### Description
This occurs more frequently when we have lots of presence subscriptions which we are able to reproduce in a test environment. Thus far it appears this only occurs when using TLS as opposed to UDP\TCP.
### Troubleshooting
Appears to be an issue in libcrypto.so.1.1 but not sure where to start.
#### Reproduction
8000+ presence subscriptions via TLS.
#### Debugging Data
``` gdb /path/to/kamailio /path/to/corefile GNU gdb (Debian 7.12-6) 7.12.0.20161007-git Copyright (C) 2016 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: http://www.gnu.org/software/gdb/bugs/. Find the GDB manual and other documentation resources online at: http://www.gnu.org/software/gdb/documentation/. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/local/kamailio/sbin/kamailio...done. [New LWP 35028] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/local/kamailio/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /usr/loc'. Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007ff9faf54645 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
bt full #0 0x00007ff9faf54645 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #1 0x00007ff9fb030677 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #2 0x00007ff9fb03cc0b in EVP_EncryptUpdate () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #3 0x00007ff9fb06f811 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #4 0x00007ff9fb070737 in RAND_DRBG_generate () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #5 0x00007ff9fb07097d in RAND_DRBG_bytes () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #6 0x00007ff9fb3ca628 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1 No symbol table info available. #7 0x00007ff9fb3c7691 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1 No symbol table info available. #8 0x00007ff9fb3c81ce in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1 No symbol table info available. #9 0x00007ff9fb3da9e3 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1 No symbol table info available. #10 0x00007ff9fb3dab23 in SSL_write () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1 No symbol table info available. #11 0x00007ff9efb3b79c in tls_encode_f (c=0x7ff9b08aff78, pbuf=0x7ffe163fb3d0, plen=0x7ffe163fb3c8, rest_buf=0x7ffe163fb3d8, rest_len=0x7ffe163fb3cc, send_flags=0x7ffe163fb3bc) at tls_server.c:828 n = 0 offs = 0 ssl = 0x7ff9b13160f8 tls_c = 0x7ff9b064ae68 wr_buf = "\027\003\003\002 n\017\031\247%%T\r8O\334\350\005r\277Kk\326\334\377\t\b\r\266\267\242\374\354:\265#"\224\333t\265\226\226\005~\361\230\237\020w\211}z\212,R\323_\367>\211\220\237\tC\244\303Ы\252\303B\020\a\240\216\366\024\206\212\201'\253G\304#\301M\333\3 20Ӂ\254\332!\341&Im\336GX\264\003\313Փp\353\226vV\034m\030\005\r\235+~\376,\236\\\316A\341f*fj\t\206\315\365Z\320͉\367xCj\344\235G#x\361T\005\216\234\363\227r\026\a\361_o\r_\274\v\340F\333%\262\336\273\023\060~\321?N\302\312L\004!\260i\340\300\324\361\371Җ\273\323X\f\332멵 \224\226\321E\343y)"... rd = {buf = 0x0, pos = 0, used = 0, size = 0} wr = { buf = 0x7ff9efd75e20 <wr_buf> "\027\003\003\002 n\017\031\247%%T\r8O\334\350\005r\277Kk\326\334\377\t\b\r\266\267\242\374\354:\265#"\224\333t\265\226\226\005~\361\230\237\020w\211}z\212,R\323_\367>\211\220\237\tC\244\303Ы\252\303B\020\a\240\216\366\024\206\212\20 1'\253G\304#\301M\333\320Ӂ\254\332!\341&Im\336GX\264\003\313Փp\353\226vV\034m\030\005\r\235+~\376,\236\\\316A\341f*fj\t\206\315\365Z\320͉\367xCj\344\235G#x\361T\005\216\234\363\227r\026\a\361_o\r_\274\v\340F\333%\262\336\273\023\060~\321?N\302\312L\004!\260i\340\300\324\36 1\371Җ\273\323X\f\332", <incomplete sequence \353\251>..., pos = 0, used = 0, size = 65536} ssl_error = 0 err_src = 0x7ff9efb65a87 "TLS write:" buf = 0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"... len = 1255 x = 373273376 __func__ = "tls_encode_f" #12 0x00005642297e1ca4 in tcpconn_send_put (c=0x7ff9b08aff78, buf=0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len=1255, send_flags=...) at core/tcp_main.c:2297 tmp = 0x7ff9af343808 fd = 10 response = {140729271694352, 0} n = 0 do_close_fd = 0 rest_buf = 0x0 t_buf = 0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"... rest_len = 0 t_len = 1255 resp = 140729271694352 t_send_flags = {f = 4, blst_imask = 0} fd_cache_e = 0x0 use_fd_cache = 0 __func__ = "tcpconn_send_put" #13 0x00005642297df397 in tcp_send (dst=0x7ff9b1693278, from=0x7ffe163fb610, buf=0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len=1255) at core/tcp_main.c:2077 c = 0x7ff9b08aff78 ip = {af = 2, len = 4, u = {addrl = {94844456114514, 140711573739219}, addr32 = {2988284242, 22082, 4150154963, 32761}, addr16 = {39250, 45597, 22082, 0, 22227, 63326, 32761, 0}, addr = "R\231\035\262BV\000\000\323V^\367\371\177\000"}} port = 39502 fd = 373274128 response = {140729271694776, 94842167197447} n = 22082 con_lifetime = 57680 rest_buf = 0x5642298efffc <sr_event_exec+482> "\211E\374\213E\374\351A\002" t_buf = 0x7ffe163fb510 "\323V^\367\371\177" rest_len = 22082 t_len = 697859842 resp = 836 t_send_flags = {f = 0, blst_imask = 0} __func__ = "tcp_send" #14 0x00007ff9f758d961 in msg_send_buffer (dst=0x7ff9b1693278, buf=0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len=1255, flags=0) at ../../core/forward.h:282 new_dst = {send_sock = 0x1, to = {s = {sa_family = 53808, sa_data = "\275\260\371\177\000\000(\254ΰ\371\177\000"}, sin = {sin_family = 53808, sin_port = 45245, sin_addr = {s_addr = 32761}, sin_zero = "(\254ΰ\371\177\000"}, sin6 = {sin6_family = 53808, sin6_port = 45245, sin6_flowinfo = 32761, sin6_addr = {__in6_u = {__u6_addr8 = "(\254ΰ\371\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {44072, 