[SR-Users] lcr related crash

Juha Heinanen jh at tutpro.com
Thu Nov 17 14:19:44 CET 2022


We noticed lcr related crash with pretty recent 5.6.  Core dump is
below.  Weird thing is that some of the values in matched_gw table make
no sense.  For example, there does not exist rule_id = 1426245171 in
lcr_rule table and some prefix_len and priority values are far too big.

Any ideas?

-- Juha

#0  0x00007efda9ea7486 in ki_load_gws_furi (_m=0x7efdaa5846f0, lcr_id=1, ruri_user=0x7fff30444b90, from_uri=0x7fff30444ba0) at lcr_mod.c:2330
2330	lcr_mod.c: No such file or directory.
(gdb) bt full
#0  0x00007efda9ea7486 in ki_load_gws_furi (_m=0x7efdaa5846f0, lcr_id=1, ruri_user=0x7fff30444b90, from_uri=0x7fff30444ba0) at lcr_mod.c:2330
        request_uri = 0x7efdaa5849d0
        i = 1421936895
        j = 21897
        gw_index = 0
        now = 1668672386
        dex = 32509
        val = {n = 0, s = {s = 0x0, len = -1436245347}, re = 0x0}
        matched_gws = {{gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 2, duplicate = 0}, {gw_index = 0, rule_id = 1426245171, prefix_len = 21897, priority = 0, weight = 32, duplicate = 0}, {gw_index = 45104, rule_id = 32509, prefix_len = 17040, 
            weight = 3201662253, duplicate = 17040}, {gw_index = 32767, rule_id = 1423653555, prefix_len = 21897, priority = 0, weight = 2857912048, duplicate = 32509}, {gw_index = 44720, rule_id = 32767, prefix_len = 0, priority = 0, weight = 32509, duplicate = 0}, {
            gw_index = 0, rule_id = 2868544968, prefix_len = 32509, priority = 0, weight = 809780304, duplicate = 32767}, {gw_index = 18160, rule_id = 32509, prefix_len = 44720, priority = 12356, weight = 32767, duplicate = 7864}, {gw_index = 32509, rule_id = 0, 
            prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 56064}, {gw_index = 32045, rule_id = 2858027016, prefix_len = 32509, priority = 0, weight = 2867938768, 
            duplicate = 32509}, {gw_index = 0, rule_id = 0, prefix_len = 6048, priority = 43762, weight = 32509, duplicate = 32}, {gw_index = 0, rule_id = 2992943152, prefix_len = 32509, priority = 0, weight = 809779984, duplicate = 32767}, {gw_index = 62282, 
            rule_id = 21897, prefix_len = 47520, priority = 43666, weight = 32509, duplicate = 13}, {gw_index = 32767, rule_id = 0, prefix_len = 0, priority = 0, weight = 2298403584, duplicate = 32045}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, 
            weight = 2, duplicate = 0}, {gw_index = 0, rule_id = 1426245171, prefix_len = 21897, priority = 0, weight = 32, duplicate = 0}, {gw_index = 45104, rule_id = 32509, prefix_len = 17408, priority = 12356, weight = 32767, duplicate = 2303}, {gw_index = 21897, 
            rule_id = 0, prefix_len = 0, priority = 0, weight = 1426245171, duplicate = 21897}, {gw_index = 32, rule_id = 0, prefix_len = 45104, priority = 45668, weight = 32509, duplicate = 17408}, {gw_index = 32767, rule_id = 2857912048, prefix_len = 32509, 
            priority = 0, weight = 2868551680, duplicate = 32509}, {gw_index = 44720, rule_id = 32767, prefix_len = 29136, priority = 34846, weight = 32509, duplicate = 56064}, {gw_index = 1, rule_id = 2868544960, prefix_len = 32509, priority = 0, weight = 809780304, 
            duplicate = 32767}, {gw_index = 0, rule_id = 0, prefix_len = 44720, priority = 12356, weight = 32767, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, 
            priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, 
            priority = 0, weight = 2867512936, duplicate = 1}, {gw_index = 50792, rule_id = 32509, prefix_len = 18160, priority = 43608, weight = 32509, duplicate = 44720}, {gw_index = 32767, rule_id = 809780296, prefix_len = 32767, priority = 0, weight = 2862001424, 
            duplicate = 22}, {gw_index = 25472, rule_id = 21897, prefix_len = 0, priority = 0, weight = 0, duplicate = 44628}, {gw_index = 32509, rule_id = 19, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 44642, 
            priority = 43670, weight = 32509, duplicate = 56064}, {gw_index = 32045, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 2}, {gw_index = 0, rule_id = 0, prefix_len = 56064, priority = 35070, weight = 3201662253, duplicate = 32}, {
            gw_index = 0, rule_id = 0, prefix_len = 2, priority = 0, weight = 0, duplicate = 0}, {gw_index = 50739, rule_id = 21897, prefix_len = 32, priority = 0, weight = 0, duplicate = 45104}, {gw_index = 32509, rule_id = 809781904, prefix_len = 32767, priority = 0, 
            weight = 1421876076, duplicate = 21897}, {gw_index = 17504, rule_id = 32767, prefix_len = 18160, priority = 43608, weight = 32509, duplicate = 2528}, {gw_index = 32509, rule_id = 2857912048, prefix_len = 32509, priority = 0, weight = 2868551952, 
            duplicate = 32509}, {gw_index = 44720, rule_id = 32767, prefix_len = 0, priority = 0, weight = 0, duplicate = 1}, {gw_index = 1, rule_id = 0, prefix_len = 0, priority = 0, weight = 2298403584, duplicate = 32045}, {gw_index = 0, rule_id = 0, prefix_len = 0, 
            priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 809780432, duplicate = 32767}, {gw_index = 41793, rule_id = 32509, prefix_len = 0, priority = 0, weight = 0, duplicate = 18600}, {gw_index = 32767, 
            rule_id = 2866689544, prefix_len = 32509, priority = 0, weight = 2857912048, duplicate = 32509}, {gw_index = 0, rule_id = 1, prefix_len = 25492, priority = 21787, weight = 21897, duplicate = 53760}, {gw_index = 32509, rule_id = 2298403584, 
            prefix_len = 32045, priority = 48853, weight = 809780624, duplicate = 32767}, {gw_index = 60669, rule_id = 21897, prefix_len = 0, priority = 0, weight = 0, duplicate = 18600}, {gw_index = 32767, rule_id = 2866689520, prefix_len = 32509, priority = 0, 
            weight = 2857912048, duplicate = 32509}, {gw_index = 35600, rule_id = 32509, prefix_len = 0, priority = 0, weight = 32509, duplicate = 35600}, {gw_index = 32509, rule_id = 2298403584, prefix_len = 32045, priority = 48853, weight = 0, duplicate = 0}, {
            gw_index = 0, rule_id = 2, prefix_len = 0, priority = 0, weight = 0, duplicate = 50739}, {gw_index = 21897, rule_id = 32, prefix_len = 0, priority = 0, weight = 2298403584, duplicate = 32045}, {gw_index = 18160, rule_id = 32767, prefix_len = 0, priority = 0, 
            weight = 2, duplicate = 0}, {gw_index = 0, rule_id = 1426245171, prefix_len = 21897, priority = 0, weight = 32, duplicate = 0}, {gw_index = 45104, rule_id = 32509, prefix_len = 18080, priority = 12356, weight = 32767, duplicate = 4205}, {gw_index = 21897, 
            rule_id = 2866712944, prefix_len = 32509, priority = 0, weight = 2857912048, duplicate = 32509}, {gw_index = 2528, rule_id = 32509, prefix_len = 34240, priority = 43770, weight = 32509, duplicate = 18592}, {gw_index = 32767, rule_id = 0, prefix_len = 65535, 
            priority = 65535, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 32767, prefix_len = 0, priority = 0, weight = 2, duplicate = 53890}, {gw_index = 55846, rule_id = 0, prefix_len = 0, priority = 0, weight = 1426245171, duplicate = 21897}, {gw_index = 0, 
            rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, 
            rule_id = 809781424, prefix_len = 32767, priority = 0, weight = 2298403584, duplicate = 32045}, {gw_index = 18216, rule_id = 32767, prefix_len = 0, priority = 0, weight = 22, duplicate = 25472}, {gw_index = 21897, rule_id = 0, prefix_len = 0, priority = 0, 
            weight = 32, duplicate = 0}, {gw_index = 19, rule_id = 32509, prefix_len = 18400, priority = 12356, weight = 32767, duplicate = 36949}, {gw_index = 21897, rule_id = 32, prefix_len = 0, priority = 0, weight = 2298403584, duplicate = 32045}, {gw_index = 18400, 
            rule_id = 32767, prefix_len = 0, priority = 0, weight = 2, duplicate = 0}, {gw_index = 0, rule_id = 1426245171, prefix_len = 21897, priority = 0, weight = 32, duplicate = 0}, {gw_index = 56064, rule_id = 3201662253, prefix_len = 18528, priority = 12356, 
            weight = 32767, duplicate = 0}, {gw_index = 2, rule_id = 0, prefix_len = 0, priority = 0, weight = 1426245171, duplicate = 21897}, {gw_index = 32, rule_id = 0, prefix_len = 45104, priority = 45668, weight = 32509, duplicate = 18240}, {gw_index = 32767, 
            rule_id = 2832509560, prefix_len = 32509, priority = 0, weight = 809781140, duplicate = 32767}, {gw_index = 18592, rule_id = 22, prefix_len = 25472, priority = 21787, weight = 21897, duplicate = 0}, {gw_index = 0, rule_id = 2866689512, prefix_len = 32509, 
            priority = 0, weight = 1, duplicate = 0}, {gw_index = 25492, rule_id = 21897, prefix_len = 56064, priority = 35070, weight = 3201662253, duplicate = 18272}, {gw_index = 32767, rule_id = 2832509702, prefix_len = 32509, priority = 0, weight = 809781140, 
            duplicate = 32767}, {gw_index = 0, rule_id = 0, prefix_len = 18352, priority = 12356, weight = 32767, duplicate = 41793}, {gw_index = 32509, rule_id = 3631862402, prefix_len = 55846, priority = 22694, weight = 809782152, duplicate = 32767}, {
            gw_index = 28360, rule_id = 32509, prefix_len = 18160, priority = 43608, weight = 32509, duplicate = 32}, {gw_index = 1, rule_id = 1427858324, prefix_len = 21897, priority = 0, weight = 2866211776, duplicate = 32509}, {gw_index = 46912, rule_id = 32509, 
            prefix_len = 18160, priority = 43608, weight = 32509, duplicate = 44720}, {gw_index = 32767, rule_id = 0, prefix_len = 0, priority = 0, weight = 809782152, duplicate = 32767}, {gw_index = 18936, rule_id = 32509, prefix_len = 19400, priority = 12356, 
            weight = 32767, duplicate = 44840}, {gw_index = 32509, rule_id = 2857912048, prefix_len = 32509, priority = 0, weight = 809781424, duplicate = 32767}, {gw_index = 51007, rule_id = 32509, prefix_len = 19400, priority = 12356, weight = 32767, 
            duplicate = 44840}, {gw_index = 32509, rule_id = 2857912824, prefix_len = 32509, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, 
            priority = 0, weight = 2868540824, duplicate = 32509}, {gw_index = 19228, rule_id = 32767, prefix_len = 18160, priority = 43608, weight = 32509, duplicate = 44720}, {gw_index = 32767, rule_id = 2868539048, prefix_len = 32509, priority = 0, weight = 0, 
            duplicate = 0}, {gw_index = 18160, rule_id = 32509, prefix_len = 56064, priority = 35070, weight = 3201662253, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 2, priority = 0, weight = 0, duplicate = 0}, {gw_index = 50739, rule_id = 21897, 
            prefix_len = 32, priority = 0, weight = 0, duplicate = 45104}, {gw_index = 32509, rule_id = 809781616, prefix_len = 32767, priority = 0, weight = 2832519634, duplicate = 32509}, {gw_index = 0, rule_id = 0, prefix_len = 19400, priority = 12356, 
            weight = 32767, duplicate = 44840}, {gw_index = 32509, rule_id = 2857912048, prefix_len = 32509, priority = 0, weight = 3743011458, duplicate = 55846}, {gw_index = 53890, rule_id = 206181164, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {
            gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 2298403584, duplicate = 32045}, {gw_index = 0, rule_id = 0, prefix_len = 56064, priority = 35070, weight = 3201662253, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 2, priority = 0, 
            weight = 0, duplicate = 0}, {gw_index = 19400, rule_id = 32767, prefix_len = 46952, priority = 43654, weight = 32509, duplicate = 18160}, {gw_index = 32509, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 44720, 
