ec "[U", len = 1213011858}
        srevp = {0x7fc937f161a0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739980, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#16 0x0000555b1040c449 in run_actions (h=0x7ffcc673a130, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f161a0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 939135680, tz_dsttime = 32713}
        tdiff = 940026468
        __func__ = "run_actions"
#17 0x0000555b1040caf6 in run_actions_safe (h=0x7ffcc673b6d0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {93849606559368, 8478727959525565030, 0, 140502477644288, 93849606854707, 5255462912, 8478727960146322022, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {140723637953640, 0, 0, 140723637953008, 93849606559368, 0, 140502477644288, 93849606854707, 5255462912, 140723637953344, 93849602810890, 93849606559368, 4571141768, 140723637953072, 140496791851379, 140502203710192}}}}}
        ret = -965499800
        ign_on_break = 0
#18 0x0000555b103c9569 in rval_get_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, i=0x7ffcc673a5d8, rv=0x7fc937f162f8, cache=0x0) at core/rvalue.c:915
        r_avp = 0x7ffcc673b6d0
        avp_val = {n = 1, s = {s = 0x7ffc00000001 <error: Cannot access memory at address 0x7ffc00000001>, len = 274772759}, re = 0x7ffc00000001}
        pval = {rs = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -965499436}, ri = 0, flags = 0}
        tmp = {s = 0x7ffcc673a380 "\350\255\f8\311\177", len = -965499840}
        s = 0x0
        r = 32713
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#19 0x0000555b103ce40a in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc673a5d8, rve=0x7fc937f162f0) at core/rvalue.c:1913
        i1 = 276174472
        i2 = 1
        ret = -1
        c1 = {cache_type = 940355048, val_type = 32713, c = {avp_val = {n = 938570632, s = {s = 0x7fc937f17388 "\232\a", len = 935352296}, re = 0x7fc937f17388}, pval = {rs = {s = 0x7fc937f17388 "\232\a", len = 935352296}, ri = 34, flags = 14}}, i2s = "\360\245s\306\374\177\000\000\341S^\365\307\177\000\000\000\000\000\000\000"}
        c2 = {cache_type = 276469811, val_type = 21851, c = {avp_val = {n = -965499840, s = {s = 0x7ffcc673a440 "\360\245s\306\374\177", len = -965499776}, re = 0x7ffcc673a440}, pval = {rs = {s = 0x7ffcc673a440 "\360\245s\306\374\177", len = -965499776}, ri = 272425709, flags = 21851}}, i2s = "=\006\001", '\000' <repeats 13 times>, "h\000\361\067\311\177"}
        rv1 = 0x555b105cf57c <pv_value_destroy+175>
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#20 0x0000555b103ce84f in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc673ab0c, rve=0x7fc937f16a20) at core/rvalue.c:1921
        i1 = 1212490240
        i2 = 0
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = -176175080, s = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, re = 0x7fc7f57fc818 <_dbg_action_list+344>}, pval = {rs = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, ri = 938570632, flags = 32713}}, i2s = "\340\246s\306\374\177", '\000' <repeats 15 times>}
        c2 = {cache_type = 938537056, val_type = 32713, c = {avp_val = {n = 940355048, s = {s = 0x7fc9380cade8 "\363\346\001", len = -49207381}, re = 0x7fc9380cade8}, pval = {rs = {s = 0x7fc9380cade8 "\363\346\001", len = -49207381}, ri = 76548816, flags = 32712}}, i2s = " X\363\067\311\177\000\000\250V\363\067\311\177\000\000\350\255\f8\311\177"}
        rv1 = 0x555b1041e5a8 <lval_assign+3169>
        rv2 = 0x7ffcc673a620
        __func__ = "rval_expr_eval_int"
#21 0x0000555b103fdf6e in do_action (h=0x7ffcc673b6d0, a=0x7fc937f17388, msg=0x7fc9380cade8) at core/action.c:1052
        ret = -5
        v = 1
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\350\356\305\067\311\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\350\356\305\067\311\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\350\356\305\067\311\177\000\000\024\256s\306\374\177\000", __u6_addr16 = {61160, 14277, 32713, 0, 44564, 50803, 32764, 0}, __u6_addr32 = {935718632, 32713, 3329469972, 32764}}}, sin6_scope_id = 940355048}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\350\356\305\067\311\177\000\000\024\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\270\347\305\067\311\177\000\000\030\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\210\026v\020[U\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000", __ss_align = 140723637955568}}, id = -64824879, send_flags = {f = 32711, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937f6f130 ""
        new_uri = 0x7ffcc673ae18 ""
        end = 0x7fc937c5e7b0 "\001"
        crt = 0x7fc937c5e7b8 "\a"
        cmd = 0x7fc937c057e8
        len = 32711
        user = -178367519
        uri = {user = {s = 0x0, len = 1212490240}, passwd = {s = 0x555b107a9833 "INFO", len = 960495616}, host = {s = 0x7ffcc673a960 "\200\251s\306\374\177", len = -44162673}, port = {s = 0x7ffcc673a9bc "\001", len = 273118466}, params = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 0}, sip_params = {s = 0x7ffcc673aa40 "\360\252s\306\374\177", len = 275030558}, headers = {s = 0x555b10b141d4 <ut_buf_int2str+20> "5", len = 275031704}, port_no = 43392, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4250804744), transport = {s = 0x7ffcc673a9bc "\001", len = 0}, ttl = {s = 0x7ffcc673a9d0 "\200\252s\306\374\177", len = -44068401}, user_param = {s = 0x38 <error: Cannot access memory at address 0x38>, len = -965497384}, maddr = {s = 0x7fc937c5e7d8 "\001", len = 940355048}, method = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, lr = {s = 0x7fc937c488c8 "`\211\304\067\311\177", len = 280052180}, r2 = {s = 0x7ffcc673aa80 "\350\356\305\067\311\177", len = 274517235}, gr = {s = 0x0, len = -965497384}, transport_val = {s = 0x7fc937c5e7c0 "\017", len = 940355048}, ttl_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 934727696}, user_param_val = {s = 0x0, len = 276174472}, maddr_val = {s = 0x0, len = 1212490240}, method_val = {s = 0x555b107a9833 "INFO", len = 960495616}, lr_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 274387908}, r2_val = {s = 0x7fc7fc440d20 <rr_param_buf_ptr> ";did=86a.0462", len = 276174472}, gr_val = {s = 0x0, len = 1212490240}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffcc673a7b0 "", len = 276174472}, host = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, port = {s = 0x555b107a9833 "INFO", len = 276174472}, params = {s = 0x0, len = 1212490240}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, headers = {s = 0x7ffcc673a8e0 "", len = 275070078}, port_no = 43040, proto = 50803, type = 32764, flags = (unknown: 934727696), transport = {s = 0x7ffcc673a820 "", len = 934727696}, ttl = {s = 0x7ffcc673a860 "\220\250s\306\374\177", len = -57849891}, user_param = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, maddr = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 271259184}, method = {s = 0x402050 <error: Cannot access memory at address 0x402050>, len = 5564880}, lr = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, r2 = {s = 0x37 <error: Cannot access memory at address 0x37>, len = 0}, gr = {s = 0x7ffcc673a890 "\200\251s\306\374\177", len = 273118466}, transport_val = {s = 0x7ffcc673a94c "\001", len = 276598612}, ttl_val = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 0}, user_param_val = {s = 0x7ffcc673a980 "Щs\306\374\177", len = 275070078}, maddr_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, method_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, lr_val = {s = 0x7ffcc673a920 "\274\251s\306\374\177", len = -57849891}, r2_val = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, gr_val = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 276174472}}
        u = 0x7ffcc673ae30
        port = 0
        dst_host = 0x555b107a982c
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 3329468288, id = 32764, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x555b105cf57c <pv_value_destroy+175>}
        sct = 0x1c673ab90
        sjt = 0x0
        rve = 0x7fc937f16a20
        mct = 0x0
        rv = 0x10761688
        rv1 = 0x7fc937c6f610
        c1 = {cache_type = 3329468224, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, ri = -965497728, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = -107129541}
        srevp = {0x7fc937f17388, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673a6e0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#22 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937f0fca0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f17388
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935786000, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#23 0x0000555b103fa952 in do_action (h=0x7ffcc673b6d0, a=0x7fc937c6f610, msg=0x7fc9380cade8) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x555b10a44051 <buf+81>, to = {s = {sa_family = 4, sa_data = "\000\000\001\000\304\023\200\264s\306\374\177\000"}, sin = {sin_family = 4, sin_port = 0, sin_addr = {s_addr = 331612161}, sin_zero = "\200\264s\306\374\177\000"}, sin6 = {sin6_family = 4, sin6_port = 0, sin6_flowinfo = 331612161, sin6_addr = {__in6_u = {__u6_addr8 = "\200\264s\306\374\177\000\000\020Bi\020[U\000", __u6_addr16 = {46208, 50803, 32764, 0, 16912, 4201, 21851, 0}, __u6_addr32 = {3329471616, 32764, 275333648, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 4, __ss_padding = "\000\000\001\000\304\023\200\264s\306\374\177\000\000\020Bi\020[U\000\000\000\000\000\000\000\000\000\000Hc\371\067\311\177\000\000UD\244\020[U\000\000\065@\244\020[U\000\000 \263s\306\374\177\000\000\020ж7\311\177\000\000`\263s\306\374\177\000\000\335G\215\374\307\177\000\000\360\360\360\360", '\000' <repeats 14 times>, "\200\020\000\000\000\000\000D+\020\000\000\000", __ss_align = 4195424}}, id = 5553152, send_flags = {f = 0, blst_imask = 0}, proto = -64 '\300', proto_pad0 = 119 'w', proto_pad1 = 1285}
        tmp = 0x7fc804900c10 ""
        new_uri = 0x7fc937f73b98 "\001"
        end = 0x555b106d42fd <parse_method_name+2024> "\205\300\017\224\300\017\266\300H\205\300t\027H\213\205p\377\377\377", <incomplete sequence \307>
        crt = 0x1c673b510 <error: Cannot access memory at address 0x1c673b510>
        cmd = 0x7fc937c137c0
        len = 0
        user = 938949488
        uri = {user = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -965496436}, passwd = {s = 0x4c673b1a0 <error: Cannot access memory at address 0x4c673b1a0>, len = 276653360}, host = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, port = {s = 0x7ffcc673b190 "\300\262s\306\374\177", len = 274214092}, params = {s = 0x4004004a0 <error: Cannot access memory at address 0x4004004a0>, len = 276653360}, sip_params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, headers = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275281682}, port_no = 45520, proto = 50803, type = 32764, flags = (URI_SIP_USER_PHONE | unknown: 273118464), transport = {s = 0x0, len = 276598612}, ttl = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275030558}, user_param = {s = 0x7fc937f96348 "\001", len = 939089824}, maddr = {s = 0x7ffcc673b342 "\005\005", len = -965495997}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x555b107d6d88 <__func__.6797> "parse_via", len = 276659112}, r2 = {s = 0x1c673b250 <error: Cannot access memory at address 0x1c673b250>, len = 76549136}, gr = {s = 0x7ffcc673b250 "\220\262s\306\374\177", len = -178372384}, transport_val = {s = 0x555b107d6534 "", len = 76549136}, ttl_val = {s = 0x555b10761688 "", len = 276174472}, user_param_val = {s = 0x7ffcc673b290 "\300\262s\306\004", len = -178335373}, maddr_val = {s = 0x0, len = -965496132}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}, lr_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = -965496004}, r2_val = {s = 0x4c673b2c0 <error: Cannot access memory at address 0x4c673b2c0>, len = 279199821}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 279199825}}
