<!-- Kamailio Project uses GitHub Issues only for bugs in the code or feature requests. Please use this template only for bug reports.
If you have questions about using Kamailio or related to its configuration file, ask on sr-users mailing list:
* https://lists.kamailio.org/mailman3/postorius/lists/sr-users.lists.kamailio....
If you have questions about developing extensions to Kamailio or its existing C code, ask on sr-dev mailing list:
* https://lists.kamailio.org/mailman3/postorius/lists/sr-dev.lists.kamailio.or...
Please try to fill this template as much as possible for any issue. It helps the developers to troubleshoot the issue.
Note that an issue report may be closed automatically after about 2 months if there is no interest from developers or community users on pursuing it, being considered expired. In such case, it can be reopened by writing a comment that includes the token `/notexpired`. About two weeks before considered expired, the issue is marked with the label `stale`, trying to notify the submitter and everyone else that might be interested in it. To remove the label `stale`, write a comment that includes the token `/notstale`. Also, any comment postpone the `expire` timeline, being considered that there is interest in pursuing the issue.
If there is no content to be filled in a section, the entire section can be removed.
You can delete the comments from the template sections when filling.
You can delete next line and everything above before submitting (it is a comment). -->
### Description
<!-- Explain what you did, what you expected to happen, and what actually happened. --> We have random kamailio crashes with Segmentation Fault. It happens when ACK for canceled call is received by Kamailio SIP proxy and forwarded to trace server using siptrace module.
### Troubleshooting
#### Reproduction
<!-- If the issue can be reproduced, describe how it can be done. --> So far the problem happens only in live environment, we are unable to reproduce it in our Dev environment.
#### Debugging Data
<!-- If you got a core dump, use gdb to extract troubleshooting data - full backtrace, local variables and the list of the code at the issue location.
gdb /path/to/kamailio /path/to/corefile bt full info locals list
If you are familiar with gdb, feel free to attach more of what you consider to be relevant. -->
``` #0 0x00007f3a0fa747b4 in msg_send_buffer (dst=0x7f3924d6ba60, buf=0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len=605, flags=1) at ../../core/forward.h:220 new_dst = {send_sock = 0x2000000, to = {s = {sa_family = 0, sa_data = "\000\000\001\000\000\000\020\374 \004\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 1}, sin_zero = "\020\374 \004\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 1, sin6_addr = {__in6_u = {__u6_addr8 = "\020\374 \004\000\000\000\257\335\017\241\373U\000", __u6_addr16 = {64528, 41154, 4, 0, 56751, 41231, 22011, 0}, __u6_addr32 = {2697133072, 4, 2702171567, 22011}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "\000\000\001\000\000\000\020\374 \004\000\000\000\257\335\017\241\373U", '\000' <repeats 11 times>, "\244\066\246\324.\301\351\300$}n\374\177\000\000\021\006\371\240\373U\000\000\360#}n\374\177\000\000\223\vΠ\373U\000\000\000\000\000\000\000\000\000\000@$}n\374\177\000\000\067(}n5060\000\244\066\246\324.\301\351\374'}n\374\177\000\000\000\000\000\000\000\000\000", __ss_align = 140722162182140}}, id = 59, send_flags = {f = 0, blst_imask = 0}, proto = 64 '@', proto_pad0 = 36 '$', proto_pad1 = 28285} outb = { s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 605} netinfo = {data = {s = 0xb000003a8 <error: Cannot access memory at address 0xb000003a8>, len = 29}, bufsize = 1853694672, rcv = 0x7c101230db, dst = 0x1} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} port = -1597834224 ip = {af = 2697133072, len = 0, u = {addrl = {3221225482794, 1512}, addr32 = {10794, 750, 1512, 0}, addr16 = {10794, 0, 750, 0, 1512, 0, 0, 0}, addr = "**\000\000\356\002\000\000\350\005\000\000\000\000\000"}} from = 0x0 local_addr = {s = {sa_family = 18112, sa_data = "\235\037\071\177\000\000\320[~\033\071\177\000"}, sin = {sin_family = 18112, sin_port = 8093, sin_addr = {s_addr = 32569}, sin_zero = "\320[~\033\071\177\000"}, sin6 = { sin6_family = 18112, sin6_port = 8093, sin6_flowinfo = 32569, sin6_addr = {__in6_u = {__u6_addr8 = "\320[~\033\071\177\000\000\210\006w\021:\177\000", __u6_addr16 = {23504, 7038, 32569, 0, 1672, 4471, 32570, 0}, __u6_addr32 = {461265872, 32569, 293013128, 32570}}}, sin6_scope_id = 291708464}, sas = {ss_family = 18112, __ss_padding = "\235\037\071\177\000\000\320[~\033\071\177\000\000\210\006w\021:\177\000\000\060\036c\021:\177\000\000\000\000\000\000\000\000\000\000\005\304"\241\373U\000\000\207\001\000\000?\000\000\000@\033\366\240\373U\000\000\200#}n\374\177\000\000\020\300\274\020:\177\000\000\330\001\000\000\000\000\000\000\060'}n\374\177\000\000\300#}n\374\177\000\000\324#V\020:\177\000\000\320$}n\374\177\000", __ss_align = 16843795572198908928}} con = 0x0 wsev = {type = 0, buf = 0xe9c12ed4a636a400 <error: Cannot access memory at address 0xe9c12ed4a636a400>, len = 1853694896, id = 32764} ret = 32764 __func__ = "msg_send_buffer" #1 0x00007f3a0fa7ca80 in trace_send_duplicate ( buf=0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len=605, dst2=0x7f3924d6ba60) at siptrace_send.c:356 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} pdst = 0x7f3924d6ba60 p = 0x0 __func__ = "trace_send_duplicate" #2 0x00007f3a0fa3f730 in sip_trace_store (sto=0x7ffc6e7d2730, dst=0x7f3924d6ba60, correlation_id_str=0x0) at siptrace.c:593 ret = 1 __func__ = "sip_trace_store" #3 0x00007f3a0fa49101 in sip_trace (msg=0x7f3a1189d500, dst=0x7f3924d6ba60, correlation_id_str=0x0, dir=0x0) at