This occurs more frequently when we have lots of presence subscriptions which we are able to reproduce in a test environment. Thus far it appears this only occurs when using TLS as opposed to UDP\TCP.
Appears to be an issue in libcrypto.so.1.1 but not sure where to start.
8000+ presence subscriptions via TLS.
gdb /path/to/kamailio /path/to/corefile
GNU gdb (Debian 7.12-6) 7.12.0.20161007-git
Copyright (C) 2016 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/local/kamailio/sbin/kamailio...done.
[New LWP 35028]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/local/kamailio/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /usr/loc'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x00007ff9faf54645 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
bt full
#0 0x00007ff9faf54645 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#1 0x00007ff9fb030677 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#2 0x00007ff9fb03cc0b in EVP_EncryptUpdate () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#3 0x00007ff9fb06f811 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#4 0x00007ff9fb070737 in RAND_DRBG_generate () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#5 0x00007ff9fb07097d in RAND_DRBG_bytes () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#6 0x00007ff9fb3ca628 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#7 0x00007ff9fb3c7691 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#8 0x00007ff9fb3c81ce in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#9 0x00007ff9fb3da9e3 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#10 0x00007ff9fb3dab23 in SSL_write () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#11 0x00007ff9efb3b79c in tls_encode_f (c=0x7ff9b08aff78, pbuf=0x7ffe163fb3d0, plen=0x7ffe163fb3c8, rest_buf=0x7ffe163fb3d8, rest_len=0x7ffe163fb3cc, send_flags=0x7ffe163fb3bc) at tls_server.c:828
n = 0
offs = 0
ssl = 0x7ff9b13160f8
tls_c = 0x7ff9b064ae68
wr_buf = "\027\003\003\002 n\017\031\247%%T\r8O\334\350\005r\277Kk\326\334\377\t\b\r\266\267\242\374\354:\265#\"\224\333t\265\226\226\005~\361\230\237\020w\211}z\212,R\323_\367>\211\220\237\tC\244\303Ы\252\303B\020\a\240\216\366\024\206\212\201'\253G\304#\301M\333\3 20Ӂ\254\332!\341&Im\336GX\264\003\313Փp\353\226vV\034m\030\005\r\235+~\376,\236\\\\\316A\341f*fj\t\206\315\365Z\320͉\367xCj\344\235G#x\361T\005\216\234\363\227r\026\a\361_o\r_\274\v\340F\333%\262\336\273\023\060~\321?N\302\312L\004!\260i\340\300\324\361\371Җ\273\323X\f\332멵 \224\226\321E\343y)"...
rd = {buf = 0x0, pos = 0, used = 0, size = 0}
wr = {
buf = 0x7ff9efd75e20 <wr_buf> "\027\003\003\002 n\017\031\247%%T\r8O\334\350\005r\277Kk\326\334\377\t\b\r\266\267\242\374\354:\265#\"\224\333t\265\226\226\005~\361\230\237\020w\211}z\212,R\323_\367>\211\220\237\tC\244\303Ы\252\303B\020\a\240\216\366\024\206\212\20 1'\253G\304#\301M\333\320Ӂ\254\332!\341&Im\336GX\264\003\313Փp\353\226vV\034m\030\005\r\235+~\376,\236\\\\\316A\341f*fj\t\206\315\365Z\320͉\367xCj\344\235G#x\361T\005\216\234\363\227r\026\a\361_o\r_\274\v\340F\333%\262\336\273\023\060~\321?N\302\312L\004!\260i\340\300\324\36 1\371Җ\273\323X\f\332", <incomplete sequence \353\251>..., pos = 0, used = 0, size = 65536}
ssl_error = 0
err_src = 0x7ff9efb65a87 "TLS write:"
buf = 0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"...
len = 1255
x = 373273376
__func__ = "tls_encode_f"
#12 0x00005642297e1ca4 in tcpconn_send_put (c=0x7ff9b08aff78,
buf=0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len=1255, send_flags=...)
at core/tcp_main.c:2297
tmp = 0x7ff9af343808
fd = 10
response = {140729271694352, 0}
n = 0
do_close_fd = 0
rest_buf = 0x0
t_buf = 0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"...
rest_len = 0
t_len = 1255
resp = 140729271694352
t_send_flags = {f = 4, blst_imask = 0}
fd_cache_e = 0x0
use_fd_cache = 0
__func__ = "tcpconn_send_put"
#13 0x00005642297df397 in tcp_send (dst=0x7ff9b1693278, from=0x7ffe163fb610,
buf=0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len=1255) at core/tcp_main.c:2077
c = 0x7ff9b08aff78
ip = {af = 2, len = 4, u = {addrl = {94844456114514, 140711573739219}, addr32 = {2988284242, 22082, 4150154963, 32761}, addr16 = {39250, 45597, 22082, 0, 22227, 63326, 32761, 0}, addr = "R\231\035\262BV\000\000\323V^\367\371\177\000"}}
port = 39502
fd = 373274128
response = {140729271694776, 94842167197447}
n = 22082
con_lifetime = 57680
rest_buf = 0x5642298efffc <sr_event_exec+482> "\211E\374\213E\374\351A\002"
t_buf = 0x7ffe163fb510 "\323V^\367\371\177"
rest_len = 22082
t_len = 697859842
resp = 836
t_send_flags = {f = 0, blst_imask = 0}
__func__ = "tcp_send"
#14 0x00007ff9f758d961 in msg_send_buffer (dst=0x7ff9b1693278,
buf=0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len=1255, flags=0)
at ../../core/forward.h:282
new_dst = {send_sock = 0x1, to = {s = {sa_family = 53808, sa_data = "\275\260\371\177\000\000(\254ΰ\371\177\000"}, sin = {sin_family = 53808, sin_port = 45245, sin_addr = {s_addr = 32761}, sin_zero = "(\254ΰ\371\177\000"}, sin6 = {sin6_family = 53808,
