Using systemd, 'service kamailio start'.
This is our Kamailio systemd config:
/lib/systemd/system/kamailio.service
```
[Unit]
Description=Kamailio (OpenSER) - the Open Source SIP Server
After=syslog.target network.target local-fs.target postgresql.service haveged.service
freeswitch.service
[Service]
Type=forking
Environment='CFGFILE=/usr/local/kamailio/etc/kamailio/kamailio.cfg'
Environment='SHM_MEMORY=1024'
Environment='PKG_MEMORY=256'
Environment='USER=kamailio'
Environment='GROUP=kamailio'
Environment='RUN_KAMAILIO=yes'
Environment='LD_PRELOAD=/usr/local/kamailio/lib64/kamailio/openssl_mutex_shared/openssl_mutex_shared.so'
# PIDFile requires a full absolute path
PIDFile=/var/run/kamailio/kamailio.pid
# ExecStart requires a full absolute path
ExecStart=/usr/local/kamailio/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f $CFGFILE
-m $SHM_MEMORY -M $PKG_MEMORY -u $USER -g $GROUP
TimeoutSec=120s
Restart=always
# /var/run/kamailio in tmpfs
RuntimeDirectory=kamailio
RuntimeDirectoryMode=0750
; exec
WorkingDirectory=/usr/local/kamailio/sbin
User=root
Group=daemon
LimitCORE=infinity
LimitNOFILE=100000
LimitNPROC=60000
LimitSTACK=250000
LimitRTPRIO=infinity
LimitRTTIME=7000000
IOSchedulingClass=realtime
IOSchedulingPriority=2
Nice=-10
CPUSchedulingPolicy=rr
CPUSchedulingPriority=1
UMask=0007
[Install]
WantedBy=multi-user.target
```
Here is the output of ```bt full``` in gdb for our most recent core dump file.
```
(gdb) bt full
#0 0x00007f46a414cd83 in EVP_CIPHER_flags (cipher=0x0) at crypto/evp/evp_lib.c:210
No locals.
#1 0x00007f46a4136028 in aesni_init_key (ctx=0x7f46587b4980, key=0x7f46587b4878
"\004\373z\264\326\301a\305\337߈M2\361\376aO\226\033\r7\203\071\020\313\060\203r\314\066\005=>\311\372\215\325,z\004y[\202\306\327\021'\337P\231\b\252",
iv=0x0, enc=1) at crypto/evp/e_aes.c:273
ret = 0
mode = 128
dat = 0x0
#2 0x00007f46a414b0d8 in EVP_CipherInit_ex (ctx=0x7f46587b4980, cipher=0x7f46a44b6460
<aesni_256_ecb>, impl=0x0,
key=0x7f46587b4878
"\004\373z\264\326\301a\305\337߈M2\361\376aO\226\033\r7\203\071\020\313\060\203r\314\066\005=>\311\372\215\325,z\004y[\202\306\327\021'\337P\231\b\252",
iv=0x0, enc=1) at crypto/evp/evp_enc.c:200
No locals.
#3 0x00007f46a418ddd3 in ctr_update (drbg=0x7f46587b47b0, in1=0x0, in1len=0, in2=0x0,
in2len=0, nonce=0x0, noncelen=0) at crypto/rand/drbg_ctr.c:274
ctr = 0x7f46587b4858
outlen = 16
#4 0x00007f46a418e0d2 in drbg_ctr_generate (drbg=0x7f46587b47b0,
out=0x7f465afaeb98 "SIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>;tag=0b62483f5"..., outlen=0, adin=0x0, adinlen=0)
at crypto/rand/drbg_ctr.c:349
ctr = 0x7f46587b4858
#5 0x00007f46a418f591 in RAND_DRBG_generate (drbg=0x7f46587b47b0,
out=0x7f465afaeb88
"\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"...,
outlen=16,
prediction_resistance=0, adin=0x0, adinlen=32) at crypto/rand/drbg_lib.c:638
reseed_required = 0
#6 0x00007f46a418f6bf in RAND_DRBG_bytes (drbg=0x7f46587b47b0,
out=0x7f465afaeb88
"\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"...,
outlen=16)
at crypto/rand/drbg_lib.c:679
additional = 0x0
additional_len = 32
chunk = 16
ret = 0
#7 0x00007f46a418fc38 in drbg_bytes (
out=0x7f465afaeb88
"\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"...,
count=16)
at crypto/rand/drbg_lib.c:968
ret = 0
drbg = 0x7f46587b47b0
#8 0x00007f46a41911ab in RAND_bytes (
buf=0x7f465afaeb88
"\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"...,
num=16)
at crypto/rand/rand_lib.c:836
meth = 0x7f46a44d8920 <rand_meth>
#9 0x00007f46a450ebb5 in tls1_enc (s=0x7f465afa3b58, recs=0x7fff01bdf050, n_recs=1,
sending=1) at ssl/record/ssl3_record.c:985
ivlen = 16
ds = 0x7f465a29d8c8
reclen = {268435456, 139940143921712, 4324191904, 139940105930440,
140733222612640, 94261356491263, 94261357814483, 139940105930440, 268435456, 4294967302,
140733222612720, 94261356548576, 139941188525952, 1260989218478, 139941188533296,
139941188525956, 40, 139940105695232,
140733222612768, 139940143921768, 140733222612768, 139941188239022,
139941381576288, 139941381576288, 139941381576304, 140733222615632, 140733222612832,
139941381162415, 140733222612848, 140733222612936, 490, 140733222615632}
buf = {"\000\000\000\000\000\000\000z\027\003\003", <incomplete
sequence \352>, "\177\000\000-\263#\376\070\335\303y4J",
"H\263\252\036q6\266be\232\336", <incomplete sequence \364>,
"\217\305F\022\322\375#\242\255\313jbZ",
"\231\335J\243=\236\244\236\333A\321-\036",
"\034$\222\250\301GB,Σ\270\255\003",
"\021\303\000\000\000\000\000\000\000\000\000\000",
"\000\001\000\000\000\060z\221ZF\177\000",
"\000\060JXF\177\000\000\230H{XF",
"\177\000\000\240\253JXF\177\000\000\000",
"\000\020\032\001\000\000\240\253JXF\177",
"\000\240\355\275\001\377\177\000\000d\227\253", <incomplete
sequence \356>, "\272U\000\000\300z\221ZF\177\000\000",
"0JXF\177\000\000\204\337ԘF\177",
"\000\000\300\243JXF\177\000\000\240y\221",
"Z\b\001\000\000\300\243JXF\177\000",
"\340\355\275\001\377\177\000\000d\227\253", <incomplete sequence
\356\272>, "U\000\000\200\001\000\000%\001\000\000[D",
"\303\356\272U\000\000\204\337ԘF\177",
"\000(\000\000\000\000\000\000\000\060z\221Z",
"F\177\000\000\000\060JXF\177\000", <incomplete sequence \360>,
"\355\217ZF\177\000\000\300z\221ZF\177",
"\000\000\220z\221Z\004\000\000\000\360", <incomplete sequence \303>,
"\356\272U\000\000\240\356\275\001\377\177\000",
")\234\253\356\272U\000\000\240\356\275\001\377",
"\177\000\000ٜ\253\356\272U\000\000\001",
"\000\000\000\000\000\000\001\000\000\000,\001",
"\000\200\337ԘF\177\000\000\240y\221Z",
"%\001\000\000\060\374ԘF\177\000\000\204",
"\337ԘF\177\000\000(\000\000\000\000",
"\000\000\000\060JXF\177\000\000\001\000",
"\000\000\000\000\000\001\000\000\000\032\001\000"}
i = 32767
pad = 0
ret = 32582
tmpr = 1
bs = 139941381576304
mac_size = 0
ctr = 0
padnum = 139941381576288
loop = 139941381576552
padval = 0 '\000'
imac_size = 43
enc = 0x7f46a44d85c0 <aesni_128_cbc_hmac_sha1_cipher>
#10 0x00007f46a450a28f in do_ssl3_write (s=0x7f465afa3b58, type=23,
buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>;tag=0b62483f5"..., pipelens=0x7fff01be0160,
numpipes=1,
create_empty_fragment=0, written=0x7fff01be0270) at ssl/record/rec_layer_s3.c:1003
pkt = {{buf = 0x0, staticbuf = 0x7f465afaeb80 "", curr = 514, written =
514, maxsize = 16472, subs = 0x7f465a917a68}, {buf = 0x0, staticbuf = 0x0, curr = 0,
written = 0, maxsize = 0, subs = 0x0} <repeats 19 times>, {buf = 0x0, staticbuf =
0x0, curr = 0, written = 0,
maxsize = 0, subs = 0x7f465afaeb80}, {buf = 0x3d8, staticbuf = 0x3d8
<error: Cannot access memory at address 0x3d8>, curr = 16472, written = 0, maxsize =
812151909, subs = 0x7f46b52abbb8}, {buf = 0x7fff01be0230,
staticbuf = 0x7f46b5c791da <_dl_runtime_resolve_xsave+138>
"I\211", <incomplete sequence \356>, curr = 60359, written = 586, maxsize
= 139941396355704, subs = 0x7f46a52129a0}, {buf = 0xebc7, staticbuf = 0x7fff01be0e40
"\371!", curr = 140733222620672, written = 828929125,
maxsize = 549756338184, subs = 0x2}, {buf = 0x55baeebfa2d3, staticbuf =
0x40000000 <error: Cannot access memory at address 0x40000000>, curr = 268435456,
written = 6, maxsize = 140733222616912, subs = 0x55baeeae5ddf <parse_from_uri+58>},
{buf = 0x0,
staticbuf = 0x7f46a52129a0 "{", curr = 586, written =
139941396346608, maxsize = 586, subs = 0x2}, {buf = 0x7f46a537f758, staticbuf =
0x7fff01be0110 "\360\002\276\001\377\177", curr = 139941394269184, written =
139941394852256, maxsize = 140733222617072,
subs = 0x7f469fe775bc <pv_get_xto_attr+5183>}, {buf = 0x12000, staticbuf
= 0x1a52129a0 <error: Cannot access memory at address 0x1a52129a0>, curr =
139941396346608, written = 140733222617360, maxsize = 139941394269184, subs =
0x7f46a52129a0}, {buf = 0x7fff01bdffc0,
staticbuf = 0x7f46a52129a0 "{", curr = 43, written =
140733222617520, maxsize = 139941396355704, subs = 0x7f46a51c84c2}, {buf = 0x7fff01be06c8,
staticbuf = 0x7fff01be0700 "\353", <incomplete sequence \307>, curr = 0,
written = 94261388500537, maxsize = 0,
subs = 0x7f469e128bde}, {buf = 0x0, staticbuf = 0x7fff01be06c8 "",
curr = 2001752693, written = 0, maxsize = 94261388500542, subs = 0x0}, {buf = 0xfffffffe,
staticbuf = 0x7f4600000000 <error: Cannot access memory at address 0x7f4600000000>,
curr = 48, written = 0,
maxsize = 4294967295, subs = 0x55baf093de3e}}
wr = {{rec_version = 771, type = 23, length = 506, orig_len = 0, off = 0,
data = 0x7f465afaeb88
"\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"...,
input = 0x7f465afaeb88
"\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"...,
comp = 0x0, read = 0, epoch = 0, seq_num =
"\000\000\000\000\000\000\000"}, {rec_version = 0, type = 0, length = 0,
orig_len = 0, off = 0, data = 0x0, input = 0x0, comp = 0x0, read = 0, epoch = 0, seq_num =
"\000\000\000\000\000\000\000"} <repeats 31 times>}
thispkt = 0x7fff01bdfa50
thiswr = 0x7fff01bdf050
recordstart = 0x7f465afaeb88
"\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"...