45262, 32761, 0, 0, 0, 0, 0}, __u6_addr32 = {2966334504, 32761, 0, 0}}}, sin6_scope_id = 699223731}}, id = 22082, proto = 2 '\002', send_flags = {f = 0, blst_imask = 0}} outb = {s = 0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len = 1255} netinfo = {data = {s = 0x100000002 <error: Cannot access memory at address 0x100000002>, len = 0}, rcv = 0x7ff9b0bdc4a0, dst = 0x7ff9f3f607ad <p_tm_callback>} evp = {data = 0x7ffe163fb690, rcv = 0x0, dst = 0x7ff9b1693278} port = 373274592 ip = {af = 4150157560, len = 32761, u = {addrl = {140710389918760, 0}, addr32 = {2966334504, 32761, 0, 0}, addr16 = {44072, 45262, 32761, 0, 0, 0, 0, 0}, addr = "(\254ΰ\371\177\000\000\000\000\000\000\000\000\000"}} from = 0x7ffe163fb610 local_addr = {s = {sa_family = 2, sa_data = "\000\000>\347\211e\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 0, sin_addr = {s_addr = 1703536446}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 0, sin6_flowinfo = 1703536446, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}} con = 0x0 wsev = {type = 699223731, buf = 0x7ff9af2f26c8 "", len = 268435456, id = 0} ret = 32766 __func__ = "msg_send_buffer" #15 0x00007ff9f758fd1f in send_pr_buffer (rb=0x7ff9b1693228, buf=0x7ff9b0bdcd48, len=1255) at t_funcs.c:70 __func__ = "send_pr_buffer" #16 0x00007ff9f7566edd in send_prepared_request_impl (request=0x7ff9b1693228, retransmit=1, branch=0) at uac.c:643 t = 0x7ff9b1693008 p_msg = 0x0 uac = 0x7ff9b1693218 ip = {af = 4037853376, len = 32761, u = {addrl = {516093936486, 140711461450400}, addr32 = {697860966, 120, 4037866144, 32761}, addr16 = {33638, 10648, 120, 0, 62112, 61612, 32761, 0}, addr = "f\203\230)x\000\000\000\240\362\254\360\371\177\000"}} ret = -1318506488 __func__ = "send_prepared_request_impl" #17 0x00007ff9f7568365 in t_uac_with_ids (uac_r=0x7ffe163fbe70, ret_index=0x0, ret_label=0x0) at uac.c:720 request = 0x7ff9b1693228 cell = 0x7ff9b1693008 ret = 1 is_ack = 0 branch_ret = 32761 i = 0 added_branches = 1 #18 0x00007ff9f75682a7 in t_uac (uac_r=0x7ffe163fbe70) at uac.c:695 No locals. #19 0x00007ff9f756a62b in req_within (uac_r=0x7ffe163fbe70) at uac.c:929 ret = 744 nbuf = "\260\272?\026\376\177\000\000\220\272?\026\376\177\000\000 \313\n\374\371\177\000\000\060\304\n\374\371\177", '\000' <repeats 18 times>, "\360\274?\026\376\177\000\000\300\275?\026\376\177\000\000\263N\255)BV\000\000\000\000\000@\000\000\000\000\000\000\000\ 020\000\000\000\000\006\000\000\000\000\000\000\000\360\275?\026\376\177\000\000:\023\365\363\371\177\000\000\000\273?\026\376\177\000\000\ e\373\371\177\000\000C\003\000\000\000\000\000\000\020\200\360\373\371\177\000\000p\272?\026\001\000\000\000\332\336\327*BV\000\000`\ 356\n\374\371\177\000\000\300\303?\026\376\177\000\000\000\000\000\000\000\000\000\000`$֯\371\177\000\000\b\224\f\374\371\177\000\000$"... dbuf = "\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\020\272?\026\376\177\000\000\377*\253\360\371\177\000\000\360\271?\026\376\177\000\000\300\275?\026\376\177\000\000\263N\255)BV\000\000\000\000\000@\000\000\000\000\377\377\377\377", '\000' <re peats 11 times> ouri = {s = 0x7ff9fc0b1250 "sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk", len = 0} nuri = {s = 0x7ffe163fb9b0 "\260\272?\026\376\177", len = 0} duri = {s = 0x7ffe163fb960 "", len = 0} __func__ = "req_within" #20 0x00007ff9f3f5deb7 in send_notify_request (subs=0x7ffe163fc2f0, watcher_subs=0x0, n_body=0x0, force_null_body=0) at notify.c:1604 td = 0x7ff9fc0af9e8 met = {s = 0x7ff9f3fd3334 "NOTIFY", len = 6} str_hdr = {s = 0x7ff9fc0ad778 "Max-Forwards: 70\r\nEvent: presence\r\nContact: sip:62.231.137.101:5071;transport=tls\r\nSubscription-State: active;expires=3600\r\nContent-Type: application/pidf+xml\r\n", len = 162} notify_body = 0x7ff9fc0c2548 result = 0 cb_param = 0x7ff9b0bdc4a0 final_body = 0x0 uac_r = {method = 0x7ffe163fbee0, headers = 0x7ffe163fbed0, body = 0x7ff9fc0c2548, ssock = 0x0, dialog = 0x7ff9fc0af9e8, cb_flags = 1024, cb = 0x7ff9f3f607ad <p_tm_callback>, cbp = 0x7ff9b0bdc4a0, callid = 0x0} aux_body = 0x0 backup_subs = 0x7ff9fbfe0a70 __func__ = "send_notify_request" #21 0x00007ff9f3f5f5b3 in notify (subs=0x7ffe163fc2f0, watcher_subs=0x0, n_body=0x0, force_null_body=0, aux_body_processing=0x0) at notify.c:1703 aux_body = 0x0 __func__ = "notify" #22 0x00007ff9f3fa2b4b in update_subscription (msg=0x7ff9fc09c150, subs=0x7ffe163fc2f0, to_tag_gen=1, sent_reply=0x7ffe163fc12c) at subscribe.c:724 hash_code = 6046 __func__ = "update_subscription" #23 0x00007ff9f3fa9857 in handle_subscribe (msg=0x7ff9fc09c150, watcher_user=..., watcher_domain=...) at subscribe.c:1284 to_tag_gen = 1 subs = {pres_uri = {s = 0x7ff9fc0c9408 "sip:229@itec-support.sysconfig.co.uk", len = 36}, to_user = { s = 0x7ff9b08b0340 "229@itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: "500" <sip:500@192.168.128.27:60700;transpor"..., len = 3}, to_domain = { s = 0x7ff9b08b0344 "itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: "500" <sip:500@192.168.128.27:60700;transport=tl"..., len = 28}, from_user = { s = 0x7ff9b08b0307 "500@itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: "..., len = 3}, from_domain = { s = 0x7ff9b08b030b "itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\n"..., len = 28}, watcher_user = { s = 0x7ff9b08b0307 "500@itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: "..., len = 3}, watcher_domain = { s = 0x7ff9b08b030b "itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\n"..., len = 28}, event = 0x7ff9afd62460, event_id = {s = 0x0, len = 0}, to_tag = {s = 0x7ff9f780a460 <tm_tags> "4984a63b2f097c424789ea70bd115f49-e427", len = 37}, from_tag = { s = 0x7ff9b08b032d "219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: "500" <sip:500@192.168.12"..., len = 8}, callid = { s = 0x7ff9b08b02b1 "0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "500" sip:500@itec-support.sysconfig.co.uk;tag=219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.1"..., len = 48}, sockinfo_str = {s = 0x7ff9fc090118 "tls:62.231.137.101:5071", len = 23}, remote_cseq = 1, local_cseq = 1, contact = {s = 0x7ff9fc0b1250 "sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk", len = 86}, local_contact = { s = 0x7ff9fc053930 "sip:62.231.137.101:5071;transport=tls", len = 37}, record_route = {s = 0x0, len = 0}, expires = 3600, status = 1, reason = {s = 0x0, len = 0}, version = 1, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1, internal_update_flag = 0, updated = -1, updated_winfo = -1, flags = 0, user_agent = {s = 0x7ff9b08b0449 "serveline1.1.1Windows 10\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 24}, next = 0x0} event = 0x7ff9afd62460 parsed_event = 0x7ff9fc0a8f90 ev_param = 0x0 found = 1 reason = {s = 0x0, len = 0} uri = {user = {s = 0x7ff9b08b03a0 "109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: "500" sip:500@192.168.128.27:60700;transport=tls;registering_acc=itec-support_sysconfig_co_uk\r\nUser-Agent: serveline1.1.1Windows 10\r\nEvent"..., len = 373277152}, passwd = {s = 0x4f8 <error: Cannot access memory at address 0x4f8>, len = 2}, host = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, port = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, params = { s = 0x7ffe163fc1f0 "@\334\327*BV", len = 697988931}, sip_params = {s = 0x7ffe163fc280 "g\025\366\373\371\177", len = -66469552}, headers = {s = 0x7ffe163fc1e0 "", len = -67096472}, port_no = 49824, proto = 5695, type = 32766, flags = (unknown: 498511872), transport = {s = 0x7ff9fc0030b0 "\a\003\213\260\371\177", len = 373277392}, ttl = {s = 0x0, len = -67758744}, user_param = {s = 0x56422ad7dc40 " #\330*BV", len = 0}, maddr = {s = 0x7ff9fbf6156b "", len = -185595711}, method = {s = 0x0, len = 373277616}, lr = { s = 0xfffffffffc050db0 <error: Cannot access memory at address 0xfffffffffc050db0>, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7ff9fbf61568 "500", len = 0}, transport_val = {s = 0x0, len = -67758744}, ttl_val = { s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x7ff9fbf61567 "", len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = { s = 0xf900000000 <error: Cannot access memory at address 0xf900000000>, len = -66469552}, gr_val = { s = 0x7ff9b08b02b1 "0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "500" sip:500@itec-support.sysconfig.co.uk;tag=219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.1"..., len = 48}} reply_code = 500 reply_str = {s = 0x7ff9f3fdca3d "Server Internal Error", len = 21} sent_reply = 1 __func__ = "handle_subscribe" #24 0x00007ff9f3fa5964 in handle_subscribe0 (msg=0x7ff9fc09c150) at subscribe.c:1033 pfrom = 0x7ff9fc003068 __func__ = "handle_subscribe0" #25 0x0000564229768e4f in do_action (h=0x7ffe163fcc30, a=0x7ff9fc057968, msg=0x7ff9fc09c150) at core/action.c:1067 ret = -5 v = 699223731 dst = {send_sock = 0x133438, to = {s = {sa_family = 53480, sa_data = "\034\000\000\000\000\000@\033\003\374\371\177\000"}, sin = {sin_family = 53480, sin_port = 28, sin_addr = {s_addr = 0}, sin_zero = "@\033\003\374\371\177\000"}, sin6 = {sin6_family = 53480, sin6_port = 28, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "@\033\003\374\371\177\000\000`\t\003\374\371\177\000", __u6_addr16 = {6976, 64515, 32761, 0, 2400, 64515, 32761, 0}, __u6_addr32 = {4228062016, 32761, 4228057440, 32761}}}, sin6_scope_id = 4228497744}}, id = 32761, proto = -112 '\220', send_flags = {f = 5695, blst_imask = 32766}} tmp = 0x40000000 <error: Cannot access memory at address 0x40000000> new_uri = 0x7ff9fc0464f8 "\032" end = 0x7ff9fc09c150 "!\024" crt = 0x564229ad4eb3 "INFO" cmd = 0x7ff9fbfc3148 len = 258327944 user = 982029481 uri = {user = {s = 0x7ffe163fc8c0 "", len = 695389545}, passwd = {s = 0x7ff9fc019b00 "\002", len = -66469552}, host = {s = 0x7ffe163fc8a8 "\360\302\345\365\371\177", len = 16}, port = {s = 0x7ffe163fc8d0 "\357\302\345\365\371\177", len = 373279888}, params = { s = 0x0, len = 0}, sip_params = {s = 0x0, len = -1}, headers = {s = 0x0, len = 16}, port_no = 62000, proto = 64521, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x564200000000 <error: Cannot access memory at address 0x564200000000>, len = 116}, ttl = {s = 0x7ffe163fc920 "\263N\255)BV", len = 0}, user_param = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 132}, maddr = {s = 0x7ff9f5e5c2e6 "%s: %s%.*s", len = 3}, method = {s = 0x7ff9fc09c150 "!\024", len = -169491728}, lr = { s = 0x7ff9fc0a2cb0 "8\213\f\374\371\177", len = -66469552}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7ff9f5e5c2ef "s", len = 697869913}, transport_val = {s = 0x7ff9fc02c790 "!", len = 16}, ttl_val = {s = 0x7ff9fbfbb0a8 "\315\352S\366\371\177", len = 373280352}, user_param_val = {s = 0x7ff9fc019ae8 "\024", len = 0}, maddr_val = {s = 0x564229ad4eb3 "INFO", len = 2}, method_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, lr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2_val = { s = 0x7ffe163fc9e0 "\320\317?\026\376\177", len = 696865318}, gr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 266546968}} next_hop = {user = {s = 0x7ffe163fc6a0 "\320\306?\026\376\177", len = 373278720}, passwd = {s = 0x15d6bf724 <error: Cannot access memory at address 0x15d6bf724>, len = -1342808584}, host = {s = 0x7ffe163fc6b0 "\320\306?