            rule_id = 32509, prefix_len = 56064, priority = 35070, weight = 3201662253, duplicate = 18992}, {gw_index = 32767, rule_id = 1423240445, prefix_len = 21897, priority = 0, weight = 2868540816, duplicate = 32509}, {gw_index = 19400, rule_id = 32767, 
            prefix_len = 46928, priority = 43654, weight = 32509, duplicate = 18160}, {gw_index = 32509, rule_id = 809782144, prefix_len = 32767, priority = 0, weight = 1424974825, duplicate = 21897}, {gw_index = 18928, rule_id = 32767, prefix_len = 57360, 
            priority = 43603, weight = 32509, duplicate = 32}, {gw_index = 0, rule_id = 2857623568, prefix_len = 32509, priority = 0, weight = 809781808, duplicate = 32767}, {gw_index = 54047, rule_id = 32509, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {
            gw_index = 0, rule_id = 134217728, prefix_len = 0, priority = 0, weight = 122341296, duplicate = 0}, {gw_index = 44784, rule_id = 0, prefix_len = 14416, priority = 181, weight = 0, duplicate = 46560}, {gw_index = 0, rule_id = 16, prefix_len = 0, 
            priority = 0, weight = 296, duplicate = 0}, {gw_index = 56064, rule_id = 3201662253, prefix_len = 19040, priority = 12356, weight = 32767, duplicate = 38381}, {gw_index = 21897, rule_id = 0, prefix_len = 0, priority = 0, weight = 80, duplicate = 5}, {
            gw_index = 47600, rule_id = 32509, prefix_len = 0, priority = 0, weight = 32509, duplicate = 19232}, {gw_index = 32767, rule_id = 1424954698, prefix_len = 21897, priority = 0, weight = 32, duplicate = 0}, {gw_index = 57360, rule_id = 32509, prefix_len = 32, 
            priority = 0, weight = 0, duplicate = 7}, {gw_index = 32509, rule_id = 2857623568, prefix_len = 32509, priority = 0, weight = 2861742528, duplicate = 32509}, {gw_index = 0, rule_id = 0, prefix_len = 50739, priority = 21762, weight = 21897, duplicate = 32}, {
            gw_index = 0, rule_id = 2992943152, prefix_len = 32509, priority = 0, weight = 809782320, duplicate = 32767}, {gw_index = 18160, rule_id = 32509, prefix_len = 41232, priority = 43770, weight = 32509, duplicate = 44720}, {gw_index = 32767, rule_id = 1216, 
            prefix_len = 0, priority = 0, weight = 1423251666, duplicate = 21897}, {gw_index = 31872, rule_id = 32509, prefix_len = 19336, priority = 12356, weight = 32767, duplicate = 19232}}
        rules = 0x7efd86889f60
        rule = 0x3837333334313030
        pl = 0x7efd8793d120
        gws = 0x7efd86d47500
        t = 0x7fff30444070
        furi = {user = {s = 0x7efdaa92b9d4 "+xxx at xxx", len = 13}, passwd = {s = 0x0, len = 0}, host = {s = 0x7efdaa92b9e2 "xxxx", len = 13}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {
            s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {
            s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        avp = 0x7efdaa64a29d
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
        __func__ = "ki_load_gws_furi"
#1  0x00007efda9eaac2a in load_gws (_m=0x7efdaa5846f0, argc=3, argv=0x5589550fb710 <mod_f_params+48>) at lcr_mod.c:2519
        ruri_user = {s = 0x7efdaa92b9a0 "+xxx", len = 13}
        from_uri = {s = 0x7efdaa92b9d0 "sip:+xxxxxxxxxx at xxx.xx.xx.xxx", len = 31}
        lcr_id = 1
        tmp = 0x7efdaa869f11 ""
        __func__ = "load_gws"
#2  0x0000558954c0bd9b in do_action (h=0x7fff3044aeb0, a=0x7efdaa86a610, msg=0x7efdaa5846f0) at core/action.c:1181
        ret = -5
        v = 1
        dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000(\001\000\000\000\000\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "(\001\000\000\000\000\000"}, sin6 = {
              sin6_family = 44720, sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "(\001", '\000' <repeats 13 times>, __u6_addr16 = {296, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {296, 0, 0, 0}}}, sin6_scope_id = 809783872}, sas = {
              ss_family = 44720, 
              __ss_padding = "D0\377\177\000\000(\001", '\000' <repeats 14 times>, "@RD0\377\177\000\000\355\225\310T\211U", '\000' <repeats 11 times>, "\333\376\210-}վ\240\340S\252\375~\000\000\000\000\000\000\002", '\000' <repeats 11 times>, "\322\030\325T\211U\000\000 \000\000\000\000\000\000\000\320RD0\377\177\000\000pSD0\377\177\000\000\211\366\315T\211U\000", __ss_align = 139627952720888}}, id = -1434074608, send_flags = {f = 32509, blst_imask = 0}, proto = -16 '\360', proto_pad0 = 70 'F', proto_pad1 = -21928}
        tmp = 0x7efdb264b030 <__syslog> "H\201\354", <incomplete sequence \330>
        new_uri = 0x200000000 <error: Cannot access memory at address 0x200000000>
        end = 0x200000000 <error: Cannot access memory at address 0x200000000>
        crt = 0x7fff30444ed0 ""
        cmd = 0x7efdaa5a2cd0
        len = 0
        user = 0
        uri = {user = {s = 0x558954ef1321 <split_frag+201> "\270", len = 128}, passwd = {s = 0x7efd8b863760 "\200", len = -1996563712}, host = {s = 0x7efd8b863760 "\200", len = 0}, port = {s = 0x0, len = 1426245171}, params = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, sip_params = {s = 0x7fff30445090 "\260QD0\377\177", len = 1421936895}, headers = {s = 0x35aa84bae8 <error: Cannot access memory at address 0x35aa84bae8>, len = 1025}, port_no = 0, 
          proto = 34386, type = 32509, flags = (unknown: 0x8b863760), transport = {s = 0x3a70697300000000 <error: Cannot access memory at address 0x3a70697300000000>, len = -1437055248}, ttl = {s = 0x7efdaa85ec60 "\320\t", len = 809783504}, user_param = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = -2041403312}, maddr = {s = 0x7fff30445038 "\030̅\252\375~", len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, transport_val = {s = 0x7fff30444fd0 "\300PD0\377\177", len = 1424983377}, ttl_val = {s = 0x72 <error: Cannot access memory at address 0x72>, len = 809783280}, user_param_val = {
            s = 0x40000000000020 <error: Cannot access memory at address 0x40000000000020>, len = -1434679252}, maddr_val = {s = 0x7fff304450c0 "", len = 1424795871}, method_val = {s = 0x7efdaa92b370 "sip:+xxxxxxx at xxx.xx.xxx;transport=TCP", len = 53}, 
          lr_val = {s = 0x7efdaa7c882d "request_uri)", len = 11}, r2_val = {s = 0x7efdaa584a18 "\202\263\222\252\375~", len = 809784016}, gr_val = {s = 0x7efdaa85cc18 "", len = -1437055248}}
        next_hop = {user = {s = 0x7fff304450e0 "", len = -1462450242}, passwd = {s = 0x7fff304452d0 "", len = -1434072040}, host = {s = 0x7efdaa5849f8 "t\263\222\252\375~", len = -1437055248}, port = {
            s = 0x7fff00000035 <error: Cannot access memory at address 0x7fff00000035>, len = -1996563712}, params = {s = 0x7fff304450ac "\375~", len = 0}, sip_params = {s = 0x0, len = 1426245171}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, 
            len = -1302024144}, port_no = 20912, proto = 12356, type = 32767, flags = (URI_USER_NORMALIZE | unknown: 0x54c1106c), transport = {s = 0x0, len = -1437055248}, ttl = {s = 0x7efdaa85ec60 "\320\t", len = 809807536}, user_param = {s = 0x0, len = 0}, maddr = {
            s = 0x0, len = -1}, method = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = -208022910}, lr = {s = 0x0, len = 1426245171}, r2 = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr = {
            s = 0x58a6da26ccb9d282 <error: Cannot access memory at address 0x58a6da26ccb9d282>, len = 1514263170}, transport_val = {s = 0x7efd00000000 <error: Cannot access memory at address 0x7efd00000000>, len = 53}, ttl_val = {s = 0x7efdaa7c882d "request_uri)", 
            len = 11}, user_param_val = {s = 0x0, len = -1996563712}, maddr_val = {s = 0x1000000000 <error: Cannot access memory at address 0x1000000000>, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, r2_val = {s = 0x7fff30445260 "pSD0\377\177", len = -1462314118}, gr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}}
        u = 0x558954c1106d <run_actions_safe+169>
        port = 0
        dst_host = 0x58a6da26c9d9d282
        i = 3
        flags = 0
        avp = 0x7efdaafc9330
        st = {flags = 1424947432, id = 21897, name = {n = -1954138112, s = {s = 0x7efd8b863800 "\020", len = -2041446400}, re = 0x7efd8b863800}, avp = 0x7efdaac78198}
        sct = 0x100000000
        sjt = 0x0
        rve = 0x7efdaafa7c80
        mct = 0x7efdaafcb790
        rv = 0x7efdaa86b748
        rv1 = 0x7efdaa5846f0
        c1 = {cache_type = 809784048, val_type = 32767, c = {avp_val = {n = 1423653555, s = {
                s = 0x558954db3ab3 <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 1}, re = 0x558954db3ab3 <rval_get_int+341>}, 
            pval = {rs = {s = 0x558954db3ab3 <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 1}, ri = -1437055248, flags = 32509}}, 
          i2s = "\202\263\222\252\375~\000\000\000\000\000\000\000\000\000\000x텪\375~"}
        s = {s = 0x7efdaa92b9d0 "sip:xxx at xxx", len = 31}
        srevp = {0x7fff304452d0, 0xbed57d2d88fedb00}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
                s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
              attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
              select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
              attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#3  0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa86a610, msg=0x7efdaa5846f0) at core/action.c:1584
        t = 0x7efdaa86a610
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
        tdiff = 809784496
        __func__ = "run_actions"
#4  0x0000558954bfdb07 in do_action (h=0x7fff3044aeb0, a=0x7efdaa860940, msg=0x7efdaa5846f0) at core/action.c:703
        ret = -5
        v = 0
        dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000\020\253\247\000\000\000\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "\020\253\247\000\000\000\000"}, sin6 = {
              sin6_family = 44720, sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "\020\253\247\000\000\000\000\000\260\063\265\000\000\000\000", __u6_addr16 = {43792, 167, 0, 0, 13232, 181, 0, 0}, __u6_addr32 = {10988304, 0, 11875248, 
                    0}}}, sin6_scope_id = 13940192}, sas = {ss_family = 44720, 
              __ss_padding = "D0\377\177\000\000\020\253\247\000\000\000\000\000\260\063\265\000\000\000\000\000\340\265\324\000\000\000\000\000\000\333\376\210-}վ,\001\000\000\002\000\000\000\000\333\376\210-}վ`*[\252\375~\000\000\030\r\202\252\375~\000\000\000\000\000\000\000\000\000\000\063\306\002U\211U\000\000 \000\000\000\000\000\000\000\060\260d\262\375~\000\000\260ZD0\377\177\000\000\306\017\333T\211U\000", __ss_align = 32}}, id = -1434317544, send_flags = {f = 32509, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', 
          proto_pad1 = 0}
        tmp = 0x130445be0 <error: Cannot access memory at address 0x130445be0>
        new_uri = 0x15 <error: Cannot access memory at address 0x15>
        end = 0x400000000 <error: Cannot access memory at address 0x400000000>
        crt = 0x7efdaa81ca60 "\340.\202\252\375~"
        cmd = 0x7efdaa8205a8
        len = -1996563712
        user = -1093305043
        uri = {user = {s = 0x7efdaa54a1f5 "", len = -1437294091}, passwd = {s = 0x7efd88e7bd30 "", len = 0}, host = {s = 0x7fff30445740 "\360WD0\377\177", len = -1462943338}, port = {s = 0x0, len = 809785192}, params = {s = 0x7fff30445770 "\021\001", len = 809785392}, 
          sip_params = {s = 0x7efd8b863550 "", len = 0}, headers = {s = 0x0, len = 0}, port_no = 22512, proto = 12356, type = 32767, flags = (URI_USER_NORMALIZE | unknown: 0xa8cc7f80), transport = {s = 0x7fff30445830 "\340\241T\252\375~", len = -1437055248}, ttl = {