i = 0
mac_size = 0
clear = 0
prefix_len = 0
eivlen = 16
align = 3
wb = 0x7f465afa43b0
sess = 0x7f465afb4620
totlen = 490
len = 506
wpinited = 1
j = 1
#11 0x00007f46a45090ac in ssl3_write_bytes (s=0x7f465afa3b58, type=23,
buf_=0x7f46a5382650, len=490, written=0x7fff01be03b0) at ssl/record/rec_layer_s3.c:613
pipelens = {490, 140733222618944, 140733193388032, 94261356061472,
140733193388037, 139941664324654, 140733222617664, 140, 34359741800, 94257352278016,
140733193388075, 139941292790494, 140733222619208, 139941394547910, 139941394547906,
139941664138425, 0, 139938624438273,
140733222618352, 94261388500539, 140733222617768, 206158430224, 140733222617808,
29230736, 0, 1158064281267208192, 5679437561345343536, 18446744073709551615,
12166682089369894912, 5736522341043666960, 139941394865048, 4239145472499881216}
tmppipelen = 490
remain = 0
numpipes = 1
j = 1
buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>;tag=0b62483f5"...
tot = 0
n = 490
max_send_fragment = 16384
split_send_fragment = 16384
maxpipes = 1
nw = 139940105930440
wb = 0x7f465afa43b0
i = 0
tmpwrit = 0
#12 0x00007f46a45178c0 in ssl3_write (s=0x7f465afa3b58, buf=0x7f46a5382650, len=490,
written=0x7fff01be03b0) at ssl/s3_lib.c:4460
No locals.
#13 0x00007f46a45264db in ssl_write_internal (s=0x7f465afa3b58, buf=0x7f46a5382650,
num=490, written=0x7fff01be03b0) at ssl/ssl_lib.c:1943
No locals.
#14 0x00007f46a4526538 in SSL_write (s=0x7f465afa3b58, buf=0x7f46a5382650, num=490) at
ssl/ssl_lib.c:1957
ret = 0
written = 268435456
#15 0x00007f4698d2ea3d in tls_encode_f (c=0x7f465a9a30c8, pbuf=0x7fff01be0560,
plen=0x7fff01be0558, rest_buf=0x7fff01be0568, rest_len=0x7fff01be055c,
send_flags=0x7fff01be054c) at tls_server.c:828
n = 0
offs = 0
ssl = 0x7f465afa3b58
tls_c = 0x7f4659c6de40
wr_buf =
"\027\003\003\002\020SL\364\362e>3<*\234i\255n\025\320E95Q1\316\357M+a:\265<\371\304\357\366\244\251\201\016ɏ\236\064+\r\341\065\207\067\331d߃\235.\226\252\224\024\r\214^\022\317q!\374\242\216\\\364Y\345\232<\003fI^7\324\327A\237\263\r\300\352lGj\203\204\341\352\f\020x\267\366\216\250\221\241\213\270\026\217\255\352\331R\334%\211\267_\302%\310\352\226\363\337˴\345\263{\203\351cr\263ڧ\224J\200\355F@\216\220\322\\\253&\346{KP\263\266\025{n2\262U\342h\202\237[_\326W\364y\216\272\060\"\232\025\315;\311\356/Ur$\200\031\256)[J\024\025\257\222$\353\230\001\061|\256\236"...
rd = {buf = 0x0, pos = 0, used = 0, size = 0}
wr = {
buf = 0x7f4698f6af60 <wr_buf>
"\027\003\003\002\020SL\364\362e>3<*\234i\255n\025\320E95Q1\316\357M+a:\265<\371\304\357\366\244\251\201\016ɏ\236\064+\r\341\065\207\067\331d߃\235.\226\252\224\024\r\214^\022\317q!\374\242\216\\\364Y\345\232<\003fI^7\324\327A\237\263\r\300\352lGj\203\204\341\352\f\020x\267\366\216\250\221\241\213\270\026\217\255\352\331R\334%\211\267_\302%\310\352\226\363\337˴\345\263{\203\351cr\263ڧ\224J\200\355F@\216\220\322\\\253&\346{KP\263\266\025{n2\262U\342h\202\237[_\326W\364y\216\272\060\"\232\025\315;\311\356/Ur$\200\031\256)[J\024\025\257\222$\353\230\001"...,
pos = 0, used = 0, size = 65536}
ssl_error = 0
err_src = 0x7f4698d59ca7 "TLS write:"
buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>;tag=0b62483f5"...
len = 490
x = 1520054472
__func__ = "tls_encode_f"
#16 0x000055baee8da1e4 in tcpconn_send_put (c=0x7f465a9a30c8,
buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>;tag=0b62483f5"..., len=490, send_flags=...)
at core/tcp_main.c:2530
tmp = 0x7f465852d808
fd = 10
response = {140733222618528, 0}
n = 4
do_close_fd = 0
rest_buf = 0x0
t_buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>;tag=0b62483f5"...
rest_len = 0
t_len = 490
resp = 0
t_send_flags = {f = 0, blst_imask = 0}
fd_cache_e = 0x0
use_fd_cache = 0
__func__ = "tcpconn_send_put"
#17 0x000055baee8d78d7 in tcp_send (dst=0x7f465b1b7848, from=0x0,
buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>;tag=0b62483f5"..., len=490) at core/tcp_main.c:2310
c = 0x7f465a9a30c8
ip = {af = 2, len = 4, u = {addrl = {2988284242, 8709}, addr32 = {2988284242, 0,
8709, 0}, addr16 = {39250, 45597, 0, 0, 8709, 0, 0, 0}, addr =
"R\231\035\262\000\000\000\000\005\"\000\000\000\000\000"}}
port = 51179
fd = 7
response = {140733222618832, 140733222618840}
n = 32582
con_lifetime = 57680
rest_buf = 0x7fff01be06c8 ""
t_buf = 0x7fff01be06c4 ""
rest_len = 32767
t_len = 29230784
resp = 140733222618812
t_send_flags = {f = 0, blst_imask = 0}
__func__ = "tcp_send"
#18 0x00007f46a080e586 in msg_send_buffer (dst=0x7f465b1b7848,
buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>;tag=0b62483f5"..., len=490, flags=0) at
../../core/forward.h:282
new_dst = {send_sock = 0x45a9175e8, to = {s = {sa_family = 13296, sa_data =
"\303\356\272U\000\000\000\t\276\001\377\177\000"}, sin = {sin_family = 13296,
sin_port = 61123, sin_addr = {s_addr = 21946}, sin_zero =
"\000\t\276\001\377\177\000"}, sin6 = {sin6_family = 13296,
sin6_port = 61123, sin6_flowinfo = 21946, sin6_addr = {__in6_u = {__u6_addr8
= "\000\t\276\001\377\177\000\000)\234\253\356\272U\000", __u6_addr16 = {2304,
446, 32767, 0, 39977, 61099, 21946, 0}, __u6_addr32 = {29231360, 32767, 4004224041,
21946}}},
sin6_scope_id = 29231360}}, id = 32767, proto = -39 '\331',
send_flags = {f = 61099, blst_imask = 21946}}
outb = {s = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>;tag=0b62483f5"..., len = 490}
netinfo = {data = {s = 0x7f46a086607b "tm: t_reply.c", len = 656}, rcv =
0x7f465a917320, dst = 0x7f46584a3000}
evp = {data = 0x7fff01be0820, rcv = 0x0, dst = 0x7f465b1b7848}
port = 1
ip = {af = 268435456, len = 0, u = {addrl = {139940105741552, 1773850724352},
addr32 = {1481303280, 32582, 29231104, 413}, addr16 = {58608, 22602, 32582, 0, 2048, 446,
413, 0}, addr = "\360\344JXF\177\000\000\000\b\276\001\235\001\000"}}
from = 0x0
local_addr = {s = {sa_family = 0, sa_data = '\000' <repeats 13
times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {
__u6_addr8 =
"\000\000\000\000\000\000\000\000\030v\221ZF\177\000", __u6_addr16 = {0, 0, 0,
0, 30232, 23185, 32582, 0}, __u6_addr32 = {0, 0, 1519482392, 32582}}}, sin6_scope_id =
1481256960}}
con = 0x0
wsev = {type = 0, buf = 0x0, len = 0, id = 0}
ret = 508
__func__ = "msg_send_buffer"
#19 0x00007f46a0810944 in send_pr_buffer (rb=0x7f465b1b77f8, buf=0x7f46a5382650, len=490)
at t_funcs.c:70
__func__ = "send_pr_buffer"
#20 0x00007f46a07c1fa2 in _reply_light (trans=0x7f465b1b7728,
buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>;tag=0b62483f5"..., len=490, code=202,
to_tag=0x7f46a0aa5580 <tm_tags>
"0b62483f5ecbb3b7846ec4ead5977a30-455a", to_tag_len=37, lock=1,
bm=0x7fff01be12c0) at t_reply.c:555
rb = 0x7f465b1b77f8
buf_len = 650
cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len =
0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}}
onsend_params = {req = 0x1be1220, rpl = 0xc00000000, param = 0x17, code =
-290705697, flags = 3, branch = 0, t_rbuf = 0x7fff01be1240, dst = 0x7f465a9a349e, send_buf
= {s = 0x0, len = 0}}
rt = 0
backup_rt = 0
ctx = {rec_lev = -1523033760, run_flags = 32582, last_retcode = -1526226928,
jmp_env = {{__jmpbuf = {94261357790928, 94261357771114, 496, 139941393178640,
140733222621628, 377957122049, 94257352278021, 139941393178640}, __mask_was_saved = 16,
__saved_mask = {__val = {
139941396371752, 140733222621536, 2, 94261357814483, 1073741824,
268435456, 6, 140733222621824, 94261355300342, 140733222621888, 140733222621916,
139941394852256, 139941319868304, 140733222622176, 867612627416, 0}}}}}
pmsg = {id = 0, pid = 0, tval = {tv_sec = 139941260598996, tv_usec =
139941396349872}, fwd_send_flags = {f = 30935, blst_imask = 15921}, rpl_send_flags = {f =
21946, blst_imask = 0}, first_line = {type = 2640, flags = 446, len = 32767, u = {request
= {method = {
s = 0x7f46a53441f0
"sip:813@88.88.88.88:51179;transport=tls;registering_acc=mydomain_co_co", len =
-1721491552}, uri = {s = 0x7f46a5346578 "\a", len = 268435456}, version = {s =
0x1 <error: Cannot access memory at address 0x1>, len = 29233280},
method_value = 29233104}, reply = {version = {s = 0x7f46a53441f0