\026\376\177", len = -270932943}, port = { s = 0x7ff9b145d960 "$\367k]\257", len = -1342808584}, params = {s = 0x7ffe163fc6d0 "`\314?\026\376\177", len = 2}, sip_params = {s = 0x7ffe163fc6d0 "`\314?\026\376\177", len = 1}, headers = { s = 0x772410000000 <error: Cannot access memory at address 0x772410000000>, len = 718789696}, port_no = 52320, proto = 5695, type = 32766, flags = (URI_SIP_USER_PHONE | unknown: 201770324), transport = {s = 0x7ffe163fcc78 "\251\224\260\020\031\273\035\", len = 0}, ttl = {s = 0x7ffa0c06c559 "n!"", len = 200606905}, user_param = {s = 0x7ffe163fc810 "\320\310?\026\376\177", len = -1355863720}, maddr = {s = 0x7ffe163fcc28 "\220\344?\026\376\177", len = 35028}, method = {s = 0x7ffe163fc7c8 "", len = 10}, lr = { s = 0x7ffe163fcc23 "\374\371\177", len = 1550670948}, r2 = {s = 0x0, len = 0}, gr = {s = 0x564200000000 <error: Cannot access memory at address 0x564200000000>, len = -1}, transport_val = { s = 0x564200000000 <error: Cannot access memory at address 0x564200000000>, len = 0}, ttl_val = {s = 0x0, len = 32}, user_param_val = {s = 0x7ffe00000005 <error: Cannot access memory at address 0x7ffe00000005>, len = 200793134}, maddr_val = { s = 0x7ffe163fc840 "", len = 116}, method_val = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 718789696}, lr_val = {s = 0x7ffe163fcd40 " n\005\374\371\177", len = -169491738}, r2_val = {s = 0x7ffe163fce48 "8\320?\026\376\177", len = 0}, gr_val = {s = 0x74 <error: Cannot access memory at address 0x74>, len = 200606905}} u = 0x2 port = 0 dst_host = 0x5642297769ba <run_actions_safe+151> i = 1 flags = 32761 avp = 0x0 st = {flags = 175, id = 0, name = {n = -1356099584, s = {s = 0x7ff9af2b9000 "", len = 1}, re = 0x7ff9af2b9000}, avp = 0x7ff9b145d960} sct = 0x10000000 sjt = 0x40000000 rve = 0x7ff9fc0464f8 mct = 0x564229ad4eb3 rv = 0x7ff9efdcf7ac rv1 = 0x7ffe163fe490 c1 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 6, s = {s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = 373278288}, re = 0x100000006}, pval = {rs = { s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = 373278288}, ri = 697906361, flags = 22082}}, i2s = "\000\365\334\357\371\177\000\000`\337\327*\272\000\000\000\310%\335\357\371\177"} s = {s = 0x564229ad4eb3 "INFO", len = -1355864376} srevp = {0x7ffe163fc600, 0x5642299854d8 <futex_release+29>} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #26 0x000056422977635e in run_actions (h=0x7ffe163fcc30, a=0x7ff9fc057968, msg=0x7ff9fc09c150) at core/action.c:1564 t = 0x7ff9fc057968 ret = -1 ms = 0 __func__ = "run_actions" #27 0x00005642297769ba in run_actions_safe (h=0x7ffe163fe490, a=0x7ff9fc057968, msg=0x7ff9fc09c150) at core/action.c:1625 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {2, 1109510072046228649, 94842167054003, 1073741824, 268435456, 6, 1109510072092365993, 6637667142142563497}, __mask_was_saved = 0, __saved_mask = {__val = {1073741824, 268435456, 6, 140729271700736, 94842165820044, 268435456, 140711652082000, 140729271700992, 140711651455080, 1, 2, 140711651455152, 140729271701200, 140711651767776, 140711652082000, 140729271700896}}}}} ret = -1 ign_on_break = 0 #28 0x0000564229728515 in rval_get_int (h=0x7ffe163fe490, msg=0x7ff9fc09c150, i=0x7ffe163fd038, rv=0x7ff9fc056e20, cache=0x0) at core/rvalue.c:912 r_avp = 0x7ffe163fced0 avp_val = {n = 268435456, s = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, re = 0x10000000} pval = {rs = {s = 0x56422ad7de90 "`η\363\371\177", len = 2}, ri = 699223731, flags = 22082} tmp = {s = 0xdb18fdfb00007dfb <error: Cannot access memory at address 0xdb18fdfb00007dfb>, len = -67096400} s = 0x0 r = 21 ret = 0 destroy_pval = 0 __func__ = "rval_get_int" #29 0x000056422972ce86 in rval_expr_eval_int (h=0x7ffe163fe490, msg=0x7ff9fc09c150, res=0x7ffe163fd038, rve=0x7ff9fc056e18) at core/rvalue.c:1910 i1 = 373281968 i2 = 4 ret = -1 c1 = {cache_type = 4228497744, val_type = 32761, c = {avp_val = {n = 373286032, s = {s = 0x7ffe163fe490 "\003", len = 699223731}, re = 0x7ffe163fe490}, pval = {rs = {s = 0x7ffe163fe490 "\003", len = 699223731}, ri = 1073741824, flags = 0}}, i2s = '\000' <repeats 21 times>} c2 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 373280464, s = {s = 0x7ffe163fced0 "", len = 373280528}, re = 0x7ffe163fced0}, pval = {rs = {s = 0x7ffe163fced0 "", len = 373280528}, ri = 695389545, flags = 22082}}, i2s = "P\301\t\374\371\177\000\000\000\000\000\000\000\000\000\000\300\365\004\374\371\177"} rv1 = 0x5642298e4e63 <pv_value_destroy+175> rv2 = 0x564229ad4eb3 __func__ = "rval_expr_eval_int" #30 0x000056422972d2f6 in rval_expr_eval_int (h=0x7ffe163fe490, msg=0x7ff9fc09c150, res=0x7ffe163fd4b0, rve=0x7ff9fc057d10) at core/rvalue.c:1918 i1 = 0 i2 = 0 ret = -1 c1 = {cache_type = 1259528, val_type = RV_NONE, c = {avp_val = {n = 1889464, s = {s = 0x1cd4b8 <error: Cannot access memory at address 0x1cd4b8>, len = 1910816}, re = 0x1cd4b8}, pval = {rs = {s = 0x1cd4b8 <error: Cannot access memory at address 0x1cd4b8>, len = 1910816}, ri = 8, flags = 0}}, i2s = "\b\326\v\374\371\177\000\000\002\000\000\000\000\000\000\000(\a\003\374\371\177"} c2 = {cache_type = 373280848, val_type = 32766, c = {avp_val = {n = -169518741, s = {s = 0x7ff9f5e5596b <xlog_2_helper+990> "H\215e\330[A\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271", len = 268435456}, re = 0x7ff9f5e5596b <xlog_2_helper+990>}, pval = {rs = {s = 0x7ff9f5e5596b <xlog_2_helper+990> "H\215e\330[A\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271", len = 268435456}, ri = 6, flags = 0}}, i2s = "\377\377\377\377\000\000\000\000\220\307\v\374\371\177\000\000\b\326\v\374\371\177"} rv1 = 0x6 rv2 = 0x10000000 __func__ = "rval_expr_eval_int" #31 0x00005642297688ec in do_action (h=0x7ffe163fe490, a=0x7ff9fc059138, msg=0x7ff9fc09c150) at core/action.c:1043 ret = -5 v = 0 dst = {send_sock = 0x564229ad4eb3, to = {s = {sa_family = 0, sa_data = "\000@\000\000\000\000\000\000\000\020\000\000\000"}, sin = {sin_family = 0, sin_port = 16384, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\020\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 16384, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000", __u6_addr16 = {0, 4096, 0, 0, 6, 0, 0, 0}, __u6_addr32 = {268435456, 0, 6, 0}}}, sin6_scope_id = 373282272}}, id = 32766, proto = 34 '"', send_flags = {f = 10610, blst_imask = 22082}} tmp = 0x7ffe163fe490 "\003" new_uri = 0x7ffe163fd690 "" end = 0x56422972ca9d <rval_str_lop2+192> "\213E\354\353!