I've gone back to our old Vanilla configuration which we used for initial testing with Kamailio and have stripped a lot of it back for the purpose of this test. Unfortunately the problem is still present (using the same systemd script as above).
I've included the configuration and back trace below in-case there's anything which helps us. Thus far I've been using multiple Jitsi softphones on Windows XP VMs with large contact lists loaded via custom XML file, I will try to reproduce this on SIPp if I can reproduce then I'll look at creating a docker image.
/usr/local/kamailio/etc/kamailio/kamailio.cfg ``` #!KAMAILIO
####### Defined Values #########
#!define WITH_POSTGRES #!define WITH_AUTH #!define WITH_USRLOCDB #!define WITH_PRESENCE #!define WITH_MULTIDOMAIN #!define WITH_NAT #!define WITH_NATSIPPING #!define WITH_TLS
# *** Value defines - IDs used later in config #!ifdef WITH_POSTGRES # - database URL - used to connect to database server by modules such # as: auth_db, acc, usrloc, a.s.o. #!ifndef DBURL #!define DBURL "postgres://username:password@localhost/dbname" #!endif #!endif #!ifdef WITH_MULTIDOMAIN # - the value for 'use_domain' parameters #!define MULTIDOMAIN 1 #!else #!define MULTIDOMAIN 0 #!endif
# - flags # FLT_ - per transaction (message) flags # FLB_ - per branch flags #!define FLT_NATS 5 #!define FLT_DLG 9 #!define FLT_DLGINFO 10 #!define FLB_NATB 6 #!define FLB_NATSIPPING 7
####### Global Parameters #########
### LOG Levels: 3=DBG, 2=INFO, 1=NOTICE, 0=WARN, -1=ERR #!ifdef WITH_DEBUG debug=4 log_stderror=no #!else debug=2 log_stderror=no #!endif
memdbg=5 memlog=5
log_facility=LOG_LOCAL0 log_prefix="{$mt $hdr(CSeq) $ci} "
children=8
listen=udp:77.77.77.77:5060 advertise 77.77.77.77:5060 listen=tcp:77.77.77.77:5060 advertise 77.77.77.77:5060 listen=tls:77.77.77.77:5061 advertise 77.77.77.77:5061
#!ifdef WITH_TLS enable_tls=yes #!endif
/* life time of TCP connection when there is no traffic * - a bit higher than registration expires to cope with UA behind NAT */ tcp_connection_lifetime=3605
tcp_accept_no_cl=yes tcp_rd_buf_size=16384
####### Modules Section ########
/* set paths to location of modules */ mpath="/usr/local/kamailio/lib64/kamailio/modules/"
#!ifdef WITH_POSTGRES loadmodule "db_postgres.so" #!endif
loadmodule "kex.so" loadmodule "corex.so" loadmodule "tm.so" loadmodule "tmx.so" loadmodule "sl.so" loadmodule "rr.so" loadmodule "pv.so" loadmodule "maxfwd.so" loadmodule "usrloc.so" loadmodule "registrar.so" loadmodule "textops.so" loadmodule "siputils.so" loadmodule "xlog.so" loadmodule "sanity.so" loadmodule "ctl.so" loadmodule "cfg_rpc.so" loadmodule "acc.so" loadmodule "counters.so" loadmodule "regex.so"
#!ifdef WITH_AUTH loadmodule "auth.so" loadmodule "auth_db.so" #!endif
#!ifdef WITH_MULTIDOMAIN loadmodule "domain.so" #!endif
#!ifdef WITH_PRESENCE loadmodule "presence.so" loadmodule "presence_xml.so" loadmodule "presence_dialoginfo.so" loadmodule "presence_mwi.so" loadmodule "pua.so" loadmodule "pua_dialoginfo.so" loadmodule "dialog.so" #!endif
#!ifdef WITH_NAT loadmodule "nathelper.so" #!endif
#!ifdef WITH_TLS loadmodule "tls.so" #!endif
#!ifdef WITH_DEBUG loadmodule "debugger.so" #!endif
# ----------------- setting module-specific parameters ---------------
# ----- ctl params ----- # modparam("ctl", "binrpc", "unix:/var/run/kamailio/kamailio_ctl")
# ----- tm params ----- modparam("tm", "failure_reply_mode", 3) modparam("tm", "fr_timer", 30000) modparam("tm", "fr_inv_timer", 120000)
# ----- rr params ----- # set next param to 1 to add value to ;lr param (helps with some UAs) modparam("rr", "enable_full_lr", 0) # do not append from tag to the RR (no need for this script) modparam("rr", "append_fromtag", 0)
# ----- registrar params ----- modparam("registrar", "method_filtering", 1) modparam("registrar", "append_branches", 1) modparam("registrar", "max_contacts", 30) modparam("registrar", "default_expires", 900) modparam("registrar", "default_expires_range", 40) modparam("registrar", "expires_range", 40) modparam("registrar", "min_expires", 500) modparam("registrar", "max_expires", 1300) modparam("registrar", "gruu_enabled", 0)
# ----- usrloc params ----- /* enable DB persistency for location entries */ #!ifdef WITH_USRLOCDB modparam("usrloc", "db_url", DBURL) modparam("usrloc", "db_mode", 2) modparam("usrloc", "use_domain", MULTIDOMAIN) #!endif
# ----- auth_db params ----- #!ifdef WITH_AUTH modparam("auth_db", "db_url", DBURL) modparam("auth_db", "calculate_ha1", 0) modparam("auth_db", "password_column", "ha1") modparam("auth_db", "load_credentials", "") modparam("auth_db", "use_domain", MULTIDOMAIN) modparam("auth", "nonce_count", 1) # enable nonce_count support modparam("auth", "qop", "auth") # enable qop=auth modparam("auth", "algorithm", "MD5") modparam("auth", "nonce_expire", 60) modparam("auth", "nonce_auth_max_drift", 2) #!endif
# ----- domain params ----- #!ifdef WITH_MULTIDOMAIN modparam("domain", "db_url", DBURL) modparam("domain", "register_myself", 1) #!endif
#!ifdef WITH_PRESENCE # ----- presence params ----- modparam("presence", "db_url", DBURL) modparam("presence", "server_address", "sip:77.77.77.77:5060" ) modparam("presence", "send_fast_notify", 0) modparam("presence", "db_update_period", 20) modparam("presence", "clean_period", 40) modparam("presence", "subs_db_mode", 2) modparam("presence", "fetch_rows", 1000)
# ----- presence_xml params ----- modparam("presence_xml", "db_url", DBURL) modparam("presence_xml", "force_active", 1)
# ----- presence_dialoginfo params ----- modparam("presence_dialoginfo", "force_single_dialog", 0) modparam("presence_dialoginfo", "force_dummy_dialog", 1)
# ----- pua params ----- modparam("pua", "db_url", DBURL) modparam("pua", "db_mode", 2) modparam("pua", "update_period", 60) modparam("pua", "dlginfo_increase_version", 0) modparam("pua", "reginfo_increase_version", 0) modparam("pua", "check_remote_contact", 1) modparam("pua", "fetch_rows", 1000)
# ----- pua_dialoginfo params ----- modparam("pua_dialoginfo", "include_callid", 1) modparam("pua_dialoginfo", "send_publish_flag", FLT_DLGINFO) modparam("pua_dialoginfo", "caller_confirmed", 0) modparam("pua_dialoginfo", "include_tags", 1) modparam("pua_dialoginfo", "override_lifetime", 124)
# ----- dialog params ----- modparam("dialog", "db_url", DBURL) modparam("dialog", "enable_stats", 1) modparam("dialog", "db_mode", 1) modparam("dialog", "dlg_flag", FLT_DLG) #!endif
#!ifdef WITH_NAT # ----- nathelper params ----- modparam("nathelper", "natping_interval", 30) modparam("nathelper", "ping_nated_only", 1) modparam("nathelper", "sipping_bflag", FLB_NATSIPPING) modparam("nathelper", "sipping_from", "sip:pinger@kamailio.org")
# params needed for NAT traversal in other modules modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)") modparam("usrloc", "nat_bflag", FLB_NATB) #!endif
#!ifdef WITH_TLS # ----- tls params ----- modparam("tls", "config", "/usr/local/kamailio/etc/kamailio/tls.cfg") #!endif
#!ifdef WITH_DEBUG # ----- debugger params ----- modparam("debugger", "cfgtrace", 1) modparam("debugger", "log_level_name", "exec") #!endif
####### Routing Logic ########
request_route {
# NAT detection route(NATDETECT);
# CANCEL processing if (is_method("CANCEL")) { if (t_check_trans()) { route(RELAY); } exit; }
# handle requests within SIP dialogs route(WITHINDLG);
### only initial requests (no To tag) # handle retransmissions if (!is_method("ACK")) { if(t_precheck_trans()) { t_check_trans(); exit; } t_check_trans(); } # authentication route(AUTH);
# record routing for dialog forming requests (in case they are routed) # - remove preloaded route headers remove_hf("Route"); if (is_method("INVITE|SUBSCRIBE")) { record_route(); } # handle presence related requests route(PRESENCE);
# handle registrations route(REGISTRAR);
if ($rU==$null) { # request with no Username in RURI sl_send_reply("484","Address Incomplete"); exit; } # user location service route(LOCATION); route(RELAY); }
# Wrapper for relaying requests route[RELAY] {
# enable additional event routes for forwarded requests # - serial forking, RTP relaying handling, a.s.o. if (is_method("INVITE|BYE|SUBSCRIBE|UPDATE")) { if(!t_is_set("branch_route")) t_on_branch("MANAGE_BRANCH"); } if (is_method("INVITE|SUBSCRIBE|UPDATE")) { if(!t_is_set("onreply_route")) t_on_reply("MANAGE_REPLY"); } if (is_method("INVITE")) { if(!t_is_set("failure_route")) t_on_failure("MANAGE_FAILURE"); } if(is_method("INVITE|BYE|UPDATE|CANCEL|ACK")) { setflag(FLT_DLGINFO); dlg_manage(); }
if (!t_relay()) { sl_reply_error(); } exit; }
# Handle requests within SIP dialogs route[WITHINDLG] { if (!has_totag()) return;
# sequential request withing a dialog should # take the path determined by record-routing if (loose_route()) { route(DLGURI); if ( is_method("ACK") ) { # ACK is forwarded statelessly route(NATMANAGE); } else if ( is_method("NOTIFY") ) { # Add Record-Route for in-dialog NOTIFY as per RFC 6665. record_route(); } route(RELAY); exit; } else { if (is_method("SUBSCRIBE") && uri == myself) { # in-dialog subscribe requests route(PRESENCE); exit; } if ( is_method("ACK") ) { if ( t_check_trans() ) { # no loose-route, but stateful ACK; # must be an ACK after a 487 # or e.g. 404 from upstream server route(RELAY); exit; } else { # ACK without matching transaction ... ignore and discard exit; } sl_send_reply("404","Not here"); } exit; } }
# Handle SIP registrations route[REGISTRAR] { if (is_method("REGISTER")) { if(isflagset(FLT_NATS)) { setbflag(FLB_NATB); #!ifdef WITH_NATSIPPING # do SIP NAT pinging setbflag(FLB_NATSIPPING); #!endif } if (!save("location")) { sl_reply_error(); } exit; } }
# User location service route[LOCATION] { if (is_method("MESSAGE|SUBSCRIBE|NOTIFY|PUBLISH")) { $avp(oexten) = $rU; if (!lookup("location")) { $var(rc) = $rc; t_newtran(); switch ($var(rc)) { case -1: send_reply("410", "USER_NOT_REGISTERED"); exit; case -3: send_reply("404", "User Not Found"); exit; case -2: send_reply("405", "Method Not Allowed"); exit; } } route(RELAY); } exit; }
# Presence server processing route[PRESENCE] { if(!is_method("PUBLISH|SUBSCRIBE")) return;
if(is_method("SUBSCRIBE") && $hdr(Event)=="message-summary") { # returns here if no voicemail server is configured sl_send_reply("404", "No voicemail service"); exit; }
#!ifdef WITH_PRESENCE if (!t_newtran()) { sl_reply_error(); exit; }
if(is_method("PUBLISH")) { handle_publish(); t_release(); } else if(is_method("SUBSCRIBE")) { handle_subscribe(); t_release(); } exit; #!endif
# if presence enabled, this part will not be executed if (is_method("PUBLISH") || $rU==$null) { sl_send_reply("404", "Not here"); exit; } return; }
# IP authorization and user authentication route[AUTH] { #!ifdef WITH_AUTH if (is_method("REGISTER")) { # authenticate requests if ($adu==$null || $au==$null || $fd==$null) { if (is_method("REGISTER")) { xlog("L_INFO", "$ci|user [$Au] from ip $si issued authentication challenge"); } auth_challenge("$fd", "0"); exit; } if (!auth_check("$fd", "subscriber", "1")) { xlog("L_INFO", "$ci|auth_check|user [$au@$fd] from ip $si authentication failed - issued authentication challenge"); auth_challenge("$fd", "0"); exit; } consume_credentials(); }
#!endif return; }
# Caller NAT detection route[NATDETECT] { #!ifdef WITH_NAT force_rport(); if (nat_uac_test("19")) { if (is_method("REGISTER")) { fix_nated_register(); } setflag(FLT_NATS); } #!endif return; }
# NAT traversal route[NATMANAGE] { #!ifdef WITH_NAT if (is_request()) { if (has_totag()) { if (check_route_param("nat=yes")) { setbflag(FLB_NATB); } } } if (!(isflagset(FLT_NATS) || isbflagset(FLB_NATB))) return;
if (is_request()) { if (!has_totag()) { if (t_is_branch_route()) { add_rr_param(";nat=yes"); } } } if (is_reply()) { if (isbflagset(FLB_NATB)) { if(is_first_hop()) set_contact_alias(); } } #!endif return; }
# URI update for dialog requests route[DLGURI] { #!ifdef WITH_NAT if(!isdsturiset()) { handle_ruri_alias(); } #!endif return; }
# Manage outgoing branches branch_route[MANAGE_BRANCH] { xdbg("new branch [$T_branch_idx] to $ru\n"); route(NATMANAGE); }
# Manage incoming replies onreply_route[MANAGE_REPLY] { xdbg("incoming reply\n"); if(status=~"[12][0-9][0-9]") { route(NATMANAGE); } }
# Manage failure routing cases failure_route[MANAGE_FAILURE] { route(NATMANAGE);
if (t_is_canceled()) { exit; } } ```
/usr/local/kamailio/etc/kamailio/kamctlrc ``` # The Kamailio configuration file for the control tools. # # Here you can set variables used in the kamctl and kamdbctl setup # scripts. Per default all variables here are commented out, the control tools # will use their internal default values.