"sip:813@88.88.88.88:51179;transport=tls;registering_acc=mydomain_co_co", len =
-1721491552}, status = {s = 0x7f46a5346578 "\a", len = 268435456}, reason = {
s = 0x1 <error: Cannot access memory at address 0x1>, len =
29233280}, statuscode = 29233104}}}, via1 = 0x7fff01be0fc0, via2 = 0x7f46a47c031b, headers
= 0x7fff01be1138, last_header = 0x0, parsed_flag = 139941384028963,
h_via1 = 0x7f46b52e24b9 <_IO_vfprintf_internal+1929>, h_via2 = 0x5, callid
= 0x7f46b52e1e36 <_IO_vfprintf_internal+262>, to = 0x7fff01be1000, cseq =
0x7f46a47c017f, from = 0x7fff01be0b28, contact = 0x0, maxforwards = 0x7fff01be0b50, route
= 0xb52e24b9, record_route = 0x0,
content_type = 0x0, content_length = 0x7fff00000000, authorization =
0xffffffffffffffff, expires = 0x7fff00000005, proxy_auth = 0x7f467fffffff, supported =
0x7f46a47c0200, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow =
0x7fff01be0ba0, event = 0x0,
accept = 0xd68, accept_language = 0x7f4600000005, organization = 0x7f46a47c031b,
priority = 0x3, subject = 0x7f46a47c0341, user_agent = 0x7f46a47c0324, server =
0x7fff01be0be0, content_disposition = 0x7f46a47c0341, diversion = 0x7fff01be0be8, rpid =
0x55ba00000006,
refer_to = 0x7f46a47c0320, session_expires = 0x3, min_se = 0x0, sipifmatch =
0x3000000018, subscription_state = 0x7fff01be1210, date = 0x7fff01be1150, identity =
0x7fff01be1220, identity_info = 0x7fff01be1160, pai = 0x7f46a47c0900, ppi = 0x0, path =
0x0,
privacy = 0x3000000000, min_expires = 0x7fff01be0c60, body = 0x0, eoh = 0xd68
<error: Cannot access memory at address 0xd68>, unparsed = 0xd <error: Cannot
access memory at address 0xd>, rcv = {src_ip = {af = 3432, len = 0, u = {addrl = {0,
139941384030571}, addr32 = {0, 0,
2759592299, 32582}, addr16 = {0, 0, 0, 0, 2411, 42108, 32582, 0}, addr =
"\000\000\000\000\000\000\000\000k\t|\244F\177\000"}}, dst_ip = {af =
2759592292, len = 0, u = {addrl = {932276338688, 139941384030571}, addr32 = {268435456,
217, 2759592299, 32582}, addr16 = {
0, 4096, 217, 0, 2411, 42108, 32582, 0}, addr =
"\000\000\000\020\331\000\000\000k\t|\244F\177\000"}}, src_port = 3280, dst_port
= 446, proto_reserved1 = 32767, proto_reserved2 = -290733184, src_su = {s = {sa_family =
21946,
sa_data = "\000\000`\t|\244F\177\000\000\260\021\276\001"}, sin
= {sin_family = 21946, sin_port = 0, sin_addr = {s_addr = 2759592288}, sin_zero =
"F\177\000\000\260\021\276\001"}, sin6 = {sin6_family = 21946, sin6_port = 0,
sin6_flowinfo = 2759592288, sin6_addr = {
__in6_u = {__u6_addr8 =
"F\177\000\000\260\021\276\001\003\000\000\000\300\001\062\240", __u6_addr16 =
{32582, 0, 4528, 446, 3, 0, 448, 41010}, __u6_addr32 = {32582, 29233584, 3, 2687631808}}},
sin6_scope_id = 32582}}, bind_address = 0x3000000018,
proto = -48 '\320'}, buf = 0x3000000018 <error: Cannot access
memory at address 0x3000000018>, len = 29233888, new_uri = {s = 0x7fff01be1220
"\200\022\276\001\377\377\377\377", len = 0}, dst_uri = {s = 0x0, len =
-1523036784}, parsed_uri_ok = -1523314032, parsed_uri = {
user = {s = 0xffffffff01be0cd0 <error: Cannot access memory at address
0xffffffff01be0cd0>, len = 0}, passwd = {s = 0x0, len = -1526226928}, host = {s = 0x6c8
<error: Cannot access memory at address 0x6c8>, len = -1524738624}, port = {
s = 0x7f465a9a357a "Agent: Jitsi2.10.5550Windows XP\r\nEvent:
presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length:
0\r\n\r\n", len = 1482316848}, params = {s = 0x55baeebfa2d3 "INFO", len =
1073741824}, sip_params = {
s = 0x10000000 <error: Cannot access memory at address 0x10000000>,
len = 1495842912}, headers = {s = 0x7fff01be1610 "K4\232ZF\177", len =
-1607376670}, port_no = 25459, proto = 28271, type = 778529126, flags = (unknown:
2770413984), transport = {s = 0x0,
len = -1523103368}, ttl = {s = 0xc800000000 <error: Cannot access memory
at address 0xc800000000>, len = 2}, user_param = {s = 0x55baeebfa2d3 "INFO",
len = 1073741824}, maddr = {s = 0x10000000 <error: Cannot access memory at address
0x10000000>, len = 6}, method = {
s = 0x7fff01be0e10 "", len = -293270045}, lr = {s =
0x286f5d4134421c88 <error: Cannot access memory at address 0x286f5d4134421c88>, len
= 945953928}, r2 = {s = 0x7fff00000000 <error: Cannot access memory at address
0x7fff00000000>, len = -1526226928}, gr = {
s = 0x7fff01be0dc0 "\200\225!\245F\177", len = -1589576708},
transport_val = {s = 0x7f46a5380f88 "\240\001", len = -1524553312}, ttl_val = {s
= 0x7f46a5153018 "Q", len = 29232704}, user_param_val = {s = 0x7f46b5e8ef30
"", len = -1255543408}, maddr_val = {
s = 0x7f46b52ac038 "", len = -1245263117}, method_val = {s = 0x754
<error: Cannot access memory at address 0x754>, len = 0}, lr_val = {s =
0x7f46a5219580 "", len = -290705697}, r2_val = {s = 0x7fff01be0e10 "",
len = -1526226928}, gr_val = {s = 0x55baee80c461 "syscall",
len = -1526226928}}, parsed_orig_ruri_ok = 29232720, parsed_orig_ruri =
{user = {s = 0x7f46a140fbfc <pkg_proc_update_stats+115> "H\213\rEW ", len
= 268435456}, passwd = {s = 0x0, len = 268435456}, host = {s = 0xfc59220 <error: Cannot
access memory at address 0xfc59220>,
len = 2377992}, port = {s = 0x3a6de0 <error: Cannot access memory at
address 0x3a6de0>, len = 3830720}, params = {s = 0x8 <error: Cannot access memory at
address 0x8>, len = 8697}, sip_params = {s = 0x7f46a507a010 "\001", len =
29232768}, headers = {
s = 0x55baee913e90 <sr_event_exec+482>
"\211E\374\213E\374\351A\002", len = 0}, port_no = 13296, proto = 61123, type =
URN_URI_T, flags = (unknown: 29232944), transport = {s = 0xeeab9c29 <error: Cannot
access memory at address 0xeeab9c29>, len = 29232944}, ttl = {
s = 0x55baeeaba08d <qm_malloc+2331>
"H\213E\270H\203\300\070\351*\003", len = 29232944}, user_param = {s =
0x55baeebfa2d3 "INFO", len = -1535365032}, maddr = {s = 0x9110000000 <error:
Cannot access memory at address 0x9110000000>, len = -1535356792}, method = {
s = 0x7f46a47c3f6c "core: db_val.c", len = 8}, lr = {s =
0x7f46a507a010 "\001", len = -1523317048}, r2 = {s = 0x100000001 <error:
Cannot access memory at address 0x100000001>, len = -258744391}, gr = {s =
0x7f46a53749b0 "\b", len = 29232976}, transport_val = {
s = 0x7f46a507a010 "\001", len = 4}, ttl_val = {s = 0x7fff01be15b0
"", len = -289430829}, user_param_val = {s = 0x7f46a47c3058 "core",
len = 268435456}, maddr_val = {s = 0x6 <error: Cannot access memory at address 0x6>,
len = 29233168}, method_val = {
s = 0x7f46a47b94ce <db_str2val+14063>
"H\213\205P\377\377\377H\213P\020\213\205X\377\377\377H\230H\001\320",
<incomplete sequence \306>, len = 8698}, lr_val = {s = 0x7f46a507a010
"\001", len = 29233024}, r2_val = {s = 0x55baf093dfba "", len =
-1523317032}, gr_val = {
s = 0x300000000 <error: Cannot access memory at address 0x300000000>,
len = 29233200}}, add_rm = 0x55baeeac2edf <qm_info+46>, body_lumps = 0x7fff01be0fc0,
reply_lump = 0x55baeeac2edf <qm_info+46>,
add_to_branch_s =
"\320\017\276\001\377\177\000\000\020\240\a\245F\177\000\000\000\020\276\001\377\177\000\000\020\240\a\245F\177\000\000\020\020\276\001\377\177\000\000\374\373@\241F\177\000\000\000\000\000\020\000\000\000\000\000",
add_to_branch_len = 0,
hash_index = 268435456, msg_flags = 0, flags = 4004261599, xflags = {21946,
29233184}, set_global_address = {s = 0x7f46a507a010 "\001", len = 3830720},
set_global_port = {s = 0x7f46a507a010 "\001", len = 29233248},
force_send_socket = 0x7f46a140fbfc <pkg_proc_update_stats+115>, path_vec =
{s = 0x7fff01be1040 "\300s:", len = 0}, instance = {s = 0x10000000 <error:
Cannot access memory at address 0x10000000>, len = 264604840}, reg_id = 2379392, ruid =
{
s = 0x3a7358 <error: Cannot access memory at address 0x3a7358>, len =
3830720}, location_ua = {s = 0x8 <error: Cannot access memory at address 0x8>, len =
8701}, ldv = {flow = {decoded = 3830720, rcv = {src_ip = {af = 29233296, len = 32767, u =
{addrl = {94261354774160,
0}, addr32 = {4002496144, 21946, 0, 0}, addr16 = {16016, 61073,
21946, 0, 0, 0, 0, 0}, addr =
"\220>\221\356\272U\000\000\000\000\000\000\000\000\000"}}, dst_ip = {af =
