### Description
This occurs more frequently when we have lots of presence subscriptions which we are able to reproduce in a test environment. Thus far it appears this only occurs when using TLS as opposed to UDP\TCP.
### Troubleshooting
Appears to be an issue in libcrypto.so.1.1 but not sure where to start.
#### Reproduction
8000+ presence subscriptions via TLS.
#### Debugging Data
``` gdb /path/to/kamailio /path/to/corefile GNU gdb (Debian 7.12-6) 7.12.0.20161007-git Copyright (C) 2016 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: http://www.gnu.org/software/gdb/bugs/. Find the GDB manual and other documentation resources online at: http://www.gnu.org/software/gdb/documentation/. For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/local/kamailio/sbin/kamailio...done. [New LWP 35028] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/local/kamailio/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /usr/loc'. Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007ff9faf54645 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
bt full #0 0x00007ff9faf54645 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #1 0x00007ff9fb030677 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #2 0x00007ff9fb03cc0b in EVP_EncryptUpdate () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #3 0x00007ff9fb06f811 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #4 0x00007ff9fb070737 in RAND_DRBG_generate () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #5 0x00007ff9fb07097d in RAND_DRBG_bytes () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #6 0x00007ff9fb3ca628 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1 No symbol table info available. #7 0x00007ff9fb3c7691 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1 No symbol table info available. #8 0x00007ff9fb3c81ce in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1 No symbol table info available. #9 0x00007ff9fb3da9e3 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1 No symbol table info available. #10 0x00007ff9fb3dab23 in SSL_write () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1 No symbol table info available. #11 0x00007ff9efb3b79c in tls_encode_f (c=0x7ff9b08aff78, pbuf=0x7ffe163fb3d0, plen=0x7ffe163fb3c8, rest_buf=0x7ffe163fb3d8, rest_len=0x7ffe163fb3cc, send_flags=0x7ffe163fb3bc) at tls_server.c:828 n = 0 offs = 0 ssl = 0x7ff9b13160f8 tls_c = 0x7ff9b064ae68 wr_buf = "\027\003\003\002 n\017\031\247%%T\r8O\334\350\005r\277Kk\326\334\377\t\b\r\266\267\242\374\354:\265#"\224\333t\265\226\226\005~\361\230\237\020w\211}z\212,R\323_\367>\211\220\237\tC\244\303Ы\252\303B\020\a\240\216\366\024\206\212\201'\253G\304#\301M\333\3 20Ӂ\254\332!\341&Im\336GX\264\003\313Փp\353\226vV\034m\030\005\r\235+~\376,\236\\\316A\341f*fj\t\206\315\365Z\320͉\367xCj\344\235G#x\361T\005\216\234\363\227r\026\a\361_o\r_\274\v\340F\333%\262\336\273\023\060~\321?N\302\312L\004!\260i\340\300\324\361\371Җ\273\323X\f\332멵 \224\226\321E\343y)"... rd = {buf = 0x0, pos = 0, used = 0, size = 0} wr = { buf = 0x7ff9efd75e20 <wr_buf> "\027\003\003\002 n\017\031\247%%T\r8O\334\350\005r\277Kk\326\334\377\t\b\r\266\267\242\374\354:\265#"\224\333t\265\226\226\005~\361\230\237\020w\211}z\212,R\323_\367>\211\220\237\tC\244\303Ы\252\303B\020\a\240\216\366\024\206\212\20 1'\253G\304#\301M\333\320Ӂ\254\332!\341&Im\336GX\264\003\313Փp\353\226vV\034m\030\005\r\235+~\376,\236\\\316A\341f*fj\t\206\315\365Z\320͉\367xCj\344\235G#x\361T\005\216\234\363\227r\026\a\361_o\r_\274\v\340F\333%\262\336\273\023\060~\321?N\302\312L\004!\260i\340\300\324\36 1\371Җ\273\323X\f\332", <incomplete sequence \353\251>..., pos = 0, used = 0, size = 65536} ssl_error = 0 err_src = 0x7ff9efb65a87 "TLS write:" buf = 0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"... len = 1255 x = 373273376 __func__ = "tls_encode_f" #12 0x00005642297e1ca4 in tcpconn_send_put (c=0x7ff9b08aff78, buf=0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len=1255, send_flags=...) at core/tcp_main.c:2297 tmp = 0x7ff9af343808 fd = 10 response = {140729271694352, 0} n = 0 do_close_fd = 0 rest_buf = 0x0 t_buf = 0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"... rest_len = 0 t_len = 1255 resp = 140729271694352 t_send_flags = {f = 4, blst_imask = 0} fd_cache_e = 0x0 use_fd_cache = 0 __func__ = "tcpconn_send_put" #13 0x00005642297df397 in tcp_send (dst=0x7ff9b1693278, from=0x7ffe163fb610, buf=0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len=1255) at core/tcp_main.c:2077 c = 0x7ff9b08aff78 ip = {af = 2, len = 4, u = {addrl = {94844456114514, 140711573739219}, addr32 = {2988284242, 22082, 4150154963, 32761}, addr16 = {39250, 45597, 22082, 0, 22227, 63326, 32761, 0}, addr = "R\231\035\262BV\000\000\323V^\367\371\177\000"}} port = 39502 fd = 373274128 response = {140729271694776, 94842167197447} n = 22082 con_lifetime = 57680 rest_buf = 0x5642298efffc <sr_event_exec+482> "\211E\374\213E\374\351A\002" t_buf = 0x7ffe163fb510 "\323V^\367\371\177" rest_len = 22082 t_len = 697859842 resp = 836 t_send_flags = {f = 0, blst_imask = 0} __func__ = "tcp_send" #14 0x00007ff9f758d961 in msg_send_buffer (dst=0x7ff9b1693278, buf=0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len=1255, flags=0) at ../../core/forward.h:282 new_dst = {send_sock = 0x1, to = {s = {sa_family = 53808, sa_data = "\275\260\371\177\000\000(\254ΰ\371\177\000"}, sin = {sin_family = 53808, sin_port = 45245, sin_addr = {s_addr = 32761}, sin_zero = "(\254ΰ\371\177\000"}, sin6 = {sin6_family = 53808, sin6_port = 45245, sin6_flowinfo = 32761, sin6_addr = {__in6_u = {__u6_addr8 = "(\254ΰ\371\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {44072, 45262, 32761, 0, 0, 0, 0, 0}, __u6_addr32 = {2966334504, 32761, 0, 0}}}, sin6_scope_id = 699223731}}, id = 22082, proto = 2 '\002', send_flags = {f = 0, blst_imask = 0}} outb = {s = 0x7ff9b0bdcd48 "NOTIFY sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len = 1255} netinfo = {data = {s = 0x100000002 <error: Cannot access memory at address 0x100000002>, len = 0}, rcv = 0x7ff9b0bdc4a0, dst = 0x7ff9f3f607ad <p_tm_callback>} evp = {data = 0x7ffe163fb690, rcv = 0x0, dst = 0x7ff9b1693278} port = 373274592 ip = {af = 4150157560, len = 32761, u = {addrl = {140710389918760, 0}, addr32 = {2966334504, 32761, 0, 0}, addr16 = {44072, 45262, 32761, 0, 0, 0, 0, 0}, addr = "(\254ΰ\371\177\000\000\000\000\000\000\000\000\000"}} from = 0x7ffe163fb610 local_addr = {s = {sa_family = 2, sa_data = "\000\000>\347\211e\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 0, sin_addr = {s_addr = 1703536446}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 0, sin6_flowinfo = 1703536446, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}} con = 0x0 wsev = {type = 699223731, buf = 0x7ff9af2f26c8 "", len = 268435456, id = 0} ret = 32766 __func__ = "msg_send_buffer" #15 0x00007ff9f758fd1f in send_pr_buffer (rb=0x7ff9b1693228, buf=0x7ff9b0bdcd48, len=1255) at t_funcs.c:70 __func__ = "send_pr_buffer" #16 0x00007ff9f7566edd in send_prepared_request_impl (request=0x7ff9b1693228, retransmit=1, branch=0) at uac.c:643 t = 0x7ff9b1693008 p_msg = 0x0 uac = 0x7ff9b1693218 ip = {af = 4037853376, len = 32761, u = {addrl = {516093936486, 140711461450400}, addr32 = {697860966, 120, 4037866144, 32761}, addr16 = {33638, 10648, 120, 0, 62112, 61612, 32761, 0}, addr = "f\203\230)x\000\000\000\240\362\254\360\371\177\000"}} ret = -1318506488 __func__ = "send_prepared_request_impl" #17 0x00007ff9f7568365 in t_uac_with_ids (uac_r=0x7ffe163fbe70, ret_index=0x0, ret_label=0x0) at uac.c:720 request = 0x7ff9b1693228 cell = 0x7ff9b1693008 ret = 1 is_ack = 0 branch_ret = 32761 i = 0 added_branches = 1 #18 0x00007ff9f75682a7 in t_uac (uac_r=0x7ffe163fbe70) at uac.c:695 No locals. #19 0x00007ff9f756a62b in req_within (uac_r=0x7ffe163fbe70) at uac.c:929 ret = 744 nbuf = "\260\272?\026\376\177\000\000\220\272?\026\376\177\000\000 \313\n\374\371\177\000\000\060\304\n\374\371\177", '\000' <repeats 18 times>, "\360\274?\026\376\177\000\000\300\275?\026\376\177\000\000\263N\255)BV\000\000\000\000\000@\000\000\000\000\000\000\000\ 020\000\000\000\000\006\000\000\000\000\000\000\000\360\275?\026\376\177\000\000:\023\365\363\371\177\000\000\000\273?\026\376\177\000\000\ e\373\371\177\000\000C\003\000\000\000\000\000\000\020\200\360\373\371\177\000\000p\272?\026\001\000\000\000\332\336\327*BV\000\000`\ 356\n\374\371\177\000\000\300\303?\026\376\177\000\000\000\000\000\000\000\000\000\000`$֯\371\177\000\000\b\224\f\374\371\177\000\000$"... dbuf = "\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\020\272?\026\376\177\000\000\377*\253\360\371\177\000\000\360\271?\026\376\177\000\000\300\275?\026\376\177\000\000\263N\255)BV\000\000\000\000\000@\000\000\000\000\377\377\377\377", '\000' <re peats 11 times> ouri = {s = 0x7ff9fc0b1250 "sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk", len = 0} nuri = {s = 0x7ffe163fb9b0 "\260\272?\026\376\177", len = 0} duri = {s = 0x7ffe163fb960 "", len = 0} __func__ = "req_within" #20 0x00007ff9f3f5deb7 in send_notify_request (subs=0x7ffe163fc2f0, watcher_subs=0x0, n_body=0x0, force_null_body=0) at notify.c:1604 td = 0x7ff9fc0af9e8 met = {s = 0x7ff9f3fd3334 "NOTIFY", len = 6} str_hdr = {s = 0x7ff9fc0ad778 "Max-Forwards: 70\r\nEvent: presence\r\nContact: sip:62.231.137.101:5071;transport=tls\r\nSubscription-State: active;expires=3600\r\nContent-Type: application/pidf+xml\r\n", len = 162} notify_body = 0x7ff9fc0c2548 result = 0 cb_param = 0x7ff9b0bdc4a0 final_body = 0x0 uac_r = {method = 0x7ffe163fbee0, headers = 0x7ffe163fbed0, body = 0x7ff9fc0c2548, ssock = 0x0, dialog = 0x7ff9fc0af9e8, cb_flags = 1024, cb = 0x7ff9f3f607ad <p_tm_callback>, cbp = 0x7ff9b0bdc4a0, callid = 0x0} aux_body = 0x0 backup_subs = 0x7ff9fbfe0a70 __func__ = "send_notify_request" #21 0x00007ff9f3f5f5b3 in notify (subs=0x7ffe163fc2f0, watcher_subs=0x0, n_body=0x0, force_null_body=0, aux_body_processing=0x0) at notify.c:1703 aux_body = 0x0 __func__ = "notify" #22 0x00007ff9f3fa2b4b in update_subscription (msg=0x7ff9fc09c150, subs=0x7ffe163fc2f0, to_tag_gen=1, sent_reply=0x7ffe163fc12c) at subscribe.c:724 hash_code = 6046 __func__ = "update_subscription" #23 0x00007ff9f3fa9857 in handle_subscribe (msg=0x7ff9fc09c150, watcher_user=..., watcher_domain=...) at subscribe.c:1284 to_tag_gen = 1 subs = {pres_uri = {s = 0x7ff9fc0c9408 "sip:229@itec-support.sysconfig.co.uk", len = 36}, to_user = { s = 0x7ff9b08b0340 "229@itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: "500" <sip:500@192.168.128.27:60700;transpor"..., len = 3}, to_domain = { s = 0x7ff9b08b0344 "itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: "500" <sip:500@192.168.128.27:60700;transport=tl"..., len = 28}, from_user = { s = 0x7ff9b08b0307 "500@itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: "..., len = 3}, from_domain = { s = 0x7ff9b08b030b "itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\n"..., len = 28}, watcher_user = { s = 0x7ff9b08b0307 "500@itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: "..., len = 3}, watcher_domain = { s = 0x7ff9b08b030b "itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\n"..., len = 28}, event = 0x7ff9afd62460, event_id = {s = 0x0, len = 0}, to_tag = {s = 0x7ff9f780a460 <tm_tags> "4984a63b2f097c424789ea70bd115f49-e427", len = 37}, from_tag = { s = 0x7ff9b08b032d "219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: "500" <sip:500@192.168.12"..., len = 8}, callid = { s = 0x7ff9b08b02b1 "0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "500" sip:500@itec-support.sysconfig.co.uk;tag=219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.1"..., len = 48}, sockinfo_str = {s = 0x7ff9fc090118 "tls:62.231.137.101:5071", len = 23}, remote_cseq = 1, local_cseq = 1, contact = {s = 0x7ff9fc0b1250 "sip:500@82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk", len = 86}, local_contact = { s = 0x7ff9fc053930 "sip:62.231.137.101:5071;transport=tls", len = 37}, record_route = {s = 0x0, len = 0}, expires = 3600, status = 1, reason = {s = 0x0, len = 0}, version = 1, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1, internal_update_flag = 0, updated = -1, updated_winfo = -1, flags = 0, user_agent = {s = 0x7ff9b08b0449 "serveline1.1.1Windows 10\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 24}, next = 0x0} event = 0x7ff9afd62460 parsed_event = 0x7ff9fc0a8f90 ev_param = 0x0 found = 1 reason = {s = 0x0, len = 0} uri = {user = {s = 0x7ff9b08b03a0 "109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: "500" sip:500@192.168.128.27:60700;transport=tls;registering_acc=itec-support_sysconfig_co_uk\r\nUser-Agent: serveline1.1.1Windows 10\r\nEvent"..., len = 373277152}, passwd = {s = 0x4f8 <error: Cannot access memory at address 0x4f8>, len = 2}, host = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, port = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, params = { s = 0x7ffe163fc1f0 "@\334\327*BV", len = 697988931}, sip_params = {s = 0x7ffe163fc280 "g\025\366\373\371\177", len = -66469552}, headers = {s = 0x7ffe163fc1e0 "", len = -67096472}, port_no = 49824, proto = 5695, type = 32766, flags = (unknown: 498511872), transport = {s = 0x7ff9fc0030b0 "\a\003\213\260\371\177", len = 373277392}, ttl = {s = 0x0, len = -67758744}, user_param = {s = 0x56422ad7dc40 " #\330*BV", len = 0}, maddr = {s = 0x7ff9fbf6156b "", len = -185595711}, method = {s = 0x0, len = 373277616}, lr = { s = 0xfffffffffc050db0 <error: Cannot access memory at address 0xfffffffffc050db0>, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7ff9fbf61568 "500", len = 0}, transport_val = {s = 0x0, len = -67758744}, ttl_val = { s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x7ff9fbf61567 "", len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = { s = 0xf900000000 <error: Cannot access memory at address 0xf900000000>, len = -66469552}, gr_val = { s = 0x7ff9b08b02b1 "0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "500" sip:500@itec-support.sysconfig.co.uk;tag=219479eb\r\nTo: sip:229@itec-support.sysconfig.co.uk\r\nVia: SIP/2.0/TLS 192.1"..., len = 48}} reply_code = 500 reply_str = {s = 0x7ff9f3fdca3d "Server Internal Error", len = 21} sent_reply = 1 __func__ = "handle_subscribe" #24 0x00007ff9f3fa5964 in handle_subscribe0 (msg=0x7ff9fc09c150) at subscribe.c:1033 pfrom = 0x7ff9fc003068 __func__ = "handle_subscribe0" #25 0x0000564229768e4f in do_action (h=0x7ffe163fcc30, a=0x7ff9fc057968, msg=0x7ff9fc09c150) at core/action.c:1067 ret = -5 v = 699223731 dst = {send_sock = 0x133438, to = {s = {sa_family = 53480, sa_data = "\034\000\000\000\000\000@\033\003\374\371\177\000"}, sin = {sin_family = 53480, sin_port = 28, sin_addr = {s_addr = 0}, sin_zero = "@\033\003\374\371\177\000"}, sin6 = {sin6_family = 53480, sin6_port = 28, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "@\033\003\374\371\177\000\000`\t\003\374\371\177\000", __u6_addr16 = {6976, 64515, 32761, 0, 2400, 64515, 32761, 0}, __u6_addr32 = {4228062016, 32761, 4228057440, 32761}}}, sin6_scope_id = 4228497744}}, id = 32761, proto = -112 '\220', send_flags = {f = 5695, blst_imask = 32766}} tmp = 0x40000000 <error: Cannot access memory at address 0x40000000> new_uri = 0x7ff9fc0464f8 "\032" end = 0x7ff9fc09c150 "!\024" crt = 0x564229ad4eb3 "INFO" cmd = 0x7ff9fbfc3148 len = 258327944 user = 982029481 uri = {user = {s = 0x7ffe163fc8c0 "", len = 695389545}, passwd = {s = 0x7ff9fc019b00 "\002", len = -66469552}, host = {s = 0x7ffe163fc8a8 "\360\302\345\365\371\177", len = 16}, port = {s = 0x7ffe163fc8d0 "\357\302\345\365\371\177", len = 373279888}, params = { s = 0x0, len = 0}, sip_params = {s = 0x0, len = -1}, headers = {s = 0x0, len = 16}, port_no = 62000, proto = 64521, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x564200000000 <error: Cannot access memory at address 0x564200000000>, len = 116}, ttl = {s = 0x7ffe163fc920 "\263N\255)BV", len = 0}, user_param = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 132}, maddr = {s = 0x7ff9f5e5c2e6 "%s: %s%.*s", len = 3}, method = {s = 0x7ff9fc09c150 "!\024", len = -169491728}, lr = { s = 0x7ff9fc0a2cb0 "8\213\f\374\371\177", len = -66469552}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7ff9f5e5c2ef "s", len = 697869913}, transport_val = {s = 0x7ff9fc02c790 "!", len = 16}, ttl_val = {s = 0x7ff9fbfbb0a8 "\315\352S\366\371\177", len = 373280352}, user_param_val = {s = 0x7ff9fc019ae8 "\024", len = 0}, maddr_val = {s = 0x564229ad4eb3 "INFO", len = 2}, method_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, lr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2_val = { s = 0x7ffe163fc9e0 "\320\317?\026\376\177", len = 696865318}, gr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 266546968}} next_hop = {user = {s = 0x7ffe163fc6a0 "\320\306?\026\376\177", len = 373278720}, passwd = {s = 0x15d6bf724 <error: Cannot access memory at address 0x15d6bf724>, len = -1342808584}, host = {s = 0x7ffe163fc6b0 "\320\306?\026\376\177", len = -270932943}, port = { s = 0x7ff9b145d960 "$\367k]\257", len = -1342808584}, params = {s = 0x7ffe163fc6d0 "`\314?\026\376\177", len = 2}, sip_params = {s = 0x7ffe163fc6d0 "`\314?\026\376\177", len = 1}, headers = { s = 0x772410000000 <error: Cannot access memory at address 0x772410000000>, len = 718789696}, port_no = 52320, proto = 5695, type = 32766, flags = (URI_SIP_USER_PHONE | unknown: 201770324), transport = {s = 0x7ffe163fcc78 "\251\224\260\020\031\273\035\", len = 0}, ttl = {s = 0x7ffa0c06c559 "n!"", len = 200606905}, user_param = {s = 0x7ffe163fc810 "\320\310?\026\376\177", len = -1355863720}, maddr = {s = 0x7ffe163fcc28 "\220\344?\026\376\177", len = 35028}, method = {s = 0x7ffe163fc7c8 "", len = 10}, lr = { s = 0x7ffe163fcc23 "\374\371\177", len = 1550670948}, r2 = {s = 0x0, len = 0}, gr = {s = 0x564200000000 <error: Cannot access memory at address 0x564200000000>, len = -1}, transport_val = { s = 0x564200000000 <error: Cannot access memory at address 0x564200000000>, len = 0}, ttl_val = {s = 0x0, len = 32}, user_param_val = {s = 0x7ffe00000005 <error: Cannot access memory at address 0x7ffe00000005>, len = 200793134}, maddr_val = { s = 0x7ffe163fc840 "", len = 116}, method_val = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 718789696}, lr_val = {s = 0x7ffe163fcd40 " n\005\374\371\177", len = -169491738}, r2_val = {s = 0x7ffe163fce48 "8\320?\026\376\177", len = 0}, gr_val = {s = 0x74 <error: Cannot access memory at address 0x74>, len = 200606905}} u = 0x2 port = 0 dst_host = 0x5642297769ba <run_actions_safe+151> i = 1 flags = 32761 avp = 0x0 st = {flags = 175, id = 0, name = {n = -1356099584, s = {s = 0x7ff9af2b9000 "", len = 1}, re = 0x7ff9af2b9000}, avp = 0x7ff9b145d960} sct = 0x10000000 sjt = 0x40000000 rve = 0x7ff9fc0464f8 mct = 0x564229ad4eb3 rv = 0x7ff9efdcf7ac rv1 = 0x7ffe163fe490 c1 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 6, s = {s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = 373278288}, re = 0x100000006}, pval = {rs = { s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = 373278288}, ri = 697906361, flags = 22082}}, i2s = "\000\365\334\357\371\177\000\000`\337\327*\272\000\000\000\310%\335\357\371\177"} s = {s = 0x564229ad4eb3 "INFO", len = -1355864376} srevp = {0x7ffe163fc600, 0x5642299854d8 <futex_release+29>} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #26 0x000056422977635e in run_actions (h=0x7ffe163fcc30, a=0x7ff9fc057968, msg=0x7ff9fc09c150) at core/action.c:1564 t = 0x7ff9fc057968 ret = -1 ms = 0 __func__ = "run_actions" #27 0x00005642297769ba in run_actions_safe (h=0x7ffe163fe490, a=0x7ff9fc057968, msg=0x7ff9fc09c150) at core/action.c:1625 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {2, 1109510072046228649, 94842167054003, 1073741824, 268435456, 6, 1109510072092365993, 6637667142142563497}, __mask_was_saved = 0, __saved_mask = {__val = {1073741824, 268435456, 6, 140729271700736, 94842165820044, 268435456, 140711652082000, 140729271700992, 140711651455080, 1, 2, 140711651455152, 140729271701200, 140711651767776, 140711652082000, 140729271700896}}}}} ret = -1 ign_on_break = 0 #28 0x0000564229728515 in rval_get_int (h=0x7ffe163fe490, msg=0x7ff9fc09c150, i=0x7ffe163fd038, rv=0x7ff9fc056e20, cache=0x0) at core/rvalue.c:912 r_avp = 0x7ffe163fced0 avp_val = {n = 268435456, s = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, re = 0x10000000} pval = {rs = {s = 0x56422ad7de90 "`η\363\371\177", len = 2}, ri = 699223731, flags = 22082} tmp = {s = 0xdb18fdfb00007dfb <error: Cannot access memory at address 0xdb18fdfb00007dfb>, len = -67096400} s = 0x0 r = 21 ret = 0 destroy_pval = 0 __func__ = "rval_get_int" #29 0x000056422972ce86 in rval_expr_eval_int (h=0x7ffe163fe490, msg=0x7ff9fc09c150, res=0x7ffe163fd038, rve=0x7ff9fc056e18) at core/rvalue.c:1910 i1 = 373281968 i2 = 4 ret = -1 c1 = {cache_type = 4228497744, val_type = 32761, c = {avp_val = {n = 373286032, s = {s = 0x7ffe163fe490 "\003", len = 699223731}, re = 0x7ffe163fe490}, pval = {rs = {s = 0x7ffe163fe490 "\003", len = 699223731}, ri = 1073741824, flags = 0}}, i2s = '\000' <repeats 21 times>} c2 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 373280464, s = {s = 0x7ffe163fced0 "", len = 373280528}, re = 0x7ffe163fced0}, pval = {rs = {s = 0x7ffe163fced0 "", len = 373280528}, ri = 695389545, flags = 22082}}, i2s = "P\301\t\374\371\177\000\000\000\000\000\000\000\000\000\000\300\365\004\374\371\177"} rv1 = 0x5642298e4e63 <pv_value_destroy+175> rv2 = 0x564229ad4eb3 __func__ = "rval_expr_eval_int" #30 0x000056422972d2f6 in rval_expr_eval_int (h=0x7ffe163fe490, msg=0x7ff9fc09c150, res=0x7ffe163fd4b0, rve=0x7ff9fc057d10) at core/rvalue.c:1918 i1 = 0 i2 = 0 ret = -1 c1 = {cache_type = 1259528, val_type = RV_NONE, c = {avp_val = {n = 1889464, s = {s = 0x1cd4b8 <error: Cannot access memory at address 0x1cd4b8>, len = 1910816}, re = 0x1cd4b8}, pval = {rs = {s = 0x1cd4b8 <error: Cannot access memory at address 0x1cd4b8>, len = 1910816}, ri = 8, flags = 0}}, i2s = "\b\326\v\374\371\177\000\000\002\000\000\000\000\000\000\000(\a\003\374\371\177"} c2 = {cache_type = 373280848, val_type = 32766, c = {avp_val = {n = -169518741, s = {s = 0x7ff9f5e5596b <xlog_2_helper+990> "H\215e\330[A\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271", len = 268435456}, re = 0x7ff9f5e5596b <xlog_2_helper+990>}, pval = {rs = {s = 0x7ff9f5e5596b <xlog_2_helper+990> "H\215e\330[A\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271", len = 268435456}, ri = 6, flags = 0}}, i2s = "\377\377\377\377\000\000\000\000\220\307\v\374\371\177\000\000\b\326\v\374\371\177"} rv1 = 0x6 rv2 = 0x10000000 __func__ = "rval_expr_eval_int" #31 0x00005642297688ec in do_action (h=0x7ffe163fe490, a=0x7ff9fc059138, msg=0x7ff9fc09c150) at core/action.c:1043 ret = -5 v = 0 dst = {send_sock = 0x564229ad4eb3, to = {s = {sa_family = 0, sa_data = "\000@\000\000\000\000\000\000\000\020\000\000\000"}, sin = {sin_family = 0, sin_port = 16384, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\020\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 16384, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000", __u6_addr16 = {0, 4096, 0, 0, 6, 0, 0, 0}, __u6_addr32 = {268435456, 0, 6, 0}}}, sin6_scope_id = 373282272}}, id = 32766, proto = 34 '"', send_flags = {f = 10610, blst_imask = 22082}} tmp = 0x7ffe163fe490 "\003" new_uri = 0x7ffe163fd690 "" end = 0x56422972ca9d <rval_str_lop2+192> "\213E\354\353!\220\353\001\220H\213E\360H\211\307\350\033\224\377\377H\213E\370H\211\307\350\017\224\377\377\270" crt = 0x7ff9fc09c150 "!\024" cmd = 0x7ff9fbfbd2e8 len = 32766 user = 373283664 uri = {user = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 2}, passwd = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = { s = 0x7ffe163fd3e0 "\360\324?\026\376\177", len = 695690078}, params = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, sip_params = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, headers = { s = 0x7ffe163fd4a0 "\340\325?\026\376\177", len = 695389830}, port_no = 54240, proto = 5695, type = 32766, flags = (unknown: 4228497744), transport = {s = 0x7ff9fc044e88 "\026", len = 373281808}, ttl = {s = 0x7ff9fc0a0bc0 "", len = -66469552}, user_param = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, maddr = {s = 0x7ff9fc09c150 "!\024", len = 2}, method = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2 = {s = 0x7ffe163fd4f0 "\340\325?\026\376\177", len = 695691706}, gr = {s = 0x7ff9fc09c150 "!\024", len = -66469552}, transport_val = {s = 0x7ff9fc044e88 "\026", len = 373286032}, ttl_val = {s = 0x0, len = 1}, user_param_val = { s = 0x2 <error: Cannot access memory at address 0x2>, len = 147362985}, maddr_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = { s = 0xf65c588098894a9 <error: Cannot access memory at address 0xf65c588098894a9>, len = 280007849}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x564229a81f30 <__func__.7452> "rval_destroy", len = 2}} next_hop = {user = {s = 0x7ff9fc07e410 "\004", len = 373286032}, passwd = {s = 0x0, len = -1}, host = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 231249065}, port = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, params = { s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, sip_params = {s = 0xf65c5880e8894a9 <error: Cannot access memory at address 0xf65c5880e8894a9>, len = 280007849}, headers = {s = 0x0, len = 6}, port_no = 53920, proto = 5695, type = 32766, flags = (URI_SIP_USER_PHONE | unknown: 695690076), transport = {s = 0x7ffe163fd350 "", len = 200818532}, ttl = {s = 0x7ff9fbfbbe98 "A\234.\366\371\177", len = 0}, user_param = {s = 0x18 <error: Cannot access memory at address 0x18>, len = 718625520}, maddr = {s = 0x0, len = -66469552}, method = {s = 0x7ff9fc01ffc8 ".", len = 373281488}, lr = {s = 0x27163fd350 <error: Cannot access memory at address 0x27163fd350>, len = -152772320}, r2 = { s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = -1}, gr = {s = 0x7ffe163fd360 "\240\324?\026\376\177", len = 695371029}, transport_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, ttl_val = { s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 0}, user_param_val = {s = 0x7ff9fc07e650 "\004", len = 373282200}, maddr_val = {s = 0x7ff9fc09c150 "!\024", len = 373286032}, method_val = {s = 0x7ff9fc01ffc8 ".", len = 373286032}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 172528809}, gr_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}} u = 0x7ff9fc045930 port = 0 dst_host = 0x56422972ce86 <rval_expr_eval_int+154> i = 11 flags = 32761 avp = 0x0 st = {flags = 268435456, id = 0, name = {n = 6, s = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 373281392}, re = 0x6}, avp = 0x5642297769ba <run_actions_safe+151>} sct = 0x7ffe163fd5e0 sjt = 0x1 rve = 0x7ff9fc057d10 mct = 0x7ff9fc0806b0 rv = 0x40000000 rv1 = 0x0 c1 = {cache_type = 31, val_type = RV_NONE, c = {avp_val = {n = -66469552, s = {s = 0x5efc09c150 <error: Cannot access memory at address 0x5efc09c150>, len = 0}, re = 0x5efc09c150}, pval = {rs = { s = 0x5efc09c150 <error: Cannot access memory at address 0x5efc09c150>, len = 0}, ri = 0, flags = 0}}, i2s = "`\321?\026\376\177\000\000\002\000\000\000\000\000\000\000\263N\255)BV"} s = {s = 0x7ff9fc07e410 "\004", len = 373281168} srevp = {0x10000000, 0x7ff9fc09c150} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #32 0x000056422977635e in run_actions (h=0x7ffe163fe490, a=0x7ff9fc046148, msg=0x7ff9fc09c150) at core/action.c:1564 t = 0x7ff9fc059138 ret = 1 ms = 0 __func__ = "run_actions" #33 0x0000564229768dbb in do_action (h=0x7ffe163fe490, a=0x7ff9fc05cd78, msg=0x7ff9fc09c150) at core/action.c:1058 ret = 1 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0, blst_imask = 0}} tmp = 0x7ffe163fe490 "\003" new_uri = 0x0 end = 0x0 crt = 0x7ff9fc09c150 "!\024" cmd = 0x0 len = 32766 user = 373285360 uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffe163fda80 "\220\333?\026\376\177", len = 695690078}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 4228497744), transport = {s = 0x7ff9fbfd66c8 "\021", len = 373283504}, ttl = {s = 0x0, len = 0}, user_param = { s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, maddr = {s = 0x0, len = 2}, method = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2 = {s = 0x7ffe163fdb90 "\200\334?\026\376\177", len = 695691706}, gr = {s = 0x0, len = -66469552}, transport_val = {s = 0x7ff9fbfd66c8 "\021", len = 373286032}, ttl_val = {s = 0x0, len = 0}, user_param_val = { s = 0x2 <error: Cannot access memory at address 0x2>, len = 436769961}, maddr_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = { s = 0xf65c5881cc894a9 <error: Cannot access memory at address 0xf65c5881cc894a9>, len = 280007849}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} next_hop = {user = {s = 0x1700000303 <error: Cannot access memory at address 0x1700000303>, len = 31}, passwd = {s = 0x0, len = 0}, host = { s = 0x7ff9b06a6ff8 "w4nP\027C\022\035\310W\002\245ʷ\310ͣZCo\322\365\033U\211\260\355\273U\256\210\006\a\037\234\373;\217\067\rV_WK\376\225\233\002\351", <incomplete sequence \317>, len = -1335201800}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x7ff9fbfbbe98 "A\234.\366\371\177", len = 0}, user_param = {s = 0x0, len = 0}, maddr = { s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} u = 0x7ff9fbfd6818 port = 0 dst_host = 0x56422972ce86 <rval_expr_eval_int+154> i = 0 flags = 0 avp = 0x0 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x7ffe163fdc80 sjt = 0xffffffff rve = 0x7ff9fc045930 mct = 0x0 rv = 0x0 rv1 = 0x0 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #34 0x000056422977635e in run_actions (h=0x7ffe163fe490, a=0x7ff9fc05cd78, msg=0x7ff9fc09c150) at core/action.c:1564 t = 0x7ff9fc05cd78 ret = -1 ms = 0 __func__ = "run_actions" #35 0x00005642297655ca in do_action (h=0x7ffe163fe490, a=0x7ff9fbfd82b8, msg=0x7ff9fc09c150) at core/action.c:691 ret = -5 v = 0 dst = {send_sock = 0x7ffe0505e220, to = {s = {sa_family = 52220, sa_data = "\025\370\371\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 52220, sin_port = 63509, sin_addr = {s_addr = 32761}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = { sin6_family = 52220, sin6_port = 63509, sin6_flowinfo = 32761, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 268435456}}, id = 0, proto = -128 '\200', send_flags = {f = 4067, blst_imask = 0}} tmp = 0x564229988366 <qm_malloc+2331> "H\213E\270H\203\300\070\351*\003" new_uri = 0x7ff9b08b0389 "branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: "500" sip:500@192.168.128.27:60700;transport=tls;registering_acc=itec-support_sysconfig_co_uk\r\nUser-Agent: servelin"... end = 0xfc0af860 <error: Cannot access memory at address 0xfc0af860> crt = 0x7ffe163fe420 "" cmd = 0xe8 len = 0 user = 697859842 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 266547264}, host = {s = 0x400133310 <error: Cannot access memory at address 0x400133310>, len = 699405104}, port = { s = 0x1d2820 <error: Cannot access memory at address 0x1d2820>, len = 8}, params = {s = 0x7ffe163fe170 "", len = 698013910}, sip_params = {s = 0x7ffe163fe0c0 "\230\370\n\374\371\177", len = 697237500}, headers = {s = 0x0, len = 699362992}, port_no = 57712, proto = 5695, type = 32766, flags = (URI_SIP_USER_PHONE | unknown: 697859840), transport = {s = 0x7ff9fc0af898 "\001", len = -66386880}, ttl = {s = 0x7ffe163fe1c2 "\005\005\376\177", len = 373285315}, user_param = {s = 0x7ff9b08b04b6 "", len = -1333066871}, maddr = {s = 0x564229b04cc0 <__func__.6670> "parse_via", len = 699412136}, method = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -68124656}, lr = {s = 0x0, len = 1}, r2 = {s = 0x0, len = -66386936}, gr = { s = 0x500000000000000 <error: Cannot access memory at address 0x500000000000000>, len = 373285308}, transport_val = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1333066877}, ttl_val = { s = 0x429ad4eb3 <error: Cannot access memory at address 0x429ad4eb3>, len = -1333066872}, user_param_val = { s = 0x7ff9b08b0388 ";branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: "500" sip:500@192.168.128.27:60700;transport=tls;registering_acc=itec-support_sysconfig_co_uk\r\nUser-Agent: serveli"..., len = 5}, maddr_val = { s = 0x7ffe163fe300 " \344?\026\376\177", len = 698064145}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = -66389864}, r2_val = {s = 0x7ff9b08b04b6 "", len = -1333066904}, gr_val = {s = 0x0, len = -68124656}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 697897400}, lr_val = {s = 0x7ffe163fe050 "", len = -68124656}, r2_val = {s = 0x0, len = -68124656}, gr_val = { s = 0x7ffe163fe090 "\300\340?\026\376\177", len = -132789252}} u = 0x7ffe163fe420 port = 0 dst_host = 0x8 i = 15 flags = 0 avp = 0x7ff9b08b04b6 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x0 sjt = 0x5642298efffc <sr_event_exec+482> rve = 0x7ff9fbfd6818 mct = 0x7ffe163fe250 rv = 0x0 rv1 = 0x7ff9fc0a3610 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #36 0x000056422977635e in run_actions (h=0x7ffe163fe490, a=0x7ff9fbfd48f0, msg=0x7ff9fc09c150) at core/action.c:1564 t = 0x7ff9fbfd82b8 ret = 1 ms = 0 __func__ = "run_actions" #37 0x0000564229776a82 in run_top_route (a=0x7ff9fbfd48f0, msg=0x7ff9fc09c150, c=0x0) at core/action.c:1646 ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {2, 1109510072864117929, 94842167054003, 1073741824, 268435456, 6, 1109510072876700841, 6637667142142563497}, __mask_was_saved = 0, __saved_mask = {__val = {5910974510923775, 140729271706912, 140711585744231, 94842167054003, 0, 4611686022990790656, 140711652082000, 140729271707008, 94842164188576, 8523465072, 140711652082000, 1073741825, 0, 94842167054003, 2, 94842167054003}}}}} p = 0x7ffe163fe490 ret = 268435456 sfbk = 0 #38 0x0000564229899cd7 in receive_msg ( buf=0x7ff9b08b0270 "SUBSCRIBE sip:229@itec-support.sysconfig.co.uk SIP/2.0\r\nCall-ID: 0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "500" sip:500@itec-support.sysconfig.co.uk;tag=219479eb\r\nT"..., len=582, rcv_info=0x7ff9b08aff90) at core/receive.c:340 msg = 0x7ff9fc09c150 ctx = {rec_lev = 699309230, run_flags = 22082, last_retcode = 2, jmp_env = {{__jmpbuf = {94842167054003, 1073741824, 268435456, 6, 140729271707520, 94842165376397, 140729271707328, 0}, __mask_was_saved = 9, __saved_mask = {__val = {140710385483640, 140710385484400, 8589935174, 240518234113, 140710385484400, 9, 140710385484410, 36, 140710385484447, 7, 64, 94842167054003, 140710396387576, 2701802864640, 16383, 140710382972520}}}}} bctx = 0x2163fe970 ret = 32761 stats_on = 0 tvb = {tv_sec = 232196669440, tv_usec = 140710385484454} tve = {tv_sec = 17879092915, tv_usec = 140710385484982} tz = {tz_minuteswest = -1333067142, tz_dsttime = 32761} diff = 0 inb = {s = 0x7ff9b08b0270 "SUBSCRIBE sip:229@itec-support.sysconfig.co.uk SIP/2.0\r\nCall-ID: 0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "500" sip:500@itec-support.sysconfig.co.uk;tag=219479eb\r\nT"..., len = 582} netinfo = {data = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, rcv = 0x10000000, dst = 0x7ff9b08b02a8} keng = 0x0 evp = {data = 0x7ffe163fe610, rcv = 0x7ff9b08aff90, dst = 0x0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 __func__ = "receive_msg" #39 0x0000564229946431 in receive_tcp_msg ( tcpbuf=0x7ff9b08b0270 "SUBSCRIBE sip:229@itec-support.sysconfig.co.uk SIP/2.0\r\nCall-ID: 0bba5e90e0a29ac9ce1c1475cce219a6@0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "500" sip:500@itec-support.sysconfig.co.uk;tag=219479eb\r\nT"..., len=582, rcv_info=0x7ff9b08aff90, con=0x7ff9b08aff78) at core/tcp_read.c:1399 buf = 0x0 bsize = 0 blen = 582 __func__ = "receive_tcp_msg" #40 0x0000564229948a39 in tcp_read_req (con=0x7ff9b08aff78, bytes_read=0x7ffe163fea00, read_flags=0x7ffe163fe9f8) at core/tcp_read.c:1631 bytes = 582 total_bytes = 582 resp = 1 size = 0 req = 0x7ff9b08afff8 dst = {send_sock = 0x7ffe163fe9f0, to = {s = {sa_family = 104, sa_data = "\213\260\371\177\000\000\000\000\000\000\001 \000"}, sin = {sin_family = 104, sin_port = 45195, sin_addr = {s_addr = 32761}, sin_zero = "\000\000\000\000\001 \000"}, sin6 = { sin6_family = 104, sin6_port = 45195, sin6_flowinfo = 32761, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\001 \000\000\200\300\f\374\371\177\000", __u6_addr16 = {0, 0, 8193, 0, 49280, 64524, 32761, 0}, __u6_addr32 = {0, 8193, 4228694144, 32761}}}, sin6_scope_id = 373287104}}, id = 32766, proto = 1 '\001', send_flags = {f = 0, blst_imask = 80}} c = 67 'C' ret = 0 __func__ = "tcp_read_req" #41 0x000056422994c596 in handle_io (fm=0x7ff9fc0cc080, events=1, idx=-1) at core/tcp_read.c:1862 ret = 0 n = 22082 read_flags = 1 con = 0x7ff9b08aff78 s = 0 resp = 1 t = 80 __func__ = "handle_io" #42 0x0000564229939499 in io_wait_loop_epoll (h=0x564229ddb000 <io_w>, t=2, repeat=0) at core/io_wait.h:1065 n = 1 r = 0 fm = 0x7ff9fc0cc080 revents = 1 __func__ = "io_wait_loop_epoll" #43 0x000056422994d943 in tcp_receive_loop (unix_sock=69) at core/tcp_read.c:1974 __func__ = "tcp_receive_loop" #44 0x00005642298029b9 in tcp_init_children () at core/tcp_main.c:4853 r = 2 i = 15 reader_fd_1 = 69 pid = 0 si_desc = "tcp receiver (generic)\000\000\000\000\000@\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000@\354?\026\376\177\000\000\331\350\203)BV\000\000\000\000\000\000\000\000\000\000\033\037\217)BV\000\000q]\255)BV\000\000\001\000\00 0\000\000\000\000\000\217\005\247)\000\000\000\000\360\224\374\373\371\177\000\000\061\000\000\000\062\000\000\000\300\317\376\v\372\177\000" si = 0x0 __func__ = "tcp_init_children" #45 0x00005642296fec7e in main_loop () at main.c:1711 i = 16 pid = 34967 si = 0x0 si_desc = "udp receiver child=15 sock=127.0.0.20:5088 (62.231.137.101:5070)\000\067\060)\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000O\320\376\v\372\177\000\000\060\355?\026\376\177\000\000\060\000\000\000\060\000\000\000\320\355?\ 026\376\177\000\000\360\305\a\374\371\177\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #46 0x0000564229705b9d in main (argc=13, argv=0x7ffe163ff068) at main.c:2645 cfg_stream = 0x56422abe1010 c = -1 r = 0 tmp = 0x7ffe163ffe5e "" tmp_len = 32766 port = 373288608 proto = 32762 options = 0x564229a710a0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3543135325 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x0 p = 0xf0b2ff <error: Cannot access memory at address 0xf0b2ff> st = {st_dev = 19, st_ino = 151468387, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_mtim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_ctim = {tv_sec = 1550207150, tv_nsec = 472559347}, __glibc_reserved = {0, 0, 0}} __func__ = "main"
info locals cfg_stream = 0x56422abe1010 c = -1 r = 0 tmp = 0x7ffe163ffe5e "" tmp_len = 32766 port = 373288608 proto = 32762 options = 0x564229a710a0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3543135325 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x0 p = 0xf0b2ff <error: Cannot access memory at address 0xf0b2ff> st = {st_dev = 19, st_ino = 151468387, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_mtim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_ctim = {tv_sec = 1550207150, tv_nsec = 472559347}, __glibc_reserved = {0, 0, 0}} __func__ = "main"
list 1835 FILE* cfg_stream; 1836 int c,r; 1837 char *tmp; 1838 int tmp_len; 1839 int port; 1840 int proto; 1841 char *options; 1842 int ret; 1843 unsigned int seed; 1844 int rfd;
```
#### Log Messages
<!-- Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
```
Feb 20 13:55:55 PBXxxxx kernel: [5243784.004500] kamailio[35028]: segfault at 7ff9ef2c3000 ip 00007ff9faf54645 sp 00007ffe163f98d8 error 4 in libcrypto.so.1.1[7ff9faebe000+2b1000] Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Main process exited, code=exited, status=1/FAILURE Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Unit entered failed state. Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Failed with result 'exit-code'. Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Service hold-off time over, scheduling restart. Feb 20 13:55:58 PBXxxxx systemd[1]: Stopped Kamailio (OpenSER) - the Open Source SIP Server. Feb 20 13:55:58 PBXxxxx systemd[1]: Starting Kamailio (OpenSER) - the Open Source SIP Server...