        next_hop = {user = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1}, passwd = {s = 0x7fc937f73c90 "\003", len = 0}, host = {s = 0x7fc937f96168 "\001", len = 938950232}, port = {s = 0x7a <error: Cannot access memory at address 0x7a>, len = 939090280}, params = {s = 0x0, len = 939090928}, sip_params = {s = 0x7fc937f96348 "\001", len = 938950232}, headers = {s = 0x7fc937f96048 "\004", len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x1c673b120 <error: Cannot access memory at address 0x1c673b120>, len = 76549136}, method_val = {s = 0x7ffcc673b120 "`\261s\306\374\177", len = -178372384}, lr_val = {s = 0x555b107d6534 "", len = 76549136}, r2_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 16}, gr_val = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -178335373}}
        u = 0x555b107df530 <__func__.6625>
        port = 0
        dst_host = 0x555b10761688
        i = 29
        flags = 21851
        avp = 0x1
        st = {flags = 65537, id = 48, name = {n = 279199744, s = {s = 0x555b10a44000 <buf> "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"..., len = 6}, re = 0x555b10a44000 <buf>}, avp = 0x555b10a44007 <buf+7>}
        sct = 0x7ffcc673b480
        sjt = 0x7fc804900c10
        rve = 0x7fc937c5f610
        mct = 0x1
        rv = 0x0
        rv1 = 0x555b10a4411f <buf+287>
        c1 = {cache_type = 276174472, val_type = 21851, c = {avp_val = {n = 0, s = {s = 0x0, len = 276824064}, re = 0x0}, pval = {rs = {s = 0x0, len = 276824064}, ri = 271261272, flags = 0}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x7ffcc673af90 "\006", len = -57849891}
        srevp = {0x7fc937c6f610, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673af20, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#24 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c473c0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c6f610
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 276690800, tz_dsttime = 21851}
        tdiff = 4116631923
        __func__ = "run_actions"
#25 0x0000555b1040cbbe in run_top_route (a=0x7fc937c473c0, msg=0x7fc9380cade8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {93849603950067, 4571428513, 140502205509096, 93849606559368, 4571141768, 140723637958544, 140496791851379, 140723637958560, 140723637958588, 18118819416, 93849606846109, 8004010816636452865, 0, 140723637958592, 93849606559368, 0}}}}}
        p = 0x7ffcc673b6d0
        ret = 276469811
        sfbk = 0
#26 0x0000555b1057b6e8 in receive_msg (buf=0x555b10a44000 <buf> "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"..., len=1109, rcv_info=0x7ffcc673bd40) at core/receive.c:423
        msg = 0x7fc9380cade8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 15 times>, 1}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x555b10a44000 <buf> "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"..., len = 1109}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcc673b8b0, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcc673bd40, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#27 0x0000555b10447d59 in udp_rcv_loop () at core/udp_server.c:543
        len = 1109
        buf = "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"...
        tmp = 0x2e <error: Cannot access memory at address 0x2e>
        fromaddr = 0x7fc93807e930
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {201527724, 0}, addr32 = {201527724, 0, 0, 0}, addr16 = {4524, 3075, 0, 0, 0, 0, 0, 0}, addr = "\254\021\003\f", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {235278508, 0}, addr32 = {235278508, 0, 0, 0}, addr16 = {4268, 3590, 0, 0, 0, 0, 0, 0}, addr = "\254\020\006\016", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023Ĭ\021\003\f\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 201527724}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 201527724, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023Ĭ\021\003\f", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fc937c01000, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "\264 \221\004\310\177\000\000\264 \221\004\001\000\000\000P\273s\306\374\177\000\000s\321^\365\307\177\000\000P\273s\306\374\177\000\000\220\267\331\020[U\000\000@\263\331\020[U\000\000\247\261s\306\374\177\000\000\220\261s\306\374\177\000\000\000\000\000\000\000\000\000\001", '\000' <repeats 20 times>, "\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000\000\264 \221\004\310\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000@\274s\306\374\177\000\000\005\067\346\356\307\177\000\000\177\252y\020[U\000\000\020\f\220\004\033\000\000\000\264 \221\004\310\177\000\000"...
        i = -1
        j = 130560
        l = 0
        __func__ = "udp_rcv_loop"
#28 0x0000555b1038de84 in main_loop () at main.c:1683
        i = 10
        pid = 0
        si = 0x7fc937c01000
        si_desc = "udp receiver child=10 sock=102.6.6.14:5060\000er.local:5060\000EH\311\177\000\000\000\000\000\000\000\000\000\000\060\000\000\000\060\000\000\000\070\300s\306\374\177\000\000P\277s\306\374\177\000\000\250Nx\020[U\000\000\370\226\r8k\000\000\000\063\230z\020[U\000\000\360\226\n8\311\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#29 0x0000555b10398511 in main (argc=11, argv=0x7ffcc673c568) at main.c:2856
        cfg_stream = 0x555b10bef010
        c = -1
        r = 0
        tmp = 0x7ffcc673deba ""
        tmp_len = 32764
        port = -965491792
        proto = 32713
        ahost = 0x0
        aport = 0
        options = 0x555b10764348 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 900928915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7fc94926d040 <_rtld_global>
        p = 0x7ffcc673de72 "trunks"
        st = {st_dev = 19, st_ino = 23307, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1641492636, tv_nsec = 884483965}, st_mtim = {tv_sec = 1599774907, tv_nsec = 42281020}, st_ctim = {tv_sec = 1599774907, tv_nsec = 42281020}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000 \232\004I\311\177\000\000\330\331&I\311\177\000\000\a\000\000\000\000\000\000\000\a\000\000\000\a\000\000\000\070\224\004I\311\177\000\000\060\302s\306\374\177\000\000\215F\005I\311\177\000\000\000\000\000\000\000\000\000\000\272J\005I\311\177", '\000' <repeats 11 times>, "\200\065\020[U", '\000' <repeats 13 times>, "\377\000\000\000\000", '\377' <repeats 11 times>, "\000\377\377\377\377GLIBC_2.2.5\000GLIB\000__f", '\000' <repeats 12 times>, "inite\000getpriorit", '\000' <repeats 136 times>...
        option_index = 0
        long_options = {{name = 0x555b107663d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x555b10761b1c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x555b107663db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x555b107663e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x555b107663e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x555b107663f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x555b107663fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x555b10766404 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x555b1076640f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x555b10766418 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x555b10766423 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007fc7f9e53741 in futex_get (lock=0x7fc7fe0c8a20) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007fc7f9e55819 in bcast_dmq_message1 (peer=0x7fc7fe1ebfb0, body=0x7ffcc6738ca0, except=0x0, resp_cback=0x7fc7f9bf2790 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9bf2750 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:156
        node = 0x7fc804900d30
        __func__ = "bcast_dmq_message1"
#3  0x00007fc7f9e56072 in bcast_dmq_message (peer=0x7fc7fe1ebfb0, body=0x7ffcc6738ca0, except=0x0, resp_cback=0x7fc7f9bf2790 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9bf2750 <dlg_dmq_content_type>) at dmq_funcs.c:188
No locals.
#4  0x00007fc7f999101a in dlg_dmq_send (body=0x7ffcc6738ca0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007fc7f999a7e4 in dlg_dmq_replicate_action (action=DLG_DMQ_UPDATE, dlg=0x7fc7fe7131f0, needlock=1, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x555b10d79c40, flags = 0, buf = {s = 0x555b10db4e20 "{\"action\":1,\"h_entry\":2664,\"h_id\":9792,\"init_ts\":1652854905,\"callid\":\"1460007659_57432438 at 102.7.3.12\",\"from_uri\":\"sip:03312586972 at 102.7.3.12;pstn-params=808482808883\",\"to_uri\":\"sip:0915061111 at 172.16"..., len = 1681}, malloc_fn = 0x7fc9483e8f10 <__GI___libc_malloc>, free_fn = 0x7fc9483e9510 <__GI___libc_free>}
        prof_jdoc = {root = 0x0, flags = 0, buf = {s = 0x0, len = 0}, malloc_fn = 0x0, free_fn = 0x0}
        var = 0x0
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007fc7f99696f7 in dlg_on_send (t=0x7fc80e363eb8, type=16, param=0x7ffcc6738f20) at dlg_handlers.c:760
        dlg = 0x7fc7fe7131f0
        iuid = 0x7fc80df503c0
        __func__ = "dlg_on_send"
#7  0x00007fc7fdb59d98 in run_trans_callbacks_internal (cb_lst=0x7fc80e363f30, type=16, trans=0x7fc80e363eb8, params=0x7ffcc6738f20) at t_hooks.c:258
        cbp = 0x7fc805b38488
        backup_from = 0x7fc80e3640c8
        backup_to = 0x7fc80e3640d0
        backup_dom_from = 0x555b10ab07c0 <def_list+32>
        backup_dom_to = 0x555b10ab07c8 <def_list+40>
        backup_uri_from = 0x7fc80e3640b8
        backup_uri_to = 0x7fc80e3640c0
        backup_xavps = 0x7fc80e3640e8
        backup_xavus = 0x7fc80e3640f0
        backup_xavis = 0x7fc80e3640f8
        __func__ = "run_trans_callbacks_internal"
#8  0x00007fc7fdb59ec8 in run_trans_callbacks (type=16, trans=0x7fc80e363eb8, req=0x7fc9380cade8, rpl=0x0, code=-1) at t_hooks.c:285
        params = {req = 0x7fc9380cade8, rpl = 0x0, param = 0x7fc805b38498, code = -1, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#9  0x00007fc7fdb6accf in prepare_new_uac (t=0x7fc80e363eb8, i_req=0x7fc9380cade8, branch=0, uri=0x7ffcc6739120, path=0x7ffcc6739100, next_hop=0x7ffcc6739110, fsocket=0x7fc937bfff30, snd_flags=..., fproto=0, flags=0, instance=0x7ffcc67390f0, ruid=0x7ffcc67390e0, location_ua=0x7ffcc67390d0) at t_fwd.c:388
        shbuf = 0x0
        add_rm_backup = 0x7fc937f71ab8
        body_lumps_backup = 0x7fc937f81470
        parsed_uri_bak = {user = {s = 0x7fc937f80f6c "411078033 at siptrunks.company.com", len = 9}, passwd = {s = 0x0, len = 0}, host = {s = 0x7fc937f80f76 "siptrunks.company.com", len = 21}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        ret = -1
        len = 32711
        parsed_uri_ok_bak = 1
        free_new_uri = 1
        msg_uri_bak = {s = 0x7fc937f80f68 "sip:411078033 at siptrunks.company.com", len = 35}
        dst_uri_bak = {s = 0x7fc937f72ac8 "sip:internal.hipertel.local", len = 28}
        dst_uri_backed_up = 1
        path_bak = {s = 0x0, len = 0}
        free_path = 1
        instance_bak = {s = 0x0, len = 0}
        free_instance = 1
        ruid_bak = {s = 0x0, len = 0}
        free_ruid = 1
        ua_bak = {s = 0x0, len = 0}
        free_ua = 1
        backup_route_type = 940355048
        test_dst = 32764
        fwd_snd_flags_bak = {f = 32712, blst_imask = 0}
        rpl_snd_flags_bak = {f = 3088, blst_imask = 1168}
        force_send_socket_bak = 0x7ffcc6739488
        dst = 0x7fc80e3641a8
        ctx = {rec_lev = -38153952, run_flags = 32711, last_retcode = 275030754, jmp_env = {{__jmpbuf = {140496932033080, 140497065837704, 140497204347696, 140497208622896, 72907341584, 140497204347696, 1, 140497046735888}, __mask_was_saved = -965504896, __saved_mask = {__val = {276598617, 140723637948904, 140723637948880, 3474017167730815278, 3328783759099507253, 3833180307342636849, 3767094209391113776, 1, 140497046735888, 141176534806585, 936, 7624429792, 140497046735888, 140723637948640, 140496791814368, 93849607136987}}}}}