sin6_port = 45245, sin6_flowinfo = 32761, sin6_addr = {__in6_u = {__u6_addr8 = "(\254ΰ\371\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {44072, 45262, 32761, 0, 0, 0, 0, 0}, __u6_addr32 = {2966334504, 32761, 0, 0}}}, sin6_scope_id = 699223731}},
id = 22082, proto = 2 '\002', send_flags = {f = 0, blst_imask = 0}}
outb = {s = 0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len = 1255}
netinfo = {data = {s = 0x100000002 <error: Cannot access memory at address 0x100000002>, len = 0}, rcv = 0x7ff9b0bdc4a0, dst = 0x7ff9f3f607ad <p_tm_callback>}
evp = {data = 0x7ffe163fb690, rcv = 0x0, dst = 0x7ff9b1693278}
port = 373274592
ip = {af = 4150157560, len = 32761, u = {addrl = {140710389918760, 0}, addr32 = {2966334504, 32761, 0, 0}, addr16 = {44072, 45262, 32761, 0, 0, 0, 0, 0}, addr = "(\254ΰ\371\177\000\000\000\000\000\000\000\000\000"}}
from = 0x7ffe163fb610
local_addr = {s = {sa_family = 2, sa_data = "\000\000>\347\211e\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 0, sin_addr = {s_addr = 1703536446}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 0,
sin6_flowinfo = 1703536446, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}
con = 0x0
wsev = {type = 699223731, buf = 0x7ff9af2f26c8 "", len = 268435456, id = 0}
ret = 32766
__func__ = "msg_send_buffer"
#15 0x00007ff9f758fd1f in send_pr_buffer (rb=0x7ff9b1693228, buf=0x7ff9b0bdcd48, len=1255) at t_funcs.c:70
__func__ = "send_pr_buffer"
#16 0x00007ff9f7566edd in send_prepared_request_impl (request=0x7ff9b1693228, retransmit=1, branch=0) at uac.c:643
t = 0x7ff9b1693008
p_msg = 0x0
uac = 0x7ff9b1693218
ip = {af = 4037853376, len = 32761, u = {addrl = {516093936486, 140711461450400}, addr32 = {697860966, 120, 4037866144, 32761}, addr16 = {33638, 10648, 120, 0, 62112, 61612, 32761, 0}, addr = "f\203\230)x\000\000\000\240\362\254\360\371\177\000"}}
ret = -1318506488
__func__ = "send_prepared_request_impl"
#17 0x00007ff9f7568365 in t_uac_with_ids (uac_r=0x7ffe163fbe70, ret_index=0x0, ret_label=0x0) at uac.c:720
request = 0x7ff9b1693228
cell = 0x7ff9b1693008
ret = 1
is_ack = 0
branch_ret = 32761
i = 0
added_branches = 1
#18 0x00007ff9f75682a7 in t_uac (uac_r=0x7ffe163fbe70) at uac.c:695
No locals.
#19 0x00007ff9f756a62b in req_within (uac_r=0x7ffe163fbe70) at uac.c:929
ret = 744
nbuf = "\260\272?\026\376\177\000\000\220\272?\026\376\177\000\000 \313\n\374\371\177\000\000\060\304\n\374\371\177", '\000' <repeats 18 times>, "\360\274?\026\376\177\000\000\300\275?\026\376\177\000\000\263N\255)BV\000\000\000\000\000@\000\000\000\000\000\000\000\ 020\000\000\000\000\006\000\000\000\000\000\000\000\360\275?\026\376\177\000\000:\023\365\363\371\177\000\000\000\273?\026\376\177\000\000\\ e\373\371\177\000\000C\003\000\000\000\000\000\000\020\200\360\373\371\177\000\000p\272?\026\001\000\000\000\332\336\327*BV\000\000`\ 356\n\374\371\177\000\000\300\303?\026\376\177\000\000\000\000\000\000\000\000\000\000`$֯\371\177\000\000\b\224\f\374\371\177\000\000$"...
dbuf = "\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\020\272?\026\376\177\000\000\377*\253\360\371\177\000\000\360\271?\026\376\177\000\000\300\275?\026\376\177\000\000\263N\255)BV\000\000\000\000\000@\000\000\000\000\377\377\377\377", '\000' <re peats 11 times>
ouri = {s = 0x7ff9fc0b1250 "sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk", len = 0}
nuri = {s = 0x7ffe163fb9b0 "\260\272?\026\376\177", len = 0}
duri = {s = 0x7ffe163fb960 "", len = 0}
__func__ = "req_within"
#20 0x00007ff9f3f5deb7 in send_notify_request (subs=0x7ffe163fc2f0, watcher_subs=0x0, n_body=0x0, force_null_body=0) at notify.c:1604
td = 0x7ff9fc0af9e8
met = {s = 0x7ff9f3fd3334 "NOTIFY", len = 6}
str_hdr = {s = 0x7ff9fc0ad778 "Max-Forwards: 70\r\nEvent: presence\r\nContact: <sip:62.231.137.101:5071;transport=tls>\r\nSubscription-State: active;expires=3600\r\nContent-Type: application/pidf+xml\r\n", len = 162}
notify_body = 0x7ff9fc0c2548
result = 0
cb_param = 0x7ff9b0bdc4a0
final_body = 0x0
uac_r = {method = 0x7ffe163fbee0, headers = 0x7ffe163fbed0, body = 0x7ff9fc0c2548, ssock = 0x0, dialog = 0x7ff9fc0af9e8, cb_flags = 1024, cb = 0x7ff9f3f607ad <p_tm_callback>, cbp = 0x7ff9b0bdc4a0, callid = 0x0}
aux_body = 0x0
backup_subs = 0x7ff9fbfe0a70
__func__ = "send_notify_request"
#21 0x00007ff9f3f5f5b3 in notify (subs=0x7ffe163fc2f0, watcher_subs=0x0, n_body=0x0, force_null_body=0, aux_body_processing=0x0) at notify.c:1703
aux_body = 0x0
__func__ = "notify"
#22 0x00007ff9f3fa2b4b in update_subscription (msg=0x7ff9fc09c150, subs=0x7ffe163fc2f0, to_tag_gen=1, sent_reply=0x7ffe163fc12c) at subscribe.c:724
hash_code = 6046
__func__ = "update_subscription"
#23 0x00007ff9f3fa9857 in handle_subscribe (msg=0x7ff9fc09c150, watcher_user=..., watcher_domain=...) at subscribe.c:1284
to_tag_gen = 1
subs = {pres_uri = {s = 0x7ff9fc0c9408 "sip:229@itec-support.sysconfig.co.uk", len = 36}, to_user = {
s = 0x7ff9b08b0340 "229@itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: \"500\" <sip:500@192.168.128.27:60700;transpor"..., len = 3}, to_domain = {
s = 0x7ff9b08b0344 "itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: \"500\" <sip:500@192.168.128.27:60700;transport=tl"..., len = 28}, from_user = {
