[SR-Users] lcr related crash

Daniel-Constantin Mierla miconda at gmail.com
Thu Nov 17 16:58:02 CET 2022


Hello,

the values from matched_gws are garbage because the array is not
initialized and gw_index is 0, meaning that no proper values were set yet.

Grab the gdb output for:

list

p *rule

p *pl

Cheers,
Daaniel

On 17.11.22 14:19, Juha Heinanen wrote:
> We noticed lcr related crash with pretty recent 5.6.  Core dump is
> below.  Weird thing is that some of the values in matched_gw table make
> no sense.  For example, there does not exist rule_id = 1426245171 in
> lcr_rule table and some prefix_len and priority values are far too big.
>
> Any ideas?
>
> -- Juha
>
> #0  0x00007efda9ea7486 in ki_load_gws_furi (_m=0x7efdaa5846f0, lcr_id=1, ruri_user=0x7fff30444b90, from_uri=0x7fff30444ba0) at lcr_mod.c:2330
> 2330	lcr_mod.c: No such file or directory.
> (gdb) bt full
> #0  0x00007efda9ea7486 in ki_load_gws_furi (_m=0x7efdaa5846f0, lcr_id=1, ruri_user=0x7fff30444b90, from_uri=0x7fff30444ba0) at lcr_mod.c:2330
>         request_uri = 0x7efdaa5849d0
>         i = 1421936895
>         j = 21897
>         gw_index = 0
>         now = 1668672386
>         dex = 32509
>         val = {n = 0, s = {s = 0x0, len = -1436245347}, re = 0x0}
>         matched_gws = {{gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 2, duplicate = 0}, {gw_index = 0, rule_id = 1426245171, prefix_len = 21897, priority = 0, weight = 32, duplicate = 0}, {gw_index = 45104, rule_id = 32509, prefix_len = 17040, 
>             weight = 3201662253, duplicate = 17040}, {gw_index = 32767, rule_id = 1423653555, prefix_len = 21897, priority = 0, weight = 2857912048, duplicate = 32509}, {gw_index = 44720, rule_id = 32767, prefix_len = 0, priority = 0, weight = 32509, duplicate = 0}, {
>             gw_index = 0, rule_id = 2868544968, prefix_len = 32509, priority = 0, weight = 809780304, duplicate = 32767}, {gw_index = 18160, rule_id = 32509, prefix_len = 44720, priority = 12356, weight = 32767, duplicate = 7864}, {gw_index = 32509, rule_id = 0, 
>             prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 56064}, {gw_index = 32045, rule_id = 2858027016, prefix_len = 32509, priority = 0, weight = 2867938768, 
>             duplicate = 32509}, {gw_index = 0, rule_id = 0, prefix_len = 6048, priority = 43762, weight = 32509, duplicate = 32}, {gw_index = 0, rule_id = 2992943152, prefix_len = 32509, priority = 0, weight = 809779984, duplicate = 32767}, {gw_index = 62282, 
>             rule_id = 21897, prefix_len = 47520, priority = 43666, weight = 32509, duplicate = 13}, {gw_index = 32767, rule_id = 0, prefix_len = 0, priority = 0, weight = 2298403584, duplicate = 32045}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, 
>             weight = 2, duplicate = 0}, {gw_index = 0, rule_id = 1426245171, prefix_len = 21897, priority = 0, weight = 32, duplicate = 0}, {gw_index = 45104, rule_id = 32509, prefix_len = 17408, priority = 12356, weight = 32767, duplicate = 2303}, {gw_index = 21897, 
>             rule_id = 0, prefix_len = 0, priority = 0, weight = 1426245171, duplicate = 21897}, {gw_index = 32, rule_id = 0, prefix_len = 45104, priority = 45668, weight = 32509, duplicate = 17408}, {gw_index = 32767, rule_id = 2857912048, prefix_len = 32509, 
>             priority = 0, weight = 2868551680, duplicate = 32509}, {gw_index = 44720, rule_id = 32767, prefix_len = 29136, priority = 34846, weight = 32509, duplicate = 56064}, {gw_index = 1, rule_id = 2868544960, prefix_len = 32509, priority = 0, weight = 809780304, 
>             duplicate = 32767}, {gw_index = 0, rule_id = 0, prefix_len = 44720, priority = 12356, weight = 32767, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, 
>             priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, 
>             priority = 0, weight = 2867512936, duplicate = 1}, {gw_index = 50792, rule_id = 32509, prefix_len = 18160, priority = 43608, weight = 32509, duplicate = 44720}, {gw_index = 32767, rule_id = 809780296, prefix_len = 32767, priority = 0, weight = 2862001424, 
>             duplicate = 22}, {gw_index = 25472, rule_id = 21897, prefix_len = 0, priority = 0, weight = 0, duplicate = 44628}, {gw_index = 32509, rule_id = 19, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 44642, 
>             priority = 43670, weight = 32509, duplicate = 56064}, {gw_index = 32045, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 2}, {gw_index = 0, rule_id = 0, prefix_len = 56064, priority = 35070, weight = 3201662253, duplicate = 32}, {
>             gw_index = 0, rule_id = 0, prefix_len = 2, priority = 0, weight = 0, duplicate = 0}, {gw_index = 50739, rule_id = 21897, prefix_len = 32, priority = 0, weight = 0, duplicate = 45104}, {gw_index = 32509, rule_id = 809781904, prefix_len = 32767, priority = 0, 
>             weight = 1421876076, duplicate = 21897}, {gw_index = 17504, rule_id = 32767, prefix_len = 18160, priority = 43608, weight = 32509, duplicate = 2528}, {gw_index = 32509, rule_id = 2857912048, prefix_len = 32509, priority = 0, weight = 2868551952, 
>             duplicate = 32509}, {gw_index = 44720, rule_id = 32767, prefix_len = 0, priority = 0, weight = 0, duplicate = 1}, {gw_index = 1, rule_id = 0, prefix_len = 0, priority = 0, weight = 2298403584, duplicate = 32045}, {gw_index = 0, rule_id = 0, prefix_len = 0, 
>             priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 809780432, duplicate = 32767}, {gw_index = 41793, rule_id = 32509, prefix_len = 0, priority = 0, weight = 0, duplicate = 18600}, {gw_index = 32767, 
>             rule_id = 2866689544, prefix_len = 32509, priority = 0, weight = 2857912048, duplicate = 32509}, {gw_index = 0, rule_id = 1, prefix_len = 25492, priority = 21787, weight = 21897, duplicate = 53760}, {gw_index = 32509, rule_id = 2298403584, 
>             prefix_len = 32045, priority = 48853, weight = 809780624, duplicate = 32767}, {gw_index = 60669, rule_id = 21897, prefix_len = 0, priority = 0, weight = 0, duplicate = 18600}, {gw_index = 32767, rule_id = 2866689520, prefix_len = 32509, priority = 0, 
>             weight = 2857912048, duplicate = 32509}, {gw_index = 35600, rule_id = 32509, prefix_len = 0, priority = 0, weight = 32509, duplicate = 35600}, {gw_index = 32509, rule_id = 2298403584, prefix_len = 32045, priority = 48853, weight = 0, duplicate = 0}, {
>             gw_index = 0, rule_id = 2, prefix_len = 0, priority = 0, weight = 0, duplicate = 50739}, {gw_index = 21897, rule_id = 32, prefix_len = 0, priority = 0, weight = 2298403584, duplicate = 32045}, {gw_index = 18160, rule_id = 32767, prefix_len = 0, priority = 0, 
>             weight = 2, duplicate = 0}, {gw_index = 0, rule_id = 1426245171, prefix_len = 21897, priority = 0, weight = 32, duplicate = 0}, {gw_index = 45104, rule_id = 32509, prefix_len = 18080, priority = 12356, weight = 32767, duplicate = 4205}, {gw_index = 21897, 
>             rule_id = 2866712944, prefix_len = 32509, priority = 0, weight = 2857912048, duplicate = 32509}, {gw_index = 2528, rule_id = 32509, prefix_len = 34240, priority = 43770, weight = 32509, duplicate = 18592}, {gw_index = 32767, rule_id = 0, prefix_len = 65535, 
>             priority = 65535, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 32767, prefix_len = 0, priority = 0, weight = 2, duplicate = 53890}, {gw_index = 55846, rule_id = 0, prefix_len = 0, priority = 0, weight = 1426245171, duplicate = 21897}, {gw_index = 0, 
>             rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, 
>             rule_id = 809781424, prefix_len = 32767, priority = 0, weight = 2298403584, duplicate = 32045}, {gw_index = 18216, rule_id = 32767, prefix_len = 0, priority = 0, weight = 22, duplicate = 25472}, {gw_index = 21897, rule_id = 0, prefix_len = 0, priority = 0, 
>             weight = 32, duplicate = 0}, {gw_index = 19, rule_id = 32509, prefix_len = 18400, priority = 12356, weight = 32767, duplicate = 36949}, {gw_index = 21897, rule_id = 32, prefix_len = 0, priority = 0, weight = 2298403584, duplicate = 32045}, {gw_index = 18400, 
>             rule_id = 32767, prefix_len = 0, priority = 0, weight = 2, duplicate = 0}, {gw_index = 0, rule_id = 1426245171, prefix_len = 21897, priority = 0, weight = 32, duplicate = 0}, {gw_index = 56064, rule_id = 3201662253, prefix_len = 18528, priority = 12356, 
>             weight = 32767, duplicate = 0}, {gw_index = 2, rule_id = 0, prefix_len = 0, priority = 0, weight = 1426245171, duplicate = 21897}, {gw_index = 32, rule_id = 0, prefix_len = 45104, priority = 45668, weight = 32509, duplicate = 18240}, {gw_index = 32767, 
>             rule_id = 2832509560, prefix_len = 32509, priority = 0, weight = 809781140, duplicate = 32767}, {gw_index = 18592, rule_id = 22, prefix_len = 25472, priority = 21787, weight = 21897, duplicate = 0}, {gw_index = 0, rule_id = 2866689512, prefix_len = 32509, 
>             priority = 0, weight = 1, duplicate = 0}, {gw_index = 25492, rule_id = 21897, prefix_len = 56064, priority = 35070, weight = 3201662253, duplicate = 18272}, {gw_index = 32767, rule_id = 2832509702, prefix_len = 32509, priority = 0, weight = 809781140, 
>             duplicate = 32767}, {gw_index = 0, rule_id = 0, prefix_len = 18352, priority = 12356, weight = 32767, duplicate = 41793}, {gw_index = 32509, rule_id = 3631862402, prefix_len = 55846, priority = 22694, weight = 809782152, duplicate = 32767}, {
>             gw_index = 28360, rule_id = 32509, prefix_len = 18160, priority = 43608, weight = 32509, duplicate = 32}, {gw_index = 1, rule_id = 1427858324, prefix_len = 21897, priority = 0, weight = 2866211776, duplicate = 32509}, {gw_index = 46912, rule_id = 32509, 
>             prefix_len = 18160, priority = 43608, weight = 32509, duplicate = 44720}, {gw_index = 32767, rule_id = 0, prefix_len = 0, priority = 0, weight = 809782152, duplicate = 32767}, {gw_index = 18936, rule_id = 32509, prefix_len = 19400, priority = 12356, 
>             weight = 32767, duplicate = 44840}, {gw_index = 32509, rule_id = 2857912048, prefix_len = 32509, priority = 0, weight = 809781424, duplicate = 32767}, {gw_index = 51007, rule_id = 32509, prefix_len = 19400, priority = 12356, weight = 32767, 
>             duplicate = 44840}, {gw_index = 32509, rule_id = 2857912824, prefix_len = 32509, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 0, 
>             priority = 0, weight = 2868540824, duplicate = 32509}, {gw_index = 19228, rule_id = 32767, prefix_len = 18160, priority = 43608, weight = 32509, duplicate = 44720}, {gw_index = 32767, rule_id = 2868539048, prefix_len = 32509, priority = 0, weight = 0, 
>             duplicate = 0}, {gw_index = 18160, rule_id = 32509, prefix_len = 56064, priority = 35070, weight = 3201662253, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 2, priority = 0, weight = 0, duplicate = 0}, {gw_index = 50739, rule_id = 21897, 
>             prefix_len = 32, priority = 0, weight = 0, duplicate = 45104}, {gw_index = 32509, rule_id = 809781616, prefix_len = 32767, priority = 0, weight = 2832519634, duplicate = 32509}, {gw_index = 0, rule_id = 0, prefix_len = 19400, priority = 12356, 
>             weight = 32767, duplicate = 44840}, {gw_index = 32509, rule_id = 2857912048, prefix_len = 32509, priority = 0, weight = 3743011458, duplicate = 55846}, {gw_index = 53890, rule_id = 206181164, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {
>             gw_index = 0, rule_id = 0, prefix_len = 0, priority = 0, weight = 2298403584, duplicate = 32045}, {gw_index = 0, rule_id = 0, prefix_len = 56064, priority = 35070, weight = 3201662253, duplicate = 0}, {gw_index = 0, rule_id = 0, prefix_len = 2, priority = 0, 
>             weight = 0, duplicate = 0}, {gw_index = 19400, rule_id = 32767, prefix_len = 46952, priority = 43654, weight = 32509, duplicate = 18160}, {gw_index = 32509, rule_id = 0, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {gw_index = 44720, 
>             rule_id = 32509, prefix_len = 56064, priority = 35070, weight = 3201662253, duplicate = 18992}, {gw_index = 32767, rule_id = 1423240445, prefix_len = 21897, priority = 0, weight = 2868540816, duplicate = 32509}, {gw_index = 19400, rule_id = 32767, 