Feb 20 13:55:55 PBXxxxx /usr/local/kamailio/sbin/kamailio[35065]: ERROR: tls [tls_util.h:42]: tls_err_ret(): TLS read:error:24067044:random number generator:rand_pool_add:internal error Feb 20 13:55:55 PBXxxxx /usr/local/kamailio/sbin/kamailio[35065]: ERROR: <core> [core/tcp_read.c:1505]: tcp_read_req(): ERROR: tcp_read_req: error reading - c: 0x7ff9b1f22340 r: 0x7ff9b1f223c0 (-1) Feb 20 13:55:56 PBXxxxx /usr/local/kamailio/sbin/kamailio[35069]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 65 Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: ALERT: <core> [main.c:740]: handle_sigs(): child process 37534 exited by a signal 11 Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: ALERT: <core> [main.c:743]: handle_sigs(): core was generated Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: INFO: <core> [main.c:766]: handle_sigs(): terminating due to SIGCHLD Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37575]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37561]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37554]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37544]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37538]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37570]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37541]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37573]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37567]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37559]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37564]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37536]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37557]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37528]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37550]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37517]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37487]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37505]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37483]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37496]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37520]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37401]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37525]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37450]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37509]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37546]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37531]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37480]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37477]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37490]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37522]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37453]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37405]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37474]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37465]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37518]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37499]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37471]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37468]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37502]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37493]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37459]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37456]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37398]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37462]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37436]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37444]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37442]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37439]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37430]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37421]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37433]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37427]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37424]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37415]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37403]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37399]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37411]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37446]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37408]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37418]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received ```
#### SIP Traffic
Don't currently have, can capture if required.
### Possible Solutions
TBD
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
``` version: kamailio 5.2.0-rc0 (x86_64/linux) 398698 flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144 MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 398698 compiled on 15:33:07 Nov 16 2018 with gcc 6.3.0 ```
* **Operating System**:
``` Linux C1PBX0202 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux ```
I've looked at similar situations, apparently this can be caused by multi-threaded programming, accessing the socket on different threads at the same time. The solution is to make sure you're not writing to it on one thread and closing it on another but I'm at a loss as to how to check this in Kamailio.
Does anyone have any suggestions?
We've been testing this further.
- The problem doesn't occur when using TCP\UDP with-out making changes to our existing configuration. - If we change 'children' from 16 to 1 then the problem no longer occurs when using TLS.
Are there any significant drawbacks setting 'children' to 1? Thus far everything appears to be working as expected.
Is libcrypto using threads and deals with sockets itself from point of view of closing them? Kamailio is multi-process and at a given moment, only one process is supposed to write to the socket. Moreover, afaik, writing to a closed socket is not causing SIGSEGV.
From the log messages, it seems an error related to the random number generator from libcrypto.
You should install debugging symbols for libssl/libcrypto and see if you can get more details on the related frames from gdb. Last frame related to kamailio code is no. 11, the first 0..10 frames point to libss/libcrypto, but those have no symbols.
We tried changing children to 8 and the problem still occurs, 1 is the only safe value thus far.
Not sure exactly on the relationship between Kamailio and Libcrypto, does Kamailio need to interact with Libcrypto in a specific order? For example, if there are multiple messages sent to Kamailio both of which require some form of interaction with Libcrypto but one thread takes slightly than another, does it matter the order in which Kamailio interacts with Libcrypto?
Will look at installing debug symbols for libssl/libcrypto.
About the question "Are there any significant drawbacks setting 'children' to 1? Thus far everything appears to be working as expected." You will not get a good performance this way, as Kamailio can't process any new messages if there is e.g. a database operation running in the one child. You will also not use your processors effectively. It is not recommended to run a regular production environment with children=1.
Have you got the chance to install the debug symbols for libssl and libcrypto? Will allow to track inside those libraries where the crash happened and see if it is related to kamailio in some way.
Not yet, I took a quick look at the process but will have to come back to it at some point later this week when I have more time. We currently have limited use of Kamailio in our production environment pending resolution of this issue.
We've installed the latest debug symbols for libssl and libcrypto compiled from here: https://www.openssl.org/source/openssl-1.1.1b.tar.gz
We've also updated Kamailio to 5.2.1.
Unfortunately the problem remains the same, see above for the updated core dump.
Please let me know if there's anything more we can do.
Looking at the trace, looks related to sending a reply. In 5.2.2 I pushed a fix for a case when a reply processing happened at the same when the transaction was supposed to be deleted, after the safety wait timer of 5sec. Can you try with 5.2.2 just to rule out this issue is not a side effect of the same problem?
If crash still, would you be able to make a sipp scenario and a docker image to reproduce it? I tried, but could't reproduce, I guess it is a specific combination of events specific for your deployment.
Unfortunately this is still a problem after the upgrade to 5.2.2.
We will look at trying to re-produce this in SIPp.
Haven't got around to producing this is in SIPp yet as I've been tied up with other projects and I'm a newbie to SIPp.
The problem only occurs when children in Kamailio is set to anything above 1 which points towards a multi-threaded issue, as it only occurs on TLS not TCP or UDP this would appear to be an OpenSSL multi-threaded issue.
As far as I can tell OpenSSL isn't multi-threaded, to use with mutli-threaded applications requires that at least two callback functions are set, locking_function and threadid_func. I searched for these functions in the Kamailio GitHub repository but couldn't find anything, is this correct? Source: https://github.com/openssl/openssl/issues/2165
Not sure if this helps, each crash follows a slightly different path with-in 'modules/tls/tls_server.c' but always crashes in 'aes_ecb_cipher' at 'crypto/evp/e_aes.c:2699'.
Here's our most recent core dump.
(gdb) bt #0 0x00007f264161d6de in aes_ecb_cipher (ctx=0x7f25f5ad4480, out=0x7f25f6afec90 "", in=0x7f25f5ad4398 "\251\333\023`a>EBi\r\035\216Z\241Z}\200\\345/-\340{", len=0) at crypto/evp/e_aes.c:2699 #1 0x00007f264162b755 in evp_EncryptDecryptUpdate (ctx=0x7f25f5ad4480, out=0x7f25f6afec90 "", outl=0x7ffc6679a3a4, in=0x7f25f5ad4398 "\251\333\023`a>EBi\r\035\216Z\241Z}\200\\345/-\340{", inl=16) at crypto/evp/evp_enc.c:333 #2 0x00007f264162b9a0 in EVP_EncryptUpdate (ctx=0x7f25f5ad4480, out=0x7f25f6afec90 "", outl=0x7ffc6679a3a4, in=0x7f25f5ad4398 "\251\333\023`a>EBi\r\035\216Z\241Z}\200\\345/-\340{", inl=16) at crypto/evp/evp_enc.c:385 #3 0x00007f264162b38e in EVP_CipherUpdate (ctx=0x7f25f5ad4480, out=0x7f25f6afec90 "", outl=0x7ffc6679a3a4, in=0x7f25f5ad4398 "\251\333\023`a>EBi\r\035\216Z\241Z}\200\\345/-\340{", inl=16) at crypto/evp/evp_enc.c:213 #4 0x00007f2641669a01 in drbg_ctr_generate (drbg=0x7f25f5ad42b0, out=0x7f25f6afec90 "", outlen=32, adin=0x0, adinlen=0) at crypto/rand/drbg_ctr.c:340 #5 0x00007f264166af15 in RAND_DRBG_generate (drbg=0x7f25f5ad42b0, out=0x7f25f6afec90 "", outlen=32, prediction_resistance=0, adin=0x0, adinlen=0) at crypto/rand/drbg_lib.c:638 #6 0x00007f264166b043 in RAND_DRBG_bytes (drbg=0x7f25f5ad42b0, out=0x7f25f6afec90 "", outlen=32) at crypto/rand/drbg_lib.c:679 #7 0x00007f264166b5bc in drbg_bytes (out=0x7f25f6afec90 "", count=32) at crypto/rand/drbg_lib.c:968 #8 0x00007f264166cb2f in RAND_bytes (buf=0x7f25f6afec90 "", num=32) at crypto/rand/rand_lib.c:836 #9 0x00007f26419f0d33 in def_generate_session_id (ssl=0x7f25f6a6c540, id=0x7f25f6afec90 "", id_len=0x7ffc6679a534) at ssl/ssl_sess.c:290 #10 0x00007f26419f0f22 in ssl_generate_session_id (s=0x7f25f6a6c540, ss=0x7f25f6afeb38) at ssl/ssl_sess.c:362 #11 0x00007f26419f113e in ssl_get_new_session (s=0x7f25f6a6c540, session=1) at ssl/ssl_sess.c:418 #12 0x00007f2641a188f0 in tls_early_post_process_client_hello (s=0x7f25f6a6c540) at ssl/statem/statem_srvr.c:1817 #13 0x00007f2641a19900 in tls_post_process_client_hello (s=0x7f25f6a6c540, wst=WORK_MORE_A) at ssl/statem/statem_srvr.c:2222 #14 0x00007f2641a173dc in ossl_statem_server_post_process_message (s=0x7f25f6a6c540, wst=WORK_MORE_A) at ssl/statem/statem_srvr.c:1220 #15 0x00007f2641a03a04 in read_state_machine (s=0x7f25f6a6c540) at ssl/statem/statem.c:664 #16 0x00007f2641a03364 in state_machine (s=0x7f25f6a6c540, server=1) at ssl/statem/statem.c:434 #17 0x00007f2641a02e89 in ossl_statem_accept (s=0x7f25f6a6c540) at ssl/statem/statem.c:255 #18 0x00007f26419e952c in SSL_do_handshake (s=0x7f25f6a6c540) at ssl/ssl_lib.c:3599 #19 0x00007f26419e55f5 in SSL_accept (s=0x7f25f6a6c540) at ssl/ssl_lib.c:1643 #20 0x00007f26360480f2 in tls_accept (c=0x7f25f6aa1010, error=0x7ffc667ba98c) at tls_server.c:422 #21 0x00007f26360515fe in tls_read_f (c=0x7f25f6aa1010, flags=0x7ffc667bacc8) at tls_server.c:1119 #22 0x000055a6ac69fc43 in tcp_read_headers (c=0x7f25f6aa1010, read_flags=0x7ffc667bacc8) at core/tcp_read.c:469 #23 0x000055a6ac6a77e9 in tcp_read_req (con=0x7f25f6aa1010, bytes_read=0x7ffc667baccc, read_flags=0x7ffc667bacc8) at core/tcp_read.c:1496 #24 0x000055a6ac6ac757 in handle_io (fm=0x7f264284c438, events=1, idx=-1) at core/tcp_read.c:1804 #25 0x000055a6ac69a2c0 in io_wait_loop_epoll (h=0x55a6acb783a0 <io_w>, t=2, repeat=0) at core/io_wait.h:1065 #26 0x000055a6ac6ae76a in tcp_receive_loop (unix_sock=86) at core/tcp_read.c:1974 #27 0x000055a6ac561f12 in tcp_init_children () at core/tcp_main.c:4853 #28 0x000055a6ac4994ac in main_loop () at main.c:1745 #29 0x000055a6ac4a046e in main (argc=13, argv=0x7ffc667bb338) at main.c:2696
Here's the disas of aes_ecb_cipher, it was doing a move from memory pointed to in the %rax register plus an offset of 0xf8, to the %rax register.
(gdb) disas aes_ecb_cipher Dump of assembler code for function aes_ecb_cipher: 0x00007f264161d67d <+0>: push %rbp 0x00007f264161d67e <+1>: mov %rsp,%rbp 0x00007f264161d681 <+4>: sub $0x40,%rsp 0x00007f264161d685 <+8>: mov %rdi,-0x28(%rbp) 0x00007f264161d689 <+12>: mov %rsi,-0x30(%rbp) 0x00007f264161d68d <+16>: mov %rdx,-0x38(%rbp) 0x00007f264161d691 <+20>: mov %rcx,-0x40(%rbp) 0x00007f264161d695 <+24>: mov -0x28(%rbp),%rax 0x00007f264161d699 <+28>: mov %rax,%rdi 0x00007f264161d69c <+31>: callq 0x7f264162cf2a <EVP_CIPHER_CTX_block_size> 0x00007f264161d6a1 <+36>: cltq 0x00007f264161d6a3 <+38>: mov %rax,-0x10(%rbp) 0x00007f264161d6a7 <+42>: mov -0x28(%rbp),%rax 0x00007f264161d6ab <+46>: mov %rax,%rdi 0x00007f264161d6ae <+49>: callq 0x7f264162cfe5 <EVP_CIPHER_CTX_get_cipher_data> 0x00007f264161d6b3 <+54>: mov %rax,-0x18(%rbp) 0x00007f264161d6b7 <+58>: mov -0x40(%rbp),%rax 0x00007f264161d6bb <+62>: cmp -0x10(%rbp),%rax 0x00007f264161d6bf <+66>: jae 0x7f264161d6c8 <aes_ecb_cipher+75> 0x00007f264161d6c1 <+68>: mov $0x1,%eax 0x00007f264161d6c6 <+73>: jmp 0x7f264161d71b <aes_ecb_cipher+158> 0x00007f264161d6c8 <+75>: movq $0x0,-0x8(%rbp) 0x00007f264161d6d0 <+83>: mov -0x10(%rbp),%rax 0x00007f264161d6d4 <+87>: sub %rax,-0x40(%rbp) 0x00007f264161d6d8 <+91>: jmp 0x7f264161d70c <aes_ecb_cipher+143> 0x00007f264161d6da <+93>: mov -0x18(%rbp),%rax => 0x00007f264161d6de <+97>: mov 0xf8(%rax),%rax 0x00007f264161d6e5 <+104>: mov -0x18(%rbp),%rdx 0x00007f264161d6e9 <+108>: mov -0x30(%rbp),%rsi 0x00007f264161d6ed <+112>: mov -0x8(%rbp),%rcx 0x00007f264161d6f1 <+116>: add %rcx,%rsi 0x00007f264161d6f4 <+119>: mov -0x38(%rbp),%rdi 0x00007f264161d6f8 <+123>: mov -0x8(%rbp),%rcx 0x00007f264161d6fc <+127>: add %rdi,%rcx 0x00007f264161d6ff <+130>: mov %rcx,%rdi 0x00007f264161d702 <+133>: callq *%rax 0x00007f264161d704 <+135>: mov -0x10(%rbp),%rax 0x00007f264161d708 <+139>: add %rax,-0x8(%rbp) 0x00007f264161d70c <+143>: mov -0x8(%rbp),%rax 0x00007f264161d710 <+147>: cmp -0x40(%rbp),%rax 0x00007f264161d714 <+151>: jbe 0x7f264161d6da <aes_ecb_cipher+93> 0x00007f264161d716 <+153>: mov $0x1,%eax 0x00007f264161d71b <+158>: leaveq 0x00007f264161d71c <+159>: retq End of assembler dump.
If we look at the register, the problem is %rax is 0.
(gdb) i r rax 0x0 0 rbx 0x50 80 rcx 0x10 16 rdx 0x7f25f5ad4398 139801012290456 rsi 0x7f25f6afec90 139801029242000 rdi 0x7f25f5ad4480 139801012290688 rbp 0x7ffc6679a290 0x7ffc6679a290 rsp 0x7ffc6679a250 0x7ffc6679a250 r8 0x10 16 r9 0x0 0 r10 0x0 0 r11 0x202 514 r12 0x55a6ac8570b3 94174347358387 r13 0x40000000 1073741824 r14 0x10000000 268435456 r15 0x6 6 rip 0x7f264161d6de 0x7f264161d6de <aes_ecb_cipher+97> eflags 0x10246 [ PF ZF IF RF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0
Thanks for troubleshooting further.
Can you try with pre-loaded library workaround that was pushed to git master yesterday? Respectively:
* https://github.com/kamailio/kamailio/tree/master/src/modules/tls/utils/opens...
It looks like a side effect of not having the pthread locks initialized by libssl 1.1 with process shared option. If proves to work fine, then we can approach openssl project to introduce a way to allow setting the process shared option for locks.
Unfortunately that didn't fix the problem, however the core dump has changed.
``` Reading symbols from /usr/local/kamailio/sbin/kamailio...done. [New LWP 26088] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/local/kamailio/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /usr/loc'. Program terminated with signal SIGSEGV, Segmentation fault. #0 aesni_ecb_encrypt () at crypto/aes/aesni-x86_64.s:624 624 movups (%rcx),%xmm1 ```
``` (gdb) disas aesni_ecb_encrypt Dump of assembler code for function aesni_ecb_encrypt: 0x00007ffba23869e0 <+0>: and $0xfffffffffffffff0,%rdx 0x00007ffba23869e4 <+4>: je 0x7ffba2386f34 <aesni_ecb_encrypt+1364> 0x00007ffba23869ea <+10>: mov 0xf0(%rcx),%eax 0x00007ffba23869f0 <+16>: movups (%rcx),%xmm0 0x00007ffba23869f3 <+19>: mov %rcx,%r11 0x00007ffba23869f6 <+22>: mov %eax,%r10d 0x00007ffba23869f9 <+25>: test %r8d,%r8d 0x00007ffba23869fc <+28>: je 0x7ffba2386c50 <aesni_ecb_encrypt+624> 0x00007ffba2386a02 <+34>: cmp $0x80,%rdx 0x00007ffba2386a09 <+41>: jb 0x7ffba2386af7 <aesni_ecb_encrypt+279> 0x00007ffba2386a0f <+47>: movdqu (%rdi),%xmm2 0x00007ffba2386a13 <+51>: movdqu 0x10(%rdi),%xmm3 0x00007ffba2386a18 <+56>: movdqu 0x20(%rdi),%xmm4 0x00007ffba2386a1d <+61>: movdqu 0x30(%rdi),%xmm5 0x00007ffba2386a22 <+66>: movdqu 0x40(%rdi),%xmm6 0x00007ffba2386a27 <+71>: movdqu 0x50(%rdi),%xmm7 0x00007ffba2386a2c <+76>: movdqu 0x60(%rdi),%xmm8 0x00007ffba2386a32 <+82>: movdqu 0x70(%rdi),%xmm9 0x00007ffba2386a38 <+88>: lea 0x80(%rdi),%rdi 0x00007ffba2386a3f <+95>: sub $0x80,%rdx 0x00007ffba2386a46 <+102>: jmp 0x7ffba2386aae <aesni_ecb_encrypt+206> 0x00007ffba2386a48 <+104>: nopl 0x0(%rax,%rax,1) 0x00007ffba2386a50 <+112>: movups %xmm2,(%rsi) 0x00007ffba2386a53 <+115>: mov %r11,%rcx 0x00007ffba2386a56 <+118>: movdqu (%rdi),%xmm2 0x00007ffba2386a5a <+122>: mov %r10d,%eax 0x00007ffba2386a5d <+125>: movups %xmm3,0x10(%rsi) 0x00007ffba2386a61 <+129>: movdqu 0x10(%rdi),%xmm3 0x00007ffba2386a66 <+134>: movups %xmm4,0x20(%rsi) 0x00007ffba2386a6a <+138>: movdqu 0x20(%rdi),%xmm4 0x00007ffba2386a6f <+143>: movups %xmm5,0x30(%rsi) 0x00007ffba2386a73 <+147>: movdqu 0x30(%rdi),%xmm5 0x00007ffba2386a78 <+152>: movups %xmm6,0x40(%rsi) 0x00007ffba2386a7c <+156>: movdqu 0x40(%rdi),%xmm6 0x00007ffba2386a81 <+161>: movups %xmm7,0x50(%rsi) 0x00007ffba2386a85 <+165>: movdqu 0x50(%rdi),%xmm7 0x00007ffba2386a8a <+170>: movups %xmm8,0x60(%rsi) 0x00007ffba2386a8f <+175>: movdqu 0x60(%rdi),%xmm8 0x00007ffba2386a95 <+181>: movups %xmm9,0x70(%rsi) 0x00007ffba2386a9a <+186>: lea 0x80(%rsi),%rsi 0x00007ffba2386aa1 <+193>: movdqu 0x70(%rdi),%xmm9 0x00007ffba2386aa7 <+199>: lea 0x80(%rdi),%rdi 0x00007ffba2386aae <+206>: callq 0x7ffba23867c0 <_aesni_encrypt8> 0x00007ffba2386ab3 <+211>: sub $0x80,%rdx 0x00007ffba2386aba <+218>: jae 0x7ffba2386a50 <aesni_ecb_encrypt+112> 0x00007ffba2386abc <+220>: movups %xmm2,(%rsi) 0x00007ffba2386abf <+223>: mov %r11,%rcx 0x00007ffba2386ac2 <+226>: movups %xmm3,0x10(%rsi) 0x00007ffba2386ac6 <+230>: mov %r10d,%eax 0x00007ffba2386ac9 <+233>: movups %xmm4,0x20(%rsi) 0x00007ffba2386acd <+237>: movups %xmm5,0x30(%rsi) 0x00007ffba2386ad1 <+241>: movups %xmm6,0x40(%rsi) 0x00007ffba2386ad5 <+245>: movups %xmm7,0x50(%rsi) 0x00007ffba2386ad9 <+249>: movups %xmm8,0x60(%rsi) 0x00007ffba2386ade <+254>: movups %xmm9,0x70(%rsi) 0x00007ffba2386ae3 <+259>: lea 0x80(%rsi),%rsi 0x00007ffba2386aea <+266>: add $0x80,%rdx 0x00007ffba2386af1 <+273>: je 0x7ffba2386f34 <aesni_ecb_encrypt+1364> 0x00007ffba2386af7 <+279>: movups (%rdi),%xmm2 0x00007ffba2386afa <+282>: cmp $0x20,%rdx 0x00007ffba2386afe <+286>: jb 0x7ffba2386b70 <aesni_ecb_encrypt+400> 0x00007ffba2386b00 <+288>: movups 0x10(%rdi),%xmm3 0x00007ffba2386b04 <+292>: je 0x7ffba2386ba0 <aesni_ecb_encrypt+448> 0x00007ffba2386b0a <+298>: movups 0x20(%rdi),%xmm4 0x00007ffba2386b0e <+302>: cmp $0x40,%rdx 0x00007ffba2386b12 <+306>: jb 0x7ffba2386bc0 <aesni_ecb_encrypt+480> 0x00007ffba2386b18 <+312>: movups 0x30(%rdi),%xmm5 0x00007ffba2386b1c <+316>: je 0x7ffba2386be0 <aesni_ecb_encrypt+512> 0x00007ffba2386b22 <+322>: movups 0x40(%rdi),%xmm6 0x00007ffba2386b26 <+326>: cmp $0x60,%rdx 0x00007ffba2386b2a <+330>: jb 0x7ffba2386c00 <aesni_ecb_encrypt+544> 0x00007ffba2386b30 <+336>: movups 0x50(%rdi),%xmm7 0x00007ffba2386b34 <+340>: je 0x7ffba2386c20 <aesni_ecb_encrypt+576> 0x00007ffba2386b3a <+346>: movdqu 0x60(%rdi),%xmm8 0x00007ffba2386b40 <+352>: xorps %xmm9,%xmm9 0x00007ffba2386b44 <+356>: callq 0x7ffba23867c0 <_aesni_encrypt8> 0x00007ffba2386b49 <+361>: movups %xmm2,(%rsi) 0x00007ffba2386b4c <+364>: movups %xmm3,0x10(%rsi) 0x00007ffba2386b50 <+368>: movups %xmm4,0x20(%rsi) 0x00007ffba2386b54 <+372>: movups %xmm5,0x30(%rsi) 0x00007ffba2386b58 <+376>: movups %xmm6,0x40(%rsi) 0x00007ffba2386b5c <+380>: movups %xmm7,0x50(%rsi) 0x00007ffba2386b60 <+384>: movups %xmm8,0x60(%rsi) 0x00007ffba2386b65 <+389>: jmpq 0x7ffba2386f34 <aesni_ecb_encrypt+1364> 0x00007ffba2386b6a <+394>: nopw 0x0(%rax,%rax,1) 0x00007ffba2386b70 <+400>: movups (%rcx),%xmm0 0x00007ffba2386b73 <+403>: movups 0x10(%rcx),%xmm1 0x00007ffba2386b77 <+407>: lea 0x20(%rcx),%rcx 0x00007ffba2386b7b <+411>: xorps %xmm0,%xmm2 0x00007ffba2386b7e <+414>: aesenc %xmm1,%xmm2 0x00007ffba2386b83 <+419>: dec %eax => 0x00007ffba2386b85 <+421>: movups (%rcx),%xmm1 0x00007ffba2386b88 <+424>: lea 0x10(%rcx),%rcx 0x00007ffba2386b8c <+428>: jne 0x7ffba2386b7e <aesni_ecb_encrypt+414> 0x00007ffba2386b8e <+430>: aesenclast %xmm1,%xmm2 0x00007ffba2386b93 <+435>: movups %xmm2,(%rsi) 0x00007ffba2386b96 <+438>: jmpq 0x7ffba2386f34 <aesni_ecb_encrypt+1364> 0x00007ffba2386b9b <+443>: nopl 0x0(%rax,%rax,1) 0x00007ffba2386ba0 <+448>: callq 0x7ffba2386340 <_aesni_encrypt2> 0x00007ffba2386ba5 <+453>: movups %xmm2,(%rsi) 0x00007ffba2386ba8 <+456>: movups %xmm3,0x10(%rsi) 0x00007ffba2386bac <+460>: jmpq 0x7ffba2386f34 <aesni_ecb_encrypt+1364> 0x00007ffba2386bb1 <+465>: nopl 0x0(%rax,%rax,1) 0x00007ffba2386bb6 <+470>: nopw %cs:0x0(%rax,%rax,1) 0x00007ffba2386bc0 <+480>: callq 0x7ffba2386400 <_aesni_encrypt3> 0x00007ffba2386bc5 <+485>: movups %xmm2,(%rsi) 0x00007ffba2386bc8 <+488>: movups %xmm3,0x10(%rsi) 0x00007ffba2386bcc <+492>: movups %xmm4,0x20(%rsi) 0x00007ffba2386bd0 <+496>: jmpq 0x7ffba2386f34 <aesni_ecb_encrypt+1364> ```
``` (gdb) i r rax 0xfc3ba328 4231766824 rbx 0x1 1 rcx 0x7ffb96805000 140718538510336 rdx 0x10 16 rsi 0x7ffb58c04108 140717502513416 rdi 0x7ffb56b0c898 140717467945112 rbp 0x7ffcff3bd080 0x7ffcff3bd080 rsp 0x7ffcff3bd038 0x7ffcff3bd038 r8 0x1 1 r9 0x0 0 r10 0x0 0 r11 0x7ffb5a3a8270 140717527302768 r12 0x55e1430f52d3 94425981080275 r13 0x40000000 1073741824 r14 0x10000000 268435456 r15 0x6 6 rip 0x7ffba2386b85 0x7ffba2386b85 <aesni_ecb_encrypt+421> eflags 0x10287 [ CF PF SF IF RF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0 ```
I've been looking at buffers and limits to see if we're perhaps hitting some kind of limit that could be triggering this and have found that increasing tls_max_connections and tcp_max_connections to 32768 appears to increase the threshold before the segmentation fault occurs. We're now able to get >20000 presence subscriptions with-out any segmentation faults.
I have more testing to do before I can reach a conclusion but it appears there may be a correlation between tls_max_connections and the segmentation fault.
Can you get the output of `bt full` in gdb for the last core dump file?
I've re-tested this morning after making no changes and the problem is as before, tls_max_connections was a red herring.
What was the command you used to start kamailio?
Using systemd, 'service kamailio start'.
