<!--
Kamailio Project uses GitHub Issues only for bugs in the code or feature 
requests. Please use this template only for bug reports.

If you have questions about using Kamailio or related to its configuration 
file, ask on sr-users mailing list:

  * 
https://lists.kamailio.org/mailman3/postorius/lists/sr-users.lists.kamailio.org/

If you have questions about developing extensions to Kamailio or its existing C 
code, ask on sr-dev mailing list:

  * 
https://lists.kamailio.org/mailman3/postorius/lists/sr-dev.lists.kamailio.org/

Please try to fill this template as much as possible for any issue. It helps 
the developers to troubleshoot the issue.

Note that an issue report may be closed automatically after about 2 months
if there is no interest from developers or community users on pursuing it, being
considered expired. In such case, it can be reopened by writing a comment that 
includes
the token `/notexpired`. About two weeks before considered expired, the issue is
marked with the label `stale`, trying to notify the submitter and everyone else
that might be interested in it. To remove the label `stale`, write a comment 
that
includes the token `/notstale`. Also, any comment postpone the `expire` 
timeline,
being considered that there is interest in pursuing the issue.

If there is no content to be filled in a section, the entire section can be 
removed.

You can delete the comments from the template sections when filling.

You can delete next line and everything above before submitting (it is a 
comment).
-->

### Description

<!--
Explain what you did, what you expected to happen, and what actually happened.
-->
We have random kamailio crashes with Segmentation Fault. It happens when ACK 
for canceled call is received by Kamailio SIP proxy and forwarded to trace 
server using siptrace module.


### Troubleshooting

#### Reproduction

<!--
If the issue can be reproduced, describe how it can be done.
-->
So far the problem happens only in live environment, we are unable to reproduce 
it in our Dev environment.

#### Debugging Data

<!--
If you got a core dump, use gdb to extract troubleshooting data - full 
backtrace,
local variables and the list of the code at the issue location.