siptrace.c:1303 sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}, body = { s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 605}, alloc_body = 0, callid = {s = 0x55fba122c45d <buf+477> "19C4ED5E658858CF@ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (May 8 2024)\r\nContent-Length: 0\r\n\r\n", len = 31}, method = { s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 3}, status = {s = 0x7f3a0fa7d065 "", len = 0}, dir = 0x7f3a0fa7ffb5 "in", fromtag = { s = 0x55fba122c3f4 <buf+372> "2041847FA948DA9D\r\nTo: sip:49yyyyyyyyyy@sip.proxy.de;tag=8e46bdec-8fb1-4814-b516-575f5cd3315c\r\nCall-ID: 19C4ED5E658858CF@ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (Ma"..., len = 16}, fromip = {s = 0x7ffc6e7d2838 "udp:aa.bb.cc.dd:5060", len = 24}, totag = { s = 0x55fba122c42e <buf+430> "8e46bdec-8fb1-4814-b516-575f5cd3315c\r\nCall-ID: 19C4ED5E658858CF@ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (May 8 2024)\r\nContent-Length: 0\r\n\r\n", len = 36}, toip = {s = 0x7ffc6e7d27fc "udp:aa.bb.cc.dd:5060", len = 23}, alloc_headers = 0, toip_buff = "udp:aa.bb.cc.dd:5060", '\000' <repeats 36 times>, fromip_buff = "udp:aa.bb.cc.dd:5060", '\000' <repeats 35 times>, tv = {tv_sec = 1725002318, tv_usec = 379190}, stat = 0x92} snd_inf = 0x0 __func__ = "sip_trace" #4 0x00007f3a0fa51497 in trace_tm_neg_ack_in (t=0x7f3921846038, type=4096, ps=0x7ffc6e7d2ad0) at siptrace.c:1769 info = 0x7f3924d6ba50 __func__ = "trace_tm_neg_ack_in" #5 0x00007f3a10659002 in run_trans_callbacks_internal (cb_lst=0x7f39218460b0, type=4096, trans=0x7f3921846038, params=0x7ffc6e7d2ad0) at t_hooks.c:258 cbp = 0x7f39205f2fb8 backup_from = 0x55fba123c2b0 <def_list+16> backup_to = 0x55fba123c2b8 <def_list+24> backup_dom_from = 0x55fba123c2c0 <def_list+32> backup_dom_to = 0x55fba123c2c8 <def_list+40> backup_uri_from = 0x55fba123c2a0 <def_list> backup_uri_to = 0x55fba123c2a8 <def_list+8> backup_xavps = 0x55fba123c3f8 <_xavp_list_head> backup_xavus = 0x55fba123c400 <_xavu_list_head> backup_xavis = 0x55fba123c408 <_xavi_list_head> __func__ = "run_trans_callbacks_internal" #6 0x00007f3a10659179 in run_trans_callbacks (type=4096, trans=0x7f3921846038, req=0x7f3a1189d500, rpl=0x0, code=4) at t_hooks.c:285 params = {req = 0x7f3a1189d500, rpl = 0x0, param = 0x7f39205f2fc8, code = 4, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}} #7 0x00007f3a106ec1bb in t_check_trans (msg=0x7f3a1189d500) at tm.c:2488 t = 0x7f3921846038 branch = 292764808 ret = 32570 #8 0x00007f3a106ec257 in w_t_check_trans (msg=0x7f3a1189d500, foo=0x0, bar=0x0) at tm.c:2509 No locals. #9 0x000055fba0c58367 in do_action (h=0x7ffc6e7d3400, a=0x7f3a10d8e8d0, msg=0x7f3a1189d500) at core/action.c:1079 ret = -5 v = 481060096 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000 2}n\374\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = " 2}n\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = " 2}n\374\177\000\000ouڠ\373U\000", __u6_addr16 = {12832, 28285, 32764, 0, 30063, 41178, 22011, 0}, __u6_addr32 = {1853698592, 32764, 2698671471, 22011}}}, sin6_scope_id = 1853698656}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000 2}n\374\177\000\000ouڠ\373U\000\000`2}n\374\177\000\000P2}n\374\177\000\000pmN\021:\177\000\000\000Չ\021:\177\000\000\001", '\000' <repeats 11 times>, "\324.\301\351\060\214+\021:\177\000\000\000\000\000\000\001\000\000\000\020\374 \373U", '\000' <repeats 25 times>, __ss_align = 140722162184688}}, id = 1853699008, send_flags = {f = 32764, blst_imask = 0}, proto = 64 '@', proto_pad0 = 108 'l', proto_pad1 = 4430} tmp = 0xe9c12ed4a636a400 <error: Cannot access memory at address 0xe9c12ed4a636a400> new_uri = 0x7f390fa416c8 "" end = 0x7f3a1012a2eb "dialog" crt = 0x7f391ff27010 "0" cmd = 0x7f3a10c68118 len = 262176768 user = 32569 uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 461265892}, passwd = {s = 0x7ffc6e7d2f80 "", len = 536880704}, host = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 461265892}, port = { s = 0x7ffc6e7d2e60 "p/}n\006", len = 269282911}, params = {s = 0x16e7d2e80 <error: Cannot access memory at address 0x16e7d2e80>, len = 461265892}, sip_params = {s = 0x7ffc6e7d2e80 "@/}n\374\177", len = 269282911}, headers = {s = 0x66e7d2f70 <error: Cannot access memory at address 0x66e7d2f70>, len = 269627611}, port_no = 41707, proto = 4114, type = 32570, flags = (unknown: 0xa636a400), transport = {s = 0x7ffc6e7d2f40 "`/}n\374\177", len = 269321843}, ttl = {s = 0x1ff27048 <error: Cannot access memory at address 0x1ff27048>, len = 10794}, user_param = {s = 0x7ffc000005e8 <error: Cannot access memory at address 0x7ffc000005e8>, len = 269526667}, maddr = {s = 0x7f391f9d46c0 "\002", len = 461265872}, method = {s = 0x100000478 <error: Cannot access memory at address 0x100000478>, len = 530400960}, lr = { s = 0x5e8112b6508 <error: Cannot access memory at address 0x5e8112b6508>, len = 530400960}, r2 = {s = 0x7ffc6e7d2f30 "", len = 461265872}, gr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 461265892}, transport_val = {s = 0x7f391d7ffc08 "\240\374\177\035\071\177", len = -1506368512}, ttl_val = {s = 0x16e7d2f50 <error: Cannot access memory at address 0x16e7d2f50>, len = 461265892}, user_param_val = { s = 0x7ffc6e7d2f50 "`0}n\374\177", len = 269282911}, maddr_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 461265892}, method_val = {s = 0x7ffc6e7d2f60 "p/}n\374\177", len = -1506368512}, lr_val = {s = 0x7ffc6e7d3060 "\200\060}n\374\177", len = 269351486}, r2_val = {s = 0x7ffc6e7d2f70 "`0}n\374\177", len = 269554093}, gr_val = {s = 0x7ffc6e7d3060 "\200\060}n\374\177", len = 269242067}} next_hop = {user = {s = 0x0, len = 530400960}, passwd = {s = 0x0, len = 294245632}, host = {s = 0x0, len = 269627637}, port = {s = 0x100000478 <error: Cannot access memory at address 0x100000478>, len = 530400960}, params = { s = 0x5e86e7d2ff0 <error: Cannot access memory at address 0x5e86e7d2ff0>, len = 269282911}, sip_params = {s = 0x608012157 <error: Cannot access memory at address 0x608012157>, len = 461265872}, headers = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = -1506368512}, port_no = 12464, proto = 28285, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0x100d8670), transport = {s = 0x3e0 <error: Cannot access memory at address 0x3e0>, len = 10794}, ttl = {s = 0x7f3a000005e8 "", len = 0}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1506368512}, maddr = { s = 0x0, len = 0}, method = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x7ffc6e7d3080 "`1}n\374\177", len = 1853698640}, gr = { s = 0x7f3a114e6d88 "", len = 294245632}, transport_val = {s = 0x7ffc6e7d3160 " 2}n\374\177", len = 269543303}, ttl_val = {s = 0x7ffc6e7d30c0 "\300F\235\037\071\177", len = 1853698640}, user_param_val = { s = 0x7f3a114e6d88 "", len = 294245632}, maddr_val = {s = 0x5e86e7d30d0 <error: Cannot access memory at address 0x5e86e7d30d0>, len = -1506368512}, method_val = {s = 0x7f391f9d46c0 "\002", len = 0}, lr_val = {s = 0x0, len = 269554093}, r2_val = {s = 0x7ffc6e7d31d0 "\360\061}n\374\177", len = 269242067}, gr_val = {s = 0x0, len = 0}} u = 0x7f390fa08000 port = 4114 dst_host = 0xcfa0f542d7 i = 16 flags = 32569 avp = 0x4a0c2fc10 st = {flags = 48, id = 0, name = {n = 262176768, s = {s = 0x7f390fa08000 "", len = 535981944}, re = 0x7f390fa08000}, avp = 0x7f391ff270a8} sct = 0x55fba0f5a088 <qm_free+8063> sjt = 0x16e7d2d90 rve = 0x7f390fa082e0 mct = 0x7ffc6e7d2e60 rv = 0x7f390fa08000 rv1 = 0x6a10f4e54 c1 = {cache_type = 290, val_type = RV_NONE, c = {avp_val = {n = 269627637, s = {s = 0x7f3a101230f5 "dlg_hash.c", len = 1144}, re = 0x7f3a101230f5}, pval = {rs = {s = 0x7f3a101230f5 "dlg_hash.c", len = 1144}, ri = -1506368512, flags = -373215532}}, i2s = "\300YO\021\350\005\000\000\000\000\000\000\001\000\000\000\020\374 \373U"} s = {s = 0x7f3a1012a770 <__func__.11> "set_dlg_variable_unsafe", len = 269657780} srevp = {0x0, 0x7f3a1189d500} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #10 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d3400, a=0x7f3a10d8e8d0, msg=0x7f3a1189d500) at core/action.c:1584 t = 0x7f3a10d8e8d0 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 294245632, tz_dsttime = 32570} tdiff = 294245632 __func__ = "run_actions" #11 0x000055fba0c67aff in run_actions_safe (h=0x7ffc6e7d5890, a=0x7f3a10d8e8d0, msg=0x7f3a1189d500) at core/action.c:1648 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4294967296, 6741736921070007646, 94539222285328, 0, 0, 0, 6741736921084687710, 684806027146655070}, __mask_was_saved = 0, __saved_mask = {__val = { 139887379076352, 0, 0, 0, 0, 0, 0, 0, 0, 140722162185472, 139887358911444, 140722162185440, 0, 33554432, 20328504, 10576624}}}}} ret = 32764 ign_on_break = 0 #12 0x000055fba0e1226d in rval_get_int (h=0x7ffc6e7d5890, msg=0x7f3a1189d500, i=0x7ffc6e7d37e0, rv=0x7f3a10d8ea28, cache=0x0) at core/rvalue.c:949 r_avp = 0xf6a0c67aff avp_val = {n = 281523440, s = {s = 0x7f3a10c7b4f0 "ou\003\020:\177", len = -1593034239}, re = 0x7f3a10c7b4f0} pval = {rs = {s = 0x7f3a10c6c4a0 "\346\024S\020:\177", len = 0}, ri = 1, flags = 22011} tmp = {s = 0x3a8 <error: Cannot access memory at address 0x3a8>, len = 280805392} s = 0x0 r = 32764 ret = 0 destroy_pval = 0 __func__ = "rval_get_int" #13 0x000055fba0e17841 in rval_expr_eval_int (h=0x7ffc6e7d5890, msg=0x7f3a1189d500, res=0x7ffc6e7d37e0, rve=0x7f3a10d8ea20) at core/rvalue.c:1947 i1 = -1506368512 i2 = -373215532 ret = -1 c1 = {cache_type = 1853699856, val_type = 32764, c = {avp_val = {n = -1595865264, s = {s = 0x55fba0e10750 <rval_new_str+136> "H\213E\370H\213P\bH\213E\350\213@\bH\230H\001\320", <incomplete sequence \306>, len = -1597834224}, re = 0x55fba0e10750 <rval_new_str+136>}, pval = {rs = {s = 0x55fba0e10750 <rval_new_str+136> "H\213E\370H\213P\bH\213E\350\213@\bH\230H\001\320", <incomplete sequence \306>, len = -1597834224}, ri = 1853699936, flags = 32764}}, i2s = "\001\000\000\000\000\000\000\000X\026s\021:\177\000\000\335\304"\241\373U"} c2 = {cache_type = 13, val_type = 17, c = {avp_val = {n = 0, s = {s = 0x0, len = 290409088}, re = 0x0}, pval = {rs = {s = 0x0, len = 290409088}, ri = 1853700172, flags = 32764}}, i2s = "\335\304"\241\373U\000\000\330\304"\241\373U\000\000\000\000\000\000\001"} rv1 = 0x0 rv2 = 0x0 __func__ = "rval_expr_eval_int" #14 0x000055fba0c57dbd in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d925d8, msg=0x7f3a1189d500) at core/action.c:1055 ret = -5 v = 14401040 dst = {send_sock = 0x7f3a1189d500, to = {s = {sa_family = 22672, sa_data = "}n\374\177\000\000\000\000\000\000:\177\000"}, sin = {sin_family = 22672, sin_port = 28285, sin_addr = {s_addr = 32764}, sin_zero = "\000\000\000\000:\177\000"}, sin6 = {sin6_family = 22672, sin6_port = 28285, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000:\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {0, 0, 32570, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 32570, 0, 0}}}, sin6_scope_id = 294245632}, sas = {ss_family = 22672, __ss_padding = "}n\374\177\000\000\000\000\000\000:\177", '\000' <repeats 11 times>, "Չ\021:\177\000\000\240V}n\374\177\000\000\000\000\000\000\000\000\000\000<\310"\241\373U\000\000XP\307\020:\177\000\000>\310"\241\373U\000\000\000\000\000\000\000\000\000\000@\022\060\021\377\377\377\377pA}\021:\177\000\000\000\000\000\000\001", '\000' <repeats 11 times>, "\020\274\241\242\373U\000", __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x55fba0c67391 <run_actions+2339> "\211\205\274\376\377\377H\307\005F\243P" new_uri = 0x55fba0f78206 <parse_headers+2307> "\351\021\066" end = 0x7ffc6e7d3990 "" crt = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE" cmd = 0x55fba0c2fc10 <_start> len = 8 user = 0 uri = {user = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, passwd = {s = 0x0, len = -1506368512}, host = {s = 0x7f3a114f4a80 "\002", len = 0}, port = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x7ffc6e7d3bf0 "\020=}n\374\177", len = -1597607023}, headers = { s = 0x7ffc6e7d3b10 "\300;}n\374\177", len = 272678193}, port_no = 15376, proto = 28285, type = 32764, flags = (unknown: 0x1189d500), transport = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 294245632}, ttl = {s = 0x7f3a10d8db28 "\272\002", len = 1853701168}, user_param = {s = 0x7ffc6e7d3bc0 "\360;}n\374\177", len = -1597605121}, maddr = {s = 0x7f3a114f9a60 "\b\021", len = 294245632}, method = {s = 0x0, len = 1853707936}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = { s = 0x2a0c2fc10 <error: Cannot access memory at address 0x2a0c2fc10>, len = 272871469}, transport_val = {s = 0x0, len = -1506368512}, ttl_val = {s = 0x7ffc6e7d3bc0 "\360;}n\374\177", len = 272753303}, user_param_val = { s = 0xb823755e <error: Cannot access memory at address 0xb823755e>, len = 294245632}, maddr_val = {s = 0x7ffc00000000 <error: Cannot access memory at address 0x7ffc00000000>, len = -1506368512}, method_val = { s = 0x1a113016f0 <error: Cannot access memory at address 0x1a113016f0>, len = 0}, lr_val = {s = 0x7f3a118ba988 "", len = 294245632}, r2_val = {s = 0x0, len = 294365576}, gr_val = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}} next_hop = {user = {s = 0x0, len = -1506368512}, passwd = {s = 0x7ffc6e7d3d00 "p>}n\374\177", len = 0}, host = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port = {s = 0x0, len = -1506368512}, params = {s = 0x7ffc6e7d3bf0 "\020=}n\374\177", len = 0}, sip_params = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, headers = {s = 0x0, len = 0}, port_no = 15632, proto = 28285, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0xa0c67afc), transport = {s = 0x7f3a1189d500 ">D%", len = 294245632}, ttl = {s = 0x7f3a10d8db28 "\272\002", len = 1853708432}, user_param = {s = 0x7f3a10d27680 "\370\001", len = 0}, maddr = {s = 0x0, len = 1}, method = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1109166754}, lr = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x5d8f7602bec3755e <error: Cannot access memory at address 0x5d8f7602bec3755e>, len = 337605982}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x5d8f7602bf03755e <error: Cannot access memory at address 0x5d8f7602bf03755e>, len = 337605982}, user_param_val = {s = 0x0, len = 0}, maddr_val = { s = 0x0, len = 0}, method_val = {s = 0x0, len = -1506368512}, lr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, r2_val = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, gr_val = {s = 0x0, len = 0}} u = 0xe9c12ed4a636a400 port = 201 dst_host = 0x10476dde i = 298 flags = 0 avp = 0x0 st = {flags = 0, id = 0, name = {n = -1591556899, s = {s = 0x55fba122c4dd <buf+605> "", len = 293390512}, re = 0x55fba122c4dd <buf+605>}, avp = 0x55fba122c4db <buf+603>} sct = 0x0 sjt = 0x7ffc6e7d3a60 rve = 0x7f3a10d8ea20 mct = 0x0 rv = 0x7ffc6e7d3aa0 rv1 = 0x100000000 c1 = {cache_type = 1853701712, val_type = 32764, c = {avp_val = {n = -1595858323, s = { s = 0x55fba0e1226d <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 1853701712}, re = 0x55fba0e1226d <rval_get_int+341>}, pval = {rs = { s = 0x55fba0e1226d <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 1853701712}, ri = -1506368512, flags = -373215532}}, i2s = "H\266O\021:\177\000\000\000\000\000\000\000\000\000\000\300\337\330\020:\177"} s = {s = 0x200 <error: Cannot access memory at address 0x200>, len = 294245632} srevp = {0x7ffc6e7d3e70, 0xe9c12ed4a636a400} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #15 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d925d8, msg=0x7f3a1189d500) at core/action.c:1584 t = 0x7f3a10d925d8 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 1853708432, tz_dsttime = 32764} tdiff = 1853702160 __func__ = "run_actions" #16 0x000055fba0c582d3 in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d95ce8, msg=0x7f3a1189d500) at core/action.c:1070 ret = 1 v = 1 dst = {send_sock = 0x7f3a1189d500, to = {s = {sa_family = 22672, sa_data = "}n\374\177\000\000\330S}\021:\177\000"}, sin = {sin_family = 22672, sin_port = 28285, sin_addr = {s_addr = 32764}, sin_zero = "\330S}\021:\177\000"}, sin6 = {sin6_family = 22672, sin6_port = 28285, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 = "\330S}\021:\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {21464, 4477, 32570, 0, 0, 0, 0, 0}, __u6_addr32 = {293426136, 32570, 0, 0}}}, sin6_scope_id = 294245632}, sas = {ss_family = 22672, __ss_padding = "}n\374\177\000\000\330S}\021:\177", '\000' <repeats 11 times>, "Չ\021:\177\000\000\240V}n\374\177", '\000' <repeats 11 times>, "Չ\021:\177\000\000P\001\310\020:\177\000\000`G}n\374\177\000\000\000\000\000\000\000\000\000\000\240V}n\377\377\377\377\200\346\301\020:\177\000\000\000\000\000\000\001", '\000' <repeats 11 times>, "\001\000\000\000\000\000\000", __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x7f3a1189d500 ">D%" new_uri = 0x7ffc6e7d4310 "" end = 0x7f3a1189d500 ">D%" crt = 0x0 cmd = 0x55fba122c2c6 <buf+70> len = 1853702572 user = 32764 uri = {user = {s = 0x7f3a1189d500 ">D%", len = 293462816}, passwd = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = -1506368512}, host = {s = 0x0, len = 0}, port = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x7ffc6e7d4420 "@E}n\374\177", len = -1597607023}, headers = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x7ffc6e7d4940 "\340J}n\374\177", len = 294245632}, ttl = {s = 0x7f3a10d27680 "\370\001", len = 1853703264}, user_param = {s = 0x0, len = 294245632}, maddr = {s = 0x7f3a10d21f18 "\340\001", len = 1853704992}, method = {s = 0x0, len = 1853707936}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x30 <error: Cannot access memory at address 0x30>, len = -1506368512}, transport_val = {s = 0x7ffc6e7d43f0 " D}n\374\177", len = 266269062}, ttl_val = { s = 0x55fb00000000 <error: Cannot access memory at address 0x55fb00000000>, len = 294245632}, user_param_val = {s = 0x55fba10c3df8 <__func__.25> "rval_new_empty", len = -1593034239}, maddr_val = { s = 0x55fba122c42e <buf+430> "8e46bdec-8fb1-4814-b516-575f5cd3315c\r\nCall-ID: 19C4ED5E658858CF@ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (May 8 2024)\r\nContent-Length: 0\r\n\r\n", len = 36}, method_val = {s = 0x7f3a11866718 "\026", len = 0}, lr_val = {s = 0x7f3a10d11f38 "", len = 294245632}, r2_val = {s = 0x0, len = 282140472}, gr_val = {s = 0x7ffc6e7d4510 "\200F}n\374\177", len = -1595836351}} next_hop = {user = {s = 0x55fb000005e8 <error: Cannot access memory at address 0x55fb000005e8>, len = -1506368512}, passwd = {s = 0x7f391e380230 "\002", len = 0}, host = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port = {s = 0x0, len = -1506368512}, params = {s = 0x7ffc6e7d4420 "@E}n\374\177", len = 0}, sip_params = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, headers = {s = 0x0, len = 0}, port_no = 17728, proto = 28285, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0xa0c67afc), transport = {s = 0x0, len = 294245632}, ttl = {s = 0x7f3a10d27680 "\370\001", len = 1853708432}, user_param = {s = 0x7f3a10d25078 "\354\001", len = 0}, maddr = {s = 0x0, len = -1}, method = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 1111717214}, lr = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x5d8f76024f23755e <error: Cannot access memory at address 0x5d8f76024f23755e>, len = 337605982}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = { s = 0x7ffc6e7d4680 "\360G}n\374\177", len = -1595834862}, gr_val = {s = 0x7f3a11866710 "\a", len = -1506368512}} u = 0x1400000000 port = 42550 dst_host = 0x7ffc6e7d56a0 i = 294245632 flags = 32570 avp = 0x7ffc00000046 st = {flags = 1853702832, id = 32764, name = {n = 268744002, s = {s = 0x7f3a1004b542 <w_process_maxfwd_header+982> "H\213M\310dH+\f%(", len = 293462808}, re = 0x7f3a1004b542 <w_process_maxfwd_header+982>}, avp = 0x0} sct = 0x1a636a400 sjt = 0x7f3a114fd540 rve = 0x7f3a10d8dfb8 mct = 0x7ffc6e7d41a0 rv = 0x14a0c2fc10 rv1 = 0x55fba0e17ea4 <rval_expr_eval_int+1806> c1 = {cache_type = 1853703808, val_type = 32764, c = {avp_val = {n = -1595858323, s = { s = 0x55fba0e1226d <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 0}, re = 0x55fba0e1226d <rval_get_int+341>}, pval = {rs = { s = 0x55fba0e1226d <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 0}, ri = 0, flags = 1}}, i2s = "\020\374 \373U\000\000\000\000\000\000\000\000\000\000\330w\322\020:\177"} s = {s = 0x0, len = 1} srevp = {0x7f3a1189d500, 0xe9c12ed4a636a400} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #17 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d95ce8, msg=0x7f3a1189d500) at core/action.c:1584 t = 0x7f3a10d95ce8 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 1853708432, tz_dsttime = 32764} tdiff = 1853704256 __func__ = "run_actions" #18 0x000055fba0c58329 in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d95e38, msg=0x7f3a1189d500) at core/action.c:1074 ret = 1 v = 0 dst = {send_sock = 0x7f3a1189d500, to = {s = {sa_family = 22672, sa_data = "}n\374\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 22672, sin_port = 28285, sin_addr = {s_addr = 32764}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 22672, sin6_port = 28285, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 1853705952}, sas = {ss_family = 22672, __ss_padding = "}n\374\177", '\000' <repeats 18 times>, "\340N}n\374\177\000\000\006\202\367\240\373U", '\000' <repeats 11 times>, "\244\066\246\324.\301\351\377\377\377\377\006\000\000\000\000\000\000\000\001\000\000\000\020\374 \373U", '\000' <repeats 26 times>, "\060O}n\374\177\000\000\242lӠ\373U\000", __ss_align = 139887367046936}}, id = 282216064, send_flags = {f = 32570, blst_imask = 0}, proto = 0 '\000', proto_pad0 = -43 '\325', proto_pad1 = 4489} tmp = 0x180000000000 <error: Cannot access memory at address 0x180000000000> new_uri = 0x101f0ccbd0 <error: Cannot access memory at address 0x101f0ccbd0> end = 0x0 crt = 0x0 cmd = 0x7f391f0ccbd0 len = -1595858323 user = 22011 uri = {user = {s = 0x55fba10eec6a "core", len = 293419024}, passwd = {s = 0x55fba10eed78 <__func__.17> "create_avp", len = -1506368512}, host = {s = 0x48 <error: Cannot access memory at address 0x48>, len = 0}, port = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x7ffc6e7d4c50 "pM}n\374\177", len = -1597607023}, headers = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x7ffc6e7d4c00 "@M}n\374\177", len = 294245632}, ttl = { s = 0x7f3a10d25078 "\354\001", len = 1853705360}, user_param = {s = 0x7f3a10d21f18 "\340\001", len = 1853708432}, maddr = {s = 0x7ffc6e7d4b40 "", len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = { s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x5d8f760258a3755e <error: Cannot access memory at address 0x5d8f760258a3755e>, len = 337605982}, ttl_val = {s = 0x0, len = 1853705136}, user_param_val = { s = 0x7f7ffc6e7d4c40 <error: Cannot access memory at address 0x7f7ffc6e7d4c40>, len = 282179676}, maddr_val = {s = 0x7ffc6e7d4c80 "\320L}n\374\177", len = -1594708756}, method_val = {s = 0x7f3a10d1c180 "", len = 0}, lr_val = {s = 0x7f3a10d1b85d "target_geo_number)", len = 17}, r2_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 280805392}, gr_val = {s = 