\220\353\001\220H\213E\360H\211\307\350\033\224\377\377H\213E\370H\211\307\350\017\224\377\377\270" crt = 0x7ff9fc09c150 "!\024" cmd = 0x7ff9fbfbd2e8 len = 32766 user = 373283664 uri = {user = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 2}, passwd = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = { s = 0x7ffe163fd3e0 "\360\324?\026\376\177", len = 695690078}, params = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, sip_params = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, headers = { s = 0x7ffe163fd4a0 "\340\325?\026\376\177", len = 695389830}, port_no = 54240, proto = 5695, type = 32766, flags = (unknown: 4228497744), transport = {s = 0x7ff9fc044e88 "\026", len = 373281808}, ttl = {s = 0x7ff9fc0a0bc0 "", len = -66469552}, user_param = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, maddr = {s = 0x7ff9fc09c150 "!\024", len = 2}, method = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2 = {s = 0x7ffe163fd4f0 "\340\325?\026\376\177", len = 695691706}, gr = {s = 0x7ff9fc09c150 "!\024", len = -66469552}, transport_val = {s = 0x7ff9fc044e88 "\026", len = 373286032}, ttl_val = {s = 0x0, len = 1}, user_param_val = { s = 0x2 <error: Cannot access memory at address 0x2>, len = 147362985}, maddr_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = { s = 0xf65c588098894a9 <error: Cannot access memory at address 0xf65c588098894a9>, len = 280007849}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x564229a81f30 <__func__.7452> "rval_destroy", len = 2}} next_hop = {user = {s = 0x7ff9fc07e410 "\004", len = 373286032}, passwd = {s = 0x0, len = -1}, host = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 231249065}, port = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, params = { s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, sip_params = {s = 0xf65c5880e8894a9 <error: Cannot access memory at address 0xf65c5880e8894a9>, len = 280007849}, headers = {s = 0x0, len = 6}, port_no = 53920, proto = 5695, type = 32766, flags = (URI_SIP_USER_PHONE | unknown: 695690076), transport = {s = 0x7ffe163fd350 "", len = 200818532}, ttl = {s = 0x7ff9fbfbbe98 "A\234.\366\371\177", len = 0}, user_param = {s = 0x18 <error: Cannot access memory at address 0x18>, len = 718625520}, maddr = {s = 0x0, len = -66469552}, method = {s = 0x7ff9fc01ffc8 ".", len = 373281488}, lr = {s = 0x27163fd350 <error: Cannot access memory at address 0x27163fd350>, len = -152772320}, r2 = { s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = -1}, gr = {s = 0x7ffe163fd360 "\240\324?\026\376\177", len = 695371029}, transport_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, ttl_val = { s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 0}, user_param_val = {s = 0x7ff9fc07e650 "\004", len = 373282200}, maddr_val = {s = 0x7ff9fc09c150 "!\024", len = 373286032}, method_val = {s = 0x7ff9fc01ffc8 ".", len = 373286032}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 172528809}, gr_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}} u = 0x7ff9fc045930 port = 0 dst_host = 0x56422972ce86 <rval_expr_eval_int+154> i = 11 flags = 32761 avp = 0x0 st = {flags = 268435456, id = 0, name = {n = 6, s = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 373281392}, re = 0x6}, avp = 0x5642297769ba <run_actions_safe+151>} sct = 0x7ffe163fd5e0 sjt = 0x1 rve = 0x7ff9fc057d10 mct = 0x7ff9fc0806b0 rv = 0x40000000 rv1 = 0x0 c1 = {cache_type = 31, val_type = RV_NONE, c = {avp_val = {n = -66469552, s = {s = 0x5efc09c150 <error: Cannot access memory at address 0x5efc09c150>, len = 0}, re = 0x5efc09c150}, pval = {rs = { s = 0x5efc09c150 <error: Cannot access memory at address 0x5efc09c150>, len = 0}, ri = 0, flags = 0}}, i2s = "`\321?\026\376\177\000\000\002\000\000\000\000\000\000\000\263N\255)BV"} s = {s = 0x7ff9fc07e410 "\004", len = 373281168} srevp = {0x10000000, 0x7ff9fc09c150} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #32 0x000056422977635e in run_actions (h=0x7ffe163fe490, a=0x7ff9fc046148, msg=0x7ff9fc09c150) at core/action.c:1564 t = 0x7ff9fc059138 ret = 1 ms = 0 __func__ = "run_actions" #33 0x0000564229768dbb in do_action (h=0x7ffe163fe490, a=0x7ff9fc05cd78, msg=0x7ff9fc09c150) at core/action.c:1058 ret = 1 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0, blst_imask = 0}} tmp = 0x7ffe163fe490 "\003" new_uri = 0x0 end = 0x0 crt = 0x7ff9fc09c150 "!\024" cmd = 0x0 len = 32766 user = 373285360 uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffe163fda80 "\220\333?\026\376\177", len = 695690078}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 4228497744), transport = {s = 0x7ff9fbfd66c8 "\021", len = 373283504}, ttl = {s = 0x0, len = 0}, user_param = { s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, maddr = {s = 0x0, len = 2}, method = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2 = {s = 0x7ffe163fdb90 "\200\334?