2768740656, len = 5, u = {addrl = {8858370048, 2771939544}, addr32 = {268435456, 2,
2771939544, 0}, addr16 = {0, 4096, 2, 0, 28888, 42296, 0, 0}, addr =
"\000\000\000\020\002\000\000\000\330p8\245\000\000\000"}}, src_port = 4448,
dst_port = 446, proto_reserved1 = 32767, proto_reserved2 = -290733184, src_su = {s =
{sa_family = 21946,
sa_data = "\000\000`\021\276\001\377\177\000\000)\234\253",
<incomplete sequence \356>}, sin = {sin_family = 21946, sin_port = 0, sin_addr =
{s_addr = 29233504}, sin_zero = "\377\177\000\000)\234\253", <incomplete
sequence \356>}, sin6 = {sin6_family = 21946,
sin6_port = 0, sin6_flowinfo = 29233504, sin6_addr = {__in6_u =
{__u6_addr8 = "\377\177\000\000)\234\253\356\000\000\000\000\200\361\276",
<incomplete sequence \356>, __u6_addr16 = {32767, 0, 39977, 61099, 0, 0, 61824,
61118}, __u6_addr32 = {32767, 4004224041, 0,
4005491072}}}, sin6_scope_id = 21946}}, bind_address =
0xa35eeaba08d, proto = -48 '\320'}}}}
__func__ = "_reply_light"
#21 0x00007f46a07c2c18 in _reply (trans=0x7f465b1b7728, p_msg=0x7f46a52129a0, code=202,
reason=0x7fff01be13e0, lock=1) at t_reply.c:657
len = 490
buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>;tag=0b62483f5"...
dset = 0x6 <error: Cannot access memory at address 0x6>
bm = {to_tag_val = {s = 0x7f46a538270f
"0b62483f5ecbb3b7846ec4ead5977a30-455a\r\nVia: SIP/2.0/TLS
192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346;rport=51179;received=88.88.88.88\r\nExpires:
3600\r\nContact: <sip:77.7"..., len = 37}}
dset_len = 1
#22 0x00007f46a07cce31 in t_reply_str (t=0x7f465b1b7728, p_msg=0x7f46a52129a0, code=202,
reason=0x7fff01be13e0) at t_reply.c:1634
No locals.
#23 0x00007f46a0832825 in ki_t_reply (msg=0x7f46a52129a0, code=202, reason=0x7fff01be13e0)
at tm.c:1354
t = 0x7f465b1b7728
ret = -1
__func__ = "ki_t_reply"
#24 0x00007f46a0833027 in w_t_reply_wrp (msg=0x7f46a52129a0, code=202, txt=0x7f46a53749e8
"OK") at tm.c:1411
reason = {s = 0x7f46a53749e8 "OK", len = 2}
#25 0x00007f46a031a9f3 in send_reply (msg=0x7f46a52129a0, code=202, reason=0x7f469d416460
<su_200_rpl>) at sl.c:287
r = 0x7f46a53749e8 "OK"
t = 0x7f465b1b7728
ret = 1
__func__ = "send_reply"
#26 0x00007f469d1c7b30 in send_2XX_reply (msg=0x7f46a52129a0, reply_code=202,
lexpire=3600, local_contact=0x7fff01be18e0) at subscribe.c:122
hdr_append = {s = 0x7f46a5341290 "Expires: 3600\r\nContact:
<sip:77.77.77.77:5071;transport=tls>\r\n", len = 65}
tmp = {s = 0x7f46a53412ce ">\r\n", len = 4}
t = 0x7f46a53412c0 ";transport=tls>\r\n"
__func__ = "send_2XX_reply"
#27 0x00007f469d1cf2fb in update_subscription (msg=0x7f46a52129a0, subs=0x7fff01be1800,
to_tag_gen=1, sent_reply=0x7fff01be163c) at subscribe.c:659
hash_code = 2864
__func__ = "update_subscription"
#28 0x00007f469d1d6d41 in handle_subscribe (msg=0x7f46a52129a0, watcher_user=...,
watcher_domain=...) at subscribe.c:1207
to_tag_gen = 1
subs = {pres_uri = {s = 0x7f46a51e0aa0 "sip:87@mydomain.co.co", len =
32}, to_user = {
s = 0x7f465a9a3481 "87(a)mydomain.co.co>\r\nVia;\r\nVia: SIP/2.0/TLS
192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards:
69\r\nContact: \"813\" <sip:813@192.168.128.58:1195;transport=tls;"...,
len = 2}, to_domain = {
s = 0x7f465a9a3484 "mydomain.co.co>\r\nVia: SIP/2.0/TLS
192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards:
69\r\nContact: \"813\"
<sip:813@192.168.128.58:1195;transport=tls;reg"..., len = 25}, from_user = {
s = 0x7f465a9a344b "813(a)mydomain.co.co>;tag=fce8c1c6\r\nToc6\r\nTo:
<sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS
192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards:
69\r\nCont"..., len = 3}, from_domain = {
s = 0x7f465a9a344f "mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS
192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards:
69\r\nContact:"..., len = 25}, watcher_user = {
s = 0x7f465a9a344b "813(a)mydomain.co.co>;tag=fce8c1c6\r\nToc6\r\nTo:
<sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS
192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards:
69\r\nCont"..., len = 3}, watcher_domain = {
s = 0x7f465a9a344f "mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS
192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards:
69\r\nContact:"..., len = 25}, event = 0x7f46587d2810,
event_id = {s = 0x0, len = 0}, to_tag = {s = 0x7f46a0aa5580 <tm_tags>
"0b62483f5ecbb3b7846ec4ead5977a30-455a", len = 37}, from_tag = {
s = 0x7f465a9a346e "fce8c1c6\r\nTo: <sip:87@mydomain.co.co>\r\nVia:
SIP/2.0/TLS
192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards:
69\r\nContact: \"813\" <sip:813@192.168.128.58:"..., len = 8}, callid =
{
s = 0x7f465a9a33fd "18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeqnCSeq: 1
SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;"..., len =
40}, sockinfo_str = {
s = 0x7f46a52066f0 "tls:77.77.77.77:5071", len = 23}, remote_cseq =
1, local_cseq = 0, contact = {s = 0x7f46a53441f0
"sip:813@88.88.88.88:51179;transport=tls;registering_acc=mydomain_co_co", len =
83}, local_contact = {
s = 0x7f46a51e55f8 "sip:77.77.77.77:5071;transport=tls", len = 37},
record_route = {s = 0x0, len = 0}, expires = 3600, status = 1, reason = {s = 0x0, len =
0}, version = 0, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1,
internal_update_flag = 0,
updated = -1, updated_winfo = -1, flags = 0, user_agent = {s = 0x7f465a9a3581
"Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept:
application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 24}, next
= 0x0}
event = 0x7f46587d2810
parsed_event = 0x7f46a53802c8
ev_param = 0x0
found = 1
reason = {s = 0x0, len = 0}
uri = {user = {s = 0x490 <error: Cannot access memory at address 0x490>, len
= 46}, passwd = {s = 0x7fff01be16a0 "", len = 2}, host = {s = 0x55baeebfa2d3
"INFO", len = 1073741824}, port = {s = 0x10000000 <error: Cannot access
memory at address 0x10000000>, len = 6}, params = {
s = 0x7fff01be1700 "\360ݓ\360\272U", len = -290562593}, sip_params =
{s = 0x7fff01be16e0 "8\367\067\245F\177", len = -1524553312}, headers = {s =
0x7fff01be17a0 "", len = -1523058960}, port_no = 11150, proto = 12410, type =
3590688514, flags = (unknown: 3884946688),
transport = {s = 0x7f46a537f738 "K4\232ZF\177", len = 29235168}, ttl =
{s = 0x0, len = -1525753168}, user_param = {s = 0x55baf093ddf0
"\270Kc\265F\177", len = 0}, maddr = {s = 0x7f46a50edab3 "", len =
-1642817343}, method = {s = 0x0, len = 29235392}, lr = {
s = 0xffffffffa51c6828 <error: Cannot access memory at address
0xffffffffa51c6828>, len = 0}, r2 = {
s = 0x7f465a9a3400 "1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeqnCSeq: 1
SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;bra"..., len =
0}, gr = {
s = 0x7f46a50edab0 "813", len = 0}, transport_val = {s = 0x0, len =
-1525753168}, ttl_val = {s = 0x300000000 <error: Cannot access memory at address
0x300000000>, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s =
0x7f46a50edaaf "", len = 0}, method_val = {
s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x4600000000
<error: Cannot access memory at address 0x4600000000>, len = -1524553312}, gr_val =
{
s = 0x7f465a9a33ca "sip:87@mydomain.co.co SIP/2.0\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@my.domain"..., len =
32}}
reply_code = 500
reply_str = {s = 0x7f469d209fcd "Server Internal Error", len = 21}
sent_reply = 0
__func__ = "handle_subscribe"
#29 0x00007f469d1d2e4e in handle_subscribe0 (msg=0x7f46a52129a0) at subscribe.c:988
pfrom = 0x7f46a537f6f0
__func__ = "handle_subscribe0"
#30 0x000055baee84384a in do_action (h=0x7fff01be2170, a=0x7f46a51cd3e0,
msg=0x7f46a52129a0) at core/action.c:1067
ret = -5
v = -289430829
dst = {send_sock = 0x7fff01be1ed0, to = {s = {sa_family = 64508, sa_data =
"@\241F\177\000\000\270u\032\245F\177\000"}, sin = {sin_family = 64508, sin_port
= 41280, sin_addr = {s_addr = 32582}, sin_zero = "\270u\032\245F\177\000"}, sin6
= {sin6_family = 64508,
sin6_port = 41280, sin6_flowinfo = 32582, sin6_addr = {__in6_u = {__u6_addr8
= "\270u\032\245F\177\000\000\330c\032\245F\177\000", __u6_addr16 = {30136,