0x100000043 <error: Cannot access memory at address 0x100000043>, len = 274080724}} next_hop = {user = {s = 0x7f391f0ccc08 "\177", len = 520932376}, passwd = {s = 0x7f3a10bcc010 "\001", len = -1506368512}, host = {s = 0x7ffc6e7d4d40 "\260N}n\374\177", len = -1595858323}, port = { s = 0x14800000187 <error: Cannot access memory at address 0x14800000187>, len = -1506368512}, params = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, sip_params = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, headers = {s = 0x0, len = 0}, port_no = 19824, proto = 28285, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0xa0c67afc), transport = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 294245632}, ttl = {s = 0x7f3a10d25078 "\354\001", len = 1853708432}, user_param = {s = 0x7ffc6e7d4cd0 "^u\203_\002v\217]^u\037\024t\353\200\t", len = 0}, maddr = {s = 0x0, len = 1}, method = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 1386444126}, lr = {s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, r2 = {s = 0x0, len = 0}, gr = { s = 0x5d8f76025f83755e <error: Cannot access memory at address 0x5d8f76025f83755e>, len = 337605982}, transport_val = {s = 0x7f3a00000000 "", len = 0}, ttl_val = {s = 0x7f3a10d1b85d "target_geo_number)", len = 17}, user_param_val = {s = 0x1a00000101 <error: Cannot access memory at address 0x1a00000101>, len = -1506368512}, maddr_val = {s = 0x10a0c2fc10 <error: Cannot access memory at address 0x10a0c2fc10>, len = 0}, method_val = { s = 0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x7ffc6e7d4eb0 " P}n\374\177", len = -1595836351}, gr_val = {s = 0x7f3a10d1b810 "", len = 294245632}} u = 0x7f3a1189d500 port = 42550 dst_host = 0x0 i = 294245632 flags = 32764 avp = 0x7f3a10d21f18 st = {flags = 520932432, id = 4, name = {n = -1592832428, s = {s = 0x55fba10f4e54 "core", len = 1853705024}, re = 0x55fba10f4e54}, avp = 0xe9c12ed4a636a400} sct = 0x7f390fa08000 sjt = 0x0 rve = 0x7f3a10d277d0 mct = 0x7f391f0ccc80 rv = 0x55fba0c2fc10 <_start> rv1 = 0x7ffc6e7d4b20 c1 = {cache_type = 1853705904, val_type = 32764, c = {avp_val = {n = -1595858323, s = { s = 0x55fba0e1226d <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 282215880}, re = 0x55fba0e1226d <rval_get_int+341>}, pval = {rs = { s = 0x55fba0e1226d <rval_get_int+341> "\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006", len = 282215880}, ri = 294245632, flags = 32570}}, i2s = "\200\301\321\020:\177\000\000\000\000\000\000\000\000\000\000\320Q\322\020:\177"} s = {s = 0x0, len = 0} srevp = {0x400014e90, 0xe9c12ed4a636a400} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #19 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d27448, msg=0x7f3a1189d500) at core/action.c:1584 t = 0x7f3a10d95e38 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 1853708432, tz_dsttime = 32764} tdiff = 1853706352 __func__ = "run_actions" #20 0x000055fba0c582d3 in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d9a5d0, msg=0x7f3a1189d500) at core/action.c:1070 ret = 1 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 41984, sa_data = "6\246\324.\301\351\000W}n\374\177\000"}, sin = {sin_family = 41984, sin_port = 42550, sin_addr = {s_addr = 3921751764}, sin_zero = "\000W}n\374\177\000"}, sin6 = {sin6_family = 41984, sin6_port = 42550, sin6_flowinfo = 3921751764, sin6_addr = {__in6_u = {__u6_addr8 = "\000W}n\374\177\000\000\000\000\000\000\001\000\000", __u6_addr16 = {22272, 28285, 32764, 0, 0, 0, 1, 0}, __u6_addr32 = {1853708032, 32764, 0, 1}}}, sin6_scope_id = 2697133072}, sas = {ss_family = 41984, __ss_padding = "6\246\324.\301\351\000W}n\374\177\000\000\000\000\000\000\001\000\000\000\020\374 \373U\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\000Չ\021:\177\000\000\000W}n\374\177\000\000\234\236\371\240\373U\000\000\270\266\017\241\373U\000\000`cn\021:\177\000\000\335\304"\241\373U\000\000\204\304"\241\373U\000\000`W}n\374\177\000\000\213\304"\241\373U\000", __ss_align = 0}}, id = -1591556899, send_flags = { f = 22011, blst_imask = 0}, proto = -122 '\206', proto_pad0 = -60 '\304', proto_pad1 = -24286} tmp = 0x5a10f4e54 <error: Cannot access memory at address 0x5a10f4e54> new_uri = 0x7f3a10721b45 "tm: t_reply.c" end = 0x7f3a11629608 "SIP/2.0 181 Call Is Being Forwarded\r\nVia: SIP/2.0/UDP 212.227.124.146;branch=z9hG4bK5233.276159011cb03ac27a88b9214d0464e1.0\r\nVia: SIP/2.0/UDP 89.246.251.196:5060;branch=z9hG4bKobcj3a20101lnev2u0f0.1\r\n"... crt = 0x7f3a116283e0 "8\a" cmd = 0x55fba123c400 <_xavu_list_head> len = 270422824 user = 32570 uri = {user = {s = 0x7ffc6e7d52d0 "0S}n\374\177", len = -1592832423}, passwd = {s = 0x12c00000187 <error: Cannot access memory at address 0x12c00000187>, len = -1594483904}, host = {s = 0x7ffc6e7d52f0 "", len = 280805392}, port = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 280805392}, params = {s = 0x7ffc6e7d5330 "`S}n\374\177", len = 274080724}, sip_params = { s = 0x400a15238 <error: Cannot access memory at address 0x400a15238>, len = 0}, headers = {s = 0x2000000 <error: Cannot access memory at address 0x2000000>, len = 20331672}, port_no = 22264, proto = 161, type = ERROR_URI_T, flags = (unknown: 0xc9c368), transport = {s = 0xdbbe10 <error: Cannot access memory at address 0xdbbe10>, len = 8}, ttl = {s = 0x130 <error: Cannot access memory at address 0x130>, len = -1506368512}, user_param = {s = 0x7ffc6e7d5360 "`T}n\374\177", len = -1597109357}, maddr = {s = 0x0, len = -1592832428}, method = {s = 0x7ffc6e7d5460 "\300U}n\374\177", len = 0}, lr = {s = 0x7ffc6e7d5460 "\300U}n\374\177", len = -1594524464}, r2 = {s = 0x55fba110b760 <__func__.3> "parse_via", len = -1592832423}, gr = {s = 0x55fba10fddaf "core", len = -1594483904}, transport_val = {s = 0x55fba10fdda0 <__func__.3> "parse_to_param", len = -1592794504}, ttl_val = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 280805392}, user_param_val = {s = 0x7ffc6e7d5410 "@T}n\374\177", len = 274080724}, maddr_val = { s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = 0}, method_val = {s = 0x7f3a10bcc010 "\001", len = 292437752}, lr_val = {s = 0x400a15450 <error: Cannot access memory at address 0x400a15450>, len = -1592742288}, r2_val = {s = 0xdbbe10 <error: Cannot access memory at address 0xdbbe10>, len = -1506368512}, gr_val = {s = 0x7ffc6e7d5540 "\207\001", len = -1593999801}} next_hop = {user = {s = 0x7ffc6e7d5440 "\020\374 \004", len = -1597109357}, passwd = {s = 0x0, len = -1506368512}, host = {s = 0x7ffc6e7d5540 "\207\001", len = 0}, port = { s = 0x4a0c2fc10 <error: Cannot access memory at address 0x4a0c2fc10>, len = -1592795729}, params = {s = 0x0, len = -1506368512}, sip_params = {s = 0x7ffc6e7d55c0 "-\001", len = -1594334232}, headers = { s = 0x55fba110b760 <__func__.3> "parse_via", len = -1592736384}, port_no = 64, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x6e7d5608), transport = {s = 0x2000000 <error: Cannot access memory at address 0x2000000>, len = 291681256}, ttl = {s = 0x55fba122c4dd <buf+605> "", len = -1591557079}, user_param = {s = 0xd10bcc010 <error: Cannot access memory at address 0xd10bcc010>, len = 29}, maddr = { s = 0x13a <error: Cannot access memory at address 0x13a>, len = -1506368512}, method = {s = 0x7ffc6e7d5500 "", len = -1597109357}, lr = {s = 0x0, len = -1592832428}, r2 = {s = 0x7ffc6e7d5600 "\020\374 \373U", len = 0}, gr = {s = 0x7ffc6e7d5600 "\020\374 \373U", len = 1853707636}, transport_val = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = -1591557245}, ttl_val = { s = 0x4a0c2fc10 <error: Cannot access memory at address 0x4a0c2fc10>, len = 292437808}, user_param_val = {s = 0x0, len = -1592832423}, maddr_val = {s = 0x8900000187 <error: Cannot access memory at address 0x8900000187>, len = -1594483904}, method_val = {s = 0x7ffc6e7d5590 "", len = 280805392}, lr_val = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 280805392}, r2_val = {s = 0x7ffc6e7d55d0 "", len = -1594175840}, gr_val = { s = 0x7f3a116e6388 "\004", len = 292447096}} u = 0x7f3a00000000 port = 0 dst_host = 0x7f3a10bcc010 i = 520577136 flags = 32764 avp = 0x7ffc6e7d52d0 st = {flags = 294245632, id = 1, name = {n = 520577432, s = {s = 0x7f391f076198 "\001", len = 1853706896}, re = 0x7f391f076198}, avp = 0x7f3a1068f69d <futex_release+29>} sct = 0x87ea636a400 sjt = 0x7f3a107244f0 <__func__.7> rve = 0x7f3a10d251c8 mct = 0x7f3a10720a2b rv = 0x0 rv1 = 0x55fba0f5a0a5 <qm_free+8092> c1 = {cache_type = 10573800, val_type = RV_NONE, c = {avp_val = {n = 13223000, s = {s = 0xc9c458 <error: Cannot access memory at address 0xc9c458>, len = 14401040}, re = 0xc9c458}, pval = {rs = { s = 0xc9c458 <error: Cannot access memory at address 0xc9c458>, len = 14401040}, ri = 8, flags = 0}}, i2s = "-\001\000\000\000\000\000\000\000\244\066\246\324.\301\351\000V}n\374\177"} s = {s = 0x0, len = -1506368512} srevp = {0x2000000, 0x1363ba8} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #21 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d103d8, msg=0x7f3a1189d500) at core/action.c:1584 t = 0x7f3a10d9a5d0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 294245632, tz_dsttime = 32570} tdiff = 0 __func__ = "run_actions" #22 0x000055fba0c67c0b in run_top_route (a=0x7f3a10d103d8, msg=0x7f3a1189d500, c=0x0) at core/action.c:1669 ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, 6741736920216466782, 94539222285328, 0, 0, 0, 6741736919895602526, 684806027146655070}, __mask_was_saved = 0, __saved_mask = {__val = {0, 94539222285328, 0, 0, 0, 140722162194768, 94539222747906, 140722162194768, 139887376539184, 0, 16843795572198908928, 4294967296, 4294967296, 94539222285328, 0, 0}}}}} p = 0x7ffc6e7d5890 ret = 0 sfbk = 0 #23 0x000055fba0dc51b2 in receive_msg ( buf=0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len=605, rcv_info=0x7ffc6e7d5d60) at core/receive.c:515 msg = 0x7f3a1189d500 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, 6741736920216466782, 94539222285328, 0, 0, 0, 6741736919895602526, 684806027146655070}, __mask_was_saved = 0, __saved_mask = {__val = { 139887403032960, 76, 94539225362399, 139887379090320, 139887379090320, 139887365636112, 294259544, 6148676624, 139883052278512, 140722162195472, 16843795572198908928, 0, 0, 94539222285328, 0, 0}}}}} bctx = 0x0 ret = 0 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} diff = 0 inb = { s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 605} netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0} keng = 0x0 evp = {data = 0x7ffc6e7d5a80, obuf = {s = 0x0, len = 0}, rcv = 0x7ffc6e7d5d60, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 exectime = 0 __func__ = "receive_msg" #24 0x000055fba0f28a26 in udp_rcv_loop () at core/udp_server.c:544 len = 605 buf = "ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D\r\nVia: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"... tmp = 0x55fba11871a0 <buff> "aa.bb.cc.dd" fromaddr = 0x7f3a118a0b90 fromaddrlen = 16 rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {2189222868, 0}, addr32 = {2189222868, 0, 0, 0}, addr16 = {58324, 33404, 0, 0, 0, 0, 0, 0}, addr = "\324\343|\202", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = { addrl = {3809666004, 0}, addr32 = {3809666004, 0, 0, 0}, addr16 = {58324, 58130, 0, 0, 0, 0, 0, 0}, addr = "\324\343\022\343", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304\324\343|\202\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 2189222868}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 2189222868, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023\304\324\343|\202", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7f3a11892470, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} printbuf = " \b%\241<\000\000\000\030\204\310\020:\177\000\000\210\347p6\000\000\000\000\001\000\000\000 \000\000\000\000\376$\241\373U\000\000x\a%\241\373U\000\000\205\337X\341r\177\017Z\000\244\066\246\324.