s = 0x7ff9b08b0307 "500@itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: <sip:229@itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: "..., len = 3}, from_domain = {
s = 0x7ff9b08b030b "itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: <sip:229@itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\n"..., len = 28}, watcher_user = {
s = 0x7ff9b08b0307 "500@itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: <sip:229@itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: "..., len = 3}, watcher_domain = {
s = 0x7ff9b08b030b "itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: <sip:229@itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\n"..., len = 28},
event = 0x7ff9afd62460, event_id = {s = 0x0, len = 0}, to_tag = {s = 0x7ff9f780a460 <tm_tags> "4984a63b2f097c424789ea70bd115f49-e427", len = 37}, from_tag = {
s = 0x7ff9b08b032d "219479eb\r\nTo: <sip:229@itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: \"500\" <sip:500@192.168.12"..., len = 8}, callid = {
s = 0x7ff9b08b02b1 "0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"500\" <sip:500@itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: <sip:229@itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.1"..., len = 48},
sockinfo_str = {s = 0x7ff9fc090118 "tls:62.231.137.101:5071", len = 23}, remote_cseq = 1, local_cseq = 1, contact = {s = 0x7ff9fc0b1250 "sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk", len = 86}, local_contact = {
s = 0x7ff9fc053930 "sip:62.231.137.101:5071;transport=tls", len = 37}, record_route = {s = 0x0, len = 0}, expires = 3600, status = 1, reason = {s = 0x0, len = 0}, version = 1, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1,
internal_update_flag = 0, updated = -1, updated_winfo = -1, flags = 0, user_agent = {s = 0x7ff9b08b0449 "serveline1.1.1Windows 10\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 24}, next = 0x0}
event = 0x7ff9afd62460
parsed_event = 0x7ff9fc0a8f90
ev_param = 0x0
found = 1
reason = {s = 0x0, len = 0}
uri = {user = {s = 0x7ff9b08b03a0 "109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: \"500\" <sip:500@192.168.128.27:60700;transport=tls;registering_acc=itec-support_sysconfig_co_uk>\r\nUser-Agent: serveline1.1.1Windows 10\r\nEvent"...,
len = 373277152}, passwd = {s = 0x4f8 <error: Cannot access memory at address 0x4f8>, len = 2}, host = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, port = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, params = {
s = 0x7ffe163fc1f0 "@\334\327*BV", len = 697988931}, sip_params = {s = 0x7ffe163fc280 "g\025\366\373\371\177", len = -66469552}, headers = {s = 0x7ffe163fc1e0 "", len = -67096472}, port_no = 49824, proto = 5695, type = 32766, flags = (unknown: 498511872),
transport = {s = 0x7ff9fc0030b0 "\a\003\213\260\371\177", len = 373277392}, ttl = {s = 0x0, len = -67758744}, user_param = {s = 0x56422ad7dc40 " #\330*BV", len = 0}, maddr = {s = 0x7ff9fbf6156b "", len = -185595711}, method = {s = 0x0, len = 373277616}, lr = {
s = 0xfffffffffc050db0 <error: Cannot access memory at address 0xfffffffffc050db0>, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7ff9fbf61568 "500", len = 0}, transport_val = {s = 0x0, len = -67758744}, ttl_val = {
s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x7ff9fbf61567 "", len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {
s = 0xf900000000 <error: Cannot access memory at address 0xf900000000>, len = -66469552}, gr_val = {
s = 0x7ff9b08b02b1 "0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"500\" <sip:500@itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: <sip:229@itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.1"..., len = 48}}
reply_code = 500
reply_str = {s = 0x7ff9f3fdca3d "Server Internal Error", len = 21}
sent_reply = 1
__func__ = "handle_subscribe"
#24 0x00007ff9f3fa5964 in handle_subscribe0 (msg=0x7ff9fc09c150) at subscribe.c:1033
pfrom = 0x7ff9fc003068
__func__ = "handle_subscribe0"
#25 0x0000564229768e4f in do_action (h=0x7ffe163fcc30, a=0x7ff9fc057968, msg=0x7ff9fc09c150) at core/action.c:1067
ret = -5
v = 699223731
dst = {send_sock = 0x133438, to = {s = {sa_family = 53480, sa_data = "\034\000\000\000\000\000@\033\003\374\371\177\000"}, sin = {sin_family = 53480, sin_port = 28, sin_addr = {s_addr = 0}, sin_zero = "@\033\003\374\371\177\000"}, sin6 = {sin6_family = 53480,
sin6_port = 28, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "@\033\003\374\371\177\000\000`\t\003\374\371\177\000", __u6_addr16 = {6976, 64515, 32761, 0, 2400, 64515, 32761, 0}, __u6_addr32 = {4228062016, 32761, 4228057440, 32761}}},
sin6_scope_id = 4228497744}}, id = 32761, proto = -112 '\220', send_flags = {f = 5695, blst_imask = 32766}}
tmp = 0x40000000 <error: Cannot access memory at address 0x40000000>
new_uri = 0x7ff9fc0464f8 "\032"
end = 0x7ff9fc09c150 "!\024"
crt = 0x564229ad4eb3 "INFO"
cmd = 0x7ff9fbfc3148
len = 258327944
user = 982029481
uri = {user = {s = 0x7ffe163fc8c0 "", len = 695389545}, passwd = {s = 0x7ff9fc019b00 "\002", len = -66469552}, host = {s = 0x7ffe163fc8a8 "\360\302\345\365\371\177", len = 16}, port = {s = 0x7ffe163fc8d0 "\357\302\345\365\371\177", len = 373279888}, params = {