\026\376\177", len = 695691706}, gr = {s = 0x0, len = -66469552}, transport_val = {s = 0x7ff9fbfd66c8 "\021", len = 373286032}, ttl_val = {s = 0x0, len = 0}, user_param_val = { s = 0x2 <error: Cannot access memory at address 0x2>, len = 436769961}, maddr_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = { s = 0xf65c5881cc894a9 <error: Cannot access memory at address 0xf65c5881cc894a9>, len = 280007849}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} next_hop = {user = {s = 0x1700000303 <error: Cannot access memory at address 0x1700000303>, len = 31}, passwd = {s = 0x0, len = 0}, host = { s = 0x7ff9b06a6ff8 "w4nP\027C\022\035\310W\002\245ʷ\310ͣZCo\322\365\033U\211\260\355\273U\256\210\006\a\037\234\373;\217\067\rV_WK\376\225\233\002\351", <incomplete sequence \317>, len = -1335201800}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x7ff9fbfbbe98 "A\234.\366\371\177", len = 0}, user_param = {s = 0x0, len = 0}, maddr = { s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7ff9fbfd6818 port = 0 dst_host = 0x56422972ce86 <rval_expr_eval_int+154> i = 0 flags = 0 avp = 0x0 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x7ffe163fdc80 sjt = 0xffffffff rve = 0x7ff9fc045930 mct = 0x0 rv = 0x0 rv1 = 0x0 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #34 0x000056422977635e in run_actions (h=0x7ffe163fe490, a=0x7ff9fc05cd78, msg=0x7ff9fc09c150) at core/action.c:1564 t = 0x7ff9fc05cd78 ret = -1 ms = 0 __func__ = "run_actions" #35 0x00005642297655ca in do_action (h=0x7ffe163fe490, a=0x7ff9fbfd82b8, msg=0x7ff9fc09c150) at core/action.c:691 ret = -5 v = 0 dst = {send_sock = 0x7ffe0505e220, to = {s = {sa_family = 52220, sa_data = "\025\370\371\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 52220, sin_port = 63509, sin_addr = {s_addr = 32761}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 52220, sin6_port = 63509, sin6_flowinfo = 32761, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 268435456}}, id = 0, proto = -128 '\200', send_flags = {f = 4067, blst_imask = 0}} tmp = 0x564229988366 <qm_malloc+2331> "H\213E\270H\203\300\070\351*\003" new_uri = 0x7ff9b08b0389 "branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: "500" sip:500@192.168.128.27:60700;transport=tls;registering_acc=itec-support_sysconfig_co_uk\r\nUser-Agent: servelin"... end = 0xfc0af860 <error: Cannot access memory at address 0xfc0af860> crt = 0x7ffe163fe420 "" cmd = 0xe8 len = 0 user = 697859842 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 266547264}, host = {s = 0x400133310 <error: Cannot access memory at address 0x400133310>, len = 699405104}, port = { s = 0x1d2820 <error: Cannot access memory at address 0x1d2820>, len = 8}, params = {s = 0x7ffe163fe170 "", len = 698013910}, sip_params = {s = 0x7ffe163fe0c0 "\230\370\n\374\371\177", len = 697237500}, headers = {s = 0x0, len = 699362992}, port_no = 57712, proto = 5695, type = 32766, flags = (URI_SIP_USER_PHONE | unknown: 697859840), transport = {s = 0x7ff9fc0af898 "\001", len = -66386880}, ttl = {s = 0x7ffe163fe1c2 "\005\005\376\177", len = 373285315}, user_param = {s = 0x7ff9b08b04b6 "", len = -1333066871}, maddr = {s = 0x564229b04cc0 <__func__.6670> "parse_via", len = 699412136}, method = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -68124656}, lr = {s = 0x0, len = 1}, r2 = {s = 0x0, len = -66386936}, gr = { s = 0x500000000000000 <error: Cannot access memory at address 0x500000000000000>, len = 373285308}, transport_val = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1333066877}, ttl_val = { s = 0x429ad4eb3 <error: Cannot access memory at address 0x429ad4eb3>, len = -1333066872}, user_param_val = { s = 0x7ff9b08b0388 ";branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: "500" sip:500@192.168.128.27:60700;transport=tls;registering_acc=itec-support_sysconfig_co_uk\r\nUser-Agent: serveli"..., len = 5}, maddr_val = { s = 0x7ffe163fe300 " \344?\026\376\177", len = 698064145}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = -66389864}, r2_val = {s = 0x7ff9b08b04b6 "", len = -1333066904}, gr_val = {s = 0x0, len = -68124656}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 697897400}, lr_val = {s = 0x7ffe163fe050 "", len = -68124656}, r2_val = {s = 0x0, len = -68124656}, gr_val = { s = 0x7ffe163fe090 "\300\340?\026\376\177", len = -132789252}} u = 0x7ffe163fe420 port = 0 dst_host = 0x8 i = 15 flags = 0 avp = 0x7ff9b08b04b6 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x0 sjt = 0x5642298efffc <sr_event_exec+482> rve = 0x7ff9fbfd6818 mct = 0x7ffe163fe250 rv = 0x0 rv1 = 0x7ff9fc0a3610 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #36 0x000056422977635e in run_actions (h=0x7ffe163fe490, a=0x7ff9fbfd48f0, msg=0x7ff9fc09c150) at core/action.c:1564 t = 0x7ff9fbfd82b8 ret = 1 ms = 0 __func__ = "run_actions" #37 0x0000564229776a82 in run_top_route (a=0x7ff9fbfd48f0, msg=0x7ff9fc09c150, c=0x0) at core/action.c:1646 ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {2, 1109510072864117929, 94842167054003, 1073741824, 268435456, 6, 1109510072876700841, 6637667142142563497}, __mask_was_saved = 0, __saved_mask = {__val = {5910974510923775, 140729271706912, 140711585744231, 94842167054003, 0, 4611686022990790656, 140711652082000, 140729271707008, 94842164188576, 8523465072, 140711652082000, 1073741825, 0, 94842167054003, 2, 94842167054003}}}}} p = 0x7ffe163fe490 ret = 268435456 sfbk = 0 #38 0x0000564229899cd7 in receive_msg ( buf=0x7ff9b08b0270 "SUBSCRIBE sip:229@itec-support.sysconfig.co.uk SIP/2.0\r\nCall-ID: 