  gdb /path/to/kamailio /path/to/corefile
  bt full
  info locals
  list

If you are familiar with gdb, feel free to attach more of what you consider to
be relevant.
-->

```
#0  0x00007f3a0fa747b4 in msg_send_buffer (dst=0x7f3924d6ba60,
    buf=0x55fba122c280 <buf> "ACK sip:49xxxxxxx...@sip.proxy.de:5060 
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: 
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP 
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len=605, flags=1) at 
../../core/forward.h:220
        new_dst = {send_sock = 0x2000000, to = {s = {sa_family = 0, sa_data = 
"\000\000\001\000\000\000\020\374 \004\000\000"}, sin = {sin_family = 0, 
sin_port = 0, sin_addr = {s_addr = 1}, sin_zero = "\020\374 \004\000\000"},
            sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 1, 
sin6_addr = {__in6_u = {__u6_addr8 = "\020\374 
\004\000\000\000\257\335\017\241\373U\000", __u6_addr16 = {64528, 41154, 4, 0, 
56751, 41231, 22011, 0},
                  __u6_addr32 = {2697133072, 4, 2702171567, 22011}}}, 
sin6_scope_id = 0}, sas = {ss_family = 0,
              __ss_padding = "\000\000\001\000\000\000\020\374 
\004\000\000\000\257\335\017\241\373U", '\000' <repeats 11 times>, 
"\244\066\246\324.\301\351\300$}n\374\177\000\000\021\006\371\240\373U\000\000\360#}n\374\177\000\000\223\vΠ\373U\000\000\000\000\000\000\000\000\000\000@$}n\374\177\000\000\067(}n5060\000\244\066\246\324.\301\351\374'}n\374\177\000\000\000\000\000\000\000\000\000",
 __ss_align = 140722162182140}}, id = 59, send_flags = {f = 0,
            blst_imask = 0}, proto = 64 '@', proto_pad0 = 36 '$', proto_pad1 = 
28285}
        outb = {
          s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxx...@sip.proxy.de:5060 
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: 
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP 
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 605}
        netinfo = {data = {s = 0xb000003a8 <error: Cannot access memory at 
address 0xb000003a8>, len = 29}, bufsize = 1853694672, rcv = 0x7c101230db, dst 
= 0x1}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        port = -1597834224
        ip = {af = 2697133072, len = 0, u = {addrl = {3221225482794, 1512}, 
addr32 = {10794, 750, 1512, 0}, addr16 = {10794, 0, 750, 0, 1512, 0, 0, 0}, 
addr = "**\000\000\356\002\000\000\350\005\000\000\000\000\000"}}
        from = 0x0
        local_addr = {s = {sa_family = 18112, sa_data = 
"\235\037\071\177\000\000\320[~\033\071\177\000"}, sin = {sin_family = 18112, 
sin_port = 8093, sin_addr = {s_addr = 32569}, sin_zero = 
"\320[~\033\071\177\000"}, sin6 = {
            sin6_family = 18112, sin6_port = 8093, sin6_flowinfo = 32569, 
sin6_addr = {__in6_u = {__u6_addr8 = 
"\320[~\033\071\177\000\000\210\006w\021:\177\000", __u6_addr16 = {23504, 7038, 
32569, 0, 1672, 4471, 32570, 0},
                __u6_addr32 = {461265872, 32569, 293013128, 32570}}}, 
sin6_scope_id = 291708464}, sas = {ss_family = 18112,
            __ss_padding = 
"\235\037\071\177\000\000\320[~\033\071\177\000\000\210\006w\021:\177\000\000\060\036c\021:\177\000\000\000\000\000\000\000\000\000\000\005\304\"\241\373U\000\000\207\001\000\000?\000\000\000@\033\366\240\373U\000\000\200#}n\374\177\000\000\020\300\274\020:\177\000\000\330\001\000\000\000\000\000\000\060'}n\374\177\000\000\300#}n\374\177\000\000\324#V\020:\177\000\000\320$}n\374\177\000",
 __ss_align = 16843795572198908928}}
        con = 0x0
        wsev = {type = 0, buf = 0xe9c12ed4a636a400 <error: Cannot access memory 
at address 0xe9c12ed4a636a400>, len = 1853694896, id = 32764}
        ret = 32764
        __func__ = "msg_send_buffer"
#1  0x00007f3a0fa7ca80 in trace_send_duplicate (
    buf=0x55fba122c280 <buf> "ACK sip:49xxxxxxx...@sip.proxy.de:5060 
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: 
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP 
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len=605, dst2=0x7f3924d6ba60) at 
siptrace_send.c:356
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' 
<repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 
0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0,
              sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = 
{__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 
0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0,
              __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 
0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 
'\000', proto_pad1 = 0}
        pdst = 0x7f3924d6ba60
        p = 0x0
        __func__ = "trace_send_duplicate"
#2  0x00007f3a0fa3f730 in sip_trace_store (sto=0x7ffc6e7d2730, 
dst=0x7f3924d6ba60, correlation_id_str=0x0) at siptrace.c:593
        ret = 1
        __func__ = "sip_trace_store"
#3  0x00007f3a0fa49101 in sip_trace (msg=0x7f3a1189d500, dst=0x7f3924d6ba60, 
correlation_id_str=0x0, dir=0x0) at siptrace.c:1303
        sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 
0x0}, state = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 
0x0}, avp = 0x0}, body = {
            s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxx...@sip.proxy.de:5060 
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: 
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP 
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 605}, alloc_body = 0, 
callid = {s = 0x55fba122c45d <buf+477> "19c4ed5e65885...@ab.bc.cd.da\r\nCSeq: 9 
ACK\r\nUser-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (May  8 
2024)\r\nContent-Length: 0\r\n\r\n", len = 31},
          method = {
            s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxx...@sip.proxy.de:5060 
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: 
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP 
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 3}, status = {s = 
0x7f3a0fa7d065 "", len = 0}, dir = 0x7f3a0fa7ffb5 "in", fromtag = {
            s = 0x55fba122c3f4 <buf+372> "2041847FA948DA9D\r\nTo: 
<sip:49yyyyyyy...@sip.proxy.de>;tag=8e46bdec-8fb1-4814-b516-575f5cd3315c\r\nCall-ID:
 19c4ed5e65885...@ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 
(UI) 154.07.59 (Ma"..., len = 16}, fromip = {s = 0x7ffc6e7d2838 
"udp:aa.bb.cc.dd:5060", len = 24}, totag = {
            s = 0x55fba122c42e <buf+430> 
"8e46bdec-8fb1-4814-b516-575f5cd3315c\r\nCall-ID: 
19c4ed5e65885...@ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 
(UI) 154.07.59 (May  8 2024)\r\nContent-Length: 0\r\n\r\n",
            len = 36}, toip = {s = 0x7ffc6e7d27fc "udp:aa.bb.cc.dd:5060", len = 
23}, alloc_headers = 0, toip_buff = "udp:aa.bb.cc.dd:5060", '\000' <repeats 36 
times>,
          fromip_buff = "udp:aa.bb.cc.dd:5060", '\000' <repeats 35 times>, tv = 
{tv_sec = 1725002318, tv_usec = 379190}, stat = 0x92}
        snd_inf = 0x0
        __func__ = "sip_trace"
#4  0x00007f3a0fa51497 in trace_tm_neg_ack_in (t=0x7f3921846038, type=4096, 
ps=0x7ffc6e7d2ad0) at siptrace.c:1769
        info = 0x7f3924d6ba50
        __func__ = "trace_tm_neg_ack_in"
#5  0x00007f3a10659002 in run_trans_callbacks_internal (cb_lst=0x7f39218460b0, 
type=4096, trans=0x7f3921846038, params=0x7ffc6e7d2ad0) at t_hooks.c:258
        cbp = 0x7f39205f2fb8
        backup_from = 0x55fba123c2b0 <def_list+16>
        backup_to = 0x55fba123c2b8 <def_list+24>
        backup_dom_from = 0x55fba123c2c0 <def_list+32>
        backup_dom_to = 0x55fba123c2c8 <def_list+40>
        backup_uri_from = 0x55fba123c2a0 <def_list>
        backup_uri_to = 0x55fba123c2a8 <def_list+8>
        backup_xavps = 0x55fba123c3f8 <_xavp_list_head>
        backup_xavus = 0x55fba123c400 <_xavu_list_head>
        backup_xavis = 0x55fba123c408 <_xavi_list_head>
        __func__ = "run_trans_callbacks_internal"
#6  0x00007f3a10659179 in run_trans_callbacks (type=4096, trans=0x7f3921846038, 
req=0x7f3a1189d500, rpl=0x0, code=4) at t_hooks.c:285
        params = {req = 0x7f3a1189d500, rpl = 0x0, param = 0x7f39205f2fc8, code 
= 4, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 
0}}
#7  0x00007f3a106ec1bb in t_check_trans (msg=0x7f3a1189d500) at tm.c:2488
        t = 0x7f3921846038
        branch = 292764808
        ret = 32570
#8  0x00007f3a106ec257 in w_t_check_trans (msg=0x7f3a1189d500, foo=0x0, 
bar=0x0) at tm.c:2509
No locals.
#9  0x000055fba0c58367 in do_action (h=0x7ffc6e7d3400, a=0x7f3a10d8e8d0, 
msg=0x7f3a1189d500) at core/action.c:1079
