I found one in backup, but is not same. ``` #0 0x00007f8e28d5fc3b in trace_onreply_in (t=0xa72441, type=4, ps=0x7f8e1c2a7ac8) at siptrace.c:1271 sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 10953664}, re = 0x0}, avp = 0x198}, body = { s = 0xa72487 "41a86d83kw9tay0nh@10.0.70.3~2o\r\nCSeq: 102 BYE\r\nFrom: sip:380894600053@81.31.45.51;tag=as397e1088\r\nTo: 380965115229 sip:0965115229@195.24.242.106;tag=y4yzzqusnwd66s7y.o\r\nServer: Sippy\r\nContent-Leng"..., len = 30}, callid = { s = 0xa724b1 "BYE\r\nFrom: sip:380894600053@81.31.45.51;tag=as397e1088\r\nTo: 380965115229 sip:0965115229@195.24.242.106;tag=y4yzzqusnwd66s7y.o\r\nServer: Sippy\r\nContent-Length: 0\r\n\r\n", len = 3}, method = {s = 0x7fffcca85710 "200", len = 3}, status = {s = 0x7f8e28d6ad86 "", len = 10953951}, dir = 0xa <Address 0xa out of bounds>, fromtag = {s = 0x7fffcca85814 "udp:195.24.242.106:5061", len = 23}, fromip = {s = 0x0, len = 0}, toip = {s = 0x7fffcca857e0 "udp:81.31.45.51:5060", len = 20}, toip_buff = "udp:81.31.45.51:5060", '\000' <repeats 31 times>, fromip_buff = "udp:195.24.242.106:5061", '\000' <repeats 28 times>, tv = {tv_sec = 0, tv_usec = 0}, stat = 0x0} msg = 0x7f8e2fa50470 req = 0x7f8e1bf23ea8 statusbuf = "\000\000\000\000\000\000\000" __FUNCTION__ = "trace_onreply_in" #1 0x00007f8e2cae6b5e in reparse_on_dns_failover_fixup (handle=0xa823e8, gname=0xa823f0, name=0xa823f8, val=0xa82400) at t_fwd.c:2006 __llevel = 32654 __FUNCTION__ = "reparse_on_dns_failover_fixup" #2 0x00007f8e2cae6c6f in reparse_on_dns_failover_fixup (handle=0xc8, gname=0x7f8e1c38dcf8, name=0x7f8e2fa50470, val=0x7f8e1bf23ea8) at t_fwd.c:2006 __llevel = 0 __FUNCTION__ = "reparse_on_dns_failover_fixup" #3 0x00007f8e2caf4b34 in t_lookupOriginalT (p_msg=0xa72422) at t_lookup.c:854 __llevel = 10953728 p_cell = 0xa72421 hash_index = 3433588208 t_msg = 0xa724b6 branch = 0x364ad611 hash_bucket = 0x7f8e1c2a7ac8 foo = 1 ret = 32654 __FUNCTION__ = "t_lookupOriginalT" #4 0x00007f8e2caf6b0f in t_reply_matching (p_msg=0x7f8e1c2a7ac8, p_branch=0xa724b6) at t_lookup.c:1021 __llevel = 32654 p_cell = 0x7f8e2cfd2df8 hash_index = 0 entry_label = 32767 branch_id = 0 hashi = 0x38e <Address 0x38e out of bounds> branchi = 0x7f8e1c38b8d0 "\340u=/\216\177" p = 0x7f8e2f727940 "\001" n = 0x7f8e2fa50470 "\342"" hash_bucket = 0x680c0e hashl = 32767 branchl = 32654 scan_space = -1 req_method = {s = 0x7f8e2f3d5a00 "\005", len = 910874129} loopi = 0xa723d5 "SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83kw9tay0nh@10.0"... loopl = 0 is_cancel = 7224 __FUNCTION__ = "t_reply_matching" #5 0x00007f8e2caf7489 in t_reply_matching (p_msg=0x0, p_branch=0x0) at t_lookup.c:1046 __llevel = 32654 p_cell = 0x0 hash_index = 473479376 entry_label = 32767 branch_id = 32654 hashi = 0xa723d5 "SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83kw9tay0nh@10.0"... branchi = 0x7f8e2f727940 "\001" p = 0x0 n = 0x7f8e2cfd2df8 "" hash_bucket = 0x7f8e2fa50470 hashl = 32767 branchl = 0 scan_space = 32767 cseq_method = {s = 0x7fffcca85cb0 "\020^\250\314\377\177", len = 6818830} req_method = {s = 0x7fffcca85bb0 "\340[\250\314\377\177", len = 749693711} loopi = 0x4188b0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300@\202n" loopl = 0 is_cancel = 167 __FUNCTION__ = "t_reply_matching" #6 0x00007f8e2cb3e94b in relay_reply (t=0xa72558, p_msg=0x7fffcca85e00, branch=0, msg_status=10953679, cancel_data=0xa0000018a, do_put_on_wait=32654) at t_reply.c:2051 relay = 33554432 save_clone = 0 buf = 0x364ad611 <Address 0x364ad611 out of bounds> res_len = 6492249 relayed_code = 0 relayed_msg = 0x6245b7 reply_bak = 0x198005668c8 bm = {to_tag_val = {s = 0x0, len = 0}} totag_retr = 32767 reply_status = RPS_ERROR uas_rb = 0xa723c0 to_tag = 0x6245b7 reason = {s = 0x4004188b0 <Address 0x4004188b0 out of bounds>, len = 799343728} onsend_params = {req = 0x7fffcca85de0, rpl = 0x1460065f7ad, param = 0x7f8e00000000, code = 7733660, flags = 0, branch = 0, t_rbuf = 0x40, dst = 0xa72424, send_buf = {s = 0x7fffcca85ed0 "\260_\250", <incomplete sequence \314>, len = 910874129}} __FUNCTION__ = "relay_reply" #7 0x00000000004901cc in do_forward_reply (msg=0x7f8e2fa50470, mode=0) at forward.c:747 new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} new_len = 0 r = 1 ip = {af = 0, len = 0, u = {addrl = {21482551297, 140248654491432}, addr32 = {7714817, 5, 792407848, 32654}, addr16 = {47105, 117, 5, 0, 12072, 12091, 32654, 0}, addr = "\001\270u\000\005\000\000\000(/;/\216\177\000"}} s = 0x7fffcca85f70 "\021\326J6" ---Type <return> to continue, or q <return> to quit--- len = 32654 __FUNCTION__ = "do_forward_reply" #8 0x0000000000491856 in forward_reply (msg=0x7f8e2fa50470) at forward.c:849 Hit http://ftp.cz.debian.org wheezy-updates/main Translation-en/DiffIndex Hit http://security.debian.org wheezy/updates/main Sources Hit http://security.debian.org wheezy/updates/main amd64 Packages Hit http://hwraid.le-vert.net wheezy Release Hit http://security.debian.org wheezy/updates/main Translation-en Hit http://hwraid.le-vert.net wheezy/main amd64 Packages No locals. #9 0x000000000050e062 in receive_msg (buf=0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len=408, rcv_info=0x7fffcca861b0) at receive.c:255 msg = 0x7f8e2fa50470 ctx = {rec_lev = 383305440, run_flags = 32654, last_retcode = 5, jmp_env = {{__jmpbuf = {10268600, 0, 0, 0, 0, 140248696117746, 140247862083589, 0}, __mask_was_saved = -861380448, __saved_mask = {__val = {10953600, 140736626975160, 910874129, 51539607555, 910874129, 4294832, 140736626976240, 140736626975008, 6322852, 7728554256, 140248255940568, 140736626974992, 6318455, 140736626975264, 167897581528, 10953600}}}}} ret = 4294832 inb = {s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len = 408} __FUNCTION__ = "receive_msg" #10 0x000000000060db81 in udp_rcv_loop () at udp_server.c:495 len = 408 buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"... tmp = 0xa72380 "93.99.158.97" from = 0x7f8e2f987188 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {1794250947, 4294832}, addr32 = {1794250947, 0, 4294832, 0}, addr16 = {6339, 27378, 0, 0, 34992, 65, 0, 0}, addr = "\303\030\362j\000\000\000\000\260\210A\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = { 858595153, 0}, addr32 = {858595153, 0, 0, 0}, addr16 = {8017, 13101, 0, 0, 0, 0, 0, 0}, addr = "Q\037-3", '\000' <repeats 11 times>}}, src_port = 5061, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\305\303\030\362j\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50451, sin_addr = {s_addr = 1794250947}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50451, sin6_flowinfo = 1794250947, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f8e2f3d75e0, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #11 0x00000000004aa664 in main_loop () at main.c:1573 i = 5 pid = 0 si = 0x7f8e2f3d75e0 si_desc = "udp receiver child=5 sock=81.31.45.51:5060\000\000n\000\000\000n/q\000\001\000\000\000\260\264y\027\216\177\000\000\060c\250\314\377\177\000\000\210Z\006\033\216\177\000\000\240\352\344'\216\177\000\000\020v\215/\216\177\000\000\020\277\344'\216\177\000 \000\003\000\000\000\216\177\000\000\021\326J6\000\000\000\000\260\210A\000\001\000\000" nrprocs = 8 __FUNCTION__ = "main_loop" #12 0x00000000004b0b5b in main (argc=9, argv=0x7fffcca865f8) at main.c:2533 cfg_stream = 0x14b0010 c = -1 r = 0 tmp = 0x7fffcca86a4f "" tmp_len = 32654 port = 836212592 proto = 0 options = 0x707da0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 4234779735 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x55 p = 0x7fffcca864fe "" __FUNCTION__ = "main" (gdb) frame 0 #0 0x00007f8e28d5fc3b in trace_onreply_in (t=0xa72441, type=4, ps=0x7f8e1c2a7ac8) at siptrace.c:1271 1271 if(trace_local_ip.s && trace_local_ip.len > 0) { (gdb) p *msg $1 = {id = 8930, pid = 7643, tval = {tv_sec = 1437593263, tv_usec = 563447}, fwd_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, rpl_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, first_line = {type = 65538, len = 16, u = {request = {method = { s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len = 7}, uri = { s = 0xa723c8 "200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83k"..., len = 3}, version = { s = 0xa723cc "OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83kw9ta"..., len = 2}, method_value = 200}, reply = {version = {s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len = 7}, status = {s = 0xa723c8 "200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83k"..., len = 3}, reason = { s = 0xa723cc "OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83kw9ta"..., len = 2}, statuscode = 200}}}, via1 = 0x7f8e2f727940, via2 = 0x7f8e2f9aa360, headers = 0x7f8e2f3d55d8, last_header = 0x7f8e2f3d4928, parsed_flag = 118, h_via1 = 0x7f8e2f3d55d8, h_via2 = 0x7f8e2f3d40a0, callid = 0x7f8e2f3d51b0, to = 0x0, cseq = 0x7f8e2f3d5a00, from = 0x7f8e2f3d4928, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0x0, authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x0, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, body = 0x0, eoh = 0x0, unparsed = 0xa724eb "To: 380965115229 sip:0965115229@195.24.242.106;tag=y4yzzqusnwd66s7y.o\r\nServer: Sippy\r\nContent-Length: 0\r\n\r\n", rcv = { src_ip = {af = 2, len = 4, u = {addrl = {1794250947, 4294832}, addr32 = {1794250947, 0, 4294832, 0}, addr16 = {6339, 27378, 0, 0, 34992, 65, 0, 0}, addr = "\303\030\362j\000\000\000\000\260\210A\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {858595153, 0}, addr32 = {858595153, 0, 0, 0}, addr16 = {8017, 13101, 0, 0, 0, 0, 0, 0}, addr = "Q\037-3", '\000' <repeats 11 times>}}, src_port = 5061, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\305\303\030\362j\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50451, sin_addr = {s_addr = 1794250947}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50451, sin6_flowinfo = 1794250947, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f8e2f3d75e0, proto = 1 '\001'}, buf = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len = 408, new_uri = {s = 0x0, len = 0}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = { s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = { s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = '\000' <repeats 57 times>, add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 0, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 0 '\000'}}}} (gdb) q ```
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/263#issuecomment-124382441