## your SIP domain # SIP_DOMAIN=kamailio.org
## chrooted directory # $CHROOT_DIR="/path/to/chrooted/directory"
## database type: MYSQL, PGSQL, ORACLE, DB_BERKELEY, DBTEXT, or SQLITE # by default none is loaded # # If you want to setup a database with kamdbctl, you must at least specify # this parameter. DBENGINE=PGSQL
## database host DBHOST=localhost
## database host DBPORT=5432
## database name (for ORACLE this is TNS name) DBNAME=dbname
# database path used by dbtext, db_berkeley or sqlite # DB_PATH="/usr/local/etc/kamailio/dbtext"
## database read/write user DBRWUSER="username"
## password for database read/write user DBRWPW="password"
## database read only user DBROUSER="rousername"
## password for database read only user DBROPW="ropassword"
## database access host (from where is kamctl used) # DBACCESSHOST=192.168.0.1
## database super user (for ORACLE this is 'scheme-creator' user) DBROOTUSER="rootuser"
## password for database super user ## - important: this is insecure, targeting the use only for automatic testing ## - known to work for: mysql # DBROOTPW=""
## database character set (used by MySQL when creating database) #CHARSET="latin1"
## user name column # USERCOL="username"
# SQL definitions # If you change this definitions here, then you must change them # in db/schema/entities.xml too. # FIXME
# FOREVER="2030-05-28 21:32:15" # DEFAULT_Q="1.0"
# Program to calculate a message-digest fingerprint # MD5="md5sum"
# awk tool # AWK="awk"
# gdb tool # GDB="gdb"
# If you use a system with a grep and egrep that is not 100% gnu grep compatible, # e.g. solaris, install the gnu grep (ggrep) and specify this below. # # grep tool # GREP="grep"
# egrep tool # EGREP="egrep"
# sed tool # SED="sed"
# tail tool # LAST_LINE="tail -n 1"
# expr tool # EXPR="expr"
# Describe what additional tables to install. Valid values for the variables # below are yes/no/ask. With ask (default) it will interactively ask the user # for an answer, while yes/no allow for automated, unassisted installs. #
# If to install tables for the modules in the EXTRA_MODULES variable. INSTALL_EXTRA_TABLES=yes
# If to install presence related tables. INSTALL_PRESENCE_TABLES=yes
# If to install uid modules related tables. INSTALL_DBUID_TABLES=yes
# Define what module tables should be installed. # If you use the postgres database and want to change the installed tables, then you # must also adjust the STANDARD_TABLES or EXTRA_TABLES variable accordingly in the # kamdbctl.base script.
# Kamailio standard modules # STANDARD_MODULES="standard acc lcr domain group permissions registrar usrloc msilo # alias_db uri_db speeddial avpops auth_db pdt dialog dispatcher # dialplan"
# Kamailio extra modules # EXTRA_MODULES="imc cpl siptrace domainpolicy carrierroute userblacklist htable purple sca"
## type of aliases used: DB - database aliases; UL - usrloc aliases ## - default: none # ALIASES_TYPE="DB"
## control engine: RPCFIFO ## - default RPCFIFO # CTLENGINE="RPCFIFO"
## path to FIFO file for engine RPCFIFO # RPCFIFOPATH="/var/run/kamailio/kamailio_rpc_fifo"
## check ACL names; default on (1); off (0) # VERIFY_ACL=1
## ACL names - if VERIFY_ACL is set, only the ACL names from below list ## are accepted # ACL_GROUPS="local ld int voicemail free-pstn"
## check if user exists (used by some commands such as acl); ## - default on (1); off (0) # VERIFY_USER=1
## verbose - debug purposes - default '0' # VERBOSE=1
## do (1) or don't (0) store plaintext passwords ## in the subscriber table - default '1' # STORE_PLAINTEXT_PW=0
## Kamailio START Options ## PID file path - default is: /var/run/kamailio/kamailio.pid # PID_FILE=/var/run/kamailio/kamailio.pid
## Extra start options - default is: not set # example: start Kamailio with 64MB share memory: STARTOPTIONS="-m 64" # STARTOPTIONS= ```
/usr/local/kamailio/etc/kamailio/tls.cfg ``` [server:default] method = TLSv1.2 verify_certificate = no require_certificate = no private_key = /usr/local/kamailio/etc/kamailio/tls/key.pem certificate = /usr/local/kamailio/etc/kamailio/tls/cert.pem #ca_list = /usr/ssl/certs/tls/cacert.pem #crl = /usr/ssl/certs/tls/crl.pem
[server:77.77.77.77:5061] method = TLSv1.2 verify_certificate = no require_certificate = no private_key = /usr/local/kamailio/etc/kamailio/tls/key.pem certificate = /usr/local/kamailio/etc/kamailio/tls/cert.pem #ca_list = /usr/ssl/certs/tls/cacert.pem #crl = /usr/ssl/certs/tls/crl.pem
[client:default] verify_certificate = no require_certificate = no ```
gdb backtrace ``` #0 aesni_ecb_encrypt () at crypto/aes/aesni-x86_64.s:624 624 movups (%rcx),%xmm1
(gdb) bt full #0 aesni_ecb_encrypt () at crypto/aes/aesni-x86_64.s:624 No locals. #1 0x00007f7415e3e240 in aesni_ecb_cipher (ctx=0x7f73cb204720, out=0x7f73cb204618 "Ж\020?\223L\263\237\020\230\223\307"\026\271\224u\222\347bX\355\371yx+\240 \fbCD\313Mh\005\264\\356\304B\222"|\204\226S\243RBO\271", in=0x7f73cb204638 "\313Mh\005\264\\35 at crypto/evp/e_aes.c:319 bl = 16 #2 0x00007f7415e53526 in evp_EncryptDecryptUpdate (ctx=0x7f73cb204720, out=0x7f73cb204618 "Ж\020?\223L\263\237\020\230\223\307"\026\271\224u\222\347bX\355\371yx+\240 \fbCD\313Mh\005\264\\356\304B\222"|\204\226S\243RBO\271", outl=0x7ffd3f1e72e4, in=0x7f73cb204638 "\313Mh\005\264\\356\304B\222"|\204\226S\243RBO\271", inl=16) at crypto/evp/evp_enc.c:333 i = 32627 j = -887077320 bl = 16 cmpl = 16 #3 0x00007f7415e53771 in EVP_EncryptUpdate (ctx=0x7f73cb204720, out=0x7f73cb204618 "Ж\020?\223L\263\237\020\230\223\307"\026\271\224u\222\347bX\355\371yx+\240 \fbCD\313Mh\005\264\\356\304B\222"|\204\226S\243RBO\271", outl=0x7ffd3f1e72e4, in=0x7f73cb204638 "\313Mh\005\264\\356\304B\222"|\204\226S\243RBO\271", inl=16) at crypto/evp/evp_enc.c:385 No locals. #4 0x00007f7415e5315f in EVP_CipherUpdate (ctx=0x7f73cb204720, out=0x7f73cb204618 "Ж\020?\223L\263\237\020\230\223\307"\026\271\224u\222\347bX\355\371yx+\240 \fbCD\313Mh\005\264\\356\304B\222"|\204\226S\243RBO\271", outl=0x7ffd3f1e72e4, in=0x7f73cb204638 inl=16) at crypto/evp/evp_enc.c:213 No locals. #5 0x00007f7415e95be4 in ctr_update (drbg=0x7f73cb204550, in1=0x0, in1len=0, in2=0x0, in2len=0, nonce=0x0, noncelen=0) at crypto/rand/drbg_ctr.c:238 ctr = 0x7f73cb2045f8 outlen = 16 #6 0x00007f7415e960d2 in drbg_ctr_generate (drbg=0x7f73cb204550, out=0x7f73cb437118 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@d adin=0x0, adinlen=0) at crypto/rand/drbg_ctr.c:349 ctr = 0x7f73cb2045f8 #7 0x00007f7415e97591 in RAND_DRBG_generate (drbg=0x7f73cb204550, out=0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co"..., at crypto/rand/drbg_lib.c:638 reseed_required = 0 #8 0x00007f7415e976bf in RAND_DRBG_bytes (drbg=0x7f73cb204550, out=0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co"..., additional = 0x0 additional_len = 0 chunk = 16 ret = 0 #9 0x00007f7415e97c38 in drbg_bytes (out=0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip at crypto/rand/drbg_lib.c:968 ret = 0 drbg = 0x7f73cb204550 #10 0x00007f7415e991ab in RAND_bytes (buf=0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip at crypto/rand/rand_lib.c:836 meth = 0x7f74161e0920 <rand_meth> #11 0x00007f7416216bb5 in tls1_enc (s=0x7f73cb42c0d8, recs=0x7ffd3f1e7950, n_recs=1, sending=1) at ssl/record/ssl3_record.c:985 ivlen = 16 ds = 0x7f73cb421e90 reclen = {268435456, 140135310032568, 5353928608, 140135301826248, 140725662414752, 94300525191679, 94300526514899, 140135301826248, 268435456, 4294967302, 140725662414832, 94300525248992, 140136384421760, 1258616618670, 140136384429104, 140136384421 140135310032624, 140725662414880, 140136384134830, 140136564594272, 140136564594272, 140136564594288, 140725662417744, 140725662414944, 140136564180399, 140725662414960, 140725662415048, 490, 140725662417744} buf = {"\000\000\000\000\000\000\001\316\027\003\003", <incomplete sequence \352>, "U\000\000\204\337i\vt\177\000\000(", "\000\000\000\000\000\000xXB\313s\177", "\000\000\060\337\312s\177\000\000\250v\036?", "\375\177\000\000\000\000\000\000@Gx\372", "\001\000\000C\001\000\000\204\337i\v\035", "\000\000@v\036?\375\177\000\000\023pN", "\r\304U\000\000\270\376_\313s\177\000", "\000\060\337\312s\177\000\000xXB\313s", "\177\000\000\340\062\337\312s\177\000\000Ӓ", "b\r\006\000\000\000\340\062\337\31 "\304U\000\000\200\001\000\000%\001\000\000[", "4f\r\304U\000\000\204\337i\vt\177", "\000\000(\000\000\000\000\000\000\000(\376_", "\313s\177\000\000\000\060\337\312s\177\000", "Hw\036?\375\177\000\000G4f", <incomplete sequence \304>, "U\000\000\20 "f\r\304U\000\000\204\337i\vt\177", "\000(\000\000\000\000\000\000\000\270\376", <incomplete sequence \313>, "s\177\000\000\000\060\337\312s\177\000\000\300", "\221\220\313s\177\000\000\313)\000\000\000", "\000\000\270\376_\313\004\000\000\000\360# ")\214N\r\304U\000\000\240w\036", <incomplete sequence \375>, "\177\000\000ٌN\r\304U\000\000\001", "\000\000\000\000\000\000\001\000\000\000\030\000", "\000\200\337i\vt\177\000\000(\376", <incomplete sequence \313>, "%\001\000\000\060\374i\vt\177\00 "\000\000\000\060\337\312s\177\000\000\001\000", "\000\000\000\000\000\001\000\000\000\006\000\000"} i = 32765 pad = 0 ret = 32628 tmpr = 1 bs = 140136564594288 mac_size = 0 ctr = 0 padnum = 140136564594272 loop = 140136564594536 padval = 0 '\000' imac_size = 43 enc = 0x7f74161e05c0 <aesni_128_cbc_hmac_sha1_cipher> #12 0x00007f741621228f in do_ssl3_write (s=0x7f73cb42c0d8, type=23, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427 pipelens=0x7ffd3f1e8a60, numpipes=1, create_empty_fragment=0, written=0x7ffd3f1e8b70) at ssl/record/rec_layer_s3.c:1003 pkt = {{buf = 0x0, staticbuf = 0x7f73cb437100 "", curr = 514, written = 514, maxsize = 16472, subs = 0x7f73cb5ffef0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0} <repeats 12 times>, {buf = 0x0, staticbuf = 0x0, curr = buf = 0x6b, staticbuf = 0x6b <error: Cannot access memory at address 0x6b>, curr = 16472, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x1}, {buf = 0x0, s curr = 140725662420336, written = 140136848320405, maxsize = 140725662420360, subs = 0xc}, {buf = 0x7f7427106798, staticbuf = 0x7ffd3f1e8db0 "\247\234j\vt\177", curr = 140725662420384, written = 140136384414731, maxsize = 140725662420760, subs = staticbuf = 0x7f7426fea4b9 <_IO_vfprintf_internal+1929> "H\213\225h\373\377\377H\211\321L)\371H9\310\017\205p\371\377\377D\213\215H\373\377\377\271\377\377\377\177D)\311Hc\311H9\310\017\217\307\025", curr = 140725662420275, written = 34359738468, buf = 0x7ffd3f1e8908, staticbuf = 0xffffffff00000010 <error: Cannot access memory at address 0xffffffff00000010>, curr = 140725662420316, written = 120, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0xffffffffffffffff <error: Cannot access me curr = 140724603453441, written = 0, maxsize = 0, subs = 0x55c40efdef20}, {buf = 0x7ffd0000000c, staticbuf = 0x7f740000000a "", curr = 140725662419328, written = 0, maxsize = 3432, subs = 0x16}, {buf = 0x7f740b69c413, staticbuf = 0x7300000001 <er curr = 140725662420504, written = 140136384414741, maxsize = 140725662419384, subs = 0x300000000a}, {buf = 0x7ffd3f1e8e13, staticbuf = 0x3f1e8d64 <error: Cannot access memory at address 0x3f1e8d64>, curr = 0, written = 0, maxsize = 3311419785216, wr = {{rec_version = 771, type = 23, length = 506, orig_len = 0, off = 0, data = 0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co input = 0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co seq_num = "\000\000\000\000\000\000\000"}, {rec_version = 0, type = 0, length = 0, orig_len = 0, off = 0, data = 0x0, input = 0x0, comp = 0x0, read = 0, epoch = 0, seq_num = "\000\000\000\000\000\000\000"} <repeats 31 times>} thispkt = 0x7ffd3f1e8350 thiswr = 0x7ffd3f1e7950 recordstart = 0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co i = 32628 mac_size = 0 clear = 0 prefix_len = 0 eivlen = 16 align = 3 wb = 0x7f73cb42c930 sess = 0x7f73cb4233e8 totlen = 490 len = 506 wpinited = 1 j = 1 #13 0x00007f74162110ac in ssl3_write_bytes (s=0x7f73cb42c0d8, type=23, buf_=0x7f7416ec4578, len=490, written=0x7ffd3f1e8cb0) at ssl/record/rec_layer_s3.c:613 pipelens = {490, 140136384324723, 140725662419768, 21699638343, 140135318380515, 140135312190408, 140136384421764, 72, 140135312195280, 3403624448, 140135309483320, 2, 94300526514899, 1073741824, 268435456, 6, 140725662419744, 140136559316112, 140725 140136384421764, 18446744072840031672, 140725662419808, 140136559311077, 140725662419856, 5, 140135318380515, 140135312190408, 1258425418112, 18446744069639386183} tmppipelen = 490 remain = 0 numpipes = 1 j = 1 buf = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co;tag=0b62483f"... tot = 0 n = 490 max_send_fragment = 16384 split_send_fragment = 16384 maxpipes = 1 nw = 140135301826248 wb = 0x7f73cb42c930 i = 1 tmpwrit = 490 #14 0x00007f741621f8c0 in ssl3_write (s=0x7f73cb42c0d8, buf=0x7f7416ec4578, len=490, written=0x7ffd3f1e8cb0) at ssl/s3_lib.c:4460 No locals. #15 0x00007f741622e4db in ssl_write_internal (s=0x7f73cb42c0d8, buf=0x7f7416ec4578, num=490, written=0x7ffd3f1e8cb0) at ssl/ssl_lib.c:1943 No locals. #16 0x00007f741622e538 in SSL_write (s=0x7f73cb42c0d8, buf=0x7f7416ec4578, num=490) at ssl/ssl_lib.c:1957 ret = 0 written = 268435456 #17 0x00007f740b67ea3d in tls_encode_f (c=0x7f73cb427d78, pbuf=0x7ffd3f1e8e60, plen=0x7ffd3f1e8e58, rest_buf=0x7ffd3f1e8e68, rest_len=0x7ffd3f1e8e5c, send_flags=0x7ffd3f1e8e4c) at tls_server.c:828 n = 0 offs = 0 ssl = 0x7f73cb42c0d8 tls_c = 0x7f73cb4189f0 wr_buf = "\027\003\003\002\020\060\n\021\334\364\020\230'W\227\265\214=\323\372\254FV\205\253\364\343g[_V.\340\vb\236ϛ\025\f\345\242\303^f9\366z\234\070\062\326&>g"\214\\275\221\244\065*-h\236\277\022\067\021\241\017\253\vO\377\234\204%L\236\202\07\225r\020b\342\257\232\274\066'\201l\210\365bD\213\205\347p\231\v\205p\206H\337C\375]3u&j\024\212\244\230{\265k\202\004\022>\t\355>\020wH\367\321v\n\027\331sP\244 \232o0\322P\026\375\206\035\366\233\301d\016\250\034\253w\376b\224\264\266\005\207j\320\n?&\035 rd = {buf = 0x0, pos = 0, used = 0, size = 0} wr = { buf = 0x7f740b8baf60 <wr_buf> "\027\003\003\002\020\060\n\021\334\364\020\230'W\227\265\214=\323\372\254FV\205\253\364\343g[_V.\340\vb\236ϛ\025\f\345\242\303^f9\366z\234\070\062\326&>g"\214\\275\221\244\065*-h\236\277\022\067\021\241\017\253\vO\30<!\214O;\316*^\346]"u\225r\020b\342\257\232\274\066'\201l\210\365bD\213\205\347p\231\v\205p\206H\337C\375]3u&j\024\212\244\230{\265k\202\004\022>\t\355>\020wH\367\321v\n\027\331sP\244 \232o0\322P\026\375\206\035\366\233\301d\016\250\034\253w\376b\224\264\2 size = 65536} ssl_error = 0 err_src = 0x7f740b6a9ca7 "TLS write:" buf = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co;tag=0b62483f"... len = 490 x = -884834952 __func__ = "tls_encode_f" #18 0x000055c40d3091e4 in tcpconn_send_put (c=0x7f73cb427d78, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co send_flags=...) at core/tcp_main.c:2530 tmp = 0x7f73cae7d328 fd = 10 response = {140725662420640, 0} n = 1 do_close_fd = 0 rest_buf = 0x0 t_buf = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co;tag=0b62483f"... rest_len = 0 t_len = 490 resp = 0 t_send_flags = {f = 0, blst_imask = 0} fd_cache_e = 0x0 use_fd_cache = 0 __func__ = "tcpconn_send_put" #19 0x000055c40d3068d7 in tcp_send (dst=0x7f73cb656648, from=0x0, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@d at core/tcp_main.c:2310 c = 0x7f73cb427d78 ip = {af = 2, len = 4, u = {addrl = {140134886250834, 140725662420944}, addr32 = {2988284242, 32627, 1058967504, 32765}, addr16 = {39250, 45597, 32627, 0, 36816, 16158, 32765, 0}, addr = "R\231\035\262s\177\000\000Џ\036?\375\177\000"}} port = 1795 fd = -879728160 response = {140725662421040, 4096} n = 32765 con_lifetime = 57680 rest_buf = 0x7f740b688bc5 <sbufq_add+503> "H\213E؋P\034\213E\360\001\302H\213E؉P\034\213E\360)E̋E\360H\001E\320H\213E؋P\024\213E\360\001\302H\213E؉P\024\203", <incomplete sequence \314> t_buf = 0x7ffd3f1e8fa0 "Џ\036?\375\177" rest_len = 32627 t_len = 3403859656 resp = 5353934752 t_send_flags = {f = 0, blst_imask = 0} __func__ = "tcp_send" #20 0x00007f741272e586 in msg_send_buffer (dst=0x7f73cb656648, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co at ../../core/forward.h:282 new_dst = {send_sock = 0x4cb450920, to = {s = {sa_family = 9200, sa_data = "f\r\304U\000\000\000\222\036?\375\177\000"}, sin = {sin_family = 9200, sin_port = 3430, sin_addr = {s_addr = 21956}, sin_zero = "\000\222\036?\375\177\000"}, sin6 = {sin6_fam sin6_addr = {__in6_u = {__u6_addr8 = "\000\222\036?\375\177\000\000)\214N\r\304U\000", __u6_addr16 = {37376, 16158, 32765, 0, 35881, 3406, 21956, 0}, __u6_addr32 = {1058968064, 32765, 223251497, 21956}}}, sin6_scope_id = 1058968064}}, id = 3276 blst_imask = 21956}} outb = {s = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co;tag=0b62483f"..., len = netinfo = {data = {s = 0x7f741278607b "tm: t_reply.c", len = 656}, rcv = 0x7f73cb450920, dst = 0x7f73cadf3000} evp = {data = 0x7ffd3f1e9120, rcv = 0x0, dst = 0x7f73cb656648} port = 1 ip = {af = 0, len = 0, u = {addrl = {0, 94300301950976}, addr32 = {0, 0, 0, 21956}, addr16 = {0, 0, 0, 0, 0, 0, 21956, 0}, addr = '\000' <repeats 12 times>, "\304U\000"}} from = 0x0 local_addr = {s = {sa_family = 44896, sa_data = "\213\vt\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 44896, sin_port = 2955, sin_addr = {s_addr = 32628}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 44896, sin6 __in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\000\000\001\000s\177\000", __u6_addr16 = {0, 0, 0, 0, 0, 1, 32627, 0}, __u6_addr32 = {0, 0, 65536, 32627}}}, sin6_scope_id = 223289055}} con = 0x0 wsev = {type = 1058968032, buf = 0x7f73cba68e00 "0", len = 0, id = 0} ret = 136 __func__ = "msg_send_buffer" #21 0x00007f7412730944 in send_pr_buffer (rb=0x7f73cb6565f8, buf=0x7f7416ec4578, len=490) at t_funcs.c:70 __func__ = "send_pr_buffer" #22 0x00007f74126e1fa2 in _reply_light (trans=0x7f73cb656528, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co code=202, to_tag=0x7f74129c5580 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-e0e2", to_tag_len=37, lock=1, bm=0x7ffd3f1e9bc0) at t_reply.c:555 rb = 0x7f73cb6565f8 buf_len = 650 cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}} onsend_params = {req = 0x3f1e9b20, rpl = 0xb00000000, param = 0x17, code = 223289055, flags = 3, branch = 0, t_rbuf = 0x7ffd3f1e9b40, dst = 0x7f73cb428150, send_buf = {s = 0x0, len = 0}} rt = 0 backup_rt = 0 ctx = {rec_lev = 384580232, run_flags = 32628, last_retcode = 383262736, jmp_env = {{__jmpbuf = {94300526491344, 94300526471530, 496, 140136576196624, 140725662423740, 502511173633, 94300301950980, 140136576196624}, __mask_was_saved = 16, __saved_mas 94300526514899, 1073741824, 268435456, 6, 140725662423936, 94300524000758, 140725662424000, 140725662424028, 140136577395672, 140136505081744, 140725662424288, 868642364120, 0}}}}} pmsg = {id = 1320704, pid = 0, tval = {tv_sec = 8, tv_usec = 10}, fwd_send_flags = {f = 35881, blst_imask = 3406}, rpl_send_flags = {f = 21956, blst_imask = 0}, first_line = {type = -27872, flags = 16158, len = 32765, u = {request = {method = { s = 0x55c40d342e90 <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 1058968520}, uri = {s = 0x55c40d663447 "core/mem/q_malloc.c", len = 2}, version = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 309961539}, method_va s = 0x55c40d342e90 <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 1058968520}, status = {s = 0x55c40d663447 "core/mem/q_malloc.c", len = 2}, reason = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 309961539}, statusc via2 = 0x7f74164c831b, headers = 0x7ffd3f1e9a38, last_header = 0x0, parsed_flag = 140136567046947, h_via1 = 0x7f7426fea4b9 <_IO_vfprintf_internal+1929>, h_via2 = 0x5, callid = 0x7f7426fe9e36 <_IO_vfprintf_internal+262>, to = 0x7ffd3f1e9900, cseq = maxforwards = 0x7ffd3f1e9450, route = 0x26fea4b9, record_route = 0x0, content_type = 0x0, content_length = 0x7ffd00000000, authorization = 0xffffffffffffffff, expires = 0x7ffd00000005, proxy_auth = 0x7f747fffffff, supported = 0x7f74164c8200, requir allow = 0x7ffd3f1e94a0, event = 0x0, accept = 0xd68, accept_language = 0x7f7400000005, organization = 0x7f74164c831b, priority = 0x3, subject = 0x7f74164c8341, user_agent = 0x7f74164c8324, server = 0x7ffd3f1e94e0, content_disposition = 0x7f74164c83 refer_to = 0x7f74164c8320, session_expires = 0x3, min_se = 0x0, sipifmatch = 0x3000000018, subscription_state = 0x7ffd3f1e9b10, date = 0x7ffd3f1e9a50, identity = 0x7ffd3f1e9b20, identity_info = 0x7ffd3f1e9a60, pai = 0x7f74164c8900, ppi = 0x30000000 min_expires = 0x7ffd3f1e9560, body = 0x0, eoh = 0xd68 <error: Cannot access memory at address 0xd68>, unparsed = 0xffffffff0000000d <error: Cannot access memory at address 0xffffffff0000000d>, rcv = {src_ip = {af = 3432, len = 0, u = {addrl = {0, 1 addr16 = {0, 0, 0, 0, 35179, 5708, 32628, 0}, addr = "\000\000\000\000\000\000\000\000k\211L\026t\177\000"}}, dst_ip = {af = 374114660, len = 0, u = {addrl = {0, 140136567048555}, addr32 = {0, 0, 374114667, 32628}, addr16 = {0, 0, 0, 0, 35179 addr = "\000\000\000\000\000\000\000\000k\211L\026t\177\000"}}, src_port = 38320, dst_port = 16158, proto_reserved1 = 32765, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = "\000\000`\211L\026t\177\000\000]\001\000"}, sin = {sin_ s_addr = 374114656}, sin_zero = "t\177\000\000]\001\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 374114656, sin6_addr = {__in6_u = {__u6_addr8 = "t\177\000\000]\001\000\000\375\177\000\000\200d|\017", __u6_addr16 = {32628, 349, 32765, 259810432}}}, sin6_scope_id = 32628}}, bind_address = 0x3000000018, proto = -48 '\320'}, buf = 0x3000000018 <error: Cannot access memory at address 0x3000000018>, len = 1058970592, new_uri = {s = 0x7ffd3f1e9b20 "\200\233\036 s = 0x40000000 <error: Cannot access memory at address 0x40000000>, len = 259810507}, parsed_uri_ok = 6, parsed_uri = {user = {s = 0x7ffd3f1e95e0 "\240\226\036?