0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "500" sip:500@itec-support.sysconfig.co.uk;tag=219479eb\r\nT"..., len=582, rcv_info=0x7ff9b08aff90) at core/receive.c:340 msg = 0x7ff9fc09c150 ctx = {rec_lev = 699309230, run_flags = 22082, last_retcode = 2, jmp_env = {{__jmpbuf = {94842167054003, 1073741824, 268435456, 6, 140729271707520, 94842165376397, 140729271707328, 0}, __mask_was_saved = 9, __saved_mask = {__val = {140710385483640, 140710385484400, 8589935174, 240518234113, 140710385484400, 9, 140710385484410, 36, 140710385484447, 7, 64, 94842167054003, 140710396387576, 2701802864640, 16383, 140710382972520}}}}} bctx = 0x2163fe970 ret = 32761 stats_on = 0 tvb = {tv_sec = 232196669440, tv_usec = 140710385484454} tve = {tv_sec = 17879092915, tv_usec = 140710385484982} tz = {tz_minuteswest = -1333067142, tz_dsttime = 32761} diff = 0 inb = {s = 0x7ff9b08b0270 "SUBSCRIBE sip:229@itec-support.sysconfig.co.uk SIP/2.0\r\nCall-ID: 0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "500" sip:500@itec-support.sysconfig.co.uk;tag=219479eb\r\nT"..., len = 582} netinfo = {data = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, rcv = 0x10000000, dst = 0x7ff9b08b02a8} keng = 0x0 evp = {data = 0x7ffe163fe610, rcv = 0x7ff9b08aff90, dst = 0x0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 __func__ = "receive_msg" #39 0x0000564229946431 in receive_tcp_msg ( tcpbuf=0x7ff9b08b0270 "SUBSCRIBE sip:229@itec-support.sysconfig.co.uk SIP/2.0\r\nCall-ID: 0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "500" sip:500@itec-support.sysconfig.co.uk;tag=219479eb\r\nT"..., len=582, rcv_info=0x7ff9b08aff90, con=0x7ff9b08aff78) at core/tcp_read.c:1399 buf = 0x0 bsize = 0 blen = 582 __func__ = "receive_tcp_msg" #40 0x0000564229948a39 in tcp_read_req (con=0x7ff9b08aff78, bytes_read=0x7ffe163fea00, read_flags=0x7ffe163fe9f8) at core/tcp_read.c:1631 bytes = 582 total_bytes = 582 resp = 1 size = 0 req = 0x7ff9b08afff8 dst = {send_sock = 0x7ffe163fe9f0, to = {s = {sa_family = 104, sa_data = "\213\260\371\177\000\000\000\000\000\000\001 \000"}, sin = {sin_family = 104, sin_port = 45195, sin_addr = {s_addr = 32761}, sin_zero = "\000\000\000\000\001 \000"}, sin6 = { sin6_family = 104, sin6_port = 45195, sin6_flowinfo = 32761, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\001 \000\000\200\300\f\374\371\177\000", __u6_addr16 = {0, 0, 8193, 0, 49280, 64524, 32761, 0}, __u6_addr32 = {0, 8193, 4228694144, 32761}}}, sin6_scope_id = 373287104}}, id = 32766, proto = 1 '\001', send_flags = {f = 0, blst_imask = 80}} c = 67 'C' ret = 0 __func__ = "tcp_read_req" #41 0x000056422994c596 in handle_io (fm=0x7ff9fc0cc080, events=1, idx=-1) at core/tcp_read.c:1862 ret = 0 n = 22082 read_flags = 1 con = 0x7ff9b08aff78 s = 0 resp = 1 t = 80 __func__ = "handle_io" #42 0x0000564229939499 in io_wait_loop_epoll (h=0x564229ddb000 <io_w>, t=2, repeat=0) at core/io_wait.h:1065 n = 1 r = 0 fm = 0x7ff9fc0cc080 revents = 1 __func__ = "io_wait_loop_epoll" #43 0x000056422994d943 in tcp_receive_loop (unix_sock=69) at core/tcp_read.c:1974 __func__ = "tcp_receive_loop" #44 0x00005642298029b9 in tcp_init_children () at core/tcp_main.c:4853 r = 2 i = 15 reader_fd_1 = 69 pid = 0 si_desc = "tcp receiver (generic)\000\000\000\000\000@\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000@\354?\026\376\177\000\000\331\350\203)BV\000\000\000\000\000\000\000\000\000\000\033\037\217)BV\000\000q]\255)BV\000\000\001\000\00 0\000\000\000\000\000\217\005\247)\000\000\000\000\360\224\374\373\371\177\000\000\061\000\000\000\062\000\000\000\300\317\376\v\372\177\000" si = 0x0 __func__ = "tcp_init_children" #45 0x00005642296fec7e in main_loop () at main.c:1711 i = 16 pid = 34967 si = 0x0 si_desc = "udp receiver child=15 sock=127.0.0.20:5088 (62.231.137.101:5070)\000\067\060)\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000O\320\376\v\372\177\000\000\060\355?\026\376\177\000\000\060\000\000\000\060\000\000\000\320\355?\ 026\376\177\000\000\360\305\a\374\371\177\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #46 0x0000564229705b9d in main (argc=13, argv=0x7ffe163ff068) at main.c:2645 cfg_stream = 0x56422abe1010 c = -1 r = 0 tmp = 0x7ffe163ffe5e "" tmp_len = 32766 port = 373288608 proto = 32762 options = 0x564229a710a0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3543135325 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x0 p = 0xf0b2ff <error: Cannot access memory at address 0xf0b2ff> st = {st_dev = 19, st_ino = 151468387, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_mtim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_ctim = {tv_sec = 1550207150, tv_nsec = 472559347}, __glibc_reserved = {0, 0, 0}} __func__ = "main"
info locals cfg_stream = 0x56422abe1010 c = -1 r = 0 tmp = 0x7ffe163ffe5e "" tmp_len = 32766 port = 373288608 proto = 32762 options = 0x564229a710a0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3543135325 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x0 p = 0xf0b2ff <error: Cannot access memory at address 0xf0b2ff> st = {st_dev = 19, st_ino = 151468387, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_mtim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_ctim = {tv_sec = 1550207150, tv_nsec = 472559347}, __glibc_reserved = {0, 0, 0}} __func__ = "main"
list 1835 FILE* cfg_stream; 1836 int c,r; 1837 char *tmp; 1838 int tmp_len; 1839 int port; 1840 int proto; 1841 char *options; 1842 int ret; 1843 unsigned int seed; 1844 int rfd;
```
#### Log Messages
<!-- Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
```