        ret = -5
        v = 481060096
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = 
"\000\000\000\000\000\000 2}n\374\177\000"}, sin = {sin_family = 0, sin_port = 
0, sin_addr = {s_addr = 0}, sin_zero = " 2}n\374\177\000"}, sin6 = {sin6_family 
= 0,
              sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = 
{__u6_addr8 = " 2}n\374\177\000\000ouڠ\373U\000", __u6_addr16 = {12832, 28285, 
32764, 0, 30063, 41178, 22011, 0}, __u6_addr32 = {1853698592, 32764, 2698671471,
                    22011}}}, sin6_scope_id = 1853698656}, sas = {ss_family = 0,
              __ss_padding = "\000\000\000\000\000\000 
2}n\374\177\000\000ouڠ\373U\000\000`2}n\374\177\000\000P2}n\374\177\000\000pmN\021:\177\000\000\000Չ\021:\177\000\000\001",
 '\000' <repeats 11 times>, 
"\324.\301\351\060\214+\021:\177\000\000\000\000\000\000\001\000\000\000\020\374
 \373U", '\000' <repeats 25 times>, __ss_align = 140722162184688}}, id = 
1853699008, send_flags = {f = 32764, blst_imask = 0}, proto = 64 '@', 
proto_pad0 = 108 'l',
          proto_pad1 = 4430}
        tmp = 0xe9c12ed4a636a400 <error: Cannot access memory at address 
0xe9c12ed4a636a400>
        new_uri = 0x7f390fa416c8 ""
        end = 0x7f3a1012a2eb "dialog"
        crt = 0x7f391ff27010 "0"
        cmd = 0x7f3a10c68118
        len = 262176768
        user = 32569
        uri = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, 
len = 461265892}, passwd = {s = 0x7ffc6e7d2f80 "", len = 536880704}, host = {s 
= 0x1 <error: Cannot access memory at address 0x1>, len = 461265892}, port = {
            s = 0x7ffc6e7d2e60 "p/}n\006", len = 269282911}, params = {s = 
0x16e7d2e80 <error: Cannot access memory at address 0x16e7d2e80>, len = 
461265892}, sip_params = {s = 0x7ffc6e7d2e80 "@/}n\374\177", len = 269282911},
          headers = {s = 0x66e7d2f70 <error: Cannot access memory at address 
0x66e7d2f70>, len = 269627611}, port_no = 41707, proto = 4114, type = 32570, 
flags = (unknown: 0xa636a400), transport = {s = 0x7ffc6e7d2f40 "`/}n\374\177",
            len = 269321843}, ttl = {s = 0x1ff27048 <error: Cannot access 
memory at address 0x1ff27048>, len = 10794}, user_param = {s = 0x7ffc000005e8 
<error: Cannot access memory at address 0x7ffc000005e8>, len = 269526667},
          maddr = {s = 0x7f391f9d46c0 "\002", len = 461265872}, method = {s = 
0x100000478 <error: Cannot access memory at address 0x100000478>, len = 
530400960}, lr = {
            s = 0x5e8112b6508 <error: Cannot access memory at address 
0x5e8112b6508>, len = 530400960}, r2 = {s = 0x7ffc6e7d2f30 "", len = 
461265872}, gr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 
461265892},
          transport_val = {s = 0x7f391d7ffc08 "\240\374\177\035\071\177", len = 
-1506368512}, ttl_val = {s = 0x16e7d2f50 <error: Cannot access memory at 
address 0x16e7d2f50>, len = 461265892}, user_param_val = {
            s = 0x7ffc6e7d2f50 "`0}n\374\177", len = 269282911}, maddr_val = {s 
= 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 
461265892}, method_val = {s = 0x7ffc6e7d2f60 "p/}n\374\177", len = -1506368512},
          lr_val = {s = 0x7ffc6e7d3060 "\200\060}n\374\177", len = 269351486}, 
r2_val = {s = 0x7ffc6e7d2f70 "`0}n\374\177", len = 269554093}, gr_val = {s = 
0x7ffc6e7d3060 "\200\060}n\374\177", len = 269242067}}
        next_hop = {user = {s = 0x0, len = 530400960}, passwd = {s = 0x0, len = 
294245632}, host = {s = 0x0, len = 269627637}, port = {s = 0x100000478 <error: 
Cannot access memory at address 0x100000478>, len = 530400960}, params = {
            s = 0x5e86e7d2ff0 <error: Cannot access memory at address 
0x5e86e7d2ff0>, len = 269282911}, sip_params = {s = 0x608012157 <error: Cannot 
access memory at address 0x608012157>, len = 461265872}, headers = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = -1506368512}, 
port_no = 12464, proto = 28285, type = 32764, flags = (URI_USER_NORMALIZE | 
URI_SIP_USER_PHONE | unknown: 0x100d8670),
          transport = {s = 0x3e0 <error: Cannot access memory at address 
0x3e0>, len = 10794}, ttl = {s = 0x7f3a000005e8 "", len = 0}, user_param = {s = 
0x1 <error: Cannot access memory at address 0x1>, len = -1506368512}, maddr = {
            s = 0x0, len = 0}, method = {s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, lr = {s = 0x0, 
len = 0}, r2 = {s = 0x7ffc6e7d3080 "`1}n\374\177", len = 1853698640}, gr = {
            s = 0x7f3a114e6d88 "", len = 294245632}, transport_val = {s = 
0x7ffc6e7d3160 " 2}n\374\177", len = 269543303}, ttl_val = {s = 0x7ffc6e7d30c0 
"\300F\235\037\071\177", len = 1853698640}, user_param_val = {
            s = 0x7f3a114e6d88 "", len = 294245632}, maddr_val = {s = 
0x5e86e7d30d0 <error: Cannot access memory at address 0x5e86e7d30d0>, len = 
-1506368512}, method_val = {s = 0x7f391f9d46c0 "\002", len = 0}, lr_val = {s = 
0x0,
            len = 269554093}, r2_val = {s = 0x7ffc6e7d31d0 
"\360\061}n\374\177", len = 269242067}, gr_val = {s = 0x0, len = 0}}
        u = 0x7f390fa08000
        port = 4114
        dst_host = 0xcfa0f542d7
        i = 16
        flags = 32569
        avp = 0x4a0c2fc10
        st = {flags = 48, id = 0, name = {n = 262176768, s = {s = 
0x7f390fa08000 "", len = 535981944}, re = 0x7f390fa08000}, avp = 0x7f391ff270a8}
        sct = 0x55fba0f5a088 <qm_free+8063>
        sjt = 0x16e7d2d90
        rve = 0x7f390fa082e0
        mct = 0x7ffc6e7d2e60
        rv = 0x7f390fa08000
        rv1 = 0x6a10f4e54
        c1 = {cache_type = 290, val_type = RV_NONE, c = {avp_val = {n = 
269627637, s = {s = 0x7f3a101230f5 "dlg_hash.c", len = 1144}, re = 
0x7f3a101230f5}, pval = {rs = {s = 0x7f3a101230f5 "dlg_hash.c", len = 1144}, ri 
= -1506368512,
              flags = -373215532}}, i2s = 
"\300YO\021\350\005\000\000\000\000\000\000\001\000\000\000\020\374 \373U"}
        s = {s = 0x7f3a1012a770 <__func__.11> "set_dlg_variable_unsafe", len = 
269657780}
        srevp = {0x0, 0x7f3a1189d500}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, 
u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>,
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len 
= 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, 
string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#10 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d3400, a=0x7f3a10d8e8d0, 
msg=0x7f3a1189d500) at core/action.c:1584
        t = 0x7f3a10d8e8d0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 294245632, tz_dsttime = 32570}
        tdiff = 294245632
        __func__ = "run_actions"
#11 0x000055fba0c67aff in run_actions_safe (h=0x7ffc6e7d5890, a=0x7f3a10d8e8d0, 
msg=0x7f3a1189d500) at core/action.c:1648
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = 
{{__jmpbuf = {4294967296, 6741736921070007646, 94539222285328, 0, 0, 0, 
6741736921084687710, 684806027146655070}, __mask_was_saved = 0, __saved_mask = 
{__val = {
                  139887379076352, 0, 0, 0, 0, 0, 0, 0, 0, 140722162185472, 
139887358911444, 140722162185440, 0, 33554432, 20328504, 10576624}}}}}
        ret = 32764
        ign_on_break = 0
#12 0x000055fba0e1226d in rval_get_int (h=0x7ffc6e7d5890, msg=0x7f3a1189d500, 
i=0x7ffc6e7d37e0, rv=0x7f3a10d8ea28, cache=0x0) at core/rvalue.c:949
        r_avp = 0xf6a0c67aff
        avp_val = {n = 281523440, s = {s = 0x7f3a10c7b4f0 "ou\003\020:\177", 
len = -1593034239}, re = 0x7f3a10c7b4f0}
        pval = {rs = {s = 0x7f3a10c6c4a0 "\346\024S\020:\177", len = 0}, ri = 
1, flags = 22011}
        tmp = {s = 0x3a8 <error: Cannot access memory at address 0x3a8>, len = 
280805392}
        s = 0x0
        r = 32764
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#13 0x000055fba0e17841 in rval_expr_eval_int (h=0x7ffc6e7d5890, 
msg=0x7f3a1189d500, res=0x7ffc6e7d37e0, rve=0x7f3a10d8ea20) at 
core/rvalue.c:1947
        i1 = -1506368512
        i2 = -373215532
        ret = -1
        c1 = {cache_type = 1853699856, val_type = 32764, c = {avp_val = {n = 
-1595865264, s = {s = 0x55fba0e10750 <rval_new_str+136> 
"H\213E\370H\213P\bH\213E\350\213@\bH\230H\001\320", <incomplete sequence 
\306>, len = -1597834224},
              re = 0x55fba0e10750 <rval_new_str+136>}, pval = {rs = {s = 
0x55fba0e10750 <rval_new_str+136> 
"H\213E\370H\213P\bH\213E\350\213@\bH\230H\001\320", <incomplete sequence 
\306>, len = -1597834224}, ri = 1853699936,
              flags = 32764}}, i2s = 
"\001\000\000\000\000\000\000\000X\026s\021:\177\000\000\335\304\"\241\373U"}