42266, 32582, 0, 25560, 42266, 32582, 0}, __u6_addr32 = {2769974712, 32582, 2769970136,
32582}}},
sin6_scope_id = 2770413984}}, id = 32582, proto = 96 '`', send_flags
= {f = 446, blst_imask = 32767}}
tmp = 0x7fff01be3a60 "\003"
new_uri = 0x7f46a51bbf70 "\032"
end = 0x7f46a52129a0 "{"
crt = 0x7f46a51bbf70 "\032"
cmd = 0x7f46a51357a8
len = 32582
user = -1524553312
uri = {user = {s = 0x7fff01be2280 "\230\310\034\245F\177", len =
-1626615074}, passwd = {s = 0x7fff01be2388 "x%\276\001\377\177", len = 0}, host
= {s = 0x69 <error: Cannot access memory at address 0x69>, len = -1255267143}, port
= {
s = 0x7f46a50e5910
"18d1c938d6d6d03dc502a4144f504713@0.0.0.0813@mydomain.co.co88.88.88.88::bantime",
len = 91}, params = {s = 0x7f46a519ab28 "\001", len = -1524553312}, sip_params =
{s = 0x7fff01be1de8 "\350\322\v\237F\177", len = 16}, headers = {
s = 0x7fff01be1e10 "\347\322\v\237F\177", len = 29237712}, port_no =
0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x55ba00000000
<error: Cannot access memory at address 0x55ba00000000>, len = -1}, ttl = {s = 0x0,
len = 16}, user_param = {
s = 0x7f46a5215b98 "18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0|handling
SUBSCRIBE from user [sip:813@mydomain.co.co]", len = 0}, maddr = {s = 0x7f4600000000
<error: Cannot access memory at address 0x7f4600000000>, len = 105}, method = {
s = 0x7fff01be1e60 "\300\037\032\245F\177", len = 0}, lr = {s =
0xd68 <error: Cannot access memory at address 0xd68>, len = 121}, r2 = {s =
0x7f469f0bd2de "%s: %s%.*s", len = 3}, gr = {s = 0x1800000000 <error: Cannot
access memory at address 0x1800000000>,
len = -1626615064}, transport_val = {s = 0x55baeebfa2d3 "INFO", len
= 1073741824}, ttl_val = {s = 0x7f46a512d6c0 "\264\356z\237F\177", len =
-1524992576}, user_param_val = {s = 0x7f469f0bd2e7 "s", len = 0}, maddr_val = {s
= 0x7fff01be1ec0 "\360\036\276\001\377\177",
len = 16}, method_val = {s = 0x7fff01be2460 "Ӣ\277\356\272U", len =
29238176}, lr_val = {s = 0x10000000 <error: Cannot access memory at address
0x10000000>, len = 6}, r2_val = {s = 0x7fff01be1ef0 "\340$\276\001\377\177",
len = -291901200}, gr_val = {
s = 0x7f46a51a1fc0 "?", len = 29244000}}
next_hop = {user = {s = 0x7fff01be1bb0 "\340\033\276\001\377\177", len =
29236496}, passwd = {s = 0x14aef82fb <error: Cannot access memory at address
0x14aef82fb>, len = 1494091032}, host = {s = 0x7fff01be1bc0
"\340\033\276\001\377\177", len = -1728474616}, port = {
s = 0x7f465b1ba0c0 "\373\202\357J\244", len = 1494091032}, params =
{s = 0x7fff01be1be0 "\220\034\276\001\377\177", len = 2}, sip_params = {s =
0x7fff01be1be0 "\220\034\276\001\377\177", len = -1728469356}, headers = {
s = 0x2fb10000000 <error: Cannot access memory at address
0x2fb10000000>, len = 1481492824}, port_no = 7312, proto = 446, type = 32767, flags =
(URI_USER_NORMALIZE | unknown: 2566518280), transport = {s = 0x7f46a5341e80
"\375\063\232ZF\177", len = 1}, ttl = {
s = 0x7fff01be1d10 "i", len = -258744848}, user_param = {s =
0x7fff01be21a0 "", len = -1254103147}, maddr = {s = 0x7fff01be21b8
"\210\034b87\203\344|", len = 0}, method = {s = 0x7f46b53fe798 "]",
len = -1255267143}, lr = {
s = 0x4aef82fb000002fb <error: Cannot access memory at address
0x4aef82fb000002fb>, len = 1555492741}, r2 = {s = 0x7fff01be2168
"`:\276\001\377\177", len = 42728}, gr = {s = 0x7fff01be1d08 "", len =
10}, transport_val = {s = 0x7fff01be2163 "\245F\177", len = 1073741924},
ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7fff00000000 <error:
Cannot access memory at address 0x7fff00000000>, len = -1}, maddr_val = {s =
0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = 0},
method_val = {
s = 0x7fff00000000 <error: Cannot access memory at address
0x7fff00000000>, len = 1481492768}, lr_val = {s = 0x7fff00000005 <error: Cannot
access memory at address 0x7fff00000005>, len = -1255080914}, r2_val = {s =
0x7fff01be1d80 "", len = 105}, gr_val = {
s = 0xd68 <error: Cannot access memory at address 0xd68>, len =
-258744848}}
u = 0x7fff01be2040
port = 0
dst_host = 0x2
i = -293268297
flags = 32582
avp = 0x7fff01be2110
st = {flags = 164, id = 0, name = {n = 1481256960, s = {s = 0x7f46584a3000
"", len = 1}, re = 0x7f46584a3000}, avp = 0x7f465b1ba0c0}
sct = 0x10000000
sjt = 0x40000000
rve = 0x10000000
mct = 0x55baeebfa2d3
rv = 0x7f4698fcb4dc
rv1 = 0x6
c1 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 6, s = {s =
0x100000006 <error: Cannot access memory at address 0x100000006>, len = 29236064},
re = 0x100000006}, pval = {rs = {s = 0x100000006 <error: Cannot access memory at
address 0x100000006>,
len = 29236064}, ri = -290696736, flags = 21946}}, i2s =
"0\262\374\230F\177\000\000\031g1\265\272\000\000\000\370\342\374\230F\177"}
s = {s = 0x55baeebfa2d3 "INFO", len = 1481492168}
srevp = {0x7fff01be1b10, 0x55baeeab71ff <futex_release+29>}
evp = {data = 0x0, rcv = 0x0, dst = 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len =
0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len
= 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#31 0x000055baee850de3 in run_actions (h=0x7fff01be2170, a=0x7f46a51cd3e0,
msg=0x7f46a52129a0) at core/action.c:1569
t = 0x7f46a51cd3e0
ret = -1
tvb = {tv_sec = 94261361422004, tv_usec = 1481492824}
tve = {tv_sec = 54086552396016, tv_usec = 6861465236}
tz = {tz_minuteswest = -290647711, tz_dsttime = 21946}
tdiff = 2771908408
__func__ = "run_actions"
#32 0x000055baee8514b7 in run_actions_safe (h=0x7fff01be3a60, a=0x7f46a51cd3e0,
msg=0x7f46a52129a0) at core/action.c:1633
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {2,
2913650019544472712, 94261357814483, 1073741824, 268435456, 6, 2913650019508821128,
8999462228585487496}, __mask_was_saved = 0, __saved_mask = {__val = {1073741824,
268435456, 6, 140733222625856,
94261356683560, 268435456, 139941394852256, 140733222626112,
139941396346608, 1, 2, 139941396346680, 140733222626320, 139941394534488, 139941394852256,
140733222626016}}}}}
ret = -1
ign_on_break = 0
#33 0x000055baeea8c044 in rval_get_int (h=0x7fff01be3a60, msg=0x7f46a52129a0,
i=0x7fff01be2578, rv=0x7f46a51cc898, cache=0x0) at core/rvalue.c:915
r_avp = 0x7fff01be2410
avp_val = {n = 268435456, s = {s = 0x10000000 <error: Cannot access memory at
address 0x10000000>, len = 6}, re = 0x10000000}
pval = {rs = {s = 0x55baf093e040 "<134>Apr 17 10:19:01
/usr/local/kamailio/sbin/kamailio[42728]: INFO: <script>:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0|handling SUBSCRIBE from user
[sip:813@mydomain.co.co]", len = 2}, ri = -289430829, flags = 21946}
tmp = {s = 0x9e56465f0000465f <error: Cannot access memory at address
0x9e56465f0000465f>, len = -1523058888}
s = 0x0
r = 21
ret = 0
destroy_pval = 0
__func__ = "rval_get_int"
#34 0x000055baeea909b5 in rval_expr_eval_int (h=0x7fff01be3a60, msg=0x7f46a52129a0,
res=0x7fff01be2578, rve=0x7f46a51cc890) at core/rvalue.c:1913
i1 = 29239792
i2 = 4
ret = -1
c1 = {cache_type = 2770413984, val_type = 32582, c = {avp_val = {n = 29244000, s =
{s = 0x7fff01be3a60 "\003", len = -289430829}, re = 0x7fff01be3a60}, pval = {rs
= {s = 0x7fff01be3a60 "\003", len = -289430829}, ri = 1073741824, flags = 0}},
i2s = '\000' <repeats 21 times>}
c2 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 29238288, s
= {s = 0x7fff01be2410 "", len = 29238352}, re = 0x7fff01be2410}, pval = {rs = {s
= 0x7fff01be2410 "", len = 29238352}, ri = -290912104, flags = 21946}},
i2s =
"\240)!\245F\177\000\000\000\000\000\000\000\000\000\000\070P\034\245F\177"}
rv1 = 0x55baee9febed <pv_value_destroy+175>
rv2 = 0x55baeebfa2d3
__func__ = "rval_expr_eval_int"
#35 0x000055baeea90e25 in rval_expr_eval_int (h=0x7fff01be3a60, msg=0x7f46a52129a0,
res=0x7fff01be29f0, rve=0x7f46a51cd788) at core/rvalue.c:1921
i1 = 0
i2 = 0
ret = -1
c1 = {cache_type = 2769969568, val_type = 32582, c = {avp_val = {n = 29244000, s =
{s = 0x7fff01be3a60 "\003", len = 8715}, re = 0x7fff01be3a60}, pval = {rs = {s =
0x7fff01be3a60 "\003", len = 8715}, ri = -1526226928, flags = 32582}},