\375\177", len = 16}, passwd = {s = 0x7ffd3f1e9bb0 "\340\233\036?\375\177", len = 1058 s = 0xcc14cb48 <error: Cannot access memory at address 0xcc14cb48>, len = 1058969120}, port = {s = 0x74b8bdd5ffffffff <error: Cannot access memory at address 0x74b8bdd5ffffffff>, len = 1958263765}, params = {s = 0x55c40d94a540 <def_list+32> "", len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 38560, proto = 16158, type = 32765, flags = (unknown: 309365440), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 262147 s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -871052560}, maddr = {s = 0x400000002 <error: Cannot access memory at address 0x400000002>, len = 1082173632}, method = {s = 0x18 <error: Cannot access memory at addres s = 0x1 <error: Cannot access memory at address 0x1>, len = -871053112}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7f73cc14cae0 "", len = -871053112}, transport_val = {s = 0x7ffd3f1e96b0 "", len = 2}, ttl_val = {s = 0x55c40d6292d3 "INFO", len = 1073 s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, maddr_val = {s = 0x7ffd3f1e9700 "", len = 309366527}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 223289055}, lr_val = {s s = 0x7ffd3f1e9710 "", len = 383262736}, gr_val = {s = 0x7ffd3f1e9740 "\a", len = 383262736}}, parsed_orig_ruri_ok = 1058969424, parsed_orig_ruri = {user = {s = 0x7f7413117bfc <pkg_proc_update_stats+115> "H\213\rEW ", len = 268435456}, passwd = s = 0xfebdf70 <error: Cannot access memory at address 0xfebdf70>, len = 897120}, port = {s = 0x142090 <error: Cannot access memory at address 0x142090>, len = 1320704}, params = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 7}, s len = 1058969472}, headers = {s = 0x55c40d342e90 <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 0}, port_no = 9200, proto = 3430, type = URN_URI_T, flags = (unknown: 1058969648), transport = {s = 0xd4e8c29 <error: Cannot access memory s = 0x55c40d4e908d <qm_malloc+2331> "H\213E\270H\203\300\070\351*\003", len = 1058969648}, user_param = {s = 0x55c40d6292d3 "INFO", len = 374124632}, maddr = {s = 0x9110000000 <error: Cannot access memory at address 0x9110000000>, len = 3741328 len = 8}, lr = {s = 0x7f7416d82010 "\001", len = 384580024}, r2 = {s = 0x500000001 <error: Cannot access memory at address 0x500000001>, len = 251523161}, gr = {s = 0x7f7416ec2858 "(", len = 1058969680}, transport_val = {s = 0x7f7416d82010 "\00 s = 0x7ffd3f1e9eb0 "\360/\344\026t\177", len = 224563923}, user_param_val = {s = 0x7f74164cb058 "core", len = 268435456}, maddr_val = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 1058969872}, method_val = { s = 0x7f74164c14ce <db_str2val+14063> "H\213\205P\377\377\377H\213P\020\213\205X\377\377\377H\230H\001\320", <incomplete sequence \306>, len = 8}, lr_val = {s = 0x7f7416d82010 "\001", len = 1058969728}, r2_val = {s = 0x55c40efdf05a "", len = 38 s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 1058969904}}, add_rm = 0x55c40d4f1edf <qm_info+46>, body_lumps = 0x7ffd3f1e98c0, reply_lump = 0x55c40d4f1edf <qm_info+46>, add_to_branch_s = "И\036?\375\177\000\000\020 \330\026t\177\000\000\000\231\036?\375\177\000\000\020 \330\026t\177\000\000\020\231\036?\375\177\000\000\374{\021\023t\177\000\000\000\000\000\020\000\000\000\000\000", add_to_branch_len = 0, hash_inde xflags = {21956, 1058969888}, set_global_address = {s = 0x7f7416d82010 "\001", len = 1320704}, set_global_port = {s = 0x7f7416d82010 "\001", len = 1058969952}, force_send_socket = 0x7f7413117bfc <pkg_proc_update_stats+115>, path_vec = {s = 0x7ffd3f s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 267114896}, reg_id = 898624, ruid = {s = 0x142670 <error: Cannot access memory at address 0x142670>, len = 1320704}, location_ua = {s = 0x8 <error: Cannot access memory at decoded = 1320704, rcv = {src_ip = {af = 1058970000, len = 32765, u = {addrl = {94300523474576, 0}, addr32 = {221523600, 21956, 0, 0}, addr16 = {11920, 3380, 21956, 0, 0, 0, 0, 0}, addr = "\220.4\r\304U\000\000\000\000\000\000\000\000\000"}}, d 8858370048, 384580592}, addr32 = {268435456, 2, 384580592, 0}, addr16 = {0, 4096, 2, 0, 15344, 5868, 0, 0}, addr = "\000\000\000\020\002\000\000\000\360;\354\026\000\000\000"}}, src_port = 39520, dst_port = 16158, proto_reserved1 = 3276 sa_family = 21956, sa_data = "\000\000`\232\036?\375\177\000\000)\214N\r"}, sin = {sin_family = 21956, sin_port = 0, sin_addr = {s_addr = 1058970208}, sin_zero = "\375\177\000\000)\214N\r"}, sin6 = {sin6_family = 21956, sin6_port = 0, sin __u6_addr8 = "\375\177\000\000)\214N\r\000\000\000\000\200\341a\r", __u6_addr16 = {32765, 0, 35881, 3406, 0, 0, 57728, 3425}, __u6_addr32 = {32765, 223251497, 0, 224518528}}}, sin6_scope_id = 21956}}, bind_address = 0xa350d4e908d, pro __func__ = "_reply_light" #23 0x00007f74126e2c18 in _reply (trans=0x7f73cb656528, p_msg=0x7f7416ea6bd8, code=202, reason=0x7ffd3f1e9ce0, lock=1) at t_reply.c:657 len = 490 buf = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co;tag=0b62483f"... dset = 0x6 <error: Cannot access memory at address 0x6> bm = {to_tag_val = {s = 0x7f7416ec4638 "0b62483f5ecbb3b7846ec4ead5977a30-e0e2\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985;rport=1795;received=88.88.88.88\r\nExpires: 3600\r\nContact: <sip:89.20"... dset_len = 1 #24 0x00007f74126ece31 in t_reply_str (t=0x7f73cb656528, p_msg=0x7f7416ea6bd8, code=202, reason=0x7ffd3f1e9ce0) at t_reply.c:1634 No locals. #25 0x00007f7412752825 in ki_t_reply (msg=0x7f7416ea6bd8, code=202, reason=0x7ffd3f1e9ce0) at tm.c:1354 t = 0x7f73cb656528 ret = -1 __func__ = "ki_t_reply" #26 0x00007f7412753027 in w_t_reply_wrp (msg=0x7f7416ea6bd8, code=202, txt=0x7f7416ec3d18 "OK") at tm.c:1411 reason = {s = 0x7f7416ec3d18 "OK", len = 2} #27 0x00007f741223a9f3 in send_reply (msg=0x7f7416ea6bd8, code=202, reason=0x7f740f9de460 <su_200_rpl>) at sl.c:287 r = 0x7f7416ec3d18 "OK" t = 0x7f73cb656528 ret = 1 __func__ = "send_reply" #28 0x00007f740f78fb30 in send_2XX_reply (msg=0x7f7416ea6bd8, reply_code=202, lexpire=3600, local_contact=0x7ffd3f1ea1e0) at subscribe.c:122 hdr_append = {s = 0x7f7416ec3840 "Expires: 3600\r\nContact: sip:77.77.77.77:5060;transport=tls\r\n", len = 65} tmp = {s = 0x7f7416ec387e ">\r\n", len = 4} t = 0x0 __func__ = "send_2XX_reply" #29 0x00007f740f7972fb in update_subscription (msg=0x7f7416ea6bd8, subs=0x7ffd3f1ea100, to_tag_gen=1, sent_reply=0x7ffd3f1e9f3c) at subscribe.c:659 hash_code = 260 __func__ = "update_subscription" #30 0x00007f740f79ed41 in handle_subscribe (msg=0x7f7416ea6bd8, watcher_user=..., watcher_domain=...) at subscribe.c:1207 to_tag_gen = 1 subs = {pres_uri = {s = 0x7f7416e850b8 "sip:427@mydomain.co.co", len = 33}, to_user = { s = 0x7f73cb428132 "427@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact: "813" <sip:813@192.168.128.64:1968;transport=tls"..., len = 3}, to s = 0x7f73cb428136 "mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact: "813" <sip:813@192.168.128.64:1968;transport=tls;reg"..., len = 25}, f s = 0x7f73cb4280fc "813@mydomain.co.co>;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nCon"..., len = 3}, fr s = 0x7f73cb428100 "mydomain.co.co>;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact"..., len = 25}, w s = 0x7f73cb4280fc "813@mydomain.co.co>;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nCon"..., len = 3}, wa s = 0x7f73cb428100 "mydomain.co.co>;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact"..., len = 25}, e to_tag = {s = 0x7f74129c5580 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-e0e2", len = 37}, from_tag = { s = 0x7f73cb42811f "e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact: "813" <sip:813@192.168.128.64"..., len = 8}, s = 0x7f73cb4280ae "5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968"..., len = 40}, s = 0x7f7416e9b650 "tls:77.77.77.77:5061", len = 23}, remote_cseq = 1, local_cseq = 0, contact = { s = 0x7f73cb4281d1 "sip:813@192.168.128.64:1968;transport=tls;registering_acc=mydomain_co_co>\r\nUser-Agent: Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length"..., len = 83}, s = 0x7f7416e42ff0 "sip:77.77.77.77:5060", len = 23}, record_route = {s = 0x0, len = 0}, expires = 3600, status = 1, reason = {s = 0x0, len = 0}, version = 0, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1, internal_updat user_agent = {s = 0x7f73cb428233 "Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 24}, next = 0x0} event = 0x7f73cb203820 parsed_event = 0x7f7416ec3678 ev_param = 0x0 found = 1 reason = {s = 0x0, len = 0} uri = {user = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, passwd = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, host = {s = 0x7ffd3f1ea390 "Ӓb\r\304U", len = 664247188}, port = {s = 0x1 <error: Cannot access memor s = 0x7ffd3f1e9fe0 "X\310\352\026t\177", len = 653991280}, sip_params = {s = 0x7ffd3f1ea340 "c\201B\313s\177", len = 664277466}, headers = {s = 0x0, len = 1}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x7f len = 384485464}, user_param = {s = 0xaf00000180 <error: Cannot access memory at address 0xaf00000180>, len = 2}, maddr = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, method = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, r2 = {s = 0x4cb425dc0 <error: Cannot access memory at address 0x4cb425dc0>, len = 224797680}, gr = {s = 0x7ffd3f1ea110 "2\201B\313s\177", len = 223251497}, transport_val = {s = 0x7ffd3f1ea110 "2\201B\313s\177", len = 