\301\351\240^}n\374\177\000\000\234\036\001\241\373U\000\000\200\a%\241\373U\000\000\200\b%\241\373U\000\000\300^}n\374\177\000\000\000\244\066\246\324.\301\351\300^}n\374\177\000\000\300\032\337\033\071\177\000\000\020\374 \373U", '\000' <repeats 26 times>, "\200_}n\374\177\000\000\315\336\347\240\373U\000\000 _}n\374\177\000\000H'\001\241<", '\000' <repeats 11 times>, "J"... i = 0 j = 0 l = 0 __func__ = "udp_rcv_loop" #25 0x000055fba0c4109b in main_loop () at main.c:1722 i = 11 pid = 0 si = 0x7f3a11892470 si_desc = "udp receiver child=11 sock=aa.bb.cc.dd:5060\000\000\002\000\000\000I\000\000\000\000\244\066\246\324.\301\351\000\000\000\000\000\000\000\000\352\004\000\000\000\000\000\000\020\374 \373U", '\000' <repeats 26 times>, "\060b}n\374\177\000\000sOߠ\373U\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #26 0x000055fba0c4e20c in main (argc=10, argv=0x7ffc6e7d6788) at main.c:3078 cfg_stream = 0x55fba28dc2a0 c = -1 r = 0 tmp = 0x7ffc6e7d6e51 "" tmp_len = 316488736 port = 32570 proto = 316400256 ahost = 0x0 aport = 0 options = 0x55fba1089258 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3674059014 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x0 p = 0x0 st = {st_dev = 23, st_ino = 1615, st_nlink = 2, st_mode = 16888, st_uid = 5061, st_gid = 5061, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1722351337, tv_nsec = 496334843}, st_mtim = {tv_sec = 1722351337, tv_nsec = 496334843}, st_ctim = {tv_sec = 1722351337, tv_nsec = 496334843}, __glibc_reserved = {0, 0, 0}} tbuf = '\000' <repeats 20 times>, " ", '\000' <repeats 35 times>, "\006\000\000\000\000\000\000\200", '\000' <repeats 56 times>, "\006\000\000\000\000\000\000\200", '\000' <repeats 168 times>... option_index = 12 long_options = {{name = 0x55fba108b6c6 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fba108650c "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fba108b6cb "alias", has_arg = 1, flag = 0x0, val = 1024}, { name = 0x55fba108b6d1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fba108b6d7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fba108b6e0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, { name = 0x55fba108b6ea "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fba108b6f4 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fba108b6ff "modparam", has_arg = 1, flag = 0x0, val = 1030}, { name = 0x55fba108b708 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fba108b713 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fba108b719 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, { name = 0x55fba108b723 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main"
```
#### Log Messages
<!-- Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
``` Aug 30 09:18:53 proxy-kamailio[1276]: ALERT: <core> [main.c:774]: handle_sigs(): child process 1512 exited by a signal 11 Aug 30 09:18:53 proxy-kamailio[1276]: ALERT: <core> [main.c:777]: handle_sigs(): core was generated
```
#### SIP Traffic
<!-- If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). --> Full SIP trace is not available. I gathered following SIP message from core dump.
``` ACK sip:49xxxxxxxxxx@sip.proxy.de:5060 SIP/2.0 Max-Forwards: 19 Record-Route: sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D Via: SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00d1232a60e4be6125f6753a4.0 Via: SIP/2.0/UDP ab.bc.cd.da:5060;received=ab.bc.cd.da;rport=5060;branch=z9hG4bK1086835C2F91ECAC From: sip:49xxxxxxxxxx@sip.proxy.de;tag=2041847FA948DA9D To: sip:49yyyyyyyyyy@sip.proxy.de;tag=8e46bdec-8fb1-4814-b516-575f5cd3315c Call-ID: 19C4ED5E658858CF@ab.bc.cd.da CSeq: 9 ACK User-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (May 8 2024) Content-Length: 0
```
### Possible Solutions
<!-- If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix. --> For the moment we have no solution except may be to remove the siptrace module and relevant config. However, we can not do that either as sip trace is required for many other reasons.
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
``` version: kamailio 5.6.4 (x86_64/linux) flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: compiled with gcc 10.2.1
```
* **Operating System**:
<!-- Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...; Kernel details (output of `lsb_release -a` and `uname -a`) -->
``` Linux sip-proxy 5.10.0-31-amd64 #1 SMP Debian 5.10.221-1 (2024-07-14) x86_64 GNU/Linux ```
You can try to look at it, get with gdb the outpout for next commands:
``` frame 0 list p *dst p *dst->send_sock ```
However, 5.6.x is out of maintenance, the best is to upgrade to a supported version and see if the same happens. Or at least try the latest version in 5.6.x series.
Thanks for your valuable input.
We are already in planning of upgrading to latest 5.6 version. I will get back to you if we observe another crash after the upgrade.
Hi, starting with frame 20, I can see a lot of logs like: `error: Cannot access memory at address`(e.g. in "uri =" variable). Maybe you can trace back from frame 20 and debug to check if/where exactly passed data got corrupted
Also in frame 20, I can see: `end = 0x7f3a11629608 "SIP/2.0 181 Call Is Being Forwarded\r\nVia: .....` ... So this might be an ack for one of the forked legs?!
Thanks. I will look into it.
This issue is stale because it has been open 6 weeks with no activity. Remove stale label or comment or this will be closed in 2 weeks.
Closed #3970 as not planned.