s = 0x0, len = 0}, sip_params = {s = 0x0, len = -1}, headers = {s = 0x0, len = 16}, port_no = 62000, proto = 64521, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x564200000000 <error: Cannot access memory at address 0x564200000000>, len = 116},
ttl = {s = 0x7ffe163fc920 "\263N\255)BV", len = 0}, user_param = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 132}, maddr = {s = 0x7ff9f5e5c2e6 "%s: %s%.*s", len = 3}, method = {s = 0x7ff9fc09c150 "!\024", len = -169491728}, lr = {
s = 0x7ff9fc0a2cb0 "8\213\f\374\371\177", len = -66469552}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7ff9f5e5c2ef "s", len = 697869913}, transport_val = {s = 0x7ff9fc02c790 "!", len = 16}, ttl_val = {s = 0x7ff9fbfbb0a8 "\315\352S\366\371\177", len = 373280352},
user_param_val = {s = 0x7ff9fc019ae8 "\024", len = 0}, maddr_val = {s = 0x564229ad4eb3 "INFO", len = 2}, method_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, lr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2_val = {
s = 0x7ffe163fc9e0 "\320\317?\026\376\177", len = 696865318}, gr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 266546968}}
next_hop = {user = {s = 0x7ffe163fc6a0 "\320\306?\026\376\177", len = 373278720}, passwd = {s = 0x15d6bf724 <error: Cannot access memory at address 0x15d6bf724>, len = -1342808584}, host = {s = 0x7ffe163fc6b0 "\320\306?\026\376\177", len = -270932943}, port = {
s = 0x7ff9b145d960 "$\367k]\257", len = -1342808584}, params = {s = 0x7ffe163fc6d0 "`\314?\026\376\177", len = 2}, sip_params = {s = 0x7ffe163fc6d0 "`\314?\026\376\177", len = 1}, headers = {
s = 0x772410000000 <error: Cannot access memory at address 0x772410000000>, len = 718789696}, port_no = 52320, proto = 5695, type = 32766, flags = (URI_SIP_USER_PHONE | unknown: 201770324), transport = {s = 0x7ffe163fcc78 "\251\224\260\020\031\273\035\\",
len = 0}, ttl = {s = 0x7ffa0c06c559 "n!\"", len = 200606905}, user_param = {s = 0x7ffe163fc810 "\320\310?\026\376\177", len = -1355863720}, maddr = {s = 0x7ffe163fcc28 "\220\344?\026\376\177", len = 35028}, method = {s = 0x7ffe163fc7c8 "", len = 10}, lr = {
s = 0x7ffe163fcc23 "\374\371\177", len = 1550670948}, r2 = {s = 0x0, len = 0}, gr = {s = 0x564200000000 <error: Cannot access memory at address 0x564200000000>, len = -1}, transport_val = {
s = 0x564200000000 <error: Cannot access memory at address 0x564200000000>, len = 0}, ttl_val = {s = 0x0, len = 32}, user_param_val = {s = 0x7ffe00000005 <error: Cannot access memory at address 0x7ffe00000005>, len = 200793134}, maddr_val = {
s = 0x7ffe163fc840 "", len = 116}, method_val = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 718789696}, lr_val = {s = 0x7ffe163fcd40 " n\005\374\371\177", len = -169491738}, r2_val = {s = 0x7ffe163fce48 "8\320?\026\376\177", len = 0},
gr_val = {s = 0x74 <error: Cannot access memory at address 0x74>, len = 200606905}}
u = 0x2
port = 0
dst_host = 0x5642297769ba <run_actions_safe+151>
i = 1
flags = 32761
avp = 0x0
st = {flags = 175, id = 0, name = {n = -1356099584, s = {s = 0x7ff9af2b9000 "", len = 1}, re = 0x7ff9af2b9000}, avp = 0x7ff9b145d960}
sct = 0x10000000
sjt = 0x40000000
rve = 0x7ff9fc0464f8
mct = 0x564229ad4eb3
rv = 0x7ff9efdcf7ac
rv1 = 0x7ffe163fe490
c1 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 6, s = {s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = 373278288}, re = 0x100000006}, pval = {rs = {
s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = 373278288}, ri = 697906361, flags = 22082}}, i2s = "\000\365\334\357\371\177\000\000`\337\327*\272\000\000\000\310%\335\357\371\177"}
s = {s = 0x564229ad4eb3 "INFO", len = -1355864376}
srevp = {0x7ffe163fc600, 0x5642299854d8 <futex_release+29>}
evp = {data = 0x0, rcv = 0x0, dst = 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#26 0x000056422977635e in run_actions (h=0x7ffe163fcc30, a=0x7ff9fc057968, msg=0x7ff9fc09c150) at core/action.c:1564
t = 0x7ff9fc057968
ret = -1
ms = 0
__func__ = "run_actions"
#27 0x00005642297769ba in run_actions_safe (h=0x7ffe163fe490, a=0x7ff9fc057968, msg=0x7ff9fc09c150) at core/action.c:1625
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {2, 1109510072046228649, 94842167054003, 1073741824, 268435456, 6, 1109510072092365993, 6637667142142563497}, __mask_was_saved = 0, __saved_mask = {__val = {1073741824, 268435456, 6,
140729271700736, 94842165820044, 268435456, 140711652082000, 140729271700992, 140711651455080, 1, 2, 140711651455152, 140729271701200, 140711651767776, 140711652082000, 140729271700896}}}}}
ret = -1
ign_on_break = 0
#28 0x0000564229728515 in rval_get_int (h=0x7ffe163fe490, msg=0x7ff9fc09c150, i=0x7ffe163fd038, rv=0x7ff9fc056e20, cache=0x0) at core/rvalue.c:912
r_avp = 0x7ffe163fced0
avp_val = {n = 268435456, s = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, re = 0x10000000}
pval = {rs = {s = 0x56422ad7de90 "`η\363\371\177", len = 2}, ri = 699223731, flags = 22082}
tmp = {s = 0xdb18fdfb00007dfb <error: Cannot access memory at address 0xdb18fdfb00007dfb>, len = -67096400}
s = 0x0
r = 21
ret = 0
destroy_pval = 0