        bctx = 0x7ffcc6739478
        keng = 0x7ffcc6739480
        __func__ = "prepare_new_uac"
#10 0x00007fc7fdb6ffe8 in add_uac (t=0x7fc80e363eb8, request=0x7fc9380cade8, uri=0x7fc9380cb0c8, next_hop=0x7fc9380cb0d8, path=0x7fc9380cb490, proxy=0x0, fsocket=0x7fc937bfff30, snd_flags=..., proto=0, flags=0, instance=0x7fc9380cb4a0, ruid=0x7fc9380cb4b8, location_ua=0x7fc9380cb4c8) at t_fwd.c:814
        ret = 100
        branch = 0
        __func__ = "add_uac"
#11 0x00007fc7fdb79725 in t_forward_nonack (t=0x7fc80e363eb8, p_msg=0x7fc9380cade8, proxy=0x0, proto=0) at t_fwd.c:1694
        branch_ret = 0
        lowest_ret = -1
        added_branches = 0
        first_branch = 0
        i = 32764
        t_invite = 0x7fc937fa1658
        success_branch = -965503440
        try_new = 1
        lock_replies = 0
        backup_bflags = 0
        obranch = {uri = {s = 0x13200000000 <error: Cannot access memory at address 0x13200000000>, len = 276174472}, dst_uri = {s = 0x0, len = 1212490240}, q = 276469811, path = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965503504}, flags = 4256017125, force_socket = 0x1, ruid = {s = 0x7ffcc67395c0 "", len = -965503456}, instance = {s = 0x6400000001 <error: Cannot access memory at address 0x6400000001>, len = 940355048}, location_ua = {s = 0x7fc80e363eb8 "H\323\376\375\307\177", len = 276174472}, otcpid = 276174472}
        __func__ = "t_forward_nonack"
#12 0x00007fc7fdb511f1 in t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, proto=0, replicate=0) at t_funcs.c:335
        ret = 0
        new_tran = 1
        t = 0x7fc80e363eb8
        dst = {send_sock = 0x7fc937c05468, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\220\230s\306\374\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\220\230s\306\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\230s\306\374\177\000\000\341S^\365\307\177\000", __u6_addr16 = {39056, 50803, 32764, 0, 21473, 62814, 32711, 0}, __u6_addr32 = {3329464464, 32764, 4116599777, 32711}}}, sin6_scope_id = 3329464080}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\220\230s\306\374\177\000\000\341S^\365\307\177\000\000\020\227s\306\374\177\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000P\227s\306\374\177\000\000@\231s\306\374\177\000\000Зs\306\374\177", '\000' <repeats 18 times>, "\350\255\f8\311\177\000", __ss_align = 140723637952000}}, id = 272622770, send_flags = {f = 21851, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -105 '\227', proto_pad1 = -14733}
        port = 0
        host = {s = 0x7fc7fe1e0c48 "\360\061q\376\307\177", len = -178324551}
        comp = 1
        __func__ = "t_relay_to"
#13 0x00007fc7fdb054da in _w_t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, force_proto=0) at tm.c:1752
        t = 0x7fc9380cade8
        res = 32764
        __func__ = "_w_t_relay_to"
#14 0x00007fc7fdb06825 in w_t_relay (p_msg=0x7fc9380cade8, _foo=0x0, _bar=0x0) at tm.c:1952
No locals.
#15 0x0000555b103fe4b2 in do_action (h=0x7ffcc673a130, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1076
        ret = -5
        v = 0
        dst = {send_sock = 0x7fc937deac70, to = {s = {sa_family = 44520, sa_data = "\f8\311\177\000\000\253'\021\375\307\177\000"}, sin = {sin_family = 44520, sin_port = 14348, sin_addr = {s_addr = 32713}, sin_zero = "\253'\021\375\307\177\000"}, sin6 = {sin6_family = 44520, sin6_port = 14348, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "\253'\021\375\307\177\000\000\320\n\220\004\310\177\000", __u6_addr16 = {10155, 64785, 32711, 0, 2768, 1168, 32712, 0}, __u6_addr32 = {4245759915, 32711, 76548816, 32712}}}, sin6_scope_id = 938562624}, sas = {ss_family = 44520, __ss_padding = "\f8\311\177\000\000\253'\021\375\307\177\000\000\320\n\220\004\310\177\000\000 at T\361\067\311\177\000\000\310R\361\067\311\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\200\235s\306\374\177\000\000\020\307\177\365\307\177\000\000\350\255\f8\311\177\000\000\030^\361\067\311\177", '\000' <repeats 33 times>, __ss_align = 0}}, id = 1212490240, send_flags = {f = 32713, blst_imask = 0}, proto = 51 '3', proto_pad0 = -104 '\230', proto_pad1 = 4218}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7fc937c05468
        len = 0
        user = 0
        uri = {user = {s = 0x555b10d24db0 "UTC", len = 938506384}, passwd = {s = 0x7fc937deace8 "H\f\361\067\311\177", len = -49207158}, host = {s = 0x7fc937f15b70 "Trying", len = 6}, port = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, params = {s = 0x41 <error: Cannot access memory at address 0x41>, len = 276174472}, sip_params = {s = 0x7fc937f5ace0 "!", len = 938565144}, headers = {s = 0x555b107a9833 "INFO", len = 960495616}, port_no = 40368, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4116599776), transport = {s = 0x7fc937f15448 "\002", len = 938562248}, ttl = {s = 0x7fc9380cade8 "\363\346\001", len = 276174472}, user_param = {s = 0x0, len = 1212490240}, maddr = {s = 0x555b107a9833 "INFO", len = 960495616}, method = {s = 0x7ffcc6739de0 "\220\244s\306\374\177", len = 272680009}, lr = {s = 0x7ffcc6739ca0 "Мs\306\374\177", len = -178335373}, r2 = {s = 0x7ffcc6739ca0 "Мs\306\374\177", len = 938562632}, gr = {s = 0x7fc937f15b70 "Trying", len = 940355048}, transport_val = {s = 0x7fc937f4fb80 "\024\b", len = -965495088}, ttl_val = {s = 0x7ffcc6739cd0 "A", len = 274214092}, user_param_val = {s = 0x4c6739d68 <error: Cannot access memory at address 0x4c6739d68>, len = 0}, maddr_val = {s = 0x7fc937f15180 "\017", len = 0}, method_val = {s = 0x41 <error: Cannot access memory at address 0x41>, len = 276174472}, lr_val = {s = 0x0, len = 1212490240}, r2_val = {s = 0x555b107a9833 "INFO", len = 960495616}, gr_val = {s = 0x7ffcc6739de0 "\220\244s\306\374\177", len = 272754088}}
        next_hop = {user = {s = 0x7fc9484cfa0b "%H:%M:%S", len = 24}, passwd = {s = 0x7ffcc6739af0 "3\230z\020[U", len = 282804960}, host = {s = 0x555b10db42d0 "", len = 1215316096}, port = {s = 0x7fc948707b00 <main_arena> "", len = 8208}, params = {s = 0x8c <error: Cannot access memory at address 0x8c>, len = 1212061465}, sip_params = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1212034094}, headers = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 282593440}, port_no = 39696, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4250416580), transport = {s = 0x555b00000001 <error: Cannot access memory at address 0x555b00000001>, len = 282593440}, ttl = {s = 0x7ffcc6739bb0 "p[\361\067\311\177", len = 938544024}, user_param = {s = 0x555b10d808a0 "1460007659_57432438 at 102.7.3.12", len = 1}, maddr = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 11}, method = {s = 0x555b10d808a0 "1460007659_57432438 at 102.7.3.12", len = -965501976}, lr = {s = 0x15 <error: Cannot access memory at address 0x15>, len = 1212489561}, r2 = {s = 0x555b107a9833 "INFO", len = -49206466}, gr = {s = 0x7ffcc6739c70 "\240\234s\306\374\177", len = 276174472}, transport_val = {s = 0x0, len = 1212490240}, ttl_val = {s = 0x555b107a9833 "INFO", len = 960495616}, user_param_val = {s = 0x7fc937c21468 "\017\261s\364\307\177", len = -44059272}, maddr_val = {s = 0x7fc9380cade8 "\363\346\001", len = 276174472}, method_val = {s = 0x7ffcc6739c80 "p[\361\067\311\177", len = 1212490240}, lr_val = {s = 0x7fc937f15198 "\001", len = 940355048}, r2_val = {s = 0x7a00000004 <error: Cannot access memory at address 0x7a00000004>, len = 3}, gr_val = {s = 0x0, len = 0}}
        u = 0x0
        port = 0
        dst_host = 0x7fc804900c10
        i = 934727696
        flags = 32713
        avp = 0x7ffcc6739f40
        st = {flags = 282813152, id = 21851, name = {n = 1215331072, s = {s = 0x7fc948707b00 <main_arena> "", len = 0}, re = 0x7fc948707b00 <main_arena>}, avp = 0xa0}
        sct = 0x555b107a9833
        sjt = 0x555b103fa952 <do_action+20285>
        rve = 0x7ffcc6739f40
        mct = 0x7ffcc673a490
        rv = 0x555b10db42d0
        rv1 = 0x7fc937b6d010
        c1 = {cache_type = 1215326240, val_type = 32713, c = {avp_val = {n = 8, s = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, re = 0x8}, pval = {rs = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, ri = 1212272350, flags = 32713}}, i2s = "\000\000\000\066\067\061\063\063\373\037", '\000' <repeats 11 times>}
        s = {s = 0x555b10db42ec "[U", len = 1213011858}
        srevp = {0x7fc937f161a0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739980, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#16 0x0000555b1040c449 in run_actions (h=0x7ffcc673a130, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f161a0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 939135680, tz_dsttime = 32713}
        tdiff = 940026468
        __func__ = "run_actions"
#17 0x0000555b1040caf6 in run_actions_safe (h=0x7ffcc673b6d0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {93849606559368, 8478727959525565030, 0, 140502477644288, 93849606854707, 5255462912, 8478727960146322022, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {140723637953640, 0, 0, 140723637953008, 93849606559368, 0, 140502477644288, 93849606854707, 5255462912, 140723637953344, 93849602810890, 93849606559368, 4571141768, 140723637953072, 140496791851379, 140502203710192}}}}}
        ret = -965499800
        ign_on_break = 0
#18 0x0000555b103c9569 in rval_get_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, i=0x7ffcc673a5d8, rv=0x7fc937f162f8, cache=0x0) at core/rvalue.c:915
        r_avp = 0x7ffcc673b6d0
        avp_val = {n = 1, s = {s = 0x7ffc00000001 <error: Cannot access memory at address 0x7ffc00000001>, len = 274772759}, re = 0x7ffc00000001}
        pval = {rs = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -965499436}, ri = 0, flags = 0}
        tmp = {s = 0x7ffcc673a380 "\350\255\f8\311\177", len = -965499840}
        s = 0x0
        r = 32713
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#19 0x0000555b103ce40a in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc673a5d8, rve=0x7fc937f162f0) at core/rvalue.c:1913
        i1 = 276174472
        i2 = 1
        ret = -1
        c1 = {cache_type = 940355048, val_type = 32713, c = {avp_val = {n = 938570632, s = {s = 0x7fc937f17388 "\232\a", len = 935352296}, re = 0x7fc937f17388}, pval = {rs = {s = 0x7fc937f17388 "\232\a", len = 935352296}, ri = 34, flags = 14}}, i2s = "\360\245s\306\374\177\000\000\341S^\365\307\177\000\000\000\000\000\000\000"}
        c2 = {cache_type = 276469811, val_type = 21851, c = {avp_val = {n = -965499840, s = {s = 0x7ffcc673a440 "\360\245s\306\374\177", len = -965499776}, re = 0x7ffcc673a440}, pval = {rs = {s = 0x7ffcc673a440 "\360\245s\306\374\177", len = -965499776}, ri = 272425709, flags = 21851}}, i2s = "=\006\001", '\000' <repeats 13 times>, "h\000\361\067\311\177"}
        rv1 = 0x555b105cf57c <pv_value_destroy+175>
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#20 0x0000555b103ce84f in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc673ab0c, rve=0x7fc937f16a20) at core/rvalue.c:1921
        i1 = 1212490240
        i2 = 0
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = -176175080, s = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, re = 0x7fc7f57fc818 <_dbg_action_list+344>}, pval = {rs = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, ri = 938570632, flags = 32713}}, i2s = "\340\246s\306\374\177", '\000' <repeats 15 times>}
        c2 = {cache_type = 938537056, val_type = 32713, c = {avp_val = {n = 940355048, s = {s = 0x7fc9380cade8 "\363\346\001", len = -49207381}, re = 0x7fc9380cade8}, pval = {rs = {s = 0x7fc9380cade8 "\363\346\001", len = -49207381}, ri = 76548816, flags = 32712}}, i2s = " X\363\067\311\177\000\000\250V\363\067\311\177\000\000\350\255\f8\311\177"}