384461784}, ttl_val = {s = 0x7f user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 224585237}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0xffffffffffffff <error: Cannot access memory at address 0xffffffffffffff>, len = 0}, r2_val = {s = 0x302e322f706973 <error: len = 0}, gr_val = {s = 0x4542495243534255 <error: Cannot access memory at address 0x4542495243534255>, len = 1917192717}} reply_code = 500 reply_str = {s = 0x7f740f7d1fcd "Server Internal Error", len = 21} sent_reply = 0 __func__ = "handle_subscribe" #31 0x00007f740f79ae4e in handle_subscribe0 (msg=0x7f7416ea6bd8) at subscribe.c:988 pfrom = 0x7f7416ec2920 __func__ = "handle_subscribe0" #32 0x000055c40d27284a in do_action (h=0x7ffd3f1ebee0, a=0x7f7416e73828, msg=0x7f7416ea6bd8) at core/action.c:1067 ret = -5 v = 224563923 dst = {send_sock = 0xfd8f150ba8ddb26f, to = {s = {sa_family = 45679, sa_data = "\235\020yq\375\251\000\000\000\000\000\000\000"}, sin = {sin_family = 45679, sin_port = 4253, sin_addr = {s_addr = 2851959161}, sin_zero = "\000\000\000\000\000\000\000"} sin6_flowinfo = 2851959161, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 1058973632}}, id = 32765, proto = 2 '\002', send_flags = {f = 0, b tmp = 0x7f7416ec4540 "\250\003" new_uri = 0x142700 <error: Cannot access memory at address 0x142700> end = 0x142448 <error: Cannot access memory at address 0x142448> crt = 0x1f7000000d7 <error: Cannot access memory at address 0x1f7000000d7> cmd = 0x7f7416e392b8 len = 117 user = 1 uri = {user = {s = 0x7f73cb4280e0 "SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d1"..., l len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffd3f1ea700 "\020\250\036?\375\177", len = 220724707}, params = {s = 0xfd8f150bad5db26f <error: Cannot access memory at addres s = 0x7f7416e84ec8 <incomplete sequence \350>, len = 384461784}, headers = {s = 0x7ffd3f1ea680 "Ӓb\r\304U", len = 223082760}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 384461784), transport = {s = 0x7f7416e72ce8 "\261\001", le len = 1073741824}, user_param = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, maddr = {s = 0x7ffd3f1ea6d0 "", len = 0}, method = {s = 0x7f7416eac768 "", len = 384461784}, lr = {s = 0x116e79fd8 <error: Cannot acces s = 0x7ffd3f1ea700 "\020\250\036?\375\177", len = 2}, gr = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, transport_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7ffd3f1ea810 "", len = 22072 len = 384461784}, maddr_val = {s = 0x7f7416e72ce8 "\261\001", len = 1058979552}, method_val = {s = 0x0, len = 1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = -1430408593}, r2_val = {s = 0x55c40d6292d3 "INFO", len = 10737 s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}} next_hop = {user = {s = 0x7f7416e805c8 "\001", len = 308869268}, passwd = {s = 0x55c40d66f540 "core", len = 2}, host = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, port = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6} len = 308954832}, sip_params = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 42256, proto = 16158, type = 32765, flags = (unknown: 384461784), tra s = 0xd6292d3 <error: Cannot access memory at address 0xd6292d3>, len = 384575776}, ttl = {s = 0x7f7416e32998 "\030\213G\021t\177", len = -884834063}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -887073664}, maddr = method = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2 = {s = 0x7ffd3f1ea5c0 "\260\253\036?\375\177", len = 309673662}, gr = {s = 0x7ffd3f1ea590 "\240\246\036?\ len = 384461784}, ttl_val = {s = 0x7f7412457a23 <trim+36> "\220\311\303UH\211\345AWAVAUATSH\203\354\030\350\244g\377\377\211Eȃ", <incomplete sequence \310>, len = 384485104}, user_param_val = {s = 0x7ffd3f1ea6a0 "Ц\036?\375\177", len = 2}, maddr_ method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {s = 0x7ffd3f1eabb0 "\220\254\036?\375\177", len = 220670026}, r2_val = { s = 0x7f73cb42811f "e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact: "813" <sip:813@192.168.128.64"..., len = 8}, s = 0x7f73cb4280de "1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008"..., len = 1}} u = 0x0 port = 0 dst_host = 0x2 i = 223082933 flags = 1 avp = 0x7ffd3f1eaa40 st = {flags = 1058972784, id = 32765, name = {n = 308866726, s = {s = 0x7f741268eea6 <futex_release+29> "\211E\374\203}\374\002\017\224\300\017\266\300H\205\300t6H\213E\350H\203\354\bj", len = 384461784}, re = 0x7f741268eea6 <futex_release+29>}, avp sct = 0x10000000 sjt = 0x0 rve = 0x10000000 mct = 0x7f73cb273a83 rv = 0x7f74126a135c <init_rb+186> rv1 = 0x6 c1 = {cache_type = 3410330408, val_type = 32627, c = {avp_val = {n = 2, s = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 224563923}, re = 0x2}, pval = {rs = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 224563923}, ri = i2s = "\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\260\244\036?\375\177"} s = {s = 0x7ffd3f1ea4b0 "P\245\036?\375\177", len = 384461784} srevp = {0x7f7416ea6dd8, 0x7f73cb656650} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {t s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, l type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTY len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #33 0x000055c40d27fde3 in run_actions (h=0x7ffd3f1ebee0, a=0x7f7416e73828, msg=0x7f7416ea6bd8) at core/action.c:1569 t = 0x7f7416e73828 ret = -1 tvb = {tv_sec = 140725662427664, tv_usec = 94300525009117} tve = {tv_sec = 268435456, tv_usec = 6} tz = {tz_minuteswest = 1073741824, tz_dsttime = 0} tdiff = 1058975120 __func__ = "run_actions" #34 0x000055c40d2727b6 in do_action (h=0x7ffd3f1ebee0, a=0x7f7416e73bb0, msg=0x7f7416ea6bd8) at core/action.c:1058 ret = 1 v = 1 dst = {send_sock = 0xfd8f150bbebdb26f, to = {s = {sa_family = 45679, sa_data = "\235\020yq\375\251\000\000\000\000\000\000\000"}, sin = {sin_family = 45679, sin_port = 4253, sin_addr = {s_addr = 2851959161}, sin_zero = "\000\000\000\000\000\000\000"} sin6_flowinfo = 2851959161, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 384322832}}, id = 32628, proto = 2 '\002', send_flags = {f = 0, bl tmp = 0x0 new_uri = 0x0 end = 0x0 crt = 0x0 cmd = 0x7f7416e72068 len = 0 user = 6 uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffd3f1eadd0 "\340\256\036?\375\177", len = 220724707}, para s = 0xfd8f150bb33db26f <error: Cannot access memory at address 0xfd8f150bb33db26f>, len = 278770287}, sip_params = {s = 0x55c400000000 <error: Cannot access memory at address 0x55c400000000>, len = 0}, headers = {s = 0x55c40d65eb78 <__func__.7457 proto = 5868, type = 32628, flags = (unknown: 384461784), transport = {s = 0x7f7416e71e28 "\256\001", len = 1058975232}, ttl = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, user_param = {s = 0x10000000 <error: Cannot access memory at address 0x100 len = 383262736}, method = {s = 0x3a8 <error: Cannot access memory at address 0x3a8>, len = 384582976}, lr = {s = 0xffffffffcb428254 <error: Cannot access memory at address 0xffffffffcb428254>, len = 0}, r2 = {s = 0x7ffd3f1eae90 "Я\036?\375\177", len = 1073741824}, transport_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7ffd3f1eaee0 "Я\036?\375\177", len = 220726455}, user_param_val = {s = 0x7f7416ea6bd8 "\317\001", len = 384461784}, len = 1058979552}, method_val = {s = 0x0, len = -1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = -1088572817}, r2_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, gr_val = {s = 0x10000000 <error: Cannot access memory next_hop = {user = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, passwd = {s = 0x7ffd3f1eac20 "\220\254\036?\375\177", len = 299523129}, host = {s = 0x7ffd3f1eb360 "p\264\036?\375\177", len = 1058975560}, port = {s = s = 0x1500000000 <error: Cannot access memory at address 0x1500000000>, len = 2}, sip_params = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 44176 flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 220724704), transport = {s = 0x13 <error: Cannot access memory at address 0x13>, len = 0}, ttl = {s = 0x7f7416e32998 "\030\213G\021t\177", len = 24}, user_param = {s = 0x0, len = 384305424 method = {s = 0x7f7416e706d8 "\251\001", len = 1058974912}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2 = {s = 0x7ffd3f1eac90 "\240\255\036?\375\177", len = 222477392}, gr = {s = 0x0, len = 223289055}, tra ttl_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, user_param_val = {s = 0x7ffd3f1eacc0 "", len = 2}, maddr_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot acc s = 0x7ffd3f1eada0 "\220\256\036?\375\177", len = 220726455}, r2_val = {s = 0x142700 <error: Cannot access memory at address 0x142700>, len = 384461784}, gr_val = {s = 0x7f7416e706d8 "\251\001", len = 1058979552}} u = 0x10000000 port = 0 dst_host = 0x2 i = 223082933 flags = 0 avp = 0x7ffd3f1eb110 st = {flags = 0, id = 0, name = {n = -884833634, s = {s = 0x7f73cb42829e "\r\n", len = 0}, re = 0x7f73cb42829e}, avp = 0x2} sct = 0x7ffd3f1eaf70 sjt = 0x6 rve = 0x7f7416e72f20 mct = 0x10000000 rv = 0x7f73cb4282a0 rv1 = 0x6 c1 = {cache_type = 4294967295, val_type = 4294967295, c = {avp_val = {n = 384461784, s = {s = 0x7f7416ea6bd8 "\317\001", len = 1058974628}, re = 0x7f7416ea6bd8}, pval = {rs = {s = 0x7f7416ea6bd8 "\317\001", len = 1058974628}, ri = 1058974632, flags = i2s = "0\342\346\026t\177\000\000\330k\352\026t\177\000\000\330\340&\313s\177"} s = {s = 0x7ffd3f1eaaf0 "0\342\346\026t\177", len = 367430969} srevp = {0x7ffd3f1eaaf0, 0x7f7415d67c02 <BIO_write+58>} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {t s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, l type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTY len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #35 0x000055c40d27fde3 in run_actions (h=0x7ffd3f1ebee0, a=0x7f7416e73bb0, msg=0x7f7416ea6bd8) at core/action.c:1569 t = 0x7f7416e73bb0 ret = -1 tvb = {tv_sec = 0, tv_usec = 140136577395672} tve = {tv_sec = 140725662429408, tv_usec = 0} tz = {tz_minuteswest = 302033795, tz_dsttime = 32628} tdiff = 1 __func__ = "run_actions" #36 0x000055c40d27280c in do_action (h=0x7ffd3f1ebee0, a=0x7f7416e73d00, msg=0x7f7416ea6bd8) at core/action.c:1062 ret = 1 v = 0 dst = {send_sock = 0xfd8f150b831db26f, to = {s = {sa_family = 45679, sa_data = "\235\020yq\375\251\000\000\000\000\000\000\000"}, sin = {sin_family = 45679, sin_port = 4253, sin_addr = {s_addr = 2851959161}, sin_zero = "\000\000\000\000\000\000\000"} sin6_flowinfo = 2851959161, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 224563923}}, id = 21956, proto = 2 '\002', send_flags = {f = 0, bl tmp = 0x1 <error: Cannot access memory at address 0x1> new_uri = 0x7f7411b2b2a5 <_ul_sruid+5> "5cb9871b-29cb-" end = 0x7f74168f3e84 "H\205\300H\211\303\017\205\070\376\377\377\061\300\351\363\376\377\377\350D\216\377\377\017\037@" crt = 0x7ffd3f1eb6f0 "" cmd = 0x7f7416e288b8 len = 21956 user = 250613444 uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffd3f1eb4a0 "\260\265\036?