__func__ = "rval_get_int"
#29 0x000056422972ce86 in rval_expr_eval_int (h=0x7ffe163fe490, msg=0x7ff9fc09c150, res=0x7ffe163fd038, rve=0x7ff9fc056e18) at core/rvalue.c:1910
i1 = 373281968
i2 = 4
ret = -1
c1 = {cache_type = 4228497744, val_type = 32761, c = {avp_val = {n = 373286032, s = {s = 0x7ffe163fe490 "\003", len = 699223731}, re = 0x7ffe163fe490}, pval = {rs = {s = 0x7ffe163fe490 "\003", len = 699223731}, ri = 1073741824, flags = 0}},
i2s = '\000' <repeats 21 times>}
c2 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 373280464, s = {s = 0x7ffe163fced0 "", len = 373280528}, re = 0x7ffe163fced0}, pval = {rs = {s = 0x7ffe163fced0 "", len = 373280528}, ri = 695389545, flags = 22082}},
i2s = "P\301\t\374\371\177\000\000\000\000\000\000\000\000\000\000\300\365\004\374\371\177"}
rv1 = 0x5642298e4e63 <pv_value_destroy+175>
rv2 = 0x564229ad4eb3
__func__ = "rval_expr_eval_int"
#30 0x000056422972d2f6 in rval_expr_eval_int (h=0x7ffe163fe490, msg=0x7ff9fc09c150, res=0x7ffe163fd4b0, rve=0x7ff9fc057d10) at core/rvalue.c:1918
i1 = 0
i2 = 0
ret = -1
c1 = {cache_type = 1259528, val_type = RV_NONE, c = {avp_val = {n = 1889464, s = {s = 0x1cd4b8 <error: Cannot access memory at address 0x1cd4b8>, len = 1910816}, re = 0x1cd4b8}, pval = {rs = {s = 0x1cd4b8 <error: Cannot access memory at address 0x1cd4b8>,
len = 1910816}, ri = 8, flags = 0}}, i2s = "\b\326\v\374\371\177\000\000\002\000\000\000\000\000\000\000(\a\003\374\371\177"}
c2 = {cache_type = 373280848, val_type = 32766, c = {avp_val = {n = -169518741, s = {s = 0x7ff9f5e5596b <xlog_2_helper+990> "H\215e\330[A\\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271",
len = 268435456}, re = 0x7ff9f5e5596b <xlog_2_helper+990>}, pval = {rs = {s = 0x7ff9f5e5596b <xlog_2_helper+990> "H\215e\330[A\\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271",
len = 268435456}, ri = 6, flags = 0}}, i2s = "\377\377\377\377\000\000\000\000\220\307\v\374\371\177\000\000\b\326\v\374\371\177"}
rv1 = 0x6
rv2 = 0x10000000
__func__ = "rval_expr_eval_int"
#31 0x00005642297688ec in do_action (h=0x7ffe163fe490, a=0x7ff9fc059138, msg=0x7ff9fc09c150) at core/action.c:1043
ret = -5
v = 0
dst = {send_sock = 0x564229ad4eb3, to = {s = {sa_family = 0, sa_data = "\000@\000\000\000\000\000\000\000\020\000\000\000"}, sin = {sin_family = 0, sin_port = 16384, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\020\000\000\000"}, sin6 = {sin6_family = 0,
sin6_port = 16384, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000", __u6_addr16 = {0, 4096, 0, 0, 6, 0, 0, 0}, __u6_addr32 = {268435456, 0, 6, 0}}}, sin6_scope_id = 373282272}},
id = 32766, proto = 34 '"', send_flags = {f = 10610, blst_imask = 22082}}
tmp = 0x7ffe163fe490 "\003"
new_uri = 0x7ffe163fd690 ""
end = 0x56422972ca9d <rval_str_lop2+192> "\213E\354\353!\220\353\001\220H\213E\360H\211\307\350\033\224\377\377H\213E\370H\211\307\350\017\224\377\377\270"
crt = 0x7ff9fc09c150 "!\024"
cmd = 0x7ff9fbfbd2e8
len = 32766
user = 373283664
uri = {user = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 2}, passwd = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {
s = 0x7ffe163fd3e0 "\360\324?\026\376\177", len = 695690078}, params = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, sip_params = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, headers = {
s = 0x7ffe163fd4a0 "\340\325?\026\376\177", len = 695389830}, port_no = 54240, proto = 5695, type = 32766, flags = (unknown: 4228497744), transport = {s = 0x7ff9fc044e88 "\026", len = 373281808}, ttl = {s = 0x7ff9fc0a0bc0 "", len = -66469552}, user_param = {
s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, maddr = {s = 0x7ff9fc09c150 "!\024", len = 2}, method = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>,
len = 6}, r2 = {s = 0x7ffe163fd4f0 "\340\325?\026\376\177", len = 695691706}, gr = {s = 0x7ff9fc09c150 "!\024", len = -66469552}, transport_val = {s = 0x7ff9fc044e88 "\026", len = 373286032}, ttl_val = {s = 0x0, len = 1}, user_param_val = {
s = 0x2 <error: Cannot access memory at address 0x2>, len = 147362985}, maddr_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {
s = 0xf65c588098894a9 <error: Cannot access memory at address 0xf65c588098894a9>, len = 280007849}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x564229a81f30 <__func__.7452> "rval_destroy", len = 2}}
next_hop = {user = {s = 0x7ff9fc07e410 "\004", len = 373286032}, passwd = {s = 0x0, len = -1}, host = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 231249065}, port = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, params = {
s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, sip_params = {s = 0xf65c5880e8894a9 <error: Cannot access memory at address 0xf65c5880e8894a9>, len = 280007849}, headers = {s = 0x0, len = 6}, port_no = 53920, proto = 5695,
type = 32766, flags = (URI_SIP_USER_PHONE | unknown: 695690076), transport = {s = 0x7ffe163fd350 "", len = 200818532}, ttl = {s = 0x7ff9fbfbbe98 "A\234.\366\371\177", len = 0}, user_param = {s = 0x18 <error: Cannot access memory at address 0x18>,
len = 718625520}, maddr = {s = 0x0, len = -66469552}, method = {s = 0x7ff9fc01ffc8 ".", len = 373281488}, lr = {s = 0x27163fd350 <error: Cannot access memory at address 0x27163fd350>, len = -152772320}, r2 = {