        rv1 = 0x555b1041e5a8 <lval_assign+3169>
        rv2 = 0x7ffcc673a620
        __func__ = "rval_expr_eval_int"
#21 0x0000555b103fdf6e in do_action (h=0x7ffcc673b6d0, a=0x7fc937f17388, msg=0x7fc9380cade8) at core/action.c:1052
        ret = -5
        v = 1
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\350\356\305\067\311\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\350\356\305\067\311\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\350\356\305\067\311\177\000\000\024\256s\306\374\177\000", __u6_addr16 = {61160, 14277, 32713, 0, 44564, 50803, 32764, 0}, __u6_addr32 = {935718632, 32713, 3329469972, 32764}}}, sin6_scope_id = 940355048}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\350\356\305\067\311\177\000\000\024\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\270\347\305\067\311\177\000\000\030\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\210\026v\020[U\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000", __ss_align = 140723637955568}}, id = -64824879, send_flags = {f = 32711, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937f6f130 ""
        new_uri = 0x7ffcc673ae18 ""
        end = 0x7fc937c5e7b0 "\001"
        crt = 0x7fc937c5e7b8 "\a"
        cmd = 0x7fc937c057e8
        len = 32711
        user = -178367519
        uri = {user = {s = 0x0, len = 1212490240}, passwd = {s = 0x555b107a9833 "INFO", len = 960495616}, host = {s = 0x7ffcc673a960 "\200\251s\306\374\177", len = -44162673}, port = {s = 0x7ffcc673a9bc "\001", len = 273118466}, params = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 0}, sip_params = {s = 0x7ffcc673aa40 "\360\252s\306\374\177", len = 275030558}, headers = {s = 0x555b10b141d4 <ut_buf_int2str+20> "5", len = 275031704}, port_no = 43392, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4250804744), transport = {s = 0x7ffcc673a9bc "\001", len = 0}, ttl = {s = 0x7ffcc673a9d0 "\200\252s\306\374\177", len = -44068401}, user_param = {s = 0x38 <error: Cannot access memory at address 0x38>, len = -965497384}, maddr = {s = 0x7fc937c5e7d8 "\001", len = 940355048}, method = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, lr = {s = 0x7fc937c488c8 "`\211\304\067\311\177", len = 280052180}, r2 = {s = 0x7ffcc673aa80 "\350\356\305\067\311\177", len = 274517235}, gr = {s = 0x0, len = -965497384}, transport_val = {s = 0x7fc937c5e7c0 "\017", len = 940355048}, ttl_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 934727696}, user_param_val = {s = 0x0, len = 276174472}, maddr_val = {s = 0x0, len = 1212490240}, method_val = {s = 0x555b107a9833 "INFO", len = 960495616}, lr_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 274387908}, r2_val = {s = 0x7fc7fc440d20 <rr_param_buf_ptr> ";did=86a.0462", len = 276174472}, gr_val = {s = 0x0, len = 1212490240}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffcc673a7b0 "", len = 276174472}, host = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, port = {s = 0x555b107a9833 "INFO", len = 276174472}, params = {s = 0x0, len = 1212490240}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, headers = {s = 0x7ffcc673a8e0 "", len = 275070078}, port_no = 43040, proto = 50803, type = 32764, flags = (unknown: 934727696), transport = {s = 0x7ffcc673a820 "", len = 934727696}, ttl = {s = 0x7ffcc673a860 "\220\250s\306\374\177", len = -57849891}, user_param = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, maddr = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 271259184}, method = {s = 0x402050 <error: Cannot access memory at address 0x402050>, len = 5564880}, lr = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, r2 = {s = 0x37 <error: Cannot access memory at address 0x37>, len = 0}, gr = {s = 0x7ffcc673a890 "\200\251s\306\374\177", len = 273118466}, transport_val = {s = 0x7ffcc673a94c "\001", len = 276598612}, ttl_val = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 0}, user_param_val = {s = 0x7ffcc673a980 "Щs\306\374\177", len = 275070078}, maddr_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, method_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, lr_val = {s = 0x7ffcc673a920 "\274\251s\306\374\177", len = -57849891}, r2_val = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, gr_val = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 276174472}}
        u = 0x7ffcc673ae30
        port = 0
        dst_host = 0x555b107a982c
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 3329468288, id = 32764, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x555b105cf57c <pv_value_destroy+175>}
        sct = 0x1c673ab90
        sjt = 0x0
        rve = 0x7fc937f16a20
        mct = 0x0
        rv = 0x10761688
        rv1 = 0x7fc937c6f610
        c1 = {cache_type = 3329468224, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, ri = -965497728, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = -107129541}
        srevp = {0x7fc937f17388, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673a6e0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#22 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937f0fca0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f17388
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935786000, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#23 0x0000555b103fa952 in do_action (h=0x7ffcc673b6d0, a=0x7fc937c6f610, msg=0x7fc9380cade8) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x555b10a44051 <buf+81>, to = {s = {sa_family = 4, sa_data = "\000\000\001\000\304\023\200\264s\306\374\177\000"}, sin = {sin_family = 4, sin_port = 0, sin_addr = {s_addr = 331612161}, sin_zero = "\200\264s\306\374\177\000"}, sin6 = {sin6_family = 4, sin6_port = 0, sin6_flowinfo = 331612161, sin6_addr = {__in6_u = {__u6_addr8 = "\200\264s\306\374\177\000\000\020Bi\020[U\000", __u6_addr16 = {46208, 50803, 32764, 0, 16912, 4201, 21851, 0}, __u6_addr32 = {3329471616, 32764, 275333648, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 4, __ss_padding = "\000\000\001\000\304\023\200\264s\306\374\177\000\000\020Bi\020[U\000\000\000\000\000\000\000\000\000\000Hc\371\067\311\177\000\000UD\244\020[U\000\000\065@\244\020[U\000\000 \263s\306\374\177\000\000\020ж7\311\177\000\000`\263s\306\374\177\000\000\335G\215\374\307\177\000\000\360\360\360\360", '\000' <repeats 14 times>, "\200\020\000\000\000\000\000D+\020\000\000\000", __ss_align = 4195424}}, id = 5553152, send_flags = {f = 0, blst_imask = 0}, proto = -64 '\300', proto_pad0 = 119 'w', proto_pad1 = 1285}
        tmp = 0x7fc804900c10 ""
        new_uri = 0x7fc937f73b98 "\001"
        end = 0x555b106d42fd <parse_method_name+2024> "\205\300\017\224\300\017\266\300H\205\300t\027H\213\205p\377\377\377", <incomplete sequence \307>
        crt = 0x1c673b510 <error: Cannot access memory at address 0x1c673b510>
        cmd = 0x7fc937c137c0
        len = 0
        user = 938949488
        uri = {user = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -965496436}, passwd = {s = 0x4c673b1a0 <error: Cannot access memory at address 0x4c673b1a0>, len = 276653360}, host = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, port = {s = 0x7ffcc673b190 "\300\262s\306\374\177", len = 274214092}, params = {s = 0x4004004a0 <error: Cannot access memory at address 0x4004004a0>, len = 276653360}, sip_params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, headers = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275281682}, port_no = 45520, proto = 50803, type = 32764, flags = (URI_SIP_USER_PHONE | unknown: 273118464), transport = {s = 0x0, len = 276598612}, ttl = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275030558}, user_param = {s = 0x7fc937f96348 "\001", len = 939089824}, maddr = {s = 0x7ffcc673b342 "\005\005", len = -965495997}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x555b107d6d88 <__func__.6797> "parse_via", len = 276659112}, r2 = {s = 0x1c673b250 <error: Cannot access memory at address 0x1c673b250>, len = 76549136}, gr = {s = 0x7ffcc673b250 "\220\262s\306\374\177", len = -178372384}, transport_val = {s = 0x555b107d6534 "", len = 76549136}, ttl_val = {s = 0x555b10761688 "", len = 276174472}, user_param_val = {s = 0x7ffcc673b290 "\300\262s\306\004", len = -178335373}, maddr_val = {s = 0x0, len = -965496132}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}, lr_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = -965496004}, r2_val = {s = 0x4c673b2c0 <error: Cannot access memory at address 0x4c673b2c0>, len = 279199821}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 279199825}}
        next_hop = {user = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1}, passwd = {s = 0x7fc937f73c90 "\003", len = 0}, host = {s = 0x7fc937f96168 "\001", len = 938950232}, port = {s = 0x7a <error: Cannot access memory at address 0x7a>, len = 939090280}, params = {s = 0x0, len = 939090928}, sip_params = {s = 0x7fc937f96348 "\001", len = 938950232}, headers = {s = 0x7fc937f96048 "\004", len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x1c673b120 <error: Cannot access memory at address 0x1c673b120>, len = 76549136}, method_val = {s = 0x7ffcc673b120 "`\261s\306\374\177", len = -178372384}, lr_val = {s = 0x555b107d6534 "", len = 76549136}, r2_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 16}, gr_val = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -178335373}}
        u = 0x555b107df530 <__func__.6625>
        port = 0
        dst_host = 0x555b10761688
        i = 29
        flags = 21851
        avp = 0x1
        st = {flags = 65537, id = 48, name = {n = 279199744, s = {s = 0x555b10a44000 <buf> "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"..., len = 6}, re = 0x555b10a44000 <buf>}, avp = 0x555b10a44007 <buf+7>}
        sct = 0x7ffcc673b480
        sjt = 0x7fc804900c10
        rve = 0x7fc937c5f610
        mct = 0x1
        rv = 0x0
        rv1 = 0x555b10a4411f <buf+287>
        c1 = {cache_type = 276174472, val_type = 21851, c = {avp_val = {n = 0, s = {s = 0x0, len = 276824064}, re = 0x0}, pval = {rs = {s = 0x0, len = 276824064}, ri = 271261272, flags = 0}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x7ffcc673af90 "\006", len = -57849891}
        srevp = {0x7fc937c6f610, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673af20, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#24 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c473c0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c6f610
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 276690800, tz_dsttime = 21851}
        tdiff = 4116631923
        __func__ = "run_actions"
#25 0x0000555b1040cbbe in run_top_route (a=0x7fc937c473c0, msg=0x7fc9380cade8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {93849603950067, 4571428513, 140502205509096, 93849606559368, 4571141768, 140723637958544, 140496791851379, 140723637958560, 140723637958588, 18118819416, 93849606846109, 8004010816636452865, 0, 140723637958592, 93849606559368, 0}}}}}
        p = 0x7ffcc673b6d0
        ret = 276469811
        sfbk = 0
#26 0x0000555b1057b6e8 in receive_msg (buf=0x555b10a44000 <buf> "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"..., len=1109, rcv_info=0x7ffcc673bd40) at core/receive.c:423
        msg = 0x7fc9380cade8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 15 times>, 1}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x555b10a44000 <buf> "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"..., len = 1109}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcc673b8b0, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcc673bd40, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#27 0x0000555b10447d59 in udp_rcv_loop () at core/udp_server.c:543
        len = 1109
        buf = "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"...