This is our Kamailio systemd config:
/lib/systemd/system/kamailio.service ``` [Unit] Description=Kamailio (OpenSER) - the Open Source SIP Server After=syslog.target network.target local-fs.target postgresql.service haveged.service freeswitch.service
[Service] Type=forking Environment='CFGFILE=/usr/local/kamailio/etc/kamailio/kamailio.cfg' Environment='SHM_MEMORY=1024' Environment='PKG_MEMORY=256' Environment='USER=kamailio' Environment='GROUP=kamailio' Environment='RUN_KAMAILIO=yes' Environment='LD_PRELOAD=/usr/local/kamailio/lib64/kamailio/openssl_mutex_shared/openssl_mutex_shared.so' # PIDFile requires a full absolute path PIDFile=/var/run/kamailio/kamailio.pid # ExecStart requires a full absolute path ExecStart=/usr/local/kamailio/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f $CFGFILE -m $SHM_MEMORY -M $PKG_MEMORY -u $USER -g $GROUP TimeoutSec=120s Restart=always # /var/run/kamailio in tmpfs RuntimeDirectory=kamailio RuntimeDirectoryMode=0750 ; exec WorkingDirectory=/usr/local/kamailio/sbin User=root Group=daemon LimitCORE=infinity LimitNOFILE=100000 LimitNPROC=60000 LimitSTACK=250000 LimitRTPRIO=infinity LimitRTTIME=7000000 IOSchedulingClass=realtime IOSchedulingPriority=2 Nice=-10 CPUSchedulingPolicy=rr CPUSchedulingPriority=1 UMask=0007
[Install] WantedBy=multi-user.target ```
Here is the output of ```bt full``` in gdb for our most recent core dump file. ``` (gdb) bt full #0 0x00007f46a414cd83 in EVP_CIPHER_flags (cipher=0x0) at crypto/evp/evp_lib.c:210 No locals. #1 0x00007f46a4136028 in aesni_init_key (ctx=0x7f46587b4980, key=0x7f46587b4878 "\004\373z\264\326\301a\305\337߈M2\361\376aO\226\033\r7\203\071\020\313\060\203r\314\066\005=>\311\372\215\325,z\004y[\202\306\327\021'\337P\231\b\252", iv=0x0, enc=1) at crypto/evp/e_aes.c:273 ret = 0 mode = 128 dat = 0x0 #2 0x00007f46a414b0d8 in EVP_CipherInit_ex (ctx=0x7f46587b4980, cipher=0x7f46a44b6460 <aesni_256_ecb>, impl=0x0, key=0x7f46587b4878 "\004\373z\264\326\301a\305\337߈M2\361\376aO\226\033\r7\203\071\020\313\060\203r\314\066\005=>\311\372\215\325,z\004y[\202\306\327\021'\337P\231\b\252", iv=0x0, enc=1) at crypto/evp/evp_enc.c:200 No locals. #3 0x00007f46a418ddd3 in ctr_update (drbg=0x7f46587b47b0, in1=0x0, in1len=0, in2=0x0, in2len=0, nonce=0x0, noncelen=0) at crypto/rand/drbg_ctr.c:274 ctr = 0x7f46587b4858 outlen = 16 #4 0x00007f46a418e0d2 in drbg_ctr_generate (drbg=0x7f46587b47b0, out=0x7f465afaeb98 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co;tag=0b62483f5"..., outlen=0, adin=0x0, adinlen=0) at crypto/rand/drbg_ctr.c:349 ctr = 0x7f46587b4858 #5 0x00007f46a418f591 in RAND_DRBG_generate (drbg=0x7f46587b47b0, out=0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"..., outlen=16, prediction_resistance=0, adin=0x0, adinlen=32) at crypto/rand/drbg_lib.c:638 reseed_required = 0 #6 0x00007f46a418f6bf in RAND_DRBG_bytes (drbg=0x7f46587b47b0, out=0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"..., outlen=16) at crypto/rand/drbg_lib.c:679 additional = 0x0 additional_len = 32 chunk = 16 ret = 0 #7 0x00007f46a418fc38 in drbg_bytes ( out=0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"..., count=16) at crypto/rand/drbg_lib.c:968 ret = 0 drbg = 0x7f46587b47b0 #8 0x00007f46a41911ab in RAND_bytes ( buf=0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"..., num=16) at crypto/rand/rand_lib.c:836 meth = 0x7f46a44d8920 <rand_meth> #9 0x00007f46a450ebb5 in tls1_enc (s=0x7f465afa3b58, recs=0x7fff01bdf050, n_recs=1, sending=1) at ssl/record/ssl3_record.c:985 ivlen = 16 ds = 0x7f465a29d8c8 reclen = {268435456, 139940143921712, 4324191904, 139940105930440, 140733222612640, 94261356491263, 94261357814483, 139940105930440, 268435456, 4294967302, 140733222612720, 94261356548576, 139941188525952, 1260989218478, 139941188533296, 139941188525956, 40, 139940105695232, 140733222612768, 139940143921768, 140733222612768, 139941188239022, 139941381576288, 139941381576288, 139941381576304, 140733222615632, 140733222612832, 139941381162415, 140733222612848, 140733222612936, 490, 140733222615632} buf = {"\000\000\000\000\000\000\000z\027\003\003", <incomplete sequence \352>, "\177\000\000-\263#\376\070\335\303y4J", "H\263\252\036q6\266be\232\336", <incomplete sequence \364>, "\217\305F\022\322\375#\242\255\313jbZ", "\231\335J\243=\236\244\236\333A\321-\036", "\034$\222\250\301GB,Σ\270\255\003", "\021\303\000\000\000\000\000\000\000\000\000\000", "\000\001\000\000\000\060z\221ZF\177\000", "\000\060JXF\177\000\000\230H{XF", "\177\000\000\240\253JXF\177\000\000\000", "\000\020\032\001\000\000\240\253JXF\177", "\000\240\355\275\001\377\177\000\000d\227\253", <incomplete sequence \356>, "\272U\000\000\300z\221ZF\177\000\000", "0JXF\177\000\000\204\337ԘF\177", "\000\000\300\243JXF\177\000\000\240y\221", "Z\b\001\000\000\300\243JXF\177\000", "\340\355\275\001\377\177\000\000d\227\253", <incomplete sequence \356\272>, "U\000\000\200\001\000\000%\001\000\000[D", "\303\356\272U\000\000\204\337ԘF\177", "\000(\000\000\000\000\000\000\000\060z\221Z", "F\177\000\000\000\060JXF\177\000", <incomplete sequence \360>, "\355\217ZF\177\000\000\300z\221ZF\177", "\000\000\220z\221Z\004\000\000\000\360", <incomplete sequence \303>, "\356\272U\000\000\240\356\275\001\377\177\000", ")\234\253\356\272U\000\000\240\356\275\001\377", "\177\000\000ٜ\253\356\272U\000\000\001", "\000\000\000\000\000\000\001\000\000\000,\001", "\000\200\337ԘF\177\000\000\240y\221Z", "%\001\000\000\060\374ԘF\177\000\000\204", "\337ԘF\177\000\000(\000\000\000\000", "\000\000\000\060JXF\177\000\000\001\000", "\000\000\000\000\000\001\000\000\000\032\001\000"} i = 32767 pad = 0 ret = 32582 tmpr = 1 bs = 139941381576304 mac_size = 0 ctr = 0 padnum = 139941381576288 loop = 139941381576552 padval = 0 '\000' imac_size = 43 enc = 0x7f46a44d85c0 <aesni_128_cbc_hmac_sha1_cipher> #10 0x00007f46a450a28f in do_ssl3_write (s=0x7f465afa3b58, type=23, buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co;tag=0b62483f5"..., pipelens=0x7fff01be0160, numpipes=1, create_empty_fragment=0, written=0x7fff01be0270) at ssl/record/rec_layer_s3.c:1003 pkt = {{buf = 0x0, staticbuf = 0x7f465afaeb80 "", curr = 514, written = 514, maxsize = 16472, subs = 0x7f465a917a68}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0} <repeats 19 times>, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x7f465afaeb80}, {buf = 0x3d8, staticbuf = 0x3d8 <error: Cannot access memory at address 0x3d8>, curr = 16472, written = 0, maxsize = 812151909, subs = 0x7f46b52abbb8}, {buf = 0x7fff01be0230, staticbuf = 0x7f46b5c791da <_dl_runtime_resolve_xsave+138> "I\211", <incomplete sequence \356>, curr = 60359, written = 586, maxsize = 139941396355704, subs = 0x7f46a52129a0}, {buf = 0xebc7, staticbuf = 0x7fff01be0e40 "\371!", curr = 140733222620672, written = 828929125, maxsize = 549756338184, subs = 0x2}, {buf = 0x55baeebfa2d3, staticbuf = 0x40000000 <error: Cannot access memory at address 0x40000000>, curr = 268435456, written = 6, maxsize = 140733222616912, subs = 0x55baeeae5ddf <parse_from_uri+58>}, {buf = 0x0, staticbuf = 0x7f46a52129a0 "{", curr = 586, written = 139941396346608, maxsize = 586, subs = 0x2}, {buf = 0x7f46a537f758, staticbuf = 0x7fff01be0110 "\360\002\276\001\377\177", curr = 139941394269184, written = 139941394852256, maxsize = 140733222617072, subs = 0x7f469fe775bc <pv_get_xto_attr+5183>}, {buf = 0x12000, staticbuf = 0x1a52129a0 <error: Cannot access memory at address 0x1a52129a0>, curr = 139941396346608, written = 140733222617360, maxsize = 139941394269184, subs = 0x7f46a52129a0}, {buf = 0x7fff01bdffc0, staticbuf = 0x7f46a52129a0 "{", curr = 43, written = 140733222617520, maxsize = 139941396355704, subs = 0x7f46a51c84c2}, {buf = 0x7fff01be06c8, staticbuf = 0x7fff01be0700 "\353", <incomplete sequence \307>, curr = 0, written = 94261388500537, maxsize = 0, subs = 0x7f469e128bde}, {buf = 0x0, staticbuf = 0x7fff01be06c8 "", curr = 2001752693, written = 0, maxsize = 94261388500542, subs = 0x0}, {buf = 0xfffffffe, staticbuf = 0x7f4600000000 <error: Cannot access memory at address 0x7f4600000000>, curr = 48, written = 0, maxsize = 4294967295, subs = 0x55baf093de3e}} wr = {{rec_version = 771, type = 23, length = 506, orig_len = 0, off = 0, data = 0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"..., input = 0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"..., comp = 0x0, read = 0, epoch = 0, seq_num = "\000\000\000\000\000\000\000"}, {rec_version = 0, type = 0, length = 0, orig_len = 0, off = 0, data = 0x0, input = 0x0, comp = 0x0, read = 0, epoch = 0, seq_num = "\000\000\000\000\000\000\000"} <repeats 31 times>} thispkt = 0x7fff01bdfa50 thiswr = 0x7fff01bdf050 recordstart = 0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"... i = 0 mac_size = 0 clear = 0 prefix_len = 0 eivlen = 16 align = 3 wb = 0x7f465afa43b0 sess = 0x7f465afb4620 totlen = 490 len = 506 wpinited = 1 j = 1 #11 0x00007f46a45090ac in ssl3_write_bytes (s=0x7f465afa3b58, type=23, buf_=0x7f46a5382650, len=490, written=0x7fff01be03b0) at ssl/record/rec_layer_s3.c:613 pipelens = {490, 140733222618944, 140733193388032, 94261356061472, 140733193388037, 139941664324654, 140733222617664, 140, 34359741800, 94257352278016, 140733193388075, 139941292790494, 140733222619208, 139941394547910, 139941394547906, 139941664138425, 0, 139938624438273, 140733222618352, 94261388500539, 140733222617768, 206158430224, 140733222617808, 29230736, 0, 1158064281267208192, 5679437561345343536, 18446744073709551615, 12166682089369894912, 5736522341043666960, 139941394865048, 4239145472499881216} tmppipelen = 490 remain = 0 numpipes = 1 j = 1 buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co;tag=0b62483f5"... tot = 0 n = 490 max_send_fragment = 16384 split_send_fragment = 16384 maxpipes = 1 nw = 139940105930440 wb = 0x7f465afa43b0 i = 0 tmpwrit = 0 #12 0x00007f46a45178c0 in ssl3_write (s=0x7f465afa3b58, buf=0x7f46a5382650, len=490, written=0x7fff01be03b0) at ssl/s3_lib.c:4460 No locals. #13 0x00007f46a45264db in ssl_write_internal (s=0x7f465afa3b58, buf=0x7f46a5382650, num=490, written=0x7fff01be03b0) at ssl/ssl_lib.c:1943 No locals. #14 0x00007f46a4526538 in SSL_write (s=0x7f465afa3b58, buf=0x7f46a5382650, num=490) at ssl/ssl_lib.c:1957 ret = 0 written = 268435456 #15 0x00007f4698d2ea3d in tls_encode_f (c=0x7f465a9a30c8, pbuf=0x7fff01be0560, plen=0x7fff01be0558, rest_buf=0x7fff01be0568, rest_len=0x7fff01be055c, send_flags=0x7fff01be054c) at tls_server.c:828 n = 0 offs = 0 ssl = 0x7f465afa3b58 tls_c = 0x7f4659c6de40 wr_buf = "\027\003\003\002\020SL\364\362e>3<*\234i\255n\025\320E95Q1\316\357M+a:\265<\371\304\357\366\244\251\201\016ɏ\236\064+\r\341\065\207\067\331d߃\235.\226\252\224\024\r\214^\022\317q!\374\242\216\\364Y\345\232<\003fI^7\324\327A\237\263\r\300\352lGj\203\204\341\352\f\020x\267\366\216\250\221\241\213\270\026\217\255\352\331R\334%\211\267_\302%\310\352\226\363\337˴\345\263{\203\351cr\263ڧ\224J\200\355F@\216\220\322\\253&\346{KP\263\266\025{n2\262U\342h\202\237[_\326W\364y\216\272\060"\232\025\315;\311\356/Ur$\200\031\256)[J\024\025\257\222$\353\230\001\061|\256\236"... rd = {buf = 0x0, pos = 0, used = 0, size = 0} wr = { buf = 0x7f4698f6af60 <wr_buf> "\027\003\003\002\020SL\364\362e>3<*\234i\255n\025\320E95Q1\316\357M+a:\265<\371\304\357\366\244\251\201\016ɏ\236\064+\r\341\065\207\067\331d߃\235.\226\252\224\024\r\214^\022\317q!\374\242\216\\364Y\345\232<\003fI^7\324\327A\237\263\r\300\352lGj\203\204\341\352\f\020x\267\366\216\250\221\241\213\270\026\217\255\352\331R\334%\211\267_\302%\310\352\226\363\337˴\345\263{\203\351cr\263ڧ\224J\200\355F@\216\220\322\\253&\346{KP\263\266\025{n2\262U\342h\202\237[_\326W\364y\216\272\060"\232\025\315;\311\356/Ur$\200\031\256)[J\024\025\257\222$\353\230\001"..., pos = 0, used = 0, size = 65536} ssl_error = 0 err_src = 0x7f4698d59ca7 "TLS write:" buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co;tag=0b62483f5"... len = 490 x = 1520054472 __func__ = "tls_encode_f" #16 0x000055baee8da1e4 in tcpconn_send_put (c=0x7f465a9a30c8, buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co;tag=0b62483f5"..., len=490, send_flags=...) at core/tcp_main.c:2530 tmp = 0x7f465852d808 fd = 10 response = {140733222618528, 0} n = 4 do_close_fd = 0 rest_buf = 0x0 t_buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co;tag=0b62483f5"... rest_len = 0 t_len = 490 resp = 0 t_send_flags = {f = 0, blst_imask = 0} fd_cache_e = 0x0 use_fd_cache = 0 __func__ = "tcpconn_send_put" #17 0x000055baee8d78d7 in tcp_send (dst=0x7f465b1b7848, from=0x0, buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co;tag=0b62483f5"..., len=490) at core/tcp_main.c:2310 c = 0x7f465a9a30c8 ip = {af = 2, len = 4, u = {addrl = {2988284242, 8709}, addr32 = {2988284242, 0, 8709, 0}, addr16 = {39250, 45597, 0, 0, 8709, 0, 0, 0}, addr = "R\231\035\262\000\000\000\000\005"\000\000\000\000\000"}} port = 51179 fd = 7 response = {140733222618832, 140733222618840} n = 32582 con_lifetime = 57680 rest_buf = 0x7fff01be06c8 "" t_buf = 0x7fff01be06c4 "" rest_len = 32767 t_len = 29230784 resp = 140733222618812 t_send_flags = {f = 0, blst_imask = 0} __func__ = "tcp_send" #18 0x00007f46a080e586 in msg_send_buffer (dst=0x7f465b1b7848, buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co;tag=0b62483f5"..., len=490, flags=0) at ../../core/forward.h:282 new_dst = {send_sock = 0x45a9175e8, to = {s = {sa_family = 13296, sa_data = "\303\356\272U\000\000\000\t\276\001\377\177\000"}, sin = {sin_family = 13296, sin_port = 61123, sin_addr = {s_addr = 21946}, sin_zero = "\000\t\276\001\377\177\000"}, sin6 = {sin6_family = 13296, sin6_port = 61123, sin6_flowinfo = 21946, sin6_addr = {__in6_u = {__u6_addr8 = "\000\t\276\001\377\177\000\000)\234\253\356\272U\000", __u6_addr16 = {2304, 446, 32767, 0, 39977, 61099, 21946, 0}, __u6_addr32 = {29231360, 32767, 4004224041, 21946}}}, sin6_scope_id = 29231360}}, id = 32767, proto = -39 '\331', send_flags = {f = 61099, blst_imask = 21946}} outb = {s = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co;tag=0b62483f5"..., len = 490} netinfo = {data = {s = 0x7f46a086607b "tm: t_reply.c", len = 656}, rcv = 0x7f465a917320, dst = 0x7f46584a3000} evp = {data = 0x7fff01be0820, rcv = 0x0, dst = 0x7f465b1b7848} port = 1 ip = {af = 268435456, len = 0, u = {addrl = {139940105741552, 1773850724352}, addr32 = {1481303280, 32582, 29231104, 413}, addr16 = {58608, 22602, 32582, 0, 2048, 446, 413, 0}, addr = "\360\344JXF\177\000\000\000\b\276\001\235\001\000"}} from = 0x0 local_addr = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = "\000\000\000\000\000\000\000\000\030v\221ZF\177\000", __u6_addr16 = {0, 0, 0, 0, 30232, 23185, 32582, 0}, __u6_addr32 = {0, 0, 1519482392, 32582}}}, sin6_scope_id = 1481256960}} con = 0x0 wsev = {type = 0, buf = 0x0, len = 0, id = 0} ret = 508 __func__ = "msg_send_buffer" #19 0x00007f46a0810944 in send_pr_buffer (rb=0x7f465b1b77f8, buf=0x7f46a5382650, len=490) at t_funcs.c:70 __func__ = "send_pr_buffer" #20 0x00007f46a07c1fa2 in _reply_light (trans=0x7f465b1b7728, buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co;tag=0b62483f5"..., len=490, code=202, to_tag=0x7f46a0aa5580 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-455a", to_tag_len=37, lock=1, bm=0x7fff01be12c0) at t_reply.c:555 rb = 0x7f465b1b77f8 buf_len = 650 cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}} onsend_params = {req = 0x1be1220, rpl = 0xc00000000, param = 0x17, code = -290705697, flags = 3, branch = 0, t_rbuf = 0x7fff01be1240, dst = 0x7f465a9a349e, send_buf = {s = 0x0, len = 0}} rt = 0 backup_rt = 0 ctx = {rec_lev = -1523033760, run_flags = 32582, last_retcode = -1526226928, jmp_env = {{__jmpbuf = {94261357790928, 94261357771114, 496, 139941393178640, 140733222621628, 377957122049, 94257352278021, 139941393178640}, __mask_was_saved = 16, __saved_mask = {__val = { 139941396371752, 140733222621536, 2, 94261357814483, 1073741824, 268435456, 6, 140733222621824, 94261355300342, 140733222621888, 140733222621916, 139941394852256, 139941319868304, 140733222622176, 867612627416, 0}}}}} pmsg = {id = 0, pid = 0, tval = {tv_sec = 139941260598996, tv_usec = 139941396349872}, fwd_send_flags = {f = 30935, blst_imask = 15921}, rpl_send_flags = {f = 21946, blst_imask = 0}, first_line = {type = 2640, flags = 446, len = 32767, u = {request = {method = { s = 0x7f46a53441f0 "sip:813@88.88.88.88:51179;transport=tls;registering_acc=mydomain_co_co", len = -1721491552}, uri = {s = 0x7f46a5346578 "\a", len = 268435456}, version = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 29233280}, method_value = 29233104}, reply = {version = {s = 0x7f46a53441f0 "sip:813@88.88.88.88:51179;transport=tls;registering_acc=mydomain_co_co", len = -1721491552}, status = {s = 0x7f46a5346578 "\a", len = 268435456}, reason = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 29233280}, statuscode = 29233104}}}, via1 = 0x7fff01be0fc0, via2 = 0x7f46a47c031b, headers = 0x7fff01be1138, last_header = 0x0, parsed_flag = 139941384028963, h_via1 = 0x7f46b52e24b9 <_IO_vfprintf_internal+1929>, h_via2 = 0x5, callid = 0x7f46b52e1e36 <_IO_vfprintf_internal+262>, to = 0x7fff01be1000, cseq = 0x7f46a47c017f, from = 0x7fff01be0b28, contact = 0x0, maxforwards = 0x7fff01be0b50, route = 0xb52e24b9, record_route = 0x0, content_type = 0x0, content_length = 0x7fff00000000, authorization = 0xffffffffffffffff, expires = 0x7fff00000005, proxy_auth = 0x7f467fffffff, supported = 0x7f46a47c0200, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x7fff01be0ba0, event = 0x0, accept = 0xd68, accept_language = 0x7f4600000005, organization = 0x7f46a47c031b, priority = 0x3, subject = 0x7f46a47c0341, user_agent = 0x7f46a47c0324, server = 0x7fff01be0be0, content_disposition = 0x7f46a47c0341, diversion = 0x7fff01be0be8, rpid = 0x55ba00000006, refer_to = 0x7f46a47c0320, session_expires = 0x3, min_se = 0x0, sipifmatch = 0x3000000018, subscription_state = 0x7fff01be1210, date = 0x7fff01be1150, identity = 0x7fff01be1220, identity_info = 0x7fff01be1160, pai = 0x7f46a47c0900, ppi = 0x0, path = 0x0, privacy = 0x3000000000, min_expires = 0x7fff01be0c60, body = 0x0, eoh = 0xd68 <error: Cannot access memory at address 0xd68>, unparsed = 0xd <error: Cannot access memory at address 0xd>, rcv = {src_ip = {af = 3432, len = 0, u = {addrl = {0, 139941384030571}, addr32 = {0, 0, 2759592299, 32582}, addr16 = {0, 0, 0, 0, 2411, 42108, 32582, 0}, addr = "\000\000\000\000\000\000\000\000k\t|\244F\177\000"}}, dst_ip = {af = 2759592292, len = 0, u = {addrl = {932276338688, 139941384030571}, addr32 = {268435456, 217, 2759592299, 32582}, addr16 = { 0, 4096, 217, 0, 2411, 42108, 32582, 0}, addr = "\000\000\000\020\331\000\000\000k\t|\244F\177\000"}}, src_port = 3280, dst_port = 446, proto_reserved1 = 32767, proto_reserved2 = -290733184, src_su = {s = {sa_family = 21946, sa_data = "\000\000`\t|\244F\177\000\000\260\021\276\001"}, sin = {sin_family = 21946, sin_port = 0, sin_addr = {s_addr = 2759592288}, sin_zero = "F\177\000\000\260\021\276\001"}, sin6 = {sin6_family = 21946, sin6_port = 0, sin6_flowinfo = 2759592288, sin6_addr = { __in6_u = {__u6_addr8 = "F\177\000\000\260\021\276\001\003\000\000\000\300\001\062\240", __u6_addr16 = {32582, 0, 4528, 446, 3, 0, 448, 41010}, __u6_addr32 = {32582, 29233584, 3, 2687631808}}}, sin6_scope_id = 32582}}, bind_address = 0x3000000018, proto = -48 '\320'}, buf = 0x3000000018 <error: Cannot access memory at address 0x3000000018>, len = 29233888, new_uri = {s = 0x7fff01be1220 "\200\022\276\001\377\377\377\377", len = 0}, dst_uri = {s = 0x0, len = -1523036784}, parsed_uri_ok = -1523314032, parsed_uri = { user = {s = 0xffffffff01be0cd0 <error: Cannot access memory at address 0xffffffff01be0cd0>, len = 0}, passwd = {s = 0x0, len = -1526226928}, host = {s = 0x6c8 <error: Cannot access memory at address 0x6c8>, len = -1524738624}, port = { s = 0x7f465a9a357a "Agent: Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 1482316848}, params = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, sip_params = { s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 1495842912}, headers = {s = 0x7fff01be1610 "K4\232ZF\177", len = -1607376670}, port_no = 25459, proto = 28271, type = 778529126, flags = (unknown: 2770413984), transport = {s = 0x0, len = -1523103368}, ttl = {s = 0xc800000000 <error: Cannot access memory at address 0xc800000000>, len = 2}, user_param = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, maddr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, method = { s = 0x7fff01be0e10 "", len = -293270045}, lr = {s = 0x286f5d4134421c88 <error: Cannot access memory at address 0x286f5d4134421c88>, len = 945953928}, r2 = {s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = -1526226928}, gr = { s = 0x7fff01be0dc0 "\200\225!\245F\177", len = -1589576708}, transport_val = {s = 0x7f46a5380f88 "\240\001", len = -1524553312}, ttl_val = {s = 0x7f46a5153018 "Q", len = 29232704}, user_param_val = {s = 0x7f46b5e8ef30 "", len = -1255543408}, maddr_val = { s = 0x7f46b52ac038 "", len = -1245263117}, method_val = {s = 0x754 <error: Cannot access memory at address 0x754>, len = 0}, lr_val = {s = 0x7f46a5219580 "", len = -290705697}, r2_val = {s = 0x7fff01be0e10 "", len = -1526226928}, gr_val = {s = 0x55baee80c461 "syscall", len = -1526226928}}, parsed_orig_ruri_ok = 29232720, parsed_orig_ruri = {user = {s = 0x7f46a140fbfc <pkg_proc_update_stats+115> "H\213\rEW ", len = 268435456}, passwd = {s = 0x0, len = 268435456}, host = {s = 0xfc59220 <error: Cannot access memory at address 0xfc59220>, len = 2377992}, port = {s = 0x3a6de0 <error: Cannot access memory at address 0x3a6de0>, len = 3830720}, params = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 8697}, sip_params = {s = 0x7f46a507a010 "\001", len = 29232768}, headers = { s = 0x55baee913e90 <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 0}, port_no = 13296, proto = 61123, type = URN_URI_T, flags = (unknown: 29232944), transport = {s = 0xeeab9c29 <error: Cannot access memory at address 0xeeab9c29>, len = 29232944}, ttl = { s = 0x55baeeaba08d <qm_malloc+2331> "H\213E\270H\203\300\070\351*\003", len = 29232944}, user_param = {s = 0x55baeebfa2d3 "INFO", len = -1535365032}, maddr = {s = 0x9110000000 <error: Cannot access memory at address 0x9110000000>, len = -1535356792}, method = { s = 0x7f46a47c3f6c "core: db_val.c", len = 8}, lr = {s = 0x7f46a507a010 "\001", len = -1523317048}, r2 = {s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = -258744391}, gr = {s = 0x7f46a53749b0 "\b", len = 29232976}, transport_val = { s = 0x7f46a507a010 "\001", len = 4}, ttl_val = {s = 0x7fff01be15b0 "", len = -289430829}, user_param_val = {s = 0x7f46a47c3058 "core", len = 268435456}, maddr_val = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 29233168}, method_val = { s = 0x7f46a47b94ce <db_str2val+14063> "H\213\205P\377\377\377H\213P\020\213\205X\377\377\377H\230H\001\320", <incomplete sequence \306>, len = 8698}, lr_val = {s = 0x7f46a507a010 "\001", len = 29233024}, r2_val = {s = 0x55baf093dfba "", len = -1523317032}, gr_val = { s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 29233200}}, add_rm = 0x55baeeac2edf <qm_info+46>, body_lumps = 0x7fff01be0fc0, reply_lump = 0x55baeeac2edf <qm_info+46>, add_to_branch_s = "\320\017\276\001\377\177\000\000\020\240\a\245F\177\000\000\000\020\276\001\377\177\000\000\020\240\a\245F\177\000\000\020\020\276\001\377\177\000\000\374\373@\241F\177\000\000\000\000\000\020\000\000\000\000\000", add_to_branch_len = 0, hash_index = 268435456, msg_flags = 0, flags = 4004261599, xflags = {21946, 29233184}, set_global_address = {s = 0x7f46a507a010 "\001", len = 3830720}, set_global_port = {s = 0x7f46a507a010 "\001", len = 29233248}, force_send_socket = 0x7f46a140fbfc <pkg_proc_update_stats+115>, path_vec = {s = 0x7fff01be1040 "\300s:", len = 0}, instance = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 264604840}, reg_id = 2379392, ruid = { s = 0x3a7358 <error: Cannot access memory at address 0x3a7358>, len = 3830720}, location_ua = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 8701}, ldv = {flow = {decoded = 3830720, rcv = {src_ip = {af = 29233296, len = 32767, u = {addrl = {94261354774160, 0}, addr32 = {4002496144, 21946, 0, 0}, addr16 = {16016, 61073, 21946, 0, 0, 0, 0, 0}, addr = "\220>\221\356\272U\000\000\000\000\000\000\000\000\000"}}, dst_ip = {af = 2768740656, len = 5, u = {addrl = {8858370048, 2771939544}, addr32 = {268435456, 2, 2771939544, 0}, addr16 = {0, 4096, 2, 0, 28888, 42296, 0, 0}, addr = "\000\000\000\020\002\000\000\000\330p8\245\000\000\000"}}, src_port = 4448, dst_port = 446, proto_reserved1 = 32767, proto_reserved2 = -290733184, src_su = {s = {sa_family = 21946, sa_data = "\000\000`\021\276\001\377\177\000\000)\234\253", <incomplete sequence \356>}, sin = {sin_family = 21946, sin_port = 0, sin_addr = {s_addr = 29233504}, sin_zero = "\377\177\000\000)\234\253", <incomplete sequence \356>}, sin6 = {sin6_family = 21946, sin6_port = 0, sin6_flowinfo = 29233504, sin6_addr = {__in6_u = {__u6_addr8 = "\377\177\000\000)\234\253\356\000\000\000\000\200\361\276", <incomplete sequence \356>, __u6_addr16 = {32767, 0, 39977, 61099, 0, 0, 61824, 61118}, __u6_addr32 = {32767, 4004224041, 0, 4005491072}}}, sin6_scope_id = 21946}}, bind_address = 0xa35eeaba08d, proto = -48 '\320'}}}} __func__ = "_reply_light" #21 0x00007f46a07c2c18 in _reply (trans=0x7f465b1b7728, p_msg=0x7f46a52129a0, code=202, reason=0x7fff01be13e0, lock=1) at t_reply.c:657 len = 490 buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co;tag=0b62483f5"... dset = 0x6 <error: Cannot access memory at address 0x6> bm = {to_tag_val = {s = 0x7f46a538270f "0b62483f5ecbb3b7846ec4ead5977a30-455a\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346;rport=51179;received=88.88.88.88\r\nExpires: 3600\r\nContact: <sip:77.7"..., len = 37}} dset_len = 1 #22 0x00007f46a07cce31 in t_reply_str (t=0x7f465b1b7728, p_msg=0x7f46a52129a0, code=202, reason=0x7fff01be13e0) at t_reply.c:1634 No locals. #23 0x00007f46a0832825 in ki_t_reply (msg=0x7f46a52129a0, code=202, reason=0x7fff01be13e0) at tm.c:1354 t = 0x7f465b1b7728 ret = -1 __func__ = "ki_t_reply" #24 0x00007f46a0833027 in w_t_reply_wrp (msg=0x7f46a52129a0, code=202, txt=0x7f46a53749e8 "OK") at tm.c:1411 reason = {s = 0x7f46a53749e8 "OK", len = 2} #25 0x00007f46a031a9f3 in send_reply (msg=0x7f46a52129a0, code=202, reason=0x7f469d416460 <su_200_rpl>) at sl.c:287 r = 0x7f46a53749e8 "OK" t = 0x7f465b1b7728 ret = 1 __func__ = "send_reply" #26 0x00007f469d1c7b30 in send_2XX_reply (msg=0x7f46a52129a0, reply_code=202, lexpire=3600, local_contact=0x7fff01be18e0) at subscribe.c:122 hdr_append = {s = 0x7f46a5341290 "Expires: 3600\r\nContact: sip:77.77.77.77:5071;transport=tls\r\n", len = 65} tmp = {s = 0x7f46a53412ce ">\r\n", len = 4} t = 0x7f46a53412c0 ";transport=tls>\r\n" __func__ = "send_2XX_reply" #27 0x00007f469d1cf2fb in update_subscription (msg=0x7f46a52129a0, subs=0x7fff01be1800, to_tag_gen=1, sent_reply=0x7fff01be163c) at subscribe.c:659 hash_code = 2864 __func__ = "update_subscription" #28 0x00007f469d1d6d41 in handle_subscribe (msg=0x7f46a52129a0, watcher_user=..., watcher_domain=...) at subscribe.c:1207 to_tag_gen = 1 subs = {pres_uri = {s = 0x7f46a51e0aa0 "sip:87@mydomain.co.co", len = 32}, to_user = { s = 0x7f465a9a3481 "87@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact: "813" <sip:813@192.168.128.58:1195;transport=tls;"..., len = 2}, to_domain = { s = 0x7f465a9a3484 "mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact: "813" <sip:813@192.168.128.58:1195;transport=tls;reg"..., len = 25}, from_user = { s = 0x7f465a9a344b "813@mydomain.co.co>;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nCont"..., len = 3}, from_domain = { s = 0x7f465a9a344f "mydomain.co.co>;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact:"..., len = 25}, watcher_user = { s = 0x7f465a9a344b "813@mydomain.co.co>;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nCont"..., len = 3}, watcher_domain = { s = 0x7f465a9a344f "mydomain.co.co>;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact:"..., len = 25}, event = 0x7f46587d2810, event_id = {s = 0x0, len = 0}, to_tag = {s = 0x7f46a0aa5580 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-455a", len = 37}, from_tag = { s = 0x7f465a9a346e "fce8c1c6\r\nTo: sip:87@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact: "813" <sip:813@192.168.128.58:"..., len = 8}, callid = { s = 0x7f465a9a33fd "18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;"..., len = 40}, sockinfo_str = { s = 0x7f46a52066f0 "tls:77.77.77.77:5071", len = 23}, remote_cseq = 1, local_cseq = 0, contact = {s = 0x7f46a53441f0 "sip:813@88.88.88.88:51179;transport=tls;registering_acc=mydomain_co_co", len = 83}, local_contact = { s = 0x7f46a51e55f8 "sip:77.77.77.77:5071;transport=tls", len = 37}, record_route = {s = 0x0, len = 0}, expires = 3600, status = 1, reason = {s = 0x0, len = 0}, version = 0, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1, internal_update_flag = 0, updated = -1, updated_winfo = -1, flags = 0, user_agent = {s = 0x7f465a9a3581 "Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 24}, next = 0x0} event = 0x7f46587d2810 parsed_event = 0x7f46a53802c8 ev_param = 0x0 found = 1 reason = {s = 0x0, len = 0} uri = {user = {s = 0x490 <error: Cannot access memory at address 0x490>, len = 46}, passwd = {s = 0x7fff01be16a0 "", len = 2}, host = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, port = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, params = { s = 0x7fff01be1700 "\360ݓ\360\272U", len = -290562593}, sip_params = {s = 0x7fff01be16e0 "8\367\067\245F\177", len = -1524553312}, headers = {s = 0x7fff01be17a0 "", len = -1523058960}, port_no = 11150, proto = 12410, type = 3590688514, flags = (unknown: 3884946688), transport = {s = 0x7f46a537f738 "K4\232ZF\177", len = 29235168}, ttl = {s = 0x0, len = -1525753168}, user_param = {s = 0x55baf093ddf0 "\270Kc\265F\177", len = 0}, maddr = {s = 0x7f46a50edab3 "", len = -1642817343}, method = {s = 0x0, len = 29235392}, lr = { s = 0xffffffffa51c6828 <error: Cannot access memory at address 0xffffffffa51c6828>, len = 0}, r2 = { s = 0x7f465a9a3400 "1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: sip:87@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;bra"..., len = 0}, gr = { s = 0x7f46a50edab0 "813", len = 0}, transport_val = {s = 0x0, len = -1525753168}, ttl_val = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x7f46a50edaaf "", len = 0}, method_val = { s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x4600000000 <error: Cannot access memory at address 0x4600000000>, len = -1524553312}, gr_val = { s = 0x7f465a9a33ca "sip:87@mydomain.co.co SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: <sip:87@my.domain"..., len = 32}} reply_code = 500 reply_str = {s = 0x7f469d209fcd "Server Internal Error", len = 21} sent_reply = 0 __func__ = "handle_subscribe" #29 0x00007f469d1d2e4e in handle_subscribe0 (msg=0x7f46a52129a0) at subscribe.c:988 pfrom = 0x7f46a537f6f0 __func__ = "handle_subscribe0" #30 0x000055baee84384a in do_action (h=0x7fff01be2170, a=0x7f46a51cd3e0, msg=0x7f46a52129a0) at core/action.c:1067 ret = -5 v = -289430829 dst = {send_sock = 0x7fff01be1ed0, to = {s = {sa_family = 64508, sa_data = "@\241F\177\000\000\270u\032\245F\177\000"}, sin = {sin_family = 64508, sin_port = 41280, sin_addr = {s_addr = 32582}, sin_zero = "\270u\032\245F\177\000"}, sin6 = {sin6_family = 64508, sin6_port = 41280, sin6_flowinfo = 32582, sin6_addr = {__in6_u = {__u6_addr8 = "\270u\032\245F\177\000\000\330c\032\245F\177\000", __u6_addr16 = {30136, 42266, 32582, 0, 25560, 42266, 32582, 0}, __u6_addr32 = {2769974712, 32582, 2769970136, 32582}}}, sin6_scope_id = 2770413984}}, id = 32582, proto = 96 '`', send_flags = {f = 446, blst_imask = 32767}} tmp = 0x7fff01be3a60 "\003" new_uri = 0x7f46a51bbf70 "\032" end = 0x7f46a52129a0 "{" crt = 0x7f46a51bbf70 "\032" cmd = 0x7f46a51357a8 len = 32582 user = -1524553312 uri = {user = {s = 0x7fff01be2280 "\230\310\034\245F\177", len = -1626615074}, passwd = {s = 0x7fff01be2388 "x%\276\001\377\177", len = 0}, host = {s = 0x69 <error: Cannot access memory at address 0x69>, len = -1255267143}, port = { s = 0x7f46a50e5910 "18d1c938d6d6d03dc502a4144f504713@0.0.0.0813@mydomain.co.co88.88.88.88::bantime", len = 91}, params = {s = 0x7f46a519ab28 "\001", len = -1524553312}, sip_params = {s = 0x7fff01be1de8 "\350\322\v\237F\177", len = 16}, headers = { s = 0x7fff01be1e10 "\347\322\v\237F\177", len = 29237712}, port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x55ba00000000 <error: Cannot access memory at address 0x55ba00000000>, len = -1}, ttl = {s = 0x0, len = 16}, user_param = { s = 0x7f46a5215b98 "18d1c938d6d6d03dc502a4144f504713@0.0.0.0|handling SUBSCRIBE from user [sip:813@mydomain.co.co]", len = 0}, maddr = {s = 0x7f4600000000 <error: Cannot access memory at address 0x7f4600000000>, len = 105}, method = { s = 0x7fff01be1e60 "\300\037\032\245F\177", len = 0}, lr = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 121}, r2 = {s = 0x7f469f0bd2de "%s: %s%.