>             prefix_len = 46928, priority = 43654, weight = 32509, duplicate = 18160}, {gw_index = 32509, rule_id = 809782144, prefix_len = 32767, priority = 0, weight = 1424974825, duplicate = 21897}, {gw_index = 18928, rule_id = 32767, prefix_len = 57360, 
>             priority = 43603, weight = 32509, duplicate = 32}, {gw_index = 0, rule_id = 2857623568, prefix_len = 32509, priority = 0, weight = 809781808, duplicate = 32767}, {gw_index = 54047, rule_id = 32509, prefix_len = 0, priority = 0, weight = 0, duplicate = 0}, {
>             gw_index = 0, rule_id = 134217728, prefix_len = 0, priority = 0, weight = 122341296, duplicate = 0}, {gw_index = 44784, rule_id = 0, prefix_len = 14416, priority = 181, weight = 0, duplicate = 46560}, {gw_index = 0, rule_id = 16, prefix_len = 0, 
>             priority = 0, weight = 296, duplicate = 0}, {gw_index = 56064, rule_id = 3201662253, prefix_len = 19040, priority = 12356, weight = 32767, duplicate = 38381}, {gw_index = 21897, rule_id = 0, prefix_len = 0, priority = 0, weight = 80, duplicate = 5}, {
>             gw_index = 47600, rule_id = 32509, prefix_len = 0, priority = 0, weight = 32509, duplicate = 19232}, {gw_index = 32767, rule_id = 1424954698, prefix_len = 21897, priority = 0, weight = 32, duplicate = 0}, {gw_index = 57360, rule_id = 32509, prefix_len = 32, 
>             priority = 0, weight = 0, duplicate = 7}, {gw_index = 32509, rule_id = 2857623568, prefix_len = 32509, priority = 0, weight = 2861742528, duplicate = 32509}, {gw_index = 0, rule_id = 0, prefix_len = 50739, priority = 21762, weight = 21897, duplicate = 32}, {
>             gw_index = 0, rule_id = 2992943152, prefix_len = 32509, priority = 0, weight = 809782320, duplicate = 32767}, {gw_index = 18160, rule_id = 32509, prefix_len = 41232, priority = 43770, weight = 32509, duplicate = 44720}, {gw_index = 32767, rule_id = 1216, 
>             prefix_len = 0, priority = 0, weight = 1423251666, duplicate = 21897}, {gw_index = 31872, rule_id = 32509, prefix_len = 19336, priority = 12356, weight = 32767, duplicate = 19232}}
>         rules = 0x7efd86889f60
>         rule = 0x3837333334313030
>         pl = 0x7efd8793d120
>         gws = 0x7efd86d47500
>         t = 0x7fff30444070
>         furi = {user = {s = 0x7efdaa92b9d4 "+xxx at xxx", len = 13}, passwd = {s = 0x0, len = 0}, host = {s = 0x7efdaa92b9e2 "xxxx", len = 13}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {
>             s = 0x0, len = 0}, port_no = 0, proto = 0, type = SIP_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {
>             s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {
>             s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
>         avp = 0x7efdaa64a29d
>         st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
>         __func__ = "ki_load_gws_furi"
> #1  0x00007efda9eaac2a in load_gws (_m=0x7efdaa5846f0, argc=3, argv=0x5589550fb710 <mod_f_params+48>) at lcr_mod.c:2519
>         ruri_user = {s = 0x7efdaa92b9a0 "+xxx", len = 13}
>         from_uri = {s = 0x7efdaa92b9d0 "sip:+xxxxxxxxxx at xxx.xx.xx.xxx", len = 31}
>         lcr_id = 1
>         tmp = 0x7efdaa869f11 ""
>         __func__ = "load_gws"
> #2  0x0000558954c0bd9b in do_action (h=0x7fff3044aeb0, a=0x7efdaa86a610, msg=0x7efdaa5846f0) at core/action.c:1181
>         ret = -5
>         v = 1
>         dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000(\001\000\000\000\000\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "(\001\000\000\000\000\000"}, sin6 = {
>               sin6_family = 44720, sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "(\001", '\000' <repeats 13 times>, __u6_addr16 = {296, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {296, 0, 0, 0}}}, sin6_scope_id = 809783872}, sas = {
>               ss_family = 44720, 
>               __ss_padding = "D0\377\177\000\000(\001", '\000' <repeats 14 times>, "@RD0\377\177\000\000\355\225\310T\211U", '\000' <repeats 11 times>, "\333\376\210-}վ\240\340S\252\375~\000\000\000\000\000\000\002", '\000' <repeats 11 times>, "\322\030\325T\211U\000\000 \000\000\000\000\000\000\000\320RD0\377\177\000\000pSD0\377\177\000\000\211\366\315T\211U\000", __ss_align = 139627952720888}}, id = -1434074608, send_flags = {f = 32509, blst_imask = 0}, proto = -16 '\360', proto_pad0 = 70 'F', proto_pad1 = -21928}
>         tmp = 0x7efdb264b030 <__syslog> "H\201\354", <incomplete sequence \330>
>         new_uri = 0x200000000 <error: Cannot access memory at address 0x200000000>
>         end = 0x200000000 <error: Cannot access memory at address 0x200000000>
>         crt = 0x7fff30444ed0 ""
>         cmd = 0x7efdaa5a2cd0
>         len = 0
>         user = 0
>         uri = {user = {s = 0x558954ef1321 <split_frag+201> "\270", len = 128}, passwd = {s = 0x7efd8b863760 "\200", len = -1996563712}, host = {s = 0x7efd8b863760 "\200", len = 0}, port = {s = 0x0, len = 1426245171}, params = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, sip_params = {s = 0x7fff30445090 "\260QD0\377\177", len = 1421936895}, headers = {s = 0x35aa84bae8 <error: Cannot access memory at address 0x35aa84bae8>, len = 1025}, port_no = 0, 
>           proto = 34386, type = 32509, flags = (unknown: 0x8b863760), transport = {s = 0x3a70697300000000 <error: Cannot access memory at address 0x3a70697300000000>, len = -1437055248}, ttl = {s = 0x7efdaa85ec60 "\320\t", len = 809783504}, user_param = {
>             s = 0x1 <error: Cannot access memory at address 0x1>, len = -2041403312}, maddr = {s = 0x7fff30445038 "\030̅\252\375~", len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, transport_val = {s = 0x7fff30444fd0 "\300PD0\377\177", len = 1424983377}, ttl_val = {s = 0x72 <error: Cannot access memory at address 0x72>, len = 809783280}, user_param_val = {
>             s = 0x40000000000020 <error: Cannot access memory at address 0x40000000000020>, len = -1434679252}, maddr_val = {s = 0x7fff304450c0 "", len = 1424795871}, method_val = {s = 0x7efdaa92b370 "sip:+xxxxxxx at xxx.xx.xxx;transport=TCP", len = 53}, 
>           lr_val = {s = 0x7efdaa7c882d "request_uri)", len = 11}, r2_val = {s = 0x7efdaa584a18 "\202\263\222\252\375~", len = 809784016}, gr_val = {s = 0x7efdaa85cc18 "", len = -1437055248}}
>         next_hop = {user = {s = 0x7fff304450e0 "", len = -1462450242}, passwd = {s = 0x7fff304452d0 "", len = -1434072040}, host = {s = 0x7efdaa5849f8 "t\263\222\252\375~", len = -1437055248}, port = {
>             s = 0x7fff00000035 <error: Cannot access memory at address 0x7fff00000035>, len = -1996563712}, params = {s = 0x7fff304450ac "\375~", len = 0}, sip_params = {s = 0x0, len = 1426245171}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, 
>             len = -1302024144}, port_no = 20912, proto = 12356, type = 32767, flags = (URI_USER_NORMALIZE | unknown: 0x54c1106c), transport = {s = 0x0, len = -1437055248}, ttl = {s = 0x7efdaa85ec60 "\320\t", len = 809807536}, user_param = {s = 0x0, len = 0}, maddr = {
>             s = 0x0, len = -1}, method = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = -208022910}, lr = {s = 0x0, len = 1426245171}, r2 = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr = {
>             s = 0x58a6da26ccb9d282 <error: Cannot access memory at address 0x58a6da26ccb9d282>, len = 1514263170}, transport_val = {s = 0x7efd00000000 <error: Cannot access memory at address 0x7efd00000000>, len = 53}, ttl_val = {s = 0x7efdaa7c882d "request_uri)", 
>             len = 11}, user_param_val = {s = 0x0, len = -1996563712}, maddr_val = {s = 0x1000000000 <error: Cannot access memory at address 0x1000000000>, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, r2_val = {s = 0x7fff30445260 "pSD0\377\177", len = -1462314118}, gr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}}
>         u = 0x558954c1106d <run_actions_safe+169>
>         port = 0
>         dst_host = 0x58a6da26c9d9d282
>         i = 3
>         flags = 0
>         avp = 0x7efdaafc9330
>         st = {flags = 1424947432, id = 21897, name = {n = -1954138112, s = {s = 0x7efd8b863800 "\020", len = -2041446400}, re = 0x7efd8b863800}, avp = 0x7efdaac78198}
>         sct = 0x100000000
>         sjt = 0x0
>         rve = 0x7efdaafa7c80
>         mct = 0x7efdaafcb790
>         rv = 0x7efdaa86b748
>         rv1 = 0x7efdaa5846f0
>         c1 = {cache_type = 809784048, val_type = 32767, c = {avp_val = {n = 1423653555, s = {
>                 s = 0x558954db3ab3 <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 1}, re = 0x558954db3ab3 <rval_get_int+341>}, 
>             pval = {rs = {s = 0x558954db3ab3 <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 1}, ri = -1437055248, flags = 32509}}, 
>           i2s = "\202\263\222\252\375~\000\000\000\000\000\000\000\000\000\000x텪\375~"}
>         s = {s = 0x7efdaa92b9d0 "sip:xxx at xxx", len = 31}
>         srevp = {0x7fff304452d0, 0xbed57d2d88fedb00}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
>                 s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
>               attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
>               select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
>               attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
>               attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #3  0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa86a610, msg=0x7efdaa5846f0) at core/action.c:1584
>         t = 0x7efdaa86a610
>         ret = -1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
>         tdiff = 809784496
>         __func__ = "run_actions"
> #4  0x0000558954bfdb07 in do_action (h=0x7fff3044aeb0, a=0x7efdaa860940, msg=0x7efdaa5846f0) at core/action.c:703
>         ret = -5
>         v = 0
>         dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000\020\253\247\000\000\000\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "\020\253\247\000\000\000\000"}, sin6 = {
>               sin6_family = 44720, sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "\020\253\247\000\000\000\000\000\260\063\265\000\000\000\000", __u6_addr16 = {43792, 167, 0, 0, 13232, 181, 0, 0}, __u6_addr32 = {10988304, 0, 11875248, 
>                     0}}}, sin6_scope_id = 13940192}, sas = {ss_family = 44720, 
>               __ss_padding = "D0\377\177\000\000\020\253\247\000\000\000\000\000\260\063\265\000\000\000\000\000\340\265\324\000\000\000\000\000\000\333\376\210-}վ,\001\000\000\002\000\000\000\000\333\376\210-}վ`*[\252\375~\000\000\030\r\202\252\375~\000\000\000\000\000\000\000\000\000\000\063\306\002U\211U\000\000 \000\000\000\000\000\000\000\060\260d\262\375~\000\000\260ZD0\377\177\000\000\306\017\333T\211U\000", __ss_align = 32}}, id = -1434317544, send_flags = {f = 32509, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', 
>           proto_pad1 = 0}
>         tmp = 0x130445be0 <error: Cannot access memory at address 0x130445be0>
>         new_uri = 0x15 <error: Cannot access memory at address 0x15>
>         end = 0x400000000 <error: Cannot access memory at address 0x400000000>
>         crt = 0x7efdaa81ca60 "\340.\202\252\375~"
>         cmd = 0x7efdaa8205a8
>         len = -1996563712
>         user = -1093305043
>         uri = {user = {s = 0x7efdaa54a1f5 "", len = -1437294091}, passwd = {s = 0x7efd88e7bd30 "", len = 0}, host = {s = 0x7fff30445740 "\360WD0\377\177", len = -1462943338}, port = {s = 0x0, len = 809785192}, params = {s = 0x7fff30445770 "\021\001", len = 809785392}, 
>           sip_params = {s = 0x7efd8b863550 "", len = 0}, headers = {s = 0x0, len = 0}, port_no = 22512, proto = 12356, type = 32767, flags = (URI_USER_NORMALIZE | unknown: 0xa8cc7f80), transport = {s = 0x7fff30445830 "\340\241T\252\375~", len = -1437055248}, ttl = {
>             s = 0x4 <error: Cannot access memory at address 0x4>, len = -1996563712}, user_param = {s = 0x111 <error: Cannot access memory at address 0x111>, len = -1434319555}, maddr = {s = 0x7efd00000014 <error: Cannot access memory at address 0x7efd00000014>, 
>             len = -1954139248}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = -1996563712}, r2 = {s = 0x0, len = -1996563712}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 1426245171}, ttl_val = {s = 0x20 <error: Cannot access memory at address 0x20>, 