s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = -1}, gr = {s = 0x7ffe163fd360 "\240\324?\026\376\177", len = 695371029}, transport_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, ttl_val = {
s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 0}, user_param_val = {s = 0x7ff9fc07e650 "\004", len = 373282200}, maddr_val = {s = 0x7ff9fc09c150 "!\024", len = 373286032}, method_val = {s = 0x7ff9fc01ffc8 ".", len = 373286032},
lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 172528809}, gr_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}}
u = 0x7ff9fc045930
port = 0
dst_host = 0x56422972ce86 <rval_expr_eval_int+154>
i = 11
flags = 32761
avp = 0x0
st = {flags = 268435456, id = 0, name = {n = 6, s = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 373281392}, re = 0x6}, avp = 0x5642297769ba <run_actions_safe+151>}
sct = 0x7ffe163fd5e0
sjt = 0x1
rve = 0x7ff9fc057d10
mct = 0x7ff9fc0806b0
rv = 0x40000000
rv1 = 0x0
c1 = {cache_type = 31, val_type = RV_NONE, c = {avp_val = {n = -66469552, s = {s = 0x5efc09c150 <error: Cannot access memory at address 0x5efc09c150>, len = 0}, re = 0x5efc09c150}, pval = {rs = {
s = 0x5efc09c150 <error: Cannot access memory at address 0x5efc09c150>, len = 0}, ri = 0, flags = 0}}, i2s = "`\321?\026\376\177\000\000\002\000\000\000\000\000\000\000\263N\255)BV"}
s = {s = 0x7ff9fc07e410 "\004", len = 373281168}
srevp = {0x10000000, 0x7ff9fc09c150}
evp = {data = 0x0, rcv = 0x0, dst = 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#32 0x000056422977635e in run_actions (h=0x7ffe163fe490, a=0x7ff9fc046148, msg=0x7ff9fc09c150) at core/action.c:1564
t = 0x7ff9fc059138
ret = 1
ms = 0
__func__ = "run_actions"
#33 0x0000564229768dbb in do_action (h=0x7ffe163fe490, a=0x7ff9fc05cd78, msg=0x7ff9fc09c150) at core/action.c:1058
ret = 1
v = 1
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0, blst_imask = 0}}
tmp = 0x7ffe163fe490 "\003"
new_uri = 0x0
end = 0x0
crt = 0x7ff9fc09c150 "!\024"
cmd = 0x0
len = 32766
user = 373285360
uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffe163fda80 "\220\333?\026\376\177", len = 695690078}, params = {s = 0x0,
len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 4228497744), transport = {s = 0x7ff9fbfd66c8 "\021", len = 373283504}, ttl = {s = 0x0, len = 0}, user_param = {
s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, maddr = {s = 0x0, len = 2}, method = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>,
len = 6}, r2 = {s = 0x7ffe163fdb90 "\200\334?\026\376\177", len = 695691706}, gr = {s = 0x0, len = -66469552}, transport_val = {s = 0x7ff9fbfd66c8 "\021", len = 373286032}, ttl_val = {s = 0x0, len = 0}, user_param_val = {
s = 0x2 <error: Cannot access memory at address 0x2>, len = 436769961}, maddr_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {
s = 0xf65c5881cc894a9 <error: Cannot access memory at address 0xf65c5881cc894a9>, len = 280007849}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
next_hop = {user = {s = 0x1700000303 <error: Cannot access memory at address 0x1700000303>, len = 31}, passwd = {s = 0x0, len = 0}, host = {
s = 0x7ff9b06a6ff8 "w4nP\027C\022\035\310W\002\245ʷ\310ͣZCo\322\365\033U\211\260\355\273U\256\210\006\a\037\234\373;\217\067\rV_WK\376\225\233\002\351", <incomplete sequence \317>, len = -1335201800}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0},
sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x7ff9fbfbbe98 "A\234.\366\371\177", len = 0}, user_param = {s = 0x0, len = 0}, maddr = {
s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
u = 0x7ff9fbfd6818
port = 0
dst_host = 0x56422972ce86 <rval_expr_eval_int+154>
i = 0
flags = 0
avp = 0x0
st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
sct = 0x7ffe163fdc80
sjt = 0xffffffff
rve = 0x7ff9fc045930
mct = 0x0
rv = 0x0
rv1 = 0x0
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>}
s = {s = 0x0, len = 0}
srevp = {0x0, 0x0}
evp = {data = 0x0, rcv = 0x0, dst = 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#34 0x000056422977635e in run_actions (h=0x7ffe163fe490, a=0x7ff9fc05cd78, msg=0x7ff9fc09c150) at core/action.c:1564
t = 0x7ff9fc05cd78
ret = -1
ms = 0
__func__ = "run_actions"
#35 0x00005642297655ca in do_action (h=0x7ffe163fe490, a=0x7ff9fbfd82b8, msg=0x7ff9fc09c150) at core/action.c:691
ret = -5
v = 0
dst = {send_sock = 0x7ffe0505e220, to = {s = {sa_family = 52220, sa_data = "\025\370\371\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 52220, sin_port = 63509, sin_addr = {s_addr = 32761}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
sin6_family = 52220, sin6_port = 63509, sin6_flowinfo = 32761, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 268435456}}, id = 0, proto = -128 '\200',
send_flags = {f = 4067, blst_imask = 0}}
tmp = 0x564229988366 <qm_malloc+2331> "H\213E\270H\203\300\070\351*\003"
new_uri = 0x7ff9b08b0389 "branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: \"500\" <sip:500@192.168.128.27:60700;transport=tls;registering_acc=itec-support_sysconfig_co_uk>\r\nUser-Agent: servelin"...