        tmp = 0x2e <error: Cannot access memory at address 0x2e>
        fromaddr = 0x7fc93807e930
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {201527724, 0}, addr32 = {201527724, 0, 0, 0}, addr16 = {4524, 3075, 0, 0, 0, 0, 0, 0}, addr = "\254\021\003\f", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {235278508, 0}, addr32 = {235278508, 0, 0, 0}, addr16 = {4268, 3590, 0, 0, 0, 0, 0, 0}, addr = "\254\020\006\016", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023Ĭ\021\003\f\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 201527724}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 201527724, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023Ĭ\021\003\f", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fc937c01000, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "\264 \221\004\310\177\000\000\264 \221\004\001\000\000\000P\273s\306\374\177\000\000s\321^\365\307\177\000\000P\273s\306\374\177\000\000\220\267\331\020[U\000\000@\263\331\020[U\000\000\247\261s\306\374\177\000\000\220\261s\306\374\177\000\000\000\000\000\000\000\000\000\001", '\000' <repeats 20 times>, "\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000\000\264 \221\004\310\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000@\274s\306\374\177\000\000\005\067\346\356\307\177\000\000\177\252y\020[U\000\000\020\f\220\004\033\000\000\000\264 \221\004\310\177\000\000"...
        i = -1
        j = 130560
        l = 0
        __func__ = "udp_rcv_loop"
#28 0x0000555b1038de84 in main_loop () at main.c:1683
        i = 10
        pid = 0
        si = 0x7fc937c01000
        si_desc = "udp receiver child=10 sock=102.6.6.14:5060\000er.local:5060\000EH\311\177\000\000\000\000\000\000\000\000\000\000\060\000\000\000\060\000\000\000\070\300s\306\374\177\000\000P\277s\306\374\177\000\000\250Nx\020[U\000\000\370\226\r8k\000\000\000\063\230z\020[U\000\000\360\226\n8\311\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#29 0x0000555b10398511 in main (argc=11, argv=0x7ffcc673c568) at main.c:2856
        cfg_stream = 0x555b10bef010
        c = -1
        r = 0
        tmp = 0x7ffcc673deba ""
        tmp_len = 32764
        port = -965491792
        proto = 32713
        ahost = 0x0
        aport = 0
        options = 0x555b10764348 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 900928915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7fc94926d040 <_rtld_global>
        p = 0x7ffcc673de72 "trunks"
        st = {st_dev = 19, st_ino = 23307, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1641492636, tv_nsec = 884483965}, st_mtim = {tv_sec = 1599774907, tv_nsec = 42281020}, st_ctim = {tv_sec = 1599774907, tv_nsec = 42281020}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000 \232\004I\311\177\000\000\330\331&I\311\177\000\000\a\000\000\000\000\000\000\000\a\000\000\000\a\000\000\000\070\224\004I\311\177\000\000\060\302s\306\374\177\000\000\215F\005I\311\177\000\000\000\000\000\000\000\000\000\000\272J\005I\311\177", '\000' <repeats 11 times>, "\200\065\020[U", '\000' <repeats 13 times>, "\377\000\000\000\000", '\377' <repeats 11 times>, "\000\377\377\377\377GLIBC_2.2.5\000GLIB\000__f", '\000' <repeats 12 times>, "inite\000getpriorit", '\000' <repeats 136 times>...
        option_index = 0
        long_options = {{name = 0x555b107663d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x555b10761b1c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x555b107663db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x555b107663e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x555b107663e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x555b107663f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x555b107663fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x555b10766404 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x555b1076640f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x555b10766418 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x555b10766423 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
38	../sysdeps/unix/sysv/linux/x86_64/syscall.S: No such file or directory.
#0  syscall () at ../sysdeps/unix/sysv/linux/x86_64/syscall.S:38
No locals.
#1  0x00007fc7f9e53741 in futex_get (lock=0x7fc7fe0c8a20) at ../../modules/tm/../../core/mem/../futexlock.h:108
        v = 2
        i = 1024
#2  0x00007fc7f9e55819 in bcast_dmq_message1 (peer=0x7fc7fe1ebfb0, body=0x7ffcc6738ca0, except=0x0, resp_cback=0x7fc7f9bf2790 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9bf2750 <dlg_dmq_content_type>, incl_inactive=0) at dmq_funcs.c:156
        node = 0x7fc804900d30
        __func__ = "bcast_dmq_message1"
#3  0x00007fc7f9e56072 in bcast_dmq_message (peer=0x7fc7fe1ebfb0, body=0x7ffcc6738ca0, except=0x0, resp_cback=0x7fc7f9bf2790 <dlg_dmq_resp_callback>, max_forwards=1, content_type=0x7fc7f9bf2750 <dlg_dmq_content_type>) at dmq_funcs.c:188
No locals.