>             len = -1302024144}, user_param_val = {s = 0x7fff304458c0 "P_D0\377\177", len = -1462992004}, maddr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, method_val = {s = 0x7efdaa822f10 "\340.\202\252\375~", len = -1437055248}, lr_val = {
>             s = 0x558954eef8e8 <qm_insert_free+59> "\005\363\003", len = 809786344}, r2_val = {s = 0x7efdaa54a1e0 "xxx", len = 21}, gr_val = {s = 0x40100000020 <error: Cannot access memory at address 0x40100000020>, len = 0}}
>         next_hop = {user = {s = 0x7efd8652a068 "", len = 1424974825}, passwd = {s = 0x7fff304458a0 "", len = -1437343728}, host = {s = 0x7efd8b863540 "P", len = -1437343728}, port = {s = 0x7fff304458e0 "\020YD0\377\177", len = -1996563712}, params = {
>             s = 0x7efd8b8635a0 "P", len = 0}, sip_params = {s = 0x0, len = 1426245171}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, port_no = 24400, proto = 12356, type = 32767, 
>           flags = (URI_SIP_USER_PHONE | unknown: 0x54c01c34), transport = {s = 0x128 <error: Cannot access memory at address 0x128>, len = -1996563712}, ttl = {s = 0x7fff30445910 "\340YD0\377\177", len = -1437055248}, user_param = {s = 0x7efdaa823350 "\356\b", 
>             len = 809787696}, maddr = {s = 0x7efdaa53ec30 "", len = 0}, method = {s = 0x7fff304459e0 "\220ZD0\377\177", len = 1424958313}, lr = {s = 0x7efdaa92b370 "sip:xxx at xxx;transport=TCP", len = -1437343728}, r2 = {
>             s = 0x7fff30445960 "\220YD0\377\177", len = -1433226400}, gr = {s = 0x4c0 <error: Cannot access memory at address 0x4c0>, len = -1437343728}, transport_val = {s = 0x7efdaa92b330 "\020", len = -1433225152}, ttl_val = {s = 0x7fff30445990 "", len = 1424983377}, 
>           user_param_val = {s = 0x4d <error: Cannot access memory at address 0x4d>, len = -1996563712}, maddr_val = {s = 0x1a00d4b5e0 <error: Cannot access memory at address 0x1a00d4b5e0>, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = -1996563712}, r2_val = {s = 0x7efdaa820d18 "\002", len = 0}, gr_val = {s = 0x0, len = 1426245171}}
>         u = 0x7efdaa5846f0
>         port = 181
>         dst_host = 0xbed57d2d88fedb00
>         i = 18
>         flags = 0
>         avp = 0x7efdaa5846f0
>         st = {flags = 32, id = 0, name = {n = 0, s = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 0}, re = 0x200000000}, avp = 0x55895502c633}
>         sct = 0x7efdaa858190
>         sjt = 0x7efdaa96ae62
>         rve = 0x7efdaa85ed70
>         mct = 0x0
>         rv = 0x7efdaa54a1e0
>         rv1 = 0x7fff00000015
>         c1 = {cache_type = 809786000, val_type = 32767, c = {avp_val = {n = 1423642494, s = {s = 0x558954db0f7e <rval_destroy_helper+1115> "\353\005\350ۑ\342\377\220H\213E\310dH+\004%(", len = 0}, re = 0x558954db0f7e <rval_destroy_helper+1115>}, pval = {rs = {
>                 s = 0x558954db0f7e <rval_destroy_helper+1115> "\353\005\350ۑ\342\377\220H\213E\310dH+\004%(", len = 0}, ri = -1434317544, flags = 32509}}, i2s = "\340[D0\377\177\000\000\200\005\202\252\375~\000\000x[D0\377\177"}
>         s = {s = 0x7fff304456c0 "", len = 0}
>         srevp = {0x20, 0x7efdb264b030 <__syslog>}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
>                 s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
>               attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
>               select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
>               attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
>               attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #5  0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa84d5f0, msg=0x7efdaa5846f0) at core/action.c:1584
>         t = 0x7efdaa860940
>         ret = 1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
>         tdiff = 809786592
>         __func__ = "run_actions"
> #6  0x0000558954bfdb07 in do_action (h=0x7fff3044aeb0, a=0x7efdaa824ec0, msg=0x7efdaa5846f0) at core/action.c:703
>         ret = -5
>         v = 0
>         dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000ȅx\252\375~\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "ȅx\252\375~\000"}, sin6 = {sin6_family = 44720, 
>               sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "ȅx\252\375~\000\000\000\000\000\000\000\000\000", __u6_addr16 = {34248, 43640, 32509, 0, 0, 0, 0, 0}, __u6_addr32 = {2860025288, 32509, 0, 0}}}, sin6_scope_id = 0}, sas = {
>               ss_family = 44720, 
>               __ss_padding = "D0\377\177\000\000ȅx\252\375~", '\000' <repeats 14 times>, "\377\177\000\000P\256\226\252\375~", '\000' <repeats 11 times>, "\333\376\210-}վ\250H[\252\375~\000\000\000\000\000\000\002", '\000' <repeats 11 times>, "\322\030\325T\211U\000\000 \000\000\000\000\000\000\000\060cD0\377\177\000\000\320cD0\377\177\000\000\211\366\315T\211U\000", __ss_align = 139627952462296}}, id = -1434335200, send_flags = {f = 32509, blst_imask = 0}, proto = -16 '\360', proto_pad0 = 70 'F', proto_pad1 = -21928}
>         tmp = 0x55895502c633 "INFO"
>         new_uri = 0x1390 <error: Cannot access memory at address 0x1390>
>         end = 0x0
>         crt = 0x20 <error: Cannot access memory at address 0x20>
>         cmd = 0x7efdaa584a18
>         len = -1466248417
>         user = 32509
>         uri = {user = {s = 0x558900000001 <error: Cannot access memory at address 0x558900000001>, len = 128}, passwd = {s = 0x7efd8b863380 "\200", len = -1996563712}, host = {s = 0x7efd8b863380 "\200", len = 0}, port = {s = 0x0, len = 1426245171}, params = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, sip_params = {s = 0x7fff304460f0 "\020bD0\377\177", len = 1421936895}, headers = {s = 0x0, len = 1426245171}, port_no = 32, proto = 0, type = ERROR_URI_T, 
>           flags = (unknown: 0xb264b030), transport = {s = 0x7fff304460a0 "\340aD0\377\177", len = -1437055248}, ttl = {s = 0x7efdaa823350 "\356\b", len = 809787696}, user_param = {s = 0x7efdaa81ebb0 "\343\b", len = 809807536}, maddr = {s = 0x0, len = 0}, method = {
>             s = 0x0, len = 1}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, transport_val = {s = 0x58a6da26e959d282 <error: Cannot access memory at address 0x58a6da26e959d282>, 
>             len = 1514263170}, ttl_val = {s = 0x0, len = 809787472}, user_param_val = {s = 0x407efdaa53e230 <error: Cannot access memory at address 0x407efdaa53e230>, len = -1434679252}, maddr_val = {s = 0x7fff30446120 "paD0\377\177", len = 1424795871}, method_val = {
>             s = 0x7efdaa96ae50 "\002", len = 53}, lr_val = {s = 0x7efdaa7c882d "request_uri)", len = 11}, r2_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, gr_val = {s = 0x72 <error: Cannot access memory at address 0x72>, len = 1426245171}}
>         next_hop = {user = {s = 0x7efd8b863390 "@", len = -1954139232}, passwd = {s = 0x7fff30446140 " ", len = -1996563712}, host = {s = 0x7fff304461e0 "PcD0\377\177", len = 1423653555}, port = {s = 0x100000035 <error: Cannot access memory at address 0x100000035>, 
>             len = -1996563712}, params = {s = 0x7fff304462a0 "", len = 0}, sip_params = {s = 0x0, len = 1426245171}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, port_no = 25104, proto = 12356, type = 32767, 
>           flags = (URI_USER_NORMALIZE | unknown: 0x54c1106c), transport = {s = 0x0, len = -1437055248}, ttl = {s = 0x7efdaa823350 "\356\b", len = -1996563712}, user_param = {s = 0x7fff30446170 "\340F\202\252\375~", len = 0}, maddr = {s = 0x0, len = 1426245171}, 
>           method = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, lr = {s = 0x7fff30446210 "PcD0\377\177", len = 1423531231}, r2 = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1437055248}, gr = {s = 0x7efdaa8246e0 "\002", 
>             len = 809807536}, transport_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 53}, ttl_val = {s = 0x7efdaa7c882d "request_uri)", len = 11}, user_param_val = {s = 0x0, len = -1996563712}, maddr_val = {
>             s = 0x1000000000 <error: Cannot access memory at address 0x1000000000>, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1996563712}, r2_val = {s = 0x7fff30446350 "\300dD0\377\177", 
>             len = 0}, gr_val = {s = 0x0, len = 1426245171}}
>         u = 0x7efdb264b030 <__syslog>
>         port = 43603
>         dst_host = 0x0
>         i = 16
>         flags = 32767
>         avp = 0x7fff30445ed0
>         st = {flags = 32, id = 0, name = {n = -1302024144, s = {s = 0x7efdb264b030 <__syslog> "H\201\354", <incomplete sequence \330>, len = 809787728}, re = 0x7efdb264b030 <__syslog>}, avp = 0x558954d92a55 <eval_elem+2278>}
>         sct = 0x1600000001
>         sjt = 0x0
>         rve = 0xaaa5813c4
>         mct = 0x7fff30445ed4
>         rv = 0x0
>         rv1 = 0x558954d90420 <check_self_op+83>
>         c1 = {cache_type = 809788240, val_type = 32767, c = {avp_val = {n = 1423653453, s = {s = 0x558954db3a4d <rval_get_int+239> "H\213\225\370\376\377\377\211\002H\213\205\370\376\377\377\213", len = -1437055248}, re = 0x558954db3a4d <rval_get_int+239>}, pval = {
>               rs = {s = 0x558954db3a4d <rval_get_int+239> "H\213\225\370\376\377\377\211\002H\213\205\370\376\377\377\213", len = -1437055248}, ri = 809807536, flags = 32767}}, i2s = "P\256\226\252\375~\000\000\000\000\000\000\000\000\000\000\070G\202\252\375~"}
>         s = {s = 0x0, len = 0}
>         srevp = {0x20, 0x7efdb264b030 <__syslog>}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
>                 s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
>               attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
>               select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
>               attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
>               attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #7  0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa824ec0, msg=0x7efdaa5846f0) at core/action.c:1584
>         t = 0x7efdaa824ec0
>         ret = -1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
>         tdiff = 809788688
>         __func__ = "run_actions"
> #8  0x0000558954c01b16 in do_action (h=0x7fff3044aeb0, a=0x7efdaa8250e0, msg=0x7efdaa5846f0) at core/action.c:1070
>         ret = 1
>         v = 1
>         dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000\220\005\000\000\000\000\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "\220\005\000\000\000\000\000"}, sin6 = {
>               sin6_family = 44720, sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "\220\005", '\000' <repeats 13 times>, __u6_addr16 = {1424, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {1424, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {
>               ss_family = 44720, 
>               __ss_padding = "D0\377\177\000\000\220\005", '\000' <repeats 22 times>, "\322\030\325T\211U", '\000' <repeats 11 times>, "\333\376\210-}վ\230\323v\252\375~", '\000' <repeats 18 times>, "\322\030\325T\000\020\000\000\000\004\000\000\n\000\000\000 at mD0\377\177\000\000\000lD0\377\177\000\000\211\366\315T\211U\000", __ss_align = 139627951675592}}, id = -1435120096, send_flags = {f = 32509, blst_imask = 0}, proto = -16 '\360', proto_pad0 = 70 'F', proto_pad1 = -21928}
>         tmp = 0x7efda8d4ab06 <sint2str+47> "\311\303UH\211\345H\211}\350\211u\344\211U\340\213E\340H\215P\377H\213E\350H\001\320H\211E\370\353\037H\213E\370\017\266"
>         new_uri = 0x5589551b6391 <ut_buf_int2str+17> "5000"
>         end = 0x0
>         crt = 0x7fff30446684 ""
>         cmd = 0x7fff30446680
>         len = 0
>         user = 0
>         uri = {user = {s = 0x0, len = 1426245171}, passwd = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1996563712}, host = {s = 0x7fff304467a0 "\300gD0\377\177", len = 0}, port = {s = 0x0, len = 1426245171}, params = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, sip_params = {s = 0x7fff30446920 "@jD0\377\177", len = 1421936895}, headers = {s = 0x5589551b6391 <ut_buf_int2str+17> "5000", len = -1996563712}, port_no = 26560, proto = 12356, 
>           type = 32767, flags = (URI_SIP_USER_PHONE | unknown: 0xa8d4ab04), transport = {s = 0x7fff304467f4 "", len = -1437055248}, ttl = {s = 0x7efdaa7807f0 "C\a", len = 809789792}, user_param = {s = 0x7fff304467f0 "", len = 809789808}, maddr = {