*s", len = 3}, gr = {s = 0x1800000000 <error: Cannot access memory at address 0x1800000000>, len = -1626615064}, transport_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, ttl_val = {s = 0x7f46a512d6c0 "\264\356z\237F\177", len = -1524992576}, user_param_val = {s = 0x7f469f0bd2e7 "s", len = 0}, maddr_val = {s = 0x7fff01be1ec0 "\360\036\276\001\377\177", len = 16}, method_val = {s = 0x7fff01be2460 "Ӣ\277\356\272U", len = 29238176}, lr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2_val = {s = 0x7fff01be1ef0 "\340$\276\001\377\177", len = -291901200}, gr_val = { s = 0x7f46a51a1fc0 "?", len = 29244000}} next_hop = {user = {s = 0x7fff01be1bb0 "\340\033\276\001\377\177", len = 29236496}, passwd = {s = 0x14aef82fb <error: Cannot access memory at address 0x14aef82fb>, len = 1494091032}, host = {s = 0x7fff01be1bc0 "\340\033\276\001\377\177", len = -1728474616}, port = { s = 0x7f465b1ba0c0 "\373\202\357J\244", len = 1494091032}, params = {s = 0x7fff01be1be0 "\220\034\276\001\377\177", len = 2}, sip_params = {s = 0x7fff01be1be0 "\220\034\276\001\377\177", len = -1728469356}, headers = { s = 0x2fb10000000 <error: Cannot access memory at address 0x2fb10000000>, len = 1481492824}, port_no = 7312, proto = 446, type = 32767, flags = (URI_USER_NORMALIZE | unknown: 2566518280), transport = {s = 0x7f46a5341e80 "\375\063\232ZF\177", len = 1}, ttl = { s = 0x7fff01be1d10 "i", len = -258744848}, user_param = {s = 0x7fff01be21a0 "", len = -1254103147}, maddr = {s = 0x7fff01be21b8 "\210\034b87\203\344|", len = 0}, method = {s = 0x7f46b53fe798 "]", len = -1255267143}, lr = { s = 0x4aef82fb000002fb <error: Cannot access memory at address 0x4aef82fb000002fb>, len = 1555492741}, r2 = {s = 0x7fff01be2168 "`:\276\001\377\177", len = 42728}, gr = {s = 0x7fff01be1d08 "", len = 10}, transport_val = {s = 0x7fff01be2163 "\245F\177", len = 1073741924}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = -1}, maddr_val = {s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = 0}, method_val = { s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = 1481492768}, lr_val = {s = 0x7fff00000005 <error: Cannot access memory at address 0x7fff00000005>, len = -1255080914}, r2_val = {s = 0x7fff01be1d80 "", len = 105}, gr_val = { s = 0xd68 <error: Cannot access memory at address 0xd68>, len = -258744848}} u = 0x7fff01be2040 port = 0 dst_host = 0x2 i = -293268297 flags = 32582 avp = 0x7fff01be2110 st = {flags = 164, id = 0, name = {n = 1481256960, s = {s = 0x7f46584a3000 "", len = 1}, re = 0x7f46584a3000}, avp = 0x7f465b1ba0c0} sct = 0x10000000 sjt = 0x40000000 rve = 0x10000000 mct = 0x55baeebfa2d3 rv = 0x7f4698fcb4dc rv1 = 0x6 c1 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 6, s = {s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = 29236064}, re = 0x100000006}, pval = {rs = {s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = 29236064}, ri = -290696736, flags = 21946}}, i2s = "0\262\374\230F\177\000\000\031g1\265\272\000\000\000\370\342\374\230F\177"} s = {s = 0x55baeebfa2d3 "INFO", len = 1481492168} srevp = {0x7fff01be1b10, 0x55baeeab71ff <futex_release+29>} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #31 0x000055baee850de3 in run_actions (h=0x7fff01be2170, a=0x7f46a51cd3e0, msg=0x7f46a52129a0) at core/action.c:1569 t = 0x7f46a51cd3e0 ret = -1 tvb = {tv_sec = 94261361422004, tv_usec = 1481492824} tve = {tv_sec = 54086552396016, tv_usec = 6861465236} tz = {tz_minuteswest = -290647711, tz_dsttime = 21946} tdiff = 2771908408 __func__ = "run_actions" #32 0x000055baee8514b7 in run_actions_safe (h=0x7fff01be3a60, a=0x7f46a51cd3e0, msg=0x7f46a52129a0) at core/action.c:1633 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {2, 2913650019544472712, 94261357814483, 1073741824, 268435456, 6, 2913650019508821128, 8999462228585487496}, __mask_was_saved = 0, __saved_mask = {__val = {1073741824, 268435456, 6, 140733222625856, 94261356683560, 268435456, 139941394852256, 140733222626112, 139941396346608, 1, 2, 139941396346680, 140733222626320, 139941394534488, 139941394852256, 140733222626016}}}}} ret = -1 ign_on_break = 0 #33 0x000055baeea8c044 in rval_get_int (h=0x7fff01be3a60, msg=0x7f46a52129a0, i=0x7fff01be2578, rv=0x7f46a51cc898, cache=0x0) at core/rvalue.c:915 r_avp = 0x7fff01be2410 avp_val = {n = 268435456, s = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, re = 0x10000000} pval = {rs = {s = 0x55baf093e040 "<134>Apr 17 10:19:01 /usr/local/kamailio/sbin/kamailio[42728]: INFO: <script>: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0|handling SUBSCRIBE from user [sip:813@mydomain.co.co]", len = 2}, ri = -289430829, flags = 21946} tmp = {s = 0x9e56465f0000465f <error: Cannot access memory at address 0x9e56465f0000465f>, len = -1523058888} s = 0x0 r = 21 ret = 0 destroy_pval = 0 __func__ = "rval_get_int" #34 0x000055baeea909b5 in rval_expr_eval_int (h=0x7fff01be3a60, msg=0x7f46a52129a0, res=0x7fff01be2578, rve=0x7f46a51cc890) at core/rvalue.c:1913 i1 = 29239792 i2 = 4 ret = -1 c1 = {cache_type = 2770413984, val_type = 32582, c = {avp_val = {n = 29244000, s = {s = 0x7fff01be3a60 "\003", len = -289430829}, re = 0x7fff01be3a60}, pval = {rs = {s = 0x7fff01be3a60 "\003", len = -289430829}, ri = 1073741824, flags = 0}}, i2s = '\000' <repeats 21 times>} c2 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 29238288, s = {s = 0x7fff01be2410 "", len = 29238352}, re = 0x7fff01be2410}, pval = {rs = {s = 0x7fff01be2410 "", len = 29238352}, ri = -290912104, flags = 21946}}, i2s = "\240)!\245F\177\000\000\000\000\000\000\000\000\000\000\070P\034\245F\177"} rv1 = 0x55baee9febed <pv_value_destroy+175> rv2 = 0x55baeebfa2d3 __func__ = "rval_expr_eval_int" #35 0x000055baeea90e25 in rval_expr_eval_int (h=0x7fff01be3a60, msg=0x7f46a52129a0, res=0x7fff01be29f0, rve=0x7f46a51cd788) at core/rvalue.c:1921 i1 = 0 i2 = 0 ret = -1 c1 = {cache_type = 2769969568, val_type = 32582, c = {avp_val = {n = 29244000, s = {s = 0x7fff01be3a60 "\003", len = 8715}, re = 0x7fff01be3a60}, pval = {rs = {s = 0x7fff01be3a60 "\003", len = 8715}, ri = -1526226928, flags = 32582}}, i2s = "\320[\033\245F\177\000\000\002", '\000' <repeats 12 times>} c2 = {cache_type = 29238672, val_type = 32767, c = {avp_val = {n = -1626642069, s = {s = 0x7f469f0b696b <xlog_2_helper+990> "H\215e\330[A\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271", len = -289430829}, re = 0x7f469f0b696b <xlog_2_helper+990>}, pval = {rs = {s = 0x7f469f0b696b <xlog_2_helper+990> "H\215e\330[A\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271", len = -289430829}, ri = 0, flags = 0}}, i2s = "\377\377\377\377\000\000\000\000\070\204\067\245F\177\000\000\320[\033\245F\177"} rv1 = 0x6 rv2 = 0x10000000 __func__ = "rval_expr_eval_int" #36 0x000055baee8432e7 in do_action (h=0x7fff01be3a60, a=0x7f46a51cebb0, msg=0x7f46a52129a0) at core/action.c:1043 ret = -5 v = 0 dst = {send_sock = 0x286f5d417d421c88, to = {s = {sa_family = 7304, sa_data = "b87\203\344|\000\000\000\000\000\000\000"}, sin = {sin_family = 7304, sin_port = 14434, sin_addr = {s_addr = 2095350583}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 7304, sin6_port = 14434, sin6_flowinfo = 2095350583, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 4005755768}}, id = 21946, proto = 2 '\002', send_flags = {f = 0, blst_imask = 0}} tmp = 0x1 <error: Cannot access memory at address 0x1> new_uri = 0x55baeebfa2d3 "INFO" end = 0x2 <error: Cannot access memory at address 0x2> crt = 0x7f4600000000 <error: Cannot access memory at address 0x7f4600000000> cmd = 0x7f46a512f938 len = 32582 user = 0 uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7fff01be2950 "`*\276\001\377\177", len = -293270045}, params = { s = 0x286f5d4162c21c88 <error: Cannot access memory at address 0x286f5d4162c21c88>, len = 945953928}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x7fff01be28e0 "P)\276\001\377\177", len = 2}, port_no = 41683, proto = 61119, type = 21946, flags = (unknown: 2770413984), transport = {s = 0x7f46a51ba900 "\026", len = 29239680}, ttl = {s = 0x7fff01be2a10 "P+\276\001\377\177", len = -290911819}, user_param = {s = 0x7fff01be2950 "`*\276\001\377\177", len = -291517360}, maddr = { s = 0x1900000004 <error: Cannot access memory at address 0x1900000004>, len = 0}, method = {s = 0x7f46a5217b80 "", len = -1524553312}, lr = {s = 0x1a51f40c0 <error: Cannot access memory at address 0x1a51f40c0>, len = 0}, r2 = {s = 0x7f46a52129a0 "{", len = 2}, gr = { s = 0x55baeebfa2d3 "INFO", len = 1073741824}, transport_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7fff01be2a60 "P+\276\001\377\177", len = -293268297}, user_param_val = {s = 0x7f46a52129a0 "{", len = -1524553312}, maddr_val = {s = 0x7f46a51ba900 "\026", len = 29244000}, method_val = {s = 0x0, len = 1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 2128747656}, r2_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, gr_val = { s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}} next_hop = {user = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, passwd = {s = 0x7fff01be27e0 "\320(\276\001\377\177", len = -293268297}, host = {s = 0x7fff01bdf678 "", len = -1524553312}, port = {s = 0x7f46a51f3e88 "\004", len = 29244000}, params = {s = 0x0, len = -1}, sip_params = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1642208392}, headers = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, port_no = 0, proto = 4096, type = ERROR_URI_T, flags = (URI_SIP_USER_PHONE | unknown: 4), transport = {s = 0x286f5d4160421c88 <error: Cannot access memory at address 0x286f5d4160421c88>, len = 945953928}, ttl = {s = 0x7f46a512e4b0 "\030\213U\237F\177", len = 25}, user_param = {s = 0x18 <error: Cannot access memory at address 0x18>, len = 0}, maddr = { s = 0x7fff01be28c0 "", len = -1524553312}, method = {s = 0x7f46a5194360 ".", len = 29239360}, lr = {s = 0x18 <error: Cannot access memory at address 0x18>, len = -258927888}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7fff01be28c0 "", len = -1254730963}, transport_val = { s = 0x2701be28c0 <error: Cannot access memory at address 0x2701be28c0>, len = -1609780480}, ttl_val = {s = 0xffffffffa5212ba8 <error: Cannot access memory at address 0xffffffffa5212ba8>, len = -1}, user_param_val = {s = 0x7fff01be28d0 "\020*\276\001\377\177", len = -290930620}, maddr_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 0}, lr_val = {s = 0x7f46a51f40c8 "\004", len = 29240072}, r2_val = {s = 0x7f46a52129a0 "{", len = 29244000}, gr_val = {s = 0x7f46a5194360 ".", len = 29244000}} u = 0x7f4600000000 port = 0 dst_host = 0x2 i = -290911819 flags = 0 avp = 0x7fff01be2c90 st = {flags = 268435456, id = 65535, name = {n = 0, s = {s = 0x0, len = 29238992}, re = 0x0}, avp = 0x2} sct = 0x7f46a5164e58 sjt = 0x6 rve = 0x7f46a51cd788 mct = 0x10000000 rv = 0x40000000 rv1 = 0x6 c1 = {cache_type = 29239904, val_type = 32767, c = {avp_val = {n = 29240320, s = {s = 0x7fff01be2c00 "\300\273\033\245F\177", len = -1524738568}, re = 0x7fff01be2c00}, pval = {rs = {s = 0x7fff01be2c00 "\300\273\033\245F\177", len = -1524738568}, ri = 29239888, flags = 944}}, i2s = "\240)!\245F\177\000\000\002\000\000\000\000\000\000\000Ӣ\277\356\272U"} s = {s = 0x7f46a51f3e88 "\004", len = 29239040} srevp = {0x7fff01be26a0, 0x7f46a52129a0} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #37 0x000055baee850de3 in run_actions (h=0x7fff01be3a60, a=0x7f46a51bbbc0, msg=0x7f46a52129a0) at core/action.c:1569 t = 0x7f46a51cebb0 ret = 1 tvb = {tv_sec = 94257352278016, tv_usec = -1} tve = {tv_sec = 0, tv_usec = 139938624438272} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 0 __func__ = "run_actions" #38 0x000055baee8437b6 in do_action (h=0x7fff01be3a60, a=0x7f46a51d27f0, msg=0x7f46a52129a0) at core/action.c:1058 ret = 1 v = 1 dst = {send_sock = 0x286f5d4172e21c88, to = {s = {sa_family = 7304, sa_data = "b87\203\344|\000\000\000\000F\177\000"}, sin = {sin_family = 7304, sin_port = 14434, sin_addr = {s_addr = 2095350583}, sin_zero = "\000\000\000\000F\177\000"}, sin6 = {sin6_family = 7304, sin6_port = 14434, sin6_flowinfo = 2095350583, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000F\177\000\000\205\220\233\237F\177\000", __u6_addr16 = {0, 0, 32582, 0, 36997, 40859, 32582, 0}, __u6_addr32 = {0, 32582, 2677772421, 32582}}}, sin6_scope_id = 2677772447}}, id = 32582, proto = 0 '\000', send_flags = {f = 0, blst_imask = 0}} tmp = 0x4 <error: Cannot access memory at address 0x4> new_uri = 0x7fff01be31c0 "\340\066\276\001\377\177" end = 0x55baf07d9244 "" crt = 0x7f46a11f8512 "%x%c%x%c" cmd = 0x7f46a5149000 len = 0 user = 14 uri = {user = {s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 2}, passwd = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = { s = 0x7fff01be3020 "01\276\001\377\177", len = -293270045}, params = {s = 0x3865366136626335 <error: Cannot access memory at address 0x3865366136626335>, len = 1073741824}, sip_params = {s = 0x7fff01be2fa0 "\001\200\255\373F\177", len = 29241248}, headers = { s = 0x1a <error: Cannot access memory at address 0x1a>, len = -1591769838}, port_no = 12552, proto = 446, type = 32767, flags = (unknown: 2770413984), transport = {s = 0x7f46a5148ea8 "\021", len = 29241424}, ttl = { s = 0x7f46fbad8001 <error: Cannot access memory at address 0x7f46fbad8001>, len = -1614761307}, user_param = {s = 0x7f469fc0b2a5 <_ul_sruid+5> "5cb6ef3a-a6e8-", len = -1614761307}, maddr = {s = 0x7f469fc0b2a5 <_ul_sruid+5> "5cb6ef3a-a6e8-", len = -1614761293}, method = { s = 0x7f469fc0b2bf <_ul_sruid+31> "", len = -1614761307}, lr = {s = 0xffffffff9fc0b2bf <error: Cannot access memory at address 0xffffffff9fc0b2bf>, len = 0}, r2 = {s = 0x0, len = 2}, gr = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, transport_val = { s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7fff01be3130 " 2\276\001\377\177", len = -293268297}, user_param_val = {s = 0x7fff01be3070 "Ӣ\277\356\272U", len = -1524553312}, maddr_val = {s = 0x7f46a5148ea8 "\021", len = 29244000}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1275206792}, r2_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, gr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}} next_hop = {user = {s = 0x7fff01be36a0 "\222\067\276\001\377\177", len = -258883088}, passwd = {s = 0x55baf091c350 "", len = -258883088}, host = {s = 0x55baf091c350 "", len = -1531003260}, port = {s = 0x313810 <error: Cannot access memory at address 0x313810>, len = 8}, params = {s = 0x2227 <error: Cannot access memory at address 0x2227>, len = 1073741824}, sip_params = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 1494014424}, headers = {s = 0x7f46a5205028 "77.77.77.77", len = 29241200}, port_no = 14, proto = 0, type = ERROR_URI_T, flags = (unknown: 1073741824), transport = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = -1255234878}, ttl = {s = 0x7f46a512e4b0 "\030\213U\237F\177", len = 48}, user_param = {s = 0x7fff01be2f08 "Kt\201\240F\177", len = 29240896}, maddr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, method = {s = 0x7fff01be2ed0 "P/\276\001\377\177", len = 45}, lr = {s = 0xa6e8 <error: Cannot access memory at address 0xa6e8>, len = 14}, r2 = { s = 0x7f46fbad8001 <error: Cannot access memory at address 0x7f46fbad8001>, len = -1599450320}, gr = {s = 0x14a0aa5330 <error: Cannot access memory at address 0x14a0aa5330>, len = -1525549816}, transport_val = {s = 0x7f46a0aa5330 <callid_buf+16> "-42728@77.77.77.77", len = -1599450299}, ttl_val = {s = 0x7f46a0aa5372 <callid_buf+82> "", len = 1494014424}, user_param_val = {s = 0x4eebfa2d3 <error: Cannot access memory at address 0x4eebfa2d3>, len = -289515552}, maddr_val = { s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, method_val = {s = 0x7fff01be2f50 "5cb6a6e8", len = -292267196}, lr_val = {s = 0x210000000 <error: Cannot access memory at address 0x210000000>, len = -1601727776}, r2_val = { s = 0x7fff01be0000 "uRPw", len = -1602129642}, gr_val = {s = 0x7fff01be2f70 "\032", len = -1602128821}} u = 0xd68 port = 0 dst_host = 0x2 i = -290911819 flags = 0 avp = 0x7fff01be3360 st = {flags = 4294967295, id = 65535, name = {n = 0, s = {s = 0x0, len = 29240816}, re = 0x0}, avp = 0x7f46b52d00a6 <__GI_getenv+22>} sct = 0x14f0911420 sjt = 0x0 rve = 0x7f46a51bb3a8 mct = 0x5 rv = 0x55baeeac2edf <qm_info+46> rv1 = 0x6 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = "\000\000\276\001\377\177\000\000\000\000\000\000\000\000\000\000h\r\000\000\004"} s = {s = 0x0, len = 0} srevp = {0x7f46a0aa5372 <callid_buf+82>, 0x0} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #39 0x000055baee850de3 in run_actions (h=0x7fff01be3a60, a=0x7f46a51d27f0, msg=0x7f46a52129a0) at core/action.c:1569 t = 0x7f46a51d27f0 ret = -1 tvb = {tv_sec = 85899345920, tv_usec = 139940118452696} tve = {tv_sec = 94261357814483, tv_usec = 60129542148} tz = {tz_minuteswest = -1617194880, tz_dsttime = 32582} tdiff = 1073741824 __func__ = "run_actions" #40 0x000055baee83ffc5 in do_action (h=0x7fff01be3a60, a=0x7f46a514aa98, msg=0x7f46a52129a0) at core/action.c:691 ret = -5 v = 0 dst = {send_sock = 0x167a16b95e269ceb, to = {s = {sa_family = 1176, sa_data = "8\245F\177\000\000\356\065\232ZF\177\000"}, sin = {sin_family = 1176, sin_port = 42296, sin_addr = {s_addr = 32582}, sin_zero = "\356\065\232ZF\177\000"}, sin6 = {sin6_family = 1176, sin6_port = 42296, sin6_flowinfo = 32582, sin6_addr = {__in6_u = {__u6_addr8 = "\356\065\232ZF\177\000\000\245\064\232ZF\177\000", __u6_addr16 = {13806, 23194, 32582, 0, 13477, 23194, 32582, 0}, __u6_addr32 = {1520055790, 32582, 1520055461, 32582}}}, sin6_scope_id = 2588589196}}, id = -789618140, proto = 16 '\020', send_flags = {f = 42247, blst_imask = 0}} tmp = 0x7f46a534b848 "\001" new_uri = 0xe8 <error: Cannot access memory at address 0xe8> end = 0x55baeec4b538 "core: core/parser/msg_parser.c" crt = 0x7fff01be3940 "" cmd = 0x7f465a9a35ee len = 32582 user = -1526226928 uri = {user = {s = 0x7fff01be3620 "", len = -1526226928}, passwd = {s = 0x7f46a537e038 "\001", len = -1526226928}, host = {s = 0x7fff01be3660 "\220\066\276\001\377\177", len = -1589576708}, port = {s = 0x7fff01be3640 "\300s:", len = 0}, params = { s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 264609488}, sip_params = {s = 0x400243c58 <error: Cannot access memory at address 0x400243c58>, len = -289139488}, headers = {s = 0x3a73c0 <error: Cannot access memory at address 0x3a73c0>, len = 8}, port_no = 14144, proto = 446, type = 32767, flags = (URI_SIP_USER_PHONE | unknown: 4004429680), transport = {s = 0x7fff01be3690 "\230\004\070\245F\177", len = -292471152}, ttl = {s = 0x0, len = -289197072}, user_param = {s = 0x7fff01be3740 "\320\070\276\001\377\177", len = -290743255}, maddr = {s = 0x7f46a5380498 "\001", len = -1523277664}, method = {s = 0x7fff01be3792 "", len = 29243283}, lr = {s = 0x7f465a9a35ee "", len = 1520055493}, r2 = {s = 0x55baeec44e50 <__func__.6674> "parse_via", len = -289132456}, gr = { s = 0x40 <error: Cannot access memory at address 0x40>, len = -1526226928}, transport_val = {s = 0x4040404040404040 <error: Cannot access memory at address 0x4040404040404040>, len = 1}, ttl_val = { s = 0x5a5a5a5a5a5a5a5a <error: Cannot access memory at address 0x5a5a5a5a5a5a5a5a>, len = -1523277720}, user_param_val = {s = 0x520202020202020 <error: Cannot access memory at address 0x520202020202020>, len = 29243276}, maddr_val = { s = 0x400ffffff <error: Cannot access memory at address 0x400ffffff>, len = 1520055488}, method_val = {s = 0x4eebfa2d3 <error: Cannot access memory at address 0x4eebfa2d3>, len = 1520055492}, lr_val = { s = 0x7f465a9a34c4 ";branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact: "813" sip:813@192.168.128.58:1195;transport=tls;registering_acc=mydomain_co_co\r\nUser-Agent: Jitsi2.10.5"..., len = 4}, r2_val = { s = 0x7fff01be38d0 "\360\071\276\001\377\177", len = -290487379}, gr_val = {s = 0x53111f5de2582f40 <error: Cannot access memory at address 0x53111f5de2582f40>, len = -1292927372}} next_hop = {user = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -1243022704}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, host = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1243053712}, port = { s = 0x7f2d00000000 <error: Cannot access memory at address 0x7f2d00000000>, len = -1617194880}, params = {s = 0x0, len = -1243052856}, sip_params = {s = 0x7fff01be34f0 "`J*\265F\177", len = 1073741824}, headers = {s = 0x7f46b5e88170 "", len = 29242592}, port_no = 49645, proto = 61056, type = 21946, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 2822930836), transport = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1494014424}, ttl = {s = 0x7f46b52a4a60 "\306J", len = -1243025616}, user_param = { s = 0x40000000 <error: Cannot access memory at address 0x40000000>, len = 29242784}, maddr = {s = 0x7fff01be3520 "", len = 29}, method = {s = 0x40000000 <error: Cannot access memory at address 0x40000000>, len = 268435456}, lr = { s = 0x6 <error: Cannot access memory at address 0x6>, len = -1631247160}, r2 = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 0}, gr = {s = 0x7fff01be35d0 "\001", len = -286653832}, transport_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, ttl_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, user_param_val = {s = 0x7fff01be3a30 "P;\276\001\377\177", len = -1245242476}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, method_val = { s = 0x6e0000005b <error: Cannot access memory at address 0x6e0000005b>, len = -1255519648}, lr_val = {s = 0x7fff01be3940 "", len = -1245212198}, r2_val = {s = 0x7fff01be3a70 "\002", len = -1525387056}, gr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -290705697}} u = 0x2215 port = 0 dst_host = 0x6 i = 15 flags = 32582 avp = 0x3a73c0 st = {flags = 29242752, id = 32767, name = {n = -1243022704, s = {s = 0x7f46b5e8fa90 "<0\201\356\272U", len = 1}, re = 0x7f46b5e8fa90}, avp = 0x0} sct = 0x3a73c0 sjt = 0x3a60d8 rve = 0x7f46a5148ff8 mct = 0x243c00 rv = 0x7f46b5e884c8 rv1 = 0x3a5fe8 c1 = {cache_type = 3051944488, val_type = 32582, c = {avp_val = {n = 7, s = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 268435456}, re = 0x7}, pval = {rs = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 268435456}, ri = -1525490576, flags = 32582}}, i2s = "\200\064\276\001", '\000' <repeats 12 times>, "`X"\244\200"} s = {s = 0x7fff01be3414 "", len = 29242592} srevp = {0x7fff01be34f0, 0x7f46b529ed90} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #41 0x000055baee850de3 in run_actions (h=0x7fff01be3a60, a=0x7f46a51470d0, msg=0x7f46a52129a0) at core/action.c:1569 t = 0x7f46a514aa98 ret = 1 tvb = {tv_sec = 21185405651, tv_usec = 94261358145712} tve = {tv_sec = 140733222632080, tv_usec = 2} tz = {tz_minuteswest = 1520055549, tz_dsttime = 32582} tdiff = 6 __func__ = "run_actions" #42 0x000055baee85157f in run_top_route (a=0x7f46a51470d0, msg=0x7f46a52129a0, c=0x0) at core/action.c:1654 ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {2, 2913650019164888200, 94261357814483, 1073741824, 268435456, 6, 2913650019271842952, 8999462228585487496}, __mask_was_saved = 0, __saved_mask = {__val = {6192449487634431, 140733222632176, 139941329810791, 94261357814483, 0, 4611686022990790656, 139941394852256, 140733222632272, 94261354856549, 7065381312, 139941394852256, 1073741825, 0, 94261357814483, 2, 94261357814483}}}}} p = 0x7fff01be3a60 ret = 268435456 sfbk = 0 #43 0x000055baee9ac2ce in receive_msg (buf=0x7f465a9a33c0 "SUBSCRIBE sip:87@mydomain.co.co SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: <sip:87@demo"..., len=558, rcv_info=0x7f465a9a30e0) at core/receive.c:427 msg = 0x7f46a52129a0 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 2, jmp_env = {{__jmpbuf = {94261357814483, 1073741824, 268435456, 6, 140733222632784, 94261355984408, 9, 139941663871424}, __mask_was_saved = 29245488, __saved_mask = {__val = {139940144492744, 139940144493504, 8589935150, 223338364929, 139940144493504, 9, 139940144493514, 32, 139940144493547, 7, 64, 0, 139940150786904, 2632814952448, 65536, 139940130643520}}}}} bctx = 0x22e ret = 32582 stats_on = 0 tvb = {tv_sec = 214748364800, tv_usec = 139940144493554} tve = {tv_sec = 0, tv_usec = 139940144494062} tz = {tz_minuteswest = 1520055242, tz_dsttime = 32582} diff = 0 inb = {s = 0x7f465a9a33c0 "SUBSCRIBE sip:87@mydomain.co.co SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: <sip:87@demo"..., len = 558} netinfo = {data = {s = 0x2020202020202020 <error: Cannot access memory at address 0x2020202020202020>, len = 538976288}, rcv = 0xffffffffffffffff, dst = 0x7f465a9a33f4} keng = 0x0 evp = {data = 0x7fff01be3be0, rcv = 0x7f465a9a30e0, dst = 0x0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 exectime = 0 __func__ = "receive_msg" #44 0x000055baeea464bc in receive_tcp_msg (tcpbuf=0x7f465a9a33c0 "SUBSCRIBE sip:87@mydomain.co.co SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=fce8c1c6\r\nTo: <sip:87@demo"..., len=558, rcv_info=0x7f465a9a30e0, con=0x7f465a9a30c8) at core/tcp_read.c:1399 buf = 0x0 bsize = 0 blen = 558 __func__ = "receive_tcp_msg" #45 0x000055baeea48ac4 in tcp_read_req (con=0x7f465a9a30c8, bytes_read=0x7fff01be3fd0, read_flags=0x7fff01be3fc8) at core/tcp_read.c:1631 bytes = 558 total_bytes = 558 resp = 1 size = 0 req = 0x7f465a9a3148 dst = {send_sock = 0x7fff01be3fc0, to = {s = {sa_family = 12728, sa_data = "\232ZF\177\000\000\000\000\000\000\001 \000"}, sin = {sin_family = 12728, sin_port = 23194, sin_addr = {s_addr = 32582}, sin_zero = "\000\000\000\000\001 \000"}, sin6 = {sin6_family = 12728, sin6_port = 23194, sin6_flowinfo = 32582, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\001 \000\000\340\330\070\245F\177\000", __u6_addr16 = {0, 0, 8193, 0, 55520, 42296, 32582, 0}, __u6_addr32 = {0, 8193, 2771966176, 32582}}}, sin6_scope_id = 29245072}}, id = 32767, proto = 1 '\001', send_flags = {f = 0, blst_imask = 80}} c = 13 '\r' ret = 0 __func__ = "tcp_read_req" #46 0x000055baeea4c621 in handle_io (fm=0x7f46a538d8e0, events=1, idx=-1) at core/tcp_read.c:1862 ret = 0 n = 21946 read_flags = 1 con = 0x7f465a9a30c8 s = 0 resp = 1 t = 80 __func__ = "handle_io" #47 0x000055baeea39524 in io_wait_loop_epoll (h=0x55baeef1d440 <io_w>, t=2, repeat=0) at core/io_wait.h:1062 n = 1 r = 0 fm = 0x7f46a538d8e0 revents = 1 __func__ = "io_wait_loop_epoll" #48 0x000055baeea4d9ce in tcp_receive_loop (unix_sock=55) at core/tcp_read.c:1974 __func__ = "tcp_receive_loop" #49 0x000055baee8faf60 in tcp_init_children () at core/tcp_main.c:5086 r = 3 i = 7 reader_fd_1 = 55 pid = 0 si_desc = "tcp receiver (generic)\000\000\006\000\000\000\000\000\000\000\000B\276\001\377\177\000\000\307W\224\356\272U\000\000\060B\276\001\377\177\000\000m\022\225\356\001", '\000' <repeats 11 times>, "\004X\240\356\000\000\000\000\321\313\300\356\000\000\000\000м\023\245F\177\000\000\357\352\272\000\000\000\000\000\000\000\000\000\000!\000\000\000"\000\000\000\000\362\067\265F\177\000" si = 0x0 __func__ = "tcp_init_children" #50 0x000055baee82f1a9 in main_loop () at main.c:1750 i = 8 pid = 42669 si = 0x0 si_desc = "udp receiver child=7 sock=127.0.0.20:5088 (77.77.77.77:5070)\000\067\060)\000\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\217\362\067\265F\177\000\000\300B\276\001\377\177\000\000\060\000\000\000\060\000\000\000\240C\276\001\377\177\000\000h \037\245F\177\000" nrprocs = 8 woneinit = 1 __func__ = "main_loop" #51 0x000055baee836430 in main (argc=13, argv=0x7fff01be4648) at main.c:2737 cfg_stream = 0x55baf07a5010 c = -1 r = 0 tmp = 0x7fff01be4e05 "" tmp_len = 32767 port = 29246592 proto = 32582 options = 0x55baeebaf600 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 554244915 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0xffffffff p = 0xd <error: Cannot access memory at address 0xd> st = {st_dev = 18, st_ino = 2029638, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1555492665, tv_nsec = 845706812}, st_mtim = {tv_sec = 1555492665, tv_nsec = 845706812}, st_ctim = {tv_sec = 1555492665, tv_nsec = 845706812}, __glibc_reserved = {0, 0, 0}} option_index = 0 long_options = {{name = 0x55baeebb1aea "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55baeebabf29 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55baeebb1aef "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" ```