            s = 0x4 <error: Cannot access memory at address 0x4>, len = -1996563712}, user_param = {s = 0x111 <error: Cannot access memory at address 0x111>, len = -1434319555}, maddr = {s = 0x7efd00000014 <error: Cannot access memory at address 0x7efd00000014>, 
            len = -1954139248}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = -1996563712}, r2 = {s = 0x0, len = -1996563712}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 1426245171}, ttl_val = {s = 0x20 <error: Cannot access memory at address 0x20>, 
            len = -1302024144}, user_param_val = {s = 0x7fff304458c0 "P_D0\377\177", len = -1462992004}, maddr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, method_val = {s = 0x7efdaa822f10 "\340.\202\252\375~", len = -1437055248}, lr_val = {
            s = 0x558954eef8e8 <qm_insert_free+59> "\005\363\003", len = 809786344}, r2_val = {s = 0x7efdaa54a1e0 "xxx", len = 21}, gr_val = {s = 0x40100000020 <error: Cannot access memory at address 0x40100000020>, len = 0}}
        next_hop = {user = {s = 0x7efd8652a068 "", len = 1424974825}, passwd = {s = 0x7fff304458a0 "", len = -1437343728}, host = {s = 0x7efd8b863540 "P", len = -1437343728}, port = {s = 0x7fff304458e0 "\020YD0\377\177", len = -1996563712}, params = {
            s = 0x7efd8b8635a0 "P", len = 0}, sip_params = {s = 0x0, len = 1426245171}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, port_no = 24400, proto = 12356, type = 32767, 
          flags = (URI_SIP_USER_PHONE | unknown: 0x54c01c34), transport = {s = 0x128 <error: Cannot access memory at address 0x128>, len = -1996563712}, ttl = {s = 0x7fff30445910 "\340YD0\377\177", len = -1437055248}, user_param = {s = 0x7efdaa823350 "\356\b", 
            len = 809787696}, maddr = {s = 0x7efdaa53ec30 "", len = 0}, method = {s = 0x7fff304459e0 "\220ZD0\377\177", len = 1424958313}, lr = {s = 0x7efdaa92b370 "sip:xxx at xxx;transport=TCP", len = -1437343728}, r2 = {
            s = 0x7fff30445960 "\220YD0\377\177", len = -1433226400}, gr = {s = 0x4c0 <error: Cannot access memory at address 0x4c0>, len = -1437343728}, transport_val = {s = 0x7efdaa92b330 "\020", len = -1433225152}, ttl_val = {s = 0x7fff30445990 "", len = 1424983377}, 
          user_param_val = {s = 0x4d <error: Cannot access memory at address 0x4d>, len = -1996563712}, maddr_val = {s = 0x1a00d4b5e0 <error: Cannot access memory at address 0x1a00d4b5e0>, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = -1996563712}, r2_val = {s = 0x7efdaa820d18 "\002", len = 0}, gr_val = {s = 0x0, len = 1426245171}}
        u = 0x7efdaa5846f0
        port = 181
        dst_host = 0xbed57d2d88fedb00
        i = 18
        flags = 0
        avp = 0x7efdaa5846f0
        st = {flags = 32, id = 0, name = {n = 0, s = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 0}, re = 0x200000000}, avp = 0x55895502c633}
        sct = 0x7efdaa858190
        sjt = 0x7efdaa96ae62
        rve = 0x7efdaa85ed70
        mct = 0x0
        rv = 0x7efdaa54a1e0
        rv1 = 0x7fff00000015
        c1 = {cache_type = 809786000, val_type = 32767, c = {avp_val = {n = 1423642494, s = {s = 0x558954db0f7e <rval_destroy_helper+1115> "\353\005\350ۑ\342\377\220H\213E\310dH+\004%(", len = 0}, re = 0x558954db0f7e <rval_destroy_helper+1115>}, pval = {rs = {
                s = 0x558954db0f7e <rval_destroy_helper+1115> "\353\005\350ۑ\342\377\220H\213E\310dH+\004%(", len = 0}, ri = -1434317544, flags = 32509}}, i2s = "\340[D0\377\177\000\000\200\005\202\252\375~\000\000x[D0\377\177"}
        s = {s = 0x7fff304456c0 "", len = 0}
        srevp = {0x20, 0x7efdb264b030 <__syslog>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
                s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
              attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
              select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
              attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#5  0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa84d5f0, msg=0x7efdaa5846f0) at core/action.c:1584
        t = 0x7efdaa860940
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
        tdiff = 809786592
        __func__ = "run_actions"
#6  0x0000558954bfdb07 in do_action (h=0x7fff3044aeb0, a=0x7efdaa824ec0, msg=0x7efdaa5846f0) at core/action.c:703
        ret = -5
        v = 0
        dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000ȅx\252\375~\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "ȅx\252\375~\000"}, sin6 = {sin6_family = 44720, 
              sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "ȅx\252\375~\000\000\000\000\000\000\000\000\000", __u6_addr16 = {34248, 43640, 32509, 0, 0, 0, 0, 0}, __u6_addr32 = {2860025288, 32509, 0, 0}}}, sin6_scope_id = 0}, sas = {
              ss_family = 44720, 
              __ss_padding = "D0\377\177\000\000ȅx\252\375~", '\000' <repeats 14 times>, "\377\177\000\000P\256\226\252\375~", '\000' <repeats 11 times>, "\333\376\210-}վ\250H[\252\375~\000\000\000\000\000\000\002", '\000' <repeats 11 times>, "\322\030\325T\211U\000\000 \000\000\000\000\000\000\000\060cD0\377\177\000\000\320cD0\377\177\000\000\211\366\315T\211U\000", __ss_align = 139627952462296}}, id = -1434335200, send_flags = {f = 32509, blst_imask = 0}, proto = -16 '\360', proto_pad0 = 70 'F', proto_pad1 = -21928}
        tmp = 0x55895502c633 "INFO"
        new_uri = 0x1390 <error: Cannot access memory at address 0x1390>
        end = 0x0
        crt = 0x20 <error: Cannot access memory at address 0x20>
        cmd = 0x7efdaa584a18
        len = -1466248417
        user = 32509
        uri = {user = {s = 0x558900000001 <error: Cannot access memory at address 0x558900000001>, len = 128}, passwd = {s = 0x7efd8b863380 "\200", len = -1996563712}, host = {s = 0x7efd8b863380 "\200", len = 0}, port = {s = 0x0, len = 1426245171}, params = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, sip_params = {s = 0x7fff304460f0 "\020bD0\377\177", len = 1421936895}, headers = {s = 0x0, len = 1426245171}, port_no = 32, proto = 0, type = ERROR_URI_T, 
          flags = (unknown: 0xb264b030), transport = {s = 0x7fff304460a0 "\340aD0\377\177", len = -1437055248}, ttl = {s = 0x7efdaa823350 "\356\b", len = 809787696}, user_param = {s = 0x7efdaa81ebb0 "\343\b", len = 809807536}, maddr = {s = 0x0, len = 0}, method = {
            s = 0x0, len = 1}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, transport_val = {s = 0x58a6da26e959d282 <error: Cannot access memory at address 0x58a6da26e959d282>, 
            len = 1514263170}, ttl_val = {s = 0x0, len = 809787472}, user_param_val = {s = 0x407efdaa53e230 <error: Cannot access memory at address 0x407efdaa53e230>, len = -1434679252}, maddr_val = {s = 0x7fff30446120 "paD0\377\177", len = 1424795871}, method_val = {
            s = 0x7efdaa96ae50 "\002", len = 53}, lr_val = {s = 0x7efdaa7c882d "request_uri)", len = 11}, r2_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, gr_val = {s = 0x72 <error: Cannot access memory at address 0x72>, len = 1426245171}}
        next_hop = {user = {s = 0x7efd8b863390 "@", len = -1954139232}, passwd = {s = 0x7fff30446140 " ", len = -1996563712}, host = {s = 0x7fff304461e0 "PcD0\377\177", len = 1423653555}, port = {s = 0x100000035 <error: Cannot access memory at address 0x100000035>, 
            len = -1996563712}, params = {s = 0x7fff304462a0 "", len = 0}, sip_params = {s = 0x0, len = 1426245171}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, port_no = 25104, proto = 12356, type = 32767, 
          flags = (URI_USER_NORMALIZE | unknown: 0x54c1106c), transport = {s = 0x0, len = -1437055248}, ttl = {s = 0x7efdaa823350 "\356\b", len = -1996563712}, user_param = {s = 0x7fff30446170 "\340F\202\252\375~", len = 0}, maddr = {s = 0x0, len = 1426245171}, 
          method = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, lr = {s = 0x7fff30446210 "PcD0\377\177", len = 1423531231}, r2 = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1437055248}, gr = {s = 0x7efdaa8246e0 "\002", 
            len = 809807536}, transport_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 53}, ttl_val = {s = 0x7efdaa7c882d "request_uri)", len = 11}, user_param_val = {s = 0x0, len = -1996563712}, maddr_val = {
            s = 0x1000000000 <error: Cannot access memory at address 0x1000000000>, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1996563712}, r2_val = {s = 0x7fff30446350 "\300dD0\377\177", 
            len = 0}, gr_val = {s = 0x0, len = 1426245171}}
        u = 0x7efdb264b030 <__syslog>
        port = 43603
        dst_host = 0x0
        i = 16
        flags = 32767
        avp = 0x7fff30445ed0
        st = {flags = 32, id = 0, name = {n = -1302024144, s = {s = 0x7efdb264b030 <__syslog> "H\201\354", <incomplete sequence \330>, len = 809787728}, re = 0x7efdb264b030 <__syslog>}, avp = 0x558954d92a55 <eval_elem+2278>}
        sct = 0x1600000001
        sjt = 0x0
        rve = 0xaaa5813c4
        mct = 0x7fff30445ed4
        rv = 0x0
        rv1 = 0x558954d90420 <check_self_op+83>
        c1 = {cache_type = 809788240, val_type = 32767, c = {avp_val = {n = 1423653453, s = {s = 0x558954db3a4d <rval_get_int+239> "H\213\225\370\376\377\377\211\002H\213\205\370\376\377\377\213", len = -1437055248}, re = 0x558954db3a4d <rval_get_int+239>}, pval = {
              rs = {s = 0x558954db3a4d <rval_get_int+239> "H\213\225\370\376\377\377\211\002H\213\205\370\376\377\377\213", len = -1437055248}, ri = 809807536, flags = 32767}}, i2s = "P\256\226\252\375~\000\000\000\000\000\000\000\000\000\000\070G\202\252\375~"}
        s = {s = 0x0, len = 0}
        srevp = {0x20, 0x7efdb264b030 <__syslog>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
                s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
              attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
              select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
              attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#7  0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa824ec0, msg=0x7efdaa5846f0) at core/action.c:1584
        t = 0x7efdaa824ec0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
        tdiff = 809788688
        __func__ = "run_actions"
#8  0x0000558954c01b16 in do_action (h=0x7fff3044aeb0, a=0x7efdaa8250e0, msg=0x7efdaa5846f0) at core/action.c:1070
        ret = 1
        v = 1
        dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000\220\005\000\000\000\000\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "\220\005\000\000\000\000\000"}, sin6 = {
              sin6_family = 44720, sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "\220\005", '\000' <repeats 13 times>, __u6_addr16 = {1424, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {1424, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {
              ss_family = 44720, 
              __ss_padding = "D0\377\177\000\000\220\005", '\000' <repeats 22 times>, "\322\030\325T\211U", '\000' <repeats 11 times>, "\333\376\210-}վ\230\323v\252\375~", '\000' <repeats 18 times>, "\322\030\325T\000\020\000\000\000\004\000\000\n\000\000\000 at mD0\377\177\000\000\000lD0\377\177\000\000\211\366\315T\211U\000", __ss_align = 139627951675592}}, id = -1435120096, send_flags = {f = 32509, blst_imask = 0}, proto = -16 '\360', proto_pad0 = 70 'F', proto_pad1 = -21928}
        tmp = 0x7efda8d4ab06 <sint2str+47> "\311\303UH\211\345H\211}\350\211u\344\211U\340\213E\340H\215P\377H\213E\350H\001\320H\211E\370\353\037H\213E\370\017\266"
        new_uri = 0x5589551b6391 <ut_buf_int2str+17> "5000"