#4  0x00007fc7f999101a in dlg_dmq_send (body=0x7ffcc6738ca0, node=0x0) at dlg_dmq.c:88
        __func__ = "dlg_dmq_send"
#5  0x00007fc7f999a7e4 in dlg_dmq_replicate_action (action=DLG_DMQ_UPDATE, dlg=0x7fc7fe7131f0, needlock=1, node=0x0) at dlg_dmq.c:628
        jdoc = {root = 0x555b10d79c40, flags = 0, buf = {s = 0x555b10db4e20 "{\"action\":1,\"h_entry\":2664,\"h_id\":9792,\"init_ts\":1652854905,\"callid\":\"1460007659_57432438 at 102.7.3.12\",\"from_uri\":\"sip:03312586972 at 102.7.3.12;pstn-params=808482808883\",\"to_uri\":\"sip:0915061111 at 172.16"..., len = 1681}, malloc_fn = 0x7fc9483e8f10 <__GI___libc_malloc>, free_fn = 0x7fc9483e9510 <__GI___libc_free>}
        prof_jdoc = {root = 0x0, flags = 0, buf = {s = 0x0, len = 0}, malloc_fn = 0x0, free_fn = 0x0}
        var = 0x0
        __func__ = "dlg_dmq_replicate_action"
#6  0x00007fc7f99696f7 in dlg_on_send (t=0x7fc80e363eb8, type=16, param=0x7ffcc6738f20) at dlg_handlers.c:760
        dlg = 0x7fc7fe7131f0
        iuid = 0x7fc80df503c0
        __func__ = "dlg_on_send"
#7  0x00007fc7fdb59d98 in run_trans_callbacks_internal (cb_lst=0x7fc80e363f30, type=16, trans=0x7fc80e363eb8, params=0x7ffcc6738f20) at t_hooks.c:258
        cbp = 0x7fc805b38488
        backup_from = 0x7fc80e3640c8
        backup_to = 0x7fc80e3640d0
        backup_dom_from = 0x555b10ab07c0 <def_list+32>
        backup_dom_to = 0x555b10ab07c8 <def_list+40>
        backup_uri_from = 0x7fc80e3640b8
        backup_uri_to = 0x7fc80e3640c0
        backup_xavps = 0x7fc80e3640e8
        backup_xavus = 0x7fc80e3640f0
        backup_xavis = 0x7fc80e3640f8
        __func__ = "run_trans_callbacks_internal"
#8  0x00007fc7fdb59ec8 in run_trans_callbacks (type=16, trans=0x7fc80e363eb8, req=0x7fc9380cade8, rpl=0x0, code=-1) at t_hooks.c:285
        params = {req = 0x7fc9380cade8, rpl = 0x0, param = 0x7fc805b38498, code = -1, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#9  0x00007fc7fdb6accf in prepare_new_uac (t=0x7fc80e363eb8, i_req=0x7fc9380cade8, branch=0, uri=0x7ffcc6739120, path=0x7ffcc6739100, next_hop=0x7ffcc6739110, fsocket=0x7fc937bfff30, snd_flags=..., fproto=0, flags=0, instance=0x7ffcc67390f0, ruid=0x7ffcc67390e0, location_ua=0x7ffcc67390d0) at t_fwd.c:388
        shbuf = 0x0
        add_rm_backup = 0x7fc937f71ab8
        body_lumps_backup = 0x7fc937f81470
        parsed_uri_bak = {user = {s = 0x7fc937f80f6c "411078033 at siptrunks.company.com", len = 9}, passwd = {s = 0x0, len = 0}, host = {s = 0x7fc937f80f76 "siptrunks.company.com", len = 21}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        ret = -1
        len = 32711
        parsed_uri_ok_bak = 1
        free_new_uri = 1
        msg_uri_bak = {s = 0x7fc937f80f68 "sip:411078033 at siptrunks.company.com", len = 35}
        dst_uri_bak = {s = 0x7fc937f72ac8 "sip:internal.hipertel.local", len = 28}
        dst_uri_backed_up = 1
        path_bak = {s = 0x0, len = 0}
        free_path = 1
        instance_bak = {s = 0x0, len = 0}
        free_instance = 1
        ruid_bak = {s = 0x0, len = 0}
        free_ruid = 1
        ua_bak = {s = 0x0, len = 0}
        free_ua = 1
        backup_route_type = 940355048
        test_dst = 32764
        fwd_snd_flags_bak = {f = 32712, blst_imask = 0}
        rpl_snd_flags_bak = {f = 3088, blst_imask = 1168}
        force_send_socket_bak = 0x7ffcc6739488
        dst = 0x7fc80e3641a8
        ctx = {rec_lev = -38153952, run_flags = 32711, last_retcode = 275030754, jmp_env = {{__jmpbuf = {140496932033080, 140497065837704, 140497204347696, 140497208622896, 72907341584, 140497204347696, 1, 140497046735888}, __mask_was_saved = -965504896, __saved_mask = {__val = {276598617, 140723637948904, 140723637948880, 3474017167730815278, 3328783759099507253, 3833180307342636849, 3767094209391113776, 1, 140497046735888, 141176534806585, 936, 7624429792, 140497046735888, 140723637948640, 140496791814368, 93849607136987}}}}}
        bctx = 0x7ffcc6739478
        keng = 0x7ffcc6739480
        __func__ = "prepare_new_uac"
#10 0x00007fc7fdb6ffe8 in add_uac (t=0x7fc80e363eb8, request=0x7fc9380cade8, uri=0x7fc9380cb0c8, next_hop=0x7fc9380cb0d8, path=0x7fc9380cb490, proxy=0x0, fsocket=0x7fc937bfff30, snd_flags=..., proto=0, flags=0, instance=0x7fc9380cb4a0, ruid=0x7fc9380cb4b8, location_ua=0x7fc9380cb4c8) at t_fwd.c:814
        ret = 100
        branch = 0
        __func__ = "add_uac"
#11 0x00007fc7fdb79725 in t_forward_nonack (t=0x7fc80e363eb8, p_msg=0x7fc9380cade8, proxy=0x0, proto=0) at t_fwd.c:1694
        branch_ret = 0
        lowest_ret = -1
        added_branches = 0
        first_branch = 0
        i = 32764
        t_invite = 0x7fc937fa1658
        success_branch = -965503440
        try_new = 1
        lock_replies = 0
        backup_bflags = 0
        obranch = {uri = {s = 0x13200000000 <error: Cannot access memory at address 0x13200000000>, len = 276174472}, dst_uri = {s = 0x0, len = 1212490240}, q = 276469811, path = {s = 0x139400000 <error: Cannot access memory at address 0x139400000>, len = -965503504}, flags = 4256017125, force_socket = 0x1, ruid = {s = 0x7ffcc67395c0 "", len = -965503456}, instance = {s = 0x6400000001 <error: Cannot access memory at address 0x6400000001>, len = 940355048}, location_ua = {s = 0x7fc80e363eb8 "H\323\376\375\307\177", len = 276174472}, otcpid = 276174472}
        __func__ = "t_forward_nonack"
#12 0x00007fc7fdb511f1 in t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, proto=0, replicate=0) at t_funcs.c:335
        ret = 0
        new_tran = 1
        t = 0x7fc80e363eb8
        dst = {send_sock = 0x7fc937c05468, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\220\230s\306\374\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\220\230s\306\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\230s\306\374\177\000\000\341S^\365\307\177\000", __u6_addr16 = {39056, 50803, 32764, 0, 21473, 62814, 32711, 0}, __u6_addr32 = {3329464464, 32764, 4116599777, 32711}}}, sin6_scope_id = 3329464080}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\220\230s\306\374\177\000\000\341S^\365\307\177\000\000\020\227s\306\374\177\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000P\227s\306\374\177\000\000@\231s\306\374\177\000\000Зs\306\374\177", '\000' <repeats 18 times>, "\350\255\f8\311\177\000", __ss_align = 140723637952000}}, id = 272622770, send_flags = {f = 21851, blst_imask = 0}, proto = -112 '\220', proto_pad0 = -105 '\227', proto_pad1 = -14733}
        port = 0
        host = {s = 0x7fc7fe1e0c48 "\360\061q\376\307\177", len = -178324551}
        comp = 1
        __func__ = "t_relay_to"
#13 0x00007fc7fdb054da in _w_t_relay_to (p_msg=0x7fc9380cade8, proxy=0x0, force_proto=0) at tm.c:1752
        t = 0x7fc9380cade8
        res = 32764
        __func__ = "_w_t_relay_to"
#14 0x00007fc7fdb06825 in w_t_relay (p_msg=0x7fc9380cade8, _foo=0x0, _bar=0x0) at tm.c:1952
No locals.
#15 0x0000555b103fe4b2 in do_action (h=0x7ffcc673a130, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1076
        ret = -5
        v = 0
        dst = {send_sock = 0x7fc937deac70, to = {s = {sa_family = 44520, sa_data = "\f8\311\177\000\000\253'\021\375\307\177\000"}, sin = {sin_family = 44520, sin_port = 14348, sin_addr = {s_addr = 32713}, sin_zero = "\253'\021\375\307\177\000"}, sin6 = {sin6_family = 44520, sin6_port = 14348, sin6_flowinfo = 32713, sin6_addr = {__in6_u = {__u6_addr8 = "\253'\021\375\307\177\000\000\320\n\220\004\310\177\000", __u6_addr16 = {10155, 64785, 32711, 0, 2768, 1168, 32712, 0}, __u6_addr32 = {4245759915, 32711, 76548816, 32712}}}, sin6_scope_id = 938562624}, sas = {ss_family = 44520, __ss_padding = "\f8\311\177\000\000\253'\021\375\307\177\000\000\320\n\220\004\310\177\000\000 at T\361\067\311\177\000\000\310R\361\067\311\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\200\235s\306\374\177\000\000\020\307\177\365\307\177\000\000\350\255\f8\311\177\000\000\030^\361\067\311\177", '\000' <repeats 33 times>, __ss_align = 0}}, id = 1212490240, send_flags = {f = 32713, blst_imask = 0}, proto = 51 '3', proto_pad0 = -104 '\230', proto_pad1 = 4218}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7fc937c05468
        len = 0
        user = 0
        uri = {user = {s = 0x555b10d24db0 "UTC", len = 938506384}, passwd = {s = 0x7fc937deace8 "H\f\361\067\311\177", len = -49207158}, host = {s = 0x7fc937f15b70 "Trying", len = 6}, port = {s = 0x7fc948452200 <__syslog> "H\201\354", <incomplete sequence \330>, len = 276469811}, params = {s = 0x41 <error: Cannot access memory at address 0x41>, len = 276174472}, sip_params = {s = 0x7fc937f5ace0 "!", len = 938565144}, headers = {s = 0x555b107a9833 "INFO", len = 960495616}, port_no = 40368, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4116599776), transport = {s = 0x7fc937f15448 "\002", len = 938562248}, ttl = {s = 0x7fc9380cade8 "\363\346\001", len = 276174472}, user_param = {s = 0x0, len = 1212490240}, maddr = {s = 0x555b107a9833 "INFO", len = 960495616}, method = {s = 0x7ffcc6739de0 "\220\244s\306\374\177", len = 272680009}, lr = {s = 0x7ffcc6739ca0 "Мs\306\374\177", len = -178335373}, r2 = {s = 0x7ffcc6739ca0 "Мs\306\374\177", len = 938562632}, gr = {s = 0x7fc937f15b70 "Trying", len = 940355048}, transport_val = {s = 0x7fc937f4fb80 "\024\b", len = -965495088}, ttl_val = {s = 0x7ffcc6739cd0 "A", len = 274214092}, user_param_val = {s = 0x4c6739d68 <error: Cannot access memory at address 0x4c6739d68>, len = 0}, maddr_val = {s = 0x7fc937f15180 "\017", len = 0}, method_val = {s = 0x41 <error: Cannot access memory at address 0x41>, len = 276174472}, lr_val = {s = 0x0, len = 1212490240}, r2_val = {s = 0x555b107a9833 "INFO", len = 960495616}, gr_val = {s = 0x7ffcc6739de0 "\220\244s\306\374\177", len = 272754088}}
        next_hop = {user = {s = 0x7fc9484cfa0b "%H:%M:%S", len = 24}, passwd = {s = 0x7ffcc6739af0 "3\230z\020[U", len = 282804960}, host = {s = 0x555b10db42d0 "", len = 1215316096}, port = {s = 0x7fc948707b00 <main_arena> "", len = 8208}, params = {s = 0x8c <error: Cannot access memory at address 0x8c>, len = 1212061465}, sip_params = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1212034094}, headers = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 282593440}, port_no = 39696, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4250416580), transport = {s = 0x555b00000001 <error: Cannot access memory at address 0x555b00000001>, len = 282593440}, ttl = {s = 0x7ffcc6739bb0 "p[\361\067\311\177", len = 938544024}, user_param = {s = 0x555b10d808a0 "1460007659_57432438 at 102.7.3.12", len = 1}, maddr = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 11}, method = {s = 0x555b10d808a0 "1460007659_57432438 at 102.7.3.12", len = -965501976}, lr = {s = 0x15 <error: Cannot access memory at address 0x15>, len = 1212489561}, r2 = {s = 0x555b107a9833 "INFO", len = -49206466}, gr = {s = 0x7ffcc6739c70 "\240\234s\306\374\177", len = 276174472}, transport_val = {s = 0x0, len = 1212490240}, ttl_val = {s = 0x555b107a9833 "INFO", len = 960495616}, user_param_val = {s = 0x7fc937c21468 "\017\261s\364\307\177", len = -44059272}, maddr_val = {s = 0x7fc9380cade8 "\363\346\001", len = 276174472}, method_val = {s = 0x7ffcc6739c80 "p[\361\067\311\177", len = 1212490240}, lr_val = {s = 0x7fc937f15198 "\001", len = 940355048}, r2_val = {s = 0x7a00000004 <error: Cannot access memory at address 0x7a00000004>, len = 3}, gr_val = {s = 0x0, len = 0}}