Feb 20 13:55:55 PBXxxxx kernel: [5243784.004500] kamailio[35028]: segfault at 7ff9ef2c3000 ip 00007ff9faf54645 sp 00007ffe163f98d8 error 4 in libcrypto.so.1.1[7ff9faebe000+2b1000] Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Main process exited, code=exited, status=1/FAILURE Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Unit entered failed state. Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Failed with result 'exit-code'. Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Service hold-off time over, scheduling restart. Feb 20 13:55:58 PBXxxxx systemd[1]: Stopped Kamailio (OpenSER) - the Open Source SIP Server. Feb 20 13:55:58 PBXxxxx systemd[1]: Starting Kamailio (OpenSER) - the Open Source SIP Server...
Feb 20 13:55:55 PBXxxxx /usr/local/kamailio/sbin/kamailio[35065]: ERROR: tls [tls_util.h:42]: tls_err_ret(): TLS read:error:24067044:random number generator:rand_pool_add:internal error Feb 20 13:55:55 PBXxxxx /usr/local/kamailio/sbin/kamailio[35065]: ERROR: <core> [core/tcp_read.c:1505]: tcp_read_req(): ERROR: tcp_read_req: error reading - c: 0x7ff9b1f22340 r: 0x7ff9b1f223c0 (-1) Feb 20 13:55:56 PBXxxxx /usr/local/kamailio/sbin/kamailio[35069]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 65 Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: ALERT: <core> [main.c:740]: handle_sigs(): child process 37534 exited by a signal 11 Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: ALERT: <core> [main.c:743]: handle_sigs(): core was generated Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: INFO: <core> [main.c:766]: handle_sigs(): terminating due to SIGCHLD Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37575]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37561]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37554]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37544]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37538]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37570]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37541]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37573]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37567]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37559]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37564]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37536]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37557]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37528]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37550]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37517]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37487]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37505]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37483]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37496]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37520]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37401]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37525]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37450]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37509]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37546]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37531]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37480]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37477]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37490]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37522]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37453]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37405]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37474]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37465]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37518]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37499]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37471]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37468]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37502]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37493]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37459]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37456]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37398]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37462]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37436]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37444]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37442]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37439]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37430]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37421]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37433]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37427]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37424]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37415]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37403]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37399]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37411]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37446]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37408]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37418]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received ```
#### SIP Traffic
Don't currently have, can capture if required.
### Possible Solutions
TBD
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
``` version: kamailio 5.2.0-rc0 (x86_64/linux) 398698 flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144 MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 398698 compiled on 15:33:07 Nov 16 2018 with gcc 6.3.0 ```
* **Operating System**:
``` Linux C1PBX0202 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux ```