Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kamailio 5.2.2 - Segmentation fault in libcrypto.so.1.1 #1860

Closed
shaunjstokes opened this issue Feb 20, 2019 · 30 comments
Closed

Kamailio 5.2.2 - Segmentation fault in libcrypto.so.1.1 #1860

shaunjstokes opened this issue Feb 20, 2019 · 30 comments
Labels

Comments

@shaunjstokes
Copy link

shaunjstokes commented Feb 20, 2019

Description

This occurs more frequently when we have lots of presence subscriptions which we are able to reproduce in a test environment. Thus far it appears this only occurs when using TLS as opposed to UDP\TCP.

Troubleshooting

Appears to be an issue in libcrypto.so.1.1 but not sure where to start.

Reproduction

8000+ presence subscriptions via TLS.

Debugging Data

  gdb /path/to/kamailio /path/to/corefile
GNU gdb (Debian 7.12-6) 7.12.0.20161007-git
Copyright (C) 2016 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/local/kamailio/sbin/kamailio...done.
[New LWP 29322]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/local/kamailio/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /usr/loc'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007f5d92ec56de in aes_ecb_cipher (ctx=0x7f5d47384480, out=0x7f5d47384378 "O\006Ȟ\377\246b\275QA\341TE\223*ڡ3\a\316&ju\220)\307\343^\212Dq^L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", in=0x7f5d47384398 "L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", len=0) at crypto/evp/e_aes.c:2699
2699            (*dat->block) (in + i, out + i, &dat->ks);


(gdb) bt
#0  0x00007f5d92ec56de in aes_ecb_cipher (ctx=0x7f5d47384480, out=0x7f5d47384378 "O\006Ȟ\377\246b\275QA\341TE\223*ڡ3\a\316&ju\220)\307\343^\212Dq^L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", in=0x7f5d47384398 "L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", len=0) at crypto/evp/e_aes.c:2699
#1  0x00007f5d92ed3755 in evp_EncryptDecryptUpdate (ctx=0x7f5d47384480, out=0x7f5d47384378 "O\006Ȟ\377\246b\275QA\341TE\223*ڡ3\a\316&ju\220)\307\343^\212Dq^L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", outl=0x7fffdb6181c4, in=0x7f5d47384398 "L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", inl=16)
    at crypto/evp/evp_enc.c:333
#2  0x00007f5d92ed39a0 in EVP_EncryptUpdate (ctx=0x7f5d47384480, out=0x7f5d47384378 "O\006Ȟ\377\246b\275QA\341TE\223*ڡ3\a\316&ju\220)\307\343^\212Dq^L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", outl=0x7fffdb6181c4, in=0x7f5d47384398 "L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", inl=16)
    at crypto/evp/evp_enc.c:385
#3  0x00007f5d92ed338e in EVP_CipherUpdate (ctx=0x7f5d47384480, out=0x7f5d47384378 "O\006Ȟ\377\246b\275QA\341TE\223*ڡ3\a\316&ju\220)\307\343^\212Dq^L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", outl=0x7fffdb6181c4, in=0x7f5d47384398 "L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", inl=16)
    at crypto/evp/evp_enc.c:213
#4  0x00007f5d92f11568 in ctr_update (drbg=0x7f5d473842b0, in1=0x0, in1len=0, in2=0x0, in2len=0, nonce=0x0, noncelen=0) at crypto/rand/drbg_ctr.c:238
#5  0x00007f5d92f11a56 in drbg_ctr_generate (drbg=0x7f5d473842b0, out=0x7f5d48cc89d8 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"..., outlen=0,
    adin=0x0, adinlen=0) at crypto/rand/drbg_ctr.c:349
#6  0x00007f5d92f12f15 in RAND_DRBG_generate (drbg=0x7f5d473842b0,
    out=0x7f5d48cc89c8 "x\b\355c\320'\\\365)\341\217\365K\306s\233SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co."..., outlen=16, prediction_resistance=0, adin=0x0,
    adinlen=0) at crypto/rand/drbg_lib.c:638
#7  0x00007f5d92f13043 in RAND_DRBG_bytes (drbg=0x7f5d473842b0,
    out=0x7f5d48cc89c8 "x\b\355c\320'\\\365)\341\217\365K\306s\233SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co."..., outlen=16) at crypto/rand/drbg_lib.c:679
#8  0x00007f5d92f135bc in drbg_bytes (out=0x7f5d48cc89c8 "x\b\355c\320'\\\365)\341\217\365K\306s\233SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co."..., count=16)
    at crypto/rand/drbg_lib.c:968
#9  0x00007f5d92f14b2f in RAND_bytes (buf=0x7f5d48cc89c8 "x\b\355c\320'\\\365)\341\217\365K\306s\233SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co."..., num=16)
    at crypto/rand/rand_lib.c:836
#10 0x00007f5d93276633 in tls1_enc (s=0x7f5d48474168, recs=0x7fffdb618830, n_recs=1, sending=1) at ssl/record/ssl3_record.c:985
#11 0x00007f5d93271d0d in do_ssl3_write (s=0x7f5d48474168, type=23, buf=0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"...,
    pipelens=0x7fffdb619940, numpipes=1, create_empty_fragment=0, written=0x7fffdb619a48) at ssl/record/rec_layer_s3.c:1003
#12 0x00007f5d93270b2a in ssl3_write_bytes (s=0x7f5d48474168, type=23, buf_=0x7f5d93fc5b08, len=486, written=0x7fffdb619b70) at ssl/record/rec_layer_s3.c:613
#13 0x00007f5d9327f33e in ssl3_write (s=0x7f5d48474168, buf=0x7f5d93fc5b08, len=486, written=0x7fffdb619b70) at ssl/s3_lib.c:4460
#14 0x00007f5d9328df59 in ssl_write_internal (s=0x7f5d48474168, buf=0x7f5d93fc5b08, num=486, written=0x7fffdb619b70) at ssl/ssl_lib.c:1943
#15 0x00007f5d9328dfb6 in SSL_write (s=0x7f5d48474168, buf=0x7f5d93fc5b08, num=486) at ssl/ssl_lib.c:1957
#16 0x00007f5d878fe5ab in tls_encode_f (c=0x7f5d48cb1a20, pbuf=0x7fffdb619d20, plen=0x7fffdb619d18, rest_buf=0x7fffdb619d28, rest_len=0x7fffdb619d1c, send_flags=0x7fffdb619d0c) at tls_server.c:828
#17 0x000055f2bf360d2d in tcpconn_send_put (c=0x7f5d48cb1a20, buf=0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"..., len=486,
    send_flags=...) at core/tcp_main.c:2297
#18 0x000055f2bf35e420 in tcp_send (dst=0x7f5d492211e8, from=0x0, buf=0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"..., len=486)
    at core/tcp_main.c:2077
#19 0x00007f5d8f3c42ec in msg_send_buffer (dst=0x7f5d492211e8, buf=0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"..., len=486, flags=0)
    at ../../core/forward.h:282
#20 0x00007f5d8f3c66aa in send_pr_buffer (rb=0x7f5d49221198, buf=0x7f5d93fc5b08, len=486) at t_funcs.c:70
#21 0x00007f5d8f379e62 in _reply_light (trans=0x7f5d492210c8, buf=0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"..., len=486, code=202,
    to_tag=0x7f5d8f65a4a0 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-8f9b", to_tag_len=37, lock=1, bm=0x7fffdb61aa80) at t_reply.c:553
#22 0x00007f5d8f37aacf in _reply (trans=0x7f5d492210c8, p_msg=0x7f5d93ff24d8, code=202, reason=0x7fffdb61aba0, lock=1) at t_reply.c:655
#23 0x00007f5d8f382aec in t_reply_str (t=0x7f5d492210c8, p_msg=0x7f5d93ff24d8, code=202, reason=0x7fffdb61aba0) at t_reply.c:1618
#24 0x00007f5d8f3e8579 in ki_t_reply (msg=0x7f5d93ff24d8, code=202, reason=0x7fffdb61aba0) at tm.c:1353
#25 0x00007f5d8f3e8d7b in w_t_reply_wrp (msg=0x7f5d93ff24d8, code=202, txt=0x7f5d93fdc4e8 "OK") at tm.c:1410
#26 0x00007f5d8eeda87a in send_reply (msg=0x7f5d93ff24d8, code=202, reason=0x7f5d8bfde460 <su_200_rpl>) at sl.c:275
#27 0x00007f5d8bd8fa3f in send_2XX_reply (msg=0x7f5d93ff24d8, reply_code=202, lexpire=3600, local_contact=0x7fffdb61b0a0) at subscribe.c:126
#28 0x00007f5d8bd9720a in update_subscription (msg=0x7f5d93ff24d8, subs=0x7fffdb61afc0, to_tag_gen=1, sent_reply=0x7fffdb61adfc) at subscribe.c:697
#29 0x00007f5d8bd9ebeb in handle_subscribe (msg=0x7f5d93ff24d8, watcher_user=..., watcher_domain=...) at subscribe.c:1284
#30 0x00007f5d8bd9acf8 in handle_subscribe0 (msg=0x7f5d93ff24d8) at subscribe.c:1033
#31 0x000055f2bf2cd694 in do_action (h=0x7fffdb61b900, a=0x7f5d93f31240, msg=0x7f5d93ff24d8) at core/action.c:1067
#32 0x000055f2bf2daba3 in run_actions (h=0x7fffdb61b900, a=0x7f5d93f31240, msg=0x7f5d93ff24d8) at core/action.c:1564
#33 0x000055f2bf2db1ff in run_actions_safe (h=0x7fffdb61d160, a=0x7f5d93f31240, msg=0x7f5d93ff24d8) at core/action.c:1625
#34 0x000055f2bf50b8c1 in rval_get_int (h=0x7fffdb61d160, msg=0x7f5d93ff24d8, i=0x7fffdb61bd08, rv=0x7f5d93f306f8, cache=0x0) at core/rvalue.c:912
#35 0x000055f2bf510232 in rval_expr_eval_int (h=0x7fffdb61d160, msg=0x7f5d93ff24d8, res=0x7fffdb61bd08, rve=0x7f5d93f306f0) at core/rvalue.c:1910
#36 0x000055f2bf5106a2 in rval_expr_eval_int (h=0x7fffdb61d160, msg=0x7f5d93ff24d8, res=0x7fffdb61c180, rve=0x7f5d93f315e8) at core/rvalue.c:1918
#37 0x000055f2bf2cd131 in do_action (h=0x7fffdb61d160, a=0x7f5d93f32a10, msg=0x7f5d93ff24d8) at core/action.c:1043
#38 0x000055f2bf2daba3 in run_actions (h=0x7fffdb61d160, a=0x7f5d93f1fa20, msg=0x7f5d93ff24d8) at core/action.c:1564
#39 0x000055f2bf2cd600 in do_action (h=0x7fffdb61d160, a=0x7f5d93f36650, msg=0x7f5d93ff24d8) at core/action.c:1058
#40 0x000055f2bf2daba3 in run_actions (h=0x7fffdb61d160, a=0x7f5d93f36650, msg=0x7f5d93ff24d8) at core/action.c:1564
#41 0x000055f2bf2c9e0f in do_action (h=0x7fffdb61d160, a=0x7f5d93eb22b8, msg=0x7f5d93ff24d8) at core/action.c:691
#42 0x000055f2bf2daba3 in run_actions (h=0x7fffdb61d160, a=0x7f5d93eae8f0, msg=0x7f5d93ff24d8) at core/action.c:1564
#43 0x000055f2bf2db2c7 in run_top_route (a=0x7f5d93eae8f0, msg=0x7f5d93ff24d8, c=0x0) at core/action.c:1646
#44 0x000055f2bf42fc3f in receive_msg (buf=0x7f5d48cb1d18 "SUBSCRIBE sip:263@mydomain.co.co SIP/2.0\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@de"..., len=560, rcv_info=0x7f5d48cb1a38)
    at core/receive.c:340
#45 0x000055f2bf4c6dcc in receive_tcp_msg (tcpbuf=0x7f5d48cb1d18 "SUBSCRIBE sip:263@mydomain.co.co SIP/2.0\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@de"..., len=560, rcv_info=0x7f5d48cb1a38,
    con=0x7f5d48cb1a20) at core/tcp_read.c:1399
#46 0x000055f2bf4c93d4 in tcp_read_req (con=0x7f5d48cb1a20, bytes_read=0x7fffdb61d6d0, read_flags=0x7fffdb61d6c8) at core/tcp_read.c:1631
#47 0x000055f2bf4ccf31 in handle_io (fm=0x7f5d93fdd6f8, events=1, idx=-1) at core/tcp_read.c:1862
#48 0x000055f2bf4b9e34 in io_wait_loop_epoll (h=0x55f2bf9970c0 <io_w>, t=2, repeat=0) at core/io_wait.h:1065
#49 0x000055f2bf4ce2de in tcp_receive_loop (unix_sock=83) at core/tcp_read.c:1974
#50 0x000055f2bf381a7e in tcp_init_children () at core/tcp_main.c:4853
#51 0x000055f2bf2b91dc in main_loop () at main.c:1745
#52 0x000055f2bf2c019e in main (argc=13, argv=0x7fffdb61dd38) at main.c:2696


(gdb) bt full
#0  0x00007f5d92ec56de in aes_ecb_cipher (ctx=0x7f5d47384480, out=0x7f5d47384378 "O\006Ȟ\377\246b\275QA\341TE\223*ڡ3\a\316&ju\220)\307\343^\212Dq^L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", in=0x7f5d47384398 "L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", len=0) at crypto/evp/e_aes.c:2699
        bl = 16
        i = 0
        dat = 0x0
#1  0x00007f5d92ed3755 in evp_EncryptDecryptUpdate (ctx=0x7f5d47384480, out=0x7f5d47384378 "O\006Ȟ\377\246b\275QA\341TE\223*ڡ3\a\316&ju\220)\307\343^\212Dq^L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", outl=0x7fffdb6181c4, in=0x7f5d47384398 "L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", inl=16)
    at crypto/evp/evp_enc.c:333
        i = 32605
        j = 1194869656
        bl = 16
        cmpl = 16
#2  0x00007f5d92ed39a0 in EVP_EncryptUpdate (ctx=0x7f5d47384480, out=0x7f5d47384378 "O\006Ȟ\377\246b\275QA\341TE\223*ڡ3\a\316&ju\220)\307\343^\212Dq^L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", outl=0x7fffdb6181c4, in=0x7f5d47384398 "L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", inl=16)
    at crypto/evp/evp_enc.c:385
No locals.
#3  0x00007f5d92ed338e in EVP_CipherUpdate (ctx=0x7f5d47384480, out=0x7f5d47384378 "O\006Ȟ\377\246b\275QA\341TE\223*ڡ3\a\316&ju\220)\307\343^\212Dq^L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", outl=0x7fffdb6181c4, in=0x7f5d47384398 "L\321RA\371y`\251\226\064Y\345/V\016\300֗\245\071bgL", inl=16)
    at crypto/evp/evp_enc.c:213
No locals.
#4  0x00007f5d92f11568 in ctr_update (drbg=0x7f5d473842b0, in1=0x0, in1len=0, in2=0x0, in2len=0, nonce=0x0, noncelen=0) at crypto/rand/drbg_ctr.c:238
        ctr = 0x7f5d47384358
        outlen = 16
#5  0x00007f5d92f11a56 in drbg_ctr_generate (drbg=0x7f5d473842b0, out=0x7f5d48cc89d8 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"..., outlen=0,
    adin=0x0, adinlen=0) at crypto/rand/drbg_ctr.c:349
        ctr = 0x7f5d47384358
#6  0x00007f5d92f12f15 in RAND_DRBG_generate (drbg=0x7f5d473842b0,
    out=0x7f5d48cc89c8 "x\b\355c\320'\\\365)\341\217\365K\306s\233SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co."..., outlen=16, prediction_resistance=0, adin=0x0,
    adinlen=0) at crypto/rand/drbg_lib.c:638
        reseed_required = 0
#7  0x00007f5d92f13043 in RAND_DRBG_bytes (drbg=0x7f5d473842b0,
    out=0x7f5d48cc89c8 "x\b\355c\320'\\\365)\341\217\365K\306s\233SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co."..., outlen=16) at crypto/rand/drbg_lib.c:679
        additional = 0x0
        additional_len = 0
        chunk = 16
        ret = 0
#8  0x00007f5d92f135bc in drbg_bytes (out=0x7f5d48cc89c8 "x\b\355c\320'\\\365)\341\217\365K\306s\233SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co."..., count=16)
    at crypto/rand/drbg_lib.c:968
        ret = 33
        drbg = 0x7f5d473842b0
#9  0x00007f5d92f14b2f in RAND_bytes (buf=0x7f5d48cc89c8 "x\b\355c\320'\\\365)\341\217\365K\306s\233SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co."..., num=16)
    at crypto/rand/rand_lib.c:836
        meth = 0x7f5d932446c0 <rand_meth>
#10 0x00007f5d93276633 in tls1_enc (s=0x7f5d48474168, recs=0x7fffdb618830, n_recs=1, sending=1) at ssl/record/ssl3_record.c:985
        ivlen = 16
        ds = 0x7f5d48c042f8
        reclen = {140736873989728, 94501080359526, 94501081672595, 140038600574664, 268435456, 4294967302, 140736873989792, 94501080417442, 140039683169008, 1388492919848, 140039683176024, 140039683169012, 140038621080936, 140038600339456, 140736873989840, 140039682883054, 140039874627571, 246040122696,
          140039874621416, 140038621080936, 140736873989888, 140039873795525, 140736873989888, 247278094907, 140039874621416, 140038621080936, 140736873989920, 140039873645198, 140038635672904, 140038621080936, 140736873990064, 140039877524715}
        buf = {"\340\\\"I]\177\000\000\367\nk\277", <incomplete sequence \362>, "U\000\000\370\001\000\000C\001\000\000\364", <incomplete sequence \332>, "\221\207]\177\000\000 X\"I]\177", "\000\367\nk\277\362U\000\000\370\001\000", "C\001\000\000\364ڑ\207]\177\000\000\220", "W\"I]\177\000\000\000\060\aG]\177",
          "\000\000\223kg\277\004\000\000\000\367\nk", "\277\362U\000\000\370\001\000\000C\001\000", "\364ڑ\207]\177\000\000\020U\"I]", "\177\000\000\000\060\aG]\177\000\000\000", "\000\020\005\000\000\000p2\aG]\177", "\000\020U\"I]\177\000\000\367\nk\277",
          "\362U\000\000\370\001\000\000C\001\000", <incomplete sequence \364>, "ڑ\207]\177\000\000\060\255CH]\177", "\000\000\000\060\aG]\177\000\000 \206a", "\333\377\177\000\000ͳS\277\362U\000", "0\255CH]\177\000\000\000\060\aG]", "\177\000\000\223kg\277\004\000\000\000\000\071",
          "\aG]\177\000\000\000\000\000\020\024\000", "\000\000\250\312H]\177\000\000`\206", <incomplete sequence \333>, "\377\177\000\000ͳS\277\362U\000", <incomplete sequence \320>, "\205a\333\377\177\000\000\000\060\aG]\177", "\000\000\360ڑ\207]\177\000\000\310\306\n", "GC\001\000\000X\366\221\207]\177\000",
          "\364ڑ\207]\177\000\000h\255CH]", "\177\000\000\000\060\aG]\177\000\000P", "\000\000\001\000\000\000\310\306\nG]\177", "\000 \206a\333\377\177\000\000fbS\277", "\362U\000\000\001\000\000\000\000\000\000", <incomplete sequence \310>, "\306\nG]\177\000\000\000\000\000\020\000",
          "\000\000\000\060\aG]\177\000\000\240\000", "\000\001\000\000\000\310\306\nG]\177\000"}
        i = 32767
        pad = 0
        ret = 32605
        tmpr = 32605
        bs = 140039877890288
        mac_size = 0
        ctr = 0
        padnum = 140039877890272
        loop = 140039877890536
        padval = 0 '\000'
        imac_size = 1221364670
        enc = 0x7f5d932231a0 <aes_128_cbc>
#11 0x00007f5d93271d0d in do_ssl3_write (s=0x7f5d48474168, type=23, buf=0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"...,
    pipelens=0x7fffdb619940, numpipes=1, create_empty_fragment=0, written=0x7fffdb619a48) at ssl/record/rec_layer_s3.c:1003
        pkt = {{buf = 0x0, staticbuf = 0x7f5d48cc89c0 "", curr = 530, written = 530, maxsize = 16472, subs = 0x7f5d489639b8}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0} <repeats 17 times>, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x7f5d48cc89c0}, {
            buf = 0x508, staticbuf = 0x508 <error: Cannot access memory at address 0x508>, curr = 16472, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x7f5d48cc89c0}, {buf = 0x758, staticbuf = 0x758 <error: Cannot access memory at address 0x758>,
            curr = 16472, written = 0, maxsize = 581, subs = 0x7f5d93fcc278}, {buf = 0x7f5d93f94008, staticbuf = 0x7f5d93fbdfd0 "\340\235a\333\377\177", curr = 8858370048, written = 140039889494032, maxsize = 140736873994040, subs = 0x55f2bf6b0af7}, {buf = 0xaf00000180,
            staticbuf = 0x55f2bf6b0b0b "fragm. from qm_malloc", curr = 94501081693669, written = 72, maxsize = 140038625895192, subs = 0x7f5d47073000}, {buf = 0x7fffdb619770, staticbuf = 0x20 <error: Cannot access memory at address 0x20>, curr = 18397078296, written = 94501081905824, maxsize = 140736873994128,
            subs = 0x55f2bf538c90 <qm_malloc+1207>}, {buf = 0x7fffdb619790, staticbuf = 0x55f2bf538d40 <qm_malloc+1383> "\211\302H\213\005o\266>", curr = 140039880350256, written = 492845573258, maxsize = 94501081693664, subs = 0xaf93529c68}, {buf = 0x55f2bf67e050 <__func__.8182>,
            staticbuf = 0x55f2bf67bde5 "core: core/usr_avp.c", curr = 72, written = 140038600339456, maxsize = 1, subs = 0xa00000001}, {buf = 0x3, staticbuf = 0x245 <error: Cannot access memory at address 0x245>, curr = 0, written = 581, maxsize = 43, subs = 0x7fffdb619970}, {buf = 0x1bf676b93,
            staticbuf = 0x7f5d93f2c322 "\\+|0)\\d+", curr = 140736873995912, written = 140736873995968, maxsize = 0, subs = 0x55f2bff76539}, {buf = 0x0, staticbuf = 0x7f5d8ccf0bde "\213m", curr = 0, written = 140736873995912, maxsize = 0, subs = 0x7f5d00000000}, {buf = 0x55f2bff7653e, staticbuf = 0x0,
            curr = 4294967294, written = 0, maxsize = 48, subs = 0x0}, {buf = 0xffffffff, staticbuf = 0x55f2bff7653e "\035\060x", curr = 4294967294, written = 0, maxsize = 140733193388032, subs = 0x619980}}
        wr = {{rec_version = 771, type = 23, length = 522, orig_len = 0, off = 0,
            data = 0x7f5d48cc89c8 "x\b\355c\320'\\\365)\341\217\365K\306s\233SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co."...,
            input = 0x7f5d48cc89c8 "x\b\355c\320'\\\365)\341\217\365K\306s\233SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co."..., comp = 0x0, read = 0, epoch = 0,
            seq_num = "\000\000\000\000\000\000\000"}, {rec_version = 0, type = 0, length = 0, orig_len = 0, off = 0, data = 0x0, input = 0x0, comp = 0x0, read = 0, epoch = 0, seq_num = "\000\000\000\000\000\000\000"} <repeats 31 times>}
        thispkt = 0x7fffdb619230
        thiswr = 0x7fffdb618830
        recordstart = 0x7f5d48cc89c8 "x\b\355c\320'\\\365)\341\217\365K\306s\233SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co."...
        i = 0
        mac_size = 20
        clear = 0
        prefix_len = 0
        eivlen = 16
        align = 3
        wb = 0x7f5d484749c0
        sess = 0x7f5d48446940
        totlen = 486
        len = 522
        wpinited = 1
        j = 1
#12 0x00007f5d93270b2a in ssl3_write_bytes (s=0x7f5d48474168, type=23, buf_=0x7f5d93fc5b08, len=486, written=0x7fffdb619b70) at ssl/record/rec_layer_s3.c:613
        pipelens = {486, 83, 140039690389955, 4, 38040346232, 140037408686080, 140733193388075, 140733193388042, 140736873995891, 140039890846502, 140039890846498, 94497870446592, 0, 206158430209, 140736873995440, 94501091108155, 140733193388032, 94501079936032, 140733193388037, 140040158411822, 140736873994896,
          140, 3376, 94501091108208, 140736873996176, 140039787401950, 140736873996440, 13215447103848676096, 140, 133, 0, 140736873995968}
        tmppipelen = 486
        remain = 0
        numpipes = 1
        j = 1
        buf = 0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"...
        tot = 0
        n = 486
        max_send_fragment = 16384
        split_send_fragment = 16384
        maxpipes = 1
        wb = 0x7f5d484749c0
        i = 32767
        tmpwrit = 94501091108148
#13 0x00007f5d9327f33e in ssl3_write (s=0x7f5d48474168, buf=0x7f5d93fc5b08, len=486, written=0x7fffdb619b70) at ssl/s3_lib.c:4460
No locals.
#14 0x00007f5d9328df59 in ssl_write_internal (s=0x7f5d48474168, buf=0x7f5d93fc5b08, num=486, written=0x7fffdb619b70) at ssl/ssl_lib.c:1943
No locals.
#15 0x00007f5d9328dfb6 in SSL_write (s=0x7f5d48474168, buf=0x7f5d93fc5b08, num=486) at ssl/ssl_lib.c:1957
        ret = 0
        written = 268435456
#16 0x00007f5d878fe5ab in tls_encode_f (c=0x7f5d48cb1a20, pbuf=0x7fffdb619d20, plen=0x7fffdb619d18, rest_buf=0x7fffdb619d28, rest_len=0x7fffdb619d1c, send_flags=0x7fffdb619d0c) at tls_server.c:828
        n = 0
        offs = 0
        ssl = 0x7f5d48474168
        tls_c = 0x7f5d48a587e0
        wr_buf = "\027\003\003\005\000\a\364\031\333\367\252I\364RF\030\235\a\231'N+rY>\207\221\066H\240\000\346@\205e\314PY\016\313\361#ia\364g/L@\232k\373S\254=\020.]\215\235\275\301\364\211\344RS\251m\324;\236D\030\005\262\223_d8k\t\324\002\270\277<\367\234lz\375\361\320t\266\246oN9R\005P\356@w\252)\323O\356\026\275UH\201\357\305\064\210\244=\240\022I-\251\316(n\375\211J\302w~\204\244gz\324\351\316_\260\r\330-\336x`\232\301\245=+\201\343\036\365\266\345\312g3&\220p\027\223k$*\024\034\371uM\227\241\223\070\006\r\273\020\342@\246\271\026\227\265!\205\340\242p\336z"...
        rd = {buf = 0x0, pos = 0, used = 0, size = 0}
        wr = {buf = 0x7f5d87b39e40 <wr_buf> "\027\003\003\005", pos = 0, used = 0, size = 65536}
        ssl_error = 0
        err_src = 0x7f5d87929627 "TLS write:"
        buf = 0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"...
        len = 486
        x = 1221270048
        __func__ = "tls_encode_f"
#17 0x000055f2bf360d2d in tcpconn_send_put (c=0x7f5d48cb1a20, buf=0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"..., len=486,
    send_flags=...) at core/tcp_main.c:2297
        tmp = 0x7f5d470fd808
        fd = 10
        response = {140736873995616, 0}
        n = 14
        do_close_fd = 0
        rest_buf = 0x0
        t_buf = 0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"...
        rest_len = 0
        t_len = 486
        resp = 0
        t_send_flags = {f = 0, blst_imask = 0}
        fd_cache_e = 0x0
        use_fd_cache = 0
        __func__ = "tcpconn_send_put"
#18 0x000055f2bf35e420 in tcp_send (dst=0x7f5d492211e8, from=0x0, buf=0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"..., len=486)
    at core/tcp_main.c:2077
        c = 0x7f5d48cb1a20
        ip = {af = 2, len = 4, u = {addrl = {2988284242, 0}, addr32 = {2988284242, 0, 0, 0}, addr16 = {39250, 45597, 0, 0, 0, 0, 0, 0}, addr = "R\231\035\262", '\000' <repeats 11 times>}}
        port = 63556
        fd = 7
        response = {140736873995920, 140736873995928}
        n = 32605
        con_lifetime = 57680
        rest_buf = 0x7fffdb619e88 ""
        t_buf = 0x7fffdb619e84 ""
        rest_len = 32767
        t_len = 3680607872
        resp = 140736873995900
        t_send_flags = {f = 0, blst_imask = 0}
        __func__ = "tcp_send"
#19 0x00007f5d8f3c42ec in msg_send_buffer (dst=0x7f5d492211e8, buf=0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"..., len=486, flags=0)
    at ../../core/forward.h:282
        new_dst = {send_sock = 0x4492253c0, to = {s = {sa_family = 64160, sa_data = "j\277\362U\000\000\300\240a\333\377\177\000"}, sin = {sin_family = 64160, sin_port = 49002, sin_addr = {s_addr = 22002}, sin_zero = "\300\240a\333\377\177\000"}, sin6 = {sin6_family = 64160, sin6_port = 49002,
              sin6_flowinfo = 22002, sin6_addr = {__in6_u = {__u6_addr8 = "\300\240a\333\377\177\000\000\220\214S\277\362U\000", __u6_addr16 = {41152, 56161, 32767, 0, 35984, 48979, 22002, 0}, __u6_addr32 = {3680608448, 32767, 3209923728, 22002}}}, sin6_scope_id = 3680608448}}, id = 32767, proto = 64 '@',
          send_flags = {f = 48979, blst_imask = 22002}}
        outb = {s = 0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"..., len = 486}
        netinfo = {data = {s = 0x7f5d8f41b55b "tm: t_reply.c", len = 648}, rcv = 0x7f5d49225100, dst = 0x7f5d47073000}
        evp = {data = 0x7fffdb619fe0, rcv = 0x0, dst = 0x7f5d492211e8}
        port = 1
        ip = {af = 3680608344, len = 32767, u = {addrl = {140038600570688, 8868493107280}, addr32 = {1191884608, 32605, 3680608336, 2064}, addr16 = {46912, 18186, 32605, 0, 41040, 56161, 2064, 0}, addr = "@\267\nG]\177\000\000P\240a\333\020\b\000"}}
        from = 0x0
        local_addr = {s = {sa_family = 40864, sa_data = "a\333\377\177\000\000zpS\277\362U\000"}, sin = {sin_family = 40864, sin_port = 56161, sin_addr = {s_addr = 32767}, sin_zero = "zpS\277\362U\000"}, sin6 = {sin6_family = 40864, sin6_port = 56161, sin6_flowinfo = 32767, sin6_addr = {__in6_u = {
                __u6_addr8 = "zpS\277\362U\000\000\360S\"I]\177\000", __u6_addr16 = {28794, 48979, 22002, 0, 21488, 18722, 32605, 0}, __u6_addr32 = {3209916538, 22002, 1226986480, 32605}}}, sin6_scope_id = 1191653376}}
        con = 0x0
        wsev = {type = 0, buf = 0xf7936ea000000000 <error: Cannot access memory at address 0xf7936ea000000000>, len = 0, id = 0}
        ret = 2064
        __func__ = "msg_send_buffer"
#20 0x00007f5d8f3c66aa in send_pr_buffer (rb=0x7f5d49221198, buf=0x7f5d93fc5b08, len=486) at t_funcs.c:70
        __func__ = "send_pr_buffer"
#21 0x00007f5d8f379e62 in _reply_light (trans=0x7f5d492210c8, buf=0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"..., len=486, code=202,
    to_tag=0x7f5d8f65a4a0 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-8f9b", to_tag_len=37, lock=1, bm=0x7fffdb61aa80) at t_reply.c:553
        rb = 0x7f5d49221198
        buf_len = 646
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}}
        onsend_params = {req = 0xdb61a9e0, rpl = 0xc00000000, param = 0x17, code = -1085006010, flags = 3, branch = 0, t_rbuf = 0x7fffdb61aa00, dst = 0x7f5d48cb1df8, send_buf = {s = 0x0, len = 0}}
        rt = 0
        backup_rt = 0
        ctx = {rec_lev = -1812157752, run_flags = 32605, last_retcode = -1814159344, jmp_env = {{__jmpbuf = {94501081651872, 94501081630890, 488, 140039889494032, 140736873998716, 377957122049, 94497870446597, 140039889494032}, __mask_was_saved = 16, __saved_mask = {__val = {140039891495568, 140736873998624, 2,
                  94501081672595, 1073741824, 268435456, 6, 140736873998912, 94501079192590, 140736873998976, 140736873999004, 140039891657944, 140039814401968, 140736873999264, 871264004504, 0}}}}}
        pmsg = {id = 0, pid = 0, tval = {tv_sec = 140039755210196, tv_usec = 0}, fwd_send_flags = {f = 0, blst_imask = 0}, rpl_send_flags = {f = 0, blst_imask = 0}, first_line = {type = 7839, flags = 18635, len = 32605, u = {request = {method = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, uri = {
                  s = 0x0, len = 0}, version = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -614356928}, method_value = -614357104}, reply = {version = {s = 0x3 <error: Cannot access memory at address 0x3>, len = 0}, status = {s = 0x0, len = 0}, reason = {
                  s = 0x1 <error: Cannot access memory at address 0x1>, len = -614356928}, statuscode = 3680610192}}}, via1 = 0x7fffdb61a780, via2 = 0x7f5d93527b7b, headers = 0x7fffdb61a8f8, last_header = 0x0, parsed_flag = 140039880342403, h_via1 = 0x7f5da3e2a4b9 <_IO_vfprintf_internal+1929>, h_via2 = 0x5,
          callid = 0x7f5da3e29e36 <_IO_vfprintf_internal+262>, to = 0x7fffdb61a7c0, cseq = 0x7f5d935279df, from = 0x7fffdb61a2e8, contact = 0x0, maxforwards = 0x7fffdb61a310, route = 0xa3e2a4b9, record_route = 0x0, content_type = 0x5300000000, content_length = 0x7fff00000000, authorization = 0xffffffffffffffff,
          expires = 0x7fff00000005, proxy_auth = 0x7f5d7fffffff, supported = 0x7f5d93527b00, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x7fffdb61a360, event = 0x0, accept = 0xd68, accept_language = 0x7f5d00000005, organization = 0x7f5d93527b7b, priority = 0x3, subject = 0x7f5d93527ba1,
          user_agent = 0x7f5d93527b84, server = 0x7fffdb61a3a0, content_disposition = 0x7f5d93527ba1, diversion = 0x7fffdb61a3a8, rpid = 0x7f5d00000006, refer_to = 0x7f5d93527b80, session_expires = 0x3, min_se = 0x0, sipifmatch = 0x3000000018, subscription_state = 0x7fffdb61a9d0, date = 0x7fffdb61a910,
          identity = 0x7fffdb61a9e0, identity_info = 0x7fffdb61a920, pai = 0x7f5d93528100, ppi = 0x7f5d00000000, path = 0x7fff00000000, privacy = 0x3000000000, min_expires = 0x7fffdb61a420, body = 0x0, eoh = 0xd68 <error: Cannot access memory at address 0xd68>,
          unparsed = 0x7f5d0000000d <error: Cannot access memory at address 0x7f5d0000000d>, rcv = {src_ip = {af = 3432, len = 0, u = {addrl = {0, 140039880344011}, addr32 = {0, 0, 2471657931, 32605}, addr16 = {0, 0, 0, 0, 33227, 37714, 32605, 0}, addr = "\000\000\000\000\000\000\000\000ˁR\223]\177\000"}},
            dst_ip = {af = 2471657924, len = 0, u = {addrl = {140038629956950, 140039880344011}, addr32 = {1221270870, 32605, 2471657931, 32605}, addr16 = {7510, 18635, 32605, 0, 33227, 37714, 32605, 0}, addr = "V\035\313H]\177\000\000ˁR\223]\177\000"}}, src_port = 0, dst_port = 0, proto_reserved1 = 1,
            proto_reserved2 = 40, src_su = {s = {sa_family = 22002, sa_data = "\000\000\300\201R\223]\177\000\000\000\000\000"}, sin = {sin_family = 22002, sin_port = 0, sin_addr = {s_addr = 2471657920}, sin_zero = "]\177\000\000\000\000\000"}, sin6 = {sin6_family = 22002, sin6_port = 0, sin6_flowinfo = 2471657920,
                sin6_addr = {__in6_u = {__u6_addr8 = "]\177\000\000\000\000\000\000\000\000\000\000h\r\000", __u6_addr16 = {32605, 0, 0, 0, 0, 0, 3432, 0}, __u6_addr32 = {32605, 0, 0, 3432}}}, sin6_scope_id = 0}}, bind_address = 0x3000000018, proto = -112 '\220'},
          buf = 0x3000000018 <error: Cannot access memory at address 0x3000000018>, len = 3680610976, new_uri = {s = 0x7fffdb61a9e0 "@\252a\333\377\377\377\377", len = -1083741293}, dst_uri = {s = 0x40000000 <error: Cannot access memory at address 0x40000000>, len = 268435456}, parsed_uri_ok = 6, parsed_uri = {
            user = {s = 0x7f5d8bdc63c7 "s\n", len = -1892064354}, passwd = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 16}, host = {s = 0x7fffdb61aa80 "\310[\374\223]\177", len = -614356544}, port = {s = 0x7f5d93e9f3d8 "\303\356\377\207]\177", len = 113676173},
            params = {s = 0x55f2bf9951c0 <def_list+32> "", len = 2}, sip_params = {s = 0x55f2bf676b93 "INFO", len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 42336, proto = 56161, type = 32767, flags = (URI_SIP_USER_PHONE | unknown: 2402936868),
            transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 262147}, user_param = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 1226949808}, maddr = {s = 0x400000002 <error: Cannot access memory at address 0x400000002>, len = -1306683054}, method = {
              s = 0x7f5d888a0220 <__func__.14016> "pres_agg_nbody_empty", len = 1226949808}, lr = {s = 0x7f5d93fcc278 "Xg\367\277\362U", len = 1226949256}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7f5d4921c4a0 "", len = 1226949256}, transport_val = {s = 0x55f2bff7a840 "\020\253\367\277\362U", len = 2}, ttl_val = {
              s = 0x55f2bf676b93 "INFO", len = 1073741824}, user_param_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 2}, maddr_val = {s = 0x55f2bf676b93 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {
              s = 0x7fffdb61a630 "\360\246a\333\377\177", len = -1085006010}, r2_val = {s = 0x7fffdb61a5d0 "", len = -1814159344}, gr_val = {s = 0x7f5d4921c4b0 "", len = -1814159344}}, parsed_orig_ruri_ok = -614357488, parsed_orig_ruri = {user = {s = 0x7f5d8ffbfbfc <pkg_proc_update_stats+115> "H\213\rEW ",
              len = -614357536}, passwd = {s = 0x0, len = 268435456}, host = {s = 0xfe134e0 <error: Cannot access memory at address 0xfe134e0>, len = 1260224}, port = {s = 0x1ecb20 <error: Cannot access memory at address 0x1ecb20>, len = 2078248}, params = {s = 0x8 <error: Cannot access memory at address 0x8>,
              len = 2061}, sip_params = {s = 0x7f5d93de2010 "\001", len = -614357440}, headers = {s = 0x55f2bf39a9ae <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 0}, port_no = 64160, proto = 49002, type = URN_URI_T, flags = (unknown: 3680610032), transport = {
              s = 0xbf538c90 <error: Cannot access memory at address 0xbf538c90>, len = -614357264}, ttl = {s = 0x55f2bf5390f4 <qm_malloc+2331> "H\213E\270H\203\300\070\351*\003", len = -614357264}, user_param = {s = 0x55f2bf676b93 "INFO", len = -1823299720}, maddr = {
              s = 0x9110000000 <error: Cannot access memory at address 0x9110000000>, len = -1823291592}, method = {s = 0x7f5d9352b68c "core: db_val.c", len = 8}, lr = {s = 0x7f5d93de2010 "\001", len = -1812396832}, r2 = {s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = -1074305143},
            gr = {s = 0x7f5d93fdc4b0 "\b", len = -614357232}, transport_val = {s = 0x7f5d93de2010 "\001", len = 64}, ttl_val = {s = 0x7fffdb61ad70 "", len = -1083741293}, user_param_val = {s = 0x7f5d9352a778 "core", len = 268435456}, maddr_val = {s = 0x6 <error: Cannot access memory at address 0x6>,
              len = -614357040}, method_val = {s = 0x7f5d93520e29 <db_str2val+14063> "H\213\205P\377\377\377H\213P\020\213\205X\377\377\377H\230H\001\320", <incomplete sequence \306>, len = 2062}, lr_val = {s = 0x7f5d93de2010 "\001", len = -614357184}, r2_val = {s = 0x55f2bff7678a "", len = -1812396816}, gr_val = {
              s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = -614357008}}, add_rm = 0x55f2bf541f46 <qm_info+46>, body_lumps = 0x7fffdb61a780, reply_lump = 0x55f2bf541f46 <qm_info+46>,
          add_to_branch_s = "\220\247a\333\377\177\000\000\020 ޓ]\177\000\000\300\247a\333\377\177\000\000\020 ޓ]\177\000\000Чa\333\377\177\000\000\374\373\373\217]\177\000\000\000\000\000\020\000\000\000\000\000", add_to_branch_len = 0, hash_index = 268435456, msg_flags = 0, flags = 3209961286, xflags = {22002,
            3680610272}, set_global_address = {s = 0x7f5d93de2010 "\001", len = 2078248}, set_global_port = {s = 0x7f5d93de2010 "\001", len = -614356960}, force_send_socket = 0x7f5d8ffbfbfc <pkg_proc_update_stats+115>, path_vec = {s = 0x7fffdb61a800 "(\266\037", len = 0}, instance = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 266416016}, reg_id = 1261584, ruid = {s = 0x1ed070 <error: Cannot access memory at address 0x1ed070>, len = 2078248}, location_ua = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 2065}, ldv = {flow = {
              decoded = 2019544, rcv = {src_ip = {af = 3680610384, len = 32767, u = {addrl = {94501078673838, 0}, addr32 = {3208227246, 22002, 0, 0}, addr16 = {43438, 48953, 22002, 0, 0, 0, 0, 0}, addr = "\256\251\071\277\362U\000\000\000\000\000\000\000\000\000"}}, dst_ip = {af = 2480808240, len = 5, u = {addrl = {
                      8858370048, 2482814280}, addr32 = {268435456, 2, 2482814280, 0}, addr16 = {0, 4096, 2, 0, 48456, 37884, 0, 0}, addr = "\000\000\000\020\002\000\000\000H\275\374\223\000\000\000"}}, src_port = 43296, dst_port = 56161, proto_reserved1 = 32767, proto_reserved2 = -1085033497, src_su = {s = {
                    sa_family = 22002, sa_data = "\000\000 \251a\333\377\177\000\000\220\214S\277"}, sin = {sin_family = 22002, sin_port = 0, sin_addr = {s_addr = 3680610592}, sin_zero = "\377\177\000\000\220\214S\277"}, sin6 = {sin6_family = 22002, sin6_port = 0, sin6_flowinfo = 3680610592, sin6_addr = {__in6_u = {
                        __u6_addr8 = "\377\177\000\000\220\214S\277\000\000\000\000\300\300f\277", __u6_addr16 = {32767, 0, 35984, 48979, 0, 0, 49344, 48998}, __u6_addr32 = {32767, 3209923728, 0, 3211182272}}}, sin6_scope_id = 22002}}, bind_address = 0xa32bf5390f4, proto = -96 '\240'}}}}
        __func__ = "_reply_light"
#22 0x00007f5d8f37aacf in _reply (trans=0x7f5d492210c8, p_msg=0x7f5d93ff24d8, code=202, reason=0x7fffdb61aba0, lock=1) at t_reply.c:655
        len = 486
        buf = 0x7f5d93fc5b08 "SIP/2.0 202 OK\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>;tag=0b62483f"...
        dset = 0x6 <error: Cannot access memory at address 0x6>
        bm = {to_tag_val = {s = 0x7f5d93fc5bc8 "0b62483f5ecbb3b7846ec4ead5977a30-8f9b\r\nVia: SIP/2.0/TLS 192.168.128.71:1167;branch=z9hG4bK-383736-165172ba8646f4b4f1f9bd59f158e3e0;rport=63556;received=88.88.88.88\r\nExpires: 3600\r\nContact: <sip:77.7"..., len = 37}}
        dset_len = 1
#23 0x00007f5d8f382aec in t_reply_str (t=0x7f5d492210c8, p_msg=0x7f5d93ff24d8, code=202, reason=0x7fffdb61aba0) at t_reply.c:1618
No locals.
#24 0x00007f5d8f3e8579 in ki_t_reply (msg=0x7f5d93ff24d8, code=202, reason=0x7fffdb61aba0) at tm.c:1353
        t = 0x7f5d492210c8
        ret = -1
        __func__ = "ki_t_reply"
#25 0x00007f5d8f3e8d7b in w_t_reply_wrp (msg=0x7f5d93ff24d8, code=202, txt=0x7f5d93fdc4e8 "OK") at tm.c:1410
        reason = {s = 0x7f5d93fdc4e8 "OK", len = 2}
#26 0x00007f5d8eeda87a in send_reply (msg=0x7f5d93ff24d8, code=202, reason=0x7f5d8bfde460 <su_200_rpl>) at sl.c:275
        r = 0x7f5d93fdc4e8 "OK"
        t = 0x7f5d492210c8
        ret = 1
        __func__ = "send_reply"
#27 0x00007f5d8bd8fa3f in send_2XX_reply (msg=0x7f5d93ff24d8, reply_code=202, lexpire=3600, local_contact=0x7fffdb61b0a0) at subscribe.c:126
        hdr_append = {s = 0x7f5d93f9ce28 "Expires: 3600\r\nContact: <sip:77.77.77.77:5071;transport=tls>\r\n", len = 65}
        tmp = {s = 0x7f5d93f9ce66 ">\r\n", len = 4}
        t = 0x7f5d93f9ce58 ";transport=tls>\r\n"
        __func__ = "send_2XX_reply"
#28 0x00007f5d8bd9720a in update_subscription (msg=0x7f5d93ff24d8, subs=0x7fffdb61afc0, to_tag_gen=1, sent_reply=0x7fffdb61adfc) at subscribe.c:697
        hash_code = 2045
        __func__ = "update_subscription"
#29 0x00007f5d8bd9ebeb in handle_subscribe (msg=0x7f5d93ff24d8, watcher_user=..., watcher_domain=...) at subscribe.c:1284
        to_tag_gen = 1
        subs = {pres_uri = {s = 0x7f5d93fd7390 "sip:263@mydomain.co.co", len = 33}, to_user = {
            s = 0x7f5d48cb1dda "263@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.71:1167;branch=z9hG4bK-383736-165172ba8646f4b4f1f9bd59f158e3e0\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813@192.168.128.71:1167;transport=tls"..., len = 3}, to_domain = {
            s = 0x7f5d48cb1dde "mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.71:1167;branch=z9hG4bK-383736-165172ba8646f4b4f1f9bd59f158e3e0\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813@192.168.128.71:1167;transport=tls;reg"..., len = 25}, from_user = {
            s = 0x7f5d48cb1da4 "813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.71:1167;branch=z9hG4bK-383736-165172ba8646f4b4f1f9bd59f158e3e0\r\nMax-Forwards: 69\r\nCon"..., len = 3}, from_domain = {
            s = 0x7f5d48cb1da8 "mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.71:1167;branch=z9hG4bK-383736-165172ba8646f4b4f1f9bd59f158e3e0\r\nMax-Forwards: 69\r\nContact"..., len = 25}, watcher_user = {
            s = 0x7f5d48cb1da4 "813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.71:1167;branch=z9hG4bK-383736-165172ba8646f4b4f1f9bd59f158e3e0\r\nMax-Forwards: 69\r\nCon"..., len = 3}, watcher_domain = {
            s = 0x7f5d48cb1da8 "mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.71:1167;branch=z9hG4bK-383736-165172ba8646f4b4f1f9bd59f158e3e0\r\nMax-Forwards: 69\r\nContact"..., len = 25}, event = 0x7f5d473a0810, event_id = {s = 0x0, len = 0},
          to_tag = {s = 0x7f5d8f65a4a0 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-8f9b", len = 37}, from_tag = {
            s = 0x7f5d48cb1dc7 "bff79e14\r\nTo: <sip:263@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.71:1167;branch=z9hG4bK-383736-165172ba8646f4b4f1f9bd59f158e3e0\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813@192.168.128.71"..., len = 8}, callid = {
            s = 0x7f5d48cb1d56 "4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.71:1167"..., len = 40}, sockinfo_str = {
            s = 0x7f5d93f69d20 "tls:77.77.77.77:5071", len = 23}, remote_cseq = 1, local_cseq = 0, contact = {s = 0x7f5d93f9da00 "sip:813@88.88.88.88:63556;transport=tls;registering_acc=mydomain_co_co", len = 83}, local_contact = {s = 0x7f5d93f7cee8 "sip:77.77.77.77:5071;transport=tls",
            len = 37}, record_route = {s = 0x0, len = 0}, expires = 3600, status = 1, reason = {s = 0x0, len = 0}, version = 0, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1, internal_update_flag = 0, updated = -1, updated_winfo = -1, flags = 0, user_agent = {
            s = 0x7f5d48cb1edb "Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 24}, next = 0x0}
        event = 0x7f5d473a0810
        parsed_event = 0x7f5d93fc7380
        ev_param = 0x0
        found = 1
        reason = {s = 0x0, len = 0}
        uri = {user = {s = 0x498 <error: Cannot access memory at address 0x498>, len = 45}, passwd = {s = 0x7fffdb61ae60 "\300\256a\333\377\177", len = 2}, host = {s = 0x55f2bf676b93 "INFO", len = 1073741824}, port = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, params = {
            s = 0x7fffdb61aec0 "\360d\367\277\362U", len = -1084863621}, sip_params = {s = 0x7fffdb61aea0 "H\365\374\223]\177", len = -1811995432}, headers = {s = 0x7fffdb61af60 "", len = -1812138752}, port_no = 10192, proto = 42945, type = 1604982722, flags = (unknown: 1558018816), transport = {