>             s = 0x7efdaa771d48 "\001", len = -1437055248}, method = {s = 0x0, len = 1427858321}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 809789808}, transport_val = {s = 0x7efdaa771d30 "\017", 
>             len = -1437055248}, ttl_val = {s = 0x7fff30446870 "0iD0\377\177", len = 0}, user_param_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 809790536}, maddr_val = {s = 0x7efdaa76d3b8 "", len = -1437055248}, method_val = {
>             s = 0x7fff30446930 "\360FX\252\375~", len = 1423240445}, lr_val = {s = 0x0, len = 809790536}, r2_val = {s = 0x7efdaa76d3a0 "\026", len = -1996563712}, gr_val = {s = 0x7fff30446a10 "\200kD0\377\177", len = 0}}
>         next_hop = {user = {s = 0x0, len = 1423251666}, passwd = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 809789808}, host = {s = 0x7fff30446a10 "\200kD0\377\177", len = 1423654338}, port = {s = 0x7efdaa5846f0 "jS\033", len = -1996563712}, 
>           params = {s = 0x7fff30446920 "@jD0\377\177", len = 0}, sip_params = {s = 0x0, len = 1426245171}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, port_no = 27200, proto = 12356, type = 32767, 
>           flags = (URI_USER_NORMALIZE | unknown: 0x54c1106c), transport = {s = 0x7efdaa5846f0 "jS\033", len = -1437055248}, ttl = {s = 0x7efdaa7807f0 "C\a", len = 809807536}, user_param = {s = 0x7fff30446c40 "", len = 0}, maddr = {s = 0x0, len = 1}, method = {
>             s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = -2131111294}, lr = {s = 0x0, len = 1426245171}, r2 = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr = {
>             s = 0x58a6da269d99d282 <error: Cannot access memory at address 0x58a6da269d99d282>, len = 1514263170}, transport_val = {s = 0x7efd00000000 <error: Cannot access memory at address 0x7efd00000000>, len = 1}, ttl_val = {s = 0x7efdaa62424d "acc_request_source)", 
>             len = -1996563712}, user_param_val = {s = 0x7fff30446a30 "\200kD0\377\177", len = -1996563712}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, 
>           r2_val = {s = 0x7fff30446b80 "\360lD0\377\177", len = 1423675477}, gr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}}
>         u = 0x7efdaa5846f0
>         port = 65535
>         dst_host = 0x0
>         i = 66
>         flags = 0
>         avp = 0x7efdaa76c1e0
>         st = {flags = 2858662608, id = 32509, name = {n = 19, s = {s = 0x7efd00000013 <error: Cannot access memory at address 0x7efd00000013>, len = 809789416}, re = 0x7efd00000013}, avp = 0x1600000000}
>         sct = 0x7efdaa5846f0
>         sjt = 0x0
>         rve = 0x7efdaa824730
>         mct = 0x7efdaa760948
>         rv = 0x7fff30446650
>         rv1 = 0x7fff304467f0
>         c1 = {cache_type = 809790336, val_type = 32767, c = {avp_val = {n = 1423653555, s = {
>                 s = 0x558954db3ab3 <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = -1437055248}, 
>               re = 0x558954db3ab3 <rval_get_int+341>}, pval = {rs = {s = 0x558954db3ab3 <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", 
>                 len = -1437055248}, ri = 809807536, flags = 32767}}, i2s = "@lD0\377\177\000\000\000\000\000\000\000\000\000\000\350\020x\252\375~"}
>         s = {s = 0x7fff30446788 "\377\b\301T\211U", len = 0}
>         srevp = {0x7fff30446b80, 0xbed57d2d88fedb00}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
>                 s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
>               attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
>               select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
>               attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
>               attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #9  0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa81c230, msg=0x7efdaa5846f0) at core/action.c:1584
>         t = 0x7efdaa8250e0
>         ret = 1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
>         tdiff = 809790784
>         __func__ = "run_actions"
> #10 0x0000558954bfdb07 in do_action (h=0x7fff3044aeb0, a=0x7efdaa783a40, msg=0x7efdaa5846f0) at core/action.c:703
>         ret = -5
>         v = 1
>         dst = {send_sock = 0x13c4, to = {s = {sa_family = 50739, sa_data = "\002U\211U\000\000 \000\000\000\000\000\000"}, sin = {sin_family = 50739, sin_port = 21762, sin_addr = {s_addr = 21897}, sin_zero = " \000\000\000\000\000\000"}, sin6 = {sin6_family = 50739, 
>               sin6_port = 21762, sin6_flowinfo = 21897, sin6_addr = {__in6_u = {__u6_addr8 = " \000\000\000\000\000\000\000\060\260d\262\375~\000", __u6_addr16 = {32, 0, 0, 0, 45104, 45668, 32509, 0}, __u6_addr32 = {32, 0, 2992943152, 32509}}}, 
>               sin6_scope_id = 809792416}, sas = {ss_family = 50739, 
>               __ss_padding = "\002U\211U\000\000 \000\000\000\000\000\000\000\060\260d\262\375~\000\000\240sD0\377\177\000\000\253f\366\250\375~\000\000\360rD0\377\177\000\000\000\333\376\210-}վ\260~[\252\375~\000\000\000\000\000\000\002", '\000' <repeats 11 times>, "\322\030\325T\211U\000\000 \000\000\000\000\000\000\000\220sD0\377\177\000\000\060tD0\377\177\000\000\211\366\315T\211U\000", __ss_align = 139627950435128}}, id = -1436358080, send_flags = {f = 32509, blst_imask = 0}, proto = -16 '\360', proto_pad0 = 70 'F', 
>           proto_pad1 = -21928}
>         tmp = 0x200000000 <error: Cannot access memory at address 0x200000000>
>         new_uri = 0x558954e2d2ae <cmp_hdrname_str+1259> "H\213]\310dH+\034%("
>         end = 0x0
>         crt = 0x0
>         cmd = 0x7efdaa5a9d30
>         len = 0
>         user = 2
>         uri = {user = {s = 0x558954ef1321 <split_frag+201> "\270", len = 80}, passwd = {s = 0x7efd8b862c90 "P", len = -2041446400}, host = {s = 0x7efd8b862c90 "P", len = 30624}, port = {s = 0x7efd8b862cf0 "P", len = -1954140928}, params = {
>             s = 0x7fff30447060 "\220pD0\377\177", len = 1424954550}, sip_params = {s = 0x50 <error: Cannot access memory at address 0x50>, len = -2041446400}, headers = {s = 0xa <error: Cannot access memory at address 0xa>, len = 1025}, port_no = 0, proto = 34386, 
>           type = 32509, flags = (unknown: 0x8b862c90), transport = {s = 0x7fff30447670 "\020xD0\377\177", len = -1996563712}, ttl = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, 
>             len = -2041403312}, maddr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, method = {s = 0x130447060 <error: Cannot access memory at address 0x130447060>, len = -2041403312}, lr = {s = 0x7fff30447060 "\220pD0\377\177", len = 1424947257}, 
>           r2 = {s = 0x0, len = -2041403312}, gr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, transport_val = {s = 0x7fff30447090 "\200qD0\377\177", len = 1424983377}, ttl_val = {s = 0x41 <error: Cannot access memory at address 0x41>, 
>             len = 809791664}, user_param_val = {s = 0x87efdaa8e4f50 <error: Cannot access memory at address 0x87efdaa8e4f50>, len = -1436512180}, maddr_val = {s = 0x7fff30447180 "\320qD0\377\177", len = 1424795871}, method_val = {s = 0x7efdaa80e380 "30013", len = 5}, 
>           lr_val = {s = 0x7efdaa60904d "peer_in_id)", len = 10}, r2_val = {s = 0x7fff304471c0 "", len = 1422279978}, gr_val = {s = 0x41 <error: Cannot access memory at address 0x41>, len = 0}}
>         next_hop = {user = {s = 0x7efd8b862ca0 "\b", len = -1954141008}, passwd = {s = 0x30363035304475e7 <error: Cannot access memory at address 0x30363035304475e7>, len = 0}, host = {s = 0x0, len = 1426245171}, port = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, params = {s = 0x7fff30447260 " s\001", len = -1462359849}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x7efdaa6036f0 "", len = -1996563712}, port_no = 57800, proto = 43618, 
>           type = 32509, flags = (URI_USER_NORMALIZE | unknown: 0x4), transport = {s = 0x0, len = 1426245171}, ttl = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, user_param = {s = 0x7fff304471d0 "0rD0\377\177", len = 1424796052}, maddr = {
>             s = 0x7efdaa80e380 "30013", len = 5}, method = {s = 0x7efdaa60904d "peer_in_id)", len = 10}, lr = {s = 0x11300000000 <error: Cannot access memory at address 0x11300000000>, len = 1427857984}, r2 = {s = 0x0, len = -1954141024}, gr = {
>             s = 0x7fff30447230 " sD0\377\177", len = 1424796326}, transport_val = {s = 0x7efdaa80e380 "30013", len = 5}, ttl_val = {s = 0x7efdaa60904d "peer_in_id)", len = 10}, user_param_val = {s = 0x0, len = 0}, maddr_val = {
>             s = 0x1000000000 <error: Cannot access memory at address 0x1000000000>, len = 1427857984}, method_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, lr_val = {s = 0x7fff30447320 "0tD0\377\177", len = -1462317108}, r2_val = {
>             s = 0x7fff30447390 "", len = 0}, gr_val = {s = 0x7efdaa609000 "", len = -1437055248}}
>         u = 0x55895502c633
>         port = 35070
>         dst_host = 0x55895502c633
>         i = 14
>         flags = 32509
>         avp = 0x20
>         st = {flags = 1424947432, id = 21897, name = {n = -1954140928, s = {s = 0x7efd8b862d00 "P", len = -2041446400}, re = 0x7efd8b862d00}, avp = 0x7efdaa5846f0}
>         sct = 0xa00000000
>         sjt = 0x7fff30447020
>         rve = 0x7efdaa7810e0
>         mct = 0x7fff30446f60
>         rv = 0x0
>         rv1 = 0x558954e2cd7c <cmpi_str+154>
>         c1 = {cache_type = 2858447024, val_type = 32509, c = {avp_val = {n = 809792400, s = {s = 0x7fff30447390 "", len = -1436512179}, re = 0x7fff30447390}, pval = {rs = {s = 0x7fff30447390 "", len = -1436512179}, ri = 10, flags = 32509}}, 
>           i2s = "\200〪\375~\000\000\005\000\000\000\000\000\000\000P~D0\377\177"}
>         s = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1424149884}
>         srevp = {0x400017320, 0x300000000}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
>                 s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
>               attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
>               select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
>               attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
>               attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #11 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa74a9f0, msg=0x7efdaa5846f0) at core/action.c:1584
>         t = 0x7efdaa783a40
>         ret = 1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 1426245171, tz_dsttime = 21897}
>         tdiff = 0
>         __func__ = "run_actions"
> #12 0x0000558954bfdb07 in do_action (h=0x7fff3044aeb0, a=0x7efdaa6161b0, msg=0x7efdaa5846f0) at core/action.c:703
>         ret = -5
>         v = 1
>         dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000\260{D0\377\177\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "\260{D0\377\177\000"}, sin6 = {sin6_family = 44720, 
>               sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = "\260{D0\377\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {31664, 12356, 32767, 0, 0, 0, 0, 0}, __u6_addr32 = {809794480, 32767, 0, 0}}}, sin6_scope_id = 809794848}, 
>             sas = {ss_family = 44720, 
>               __ss_padding = "D0\377\177\000\000\260{D0\377\177\000\000\000\000\000\000\000\000\000\000 }D0\377\177", '\000' <repeats 19 times>, "\333\376\210-}վ\000\000\000\000\000\000\240\356\000\000\000\000\002", '\000' <repeats 11 times>, "\322\030\325T0u\000\000=u\000\000\021\000\000\000\240}D0\377\177\000\000`|D0\377\177\000\000\211\366\315T\211U\000", __ss_align = 139627950425864}}, id = -1436367744, send_flags = {f = 32509, blst_imask = 0}, proto = -16 '\360', proto_pad0 = 70 'F', proto_pad1 = -21928}
>         tmp = 0x200000000 <error: Cannot access memory at address 0x200000000>
>         new_uri = 0x0
>         end = 0x7efdaa607130 ""
>         crt = 0x0
>         cmd = 0x7fff30447740
>         len = 809793000
>         user = 32767
>         uri = {user = {s = 0x7fff30447c38 "", len = 809793632}, passwd = {s = 0x0, len = 1423251666}, host = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 809793632}, port = {s = 0x7fff30447900 "pzD0\377\177", len = 1423656503}, params = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, sip_params = {s = 0x7fff30447980 "\240zD0\377\177", len = 0}, headers = {s = 0x7efdaa6143a8 "\a", len = 809794616}, port_no = 18160, proto = 43608, type = 32509, 
>           flags = (unknown: 0x3044aeb0), transport = {s = 0x7fff30447930 "\240Ca\252\375~", len = 0}, ttl = {s = 0x7efdaa62cfa0 "m\004", len = 809793984}, user_param = {s = 0x7fff30447860 "", len = 1426245171}, maddr = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7efdaa62afb8 "", len = -1437055248}, transport_val = {s = 0x7efdaa62afb8 "", len = -1437055248}, 
>           ttl_val = {s = 0x0, len = 16}, user_param_val = {s = 0x7efdab04f2d0 "", len = -1996563712}, maddr_val = {s = 0x7fff304478f0 " ", len = -1996563712}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 1426245171}, r2_val = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr_val = {s = 0x7fff30447a70 "\340{D0\377\177", len = 1423675477}}
>         next_hop = {user = {s = 0x7fff30447950 "\220zD0\377\177", len = -1996563712}, passwd = {s = 0x7efdaa53e010 "\001", len = 0}, host = {s = 0x7efdaa6143a0 "\001", len = 809794616}, port = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, params = {
>             s = 0x7fff30447a90 "\300{D0\377\177", len = 0}, sip_params = {s = 0x7efdaa615188 "\001", len = 809794620}, headers = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, port_no = 31392, proto = 12356, type = 32767, flags = 0, transport = {s = 0x7fff304479d0 "", 
>             len = -1437055248}, ttl = {s = 0x0, len = 809807536}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 1}, method = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = -1581657470}, lr = {s = 0x0, len = 1426245171}, r2 = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr = {s = 0x58a6da26bd59d282 <error: Cannot access memory at address 0x58a6da26bd59d282>, len = 1514263170}, transport_val = {
>             s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = -1996563712}, ttl_val = {s = 0x19aa53e618 <error: Cannot access memory at address 0x19aa53e618>, len = 0}, user_param_val = {s = 0x0, len = -1996563712}, maddr_val = {
>             s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, r2_val = {s = 0x7fff30447be0 "P}D0\377\177", len = 1423675477}, 
>           gr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}}
>         u = 0x55895502c633
>         port = 0
>         dst_host = 0xbed57d2d88fedb00
>         i = 9
>         flags = 0
>         avp = 0x20
>         st = {flags = 0, id = 32767, name = {n = 1445170114, s = {
>               s = 0x558956238bc2 "X-Src-Addr: xxx;udp\r\nX-Src-Peer: 30013\r\nContact: <sip:btpsh-6137d4b2-61bc-3ce509-leg1 at xxx:5060;transport=tcp>\r\n\r\nv=0\r\no=- 461374211 461374211 IN IP4 xxx\r\ns=xxx\r\nc=IN"..., len = 10}, 
>             re = 0x558956238bc2}, avp = 0x7efdaa5846f0}
>         sct = 0x7efdaa5846f0
>         sjt = 0x30447850
>         rve = 0x7fff30447860
>         mct = 0x7efdaa6143c8
>         rv = 0x7fff304476c0
>         rv1 = 0x558954e2cd7c <cmpi_str+154>
>         c1 = {cache_type = 2858504576, val_type = 32509, c = {avp_val = {n = 809794620, s = {s = 0x7fff30447c3c "", len = -1437055248}, re = 0x7fff30447c3c}, pval = {rs = {s = 0x7fff30447c3c "", len = -1437055248}, ri = 809807536, flags = 32767}}, 
>           i2s = "\200\376\022V\211U", '\000' <repeats 14 times>, "\375~"}
>         s = {s = 0x7fff304477c0 "", len = 1423240445}
>         srevp = {0x7fff30447bc0, 0xbed57d2d88fedb00}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
>                 s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
>               attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
>               select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
>               attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
>               attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #13 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa616000, msg=0x7efdaa5846f0) at core/action.c:1584
>         t = 0x7efdaa6161b0
>         ret = 1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
>         tdiff = 809794976
>         __func__ = "run_actions"
> #14 0x0000558954c01b16 in do_action (h=0x7fff3044aeb0, a=0x7efdaa616470, msg=0x7efdaa5846f0) at core/action.c:1070
>         ret = 1
>         v = 1
>         dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, 
>               sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, 
>               __ss_padding = '\000' <repeats 38 times>, "\002", '\000' <repeats 11 times>, "\005\000\000\000h\202[\252\375~\000\000\000\000\000\000\375~\000\000\060\204D0\377\177\000\000i#\357T N\000\000=u\000\000\021\000\000\000ЅD0\377\177\000\000\250\005\003U\211U\000\000\000\333\376\210-}վ", __ss_align = 768}}, id = 2, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
>         tmp = 0x0
>         new_uri = 0x0
>         end = 0x7efdaa607130 ""
>         crt = 0x558956238907 "sip:+xxx at xxx;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP xxx:5060;branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>;tag=3d"...
>         cmd = 0x7efdaa5ba500
>         len = 1424796052
>         user = 21897
>         uri = {user = {s = 0x7fff30448468 "", len = 809795728}, passwd = {s = 0x0, len = 1423251666}, host = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 809795728}, port = {s = 0x7fff30448130 "\240\202D0\377\177", len = 1423656503}, params = {
>             s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 122344320}, sip_params = {s = 0xa7a3e0 <error: Cannot access memory at address 0xa7a3e0>, len = 0}, headers = {s = 0x7efdaa612748 "\a", len = 809796712}, port_no = 18160, proto = 43608, 
>           type = 32509, flags = (unknown: 0x3044aeb0), transport = {s = 0x7fff30448070 "@\201D0\377\177", len = 0}, ttl = {s = 0x0, len = -1426974192}, user_param = {s = 0x7fff30448090 "", len = 0}, maddr = {s = 0x7fff30448140 "\240\201D0\377\177", len = 1424958313}, 
>           method = {s = 0x7efdaa92b8a0 "\300\210\222\252\375~", len = -1437343728}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = -1437343728}, gr = {s = 0x7efdaa92b840 "0", len = -1433224624}, transport_val = {s = 0x2a0 <error: Cannot access memory at address 0x2a0>, 
>             len = -1433226400}, ttl_val = {s = 0x4c0 <error: Cannot access memory at address 0x4c0>, len = -1437343728}, user_param_val = {s = 0x7efdaa92b330 "\020", len = -1433225152}, maddr_val = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, 
>             len = -1996563712}, method_val = {s = 0xa7a800 <error: Cannot access memory at address 0xa7a800>, len = 0}, lr_val = {s = 0x0, len = 1426245171}, r2_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr_val = {
>             s = 0x7fff304482a0 "\020\204D0\377\177", len = 1423675477}}
>         next_hop = {user = {s = 0x7fff304481a0 "\360FX\252\375~", len = -1466248417}, passwd = {s = 0x0, len = 0}, host = {s = 0x7efdaa612740 "\001", len = 809796712}, port = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, params = {
>             s = 0xd4b5e0 <error: Cannot access memory at address 0xd4b5e0>, len = 0}, sip_params = {s = 0x7efdaa613528 "\001", len = 809796716}, headers = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {
>             s = 0x7efdaa53ec30 "", len = 0}, ttl = {s = 0x0, len = 1424954698}, user_param = {s = 0x400 <error: Cannot access memory at address 0x400>, len = -1437343728}, maddr = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -1437055248}, method = {
>             s = 0x7efdaa53e010 "\001", len = -1433226400}, lr = {s = 0x7efdaaf21a10 "\300\210\222\252\375~", len = 6}, r2 = {s = 0x7efda8f30010 "sl:local-response", len = 17}, gr = {s = 0x58a6da2752f9d282 <error: Cannot access memory at address 0x58a6da2752f9d282>, 
>             len = 1445170245}, transport_val = {s = 0x0, len = 1445170508}, ttl_val = {s = 0x0, len = -1996563712}, user_param_val = {s = 0x7fff304486a0 "\220\357Y\252\375~", len = -1996563712}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 1426245171}, 
>           lr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, r2_val = {s = 0x7fff30448410 "\200\205D0\377\177", len = 1423675477}, gr_val = {s = 0x7efdaa59ef90 "\377\377\377\377", len = 0}}
>         u = 0x35
>         port = 45668
>         dst_host = 0xbed57d2d88fedb00
>         i = -2008929216
>         flags = 32767
>         avp = 0x558955111180 <buff>
>         st = {flags = 980445555, id = 13099, name = {n = 858928436, s = {s = 0x3832323533323534 <error: Cannot access memory at address 0x3832323533323534>, len = 1769160761}, re = 0x3832323533323534}, avp = 0x7465732e69662e65}
>         sct = 0x7efdaa5846f0
>         sjt = 0x0
>         rve = 0x7efdaa615870
>         mct = 0x7efdaa612768
>         rv = 0xd4b5e0
>         rv1 = 0x55890000000d
>         c1 = {cache_type = 2858497312, val_type = 32509, c = {avp_val = {n = 809796716, s = {s = 0x7fff3044846c "", len = -1437055248}, re = 0x7fff3044846c}, pval = {rs = {s = 0x7fff3044846c "", len = -1437055248}, ri = 809807536, flags = 32767}}, 
>           i2s = "\000\000\000\000\000\000\000\000\360FX\252\375~\000\000\000\000\000\000\000"}
>         s = {s = 0x7fff30447ff0 "0\201D0\377\177", len = 1423240445}
>         srevp = {0x800000000, 0x7efda8b6ecea}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
>                 s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
>               attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
>               select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
>               attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
>               attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #15 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa616470, msg=0x7efdaa5846f0) at core/action.c:1584
>         t = 0x7efdaa616470
>         ret = -1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
>         tdiff = 809797072
>         __func__ = "run_actions"
> #16 0x0000558954c01b16 in do_action (h=0x7fff3044aeb0, a=0x7efdaa616690, msg=0x7efdaa5846f0) at core/action.c:1070
>         ret = 1
>         v = 1
>         dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, 
>               sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, 
>               __ss_padding = '\000' <repeats 31 times>, "\333\376\210-}վ", '\000' <repeats 12 times>, "\002", '\000' <repeats 11 times>, "\063\306\002U\211U\000\000 \000\000\000\000\000\000\000\060\260d\262\020'\000\000=u\000\000\023\000\000\000\000\216D0\377\177\000\000\300\214D0\377\177\000\000\360FX\252\375~\000", __ss_align = 139627950287840}}, id = 809807536, send_flags = {f = 32767, blst_imask = 0}, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
>         tmp = 0x558954e2b064 <unescape_user+3267> "\203\370\002\017\216 \003"
>         new_uri = 0x0
>         end = 0x7efdaa607130 ""
>         crt = 0x0
>         cmd = 0x0
>         len = 0
>         user = 1
>         uri = {user = {s = 0x7fff30448c98 "", len = 809797824}, passwd = {s = 0x0, len = 1423251666}, host = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 809797824}, port = {s = 0x7fff30448960 "ЊD0\377\177", len = 1423656503}, params = {
>             s = 0x7fff304488f0 "\200\250\247", len = -1996563712}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x7efdaa610828 "\a", len = 809798808}, port_no = 18160, proto = 43608, type = 32509, flags = (unknown: 0x3044aeb0), transport = {
>             s = 0x7fff30448f00 "\350\353`\252\375~", len = 0}, ttl = {s = 0x7efdaac2c740 "2\023", len = 1424974825}, user_param = {s = 0x7fff304488c0 "", len = -1437055248}, maddr = {s = 0x7efdaa609b40 "\027\004", len = 809799904}, method = {
>             s = 0x10 <error: Cannot access memory at address 0x10>, len = -1437343728}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 122343136}, transport_val = {
>             s = 0xa7a880 <error: Cannot access memory at address 0xa7a880>, len = 11874592}, ttl_val = {s = 0xd4b5e0 <error: Cannot access memory at address 0xd4b5e0>, len = 16}, user_param_val = {s = 0x131 <error: Cannot access memory at address 0x131>, 
>             len = -1996563712}, maddr_val = {s = 0x7fff30448950 " ", len = -1996563712}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 1426245171}, r2_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr_val = {
>             s = 0x7fff30448ad0 "@\214D0\377\177", len = 1423675477}}
>         next_hop = {user = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 1}, passwd = {s = 0x7efdaa53e010 "\001", len = -1434393744}, host = {s = 0x7efdaa610820 "\001", len = 809798808}, port = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, params = {
>             s = 0x7fff304489e0 "", len = 0}, sip_params = {s = 0x7efdaa611608 "\001", len = 809798812}, headers = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, port_no = 0, proto = 0, type = 32767, flags = 0, transport = {s = 0x0, len = 1426245171}, ttl = {s = 0x0, 
>             len = -1302024144}, user_param = {s = 0x7fff30448ad0 "@\214D0\377\177", len = -1462135749}, maddr = {s = 0x7efdaa60904d "peer_in_id)", len = 10}, method = {s = 0x7fff30448b20 "\v-\206\213\375~", len = -1436520144}, lr = {
>             s = 0x111aa602728 <error: Cannot access memory at address 0x111aa602728>, len = 1427857984}, r2 = {s = 0x800000111 <error: Cannot access memory at address 0x800000111>, len = -1436512179}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, 
>           ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = -1996563712}, maddr_val = {s = 0x1000000000 <error: Cannot access memory at address 0x1000000000>, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, r2_val = {s = 0x7fff30448c40 "\260\215D0\377\177", len = 1423675477}, gr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}}
>         u = 0x0
>         port = 12356
>         dst_host = 0xbed57d2d88fedb00
>         i = 0
>         flags = 0
>         avp = 0x7fff30448950
>         st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = -2041446400}, re = 0x0}, avp = 0x7efdb264b030 <__syslog>}
>         sct = 0x7efdaa5846f0
>         sjt = 0x0
>         rve = 0x7efdaa613c10
>         mct = 0x7efdaa610848
>         rv = 0x7fff304487d0
>         rv1 = 0x7fff30448c20
>         c1 = {cache_type = 2858489344, val_type = 32509, c = {avp_val = {n = 809798812, s = {s = 0x7fff30448c9c "", len = -1437055248}, re = 0x7fff30448c9c}, pval = {rs = {s = 0x7fff30448c9c "", len = -1437055248}, ri = 809807536, flags = 32767}}, 
>           i2s = "\v-\206\213\375~\000\000\005\000\000\000\375~\000\000\000\000\000\000\000"}
>         s = {s = 0x7fff30448820 "`\211D0\377\177", len = 1423240445}
>         srevp = {0x7fff30448c20, 0xfe54d4ecfd}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
>                 s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
>               attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
>               select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
>               attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
>               attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #17 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa616690, msg=0x7efdaa5846f0) at core/action.c:1584
>         t = 0x7efdaa616690
>         ret = -1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
>         tdiff = 809799168
>         __func__ = "run_actions"
> #18 0x0000558954c01b6c in do_action (h=0x7fff3044aeb0, a=0x7efdaa6167a0, msg=0x7efdaa5846f0) at core/action.c:1074
>         ret = 1
>         v = 0
>         dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 60360, sa_data = "`\252\375~\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 60360, sin_port = 43616, sin_addr = {s_addr = 32509}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
>               sin6_family = 60360, sin6_port = 43616, sin6_flowinfo = 32509, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 60360, 
>               __ss_padding = "`\252\375~", '\000' <repeats 30 times>, "\001", '\000' <repeats 12 times>, "\333\376\210-}վ", '\000' <repeats 12 times>, "\002", '\000' <repeats 35 times>, "\360\224D0\377\177\000\000J\363\315T\211U\000", __ss_align = 139627950275960}}, 
>           id = -1436517248, send_flags = {f = 32509, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
>         tmp = 0x7fff304493c8 ""
>         new_uri = 0x5589ffffffff <error: Cannot access memory at address 0x5589ffffffff>
>         end = 0x0
>         crt = 0x7efdaa60ebe8 "\002"
>         cmd = 0x0
>         len = -1437343728
>         user = 5
>         uri = {user = {s = 0x7fff30449190 "\260\221D0\377\177", len = 0}, passwd = {s = 0x7efd8b862bb0 "0", len = -1996563712}, host = {s = 0x7efd8b862bb0 "0", len = 0}, port = {s = 0x7efdaa60c380 "\001", len = 809800168}, params = {s = 0x7efdaa5846f0 "jS\033", 
>             len = 809807536}, sip_params = {s = 0x7fff30449210 "0\223D0\377\177", len = -1996563712}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x30449400), transport = {s = 0x7efdaa60f2b8 "\001", len = 809800540}, 
>           ttl = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, user_param = {s = 0x7efdaa609b40 "\027\004", len = 0}, maddr = {s = 0x7fff30449400 "", len = -1436486984}, method = {s = 0x0, len = 809807536}, lr = {
>             s = 0x1aa607130 <error: Cannot access memory at address 0x1aa607130>, len = 0}, r2 = {s = 0x7fff304491c0 "", len = 809800648}, gr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 809800288}, transport_val = {s = 0x7efdaa60e2b0 "\017", 
>             len = -1437055248}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x131 <error: Cannot access memory at address 0x131>, len = -1996563712}, maddr_val = {s = 0x7fff30449180 " ", len = -1996563712}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, 
>             len = 1426245171}, r2_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr_val = {s = 0x7fff304491b0 "", len = 1423642566}}
>         next_hop = {user = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, passwd = {s = 0x7fff30449300 "p\224D0\377\177", len = 1423692045}, host = {s = 0x7fff30449300 "p\224D0\377\177", len = 1423656503}, port = {s = 0x7efdaa5846f0 "jS\033", 
>             len = 809807536}, params = {s = 0x7fff30449400 "", len = -1436486992}, sip_params = {s = 0x7fff3044935c "\001", len = 809800576}, headers = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, port_no = 37680, proto = 12356, type = 32767, flags = 0, transport = {
>             s = 0x0, len = -1437055248}, ttl = {s = 0x130449260 <error: Cannot access memory at address 0x130449260>, len = 809807536}, user_param = {s = 0x1aa60f2b8 <error: Cannot access memory at address 0x1aa60f2b8>, len = -1436488760}, maddr = {s = 0x0, len = 1}, 
>           method = {s = 0x1a00000000 <error: Cannot access memory at address 0x1a00000000>, len = 809800908}, lr = {s = 0x0, len = 1426245171}, r2 = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, gr = {
>             s = 0x58a6da2773b9d282 <error: Cannot access memory at address 0x58a6da2773b9d282>, len = 1514263170}, transport_val = {s = 0x0, len = -1996563712}, ttl_val = {s = 0x7efdaa5f9e0d "p-flags)", len = 0}, user_param_val = {s = 0x0, len = 1426245171}, 
>           maddr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, method_val = {s = 0x7fff30449300 "p\224D0\377\177", len = 1423642566}, lr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1436488760}, r2_val = {
>             s = 0x7fff30449470 "\340\225D0\377\177", len = 1423678076}, gr_val = {s = 0x0, len = 1426245171}}
>         u = 0x7efdaa5846f0
>         port = 21704
>         dst_host = 0x0
>         i = -1437341824
>         flags = 0
>         avp = 0x7efdaa609b40
>         st = {flags = 32, id = 0, name = {n = -1302024144, s = {s = 0x7efdb264b030 <__syslog> "H\201\354", <incomplete sequence \330>, len = 809799856}, re = 0x7efdb264b030 <__syslog>}, avp = 0x558954d4ecfd <pv_get_spec_value+995>}
>         sct = 0x7fff00000015
>         sjt = 0x0
>         rve = 0x7efdaa611cf0
>         mct = 0x7efdaa5614c0
>         rv = 0x7efdaa5846f0
>         rv1 = 0x7fff304490e0
>         c1 = {cache_type = 2858482080, val_type = 32509, c = {avp_val = {n = 809800908, s = {s = 0x7fff304494cc "", len = -1437055248}, re = 0x7fff304494cc}, pval = {rs = {s = 0x7fff304494cc "", len = -1437055248}, ri = 809807536, flags = 32767}}, 
>           i2s = "`\204`\252\375~\000\000\001\000\000\000\001\000\000\000\000\000\000\000\375~"}
>         s = {s = 0x0, len = 0}
>         srevp = {0x7fff30449450, 0xbed57d2d88fedb00}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
>                 s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
>               attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
>               select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
>               attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
>               attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #19 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa6167a0, msg=0x7efdaa5846f0) at core/action.c:1584
>         t = 0x7efdaa6167a0
>         ret = -1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
>         tdiff = 809801264
>         __func__ = "run_actions"
> #20 0x0000558954c01b16 in do_action (h=0x7fff3044aeb0, a=0x7efdaa6168b0, msg=0x7efdaa5846f0) at core/action.c:1070
>         ret = 1
>         v = 1
>         dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
>               sin6_family = 44720, sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 2}, sas = {ss_family = 44720, 
>               __ss_padding = "D0\377\177", '\000' <repeats 18 times>, "\002\000\000\000\000\000\000\000\060\260d\262\375~", '\000' <repeats 18 times>, "xX[\252\375~", '\000' <repeats 18 times>, "\360\245D0\377\177\000\000\000\000\000\000\000\000\000\000P\256\226\252\375~", '\000' <repeats 17 times>, __ss_align = 139627926641050}}, id = 12, send_flags = {f = 2, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
>         tmp = 0x7efdaa5846f0 "jS\033"
>         new_uri = 0x200000000 <error: Cannot access memory at address 0x200000000>
>         end = 0x0
>         crt = 0x0
>         cmd = 0x7efdaa5a18f0
>         len = -1437055248
>         user = 32509
>         uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = -1996563712}, host = {s = 0x7efdaa96fbd8 "W\211#V\211U", len = 0}, port = {s = 0x0, len = 1426245171}, params = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, sip_params = {
>             s = 0x7fff304498d0 "`\237D0\377\177", len = -1464683310}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0xaa5846f0), transport = {s = 0x7fff30449f60 "", len = 1421876138}, ttl = {s = 0x7efdaa5db320 "g\003", 
>             len = 809802368}, user_param = {s = 0x7efdaa59f1f0 "\a", len = -1437055248}, maddr = {s = 0x7efdaa5e0260 "~\003", len = 809804096}, method = {s = 0x0, len = 1426245171}, lr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, r2 = {
>             s = 0x7fff30449960 "\200\231D0\377\177", len = 1422859023}, gr = {s = 0x7efdb2721180 <_IO_strn_jumps> "", len = -1437055248}, transport_val = {s = 0x7efdaa5ce0b0 "\002", len = 0}, ttl_val = {s = 0x7fff30449980 "@\232D0\377\177", len = -1465333050}, 
>           user_param_val = {s = 0x200000020 <error: Cannot access memory at address 0x200000020>, len = -1437055248}, maddr_val = {s = 0x7fff30449a40 "РD0\377\177", len = -1465331735}, method_val = {s = 0x7fff3044a540 " ", len = 0}, lr_val = {
>             s = 0x7efdaa5cb100 "а\\\252\375~", len = -1437055248}, r2_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 2}, gr_val = {s = 0xb00000000 <error: Cannot access memory at address 0xb00000000>, len = 0}}
>         next_hop = {user = {s = 0x0, len = 1426245171}, passwd = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, host = {s = 0x7fff30449b30 "\240\234D0\377\177", len = 1423653453}, port = {s = 0x7fff30449f80 " ", len = -1996563712}, 
>           params = {s = 0x7efdaa4b1746 ") values (", len = 0}, sip_params = {s = 0x0, len = 1426245171}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, port_no = 41168, proto = 12356, type = 32767, 
>           flags = (URI_SIP_USER_PHONE | unknown: 0x54c01c34), transport = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -1437055248}, ttl = {s = 0x0, len = -1437055248}, user_param = {s = 0x7efdaa5b4250 "Q\371\266\250\375~", 