        end = 0x0
        crt = 0x7fff30446684 ""
        cmd = 0x7fff30446680
        len = 0
        user = 0
        uri = {user = {s = 0x0, len = 1426245171}, passwd = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1996563712}, host = {s = 0x7fff304467a0 "\300gD0\377\177", len = 0}, port = {s = 0x0, len = 1426245171}, params = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, sip_params = {s = 0x7fff30446920 "@jD0\377\177", len = 1421936895}, headers = {s = 0x5589551b6391 <ut_buf_int2str+17> "5000", len = -1996563712}, port_no = 26560, proto = 12356, 
          type = 32767, flags = (URI_SIP_USER_PHONE | unknown: 0xa8d4ab04), transport = {s = 0x7fff304467f4 "", len = -1437055248}, ttl = {s = 0x7efdaa7807f0 "C\a", len = 809789792}, user_param = {s = 0x7fff304467f0 "", len = 809789808}, maddr = {
            s = 0x7efdaa771d48 "\001", len = -1437055248}, method = {s = 0x0, len = 1427858321}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 809789808}, transport_val = {s = 0x7efdaa771d30 "\017", 
            len = -1437055248}, ttl_val = {s = 0x7fff30446870 "0iD0\377\177", len = 0}, user_param_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 809790536}, maddr_val = {s = 0x7efdaa76d3b8 "", len = -1437055248}, method_val = {
            s = 0x7fff30446930 "\360FX\252\375~", len = 1423240445}, lr_val = {s = 0x0, len = 809790536}, r2_val = {s = 0x7efdaa76d3a0 "\026", len = -1996563712}, gr_val = {s = 0x7fff30446a10 "\200kD0\377\177", len = 0}}
        next_hop = {user = {s = 0x0, len = 1423251666}, passwd = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 809789808}, host = {s = 0x7fff30446a10 "\200kD0\377\177", len = 1423654338}, port = {s = 0x7efdaa5846f0 "jS\033", len = -1996563712}, 
          params = {s = 0x7fff30446920 "@jD0\377\177", len = 0}, sip_params = {s = 0x0, len = 1426245171}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, port_no = 27200, proto = 12356, type = 32767, 
          flags = (URI_USER_NORMALIZE | unknown: 0x54c1106c), transport = {s = 0x7efdaa5846f0 "jS\033", len = -1437055248}, ttl = {s = 0x7efdaa7807f0 "C\a", len = 809807536}, user_param = {s = 0x7fff30446c40 "", len = 0}, maddr = {s = 0x0, len = 1}, method = {
            s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = -2131111294}, lr = {s = 0x0, len = 1426245171}, r2 = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr = {
            s = 0x58a6da269d99d282 <error: Cannot access memory at address 0x58a6da269d99d282>, len = 1514263170}, transport_val = {s = 0x7efd00000000 <error: Cannot access memory at address 0x7efd00000000>, len = 1}, ttl_val = {s = 0x7efdaa62424d "acc_request_source)", 
            len = -1996563712}, user_param_val = {s = 0x7fff30446a30 "\200kD0\377\177", len = -1996563712}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, 
          r2_val = {s = 0x7fff30446b80 "\360lD0\377\177", len = 1423675477}, gr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}}
        u = 0x7efdaa5846f0
        port = 65535
        dst_host = 0x0
        i = 66
        flags = 0
        avp = 0x7efdaa76c1e0
        st = {flags = 2858662608, id = 32509, name = {n = 19, s = {s = 0x7efd00000013 <error: Cannot access memory at address 0x7efd00000013>, len = 809789416}, re = 0x7efd00000013}, avp = 0x1600000000}
        sct = 0x7efdaa5846f0
        sjt = 0x0
        rve = 0x7efdaa824730
        mct = 0x7efdaa760948
        rv = 0x7fff30446650
        rv1 = 0x7fff304467f0
        c1 = {cache_type = 809790336, val_type = 32767, c = {avp_val = {n = 1423653555, s = {
                s = 0x558954db3ab3 <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = -1437055248}, 
              re = 0x558954db3ab3 <rval_get_int+341>}, pval = {rs = {s = 0x558954db3ab3 <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", 
                len = -1437055248}, ri = 809807536, flags = 32767}}, i2s = "@lD0\377\177\000\000\000\000\000\000\000\000\000\000\350\020x\252\375~"}
        s = {s = 0x7fff30446788 "\377\b\301T\211U", len = 0}
        srevp = {0x7fff30446b80, 0xbed57d2d88fedb00}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
                s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
              attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
              select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
              attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#9  0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa81c230, msg=0x7efdaa5846f0) at core/action.c:1584
        t = 0x7efdaa8250e0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
        tdiff = 809790784
        __func__ = "run_actions"
#10 0x0000558954bfdb07 in do_action (h=0x7fff3044aeb0, a=0x7efdaa783a40, msg=0x7efdaa5846f0) at core/action.c:703
        ret = -5
        v = 1
        dst = {send_sock = 0x13c4, to = {s = {sa_family = 50739, sa_data = "\002U\211U\000\000 \000\000\000\000\000\000"}, sin = {sin_family = 50739, sin_port = 21762, sin_addr = {s_addr = 21897}, sin_zero = " \000\000\000\000\000\000"}, sin6 = {sin6_family = 50739, 
              sin6_port = 21762, sin6_flowinfo = 21897, sin6_addr = {__in6_u = {__u6_addr8 = " \000\000\000\000\000\000\000\060\260d\262\375~\000", __u6_addr16 = {32, 0, 0, 0, 45104, 45668, 32509, 0}, __u6_addr32 = {32, 0, 2992943152, 32509}}}, 
              sin6_scope_id = 809792416}, sas = {ss_family = 50739, 
              __ss_padding = "\002U\211U\000\000 \000\000\000\000\000\000\000\060\260d\262\375~\000\000\240sD0\377\177\000\000\253f\366\250\375~\000\000\360rD0\377\177\000\000\000\333\376\210-}վ\260~[\252\375~\000\000\000\000\000\000\002", '\000' <repeats 11 times>, "\322\030\325T\211U\000\000 \000\000\000\000\000\000\000\220sD0\377\177\000\000\060tD0\377\177\000\000\211\366\315T\211U\000", __ss_align = 139627950435128}}, id = -1436358080, send_flags = {f = 32509, blst_imask = 0}, proto = -16 '\360', proto_pad0 = 70 'F', 
          proto_pad1 = -21928}
        tmp = 0x200000000 <error: Cannot access memory at address 0x200000000>
        new_uri = 0x558954e2d2ae <cmp_hdrname_str+1259> "H\213]\310dH+\034%("
        end = 0x0
        crt = 0x0
        cmd = 0x7efdaa5a9d30
        len = 0
        user = 2
        uri = {user = {s = 0x558954ef1321 <split_frag+201> "\270", len = 80}, passwd = {s = 0x7efd8b862c90 "P", len = -2041446400}, host = {s = 0x7efd8b862c90 "P", len = 30624}, port = {s = 0x7efd8b862cf0 "P", len = -1954140928}, params = {
            s = 0x7fff30447060 "\220pD0\377\177", len = 1424954550}, sip_params = {s = 0x50 <error: Cannot access memory at address 0x50>, len = -2041446400}, headers = {s = 0xa <error: Cannot access memory at address 0xa>, len = 1025}, port_no = 0, proto = 34386, 
          type = 32509, flags = (unknown: 0x8b862c90), transport = {s = 0x7fff30447670 "\020xD0\377\177", len = -1996563712}, ttl = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, 
            len = -2041403312}, maddr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, method = {s = 0x130447060 <error: Cannot access memory at address 0x130447060>, len = -2041403312}, lr = {s = 0x7fff30447060 "\220pD0\377\177", len = 1424947257}, 
          r2 = {s = 0x0, len = -2041403312}, gr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, transport_val = {s = 0x7fff30447090 "\200qD0\377\177", len = 1424983377}, ttl_val = {s = 0x41 <error: Cannot access memory at address 0x41>, 
            len = 809791664}, user_param_val = {s = 0x87efdaa8e4f50 <error: Cannot access memory at address 0x87efdaa8e4f50>, len = -1436512180}, maddr_val = {s = 0x7fff30447180 "\320qD0\377\177", len = 1424795871}, method_val = {s = 0x7efdaa80e380 "30013", len = 5}, 
          lr_val = {s = 0x7efdaa60904d "peer_in_id)", len = 10}, r2_val = {s = 0x7fff304471c0 "", len = 1422279978}, gr_val = {s = 0x41 <error: Cannot access memory at address 0x41>, len = 0}}
        next_hop = {user = {s = 0x7efd8b862ca0 "\b", len = -1954141008}, passwd = {s = 0x30363035304475e7 <error: Cannot access memory at address 0x30363035304475e7>, len = 0}, host = {s = 0x0, len = 1426245171}, port = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, params = {s = 0x7fff30447260 " s\001", len = -1462359849}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x7efdaa6036f0 "", len = -1996563712}, port_no = 57800, proto = 43618, 
          type = 32509, flags = (URI_USER_NORMALIZE | unknown: 0x4), transport = {s = 0x0, len = 1426245171}, ttl = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, user_param = {s = 0x7fff304471d0 "0rD0\377\177", len = 1424796052}, maddr = {
            s = 0x7efdaa80e380 "30013", len = 5}, method = {s = 0x7efdaa60904d "peer_in_id)", len = 10}, lr = {s = 0x11300000000 <error: Cannot access memory at address 0x11300000000>, len = 1427857984}, r2 = {s = 0x0, len = -1954141024}, gr = {
            s = 0x7fff30447230 " sD0\377\177", len = 1424796326}, transport_val = {s = 0x7efdaa80e380 "30013", len = 5}, ttl_val = {s = 0x7efdaa60904d "peer_in_id)", len = 10}, user_param_val = {s = 0x0, len = 0}, maddr_val = {
            s = 0x1000000000 <error: Cannot access memory at address 0x1000000000>, len = 1427857984}, method_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, lr_val = {s = 0x7fff30447320 "0tD0\377\177", len = -1462317108}, r2_val = {
            s = 0x7fff30447390 "", len = 0}, gr_val = {s = 0x7efdaa609000 "", len = -1437055248}}
        u = 0x55895502c633
        port = 35070
        dst_host = 0x55895502c633
        i = 14
        flags = 32509
        avp = 0x20
        st = {flags = 1424947432, id = 21897, name = {n = -1954140928, s = {s = 0x7efd8b862d00 "P", len = -2041446400}, re = 0x7efd8b862d00}, avp = 0x7efdaa5846f0}
        sct = 0xa00000000
        sjt = 0x7fff30447020
        rve = 0x7efdaa7810e0
        mct = 0x7fff30446f60
        rv = 0x0
        rv1 = 0x558954e2cd7c <cmpi_str+154>
        c1 = {cache_type = 2858447024, val_type = 32509, c = {avp_val = {n = 809792400, s = {s = 0x7fff30447390 "", len = -1436512179}, re = 0x7fff30447390}, pval = {rs = {s = 0x7fff30447390 "", len = -1436512179}, ri = 10, flags = 32509}}, 
          i2s = "\200〪\375~\000\000\005\000\000\000\000\000\000\000P~D0\377\177"}
        s = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1424149884}
        srevp = {0x400017320, 0x300000000}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
                s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
              attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
              select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
              attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#11 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa74a9f0, msg=0x7efdaa5846f0) at core/action.c:1584
        t = 0x7efdaa783a40
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 1426245171, tz_dsttime = 21897}
        tdiff = 0
        __func__ = "run_actions"
#12 0x0000558954bfdb07 in do_action (h=0x7fff3044aeb0, a=0x7efdaa6161b0, msg=0x7efdaa5846f0) at core/action.c:703
        ret = -5
        v = 1
        dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000\260{D0\377\177\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "\260{D0\377\177\000"}, sin6 = {sin6_family = 44720, 
              sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "\260{D0\377\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {31664, 12356, 32767, 0, 0, 0, 0, 0}, __u6_addr32 = {809794480, 32767, 0, 0}}}, sin6_scope_id = 809794848}, 
            sas = {ss_family = 44720, 