i2s = "\320[\033\245F\177\000\000\002", '\000' <repeats 12
times>}
c2 = {cache_type = 29238672, val_type = 32767, c = {avp_val = {n = -1626642069, s
= {s = 0x7f469f0b696b <xlog_2_helper+990>
"H\215e\330[A\\A]A^A_]\303UH\211\345H\203\354
H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271",
len = -289430829},
re = 0x7f469f0b696b <xlog_2_helper+990>}, pval = {rs = {s =
0x7f469f0b696b <xlog_2_helper+990>
"H\215e\330[A\\A]A^A_]\303UH\211\345H\203\354
H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271",
len = -289430829}, ri = 0, flags = 0}},
i2s =
"\377\377\377\377\000\000\000\000\070\204\067\245F\177\000\000\320[\033\245F\177"}
rv1 = 0x6
rv2 = 0x10000000
__func__ = "rval_expr_eval_int"
#36 0x000055baee8432e7 in do_action (h=0x7fff01be3a60, a=0x7f46a51cebb0,
msg=0x7f46a52129a0) at core/action.c:1043
ret = -5
v = 0
dst = {send_sock = 0x286f5d417d421c88, to = {s = {sa_family = 7304, sa_data =
"b87\203\344|\000\000\000\000\000\000\000"}, sin = {sin_family = 7304, sin_port
= 14434, sin_addr = {s_addr = 2095350583}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 7304,
sin6_port = 14434, sin6_flowinfo = 2095350583, sin6_addr = {__in6_u =
{__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0,
0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 4005755768}}, id = 21946, proto = 2
'\002', send_flags = {f = 0,
blst_imask = 0}}
tmp = 0x1 <error: Cannot access memory at address 0x1>
new_uri = 0x55baeebfa2d3 "INFO"
end = 0x2 <error: Cannot access memory at address 0x2>
crt = 0x7f4600000000 <error: Cannot access memory at address
0x7f4600000000>
cmd = 0x7f46a512f938
len = 32582
user = 0
uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x55baeebfa2d3 "INFO",
len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address
0x10000000>, len = 6}, port = {s = 0x7fff01be2950 "`*\276\001\377\177", len =
-293270045}, params = {
s = 0x286f5d4162c21c88 <error: Cannot access memory at address
0x286f5d4162c21c88>, len = 945953928}, sip_params = {s = 0x0, len = 0}, headers = {s =
0x7fff01be28e0 "P)\276\001\377\177", len = 2}, port_no = 41683, proto = 61119,
type = 21946, flags = (unknown: 2770413984),
transport = {s = 0x7f46a51ba900 "\026", len = 29239680}, ttl = {s =
0x7fff01be2a10 "P+\276\001\377\177", len = -290911819}, user_param = {s =
0x7fff01be2950 "`*\276\001\377\177", len = -291517360}, maddr = {
s = 0x1900000004 <error: Cannot access memory at address 0x1900000004>,
len = 0}, method = {s = 0x7f46a5217b80 "", len = -1524553312}, lr = {s =
0x1a51f40c0 <error: Cannot access memory at address 0x1a51f40c0>, len = 0}, r2 = {s
= 0x7f46a52129a0 "{", len = 2}, gr = {
s = 0x55baeebfa2d3 "INFO", len = 1073741824}, transport_val = {s =
0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val =
{s = 0x7fff01be2a60 "P+\276\001\377\177", len = -293268297}, user_param_val = {s
= 0x7f46a52129a0 "{", len = -1524553312},
maddr_val = {s = 0x7f46a51ba900 "\026", len = 29244000}, method_val =
{s = 0x0, len = 1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>,
len = 2128747656}, r2_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824},
gr_val = {
s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len
= 6}}
next_hop = {user = {s = 0x10000000 <error: Cannot access memory at address
0x10000000>, len = 6}, passwd = {s = 0x7fff01be27e0 "\320(\276\001\377\177",
len = -293268297}, host = {s = 0x7fff01bdf678 "", len = -1524553312}, port = {s
= 0x7f46a51f3e88 "\004", len = 29244000},
params = {s = 0x0, len = -1}, sip_params = {s = 0x2 <error: Cannot access
memory at address 0x2>, len = 1642208392}, headers = {s = 0x55baeebfa2d3
"INFO", len = 1073741824}, port_no = 0, proto = 4096, type = ERROR_URI_T, flags
= (URI_SIP_USER_PHONE | unknown: 4),
transport = {s = 0x286f5d4160421c88 <error: Cannot access memory at address
0x286f5d4160421c88>, len = 945953928}, ttl = {s = 0x7f46a512e4b0
"\030\213U\237F\177", len = 25}, user_param = {s = 0x18 <error: Cannot access
memory at address 0x18>, len = 0}, maddr = {
s = 0x7fff01be28c0 "", len = -1524553312}, method = {s =
0x7f46a5194360 ".", len = 29239360}, lr = {s = 0x18 <error: Cannot access
memory at address 0x18>, len = -258927888}, r2 = {s = 0x0, len = 0}, gr = {s =
0x7fff01be28c0 "", len = -1254730963}, transport_val = {
s = 0x2701be28c0 <error: Cannot access memory at address 0x2701be28c0>,
len = -1609780480}, ttl_val = {s = 0xffffffffa5212ba8 <error: Cannot access memory at
address 0xffffffffa5212ba8>, len = -1}, user_param_val = {s = 0x7fff01be28d0
"\020*\276\001\377\177",
len = -290930620}, maddr_val = {s = 0x55baeebfa2d3 "INFO", len =
1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address
0x10000000>, len = 0}, lr_val = {s = 0x7f46a51f40c8 "\004", len = 29240072},
r2_val = {s = 0x7f46a52129a0 "{",
len = 29244000}, gr_val = {s = 0x7f46a5194360 ".", len =
29244000}}
u = 0x7f4600000000
port = 0
dst_host = 0x2
i = -290911819
flags = 0
avp = 0x7fff01be2c90
st = {flags = 268435456, id = 65535, name = {n = 0, s = {s = 0x0, len = 29238992},
re = 0x0}, avp = 0x2}
sct = 0x7f46a5164e58
sjt = 0x6
rve = 0x7f46a51cd788
mct = 0x10000000
rv = 0x40000000
rv1 = 0x6
c1 = {cache_type = 29239904, val_type = 32767, c = {avp_val = {n = 29240320, s =
{s = 0x7fff01be2c00 "\300\273\033\245F\177", len = -1524738568}, re =
0x7fff01be2c00}, pval = {rs = {s = 0x7fff01be2c00 "\300\273\033\245F\177", len =
-1524738568}, ri = 29239888, flags = 944}},
i2s =
"\240)!\245F\177\000\000\002\000\000\000\000\000\000\000Ӣ\277\356\272U"}
s = {s = 0x7f46a51f3e88 "\004", len = 29239040}
srevp = {0x7fff01be26a0, 0x7f46a52129a0}
evp = {data = 0x0, rcv = 0x0, dst = 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len =
0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len
= 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#37 0x000055baee850de3 in run_actions (h=0x7fff01be3a60, a=0x7f46a51bbbc0,
msg=0x7f46a52129a0) at core/action.c:1569
t = 0x7f46a51cebb0
ret = 1
tvb = {tv_sec = 94257352278016, tv_usec = -1}
tve = {tv_sec = 0, tv_usec = 139938624438272}
tz = {tz_minuteswest = 0, tz_dsttime = 0}
tdiff = 0
__func__ = "run_actions"
#38 0x000055baee8437b6 in do_action (h=0x7fff01be3a60, a=0x7f46a51d27f0,
msg=0x7f46a52129a0) at core/action.c:1058
ret = 1
v = 1
dst = {send_sock = 0x286f5d4172e21c88, to = {s = {sa_family = 7304, sa_data =
"b87\203\344|\000\000\000\000F\177\000"}, sin = {sin_family = 7304, sin_port =
14434, sin_addr = {s_addr = 2095350583}, sin_zero =
"\000\000\000\000F\177\000"}, sin6 = {sin6_family = 7304,
sin6_port = 14434, sin6_flowinfo = 2095350583, sin6_addr = {__in6_u =
{__u6_addr8 = "\000\000\000\000F\177\000\000\205\220\233\237F\177\000",
__u6_addr16 = {0, 0, 32582, 0, 36997, 40859, 32582, 0}, __u6_addr32 = {0, 32582,
2677772421, 32582}}},
sin6_scope_id = 2677772447}}, id = 32582, proto = 0 '\000',
send_flags = {f = 0, blst_imask = 0}}
tmp = 0x4 <error: Cannot access memory at address 0x4>
new_uri = 0x7fff01be31c0 "\340\066\276\001\377\177"
end = 0x55baf07d9244 ""
crt = 0x7f46a11f8512 "%x%c%x%c"
cmd = 0x7f46a5149000
len = 0
user = 14
uri = {user = {s = 0xffffffffffffffff <error: Cannot access memory at address
0xffffffffffffffff>, len = 2}, passwd = {s = 0x55baeebfa2d3 "INFO", len =
1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address
0x10000000>, len = 6}, port = {
s = 0x7fff01be3020 "01\276\001\377\177", len = -293270045}, params =
{s = 0x3865366136626335 <error: Cannot access memory at address 0x3865366136626335>,
len = 1073741824}, sip_params = {s = 0x7fff01be2fa0 "\001\200\255\373F\177", len
= 29241248}, headers = {
s = 0x1a <error: Cannot access memory at address 0x1a>, len =
-1591769838}, port_no = 12552, proto = 446, type = 32767, flags = (unknown: 2770413984),
transport = {s = 0x7f46a5148ea8 "\021", len = 29241424}, ttl = {
s = 0x7f46fbad8001 <error: Cannot access memory at address
0x7f46fbad8001>, len = -1614761307}, user_param = {s = 0x7f469fc0b2a5
<_ul_sruid+5> "5cb6ef3a-a6e8-", len = -1614761307}, maddr = {s =
0x7f469fc0b2a5 <_ul_sruid+5> "5cb6ef3a-a6e8-", len = -1614761293}, method
= {
s = 0x7f469fc0b2bf <_ul_sruid+31> "", len = -1614761307}, lr =
{s = 0xffffffff9fc0b2bf <error: Cannot access memory at address 0xffffffff9fc0b2bf>,
len = 0}, r2 = {s = 0x0, len = 2}, gr = {s = 0x55baeebfa2d3 "INFO", len =
1073741824}, transport_val = {
s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len
= 6}, ttl_val = {s = 0x7fff01be3130 " 2\276\001\377\177", len = -293268297},
user_param_val = {s = 0x7fff01be3070 "Ӣ\277\356\272U", len = -1524553312},
maddr_val = {s = 0x7f46a5148ea8 "\021",
len = 29244000}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x2 <error:
Cannot access memory at address 0x2>, len = 1275206792}, r2_val = {s = 0x55baeebfa2d3
"INFO", len = 1073741824}, gr_val = {s = 0x10000000 <error: Cannot access
memory at address 0x10000000>,
len = 6}}
next_hop = {user = {s = 0x7fff01be36a0 "\222\067\276\001\377\177", len =
-258883088}, passwd = {s = 0x55baf091c350 "", len = -258883088}, host = {s =
0x55baf091c350 "", len = -1531003260}, port = {s = 0x313810 <error: Cannot
access memory at address 0x313810>, len = 8},
params = {s = 0x2227 <error: Cannot access memory at address 0x2227>, len
= 1073741824}, sip_params = {s = 0x10000000 <error: Cannot access memory at address
0x10000000>, len = 1494014424}, headers = {s = 0x7f46a5205028 "77.77.77.77",
len = 29241200}, port_no = 14,
proto = 0, type = ERROR_URI_T, flags = (unknown: 1073741824), transport = {s =
0x10000000 <error: Cannot access memory at address 0x10000000>, len = -1255234878},
ttl = {s = 0x7f46a512e4b0 "\030\213U\237F\177", len = 48}, user_param = {s =
0x7fff01be2f08 "Kt\201\240F\177",
len = 29240896}, maddr = {s = 0x10000000 <error: Cannot access memory at
address 0x10000000>, len = 6}, method = {s = 0x7fff01be2ed0
"P/\276\001\377\177", len = 45}, lr = {s = 0xa6e8 <error: Cannot access
memory at address 0xa6e8>, len = 14}, r2 = {
s = 0x7f46fbad8001 <error: Cannot access memory at address
0x7f46fbad8001>, len = -1599450320}, gr = {s = 0x14a0aa5330 <error: Cannot access
memory at address 0x14a0aa5330>, len = -1525549816}, transport_val = {s =
0x7f46a0aa5330 <callid_buf+16> "-42728(a)77.77.77.77"7.77",
len = -1599450299}, ttl_val = {s = 0x7f46a0aa5372 <callid_buf+82>
"", len = 1494014424}, user_param_val = {s = 0x4eebfa2d3 <error: Cannot
access memory at address 0x4eebfa2d3>, len = -289515552}, maddr_val = {
s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len
= 6}, method_val = {s = 0x7fff01be2f50 "5cb6a6e8", len = -292267196}, lr_val =
{s = 0x210000000 <error: Cannot access memory at address 0x210000000>, len =
-1601727776}, r2_val = {
s = 0x7fff01be0000 "uRPw", len = -1602129642}, gr_val = {s =
0x7fff01be2f70 "\032", len = -1602128821}}
u = 0xd68
port = 0
dst_host = 0x2
i = -290911819
flags = 0
avp = 0x7fff01be3360
st = {flags = 4294967295, id = 65535, name = {n = 0, s = {s = 0x0, len =
29240816}, re = 0x0}, avp = 0x7f46b52d00a6 <__GI_getenv+22>}
sct = 0x14f0911420
sjt = 0x0
rve = 0x7f46a51bb3a8
mct = 0x5
rv = 0x55baeeac2edf <qm_info+46>
rv1 = 0x6
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s =
{s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s =
"\000\000\276\001\377\177\000\000\000\000\000\000\000\000\000\000h\r\000\000\004"}
s = {s = 0x0, len = 0}
srevp = {0x7f46a0aa5372 <callid_buf+82>, 0x0}
evp = {data = 0x0, rcv = 0x0, dst = 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len =
0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len
= 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#39 0x000055baee850de3 in run_actions (h=0x7fff01be3a60, a=0x7f46a51d27f0,
msg=0x7f46a52129a0) at core/action.c:1569
t = 0x7f46a51d27f0
ret = -1
tvb = {tv_sec = 85899345920, tv_usec = 139940118452696}
tve = {tv_sec = 94261357814483, tv_usec = 60129542148}
tz = {tz_minuteswest = -1617194880, tz_dsttime = 32582}
tdiff = 1073741824
__func__ = "run_actions"
#40 0x000055baee83ffc5 in do_action (h=0x7fff01be3a60, a=0x7f46a514aa98,
msg=0x7f46a52129a0) at core/action.c:691
ret = -5
v = 0
dst = {send_sock = 0x167a16b95e269ceb, to = {s = {sa_family = 1176, sa_data =
"8\245F\177\000\000\356\065\232ZF\177\000"}, sin = {sin_family = 1176, sin_port
= 42296, sin_addr = {s_addr = 32582}, sin_zero = "\356\065\232ZF\177\000"}, sin6
= {sin6_family = 1176,
sin6_port = 42296, sin6_flowinfo = 32582, sin6_addr = {__in6_u = {__u6_addr8
= "\356\065\232ZF\177\000\000\245\064\232ZF\177\000", __u6_addr16 = {13806,
23194, 32582, 0, 13477, 23194, 32582, 0}, __u6_addr32 = {1520055790, 32582, 1520055461,
32582}}},
sin6_scope_id = 2588589196}}, id = -789618140, proto = 16 '\020',
send_flags = {f = 42247, blst_imask = 0}}
tmp = 0x7f46a534b848 "\001"
new_uri = 0xe8 <error: Cannot access memory at address 0xe8>
end = 0x55baeec4b538 "core: core/parser/msg_parser.c"
crt = 0x7fff01be3940 ""
cmd = 0x7f465a9a35ee
len = 32582
user = -1526226928
uri = {user = {s = 0x7fff01be3620 "", len = -1526226928}, passwd = {s =
0x7f46a537e038 "\001", len = -1526226928}, host = {s = 0x7fff01be3660
"\220\066\276\001\377\177", len = -1589576708}, port = {s = 0x7fff01be3640
"\300s:", len = 0}, params = {
s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len
= 264609488}, sip_params = {s = 0x400243c58 <error: Cannot access memory at address
0x400243c58>, len = -289139488}, headers = {s = 0x3a73c0 <error: Cannot access
memory at address 0x3a73c0>, len = 8},
port_no = 14144, proto = 446, type = 32767, flags = (URI_SIP_USER_PHONE |
unknown: 4004429680), transport = {s = 0x7fff01be3690 "\230\004\070\245F\177",
len = -292471152}, ttl = {s = 0x0, len = -289197072}, user_param = {s = 0x7fff01be3740
"\320\070\276\001\377\177",
len = -290743255}, maddr = {s = 0x7f46a5380498 "\001", len =
-1523277664}, method = {s = 0x7fff01be3792 "", len = 29243283}, lr = {s =
0x7f465a9a35ee "", len = 1520055493}, r2 = {s = 0x55baeec44e50
<__func__.6674> "parse_via", len = -289132456}, gr = {
s = 0x40 <error: Cannot access memory at address 0x40>, len =
-1526226928}, transport_val = {s = 0x4040404040404040 <error: Cannot access memory at
address 0x4040404040404040>, len = 1}, ttl_val = {
s = 0x5a5a5a5a5a5a5a5a <error: Cannot access memory at address
0x5a5a5a5a5a5a5a5a>, len = -1523277720}, user_param_val = {s = 0x520202020202020
<error: Cannot access memory at address 0x520202020202020>, len = 29243276},
maddr_val = {
s = 0x400ffffff <error: Cannot access memory at address 0x400ffffff>,
len = 1520055488}, method_val = {s = 0x4eebfa2d3 <error: Cannot access memory at
address 0x4eebfa2d3>, len = 1520055492}, lr_val = {
s = 0x7f465a9a34c4
";branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards:
69\r\nContact: \"813\"
<sip:813@192.168.128.58:1195;transport=tls;registering_acc=mydomain_co_co>\r\nUser-Agent:
Jitsi2.10.5"..., len = 4}, r2_val = {
s = 0x7fff01be38d0 "\360\071\276\001\377\177", len = -290487379},
gr_val = {s = 0x53111f5de2582f40 <error: Cannot access memory at address
0x53111f5de2582f40>, len = -1292927372}}
next_hop = {user = {s = 0x4 <error: Cannot access memory at address 0x4>,
len = -1243022704}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>,
len = 0}, host = {s = 0x1 <error: Cannot access memory at address 0x1>, len =
-1243053712}, port = {
s = 0x7f2d00000000 <error: Cannot access memory at address
0x7f2d00000000>, len = -1617194880}, params = {s = 0x0, len = -1243052856}, sip_params
= {s = 0x7fff01be34f0 "`J*\265F\177", len = 1073741824}, headers = {s =
0x7f46b5e88170 "", len = 29242592}, port_no = 49645,
proto = 61056, type = 21946, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE |
unknown: 2822930836), transport = {s = 0xffffffff <error: Cannot access memory at
address 0xffffffff>, len = 1494014424}, ttl = {s = 0x7f46b52a4a60 "\306J",
len = -1243025616}, user_param = {
s = 0x40000000 <error: Cannot access memory at address 0x40000000>, len
= 29242784}, maddr = {s = 0x7fff01be3520 "", len = 29}, method = {s = 0x40000000
<error: Cannot access memory at address 0x40000000>, len = 268435456}, lr = {
s = 0x6 <error: Cannot access memory at address 0x6>, len =