        u = 0x0
        port = 0
        dst_host = 0x7fc804900c10
        i = 934727696
        flags = 32713
        avp = 0x7ffcc6739f40
        st = {flags = 282813152, id = 21851, name = {n = 1215331072, s = {s = 0x7fc948707b00 <main_arena> "", len = 0}, re = 0x7fc948707b00 <main_arena>}, avp = 0xa0}
        sct = 0x555b107a9833
        sjt = 0x555b103fa952 <do_action+20285>
        rve = 0x7ffcc6739f40
        mct = 0x7ffcc673a490
        rv = 0x555b10db42d0
        rv1 = 0x7fc937b6d010
        c1 = {cache_type = 1215326240, val_type = 32713, c = {avp_val = {n = 8, s = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, re = 0x8}, pval = {rs = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, ri = 1212272350, flags = 32713}}, i2s = "\000\000\000\066\067\061\063\063\373\037", '\000' <repeats 11 times>}
        s = {s = 0x555b10db42ec "[U", len = 1213011858}
        srevp = {0x7fc937f161a0, 0x7fc9380cade8}
        evp = {data = 0x7ffcc6739980, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#16 0x0000555b1040c449 in run_actions (h=0x7ffcc673a130, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f161a0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 939135680, tz_dsttime = 32713}
        tdiff = 940026468
        __func__ = "run_actions"
#17 0x0000555b1040caf6 in run_actions_safe (h=0x7ffcc673b6d0, a=0x7fc937f161a0, msg=0x7fc9380cade8) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {93849606559368, 8478727959525565030, 0, 140502477644288, 93849606854707, 5255462912, 8478727960146322022, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {140723637953640, 0, 0, 140723637953008, 93849606559368, 0, 140502477644288, 93849606854707, 5255462912, 140723637953344, 93849602810890, 93849606559368, 4571141768, 140723637953072, 140496791851379, 140502203710192}}}}}
        ret = -965499800
        ign_on_break = 0
#18 0x0000555b103c9569 in rval_get_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, i=0x7ffcc673a5d8, rv=0x7fc937f162f8, cache=0x0) at core/rvalue.c:915
        r_avp = 0x7ffcc673b6d0
        avp_val = {n = 1, s = {s = 0x7ffc00000001 <error: Cannot access memory at address 0x7ffc00000001>, len = 274772759}, re = 0x7ffc00000001}
        pval = {rs = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -965499436}, ri = 0, flags = 0}
        tmp = {s = 0x7ffcc673a380 "\350\255\f8\311\177", len = -965499840}
        s = 0x0
        r = 32713
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#19 0x0000555b103ce40a in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc673a5d8, rve=0x7fc937f162f0) at core/rvalue.c:1913
        i1 = 276174472
        i2 = 1
        ret = -1
        c1 = {cache_type = 940355048, val_type = 32713, c = {avp_val = {n = 938570632, s = {s = 0x7fc937f17388 "\232\a", len = 935352296}, re = 0x7fc937f17388}, pval = {rs = {s = 0x7fc937f17388 "\232\a", len = 935352296}, ri = 34, flags = 14}}, i2s = "\360\245s\306\374\177\000\000\341S^\365\307\177\000\000\000\000\000\000\000"}
        c2 = {cache_type = 276469811, val_type = 21851, c = {avp_val = {n = -965499840, s = {s = 0x7ffcc673a440 "\360\245s\306\374\177", len = -965499776}, re = 0x7ffcc673a440}, pval = {rs = {s = 0x7ffcc673a440 "\360\245s\306\374\177", len = -965499776}, ri = 272425709, flags = 21851}}, i2s = "=\006\001", '\000' <repeats 13 times>, "h\000\361\067\311\177"}
        rv1 = 0x555b105cf57c <pv_value_destroy+175>
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#20 0x0000555b103ce84f in rval_expr_eval_int (h=0x7ffcc673b6d0, msg=0x7fc9380cade8, res=0x7ffcc673ab0c, rve=0x7fc937f16a20) at core/rvalue.c:1921
        i1 = 1212490240
        i2 = 0
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = -176175080, s = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, re = 0x7fc7f57fc818 <_dbg_action_list+344>}, pval = {rs = {s = 0x7fc7f57fc818 <_dbg_action_list+344> "Փ_\365\307\177", len = 940355048}, ri = 938570632, flags = 32713}}, i2s = "\340\246s\306\374\177", '\000' <repeats 15 times>}
        c2 = {cache_type = 938537056, val_type = 32713, c = {avp_val = {n = 940355048, s = {s = 0x7fc9380cade8 "\363\346\001", len = -49207381}, re = 0x7fc9380cade8}, pval = {rs = {s = 0x7fc9380cade8 "\363\346\001", len = -49207381}, ri = 76548816, flags = 32712}}, i2s = " X\363\067\311\177\000\000\250V\363\067\311\177\000\000\350\255\f8\311\177"}
        rv1 = 0x555b1041e5a8 <lval_assign+3169>
        rv2 = 0x7ffcc673a620
        __func__ = "rval_expr_eval_int"
#21 0x0000555b103fdf6e in do_action (h=0x7ffcc673b6d0, a=0x7fc937f17388, msg=0x7fc9380cade8) at core/action.c:1052
        ret = -5
        v = 1
        dst = {send_sock = 0x555b107a9833, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\350\356\305\067\311\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\350\356\305\067\311\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\350\356\305\067\311\177\000\000\024\256s\306\374\177\000", __u6_addr16 = {61160, 14277, 32713, 0, 44564, 50803, 32764, 0}, __u6_addr32 = {935718632, 32713, 3329469972, 32764}}}, sin6_scope_id = 940355048}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\350\356\305\067\311\177\000\000\024\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\270\347\305\067\311\177\000\000\030\256s\306\374\177\000\000\350\255\f8\311\177\000\000жs\306\374\177\000\000\210\026v\020[U\000\000\210\026v\020[U", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000", __ss_align = 140723637955568}}, id = -64824879, send_flags = {f = 32711, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fc937f6f130 ""
        new_uri = 0x7ffcc673ae18 ""
        end = 0x7fc937c5e7b0 "\001"
        crt = 0x7fc937c5e7b8 "\a"
        cmd = 0x7fc937c057e8
        len = 32711
        user = -178367519
        uri = {user = {s = 0x0, len = 1212490240}, passwd = {s = 0x555b107a9833 "INFO", len = 960495616}, host = {s = 0x7ffcc673a960 "\200\251s\306\374\177", len = -44162673}, port = {s = 0x7ffcc673a9bc "\001", len = 273118466}, params = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 0}, sip_params = {s = 0x7ffcc673aa40 "\360\252s\306\374\177", len = 275030558}, headers = {s = 0x555b10b141d4 <ut_buf_int2str+20> "5", len = 275031704}, port_no = 43392, proto = 50803, type = 32764, flags = (URI_USER_NORMALIZE | unknown: 4250804744), transport = {s = 0x7ffcc673a9bc "\001", len = 0}, ttl = {s = 0x7ffcc673a9d0 "\200\252s\306\374\177", len = -44068401}, user_param = {s = 0x38 <error: Cannot access memory at address 0x38>, len = -965497384}, maddr = {s = 0x7fc937c5e7d8 "\001", len = 940355048}, method = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, lr = {s = 0x7fc937c488c8 "`\211\304\067\311\177", len = 280052180}, r2 = {s = 0x7ffcc673aa80 "\350\356\305\067\311\177", len = 274517235}, gr = {s = 0x0, len = -965497384}, transport_val = {s = 0x7fc937c5e7c0 "\017", len = 940355048}, ttl_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 934727696}, user_param_val = {s = 0x0, len = 276174472}, maddr_val = {s = 0x0, len = 1212490240}, method_val = {s = 0x555b107a9833 "INFO", len = 960495616}, lr_val = {s = 0x7ffcc673aaf0 "\360\253s\306\374\177", len = 274387908}, r2_val = {s = 0x7fc7fc440d20 <rr_param_buf_ptr> ";did=86a.0462", len = 276174472}, gr_val = {s = 0x0, len = 1212490240}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffcc673a7b0 "", len = 276174472}, host = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, port = {s = 0x555b107a9833 "INFO", len = 276174472}, params = {s = 0x0, len = 1212490240}, sip_params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, headers = {s = 0x7ffcc673a8e0 "", len = 275070078}, port_no = 43040, proto = 50803, type = 32764, flags = (unknown: 934727696), transport = {s = 0x7ffcc673a820 "", len = 934727696}, ttl = {s = 0x7ffcc673a860 "\220\250s\306\374\177", len = -57849891}, user_param = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, maddr = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 271259184}, method = {s = 0x402050 <error: Cannot access memory at address 0x402050>, len = 5564880}, lr = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, r2 = {s = 0x37 <error: Cannot access memory at address 0x37>, len = 0}, gr = {s = 0x7ffcc673a890 "\200\251s\306\374\177", len = 273118466}, transport_val = {s = 0x7ffcc673a94c "\001", len = 276598612}, ttl_val = {s = 0x555b10b141c0 <ut_buf_int2str> "", len = 0}, user_param_val = {s = 0x7ffcc673a980 "Щs\306\374\177", len = 275070078}, maddr_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, method_val = {s = 0x7ffcc673a8e0 "", len = 934727696}, lr_val = {s = 0x7ffcc673a920 "\274\251s\306\374\177", len = -57849891}, r2_val = {s = 0xf0f0f0f0 <error: Cannot access memory at address 0xf0f0f0f0>, len = 0}, gr_val = {s = 0x10800000 <error: Cannot access memory at address 0x10800000>, len = 276174472}}
        u = 0x7ffcc673ae30
        port = 0
        dst_host = 0x555b107a982c
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 3329468288, id = 32764, name = {n = 276174472, s = {s = 0x555b10761688 "", len = 0}, re = 0x555b10761688}, avp = 0x555b105cf57c <pv_value_destroy+175>}
        sct = 0x1c673ab90
        sjt = 0x0
        rve = 0x7fc937f16a20
        mct = 0x0
        rv = 0x10761688
        rv1 = 0x7fc937c6f610
        c1 = {cache_type = 3329468224, val_type = RV_INT, c = {avp_val = {n = 16, s = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, re = 0x3000000010}, pval = {rs = {s = 0x3000000010 <error: Cannot access memory at address 0x3000000010>, len = -965497536}, ri = -965497728, flags = 32764}}, i2s = "AU\235\371\307\177\000\000\060\r\220\004\310\177\000\000\210\026v\020[U"}
        s = {s = 0x7fc7fd112b4f "s", len = -107129541}
        srevp = {0x7fc937f17388, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673a6e0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#22 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937f0fca0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937f17388
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 935786000, tz_dsttime = 32713}
        tdiff = 1212490240
        __func__ = "run_actions"
#23 0x0000555b103fa952 in do_action (h=0x7ffcc673b6d0, a=0x7fc937c6f610, msg=0x7fc9380cade8) at core/action.c:700
        ret = -5
        v = 0