end = 0xfc0af860 <error: Cannot access memory at address 0xfc0af860>
crt = 0x7ffe163fe420 ""
cmd = 0xe8
len = 0
user = 697859842
uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 266547264}, host = {s = 0x400133310 <error: Cannot access memory at address 0x400133310>, len = 699405104}, port = {
s = 0x1d2820 <error: Cannot access memory at address 0x1d2820>, len = 8}, params = {s = 0x7ffe163fe170 "", len = 698013910}, sip_params = {s = 0x7ffe163fe0c0 "\230\370\n\374\371\177", len = 697237500}, headers = {s = 0x0, len = 699362992}, port_no = 57712,
proto = 5695, type = 32766, flags = (URI_SIP_USER_PHONE | unknown: 697859840), transport = {s = 0x7ff9fc0af898 "\001", len = -66386880}, ttl = {s = 0x7ffe163fe1c2 "\005\005\376\177", len = 373285315}, user_param = {s = 0x7ff9b08b04b6 "", len = -1333066871},
maddr = {s = 0x564229b04cc0 <__func__.6670> "parse_via", len = 699412136}, method = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -68124656}, lr = {s = 0x0, len = 1}, r2 = {s = 0x0, len = -66386936}, gr = {
s = 0x500000000000000 <error: Cannot access memory at address 0x500000000000000>, len = 373285308}, transport_val = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1333066877}, ttl_val = {
s = 0x429ad4eb3 <error: Cannot access memory at address 0x429ad4eb3>, len = -1333066872}, user_param_val = {
s = 0x7ff9b08b0388 ";branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: \"500\" <sip:500@192.168.128.27:60700;transport=tls;registering_acc=itec-support_sysconfig_co_uk>\r\nUser-Agent: serveli"..., len = 5}, maddr_val = {
s = 0x7ffe163fe300 " \344?\026\376\177", len = 698064145}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = -66389864}, r2_val = {s = 0x7ff9b08b04b6 "", len = -1333066904}, gr_val = {s = 0x0, len = -68124656}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T,
flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {
s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 697897400}, lr_val = {s = 0x7ffe163fe050 "", len = -68124656}, r2_val = {s = 0x0, len = -68124656}, gr_val = {
s = 0x7ffe163fe090 "\300\340?\026\376\177", len = -132789252}}
u = 0x7ffe163fe420
port = 0
dst_host = 0x8
i = 15
flags = 0
avp = 0x7ff9b08b04b6
st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
sct = 0x0
sjt = 0x5642298efffc <sr_event_exec+482>
rve = 0x7ff9fbfd6818
mct = 0x7ffe163fe250
rv = 0x0
rv1 = 0x7ff9fc0a3610
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>}
s = {s = 0x0, len = 0}
srevp = {0x0, 0x0}
evp = {data = 0x0, rcv = 0x0, dst = 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#36 0x000056422977635e in run_actions (h=0x7ffe163fe490, a=0x7ff9fbfd48f0, msg=0x7ff9fc09c150) at core/action.c:1564
t = 0x7ff9fbfd82b8
ret = 1
ms = 0
__func__ = "run_actions"
#37 0x0000564229776a82 in run_top_route (a=0x7ff9fbfd48f0, msg=0x7ff9fc09c150, c=0x0) at core/action.c:1646
ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {2, 1109510072864117929, 94842167054003, 1073741824, 268435456, 6, 1109510072876700841, 6637667142142563497}, __mask_was_saved = 0, __saved_mask = {__val = {5910974510923775,
140729271706912, 140711585744231, 94842167054003, 0, 4611686022990790656, 140711652082000, 140729271707008, 94842164188576, 8523465072, 140711652082000, 1073741825, 0, 94842167054003, 2, 94842167054003}}}}}
p = 0x7ffe163fe490
ret = 268435456
sfbk = 0
#38 0x0000564229899cd7 in receive_msg (
buf=0x7ff9b08b0270 "SUBSCRIBE sip:229@itec-support.sysconfig.co.uk SIP/2.0\r\nCall-ID: 0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"500\" <sip:500@itec-support.sysconfig.co.uk>;tag=219479eb\r\nT"..., len=582, rcv_info=0x7ff9b08aff90)
at core/receive.c:340
msg = 0x7ff9fc09c150
ctx = {rec_lev = 699309230, run_flags = 22082, last_retcode = 2, jmp_env = {{__jmpbuf = {94842167054003, 1073741824, 268435456, 6, 140729271707520, 94842165376397, 140729271707328, 0}, __mask_was_saved = 9, __saved_mask = {__val = {140710385483640,
140710385484400, 8589935174, 240518234113, 140710385484400, 9, 140710385484410, 36, 140710385484447, 7, 64, 94842167054003, 140710396387576, 2701802864640, 16383, 140710382972520}}}}}
bctx = 0x2163fe970
ret = 32761
stats_on = 0
tvb = {tv_sec = 232196669440, tv_usec = 140710385484454}
tve = {tv_sec = 17879092915, tv_usec = 140710385484982}
tz = {tz_minuteswest = -1333067142, tz_dsttime = 32761}
diff = 0
inb = {s = 0x7ff9b08b0270 "SUBSCRIBE sip:229@itec-support.sysconfig.co.uk SIP/2.0\r\nCall-ID: 0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"500\" <sip:500@itec-support.sysconfig.co.uk>;tag=219479eb\r\nT"..., len = 582}
netinfo = {data = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, rcv = 0x10000000, dst = 0x7ff9b08b02a8}
keng = 0x0
evp = {data = 0x7ffe163fe610, rcv = 0x7ff9b08aff90, dst = 0x0}
cidlockidx = 0
cidlockset = 0
errsipmsg = 0
__func__ = "receive_msg"
#39 0x0000564229946431 in receive_tcp_msg (
tcpbuf=0x7ff9b08b0270 "SUBSCRIBE sip:229@itec-support.sysconfig.co.uk SIP/2.0\r\nCall-ID: 0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"500\" <sip:500@itec-support.sysconfig.co.uk>;tag=219479eb\r\nT"..., len=582,
rcv_info=0x7ff9b08aff90, con=0x7ff9b08aff78) at core/tcp_read.c:1399
buf = 0x0
bsize = 0
blen = 582
__func__ = "receive_tcp_msg"
#40 0x0000564229948a39 in tcp_read_req (con=0x7ff9b08aff78, bytes_read=0x7ffe163fea00, read_flags=0x7ffe163fe9f8) at core/tcp_read.c:1631
bytes = 582
total_bytes = 582
resp = 1
size = 0
req = 0x7ff9b08afff8
dst = {send_sock = 0x7ffe163fe9f0, to = {s = {sa_family = 104, sa_data = "\213\260\371\177\000\000\000\000\000\000\001 \000"}, sin = {sin_family = 104, sin_port = 45195, sin_addr = {s_addr = 32761}, sin_zero = "\000\000\000\000\001 \000"}, sin6 = {
sin6_family = 104, sin6_port = 45195, sin6_flowinfo = 32761, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\001 \000\000\200\300\f\374\371\177\000", __u6_addr16 = {0, 0, 8193, 0, 49280, 64524, 32761, 0}, __u6_addr32 = {0, 8193, 4228694144, 32761}}},
sin6_scope_id = 373287104}}, id = 32766, proto = 1 '\001', send_flags = {f = 0, blst_imask = 80}}
c = 67 'C'
ret = 0
__func__ = "tcp_read_req"
#41 0x000056422994c596 in handle_io (fm=0x7ff9fc0cc080, events=1, idx=-1) at core/tcp_read.c:1862
ret = 0
n = 22082
read_flags = 1
con = 0x7ff9b08aff78
s = 0
resp = 1
t = 80
__func__ = "handle_io"
#42 0x0000564229939499 in io_wait_loop_epoll (h=0x564229ddb000 <io_w>, t=2, repeat=0) at core/io_wait.h:1065
n = 1
r = 0
fm = 0x7ff9fc0cc080
revents = 1
__func__ = "io_wait_loop_epoll"
#43 0x000056422994d943 in tcp_receive_loop (unix_sock=69) at core/tcp_read.c:1974
__func__ = "tcp_receive_loop"
#44 0x00005642298029b9 in tcp_init_children () at core/tcp_main.c:4853
r = 2
i = 15
reader_fd_1 = 69
pid = 0
si_desc = "tcp receiver (generic)\000\000\000\000\000@\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000@\354?\026\376\177\000\000\331\350\203)BV\000\000\000\000\000\000\000\000\000\000\033\037\217)BV\000\000q]\255)BV\000\000\001\000\00 0\000\000\000\000\000\217\005\247)\000\000\000\000\360\224\374\373\371\177\000\000\061\000\000\000\062\000\000\000\300\317\376\v\372\177\000"
si = 0x0
__func__ = "tcp_init_children"
#45 0x00005642296fec7e in main_loop () at main.c:1711
i = 16
pid = 34967
si = 0x0