              __ss_padding = "D0\377\177\000\000\260{D0\377\177\000\000\000\000\000\000\000\000\000\000 }D0\377\177", '\000' <repeats 19 times>, "\333\376\210-}վ\000\000\000\000\000\000\240\356\000\000\000\000\002", '\000' <repeats 11 times>, "\322\030\325T0u\000\000=u\000\000\021\000\000\000\240}D0\377\177\000\000`|D0\377\177\000\000\211\366\315T\211U\000", __ss_align = 139627950425864}}, id = -1436367744, send_flags = {f = 32509, blst_imask = 0}, proto = -16 '\360', proto_pad0 = 70 'F', proto_pad1 = -21928}
        tmp = 0x200000000 <error: Cannot access memory at address 0x200000000>
        new_uri = 0x0
        end = 0x7efdaa607130 ""
        crt = 0x0
        cmd = 0x7fff30447740
        len = 809793000
        user = 32767
        uri = {user = {s = 0x7fff30447c38 "", len = 809793632}, passwd = {s = 0x0, len = 1423251666}, host = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 809793632}, port = {s = 0x7fff30447900 "pzD0\377\177", len = 1423656503}, params = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, sip_params = {s = 0x7fff30447980 "\240zD0\377\177", len = 0}, headers = {s = 0x7efdaa6143a8 "\a", len = 809794616}, port_no = 18160, proto = 43608, type = 32509, 
          flags = (unknown: 0x3044aeb0), transport = {s = 0x7fff30447930 "\240Ca\252\375~", len = 0}, ttl = {s = 0x7efdaa62cfa0 "m\004", len = 809793984}, user_param = {s = 0x7fff30447860 "", len = 1426245171}, maddr = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7efdaa62afb8 "", len = -1437055248}, transport_val = {s = 0x7efdaa62afb8 "", len = -1437055248}, 
          ttl_val = {s = 0x0, len = 16}, user_param_val = {s = 0x7efdab04f2d0 "", len = -1996563712}, maddr_val = {s = 0x7fff304478f0 " ", len = -1996563712}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 1426245171}, r2_val = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr_val = {s = 0x7fff30447a70 "\340{D0\377\177", len = 1423675477}}
        next_hop = {user = {s = 0x7fff30447950 "\220zD0\377\177", len = -1996563712}, passwd = {s = 0x7efdaa53e010 "\001", len = 0}, host = {s = 0x7efdaa6143a0 "\001", len = 809794616}, port = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, params = {
            s = 0x7fff30447a90 "\300{D0\377\177", len = 0}, sip_params = {s = 0x7efdaa615188 "\001", len = 809794620}, headers = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, port_no = 31392, proto = 12356, type = 32767, flags = 0, transport = {s = 0x7fff304479d0 "", 
            len = -1437055248}, ttl = {s = 0x0, len = 809807536}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 1}, method = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = -1581657470}, lr = {s = 0x0, len = 1426245171}, r2 = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr = {s = 0x58a6da26bd59d282 <error: Cannot access memory at address 0x58a6da26bd59d282>, len = 1514263170}, transport_val = {
            s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = -1996563712}, ttl_val = {s = 0x19aa53e618 <error: Cannot access memory at address 0x19aa53e618>, len = 0}, user_param_val = {s = 0x0, len = -1996563712}, maddr_val = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, r2_val = {s = 0x7fff30447be0 "P}D0\377\177", len = 1423675477}, 
          gr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}}
        u = 0x55895502c633
        port = 0
        dst_host = 0xbed57d2d88fedb00
        i = 9
        flags = 0
        avp = 0x20
        st = {flags = 0, id = 32767, name = {n = 1445170114, s = {
              s = 0x558956238bc2 "X-Src-Addr: xxx;udp\r\nX-Src-Peer: 30013\r\nContact: <sip:btpsh-6137d4b2-61bc-3ce509-leg1 at xxx:5060;transport=tcp>\r\n\r\nv=0\r\no=- 461374211 461374211 IN IP4 xxx\r\ns=xxx\r\nc=IN"..., len = 10}, 
            re = 0x558956238bc2}, avp = 0x7efdaa5846f0}
        sct = 0x7efdaa5846f0
        sjt = 0x30447850
        rve = 0x7fff30447860
        mct = 0x7efdaa6143c8
        rv = 0x7fff304476c0
        rv1 = 0x558954e2cd7c <cmpi_str+154>
        c1 = {cache_type = 2858504576, val_type = 32509, c = {avp_val = {n = 809794620, s = {s = 0x7fff30447c3c "", len = -1437055248}, re = 0x7fff30447c3c}, pval = {rs = {s = 0x7fff30447c3c "", len = -1437055248}, ri = 809807536, flags = 32767}}, 
          i2s = "\200\376\022V\211U", '\000' <repeats 14 times>, "\375~"}
        s = {s = 0x7fff304477c0 "", len = 1423240445}
        srevp = {0x7fff30447bc0, 0xbed57d2d88fedb00}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
                s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
              attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
              select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
              attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#13 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa616000, msg=0x7efdaa5846f0) at core/action.c:1584
        t = 0x7efdaa6161b0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
        tdiff = 809794976
        __func__ = "run_actions"
#14 0x0000558954c01b16 in do_action (h=0x7fff3044aeb0, a=0x7efdaa616470, msg=0x7efdaa5846f0) at core/action.c:1070
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, 
              sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, 
              __ss_padding = '\000' <repeats 38 times>, "\002", '\000' <repeats 11 times>, "\005\000\000\000h\202[\252\375~\000\000\000\000\000\000\375~\000\000\060\204D0\377\177\000\000i#\357T N\000\000=u\000\000\021\000\000\000ЅD0\377\177\000\000\250\005\003U\211U\000\000\000\333\376\210-}վ", __ss_align = 768}}, id = 2, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x0
        end = 0x7efdaa607130 ""
        crt = 0x558956238907 "sip:+xxx at xxx;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP xxx:5060;branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>;tag=3d"...
        cmd = 0x7efdaa5ba500
        len = 1424796052
        user = 21897
        uri = {user = {s = 0x7fff30448468 "", len = 809795728}, passwd = {s = 0x0, len = 1423251666}, host = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 809795728}, port = {s = 0x7fff30448130 "\240\202D0\377\177", len = 1423656503}, params = {
            s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 122344320}, sip_params = {s = 0xa7a3e0 <error: Cannot access memory at address 0xa7a3e0>, len = 0}, headers = {s = 0x7efdaa612748 "\a", len = 809796712}, port_no = 18160, proto = 43608, 
          type = 32509, flags = (unknown: 0x3044aeb0), transport = {s = 0x7fff30448070 "@\201D0\377\177", len = 0}, ttl = {s = 0x0, len = -1426974192}, user_param = {s = 0x7fff30448090 "", len = 0}, maddr = {s = 0x7fff30448140 "\240\201D0\377\177", len = 1424958313}, 
          method = {s = 0x7efdaa92b8a0 "\300\210\222\252\375~", len = -1437343728}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = -1437343728}, gr = {s = 0x7efdaa92b840 "0", len = -1433224624}, transport_val = {s = 0x2a0 <error: Cannot access memory at address 0x2a0>, 
            len = -1433226400}, ttl_val = {s = 0x4c0 <error: Cannot access memory at address 0x4c0>, len = -1437343728}, user_param_val = {s = 0x7efdaa92b330 "\020", len = -1433225152}, maddr_val = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, 
            len = -1996563712}, method_val = {s = 0xa7a800 <error: Cannot access memory at address 0xa7a800>, len = 0}, lr_val = {s = 0x0, len = 1426245171}, r2_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr_val = {
            s = 0x7fff304482a0 "\020\204D0\377\177", len = 1423675477}}
        next_hop = {user = {s = 0x7fff304481a0 "\360FX\252\375~", len = -1466248417}, passwd = {s = 0x0, len = 0}, host = {s = 0x7efdaa612740 "\001", len = 809796712}, port = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, params = {
            s = 0xd4b5e0 <error: Cannot access memory at address 0xd4b5e0>, len = 0}, sip_params = {s = 0x7efdaa613528 "\001", len = 809796716}, headers = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {
            s = 0x7efdaa53ec30 "", len = 0}, ttl = {s = 0x0, len = 1424954698}, user_param = {s = 0x400 <error: Cannot access memory at address 0x400>, len = -1437343728}, maddr = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -1437055248}, method = {
            s = 0x7efdaa53e010 "\001", len = -1433226400}, lr = {s = 0x7efdaaf21a10 "\300\210\222\252\375~", len = 6}, r2 = {s = 0x7efda8f30010 "sl:local-response", len = 17}, gr = {s = 0x58a6da2752f9d282 <error: Cannot access memory at address 0x58a6da2752f9d282>, 
            len = 1445170245}, transport_val = {s = 0x0, len = 1445170508}, ttl_val = {s = 0x0, len = -1996563712}, user_param_val = {s = 0x7fff304486a0 "\220\357Y\252\375~", len = -1996563712}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 1426245171}, 
          lr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, r2_val = {s = 0x7fff30448410 "\200\205D0\377\177", len = 1423675477}, gr_val = {s = 0x7efdaa59ef90 "\377\377\377\377", len = 0}}
        u = 0x35
        port = 45668
        dst_host = 0xbed57d2d88fedb00
        i = -2008929216
        flags = 32767
        avp = 0x558955111180 <buff>
        st = {flags = 980445555, id = 13099, name = {n = 858928436, s = {s = 0x3832323533323534 <error: Cannot access memory at address 0x3832323533323534>, len = 1769160761}, re = 0x3832323533323534}, avp = 0x7465732e69662e65}
        sct = 0x7efdaa5846f0
        sjt = 0x0
        rve = 0x7efdaa615870
        mct = 0x7efdaa612768
        rv = 0xd4b5e0
        rv1 = 0x55890000000d
        c1 = {cache_type = 2858497312, val_type = 32509, c = {avp_val = {n = 809796716, s = {s = 0x7fff3044846c "", len = -1437055248}, re = 0x7fff3044846c}, pval = {rs = {s = 0x7fff3044846c "", len = -1437055248}, ri = 809807536, flags = 32767}}, 
          i2s = "\000\000\000\000\000\000\000\000\360FX\252\375~\000\000\000\000\000\000\000"}
        s = {s = 0x7fff30447ff0 "0\201D0\377\177", len = 1423240445}
        srevp = {0x800000000, 0x7efda8b6ecea}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
                s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
              attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
              select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
              attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#15 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa616470, msg=0x7efdaa5846f0) at core/action.c:1584
        t = 0x7efdaa616470
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
        tdiff = 809797072
        __func__ = "run_actions"
#16 0x0000558954c01b16 in do_action (h=0x7fff3044aeb0, a=0x7efdaa616690, msg=0x7efdaa5846f0) at core/action.c:1070
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, 
              sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, 
              __ss_padding = '\000' <repeats 31 times>, "\333\376\210-}վ", '\000' <repeats 12 times>, "\002", '\000' <repeats 11 times>, "\063\306\002U\211U\000\000 \000\000\000\000\000\000\000\060\260d\262\020'\000\000=u\000\000\023\000\000\000\000\216D0\377\177\000\000\300\214D0\377\177\000\000\360FX\252\375~\000", __ss_align = 139627950287840}}, id = 809807536, send_flags = {f = 32767, blst_imask = 0}, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x558954e2b064 <unescape_user+3267> "\203\370\002\017\216 \003"
        new_uri = 0x0
        end = 0x7efdaa607130 ""
        crt = 0x0
        cmd = 0x0
        len = 0
        user = 1
        uri = {user = {s = 0x7fff30448c98 "", len = 809797824}, passwd = {s = 0x0, len = 1423251666}, host = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 809797824}, port = {s = 0x7fff30448960 "ЊD0\377\177", len = 1423656503}, params = {
            s = 0x7fff304488f0 "\200\250\247", len = -1996563712}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x7efdaa610828 "\a", len = 809798808}, port_no = 18160, proto = 43608, type = 32509, flags = (unknown: 0x3044aeb0), transport = {
            s = 0x7fff30448f00 "\350\353`\252\375~", len = 0}, ttl = {s = 0x7efdaac2c740 "2\023", len = 1424974825}, user_param = {s = 0x7fff304488c0 "", len = -1437055248}, maddr = {s = 0x7efdaa609b40 "\027\004", len = 809799904}, method = {
            s = 0x10 <error: Cannot access memory at address 0x10>, len = -1437343728}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 122343136}, transport_val = {
            s = 0xa7a880 <error: Cannot access memory at address 0xa7a880>, len = 11874592}, ttl_val = {s = 0xd4b5e0 <error: Cannot access memory at address 0xd4b5e0>, len = 16}, user_param_val = {s = 0x131 <error: Cannot access memory at address 0x131>, 
            len = -1996563712}, maddr_val = {s = 0x7fff30448950 " ", len = -1996563712}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 1426245171}, r2_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr_val = {
            s = 0x7fff30448ad0 "@\214D0\377\177", len = 1423675477}}
        next_hop = {user = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 1}, passwd = {s = 0x7efdaa53e010 "\001", len = -1434393744}, host = {s = 0x7efdaa610820 "\001", len = 809798808}, port = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, params = {
            s = 0x7fff304489e0 "", len = 0}, sip_params = {s = 0x7efdaa611608 "\001", len = 809798812}, headers = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, port_no = 0, proto = 0, type = 32767, flags = 0, transport = {s = 0x0, len = 1426245171}, ttl = {s = 0x0, 
            len = -1302024144}, user_param = {s = 0x7fff30448ad0 "@\214D0\377\177", len = -1462135749}, maddr = {s = 0x7efdaa60904d "peer_in_id)", len = 10}, method = {s = 0x7fff30448b20 "\v-\206\213\375~", len = -1436520144}, lr = {
            s = 0x111aa602728 <error: Cannot access memory at address 0x111aa602728>, len = 1427857984}, r2 = {s = 0x800000111 <error: Cannot access memory at address 0x800000111>, len = -1436512179}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, 
          ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = -1996563712}, maddr_val = {s = 0x1000000000 <error: Cannot access memory at address 0x1000000000>, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, r2_val = {s = 0x7fff30448c40 "\260\215D0\377\177", len = 1423675477}, gr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}}
        u = 0x0
        port = 12356
        dst_host = 0xbed57d2d88fedb00
        i = 0
        flags = 0
        avp = 0x7fff30448950
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = -2041446400}, re = 0x0}, avp = 0x7efdb264b030 <__syslog>}
        sct = 0x7efdaa5846f0
        sjt = 0x0
        rve = 0x7efdaa613c10
        mct = 0x7efdaa610848
        rv = 0x7fff304487d0
        rv1 = 0x7fff30448c20
        c1 = {cache_type = 2858489344, val_type = 32509, c = {avp_val = {n = 809798812, s = {s = 0x7fff30448c9c "", len = -1437055248}, re = 0x7fff30448c9c}, pval = {rs = {s = 0x7fff30448c9c "", len = -1437055248}, ri = 809807536, flags = 32767}}, 
          i2s = "\v-\206\213\375~\000\000\005\000\000\000\375~\000\000\000\000\000\000\000"}
        s = {s = 0x7fff30448820 "`\211D0\377\177", len = 1423240445}
        srevp = {0x7fff30448c20, 0xfe54d4ecfd}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
                s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
              attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
              select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
              attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#17 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa616690, msg=0x7efdaa5846f0) at core/action.c:1584
        t = 0x7efdaa616690
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
        tdiff = 809799168
        __func__ = "run_actions"
#18 0x0000558954c01b6c in do_action (h=0x7fff3044aeb0, a=0x7efdaa6167a0, msg=0x7efdaa5846f0) at core/action.c:1074
        ret = 1
        v = 0
        dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 60360, sa_data = "`\252\375~\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 60360, sin_port = 43616, sin_addr = {s_addr = 32509}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 60360, sin6_port = 43616, sin6_flowinfo = 32509, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 60360, 
              __ss_padding = "`\252\375~", '\000' <repeats 30 times>, "\001", '\000' <repeats 12 times>, "\333\376\210-}վ", '\000' <repeats 12 times>, "\002", '\000' <repeats 35 times>, "\360\224D0\377\177\000\000J\363\315T\211U\000", __ss_align = 139627950275960}}, 
          id = -1436517248, send_flags = {f = 32509, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7fff304493c8 ""
        new_uri = 0x5589ffffffff <error: Cannot access memory at address 0x5589ffffffff>
        end = 0x0
        crt = 0x7efdaa60ebe8 "\002"
        cmd = 0x0
        len = -1437343728
        user = 5
        uri = {user = {s = 0x7fff30449190 "\260\221D0\377\177", len = 0}, passwd = {s = 0x7efd8b862bb0 "0", len = -1996563712}, host = {s = 0x7efd8b862bb0 "0", len = 0}, port = {s = 0x7efdaa60c380 "\001", len = 809800168}, params = {s = 0x7efdaa5846f0 "jS\033", 
            len = 809807536}, sip_params = {s = 0x7fff30449210 "0\223D0\377\177", len = -1996563712}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x30449400), transport = {s = 0x7efdaa60f2b8 "\001", len = 809800540}, 
          ttl = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, user_param = {s = 0x7efdaa609b40 "\027\004", len = 0}, maddr = {s = 0x7fff30449400 "", len = -1436486984}, method = {s = 0x0, len = 809807536}, lr = {
            s = 0x1aa607130 <error: Cannot access memory at address 0x1aa607130>, len = 0}, r2 = {s = 0x7fff304491c0 "", len = 809800648}, gr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 809800288}, transport_val = {s = 0x7efdaa60e2b0 "\017", 
            len = -1437055248}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x131 <error: Cannot access memory at address 0x131>, len = -1996563712}, maddr_val = {s = 0x7fff30449180 " ", len = -1996563712}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, 
            len = 1426245171}, r2_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr_val = {s = 0x7fff304491b0 "", len = 1423642566}}
        next_hop = {user = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, passwd = {s = 0x7fff30449300 "p\224D0\377\177", len = 1423692045}, host = {s = 0x7fff30449300 "p\224D0\377\177", len = 1423656503}, port = {s = 0x7efdaa5846f0 "jS\033", 
            len = 809807536}, params = {s = 0x7fff30449400 "", len = -1436486992}, sip_params = {s = 0x7fff3044935c "\001", len = 809800576}, headers = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, port_no = 37680, proto = 12356, type = 32767, flags = 0, transport = {
            s = 0x0, len = -1437055248}, ttl = {s = 0x130449260 <error: Cannot access memory at address 0x130449260>, len = 809807536}, user_param = {s = 0x1aa60f2b8 <error: Cannot access memory at address 0x1aa60f2b8>, len = -1436488760}, maddr = {s = 0x0, len = 1}, 
          method = {s = 0x1a00000000 <error: Cannot access memory at address 0x1a00000000>, len = 809800908}, lr = {s = 0x0, len = 1426245171}, r2 = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr = {
            s = 0x58a6da2773b9d282 <error: Cannot access memory at address 0x58a6da2773b9d282>, len = 1514263170}, transport_val = {s = 0x0, len = -1996563712}, ttl_val = {s = 0x7efdaa5f9e0d "p-flags)", len = 0}, user_param_val = {s = 0x0, len = 1426245171}, 
          maddr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, method_val = {s = 0x7fff30449300 "p\224D0\377\177", len = 1423642566}, lr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1436488760}, r2_val = {
            s = 0x7fff30449470 "\340\225D0\377\177", len = 1423678076}, gr_val = {s = 0x0, len = 1426245171}}
        u = 0x7efdaa5846f0
        port = 21704
        dst_host = 0x0
        i = -1437341824
        flags = 0
        avp = 0x7efdaa609b40
        st = {flags = 32, id = 0, name = {n = -1302024144, s = {s = 0x7efdb264b030 <__syslog> "H\201\354", <incomplete sequence \330>, len = 809799856}, re = 0x7efdb264b030 <__syslog>}, avp = 0x558954d4ecfd <pv_get_spec_value+995>}
        sct = 0x7fff00000015
        sjt = 0x0
        rve = 0x7efdaa611cf0
        mct = 0x7efdaa5614c0
        rv = 0x7efdaa5846f0
        rv1 = 0x7fff304490e0
        c1 = {cache_type = 2858482080, val_type = 32509, c = {avp_val = {n = 809800908, s = {s = 0x7fff304494cc "", len = -1437055248}, re = 0x7fff304494cc}, pval = {rs = {s = 0x7fff304494cc "", len = -1437055248}, ri = 809807536, flags = 32767}}, 
          i2s = "`\204`\252\375~\000\000\001\000\000\000\001\000\000\000\000\000\000\000\375~"}
        s = {s = 0x0, len = 0}
        srevp = {0x7fff30449450, 0xbed57d2d88fedb00}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
                s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
              attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
              select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
              attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#19 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa6167a0, msg=0x7efdaa5846f0) at core/action.c:1584
        t = 0x7efdaa6167a0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
        tdiff = 809801264
        __func__ = "run_actions"
#20 0x0000558954c01b16 in do_action (h=0x7fff3044aeb0, a=0x7efdaa6168b0, msg=0x7efdaa5846f0) at core/action.c:1070
        ret = 1
        v = 1
        dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 44720, sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 2}, sas = {ss_family = 44720, 
              __ss_padding = "D0\377\177", '\000' <repeats 18 times>, "\002\000\000\000\000\000\000\000\060\260d\262\375~", '\000' <repeats 18 times>, "xX[\252\375~", '\000' <repeats 18 times>, "\360\245D0\377\177\000\000\000\000\000\000\000\000\000\000P\256\226\252\375~", '\000' <repeats 17 times>, __ss_align = 139627926641050}}, id = 12, send_flags = {f = 2, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7efdaa5846f0 "jS\033"
        new_uri = 0x200000000 <error: Cannot access memory at address 0x200000000>
        end = 0x0
        crt = 0x0
        cmd = 0x7efdaa5a18f0
        len = -1437055248
        user = 32509
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = -1996563712}, host = {s = 0x7efdaa96fbd8 "W\211#V\211U", len = 0}, port = {s = 0x0, len = 1426245171}, params = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, sip_params = {
            s = 0x7fff304498d0 "`\237D0\377\177", len = -1464683310}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0xaa5846f0), transport = {s = 0x7fff30449f60 "", len = 1421876138}, ttl = {s = 0x7efdaa5db320 "g\003", 
            len = 809802368}, user_param = {s = 0x7efdaa59f1f0 "\a", len = -1437055248}, maddr = {s = 0x7efdaa5e0260 "~\003", len = 809804096}, method = {s = 0x0, len = 1426245171}, lr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, r2 = {
            s = 0x7fff30449960 "\200\231D0\377\177", len = 1422859023}, gr = {s = 0x7efdb2721180 <_IO_strn_jumps> "", len = -1437055248}, transport_val = {s = 0x7efdaa5ce0b0 "\002", len = 0}, ttl_val = {s = 0x7fff30449980 "@\232D0\377\177", len = -1465333050}, 
          user_param_val = {s = 0x200000020 <error: Cannot access memory at address 0x200000020>, len = -1437055248}, maddr_val = {s = 0x7fff30449a40 "РD0\377\177", len = -1465331735}, method_val = {s = 0x7fff3044a540 " ", len = 0}, lr_val = {
            s = 0x7efdaa5cb100 "а\\\252\375~", len = -1437055248}, r2_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 2}, gr_val = {s = 0xb00000000 <error: Cannot access memory at address 0xb00000000>, len = 0}}
        next_hop = {user = {s = 0x0, len = 1426245171}, passwd = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, host = {s = 0x7fff30449b30 "\240\234D0\377\177", len = 1423653453}, port = {s = 0x7fff30449f80 " ", len = -1996563712}, 
          params = {s = 0x7efdaa4b1746 ") values (", len = 0}, sip_params = {s = 0x0, len = 1426245171}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, port_no = 41168, proto = 12356, type = 32767, 
          flags = (URI_SIP_USER_PHONE | unknown: 0x54c01c34), transport = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -1437055248}, ttl = {s = 0x0, len = -1437055248}, user_param = {s = 0x7efdaa5b4250 "Q\371\266\250\375~", 
            len = 809804464}, maddr = {s = 0x0, len = 1}, method = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 1715065474}, lr = {s = 0x0, len = 1426245171}, r2 = {s = 0x20 <error: Cannot access memory at address 0x20>, 
            len = -1302024144}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {
            s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, r2_val = {s = 0x7fff30449ca0 "\020\236D0\377\177", len = 1423675477}, gr_val = {s = 0x7fff3044a200 "", len = 809804096}}
        u = 0x45aa967650
        port = 21745
        dst_host = 0x55895502c633
        i = 32
        flags = 0
        avp = 0x558900000046
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
        sct = 0xbed57d2d88fedb00
        sjt = 0x7efdaa5d75a0
        rve = 0x7efdaa610090
        mct = 0xba03000000000000
        rv = 0xa30449810
        rv1 = 0x7efdaa5848f0
        c1 = {cache_type = 2858213632, val_type = 32509, c = {avp_val = {n = 809803000, s = {s = 0x7fff30449cf8 "", len = -1437055248}, re = 0x7fff30449cf8}, pval = {rs = {s = 0x7fff30449cf8 "", len = -1437055248}, ri = 809807536, flags = 32767}}, 
          i2s = '\000' <repeats 20 times>, "\375~"}
        s = {s = 0x800000020 <error: Cannot access memory at address 0x800000020>, len = -1464429030}
        srevp = {0x0, 0xbed57d2d88fedb00}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
                s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
              attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
              select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
              attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa5e23a0, msg=0x7efdaa5846f0) at core/action.c:1584
        t = 0x7efdaa6168b0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
        tdiff = 809803360
        __func__ = "run_actions"
#22 0x0000558954bfdb07 in do_action (h=0x7fff3044aeb0, a=0x7efdaa5e11f0, msg=0x7efdaa5846f0) at core/action.c:703
        ret = -5
        v = 0
        dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 44720, sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 44720, 
              __ss_padding = "D0\377\177", '\000' <repeats 43 times>, "\333\376\210-}վ", '\000' <repeats 12 times>, "\002", '\000' <repeats 11 times>, "\322\030\325T\211U\000\000\000\000\000\000\004\000\000\000\220\246D0\377\177\000\000P\245D0\377\177\000\000\211\366\315T\211U\000", __ss_align = 139627950028216}}, id = -1436765232, send_flags = {f = 32509, blst_imask = 0}, proto = -16 '\360', proto_pad0 = 70 'F', proto_pad1 = -21928}
        tmp = 0x4000b264b030 <error: Cannot access memory at address 0x4000b264b030>
        new_uri = 0x7efdaa53e010 "\001"
        end = 0x0
        crt = 0x7fff3044a090 "\300\240D0\377\177"
        cmd = 0x0
        len = 1427222488
        user = 13
        uri = {user = {s = 0x0, len = -1996563712}, passwd = {s = 0x7fff3044a0c0 " ", len = -1996563712}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1996563712}, sip_params = {
            s = 0x7fff3044a270 "\220\243D0\377\177", len = 0}, headers = {s = 0x0, len = 1426245171}, port_no = 32, proto = 0, type = ERROR_URI_T, flags = (unknown: 0xb264b030), transport = {s = 0x7fff3044a220 "`\243D0\377\177", len = 1421938797}, ttl = {
            s = 0x7efdaa5d20c0 "P\003", len = -1437055248}, user_param = {s = 0x7efdaa5e0260 "~\003", len = 809807536}, maddr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, method = {s = 0x0, len = -1}, lr = {
            s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 280613506}, r2 = {s = 0x0, len = 1426245171}, gr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, transport_val = {
            s = 0x58a6da276c59d282 <error: Cannot access memory at address 0x58a6da276c59d282>, len = 1514263170}, ttl_val = {s = 0x0, len = -1460231948}, user_param_val = {s = 0x13e <error: Cannot access memory at address 0x13e>, len = -1996563712}, maddr_val = {
            s = 0x7fff3044a1e0 "\210\246D0\377\177", len = 1422431725}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 809805480}, r2_val = {s = 0x7fff3044a688 "\370\246D0\001", len = -1996563712}, gr_val = {
            s = 0x10 <error: Cannot access memory at address 0x10>, len = 0}}
        next_hop = {user = {s = 0x0, len = 1426245171}, passwd = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1996563712}, host = {s = 0x7fff3044a360 "ФD0\377\177", len = 1423653555}, port = {s = 0x0, len = -1996563712}, params = {
            s = 0x7fff3044a300 "", len = 0}, sip_params = {s = 0x7efdaa5e0378 "\004", len = 809805096}, headers = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, port_no = 41872, proto = 12356, type = 32767, flags = 0, transport = {s = 0x0, len = -1437055248}, ttl = {
            s = 0x0, len = -1996563712}, user_param = {s = 0x7fff3044a360 "ФD0\377\177", len = 0}, maddr = {s = 0x0, len = 1426245171}, method = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, lr = {s = 0x7fff3044a390 "p\003^\252\375~", 
            len = 1423531231}, r2 = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1437055248}, gr = {s = 0x7efdaa5dab40 "\002", len = 809807536}, transport_val = {s = 0x0, len = 1422564395}, ttl_val = {s = 0x7fff3044a360 "ФD0\377\177", 
            len = 809804976}, user_param_val = {s = 0x7efdaa5cb5d8 "", len = -1996563712}, maddr_val = {s = 0x7fff3044a380 " ", len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, 
          r2_val = {s = 0x7fff3044a4d0 "@\246D0\377\177", len = 1423675477}, gr_val = {s = 0x0, len = 1426245171}}
        u = 0x7efdaa5846f0
        port = 43607
        dst_host = 0x0
        i = 3
        flags = 4
        avp = 0x7efdaa5e0260
        st = {flags = 32, id = 0, name = {n = -1302024144, s = {s = 0x7efdb264b030 <__syslog> "H\201\354", <incomplete sequence \330>, len = 809804496}, re = 0x7efdb264b030 <__syslog>}, avp = 0x558954d925ab <eval_elem+1084>}
        sct = 0x7efdaa53e010
        sjt = 0x0
        rve = 0xffffffffaa5cfe30
        mct = 0x7fff3044a000
        rv = 0x20
        rv1 = 0x7fff3044a140
        c1 = {cache_type = 2858287984, val_type = 32509, c = {avp_val = {n = 809805096, s = {s = 0x7fff3044a528 "", len = -1437055248}, re = 0x7fff3044a528}, pval = {rs = {s = 0x7fff3044a528 "", len = -1437055248}, ri = 809807536, flags = 32767}}, 
          i2s = "\200\021\021U\211U", '\000' <repeats 14 times>, "\375~"}
        s = {s = 0x0, len = 0}
        srevp = {0x20, 0x7efdb264b030 <__syslog>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
                s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
              attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
              select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
              attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#23 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa5e11f0, msg=0x7efdaa5846f0) at core/action.c:1584
        t = 0x7efdaa5e11f0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
        tdiff = 809805456
        __func__ = "run_actions"
#24 0x0000558954c01b16 in do_action (h=0x7fff3044aeb0, a=0x7efdaa5e14b0, msg=0x7efdaa5846f0) at core/action.c:1070
        ret = 1
        v = 1
        dst = {send_sock = 0xa79e00, to = {s = {sa_family = 56064, sa_data = "\376\210-}վ\340\265\324\000\000\000\000"}, sin = {sin_family = 56064, sin_port = 35070, sin_addr = {s_addr = 3201662253}, sin_zero = "\340\265\324\000\000\000\000"}, sin6 = {
              sin6_family = 56064, sin6_port = 35070, sin6_flowinfo = 3201662253, sin6_addr = {__in6_u = {__u6_addr8 = "\340\265\324\000\000\000\000\000\000\000\000\000\002\000\000", __u6_addr16 = {46560, 212, 0, 0, 0, 0, 2, 0}, __u6_addr32 = {13940192, 0, 0, 2}}}, 
              sin6_scope_id = 0}, sas = {ss_family = 56064, 
              __ss_padding = "\376\210-}վ\340\265\324\000\000\000\000\000\000\000\000\000\002", '\000' <repeats 11 times>, "\063\306\002U\211U\000\000L\215#V\211U\000\000Z\212#V\211U\000\000 \255D0\377\177\000\000\226\267\362T\211U\000\000\310\340S\252\375~\000\000@\035\362\252\375~\000\000L\215#V\211U\000\000O\212#V\211U\000\000\060\000\000\000\000\000\000\000\020\340S\252\375~\000", __ss_align = 328}}, id = 1445169754, send_flags = {f = 21897, blst_imask = 0}, proto = 84 'T', proto_pad0 = -118 '\212', proto_pad1 = 22051}
        tmp = 0x74acc90 <error: Cannot access memory at address 0x74acc90>
        new_uri = 0x588fedb00 <error: Cannot access memory at address 0x588fedb00>
        end = 0x7efdaa53ea78 ""
        crt = 0xa7aa30 <error: Cannot access memory at address 0xa7aa30>
        cmd = 0x7efdaa5a84c0
        len = 0
        user = 0
        uri = {user = {s = 0x7fff3044a8d0 "", len = -1996563712}, passwd = {s = 0x7efd88820b80 "\264", len = 0}, host = {s = 0x0, len = 1426245171}, port = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1424974825}, params = {s = 0x7fff3044a930 "", 
            len = -1437343728}, sip_params = {s = 0x400000040 <error: Cannot access memory at address 0x400000040>, len = 1426677168}, headers = {s = 0x7fff3044a970 "\223\252D0\377\177", len = -1996563712}, port_no = 43616, proto = 12356, type = 32767, 
          flags = (URI_SIP_USER_PHONE | unknown: 0x54f691b4), transport = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 122346656}, ttl = {s = 0xa79ac0 <error: Cannot access memory at address 0xa79ac0>, len = 11871072}, user_param = {
            s = 0xd4b5e0 <error: Cannot access memory at address 0xd4b5e0>, len = 16}, maddr = {s = 0x7efdaa96fb90 "\001", len = -1434548848}, method = {s = 0x7fff3044aa93 "\005", len = 809806482}, lr = {s = 0x558956238d4c "", len = 1445169514}, r2 = {
            s = 0x7efdaa53e0f0 "", len = 0}, gr = {s = 0x7fff3044aa60 " \254D0\377\177", len = 1424954698}, transport_val = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -1437343728}, ttl_val = {s = 0x7fff3044aa80 "L\215#V\211U", len = 4}, 
          user_param_val = {s = 0x7efdaa53e010 "\001", len = 1445169567}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 3}, method_val = {s = 0x7efdaa53e010 "\001", len = -1426973392}, lr_val = {
            s = 0x400000040 <error: Cannot access memory at address 0x400000040>, len = 0}, r2_val = {s = 0x7fff3044aa30 "`\252D0\004", len = -1443374771}, gr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 809806484}}
        next_hop = {user = {s = 0x43044aa60 <error: Cannot access memory at address 0x43044aa60>, len = 1445169509}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 331636144}, host = {
            s = 0x558956238969 ";branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>;tag=3d63dba0-bd5f-4b46-8434-e84e5b44da90\r\nTo: <sip:+xxx at xxx>\r\nCall-ID: e393131f-4156-"..., len = 1445169513}, port = {
            s = 0x7fff3044ac20 "", len = 1425499403}, params = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1432945776}, sip_params = {s = 0x558956238d4c "", len = 1445169483}, headers = {
            s = 0x505e0f0 <error: Cannot access memory at address 0x505e0f0>, len = 0}, port_no = 0, proto = 0, type = 200, flags = (URI_USER_NORMALIZE | unknown: 0x54ef63e8), transport = {s = 0x7fff3044aaf0 "", len = -1437343728}, ttl = {
            s = 0xf0 <error: Cannot access memory at address 0xf0>, len = -1437343728}, user_param = {s = 0x7fff3044ab30 "`\253D0\377\177", len = -1466248417}, maddr = {s = 0x43044abf0 <error: Cannot access memory at address 0x43044abf0>, len = 0}, method = {
            s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 122346720}, lr = {s = 0xa79a80 <error: Cannot access memory at address 0xa79a80>, len = 11871008}, r2 = {s = 0xd4b5e0 <error: Cannot access memory at address 0xd4b5e0>, len = 16}, gr = {
            s = 0x147 <error: Cannot access memory at address 0x147>, len = -1996563712}, transport_val = {s = 0x7fff3044ab60 " \254D0\377\177", len = 1422431725}, ttl_val = {s = 0x0, len = 48}, user_param_val = {s = 0x7efdaa53e320 "", len = 0}, maddr_val = {
            s = 0x7fff3044ac20 "", len = 1424954698}, method_val = {s = 0xf0 <error: Cannot access memory at address 0xf0>, len = -1437343728}, lr_val = {
            s = 0x5589562389a1 "From: <sip:+xxx at xxx>;tag=3d63dba0-bd5f-4b46-8434-e84e5b44da90\r\nTo: <sip:+xxx at xxx>\r\nCall-ID: e393131f-4156-44e3-95b0-60b5b7b9c417\r\nCSeq: 3763 INVITE\r\nAllow: OPTION"..., len = 1445169514}, 
          r2_val = {s = 0x7efdaa96fb90 "\001", len = 1425270178}, gr_val = {s = 0x7efdaaf21d68 "\001", len = -1426973352}}
        u = 0xb53370
        port = 12356
        dst_host = 0x7efd00000000
        i = 0
        flags = 0
        avp = 0xd4b5e0
        st = {flags = 2857912048, id = 1, name = {n = -2004742920, s = {s = 0x7efd88820cf8 "", len = 809806000}, re = 0x7efd88820cf8}, avp = 0x7efda9f7c6fa <futex_release+29>}
        sct = 0x558954c895ed <sr_event_exec+481>
        sjt = 0x0
        rve = 0x7efdaa5e0a60
        mct = 0x7fff3044a820
        rv = 0x8000000
        rv1 = 0x10
        c1 = {cache_type = 48, val_type = RV_NONE, c = {avp_val = {n = -1437343728, s = {s = 0x7efdaa53e010 "\001", len = 809806896}, re = 0x7efdaa53e010}, pval = {rs = {s = 0x7efdaa53e010 "\001", len = 809806896}, ri = -1466248417, flags = 32509}}, 
          i2s = "\360\254D0\004", '\000' <repeats 14 times>, "\b\000"}
        s = {s = 0x7fff3044a8f0 "0\251D0\377\177", len = 1424958313}
        srevp = {0x7fff3044abf0, 0x7efdaa53e010}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
                s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
              attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
              select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
              attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#25 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa5ca960, msg=0x7efdaa5846f0) at core/action.c:1584
        t = 0x7efdaa5e14b0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1437055248, tz_dsttime = 32509}
        tdiff = 0
        __func__ = "run_actions"
#26 0x0000558954c11179 in run_top_route (a=0x7efdaa5ca960, msg=0x7efdaa5846f0, c=0x0) at core/action.c:1669
        ctx = {rec_lev = 12, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {8589934592, 6388032982750974594, 0, 94048325125683, 32, 139628084768816, 6388032982702740098, 885541357945475714}, __mask_was_saved = 0, __saved_mask = {__val = {0, 139627368492924, 
                  13751034671771081472, 140734003195984, 13751034671771081472, 32, 2, 0, 140734003763305, 32, 13751034671771081472, 8589934592, 8589934592, 0, 94048325125683, 32}}}}}
        p = 0x7fff3044aeb0
        ret = 0
        sfbk = 0
#27 0x0000558954d67146 in receive_msg (buf=0x558956238900 "INVITE sip:+xxx at xxx;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP xxx:5060;branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>"..., 
    len=1100, rcv_info=0x7efd87b327a8) at core/receive.c:515
        msg = 0x7efdaa5846f0
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 33, jmp_env = {{__jmpbuf = {8589935692, 139627368491192, 0, 94048325125683, 32, 139628084768816, 6388032982702740098, 885541357945475714}, __mask_was_saved = 0, __saved_mask = {__val = {139628085660640, 0, 
                  13751034671771081472, 121, 2, 0, 94048325125683, 32, 139628084768816, 140734003196720, 94048323499679, 128, 2, 2214, 4095, 140734003197292}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x558956238900 "INVITE sip:+xxx at xxx;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP xxx:5060;branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>"..., len = 1100}
        netinfo = {data = {s = 0x558956238900 "INVITE sip:+xxx at xxx;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP xxx:5060;branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>"..., len = 1100}, 
          bufsize = 0, rcv = 0x7efd87b327a8, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7fff3044b0a0, obuf = {s = 0x0, len = 0}, rcv = 0x7efd87b327a8, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#28 0x0000558954ea7d39 in receive_tcp_msg (
    tcpbuf=0x7efd87b32b30 "INVITE sip:+xxx at xxx;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP xxx:5060;branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>"..., len=1100, 
    rcv_info=0x7efd87b327a8, con=0x7efd87b32790) at core/tcp_read.c:1413
        ret = 0
        buf = 0x558956238900 "INVITE sip:+xxx at xxx;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP xxx:5060;branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>"...
        bsize = 65535
        blen = 65535
        __func__ = "receive_tcp_msg"
#29 0x0000558954eaa39a in tcp_read_req (con=0x7efd87b32790, bytes_read=0x7fff3044b564, read_flags=0x7fff3044b56c) at core/tcp_read.c:1604
        bytes = 1100
        total_bytes = 1100
        resp = 1
        size = 0
        req = 0x7efd87b328b8
        dst = {send_sock = 0x0, to = {s = {sa_family = 50739, sa_data = "\002U\211U\000\000 \000\000\000\000\000\000"}, sin = {sin_family = 50739, sin_port = 21762, sin_addr = {s_addr = 21897}, sin_zero = " \000\000\000\000\000\000"}, sin6 = {sin6_family = 50739, 
              sin6_port = 21762, sin6_flowinfo = 21897, sin6_addr = {__in6_u = {__u6_addr8 = " \000\000\000\000\000\000\000\060\260d\262\375~\000", __u6_addr16 = {32, 0, 0, 0, 45104, 45668, 32509, 0}, __u6_addr32 = {32, 0, 2992943152, 32509}}}, 
              sin6_scope_id = 809809184}, sas = {ss_family = 50739, 
              __ss_padding = "\002U\211U\000\000 \000\000\000\000\000\000\000\060\260d\262\375~\000\000 \265D0\377\177\000\000\002\263\352T\211U\000\000\377\377\377\377)\000\000\000`\036\026U\211U\000\000\000\000\000\000\001 \000\000\030\204X\252\001\000\000\000\240\264D0\001\000\000\000P\273R\206.\000\000\000\001\000\000\000\000\000\000\000\000\376\207\213\375~\000\000\260\265D0\377\177\000\000\030\204X\252\375~\000", __ss_align = 20}}, id = 1, send_flags = {f = 1, blst_imask = 0}, proto = 41 ')', proto_pad0 = 0 '\000', proto_pad1 = 0}
        c = 10 '\n'
        ret = 0
        __func__ = "tcp_read_req"
#30 0x0000558954eaed62 in handle_io (fm=0x7efdaa588358, events=1, idx=-1) at core/tcp_read.c:1855
        ret = 0
        n = 456
        read_flags = RD_CONN_SHORT_READ
        con = 0x7efd87b32790
        s = 41
        resp = 1
        t = 1953053264
        ee = 0x0
        __func__ = "handle_io"
#31 0x0000558954e991dd in io_wait_loop_epoll (h=0x558955161e60 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
        n = 1
        r = 0
        fm = 0x7efdaa588358
        revents = 1
        __func__ = "io_wait_loop_epoll"
#32 0x0000558954eb0840 in tcp_receive_loop (unix_sock=46) at core/tcp_read.c:1976
        __func__ = "tcp_receive_loop"
#33 0x0000558954e8d46d in tcp_init_children (woneinit=0x7fff3044b950) at core/tcp_main.c:5227
        r = 6
        i = 7
        reader_fd_1 = 46
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\330\356\341T\211U\000\000\060\271D0\377\177\000\000۲\353T\000\000\000\000\240\363Y\252\000\000\000\000\273'\006U\211U\000\000\246\000D0\377\177\000\000\347\373\374T\211U\000\000\000\271D0\001\000\000\000P\273R\206\375~\000\000\000\271D0\377\177\000\000\320\003\361\210\001\000\000\000 \271D0\377\177\000\000\205\375\374T\211U\000"
        si = 0x0
        __func__ = "tcp_init_children"
#34 0x0000558954becf03 in main_loop () at main.c:1849
        i = 8
        pid = 1477
        si = 0x0
        si_desc = "udp receiver child=7 sock=xxx:5060\000\000\000\000\003\000\000\000 \000\000\000\000\333\376\210-}վ\000\000\000\000\000\000\000\000\210`\001U\211U\000\000\000\000\000\000\000\000\000\000\063\306\002U\211U\000\000 \000\000\000\000\000\000\000\060\260d\262\375~\000\000кD0\377\177\000\000ai\331T\211U\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#35 0x0000558954bf7acf in main (argc=17, argv=0x7fff3044c028) at main.c:3078
        cfg_stream = 0x5589560d12a0
        c = -1
        r = 0
        tmp = 0x7fff3044df42 ""
        tmp_len = 0
        port = 0
        proto = 7
        ahost = 0x0
        aport = 0
        options = 0x558955018e90 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1882048236
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0x0
        st = {st_dev = 23, st_ino = 862, st_nlink = 2, st_mode = 16832, st_uid = 109, st_gid = 115, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1667940516, tv_nsec = 335990872}, st_mtim = {tv_sec = 1667941120, 
            tv_nsec = 945450055}, st_ctim = {tv_sec = 1667941121, tv_nsec = 329446417}, __glibc_reserved = {0, 0, 0}}
        tbuf = "\000\000\000\000\000\000\000\000\030RM0\377\177\000\000\000\000\000\000 ", '\000' <repeats 27 times>, "\001\000\000\000\000\000\000\000\366u\256\003\001", '\000' <repeats 19 times>, "\002", '\000' <repeats 319 times>...
        option_index = 0
        long_options = {{name = 0x55895501b2b3 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5589550164e0 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55895501b2b8 "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55895501b2be "subst", 
            has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55895501b2c4 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55895501b2cd "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55895501b2d7 "server-id", has_arg = 1, flag = 0x0, val = 1028}, 
          {name = 0x55895501b2e1 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55895501b2ec "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55895501b2f5 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55895501b300 "debug", 
            has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55895501b306 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55895501b310 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"



More information about the sr-users mailing list