        dst = {send_sock = 0x555b10a44051 <buf+81>, to = {s = {sa_family = 4, sa_data = "\000\000\001\000\304\023\200\264s\306\374\177\000"}, sin = {sin_family = 4, sin_port = 0, sin_addr = {s_addr = 331612161}, sin_zero = "\200\264s\306\374\177\000"}, sin6 = {sin6_family = 4, sin6_port = 0, sin6_flowinfo = 331612161, sin6_addr = {__in6_u = {__u6_addr8 = "\200\264s\306\374\177\000\000\020Bi\020[U\000", __u6_addr16 = {46208, 50803, 32764, 0, 16912, 4201, 21851, 0}, __u6_addr32 = {3329471616, 32764, 275333648, 21851}}}, sin6_scope_id = 0}, sas = {ss_family = 4, __ss_padding = "\000\000\001\000\304\023\200\264s\306\374\177\000\000\020Bi\020[U\000\000\000\000\000\000\000\000\000\000Hc\371\067\311\177\000\000UD\244\020[U\000\000\065@\244\020[U\000\000 \263s\306\374\177\000\000\020ж7\311\177\000\000`\263s\306\374\177\000\000\335G\215\374\307\177\000\000\360\360\360\360", '\000' <repeats 14 times>, "\200\020\000\000\000\000\000D+\020\000\000\000", __ss_align = 4195424}}, id = 5553152, send_flags = {f = 0, blst_imask = 0}, proto = -64 '\300', proto_pad0 = 119 'w', proto_pad1 = 1285}
        tmp = 0x7fc804900c10 ""
        new_uri = 0x7fc937f73b98 "\001"
        end = 0x555b106d42fd <parse_method_name+2024> "\205\300\017\224\300\017\266\300H\205\300t\027H\213\205p\377\377\377", <incomplete sequence \307>
        crt = 0x1c673b510 <error: Cannot access memory at address 0x1c673b510>
        cmd = 0x7fc937c137c0
        len = 0
        user = 938949488
        uri = {user = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -965496436}, passwd = {s = 0x4c673b1a0 <error: Cannot access memory at address 0x4c673b1a0>, len = 276653360}, host = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = 0}, port = {s = 0x7ffcc673b190 "\300\262s\306\374\177", len = 274214092}, params = {s = 0x4004004a0 <error: Cannot access memory at address 0x4004004a0>, len = 276653360}, sip_params = {s = 0x11077c0 <error: Cannot access memory at address 0x11077c0>, len = 8}, headers = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275281682}, port_no = 45520, proto = 50803, type = 32764, flags = (URI_SIP_USER_PHONE | unknown: 273118464), transport = {s = 0x0, len = 276598612}, ttl = {s = 0x7ffcc673b2c0 "\200\264s\306\374\177", len = 275030558}, user_param = {s = 0x7fc937f96348 "\001", len = 939089824}, maddr = {s = 0x7ffcc673b342 "\005\005", len = -965495997}, method = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, lr = {s = 0x555b107d6d88 <__func__.6797> "parse_via", len = 276659112}, r2 = {s = 0x1c673b250 <error: Cannot access memory at address 0x1c673b250>, len = 76549136}, gr = {s = 0x7ffcc673b250 "\220\262s\306\374\177", len = -178372384}, transport_val = {s = 0x555b107d6534 "", len = 76549136}, ttl_val = {s = 0x555b10761688 "", len = 276174472}, user_param_val = {s = 0x7ffcc673b290 "\300\262s\306\004", len = -178335373}, maddr_val = {s = 0x0, len = -965496132}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 276653360}, lr_val = {s = 0x6f13f56e0000000e <error: Cannot access memory at address 0x6f13f56e0000000e>, len = -965496004}, r2_val = {s = 0x4c673b2c0 <error: Cannot access memory at address 0x4c673b2c0>, len = 279199821}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 279199825}}
        next_hop = {user = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1}, passwd = {s = 0x7fc937f73c90 "\003", len = 0}, host = {s = 0x7fc937f96168 "\001", len = 938950232}, port = {s = 0x7a <error: Cannot access memory at address 0x7a>, len = 939090280}, params = {s = 0x0, len = 939090928}, sip_params = {s = 0x7fc937f96348 "\001", len = 938950232}, headers = {s = 0x7fc937f96048 "\004", len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 76549136}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x1c673b120 <error: Cannot access memory at address 0x1c673b120>, len = 76549136}, method_val = {s = 0x7ffcc673b120 "`\261s\306\374\177", len = -178372384}, lr_val = {s = 0x555b107d6534 "", len = 76549136}, r2_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 16}, gr_val = {s = 0x7ffcc673b160 "\220\261s\306\374\177", len = -178335373}}
        u = 0x555b107df530 <__func__.6625>
        port = 0
        dst_host = 0x555b10761688
        i = 29
        flags = 21851
        avp = 0x1
        st = {flags = 65537, id = 48, name = {n = 279199744, s = {s = 0x555b10a44000 <buf> "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"..., len = 6}, re = 0x555b10a44000 <buf>}, avp = 0x555b10a44007 <buf+7>}
        sct = 0x7ffcc673b480
        sjt = 0x7fc804900c10
        rve = 0x7fc937c5f610
        mct = 0x1
        rv = 0x0
        rv1 = 0x555b10a4411f <buf+287>
        c1 = {cache_type = 276174472, val_type = 21851, c = {avp_val = {n = 0, s = {s = 0x0, len = 276824064}, re = 0x0}, pval = {rs = {s = 0x0, len = 276824064}, ri = 271261272, flags = 0}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x7ffcc673af90 "\006", len = -57849891}
        srevp = {0x7fc937c6f610, 0x7fc9380cade8}
        evp = {data = 0x7ffcc673af20, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#24 0x0000555b1040c449 in run_actions (h=0x7ffcc673b6d0, a=0x7fc937c473c0, msg=0x7fc9380cade8) at core/action.c:1581
        t = 0x7fc937c6f610
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 276690800, tz_dsttime = 21851}
        tdiff = 4116631923
        __func__ = "run_actions"
#25 0x0000555b1040cbbe in run_top_route (a=0x7fc937c473c0, msg=0x7fc9380cade8, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 2, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {93849603950067, 4571428513, 140502205509096, 93849606559368, 4571141768, 140723637958544, 140496791851379, 140723637958560, 140723637958588, 18118819416, 93849606846109, 8004010816636452865, 0, 140723637958592, 93849606559368, 0}}}}}
        p = 0x7ffcc673b6d0
        ret = 276469811
        sfbk = 0
#26 0x0000555b1057b6e8 in receive_msg (buf=0x555b10a44000 <buf> "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"..., len=1109, rcv_info=0x7ffcc673bd40) at core/receive.c:423
        msg = 0x7fc9380cade8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {93849606559368, 8478727958774784614, 0, 140502477644288, 93849606854707, 5255462912, 8478727958858670694, 2370532015302877798}, __mask_was_saved = 0, __saved_mask = {__val = {0 <repeats 15 times>, 1}}}}}
        bctx = 0x0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x555b10a44000 <buf> "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"..., len = 1109}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcc673b8b0, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcc673bd40, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#27 0x0000555b10447d59 in udp_rcv_loop () at core/udp_server.c:543
        len = 1109
        buf = "INVITE sip:0915061111 at 102.6.6.14:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 102.7.3.12:5060;branch=z9hG4bK05B9835343e01f9059f\r\nFrom: <sip:03312586972 at 102.7.3.12;pstn-params=808482808883>;tag=gK05696ca8\r\nTo: <s"...
        tmp = 0x2e <error: Cannot access memory at address 0x2e>
        fromaddr = 0x7fc93807e930
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {201527724, 0}, addr32 = {201527724, 0, 0, 0}, addr16 = {4524, 3075, 0, 0, 0, 0, 0, 0}, addr = "\254\021\003\f", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {235278508, 0}, addr32 = {235278508, 0, 0, 0}, addr16 = {4268, 3590, 0, 0, 0, 0, 0, 0}, addr = "\254\020\006\016", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023Ĭ\021\003\f\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 201527724}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 201527724, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023Ĭ\021\003\f", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7fc937c01000, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = "\264 \221\004\310\177\000\000\264 \221\004\001\000\000\000P\273s\306\374\177\000\000s\321^\365\307\177\000\000P\273s\306\374\177\000\000\220\267\331\020[U\000\000@\263\331\020[U\000\000\247\261s\306\374\177\000\000\220\261s\306\374\177\000\000\000\000\000\000\000\000\000\001", '\000' <repeats 20 times>, "\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000\000\264 \221\004\310\177", '\000' <repeats 11 times>, "\"EH\311\177\000\000\063\230z\020[U\000\000\000\000 at 9\001\000\000\000@\274s\306\374\177\000\000\005\067\346\356\307\177\000\000\177\252y\020[U\000\000\020\f\220\004\033\000\000\000\264 \221\004\310\177\000\000"...
        i = -1
        j = 130560
        l = 0
        __func__ = "udp_rcv_loop"
#28 0x0000555b1038de84 in main_loop () at main.c:1683
        i = 10
        pid = 0
        si = 0x7fc937c01000
        si_desc = "udp receiver child=10 sock=102.6.6.14:5060\000er.local:5060\000EH\311\177\000\000\000\000\000\000\000\000\000\000\060\000\000\000\060\000\000\000\070\300s\306\374\177\000\000P\277s\306\374\177\000\000\250Nx\020[U\000\000\370\226\r8k\000\000\000\063\230z\020[U\000\000\360\226\n8\311\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#29 0x0000555b10398511 in main (argc=11, argv=0x7ffcc673c568) at main.c:2856
        cfg_stream = 0x555b10bef010
        c = -1
        r = 0
        tmp = 0x7ffcc673deba ""
        tmp_len = 32764
        port = -965491792
        proto = 32713
        ahost = 0x0
        aport = 0
        options = 0x555b10764348 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 900928915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7fc94926d040 <_rtld_global>
        p = 0x7ffcc673de72 "trunks"
        st = {st_dev = 19, st_ino = 23307, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1641492636, tv_nsec = 884483965}, st_mtim = {tv_sec = 1599774907, tv_nsec = 42281020}, st_ctim = {tv_sec = 1599774907, tv_nsec = 42281020}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000 \232\004I\311\177\000\000\330\331&I\311\177\000\000\a\000\000\000\000\000\000\000\a\000\000\000\a\000\000\000\070\224\004I\311\177\000\000\060\302s\306\374\177\000\000\215F\005I\311\177\000\000\000\000\000\000\000\000\000\000\272J\005I\311\177", '\000' <repeats 11 times>, "\200\065\020[U", '\000' <repeats 13 times>, "\377\000\000\000\000", '\377' <repeats 11 times>, "\000\377\377\377\377GLIBC_2.2.5\000GLIB\000__f", '\000' <repeats 12 times>, "inite\000getpriorit", '\000' <repeats 136 times>...
        option_index = 0
        long_options = {{name = 0x555b107663d6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x555b10761b1c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x555b107663db "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x555b107663e1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x555b107663e7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x555b107663f0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x555b107663fa "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x555b10766404 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x555b1076640f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x555b10766418 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x555b10766423 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"


More information about the sr-users mailing list