        c2 = {cache_type = 13, val_type = 17, c = {avp_val = {n = 0, s = {s = 
0x0, len = 290409088}, re = 0x0}, pval = {rs = {s = 0x0, len = 290409088}, ri = 
1853700172, flags = 32764}},
          i2s = 
"\335\304\"\241\373U\000\000\330\304\"\241\373U\000\000\000\000\000\000\001"}
        rv1 = 0x0
        rv2 = 0x0
        __func__ = "rval_expr_eval_int"
#14 0x000055fba0c57dbd in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d925d8, 
msg=0x7f3a1189d500) at core/action.c:1055
        ret = -5
        v = 14401040
        dst = {send_sock = 0x7f3a1189d500, to = {s = {sa_family = 22672, 
sa_data = "}n\374\177\000\000\000\000\000\000:\177\000"}, sin = {sin_family = 
22672, sin_port = 28285, sin_addr = {s_addr = 32764},
              sin_zero = "\000\000\000\000:\177\000"}, sin6 = {sin6_family = 
22672, sin6_port = 28285, sin6_flowinfo = 32764, sin6_addr = {__in6_u = 
{__u6_addr8 = "\000\000\000\000:\177\000\000\000\000\000\000\000\000\000",
                  __u6_addr16 = {0, 0, 32570, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 
32570, 0, 0}}}, sin6_scope_id = 294245632}, sas = {ss_family = 22672,
              __ss_padding = "}n\374\177\000\000\000\000\000\000:\177", '\000' 
<repeats 11 times>, 
"Չ\021:\177\000\000\240V}n\374\177\000\000\000\000\000\000\000\000\000\000<\310\"\241\373U\000\000XP\307\020:\177\000\000>\310\"\241\373U\000\000\000\000\000\000\000\000\000\000@\022\060\021\377\377\377\377pA}\021:\177\000\000\000\000\000\000\001",
 '\000' <repeats 11 times>, "\020\274\241\242\373U\000", __ss_align = 0}}, id = 
0, send_flags = {f = 0, blst_imask = 0},
          proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x55fba0c67391 <run_actions+2339> 
"\211\205\274\376\377\377H\307\005F\243P"
        new_uri = 0x55fba0f78206 <parse_headers+2307> "\351\021\066"
        end = 0x7ffc6e7d3990 ""
        crt = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE"
        cmd = 0x55fba0c2fc10 <_start>
        len = 8
        user = 0
        uri = {user = {s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, passwd = {s = 
0x0, len = -1506368512}, host = {s = 0x7f3a114f4a80 "\002", len = 0}, port = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, params = {s = 
0x0, len = 0}, sip_params = {s = 0x7ffc6e7d3bf0 "\020=}n\374\177", len = 
-1597607023}, headers = {
            s = 0x7ffc6e7d3b10 "\300;}n\374\177", len = 272678193}, port_no = 
15376, proto = 28285, type = 32764, flags = (unknown: 0x1189d500), transport = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 294245632}, ttl = 
{s = 0x7f3a10d8db28 "\272\002", len = 1853701168}, user_param = {s = 
0x7ffc6e7d3bc0 "\360;}n\374\177",
            len = -1597605121}, maddr = {s = 0x7f3a114f9a60 "\b\021", len = 
294245632}, method = {s = 0x0, len = 1853707936}, lr = {s = 0x0, len = 0}, r2 = 
{s = 0x0, len = 0}, gr = {
            s = 0x2a0c2fc10 <error: Cannot access memory at address 
0x2a0c2fc10>, len = 272871469}, transport_val = {s = 0x0, len = -1506368512}, 
ttl_val = {s = 0x7ffc6e7d3bc0 "\360;}n\374\177", len = 272753303}, 
user_param_val = {
            s = 0xb823755e <error: Cannot access memory at address 0xb823755e>, 
len = 294245632}, maddr_val = {s = 0x7ffc00000000 <error: Cannot access memory 
at address 0x7ffc00000000>, len = -1506368512}, method_val = {
            s = 0x1a113016f0 <error: Cannot access memory at address 
0x1a113016f0>, len = 0}, lr_val = {s = 0x7f3a118ba988 "", len = 294245632}, 
r2_val = {s = 0x0, len = 294365576}, gr_val = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}}
        next_hop = {user = {s = 0x0, len = -1506368512}, passwd = {s = 
0x7ffc6e7d3d00 "p>}n\374\177", len = 0}, host = {s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port = {s = 
0x0,
            len = -1506368512}, params = {s = 0x7ffc6e7d3bf0 "\020=}n\374\177", 
len = 0}, sip_params = {s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, headers = {s = 
0x0, len = 0},
          port_no = 15632, proto = 28285, type = 32764, flags = 
(URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0xa0c67afc), transport = {s 
= 0x7f3a1189d500 ">D%", len = 294245632}, ttl = {s = 0x7f3a10d8db28 "\272\002",
            len = 1853708432}, user_param = {s = 0x7f3a10d27680 "\370\001", len 
= 0}, maddr = {s = 0x0, len = 1}, method = {s = 0x100000000 <error: Cannot 
access memory at address 0x100000000>, len = -1109166754}, lr = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, r2 = {s = 0x0, 
len = 0}, gr = {s = 0x5d8f7602bec3755e <error: Cannot access memory at address 
0x5d8f7602bec3755e>,
            len = 337605982}, transport_val = {s = 0x0, len = 0}, ttl_val = {s 
= 0x5d8f7602bf03755e <error: Cannot access memory at address 
0x5d8f7602bf03755e>, len = 337605982}, user_param_val = {s = 0x0, len = 0}, 
maddr_val = {
            s = 0x0, len = 0}, method_val = {s = 0x0, len = -1506368512}, 
lr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, 
r2_val = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, gr_val = {s = 
0x0, len = 0}}
        u = 0xe9c12ed4a636a400
        port = 201
        dst_host = 0x10476dde
        i = 298
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 0, name = {n = -1591556899, s = {s = 
0x55fba122c4dd <buf+605> "", len = 293390512}, re = 0x55fba122c4dd <buf+605>}, 
avp = 0x55fba122c4db <buf+603>}
        sct = 0x0
        sjt = 0x7ffc6e7d3a60
        rve = 0x7f3a10d8ea20
        mct = 0x0
        rv = 0x7ffc6e7d3aa0
        rv1 = 0x100000000
        c1 = {cache_type = 1853701712, val_type = 32764, c = {avp_val = {n = 
-1595858323, s = {
                s = 0x55fba0e1226d <rval_get_int+341> 
"\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006",
 len = 1853701712},
              re = 0x55fba0e1226d <rval_get_int+341>}, pval = {rs = {
                s = 0x55fba0e1226d <rval_get_int+341> 
"\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006",
 len = 1853701712},
              ri = -1506368512, flags = -373215532}}, i2s = 
"H\266O\021:\177\000\000\000\000\000\000\000\000\000\000\300\337\330\020:\177"}
        s = {s = 0x200 <error: Cannot access memory at address 0x200>, len = 
294245632}
        srevp = {0x7ffc6e7d3e70, 0xe9c12ed4a636a400}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, 
u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>,
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len 
= 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, 
string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#15 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d925d8, 
msg=0x7f3a1189d500) at core/action.c:1584
        t = 0x7f3a10d925d8
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 1853708432, tz_dsttime = 32764}
        tdiff = 1853702160
        __func__ = "run_actions"
#16 0x000055fba0c582d3 in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d95ce8, 
msg=0x7f3a1189d500) at core/action.c:1070
        ret = 1
        v = 1
        dst = {send_sock = 0x7f3a1189d500, to = {s = {sa_family = 22672, 
sa_data = "}n\374\177\000\000\330S}\021:\177\000"}, sin = {sin_family = 22672, 
sin_port = 28285, sin_addr = {s_addr = 32764}, sin_zero = 
"\330S}\021:\177\000"},
            sin6 = {sin6_family = 22672, sin6_port = 28285, sin6_flowinfo = 
32764, sin6_addr = {__in6_u = {__u6_addr8 = 
"\330S}\021:\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {21464, 
4477, 32570, 0, 0, 0, 0, 0},
                  __u6_addr32 = {293426136, 32570, 0, 0}}}, sin6_scope_id = 
294245632}, sas = {ss_family = 22672,
              __ss_padding = "}n\374\177\000\000\330S}\021:\177", '\000' 
<repeats 11 times>, "Չ\021:\177\000\000\240V}n\374\177", '\000' <repeats 11 
times>, 
"Չ\021:\177\000\000P\001\310\020:\177\000\000`G}n\374\177\000\000\000\000\000\000\000\000\000\000\240V}n\377\377\377\377\200\346\301\020:\177\000\000\000\000\000\000\001",
 '\000' <repeats 11 times>, "\001\000\000\000\000\000\000", __ss_align = 0}}, 
id = 0, send_flags = {f = 0, blst_imask = 0},
          proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7f3a1189d500 ">D%"
        new_uri = 0x7ffc6e7d4310 ""
        end = 0x7f3a1189d500 ">D%"
        crt = 0x0
        cmd = 0x55fba122c2c6 <buf+70>
        len = 1853702572
        user = 32764
        uri = {user = {s = 0x7f3a1189d500 ">D%", len = 293462816}, passwd = {s 
= 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = -1506368512}, host 
= {s = 0x0, len = 0}, port = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, params = {s = 
0x0, len = 0}, sip_params = {s = 0x7ffc6e7d4420 "@E}n\374\177", len = 
-1597607023}, headers = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port_no = 0, 
proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x7ffc6e7d4940 
"\340J}n\374\177", len = 294245632},
          ttl = {s = 0x7f3a10d27680 "\370\001", len = 1853703264}, user_param = 
{s = 0x0, len = 294245632}, maddr = {s = 0x7f3a10d21f18 "\340\001", len = 
1853704992}, method = {s = 0x0, len = 1853707936}, lr = {s = 0x0, len = 0},
          r2 = {s = 0x0, len = 0}, gr = {s = 0x30 <error: Cannot access memory 
at address 0x30>, len = -1506368512}, transport_val = {s = 0x7ffc6e7d43f0 " 
D}n\374\177", len = 266269062}, ttl_val = {
            s = 0x55fb00000000 <error: Cannot access memory at address 
0x55fb00000000>, len = 294245632}, user_param_val = {s = 0x55fba10c3df8 
<__func__.25> "rval_new_empty", len = -1593034239}, maddr_val = {
            s = 0x55fba122c42e <buf+430> 
"8e46bdec-8fb1-4814-b516-575f5cd3315c\r\nCall-ID: 
19c4ed5e65885...@ab.bc.cd.da\r\nCSeq: 9 ACK\r\nUser-Agent: AVM FRITZ!Box 7590 
(UI) 154.07.59 (May  8 2024)\r\nContent-Length: 0\r\n\r\n",
            len = 36}, method_val = {s = 0x7f3a11866718 "\026", len = 0}, 
lr_val = {s = 0x7f3a10d11f38 "", len = 294245632}, r2_val = {s = 0x0, len = 
282140472}, gr_val = {s = 0x7ffc6e7d4510 "\200F}n\374\177", len = -1595836351}}
        next_hop = {user = {s = 0x55fb000005e8 <error: Cannot access memory at 
address 0x55fb000005e8>, len = -1506368512}, passwd = {s = 0x7f391e380230 
"\002", len = 0}, host = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port = {s = 
0x0, len = -1506368512}, params = {s = 0x7ffc6e7d4420 "@E}n\374\177", len = 0}, 
sip_params = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, headers = {s = 
0x0, len = 0}, port_no = 17728, proto = 28285, type = 32764,
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 
0xa0c67afc), transport = {s = 0x0, len = 294245632}, ttl = {s = 0x7f3a10d27680 
"\370\001", len = 1853708432}, user_param = {s = 0x7f3a10d25078 "\354\001", len 
= 0},
          maddr = {s = 0x0, len = -1}, method = {s = 0x100000000 <error: Cannot 
access memory at address 0x100000000>, len = 1111717214}, lr = {s = 
0x55fba0c2fc10 <_start> "1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE",
            len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x5d8f76024f23755e 
<error: Cannot access memory at address 0x5d8f76024f23755e>, len = 337605982}, 
transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0},
          user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, 
method_val = {s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, lr_val = {s = 
0x0, len = 0}, r2_val = {
            s = 0x7ffc6e7d4680 "\360G}n\374\177", len = -1595834862}, gr_val = 
{s = 0x7f3a11866710 "\a", len = -1506368512}}
        u = 0x1400000000
        port = 42550
        dst_host = 0x7ffc6e7d56a0
        i = 294245632
        flags = 32570
        avp = 0x7ffc00000046
        st = {flags = 1853702832, id = 32764, name = {n = 268744002, s = {s = 
0x7f3a1004b542 <w_process_maxfwd_header+982> "H\213M\310dH+\f%(", len = 
293462808}, re = 0x7f3a1004b542 <w_process_maxfwd_header+982>}, avp = 0x0}
        sct = 0x1a636a400
        sjt = 0x7f3a114fd540
        rve = 0x7f3a10d8dfb8
        mct = 0x7ffc6e7d41a0
        rv = 0x14a0c2fc10
        rv1 = 0x55fba0e17ea4 <rval_expr_eval_int+1806>
        c1 = {cache_type = 1853703808, val_type = 32764, c = {avp_val = {n = 
-1595858323, s = {
                s = 0x55fba0e1226d <rval_get_int+341> 
"\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006",
 len = 0},
              re = 0x55fba0e1226d <rval_get_int+341>}, pval = {rs = {
                s = 0x55fba0e1226d <rval_get_int+341> 
"\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006",
 len = 0}, ri = 0,
              flags = 1}}, i2s = "\020\374 
\373U\000\000\000\000\000\000\000\000\000\000\330w\322\020:\177"}
        s = {s = 0x0, len = 1}
        srevp = {0x7f3a1189d500, 0xe9c12ed4a636a400}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, 
u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>,
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len 
= 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, 
string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#17 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d95ce8, 
msg=0x7f3a1189d500) at core/action.c:1584
        t = 0x7f3a10d95ce8
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 1853708432, tz_dsttime = 32764}
        tdiff = 1853704256
        __func__ = "run_actions"
#18 0x000055fba0c58329 in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d95e38, 
msg=0x7f3a1189d500) at core/action.c:1074
        ret = 1
        v = 0
        dst = {send_sock = 0x7f3a1189d500, to = {s = {sa_family = 22672, 
sa_data = "}n\374\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family 
= 22672, sin_port = 28285, sin_addr = {s_addr = 32764},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 
22672, sin6_port = 28285, sin6_flowinfo = 32764, sin6_addr = {__in6_u = 
{__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
                  __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 1853705952}, 
sas = {ss_family = 22672,
              __ss_padding = "}n\374\177", '\000' <repeats 18 times>, 
"\340N}n\374\177\000\000\006\202\367\240\373U", '\000' <repeats 11 times>, 
"\244\066\246\324.\301\351\377\377\377\377\006\000\000\000\000\000\000\000\001\000\000\000\020\374
 \373U", '\000' <repeats 26 times>, "\060O}n\374\177\000\000\242lӠ\373U\000", 
__ss_align = 139887367046936}}, id = 282216064, send_flags = {f = 32570, 
blst_imask = 0}, proto = 0 '\000', proto_pad0 = -43 '\325',
          proto_pad1 = 4489}
        tmp = 0x180000000000 <error: Cannot access memory at address 
0x180000000000>
        new_uri = 0x101f0ccbd0 <error: Cannot access memory at address 
0x101f0ccbd0>
        end = 0x0
        crt = 0x0
        cmd = 0x7f391f0ccbd0
        len = -1595858323
        user = 22011
        uri = {user = {s = 0x55fba10eec6a "core", len = 293419024}, passwd = {s 
= 0x55fba10eed78 <__func__.17> "create_avp", len = -1506368512}, host = {s = 
0x48 <error: Cannot access memory at address 0x48>, len = 0}, port = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, params = {s = 
0x0, len = 0}, sip_params = {s = 0x7ffc6e7d4c50 "pM}n\374\177", len = 
-1597607023}, headers = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, port_no = 0, 
proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x7ffc6e7d4c00 
"@M}n\374\177", len = 294245632}, ttl = {
            s = 0x7f3a10d25078 "\354\001", len = 1853705360}, user_param = {s = 
0x7f3a10d21f18 "\340\001", len = 1853708432}, maddr = {s = 0x7ffc6e7d4b40 "", 
len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {
            s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 
0x5d8f760258a3755e <error: Cannot access memory at address 0x5d8f760258a3755e>, 
len = 337605982}, ttl_val = {s = 0x0, len = 1853705136}, user_param_val = {
            s = 0x7f7ffc6e7d4c40 <error: Cannot access memory at address 
0x7f7ffc6e7d4c40>, len = 282179676}, maddr_val = {s = 0x7ffc6e7d4c80 
"\320L}n\374\177", len = -1594708756}, method_val = {s = 0x7f3a10d1c180 "", len 
= 0},
          lr_val = {s = 0x7f3a10d1b85d "target_geo_number)", len = 17}, r2_val 
= {s = 0x8 <error: Cannot access memory at address 0x8>, len = 280805392}, 
gr_val = {s = 0x100000043 <error: Cannot access memory at address 0x100000043>,
            len = 274080724}}
        next_hop = {user = {s = 0x7f391f0ccc08 "\177", len = 520932376}, passwd 
= {s = 0x7f3a10bcc010 "\001", len = -1506368512}, host = {s = 0x7ffc6e7d4d40 
"\260N}n\374\177", len = -1595858323}, port = {
            s = 0x14800000187 <error: Cannot access memory at address 
0x14800000187>, len = -1506368512}, params = {s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, sip_params = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, headers = {s = 
0x0, len = 0}, port_no = 19824, proto = 28285, type = 32764,
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 
0xa0c67afc), transport = {s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 294245632}, ttl = 
{s = 0x7f3a10d25078 "\354\001",
            len = 1853708432}, user_param = {s = 0x7ffc6e7d4cd0 
"^u\203_\002v\217]^u\037\024t\353\200\t", len = 0}, maddr = {s = 0x0, len = 1}, 
method = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>,
            len = 1386444126}, lr = {s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, r2 = {s = 0x0, 
len = 0}, gr = {
            s = 0x5d8f76025f83755e <error: Cannot access memory at address 
0x5d8f76025f83755e>, len = 337605982}, transport_val = {s = 0x7f3a00000000 "", 
len = 0}, ttl_val = {s = 0x7f3a10d1b85d "target_geo_number)", len = 17},
          user_param_val = {s = 0x1a00000101 <error: Cannot access memory at 
address 0x1a00000101>, len = -1506368512}, maddr_val = {s = 0x10a0c2fc10 
<error: Cannot access memory at address 0x10a0c2fc10>, len = 0}, method_val = {
            s = 0x55fba0c2fc10 <_start> 
"1\355I\211\321^H\211\342H\203\344\360PTL\215\005ZaE", len = 0}, lr_val = {s = 
0x0, len = 0}, r2_val = {s = 0x7ffc6e7d4eb0 " P}n\374\177", len = -1595836351}, 
gr_val = {s = 0x7f3a10d1b810 "",
            len = 294245632}}
        u = 0x7f3a1189d500
        port = 42550
        dst_host = 0x0
        i = 294245632
        flags = 32764
        avp = 0x7f3a10d21f18
        st = {flags = 520932432, id = 4, name = {n = -1592832428, s = {s = 
0x55fba10f4e54 "core", len = 1853705024}, re = 0x55fba10f4e54}, avp = 
0xe9c12ed4a636a400}
        sct = 0x7f390fa08000
        sjt = 0x0
        rve = 0x7f3a10d277d0
        mct = 0x7f391f0ccc80
        rv = 0x55fba0c2fc10 <_start>
        rv1 = 0x7ffc6e7d4b20
        c1 = {cache_type = 1853705904, val_type = 32764, c = {avp_val = {n = 
-1595858323, s = {
                s = 0x55fba0e1226d <rval_get_int+341> 
"\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006",
 len = 282215880},
              re = 0x55fba0e1226d <rval_get_int+341>}, pval = {rs = {
                s = 0x55fba0e1226d <rval_get_int+341> 
"\205\300\017\237\300\017\266\320H\213\205\370\376\377\377\211\020H\213\205\b\377\377\377\213@\004\203\340\371\211\302H\213\205\b\377\377\377\211P\004\351y\006",
 len = 282215880},
              ri = 294245632, flags = 32570}}, i2s = 
"\200\301\321\020:\177\000\000\000\000\000\000\000\000\000\000\320Q\322\020:\177"}
        s = {s = 0x0, len = 0}
        srevp = {0x400014e90, 0xe9c12ed4a636a400}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, 
u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>,
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len 
= 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, 
string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#19 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d27448, 
msg=0x7f3a1189d500) at core/action.c:1584
        t = 0x7f3a10d95e38
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 1853708432, tz_dsttime = 32764}
        tdiff = 1853706352
        __func__ = "run_actions"
#20 0x000055fba0c582d3 in do_action (h=0x7ffc6e7d5890, a=0x7f3a10d9a5d0, 
msg=0x7f3a1189d500) at core/action.c:1070
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 41984, sa_data = 
"6\246\324.\301\351\000W}n\374\177\000"}, sin = {sin_family = 41984, sin_port = 
42550, sin_addr = {s_addr = 3921751764}, sin_zero = "\000W}n\374\177\000"},
            sin6 = {sin6_family = 41984, sin6_port = 42550, sin6_flowinfo = 
3921751764, sin6_addr = {__in6_u = {__u6_addr8 = 
"\000W}n\374\177\000\000\000\000\000\000\001\000\000", __u6_addr16 = {22272, 
28285, 32764, 0, 0, 0, 1, 0},
                  __u6_addr32 = {1853708032, 32764, 0, 1}}}, sin6_scope_id = 
2697133072}, sas = {ss_family = 41984,
              __ss_padding = 
"6\246\324.\301\351\000W}n\374\177\000\000\000\000\000\000\001\000\000\000\020\374
 
\373U\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\000Չ\021:\177\000\000\000W}n\374\177\000\000\234\236\371\240\373U\000\000\270\266\017\241\373U\000\000`cn\021:\177\000\000\335\304\"\241\373U\000\000\204\304\"\241\373U\000\000`W}n\374\177\000\000\213\304\"\241\373U\000",
 __ss_align = 0}}, id = -1591556899, send_flags = {
            f = 22011, blst_imask = 0}, proto = -122 '\206', proto_pad0 = -60 
'\304', proto_pad1 = -24286}
        tmp = 0x5a10f4e54 <error: Cannot access memory at address 0x5a10f4e54>
        new_uri = 0x7f3a10721b45 "tm: t_reply.c"
        end = 0x7f3a11629608 "SIP/2.0 181 Call Is Being Forwarded\r\nVia: 
SIP/2.0/UDP 
212.227.124.146;branch=z9hG4bK5233.276159011cb03ac27a88b9214d0464e1.0\r\nVia: 
SIP/2.0/UDP 89.246.251.196:5060;branch=z9hG4bKobcj3a20101lnev2u0f0.1\r\n"...
        crt = 0x7f3a116283e0 "8\a"
        cmd = 0x55fba123c400 <_xavu_list_head>
        len = 270422824
        user = 32570
        uri = {user = {s = 0x7ffc6e7d52d0 "0S}n\374\177", len = -1592832423}, 
passwd = {s = 0x12c00000187 <error: Cannot access memory at address 
0x12c00000187>, len = -1594483904}, host = {s = 0x7ffc6e7d52f0 "", len = 
280805392},
          port = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 
280805392}, params = {s = 0x7ffc6e7d5330 "`S}n\374\177", len = 274080724}, 
sip_params = {
            s = 0x400a15238 <error: Cannot access memory at address 
0x400a15238>, len = 0}, headers = {s = 0x2000000 <error: Cannot access memory 
at address 0x2000000>, len = 20331672}, port_no = 22264, proto = 161,
          type = ERROR_URI_T, flags = (unknown: 0xc9c368), transport = {s = 
0xdbbe10 <error: Cannot access memory at address 0xdbbe10>, len = 8}, ttl = {s 
= 0x130 <error: Cannot access memory at address 0x130>, len = -1506368512},
          user_param = {s = 0x7ffc6e7d5360 "`T}n\374\177", len = -1597109357}, 
maddr = {s = 0x0, len = -1592832428}, method = {s = 0x7ffc6e7d5460 
"\300U}n\374\177", len = 0}, lr = {s = 0x7ffc6e7d5460 "\300U}n\374\177",
            len = -1594524464}, r2 = {s = 0x55fba110b760 <__func__.3> 
"parse_via", len = -1592832423}, gr = {s = 0x55fba10fddaf "core", len = 
-1594483904}, transport_val = {s = 0x55fba10fdda0 <__func__.3> "parse_to_param",
            len = -1592794504}, ttl_val = {s = 0x30 <error: Cannot access 
memory at address 0x30>, len = 280805392}, user_param_val = {s = 0x7ffc6e7d5410 
"@T}n\374\177", len = 274080724}, maddr_val = {
            s = 0x100000001 <error: Cannot access memory at address 
0x100000001>, len = 0}, method_val = {s = 0x7f3a10bcc010 "\001", len = 
292437752}, lr_val = {s = 0x400a15450 <error: Cannot access memory at address 
0x400a15450>,
            len = -1592742288}, r2_val = {s = 0xdbbe10 <error: Cannot access 
memory at address 0xdbbe10>, len = -1506368512}, gr_val = {s = 0x7ffc6e7d5540 
"\207\001", len = -1593999801}}
        next_hop = {user = {s = 0x7ffc6e7d5440 "\020\374 \004", len = 
-1597109357}, passwd = {s = 0x0, len = -1506368512}, host = {s = 0x7ffc6e7d5540 
"\207\001", len = 0}, port = {
            s = 0x4a0c2fc10 <error: Cannot access memory at address 
0x4a0c2fc10>, len = -1592795729}, params = {s = 0x0, len = -1506368512}, 
sip_params = {s = 0x7ffc6e7d55c0 "-\001", len = -1594334232}, headers = {
            s = 0x55fba110b760 <__func__.3> "parse_via", len = -1592736384}, 
port_no = 64, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x6e7d5608), 
transport = {s = 0x2000000 <error: Cannot access memory at address 0x2000000>,
            len = 291681256}, ttl = {s = 0x55fba122c4dd <buf+605> "", len = 
-1591557079}, user_param = {s = 0xd10bcc010 <error: Cannot access memory at 
address 0xd10bcc010>, len = 29}, maddr = {
            s = 0x13a <error: Cannot access memory at address 0x13a>, len = 
-1506368512}, method = {s = 0x7ffc6e7d5500 "", len = -1597109357}, lr = {s = 
0x0, len = -1592832428}, r2 = {s = 0x7ffc6e7d5600 "\020\374 \373U", len = 0},
          gr = {s = 0x7ffc6e7d5600 "\020\374 \373U", len = 1853707636}, 
transport_val = {s = 0x400000001 <error: Cannot access memory at address 
0x400000001>, len = -1591557245}, ttl_val = {
            s = 0x4a0c2fc10 <error: Cannot access memory at address 
0x4a0c2fc10>, len = 292437808}, user_param_val = {s = 0x0, len = -1592832423}, 
maddr_val = {s = 0x8900000187 <error: Cannot access memory at address 
0x8900000187>,
            len = -1594483904}, method_val = {s = 0x7ffc6e7d5590 "", len = 
280805392}, lr_val = {s = 0x30 <error: Cannot access memory at address 0x30>, 
len = 280805392}, r2_val = {s = 0x7ffc6e7d55d0 "", len = -1594175840}, gr_val = 
{
            s = 0x7f3a116e6388 "\004", len = 292447096}}
        u = 0x7f3a00000000
        port = 0
        dst_host = 0x7f3a10bcc010
        i = 520577136
        flags = 32764
        avp = 0x7ffc6e7d52d0
        st = {flags = 294245632, id = 1, name = {n = 520577432, s = {s = 
0x7f391f076198 "\001", len = 1853706896}, re = 0x7f391f076198}, avp = 
0x7f3a1068f69d <futex_release+29>}
        sct = 0x87ea636a400
        sjt = 0x7f3a107244f0 <__func__.7>
        rve = 0x7f3a10d251c8
        mct = 0x7f3a10720a2b
        rv = 0x0
        rv1 = 0x55fba0f5a0a5 <qm_free+8092>
        c1 = {cache_type = 10573800, val_type = RV_NONE, c = {avp_val = {n = 
13223000, s = {s = 0xc9c458 <error: Cannot access memory at address 0xc9c458>, 
len = 14401040}, re = 0xc9c458}, pval = {rs = {
                s = 0xc9c458 <error: Cannot access memory at address 0xc9c458>, 
len = 14401040}, ri = 8, flags = 0}}, i2s = 
"-\001\000\000\000\000\000\000\000\244\066\246\324.\301\351\000V}n\374\177"}
        s = {s = 0x0, len = -1506368512}
        srevp = {0x2000000, 0x1363ba8}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, 
u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>,
              str = {s = 0x1 <error: Cannot access memory at address 0x1>, len 
= 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 13}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, 
string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = 
{number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x000055fba0c67391 in run_actions (h=0x7ffc6e7d5890, a=0x7f3a10d103d8, 
msg=0x7f3a1189d500) at core/action.c:1584
        t = 0x7f3a10d9a5d0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 294245632, tz_dsttime = 32570}
        tdiff = 0
        __func__ = "run_actions"
#22 0x000055fba0c67c0b in run_top_route (a=0x7f3a10d103d8, msg=0x7f3a1189d500, 
c=0x0) at core/action.c:1669
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = 
{{__jmpbuf = {4294967296, 6741736920216466782, 94539222285328, 0, 0, 0, 
6741736919895602526, 684806027146655070}, __mask_was_saved = 0, __saved_mask = 
{__val = {0,
                  94539222285328, 0, 0, 0, 140722162194768, 94539222747906, 
140722162194768, 139887376539184, 0, 16843795572198908928, 4294967296, 
4294967296, 94539222285328, 0, 0}}}}}
        p = 0x7ffc6e7d5890
        ret = 0
        sfbk = 0
#23 0x000055fba0dc51b2 in receive_msg (
    buf=0x55fba122c280 <buf> "ACK sip:49xxxxxxx...@sip.proxy.de:5060 
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: 
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP 
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len=605, rcv_info=0x7ffc6e7d5d60) 
at core/receive.c:515
        msg = 0x7f3a1189d500
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 1, jmp_env = 
{{__jmpbuf = {4294967296, 6741736920216466782, 94539222285328, 0, 0, 0, 
6741736919895602526, 684806027146655070}, __mask_was_saved = 0, __saved_mask = 
{__val = {
                  139887403032960, 76, 94539225362399, 139887379090320, 
139887379090320, 139887365636112, 294259544, 6148676624, 139883052278512, 
140722162195472, 16843795572198908928, 0, 0, 94539222285328, 0, 0}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {
          s = 0x55fba122c280 <buf> "ACK sip:49xxxxxxx...@sip.proxy.de:5060 
SIP/2.0\r\nMax-Forwards: 19\r\nRecord-Route: 
<sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: SIP/2.0/UDP 
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"..., len = 605}
        netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffc6e7d5a80, obuf = {s = 0x0, len = 0}, rcv = 
0x7ffc6e7d5d60, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#24 0x000055fba0f28a26 in udp_rcv_loop () at core/udp_server.c:544
        len = 605
        buf = "ACK sip:49xxxxxxx...@sip.proxy.de:5060 SIP/2.0\r\nMax-Forwards: 
19\r\nRecord-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>\r\nVia: 
SIP/2.0/UDP aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00"...
        tmp = 0x55fba11871a0 <buff> "aa.bb.cc.dd"
        fromaddr = 0x7f3a118a0b90
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {2189222868, 0}, addr32 
= {2189222868, 0, 0, 0}, addr16 = {58324, 33404, 0, 0, 0, 0, 0, 0}, addr = 
"\324\343|\202", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {
              addrl = {3809666004, 0}, addr32 = {3809666004, 0, 0, 0}, addr16 = 
{58324, 58130, 0, 0, 0, 0, 0, 0}, addr = "\324\343\022\343", '\000' <repeats 11 
times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0,
          proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = 
"\023\304\324\343|\202\000\000\000\000\000\000\000"}, sin = {sin_family = 2, 
sin_port = 50195, sin_addr = {s_addr = 2189222868},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 
2, sin6_port = 50195, sin6_flowinfo = 2189222868, sin6_addr = {__in6_u = 
{__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
                  __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = 
{ss_family = 2, __ss_padding = "\023\304\324\343|\202", '\000' <repeats 111 
times>, __ss_align = 0}}, bind_address = 0x7f3a11892470, rflags = 0,
          proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = " 
\b%\241<\000\000\000\030\204\310\020:\177\000\000\210\347p6\000\000\000\000\001\000\000\000
 
\000\000\000\000\376$\241\373U\000\000x\a%\241\373U\000\000\205\337X\341r\177\017Z\000\244\066\246\324.\301\351\240^}n\374\177\000\000\234\036\001\241\373U\000\000\200\a%\241\373U\000\000\200\b%\241\373U\000\000\300^}n\374\177\000\000\000\244\066\246\324.\301\351\300^}n\374\177\000\000\300\032\337\033\071\177\000\000\020\374
 \373U", '\000' <repeats 26 times>, 
"\200_}n\374\177\000\000\315\336\347\240\373U\000\000 
_}n\374\177\000\000H'\001\241<", '\000' <repeats 11 times>, "J"...
        i = 0
        j = 0
        l = 0
        __func__ = "udp_rcv_loop"
#25 0x000055fba0c4109b in main_loop () at main.c:1722
        i = 11
        pid = 0
        si = 0x7f3a11892470
        si_desc = "udp receiver child=11 
sock=aa.bb.cc.dd:5060\000\000\002\000\000\000I\000\000\000\000\244\066\246\324.\301\351\000\000\000\000\000\000\000\000\352\004\000\000\000\000\000\000\020\374
 \373U", '\000' <repeats 26 times>, "\060b}n\374\177\000\000sOߠ\373U\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#26 0x000055fba0c4e20c in main (argc=10, argv=0x7ffc6e7d6788) at main.c:3078
        cfg_stream = 0x55fba28dc2a0
        c = -1
        r = 0
        tmp = 0x7ffc6e7d6e51 ""
        tmp_len = 316488736
        port = 32570
        proto = 316400256
        ahost = 0x0
        aport = 0
        options = 0x55fba1089258 
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 3674059014
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0x0
        st = {st_dev = 23, st_ino = 1615, st_nlink = 2, st_mode = 16888, st_uid 
= 5061, st_gid = 5061, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 
4096, st_blocks = 0, st_atim = {tv_sec = 1722351337, tv_nsec = 496334843},
          st_mtim = {tv_sec = 1722351337, tv_nsec = 496334843}, st_ctim = 
{tv_sec = 1722351337, tv_nsec = 496334843}, __glibc_reserved = {0, 0, 0}}
        tbuf = '\000' <repeats 20 times>, " ", '\000' <repeats 35 times>, 
"\006\000\000\000\000\000\000\200", '\000' <repeats 56 times>, 
"\006\000\000\000\000\000\000\200", '\000' <repeats 168 times>...
        option_index = 12
        long_options = {{name = 0x55fba108b6c6 "help", has_arg = 0, flag = 0x0, 
val = 104}, {name = 0x55fba108650c "version", has_arg = 0, flag = 0x0, val = 
118}, {name = 0x55fba108b6cb "alias", has_arg = 1, flag = 0x0, val = 1024}, {
            name = 0x55fba108b6d1 "subst", has_arg = 1, flag = 0x0, val = 
1025}, {name = 0x55fba108b6d7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, 
{name = 0x55fba108b6e0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
            name = 0x55fba108b6ea "server-id", has_arg = 1, flag = 0x0, val = 
1028}, {name = 0x55fba108b6f4 "loadmodule", has_arg = 1, flag = 0x0, val = 
1029}, {name = 0x55fba108b6ff "modparam", has_arg = 1, flag = 0x0, val = 1030}, 
{
            name = 0x55fba108b708 "log-engine", has_arg = 1, flag = 0x0, val = 
1031}, {name = 0x55fba108b713 "debug", has_arg = 1, flag = 0x0, val = 1032}, 
{name = 0x55fba108b719 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {
            name = 0x55fba108b723 "atexit", has_arg = 1, flag = 0x0, val = 
1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"

```

#### Log Messages

<!--
Check the syslog file and if there are relevant log messages printed by 
Kamailio, add them next, or attach to issue, or provide a link to download them 
(e.g., to a pastebin site).
-->

```
Aug 30 09:18:53 proxy-kamailio[1276]: ALERT: <core> [main.c:774]: 
handle_sigs(): child process 1512 exited by a signal 11
Aug 30 09:18:53 proxy-kamailio[1276]: ALERT: <core> [main.c:777]: 
handle_sigs(): core was generated

```

#### SIP Traffic

<!--
If the issue is exposed by processing specific SIP messages, grab them with 
ngrep or save in a pcap file, then add them next, or attach to issue, or 
provide a link to download them (e.g., to a pastebin site).
-->
Full SIP trace is not available. I gathered following SIP message from core 
dump.

```
ACK sip:49xxxxxxx...@sip.proxy.de:5060 SIP/2.0
Max-Forwards: 19
Record-Route: <sip:aa.bb.cc.dd;lr=on;ftag=2041847FA948DA9D>
Via: SIP/2.0/UDP 
aa.bb.cc.dd;branch=z9hG4bKebee.750c2ac00d1232a60e4be6125f6753a4.0
Via: SIP/2.0/UDP 
ab.bc.cd.da:5060;received=ab.bc.cd.da;rport=5060;branch=z9hG4bK1086835C2F91ECAC
From: <sip:49xxxxxxx...@sip.proxy.de>;tag=2041847FA948DA9D
To: <sip:49yyyyyyy...@sip.proxy.de>;tag=8e46bdec-8fb1-4814-b516-575f5cd3315c
Call-ID: 19c4ed5e65885...@ab.bc.cd.da
CSeq: 9 ACK
User-Agent: AVM FRITZ!Box 7590 (UI) 154.07.59 (May  8 2024)
Content-Length: 0


```

### Possible Solutions

<!--
If you found a solution or workaround for the issue, describe it. Ideally, 
provide a pull request with a fix.
-->
For the moment we have no solution except may be to remove the siptrace module 
and relevant config. However, we can not do that either as sip trace is 
required for many other reasons.

### Additional Information

  * **Kamailio Version** - output of `kamailio -v`

```
version: kamailio 5.6.4 (x86_64/linux) 
flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, 
USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, 
DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, 
USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, 
TLS_PTHREAD_MUTEX_SHARED
ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, 
BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id:  
compiled with gcc 10.2.1

```

* **Operating System**:

<!--
Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 
16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...;
Kernel details (output of `lsb_release -a` and `uname -a`)
-->

```
Linux sip-proxy 5.10.0-31-amd64 #1 SMP Debian 5.10.221-1 (2024-07-14) x86_64 
GNU/Linux
```


-- 
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/3970
You are receiving this because you are subscribed to this thread.

Message ID: <kamailio/kamailio/issues/3...@github.com>
_______________________________________________
Kamailio (SER) - Development Mailing List
To unsubscribe send an email to sr-dev-le...@lists.kamailio.org

Reply via email to