Here's another core dump, mostly we're seeing the last line on: aesni_ecb_encrypt () at crypto/aes/aesni-x86_64.s:624
``` #0 aesni_ecb_encrypt () at crypto/aes/aesni-x86_64.s:624 No locals. #1 0x00007f2f5b39e240 in aesni_ecb_cipher (ctx=0x7f2f0fa1d050, out=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, in=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, len=16) at crypto/evp/e_aes.c:319 bl = 16 #2 0x00007f2f5b3b3526 in evp_EncryptDecryptUpdate (ctx=0x7f2f0fa1d050, out=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, outl=0x7ffd614afd74, in=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, inl=16) at crypto/evp/evp_enc.c:333 i = 32559 j = 262262632 bl = 16 cmpl = 16 #3 0x00007f2f5b3b3771 in EVP_EncryptUpdate (ctx=0x7f2f0fa1d050, out=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, outl=0x7ffd614afd74, in=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, inl=16) at crypto/evp/evp_enc.c:385 No locals. #4 0x00007f2f5b3b315f in EVP_CipherUpdate (ctx=0x7f2f0fa1d050, out=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, outl=0x7ffd614afd74, in=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, inl=16) at crypto/evp/evp_enc.c:213 No locals. #5 0x00007f2f5b3f5c8c in ctr_update (drbg=0x7f2f0fa1ce80, in1=0x0, in1len=0, in2=0x0, in2len=0, nonce=0x0, noncelen=0) at crypto/rand/drbg_ctr.c:251 ctr = 0x7f2f0fa1cf28 outlen = 16 #6 0x00007f2f5b3f60d2 in drbg_ctr_generate (drbg=0x7f2f0fa1ce80, out=0x7f2f10b910b8 "", outlen=0, adin=0x0, adinlen=0) at crypto/rand/drbg_ctr.c:349 ctr = 0x7f2f0fa1cf28 #7 0x00007f2f5b3f7591 in RAND_DRBG_generate (drbg=0x7f2f0fa1ce80, out=0x7f2f10b91098 "\256\277\364\322\r\271.\247˗{\325i\030\376\251\212$MM\330R\354\244>kPM\224%T1", outlen=32, prediction_resistance=0, adin=0x0, adinlen=0) at crypto/rand/drbg_lib.c:638 reseed_required = 0 #8 0x00007f2f5b3f76bf in RAND_DRBG_bytes (drbg=0x7f2f0fa1ce80, out=0x7f2f10b91098 "\256\277\364\322\r\271.\247˗{\325i\030\376\251\212$MM\330R\354\244>kPM\224%T1", outlen=32) at crypto/rand/drbg_lib.c:679 additional = 0x0 additional_len = 0 chunk = 32 ret = 0 #9 0x00007f2f5b3f9168 in RAND_priv_bytes (buf=0x7f2f10b91098 "\256\277\364\322\r\271.\247˗{\325i\030\376\251\212$MM\330R\354\244>kPM\224%T1", num=32) at crypto/rand/rand_lib.c:827 meth = 0x7f2f5b740920 <rand_meth> drbg = 0x7f2f0fa1ce80 ret = 32559 #10 0x00007f2f5b7909d0 in SSL_CTX_new (meth=0x7f2f5b9f3a40 <TLS_method_data.22387>) at ssl/ssl_lib.c:2998 ret = 0x7f2f10b8f498 #11 0x00007f2f5be68cac in ?? () from /usr/lib/x86_64-linux-gnu/libpq.so.5 No symbol table info available. #12 0x00007f2f5be6a4f5 in ?? () from /usr/lib/x86_64-linux-gnu/libpq.so.5 No symbol table info available. #13 0x00007f2f5be52258 in PQconnectPoll () from /usr/lib/x86_64-linux-gnu/libpq.so.5 No symbol table info available. #14 0x00007f2f5be5304c in ?? () from /usr/lib/x86_64-linux-gnu/libpq.so.5 No symbol table info available. #15 0x00007f2f5be55d67 in PQconnectdbParams () from /usr/lib/x86_64-linux-gnu/libpq.so.5 No symbol table info available. #16 0x00007f2f5c0ac514 in db_postgres_new_connection (id=0x7f2f5c4c4a10) at km_pg_con.c:112 ptr = 0x7f2f5c4f8ff0 ports = 0x0 i = 4 keywords = {0x7f2f5c0d2dcc "host", 0x7f2f5c0d2dd1 "dbname", 0x7f2f5c0d2dd8 "user", 0x7f2f5c0d2ddd "password", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0} values = {0x7f2f5c4c8cf8 "localhost", 0x7f2f5c4c93d8 "kamailio", 0x7f2f5c4c8800 "kamailio", 0x7f2f5c4dbe28 "CXsX8MIsC8Dy1Ui7qdyP4nbcmCAl", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0} to = '\000' <repeats 15 times> res = 0x0 __func__ = "db_postgres_new_connection" #17 0x00007f2f5ba04590 in db_do_init2 (url=0x7f2f5467e530 <pres_db_url>, new_connection=0x7f2f5c0aad33 <db_postgres_new_connection>, pooling=DB_POOLING_PERMITTED) at db.c:317 id = 0x7f2f5c4c4a10 con = 0x0 res = 0x7f2f5c4dbd30 con_size = 32 __func__ = "db_do_init2" #18 0x00007f2f5ba03516 in db_do_init (url=0x7f2f5467e530 <pres_db_url>, new_connection=0x7f2f5c0aad33 <db_postgres_new_connection>) at db.c:270 No locals. #19 0x00007f2f5c09a099 in db_postgres_init (_url=0x7f2f5467e530 <pres_db_url>) at km_dbase.c:113 No locals. #20 0x00007f2f543b7d71 in child_init (rank=33) at presence.c:536 __func__ = "child_init" #21 0x000055e257f89b44 in init_mod_child (m=0x7f2f5c39d668, rank=33) at core/sr_module.c:859 __func__ = "init_mod_child" #22 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39dd98, rank=33) at core/sr_module.c:855 __func__ = "init_mod_child" #23 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39e118, rank=33) at core/sr_module.c:855 __func__ = "init_mod_child" #24 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39e498, rank=33) at core/sr_module.c:855 __func__ = "init_mod_child" #25 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39e8b8, rank=33) at core/sr_module.c:855 __func__ = "init_mod_child" #26 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39ec60, rank=33) at core/sr_module.c:855 __func__ = "init_mod_child" #27 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39f2a8, rank=33) at core/sr_module.c:855 __func__ = "init_mod_child" #28 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39f7e0, rank=33) at core/sr_module.c:855 __func__ = "init_mod_child" #29 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39ff70, rank=33) at core/sr_module.c:855 __func__ = "init_mod_child" #30 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c3a03f8, rank=33) at core/sr_module.c:855 __func__ = "init_mod_child" #31 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c3a1170, rank=33) at core/sr_module.c:855 __func__ = "init_mod_child" #32 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c3a3cd0, rank=33) at core/sr_module.c:855 __func__ = "init_mod_child" #33 0x000055e257f89f19 in init_child (rank=33) at core/sr_module.c:887 ret = 32559 #34 0x000055e257f966b4 in fork_tcp_process (child_id=33, desc=0x7ffd614b3670 "tcp receiver (generic)", r=0, reader_fd_1=0x7ffd614b36f0) at core/pt.c:4 pid = 0 child_process_no = 47 sockfd = {62, 63} reader_fd = {64, 65} ret = -1 i = 0 new_seed1 = 1031182733 new_seed2 = 766258607 __func__ = "fork_tcp_process" #35 0x000055e257f3ec38 in tcp_init_children () at core/tcp_main.c:5076 r = 0 i = 15 reader_fd_1 = 65 pid = 0 si_desc = "tcp receiver (generic)\000\000\006\000\000\000\000\000\000\000\020\067Ka\375\177\000\000Ǘ\370W\342U\000\000@7Ka\375\177\000\000mR\371W\001", '\000' <repeats 11 times>, "\004\230\004X\000\000\000\000\321\v%X\000\000\000\000\320<:\/\177\000\000\357*\037X\271A\000\000\000\000\000\000\000\000\000\000\061\000\000\000\062\000\000\000\000r^l/\177\000" si = 0x0 __func__ = "tcp_init_children" #36 0x000055e257e731a9 in main_loop () at main.c:1750 i = 16 pid = 16824 si = 0x0 si_desc = "udp receiver child=15 sock=127.0.0.20:5088 (77.77.77.77:5070)\000\067\060)\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\217r^l/\177\000\000\320\067Ka\375\177\000\000\060\000\000\000\060\000\000\000\260\070Ka\375\177\000\000h\240E\/\177\000" nrprocs = 16 woneinit = 1 __func__ = "main_loop" #37 0x000055e257e7a430 in main (argc=13, argv=0x7ffd614b3b58) at main.c:2737 cfg_stream = 0x55e258a1d010 c = -1 r = 0 tmp = 0x7ffd614b4e06 "" tmp_len = 32765 port = 1632319888 proto = 32559 options = 0x55e2581f3600 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 308684642 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0xffffffff p = 0xd <error: Cannot access memory at address 0xd> st = {st_dev = 18, st_ino = 179431, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1555436224, tv_nsec = 507938051}, st_mtim = {tv_sec = 1555436224, tv_nsec = 507938051}, st_ctim = {tv_sec = 1555436224, tv_nsec = 507938051}, __glibc_reserved = {0, 0, 0}} option_index = 0 long_options = {{name = 0x55e2581f5aea "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55e2581eff29 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55e2581f5aef "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" ```
``` (gdb) disas aesni_ecb_encrypt Dump of assembler code for function aesni_ecb_encrypt: 0x00007f2f5b2969e0 <+0>: and $0xfffffffffffffff0,%rdx 0x00007f2f5b2969e4 <+4>: je 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b2969ea <+10>: mov 0xf0(%rcx),%eax 0x00007f2f5b2969f0 <+16>: movups (%rcx),%xmm0 0x00007f2f5b2969f3 <+19>: mov %rcx,%r11 0x00007f2f5b2969f6 <+22>: mov %eax,%r10d 0x00007f2f5b2969f9 <+25>: test %r8d,%r8d 0x00007f2f5b2969fc <+28>: je 0x7f2f5b296c50 <aesni_ecb_encrypt+624> 0x00007f2f5b296a02 <+34>: cmp $0x80,%rdx 0x00007f2f5b296a09 <+41>: jb 0x7f2f5b296af7 <aesni_ecb_encrypt+279> 0x00007f2f5b296a0f <+47>: movdqu (%rdi),%xmm2 0x00007f2f5b296a13 <+51>: movdqu 0x10(%rdi),%xmm3 0x00007f2f5b296a18 <+56>: movdqu 0x20(%rdi),%xmm4 0x00007f2f5b296a1d <+61>: movdqu 0x30(%rdi),%xmm5 0x00007f2f5b296a22 <+66>: movdqu 0x40(%rdi),%xmm6 0x00007f2f5b296a27 <+71>: movdqu 0x50(%rdi),%xmm7 0x00007f2f5b296a2c <+76>: movdqu 0x60(%rdi),%xmm8 0x00007f2f5b296a32 <+82>: movdqu 0x70(%rdi),%xmm9 0x00007f2f5b296a38 <+88>: lea 0x80(%rdi),%rdi 0x00007f2f5b296a3f <+95>: sub $0x80,%rdx 0x00007f2f5b296a46 <+102>: jmp 0x7f2f5b296aae <aesni_ecb_encrypt+206> 0x00007f2f5b296a48 <+104>: nopl 0x0(%rax,%rax,1) 0x00007f2f5b296a50 <+112>: movups %xmm2,(%rsi) 0x00007f2f5b296a53 <+115>: mov %r11,%rcx 0x00007f2f5b296a56 <+118>: movdqu (%rdi),%xmm2 0x00007f2f5b296a5a <+122>: mov %r10d,%eax 0x00007f2f5b296a5d <+125>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296a61 <+129>: movdqu 0x10(%rdi),%xmm3 0x00007f2f5b296a66 <+134>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296a6a <+138>: movdqu 0x20(%rdi),%xmm4 0x00007f2f5b296a6f <+143>: movups %xmm5,0x30(%rsi) 0x00007f2f5b296a73 <+147>: movdqu 0x30(%rdi),%xmm5 0x00007f2f5b296a78 <+152>: movups %xmm6,0x40(%rsi) 0x00007f2f5b296a7c <+156>: movdqu 0x40(%rdi),%xmm6 0x00007f2f5b296a81 <+161>: movups %xmm7,0x50(%rsi) 0x00007f2f5b296a85 <+165>: movdqu 0x50(%rdi),%xmm7 0x00007f2f5b296a8a <+170>: movups %xmm8,0x60(%rsi) 0x00007f2f5b296a8f <+175>: movdqu 0x60(%rdi),%xmm8 0x00007f2f5b296a95 <+181>: movups %xmm9,0x70(%rsi) 0x00007f2f5b296a9a <+186>: lea 0x80(%rsi),%rsi 0x00007f2f5b296aa1 <+193>: movdqu 0x70(%rdi),%xmm9 0x00007f2f5b296aa7 <+199>: lea 0x80(%rdi),%rdi 0x00007f2f5b296aae <+206>: callq 0x7f2f5b2967c0 <_aesni_encrypt8> 0x00007f2f5b296ab3 <+211>: sub $0x80,%rdx 0x00007f2f5b296aba <+218>: jae 0x7f2f5b296a50 <aesni_ecb_encrypt+112> 0x00007f2f5b296abc <+220>: movups %xmm2,(%rsi) 0x00007f2f5b296abf <+223>: mov %r11,%rcx 0x00007f2f5b296ac2 <+226>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296ac6 <+230>: mov %r10d,%eax 0x00007f2f5b296ac9 <+233>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296acd <+237>: movups %xmm5,0x30(%rsi) 0x00007f2f5b296ad1 <+241>: movups %xmm6,0x40(%rsi) 0x00007f2f5b296ad5 <+245>: movups %xmm7,0x50(%rsi) 0x00007f2f5b296ad9 <+249>: movups %xmm8,0x60(%rsi) 0x00007f2f5b296ade <+254>: movups %xmm9,0x70(%rsi) 0x00007f2f5b296ae3 <+259>: lea 0x80(%rsi),%rsi 0x00007f2f5b296aea <+266>: add $0x80,%rdx 0x00007f2f5b296af1 <+273>: je 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296af7 <+279>: movups (%rdi),%xmm2 0x00007f2f5b296afa <+282>: cmp $0x20,%rdx 0x00007f2f5b296afe <+286>: jb 0x7f2f5b296b70 <aesni_ecb_encrypt+400> 0x00007f2f5b296b00 <+288>: movups 0x10(%rdi),%xmm3 0x00007f2f5b296b04 <+292>: je 0x7f2f5b296ba0 <aesni_ecb_encrypt+448> 0x00007f2f5b296b0a <+298>: movups 0x20(%rdi),%xmm4 0x00007f2f5b296b0e <+302>: cmp $0x40,%rdx 0x00007f2f5b296b12 <+306>: jb 0x7f2f5b296bc0 <aesni_ecb_encrypt+480> 0x00007f2f5b296b18 <+312>: movups 0x30(%rdi),%xmm5 0x00007f2f5b296b1c <+316>: je 0x7f2f5b296be0 <aesni_ecb_encrypt+512> 0x00007f2f5b296b22 <+322>: movups 0x40(%rdi),%xmm6 0x00007f2f5b296b26 <+326>: cmp $0x60,%rdx 0x00007f2f5b296b2a <+330>: jb 0x7f2f5b296c00 <aesni_ecb_encrypt+544> 0x00007f2f5b296b30 <+336>: movups 0x50(%rdi),%xmm7 0x00007f2f5b296b34 <+340>: je 0x7f2f5b296c20 <aesni_ecb_encrypt+576> 0x00007f2f5b296b3a <+346>: movdqu 0x60(%rdi),%xmm8 0x00007f2f5b296b40 <+352>: xorps %xmm9,%xmm9 0x00007f2f5b296b44 <+356>: callq 0x7f2f5b2967c0 <_aesni_encrypt8> 0x00007f2f5b296b49 <+361>: movups %xmm2,(%rsi) 0x00007f2f5b296b4c <+364>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296b50 <+368>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296b54 <+372>: movups %xmm5,0x30(%rsi) 0x00007f2f5b296b58 <+376>: movups %xmm6,0x40(%rsi) 0x00007f2f5b296b5c <+380>: movups %xmm7,0x50(%rsi) 0x00007f2f5b296b60 <+384>: movups %xmm8,0x60(%rsi) 0x00007f2f5b296b65 <+389>: jmpq 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296b6a <+394>: nopw 0x0(%rax,%rax,1) 0x00007f2f5b296b70 <+400>: movups (%rcx),%xmm0 0x00007f2f5b296b73 <+403>: movups 0x10(%rcx),%xmm1 0x00007f2f5b296b77 <+407>: lea 0x20(%rcx),%rcx 0x00007f2f5b296b7b <+411>: xorps %xmm0,%xmm2 0x00007f2f5b296b7e <+414>: aesenc %xmm1,%xmm2 0x00007f2f5b296b83 <+419>: dec %eax => 0x00007f2f5b296b85 <+421>: movups (%rcx),%xmm1 0x00007f2f5b296b88 <+424>: lea 0x10(%rcx),%rcx 0x00007f2f5b296b8c <+428>: jne 0x7f2f5b296b7e <aesni_ecb_encrypt+414> 0x00007f2f5b296b8e <+430>: aesenclast %xmm1,%xmm2 0x00007f2f5b296b93 <+435>: movups %xmm2,(%rsi) 0x00007f2f5b296b96 <+438>: jmpq 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296b9b <+443>: nopl 0x0(%rax,%rax,1) 0x00007f2f5b296ba0 <+448>: callq 0x7f2f5b296340 <_aesni_encrypt2> 0x00007f2f5b296ba5 <+453>: movups %xmm2,(%rsi) 0x00007f2f5b296ba8 <+456>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296bac <+460>: jmpq 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296bb1 <+465>: nopl 0x0(%rax,%rax,1) 0x00007f2f5b296bb6 <+470>: nopw %cs:0x0(%rax,%rax,1) 0x00007f2f5b296bc0 <+480>: callq 0x7f2f5b296400 <_aesni_encrypt3> 0x00007f2f5b296bc5 <+485>: movups %xmm2,(%rsi) 0x00007f2f5b296bc8 <+488>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296bcc <+492>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296bd0 <+496>: jmpq 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296bd5 <+501>: nop 0x00007f2f5b296bd6 <+502>: nopw %cs:0x0(%rax,%rax,1) 0x00007f2f5b296be0 <+512>: callq 0x7f2f5b2964e0 <_aesni_encrypt4> 0x00007f2f5b296be5 <+517>: movups %xmm2,(%rsi) 0x00007f2f5b296be8 <+520>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296bec <+524>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296bf0 <+528>: movups %xmm5,0x30(%rsi) 0x00007f2f5b296bf4 <+532>: jmpq 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296bf9 <+537>: nopl 0x0(%rax) 0x00007f2f5b296c00 <+544>: xorps %xmm7,%xmm7 0x00007f2f5b296c03 <+547>: callq 0x7f2f5b296600 <_aesni_encrypt6> 0x00007f2f5b296c08 <+552>: movups %xmm2,(%rsi) 0x00007f2f5b296c0b <+555>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296c0f <+559>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296c13 <+563>: movups %xmm5,0x30(%rsi) 0x00007f2f5b296c17 <+567>: movups %xmm6,0x40(%rsi) 0x00007f2f5b296c1b <+571>: jmpq 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296c20 <+576>: callq 0x7f2f5b296600 <_aesni_encrypt6> 0x00007f2f5b296c25 <+581>: movups %xmm2,(%rsi) 0x00007f2f5b296c28 <+584>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296c2c <+588>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296c30 <+592>: movups %xmm5,0x30(%rsi) 0x00007f2f5b296c34 <+596>: movups %xmm6,0x40(%rsi) 0x00007f2f5b296c38 <+600>: movups %xmm7,0x50(%rsi) 0x00007f2f5b296c3c <+604>: jmpq 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296c41 <+609>: nopl 0x0(%rax,%rax,1) 0x00007f2f5b296c46 <+614>: nopw %cs:0x0(%rax,%rax,1) 0x00007f2f5b296c50 <+624>: cmp $0x80,%rdx 0x00007f2f5b296c57 <+631>: jb 0x7f2f5b296d6d <aesni_ecb_encrypt+909> 0x00007f2f5b296c5d <+637>: movdqu (%rdi),%xmm2 0x00007f2f5b296c61 <+641>: movdqu 0x10(%rdi),%xmm3 0x00007f2f5b296c66 <+646>: movdqu 0x20(%rdi),%xmm4 0x00007f2f5b296c6b <+651>: movdqu 0x30(%rdi),%xmm5 0x00007f2f5b296c70 <+656>: movdqu 0x40(%rdi),%xmm6 0x00007f2f5b296c75 <+661>: movdqu 0x50(%rdi),%xmm7 0x00007f2f5b296c7a <+666>: movdqu 0x60(%rdi),%xmm8 0x00007f2f5b296c80 <+672>: movdqu 0x70(%rdi),%xmm9 0x00007f2f5b296c86 <+678>: lea 0x80(%rdi),%rdi 0x00007f2f5b296c8d <+685>: sub $0x80,%rdx 0x00007f2f5b296c94 <+692>: jmp 0x7f2f5b296cfe <aesni_ecb_encrypt+798> 0x00007f2f5b296c96 <+694>: nopw %cs:0x0(%rax,%rax,1) 0x00007f2f5b296ca0 <+704>: movups %xmm2,(%rsi) 0x00007f2f5b296ca3 <+707>: mov %r11,%rcx 0x00007f2f5b296ca6 <+710>: movdqu (%rdi),%xmm2 0x00007f2f5b296caa <+714>: mov %r10d,%eax 0x00007f2f5b296cad <+717>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296cb1 <+721>: movdqu 0x10(%rdi),%xmm3 0x00007f2f5b296cb6 <+726>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296cba <+730>: movdqu 0x20(%rdi),%xmm4 0x00007f2f5b296cbf <+735>: movups %xmm5,0x30(%rsi) 0x00007f2f5b296cc3 <+739>: movdqu 0x30(%rdi),%xmm5 0x00007f2f5b296cc8 <+744>: movups %xmm6,0x40(%rsi) 0x00007f2f5b296ccc <+748>: movdqu 0x40(%rdi),%xmm6 0x00007f2f5b296cd1 <+753>: movups %xmm7,0x50(%rsi) 0x00007f2f5b296cd5 <+757>: movdqu 0x50(%rdi),%xmm7 0x00007f2f5b296cda <+762>: movups %xmm8,0x60(%rsi) 0x00007f2f5b296cdf <+767>: movdqu 0x60(%rdi),%xmm8 0x00007f2f5b296ce5 <+773>: movups %xmm9,0x70(%rsi) 0x00007f2f5b296cea <+778>: lea 0x80(%rsi),%rsi 0x00007f2f5b296cf1 <+785>: movdqu 0x70(%rdi),%xmm9 0x00007f2f5b296cf7 <+791>: lea 0x80(%rdi),%rdi 0x00007f2f5b296cfe <+798>: callq 0x7f2f5b2968d0 <_aesni_decrypt8> 0x00007f2f5b296d03 <+803>: movups (%r11),%xmm0 0x00007f2f5b296d07 <+807>: sub $0x80,%rdx 0x00007f2f5b296d0e <+814>: jae 0x7f2f5b296ca0 <aesni_ecb_encrypt+704> 0x00007f2f5b296d10 <+816>: movups %xmm2,(%rsi) 0x00007f2f5b296d13 <+819>: pxor %xmm2,%xmm2 0x00007f2f5b296d17 <+823>: mov %r11,%rcx 0x00007f2f5b296d1a <+826>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296d1e <+830>: pxor %xmm3,%xmm3 0x00007f2f5b296d22 <+834>: mov %r10d,%eax 0x00007f2f5b296d25 <+837>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296d29 <+841>: pxor %xmm4,%xmm4 0x00007f2f5b296d2d <+845>: movups %xmm5,0x30(%rsi) 0x00007f2f5b296d31 <+849>: pxor %xmm5,%xmm5 0x00007f2f5b296d35 <+853>: movups %xmm6,0x40(%rsi) 0x00007f2f5b296d39 <+857>: pxor %xmm6,%xmm6 0x00007f2f5b296d3d <+861>: movups %xmm7,0x50(%rsi) 0x00007f2f5b296d41 <+865>: pxor %xmm7,%xmm7 0x00007f2f5b296d45 <+869>: movups %xmm8,0x60(%rsi) 0x00007f2f5b296d4a <+874>: pxor %xmm8,%xmm8 0x00007f2f5b296d4f <+879>: movups %xmm9,0x70(%rsi) 0x00007f2f5b296d54 <+884>: pxor %xmm9,%xmm9 0x00007f2f5b296d59 <+889>: lea 0x80(%rsi),%rsi 0x00007f2f5b296d60 <+896>: add $0x80,%rdx 0x00007f2f5b296d67 <+903>: je 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296d6d <+909>: movups (%rdi),%xmm2 0x00007f2f5b296d70 <+912>: cmp $0x20,%rdx 0x00007f2f5b296d74 <+916>: jb 0x7f2f5b296e10 <aesni_ecb_encrypt+1072> 0x00007f2f5b296d7a <+922>: movups 0x10(%rdi),%xmm3 0x00007f2f5b296d7e <+926>: je 0x7f2f5b296e40 <aesni_ecb_encrypt+1120> 0x00007f2f5b296d84 <+932>: movups 0x20(%rdi),%xmm4 0x00007f2f5b296d88 <+936>: cmp $0x40,%rdx 0x00007f2f5b296d8c <+940>: jb 0x7f2f5b296e60 <aesni_ecb_encrypt+1152> 0x00007f2f5b296d92 <+946>: movups 0x30(%rdi),%xmm5 0x00007f2f5b296d96 <+950>: je 0x7f2f5b296e90 <aesni_ecb_encrypt+1200> 0x00007f2f5b296d9c <+956>: movups 0x40(%rdi),%xmm6 0x00007f2f5b296da0 <+960>: cmp $0x60,%rdx 0x00007f2f5b296da4 <+964>: jb 0x7f2f5b296ec0 <aesni_ecb_encrypt+1248> 0x00007f2f5b296daa <+970>: movups 0x50(%rdi),%xmm7 0x00007f2f5b296dae <+974>: je 0x7f2f5b296f00 <aesni_ecb_encrypt+1312> 0x00007f2f5b296db4 <+980>: movups 0x60(%rdi),%xmm8 0x00007f2f5b296db9 <+985>: movups (%rcx),%xmm0 0x00007f2f5b296dbc <+988>: xorps %xmm9,%xmm9 0x00007f2f5b296dc0 <+992>: callq 0x7f2f5b2968d0 <_aesni_decrypt8> 0x00007f2f5b296dc5 <+997>: movups %xmm2,(%rsi) 0x00007f2f5b296dc8 <+1000>: pxor %xmm2,%xmm2 0x00007f2f5b296dcc <+1004>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296dd0 <+1008>: pxor %xmm3,%xmm3 0x00007f2f5b296dd4 <+1012>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296dd8 <+1016>: pxor %xmm4,%xmm4 0x00007f2f5b296ddc <+1020>: movups %xmm5,0x30(%rsi) 0x00007f2f5b296de0 <+1024>: pxor %xmm5,%xmm5 0x00007f2f5b296de4 <+1028>: movups %xmm6,0x40(%rsi) 0x00007f2f5b296de8 <+1032>: pxor %xmm6,%xmm6 0x00007f2f5b296dec <+1036>: movups %xmm7,0x50(%rsi) 0x00007f2f5b296df0 <+1040>: pxor %xmm7,%xmm7 0x00007f2f5b296df4 <+1044>: movups %xmm8,0x60(%rsi) 0x00007f2f5b296df9 <+1049>: pxor %xmm8,%xmm8 0x00007f2f5b296dfe <+1054>: pxor %xmm9,%xmm9 0x00007f2f5b296e03 <+1059>: jmpq 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296e08 <+1064>: nopl 0x0(%rax,%rax,1) 0x00007f2f5b296e10 <+1072>: movups (%rcx),%xmm0 0x00007f2f5b296e13 <+1075>: movups 0x10(%rcx),%xmm1 0x00007f2f5b296e17 <+1079>: lea 0x20(%rcx),%rcx 0x00007f2f5b296e1b <+1083>: xorps %xmm0,%xmm2 0x00007f2f5b296e1e <+1086>: aesdec %xmm1,%xmm2 0x00007f2f5b296e23 <+1091>: dec %eax 0x00007f2f5b296e25 <+1093>: movups (%rcx),%xmm1 0x00007f2f5b296e28 <+1096>: lea 0x10(%rcx),%rcx 0x00007f2f5b296e2c <+1100>: jne 0x7f2f5b296e1e <aesni_ecb_encrypt+1086> 0x00007f2f5b296e2e <+1102>: aesdeclast %xmm1,%xmm2 0x00007f2f5b296e33 <+1107>: movups %xmm2,(%rsi) 0x00007f2f5b296e36 <+1110>: pxor %xmm2,%xmm2 0x00007f2f5b296e3a <+1114>: jmpq 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296e3f <+1119>: nop 0x00007f2f5b296e40 <+1120>: callq 0x7f2f5b2963a0 <_aesni_decrypt2> 0x00007f2f5b296e45 <+1125>: movups %xmm2,(%rsi) 0x00007f2f5b296e48 <+1128>: pxor %xmm2,%xmm2 0x00007f2f5b296e4c <+1132>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296e50 <+1136>: pxor %xmm3,%xmm3 0x00007f2f5b296e54 <+1140>: jmpq 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296e59 <+1145>: nopl 0x0(%rax) 0x00007f2f5b296e60 <+1152>: callq 0x7f2f5b296470 <_aesni_decrypt3> 0x00007f2f5b296e65 <+1157>: movups %xmm2,(%rsi) 0x00007f2f5b296e68 <+1160>: pxor %xmm2,%xmm2 0x00007f2f5b296e6c <+1164>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296e70 <+1168>: pxor %xmm3,%xmm3 0x00007f2f5b296e74 <+1172>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296e78 <+1176>: pxor %xmm4,%xmm4 0x00007f2f5b296e7c <+1180>: jmpq 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296e81 <+1185>: nopl 0x0(%rax,%rax,1) 0x00007f2f5b296e86 <+1190>: nopw %cs:0x0(%rax,%rax,1) 0x00007f2f5b296e90 <+1200>: callq 0x7f2f5b296570 <_aesni_decrypt4> 0x00007f2f5b296e95 <+1205>: movups %xmm2,(%rsi) 0x00007f2f5b296e98 <+1208>: pxor %xmm2,%xmm2 0x00007f2f5b296e9c <+1212>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296ea0 <+1216>: pxor %xmm3,%xmm3 0x00007f2f5b296ea4 <+1220>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296ea8 <+1224>: pxor %xmm4,%xmm4 0x00007f2f5b296eac <+1228>: movups %xmm5,0x30(%rsi) 0x00007f2f5b296eb0 <+1232>: pxor %xmm5,%xmm5 0x00007f2f5b296eb4 <+1236>: jmp 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296eb6 <+1238>: nopw %cs:0x0(%rax,%rax,1) 0x00007f2f5b296ec0 <+1248>: xorps %xmm7,%xmm7 0x00007f2f5b296ec3 <+1251>: callq 0x7f2f5b2966e0 <_aesni_decrypt6> 0x00007f2f5b296ec8 <+1256>: movups %xmm2,(%rsi) 0x00007f2f5b296ecb <+1259>: pxor %xmm2,%xmm2 0x00007f2f5b296ecf <+1263>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296ed3 <+1267>: pxor %xmm3,%xmm3 0x00007f2f5b296ed7 <+1271>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296edb <+1275>: pxor %xmm4,%xmm4 0x00007f2f5b296edf <+1279>: movups %xmm5,0x30(%rsi) 0x00007f2f5b296ee3 <+1283>: pxor %xmm5,%xmm5 0x00007f2f5b296ee7 <+1287>: movups %xmm6,0x40(%rsi) 0x00007f2f5b296eeb <+1291>: pxor %xmm6,%xmm6 0x00007f2f5b296eef <+1295>: pxor %xmm7,%xmm7 0x00007f2f5b296ef3 <+1299>: jmp 0x7f2f5b296f34 <aesni_ecb_encrypt+1364> 0x00007f2f5b296ef5 <+1301>: nop 0x00007f2f5b296ef6 <+1302>: nopw %cs:0x0(%rax,%rax,1) 0x00007f2f5b296f00 <+1312>: callq 0x7f2f5b2966e0 <_aesni_decrypt6> 0x00007f2f5b296f05 <+1317>: movups %xmm2,(%rsi) 0x00007f2f5b296f08 <+1320>: pxor %xmm2,%xmm2 0x00007f2f5b296f0c <+1324>: movups %xmm3,0x10(%rsi) 0x00007f2f5b296f10 <+1328>: pxor %xmm3,%xmm3 0x00007f2f5b296f14 <+1332>: movups %xmm4,0x20(%rsi) 0x00007f2f5b296f18 <+1336>: pxor %xmm4,%xmm4 0x00007f2f5b296f1c <+1340>: movups %xmm5,0x30(%rsi) 0x00007f2f5b296f20 <+1344>: pxor %xmm5,%xmm5 0x00007f2f5b296f24 <+1348>: movups %xmm6,0x40(%rsi) 0x00007f2f5b296f28 <+1352>: pxor %xmm6,%xmm6 0x00007f2f5b296f2c <+1356>: movups %xmm7,0x50(%rsi) 0x00007f2f5b296f30 <+1360>: pxor %xmm7,%xmm7 0x00007f2f5b296f34 <+1364>: xorps %xmm0,%xmm0 0x00007f2f5b296f37 <+1367>: pxor %xmm1,%xmm1 0x00007f2f5b296f3b <+1371>: repz retq End of assembler dump. ```
``` (gdb) i r rax 0xfc0307d2 4228057042 rbx 0x1 1 rcx 0x7f2f4f715000 139841173016576 rdx 0x10 16 rsi 0x7f2f0fa1cf68 139840102453096 rdi 0x7f2f0fa1cf68 139840102453096 rbp 0x7ffd614afc60 0x7ffd614afc60 rsp 0x7ffd614afc18 0x7ffd614afc18 r8 0x1 1 r9 0x0 0 r10 0x0 0 r11 0x7f2f0fa1cd10 139840102452496 r12 0x0 0 r13 0x1 1 r14 0x7f2f5be6c98c 139841382041996 r15 0x7ffd614b0a88 140726235761288 rip 0x7f2f5b296b85 0x7f2f5b296b85 <aesni_ecb_encrypt+421> eflags 0x10287 [ CF PF SF IF RF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0 ```
I've gone back to our old Vanilla configuration which we used for initial testing with Kamailio and have stripped a lot of it back for the purpose of this test. Unfortunately the problem is still present (using the same systemd script as above).
I've included the configuration and back trace below in-case there's anything which helps us. Thus far I've been using multiple Jitsi softphones on Windows XP VMs with large contact lists loaded via custom XML file, I will try to reproduce this on SIPp if I can reproduce then I'll look at creating a docker image.
/usr/local/kamailio/etc/kamailio/kamailio.cfg ``` #!KAMAILIO
####### Defined Values #########
#!define WITH_POSTGRES #!define WITH_AUTH #!define WITH_USRLOCDB #!define WITH_PRESENCE #!define WITH_MULTIDOMAIN #!define WITH_NAT #!define WITH_NATSIPPING #!define WITH_TLS
# *** Value defines - IDs used later in config #!ifdef WITH_POSTGRES # - database URL - used to connect to database server by modules such # as: auth_db, acc, usrloc, a.s.o. #!ifndef DBURL #!define DBURL "postgres://username:password@localhost/dbname" #!endif #!endif #!ifdef WITH_MULTIDOMAIN # - the value for 'use_domain' parameters #!define MULTIDOMAIN 1 #!else #!define MULTIDOMAIN 0 #!endif
# - flags # FLT_ - per transaction (message) flags # FLB_ - per branch flags #!define FLT_NATS 5 #!define FLT_DLG 9 #!define FLT_DLGINFO 10 #!define FLB_NATB 6 #!define FLB_NATSIPPING 7
####### Global Parameters #########
### LOG Levels: 3=DBG, 2=INFO, 1=NOTICE, 0=WARN, -1=ERR #!ifdef WITH_DEBUG debug=4 log_stderror=no #!else debug=2 log_stderror=no #!endif
memdbg=5 memlog=5
log_facility=LOG_LOCAL0 log_prefix="{$mt $hdr(CSeq) $ci} "
children=8
listen=udp:77.77.77.77:5060 advertise 77.77.77.77:5060 listen=tcp:77.77.77.77:5060 advertise 77.77.77.77:5060 listen=tls:77.77.77.77:5061 advertise 77.77.77.77:5061
#!ifdef WITH_TLS enable_tls=yes #!endif
/* life time of TCP connection when there is no traffic * - a bit higher than registration expires to cope with UA behind NAT */ tcp_connection_lifetime=3605
tcp_accept_no_cl=yes tcp_rd_buf_size=16384
####### Modules Section ########
/* set paths to location of modules */ mpath="/usr/local/kamailio/lib64/kamailio/modules/"
#!ifdef WITH_POSTGRES loadmodule "db_postgres.so" #!endif
loadmodule "kex.so" loadmodule "corex.so" loadmodule "tm.so" loadmodule "tmx.so" loadmodule "sl.so" loadmodule "rr.so" loadmodule "pv.so" loadmodule "maxfwd.so" loadmodule "usrloc.so" loadmodule "registrar.so" loadmodule "textops.so" loadmodule "siputils.so" loadmodule "xlog.so" loadmodule "sanity.so" loadmodule "ctl.so" loadmodule "cfg_rpc.so" loadmodule "acc.so" loadmodule "counters.so" loadmodule "regex.so"
#!ifdef WITH_AUTH loadmodule "auth.so" loadmodule "auth_db.so" #!endif
#!ifdef WITH_MULTIDOMAIN loadmodule "domain.so" #!endif
#!ifdef WITH_PRESENCE loadmodule "presence.so" loadmodule "presence_xml.so" loadmodule "presence_dialoginfo.so" loadmodule "presence_mwi.so" loadmodule "pua.so" loadmodule "pua_dialoginfo.so" loadmodule "dialog.so" #!endif
#!ifdef WITH_NAT loadmodule "nathelper.so" #!endif
#!ifdef WITH_TLS loadmodule "tls.so" #!endif
#!ifdef WITH_DEBUG loadmodule "debugger.so" #!endif
# ----------------- setting module-specific parameters ---------------
# ----- ctl params ----- # modparam("ctl", "binrpc", "unix:/var/run/kamailio/kamailio_ctl")
# ----- tm params ----- modparam("tm", "failure_reply_mode", 3) modparam("tm", "fr_timer", 30000) modparam("tm", "fr_inv_timer", 120000)
# ----- rr params ----- # set next param to 1 to add value to ;lr param (helps with some UAs) modparam("rr", "enable_full_lr", 0) # do not append from tag to the RR (no need for this script) modparam("rr", "append_fromtag", 0)
# ----- registrar params ----- modparam("registrar", "method_filtering", 1) modparam("registrar", "append_branches", 1) modparam("registrar", "max_contacts", 30) modparam("registrar", "default_expires", 900) modparam("registrar", "default_expires_range", 40) modparam("registrar", "expires_range", 40) modparam("registrar", "min_expires", 500) modparam("registrar", "max_expires", 1300) modparam("registrar", "gruu_enabled", 0)
# ----- usrloc params ----- /* enable DB persistency for location entries */ #!ifdef WITH_USRLOCDB modparam("usrloc", "db_url", DBURL) modparam("usrloc", "db_mode", 2) modparam("usrloc", "use_domain", MULTIDOMAIN) #!endif
# ----- auth_db params ----- #!ifdef WITH_AUTH modparam("auth_db", "db_url", DBURL) modparam("auth_db", "calculate_ha1", 0) modparam("auth_db", "password_column", "ha1") modparam("auth_db", "load_credentials", "") modparam("auth_db", "use_domain", MULTIDOMAIN) modparam("auth", "nonce_count", 1) # enable nonce_count support modparam("auth", "qop", "auth") # enable qop=auth modparam("auth", "algorithm", "MD5") modparam("auth", "nonce_expire", 60) modparam("auth", "nonce_auth_max_drift", 2) #!endif
# ----- domain params ----- #!ifdef WITH_MULTIDOMAIN modparam("domain", "db_url", DBURL) modparam("domain", "register_myself", 1) #!endif
#!ifdef WITH_PRESENCE # ----- presence params ----- modparam("presence", "db_url", DBURL) modparam("presence", "server_address", "sip:77.77.77.77:5060" ) modparam("presence", "send_fast_notify", 0) modparam("presence", "db_update_period", 20) modparam("presence", "clean_period", 40) modparam("presence", "subs_db_mode", 2) modparam("presence", "fetch_rows", 1000)
# ----- presence_xml params ----- modparam("presence_xml", "db_url", DBURL) modparam("presence_xml", "force_active", 1)
# ----- presence_dialoginfo params ----- modparam("presence_dialoginfo", "force_single_dialog", 0) modparam("presence_dialoginfo", "force_dummy_dialog", 1)
# ----- pua params ----- modparam("pua", "db_url", DBURL) modparam("pua", "db_mode", 2) modparam("pua", "update_period", 60) modparam("pua", "dlginfo_increase_version", 0) modparam("pua", "reginfo_increase_version", 0) modparam("pua", "check_remote_contact", 1) modparam("pua", "fetch_rows", 1000)
# ----- pua_dialoginfo params ----- modparam("pua_dialoginfo", "include_callid", 1) modparam("pua_dialoginfo", "send_publish_flag", FLT_DLGINFO) modparam("pua_dialoginfo", "caller_confirmed", 0) modparam("pua_dialoginfo", "include_tags", 1) modparam("pua_dialoginfo", "override_lifetime", 124)
# ----- dialog params ----- modparam("dialog", "db_url", DBURL) modparam("dialog", "enable_stats", 1) modparam("dialog", "db_mode", 1) modparam("dialog", "dlg_flag", FLT_DLG) #!endif
#!ifdef WITH_NAT # ----- nathelper params ----- modparam("nathelper", "natping_interval", 30) modparam("nathelper", "ping_nated_only", 1) modparam("nathelper", "sipping_bflag", FLB_NATSIPPING) modparam("nathelper", "sipping_from", "sip:pinger@kamailio.org")
# params needed for NAT traversal in other modules modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)") modparam("usrloc", "nat_bflag", FLB_NATB) #!endif
#!ifdef WITH_TLS # ----- tls params ----- modparam("tls", "config", "/usr/local/kamailio/etc/kamailio/tls.cfg") #!endif
#!ifdef WITH_DEBUG # ----- debugger params ----- modparam("debugger", "cfgtrace", 1) modparam("debugger", "log_level_name", "exec") #!endif
####### Routing Logic ########
request_route {
# NAT detection route(NATDETECT);
# CANCEL processing if (is_method("CANCEL")) { if (t_check_trans()) { route(RELAY); } exit; }
# handle requests within SIP dialogs route(WITHINDLG);
### only initial requests (no To tag) # handle retransmissions if (!is_method("ACK")) { if(t_precheck_trans()) { t_check_trans(); exit; } t_check_trans(); } # authentication route(AUTH);
# record routing for dialog forming requests (in case they are routed) # - remove preloaded route headers remove_hf("Route"); if (is_method("INVITE|SUBSCRIBE")) { record_route(); } # handle presence related requests route(PRESENCE);
# handle registrations route(REGISTRAR);
if ($rU==$null) { # request with no Username in RURI sl_send_reply("484","Address Incomplete"); exit; } # user location service route(LOCATION); route(RELAY); }
# Wrapper for relaying requests route[RELAY] {
# enable additional event routes for forwarded requests # - serial forking, RTP relaying handling, a.s.o. if (is_method("INVITE|BYE|SUBSCRIBE|UPDATE")) { if(!t_is_set("branch_route")) t_on_branch("MANAGE_BRANCH"); } if (is_method("INVITE|SUBSCRIBE|UPDATE")) { if(!t_is_set("onreply_route")) t_on_reply("MANAGE_REPLY"); } if (is_method("INVITE")) { if(!t_is_set("failure_route")) t_on_failure("MANAGE_FAILURE"); } if(is_method("INVITE|BYE|UPDATE|CANCEL|ACK")) { setflag(FLT_DLGINFO); dlg_manage(); }
if (!t_relay()) { sl_reply_error(); } exit; }
# Handle requests within SIP dialogs route[WITHINDLG] { if (!has_totag()) return;
# sequential request withing a dialog should # take the path determined by record-routing if (loose_route()) { route(DLGURI); if ( is_method("ACK") ) { # ACK is forwarded statelessly route(NATMANAGE); } else if ( is_method("NOTIFY") ) { # Add Record-Route for in-dialog NOTIFY as per RFC 6665. record_route(); } route(RELAY); exit; } else { if (is_method("SUBSCRIBE") && uri == myself) { # in-dialog subscribe requests route(PRESENCE); exit; } if ( is_method("ACK") ) { if ( t_check_trans() ) { # no loose-route, but stateful ACK; # must be an ACK after a 487 # or e.g. 404 from upstream server route(RELAY); exit; } else { # ACK without matching transaction ... ignore and discard exit; } sl_send_reply("404","Not here"); } exit; } }
# Handle SIP registrations route[REGISTRAR] { if (is_method("REGISTER")) { if(isflagset(FLT_NATS)) { setbflag(FLB_NATB); #!ifdef WITH_NATSIPPING # do SIP NAT pinging setbflag(FLB_NATSIPPING); #!endif } if (!save("location")) { sl_reply_error(); } exit; } }
# User location service route[LOCATION] { if (is_method("MESSAGE|SUBSCRIBE|NOTIFY|PUBLISH")) { $avp(oexten) = $rU; if (!lookup("location")) { $var(rc) = $rc; t_newtran(); switch ($var(rc)) { case -1: send_reply("410", "USER_NOT_REGISTERED"); exit; case -3: send_reply("404", "User Not Found"); exit; case -2: send_reply("405", "Method Not Allowed"); exit; } } route(RELAY); } exit; }
# Presence server processing route[PRESENCE] { if(!is_method("PUBLISH|SUBSCRIBE")) return;
if(is_method("SUBSCRIBE") && $hdr(Event)=="message-summary") { # returns here if no voicemail server is configured sl_send_reply("404", "No voicemail service"); exit; }
#!ifdef WITH_PRESENCE if (!t_newtran()) { sl_reply_error(); exit; }
if(is_method("PUBLISH")) { handle_publish(); t_release(); } else if(is_method("SUBSCRIBE")) { handle_subscribe(); t_release(); } exit; #!endif
# if presence enabled, this part will not be executed if (is_method("PUBLISH") || $rU==$null) { sl_send_reply("404", "Not here"); exit; } return; }
# IP authorization and user authentication route[AUTH] { #!ifdef WITH_AUTH if (is_method("REGISTER")) { # authenticate requests if ($adu==$null || $au==$null || $fd==$null) { if (is_method("REGISTER")) { xlog("L_INFO", "$ci|user [$Au] from ip $si issued authentication challenge"); } auth_challenge("$fd", "0"); exit; } if (!auth_check("$fd", "subscriber", "1")) { xlog("L_INFO", "$ci|auth_check|user [$au@$fd] from ip $si authentication failed - issued authentication challenge"); auth_challenge("$fd", "0"); exit; } consume_credentials(); }
#!endif return; }
# Caller NAT detection route[NATDETECT] { #!ifdef WITH_NAT force_rport(); if (nat_uac_test("19")) { if (is_method("REGISTER")) { fix_nated_register(); } setflag(FLT_NATS); } #!endif return; }
# NAT traversal route[NATMANAGE] { #!ifdef WITH_NAT if (is_request()) { if (has_totag()) { if (check_route_param("nat=yes")) { setbflag(FLB_NATB); } } } if (!(isflagset(FLT_NATS) || isbflagset(FLB_NATB))) return;
if (is_request()) { if (!has_totag()) { if (t_is_branch_route()) { add_rr_param(";nat=yes"); } } } if (is_reply()) { if (isbflagset(FLB_NATB)) { if(is_first_hop()) set_contact_alias(); } } #!endif return; }
# URI update for dialog requests route[DLGURI] { #!ifdef WITH_NAT if(!isdsturiset()) { handle_ruri_alias(); } #!endif return; }
# Manage outgoing branches branch_route[MANAGE_BRANCH] { xdbg("new branch [$T_branch_idx] to $ru\n"); route(NATMANAGE); }
# Manage incoming replies onreply_route[MANAGE_REPLY] { xdbg("incoming reply\n"); if(status=~"[12][0-9][0-9]") { route(NATMANAGE); } }
# Manage failure routing cases failure_route[MANAGE_FAILURE] { route(NATMANAGE);
if (t_is_canceled()) { exit; } } ```
/usr/local/kamailio/etc/kamailio/kamctlrc ``` # The Kamailio configuration file for the control tools. # # Here you can set variables used in the kamctl and kamdbctl setup # scripts. Per default all variables here are commented out, the control tools # will use their internal default values.
## your SIP domain # SIP_DOMAIN=kamailio.org
## chrooted directory # $CHROOT_DIR="/path/to/chrooted/directory"
## database type: MYSQL, PGSQL, ORACLE, DB_BERKELEY, DBTEXT, or SQLITE # by default none is loaded # # If you want to setup a database with kamdbctl, you must at least specify # this parameter. DBENGINE=PGSQL
## database host DBHOST=localhost
## database host DBPORT=5432
## database name (for ORACLE this is TNS name) DBNAME=dbname
# database path used by dbtext, db_berkeley or sqlite # DB_PATH="/usr/local/etc/kamailio/dbtext"
## database read/write user DBRWUSER="username"
## password for database read/write user DBRWPW="password"
## database read only user DBROUSER="rousername"
## password for database read only user DBROPW="ropassword"
## database access host (from where is kamctl used) # DBACCESSHOST=192.168.0.1
## database super user (for ORACLE this is 'scheme-creator' user) DBROOTUSER="rootuser"
## password for database super user ## - important: this is insecure, targeting the use only for automatic testing ## - known to work for: mysql # DBROOTPW=""
## database character set (used by MySQL when creating database) #CHARSET="latin1"
## user name column # USERCOL="username"
# SQL definitions # If you change this definitions here, then you must change them # in db/schema/entities.xml too. # FIXME
# FOREVER="2030-05-28 21:32:15" # DEFAULT_Q="1.0"
# Program to calculate a message-digest fingerprint # MD5="md5sum"
# awk tool # AWK="awk"
# gdb tool # GDB="gdb"
# If you use a system with a grep and egrep that is not 100% gnu grep compatible, # e.g. solaris, install the gnu grep (ggrep) and specify this below. # # grep tool # GREP="grep"
# egrep tool # EGREP="egrep"
# sed tool # SED="sed"
# tail tool # LAST_LINE="tail -n 1"
# expr tool # EXPR="expr"
# Describe what additional tables to install. Valid values for the variables # below are yes/no/ask. With ask (default) it will interactively ask the user # for an answer, while yes/no allow for automated, unassisted installs. #
# If to install tables for the modules in the EXTRA_MODULES variable. INSTALL_EXTRA_TABLES=yes
# If to install presence related tables. INSTALL_PRESENCE_TABLES=yes
# If to install uid modules related tables. INSTALL_DBUID_TABLES=yes
# Define what module tables should be installed. # If you use the postgres database and want to change the installed tables, then you # must also adjust the STANDARD_TABLES or EXTRA_TABLES variable accordingly in the # kamdbctl.base script.
# Kamailio standard modules # STANDARD_MODULES="standard acc lcr domain group permissions registrar usrloc msilo # alias_db uri_db speeddial avpops auth_db pdt dialog dispatcher # dialplan"
# Kamailio extra modules # EXTRA_MODULES="imc cpl siptrace domainpolicy carrierroute userblacklist htable purple sca"
## type of aliases used: DB - database aliases; UL - usrloc aliases ## - default: none # ALIASES_TYPE="DB"
## control engine: RPCFIFO ## - default RPCFIFO # CTLENGINE="RPCFIFO"
## path to FIFO file for engine RPCFIFO # RPCFIFOPATH="/var/run/kamailio/kamailio_rpc_fifo"
## check ACL names; default on (1); off (0) # VERIFY_ACL=1
## ACL names - if VERIFY_ACL is set, only the ACL names from below list ## are accepted # ACL_GROUPS="local ld int voicemail free-pstn"
## check if user exists (used by some commands such as acl); ## - default on (1); off (0) # VERIFY_USER=1
## verbose - debug purposes - default '0' # VERBOSE=1
## do (1) or don't (0) store plaintext passwords ## in the subscriber table - default '1' # STORE_PLAINTEXT_PW=0
## Kamailio START Options ## PID file path - default is: /var/run/kamailio/kamailio.pid # PID_FILE=/var/run/kamailio/kamailio.pid
## Extra start options - default is: not set # example: start Kamailio with 64MB share memory: STARTOPTIONS="-m 64" # STARTOPTIONS= ```
/usr/local/kamailio/etc/kamailio/tls.cfg ``` [server:default] method = TLSv1.2 verify_certificate = no require_certificate = no private_key = /usr/local/kamailio/etc/kamailio/tls/key.pem certificate = /usr/local/kamailio/etc/kamailio/tls/cert.pem #ca_list = /usr/ssl/certs/tls/cacert.pem #crl = /usr/ssl/certs/tls/crl.pem
[server:77.77.77.77:5061] method = TLSv1.2 verify_certificate = no require_certificate = no private_key = /usr/local/kamailio/etc/kamailio/tls/key.pem certificate = /usr/local/kamailio/etc/kamailio/tls/cert.pem #ca_list = /usr/ssl/certs/tls/cacert.pem #crl = /usr/ssl/certs/tls/crl.pem
[client:default] verify_certificate = no require_certificate = no ```
gdb backtrace ``` #0 aesni_ecb_encrypt () at crypto/aes/aesni-x86_64.s:624 624 movups (%rcx),%xmm1
(gdb) bt full #0 aesni_ecb_encrypt () at crypto/aes/aesni-x86_64.s:624 No locals. #1 0x00007f7415e3e240 in aesni_ecb_cipher (ctx=0x7f73cb204720, out=0x7f73cb204618 "Ж\020?\223L\263\237\020\230\223\307"\026\271\224u\222\347bX\355\371yx+\240 \fbCD\313Mh\005\264\\356\304B\222"|\204\226S\243RBO\271", in=0x7f73cb204638 "\313Mh\005\264\\35 at crypto/evp/e_aes.c:319 bl = 16 #2 0x00007f7415e53526 in evp_EncryptDecryptUpdate (ctx=0x7f73cb204720, out=0x7f73cb204618 "Ж\020?\223L\263\237\020\230\223\307"\026\271\224u\222\347bX\355\371yx+\240 \fbCD\313Mh\005\264\\356\304B\222"|\204\226S\243RBO\271", outl=0x7ffd3f1e72e4, in=0x7f73cb204638 "\313Mh\005\264\\356\304B\222"|\204\226S\243RBO\271", inl=16) at crypto/evp/evp_enc.c:333 i = 32627 j = -887077320 bl = 16 cmpl = 16 #3 0x00007f7415e53771 in EVP_EncryptUpdate (ctx=0x7f73cb204720, out=0x7f73cb204618 "Ж\020?\223L\263\237\020\230\223\307"\026\271\224u\222\347bX\355\371yx+\240 \fbCD\313Mh\005\264\\356\304B\222"|\204\226S\243RBO\271", outl=0x7ffd3f1e72e4, in=0x7f73cb204638 "\313Mh\005\264\\356\304B\222"|\204\226S\243RBO\271", inl=16) at crypto/evp/evp_enc.c:385 No locals. #4 0x00007f7415e5315f in EVP_CipherUpdate (ctx=0x7f73cb204720, out=0x7f73cb204618 "Ж\020?\223L\263\237\020\230\223\307"\026\271\224u\222\347bX\355\371yx+\240 \fbCD\313Mh\005\264\\356\304B\222"|\204\226S\243RBO\271", outl=0x7ffd3f1e72e4, in=0x7f73cb204638 inl=16) at crypto/evp/evp_enc.c:213 No locals. #5 0x00007f7415e95be4 in ctr_update (drbg=0x7f73cb204550, in1=0x0, in1len=0, in2=0x0, in2len=0, nonce=0x0, noncelen=0) at crypto/rand/drbg_ctr.c:238 ctr = 0x7f73cb2045f8 outlen = 16 #6 0x00007f7415e960d2 in drbg_ctr_generate (drbg=0x7f73cb204550, out=0x7f73cb437118 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@d adin=0x0, adinlen=0) at crypto/rand/drbg_ctr.c:349 ctr = 0x7f73cb2045f8 #7 0x00007f7415e97591 in RAND_DRBG_generate (drbg=0x7f73cb204550, out=0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co"..., at crypto/rand/drbg_lib.c:638 reseed_required = 0 #8 0x00007f7415e976bf in RAND_DRBG_bytes (drbg=0x7f73cb204550, out=0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co"..., additional = 0x0 additional_len = 0 chunk = 16 ret = 0 #9 0x00007f7415e97c38 in drbg_bytes (out=0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip at crypto/rand/drbg_lib.c:968 ret = 0 drbg = 0x7f73cb204550 #10 0x00007f7415e991ab in RAND_bytes (buf=0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip at crypto/rand/rand_lib.c:836 meth = 0x7f74161e0920 <rand_meth> #11 0x00007f7416216bb5 in tls1_enc (s=0x7f73cb42c0d8, recs=0x7ffd3f1e7950, n_recs=1, sending=1) at ssl/record/ssl3_record.c:985 ivlen = 16 ds = 0x7f73cb421e90 reclen = {268435456, 140135310032568, 5353928608, 140135301826248, 140725662414752, 94300525191679, 94300526514899, 140135301826248, 268435456, 4294967302, 140725662414832, 94300525248992, 140136384421760, 1258616618670, 140136384429104, 140136384421 140135310032624, 140725662414880, 140136384134830, 140136564594272, 140136564594272, 140136564594288, 140725662417744, 140725662414944, 140136564180399, 140725662414960, 140725662415048, 490, 140725662417744} buf = {"\000\000\000\000\000\000\001\316\027\003\003", <incomplete sequence \352>, "U\000\000\204\337i\vt\177\000\000(", "\000\000\000\000\000\000xXB\313s\177", "\000\000\060\337\312s\177\000\000\250v\036?", "\375\177\000\000\000\000\000\000@Gx\372", "\001\000\000C\001\000\000\204\337i\v\035", "\000\000@v\036?\375\177\000\000\023pN", "\r\304U\000\000\270\376_\313s\177\000", "\000\060\337\312s\177\000\000xXB\313s", "\177\000\000\340\062\337\312s\177\000\000Ӓ", "b\r\006\000\000\000\340\062\337\31 "\304U\000\000\200\001\000\000%\001\000\000[", "4f\r\304U\000\000\204\337i\vt\177", "\000\000(\000\000\000\000\000\000\000(\376_", "\313s\177\000\000\000\060\337\312s\177\000", "Hw\036?\375\177\000\000G4f", <incomplete sequence \304>, "U\000\000\20 "f\r\304U\000\000\204\337i\vt\177", "\000(\000\000\000\000\000\000\000\270\376", <incomplete sequence \313>, "s\177\000\000\000\060\337\312s\177\000\000\300", "\221\220\313s\177\000\000\313)\000\000\000", "\000\000\270\376_\313\004\000\000\000\360# ")\214N\r\304U\000\000\240w\036", <incomplete sequence \375>, "\177\000\000ٌN\r\304U\000\000\001", "\000\000\000\000\000\000\001\000\000\000\030\000", "\000\200\337i\vt\177\000\000(\376", <incomplete sequence \313>, "%\001\000\000\060\374i\vt\177\00 "\000\000\000\060\337\312s\177\000\000\001\000", "\000\000\000\000\000\001\000\000\000\006\000\000"} i = 32765 pad = 0 ret = 32628 tmpr = 1 bs = 140136564594288 mac_size = 0 ctr = 0 padnum = 140136564594272 loop = 140136564594536 padval = 0 '\000' imac_size = 43 enc = 0x7f74161e05c0 <aesni_128_cbc_hmac_sha1_cipher> #12 0x00007f741621228f in do_ssl3_write (s=0x7f73cb42c0d8, type=23, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427 pipelens=0x7ffd3f1e8a60, numpipes=1, create_empty_fragment=0, written=0x7ffd3f1e8b70) at ssl/record/rec_layer_s3.c:1003 pkt = {{buf = 0x0, staticbuf = 0x7f73cb437100 "", curr = 514, written = 514, maxsize = 16472, subs = 0x7f73cb5ffef0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0} <repeats 12 times>, {buf = 0x0, staticbuf = 0x0, curr = buf = 0x6b, staticbuf = 0x6b <error: Cannot access memory at address 0x6b>, curr = 16472, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x1}, {buf = 0x0, s curr = 140725662420336, written = 140136848320405, maxsize = 140725662420360, subs = 0xc}, {buf = 0x7f7427106798, staticbuf = 0x7ffd3f1e8db0 "\247\234j\vt\177", curr = 140725662420384, written = 140136384414731, maxsize = 140725662420760, subs = staticbuf = 0x7f7426fea4b9 <_IO_vfprintf_internal+1929> "H\213\225h\373\377\377H\211\321L)\371H9\310\017\205p\371\377\377D\213\215H\373\377\377\271\377\377\377\177D)\311Hc\311H9\310\017\217\307\025", curr = 140725662420275, written = 34359738468, buf = 0x7ffd3f1e8908, staticbuf = 0xffffffff00000010 <error: Cannot access memory at address 0xffffffff00000010>, curr = 140725662420316, written = 120, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0xffffffffffffffff <error: Cannot access me curr = 140724603453441, written = 0, maxsize = 0, subs = 0x55c40efdef20}, {buf = 0x7ffd0000000c, staticbuf = 0x7f740000000a "", curr = 140725662419328, written = 0, maxsize = 3432, subs = 0x16}, {buf = 0x7f740b69c413, staticbuf = 0x7300000001 <er curr = 140725662420504, written = 140136384414741, maxsize = 140725662419384, subs = 0x300000000a}, {buf = 0x7ffd3f1e8e13, staticbuf = 0x3f1e8d64 <error: Cannot access memory at address 0x3f1e8d64>, curr = 0, written = 0, maxsize = 3311419785216, wr = {{rec_version = 771, type = 23, length = 506, orig_len = 0, off = 0, data = 0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co input = 0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co seq_num = "\000\000\000\000\000\000\000"}, {rec_version = 0, type = 0, length = 0, orig_len = 0, off = 0, data = 0x0, input = 0x0, comp = 0x0, read = 0, epoch = 0, seq_num = "\000\000\000\000\000\000\000"} <repeats 31 times>} thispkt = 0x7ffd3f1e8350 thiswr = 0x7ffd3f1e7950 recordstart = 0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co i = 32628 mac_size = 0 clear = 0 prefix_len = 0 eivlen = 16 align = 3 wb = 0x7f73cb42c930 sess = 0x7f73cb4233e8 totlen = 490 len = 506 wpinited = 1 j = 1 #13 0x00007f74162110ac in ssl3_write_bytes (s=0x7f73cb42c0d8, type=23, buf_=0x7f7416ec4578, len=490, written=0x7ffd3f1e8cb0) at ssl/record/rec_layer_s3.c:613 pipelens = {490, 140136384324723, 140725662419768, 21699638343, 140135318380515, 140135312190408, 140136384421764, 72, 140135312195280, 3403624448, 140135309483320, 2, 94300526514899, 1073741824, 268435456, 6, 140725662419744, 140136559316112, 140725 140136384421764, 18446744072840031672, 140725662419808, 140136559311077, 140725662419856, 5, 140135318380515, 140135312190408, 1258425418112, 18446744069639386183} tmppipelen = 490 remain = 0 numpipes = 1 j = 1 buf = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co;tag=0b62483f"... tot = 0 n = 490 max_send_fragment = 16384 split_send_fragment = 16384 maxpipes = 1 nw = 140135301826248 wb = 0x7f73cb42c930 i = 1 tmpwrit = 490 #14 0x00007f741621f8c0 in ssl3_write (s=0x7f73cb42c0d8, buf=0x7f7416ec4578, len=490, written=0x7ffd3f1e8cb0) at ssl/s3_lib.c:4460 No locals. #15 0x00007f741622e4db in ssl_write_internal (s=0x7f73cb42c0d8, buf=0x7f7416ec4578, num=490, written=0x7ffd3f1e8cb0) at ssl/ssl_lib.c:1943 No locals. #16 0x00007f741622e538 in SSL_write (s=0x7f73cb42c0d8, buf=0x7f7416ec4578, num=490) at ssl/ssl_lib.c:1957 ret = 0 written = 268435456 #17 0x00007f740b67ea3d in tls_encode_f (c=0x7f73cb427d78, pbuf=0x7ffd3f1e8e60, plen=0x7ffd3f1e8e58, rest_buf=0x7ffd3f1e8e68, rest_len=0x7ffd3f1e8e5c, send_flags=0x7ffd3f1e8e4c) at tls_server.c:828 n = 0 offs = 0 ssl = 0x7f73cb42c0d8 tls_c = 0x7f73cb4189f0 wr_buf = "\027\003\003\002\020\060\n\021\334\364\020\230'W\227\265\214=\323\372\254FV\205\253\364\343g[_V.\340\vb\236ϛ\025\f\345\242\303^f9\366z\234\070\062\326&>g"\214\\275\221\244\065*-h\236\277\022\067\021\241\017\253\vO\377\234\204%L\236\202\07\225r\020b\342\257\232\274\066'\201l\210\365bD\213\205\347p\231\v\205p\206H\337C\375]3u&j\024\212\244\230{\265k\202\004\022>\t\355>\020wH\367\321v\n\027\331sP\244 \232o0\322P\026\375\206\035\366\233\301d\016\250\034\253w\376b\224\264\266\005\207j\320\n?&\035 rd = {buf = 0x0, pos = 0, used = 0, size = 0} wr = { buf = 0x7f740b8baf60 <wr_buf> "\027\003\003\002\020\060\n\021\334\364\020\230'W\227\265\214=\323\372\254FV\205\253\364\343g[_V.\340\vb\236ϛ\025\f\345\242\303^f9\366z\234\070\062\326&>g"\214\\275\221\244\065*-h\236\277\022\067\021\241\017\253\vO\30<!\214O;\316*^\346]"u\225r\020b\342\257\232\274\066'\201l\210\365bD\213\205\347p\231\v\205p\206H\337C\375]3u&j\024\212\244\230{\265k\202\004\022>\t\355>\020wH\367\321v\n\027\331sP\244 \232o0\322P\026\375\206\035\366\233\301d\016\250\034\253w\376b\224\264\2 size = 65536} ssl_error = 0 err_src = 0x7f740b6a9ca7 "TLS write:" buf = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co;tag=0b62483f"... len = 490 x = -884834952 __func__ = "tls_encode_f" #18 0x000055c40d3091e4 in tcpconn_send_put (c=0x7f73cb427d78, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co send_flags=...) at core/tcp_main.c:2530 tmp = 0x7f73cae7d328 fd = 10 response = {140725662420640, 0} n = 1 do_close_fd = 0 rest_buf = 0x0 t_buf = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co;tag=0b62483f"... rest_len = 0 t_len = 490 resp = 0 t_send_flags = {f = 0, blst_imask = 0} fd_cache_e = 0x0 use_fd_cache = 0 __func__ = "tcpconn_send_put" #19 0x000055c40d3068d7 in tcp_send (dst=0x7f73cb656648, from=0x0, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@d at core/tcp_main.c:2310 c = 0x7f73cb427d78 ip = {af = 2, len = 4, u = {addrl = {140134886250834, 140725662420944}, addr32 = {2988284242, 32627, 1058967504, 32765}, addr16 = {39250, 45597, 32627, 0, 36816, 16158, 32765, 0}, addr = "R\231\035\262s\177\000\000Џ\036?\375\177\000"}} port = 1795 fd = -879728160 response = {140725662421040, 4096} n = 32765 con_lifetime = 57680 rest_buf = 0x7f740b688bc5 <sbufq_add+503> "H\213E؋P\034\213E\360\001\302H\213E؉P\034\213E\360)E̋E\360H\001E\320H\213E؋P\024\213E\360\001\302H\213E؉P\024\203", <incomplete sequence \314> t_buf = 0x7ffd3f1e8fa0 "Џ\036?\375\177" rest_len = 32627 t_len = 3403859656 resp = 5353934752 t_send_flags = {f = 0, blst_imask = 0} __func__ = "tcp_send" #20 0x00007f741272e586 in msg_send_buffer (dst=0x7f73cb656648, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co at ../../core/forward.h:282 new_dst = {send_sock = 0x4cb450920, to = {s = {sa_family = 9200, sa_data = "f\r\304U\000\000\000\222\036?\375\177\000"}, sin = {sin_family = 9200, sin_port = 3430, sin_addr = {s_addr = 21956}, sin_zero = "\000\222\036?\375\177\000"}, sin6 = {sin6_fam sin6_addr = {__in6_u = {__u6_addr8 = "\000\222\036?\375\177\000\000)\214N\r\304U\000", __u6_addr16 = {37376, 16158, 32765, 0, 35881, 3406, 21956, 0}, __u6_addr32 = {1058968064, 32765, 223251497, 21956}}}, sin6_scope_id = 1058968064}}, id = 3276 blst_imask = 21956}} outb = {s = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co;tag=0b62483f"..., len = netinfo = {data = {s = 0x7f741278607b "tm: t_reply.c", len = 656}, rcv = 0x7f73cb450920, dst = 0x7f73cadf3000} evp = {data = 0x7ffd3f1e9120, rcv = 0x0, dst = 0x7f73cb656648} port = 1 ip = {af = 0, len = 0, u = {addrl = {0, 94300301950976}, addr32 = {0, 0, 0, 21956}, addr16 = {0, 0, 0, 0, 0, 0, 21956, 0}, addr = '\000' <repeats 12 times>, "\304U\000"}} from = 0x0 local_addr = {s = {sa_family = 44896, sa_data = "\213\vt\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 44896, sin_port = 2955, sin_addr = {s_addr = 32628}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 44896, sin6 __in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\000\000\001\000s\177\000", __u6_addr16 = {0, 0, 0, 0, 0, 1, 32627, 0}, __u6_addr32 = {0, 0, 65536, 32627}}}, sin6_scope_id = 223289055}} con = 0x0 wsev = {type = 1058968032, buf = 0x7f73cba68e00 "0", len = 0, id = 0} ret = 136 __func__ = "msg_send_buffer" #21 0x00007f7412730944 in send_pr_buffer (rb=0x7f73cb6565f8, buf=0x7f7416ec4578, len=490) at t_funcs.c:70 __func__ = "send_pr_buffer" #22 0x00007f74126e1fa2 in _reply_light (trans=0x7f73cb656528, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co code=202, to_tag=0x7f74129c5580 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-e0e2", to_tag_len=37, lock=1, bm=0x7ffd3f1e9bc0) at t_reply.c:555 rb = 0x7f73cb6565f8 buf_len = 650 cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}} onsend_params = {req = 0x3f1e9b20, rpl = 0xb00000000, param = 0x17, code = 223289055, flags = 3, branch = 0, t_rbuf = 0x7ffd3f1e9b40, dst = 0x7f73cb428150, send_buf = {s = 0x0, len = 0}} rt = 0 backup_rt = 0 ctx = {rec_lev = 384580232, run_flags = 32628, last_retcode = 383262736, jmp_env = {{__jmpbuf = {94300526491344, 94300526471530, 496, 140136576196624, 140725662423740, 502511173633, 94300301950980, 140136576196624}, __mask_was_saved = 16, __saved_mas 94300526514899, 1073741824, 268435456, 6, 140725662423936, 94300524000758, 140725662424000, 140725662424028, 140136577395672, 140136505081744, 140725662424288, 868642364120, 0}}}}} pmsg = {id = 1320704, pid = 0, tval = {tv_sec = 8, tv_usec = 10}, fwd_send_flags = {f = 35881, blst_imask = 3406}, rpl_send_flags = {f = 21956, blst_imask = 0}, first_line = {type = -27872, flags = 16158, len = 32765, u = {request = {method = { s = 0x55c40d342e90 <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 1058968520}, uri = {s = 0x55c40d663447 "core/mem/q_malloc.c", len = 2}, version = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 309961539}, method_va s = 0x55c40d342e90 <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 1058968520}, status = {s = 0x55c40d663447 "core/mem/q_malloc.c", len = 2}, reason = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 309961539}, statusc via2 = 0x7f74164c831b, headers = 0x7ffd3f1e9a38, last_header = 0x0, parsed_flag = 140136567046947, h_via1 = 0x7f7426fea4b9 <_IO_vfprintf_internal+1929>, h_via2 = 0x5, callid = 0x7f7426fe9e36 <_IO_vfprintf_internal+262>, to = 0x7ffd3f1e9900, cseq = maxforwards = 0x7ffd3f1e9450, route = 0x26fea4b9, record_route = 0x0, content_type = 0x0, content_length = 0x7ffd00000000, authorization = 0xffffffffffffffff, expires = 0x7ffd00000005, proxy_auth = 0x7f747fffffff, supported = 0x7f74164c8200, requir allow = 0x7ffd3f1e94a0, event = 0x0, accept = 0xd68, accept_language = 0x7f7400000005, organization = 0x7f74164c831b, priority = 0x3, subject = 0x7f74164c8341, user_agent = 0x7f74164c8324, server = 0x7ffd3f1e94e0, content_disposition = 0x7f74164c83 refer_to = 0x7f74164c8320, session_expires = 0x3, min_se = 0x0, sipifmatch = 0x3000000018, subscription_state = 0x7ffd3f1e9b10, date = 0x7ffd3f1e9a50, identity = 0x7ffd3f1e9b20, identity_info = 0x7ffd3f1e9a60, pai = 0x7f74164c8900, ppi = 0x30000000 min_expires = 0x7ffd3f1e9560, body = 0x0, eoh = 0xd68 <error: Cannot access memory at address 0xd68>, unparsed = 0xffffffff0000000d <error: Cannot access memory at address 0xffffffff0000000d>, rcv = {src_ip = {af = 3432, len = 0, u = {addrl = {0, 1 addr16 = {0, 0, 0, 0, 35179, 5708, 32628, 0}, addr = "\000\000\000\000\000\000\000\000k\211L\026t\177\000"}}, dst_ip = {af = 374114660, len = 0, u = {addrl = {0, 140136567048555}, addr32 = {0, 0, 374114667, 32628}, addr16 = {0, 0, 0, 0, 35179 addr = "\000\000\000\000\000\000\000\000k\211L\026t\177\000"}}, src_port = 38320, dst_port = 16158, proto_reserved1 = 32765, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = "\000\000`\211L\026t\177\000\000]\001\000"}, sin = {sin_ s_addr = 374114656}, sin_zero = "t\177\000\000]\001\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 374114656, sin6_addr = {__in6_u = {__u6_addr8 = "t\177\000\000]\001\000\000\375\177\000\000\200d|\017", __u6_addr16 = {32628, 349, 32765, 259810432}}}, sin6_scope_id = 32628}}, bind_address = 0x3000000018, proto = -48 '\320'}, buf = 0x3000000018 <error: Cannot access memory at address 0x3000000018>, len = 1058970592, new_uri = {s = 0x7ffd3f1e9b20 "\200\233\036 s = 0x40000000 <error: Cannot access memory at address 0x40000000>, len = 259810507}, parsed_uri_ok = 6, parsed_uri = {user = {s = 0x7ffd3f1e95e0 "\240\226\036?\375\177", len = 16}, passwd = {s = 0x7ffd3f1e9bb0 "\340\233\036?\375\177", len = 1058 s = 0xcc14cb48 <error: Cannot access memory at address 0xcc14cb48>, len = 1058969120}, port = {s = 0x74b8bdd5ffffffff <error: Cannot access memory at address 0x74b8bdd5ffffffff>, len = 1958263765}, params = {s = 0x55c40d94a540 <def_list+32> "", len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 38560, proto = 16158, type = 32765, flags = (unknown: 309365440), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 262147 s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -871052560}, maddr = {s = 0x400000002 <error: Cannot access memory at address 0x400000002>, len = 1082173632}, method = {s = 0x18 <error: Cannot access memory at addres s = 0x1 <error: Cannot access memory at address 0x1>, len = -871053112}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7f73cc14cae0 "", len = -871053112}, transport_val = {s = 0x7ffd3f1e96b0 "", len = 2}, ttl_val = {s = 0x55c40d6292d3 "INFO", len = 1073 s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, maddr_val = {s = 0x7ffd3f1e9700 "", len = 309366527}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 223289055}, lr_val = {s s = 0x7ffd3f1e9710 "", len = 383262736}, gr_val = {s = 0x7ffd3f1e9740 "\a", len = 383262736}}, parsed_orig_ruri_ok = 1058969424, parsed_orig_ruri = {user = {s = 0x7f7413117bfc <pkg_proc_update_stats+115> "H\213\rEW ", len = 268435456}, passwd = s = 0xfebdf70 <error: Cannot access memory at address 0xfebdf70>, len = 897120}, port = {s = 0x142090 <error: Cannot access memory at address 0x142090>, len = 1320704}, params = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 7}, s len = 1058969472}, headers = {s = 0x55c40d342e90 <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 0}, port_no = 9200, proto = 3430, type = URN_URI_T, flags = (unknown: 1058969648), transport = {s = 0xd4e8c29 <error: Cannot access memory s = 0x55c40d4e908d <qm_malloc+2331> "H\213E\270H\203\300\070\351*\003", len = 1058969648}, user_param = {s = 0x55c40d6292d3 "INFO", len = 374124632}, maddr = {s = 0x9110000000 <error: Cannot access memory at address 0x9110000000>, len = 3741328 len = 8}, lr = {s = 0x7f7416d82010 "\001", len = 384580024}, r2 = {s = 0x500000001 <error: Cannot access memory at address 0x500000001>, len = 251523161}, gr = {s = 0x7f7416ec2858 "(", len = 1058969680}, transport_val = {s = 0x7f7416d82010 "\00 s = 0x7ffd3f1e9eb0 "\360/\344\026t\177", len = 224563923}, user_param_val = {s = 0x7f74164cb058 "core", len = 268435456}, maddr_val = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 1058969872}, method_val = { s = 0x7f74164c14ce <db_str2val+14063> "H\213\205P\377\377\377H\213P\020\213\205X\377\377\377H\230H\001\320", <incomplete sequence \306>, len = 8}, lr_val = {s = 0x7f7416d82010 "\001", len = 1058969728}, r2_val = {s = 0x55c40efdf05a "", len = 38 s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 1058969904}}, add_rm = 0x55c40d4f1edf <qm_info+46>, body_lumps = 0x7ffd3f1e98c0, reply_lump = 0x55c40d4f1edf <qm_info+46>, add_to_branch_s = "И\036?\375\177\000\000\020 \330\026t\177\000\000\000\231\036?\375\177\000\000\020 \330\026t\177\000\000\020\231\036?\375\177\000\000\374{\021\023t\177\000\000\000\000\000\020\000\000\000\000\000", add_to_branch_len = 0, hash_inde xflags = {21956, 1058969888}, set_global_address = {s = 0x7f7416d82010 "\001", len = 1320704}, set_global_port = {s = 0x7f7416d82010 "\001", len = 1058969952}, force_send_socket = 0x7f7413117bfc <pkg_proc_update_stats+115>, path_vec = {s = 0x7ffd3f s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 267114896}, reg_id = 898624, ruid = {s = 0x142670 <error: Cannot access memory at address 0x142670>, len = 1320704}, location_ua = {s = 0x8 <error: Cannot access memory at decoded = 1320704, rcv = {src_ip = {af = 1058970000, len = 32765, u = {addrl = {94300523474576, 0}, addr32 = {221523600, 21956, 0, 0}, addr16 = {11920, 3380, 21956, 0, 0, 0, 0, 0}, addr = "\220.4\r\304U\000\000\000\000\000\000\000\000\000"}}, d 8858370048, 384580592}, addr32 = {268435456, 2, 384580592, 0}, addr16 = {0, 4096, 2, 0, 15344, 5868, 0, 0}, addr = "\000\000\000\020\002\000\000\000\360;\354\026\000\000\000"}}, src_port = 39520, dst_port = 16158, proto_reserved1 = 3276 sa_family = 21956, sa_data = "\000\000`\232\036?\375\177\000\000)\214N\r"}, sin = {sin_family = 21956, sin_port = 0, sin_addr = {s_addr = 1058970208}, sin_zero = "\375\177\000\000)\214N\r"}, sin6 = {sin6_family = 21956, sin6_port = 0, sin __u6_addr8 = "\375\177\000\000)\214N\r\000\000\000\000\200\341a\r", __u6_addr16 = {32765, 0, 35881, 3406, 0, 0, 57728, 3425}, __u6_addr32 = {32765, 223251497, 0, 224518528}}}, sin6_scope_id = 21956}}, bind_address = 0xa350d4e908d, pro __func__ = "_reply_light" #23 0x00007f74126e2c18 in _reply (trans=0x7f73cb656528, p_msg=0x7f7416ea6bd8, code=202, reason=0x7ffd3f1e9ce0, lock=1) at t_reply.c:657 len = 490 buf = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co;tag=0b62483f"... dset = 0x6 <error: Cannot access memory at address 0x6> bm = {to_tag_val = {s = 0x7f7416ec4638 "0b62483f5ecbb3b7846ec4ead5977a30-e0e2\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985;rport=1795;received=88.88.88.88\r\nExpires: 3600\r\nContact: <sip:89.20"... dset_len = 1 #24 0x00007f74126ece31 in t_reply_str (t=0x7f73cb656528, p_msg=0x7f7416ea6bd8, code=202, reason=0x7ffd3f1e9ce0) at t_reply.c:1634 No locals. #25 0x00007f7412752825 in ki_t_reply (msg=0x7f7416ea6bd8, code=202, reason=0x7ffd3f1e9ce0) at tm.c:1354 t = 0x7f73cb656528 ret = -1 __func__ = "ki_t_reply" #26 0x00007f7412753027 in w_t_reply_wrp (msg=0x7f7416ea6bd8, code=202, txt=0x7f7416ec3d18 "OK") at tm.c:1411 reason = {s = 0x7f7416ec3d18 "OK", len = 2} #27 0x00007f741223a9f3 in send_reply (msg=0x7f7416ea6bd8, code=202, reason=0x7f740f9de460 <su_200_rpl>) at sl.c:287 r = 0x7f7416ec3d18 "OK" t = 0x7f73cb656528 ret = 1 __func__ = "send_reply" #28 0x00007f740f78fb30 in send_2XX_reply (msg=0x7f7416ea6bd8, reply_code=202, lexpire=3600, local_contact=0x7ffd3f1ea1e0) at subscribe.c:122 hdr_append = {s = 0x7f7416ec3840 "Expires: 3600\r\nContact: sip:77.77.77.77:5060;transport=tls\r\n", len = 65} tmp = {s = 0x7f7416ec387e ">\r\n", len = 4} t = 0x0 __func__ = "send_2XX_reply" #29 0x00007f740f7972fb in update_subscription (msg=0x7f7416ea6bd8, subs=0x7ffd3f1ea100, to_tag_gen=1, sent_reply=0x7ffd3f1e9f3c) at subscribe.c:659 hash_code = 260 __func__ = "update_subscription" #30 0x00007f740f79ed41 in handle_subscribe (msg=0x7f7416ea6bd8, watcher_user=..., watcher_domain=...) at subscribe.c:1207 to_tag_gen = 1 subs = {pres_uri = {s = 0x7f7416e850b8 "sip:427@mydomain.co.co", len = 33}, to_user = { s = 0x7f73cb428132 "427@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact: "813" <sip:813@192.168.128.64:1968;transport=tls"..., len = 3}, to s = 0x7f73cb428136 "mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact: "813" <sip:813@192.168.128.64:1968;transport=tls;reg"..., len = 25}, f s = 0x7f73cb4280fc "813@mydomain.co.co>;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nCon"..., len = 3}, fr s = 0x7f73cb428100 "mydomain.co.co>;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact"..., len = 25}, w s = 0x7f73cb4280fc "813@mydomain.co.co>;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nCon"..., len = 3}, wa s = 0x7f73cb428100 "mydomain.co.co>;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact"..., len = 25}, e to_tag = {s = 0x7f74129c5580 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-e0e2", len = 37}, from_tag = { s = 0x7f73cb42811f "e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact: "813" <sip:813@192.168.128.64"..., len = 8}, s = 0x7f73cb4280ae "5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968"..., len = 40}, s = 0x7f7416e9b650 "tls:77.77.77.77:5061", len = 23}, remote_cseq = 1, local_cseq = 0, contact = { s = 0x7f73cb4281d1 "sip:813@192.168.128.64:1968;transport=tls;registering_acc=mydomain_co_co>\r\nUser-Agent: Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length"..., len = 83}, s = 0x7f7416e42ff0 "sip:77.77.77.77:5060", len = 23}, record_route = {s = 0x0, len = 0}, expires = 3600, status = 1, reason = {s = 0x0, len = 0}, version = 0, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1, internal_updat user_agent = {s = 0x7f73cb428233 "Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 24}, next = 0x0} event = 0x7f73cb203820 parsed_event = 0x7f7416ec3678 ev_param = 0x0 found = 1 reason = {s = 0x0, len = 0} uri = {user = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, passwd = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, host = {s = 0x7ffd3f1ea390 "Ӓb\r\304U", len = 664247188}, port = {s = 0x1 <error: Cannot access memor s = 0x7ffd3f1e9fe0 "X\310\352\026t\177", len = 653991280}, sip_params = {s = 0x7ffd3f1ea340 "c\201B\313s\177", len = 664277466}, headers = {s = 0x0, len = 1}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x7f len = 384485464}, user_param = {s = 0xaf00000180 <error: Cannot access memory at address 0xaf00000180>, len = 2}, maddr = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, method = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, r2 = {s = 0x4cb425dc0 <error: Cannot access memory at address 0x4cb425dc0>, len = 224797680}, gr = {s = 0x7ffd3f1ea110 "2\201B\313s\177", len = 223251497}, transport_val = {s = 0x7ffd3f1ea110 "2\201B\313s\177", len = 384461784}, ttl_val = {s = 0x7f user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 224585237}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0xffffffffffffff <error: Cannot access memory at address 0xffffffffffffff>, len = 0}, r2_val = {s = 0x302e322f706973 <error: len = 0}, gr_val = {s = 0x4542495243534255 <error: Cannot access memory at address 0x4542495243534255>, len = 1917192717}} reply_code = 500 reply_str = {s = 0x7f740f7d1fcd "Server Internal Error", len = 21} sent_reply = 0 __func__ = "handle_subscribe" #31 0x00007f740f79ae4e in handle_subscribe0 (msg=0x7f7416ea6bd8) at subscribe.c:988 pfrom = 0x7f7416ec2920 __func__ = "handle_subscribe0" #32 0x000055c40d27284a in do_action (h=0x7ffd3f1ebee0, a=0x7f7416e73828, msg=0x7f7416ea6bd8) at core/action.c:1067 ret = -5 v = 224563923 dst = {send_sock = 0xfd8f150ba8ddb26f, to = {s = {sa_family = 45679, sa_data = "\235\020yq\375\251\000\000\000\000\000\000\000"}, sin = {sin_family = 45679, sin_port = 4253, sin_addr = {s_addr = 2851959161}, sin_zero = "\000\000\000\000\000\000\000"} sin6_flowinfo = 2851959161, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 1058973632}}, id = 32765, proto = 2 '\002', send_flags = {f = 0, b tmp = 0x7f7416ec4540 "\250\003" new_uri = 0x142700 <error: Cannot access memory at address 0x142700> end = 0x142448 <error: Cannot access memory at address 0x142448> crt = 0x1f7000000d7 <error: Cannot access memory at address 0x1f7000000d7> cmd = 0x7f7416e392b8 len = 117 user = 1 uri = {user = {s = 0x7f73cb4280e0 "SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d1"..., l len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffd3f1ea700 "\020\250\036?\375\177", len = 220724707}, params = {s = 0xfd8f150bad5db26f <error: Cannot access memory at addres s = 0x7f7416e84ec8 <incomplete sequence \350>, len = 384461784}, headers = {s = 0x7ffd3f1ea680 "Ӓb\r\304U", len = 223082760}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 384461784), transport = {s = 0x7f7416e72ce8 "\261\001", le len = 1073741824}, user_param = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, maddr = {s = 0x7ffd3f1ea6d0 "", len = 0}, method = {s = 0x7f7416eac768 "", len = 384461784}, lr = {s = 0x116e79fd8 <error: Cannot acces s = 0x7ffd3f1ea700 "\020\250\036?\375\177", len = 2}, gr = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, transport_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7ffd3f1ea810 "", len = 22072 len = 384461784}, maddr_val = {s = 0x7f7416e72ce8 "\261\001", len = 1058979552}, method_val = {s = 0x0, len = 1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = -1430408593}, r2_val = {s = 0x55c40d6292d3 "INFO", len = 10737 s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}} next_hop = {user = {s = 0x7f7416e805c8 "\001", len = 308869268}, passwd = {s = 0x55c40d66f540 "core", len = 2}, host = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, port = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6} len = 308954832}, sip_params = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 42256, proto = 16158, type = 32765, flags = (unknown: 384461784), tra s = 0xd6292d3 <error: Cannot access memory at address 0xd6292d3>, len = 384575776}, ttl = {s = 0x7f7416e32998 "\030\213G\021t\177", len = -884834063}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -887073664}, maddr = method = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2 = {s = 0x7ffd3f1ea5c0 "\260\253\036?\375\177", len = 309673662}, gr = {s = 0x7ffd3f1ea590 "\240\246\036?\ len = 384461784}, ttl_val = {s = 0x7f7412457a23 <trim+36> "\220\311\303UH\211\345AWAVAUATSH\203\354\030\350\244g\377\377\211Eȃ", <incomplete sequence \310>, len = 384485104}, user_param_val = {s = 0x7ffd3f1ea6a0 "Ц\036?\375\177", len = 2}, maddr_ method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {s = 0x7ffd3f1eabb0 "\220\254\036?\375\177", len = 220670026}, r2_val = { s = 0x7f73cb42811f "e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact: "813" <sip:813@192.168.128.64"..., len = 8}, s = 0x7f73cb4280de "1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: sip:427@mydomain.co.co\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008"..., len = 1}} u = 0x0 port = 0 dst_host = 0x2 i = 223082933 flags = 1 avp = 0x7ffd3f1eaa40 st = {flags = 1058972784, id = 32765, name = {n = 308866726, s = {s = 0x7f741268eea6 <futex_release+29> "\211E\374\203}\374\002\017\224\300\017\266\300H\205\300t6H\213E\350H\203\354\bj", len = 384461784}, re = 0x7f741268eea6 <futex_release+29>}, avp sct = 0x10000000 sjt = 0x0 rve = 0x10000000 mct = 0x7f73cb273a83 rv = 0x7f74126a135c <init_rb+186> rv1 = 0x6 c1 = {cache_type = 3410330408, val_type = 32627, c = {avp_val = {n = 2, s = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 224563923}, re = 0x2}, pval = {rs = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 224563923}, ri = i2s = "\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\260\244\036?\375\177"} s = {s = 0x7ffd3f1ea4b0 "P\245\036?\375\177", len = 384461784} srevp = {0x7f7416ea6dd8, 0x7f73cb656650} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {t s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, l type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTY len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #33 0x000055c40d27fde3 in run_actions (h=0x7ffd3f1ebee0, a=0x7f7416e73828, msg=0x7f7416ea6bd8) at core/action.c:1569 t = 0x7f7416e73828 ret = -1 tvb = {tv_sec = 140725662427664, tv_usec = 94300525009117} tve = {tv_sec = 268435456, tv_usec = 6} tz = {tz_minuteswest = 1073741824, tz_dsttime = 0} tdiff = 1058975120 __func__ = "run_actions" #34 0x000055c40d2727b6 in do_action (h=0x7ffd3f1ebee0, a=0x7f7416e73bb0, msg=0x7f7416ea6bd8) at core/action.c:1058 ret = 1 v = 1 dst = {send_sock = 0xfd8f150bbebdb26f, to = {s = {sa_family = 45679, sa_data = "\235\020yq\375\251\000\000\000\000\000\000\000"}, sin = {sin_family = 45679, sin_port = 4253, sin_addr = {s_addr = 2851959161}, sin_zero = "\000\000\000\000\000\000\000"} sin6_flowinfo = 2851959161, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 384322832}}, id = 32628, proto = 2 '\002', send_flags = {f = 0, bl tmp = 0x0 new_uri = 0x0 end = 0x0 crt = 0x0 cmd = 0x7f7416e72068 len = 0 user = 6 uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffd3f1eadd0 "\340\256\036?\375\177", len = 220724707}, para s = 0xfd8f150bb33db26f <error: Cannot access memory at address 0xfd8f150bb33db26f>, len = 278770287}, sip_params = {s = 0x55c400000000 <error: Cannot access memory at address 0x55c400000000>, len = 0}, headers = {s = 0x55c40d65eb78 <__func__.7457 proto = 5868, type = 32628, flags = (unknown: 384461784), transport = {s = 0x7f7416e71e28 "\256\001", len = 1058975232}, ttl = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, user_param = {s = 0x10000000 <error: Cannot access memory at address 0x100 len = 383262736}, method = {s = 0x3a8 <error: Cannot access memory at address 0x3a8>, len = 384582976}, lr = {s = 0xffffffffcb428254 <error: Cannot access memory at address 0xffffffffcb428254>, len = 0}, r2 = {s = 0x7ffd3f1eae90 "Я\036?\375\177", len = 1073741824}, transport_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7ffd3f1eaee0 "Я\036?\375\177", len = 220726455}, user_param_val = {s = 0x7f7416ea6bd8 "\317\001", len = 384461784}, len = 1058979552}, method_val = {s = 0x0, len = -1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = -1088572817}, r2_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, gr_val = {s = 0x10000000 <error: Cannot access memory next_hop = {user = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, passwd = {s = 0x7ffd3f1eac20 "\220\254\036?\375\177", len = 299523129}, host = {s = 0x7ffd3f1eb360 "p\264\036?\375\177", len = 1058975560}, port = {s = s = 0x1500000000 <error: Cannot access memory at address 0x1500000000>, len = 2}, sip_params = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 44176 flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 220724704), transport = {s = 0x13 <error: Cannot access memory at address 0x13>, len = 0}, ttl = {s = 0x7f7416e32998 "\030\213G\021t\177", len = 24}, user_param = {s = 0x0, len = 384305424 method = {s = 0x7f7416e706d8 "\251\001", len = 1058974912}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2 = {s = 0x7ffd3f1eac90 "\240\255\036?\375\177", len = 222477392}, gr = {s = 0x0, len = 223289055}, tra ttl_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, user_param_val = {s = 0x7ffd3f1eacc0 "", len = 2}, maddr_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot acc s = 0x7ffd3f1eada0 "\220\256\036?\375\177", len = 220726455}, r2_val = {s = 0x142700 <error: Cannot access memory at address 0x142700>, len = 384461784}, gr_val = {s = 0x7f7416e706d8 "\251\001", len = 1058979552}} u = 0x10000000 port = 0 dst_host = 0x2 i = 223082933 flags = 0 avp = 0x7ffd3f1eb110 st = {flags = 0, id = 0, name = {n = -884833634, s = {s = 0x7f73cb42829e "\r\n", len = 0}, re = 0x7f73cb42829e}, avp = 0x2} sct = 0x7ffd3f1eaf70 sjt = 0x6 rve = 0x7f7416e72f20 mct = 0x10000000 rv = 0x7f73cb4282a0 rv1 = 0x6 c1 = {cache_type = 4294967295, val_type = 4294967295, c = {avp_val = {n = 384461784, s = {s = 0x7f7416ea6bd8 "\317\001", len = 1058974628}, re = 0x7f7416ea6bd8}, pval = {rs = {s = 0x7f7416ea6bd8 "\317\001", len = 1058974628}, ri = 1058974632, flags = i2s = "0\342\346\026t\177\000\000\330k\352\026t\177\000\000\330\340&\313s\177"} s = {s = 0x7ffd3f1eaaf0 "0\342\346\026t\177", len = 367430969} srevp = {0x7ffd3f1eaaf0, 0x7f7415d67c02 <BIO_write+58>} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {t s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, l type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTY len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #35 0x000055c40d27fde3 in run_actions (h=0x7ffd3f1ebee0, a=0x7f7416e73bb0, msg=0x7f7416ea6bd8) at core/action.c:1569 t = 0x7f7416e73bb0 ret = -1 tvb = {tv_sec = 0, tv_usec = 140136577395672} tve = {tv_sec = 140725662429408, tv_usec = 0} tz = {tz_minuteswest = 302033795, tz_dsttime = 32628} tdiff = 1 __func__ = "run_actions" #36 0x000055c40d27280c in do_action (h=0x7ffd3f1ebee0, a=0x7f7416e73d00, msg=0x7f7416ea6bd8) at core/action.c:1062 ret = 1 v = 0 dst = {send_sock = 0xfd8f150b831db26f, to = {s = {sa_family = 45679, sa_data = "\235\020yq\375\251\000\000\000\000\000\000\000"}, sin = {sin_family = 45679, sin_port = 4253, sin_addr = {s_addr = 2851959161}, sin_zero = "\000\000\000\000\000\000\000"} sin6_flowinfo = 2851959161, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 224563923}}, id = 21956, proto = 2 '\002', send_flags = {f = 0, bl tmp = 0x1 <error: Cannot access memory at address 0x1> new_uri = 0x7f7411b2b2a5 <_ul_sruid+5> "5cb9871b-29cb-" end = 0x7f74168f3e84 "H\205\300H\211\303\017\205\070\376\377\377\061\300\351\363\376\377\377\350D\216\377\377\017\037@" crt = 0x7ffd3f1eb6f0 "" cmd = 0x7f7416e288b8 len = 21956 user = 250613444 uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffd3f1eb4a0 "\260\265\036?\375\177", len = 220724707}, para s = 0xfd8f150b819db26f <error: Cannot access memory at address 0xfd8f150b819db26f>, len = 278770287}, sip_params = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, headers = {s = 0x7f741331d2e5 <_kex_ port_no = 65535, proto = 65535, type = 32628, flags = (unknown: 384461784), transport = {s = 0x7f7416e4c3e8 "\035\001", len = 1058976976}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 24}, maddr = {s = 0x7ffd3f1ebae0 "\020\273\036?\375\17 s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 223289055}, lr = {s = 0x13f1eb4a0 <error: Cannot access memory at address 0x13f1eb4a0>, len = 0}, r2 = {s = 0x7ffd3f1eb560 "\240\266\036?\375\177", len = 2}, gr = {s = 0x s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7ffd3f1eb5b0 "\240\266\036?\375\177", len = 220726455}, user_param_val = {s = 0x7f7416ea6bd8 "\317\001", len = 384461784}, maddr_val = {s = 0x7f7416e4c len = 1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = -1912753553}, r2_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, gr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}} next_hop = {user = {s = 0x7ffd3f1eb2c0 "л\036?\375\177", len = 0}, passwd = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 14}, host = {s = 0x7f7412f00512 "%x%c%x%c", len = 4}, port = {s = 0x7f741331d2e5 <_kex_sruid+5> "5cb9871b-29c s = 0x7f741331d2e5 <_kex_sruid+5> "5cb9871b-29cb-", len = 2}, sip_params = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 45920, proto = 16158, typ flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 220724704), transport = {s = 0x7ffd3f1eb930 "p\271\036?\375\177", len = 1058977904}, ttl = {s = 0x7f7416e32998 "\030\213G\021t\177", len = 654147750}, user_param = {s = 0x11c00000000 <erro len = 0}, maddr = {s = 0x7ffd3f1ebbd0 "\205\060T\031\244\064\240", <incomplete sequence \350>, len = 384461784}, method = {s = 0x7f7416e493a8 "\017\001", len = 1058976656}, lr = {s = 0x55c40efc57e0 "\200V\356\016\304U", len = 378486404}, r2 = { s = 0x3939363031ffffff <error: Cannot access memory at address 0x3939363031ffffff>, len = 1058977952}, gr = {s = 0x7ffd3f1eb340 "Ӓb\r\304U", len = 1058976576}, transport_val = {s = 0x42 <error: Cannot access memory at address 0x42>, len = 3099581 s = 0xffffffff3f1eb4a8 <error: Cannot access memory at address 0xffffffff3f1eb4a8>, len = 0}, user_param_val = {s = 0x7f74129c5330 <callid_buf+16> "-10699@77.77.77.77", len = 2}, maddr_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, metho s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {s = 0x7ffd3f1eb470 "`\265\036?\375\177", len = 220726455}, r2_val = {s = 0x7f74129c5372 <callid_buf+82> "", len = 384461784}, gr_val = {s = 0x7f7416e493a8 "\0 u = 0x8050 port = 0 dst_host = 0x2 i = 223082933 flags = 32628 avp = 0x7ffd3f1eb7e0 st = {flags = 0, id = 14642, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x7ffd3f1eb220} sct = 0x7ffd3f1eb5f0 sjt = 0x7f7412737116 <child_init_callid+932> rve = 0x7f7416e72060 mct = 0x7ffd3f1e0000 rv = 0xffffffffffffffff rv1 = 0x6 c1 = {cache_type = 1058976328, val_type = 32765, c = {avp_val = {n = 16, s = {s = 0x7ffd00000010 <error: Cannot access memory at address 0x7ffd00000010>, len = 1058976368}, re = 0x7ffd00000010}, pval = {rs = {s = 0x7ffd00000010 <error: Cannot access ri = 120, flags = 0}}, i2s = '\000' <repeats 12 times>, "\375\177\000\000\000\000\000\000t\177"} s = {s = 0x7ffd3f1eb6a8 "\265\371K\r\304U", len = 10699} srevp = {0x7f740b69df84, 0x900000010} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {t s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, l type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTY len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #37 0x000055c40d27fde3 in run_actions (h=0x7ffd3f1ebee0, a=0x7f7416e6d418, msg=0x7f7416ea6bd8) at core/action.c:1569 t = 0x7f7416e73d00 ret = 1 tvb = {tv_sec = 140136850624832, tv_usec = 140136847156409} tve = {tv_sec = 140136577427424, tv_usec = 140136577395672} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 384493536 __func__ = "run_actions" #38 0x000055c40d26efc5 in do_action (h=0x7ffd3f1ebee0, a=0x7f7416e4d2c0, msg=0x7f7416ea6bd8) at core/action.c:691 ret = -5 v = 1 dst = {send_sock = 0x10000000, to = {s = {sa_family = 59024, sa_data = "\353\017\000\000\000\000@\251\r\000\000\000\000"}, sin = {sin_family = 59024, sin_port = 4075, sin_addr = {s_addr = 0}, sin_zero = "@\251\r\000\000\000\000"}, sin6 = {sin6_family sin6_addr = {__in6_u = {__u6_addr8 = "@\251\r\000\000\000\000\000p\031\024\000\000\000\000", __u6_addr16 = {43328, 13, 0, 0, 6512, 20, 0, 0}, __u6_addr32 = {895296, 0, 1317232, 0}}}, sin6_scope_id = 1320704}}, id = 0, proto = 8 '\b', send_flags tmp = 0x2 <error: Cannot access memory at address 0x2> new_uri = 0x40 <error: Cannot access memory at address 0x40> end = 0x7f7416d82010 "\001" crt = 0x7ffd3f1ebe44 "t\177" cmd = 0x7f7416e32688 len = 32627 user = -884833634 uri = {user = {s = 0x7ffd3f1ebaa0 "", len = 383262736}, passwd = {s = 0x7f74270d0da0 <__memcpy_ssse3+7728> "f\213V\376f\211W\376\303\017\037\200", len = 383262736}, host = {s = 0x7ffd3f1ebae0 "\020\273\036?\375\177", len = 319912956}, port = { s = 0x853f1ebb00 <error: Cannot access memory at address 0x853f1ebb00>, len = 0}, params = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 267118672}, sip_params = {s = 0x4000da780 <error: Cannot access memory at addres s = 0x142700 <error: Cannot access memory at address 0x142700>, len = 8}, port_no = 48064, proto = 16158, type = 32765, flags = (URI_SIP_USER_PHONE | unknown: 223457136), transport = {s = 0x7ffd3f1ebb10 "\310\005\350\026t\177", len = 221523600}, s = 0x7ffd3f1ebbc0 " \274\036?\375\177", len = 223251497}, maddr = {s = 0x7f7416e805c8 "\001", len = 384323272}, method = {s = 0x7ffd3f1ebc12 "", len = 1058978835}, lr = {s = 0x7f73cb4282a0 "", len = -884833929}, r2 = {s = 0x55c40d673e50 <__func_ s = 0x40 <error: Cannot access memory at address 0x40>, len = 383262736}, transport_val = {s = 0x4040404040404040 <error: Cannot access memory at address 0x4040404040404040>, len = 1}, ttl_val = {s = 0x3c5a5a5a5a <error: Cannot access memory at a user_param_val = {s = 0x520202020202020 <error: Cannot access memory at address 0x520202020202020>, len = -884833632}, maddr_val = {s = 0x7ffd3f1ebc00 "", len = 223289055}, method_val = {s = 0x7ffd3f1ebbe0 "", len = 383262736}, lr_val = {s = 0x7f73 s = 0x7ffd3f1ebc20 "P\274\036?\375\177", len = 319912956}, gr_val = {s = 0xe8a034a419543085 <error: Cannot access memory at address 0xe8a034a419543085>, len = 0}} next_hop = {user = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 666454672}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, host = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 666435952}, port s = 0x43f1ebea0 <error: Cannot access memory at address 0x43f1ebea0>, len = 317719835}, params = {s = 0x0, len = 666436808}, sip_params = {s = 0x7ffd3f1eb970 "`\312\372&t\177", len = 2}, headers = {s = 0x7f7427b90170 "", len = 1058978144}, port_n flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 2822930836), transport = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 96}, ttl = {s = 0x7f7426faca60 "\306J", len = 666451760}, user_param = {s = 0x0, len = 0 s = 0x6e0000005b <error: Cannot access memory at address 0x6e0000005b>, len = 657705728}, method = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 1058978392}, lr = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 2506191 s = 0x20030 <error: Cannot access memory at address 0x20030>, len = 227340920}, transport_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, ttl_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, user_param_val len = 664247188}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, method_val = {s = 0x7f73cb4190e4 "t\177", len = 653970016}, lr_val = {s = 0x7ffd3f1ebdc0 "", len = 664277466}, r2_val = {s = 0x7ffd3f1ebef0 "\002", len s = 0x1 <error: Cannot access memory at address 0x1>, len = 223289055}} u = 0x0 port = 0 dst_host = 0x7f7416ea6bd8 i = 5 flags = 32628 avp = 0x7f7416e85010 st = {flags = 1058978304, id = 32765, name = {n = 666454672, s = {s = 0x7f7427b94a90 "< $\r\304U", len = 1}, re = 0x7f7427b94a90}, avp = 0x0} sct = 0x7ffd3f1ebd20 sjt = 0x16d823d0 rve = 0x7f7416e4c620 mct = 0x810000000 rv = 0x7f7427b904c8 rv1 = 0x7f7416ea6bd8 c1 = {cache_type = 666454568, val_type = 32628, c = {avp_val = {n = 7, s = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1058978312}, re = 0x7}, pval = {rs = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1058978312}, ri i2s = "-", '\000' <repeats 15 times>, "@\277\036?\375\177"} s = {s = 0x7ffd3f1eb894 "", len = 1058978144} srevp = {0x7ffd3f1eb970, 0x7f7426fa6d90} evp = {data = 0x0, rcv = 0x0, dst = 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {t s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, l type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTY len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #39 0x000055c40d27fde3 in run_actions (h=0x7ffd3f1ebee0, a=0x7f7416e474e8, msg=0x7f7416ea6bd8) at core/action.c:1569 t = 0x7f7416e4d2c0 ret = 1 tvb = {tv_sec = 140725662432912, tv_usec = 140136577263320} tve = {tv_sec = 140136577117680, tv_usec = 140136577395672} tz = {tz_minuteswest = 1058979648, tz_dsttime = 32765} tdiff = 2 __func__ = "run_actions" #40 0x000055c40d28057f in run_top_route (a=0x7f7416e474e8, msg=0x7f7416ea6bd8, c=0x0) at core/action.c:1654 ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {2, -175898720873893265, 94300526514899, 1073741824, 268435456, 6, -175898720779521425, -6197672747408182673}, __mask_was_saved = 0, __saved_mask = {__val = {6192449487634431 4611686022990790656, 140136577395672, 140725662433232, 94300523556965, 4679429112, 140136577395672, 94301375692801, 0, 268435456, 2, 94300526514899}}}}} p = 0x7ffd3f1ebee0 ret = 268435456 sfbk = 0 #41 0x000055c40d3db2ce in receive_msg (buf=0x7f73cb428070 "SUBSCRIBE sip:427@mydomain.co.co SIP/2.0\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: at core/receive.c:427 msg = 0x7f7416ea6bd8 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 2, jmp_env = {{__jmpbuf = {94300526514899, 1073741824, 268435456, 6, 140725662433744, 94300524684824, 9, 140136846889408}, __mask_was_saved = 1058981040, __saved_mask = {__val = {140135308098936, 1401 9, 140135308099706, 33, 140135308099740, 7, 64, 0, 140135308116184, 2632814952448, 16383, 140135308036592}}}}} bctx = 0x230 ret = 32627 stats_on = 0 tvb = {tv_sec = 219043332096, tv_usec = 140135308099747} tve = {tv_sec = 0, tv_usec = 140135308100256} tz = {tz_minuteswest = -884834182, tz_dsttime = 32627} diff = 0 inb = {s = 0x7f73cb428070 "SUBSCRIBE sip:427@mydomain.co.co SIP/2.0\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\r\nTo: <sip:427@de"..., len = 5 netinfo = {data = {s = 0x2020202020202020 <error: Cannot access memory at address 0x2020202020202020>, len = 538976288}, rcv = 0xff, dst = 0x7f73cb4280a5} keng = 0x0 evp = {data = 0x7ffd3f1ec060, rcv = 0x7f73cb427d90, dst = 0x0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 exectime = 0 __func__ = "receive_msg" #42 0x000055c40d4754bc in receive_tcp_msg (tcpbuf=0x7f73cb428070 "SUBSCRIBE sip:427@mydomain.co.co SIP/2.0\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: "813" sip:813@mydomain.co.co;tag=e56f79f4\ con=0x7f73cb427d78) at core/tcp_read.c:1399 buf = 0x0 bsize = 0 blen = 560 __func__ = "receive_tcp_msg" #43 0x000055c40d477ac4 in tcp_read_req (con=0x7f73cb427d78, bytes_read=0x7ffd3f1ec450, read_flags=0x7ffd3f1ec448) at core/tcp_read.c:1631 bytes = 560 total_bytes = 560 resp = 1 size = 0 req = 0x7f73cb427df8 dst = {send_sock = 0x7ffd3f1ec440, to = {s = {sa_family = 32360, sa_data = "B\313s\177\000\000\000\000\000\000\001 \000"}, sin = {sin_family = 32360, sin_port = 52034, sin_addr = {s_addr = 32627}, sin_zero = "\000\000\000\000\001 \000"}, sin6 = {sin6 sin6_flowinfo = 32627, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\001 \000\000x\363\352\026t\177\000", __u6_addr16 = {0, 0, 8193, 0, 62328, 5866, 32628, 0}, __u6_addr32 = {0, 8193, 384496504, 32628}}}, sin6_scope_id = 1058980624}}, blst_imask = 80}} c = 13 '\r' ret = 0 __func__ = "tcp_read_req" #44 0x000055c40d47b621 in handle_io (fm=0x7f7416eaf378, events=1, idx=-1) at core/tcp_read.c:1862 ret = 0 n = 21956 read_flags = 1 con = 0x7f73cb427d78 s = 0 resp = 1 t = 80 __func__ = "handle_io" #45 0x000055c40d468524 in io_wait_loop_epoll (h=0x55c40d94c440 <io_w>, t=2, repeat=0) at core/io_wait.h:1062 n = 1 r = 0 fm = 0x7f7416eaf378 revents = 1 __func__ = "io_wait_loop_epoll" #46 0x000055c40d47c9ce in tcp_receive_loop (unix_sock=28) at core/tcp_read.c:1974 __func__ = "tcp_receive_loop" #47 0x000055c40d329f60 in tcp_init_children () at core/tcp_main.c:5086 r = 0 i = 7 reader_fd_1 = 28 pid = 0 si_desc = "tcp receiver (generic)\000\000\006\000\000\000\000\000\000\000\200\306\036?\375\177\000\000DK7\r\304U\000\000\260\306\036?\375\177\000\000m\002\070\r\001", '\000' <repeats 11 times>, "\004HC\r\000\000\000\000ѻc\r\000\000\000\000\310\300\34000\000\000\000\024\000\000\000\025\000\000\000\000r\b't\177\000" si = 0x0 __func__ = "tcp_init_children" #48 0x000055c40d25e1a9 in main_loop () at main.c:1750 i = 8 pid = 10667 si = 0x0 si_desc = "udp receiver child=7 sock=77.77.77.77:5060 (77.77.77.77:5060)\000\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\217r\b't\177\000\000@\307\036?\375\177\000\000\060\000\000\000\060\000\000\000 \310\036 nrprocs = 8 woneinit = 1 __func__ = "main_loop" #49 0x000055c40d265430 in main (argc=13, argv=0x7ffd3f1ecac8) at main.c:2737 cfg_stream = 0x55c40eee0010 c = -1 r = 0 tmp = 0x7ffd3f1ede06 "" tmp_len = 32765 port = 1058982144 proto = 32628 options = 0x55c40d5de600 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 42281687 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0xffffffff p = 0xd <error: Cannot access memory at address 0xd> st = {st_dev = 18, st_ino = 210785, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1555662619, tv_nsec = 581870842}, st_mtim = {tv_sec = 1555662619, tv_nsec = 581870842}, __glibc_reserved = {0, 0, 0}} option_index = 0 long_options = {{name = 0x55c40d5e0aea "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55c40d5daf29 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55c40d5e0aef "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x0, has_arg = 0, __func__ = "main" ```
disas aesni_ecb_encrypt ``` (gdb) disas aesni_ecb_encrypt Dump of assembler code for function aesni_ecb_encrypt: 0x00007f7415d369e0 <+0>: and $0xfffffffffffffff0,%rdx 0x00007f7415d369e4 <+4>: je 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d369ea <+10>: mov 0xf0(%rcx),%eax 0x00007f7415d369f0 <+16>: movups (%rcx),%xmm0 0x00007f7415d369f3 <+19>: mov %rcx,%r11 0x00007f7415d369f6 <+22>: mov %eax,%r10d 0x00007f7415d369f9 <+25>: test %r8d,%r8d 0x00007f7415d369fc <+28>: je 0x7f7415d36c50 <aesni_ecb_encrypt+624> 0x00007f7415d36a02 <+34>: cmp $0x80,%rdx 0x00007f7415d36a09 <+41>: jb 0x7f7415d36af7 <aesni_ecb_encrypt+279> 0x00007f7415d36a0f <+47>: movdqu (%rdi),%xmm2 0x00007f7415d36a13 <+51>: movdqu 0x10(%rdi),%xmm3 0x00007f7415d36a18 <+56>: movdqu 0x20(%rdi),%xmm4 0x00007f7415d36a1d <+61>: movdqu 0x30(%rdi),%xmm5 0x00007f7415d36a22 <+66>: movdqu 0x40(%rdi),%xmm6 0x00007f7415d36a27 <+71>: movdqu 0x50(%rdi),%xmm7 0x00007f7415d36a2c <+76>: movdqu 0x60(%rdi),%xmm8 0x00007f7415d36a32 <+82>: movdqu 0x70(%rdi),%xmm9 0x00007f7415d36a38 <+88>: lea 0x80(%rdi),%rdi 0x00007f7415d36a3f <+95>: sub $0x80,%rdx 0x00007f7415d36a46 <+102>: jmp 0x7f7415d36aae <aesni_ecb_encrypt+206> 0x00007f7415d36a48 <+104>: nopl 0x0(%rax,%rax,1) 0x00007f7415d36a50 <+112>: movups %xmm2,(%rsi) 0x00007f7415d36a53 <+115>: mov %r11,%rcx 0x00007f7415d36a56 <+118>: movdqu (%rdi),%xmm2 0x00007f7415d36a5a <+122>: mov %r10d,%eax 0x00007f7415d36a5d <+125>: movups %xmm3,0x10(%rsi) 0x00007f7415d36a61 <+129>: movdqu 0x10(%rdi),%xmm3 0x00007f7415d36a66 <+134>: movups %xmm4,0x20(%rsi) 0x00007f7415d36a6a <+138>: movdqu 0x20(%rdi),%xmm4 0x00007f7415d36a6f <+143>: movups %xmm5,0x30(%rsi) 0x00007f7415d36a73 <+147>: movdqu 0x30(%rdi),%xmm5 0x00007f7415d36a78 <+152>: movups %xmm6,0x40(%rsi) 0x00007f7415d36a7c <+156>: movdqu 0x40(%rdi),%xmm6 0x00007f7415d36a81 <+161>: movups %xmm7,0x50(%rsi) 0x00007f7415d36a85 <+165>: movdqu 0x50(%rdi),%xmm7 0x00007f7415d36a8a <+170>: movups %xmm8,0x60(%rsi) 0x00007f7415d36a8f <+175>: movdqu 0x60(%rdi),%xmm8 0x00007f7415d36a95 <+181>: movups %xmm9,0x70(%rsi) 0x00007f7415d36a9a <+186>: lea 0x80(%rsi),%rsi 0x00007f7415d36aa1 <+193>: movdqu 0x70(%rdi),%xmm9 0x00007f7415d36aa7 <+199>: lea 0x80(%rdi),%rdi 0x00007f7415d36aae <+206>: callq 0x7f7415d367c0 <_aesni_encrypt8> 0x00007f7415d36ab3 <+211>: sub $0x80,%rdx 0x00007f7415d36aba <+218>: jae 0x7f7415d36a50 <aesni_ecb_encrypt+112> 0x00007f7415d36abc <+220>: movups %xmm2,(%rsi) 0x00007f7415d36abf <+223>: mov %r11,%rcx 0x00007f7415d36ac2 <+226>: movups %xmm3,0x10(%rsi) 0x00007f7415d36ac6 <+230>: mov %r10d,%eax 0x00007f7415d36ac9 <+233>: movups %xmm4,0x20(%rsi) 0x00007f7415d36acd <+237>: movups %xmm5,0x30(%rsi) 0x00007f7415d36ad1 <+241>: movups %xmm6,0x40(%rsi) 0x00007f7415d36ad5 <+245>: movups %xmm7,0x50(%rsi) 0x00007f7415d36ad9 <+249>: movups %xmm8,0x60(%rsi) 0x00007f7415d36ade <+254>: movups %xmm9,0x70(%rsi) 0x00007f7415d36ae3 <+259>: lea 0x80(%rsi),%rsi 0x00007f7415d36aea <+266>: add $0x80,%rdx 0x00007f7415d36af1 <+273>: je 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36af7 <+279>: movups (%rdi),%xmm2 0x00007f7415d36afa <+282>: cmp $0x20,%rdx 0x00007f7415d36afe <+286>: jb 0x7f7415d36b70 <aesni_ecb_encrypt+400> 0x00007f7415d36b00 <+288>: movups 0x10(%rdi),%xmm3 0x00007f7415d36b04 <+292>: je 0x7f7415d36ba0 <aesni_ecb_encrypt+448> 0x00007f7415d36b0a <+298>: movups 0x20(%rdi),%xmm4 0x00007f7415d36b0e <+302>: cmp $0x40,%rdx 0x00007f7415d36b12 <+306>: jb 0x7f7415d36bc0 <aesni_ecb_encrypt+480> 0x00007f7415d36b18 <+312>: movups 0x30(%rdi),%xmm5 0x00007f7415d36b1c <+316>: je 0x7f7415d36be0 <aesni_ecb_encrypt+512> 0x00007f7415d36b22 <+322>: movups 0x40(%rdi),%xmm6 0x00007f7415d36b26 <+326>: cmp $0x60,%rdx 0x00007f7415d36b2a <+330>: jb 0x7f7415d36c00 <aesni_ecb_encrypt+544> 0x00007f7415d36b30 <+336>: movups 0x50(%rdi),%xmm7 0x00007f7415d36b34 <+340>: je 0x7f7415d36c20 <aesni_ecb_encrypt+576> 0x00007f7415d36b3a <+346>: movdqu 0x60(%rdi),%xmm8 0x00007f7415d36b40 <+352>: xorps %xmm9,%xmm9 0x00007f7415d36b44 <+356>: callq 0x7f7415d367c0 <_aesni_encrypt8> 0x00007f7415d36b49 <+361>: movups %xmm2,(%rsi) 0x00007f7415d36b4c <+364>: movups %xmm3,0x10(%rsi) 0x00007f7415d36b50 <+368>: movups %xmm4,0x20(%rsi) 0x00007f7415d36b54 <+372>: movups %xmm5,0x30(%rsi) 0x00007f7415d36b58 <+376>: movups %xmm6,0x40(%rsi) 0x00007f7415d36b5c <+380>: movups %xmm7,0x50(%rsi) 0x00007f7415d36b60 <+384>: movups %xmm8,0x60(%rsi) 0x00007f7415d36b65 <+389>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36b6a <+394>: nopw 0x0(%rax,%rax,1) 0x00007f7415d36b70 <+400>: movups (%rcx),%xmm0 0x00007f7415d36b73 <+403>: movups 0x10(%rcx),%xmm1 0x00007f7415d36b77 <+407>: lea 0x20(%rcx),%rcx 0x00007f7415d36b7b <+411>: xorps %xmm0,%xmm2 0x00007f7415d36b7e <+414>: aesenc %xmm1,%xmm2 0x00007f7415d36b83 <+419>: dec %eax 0x00007f7415d36b85 <+421>: movups (%rcx),%xmm1 0x00007f7415d36b88 <+424>: lea 0x10(%rcx),%rcx 0x00007f7415d36b8c <+428>: jne 0x7f7415d36b7e <aesni_ecb_encrypt+414> 0x00007f7415d36b8e <+430>: aesenclast %xmm1,%xmm2 0x00007f7415d36b93 <+435>: movups %xmm2,(%rsi) 0x00007f7415d36b96 <+438>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36b9b <+443>: nopl 0x0(%rax,%rax,1) 0x00007f7415d36ba0 <+448>: callq 0x7f7415d36340 <_aesni_encrypt2> 0x00007f7415d36ba5 <+453>: movups %xmm2,(%rsi) 0x00007f7415d36ba8 <+456>: movups %xmm3,0x10(%rsi) 0x00007f7415d36bac <+460>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36bb1 <+465>: nopl 0x0(%rax,%rax,1) 0x00007f7415d36bb6 <+470>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36bc0 <+480>: callq 0x7f7415d36400 <_aesni_encrypt3> 0x00007f7415d36bc5 <+485>: movups %xmm2,(%rsi) 0x00007f7415d36bc8 <+488>: movups %xmm3,0x10(%rsi) 0x00007f7415d36bcc <+492>: movups %xmm4,0x20(%rsi) 0x00007f7415d36bd0 <+496>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36bd5 <+501>: nop 0x00007f7415d36bd6 <+502>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36be0 <+512>: callq 0x7f7415d364e0 <_aesni_encrypt4> 0x00007f7415d36be5 <+517>: movups %xmm2,(%rsi) 0x00007f7415d36be8 <+520>: movups %xmm3,0x10(%rsi) 0x00007f7415d36bec <+524>: movups %xmm4,0x20(%rsi) 0x00007f7415d36bf0 <+528>: movups %xmm5,0x30(%rsi) 0x00007f7415d36bf4 <+532>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36bf9 <+537>: nopl 0x0(%rax) 0x00007f7415d36c00 <+544>: xorps %xmm7,%xmm7 0x00007f7415d36c03 <+547>: callq 0x7f7415d36600 <_aesni_encrypt6> 0x00007f7415d36c08 <+552>: movups %xmm2,(%rsi) 0x00007f7415d36c0b <+555>: movups %xmm3,0x10(%rsi) 0x00007f7415d36c0f <+559>: movups %xmm4,0x20(%rsi) 0x00007f7415d36c13 <+563>: movups %xmm5,0x30(%rsi) 0x00007f7415d36c17 <+567>: movups %xmm6,0x40(%rsi) 0x00007f7415d36c1b <+571>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36c20 <+576>: callq 0x7f7415d36600 <_aesni_encrypt6> 0x00007f7415d36c25 <+581>: movups %xmm2,(%rsi) 0x00007f7415d36c28 <+584>: movups %xmm3,0x10(%rsi) 0x00007f7415d36c2c <+588>: movups %xmm4,0x20(%rsi) 0x00007f7415d36c30 <+592>: movups %xmm5,0x30(%rsi) 0x00007f7415d36c34 <+596>: movups %xmm6,0x40(%rsi) 0x00007f7415d36c38 <+600>: movups %xmm7,0x50(%rsi) 0x00007f7415d36c3c <+604>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36c41 <+609>: nopl 0x0(%rax,%rax,1) 0x00007f7415d36c46 <+614>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36c50 <+624>: cmp $0x80,%rdx 0x00007f7415d36c57 <+631>: jb 0x7f7415d36d6d <aesni_ecb_encrypt+909> 0x00007f7415d36c5d <+637>: movdqu (%rdi),%xmm2 0x00007f7415d36c61 <+641>: movdqu 0x10(%rdi),%xmm3 0x00007f7415d36c66 <+646>: movdqu 0x20(%rdi),%xmm4 0x00007f7415d36c6b <+651>: movdqu 0x30(%rdi),%xmm5 0x00007f7415d36c70 <+656>: movdqu 0x40(%rdi),%xmm6 0x00007f7415d36c75 <+661>: movdqu 0x50(%rdi),%xmm7 0x00007f7415d36c7a <+666>: movdqu 0x60(%rdi),%xmm8 0x00007f7415d36c80 <+672>: movdqu 0x70(%rdi),%xmm9 0x00007f7415d36c86 <+678>: lea 0x80(%rdi),%rdi 0x00007f7415d36c8d <+685>: sub $0x80,%rdx 0x00007f7415d36c94 <+692>: jmp 0x7f7415d36cfe <aesni_ecb_encrypt+798> 0x00007f7415d36c96 <+694>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36ca0 <+704>: movups %xmm2,(%rsi) 0x00007f7415d36ca3 <+707>: mov %r11,%rcx 0x00007f7415d36ca6 <+710>: movdqu (%rdi),%xmm2 0x00007f7415d36caa <+714>: mov %r10d,%eax 0x00007f7415d36cad <+717>: movups %xmm3,0x10(%rsi) 0x00007f7415d36cb1 <+721>: movdqu 0x10(%rdi),%xmm3 0x00007f7415d36cb6 <+726>: movups %xmm4,0x20(%rsi) 0x00007f7415d36cba <+730>: movdqu 0x20(%rdi),%xmm4 0x00007f7415d36cbf <+735>: movups %xmm5,0x30(%rsi) 0x00007f7415d36cc3 <+739>: movdqu 0x30(%rdi),%xmm5 0x00007f7415d36cc8 <+744>: movups %xmm6,0x40(%rsi) 0x00007f7415d36ccc <+748>: movdqu 0x40(%rdi),%xmm6 0x00007f7415d36cd1 <+753>: movups %xmm7,0x50(%rsi) 0x00007f7415d36cd5 <+757>: movdqu 0x50(%rdi),%xmm7 0x00007f7415d36cda <+762>: movups %xmm8,0x60(%rsi) 0x00007f7415d36cdf <+767>: movdqu 0x60(%rdi),%xmm8 0x00007f7415d36ce5 <+773>: movups %xmm9,0x70(%rsi) 0x00007f7415d36cea <+778>: lea 0x80(%rsi),%rsi 0x00007f7415d36cf1 <+785>: movdqu 0x70(%rdi),%xmm9 0x00007f7415d36cf7 <+791>: lea 0x80(%rdi),%rdi 0x00007f7415d36cfe <+798>: callq 0x7f7415d368d0 <_aesni_decrypt8> 0x00007f7415d36d03 <+803>: movups (%r11),%xmm0 0x00007f7415d36d07 <+807>: sub $0x80,%rdx 0x00007f7415d36d0e <+814>: jae 0x7f7415d36ca0 <aesni_ecb_encrypt+704> 0x00007f7415d36d10 <+816>: movups %xmm2,(%rsi) 0x00007f7415d36d13 <+819>: pxor %xmm2,%xmm2 0x00007f7415d36d17 <+823>: mov %r11,%rcx 0x00007f7415d36d1a <+826>: movups %xmm3,0x10(%rsi) 0x00007f7415d36d1e <+830>: pxor %xmm3,%xmm3 0x00007f7415d36d22 <+834>: mov %r10d,%eax 0x00007f7415d36d25 <+837>: movups %xmm4,0x20(%rsi) 0x00007f7415d36d29 <+841>: pxor %xmm4,%xmm4 0x00007f7415d36d2d <+845>: movups %xmm5,0x30(%rsi) 0x00007f7415d36d31 <+849>: pxor %xmm5,%xmm5 0x00007f7415d36d35 <+853>: movups %xmm6,0x40(%rsi) 0x00007f7415d36d39 <+857>: pxor %xmm6,%xmm6 0x00007f7415d36d3d <+861>: movups %xmm7,0x50(%rsi) 0x00007f7415d36d41 <+865>: pxor %xmm7,%xmm7 0x00007f7415d36d45 <+869>: movups %xmm8,0x60(%rsi) 0x00007f7415d36d4a <+874>: pxor %xmm8,%xmm8 0x00007f7415d36d4f <+879>: movups %xmm9,0x70(%rsi) 0x00007f7415d36d54 <+884>: pxor %xmm9,%xmm9 0x00007f7415d36d59 <+889>: lea 0x80(%rsi),%rsi 0x00007f7415d36d60 <+896>: add $0x80,%rdx 0x00007f7415d36d67 <+903>: je 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36d6d <+909>: movups (%rdi),%xmm2 0x00007f7415d36d70 <+912>: cmp $0x20,%rdx 0x00007f7415d36d74 <+916>: jb 0x7f7415d36e10 <aesni_ecb_encrypt+1072> 0x00007f7415d36d7a <+922>: movups 0x10(%rdi),%xmm3 0x00007f7415d36d7e <+926>: je 0x7f7415d36e40 <aesni_ecb_encrypt+1120> 0x00007f7415d36d84 <+932>: movups 0x20(%rdi),%xmm4 0x00007f7415d36d88 <+936>: cmp $0x40,%rdx 0x00007f7415d36d8c <+940>: jb 0x7f7415d36e60 <aesni_ecb_encrypt+1152> 0x00007f7415d36d92 <+946>: movups 0x30(%rdi),%xmm5 0x00007f7415d36d96 <+950>: je 0x7f7415d36e90 <aesni_ecb_encrypt+1200> 0x00007f7415d36d9c <+956>: movups 0x40(%rdi),%xmm6 0x00007f7415d36da0 <+960>: cmp $0x60,%rdx 0x00007f7415d36da4 <+964>: jb 0x7f7415d36ec0 <aesni_ecb_encrypt+1248> 0x00007f7415d36daa <+970>: movups 0x50(%rdi),%xmm7 0x00007f7415d36dae <+974>: je 0x7f7415d36f00 <aesni_ecb_encrypt+1312> 0x00007f7415d36db4 <+980>: movups 0x60(%rdi),%xmm8 0x00007f7415d36db9 <+985>: movups (%rcx),%xmm0 0x00007f7415d36dbc <+988>: xorps %xmm9,%xmm9 0x00007f7415d36dc0 <+992>: callq 0x7f7415d368d0 <_aesni_decrypt8> 0x00007f7415d36dc5 <+997>: movups %xmm2,(%rsi) 0x00007f7415d36dc8 <+1000>: pxor %xmm2,%xmm2 0x00007f7415d36dcc <+1004>: movups %xmm3,0x10(%rsi) 0x00007f7415d36dd0 <+1008>: pxor %xmm3,%xmm3 0x00007f7415d36dd4 <+1012>: movups %xmm4,0x20(%rsi) 0x00007f7415d36dd8 <+1016>: pxor %xmm4,%xmm4 0x00007f7415d36ddc <+1020>: movups %xmm5,0x30(%rsi) 0x00007f7415d36de0 <+1024>: pxor %xmm5,%xmm5 0x00007f7415d36de4 <+1028>: movups %xmm6,0x40(%rsi) 0x00007f7415d36de8 <+1032>: pxor %xmm6,%xmm6 0x00007f7415d36dec <+1036>: movups %xmm7,0x50(%rsi) 0x00007f7415d36df0 <+1040>: pxor %xmm7,%xmm7 0x00007f7415d36df4 <+1044>: movups %xmm8,0x60(%rsi) 0x00007f7415d36df9 <+1049>: pxor %xmm8,%xmm8 0x00007f7415d36dfe <+1054>: pxor %xmm9,%xmm9 0x00007f7415d36e03 <+1059>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36e08 <+1064>: nopl 0x0(%rax,%rax,1) 0x00007f7415d36e10 <+1072>: movups (%rcx),%xmm0 0x00007f7415d36e13 <+1075>: movups 0x10(%rcx),%xmm1 0x00007f7415d36e17 <+1079>: lea 0x20(%rcx),%rcx 0x00007f7415d36e1b <+1083>: xorps %xmm0,%xmm2 0x00007f7415d36e1e <+1086>: aesdec %xmm1,%xmm2 0x00007f7415d36e23 <+1091>: dec %eax 0x00007f7415d36e25 <+1093>: movups (%rcx),%xmm1 0x00007f7415d36e28 <+1096>: lea 0x10(%rcx),%rcx 0x00007f7415d36e2c <+1100>: jne 0x7f7415d36e1e <aesni_ecb_encrypt+1086> 0x00007f7415d36e2e <+1102>: aesdeclast %xmm1,%xmm2 0x00007f7415d36e33 <+1107>: movups %xmm2,(%rsi) 0x00007f7415d36e36 <+1110>: pxor %xmm2,%xmm2 0x00007f7415d36e3a <+1114>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36e3f <+1119>: nop 0x00007f7415d36e40 <+1120>: callq 0x7f7415d363a0 <_aesni_decrypt2> 0x00007f7415d36e45 <+1125>: movups %xmm2,(%rsi) 0x00007f7415d36e48 <+1128>: pxor %xmm2,%xmm2 0x00007f7415d36e4c <+1132>: movups %xmm3,0x10(%rsi) 0x00007f7415d36e50 <+1136>: pxor %xmm3,%xmm3 0x00007f7415d36e54 <+1140>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36e59 <+1145>: nopl 0x0(%rax) 0x00007f7415d36e60 <+1152>: callq 0x7f7415d36470 <_aesni_decrypt3> 0x00007f7415d36e65 <+1157>: movups %xmm2,(%rsi) 0x00007f7415d36e68 <+1160>: pxor %xmm2,%xmm2 0x00007f7415d36e6c <+1164>: movups %xmm3,0x10(%rsi) 0x00007f7415d36e70 <+1168>: pxor %xmm3,%xmm3 0x00007f7415d36e74 <+1172>: movups %xmm4,0x20(%rsi) 0x00007f7415d36e78 <+1176>: pxor %xmm4,%xmm4 0x00007f7415d36e7c <+1180>: jmpq 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36e81 <+1185>: nopl 0x0(%rax,%rax,1) 0x00007f7415d36e86 <+1190>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36e90 <+1200>: callq 0x7f7415d36570 <_aesni_decrypt4> 0x00007f7415d36e95 <+1205>: movups %xmm2,(%rsi) 0x00007f7415d36e98 <+1208>: pxor %xmm2,%xmm2 0x00007f7415d36e9c <+1212>: movups %xmm3,0x10(%rsi) 0x00007f7415d36ea0 <+1216>: pxor %xmm3,%xmm3 0x00007f7415d36ea4 <+1220>: movups %xmm4,0x20(%rsi) 0x00007f7415d36ea8 <+1224>: pxor %xmm4,%xmm4 0x00007f7415d36eac <+1228>: movups %xmm5,0x30(%rsi) 0x00007f7415d36eb0 <+1232>: pxor %xmm5,%xmm5 0x00007f7415d36eb4 <+1236>: jmp 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36eb6 <+1238>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36ec0 <+1248>: xorps %xmm7,%xmm7 0x00007f7415d36ec3 <+1251>: callq 0x7f7415d366e0 <_aesni_decrypt6> 0x00007f7415d36ec8 <+1256>: movups %xmm2,(%rsi) 0x00007f7415d36ecb <+1259>: pxor %xmm2,%xmm2 0x00007f7415d36ecf <+1263>: movups %xmm3,0x10(%rsi) 0x00007f7415d36ed3 <+1267>: pxor %xmm3,%xmm3 0x00007f7415d36ed7 <+1271>: movups %xmm4,0x20(%rsi) 0x00007f7415d36edb <+1275>: pxor %xmm4,%xmm4 0x00007f7415d36edf <+1279>: movups %xmm5,0x30(%rsi) 0x00007f7415d36ee3 <+1283>: pxor %xmm5,%xmm5 0x00007f7415d36ee7 <+1287>: movups %xmm6,0x40(%rsi) 0x00007f7415d36eeb <+1291>: pxor %xmm6,%xmm6 0x00007f7415d36eef <+1295>: pxor %xmm7,%xmm7 0x00007f7415d36ef3 <+1299>: jmp 0x7f7415d36f34 <aesni_ecb_encrypt+1364> 0x00007f7415d36ef5 <+1301>: nop 0x00007f7415d36ef6 <+1302>: nopw %cs:0x0(%rax,%rax,1) 0x00007f7415d36f00 <+1312>: callq 0x7f7415d366e0 <_aesni_decrypt6> 0x00007f7415d36f05 <+1317>: movups %xmm2,(%rsi) 0x00007f7415d36f08 <+1320>: pxor %xmm2,%xmm2 0x00007f7415d36f0c <+1324>: movups %xmm3,0x10(%rsi) 0x00007f7415d36f10 <+1328>: pxor %xmm3,%xmm3 0x00007f7415d36f14 <+1332>: movups %xmm4,0x20(%rsi) 0x00007f7415d36f18 <+1336>: pxor %xmm4,%xmm4 0x00007f7415d36f1c <+1340>: movups %xmm5,0x30(%rsi) 0x00007f7415d36f20 <+1344>: pxor %xmm5,%xmm5 0x00007f7415d36f24 <+1348>: movups %xmm6,0x40(%rsi) 0x00007f7415d36f28 <+1352>: pxor %xmm6,%xmm6 0x00007f7415d36f2c <+1356>: movups %xmm7,0x50(%rsi) 0x00007f7415d36f30 <+1360>: pxor %xmm7,%xmm7 0x00007f7415d36f34 <+1364>: xorps %xmm0,%xmm0 0x00007f7415d36f37 <+1367>: pxor %xmm1,%xmm1 0x00007f7415d36f3b <+1371>: repz retq End of assembler dump. ```
i r ``` (gdb) i r rax 0xfc0e5f44 4228800324 rbx 0x7f7427087200 140136847798784 rcx 0x7f740adfd000 140136375373824 rdx 0x10 16 rsi 0x7f73cb204618 140135305856536 rdi 0x7f73cb204638 140135305856568 rbp 0x7ffd3f1ec9e0 0x7ffd3f1ec9e0 rsp 0x7ffd3f1ec820 0x7ffd3f1ec820 r8 0x1 1 r9 0x0 0 r10 0x0 0 r11 0x7f73cbc5c430 140135316702256 r12 0x55c40d6292d3 94300526514899 r13 0x40000000 1073741824 r14 0x10000000 268435456 r15 0x6 6 rip 0x55c40d265430 0x55c40d265430 <main+26065> eflags 0x10287 [ CF PF SF IF RF ] cs 0x33 51 ss 0x2b 43 ds 0x0 0 es 0x0 0 fs 0x0 0 gs 0x0 0 ```
Not sure when I get time to look deeper, it's Easter holidays in most of Europe, so likely others are busy as well. What I can suggest for the moment is to compile using libssl 1.0.x and see if works ok with it. That will confirm or rule out if it is an issue with libssl/libcrypti 1.1.x. On some systems, you can get libssl1.0.x along with libssl1.1, so if you have both you may need to tune the Makefile inside src/modules/tls to compile with 1.0.x. If you use Debian 8 for example, iirc, it has only libssl 1.0.x (or at least this is the default installed version).
I'm also having trouble with kamailio and OpenSSL 1.1, with segfaults in TLS. It's not quite the same issue as described here, but I suspect might be related:
* thread #1, name = 'kamailio', stop reason = signal SIGSEGV * frame #0: 0x00000008009c954d libc.so.7`__free + 749 frame #1: 0x00000008026c262b libthr.so.3`pthread_rwlock_destroy + 59 frame #2: 0x0000000802b8abf6 libcrypto.so.111`CRYPTO_THREAD_lock_free + 22 frame #3: 0x0000000802b784c6 libcrypto.so.111`BIO_free + 182 frame #4: 0x00000008028fb1a1 libssl.so.111`SSL_free + 193 frame #5: 0x0000000802810d48 tls.so`tls_h_tcpconn_clean + 1240
I haven't tried with OpenSSL 1.0 yet.
https://kamailio.slack.com/archives/CDMGSTJ2U/p1542138287318000
On Sat, Apr 20, 2019 at 4:01 PM Nathan Whitehorn notifications@github.com wrote:
I'm also having trouble with kamailio and OpenSSL 1.1, with segfaults in TLS. It's not quite the same issue as described here, but I suspect might be related:
- thread #1 https://github.com/kamailio/kamailio/issues/1, name =
'kamailio', stop reason = signal SIGSEGV - frame #0: 0x00000008009c954d libc.so.7__free + 749 frame #1: 0x00000008026c262b libthr.so.3pthread_rwlock_destroy + 59 frame #2 https://github.com/kamailio/kamailio/pull/2: 0x0000000802b8abf6 libcrypto.so.111CRYPTO_THREAD_lock_free + 22 frame #3: 0x0000000802b784c6 libcrypto.so.111BIO_free + 182 frame #4 https://github.com/kamailio/kamailio/pull/4: 0x00000008028fb1a1 libssl.so.111SSL_free + 193 frame #5: 0x0000000802810d48 tls.sotls_h_tcpconn_clean + 1240
I haven't tried with OpenSSL 1.0 yet.
— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/kamailio/kamailio/issues/1860#issuecomment-485191734, or mute the thread https://github.com/notifications/unsubscribe-auth/ABO7UZJ5H3BXCTYLXS2Q2O3PROODLANCNFSM4GYVXBZA . _______________________________________________ Kamailio (SER) - Development Mailing List sr-dev@lists.kamailio.org https://lists.kamailio.org/cgi-bin/mailman/listinfo/sr-dev
I vaguely remember seeing something recently on slack in regards to OpenSSL - May want to check the archives on Kamailio slack channels.
On Sat, Apr 20, 2019 at 4:01 PM Nathan Whitehorn notifications@github.com wrote:
I'm also having trouble with kamailio and OpenSSL 1.1, with segfaults in TLS. It's not quite the same issue as described here, but I suspect might be related:
- thread #1 https://github.com/kamailio/kamailio/issues/1, name =
'kamailio', stop reason = signal SIGSEGV - frame #0: 0x00000008009c954d libc.so.7__free + 749 frame #1: 0x00000008026c262b libthr.so.3pthread_rwlock_destroy + 59 frame #2 https://github.com/kamailio/kamailio/pull/2: 0x0000000802b8abf6 libcrypto.so.111CRYPTO_THREAD_lock_free + 22 frame #3: 0x0000000802b784c6 libcrypto.so.111BIO_free + 182 frame #4 https://github.com/kamailio/kamailio/pull/4: 0x00000008028fb1a1 libssl.so.111SSL_free + 193 frame #5: 0x0000000802810d48 tls.sotls_h_tcpconn_clean + 1240
I haven't tried with OpenSSL 1.0 yet.
— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/kamailio/kamailio/issues/1860#issuecomment-485191734, or mute the thread https://github.com/notifications/unsubscribe-auth/AANXT6YNNIX64DNBHRVTMADPROODHANCNFSM4GYVXBZA .
Changing the Makefile for the TLS module to use OpenSSL 1.0 fixes the problem, that at least provides us with a workaround.
Just to be sure, I've repeated the process of making the TLS module using OpenSSL 1.1.1b and the problem returns, if I then clean and make the TLS module using OpenSSL 1.0.2r the problem is fixed.
Thank you to all for your assistance.
Changing the Makefile for the TLS module to use OpenSSL 1.0 fixes the problem, that at least provides us with a workaround.
Just to be sure, I've repeated the process of making the TLS module using OpenSSL 1.1.1b and the problem returns, if I then clean and make the TLS module using OpenSSL 1.0.2r the problem is fixed.
Thank you to all for your assistance.
My skills are poor, but I can build from source. Could you explain in detail what file to edit before making. I would like to try using OpenSSL 1.0 I get segmentation fault when I specify listen=tls:1.2.3.4:5061 in kamailio.cfg My config worked in Ubuntu 14, after I upgraded to 18 and installed 5.2.2 its broken.
These are roughly the steps that I've followed to switch to OpenSSL 1.0.2r and rebuild Kamailio TLS module. Hope this helps!
First of all you need to make and install OpenSSL 1.0.2r from source.
sudo apt install build-essential checkinstall zlib1g-dev -y
cd /usr/src
wget https://www.openssl.org/source/openssl-1.0.2r.tar.gz
tar -xvzf openssl-1.0.2r.tar.gz
cd openssl-1.0.2r
./config -d --prefix=/usr/local/ssl --openssldir=/usr/local/ssl shared zlib
make make test
make install
nano /etc/ld.so.conf.d/openssl-1.0.2r.conf Add this line and save: /usr/local/ssl/lib
sudo ldconfig -v
mv /usr/bin/c_rehash /usr/bin/c_rehash.BEKUP mv /usr/bin/openssl /usr/bin/openssl.BEKUP
export PATH=$PATH:/usr/local/ssl/bin
Link binaries to path: sudo ln -s /usr/local/ssl/bin/c_rehash /usr/bin/c_rehash sudo ln -s /usr/local/ssl/bin/openssl /usr/bin/openssl
Restart. sudo shutdown -r now Check OpenSSL path, should return '/usr/bin/openssl'. which openssl
Check OpenSSL version, should return 'OpenSSL 1.0.2r 26 Feb 2019' openssl version
Modify '/usr/src/kamailio/src/modules/tls/makefile'.
Changed this: ifneq ($(SSL_BUILDER),) DEFS += $(shell $(SSL_BUILDER) --cflags) LIBS += $(shell $(SSL_BUILDER) --libs) else DEFS += -I$(LOCALBASE)/ssl/include LIBS += -L$(LOCALBASE)/lib -L$(LOCALBASE)/ssl/lib \ -L$(LOCALBASE)/lib64 -L$(LOCALBASE)/ssl/lib64 \ -lssl -lcrypto # NOTE: depending on the way in which libssl was compiled you might # have to add -lz -lkrb5 (zlib and kerberos5). # E.g.: make TLS_HOOKS=1 TLS_EXTRA_LIBS="-lz -lkrb5" endif To this: DEFS+= -I/usr/local/ssl/include LIBS+= -L/usr/local/ssl/lib \ -lssl -lcrypto Make clean, make and make install: cd /usr/src/kamailio/src/modules/tls make clean make make install
@shaunjstokes - great description, do you would mind to add this to our wiki page as well? This would be great! It would be a good fit in the tutorials sections on www.kamailio.org/wiki (you need to quickly create a free account to create a new page here).
@henningw Wiki added https://www.kamailio.org/wiki/tutorials/tls/howto-openssl-1-0
For OpenSSL >= 1.1x there will be also a a workaround in the upcoming 5.3 release (efdc141ecb5ff72 and following commits). Close this one, as the reporter also found another workaround.
Closed #1860.