\375\177", len = 220724707}, para s = 0xfd8f150b819db26f <error: Cannot access memory at address 0xfd8f150b819db26f>, len = 278770287}, sip_params = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, headers = {s = 0x7f741331d2e5 <_kex_ port_no = 65535, proto = 65535, type = 32628, flags = (unknown: 384461784), transport = {s = 0x7f7416e4c3e8 "\035\001", len = 1058976976}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 24}, maddr = {s = 0x7ffd3f1ebae0 "\020\273\036?\375\17 s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 223289055}, lr = {s = 0x13f1eb4a0 <error: Cannot access memory at address 0x13f1eb4a0>, len = 0}, r2 = {s = 0x7ffd3f1eb560 "\240\266\036?\375\177", len = 2}, gr = {s = 0x s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7ffd3f1eb5b0 "\240\266\036?\375\177", len = 220726455}, user_param_val = {s = 0x7f7416ea6bd8 "\317\001", len = 384461784}, maddr_val = {s = 0x7f7416e4c len = 1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = -1912753553}, r2_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, gr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}} next_hop = {user = {s = 0x7ffd3f1eb2c0 "л\036?\375\177", len = 0}, passwd = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 14}, host = {s = 0x7f7412f00512 "%x%c%x%c", len = 4}, port = {s = 0x7f741331d2e5 <_kex_sruid+5> "5cb9871b-29c s = 0x7f741331d2e5 <_kex_sruid+5> "5cb9871b-29cb-", len = 2}, sip_params = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 45920, proto = 16158, typ flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 220724704), transport = {s = 0x7ffd3f1eb930 "p\271\036?\375\177", len = 1058977904}, ttl = {s = 0x7f7416e32998 "\030\213G\021t\177", len = 654147750}, user_param = {s = 0x11c00000000 <erro len = 0}, maddr = {s = 0x7ffd3f1ebbd0 "\205\060T\031\244\064\240", <incomplete sequence \350>, len = 384461784}, method = {s = 0x7f7416e493a8 "\017\001", len = 1058976656}, lr = {s = 0x55c40efc57e0 "\200V\356\016\304U", len = 378486404}, r2 = { s = 0x3939363031ffffff <error: Cannot access memory at address 0x3939363031ffffff>, len = 1058977952}, gr = {s = 0x7ffd3f1eb340 "Ӓb\r\304U", len = 1058976576}, transport_val = {s = 0x42 <error: Cannot access memory at address 0x42>, len = 3099581 s = 0xffffffff3f1eb4a8 <error: Cannot access memory at address 0xffffffff3f1eb4a8>, len = 0}, user_param_val = {s = 0x7f74129c5330 <callid_buf+16> "-10699@77.77.77.77", len = 2}, maddr_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, metho s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {s = 0x7ffd3f1eb470 "`\265\036?\375\177", len = 220726455}, r2_val = {s = 0x7f74129c5372 <callid_buf+82> "", len = 384461784}, gr_val = {s = 0x7f7416e493a8 "\0 u = 0x8050 port = 0 dst_host = 0x2 i = 223082933 flags = 32628 avp = 0x7ffd3f1eb7e0 st = {flags = 0, id = 14642, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x7ffd3f1eb220} sct = 0x7ffd3f1eb5f0 sjt = 0x7f7412737116 <child_init_callid+932> rve = 0x7f7416e72060 mct = 0x7ffd3f1e0000 rv = 0xffffffffffffffff rv1 = 0x6 c1 = {cache_type = 1058976328, val_type = 32765, c = {avp_val = {n = 16, s = {s = 0x7ffd00000010 <error: Cannot access memory at address 0x7ffd00000010>, len = 1058976368}, re = 0x7ffd00000010}, pval = {rs = {s = 0x7ffd00000010 <error: Cannot access ri = 120, flags = 0}}, i2s = '\000' <repeats 12 times>, "\375\177\000\000\000\000\000\000t\177"} s = {s = 0x7ffd3f1eb6a8 "\265\371K\r\304U", len = 10699} srevp = {0x7f740b69df84, 0x900000010} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {t s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, l type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTY len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #37 0x000055c40d27fde3 in run_actions (h=0x7ffd3f1ebee0, a=0x7f7416e6d418, msg=0x7f7416ea6bd8) at core/action.c:1569 t = 0x7f7416e73d00 ret = 1 tvb = {tv_sec = 140136850624832, tv_usec = 140136847156409} tve = {tv_sec = 140136577427424, tv_usec = 140136577395672} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 384493536 __func__ = "run_actions" #38 0x000055c40d26efc5 in do_action (h=0x7ffd3f1ebee0, a=0x7f7416e4d2c0, msg=0x7f7416ea6bd8) at core/action.c:691 ret = -5 v = 1 dst = {send_sock = 0x10000000, to = {s = {sa_family = 59024, sa_data = "\353\017\000\000\000\000@\251\r\000\000\000\000"}, sin = {sin_family = 59024, sin_port = 4075, sin_addr = {s_addr = 0}, sin_zero = "@\251\r\000\000\000\000"}, sin6 = {sin6_family sin6_addr = {__in6_u = {__u6_addr8 = "@\251\r\000\000\000\000\000p\031\024\000\000\000\000", __u6_addr16 = {43328, 13, 0, 0, 6512, 20, 0, 0}, __u6_addr32 = {895296, 0, 1317232, 0}}}, sin6_scope_id = 1320704}}, id = 0, proto = 8 '\b', send_flags tmp = 0x2 <error: Cannot access memory at address 0x2> new_uri = 0x40 <error: Cannot access memory at address 0x40> end = 0x7f7416d82010 "\001" crt = 0x7ffd3f1ebe44 "t\177" cmd = 0x7f7416e32688 len = 32627 user = -884833634 uri = {user = {s = 0x7ffd3f1ebaa0 "", len = 383262736}, passwd = {s = 0x7f74270d0da0 <__memcpy_ssse3+7728> "f\213V\376f\211W\376\303\017\037\200", len = 383262736}, host = {s = 0x7ffd3f1ebae0 "\020\273\036?\375\177", len = 319912956}, port = { s = 0x853f1ebb00 <error: Cannot access memory at address 0x853f1ebb00>, len = 0}, params = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 267118672}, sip_params = {s = 0x4000da780 <error: Cannot access memory at addres s = 0x142700 <error: Cannot access memory at address 0x142700>, len = 8}, port_no = 48064, proto = 16158, type = 32765, flags = (URI_SIP_USER_PHONE | unknown: 223457136), transport = {s = 0x7ffd3f1ebb10 "\310\005\350\026t\177", len = 221523600}, s = 0x7ffd3f1ebbc0 " \274\036?\375\177", len = 223251497}, maddr = {s = 0x7f7416e805c8 "\001", len = 384323272}, method = {s = 0x7ffd3f1ebc12 "", len = 1058978835}, lr = {s = 0x7f73cb4282a0 "", len = -884833929}, r2 = {s = 0x55c40d673e50 <__func_ s = 0x40 <error: Cannot access memory at address 0x40>, len = 383262736}, transport_val = {s = 0x4040404040404040 <error: Cannot access memory at address 0x4040404040404040>, len = 1}, ttl_val = {s = 0x3c5a5a5a5a <error: Cannot access memory at a user_param_val = {s = 0x520202020202020 <error: Cannot access memory at address 0x520202020202020>, len = -884833632}, maddr_val = {s = 0x7ffd3f1ebc00 "", len = 223289055}, method_val = {s = 0x7ffd3f1ebbe0 "", len = 383262736}, lr_val = {s = 0x7f73 s = 0x7ffd3f1ebc20 "P\274\036?\375\177", len = 319912956}, gr_val = {s = 0xe8a034a419543085 <error: Cannot access memory at address 0xe8a034a419543085>, len = 0}} next_hop = {user = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 666454672}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, host = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 666435952}, port s = 0x43f1ebea0 <error: Cannot access memory at address 0x43f1ebea0>, len = 317719835}, params = {s = 0x0, len = 666436808}, sip_params = {s = 0x7ffd3f1eb970 "`\312\372&t\177", len = 2}, headers = {s = 0x7f7427b90170 "", len = 1058978144}, port_n flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 2822930836), transport = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 96}, ttl = {s = 0x7f7426faca60 "\306J", len = 666451760}, user_param = {s = 0x0, len = 0 s = 0x6e0000005b <error: Cannot access memory at address 0x6e0000005b>, len = 657705728}, method = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 1058978392}, lr = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 2506191 s = 0x20030 <error: Cannot access memory at address 0x20030>, len = 227340920}, transport_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, ttl_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, user_param_val len = 664247188}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, method_val = {s = 0x7f73cb4190e4 "t\177", len = 653970016}, lr_val = {s = 0x7ffd3f1ebdc0 "", len = 664277466}, r2_val = {s = 0x7ffd3f1ebef0 "\002", len s = 0x1 <error: Cannot access memory at address 0x1>, len = 223289055}} u = 0x0 port = 0 dst_host = 0x7f7416ea6bd8 i = 5 flags = 32628 avp = 0x7f7416e85010 st = {flags = 1058978304, id = 32765, name = {n = 666454672, s = {s = 0x7f7427b94a90 "< $\r\304U", len = 1}, re = 0x7f7427b94a90}, avp = 0x0} sct = 0x7ffd3f1ebd20 sjt = 0x16d823d0 rve = 0x7f7416e4c620 mct = 0x810000000 rv = 0x7f7427b904c8 rv1 = 0x7f7416ea6bd8 c1 = {cache_type = 666454568, val_type = 32628, c = {avp_val = {n = 7, s = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1058978312}, re = 0x7}, pval = {rs = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1058978312}, ri i2s = "-", '\000' <repeats 15 times>, "@\277\036?