si_desc = "udp receiver child=15 sock=127.0.0.20:5088 (62.231.137.101:5070)\000\067\060)\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000O\320\376\v\372\177\000\000\060\355?\026\376\177\000\000\060\000\000\000\060\000\000\000\320\355?\ 026\376\177\000\000\360\305\a\374\371\177\000"
nrprocs = 16
woneinit = 1
__func__ = "main_loop"
#46 0x0000564229705b9d in main (argc=13, argv=0x7ffe163ff068) at main.c:2645
cfg_stream = 0x56422abe1010
c = -1
r = 0
tmp = 0x7ffe163ffe5e ""
tmp_len = 32766
port = 373288608
proto = 32762
options = 0x564229a710a0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 3543135325
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x0
p = 0xf0b2ff <error: Cannot access memory at address 0xf0b2ff>
st = {st_dev = 19, st_ino = 151468387, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_mtim = {tv_sec = 1550207150,
tv_nsec = 472559347}, st_ctim = {tv_sec = 1550207150, tv_nsec = 472559347}, __glibc_reserved = {0, 0, 0}}
__func__ = "main"
info locals
cfg_stream = 0x56422abe1010
c = -1
r = 0
tmp = 0x7ffe163ffe5e ""
tmp_len = 32766
port = 373288608
proto = 32762
options = 0x564229a710a0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 3543135325
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x0
p = 0xf0b2ff <error: Cannot access memory at address 0xf0b2ff>
st = {st_dev = 19, st_ino = 151468387, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_mtim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_ctim = {tv_sec = 1550207150,
tv_nsec = 472559347}, __glibc_reserved = {0, 0, 0}}
__func__ = "main"
list
1835 FILE* cfg_stream;
1836 int c,r;
1837 char *tmp;
1838 int tmp_len;
1839 int port;
1840 int proto;
1841 char *options;
1842 int ret;
1843 unsigned int seed;
1844 int rfd;
Feb 20 13:55:55 PBXxxxx kernel: [5243784.004500] kamailio[35028]: segfault at 7ff9ef2c3000 ip 00007ff9faf54645 sp 00007ffe163f98d8 error 4 in libcrypto.so.1.1[7ff9faebe000+2b1000]
Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Main process exited, code=exited, status=1/FAILURE
Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Unit entered failed state.
Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Failed with result 'exit-code'.
Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Service hold-off time over, scheduling restart.
Feb 20 13:55:58 PBXxxxx systemd[1]: Stopped Kamailio (OpenSER) - the Open Source SIP Server.
Feb 20 13:55:58 PBXxxxx systemd[1]: Starting Kamailio (OpenSER) - the Open Source SIP Server...
Feb 20 13:55:55 PBXxxxx /usr/local/kamailio/sbin/kamailio[35065]: ERROR: tls [tls_util.h:42]: tls_err_ret(): TLS read:error:24067044:random number generator:rand_pool_add:internal error
Feb 20 13:55:55 PBXxxxx /usr/local/kamailio/sbin/kamailio[35065]: ERROR: <core> [core/tcp_read.c:1505]: tcp_read_req(): ERROR: tcp_read_req: error reading - c: 0x7ff9b1f22340 r: 0x7ff9b1f223c0 (-1)
Feb 20 13:55:56 PBXxxxx /usr/local/kamailio/sbin/kamailio[35069]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 65
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: ALERT: <core> [main.c:740]: handle_sigs(): child process 37534 exited by a signal 11
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: ALERT: <core> [main.c:743]: handle_sigs(): core was generated
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: INFO: <core> [main.c:766]: handle_sigs(): terminating due to SIGCHLD
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37575]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37561]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37554]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37544]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37538]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37570]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37541]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37573]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37567]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37559]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37564]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37536]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37557]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37528]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37550]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37517]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37487]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37505]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37483]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37496]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37520]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37401]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37525]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37450]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37509]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37546]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37531]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37480]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37477]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37490]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37522]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37453]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37405]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37474]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37465]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37518]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37499]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37471]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37468]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37502]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37493]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37459]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37456]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37398]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37462]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37436]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37444]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37442]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37439]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37430]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37421]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37433]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37427]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37424]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37415]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37403]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37399]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37411]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37446]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37408]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37418]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Don't currently have, can capture if required.
TBD
kamailio -v
version: kamailio 5.2.0-rc0 (x86_64/linux) 398698
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144 MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: 398698
compiled on 15:33:07 Nov 16 2018 with gcc 6.3.0
Linux C1PBX0202 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.