-1631247160}, r2 = {s = 0x10000000 <error: Cannot access memory at address
0x10000000>, len = 0}, gr = {s = 0x7fff01be35d0 "\001", len = -286653832},
transport_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824},
ttl_val = {s = 0x10000000 <error: Cannot access memory at address
0x10000000>, len = 6}, user_param_val = {s = 0x7fff01be3a30
"P;\276\001\377\177", len = -1245242476}, maddr_val = {s = 0x1 <error: Cannot
access memory at address 0x1>, len = 0}, method_val = {
s = 0x6e0000005b <error: Cannot access memory at address 0x6e0000005b>,
len = -1255519648}, lr_val = {s = 0x7fff01be3940 "", len = -1245212198}, r2_val
= {s = 0x7fff01be3a70 "\002", len = -1525387056}, gr_val = {s = 0x1 <error:
Cannot access memory at address 0x1>,
len = -290705697}}
u = 0x2215
port = 0
dst_host = 0x6
i = 15
flags = 32582
avp = 0x3a73c0
st = {flags = 29242752, id = 32767, name = {n = -1243022704, s = {s =
0x7f46b5e8fa90 "<0\201\356\272U", len = 1}, re = 0x7f46b5e8fa90}, avp =
0x0}
sct = 0x3a73c0
sjt = 0x3a60d8
rve = 0x7f46a5148ff8
mct = 0x243c00
rv = 0x7f46b5e884c8
rv1 = 0x3a5fe8
c1 = {cache_type = 3051944488, val_type = 32582, c = {avp_val = {n = 7, s = {s =
0x7 <error: Cannot access memory at address 0x7>, len = 268435456}, re = 0x7}, pval
= {rs = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 268435456}, ri
= -1525490576,
flags = 32582}}, i2s = "\200\064\276\001", '\000'
<repeats 12 times>, "`X\"\244\200"}
s = {s = 0x7fff01be3414 "", len = 29242592}
srevp = {0x7fff01be34f0, 0x7f46b529ed90}
evp = {data = 0x0, rcv = 0x0, dst = 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len =
0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr =
0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len
= 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#41 0x000055baee850de3 in run_actions (h=0x7fff01be3a60, a=0x7f46a51470d0,
msg=0x7f46a52129a0) at core/action.c:1569
t = 0x7f46a514aa98
ret = 1
tvb = {tv_sec = 21185405651, tv_usec = 94261358145712}
tve = {tv_sec = 140733222632080, tv_usec = 2}
tz = {tz_minuteswest = 1520055549, tz_dsttime = 32582}
tdiff = 6
__func__ = "run_actions"
#42 0x000055baee85157f in run_top_route (a=0x7f46a51470d0, msg=0x7f46a52129a0, c=0x0) at
core/action.c:1654
ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {2,
2913650019164888200, 94261357814483, 1073741824, 268435456, 6, 2913650019271842952,
8999462228585487496}, __mask_was_saved = 0, __saved_mask = {__val = {6192449487634431,
140733222632176,
139941329810791, 94261357814483, 0, 4611686022990790656,
139941394852256, 140733222632272, 94261354856549, 7065381312, 139941394852256, 1073741825,
0, 94261357814483, 2, 94261357814483}}}}}
p = 0x7fff01be3a60
ret = 268435456
sfbk = 0
#43 0x000055baee9ac2ce in receive_msg (buf=0x7f465a9a33c0 "SUBSCRIBE
sip:87@mydomain.co.co SIP/2.0\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@demo"..., len=558,
rcv_info=0x7f465a9a30e0) at core/receive.c:427
msg = 0x7f46a52129a0
ctx = {rec_lev = 0, run_flags = 0, last_retcode = 2, jmp_env = {{__jmpbuf =
{94261357814483, 1073741824, 268435456, 6, 140733222632784, 94261355984408, 9,
139941663871424}, __mask_was_saved = 29245488, __saved_mask = {__val = {139940144492744,
139940144493504, 8589935150,
223338364929, 139940144493504, 9, 139940144493514, 32, 139940144493547,
7, 64, 0, 139940150786904, 2632814952448, 65536, 139940130643520}}}}}
bctx = 0x22e
ret = 32582
stats_on = 0
tvb = {tv_sec = 214748364800, tv_usec = 139940144493554}
tve = {tv_sec = 0, tv_usec = 139940144494062}
tz = {tz_minuteswest = 1520055242, tz_dsttime = 32582}
diff = 0
inb = {s = 0x7f465a9a33c0 "SUBSCRIBE sip:87@mydomain.co.co
SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom:
\"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo:
<sip:87@demo"..., len = 558}
netinfo = {data = {s = 0x2020202020202020 <error: Cannot access memory at
address 0x2020202020202020>, len = 538976288}, rcv = 0xffffffffffffffff, dst =
0x7f465a9a33f4}
keng = 0x0
evp = {data = 0x7fff01be3be0, rcv = 0x7f465a9a30e0, dst = 0x0}
cidlockidx = 0
cidlockset = 0
errsipmsg = 0
exectime = 0
__func__ = "receive_msg"
#44 0x000055baeea464bc in receive_tcp_msg (tcpbuf=0x7f465a9a33c0 "SUBSCRIBE
sip:87@mydomain.co.co SIP/2.0\r\nCall-ID:
18d1c938d6d6d03dc502a4144f504713(a)0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\"
<sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@demo"...,
len=558, rcv_info=0x7f465a9a30e0, con=0x7f465a9a30c8) at core/tcp_read.c:1399
buf = 0x0
bsize = 0
blen = 558
__func__ = "receive_tcp_msg"
#45 0x000055baeea48ac4 in tcp_read_req (con=0x7f465a9a30c8, bytes_read=0x7fff01be3fd0,
read_flags=0x7fff01be3fc8) at core/tcp_read.c:1631
bytes = 558
total_bytes = 558
resp = 1
size = 0
req = 0x7f465a9a3148
dst = {send_sock = 0x7fff01be3fc0, to = {s = {sa_family = 12728, sa_data =
"\232ZF\177\000\000\000\000\000\000\001 \000"}, sin = {sin_family = 12728,
sin_port = 23194, sin_addr = {s_addr = 32582}, sin_zero = "\000\000\000\000\001
\000"}, sin6 = {sin6_family = 12728,
sin6_port = 23194, sin6_flowinfo = 32582, sin6_addr = {__in6_u = {__u6_addr8
= "\000\000\000\000\001 \000\000\340\330\070\245F\177\000", __u6_addr16 = {0, 0,
8193, 0, 55520, 42296, 32582, 0}, __u6_addr32 = {0, 8193, 2771966176, 32582}}},
sin6_scope_id = 29245072}},
id = 32767, proto = 1 '\001', send_flags = {f = 0, blst_imask = 80}}
c = 13 '\r'
ret = 0
__func__ = "tcp_read_req"
#46 0x000055baeea4c621 in handle_io (fm=0x7f46a538d8e0, events=1, idx=-1) at
core/tcp_read.c:1862
ret = 0
n = 21946
read_flags = 1
con = 0x7f465a9a30c8
s = 0
resp = 1
t = 80
__func__ = "handle_io"
#47 0x000055baeea39524 in io_wait_loop_epoll (h=0x55baeef1d440 <io_w>, t=2,
repeat=0) at core/io_wait.h:1062
n = 1
r = 0
fm = 0x7f46a538d8e0
revents = 1
__func__ = "io_wait_loop_epoll"
#48 0x000055baeea4d9ce in tcp_receive_loop (unix_sock=55) at core/tcp_read.c:1974
__func__ = "tcp_receive_loop"
#49 0x000055baee8faf60 in tcp_init_children () at core/tcp_main.c:5086
r = 3
i = 7
reader_fd_1 = 55
pid = 0
si_desc = "tcp receiver
(generic)\000\000\006\000\000\000\000\000\000\000\000B\276\001\377\177\000\000\307W\224\356\272U\000\000\060B\276\001\377\177\000\000m\022\225\356\001",
'\000' <repeats 11 times>,
"\004X\240\356\000\000\000\000\321\313\300\356\000\000\000\000м\023\245F\177\000\000\357\352\272\000\000\000\000\000\000\000\000\000\000!\000\000\000\"\000\000\000\000\362\067\265F\177\000"
si = 0x0
__func__ = "tcp_init_children"
#50 0x000055baee82f1a9 in main_loop () at main.c:1750
i = 8
pid = 42669
si = 0x0
si_desc = "udp receiver child=7 sock=127.0.0.20:5088
(77.77.77.77:5070)\000\067\060)\000\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\217\362\067\265F\177\000\000\300B\276\001\377\177\000\000\060\000\000\000\060\000\000\000\240C\276\001\377\177\000\000h
\037\245F\177\000"
nrprocs = 8
woneinit = 1
__func__ = "main_loop"
#51 0x000055baee836430 in main (argc=13, argv=0x7fff01be4648) at main.c:2737
cfg_stream = 0x55baf07a5010
c = -1
r = 0
tmp = 0x7fff01be4e05 ""
tmp_len = 32767
port = 29246592
proto = 32582
options = 0x55baeebaf600
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 554244915
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0xffffffff
p = 0xd <error: Cannot access memory at address 0xd>
st = {st_dev = 18, st_ino = 2029638, st_nlink = 2, st_mode = 16872, st_uid = 0,
st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0,
st_atim = {tv_sec = 1555492665, tv_nsec = 845706812}, st_mtim = {tv_sec = 1555492665,
tv_nsec = 845706812},
st_ctim = {tv_sec = 1555492665, tv_nsec = 845706812}, __glibc_reserved = {0, 0,
0}}
option_index = 0
long_options = {{name = 0x55baeebb1aea "help", has_arg = 0, flag = 0x0,
val = 104}, {name = 0x55baeebabf29 "version", has_arg = 0, flag = 0x0, val =
118}, {name = 0x55baeebb1aef "alias", has_arg = 1, flag = 0x0, val = 1024},
{name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
__func__ = "main"
```
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1860#issuecomment-484171999