\375\177"} s = {s = 0x7ffd3f1eb894 "", len = 1058978144} srevp = {0x7ffd3f1eb970, 0x7f7426fa6d90} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {t s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, l type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTY len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #39 0x000055c40d27fde3 in run_actions (h=0x7ffd3f1ebee0, a=0x7f7416e474e8, msg=0x7f7416ea6bd8) at core/action.c:1569 t = 0x7f7416e4d2c0 ret = 1 tvb = {tv_sec = 140725662432912, tv_usec = 140136577263320} tve = {tv_sec = 140136577117680, tv_usec = 140136577395672} tz = {tz_minuteswest = 1058979648, tz_dsttime = 32765} tdiff = 2 __func__ = "run_actions" #40 0x000055c40d28057f in run_top_route (a=0x7f7416e474e8, msg=0x7f7416ea6bd8, c=0x0) at core/action.c:1654 ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {2, -175898720873893265, 94300526514899, 1073741824, 268435456, 6, -175898720779521425, -6197672747408182673}, __mask_was_saved = 0, __saved_mask = {__val = {6192449487634431 4611686022990790656, 140136577395672, 140725662433232, 94300523556965, 4679429112, 140136577395672, 94301375692801, 0, 268435456, 2, 94300526514899}}}}} p = 0x7ffd3f1ebee0 ret = 268435456 sfbk = 0 #41 0x000055c40d3db2ce in receive_msg (buf=0x7f73cb428070 "SUBSCRIBE sip:427@mydomain.co.co SIP/2.0\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: at core/receive.c:427 msg = 0x7f7416ea6bd8 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 2, jmp_env = {{__jmpbuf = {94300526514899, 1073741824, 268435456, 6, 140725662433744, 94300524684824, 9, 140136846889408}, __mask_was_saved = 1058981040, __saved_mask = {__val = {140135308098936, 1401 9, 140135308099706, 33, 140135308099740, 7, 64, 0, 140135308116184, 2632814952448, 16383, 140135308036592}}}}} bctx = 0x230 ret = 32627 stats_on = 0 tvb = {tv_sec = 219043332096, tv_usec = 140135308099747} tve = {tv_sec = 0, tv_usec = 140135308100256} tz = {tz_minuteswest = -884834182, tz_dsttime = 32627} diff = 0 inb = {s = 0x7f73cb428070 "SUBSCRIBE sip:427@mydomain.co.co SIP/2.0\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@de"..., len = 5 netinfo = {data = {s = 0x2020202020202020 <error: Cannot access memory at address 0x2020202020202020>, len = 538976288}, rcv = 0xff, dst = 0x7f73cb4280a5} keng = 0x0 evp = {data = 0x7ffd3f1ec060, rcv = 0x7f73cb427d90, dst = 0x0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 exectime = 0 __func__ = "receive_msg" #42 0x000055c40d4754bc in receive_tcp_msg (tcpbuf=0x7f73cb428070 "SUBSCRIBE sip:427@mydomain.co.co SIP/2.0\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\ con=0x7f73cb427d78) at core/tcp_read.c:1399 buf = 0x0 bsize = 0 blen = 560 __func__ = "receive_tcp_msg" #43 0x000055c40d477ac4 in tcp_read_req (con=0x7f73cb427d78, bytes_read=0x7ffd3f1ec450, read_flags=0x7ffd3f1ec448) at core/tcp_read.c:1631 bytes = 560 total_bytes = 560 resp = 1 size = 0 req = 0x7f73cb427df8 dst = {send_sock = 0x7ffd3f1ec440, to = {s = {sa_family = 32360, sa_data = "B\313s\177\000\000\000\000\000\000\001 \000"}, sin = {sin_family = 32360, sin_port = 52034, sin_addr = {s_addr = 32627}, sin_zero = "\000\000\000\000\001 \000"}, sin6 = {sin6 sin6_flowinfo = 32627, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\001 \000\000x\363\352\026t\177\000", __u6_addr16 = {0, 0, 8193, 0, 62328, 5866, 32628, 0}, __u6_addr32 = {0, 8193, 384496504, 32628}}}, sin6_scope_id = 1058980624}}, blst_imask = 80}} c = 13 '\r' ret = 0 __func__ = "tcp_read_req" #44 0x000055c40d47b621 in handle_io (fm=0x7f7416eaf378, events=1, idx=-1) at core/tcp_read.c:1862 ret = 0 n = 21956 read_flags = 1 con = 0x7f73cb427d78 s = 0 resp = 1 t = 80 __func__ = "handle_io" #45 0x000055c40d468524 in io_wait_loop_epoll (h=0x55c40d94c440 <io_w>, t=2, repeat=0) at core/io_wait.h:1062 n = 1 r = 0 fm = 0x7f7416eaf378 revents = 1 __func__ = "io_wait_loop_epoll" #46 0x000055c40d47c9ce in tcp_receive_loop (unix_sock=28) at core/tcp_read.c:1974 __func__ = "tcp_receive_loop" #47 0x000055c40d329f60 in tcp_init_children () at core/tcp_main.c:5086 r = 0 i = 7 reader_fd_1 = 28 pid = 0 si_desc = "tcp receiver (generic)\000\000\006\000\000\000\000\000\000\000\200\306\036?\375\177\000\000DK7\r\304U\000\000\260\306\036?\375\177\000\000m\002\070\r\001", '\000' <repeats 11 times>, "\004HC\r\000\000\000\000ѻc\r\000\000\000\000\310\300\34000\000\000\000\024\000\000\000\025\000\000\000\000r\b't\177\000" si = 0x0 __func__ = "tcp_init_children" #48 0x000055c40d25e1a9 in main_loop () at main.c:1750 i = 8 pid = 10667 si = 0x0 si_desc = "udp receiver child=7 sock=77.77.77.77:5060 (77.77.77.77:5060)\000\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\217r\b't\177\000\000@\307\036?\375\177\000\000\060\000\000\000\060\000\000\000 \310\036 nrprocs = 8 woneinit = 1 __func__ = "main_loop" #49 0x000055c40d265430 in main (argc=13, argv=0x7ffd3f1ecac8) at main.c:2737 cfg_stream = 0x55c40eee0010 c = -1 r = 0 tmp = 0x7ffd3f1ede06 "" tmp_len = 32765 port = 1058982144 proto = 32628 options = 0x55c40d5de600 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 42281687 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0xffffffff p = 0xd <error: Cannot access memory at address 0xd> st = {st_dev = 18, st_ino = 210785, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1555662619, tv_nsec = 581870842}, st_mtim = {tv_sec = 1555662619, tv_nsec = 581870842}, __glibc_reserved = {0, 0, 0}} option_index = 0 long_options = {{name = 0x55c40d5e0aea "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55c40d5daf29 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55c40d5e0aef "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x0, has_arg = 0, __func__ = "main" ```
disas aesni_ecb_encrypt ``` (gdb) disas aesni_ecb_encrypt Dump of assembler code for function aesni_ecb_encrypt: 0x00007f7415d369e0 <+0>: and $0xfffffffffffffff0,%rdx 0x00007f7415d369e4 <+4>: je 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d369ea <+10>: mov 0xf0(%rcx),%eax 0x00007f7415d369f0 <+16>: movups (%rcx),%xmm0 0x00007f7415d369f3 <+19>: mov %rcx,%r11 0x00007f7415d369f6 <+22>: mov %eax,%r10d 0x00007f7415d369f9 <+25>: test %r8d,%r8d 0x00007f7415d369fc <+28>: je 0x7f7415d36c50 <aesni_ecb_encrypt+624> 0x00007f7415d36a02 <+34>: cmp $0x80,%rdx 0x00007f7415d36a09 <+41>: jb 0x7f7415d36af7 <aesni_ecb_encrypt+279> 0x00007f7415d36a0f <+47>: movdqu (%rdi),%xmm2 0x00007f7415d36a13 <+51>: movdqu 0x10(%rdi),%xmm3 0x00007f7415d36a18 <+56>: movdqu 0x20(%rdi),%xmm4 0x00007f7415d36a1d <+61>: movdqu 0x30(%rdi),%xmm5 0x00007f7415d36a22 <+66>: movdqu 0x40(%rdi),%xmm6 0x00007f7415d36a27 <+71>: movdqu 0x50(%rdi),%xmm7 0x00007f7415d36a2c <+76>: movdqu 0x60(%rdi),%xmm8 0x00007f7415d36a32 <+82>: movdqu 0x70(%rdi),%xmm9 0x00007f7415d36a38 <+88>: lea 0x80(%rdi),%rdi 0x00007f7415d36a3f <+95>: sub $0x80,%rdx 0x00007f7415d36a46 <+102>: jmp 0x7f7415d36aae <aesni_ecb_encrypt+206> 0x00007f7415d36a48 <+104>: nopl 0x0(%rax,%rax,1) 0x00007f7415d36a50 <+112>: movups %xmm2,(%rsi) 0x00007f7415d36a53 <+115>: mov %r11,%rcx 0x00007f7415d36a56 <+118>: movdqu (%rdi),%xmm2 0x00007f7415d36a5a <+122>: mov %r10d,%eax 0x00007f7415d36a5d <+125>: movups %xmm3,0x10(%rsi) 0x00007f7415d36a61 <+129>: movdqu 0x10(%rdi),%xmm3 0x00007f7415d36a66 <+134>: movups %xmm4,0x20(%rsi) 0x00007f7415d36a6a <+138>: movdqu 0x20(%rdi),%xmm4 0x00007f7415d36a6f <+143>: movups %xmm5,0x30(%rsi) 0x00007f7415d36a73 <+147>: movdqu 0x30(%rdi),%xmm5 0x00007f7415d36a78 <+152>: movups %xmm6,0x40(%rsi) 0x00007f7415d36a7c <+156>: movdqu 0x40(%rdi),%xmm6 0x00007f7415d36a81 <+161>: movups %xmm7,0x50(%rsi) 0x00007f7415d36a85 <+165>: movdqu 0x50(%rdi),%xmm7 0x00007f7415d36a8a <+170>: movups %xmm8,0x60(%rsi) 0x00007f7415d36a8f <+175>: movdqu 0x60(%rdi),%xmm8 0x00007f7415d36a95 <+181>: movups %xmm9,0x70(%rsi) 0x00007f7415d36a9a <+186>: lea 0x80(%rsi),%rsi 0x00007f7415d36aa1 <+193>: movdqu 0x70(%rdi),%xmm9 0x00007f7415d36aa7 <+199>: lea 0x80(%rdi),%rdi 0x00007f7415d36aae <+206>: callq 0x7f7415d367c0 <_aesni_encrypt8> 0x00007f7415d36ab3 <+211>: sub $0x80,%rdx 0x00007f7415d36aba <+218>: jae 0x7f7415d36a50 <aesni_ecb_encrypt+112> 0x00007f7415d36abc <+220>: movups %xmm2,(%rsi) 0x00007f7415d36abf <+223>: mov %r11,%rcx 0x00007f7415d36ac2 <+226>: movups %xmm3,0x10(%rsi) 0x00007f7415d36ac6 <+230>: mov %r10d,%eax 0x00007f7415d36ac9 <+233>: movups %xmm4,0x20(%rsi) 0x00007f7415d36acd <+237>: movups %xmm5,0x30(%rsi) 0x00007f7415d36ad1 <+241>: movups %xmm6,0x40(%rsi) 0x00007f7415d36ad5 <+245>: movups %xmm7,0x50(%rsi) 0x00007f7415d36ad9 <+249>: movups %xmm8,0x60(%rsi) 0x00007f7415d36ade <+254>: movups %xmm9,0x70(%rsi) 0x00007f7415d36ae3 <+259>: lea 0x80(%rsi),%rsi 0x00007f7415d36aea <+266>: add $0x80,%rdx 0x00007f7415d36af1 <+273>: je 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36af7 <+279>: movups (%rdi),%xmm2 0x00007f7415d36afa <+282>: cmp $0x20,%rdx 0x00007f7415d36afe <+286>: jb 0x7f7415d36b70 <aesni_ecb_encrypt+400> 0x00007f7415d36b00 <+288>: movups 0x10(%rdi),%xmm3 0x00007f7415d36b04 <+292>: je 0x7f7415d36ba0 <aesni_ecb_encrypt+448> 0x00007f7415d36b0a <+298>: movups 0x20(%rdi),%xmm4 0x00007f7415d36b0e <+302>: cmp $0x40,%rdx 0x00007f7415d36b12 <+306>: jb 0x7f7415d36bc0 <aesni_ecb_encrypt+480> 0x00007f7415d36b18 <+312>: movups 0x30(%rdi),%xmm5 0x00007f7415d36b1c <+316>: je 0x7f7415d36be0 <aesni_ecb_encrypt+512> 0x00007f7415d36b22 <+322>: movups 0x40(%rdi),%xmm6 0x00007f7415d36b26 <+326>: cmp $0x60,%rdx 0x00007f7415d36b2a <+330>: jb 0x7f7415d36c00 <aesni_ecb_encrypt+544> 0x00007f7415d36b30 <+336>: movups 0x50(%rdi),%xmm7 0x00007f7415d36b34 <+340>: je 0x7f7415d36c20 <aesni_ecb_encrypt+576> 0x00007f7415d36b3a <+346>: movdqu 0x60(%rdi),%xmm8 0x00007f7415d36b40 <+352>: xorps %xmm9,%xmm9 0x00007f7415d36b44 <+356>: callq 0x7f7415d367c0 <_aesni_encrypt8> 0x00007f7415d36b49 <+361>: movups %xmm2,(%rsi) 0x00007f7415d36b4c <+364>: movups %xmm3,0x10(%rsi) 0x00007f7415d36b50 <+368>: movups %xmm4,0x20(%rsi) 0x00007f7415d36b54 <+372>: movups %xmm5,0x30(%rsi) 0x00007f7415d36b58 <+376>: movups %xmm6,0x40(%rsi) 0x00007f7415d36b5c <+380>: movups %xmm7,0x50(%rsi) 0x00007f7415d36b60 <+384>: movups %xmm8,0x60(%rsi) 0x00007f7415d36b65 <+389>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36b6a <+394>: nopw 0x0(%rax,%rax,1) 0x00007f7415d36b70 <+400>: movups (%rcx),%xmm0 0x00007f7415d36b73 <+403>: movups 0x10(%rcx),%xmm1 0x00007f7415d36b77 <+407>: lea 0x20(%rcx),%rcx 0x00007f7415d36b7b <+411>: xorps %xmm0,%xmm2 0x00007f7415d36b7e <+414>: aesenc %xmm1,%xmm2 0x00007f7415d36b83 <+419>: dec %eax 0x00007f7415d36b85 <+421>: movups (%rcx),%xmm1 0x00007f7415d36b88 <+424>: lea 0x10(%rcx),%rcx 0x00007f7415d36b8c <+428>: jne 0x7f7415d36b7e <aesni_ecb_encrypt+414> 0x00007f7415d36b8e <+430>: aesenclast %xmm1,%xmm2 0x00007f7415d36b93 <+435>: movups %xmm2,(%rsi) 0x00007f7415d36b96 <+438>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36b9b <+443>: nopl 0x0(%rax,%rax,1) 0x00007f7415d36ba0 <+448>: callq 0x7f7415d36340 <_aesni_encrypt2> 0x00007f7415d36ba5 <+453>: movups %xmm2,(%rsi) 0x00007f7415d36ba8 <+456>: movups %xmm3,0x10(%rsi) 0x00007f7415d36bac <+460>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36bb1 <+465>: nopl 0x0(%rax,%rax,1) 0x00007f7415d36bb6 <+470>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36bc0 <+480>: callq 0x7f7415d36400 <_aesni_encrypt3> 0x00007f7415d36bc5 <+485>: movups %xmm2,(%rsi) 0x00007f7415d36bc8 <+488>: movups %xmm3,0x10(%rsi) 0x00007f7415d36bcc <+492>: movups %xmm4,0x20(%rsi) 0x00007f7415d36bd0 <+496>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36bd5 <+501>: nop 0x00007f7415d36bd6 <+502>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36be0 <+512>: callq 0x7f7415d364e0 <_aesni_encrypt4> 0x00007f7415d36be5 <+517>: movups %xmm2,(%rsi) 0x00007f7415d36be8 <+520>: movups %xmm3,0x10(%rsi) 0x00007f7415d36bec <+524>: movups %xmm4,0x20(%rsi) 0x00007f7415d36bf0 <+528>: movups %xmm5,0x30(%rsi) 0x00007f7415d36bf4 <+532>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36bf9 <+537>: nopl 0x0(%rax) 0x00007f7415d36c00 <+544>: xorps %xmm7,%xmm7 0x00007f7415d36c03 <+547>: callq 0x7f7415d36600 <_aesni_encrypt6> 0x00007f7415d36c08 <+552>: movups %xmm2,(%rsi) 0x00007f7415d36c0b <+555>: movups %xmm3,0x10(%rsi) 0x00007f7415d36c0f <+559>: movups %xmm4,0x20(%rsi) 0x00007f7415d36c13 <+563>: movups %xmm5,0x30(%rsi) 0x00007f7415d36c17 <+567>: movups %xmm6,0x40(%rsi) 0x00007f7415d36c1b <+571>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36c20 <+576>: callq 0x7f7415d36600 <_aesni_encrypt6> 0x00007f7415d36c25 <+581>: movups %xmm2,(%rsi) 0x00007f7415d36c28 <+584>: movups %xmm3,0x10(%rsi) 0x00007f7415d36c2c <+588>: movups %xmm4,0x20(%rsi) 0x00007f7415d36c30 <+592>: movups %xmm5,0x30(%rsi) 0x00007f7415d36c34 <+596>: movups %xmm6,0x40(%rsi) 0x00007f7415d36c38 <+600>: movups %xmm7,0x50(%rsi) 0x00007f7415d36c3c <+604>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36c41 <+609>: nopl 0x0(%rax,%rax,1) 0x00007f7415d36c46 <+614>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36c50 <+624>: cmp $0x80,%rdx 0x00007f7415d36c57 <+631>: jb 0x7f7415d36d6d <aesni_ecb_encrypt+909> 0x00007f7415d36c5d <+637>: movdqu (%rdi),%xmm2 0x00007f7415d36c61 <+641>: movdqu 0x10(%rdi),%xmm3 0x00007f7415d36c66 <+646>: movdqu 0x20(%rdi),%xmm4 0x00007f7415d36c6b <+651>: movdqu 0x30(%rdi),%xmm5 0x00007f7415d36c70 <+656>: movdqu 0x40(%rdi),%xmm6 0x00007f7415d36c75 <+661>: movdqu 0x50(%rdi),%xmm7 0x00007f7415d36c7a <+666>: movdqu 0x60(%rdi),%xmm8 0x00007f7415d36c80 <+672>: movdqu 0x70(%rdi),%xmm9 0x00007f7415d36c86 <+678>: lea 0x80(%rdi),%rdi 0x00007f7415d36c8d <+685>: sub $0x80,%rdx 0x00007f7415d36c94 <+692>: jmp 0x7f7415d36cfe <aesni_ecb_encrypt+798> 0x00007f7415d36c96 <+694>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36ca0 <+704>: movups %xmm2,(%rsi) 0x00007f7415d36ca3 <+707>: mov %r11,%rcx 0x00007f7415d36ca6 <+710>: movdqu (%rdi),%xmm2 0x00007f7415d36caa <+714>: mov %r10d,%eax 0x00007f7415d36cad <+717>: movups %xmm3,0x10(%rsi) 0x00007f7415d36cb1 <+721>: movdqu 0x10(%rdi),%xmm3 0x00007f7415d36cb6 <+726>: movups %xmm4,0x20(%rsi) 0x00007f7415d36cba <+730>: movdqu 0x20(%rdi),%xmm4 0x00007f7415d36cbf <+735>: movups %xmm5,0x30(%rsi) 0x00007f7415d36cc3 <+739>: movdqu 0x30(%rdi),%xmm5 0x00007f7415d36cc8 <+744>: movups %xmm6,0x40(%rsi) 0x00007f7415d36ccc <+748>: movdqu 0x40(%rdi),%xmm6 0x00007f7415d36cd1 <+753>: movups %xmm7,0x50(%rsi) 0x00007f7415d36cd5 <+757>: movdqu 0x50(%rdi),%xmm7 0x00007f7415d36cda <+762>: movups %xmm8,0x60(%rsi) 0x00007f7415d36cdf <+767>: movdqu 0x60(%rdi),%xmm8 0x00007f7415d36ce5 <+773>: movups %xmm9,0x70(%rsi) 0x00007f7415d36cea <+778>: lea 0x80(%rsi),%rsi 0x00007f7415d36cf1 <+785>: movdqu 0x70(%rdi),%xmm9 0x00007f7415d36cf7 <+791>: lea 0x80(%rdi),%rdi 0x00007f7415d36cfe <+798>: callq 0x7f7415d368d0 <_aesni_decrypt8> 0x00007f7415d36d03 <+803>: movups (%r11),%xmm0 0x00007f7415d36d07 <+807>: sub $0x80,%rdx 0x00007f7415d36d0e <+814>: jae 0x7f7415d36ca0 <aesni_ecb_encrypt+704> 0x00007f7415d36d10 <+816>: movups %xmm2,(%rsi) 0x00007f7415d36d13 <+819>: pxor %xmm2,%xmm2 0x00007f7415d36d17 <+823>: mov %r11,%rcx 0x00007f7415d36d1a <+826>: movups %xmm3,0x10(%rsi) 0x00007f7415d36d1e <+830>: pxor %xmm3,%xmm3 0x00007f7415d36d22 <+834>: mov %r10d,%eax 0x00007f7415d36d25 <+837>: movups %xmm4,0x20(%rsi) 0x00007f7415d36d29 <+841>: pxor %xmm4,%xmm4 0x00007f7415d36d2d <+845>: movups %xmm5,0x30(%rsi) 0x00007f7415d36d31 <+849>: pxor %xmm5,%xmm5 0x00007f7415d36d35 <+853>: movups %xmm6,0x40(%rsi) 0x00007f7415d36d39 <+857>: pxor %xmm6,%xmm6 0x00007f7415d36d3d <+861>: movups %xmm7,0x50(%rsi) 0x00007f7415d36d41 <+865>: pxor %xmm7,%xmm7 0x00007f7415d36d45 <+869>: movups %xmm8,0x60(%rsi) 0x00007f7415d36d4a <+874>: pxor %xmm8,%xmm8 0x00007f7415d36d4f <+879>: movups %xmm9,0x70(%rsi) 0x00007f7415d36d54 <+884>: pxor %xmm9,%xmm9 0x00007f7415d36d59 <+889>: lea 0x80(%rsi),%rsi 0x00007f7415d36d60 <+896>: add $0x80,%rdx 0x00007f7415d36d67 <+903>: je 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36d6d <+909>: movups (%rdi),%xmm2 0x00007f7415d36d70 <+912>: cmp $0x20,%rdx 0x00007f7415d36d74 <+916>: jb 0x7f7415d36e10 <aesni_ecb_encrypt+1072> 0x00007f7415d36d7a <+922>: movups 0x10(%rdi),%xmm3 0x00007f7415d36d7e <+926>: je 0x7f7415d36e40 <aesni_ecb_encrypt+1120> 0x00007f7415d36d84 <+932>: movups 0x20(%rdi),%xmm4 0x00007f7415d36d88 <+936>: cmp $0x40,%rdx 0x00007f7415d36d8c <+940>: jb 0x7f7415d36e60 <aesni_ecb_encrypt+1152> 0x00007f7415d36d92 <+946>: movups 0x30(%rdi),%xmm5 0x00007f7415d36d96 <+950>: je 0x7f7415d36e90 <aesni_ecb_encrypt+1200> 0x00007f7415d36d9c <+956>: movups 0x40(%rdi),%xmm6 0x00007f7415d36da0 <+960>: cmp $0x60,%rdx 0x00007f7415d36da4 <+964>: jb 0x7f7415d36ec0 <aesni_ecb_encrypt+1248> 0x00007f7415d36daa <+970>: movups 0x50(%rdi),%xmm7 0x00007f7415d36dae <+974>: je 0x7f7415d36f00 <aesni_ecb_encrypt+1312> 0x00007f7415d36db4 <+980>: movups 0x60(%rdi),%xmm8 0x00007f7415d36db9 <+985>: movups (%rcx),%xmm0 0x00007f7415d36dbc <+988>: xorps %xmm9,%xmm9 0x00007f7415d36dc0 <+992>: callq 0x7f7415d368d0 <_aesni_decrypt8> 0x00007f7415d36dc5 <+997>: movups %xmm2,(%rsi) 0x00007f7415d36dc8 <+1000>: pxor %xmm2,%xmm2 0x00007f7415d36dcc <+1004>: movups %xmm3,0x10(%rsi) 0x00007f7415d36dd0 <+1008>: pxor %xmm3,%xmm3 0x00007f7415d36dd4 <+1012>: movups %xmm4,0x20(%rsi) 0x00007f7415d36dd8 <+1016>: pxor %xmm4,%xmm4 0x00007f7415d36ddc <+1020>: movups %xmm5,0x30(%rsi) 0x00007f7415d36de0 <+1024>: pxor %xmm5,%xmm5 0x00007f7415d36de4 <+1028>: movups %xmm6,0x40(%rsi) 0x00007f7415d36de8 <+1032>: pxor %xmm6,%xmm6 0x00007f7415d36dec <+1036>: movups %xmm7,0x50(%rsi) 0x00007f7415d36df0 <+1040>: pxor %xmm7,%xmm7 0x00007f7415d36df4 <+1044>: movups %xmm8,0x60(%rsi) 0x00007f7415d36df9 <+1049>: pxor %xmm8,%xmm8 0x00007f7415d36dfe <+1054>: pxor %xmm9,%xmm9 0x00007f7415d36e03 <+1059>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36e08 <+1064>: nopl 0x0(%rax,%rax,1) 0x00007f7415d36e10 <+1072>: movups (%rcx),%xmm0 0x00007f7415d36e13 <+1075>: movups 0x10(%rcx),%xmm1 0x00007f7415d36e17 <+1079>: lea 0x20(%rcx),%rcx 0x00007f7415d36e1b <+1083>: xorps %xmm0,%xmm2 0x00007f7415d36e1e <+1086>: aesdec %xmm1,%xmm2 0x00007f7415d36e23 <+1091>: dec %eax 0x00007f7415d36e25 <+1093>: movups (%rcx),%xmm1 0x00007f7415d36e28 <+1096>: lea 0x10(%rcx),%rcx 0x00007f7415d36e2c <+1100>: jne 0x7f7415d36e1e <aesni_ecb_encrypt+1086> 0x00007f7415d36e2e <+1102>: aesdeclast %xmm1,%xmm2 0x00007f7415d36e33 <+1107>: movups %xmm2,(%rsi) 0x00007f7415d36e36 <+1110>: pxor %xmm2,%xmm2 0x00007f7415d36e3a <+1114>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36e3f <+1119>: nop 0x00007f7415d36e40 <+1120>: callq 0x7f7415d363a0 <_aesni_decrypt2> 0x00007f7415d36e45 <+1125>: movups %xmm2,(%rsi) 0x00007f7415d36e48 <+1128>: pxor %xmm2,%xmm2 0x00007f7415d36e4c <+1132>: movups %xmm3,0x10(%rsi) 0x00007f7415d36e50 <+1136>: pxor %xmm3,%xmm3 0x00007f7415d36e54 <+1140>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36e59 <+1145>: nopl 0x0(%rax) 0x00007f7415d36e60 <+1152>: callq 0x7f7415d36470 <_aesni_decrypt3> 0x00007f7415d36e65 <+1157>: movups %xmm2,(%rsi) 0x00007f7415d36e68 <+1160>: pxor %xmm2,%xmm2 0x00007f7415d36e6c <+1164>: movups %xmm3,0x10(%rsi) 0x00007f7415d36e70 <+1168>: pxor %xmm3,%xmm3 0x00007f7415d36e74 <+1172>: movups %xmm4,0x20(%rsi) 0x00007f7415d36e78 <+1176>: pxor %xmm4,%xmm4 0x00007f7415d36e7c <+1180>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36e81 <+1185>: nopl 0x0(%rax,%rax,1) 0x00007f7415d36e86 <+1190>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36e90 <+1200>: callq 0x7f7415d36570 <_aesni_decrypt4> 0x00007f7415d36e95 <+1205>: movups %xmm2,(%rsi) 0x00007f7415d36e98 <+1208>: pxor %xmm2,%xmm2 0x00007f7415d36e9c <+1212>: movups %xmm3,0x10(%rsi) 0x00007f7415d36ea0 <+1216>: pxor %xmm3,%xmm3 0x00007f7415d36ea4 <+1220>: movups %xmm4,0x20(%rsi) 0x00007f7415d36ea8 <+1224>: pxor %xmm4,%xmm4 0x00007f7415d36eac <+1228>: movups %xmm5,0x30(%rsi) 0x00007f7415d36eb0 <+1232>: pxor %xmm5,%xmm5 0x00007f7415d36eb4 <+1236>: jmp 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36eb6 <+1238>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36ec0 <+1248>: xorps %xmm7,%xmm7 0x00007f7415d36ec3 <+1251>: callq 0x7f7415d366e0 <_aesni_decrypt6> 0x00007f7415d36ec8 <+1256>: movups %xmm2,(%rsi) 0x00007f7415d36ecb <+1259>: pxor %xmm2,%xmm2 0x00007f7415d36ecf <+1263>: movups %xmm3,0x10(%rsi) 0x00007f7415d36ed3 <+1267>: pxor %xmm3,%xmm3 0x00007f7415d36ed7 <+1271>: movups %xmm4,0x20(%rsi) 0x00007f7415d36edb <+1275>: pxor %xmm4,%xmm4 0x00007f7415d36edf <+1279>: movups %xmm5,0x30(%rsi) 0x00007f7415d36ee3 <+1283>: pxor %xmm5,%xmm5 0x00007f7415d36ee7 <+1287>: movups %xmm6,0x40(%rsi) 0x00007f7415d36eeb <+1291>: pxor %xmm6,%xmm6 0x00007f7415d36eef <+1295>: pxor %xmm7,%xmm7 0x00007f7415d36ef3 <+1299>: jmp 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36ef5 <+1301>: nop 0x00007f7415d36ef6 <+1302>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36f00 <+1312>: callq 0x7f7415d366e0 <_aesni_decrypt6> 0x00007f7415d36f05 <+1317>: movups %xmm2,(%rsi) 0x00007f7415d36f08 <+1320>: pxor %xmm2,%xmm2 0x00007f7415d36f0c <+1324>: movups %xmm3,0x10(%rsi) 0x00007f7415d36f10 <+1328>: pxor %xmm3,%xmm3 0x00007f7415d36f14 <+1332>: movups %xmm4,0x20(%rsi) 0x00007f7415d36f18 <+1336>: pxor %xmm4,%xmm4 0x00007f7415d36f1c <+1340>: movups %xmm5,0x30(%rsi) 0x00007f7415d36f20 <+1344>: pxor %xmm5,%xmm5 0x00007f7415d36f24 <+1348>: movups %xmm6,0x40(%rsi) 0x00007f7415d36f28 <+1352>: pxor %xmm6,%xmm6 0x00007f7415d36f2c <+1356>: movups %xmm7,0x50(%rsi) 0x00007f7415d36f30 <+1360>: pxor %xmm7,%xmm7 0x00007f7415d36f34 <+1364>: xorps %xmm0,%xmm0 0x00007f7415d36f37 <+1367>: pxor %xmm1,%xmm1 0x00007f7415d36f3b <+1371>: repz retq End of assembler dump. ```
i r ``` (gdb) i r rax 0xfc0e5f44 4228800324 rbx 0x7f7427087200 140136847798784 rcx 0x7f740adfd000 140136375373824 rdx 0x10 16 rsi 0x7f73cb204618 140135305856536 rdi 0x7f73cb204638 140135305856568 rbp 0x7ffd3f1ec9e0 0x7ffd3f1ec9e0 rsp 0x7ffd3f1ec820 0x7ffd3f1ec820 r8 0x1 1 r9 0x0 0 r10 0x0 0 r11 0x7f73cbc5c430 140135316702256 r12 0x55c40d6292d3 94300526514899 r13 0x40000000 1073741824 r14 0x10000000 268435456 r15 0x6 6 rip 0x55c40d265430 0x55c40d265430 <main+26065> eflags 0x10287 [ CF PF SF IF RF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0 ```