>             len = 809804464}, maddr = {s = 0x0, len = 1}, method = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 1715065474}, lr = {s = 0x0, len = 1426245171}, r2 = {s = 0x20 <error: Cannot access memory at address 0x20>, 
>             len = -1302024144}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {
>             s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, r2_val = {s = 0x7fff30449ca0 "\020\236D0\377\177", len = 1423675477}, gr_val = {s = 0x7fff3044a200 "", len = 809804096}}
>         u = 0x45aa967650
>         port = 21745
>         dst_host = 0x55895502c633
>         i = 32
>         flags = 0
>         avp = 0x558900000046
>         st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
>         sct = 0xbed57d2d88fedb00
>         sjt = 0x7efdaa5d75a0
>         rve = 0x7efdaa610090
>         mct = 0xba03000000000000
>         rv = 0xa30449810
>         rv1 = 0x7efdaa5848f0
>         c1 = {cache_type = 2858213632, val_type = 32509, c = {avp_val = {n = 809803000, s = {s = 0x7fff30449cf8 "", len = -1437055248}, re = 0x7fff30449cf8}, pval = {rs = {s = 0x7fff30449cf8 "", len = -1437055248}, ri = 809807536, flags = 32767}}, 
>           i2s = '\000' <repeats 20 times>, "\375~"}
>         s = {s = 0x800000020 <error: Cannot access memory at address 0x800000020>, len = -1464429030}
>         srevp = {0x0, 0xbed57d2d88fedb00}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
>                 s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
>               attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
>               select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
>               attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
>               attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #21 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa5e23a0, msg=0x7efdaa5846f0) at core/action.c:1584
>         t = 0x7efdaa6168b0
>         ret = 1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
>         tdiff = 809803360
>         __func__ = "run_actions"
> #22 0x0000558954bfdb07 in do_action (h=0x7fff3044aeb0, a=0x7efdaa5e11f0, msg=0x7efdaa5846f0) at core/action.c:703
>         ret = -5
>         v = 0
>         dst = {send_sock = 0x7efdaa5846f0, to = {s = {sa_family = 44720, sa_data = "D0\377\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 44720, sin_port = 12356, sin_addr = {s_addr = 32767}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
>               sin6_family = 44720, sin6_port = 12356, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 44720, 
>               __ss_padding = "D0\377\177", '\000' <repeats 43 times>, "\333\376\210-}վ", '\000' <repeats 12 times>, "\002", '\000' <repeats 11 times>, "\322\030\325T\211U\000\000\000\000\000\000\004\000\000\000\220\246D0\377\177\000\000P\245D0\377\177\000\000\211\366\315T\211U\000", __ss_align = 139627950028216}}, id = -1436765232, send_flags = {f = 32509, blst_imask = 0}, proto = -16 '\360', proto_pad0 = 70 'F', proto_pad1 = -21928}
>         tmp = 0x4000b264b030 <error: Cannot access memory at address 0x4000b264b030>
>         new_uri = 0x7efdaa53e010 "\001"
>         end = 0x0
>         crt = 0x7fff3044a090 "\300\240D0\377\177"
>         cmd = 0x0
>         len = 1427222488
>         user = 13
>         uri = {user = {s = 0x0, len = -1996563712}, passwd = {s = 0x7fff3044a0c0 " ", len = -1996563712}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1996563712}, sip_params = {
>             s = 0x7fff3044a270 "\220\243D0\377\177", len = 0}, headers = {s = 0x0, len = 1426245171}, port_no = 32, proto = 0, type = ERROR_URI_T, flags = (unknown: 0xb264b030), transport = {s = 0x7fff3044a220 "`\243D0\377\177", len = 1421938797}, ttl = {
>             s = 0x7efdaa5d20c0 "P\003", len = -1437055248}, user_param = {s = 0x7efdaa5e0260 "~\003", len = 809807536}, maddr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 0}, method = {s = 0x0, len = -1}, lr = {
>             s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = 280613506}, r2 = {s = 0x0, len = 1426245171}, gr = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, transport_val = {
>             s = 0x58a6da276c59d282 <error: Cannot access memory at address 0x58a6da276c59d282>, len = 1514263170}, ttl_val = {s = 0x0, len = -1460231948}, user_param_val = {s = 0x13e <error: Cannot access memory at address 0x13e>, len = -1996563712}, maddr_val = {
>             s = 0x7fff3044a1e0 "\210\246D0\377\177", len = 1422431725}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 809805480}, r2_val = {s = 0x7fff3044a688 "\370\246D0\001", len = -1996563712}, gr_val = {
>             s = 0x10 <error: Cannot access memory at address 0x10>, len = 0}}
>         next_hop = {user = {s = 0x0, len = 1426245171}, passwd = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1996563712}, host = {s = 0x7fff3044a360 "ФD0\377\177", len = 1423653555}, port = {s = 0x0, len = -1996563712}, params = {
>             s = 0x7fff3044a300 "", len = 0}, sip_params = {s = 0x7efdaa5e0378 "\004", len = 809805096}, headers = {s = 0x7efdaa5846f0 "jS\033", len = 809807536}, port_no = 41872, proto = 12356, type = 32767, flags = 0, transport = {s = 0x0, len = -1437055248}, ttl = {
>             s = 0x0, len = -1996563712}, user_param = {s = 0x7fff3044a360 "ФD0\377\177", len = 0}, maddr = {s = 0x0, len = 1426245171}, method = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, lr = {s = 0x7fff3044a390 "p\003^\252\375~", 
>             len = 1423531231}, r2 = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1437055248}, gr = {s = 0x7efdaa5dab40 "\002", len = 809807536}, transport_val = {s = 0x0, len = 1422564395}, ttl_val = {s = 0x7fff3044a360 "ФD0\377\177", 
>             len = 809804976}, user_param_val = {s = 0x7efdaa5cb5d8 "", len = -1996563712}, maddr_val = {s = 0x7fff3044a380 " ", len = 0}, method_val = {s = 0x0, len = 1426245171}, lr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1302024144}, 
>           r2_val = {s = 0x7fff3044a4d0 "@\246D0\377\177", len = 1423675477}, gr_val = {s = 0x0, len = 1426245171}}
>         u = 0x7efdaa5846f0
>         port = 43607
>         dst_host = 0x0
>         i = 3
>         flags = 4
>         avp = 0x7efdaa5e0260
>         st = {flags = 32, id = 0, name = {n = -1302024144, s = {s = 0x7efdb264b030 <__syslog> "H\201\354", <incomplete sequence \330>, len = 809804496}, re = 0x7efdb264b030 <__syslog>}, avp = 0x558954d925ab <eval_elem+1084>}
>         sct = 0x7efdaa53e010
>         sjt = 0x0
>         rve = 0xffffffffaa5cfe30
>         mct = 0x7fff3044a000
>         rv = 0x20
>         rv1 = 0x7fff3044a140
>         c1 = {cache_type = 2858287984, val_type = 32509, c = {avp_val = {n = 809805096, s = {s = 0x7fff3044a528 "", len = -1437055248}, re = 0x7fff3044a528}, pval = {rs = {s = 0x7fff3044a528 "", len = -1437055248}, ri = 809807536, flags = 32767}}, 
>           i2s = "\200\021\021U\211U", '\000' <repeats 14 times>, "\375~"}
>         s = {s = 0x0, len = 0}
>         srevp = {0x20, 0x7efdb264b030 <__syslog>}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
>                 s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
>               attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
>               select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
>               attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
>               attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #23 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa5e11f0, msg=0x7efdaa5846f0) at core/action.c:1584
>         t = 0x7efdaa5e11f0
>         ret = -1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = 809807536, tz_dsttime = 32767}
>         tdiff = 809805456
>         __func__ = "run_actions"
> #24 0x0000558954c01b16 in do_action (h=0x7fff3044aeb0, a=0x7efdaa5e14b0, msg=0x7efdaa5846f0) at core/action.c:1070
>         ret = 1
>         v = 1
>         dst = {send_sock = 0xa79e00, to = {s = {sa_family = 56064, sa_data = "\376\210-}վ\340\265\324\000\000\000\000"}, sin = {sin_family = 56064, sin_port = 35070, sin_addr = {s_addr = 3201662253}, sin_zero = "\340\265\324\000\000\000\000"}, sin6 = {
>               sin6_family = 56064, sin6_port = 35070, sin6_flowinfo = 3201662253, sin6_addr = {__in6_u = {__u6_addr8 = "\340\265\324\000\000\000\000\000\000\000\000\000\002\000\000", __u6_addr16 = {46560, 212, 0, 0, 0, 0, 2, 0}, __u6_addr32 = {13940192, 0, 0, 2}}}, 
>               sin6_scope_id = 0}, sas = {ss_family = 56064, 
>               __ss_padding = "\376\210-}վ\340\265\324\000\000\000\000\000\000\000\000\000\002", '\000' <repeats 11 times>, "\063\306\002U\211U\000\000L\215#V\211U\000\000Z\212#V\211U\000\000 \255D0\377\177\000\000\226\267\362T\211U\000\000\310\340S\252\375~\000\000@\035\362\252\375~\000\000L\215#V\211U\000\000O\212#V\211U\000\000\060\000\000\000\000\000\000\000\020\340S\252\375~\000", __ss_align = 328}}, id = 1445169754, send_flags = {f = 21897, blst_imask = 0}, proto = 84 'T', proto_pad0 = -118 '\212', proto_pad1 = 22051}
>         tmp = 0x74acc90 <error: Cannot access memory at address 0x74acc90>
>         new_uri = 0x588fedb00 <error: Cannot access memory at address 0x588fedb00>
>         end = 0x7efdaa53ea78 ""
>         crt = 0xa7aa30 <error: Cannot access memory at address 0xa7aa30>
>         cmd = 0x7efdaa5a84c0
>         len = 0
>         user = 0
>         uri = {user = {s = 0x7fff3044a8d0 "", len = -1996563712}, passwd = {s = 0x7efd88820b80 "\264", len = 0}, host = {s = 0x0, len = 1426245171}, port = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1424974825}, params = {s = 0x7fff3044a930 "", 
>             len = -1437343728}, sip_params = {s = 0x400000040 <error: Cannot access memory at address 0x400000040>, len = 1426677168}, headers = {s = 0x7fff3044a970 "\223\252D0\377\177", len = -1996563712}, port_no = 43616, proto = 12356, type = 32767, 
>           flags = (URI_SIP_USER_PHONE | unknown: 0x54f691b4), transport = {s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 122346656}, ttl = {s = 0xa79ac0 <error: Cannot access memory at address 0xa79ac0>, len = 11871072}, user_param = {
>             s = 0xd4b5e0 <error: Cannot access memory at address 0xd4b5e0>, len = 16}, maddr = {s = 0x7efdaa96fb90 "\001", len = -1434548848}, method = {s = 0x7fff3044aa93 "\005", len = 809806482}, lr = {s = 0x558956238d4c "", len = 1445169514}, r2 = {
>             s = 0x7efdaa53e0f0 "", len = 0}, gr = {s = 0x7fff3044aa60 " \254D0\377\177", len = 1424954698}, transport_val = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -1437343728}, ttl_val = {s = 0x7fff3044aa80 "L\215#V\211U", len = 4}, 
>           user_param_val = {s = 0x7efdaa53e010 "\001", len = 1445169567}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 3}, method_val = {s = 0x7efdaa53e010 "\001", len = -1426973392}, lr_val = {
>             s = 0x400000040 <error: Cannot access memory at address 0x400000040>, len = 0}, r2_val = {s = 0x7fff3044aa30 "`\252D0\004", len = -1443374771}, gr_val = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 809806484}}
>         next_hop = {user = {s = 0x43044aa60 <error: Cannot access memory at address 0x43044aa60>, len = 1445169509}, passwd = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 331636144}, host = {
>             s = 0x558956238969 ";branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>;tag=3d63dba0-bd5f-4b46-8434-e84e5b44da90\r\nTo: <sip:+xxx at xxx>\r\nCall-ID: e393131f-4156-"..., len = 1445169513}, port = {
>             s = 0x7fff3044ac20 "", len = 1425499403}, params = {s = 0x20 <error: Cannot access memory at address 0x20>, len = -1432945776}, sip_params = {s = 0x558956238d4c "", len = 1445169483}, headers = {
>             s = 0x505e0f0 <error: Cannot access memory at address 0x505e0f0>, len = 0}, port_no = 0, proto = 0, type = 200, flags = (URI_USER_NORMALIZE | unknown: 0x54ef63e8), transport = {s = 0x7fff3044aaf0 "", len = -1437343728}, ttl = {
>             s = 0xf0 <error: Cannot access memory at address 0xf0>, len = -1437343728}, user_param = {s = 0x7fff3044ab30 "`\253D0\377\177", len = -1466248417}, maddr = {s = 0x43044abf0 <error: Cannot access memory at address 0x43044abf0>, len = 0}, method = {
>             s = 0x8000000 <error: Cannot access memory at address 0x8000000>, len = 122346720}, lr = {s = 0xa79a80 <error: Cannot access memory at address 0xa79a80>, len = 11871008}, r2 = {s = 0xd4b5e0 <error: Cannot access memory at address 0xd4b5e0>, len = 16}, gr = {
>             s = 0x147 <error: Cannot access memory at address 0x147>, len = -1996563712}, transport_val = {s = 0x7fff3044ab60 " \254D0\377\177", len = 1422431725}, ttl_val = {s = 0x0, len = 48}, user_param_val = {s = 0x7efdaa53e320 "", len = 0}, maddr_val = {
>             s = 0x7fff3044ac20 "", len = 1424954698}, method_val = {s = 0xf0 <error: Cannot access memory at address 0xf0>, len = -1437343728}, lr_val = {
>             s = 0x5589562389a1 "From: <sip:+xxx at xxx>;tag=3d63dba0-bd5f-4b46-8434-e84e5b44da90\r\nTo: <sip:+xxx at xxx>\r\nCall-ID: e393131f-4156-44e3-95b0-60b5b7b9c417\r\nCSeq: 3763 INVITE\r\nAllow: OPTION"..., len = 1445169514}, 
>           r2_val = {s = 0x7efdaa96fb90 "\001", len = 1425270178}, gr_val = {s = 0x7efdaaf21d68 "\001", len = -1426973352}}
>         u = 0xb53370
>         port = 12356
>         dst_host = 0x7efd00000000
>         i = 0
>         flags = 0
>         avp = 0xd4b5e0
>         st = {flags = 2857912048, id = 1, name = {n = -2004742920, s = {s = 0x7efd88820cf8 "", len = 809806000}, re = 0x7efd88820cf8}, avp = 0x7efda9f7c6fa <futex_release+29>}
>         sct = 0x558954c895ed <sr_event_exec+481>
>         sjt = 0x0
>         rve = 0x7efdaa5e0a60
>         mct = 0x7fff3044a820
>         rv = 0x8000000
>         rv1 = 0x10
>         c1 = {cache_type = 48, val_type = RV_NONE, c = {avp_val = {n = -1437343728, s = {s = 0x7efdaa53e010 "\001", len = 809806896}, re = 0x7efdaa53e010}, pval = {rs = {s = 0x7efdaa53e010 "\001", len = 809806896}, ri = -1466248417, flags = 32509}}, 
>           i2s = "\360\254D0\004", '\000' <repeats 14 times>, "\b\000"}
>         s = {s = 0x7fff3044a8f0 "0\251D0\377\177", len = 1424958313}
>         srevp = {0x7fff3044abf0, 0x7efdaa53e010}
>         evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 3, string = 0x3 <error: Cannot access memory at address 0x3>, str = {
>                 s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, data = 0x3, attr = 0x3, select = 0x3}}, {type = STRING_ST, u = {number = 139627952774928, string = 0x7efdaa869f10 "1", str = {s = 0x7efdaa869f10 "1", len = 1}, data = 0x7efdaa869f10, 
>               attr = 0x7efdaa869f10, select = 0x7efdaa869f10}}, {type = STRING_RVE_ST, u = {number = 139627953568160, string = 0x7efdaa92b9a0 "+xxx", str = {s = 0x7efdaa92b9a0 "+xxx", len = 13}, data = 0x7efdaa92b9a0, attr = 0x7efdaa92b9a0, 
>               select = 0x7efdaa92b9a0}}, {type = STRING_RVE_ST, u = {number = 139627953568208, string = 0x7efdaa92b9d0 "sip:+xxx at xxx", str = {s = 0x7efdaa92b9d0 "sip:+xxx at xxx", len = 31}, data = 0x7efdaa92b9d0, 
>               attr = 0x7efdaa92b9d0, select = 0x7efdaa92b9d0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
>               attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
>         __func__ = "do_action"
> #25 0x0000558954c108ff in run_actions (h=0x7fff3044aeb0, a=0x7efdaa5ca960, msg=0x7efdaa5846f0) at core/action.c:1584
>         t = 0x7efdaa5e14b0
>         ret = 1
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         tz = {tz_minuteswest = -1437055248, tz_dsttime = 32509}
>         tdiff = 0
>         __func__ = "run_actions"
> #26 0x0000558954c11179 in run_top_route (a=0x7efdaa5ca960, msg=0x7efdaa5846f0, c=0x0) at core/action.c:1669
>         ctx = {rec_lev = 12, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {8589934592, 6388032982750974594, 0, 94048325125683, 32, 139628084768816, 6388032982702740098, 885541357945475714}, __mask_was_saved = 0, __saved_mask = {__val = {0, 139627368492924, 
>                   13751034671771081472, 140734003195984, 13751034671771081472, 32, 2, 0, 140734003763305, 32, 13751034671771081472, 8589934592, 8589934592, 0, 94048325125683, 32}}}}}
>         p = 0x7fff3044aeb0
>         ret = 0
>         sfbk = 0
> #27 0x0000558954d67146 in receive_msg (buf=0x558956238900 "INVITE sip:+xxx at xxx;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP xxx:5060;branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>"..., 
>     len=1100, rcv_info=0x7efd87b327a8) at core/receive.c:515
>         msg = 0x7efdaa5846f0
>         ctx = {rec_lev = 0, run_flags = 0, last_retcode = 33, jmp_env = {{__jmpbuf = {8589935692, 139627368491192, 0, 94048325125683, 32, 139628084768816, 6388032982702740098, 885541357945475714}, __mask_was_saved = 0, __saved_mask = {__val = {139628085660640, 0, 
>                   13751034671771081472, 121, 2, 0, 94048325125683, 32, 139628084768816, 140734003196720, 94048323499679, 128, 2, 2214, 4095, 140734003197292}}}}}
>         bctx = 0x0
>         ret = 0
>         tvb = {tv_sec = 0, tv_usec = 0}
>         tve = {tv_sec = 0, tv_usec = 0}
>         diff = 0
>         inb = {s = 0x558956238900 "INVITE sip:+xxx at xxx;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP xxx:5060;branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>"..., len = 1100}
>         netinfo = {data = {s = 0x558956238900 "INVITE sip:+xxx at xxx;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP xxx:5060;branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>"..., len = 1100}, 
>           bufsize = 0, rcv = 0x7efd87b327a8, dst = 0x0}
>         keng = 0x0
>         evp = {data = 0x7fff3044b0a0, obuf = {s = 0x0, len = 0}, rcv = 0x7efd87b327a8, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
>         cidlockidx = 0
>         cidlockset = 0
>         errsipmsg = 0
>         exectime = 0
>         __func__ = "receive_msg"
> #28 0x0000558954ea7d39 in receive_tcp_msg (
>     tcpbuf=0x7efd87b32b30 "INVITE sip:+xxx at xxx;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP xxx:5060;branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>"..., len=1100, 
>     rcv_info=0x7efd87b327a8, con=0x7efd87b32790) at core/tcp_read.c:1413
>         ret = 0
>         buf = 0x558956238900 "INVITE sip:+xxx at xxx;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP xxx:5060;branch=z9hG4bK2149.ed5b7b65e862f15e376ee9d226300d35.0\r\nFrom: <sip:+xxx at xxx>"...
>         bsize = 65535
>         blen = 65535
>         __func__ = "receive_tcp_msg"
> #29 0x0000558954eaa39a in tcp_read_req (con=0x7efd87b32790, bytes_read=0x7fff3044b564, read_flags=0x7fff3044b56c) at core/tcp_read.c:1604
>         bytes = 1100
>         total_bytes = 1100
>         resp = 1
>         size = 0
>         req = 0x7efd87b328b8
>         dst = {send_sock = 0x0, to = {s = {sa_family = 50739, sa_data = "\002U\211U\000\000 \000\000\000\000\000\000"}, sin = {sin_family = 50739, sin_port = 21762, sin_addr = {s_addr = 21897}, sin_zero = " \000\000\000\000\000\000"}, sin6 = {sin6_family = 50739, 
>               sin6_port = 21762, sin6_flowinfo = 21897, sin6_addr = {__in6_u = {__u6_addr8 = " \000\000\000\000\000\000\000\060\260d\262\375~\000", __u6_addr16 = {32, 0, 0, 0, 45104, 45668, 32509, 0}, __u6_addr32 = {32, 0, 2992943152, 32509}}}, 
>               sin6_scope_id = 809809184}, sas = {ss_family = 50739, 
>               __ss_padding = "\002U\211U\000\000 \000\000\000\000\000\000\000\060\260d\262\375~\000\000 \265D0\377\177\000\000\002\263\352T\211U\000\000\377\377\377\377)\000\000\000`\036\026U\211U\000\000\000\000\000\000\001 \000\000\030\204X\252\001\000\000\000\240\264D0\001\000\000\000P\273R\206.\000\000\000\001\000\000\000\000\000\000\000\000\376\207\213\375~\000\000\260\265D0\377\177\000\000\030\204X\252\375~\000", __ss_align = 20}}, id = 1, send_flags = {f = 1, blst_imask = 0}, proto = 41 ')', proto_pad0 = 0 '\000', proto_pad1 = 0}
>         c = 10 '\n'
>         ret = 0
>         __func__ = "tcp_read_req"
> #30 0x0000558954eaed62 in handle_io (fm=0x7efdaa588358, events=1, idx=-1) at core/tcp_read.c:1855
>         ret = 0
>         n = 456
>         read_flags = RD_CONN_SHORT_READ
>         con = 0x7efd87b32790
>         s = 41
>         resp = 1
>         t = 1953053264
>         ee = 0x0
>         __func__ = "handle_io"
> #31 0x0000558954e991dd in io_wait_loop_epoll (h=0x558955161e60 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
>         n = 1
>         r = 0
>         fm = 0x7efdaa588358
>         revents = 1
>         __func__ = "io_wait_loop_epoll"
> #32 0x0000558954eb0840 in tcp_receive_loop (unix_sock=46) at core/tcp_read.c:1976
>         __func__ = "tcp_receive_loop"
> #33 0x0000558954e8d46d in tcp_init_children (woneinit=0x7fff3044b950) at core/tcp_main.c:5227
>         r = 6
>         i = 7
>         reader_fd_1 = 46
>         pid = 0
>         si_desc = "tcp receiver (generic)\000\000\330\356\341T\211U\000\000\060\271D0\377\177\000\000۲\353T\000\000\000\000\240\363Y\252\000\000\000\000\273'\006U\211U\000\000\246\000D0\377\177\000\000\347\373\374T\211U\000\000\000\271D0\001\000\000\000P\273R\206\375~\000\000\000\271D0\377\177\000\000\320\003\361\210\001\000\000\000 \271D0\377\177\000\000\205\375\374T\211U\000"
>         si = 0x0
>         __func__ = "tcp_init_children"
> #34 0x0000558954becf03 in main_loop () at main.c:1849
>         i = 8
>         pid = 1477
>         si = 0x0
>         si_desc = "udp receiver child=7 sock=xxx:5060\000\000\000\000\003\000\000\000 \000\000\000\000\333\376\210-}վ\000\000\000\000\000\000\000\000\210`\001U\211U\000\000\000\000\000\000\000\000\000\000\063\306\002U\211U\000\000 \000\000\000\000\000\000\000\060\260d\262\375~\000\000кD0\377\177\000\000ai\331T\211U\000"
>         nrprocs = 8
>         woneinit = 1
>         __func__ = "main_loop"
> #35 0x0000558954bf7acf in main (argc=17, argv=0x7fff3044c028) at main.c:3078
>         cfg_stream = 0x5589560d12a0
>         c = -1
>         r = 0
>         tmp = 0x7fff3044df42 ""
>         tmp_len = 0
>         port = 0
>         proto = 7
>         ahost = 0x0
>         aport = 0
>         options = 0x558955018e90 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
>         ret = -1
>         seed = 1882048236
>         rfd = 4
>         debug_save = 0
>         debug_flag = 0
>         dont_fork_cnt = 0
>         n_lst = 0x0
>         p = 0x0
>         st = {st_dev = 23, st_ino = 862, st_nlink = 2, st_mode = 16832, st_uid = 109, st_gid = 115, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1667940516, tv_nsec = 335990872}, st_mtim = {tv_sec = 1667941120, 
>             tv_nsec = 945450055}, st_ctim = {tv_sec = 1667941121, tv_nsec = 329446417}, __glibc_reserved = {0, 0, 0}}
>         tbuf = "\000\000\000\000\000\000\000\000\030RM0\377\177\000\000\000\000\000\000 ", '\000' <repeats 27 times>, "\001\000\000\000\000\000\000\000\366u\256\003\001", '\000' <repeats 19 times>, "\002", '\000' <repeats 319 times>...
>         option_index = 0
>         long_options = {{name = 0x55895501b2b3 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x5589550164e0 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55895501b2b8 "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55895501b2be "subst", 
>             has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55895501b2c4 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55895501b2cd "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55895501b2d7 "server-id", has_arg = 1, flag = 0x0, val = 1028}, 
>           {name = 0x55895501b2e1 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55895501b2ec "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55895501b2f5 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55895501b300 "debug", 
>             has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55895501b306 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55895501b310 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
>         __func__ = "main"
>
> __________________________________________________________
> Kamailio - Users Mailing List - Non Commercial Discussions
> sr-users at lists.kamailio.org
> Important: keep the mailing list in the recipients, do not reply only to the sender!
> Edit mailing list options or unsubscribe:
> https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-users

-- 
Daniel-Constantin Mierla -- www.asipto.com
www.twitter.com/miconda -- www.linkedin.com/in/miconda




More information about the sr-users mailing list