            s = 0x7f5d93fcf548 "\244\035\313H]\177", len = -614355040}, ttl = {s = 0x0, len = -1813768544}, user_param = {s = 0x55f2bff764f0 "", len = 0}, maddr = {s = 0x7f5d93e416a3 "", len = -1932453695}, method = {s = 0x0, len = -614354816}, lr = {
            s = 0xffffffff93f2a688 <error: Cannot access memory at address 0xffffffff93f2a688>, len = 0}, r2 = {
            s = 0x7f5d48cb1e00 "IP/2.0/TLS 192.168.128.71:1167;branch=z9hG4bK-383736-165172ba8646f4b4f1f9bd59f158e3e0\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813@192.168.128.71:1167;transport=tls;registering_acc=mydomain_c"..., len = 0}, gr = {s = 0x7f5d93e416a0 "813", len = 0}, transport_val = {
            s = 0x0, len = -1813768544}, ttl_val = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x7f5d93e4169f "", len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0x5d00000000 <error: Cannot access memory at address 0x5d00000000>, len = -1811995432}, gr_val = {
            s = 0x7f5d48cb1d22 "sip:263@mydomain.co.co SIP/2.0\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@mydomain"..., len = 33}}
        reply_code = 500
        reply_str = {s = 0x7f5d8bdd1ecd "Server Internal Error", len = 21}
        sent_reply = 0
        __func__ = "handle_subscribe"
#30 0x00007f5d8bd9acf8 in handle_subscribe0 (msg=0x7f5d93ff24d8) at subscribe.c:1033
        pfrom = 0x7f5d93fcf500
        __func__ = "handle_subscribe0"
#31 0x000055f2bf2cd694 in do_action (h=0x7fffdb61b900, a=0x7f5d93f31240, msg=0x7f5d93ff24d8) at core/action.c:1067
        ret = -5
        v = -1083741293
        dst = {send_sock = 0x1331c8, to = {s = {sa_family = 49704, sa_data = "\036\000\000\000\000\000\030\264\360\223]\177\000"}, sin = {sin_family = 49704, sin_port = 30, sin_addr = {s_addr = 0}, sin_zero = "\030\264\360\223]\177\000"}, sin6 = {sin6_family = 49704, sin6_port = 30, sin6_flowinfo = 0, sin6_addr = {
                __in6_u = {__u6_addr8 = "\030\264\360\223]\177\000\000\070\242\360\223]\177\000", __u6_addr16 = {46104, 37872, 32605, 0, 41528, 37872, 32605, 0}, __u6_addr32 = {2482025496, 32605, 2482020920, 32605}}}, sin6_scope_id = 2482971864}}, id = 32605, proto = 96 '`', send_flags = {f = 56161,
            blst_imask = 32767}}
        tmp = 0x40000000 <error: Cannot access memory at address 0x40000000>
        new_uri = 0x7f5d93f1fdd0 "\032"
        end = 0x7f5d93ff24d8 "X\a"
        crt = 0x55f2bf676b93 "INFO"
        cmd = 0x7f5d93e9d148
        len = -1280237469
        user = 1108297107
        uri = {user = {s = 0x7fffdb61b590 "", len = -1085210347}, passwd = {s = 0x7f5d93ef3760 "\002", len = -1811995432}, host = {s = 0x7fffdb61b578 "\350Rȍ]\177", len = 16}, port = {s = 0x7fffdb61b5a0 "\347Rȍ]\177", len = -614352544}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = -1}, headers = {
            s = 0x0, len = 16}, port_no = 36408, proto = 37879, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x55f200000000 <error: Cannot access memory at address 0x55f200000000>, len = 105}, ttl = {s = 0x7fffdb61b5f0 "\223kg\277\362U", len = 0}, user_param = {
            s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 121}, maddr = {s = 0x7f5d8dc852de "%s: %s%.*s", len = 3}, method = {s = 0x7f5d93ff24d8 "X\a", len = -1916251416}, lr = {s = 0x7f5d93f7c8b8 "ؠ\375\223]\177", len = -1811995432}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7f5d8dc852e7 "s",
            len = -1085033497}, transport_val = {s = 0x7f5d93f06068 "!", len = 16}, ttl_val = {s = 0x7f5d93e950a8 "\325l7\216]\177", len = -614352080}, user_param_val = {s = 0x7f5d93ef3748 "\024", len = 0}, maddr_val = {s = 0x55f2bf676b93 "INFO", len = 2}, method_val = {s = 0x55f2bf676b93 "INFO", len = 1073741824},
          lr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2_val = {s = 0x7fffdb61b6b0 "\240\274a\333\377\177", len = -1086177528}, gr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 266419672}}
        next_hop = {user = {s = 0x7fffdb61b370 "\240\263a\333\377\177", len = -614353712}, passwd = {s = 0x142f4c961 <error: Cannot access memory at address 0x142f4c961>, len = 1204645056}, host = {s = 0x7fffdb61b380 "\240\263a\333\377\177", len = -2018111024}, port = {s = 0x7f5d490428b0 "a\311\364B\244",
            len = 1204645056}, params = {s = 0x7fffdb61b3a0 "0\271a\333\377\177", len = 2}, sip_params = {s = 0x7fffdb61b3a0 "0\271a\333\377\177", len = 1}, headers = {s = 0x496110000000 <error: Cannot access memory at address 0x496110000000>, len = -1074305808}, port_no = 47408, proto = 56161, type = 32767,
          flags = (URI_USER_NORMALIZE | unknown: 2750703508), transport = {s = 0x7fffdb61b948 "\223Em}\373\350\253", <incomplete sequence \347>, len = 0}, ttl = {s = 0x7f5da3f46798 "]", len = -1545427783}, user_param = {s = 0x7fffdb61b4e0 "\240\265a\333\377\177", len = 1191889240}, maddr = {
            s = 0x7fffdb61b8f8 "`\321a\333\377\177", len = 29322}, method = {s = 0x7fffdb61b498 "", len = 10}, lr = {s = 0x7fffdb61b8f3 "\223]\177", len = 1551965284}, r2 = {s = 0x0, len = 0}, gr = {s = 0x55f200000000 <error: Cannot access memory at address 0x55f200000000>, len = -1}, transport_val = {
            s = 0x55f200000000 <error: Cannot access memory at address 0x55f200000000>, len = 0}, ttl_val = {s = 0x0, len = 32}, user_param_val = {s = 0x7fff00000005 <error: Cannot access memory at address 0x7fff00000005>, len = -1545241554}, maddr_val = {s = 0x7fffdb61b510 "", len = 105}, method_val = {
            s = 0xd68 <error: Cannot access memory at address 0xd68>, len = -1074305808}, lr_val = {s = 0x7fffdb61ba10 "\370\006\363\223]\177", len = -1916251426}, r2_val = {s = 0x7fffdb61bb18 "\b\275a\333\377\177", len = 0}, gr_val = {s = 0x69 <error: Cannot access memory at address 0x69>, len = -1545427783}}
        u = 0x2
        port = 0
        dst_host = 0x55f2bf2db1ff <run_actions_safe+151>
        i = 1
        flags = 32605
        avp = 0x0
        st = {flags = 164, id = 0, name = {n = 1191653376, s = {s = 0x7f5d47073000 "", len = 1}, re = 0x7f5d47073000}, avp = 0x7f5d490428b0}
        sct = 0x10000000
        sjt = 0x40000000
        rve = 0x7f5d93f1fdd0
        mct = 0x55f2bf676b93
        rv = 0x7f5d87b933ac
        rv1 = 0x7fffdb61d160
        c1 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 6, s = {s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = -614354144}, re = 0x100000006}, pval = {rs = {s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = -614354144}, ri = -1084997049,
              flags = 22002}}, i2s = "\000\061\271\207]\177\000\000\031\347壺\000\000\000\310a\271\207]\177"}
        s = {s = 0x55f2bf676b93 "INFO", len = 1191888584}
        srevp = {0x7fffdb61b2d0, 0x55f2bf536266 <futex_release+29>}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#32 0x000055f2bf2daba3 in run_actions (h=0x7fffdb61b900, a=0x7f5d93f31240, msg=0x7f5d93ff24d8) at core/action.c:1564
        t = 0x7f5d93f31240
        ret = -1
        ms = 0
        __func__ = "run_actions"
#33 0x000055f2bf2db1ff in run_actions_safe (h=0x7fffdb61d160, a=0x7f5d93f31240, msg=0x7f5d93ff24d8) at core/action.c:1625
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {2, -5498578058915920493, 94501081672595, 1073741824, 268435456, 6, -5498578058903337581, -1753051463091927661}, __mask_was_saved = 0, __saved_mask = {__val = {1073741824, 268435456, 6, 140736874002896, 94501080551108, 268435456,
                  140039891657944, 140736874003152, 140039891514624, 1, 2, 140039891514696, 140736874003360, 140039890833080, 140039891657944, 140736874003056}}}}}
        ret = -1
        ign_on_break = 0
#34 0x000055f2bf50b8c1 in rval_get_int (h=0x7fffdb61d160, msg=0x7f5d93ff24d8, i=0x7fffdb61bd08, rv=0x7f5d93f306f8, cache=0x0) at core/rvalue.c:912
        r_avp = 0x7fffdb61bba0
        avp_val = {n = 268435456, s = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, re = 0x10000000}
        pval = {rs = {s = 0x55f2bff76740 "!B", len = 2}, ri = -1083741293, flags = 22002}
        tmp = {s = 0x965b8cc500000cc5 <error: Cannot access memory at address 0x965b8cc500000cc5>, len = -1812138680}
        s = 0x0
        r = 21
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#35 0x000055f2bf510232 in rval_expr_eval_int (h=0x7fffdb61d160, msg=0x7f5d93ff24d8, res=0x7fffdb61bd08, rve=0x7f5d93f306f0) at core/rvalue.c:1910
        i1 = -614350464
        i2 = 4
        ret = -1
        c1 = {cache_type = 2482971864, val_type = 32605, c = {avp_val = {n = -614346400, s = {s = 0x7fffdb61d160 "\003", len = -1083741293}, re = 0x7fffdb61d160}, pval = {rs = {s = 0x7fffdb61d160 "\003", len = -1083741293}, ri = 1073741824, flags = 0}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = -614351968, s = {s = 0x7fffdb61bba0 "", len = -614351904}, re = 0x7fffdb61bba0}, pval = {rs = {s = 0x7fffdb61bba0 "", len = -614351904}, ri = -1085210347, flags = 22002}},
          i2s = "\330$\377\223]\177\000\000\000\000\000\000\000\000\000\000\230\216\362\223]\177"}
        rv1 = 0x55f2bf480c1f <pv_value_destroy+175>
        rv2 = 0x55f2bf676b93
        __func__ = "rval_expr_eval_int"
#36 0x000055f2bf5106a2 in rval_expr_eval_int (h=0x7fffdb61d160, msg=0x7f5d93ff24d8, res=0x7fffdb61c180, rve=0x7f5d93f315e8) at core/rvalue.c:1918
        i1 = 0
        i2 = 0
        ret = -1
        c1 = {cache_type = 1259184, val_type = RV_NONE, c = {avp_val = {n = 2017040, s = {s = 0x1ec710 <error: Cannot access memory at address 0x1ec710>, len = 2078248}, re = 0x1ec710}, pval = {rs = {s = 0x1ec710 <error: Cannot access memory at address 0x1ec710>, len = 2078248}, ri = 8, flags = 0}},
          i2s = "0\232\361\223]\177\000\000\002\000\000\000\000\000\000\000\000\240\360\223]\177"}
        c2 = {cache_type = 3680615712, val_type = 32767, c = {avp_val = {n = -1916278421, s = {s = 0x7f5d8dc7e96b <xlog_2_helper+990> "H\215e\330[A\\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271", len = 268435456},
              re = 0x7f5d8dc7e96b <xlog_2_helper+990>}, pval = {rs = {s = 0x7f5d8dc7e96b <xlog_2_helper+990> "H\215e\330[A\\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271", len = 268435456}, ri = 6, flags = 0}},
          i2s = "\377\377\377\377\000\000\000\000\260\222\375\223]\177\000\000\060\232\361\223]\177"}
        rv1 = 0x6
        rv2 = 0x10000000
        __func__ = "rval_expr_eval_int"
#37 0x000055f2bf2cd131 in do_action (h=0x7fffdb61d160, a=0x7f5d93f32a10, msg=0x7f5d93ff24d8) at core/action.c:1043
        ret = -5
        v = 0
        dst = {send_sock = 0x55f2bf676b93, to = {s = {sa_family = 0, sa_data = "\000@\000\000\000\000\000\000\000\020\000\000\000"}, sin = {sin_family = 0, sin_port = 16384, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\020\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 16384, sin6_flowinfo = 0,
              sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000", __u6_addr16 = {0, 4096, 0, 0, 6, 0, 0, 0}, __u6_addr32 = {268435456, 0, 6, 0}}}, sin6_scope_id = 3680617136}}, id = 32767, proto = -50 '\316', send_flags = {f = 48977, blst_imask = 22002}}
        tmp = 0x7fffdb61d160 "\003"
        new_uri = 0x7fffdb61c360 ""
        end = 0x55f2bf50fe49 <rval_str_lop2+192> "\213E\354\353!\220\353\001\220H\213E\360H\211\307\350\033\224\377\377H\213E\370H\211\307\350\017\224\377\377\270"
        crt = 0x7f5d93ff24d8 "X\a"
        cmd = 0x7f5d93e972e8
        len = 32767
        user = -614348768
        uri = {user = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 2}, passwd = {s = 0x55f2bf676b93 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7fffdb61c0b0 "\300\301a\333\377\177", len = -1087525981},
          params = {s = 0x55f2bf676b93 "INFO", len = 1073741824}, sip_params = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, headers = {s = 0x7fffdb61c170 "\260\302a\333\377\177", len = -1085210062}, port_no = 49328, proto = 56161, type = 32767, flags = (unknown: 2482971864),
          transport = {s = 0x7f5d93f1e760 "\026", len = -614350624}, ttl = {s = 0x7f5d93f7a7c8 "", len = -1811995432}, user_param = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, maddr = {s = 0x7f5d93ff24d8 "X\a", len = 2}, method = {s = 0x55f2bf676b93 "INFO", len = 1073741824},
          lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2 = {s = 0x7fffdb61c1c0 "\260\302a\333\377\177", len = -1087524353}, gr = {s = 0x7f5d93ff24d8 "X\a", len = -1811995432}, transport_val = {s = 0x7f5d93f1e760 "\026", len = -614346400}, ttl_val = {s = 0x0, len = 1},
          user_param_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = -1404090989}, maddr_val = {s = 0x55f2bf676b93 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {
            s = 0xb3b12063ad0f4593 <error: Cannot access memory at address 0xb3b12063ad0f4593>, len = 2104313235}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x55f2bf6ac230 <__func__.7452> "rval_destroy", len = 2}}
        next_hop = {user = {s = 0x7f5d93f57ce8 "\004", len = -614346400}, passwd = {s = 0x0, len = -1}, host = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1364149651}, port = {s = 0x55f2bf676b93 "INFO", len = 1073741824}, params = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>,
            len = 6}, sip_params = {s = 0xb3b12063560f4593 <error: Cannot access memory at address 0xb3b12063560f4593>, len = 2104313235}, headers = {s = 0x0, len = 6}, port_no = 49008, proto = 56161, type = 32767, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3207441312), transport = {
            s = 0x7fffdb61c020 "", len = -1545216156}, ttl = {s = 0x7f5d93e95e98 "\251\314\021\216]\177", len = 0}, user_param = {s = 0x18 <error: Cannot access memory at address 0x18>, len = -1074488800}, maddr = {s = 0x0, len = -1811995432}, method = {s = 0x7f5d93ef98a0 ".", len = -614350944}, lr = {
            s = 0x27db61c020 <error: Cannot access memory at address 0x27db61c020>, len = -1899429600}, r2 = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = -1}, gr = {s = 0x7fffdb61c030 "p\301a\333\377\177", len = -1085228863}, transport_val = {s = 0x55f2bf676b93 "INFO",
            len = 1073741824}, ttl_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 0}, user_param_val = {s = 0x7f5d93f57f28 "\004", len = -614350232}, maddr_val = {s = 0x7f5d93ff24d8 "X\a", len = -614346400}, method_val = {s = 0x7f5d93ef98a0 ".", len = -614346400}, lr_val = {
            s = 0x0, len = 0}, r2_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1406092691}, gr_val = {s = 0x55f2bf676b93 "INFO", len = 1073741824}}
        u = 0x7f5d93f1f208
        port = 0
        dst_host = 0x55f2bf510232 <rval_expr_eval_int+154>
        i = 11
        flags = 32605
        avp = 0x7fffdb61c340
        st = {flags = 268435456, id = 0, name = {n = 6, s = {s = 0x6 <error: Cannot access memory at address 0x6>, len = -614351040}, re = 0x6}, avp = 0x55f2bf2db1ff <run_actions_safe+151>}
        sct = 0x7fffdb61c2b0
        sjt = 0x1
        rve = 0x7f5d93f315e8
        mct = 0x7f5d93f59f88
        rv = 0x40000000
        rv1 = 0x7f5d93de2010
        c1 = {cache_type = 3680615952, val_type = 32767, c = {avp_val = {n = -1811995432, s = {s = 0x5e93ff24d8 <error: Cannot access memory at address 0x5e93ff24d8>, len = 0}, re = 0x5e93ff24d8}, pval = {rs = {s = 0x5e93ff24d8 <error: Cannot access memory at address 0x5e93ff24d8>, len = 0}, ri = 0, flags = 0}},
          i2s = "0\276a\333\377\177\000\000\002\000\000\000\000\000\000\000\223kg\277\362U"}
        s = {s = 0x7f5d93f57ce8 "\004", len = -614351264}
        srevp = {0x10000000, 0x7f5d93ff24d8}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#38 0x000055f2bf2daba3 in run_actions (h=0x7fffdb61d160, a=0x7f5d93f1fa20, msg=0x7f5d93ff24d8) at core/action.c:1564
        t = 0x7f5d93f32a10
        ret = 1
        ms = 0
        __func__ = "run_actions"
#39 0x000055f2bf2cd600 in do_action (h=0x7fffdb61d160, a=0x7f5d93f36650, msg=0x7f5d93ff24d8) at core/action.c:1058
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                  __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0, blst_imask = 0}}
        tmp = 0x7fffdb61d160 "\003"
        new_uri = 0x0
        end = 0x0
        crt = 0x7f5d93ff24d8 "X\a"
        cmd = 0x0
        len = 32767
        user = -614347072
        uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x55f2bf676b93 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7fffdb61c750 "`\310a\333\377\177", len = -1087525981}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0},
          headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 2482971864), transport = {s = 0x7f5d93eb06c8 "\021", len = -614348928}, ttl = {s = 0x0, len = 0}, user_param = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, maddr = {
            s = 0x0, len = 2}, method = {s = 0x55f2bf676b93 "INFO", len = 1073741824}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2 = {s = 0x7fffdb61c860 "P\311a\333\377\177", len = -1087524353}, gr = {s = 0x0, len = -1811995432}, transport_val = {s = 0x7f5d93eb06c8 "\021",
            len = -614346400}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = -1550891629}, maddr_val = {s = 0x55f2bf676b93 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {
            s = 0xb3b12063a04f4593 <error: Cannot access memory at address 0xb3b12063a04f4593>, len = 2104313235}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7fffdb61c510 "p\314a\333\377\177", len = -1084623376}, passwd = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = -614349520}, host = {s = 0x7fffdb61cc70 "\360\314a\333\377\177", len = -1949004110}, port = {s = 0x7fffdb61cdd0 "@", len = 1215768976},
          params = {s = 0x728a0000062a <error: Cannot access memory at address 0x728a0000062a>, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x6400010001 <error: Cannot access memory at address 0x6400010001>, len = 1217324264}, port_no = 6, proto = 0, type = ERROR_URI_T,
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 1217324268), transport = {s = 0x53 <error: Cannot access memory at address 0x53>, len = 1217324355}, ttl = {s = 0x7f5d93e95e98 "\251\314\021\216]\177", len = 128}, user_param = {s = 0x7f5d93fc8c08 "V\035\313H]\177", len = 0}, maddr = {
            s = 0x7f5d93f9aaa0 <incomplete sequence \350>, len = -1812366528}, method = {s = 0x7a <error: Cannot access memory at address 0x7a>, len = -1812354400}, lr = {s = 0x0, len = -1812366528}, r2 = {s = 0x7f5d93f98718 "\a", len = -1812375624}, gr = {s = 0x7f5d93f9c250 "\034", len = 0}, transport_val = {
            s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        u = 0x7f5d93eb0818
        port = 0
        dst_host = 0x55f2bf510232 <rval_expr_eval_int+154>
        i = 0
        flags = 32767
        avp = 0x0
        st = {flags = 3680617712, id = 32767, name = {n = -1084879451, s = {s = 0x55f2bf560da5 <free_hdr_field_lst+93> "H\307", <incomplete sequence \370>, len = 904}, re = 0x55f2bf560da5 <free_hdr_field_lst+93>}, avp = 0x55f2bf5a1c36 <msg_ldata_reset+47>}
        sct = 0x7fffdb61c950
        sjt = 0xffffffff
        rve = 0x7f5d93f1f208
        mct = 0x0
        rv = 0x6
        rv1 = 0x0
        c1 = {cache_type = 88, val_type = RV_NONE, c = {avp_val = {n = -1812366584, s = {s = 0x7f5d93f97b08 "X", len = 268435456}, re = 0x7f5d93f97b08}, pval = {rs = {s = 0x7f5d93f97b08 "X", len = 268435456}, ri = 2, flags = 0}}, i2s = "\223kg\277\362U\000\000\000\000\000@\000\000\000\000\000\000\000\020\000"}
        s = {s = 0x7f5d8bdc8df0 <__func__.18588> "run_notify_reply_event", len = -1814159344}
        srevp = {0x7fffdb61c4c0, 0x55f2bf5608d5 <clean_hdr_field+240>}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#40 0x000055f2bf2daba3 in run_actions (h=0x7fffdb61d160, a=0x7f5d93f36650, msg=0x7f5d93ff24d8) at core/action.c:1564
        t = 0x7f5d93f36650
        ret = -1
        ms = 0
        __func__ = "run_actions"
#41 0x000055f2bf2c9e0f in do_action (h=0x7fffdb61d160, a=0x7f5d93eb22b8, msg=0x7f5d93ff24d8) at core/action.c:691
        ret = -5
        v = 0
        dst = {send_sock = 0x7fff0505cef0, to = {s = {sa_family = 64508, sa_data = "\373\217]\177\000\000\000\000\000\020\000\000\000"}, sin = {sin_family = 64508, sin_port = 36859, sin_addr = {s_addr = 32605}, sin_zero = "\000\000\000\020\000\000\000"}, sin6 = {sin6_family = 64508, sin6_port = 36859,
              sin6_flowinfo = 32605, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\020", '\000' <repeats 11 times>, __u6_addr16 = {0, 4096, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {268435456, 0, 0, 0}}}, sin6_scope_id = 268435456}}, id = 0, proto = -40 '\330', send_flags = {f = 4065, blst_imask = 0}}
        tmp = 0x55f2bf5390f4 <qm_malloc+2331> "H\213E\270H\203\300\070\351*\003"
        new_uri = 0x7f5d48cb1e1f "branch=z9hG4bK-383736-165172ba8646f4b4f1f9bd59f158e3e0\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813@192.168.128.71:1167;transport=tls;registering_acc=mydomain_co_co>\r\nUser-Agent: Jitsi2.10.55"...
        end = 0x93fd0268 <error: Cannot access memory at address 0x93fd0268>
        crt = 0x7fffdb61d0f0 ""
        cmd = 0xe8
        len = 0
        user = -1085043568
        uri = {user = {s = 0x400db61cdd0 <error: Cannot access memory at address 0x400db61cdd0>, len = 0}, passwd = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 266420096}, host = {s = 0x400133020 <error: Cannot access memory at address 0x400133020>, len = -1083451072}, port = {
            s = 0x1fb628 <error: Cannot access memory at address 0x1fb628>, len = 8}, params = {s = 0x7fffdb61ce40 "\320\317a\333\377\177", len = -1084838642}, sip_params = {s = 0x7fffdb61cd90 "\240\002\375\223]\177", len = -1086740050}, headers = {s = 0x0, len = -1083508064}, port_no = 52800, proto = 56161,
          type = 32767, flags = (unknown: 3209923728), transport = {s = 0x7f5d93fd02a0 "\001", len = -1812354400}, ttl = {s = 0x7fffdb61ce92 "\005\005\377\177", len = -614347117}, user_param = {s = 0x7f5d48cb1f48 "", len = 1221271071}, maddr = {s = 0x55f2bf6c12d0 <__func__.6670> "parse_via", len = -1083444040},
          method = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -1814159344}, lr = {s = 0x7fffdb61ce50 "\260\316a\333\377\177", len = 1}, r2 = {s = 0x0, len = -1812354456}, gr = {s = 0x500005000000000 <error: Cannot access memory at address 0x500005000000000>, len = -614347124}, transport_val = {
            s = 0x4db61ceb0 <error: Cannot access memory at address 0x4db61ceb0>, len = 1221271066}, ttl_val = {s = 0x4bf676b93 <error: Cannot access memory at address 0x4bf676b93>, len = 1221271070}, user_param_val = {
            s = 0x7f5d48cb1e1e ";branch=z9hG4bK-383736-165172ba8646f4b4f1f9bd59f158e3e0\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813@192.168.128.71:1167;transport=tls;registering_acc=mydomain_co_co>\r\nUser-Agent: Jitsi2.10.5"..., len = 4}, maddr_val = {s = 0x7fffdb61cfd0 "\360\320a\333\377\177",
            len = -1084788407}, method_val = {s = 0x7fffdb61ceb0 "", len = -1812505256}, lr_val = {s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = -1812135264}, r2_val = {s = 0x7f5d48cb1f48 "", len = 1221271039}, gr_val = {s = 0x7fffdb61ceb0 "", len = -1814159344}}
        next_hop = {user = {s = 0x7f5d8bdc8e08 <__func__.18601> "p_tm_callback", len = -1948505814}, passwd = {s = 0x7f5d48725490 "\220\061\220^\247", len = 1191653376}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1191888584},
          sip_params = {s = 0x0, len = 1191653376}, headers = {s = 0x100000430 <error: Cannot access memory at address 0x100000430>, len = 1191888584}, port_no = 52272, proto = 56161, type = 32767, flags = (URI_SIP_USER_PHONE | unknown: 3209912932), transport = {s = 0x55f2bf676b93 "INFO", len = 1191888584}, ttl = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, user_param = {s = 0x7fffdb61cc70 "\360\314a\333\377\177", len = -1084996446}, maddr = {s = 0x7f5d8bdc18f0 "presence", len = 2}, method = {s = 0x7f5d8bdc8e08 <__func__.18601> "p_tm_callback", len = -1948505814}, lr = {
            s = 0x7f5d48725490 "\220\061\220^\247", len = 1191653376}, r2 = {s = 0x7fffdb61ccf0 "\240\315a\333\377\177", len = -1949001901}, gr = {s = 0x7fffdb61ccb0 "\320\315a\333\377\177", len = 1193759768}, transport_val = {s = 0x2db61ccb0 <error: Cannot access memory at address 0x2db61ccb0>, len = -614347312},
          ttl_val = {s = 0x400485857f0 <error: Cannot access memory at address 0x400485857f0>, len = 1215768976}, user_param_val = {s = 0x7fffdb61cdd0 "@", len = 1215452304}, maddr_val = {s = 0x132da8 <error: Cannot access memory at address 0x132da8>, len = 2}, method_val = {s = 0x55f2bf9951a0 <def_list> "",
            len = -1085006010}, lr_val = {s = 0x7fffdb61cd20 "", len = -1814159344}, r2_val = {s = 0x7fffdb61cda0 "\222\316a\333\377\177", len = -1814159344}, gr_val = {s = 0x7fffdb61cd60 "\220\315a\333\377\177", len = -1879311364}}
        u = 0x7fffdb61d0f0
        port = 0
        dst_host = 0x8
        i = 15
        flags = 1857
        avp = 0x7f5d48cb1f48
        st = {flags = 3680619568, id = 32767, name = {n = -1085033523, s = {s = 0x55f2bf53b3cd <qm_free+7976> "H\213E\270\213", len = 0}, re = 0x55f2bf53b3cd <qm_free+7976>}, avp = 0x0}
        sct = 0x0
        sjt = 0x55f2bf39a9ae <sr_event_exec+482>
        rve = 0x7f5d93eb0818
        mct = 0x7fffdb61cf20
        rv = 0x7f5d486ead68
        rv1 = 0x7f5d93f992f0
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 1215452248}, re = 0x0}, pval = {rs = {s = 0x0, len = 1215452248}, ri = 1191653376, flags = 32605}}, i2s = "\223kg\277\004\000\000\000\340j\aG]\177\000\000\000\000\000\020\206"}
        s = {s = 0x7f5d48725458 "\270", len = 1191653376}
        srevp = {0x741000001f8, 0x7f5d8bdc292a}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#42 0x000055f2bf2daba3 in run_actions (h=0x7fffdb61d160, a=0x7f5d93eae8f0, msg=0x7f5d93ff24d8) at core/action.c:1564
        t = 0x7f5d93eb22b8
        ret = 1
        ms = 0
        __func__ = "run_actions"
#43 0x000055f2bf2db2c7 in run_top_route (a=0x7f5d93eae8f0, msg=0x7f5d93ff24d8, c=0x0) at core/action.c:1646
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {2, -5498578058064476781, 94501081672595, 1073741824, 268435456, 6, -5498578058119002733, -1753051463091927661}, __mask_was_saved = 0, __saved_mask = {__val = {5910974510923775, 140736874009072, 140039824323943, 94501081672595, 0,
                  4611686022990790656, 140039891657944, 140736874009168, 94501078756662, 6777939192, 140039891657944, 1073741825, 0, 94501081672595, 2, 94501081672595}}}}}
        p = 0x7fffdb61d160
        ret = 268435456
        sfbk = 0
#44 0x000055f2bf42fc3f in receive_msg (buf=0x7f5d48cb1d18 "SUBSCRIBE sip:263@mydomain.co.co SIP/2.0\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@de"..., len=560, rcv_info=0x7f5d48cb1a38)
    at core/receive.c:340
        msg = 0x7f5d93ff24d8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 2, jmp_env = {{__jmpbuf = {94501081672595, 1073741824, 268435456, 6, 140736874009680, 94501079858984, 9, 140040157958592}, __mask_was_saved = -614344912, __saved_mask = {__val = {140038629956128, 140038629956888, 8589935152, 227633332225, 140038629956888, 9,
                  140038629956898, 33, 140038629956932, 7, 64, 0, 140038621315432, 2632814952448, 16383, 140038627493856}}}}}
        bctx = 0x0
        ret = 32605
        stats_on = 0
        tvb = {tv_sec = 219043332096, tv_usec = 140038629956939}
        tve = {tv_sec = 0, tv_usec = 140038629957448}
        tz = {tz_minuteswest = 1221270818, tz_dsttime = 32605}
        diff = 0
        inb = {s = 0x7f5d48cb1d18 "SUBSCRIBE sip:263@mydomain.co.co SIP/2.0\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@de"..., len = 560}
        netinfo = {data = {s = 0x2020202020202020 <error: Cannot access memory at address 0x2020202020202020>, len = 538976288}, rcv = 0xffffffffffffffff, dst = 0x7f5d48cb1d4d}
        keng = 0x0
        evp = {data = 0x7fffdb61d2e0, rcv = 0x7f5d48cb1a38, dst = 0x0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        __func__ = "receive_msg"
#45 0x000055f2bf4c6dcc in receive_tcp_msg (tcpbuf=0x7f5d48cb1d18 "SUBSCRIBE sip:263@mydomain.co.co SIP/2.0\r\nCall-ID: 4344f6abd4f154f8ddb8a80bcc284feb@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=bff79e14\r\nTo: <sip:263@de"..., len=560, rcv_info=0x7f5d48cb1a38,
    con=0x7f5d48cb1a20) at core/tcp_read.c:1399
        buf = 0x0
        bsize = 0
        blen = 560
        __func__ = "receive_tcp_msg"
#46 0x000055f2bf4c93d4 in tcp_read_req (con=0x7f5d48cb1a20, bytes_read=0x7fffdb61d6d0, read_flags=0x7fffdb61d6c8) at core/tcp_read.c:1631
        bytes = 560
        total_bytes = 560
        resp = 1
        size = 0
        req = 0x7f5d48cb1aa0
        dst = {send_sock = 0x7fffdb61d6c0, to = {s = {sa_family = 6928, sa_data = "\313H]\177\000\000\000\000\000\000\001 \000"}, sin = {sin_family = 6928, sin_port = 18635, sin_addr = {s_addr = 32605}, sin_zero = "\000\000\000\000\001 \000"}, sin6 = {sin6_family = 6928, sin6_port = 18635, sin6_flowinfo = 32605,
              sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\001 \000\000\370\326\375\223]\177\000", __u6_addr16 = {0, 0, 8193, 0, 55032, 37885, 32605, 0}, __u6_addr32 = {0, 8193, 2482886392, 32605}}}, sin6_scope_id = 3680621968}}, id = 32767, proto = 1 '\001', send_flags = {f = 0, blst_imask = 80}}
        c = 13 '\r'
        ret = 0
        __func__ = "tcp_read_req"
#47 0x000055f2bf4ccf31 in handle_io (fm=0x7f5d93fdd6f8, events=1, idx=-1) at core/tcp_read.c:1862
        ret = 0
        n = 22002
        read_flags = 1
        con = 0x7f5d48cb1a20
        s = 0
        resp = 1
        t = 80
        __func__ = "handle_io"
#48 0x000055f2bf4b9e34 in io_wait_loop_epoll (h=0x55f2bf9970c0 <io_w>, t=2, repeat=0) at core/io_wait.h:1065
        n = 1
        r = 0
        fm = 0x7f5d93fdd6f8
        revents = 1
        __func__ = "io_wait_loop_epoll"
#49 0x000055f2bf4ce2de in tcp_receive_loop (unix_sock=83) at core/tcp_read.c:1974
        __func__ = "tcp_receive_loop"
#50 0x000055f2bf381a7e in tcp_init_children () at core/tcp_main.c:4853
        r = 9
        i = 15
        reader_fd_1 = 83
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\006\000\000\000\000\000\000\000\000\331a\333\377\177\000\000\364\254<\277\362U\000\000\060\331a\333\377\177\000\000\263g=\277\001", '\000' <repeats 11 times>, "\246vH\277\000\000\000\000a\225h\277\000\000\000\000\360\064\352\223]\177\000\000\357\300b\277>r\000\000\000\000\000\000\000\000\000\000\061\000\000\000\062\000\000\000\000r\354\243]\177\000"
        si = 0x0
        __func__ = "tcp_init_children"
#51 0x000055f2bf2b91dc in main_loop () at main.c:1745
        i = 16
        pid = 29245
        si = 0x0
        si_desc = "udp receiver child=15 sock=127.0.0.20:5088 (77.77.77.77:5070)\000\067\060)\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\217r\354\243]\177\000\000\300\331a\333\377\177\000\000\060\000\000\000\060\000\000\000\240\332a\333\377\177\000\000\310^\365\223]\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#52 0x000055f2bf2c019e in main (argc=13, argv=0x7fffdb61dd38) at main.c:2696
        cfg_stream = 0x55f2bfddd010
        c = -1
        r = 0
        tmp = 0x7fffdb61ee5e ""
        tmp_len = 32767
        port = -614343824
        proto = 32605
        options = 0x55f2bf62cc00 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 328348188
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0xd <error: Cannot access memory at address 0xd>
        st = {st_dev = 18, st_ino = 150598697, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1551964882, tv_nsec = 330050425}, st_mtim = {tv_sec = 1551964882, tv_nsec = 330050425}, st_ctim = {tv_sec = 1551964882,
            tv_nsec = 330050425}, __glibc_reserved = {0, 0, 0}}
        __func__ = "main"
		
		
(gdb) info locals
cfg_stream = 0x55f2bfddd010
c = -1
r = 0
tmp = 0x7fffdb61ee5e ""
tmp_len = 32767
port = -614343824
proto = 32605
options = 0x55f2bf62cc00 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 328348188
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x0
p = 0xd <error: Cannot access memory at address 0xd>
st = {st_dev = 18, st_ino = 150598697, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1551964882, tv_nsec = 330050425}, st_mtim = {tv_sec = 1551964882, tv_nsec = 330050425}, st_ctim = {tv_sec = 1551964882,
    tv_nsec = 330050425}, __glibc_reserved = {0, 0, 0}}
__func__ = "main"


(gdb) list
2694
2695        if (len < bl)
2696            return 1;
2697
2698        for (i = 0, len -= bl; i <= len; i += bl)
2699            (*dat->block) (in + i, out + i, &dat->ks);
2700
2701        return 1;
2702    }
2703

Log Messages


Feb 20 13:55:55 PBXxxxx kernel: [5243784.004500] kamailio[35028]: segfault at 7ff9ef2c3000 ip 00007ff9faf54645 sp 00007ffe163f98d8 error 4 in libcrypto.so.1.1[7ff9faebe000+2b1000]
Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Main process exited, code=exited, status=1/FAILURE
Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Unit entered failed state.
Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Failed with result 'exit-code'.
Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Service hold-off time over, scheduling restart.
Feb 20 13:55:58 PBXxxxx systemd[1]: Stopped Kamailio (OpenSER) - the Open Source SIP Server.
Feb 20 13:55:58 PBXxxxx systemd[1]: Starting Kamailio (OpenSER) - the Open Source SIP Server...

Feb 20 13:55:55 PBXxxxx /usr/local/kamailio/sbin/kamailio[35065]: ERROR: tls [tls_util.h:42]: tls_err_ret(): TLS read:error:24067044:random number generator:rand_pool_add:internal error
Feb 20 13:55:55 PBXxxxx /usr/local/kamailio/sbin/kamailio[35065]: ERROR: <core> [core/tcp_read.c:1505]: tcp_read_req(): ERROR: tcp_read_req: error reading - c: 0x7ff9b1f22340 r: 0x7ff9b1f223c0 (-1)
Feb 20 13:55:56 PBXxxxx /usr/local/kamailio/sbin/kamailio[35069]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 65
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: ALERT: <core> [main.c:740]: handle_sigs(): child process 37534 exited by a signal 11
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: ALERT: <core> [main.c:743]: handle_sigs(): core was generated
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: INFO: <core> [main.c:766]: handle_sigs(): terminating due to SIGCHLD
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37575]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37561]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37554]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37544]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37538]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37570]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37541]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37573]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37567]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37559]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37564]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37536]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37557]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37528]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37550]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37517]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37487]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37505]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37483]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37496]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37520]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37401]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37525]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37450]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37509]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37546]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37531]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37480]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37477]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37490]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37522]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37453]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37405]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37474]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37465]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37518]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37499]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37471]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37468]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37502]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37493]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37459]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37456]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37398]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37462]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37436]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37444]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37442]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37439]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37430]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37421]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37433]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37427]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37424]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37415]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37403]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37399]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37411]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37446]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37408]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37418]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received

SIP Traffic

Don't currently have, can capture if required.

Possible Solutions

TBD

Additional Information

  • Kamailio Version - output of kamailio -v
version: kamailio 5.2.1 (x86_64/linux) 60cf0c
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144 MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: 60cf0c
compiled on 12:30:11 Mar  7 2019 with gcc 6.3.0
  • Operating System:
Linux PBXxxxx 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux
@shaunjstokes
Copy link
Author

I've looked at similar situations, apparently this can be caused by multi-threaded programming, accessing the socket on different threads at the same time. The solution is to make sure you're not writing to it on one thread and closing it on another but I'm at a loss as to how to check this in Kamailio.

Does anyone have any suggestions?

@shaunjstokes
Copy link
Author

We've been testing this further.

  • The problem doesn't occur when using TCP\UDP with-out making changes to our existing configuration.
  • If we change 'children' from 16 to 1 then the problem no longer occurs when using TLS.

Are there any significant drawbacks setting 'children' to 1? Thus far everything appears to be working as expected.

@miconda
Copy link
Member

miconda commented Feb 21, 2019

Is libcrypto using threads and deals with sockets itself from point of view of closing them? Kamailio is multi-process and at a given moment, only one process is supposed to write to the socket. Moreover, afaik, writing to a closed socket is not causing SIGSEGV.

From the log messages, it seems an error related to the random number generator from libcrypto.

You should install debugging symbols for libssl/libcrypto and see if you can get more details on the related frames from gdb. Last frame related to kamailio code is no. 11, the first 0..10 frames point to libss/libcrypto, but those have no symbols.

@shaunjstokes
Copy link
Author

shaunjstokes commented Feb 22, 2019

We tried changing children to 8 and the problem still occurs, 1 is the only safe value thus far.

Not sure exactly on the relationship between Kamailio and Libcrypto, does Kamailio need to interact with Libcrypto in a specific order? For example, if there are multiple messages sent to Kamailio both of which require some form of interaction with Libcrypto but one thread takes slightly than another, does it matter the order in which the threads in Kamailio which are ready interact with Libcrypto?

Will look at installing debug symbols for libssl/libcrypto.

@henningw
Copy link
Contributor

About the question "Are there any significant drawbacks setting 'children' to 1? Thus far everything appears to be working as expected."
You will not get a good performance this way, as Kamailio can't process any new messages if there is e.g. a database operation running in the one child. You will also not use your processors effectively. It is not recommended to run a regular production environment with children=1.

@miconda
Copy link
Member

miconda commented Feb 26, 2019

Have you got the chance to install the debug symbols for libssl and libcrypto? Will allow to track inside those libraries where the crash happened and see if it is related to kamailio in some way.

@shaunjstokes
Copy link
Author

Not yet, I took a quick look at the process but will have to come back to it at some point later this week when I have more time. We currently have limited use of Kamailio in our production environment pending resolution of this issue.

@shaunjstokes
Copy link
Author

We've installed the latest debug symbols for libssl and libcrypto compiled from here:
https://www.openssl.org/source/openssl-1.1.1b.tar.gz

We've also updated Kamailio to 5.2.1.

Unfortunately the problem remains the same, see above for the updated core dump.

Please let me know if there's anything more we can do.

@shaunjstokes shaunjstokes changed the title Kamailio 5.2.0 - Segmentation fault in libcrypto.so.1.1 Kamailio 5.2.1 - Segmentation fault in libcrypto.so.1.1 Mar 8, 2019
@miconda
Copy link
Member

miconda commented Mar 12, 2019

Looking at the trace, looks related to sending a reply. In 5.2.2 I pushed a fix for a case when a reply processing happened at the same when the transaction was supposed to be deleted, after the safety wait timer of 5sec. Can you try with 5.2.2 just to rule out this issue is not a side effect of the same problem?

If crash still, would you be able to make a sipp scenario and a docker image to reproduce it? I tried, but could't reproduce, I guess it is a specific combination of events specific for your deployment.

@shaunjstokes
Copy link
Author

Unfortunately this is still a problem after the upgrade to 5.2.2.

We will look at trying to re-produce this in SIPp.

@shaunjstokes shaunjstokes changed the title Kamailio 5.2.1 - Segmentation fault in libcrypto.so.1.1 Kamailio 5.2.2 - Segmentation fault in libcrypto.so.1.1 Apr 3, 2019
@shaunjstokes
Copy link
Author

Haven't got around to producing this is in SIPp yet as I've been tied up with other projects and I'm a newbie to SIPp.

The problem only occurs when children in Kamailio is set to anything above 1 which points towards a multi-threaded issue, as it only occurs on TLS not TCP or UDP this would appear to be an OpenSSL multi-threaded issue.

As far as I can tell OpenSSL isn't multi-threaded, to use with mutli-threaded applications requires that at least two callback functions are set, locking_function and threadid_func. I searched for these functions in the Kamailio GitHub repository but couldn't find anything, is this correct?
Source: openssl/openssl#2165

@shaunjstokes
Copy link
Author

shaunjstokes commented Apr 15, 2019

Not sure if this helps, each crash follows a slightly different path with-in 'modules/tls/tls_server.c' but always crashes in 'aes_ecb_cipher' at 'crypto/evp/e_aes.c:2699'.

Here's our most recent core dump.

(gdb) bt
#0  0x00007f264161d6de in aes_ecb_cipher (ctx=0x7f25f5ad4480, out=0x7f25f6afec90 "", in=0x7f25f5ad4398 "\251\333\023`a>EBi\r\035\216Z\241Z}\200\\\345/-\340{", len=0) at crypto/evp/e_aes.c:2699
#1  0x00007f264162b755 in evp_EncryptDecryptUpdate (ctx=0x7f25f5ad4480, out=0x7f25f6afec90 "", outl=0x7ffc6679a3a4, in=0x7f25f5ad4398 "\251\333\023`a>EBi\r\035\216Z\241Z}\200\\\345/-\340{", inl=16) at crypto/evp/evp_enc.c:333
#2  0x00007f264162b9a0 in EVP_EncryptUpdate (ctx=0x7f25f5ad4480, out=0x7f25f6afec90 "", outl=0x7ffc6679a3a4, in=0x7f25f5ad4398 "\251\333\023`a>EBi\r\035\216Z\241Z}\200\\\345/-\340{", inl=16) at crypto/evp/evp_enc.c:385
#3  0x00007f264162b38e in EVP_CipherUpdate (ctx=0x7f25f5ad4480, out=0x7f25f6afec90 "", outl=0x7ffc6679a3a4, in=0x7f25f5ad4398 "\251\333\023`a>EBi\r\035\216Z\241Z}\200\\\345/-\340{", inl=16) at crypto/evp/evp_enc.c:213
#4  0x00007f2641669a01 in drbg_ctr_generate (drbg=0x7f25f5ad42b0, out=0x7f25f6afec90 "", outlen=32, adin=0x0, adinlen=0) at crypto/rand/drbg_ctr.c:340
#5  0x00007f264166af15 in RAND_DRBG_generate (drbg=0x7f25f5ad42b0, out=0x7f25f6afec90 "", outlen=32, prediction_resistance=0, adin=0x0, adinlen=0) at crypto/rand/drbg_lib.c:638
#6  0x00007f264166b043 in RAND_DRBG_bytes (drbg=0x7f25f5ad42b0, out=0x7f25f6afec90 "", outlen=32) at crypto/rand/drbg_lib.c:679
#7  0x00007f264166b5bc in drbg_bytes (out=0x7f25f6afec90 "", count=32) at crypto/rand/drbg_lib.c:968
#8  0x00007f264166cb2f in RAND_bytes (buf=0x7f25f6afec90 "", num=32) at crypto/rand/rand_lib.c:836
#9  0x00007f26419f0d33 in def_generate_session_id (ssl=0x7f25f6a6c540, id=0x7f25f6afec90 "", id_len=0x7ffc6679a534) at ssl/ssl_sess.c:290
#10 0x00007f26419f0f22 in ssl_generate_session_id (s=0x7f25f6a6c540, ss=0x7f25f6afeb38) at ssl/ssl_sess.c:362
#11 0x00007f26419f113e in ssl_get_new_session (s=0x7f25f6a6c540, session=1) at ssl/ssl_sess.c:418
#12 0x00007f2641a188f0 in tls_early_post_process_client_hello (s=0x7f25f6a6c540) at ssl/statem/statem_srvr.c:1817
#13 0x00007f2641a19900 in tls_post_process_client_hello (s=0x7f25f6a6c540, wst=WORK_MORE_A) at ssl/statem/statem_srvr.c:2222
#14 0x00007f2641a173dc in ossl_statem_server_post_process_message (s=0x7f25f6a6c540, wst=WORK_MORE_A) at ssl/statem/statem_srvr.c:1220
#15 0x00007f2641a03a04 in read_state_machine (s=0x7f25f6a6c540) at ssl/statem/statem.c:664
#16 0x00007f2641a03364 in state_machine (s=0x7f25f6a6c540, server=1) at ssl/statem/statem.c:434
#17 0x00007f2641a02e89 in ossl_statem_accept (s=0x7f25f6a6c540) at ssl/statem/statem.c:255
#18 0x00007f26419e952c in SSL_do_handshake (s=0x7f25f6a6c540) at ssl/ssl_lib.c:3599
#19 0x00007f26419e55f5 in SSL_accept (s=0x7f25f6a6c540) at ssl/ssl_lib.c:1643
#20 0x00007f26360480f2 in tls_accept (c=0x7f25f6aa1010, error=0x7ffc667ba98c) at tls_server.c:422
#21 0x00007f26360515fe in tls_read_f (c=0x7f25f6aa1010, flags=0x7ffc667bacc8) at tls_server.c:1119
#22 0x000055a6ac69fc43 in tcp_read_headers (c=0x7f25f6aa1010, read_flags=0x7ffc667bacc8) at core/tcp_read.c:469
#23 0x000055a6ac6a77e9 in tcp_read_req (con=0x7f25f6aa1010, bytes_read=0x7ffc667baccc, read_flags=0x7ffc667bacc8) at core/tcp_read.c:1496
#24 0x000055a6ac6ac757 in handle_io (fm=0x7f264284c438, events=1, idx=-1) at core/tcp_read.c:1804
#25 0x000055a6ac69a2c0 in io_wait_loop_epoll (h=0x55a6acb783a0 <io_w>, t=2, repeat=0) at core/io_wait.h:1065
#26 0x000055a6ac6ae76a in tcp_receive_loop (unix_sock=86) at core/tcp_read.c:1974
#27 0x000055a6ac561f12 in tcp_init_children () at core/tcp_main.c:4853
#28 0x000055a6ac4994ac in main_loop () at main.c:1745
#29 0x000055a6ac4a046e in main (argc=13, argv=0x7ffc667bb338) at main.c:2696

Here's the disas of aes_ecb_cipher, it was doing a move from memory pointed to in the %rax register plus an offset of 0xf8, to the %rax register.

(gdb) disas aes_ecb_cipher
Dump of assembler code for function aes_ecb_cipher:
   0x00007f264161d67d <+0>:     push   %rbp
   0x00007f264161d67e <+1>:     mov    %rsp,%rbp
   0x00007f264161d681 <+4>:     sub    $0x40,%rsp
   0x00007f264161d685 <+8>:     mov    %rdi,-0x28(%rbp)
   0x00007f264161d689 <+12>:    mov    %rsi,-0x30(%rbp)
   0x00007f264161d68d <+16>:    mov    %rdx,-0x38(%rbp)
   0x00007f264161d691 <+20>:    mov    %rcx,-0x40(%rbp)
   0x00007f264161d695 <+24>:    mov    -0x28(%rbp),%rax
   0x00007f264161d699 <+28>:    mov    %rax,%rdi
   0x00007f264161d69c <+31>:    callq  0x7f264162cf2a <EVP_CIPHER_CTX_block_size>
   0x00007f264161d6a1 <+36>:    cltq
   0x00007f264161d6a3 <+38>:    mov    %rax,-0x10(%rbp)
   0x00007f264161d6a7 <+42>:    mov    -0x28(%rbp),%rax
   0x00007f264161d6ab <+46>:    mov    %rax,%rdi
   0x00007f264161d6ae <+49>:    callq  0x7f264162cfe5 <EVP_CIPHER_CTX_get_cipher_data>
   0x00007f264161d6b3 <+54>:    mov    %rax,-0x18(%rbp)
   0x00007f264161d6b7 <+58>:    mov    -0x40(%rbp),%rax
   0x00007f264161d6bb <+62>:    cmp    -0x10(%rbp),%rax
   0x00007f264161d6bf <+66>:    jae    0x7f264161d6c8 <aes_ecb_cipher+75>
   0x00007f264161d6c1 <+68>:    mov    $0x1,%eax
   0x00007f264161d6c6 <+73>:    jmp    0x7f264161d71b <aes_ecb_cipher+158>
   0x00007f264161d6c8 <+75>:    movq   $0x0,-0x8(%rbp)
   0x00007f264161d6d0 <+83>:    mov    -0x10(%rbp),%rax
   0x00007f264161d6d4 <+87>:    sub    %rax,-0x40(%rbp)
   0x00007f264161d6d8 <+91>:    jmp    0x7f264161d70c <aes_ecb_cipher+143>
   0x00007f264161d6da <+93>:    mov    -0x18(%rbp),%rax
=> 0x00007f264161d6de <+97>:    mov    0xf8(%rax),%rax
   0x00007f264161d6e5 <+104>:   mov    -0x18(%rbp),%rdx
   0x00007f264161d6e9 <+108>:   mov    -0x30(%rbp),%rsi
   0x00007f264161d6ed <+112>:   mov    -0x8(%rbp),%rcx
   0x00007f264161d6f1 <+116>:   add    %rcx,%rsi
   0x00007f264161d6f4 <+119>:   mov    -0x38(%rbp),%rdi
   0x00007f264161d6f8 <+123>:   mov    -0x8(%rbp),%rcx
   0x00007f264161d6fc <+127>:   add    %rdi,%rcx
   0x00007f264161d6ff <+130>:   mov    %rcx,%rdi
   0x00007f264161d702 <+133>:   callq  *%rax
   0x00007f264161d704 <+135>:   mov    -0x10(%rbp),%rax
   0x00007f264161d708 <+139>:   add    %rax,-0x8(%rbp)
   0x00007f264161d70c <+143>:   mov    -0x8(%rbp),%rax
   0x00007f264161d710 <+147>:   cmp    -0x40(%rbp),%rax
   0x00007f264161d714 <+151>:   jbe    0x7f264161d6da <aes_ecb_cipher+93>
   0x00007f264161d716 <+153>:   mov    $0x1,%eax
   0x00007f264161d71b <+158>:   leaveq
   0x00007f264161d71c <+159>:   retq
End of assembler dump.

If we look at the register, the problem is %rax is 0.

(gdb) i r
rax            0x0      0
rbx            0x50     80
rcx            0x10     16
rdx            0x7f25f5ad4398   139801012290456
rsi            0x7f25f6afec90   139801029242000
rdi            0x7f25f5ad4480   139801012290688
rbp            0x7ffc6679a290   0x7ffc6679a290
rsp            0x7ffc6679a250   0x7ffc6679a250
r8             0x10     16
r9             0x0      0
r10            0x0      0
r11            0x202    514
r12            0x55a6ac8570b3   94174347358387
r13            0x40000000       1073741824
r14            0x10000000       268435456
r15            0x6      6
rip            0x7f264161d6de   0x7f264161d6de <aes_ecb_cipher+97>
eflags         0x10246  [ PF ZF IF RF ]
cs             0x33     51
ss             0x2b     43
ds             0x0      0
es             0x0      0
fs             0x0      0
gs             0x0      0

@miconda miconda added the bug label Apr 16, 2019
@miconda
Copy link
Member

miconda commented Apr 16, 2019

Thanks for troubleshooting further.

Can you try with pre-loaded library workaround that was pushed to git master yesterday? Respectively:

It looks like a side effect of not having the pthread locks initialized by libssl 1.1 with process shared option. If proves to work fine, then we can approach openssl project to introduce a way to allow setting the process shared option for locks.

@shaunjstokes
Copy link
Author

Unfortunately that didn't fix the problem, however the core dump has changed.

Reading symbols from /usr/local/kamailio/sbin/kamailio...done.
[New LWP 26088]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/local/kamailio/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /usr/loc'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  aesni_ecb_encrypt () at crypto/aes/aesni-x86_64.s:624
624             movups  (%rcx),%xmm1
(gdb) disas aesni_ecb_encrypt
Dump of assembler code for function aesni_ecb_encrypt:
   0x00007ffba23869e0 <+0>:     and    $0xfffffffffffffff0,%rdx
   0x00007ffba23869e4 <+4>:     je     0x7ffba2386f34 <aesni_ecb_encrypt+1364>
   0x00007ffba23869ea <+10>:    mov    0xf0(%rcx),%eax
   0x00007ffba23869f0 <+16>:    movups (%rcx),%xmm0
   0x00007ffba23869f3 <+19>:    mov    %rcx,%r11
   0x00007ffba23869f6 <+22>:    mov    %eax,%r10d
   0x00007ffba23869f9 <+25>:    test   %r8d,%r8d
   0x00007ffba23869fc <+28>:    je     0x7ffba2386c50 <aesni_ecb_encrypt+624>
   0x00007ffba2386a02 <+34>:    cmp    $0x80,%rdx
   0x00007ffba2386a09 <+41>:    jb     0x7ffba2386af7 <aesni_ecb_encrypt+279>
   0x00007ffba2386a0f <+47>:    movdqu (%rdi),%xmm2
   0x00007ffba2386a13 <+51>:    movdqu 0x10(%rdi),%xmm3
   0x00007ffba2386a18 <+56>:    movdqu 0x20(%rdi),%xmm4
   0x00007ffba2386a1d <+61>:    movdqu 0x30(%rdi),%xmm5
   0x00007ffba2386a22 <+66>:    movdqu 0x40(%rdi),%xmm6
   0x00007ffba2386a27 <+71>:    movdqu 0x50(%rdi),%xmm7
   0x00007ffba2386a2c <+76>:    movdqu 0x60(%rdi),%xmm8
   0x00007ffba2386a32 <+82>:    movdqu 0x70(%rdi),%xmm9
   0x00007ffba2386a38 <+88>:    lea    0x80(%rdi),%rdi
   0x00007ffba2386a3f <+95>:    sub    $0x80,%rdx
   0x00007ffba2386a46 <+102>:   jmp    0x7ffba2386aae <aesni_ecb_encrypt+206>
   0x00007ffba2386a48 <+104>:   nopl   0x0(%rax,%rax,1)
   0x00007ffba2386a50 <+112>:   movups %xmm2,(%rsi)
   0x00007ffba2386a53 <+115>:   mov    %r11,%rcx
   0x00007ffba2386a56 <+118>:   movdqu (%rdi),%xmm2
   0x00007ffba2386a5a <+122>:   mov    %r10d,%eax
   0x00007ffba2386a5d <+125>:   movups %xmm3,0x10(%rsi)
   0x00007ffba2386a61 <+129>:   movdqu 0x10(%rdi),%xmm3
   0x00007ffba2386a66 <+134>:   movups %xmm4,0x20(%rsi)
   0x00007ffba2386a6a <+138>:   movdqu 0x20(%rdi),%xmm4
   0x00007ffba2386a6f <+143>:   movups %xmm5,0x30(%rsi)
   0x00007ffba2386a73 <+147>:   movdqu 0x30(%rdi),%xmm5
   0x00007ffba2386a78 <+152>:   movups %xmm6,0x40(%rsi)
   0x00007ffba2386a7c <+156>:   movdqu 0x40(%rdi),%xmm6
   0x00007ffba2386a81 <+161>:   movups %xmm7,0x50(%rsi)
   0x00007ffba2386a85 <+165>:   movdqu 0x50(%rdi),%xmm7
   0x00007ffba2386a8a <+170>:   movups %xmm8,0x60(%rsi)
   0x00007ffba2386a8f <+175>:   movdqu 0x60(%rdi),%xmm8
   0x00007ffba2386a95 <+181>:   movups %xmm9,0x70(%rsi)
   0x00007ffba2386a9a <+186>:   lea    0x80(%rsi),%rsi
   0x00007ffba2386aa1 <+193>:   movdqu 0x70(%rdi),%xmm9
   0x00007ffba2386aa7 <+199>:   lea    0x80(%rdi),%rdi
   0x00007ffba2386aae <+206>:   callq  0x7ffba23867c0 <_aesni_encrypt8>
   0x00007ffba2386ab3 <+211>:   sub    $0x80,%rdx
   0x00007ffba2386aba <+218>:   jae    0x7ffba2386a50 <aesni_ecb_encrypt+112>
   0x00007ffba2386abc <+220>:   movups %xmm2,(%rsi)
   0x00007ffba2386abf <+223>:   mov    %r11,%rcx
   0x00007ffba2386ac2 <+226>:   movups %xmm3,0x10(%rsi)
   0x00007ffba2386ac6 <+230>:   mov    %r10d,%eax
   0x00007ffba2386ac9 <+233>:   movups %xmm4,0x20(%rsi)
   0x00007ffba2386acd <+237>:   movups %xmm5,0x30(%rsi)
   0x00007ffba2386ad1 <+241>:   movups %xmm6,0x40(%rsi)
   0x00007ffba2386ad5 <+245>:   movups %xmm7,0x50(%rsi)
   0x00007ffba2386ad9 <+249>:   movups %xmm8,0x60(%rsi)
   0x00007ffba2386ade <+254>:   movups %xmm9,0x70(%rsi)
   0x00007ffba2386ae3 <+259>:   lea    0x80(%rsi),%rsi
   0x00007ffba2386aea <+266>:   add    $0x80,%rdx
   0x00007ffba2386af1 <+273>:   je     0x7ffba2386f34 <aesni_ecb_encrypt+1364>
   0x00007ffba2386af7 <+279>:   movups (%rdi),%xmm2
   0x00007ffba2386afa <+282>:   cmp    $0x20,%rdx
   0x00007ffba2386afe <+286>:   jb     0x7ffba2386b70 <aesni_ecb_encrypt+400>
   0x00007ffba2386b00 <+288>:   movups 0x10(%rdi),%xmm3
   0x00007ffba2386b04 <+292>:   je     0x7ffba2386ba0 <aesni_ecb_encrypt+448>
   0x00007ffba2386b0a <+298>:   movups 0x20(%rdi),%xmm4
   0x00007ffba2386b0e <+302>:   cmp    $0x40,%rdx
   0x00007ffba2386b12 <+306>:   jb     0x7ffba2386bc0 <aesni_ecb_encrypt+480>
   0x00007ffba2386b18 <+312>:   movups 0x30(%rdi),%xmm5
   0x00007ffba2386b1c <+316>:   je     0x7ffba2386be0 <aesni_ecb_encrypt+512>
   0x00007ffba2386b22 <+322>:   movups 0x40(%rdi),%xmm6
   0x00007ffba2386b26 <+326>:   cmp    $0x60,%rdx
   0x00007ffba2386b2a <+330>:   jb     0x7ffba2386c00 <aesni_ecb_encrypt+544>
   0x00007ffba2386b30 <+336>:   movups 0x50(%rdi),%xmm7
   0x00007ffba2386b34 <+340>:   je     0x7ffba2386c20 <aesni_ecb_encrypt+576>
   0x00007ffba2386b3a <+346>:   movdqu 0x60(%rdi),%xmm8
   0x00007ffba2386b40 <+352>:   xorps  %xmm9,%xmm9
   0x00007ffba2386b44 <+356>:   callq  0x7ffba23867c0 <_aesni_encrypt8>
   0x00007ffba2386b49 <+361>:   movups %xmm2,(%rsi)
   0x00007ffba2386b4c <+364>:   movups %xmm3,0x10(%rsi)
   0x00007ffba2386b50 <+368>:   movups %xmm4,0x20(%rsi)
   0x00007ffba2386b54 <+372>:   movups %xmm5,0x30(%rsi)
   0x00007ffba2386b58 <+376>:   movups %xmm6,0x40(%rsi)
   0x00007ffba2386b5c <+380>:   movups %xmm7,0x50(%rsi)
   0x00007ffba2386b60 <+384>:   movups %xmm8,0x60(%rsi)
   0x00007ffba2386b65 <+389>:   jmpq   0x7ffba2386f34 <aesni_ecb_encrypt+1364>
   0x00007ffba2386b6a <+394>:   nopw   0x0(%rax,%rax,1)
   0x00007ffba2386b70 <+400>:   movups (%rcx),%xmm0
   0x00007ffba2386b73 <+403>:   movups 0x10(%rcx),%xmm1
   0x00007ffba2386b77 <+407>:   lea    0x20(%rcx),%rcx
   0x00007ffba2386b7b <+411>:   xorps  %xmm0,%xmm2
   0x00007ffba2386b7e <+414>:   aesenc %xmm1,%xmm2
   0x00007ffba2386b83 <+419>:   dec    %eax
=> 0x00007ffba2386b85 <+421>:   movups (%rcx),%xmm1
   0x00007ffba2386b88 <+424>:   lea    0x10(%rcx),%rcx
   0x00007ffba2386b8c <+428>:   jne    0x7ffba2386b7e <aesni_ecb_encrypt+414>
   0x00007ffba2386b8e <+430>:   aesenclast %xmm1,%xmm2
   0x00007ffba2386b93 <+435>:   movups %xmm2,(%rsi)
   0x00007ffba2386b96 <+438>:   jmpq   0x7ffba2386f34 <aesni_ecb_encrypt+1364>
   0x00007ffba2386b9b <+443>:   nopl   0x0(%rax,%rax,1)
   0x00007ffba2386ba0 <+448>:   callq  0x7ffba2386340 <_aesni_encrypt2>
   0x00007ffba2386ba5 <+453>:   movups %xmm2,(%rsi)
   0x00007ffba2386ba8 <+456>:   movups %xmm3,0x10(%rsi)
   0x00007ffba2386bac <+460>:   jmpq   0x7ffba2386f34 <aesni_ecb_encrypt+1364>
   0x00007ffba2386bb1 <+465>:   nopl   0x0(%rax,%rax,1)
   0x00007ffba2386bb6 <+470>:   nopw   %cs:0x0(%rax,%rax,1)
   0x00007ffba2386bc0 <+480>:   callq  0x7ffba2386400 <_aesni_encrypt3>
   0x00007ffba2386bc5 <+485>:   movups %xmm2,(%rsi)
   0x00007ffba2386bc8 <+488>:   movups %xmm3,0x10(%rsi)
   0x00007ffba2386bcc <+492>:   movups %xmm4,0x20(%rsi)
   0x00007ffba2386bd0 <+496>:   jmpq   0x7ffba2386f34 <aesni_ecb_encrypt+1364>
(gdb) i r
rax            0xfc3ba328       4231766824
rbx            0x1      1
rcx            0x7ffb96805000   140718538510336
rdx            0x10     16
rsi            0x7ffb58c04108   140717502513416
rdi            0x7ffb56b0c898   140717467945112
rbp            0x7ffcff3bd080   0x7ffcff3bd080
rsp            0x7ffcff3bd038   0x7ffcff3bd038
r8             0x1      1
r9             0x0      0
r10            0x0      0
r11            0x7ffb5a3a8270   140717527302768
r12            0x55e1430f52d3   94425981080275
r13            0x40000000       1073741824
r14            0x10000000       268435456
r15            0x6      6
rip            0x7ffba2386b85   0x7ffba2386b85 <aesni_ecb_encrypt+421>
eflags         0x10287  [ CF PF SF IF RF ]
cs             0x33     51
ss             0x2b     43
ds             0x0      0
es             0x0      0
fs             0x0      0
gs             0x0      0

I've been looking at buffers and limits to see if we're perhaps hitting some kind of limit that could be triggering this and have found that increasing tls_max_connections and tcp_max_connections to 32768 appears to increase the threshold before the segmentation fault occurs. We're now able to get >20000 presence subscriptions with-out any segmentation faults.

I have more testing to do before I can reach a conclusion but it appears there may be a correlation between tls_max_connections and the segmentation fault.

@miconda
Copy link
Member

miconda commented Apr 17, 2019

Can you get the output of bt full in gdb for the last core dump file?

@shaunjstokes
Copy link
Author

I've re-tested this morning after making no changes and the problem is as before, tls_max_connections was a red herring.

@miconda
Copy link
Member

miconda commented Apr 17, 2019

What was the command you used to start kamailio?

@shaunjstokes
Copy link
Author

Using systemd, 'service kamailio start'.

This is our Kamailio systemd config:

/lib/systemd/system/kamailio.service

[Unit]
Description=Kamailio (OpenSER) - the Open Source SIP Server
After=syslog.target network.target local-fs.target postgresql.service haveged.service freeswitch.service

[Service]
Type=forking
Environment='CFGFILE=/usr/local/kamailio/etc/kamailio/kamailio.cfg'
Environment='SHM_MEMORY=1024'
Environment='PKG_MEMORY=256'
Environment='USER=kamailio'
Environment='GROUP=kamailio'
Environment='RUN_KAMAILIO=yes'
Environment='LD_PRELOAD=/usr/local/kamailio/lib64/kamailio/openssl_mutex_shared/openssl_mutex_shared.so'
# PIDFile requires a full absolute path
PIDFile=/var/run/kamailio/kamailio.pid
# ExecStart requires a full absolute path
ExecStart=/usr/local/kamailio/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f $CFGFILE -m $SHM_MEMORY -M $PKG_MEMORY -u $USER -g $GROUP
TimeoutSec=120s
Restart=always
# /var/run/kamailio in tmpfs
RuntimeDirectory=kamailio
RuntimeDirectoryMode=0750
; exec
WorkingDirectory=/usr/local/kamailio/sbin
User=root
Group=daemon
LimitCORE=infinity
LimitNOFILE=100000
LimitNPROC=60000
LimitSTACK=250000
LimitRTPRIO=infinity
LimitRTTIME=7000000
IOSchedulingClass=realtime
IOSchedulingPriority=2
Nice=-10
CPUSchedulingPolicy=rr
CPUSchedulingPriority=1
UMask=0007

[Install]
WantedBy=multi-user.target

Here is the output of bt full in gdb for our most recent core dump file.

(gdb) bt full
#0  0x00007f46a414cd83 in EVP_CIPHER_flags (cipher=0x0) at crypto/evp/evp_lib.c:210
No locals.
#1  0x00007f46a4136028 in aesni_init_key (ctx=0x7f46587b4980, key=0x7f46587b4878 "\004\373z\264\326\301a\305\337߈M2\361\376aO\226\033\r7\203\071\020\313\060\203r\314\066\005=>\311\372\215\325,z\004y[\202\306\327\021'\337P\231\b\252", iv=0x0, enc=1) at crypto/evp/e_aes.c:273
        ret = 0
        mode = 128
        dat = 0x0
#2  0x00007f46a414b0d8 in EVP_CipherInit_ex (ctx=0x7f46587b4980, cipher=0x7f46a44b6460 <aesni_256_ecb>, impl=0x0,
    key=0x7f46587b4878 "\004\373z\264\326\301a\305\337߈M2\361\376aO\226\033\r7\203\071\020\313\060\203r\314\066\005=>\311\372\215\325,z\004y[\202\306\327\021'\337P\231\b\252", iv=0x0, enc=1) at crypto/evp/evp_enc.c:200
No locals.
#3  0x00007f46a418ddd3 in ctr_update (drbg=0x7f46587b47b0, in1=0x0, in1len=0, in2=0x0, in2len=0, nonce=0x0, noncelen=0) at crypto/rand/drbg_ctr.c:274
        ctr = 0x7f46587b4858
        outlen = 16
#4  0x00007f46a418e0d2 in drbg_ctr_generate (drbg=0x7f46587b47b0,
    out=0x7f465afaeb98 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>;tag=0b62483f5"..., outlen=0, adin=0x0, adinlen=0)
    at crypto/rand/drbg_ctr.c:349
        ctr = 0x7f46587b4858
#5  0x00007f46a418f591 in RAND_DRBG_generate (drbg=0x7f46587b47b0,
    out=0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"..., outlen=16,
    prediction_resistance=0, adin=0x0, adinlen=32) at crypto/rand/drbg_lib.c:638
        reseed_required = 0
#6  0x00007f46a418f6bf in RAND_DRBG_bytes (drbg=0x7f46587b47b0,
    out=0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"..., outlen=16)
    at crypto/rand/drbg_lib.c:679
        additional = 0x0
        additional_len = 32
        chunk = 16
        ret = 0
#7  0x00007f46a418fc38 in drbg_bytes (
    out=0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"..., count=16)
    at crypto/rand/drbg_lib.c:968
        ret = 0
        drbg = 0x7f46587b47b0
#8  0x00007f46a41911ab in RAND_bytes (
    buf=0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"..., num=16)
    at crypto/rand/rand_lib.c:836
        meth = 0x7f46a44d8920 <rand_meth>
#9  0x00007f46a450ebb5 in tls1_enc (s=0x7f465afa3b58, recs=0x7fff01bdf050, n_recs=1, sending=1) at ssl/record/ssl3_record.c:985
        ivlen = 16
        ds = 0x7f465a29d8c8
        reclen = {268435456, 139940143921712, 4324191904, 139940105930440, 140733222612640, 94261356491263, 94261357814483, 139940105930440, 268435456, 4294967302, 140733222612720, 94261356548576, 139941188525952, 1260989218478, 139941188533296, 139941188525956, 40, 139940105695232,
          140733222612768, 139940143921768, 140733222612768, 139941188239022, 139941381576288, 139941381576288, 139941381576304, 140733222615632, 140733222612832, 139941381162415, 140733222612848, 140733222612936, 490, 140733222615632}
        buf = {"\000\000\000\000\000\000\000z\027\003\003", <incomplete sequence \352>, "\177\000\000-\263#\376\070\335\303y4J", "H\263\252\036q6\266be\232\336", <incomplete sequence \364>, "\217\305F\022\322\375#\242\255\313jbZ", "\231\335J\243=\236\244\236\333A\321-\036",
          "\034$\222\250\301GB,Σ\270\255\003", "\021\303\000\000\000\000\000\000\000\000\000\000", "\000\001\000\000\000\060z\221ZF\177\000", "\000\060JXF\177\000\000\230H{XF", "\177\000\000\240\253JXF\177\000\000\000", "\000\020\032\001\000\000\240\253JXF\177",
          "\000\240\355\275\001\377\177\000\000d\227\253", <incomplete sequence \356>, "\272U\000\000\300z\221ZF\177\000\000", "0JXF\177\000\000\204\337ԘF\177", "\000\000\300\243JXF\177\000\000\240y\221", "Z\b\001\000\000\300\243JXF\177\000",
          "\340\355\275\001\377\177\000\000d\227\253", <incomplete sequence \356\272>, "U\000\000\200\001\000\000%\001\000\000[D", "\303\356\272U\000\000\204\337ԘF\177", "\000(\000\000\000\000\000\000\000\060z\221Z", "F\177\000\000\000\060JXF\177\000", <incomplete sequence \360>,
          "\355\217ZF\177\000\000\300z\221ZF\177", "\000\000\220z\221Z\004\000\000\000\360", <incomplete sequence \303>, "\356\272U\000\000\240\356\275\001\377\177\000", ")\234\253\356\272U\000\000\240\356\275\001\377", "\177\000\000ٜ\253\356\272U\000\000\001",
          "\000\000\000\000\000\000\001\000\000\000,\001", "\000\200\337ԘF\177\000\000\240y\221Z", "%\001\000\000\060\374ԘF\177\000\000\204", "\337ԘF\177\000\000(\000\000\000\000", "\000\000\000\060JXF\177\000\000\001\000", "\000\000\000\000\000\001\000\000\000\032\001\000"}
        i = 32767
        pad = 0
        ret = 32582
        tmpr = 1
        bs = 139941381576304
        mac_size = 0
        ctr = 0
        padnum = 139941381576288
        loop = 139941381576552
        padval = 0 '\000'
        imac_size = 43
        enc = 0x7f46a44d85c0 <aesni_128_cbc_hmac_sha1_cipher>
#10 0x00007f46a450a28f in do_ssl3_write (s=0x7f465afa3b58, type=23,
    buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>;tag=0b62483f5"..., pipelens=0x7fff01be0160, numpipes=1,
    create_empty_fragment=0, written=0x7fff01be0270) at ssl/record/rec_layer_s3.c:1003
        pkt = {{buf = 0x0, staticbuf = 0x7f465afaeb80 "", curr = 514, written = 514, maxsize = 16472, subs = 0x7f465a917a68}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0} <repeats 19 times>, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0,
            maxsize = 0, subs = 0x7f465afaeb80}, {buf = 0x3d8, staticbuf = 0x3d8 <error: Cannot access memory at address 0x3d8>, curr = 16472, written = 0, maxsize = 812151909, subs = 0x7f46b52abbb8}, {buf = 0x7fff01be0230,
            staticbuf = 0x7f46b5c791da <_dl_runtime_resolve_xsave+138> "I\211", <incomplete sequence \356>, curr = 60359, written = 586, maxsize = 139941396355704, subs = 0x7f46a52129a0}, {buf = 0xebc7, staticbuf = 0x7fff01be0e40 "\371!", curr = 140733222620672, written = 828929125,
            maxsize = 549756338184, subs = 0x2}, {buf = 0x55baeebfa2d3, staticbuf = 0x40000000 <error: Cannot access memory at address 0x40000000>, curr = 268435456, written = 6, maxsize = 140733222616912, subs = 0x55baeeae5ddf <parse_from_uri+58>}, {buf = 0x0,
            staticbuf = 0x7f46a52129a0 "{", curr = 586, written = 139941396346608, maxsize = 586, subs = 0x2}, {buf = 0x7f46a537f758, staticbuf = 0x7fff01be0110 "\360\002\276\001\377\177", curr = 139941394269184, written = 139941394852256, maxsize = 140733222617072,
            subs = 0x7f469fe775bc <pv_get_xto_attr+5183>}, {buf = 0x12000, staticbuf = 0x1a52129a0 <error: Cannot access memory at address 0x1a52129a0>, curr = 139941396346608, written = 140733222617360, maxsize = 139941394269184, subs = 0x7f46a52129a0}, {buf = 0x7fff01bdffc0,
            staticbuf = 0x7f46a52129a0 "{", curr = 43, written = 140733222617520, maxsize = 139941396355704, subs = 0x7f46a51c84c2}, {buf = 0x7fff01be06c8, staticbuf = 0x7fff01be0700 "\353", <incomplete sequence \307>, curr = 0, written = 94261388500537, maxsize = 0,
            subs = 0x7f469e128bde}, {buf = 0x0, staticbuf = 0x7fff01be06c8 "", curr = 2001752693, written = 0, maxsize = 94261388500542, subs = 0x0}, {buf = 0xfffffffe, staticbuf = 0x7f4600000000 <error: Cannot access memory at address 0x7f4600000000>, curr = 48, written = 0,
            maxsize = 4294967295, subs = 0x55baf093de3e}}
        wr = {{rec_version = 771, type = 23, length = 506, orig_len = 0, off = 0,
            data = 0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"...,
            input = 0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"...,
            comp = 0x0, read = 0, epoch = 0, seq_num = "\000\000\000\000\000\000\000"}, {rec_version = 0, type = 0, length = 0, orig_len = 0, off = 0, data = 0x0, input = 0x0, comp = 0x0, read = 0, epoch = 0, seq_num = "\000\000\000\000\000\000\000"} <repeats 31 times>}
        thispkt = 0x7fff01bdfa50
        thiswr = 0x7fff01bdf050
        recordstart = 0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.c"...
        i = 0
        mac_size = 0
        clear = 0
        prefix_len = 0
        eivlen = 16
        align = 3
        wb = 0x7f465afa43b0
        sess = 0x7f465afb4620
        totlen = 490
        len = 506
        wpinited = 1
        j = 1
#11 0x00007f46a45090ac in ssl3_write_bytes (s=0x7f465afa3b58, type=23, buf_=0x7f46a5382650, len=490, written=0x7fff01be03b0) at ssl/record/rec_layer_s3.c:613
        pipelens = {490, 140733222618944, 140733193388032, 94261356061472, 140733193388037, 139941664324654, 140733222617664, 140, 34359741800, 94257352278016, 140733193388075, 139941292790494, 140733222619208, 139941394547910, 139941394547906, 139941664138425, 0, 139938624438273,
          140733222618352, 94261388500539, 140733222617768, 206158430224, 140733222617808, 29230736, 0, 1158064281267208192, 5679437561345343536, 18446744073709551615, 12166682089369894912, 5736522341043666960, 139941394865048, 4239145472499881216}
        tmppipelen = 490
        remain = 0
        numpipes = 1
        j = 1
        buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>;tag=0b62483f5"...
        tot = 0
        n = 490
        max_send_fragment = 16384
        split_send_fragment = 16384
        maxpipes = 1
        nw = 139940105930440
        wb = 0x7f465afa43b0
        i = 0
        tmpwrit = 0
#12 0x00007f46a45178c0 in ssl3_write (s=0x7f465afa3b58, buf=0x7f46a5382650, len=490, written=0x7fff01be03b0) at ssl/s3_lib.c:4460
No locals.
#13 0x00007f46a45264db in ssl_write_internal (s=0x7f465afa3b58, buf=0x7f46a5382650, num=490, written=0x7fff01be03b0) at ssl/ssl_lib.c:1943
No locals.
#14 0x00007f46a4526538 in SSL_write (s=0x7f465afa3b58, buf=0x7f46a5382650, num=490) at ssl/ssl_lib.c:1957
        ret = 0
        written = 268435456
#15 0x00007f4698d2ea3d in tls_encode_f (c=0x7f465a9a30c8, pbuf=0x7fff01be0560, plen=0x7fff01be0558, rest_buf=0x7fff01be0568, rest_len=0x7fff01be055c, send_flags=0x7fff01be054c) at tls_server.c:828
        n = 0
        offs = 0
        ssl = 0x7f465afa3b58
        tls_c = 0x7f4659c6de40
        wr_buf = "\027\003\003\002\020SL\364\362e>3<*\234i\255n\025\320E95Q1\316\357M+a:\265<\371\304\357\366\244\251\201\016ɏ\236\064+\r\341\065\207\067\331d߃\235.\226\252\224\024\r\214^\022\317q!\374\242\216\\\364Y\345\232<\003fI^7\324\327A\237\263\r\300\352lGj\203\204\341\352\f\020x\267\366\216\250\221\241\213\270\026\217\255\352\331R\334%\211\267_\302%\310\352\226\363\337˴\345\263{\203\351cr\263ڧ\224J\200\355F@\216\220\322\\\253&\346{KP\263\266\025{n2\262U\342h\202\237[_\326W\364y\216\272\060\"\232\025\315;\311\356/Ur$\200\031\256)[J\024\025\257\222$\353\230\001\061|\256\236"...
        rd = {buf = 0x0, pos = 0, used = 0, size = 0}
        wr = {
          buf = 0x7f4698f6af60 <wr_buf> "\027\003\003\002\020SL\364\362e>3<*\234i\255n\025\320E95Q1\316\357M+a:\265<\371\304\357\366\244\251\201\016ɏ\236\064+\r\341\065\207\067\331d߃\235.\226\252\224\024\r\214^\022\317q!\374\242\216\\\364Y\345\232<\003fI^7\324\327A\237\263\r\300\352lGj\203\204\341\352\f\020x\267\366\216\250\221\241\213\270\026\217\255\352\331R\334%\211\267_\302%\310\352\226\363\337˴\345\263{\203\351cr\263ڧ\224J\200\355F@\216\220\322\\\253&\346{KP\263\266\025{n2\262U\342h\202\237[_\326W\364y\216\272\060\"\232\025\315;\311\356/Ur$\200\031\256)[J\024\025\257\222$\353\230\001"..., pos = 0, used = 0, size = 65536}
        ssl_error = 0
        err_src = 0x7f4698d59ca7 "TLS write:"
        buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>;tag=0b62483f5"...
        len = 490
        x = 1520054472
        __func__ = "tls_encode_f"
#16 0x000055baee8da1e4 in tcpconn_send_put (c=0x7f465a9a30c8,
    buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>;tag=0b62483f5"..., len=490, send_flags=...)
    at core/tcp_main.c:2530
        tmp = 0x7f465852d808
        fd = 10
        response = {140733222618528, 0}
        n = 4
        do_close_fd = 0
        rest_buf = 0x0
        t_buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>;tag=0b62483f5"...
        rest_len = 0
        t_len = 490
        resp = 0
        t_send_flags = {f = 0, blst_imask = 0}
        fd_cache_e = 0x0
        use_fd_cache = 0
        __func__ = "tcpconn_send_put"
#17 0x000055baee8d78d7 in tcp_send (dst=0x7f465b1b7848, from=0x0,
    buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>;tag=0b62483f5"..., len=490) at core/tcp_main.c:2310
        c = 0x7f465a9a30c8
        ip = {af = 2, len = 4, u = {addrl = {2988284242, 8709}, addr32 = {2988284242, 0, 8709, 0}, addr16 = {39250, 45597, 0, 0, 8709, 0, 0, 0}, addr = "R\231\035\262\000\000\000\000\005\"\000\000\000\000\000"}}
        port = 51179
        fd = 7
        response = {140733222618832, 140733222618840}
        n = 32582
        con_lifetime = 57680
        rest_buf = 0x7fff01be06c8 ""
        t_buf = 0x7fff01be06c4 ""
        rest_len = 32767
        t_len = 29230784
        resp = 140733222618812
        t_send_flags = {f = 0, blst_imask = 0}
        __func__ = "tcp_send"
#18 0x00007f46a080e586 in msg_send_buffer (dst=0x7f465b1b7848,
    buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>;tag=0b62483f5"..., len=490, flags=0) at ../../core/forward.h:282
        new_dst = {send_sock = 0x45a9175e8, to = {s = {sa_family = 13296, sa_data = "\303\356\272U\000\000\000\t\276\001\377\177\000"}, sin = {sin_family = 13296, sin_port = 61123, sin_addr = {s_addr = 21946}, sin_zero = "\000\t\276\001\377\177\000"}, sin6 = {sin6_family = 13296,
              sin6_port = 61123, sin6_flowinfo = 21946, sin6_addr = {__in6_u = {__u6_addr8 = "\000\t\276\001\377\177\000\000)\234\253\356\272U\000", __u6_addr16 = {2304, 446, 32767, 0, 39977, 61099, 21946, 0}, __u6_addr32 = {29231360, 32767, 4004224041, 21946}}},
              sin6_scope_id = 29231360}}, id = 32767, proto = -39 '\331', send_flags = {f = 61099, blst_imask = 21946}}
        outb = {s = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>;tag=0b62483f5"..., len = 490}
        netinfo = {data = {s = 0x7f46a086607b "tm: t_reply.c", len = 656}, rcv = 0x7f465a917320, dst = 0x7f46584a3000}
        evp = {data = 0x7fff01be0820, rcv = 0x0, dst = 0x7f465b1b7848}
        port = 1
        ip = {af = 268435456, len = 0, u = {addrl = {139940105741552, 1773850724352}, addr32 = {1481303280, 32582, 29231104, 413}, addr16 = {58608, 22602, 32582, 0, 2048, 446, 413, 0}, addr = "\360\344JXF\177\000\000\000\b\276\001\235\001\000"}}
        from = 0x0
        local_addr = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                __u6_addr8 = "\000\000\000\000\000\000\000\000\030v\221ZF\177\000", __u6_addr16 = {0, 0, 0, 0, 30232, 23185, 32582, 0}, __u6_addr32 = {0, 0, 1519482392, 32582}}}, sin6_scope_id = 1481256960}}
        con = 0x0
        wsev = {type = 0, buf = 0x0, len = 0, id = 0}
        ret = 508
        __func__ = "msg_send_buffer"
#19 0x00007f46a0810944 in send_pr_buffer (rb=0x7f465b1b77f8, buf=0x7f46a5382650, len=490) at t_funcs.c:70
        __func__ = "send_pr_buffer"
#20 0x00007f46a07c1fa2 in _reply_light (trans=0x7f465b1b7728,
    buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>;tag=0b62483f5"..., len=490, code=202,
    to_tag=0x7f46a0aa5580 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-455a", to_tag_len=37, lock=1, bm=0x7fff01be12c0) at t_reply.c:555
        rb = 0x7f465b1b77f8
        buf_len = 650
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}}
        onsend_params = {req = 0x1be1220, rpl = 0xc00000000, param = 0x17, code = -290705697, flags = 3, branch = 0, t_rbuf = 0x7fff01be1240, dst = 0x7f465a9a349e, send_buf = {s = 0x0, len = 0}}
        rt = 0
        backup_rt = 0
        ctx = {rec_lev = -1523033760, run_flags = 32582, last_retcode = -1526226928, jmp_env = {{__jmpbuf = {94261357790928, 94261357771114, 496, 139941393178640, 140733222621628, 377957122049, 94257352278021, 139941393178640}, __mask_was_saved = 16, __saved_mask = {__val = {
                  139941396371752, 140733222621536, 2, 94261357814483, 1073741824, 268435456, 6, 140733222621824, 94261355300342, 140733222621888, 140733222621916, 139941394852256, 139941319868304, 140733222622176, 867612627416, 0}}}}}
        pmsg = {id = 0, pid = 0, tval = {tv_sec = 139941260598996, tv_usec = 139941396349872}, fwd_send_flags = {f = 30935, blst_imask = 15921}, rpl_send_flags = {f = 21946, blst_imask = 0}, first_line = {type = 2640, flags = 446, len = 32767, u = {request = {method = {
                  s = 0x7f46a53441f0 "sip:813@88.88.88.88:51179;transport=tls;registering_acc=mydomain_co_co", len = -1721491552}, uri = {s = 0x7f46a5346578 "\a", len = 268435456}, version = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 29233280},
                method_value = 29233104}, reply = {version = {s = 0x7f46a53441f0 "sip:813@88.88.88.88:51179;transport=tls;registering_acc=mydomain_co_co", len = -1721491552}, status = {s = 0x7f46a5346578 "\a", len = 268435456}, reason = {
                  s = 0x1 <error: Cannot access memory at address 0x1>, len = 29233280}, statuscode = 29233104}}}, via1 = 0x7fff01be0fc0, via2 = 0x7f46a47c031b, headers = 0x7fff01be1138, last_header = 0x0, parsed_flag = 139941384028963,
          h_via1 = 0x7f46b52e24b9 <_IO_vfprintf_internal+1929>, h_via2 = 0x5, callid = 0x7f46b52e1e36 <_IO_vfprintf_internal+262>, to = 0x7fff01be1000, cseq = 0x7f46a47c017f, from = 0x7fff01be0b28, contact = 0x0, maxforwards = 0x7fff01be0b50, route = 0xb52e24b9, record_route = 0x0,
          content_type = 0x0, content_length = 0x7fff00000000, authorization = 0xffffffffffffffff, expires = 0x7fff00000005, proxy_auth = 0x7f467fffffff, supported = 0x7f46a47c0200, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x7fff01be0ba0, event = 0x0,
          accept = 0xd68, accept_language = 0x7f4600000005, organization = 0x7f46a47c031b, priority = 0x3, subject = 0x7f46a47c0341, user_agent = 0x7f46a47c0324, server = 0x7fff01be0be0, content_disposition = 0x7f46a47c0341, diversion = 0x7fff01be0be8, rpid = 0x55ba00000006,
          refer_to = 0x7f46a47c0320, session_expires = 0x3, min_se = 0x0, sipifmatch = 0x3000000018, subscription_state = 0x7fff01be1210, date = 0x7fff01be1150, identity = 0x7fff01be1220, identity_info = 0x7fff01be1160, pai = 0x7f46a47c0900, ppi = 0x0, path = 0x0,
          privacy = 0x3000000000, min_expires = 0x7fff01be0c60, body = 0x0, eoh = 0xd68 <error: Cannot access memory at address 0xd68>, unparsed = 0xd <error: Cannot access memory at address 0xd>, rcv = {src_ip = {af = 3432, len = 0, u = {addrl = {0, 139941384030571}, addr32 = {0, 0,
                  2759592299, 32582}, addr16 = {0, 0, 0, 0, 2411, 42108, 32582, 0}, addr = "\000\000\000\000\000\000\000\000k\t|\244F\177\000"}}, dst_ip = {af = 2759592292, len = 0, u = {addrl = {932276338688, 139941384030571}, addr32 = {268435456, 217, 2759592299, 32582}, addr16 = {
                  0, 4096, 217, 0, 2411, 42108, 32582, 0}, addr = "\000\000\000\020\331\000\000\000k\t|\244F\177\000"}}, src_port = 3280, dst_port = 446, proto_reserved1 = 32767, proto_reserved2 = -290733184, src_su = {s = {sa_family = 21946,
                sa_data = "\000\000`\t|\244F\177\000\000\260\021\276\001"}, sin = {sin_family = 21946, sin_port = 0, sin_addr = {s_addr = 2759592288}, sin_zero = "F\177\000\000\260\021\276\001"}, sin6 = {sin6_family = 21946, sin6_port = 0, sin6_flowinfo = 2759592288, sin6_addr = {
                  __in6_u = {__u6_addr8 = "F\177\000\000\260\021\276\001\003\000\000\000\300\001\062\240", __u6_addr16 = {32582, 0, 4528, 446, 3, 0, 448, 41010}, __u6_addr32 = {32582, 29233584, 3, 2687631808}}}, sin6_scope_id = 32582}}, bind_address = 0x3000000018,
            proto = -48 '\320'}, buf = 0x3000000018 <error: Cannot access memory at address 0x3000000018>, len = 29233888, new_uri = {s = 0x7fff01be1220 "\200\022\276\001\377\377\377\377", len = 0}, dst_uri = {s = 0x0, len = -1523036784}, parsed_uri_ok = -1523314032, parsed_uri = {
            user = {s = 0xffffffff01be0cd0 <error: Cannot access memory at address 0xffffffff01be0cd0>, len = 0}, passwd = {s = 0x0, len = -1526226928}, host = {s = 0x6c8 <error: Cannot access memory at address 0x6c8>, len = -1524738624}, port = {
              s = 0x7f465a9a357a "Agent: Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 1482316848}, params = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, sip_params = {
              s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 1495842912}, headers = {s = 0x7fff01be1610 "K4\232ZF\177", len = -1607376670}, port_no = 25459, proto = 28271, type = 778529126, flags = (unknown: 2770413984), transport = {s = 0x0,
              len = -1523103368}, ttl = {s = 0xc800000000 <error: Cannot access memory at address 0xc800000000>, len = 2}, user_param = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, maddr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, method = {
              s = 0x7fff01be0e10 "", len = -293270045}, lr = {s = 0x286f5d4134421c88 <error: Cannot access memory at address 0x286f5d4134421c88>, len = 945953928}, r2 = {s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = -1526226928}, gr = {
              s = 0x7fff01be0dc0 "\200\225!\245F\177", len = -1589576708}, transport_val = {s = 0x7f46a5380f88 "\240\001", len = -1524553312}, ttl_val = {s = 0x7f46a5153018 "Q", len = 29232704}, user_param_val = {s = 0x7f46b5e8ef30 "", len = -1255543408}, maddr_val = {
              s = 0x7f46b52ac038 "", len = -1245263117}, method_val = {s = 0x754 <error: Cannot access memory at address 0x754>, len = 0}, lr_val = {s = 0x7f46a5219580 "", len = -290705697}, r2_val = {s = 0x7fff01be0e10 "", len = -1526226928}, gr_val = {s = 0x55baee80c461 "syscall",
              len = -1526226928}}, parsed_orig_ruri_ok = 29232720, parsed_orig_ruri = {user = {s = 0x7f46a140fbfc <pkg_proc_update_stats+115> "H\213\rEW ", len = 268435456}, passwd = {s = 0x0, len = 268435456}, host = {s = 0xfc59220 <error: Cannot access memory at address 0xfc59220>,
              len = 2377992}, port = {s = 0x3a6de0 <error: Cannot access memory at address 0x3a6de0>, len = 3830720}, params = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 8697}, sip_params = {s = 0x7f46a507a010 "\001", len = 29232768}, headers = {
              s = 0x55baee913e90 <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 0}, port_no = 13296, proto = 61123, type = URN_URI_T, flags = (unknown: 29232944), transport = {s = 0xeeab9c29 <error: Cannot access memory at address 0xeeab9c29>, len = 29232944}, ttl = {
              s = 0x55baeeaba08d <qm_malloc+2331> "H\213E\270H\203\300\070\351*\003", len = 29232944}, user_param = {s = 0x55baeebfa2d3 "INFO", len = -1535365032}, maddr = {s = 0x9110000000 <error: Cannot access memory at address 0x9110000000>, len = -1535356792}, method = {
              s = 0x7f46a47c3f6c "core: db_val.c", len = 8}, lr = {s = 0x7f46a507a010 "\001", len = -1523317048}, r2 = {s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = -258744391}, gr = {s = 0x7f46a53749b0 "\b", len = 29232976}, transport_val = {
              s = 0x7f46a507a010 "\001", len = 4}, ttl_val = {s = 0x7fff01be15b0 "", len = -289430829}, user_param_val = {s = 0x7f46a47c3058 "core", len = 268435456}, maddr_val = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 29233168}, method_val = {
              s = 0x7f46a47b94ce <db_str2val+14063> "H\213\205P\377\377\377H\213P\020\213\205X\377\377\377H\230H\001\320", <incomplete sequence \306>, len = 8698}, lr_val = {s = 0x7f46a507a010 "\001", len = 29233024}, r2_val = {s = 0x55baf093dfba "", len = -1523317032}, gr_val = {
              s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 29233200}}, add_rm = 0x55baeeac2edf <qm_info+46>, body_lumps = 0x7fff01be0fc0, reply_lump = 0x55baeeac2edf <qm_info+46>,
          add_to_branch_s = "\320\017\276\001\377\177\000\000\020\240\a\245F\177\000\000\000\020\276\001\377\177\000\000\020\240\a\245F\177\000\000\020\020\276\001\377\177\000\000\374\373@\241F\177\000\000\000\000\000\020\000\000\000\000\000", add_to_branch_len = 0,
          hash_index = 268435456, msg_flags = 0, flags = 4004261599, xflags = {21946, 29233184}, set_global_address = {s = 0x7f46a507a010 "\001", len = 3830720}, set_global_port = {s = 0x7f46a507a010 "\001", len = 29233248},
          force_send_socket = 0x7f46a140fbfc <pkg_proc_update_stats+115>, path_vec = {s = 0x7fff01be1040 "\300s:", len = 0}, instance = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 264604840}, reg_id = 2379392, ruid = {
            s = 0x3a7358 <error: Cannot access memory at address 0x3a7358>, len = 3830720}, location_ua = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 8701}, ldv = {flow = {decoded = 3830720, rcv = {src_ip = {af = 29233296, len = 32767, u = {addrl = {94261354774160,
                      0}, addr32 = {4002496144, 21946, 0, 0}, addr16 = {16016, 61073, 21946, 0, 0, 0, 0, 0}, addr = "\220>\221\356\272U\000\000\000\000\000\000\000\000\000"}}, dst_ip = {af = 2768740656, len = 5, u = {addrl = {8858370048, 2771939544}, addr32 = {268435456, 2,
                      2771939544, 0}, addr16 = {0, 4096, 2, 0, 28888, 42296, 0, 0}, addr = "\000\000\000\020\002\000\000\000\330p8\245\000\000\000"}}, src_port = 4448, dst_port = 446, proto_reserved1 = 32767, proto_reserved2 = -290733184, src_su = {s = {sa_family = 21946,
                    sa_data = "\000\000`\021\276\001\377\177\000\000)\234\253", <incomplete sequence \356>}, sin = {sin_family = 21946, sin_port = 0, sin_addr = {s_addr = 29233504}, sin_zero = "\377\177\000\000)\234\253", <incomplete sequence \356>}, sin6 = {sin6_family = 21946,
                    sin6_port = 0, sin6_flowinfo = 29233504, sin6_addr = {__in6_u = {__u6_addr8 = "\377\177\000\000)\234\253\356\000\000\000\000\200\361\276", <incomplete sequence \356>, __u6_addr16 = {32767, 0, 39977, 61099, 0, 0, 61824, 61118}, __u6_addr32 = {32767, 4004224041, 0,
                          4005491072}}}, sin6_scope_id = 21946}}, bind_address = 0xa35eeaba08d, proto = -48 '\320'}}}}
        __func__ = "_reply_light"
#21 0x00007f46a07c2c18 in _reply (trans=0x7f465b1b7728, p_msg=0x7f46a52129a0, code=202, reason=0x7fff01be13e0, lock=1) at t_reply.c:657
        len = 490
        buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>;tag=0b62483f5"...
        dset = 0x6 <error: Cannot access memory at address 0x6>
        bm = {to_tag_val = {s = 0x7f46a538270f "0b62483f5ecbb3b7846ec4ead5977a30-455a\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346;rport=51179;received=88.88.88.88\r\nExpires: 3600\r\nContact: <sip:77.7"..., len = 37}}
        dset_len = 1
#22 0x00007f46a07cce31 in t_reply_str (t=0x7f465b1b7728, p_msg=0x7f46a52129a0, code=202, reason=0x7fff01be13e0) at t_reply.c:1634
No locals.
#23 0x00007f46a0832825 in ki_t_reply (msg=0x7f46a52129a0, code=202, reason=0x7fff01be13e0) at tm.c:1354
        t = 0x7f465b1b7728
        ret = -1
        __func__ = "ki_t_reply"
#24 0x00007f46a0833027 in w_t_reply_wrp (msg=0x7f46a52129a0, code=202, txt=0x7f46a53749e8 "OK") at tm.c:1411
        reason = {s = 0x7f46a53749e8 "OK", len = 2}
#25 0x00007f46a031a9f3 in send_reply (msg=0x7f46a52129a0, code=202, reason=0x7f469d416460 <su_200_rpl>) at sl.c:287
        r = 0x7f46a53749e8 "OK"
        t = 0x7f465b1b7728
        ret = 1
        __func__ = "send_reply"
#26 0x00007f469d1c7b30 in send_2XX_reply (msg=0x7f46a52129a0, reply_code=202, lexpire=3600, local_contact=0x7fff01be18e0) at subscribe.c:122
        hdr_append = {s = 0x7f46a5341290 "Expires: 3600\r\nContact: <sip:77.77.77.77:5071;transport=tls>\r\n", len = 65}
        tmp = {s = 0x7f46a53412ce ">\r\n", len = 4}
        t = 0x7f46a53412c0 ";transport=tls>\r\n"
        __func__ = "send_2XX_reply"
#27 0x00007f469d1cf2fb in update_subscription (msg=0x7f46a52129a0, subs=0x7fff01be1800, to_tag_gen=1, sent_reply=0x7fff01be163c) at subscribe.c:659
        hash_code = 2864
        __func__ = "update_subscription"
#28 0x00007f469d1d6d41 in handle_subscribe (msg=0x7f46a52129a0, watcher_user=..., watcher_domain=...) at subscribe.c:1207
        to_tag_gen = 1
        subs = {pres_uri = {s = 0x7f46a51e0aa0 "sip:87@mydomain.co.co", len = 32}, to_user = {
            s = 0x7f465a9a3481 "87@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813@192.168.128.58:1195;transport=tls;"..., len = 2}, to_domain = {
            s = 0x7f465a9a3484 "mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813@192.168.128.58:1195;transport=tls;reg"..., len = 25}, from_user = {
            s = 0x7f465a9a344b "813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nCont"..., len = 3}, from_domain = {
            s = 0x7f465a9a344f "mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact:"..., len = 25}, watcher_user = {
            s = 0x7f465a9a344b "813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nCont"..., len = 3}, watcher_domain = {
            s = 0x7f465a9a344f "mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact:"..., len = 25}, event = 0x7f46587d2810,
          event_id = {s = 0x0, len = 0}, to_tag = {s = 0x7f46a0aa5580 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-455a", len = 37}, from_tag = {
            s = 0x7f465a9a346e "fce8c1c6\r\nTo: <sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813@192.168.128.58:"..., len = 8}, callid = {
            s = 0x7f465a9a33fd "18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;"..., len = 40}, sockinfo_str = {
            s = 0x7f46a52066f0 "tls:77.77.77.77:5071", len = 23}, remote_cseq = 1, local_cseq = 0, contact = {s = 0x7f46a53441f0 "sip:813@88.88.88.88:51179;transport=tls;registering_acc=mydomain_co_co", len = 83}, local_contact = {
            s = 0x7f46a51e55f8 "sip:77.77.77.77:5071;transport=tls", len = 37}, record_route = {s = 0x0, len = 0}, expires = 3600, status = 1, reason = {s = 0x0, len = 0}, version = 0, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1, internal_update_flag = 0,
          updated = -1, updated_winfo = -1, flags = 0, user_agent = {s = 0x7f465a9a3581 "Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 24}, next = 0x0}
        event = 0x7f46587d2810
        parsed_event = 0x7f46a53802c8
        ev_param = 0x0
        found = 1
        reason = {s = 0x0, len = 0}
        uri = {user = {s = 0x490 <error: Cannot access memory at address 0x490>, len = 46}, passwd = {s = 0x7fff01be16a0 "", len = 2}, host = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, port = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, params = {
            s = 0x7fff01be1700 "\360ݓ\360\272U", len = -290562593}, sip_params = {s = 0x7fff01be16e0 "8\367\067\245F\177", len = -1524553312}, headers = {s = 0x7fff01be17a0 "", len = -1523058960}, port_no = 11150, proto = 12410, type = 3590688514, flags = (unknown: 3884946688),
          transport = {s = 0x7f46a537f738 "K4\232ZF\177", len = 29235168}, ttl = {s = 0x0, len = -1525753168}, user_param = {s = 0x55baf093ddf0 "\270Kc\265F\177", len = 0}, maddr = {s = 0x7f46a50edab3 "", len = -1642817343}, method = {s = 0x0, len = 29235392}, lr = {
            s = 0xffffffffa51c6828 <error: Cannot access memory at address 0xffffffffa51c6828>, len = 0}, r2 = {
            s = 0x7f465a9a3400 "1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;bra"..., len = 0}, gr = {
            s = 0x7f46a50edab0 "813", len = 0}, transport_val = {s = 0x0, len = -1525753168}, ttl_val = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x7f46a50edaaf "", len = 0}, method_val = {
            s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x4600000000 <error: Cannot access memory at address 0x4600000000>, len = -1524553312}, gr_val = {
            s = 0x7f465a9a33ca "sip:87@mydomain.co.co SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@my.domain"..., len = 32}}
        reply_code = 500
        reply_str = {s = 0x7f469d209fcd "Server Internal Error", len = 21}
        sent_reply = 0
        __func__ = "handle_subscribe"
#29 0x00007f469d1d2e4e in handle_subscribe0 (msg=0x7f46a52129a0) at subscribe.c:988
        pfrom = 0x7f46a537f6f0
        __func__ = "handle_subscribe0"
#30 0x000055baee84384a in do_action (h=0x7fff01be2170, a=0x7f46a51cd3e0, msg=0x7f46a52129a0) at core/action.c:1067
        ret = -5
        v = -289430829
        dst = {send_sock = 0x7fff01be1ed0, to = {s = {sa_family = 64508, sa_data = "@\241F\177\000\000\270u\032\245F\177\000"}, sin = {sin_family = 64508, sin_port = 41280, sin_addr = {s_addr = 32582}, sin_zero = "\270u\032\245F\177\000"}, sin6 = {sin6_family = 64508,
              sin6_port = 41280, sin6_flowinfo = 32582, sin6_addr = {__in6_u = {__u6_addr8 = "\270u\032\245F\177\000\000\330c\032\245F\177\000", __u6_addr16 = {30136, 42266, 32582, 0, 25560, 42266, 32582, 0}, __u6_addr32 = {2769974712, 32582, 2769970136, 32582}}},
              sin6_scope_id = 2770413984}}, id = 32582, proto = 96 '`', send_flags = {f = 446, blst_imask = 32767}}
        tmp = 0x7fff01be3a60 "\003"
        new_uri = 0x7f46a51bbf70 "\032"
        end = 0x7f46a52129a0 "{"
        crt = 0x7f46a51bbf70 "\032"
        cmd = 0x7f46a51357a8
        len = 32582
        user = -1524553312
        uri = {user = {s = 0x7fff01be2280 "\230\310\034\245F\177", len = -1626615074}, passwd = {s = 0x7fff01be2388 "x%\276\001\377\177", len = 0}, host = {s = 0x69 <error: Cannot access memory at address 0x69>, len = -1255267143}, port = {
            s = 0x7f46a50e5910 "18d1c938d6d6d03dc502a4144f504713@0.0.0.0813@mydomain.co.co88.88.88.88::bantime", len = 91}, params = {s = 0x7f46a519ab28 "\001", len = -1524553312}, sip_params = {s = 0x7fff01be1de8 "\350\322\v\237F\177", len = 16}, headers = {
            s = 0x7fff01be1e10 "\347\322\v\237F\177", len = 29237712}, port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x55ba00000000 <error: Cannot access memory at address 0x55ba00000000>, len = -1}, ttl = {s = 0x0, len = 16}, user_param = {
            s = 0x7f46a5215b98 "18d1c938d6d6d03dc502a4144f504713@0.0.0.0|handling SUBSCRIBE from user [sip:813@mydomain.co.co]", len = 0}, maddr = {s = 0x7f4600000000 <error: Cannot access memory at address 0x7f4600000000>, len = 105}, method = {
            s = 0x7fff01be1e60 "\300\037\032\245F\177", len = 0}, lr = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 121}, r2 = {s = 0x7f469f0bd2de "%s: %s%.*s", len = 3}, gr = {s = 0x1800000000 <error: Cannot access memory at address 0x1800000000>,
            len = -1626615064}, transport_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, ttl_val = {s = 0x7f46a512d6c0 "\264\356z\237F\177", len = -1524992576}, user_param_val = {s = 0x7f469f0bd2e7 "s", len = 0}, maddr_val = {s = 0x7fff01be1ec0 "\360\036\276\001\377\177",
            len = 16}, method_val = {s = 0x7fff01be2460 "Ӣ\277\356\272U", len = 29238176}, lr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2_val = {s = 0x7fff01be1ef0 "\340$\276\001\377\177", len = -291901200}, gr_val = {
            s = 0x7f46a51a1fc0 "?", len = 29244000}}
        next_hop = {user = {s = 0x7fff01be1bb0 "\340\033\276\001\377\177", len = 29236496}, passwd = {s = 0x14aef82fb <error: Cannot access memory at address 0x14aef82fb>, len = 1494091032}, host = {s = 0x7fff01be1bc0 "\340\033\276\001\377\177", len = -1728474616}, port = {
            s = 0x7f465b1ba0c0 "\373\202\357J\244", len = 1494091032}, params = {s = 0x7fff01be1be0 "\220\034\276\001\377\177", len = 2}, sip_params = {s = 0x7fff01be1be0 "\220\034\276\001\377\177", len = -1728469356}, headers = {
            s = 0x2fb10000000 <error: Cannot access memory at address 0x2fb10000000>, len = 1481492824}, port_no = 7312, proto = 446, type = 32767, flags = (URI_USER_NORMALIZE | unknown: 2566518280), transport = {s = 0x7f46a5341e80 "\375\063\232ZF\177", len = 1}, ttl = {
            s = 0x7fff01be1d10 "i", len = -258744848}, user_param = {s = 0x7fff01be21a0 "", len = -1254103147}, maddr = {s = 0x7fff01be21b8 "\210\034b87\203\344|", len = 0}, method = {s = 0x7f46b53fe798 "]", len = -1255267143}, lr = {
            s = 0x4aef82fb000002fb <error: Cannot access memory at address 0x4aef82fb000002fb>, len = 1555492741}, r2 = {s = 0x7fff01be2168 "`:\276\001\377\177", len = 42728}, gr = {s = 0x7fff01be1d08 "", len = 10}, transport_val = {s = 0x7fff01be2163 "\245F\177", len = 1073741924},
          ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = -1}, maddr_val = {s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = 0}, method_val = {
            s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = 1481492768}, lr_val = {s = 0x7fff00000005 <error: Cannot access memory at address 0x7fff00000005>, len = -1255080914}, r2_val = {s = 0x7fff01be1d80 "", len = 105}, gr_val = {
            s = 0xd68 <error: Cannot access memory at address 0xd68>, len = -258744848}}
        u = 0x7fff01be2040
        port = 0
        dst_host = 0x2
        i = -293268297
        flags = 32582
        avp = 0x7fff01be2110
        st = {flags = 164, id = 0, name = {n = 1481256960, s = {s = 0x7f46584a3000 "", len = 1}, re = 0x7f46584a3000}, avp = 0x7f465b1ba0c0}
        sct = 0x10000000
        sjt = 0x40000000
        rve = 0x10000000
        mct = 0x55baeebfa2d3
        rv = 0x7f4698fcb4dc
        rv1 = 0x6
        c1 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 6, s = {s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = 29236064}, re = 0x100000006}, pval = {rs = {s = 0x100000006 <error: Cannot access memory at address 0x100000006>,
                len = 29236064}, ri = -290696736, flags = 21946}}, i2s = "0\262\374\230F\177\000\000\031g1\265\272\000\000\000\370\342\374\230F\177"}
        s = {s = 0x55baeebfa2d3 "INFO", len = 1481492168}
        srevp = {0x7fff01be1b10, 0x55baeeab71ff <futex_release+29>}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#31 0x000055baee850de3 in run_actions (h=0x7fff01be2170, a=0x7f46a51cd3e0, msg=0x7f46a52129a0) at core/action.c:1569
        t = 0x7f46a51cd3e0
        ret = -1
        tvb = {tv_sec = 94261361422004, tv_usec = 1481492824}
        tve = {tv_sec = 54086552396016, tv_usec = 6861465236}
        tz = {tz_minuteswest = -290647711, tz_dsttime = 21946}
        tdiff = 2771908408
        __func__ = "run_actions"
#32 0x000055baee8514b7 in run_actions_safe (h=0x7fff01be3a60, a=0x7f46a51cd3e0, msg=0x7f46a52129a0) at core/action.c:1633
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {2, 2913650019544472712, 94261357814483, 1073741824, 268435456, 6, 2913650019508821128, 8999462228585487496}, __mask_was_saved = 0, __saved_mask = {__val = {1073741824, 268435456, 6, 140733222625856,
                  94261356683560, 268435456, 139941394852256, 140733222626112, 139941396346608, 1, 2, 139941396346680, 140733222626320, 139941394534488, 139941394852256, 140733222626016}}}}}
        ret = -1
        ign_on_break = 0
#33 0x000055baeea8c044 in rval_get_int (h=0x7fff01be3a60, msg=0x7f46a52129a0, i=0x7fff01be2578, rv=0x7f46a51cc898, cache=0x0) at core/rvalue.c:915
        r_avp = 0x7fff01be2410
        avp_val = {n = 268435456, s = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, re = 0x10000000}
        pval = {rs = {s = 0x55baf093e040 "<134>Apr 17 10:19:01 /usr/local/kamailio/sbin/kamailio[42728]: INFO: <script>: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0|handling SUBSCRIBE from user [sip:813@mydomain.co.co]", len = 2}, ri = -289430829, flags = 21946}
        tmp = {s = 0x9e56465f0000465f <error: Cannot access memory at address 0x9e56465f0000465f>, len = -1523058888}
        s = 0x0
        r = 21
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#34 0x000055baeea909b5 in rval_expr_eval_int (h=0x7fff01be3a60, msg=0x7f46a52129a0, res=0x7fff01be2578, rve=0x7f46a51cc890) at core/rvalue.c:1913
        i1 = 29239792
        i2 = 4
        ret = -1
        c1 = {cache_type = 2770413984, val_type = 32582, c = {avp_val = {n = 29244000, s = {s = 0x7fff01be3a60 "\003", len = -289430829}, re = 0x7fff01be3a60}, pval = {rs = {s = 0x7fff01be3a60 "\003", len = -289430829}, ri = 1073741824, flags = 0}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 29238288, s = {s = 0x7fff01be2410 "", len = 29238352}, re = 0x7fff01be2410}, pval = {rs = {s = 0x7fff01be2410 "", len = 29238352}, ri = -290912104, flags = 21946}},
          i2s = "\240)!\245F\177\000\000\000\000\000\000\000\000\000\000\070P\034\245F\177"}
        rv1 = 0x55baee9febed <pv_value_destroy+175>
        rv2 = 0x55baeebfa2d3
        __func__ = "rval_expr_eval_int"
#35 0x000055baeea90e25 in rval_expr_eval_int (h=0x7fff01be3a60, msg=0x7f46a52129a0, res=0x7fff01be29f0, rve=0x7f46a51cd788) at core/rvalue.c:1921
        i1 = 0
        i2 = 0
        ret = -1
        c1 = {cache_type = 2769969568, val_type = 32582, c = {avp_val = {n = 29244000, s = {s = 0x7fff01be3a60 "\003", len = 8715}, re = 0x7fff01be3a60}, pval = {rs = {s = 0x7fff01be3a60 "\003", len = 8715}, ri = -1526226928, flags = 32582}},
          i2s = "\320[\033\245F\177\000\000\002", '\000' <repeats 12 times>}
        c2 = {cache_type = 29238672, val_type = 32767, c = {avp_val = {n = -1626642069, s = {s = 0x7f469f0b696b <xlog_2_helper+990> "H\215e\330[A\\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271", len = -289430829},
              re = 0x7f469f0b696b <xlog_2_helper+990>}, pval = {rs = {s = 0x7f469f0b696b <xlog_2_helper+990> "H\215e\330[A\\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271", len = -289430829}, ri = 0, flags = 0}},
          i2s = "\377\377\377\377\000\000\000\000\070\204\067\245F\177\000\000\320[\033\245F\177"}
        rv1 = 0x6
        rv2 = 0x10000000
        __func__ = "rval_expr_eval_int"
#36 0x000055baee8432e7 in do_action (h=0x7fff01be3a60, a=0x7f46a51cebb0, msg=0x7f46a52129a0) at core/action.c:1043
        ret = -5
        v = 0
        dst = {send_sock = 0x286f5d417d421c88, to = {s = {sa_family = 7304, sa_data = "b87\203\344|\000\000\000\000\000\000\000"}, sin = {sin_family = 7304, sin_port = 14434, sin_addr = {s_addr = 2095350583}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 7304,
              sin6_port = 14434, sin6_flowinfo = 2095350583, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 4005755768}}, id = 21946, proto = 2 '\002', send_flags = {f = 0,
            blst_imask = 0}}
        tmp = 0x1 <error: Cannot access memory at address 0x1>
        new_uri = 0x55baeebfa2d3 "INFO"
        end = 0x2 <error: Cannot access memory at address 0x2>
        crt = 0x7f4600000000 <error: Cannot access memory at address 0x7f4600000000>
        cmd = 0x7f46a512f938
        len = 32582
        user = 0
        uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7fff01be2950 "`*\276\001\377\177", len = -293270045}, params = {
            s = 0x286f5d4162c21c88 <error: Cannot access memory at address 0x286f5d4162c21c88>, len = 945953928}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x7fff01be28e0 "P)\276\001\377\177", len = 2}, port_no = 41683, proto = 61119, type = 21946, flags = (unknown: 2770413984),
          transport = {s = 0x7f46a51ba900 "\026", len = 29239680}, ttl = {s = 0x7fff01be2a10 "P+\276\001\377\177", len = -290911819}, user_param = {s = 0x7fff01be2950 "`*\276\001\377\177", len = -291517360}, maddr = {
            s = 0x1900000004 <error: Cannot access memory at address 0x1900000004>, len = 0}, method = {s = 0x7f46a5217b80 "", len = -1524553312}, lr = {s = 0x1a51f40c0 <error: Cannot access memory at address 0x1a51f40c0>, len = 0}, r2 = {s = 0x7f46a52129a0 "{", len = 2}, gr = {
            s = 0x55baeebfa2d3 "INFO", len = 1073741824}, transport_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7fff01be2a60 "P+\276\001\377\177", len = -293268297}, user_param_val = {s = 0x7f46a52129a0 "{", len = -1524553312},
          maddr_val = {s = 0x7f46a51ba900 "\026", len = 29244000}, method_val = {s = 0x0, len = 1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 2128747656}, r2_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, gr_val = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}}
        next_hop = {user = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, passwd = {s = 0x7fff01be27e0 "\320(\276\001\377\177", len = -293268297}, host = {s = 0x7fff01bdf678 "", len = -1524553312}, port = {s = 0x7f46a51f3e88 "\004", len = 29244000},
          params = {s = 0x0, len = -1}, sip_params = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1642208392}, headers = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, port_no = 0, proto = 4096, type = ERROR_URI_T, flags = (URI_SIP_USER_PHONE | unknown: 4),
          transport = {s = 0x286f5d4160421c88 <error: Cannot access memory at address 0x286f5d4160421c88>, len = 945953928}, ttl = {s = 0x7f46a512e4b0 "\030\213U\237F\177", len = 25}, user_param = {s = 0x18 <error: Cannot access memory at address 0x18>, len = 0}, maddr = {
            s = 0x7fff01be28c0 "", len = -1524553312}, method = {s = 0x7f46a5194360 ".", len = 29239360}, lr = {s = 0x18 <error: Cannot access memory at address 0x18>, len = -258927888}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7fff01be28c0 "", len = -1254730963}, transport_val = {
            s = 0x2701be28c0 <error: Cannot access memory at address 0x2701be28c0>, len = -1609780480}, ttl_val = {s = 0xffffffffa5212ba8 <error: Cannot access memory at address 0xffffffffa5212ba8>, len = -1}, user_param_val = {s = 0x7fff01be28d0 "\020*\276\001\377\177",
            len = -290930620}, maddr_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 0}, lr_val = {s = 0x7f46a51f40c8 "\004", len = 29240072}, r2_val = {s = 0x7f46a52129a0 "{",
            len = 29244000}, gr_val = {s = 0x7f46a5194360 ".", len = 29244000}}
        u = 0x7f4600000000
        port = 0
        dst_host = 0x2
        i = -290911819
        flags = 0
        avp = 0x7fff01be2c90
        st = {flags = 268435456, id = 65535, name = {n = 0, s = {s = 0x0, len = 29238992}, re = 0x0}, avp = 0x2}
        sct = 0x7f46a5164e58
        sjt = 0x6
        rve = 0x7f46a51cd788
        mct = 0x10000000
        rv = 0x40000000
        rv1 = 0x6
        c1 = {cache_type = 29239904, val_type = 32767, c = {avp_val = {n = 29240320, s = {s = 0x7fff01be2c00 "\300\273\033\245F\177", len = -1524738568}, re = 0x7fff01be2c00}, pval = {rs = {s = 0x7fff01be2c00 "\300\273\033\245F\177", len = -1524738568}, ri = 29239888, flags = 944}},
          i2s = "\240)!\245F\177\000\000\002\000\000\000\000\000\000\000Ӣ\277\356\272U"}
        s = {s = 0x7f46a51f3e88 "\004", len = 29239040}
        srevp = {0x7fff01be26a0, 0x7f46a52129a0}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#37 0x000055baee850de3 in run_actions (h=0x7fff01be3a60, a=0x7f46a51bbbc0, msg=0x7f46a52129a0) at core/action.c:1569
        t = 0x7f46a51cebb0
        ret = 1
        tvb = {tv_sec = 94257352278016, tv_usec = -1}
        tve = {tv_sec = 0, tv_usec = 139938624438272}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 0
        __func__ = "run_actions"
#38 0x000055baee8437b6 in do_action (h=0x7fff01be3a60, a=0x7f46a51d27f0, msg=0x7f46a52129a0) at core/action.c:1058
        ret = 1
        v = 1
        dst = {send_sock = 0x286f5d4172e21c88, to = {s = {sa_family = 7304, sa_data = "b87\203\344|\000\000\000\000F\177\000"}, sin = {sin_family = 7304, sin_port = 14434, sin_addr = {s_addr = 2095350583}, sin_zero = "\000\000\000\000F\177\000"}, sin6 = {sin6_family = 7304,
              sin6_port = 14434, sin6_flowinfo = 2095350583, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000F\177\000\000\205\220\233\237F\177\000", __u6_addr16 = {0, 0, 32582, 0, 36997, 40859, 32582, 0}, __u6_addr32 = {0, 32582, 2677772421, 32582}}},
              sin6_scope_id = 2677772447}}, id = 32582, proto = 0 '\000', send_flags = {f = 0, blst_imask = 0}}
        tmp = 0x4 <error: Cannot access memory at address 0x4>
        new_uri = 0x7fff01be31c0 "\340\066\276\001\377\177"
        end = 0x55baf07d9244 ""
        crt = 0x7f46a11f8512 "%x%c%x%c"
        cmd = 0x7f46a5149000
        len = 0
        user = 14
        uri = {user = {s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 2}, passwd = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {
            s = 0x7fff01be3020 "01\276\001\377\177", len = -293270045}, params = {s = 0x3865366136626335 <error: Cannot access memory at address 0x3865366136626335>, len = 1073741824}, sip_params = {s = 0x7fff01be2fa0 "\001\200\255\373F\177", len = 29241248}, headers = {
            s = 0x1a <error: Cannot access memory at address 0x1a>, len = -1591769838}, port_no = 12552, proto = 446, type = 32767, flags = (unknown: 2770413984), transport = {s = 0x7f46a5148ea8 "\021", len = 29241424}, ttl = {
            s = 0x7f46fbad8001 <error: Cannot access memory at address 0x7f46fbad8001>, len = -1614761307}, user_param = {s = 0x7f469fc0b2a5 <_ul_sruid+5> "5cb6ef3a-a6e8-", len = -1614761307}, maddr = {s = 0x7f469fc0b2a5 <_ul_sruid+5> "5cb6ef3a-a6e8-", len = -1614761293}, method = {
            s = 0x7f469fc0b2bf <_ul_sruid+31> "", len = -1614761307}, lr = {s = 0xffffffff9fc0b2bf <error: Cannot access memory at address 0xffffffff9fc0b2bf>, len = 0}, r2 = {s = 0x0, len = 2}, gr = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, transport_val = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7fff01be3130 " 2\276\001\377\177", len = -293268297}, user_param_val = {s = 0x7fff01be3070 "Ӣ\277\356\272U", len = -1524553312}, maddr_val = {s = 0x7f46a5148ea8 "\021",
            len = 29244000}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1275206792}, r2_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, gr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>,
            len = 6}}
        next_hop = {user = {s = 0x7fff01be36a0 "\222\067\276\001\377\177", len = -258883088}, passwd = {s = 0x55baf091c350 "", len = -258883088}, host = {s = 0x55baf091c350 "", len = -1531003260}, port = {s = 0x313810 <error: Cannot access memory at address 0x313810>, len = 8},
          params = {s = 0x2227 <error: Cannot access memory at address 0x2227>, len = 1073741824}, sip_params = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 1494014424}, headers = {s = 0x7f46a5205028 "77.77.77.77", len = 29241200}, port_no = 14,
          proto = 0, type = ERROR_URI_T, flags = (unknown: 1073741824), transport = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = -1255234878}, ttl = {s = 0x7f46a512e4b0 "\030\213U\237F\177", len = 48}, user_param = {s = 0x7fff01be2f08 "Kt\201\240F\177",
            len = 29240896}, maddr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, method = {s = 0x7fff01be2ed0 "P/\276\001\377\177", len = 45}, lr = {s = 0xa6e8 <error: Cannot access memory at address 0xa6e8>, len = 14}, r2 = {
            s = 0x7f46fbad8001 <error: Cannot access memory at address 0x7f46fbad8001>, len = -1599450320}, gr = {s = 0x14a0aa5330 <error: Cannot access memory at address 0x14a0aa5330>, len = -1525549816}, transport_val = {s = 0x7f46a0aa5330 <callid_buf+16> "-42728@77.77.77.77",
            len = -1599450299}, ttl_val = {s = 0x7f46a0aa5372 <callid_buf+82> "", len = 1494014424}, user_param_val = {s = 0x4eebfa2d3 <error: Cannot access memory at address 0x4eebfa2d3>, len = -289515552}, maddr_val = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, method_val = {s = 0x7fff01be2f50 "5cb6a6e8", len = -292267196}, lr_val = {s = 0x210000000 <error: Cannot access memory at address 0x210000000>, len = -1601727776}, r2_val = {
            s = 0x7fff01be0000 "uRPw", len = -1602129642}, gr_val = {s = 0x7fff01be2f70 "\032", len = -1602128821}}
        u = 0xd68
        port = 0
        dst_host = 0x2
        i = -290911819
        flags = 0
        avp = 0x7fff01be3360
        st = {flags = 4294967295, id = 65535, name = {n = 0, s = {s = 0x0, len = 29240816}, re = 0x0}, avp = 0x7f46b52d00a6 <__GI_getenv+22>}
        sct = 0x14f0911420
        sjt = 0x0
        rve = 0x7f46a51bb3a8
        mct = 0x5
        rv = 0x55baeeac2edf <qm_info+46>
        rv1 = 0x6
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = "\000\000\276\001\377\177\000\000\000\000\000\000\000\000\000\000h\r\000\000\004"}
        s = {s = 0x0, len = 0}
        srevp = {0x7f46a0aa5372 <callid_buf+82>, 0x0}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#39 0x000055baee850de3 in run_actions (h=0x7fff01be3a60, a=0x7f46a51d27f0, msg=0x7f46a52129a0) at core/action.c:1569
        t = 0x7f46a51d27f0
        ret = -1
        tvb = {tv_sec = 85899345920, tv_usec = 139940118452696}
        tve = {tv_sec = 94261357814483, tv_usec = 60129542148}
        tz = {tz_minuteswest = -1617194880, tz_dsttime = 32582}
        tdiff = 1073741824
        __func__ = "run_actions"
#40 0x000055baee83ffc5 in do_action (h=0x7fff01be3a60, a=0x7f46a514aa98, msg=0x7f46a52129a0) at core/action.c:691
        ret = -5
        v = 0
        dst = {send_sock = 0x167a16b95e269ceb, to = {s = {sa_family = 1176, sa_data = "8\245F\177\000\000\356\065\232ZF\177\000"}, sin = {sin_family = 1176, sin_port = 42296, sin_addr = {s_addr = 32582}, sin_zero = "\356\065\232ZF\177\000"}, sin6 = {sin6_family = 1176,
              sin6_port = 42296, sin6_flowinfo = 32582, sin6_addr = {__in6_u = {__u6_addr8 = "\356\065\232ZF\177\000\000\245\064\232ZF\177\000", __u6_addr16 = {13806, 23194, 32582, 0, 13477, 23194, 32582, 0}, __u6_addr32 = {1520055790, 32582, 1520055461, 32582}}},
              sin6_scope_id = 2588589196}}, id = -789618140, proto = 16 '\020', send_flags = {f = 42247, blst_imask = 0}}
        tmp = 0x7f46a534b848 "\001"
        new_uri = 0xe8 <error: Cannot access memory at address 0xe8>
        end = 0x55baeec4b538 "core: core/parser/msg_parser.c"
        crt = 0x7fff01be3940 ""
        cmd = 0x7f465a9a35ee
        len = 32582
        user = -1526226928
        uri = {user = {s = 0x7fff01be3620 "", len = -1526226928}, passwd = {s = 0x7f46a537e038 "\001", len = -1526226928}, host = {s = 0x7fff01be3660 "\220\066\276\001\377\177", len = -1589576708}, port = {s = 0x7fff01be3640 "\300s:", len = 0}, params = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 264609488}, sip_params = {s = 0x400243c58 <error: Cannot access memory at address 0x400243c58>, len = -289139488}, headers = {s = 0x3a73c0 <error: Cannot access memory at address 0x3a73c0>, len = 8},
          port_no = 14144, proto = 446, type = 32767, flags = (URI_SIP_USER_PHONE | unknown: 4004429680), transport = {s = 0x7fff01be3690 "\230\004\070\245F\177", len = -292471152}, ttl = {s = 0x0, len = -289197072}, user_param = {s = 0x7fff01be3740 "\320\070\276\001\377\177",
            len = -290743255}, maddr = {s = 0x7f46a5380498 "\001", len = -1523277664}, method = {s = 0x7fff01be3792 "", len = 29243283}, lr = {s = 0x7f465a9a35ee "", len = 1520055493}, r2 = {s = 0x55baeec44e50 <__func__.6674> "parse_via", len = -289132456}, gr = {
            s = 0x40 <error: Cannot access memory at address 0x40>, len = -1526226928}, transport_val = {s = 0x4040404040404040 <error: Cannot access memory at address 0x4040404040404040>, len = 1}, ttl_val = {
            s = 0x5a5a5a5a5a5a5a5a <error: Cannot access memory at address 0x5a5a5a5a5a5a5a5a>, len = -1523277720}, user_param_val = {s = 0x520202020202020 <error: Cannot access memory at address 0x520202020202020>, len = 29243276}, maddr_val = {
            s = 0x400ffffff <error: Cannot access memory at address 0x400ffffff>, len = 1520055488}, method_val = {s = 0x4eebfa2d3 <error: Cannot access memory at address 0x4eebfa2d3>, len = 1520055492}, lr_val = {
            s = 0x7f465a9a34c4 ";branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813@192.168.128.58:1195;transport=tls;registering_acc=mydomain_co_co>\r\nUser-Agent: Jitsi2.10.5"..., len = 4}, r2_val = {
            s = 0x7fff01be38d0 "\360\071\276\001\377\177", len = -290487379}, gr_val = {s = 0x53111f5de2582f40 <error: Cannot access memory at address 0x53111f5de2582f40>, len = -1292927372}}
        next_hop = {user = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -1243022704}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, host = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1243053712}, port = {
            s = 0x7f2d00000000 <error: Cannot access memory at address 0x7f2d00000000>, len = -1617194880}, params = {s = 0x0, len = -1243052856}, sip_params = {s = 0x7fff01be34f0 "`J*\265F\177", len = 1073741824}, headers = {s = 0x7f46b5e88170 "", len = 29242592}, port_no = 49645,
          proto = 61056, type = 21946, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 2822930836), transport = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1494014424}, ttl = {s = 0x7f46b52a4a60 "\306J", len = -1243025616}, user_param = {
            s = 0x40000000 <error: Cannot access memory at address 0x40000000>, len = 29242784}, maddr = {s = 0x7fff01be3520 "", len = 29}, method = {s = 0x40000000 <error: Cannot access memory at address 0x40000000>, len = 268435456}, lr = {
            s = 0x6 <error: Cannot access memory at address 0x6>, len = -1631247160}, r2 = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 0}, gr = {s = 0x7fff01be35d0 "\001", len = -286653832}, transport_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824},
          ttl_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, user_param_val = {s = 0x7fff01be3a30 "P;\276\001\377\177", len = -1245242476}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, method_val = {
            s = 0x6e0000005b <error: Cannot access memory at address 0x6e0000005b>, len = -1255519648}, lr_val = {s = 0x7fff01be3940 "", len = -1245212198}, r2_val = {s = 0x7fff01be3a70 "\002", len = -1525387056}, gr_val = {s = 0x1 <error: Cannot access memory at address 0x1>,
            len = -290705697}}
        u = 0x2215
        port = 0
        dst_host = 0x6
        i = 15
        flags = 32582
        avp = 0x3a73c0
        st = {flags = 29242752, id = 32767, name = {n = -1243022704, s = {s = 0x7f46b5e8fa90 "<0\201\356\272U", len = 1}, re = 0x7f46b5e8fa90}, avp = 0x0}
        sct = 0x3a73c0
        sjt = 0x3a60d8
        rve = 0x7f46a5148ff8
        mct = 0x243c00
        rv = 0x7f46b5e884c8
        rv1 = 0x3a5fe8
        c1 = {cache_type = 3051944488, val_type = 32582, c = {avp_val = {n = 7, s = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 268435456}, re = 0x7}, pval = {rs = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 268435456}, ri = -1525490576,
              flags = 32582}}, i2s = "\200\064\276\001", '\000' <repeats 12 times>, "`X\"\244\200"}
        s = {s = 0x7fff01be3414 "", len = 29242592}
        srevp = {0x7fff01be34f0, 0x7f46b529ed90}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#41 0x000055baee850de3 in run_actions (h=0x7fff01be3a60, a=0x7f46a51470d0, msg=0x7f46a52129a0) at core/action.c:1569
        t = 0x7f46a514aa98
        ret = 1
        tvb = {tv_sec = 21185405651, tv_usec = 94261358145712}
        tve = {tv_sec = 140733222632080, tv_usec = 2}
        tz = {tz_minuteswest = 1520055549, tz_dsttime = 32582}
        tdiff = 6
        __func__ = "run_actions"
#42 0x000055baee85157f in run_top_route (a=0x7f46a51470d0, msg=0x7f46a52129a0, c=0x0) at core/action.c:1654
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {2, 2913650019164888200, 94261357814483, 1073741824, 268435456, 6, 2913650019271842952, 8999462228585487496}, __mask_was_saved = 0, __saved_mask = {__val = {6192449487634431, 140733222632176,
                  139941329810791, 94261357814483, 0, 4611686022990790656, 139941394852256, 140733222632272, 94261354856549, 7065381312, 139941394852256, 1073741825, 0, 94261357814483, 2, 94261357814483}}}}}
        p = 0x7fff01be3a60
        ret = 268435456
        sfbk = 0
#43 0x000055baee9ac2ce in receive_msg (buf=0x7f465a9a33c0 "SUBSCRIBE sip:87@mydomain.co.co SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@demo"..., len=558,
    rcv_info=0x7f465a9a30e0) at core/receive.c:427
        msg = 0x7f46a52129a0
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 2, jmp_env = {{__jmpbuf = {94261357814483, 1073741824, 268435456, 6, 140733222632784, 94261355984408, 9, 139941663871424}, __mask_was_saved = 29245488, __saved_mask = {__val = {139940144492744, 139940144493504, 8589935150,
                  223338364929, 139940144493504, 9, 139940144493514, 32, 139940144493547, 7, 64, 0, 139940150786904, 2632814952448, 65536, 139940130643520}}}}}
        bctx = 0x22e
        ret = 32582
        stats_on = 0
        tvb = {tv_sec = 214748364800, tv_usec = 139940144493554}
        tve = {tv_sec = 0, tv_usec = 139940144494062}
        tz = {tz_minuteswest = 1520055242, tz_dsttime = 32582}
        diff = 0
        inb = {s = 0x7f465a9a33c0 "SUBSCRIBE sip:87@mydomain.co.co SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@demo"..., len = 558}
        netinfo = {data = {s = 0x2020202020202020 <error: Cannot access memory at address 0x2020202020202020>, len = 538976288}, rcv = 0xffffffffffffffff, dst = 0x7f465a9a33f4}
        keng = 0x0
        evp = {data = 0x7fff01be3be0, rcv = 0x7f465a9a30e0, dst = 0x0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#44 0x000055baeea464bc in receive_tcp_msg (tcpbuf=0x7f465a9a33c0 "SUBSCRIBE sip:87@mydomain.co.co SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87@demo"...,
    len=558, rcv_info=0x7f465a9a30e0, con=0x7f465a9a30c8) at core/tcp_read.c:1399
        buf = 0x0
        bsize = 0
        blen = 558
        __func__ = "receive_tcp_msg"
#45 0x000055baeea48ac4 in tcp_read_req (con=0x7f465a9a30c8, bytes_read=0x7fff01be3fd0, read_flags=0x7fff01be3fc8) at core/tcp_read.c:1631
        bytes = 558
        total_bytes = 558
        resp = 1
        size = 0
        req = 0x7f465a9a3148
        dst = {send_sock = 0x7fff01be3fc0, to = {s = {sa_family = 12728, sa_data = "\232ZF\177\000\000\000\000\000\000\001 \000"}, sin = {sin_family = 12728, sin_port = 23194, sin_addr = {s_addr = 32582}, sin_zero = "\000\000\000\000\001 \000"}, sin6 = {sin6_family = 12728,
              sin6_port = 23194, sin6_flowinfo = 32582, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\001 \000\000\340\330\070\245F\177\000", __u6_addr16 = {0, 0, 8193, 0, 55520, 42296, 32582, 0}, __u6_addr32 = {0, 8193, 2771966176, 32582}}}, sin6_scope_id = 29245072}},
          id = 32767, proto = 1 '\001', send_flags = {f = 0, blst_imask = 80}}
        c = 13 '\r'
        ret = 0
        __func__ = "tcp_read_req"
#46 0x000055baeea4c621 in handle_io (fm=0x7f46a538d8e0, events=1, idx=-1) at core/tcp_read.c:1862
        ret = 0
        n = 21946
        read_flags = 1
        con = 0x7f465a9a30c8
        s = 0
        resp = 1
        t = 80
        __func__ = "handle_io"
#47 0x000055baeea39524 in io_wait_loop_epoll (h=0x55baeef1d440 <io_w>, t=2, repeat=0) at core/io_wait.h:1062
        n = 1
        r = 0
        fm = 0x7f46a538d8e0
        revents = 1
        __func__ = "io_wait_loop_epoll"
#48 0x000055baeea4d9ce in tcp_receive_loop (unix_sock=55) at core/tcp_read.c:1974
        __func__ = "tcp_receive_loop"
#49 0x000055baee8faf60 in tcp_init_children () at core/tcp_main.c:5086
        r = 3
        i = 7
        reader_fd_1 = 55
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\006\000\000\000\000\000\000\000\000B\276\001\377\177\000\000\307W\224\356\272U\000\000\060B\276\001\377\177\000\000m\022\225\356\001", '\000' <repeats 11 times>, "\004X\240\356\000\000\000\000\321\313\300\356\000\000\000\000м\023\245F\177\000\000\357\352\272\000\000\000\000\000\000\000\000\000\000!\000\000\000\"\000\000\000\000\362\067\265F\177\000"
        si = 0x0
        __func__ = "tcp_init_children"
#50 0x000055baee82f1a9 in main_loop () at main.c:1750
        i = 8
        pid = 42669
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.20:5088 (77.77.77.77:5070)\000\067\060)\000\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\217\362\067\265F\177\000\000\300B\276\001\377\177\000\000\060\000\000\000\060\000\000\000\240C\276\001\377\177\000\000h \037\245F\177\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#51 0x000055baee836430 in main (argc=13, argv=0x7fff01be4648) at main.c:2737
        cfg_stream = 0x55baf07a5010
        c = -1
        r = 0
        tmp = 0x7fff01be4e05 ""
        tmp_len = 32767
        port = 29246592
        proto = 32582
        options = 0x55baeebaf600 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 554244915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0xffffffff
        p = 0xd <error: Cannot access memory at address 0xd>
        st = {st_dev = 18, st_ino = 2029638, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1555492665, tv_nsec = 845706812}, st_mtim = {tv_sec = 1555492665, tv_nsec = 845706812},
          st_ctim = {tv_sec = 1555492665, tv_nsec = 845706812}, __glibc_reserved = {0, 0, 0}}
        option_index = 0
        long_options = {{name = 0x55baeebb1aea "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55baeebabf29 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55baeebb1aef "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"

@shaunjstokes
Copy link
Author

shaunjstokes commented Apr 17, 2019

Here's another core dump, mostly we're seeing: aesni_ecb_encrypt () at crypto/aes/aesni-x86_64.s:624

#0  aesni_ecb_encrypt () at crypto/aes/aesni-x86_64.s:624
No locals.
#1  0x00007f2f5b39e240 in aesni_ecb_cipher (ctx=0x7f2f0fa1d050, out=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, in=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, len=16) at crypto/evp/e_aes.c:319
        bl = 16
#2  0x00007f2f5b3b3526 in evp_EncryptDecryptUpdate (ctx=0x7f2f0fa1d050, out=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, outl=0x7ffd614afd74, in=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, inl=16)
    at crypto/evp/evp_enc.c:333
        i = 32559
        j = 262262632
        bl = 16
        cmpl = 16
#3  0x00007f2f5b3b3771 in EVP_EncryptUpdate (ctx=0x7f2f0fa1d050, out=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, outl=0x7ffd614afd74, in=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, inl=16)
    at crypto/evp/evp_enc.c:385
No locals.
#4  0x00007f2f5b3b315f in EVP_CipherUpdate (ctx=0x7f2f0fa1d050, out=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, outl=0x7ffd614afd74, in=0x7f2f0fa1cf68 "\006\017\340\205\065\005|?\371\301@M\375\fC\237Jv", <incomplete sequence \355>, inl=16)
    at crypto/evp/evp_enc.c:213
No locals.
#5  0x00007f2f5b3f5c8c in ctr_update (drbg=0x7f2f0fa1ce80, in1=0x0, in1len=0, in2=0x0, in2len=0, nonce=0x0, noncelen=0) at crypto/rand/drbg_ctr.c:251
        ctr = 0x7f2f0fa1cf28
        outlen = 16
#6  0x00007f2f5b3f60d2 in drbg_ctr_generate (drbg=0x7f2f0fa1ce80, out=0x7f2f10b910b8 "", outlen=0, adin=0x0, adinlen=0) at crypto/rand/drbg_ctr.c:349
        ctr = 0x7f2f0fa1cf28
#7  0x00007f2f5b3f7591 in RAND_DRBG_generate (drbg=0x7f2f0fa1ce80, out=0x7f2f10b91098 "\256\277\364\322\r\271.\247˗{\325i\030\376\251\212$MM\330R\354\244>kPM\224%T1", outlen=32, prediction_resistance=0, adin=0x0, adinlen=0) at crypto/rand/drbg_lib.c:638
        reseed_required = 0
#8  0x00007f2f5b3f76bf in RAND_DRBG_bytes (drbg=0x7f2f0fa1ce80, out=0x7f2f10b91098 "\256\277\364\322\r\271.\247˗{\325i\030\376\251\212$MM\330R\354\244>kPM\224%T1", outlen=32) at crypto/rand/drbg_lib.c:679
        additional = 0x0
        additional_len = 0
        chunk = 32
        ret = 0
#9  0x00007f2f5b3f9168 in RAND_priv_bytes (buf=0x7f2f10b91098 "\256\277\364\322\r\271.\247˗{\325i\030\376\251\212$MM\330R\354\244>kPM\224%T1", num=32) at crypto/rand/rand_lib.c:827
        meth = 0x7f2f5b740920 <rand_meth>
        drbg = 0x7f2f0fa1ce80
        ret = 32559
#10 0x00007f2f5b7909d0 in SSL_CTX_new (meth=0x7f2f5b9f3a40 <TLS_method_data.22387>) at ssl/ssl_lib.c:2998
        ret = 0x7f2f10b8f498
#11 0x00007f2f5be68cac in ?? () from /usr/lib/x86_64-linux-gnu/libpq.so.5
No symbol table info available.
#12 0x00007f2f5be6a4f5 in ?? () from /usr/lib/x86_64-linux-gnu/libpq.so.5
No symbol table info available.
#13 0x00007f2f5be52258 in PQconnectPoll () from /usr/lib/x86_64-linux-gnu/libpq.so.5
No symbol table info available.
#14 0x00007f2f5be5304c in ?? () from /usr/lib/x86_64-linux-gnu/libpq.so.5
No symbol table info available.
#15 0x00007f2f5be55d67 in PQconnectdbParams () from /usr/lib/x86_64-linux-gnu/libpq.so.5
No symbol table info available.
#16 0x00007f2f5c0ac514 in db_postgres_new_connection (id=0x7f2f5c4c4a10) at km_pg_con.c:112
        ptr = 0x7f2f5c4f8ff0
        ports = 0x0
        i = 4
        keywords = {0x7f2f5c0d2dcc "host", 0x7f2f5c0d2dd1 "dbname", 0x7f2f5c0d2dd8 "user", 0x7f2f5c0d2ddd "password", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}
        values = {0x7f2f5c4c8cf8 "localhost", 0x7f2f5c4c93d8 "kamailio", 0x7f2f5c4c8800 "kamailio", 0x7f2f5c4dbe28 "gk043e89jt08jgmvgo438jt089394ej", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}
        to = '\000' <repeats 15 times>
        res = 0x0
        __func__ = "db_postgres_new_connection"
#17 0x00007f2f5ba04590 in db_do_init2 (url=0x7f2f5467e530 <pres_db_url>, new_connection=0x7f2f5c0aad33 <db_postgres_new_connection>, pooling=DB_POOLING_PERMITTED) at db.c:317
        id = 0x7f2f5c4c4a10
        con = 0x0
        res = 0x7f2f5c4dbd30
        con_size = 32
        __func__ = "db_do_init2"
#18 0x00007f2f5ba03516 in db_do_init (url=0x7f2f5467e530 <pres_db_url>, new_connection=0x7f2f5c0aad33 <db_postgres_new_connection>) at db.c:270
No locals.
#19 0x00007f2f5c09a099 in db_postgres_init (_url=0x7f2f5467e530 <pres_db_url>) at km_dbase.c:113
No locals.
#20 0x00007f2f543b7d71 in child_init (rank=33) at presence.c:536
        __func__ = "child_init"
#21 0x000055e257f89b44 in init_mod_child (m=0x7f2f5c39d668, rank=33) at core/sr_module.c:859
        __func__ = "init_mod_child"
#22 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39dd98, rank=33) at core/sr_module.c:855
        __func__ = "init_mod_child"
#23 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39e118, rank=33) at core/sr_module.c:855
        __func__ = "init_mod_child"
#24 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39e498, rank=33) at core/sr_module.c:855
        __func__ = "init_mod_child"
#25 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39e8b8, rank=33) at core/sr_module.c:855
        __func__ = "init_mod_child"
#26 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39ec60, rank=33) at core/sr_module.c:855
        __func__ = "init_mod_child"
#27 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39f2a8, rank=33) at core/sr_module.c:855
        __func__ = "init_mod_child"
#28 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39f7e0, rank=33) at core/sr_module.c:855
        __func__ = "init_mod_child"
#29 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c39ff70, rank=33) at core/sr_module.c:855
        __func__ = "init_mod_child"
#30 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c3a03f8, rank=33) at core/sr_module.c:855
        __func__ = "init_mod_child"
#31 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c3a1170, rank=33) at core/sr_module.c:855
        __func__ = "init_mod_child"
#32 0x000055e257f897c7 in init_mod_child (m=0x7f2f5c3a3cd0, rank=33) at core/sr_module.c:855
        __func__ = "init_mod_child"
#33 0x000055e257f89f19 in init_child (rank=33) at core/sr_module.c:887
        ret = 32559
#34 0x000055e257f966b4 in fork_tcp_process (child_id=33, desc=0x7ffd614b3670 "tcp receiver (generic)", r=0, reader_fd_1=0x7ffd614b36f0) at core/pt.c:4
        pid = 0
        child_process_no = 47
        sockfd = {62, 63}
        reader_fd = {64, 65}
        ret = -1
        i = 0
        new_seed1 = 1031182733
        new_seed2 = 766258607
        __func__ = "fork_tcp_process"
#35 0x000055e257f3ec38 in tcp_init_children () at core/tcp_main.c:5076
        r = 0
        i = 15
        reader_fd_1 = 65
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\006\000\000\000\000\000\000\000\020\067Ka\375\177\000\000Ǘ\370W\342U\000\000@7Ka\375\177\000\000mR\371W\001", '\000' <repeats 11 times>, "\004\230\004X\000\000\000\000\321\v%X\000\000\000\000\320<:\\/\177\000\000\357*\037X\271A\000\000\000\000\000\000\000\000\000\000\061\000\000\000\062\000\000\000\000r^l/\177\000"
        si = 0x0
        __func__ = "tcp_init_children"
#36 0x000055e257e731a9 in main_loop () at main.c:1750
        i = 16
        pid = 16824
        si = 0x0
        si_desc = "udp receiver child=15 sock=127.0.0.20:5088 (77.77.77.77:5070)\000\067\060)\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\217r^l/\177\000\000\320\067Ka\375\177\000\000\060\000\000\000\060\000\000\000\260\070Ka\375\177\000\000h\240E\\/\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#37 0x000055e257e7a430 in main (argc=13, argv=0x7ffd614b3b58) at main.c:2737
        cfg_stream = 0x55e258a1d010
        c = -1
        r = 0
        tmp = 0x7ffd614b4e06 ""
        tmp_len = 32765
        port = 1632319888
        proto = 32559
        options = 0x55e2581f3600 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 308684642
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0xffffffff
        p = 0xd <error: Cannot access memory at address 0xd>
        st = {st_dev = 18, st_ino = 179431, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1555436224, tv_nsec = 507938051}, st_mtim = {tv_sec = 1555436224, tv_nsec = 507938051}, st_ctim = {tv_sec = 1555436224,
            tv_nsec = 507938051}, __glibc_reserved = {0, 0, 0}}
        option_index = 0
        long_options = {{name = 0x55e2581f5aea "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55e2581eff29 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55e2581f5aef "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
(gdb) disas aesni_ecb_encrypt
Dump of assembler code for function aesni_ecb_encrypt:
   0x00007f2f5b2969e0 <+0>:     and    $0xfffffffffffffff0,%rdx
   0x00007f2f5b2969e4 <+4>:     je     0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b2969ea <+10>:    mov    0xf0(%rcx),%eax
   0x00007f2f5b2969f0 <+16>:    movups (%rcx),%xmm0
   0x00007f2f5b2969f3 <+19>:    mov    %rcx,%r11
   0x00007f2f5b2969f6 <+22>:    mov    %eax,%r10d
   0x00007f2f5b2969f9 <+25>:    test   %r8d,%r8d
   0x00007f2f5b2969fc <+28>:    je     0x7f2f5b296c50 <aesni_ecb_encrypt+624>
   0x00007f2f5b296a02 <+34>:    cmp    $0x80,%rdx
   0x00007f2f5b296a09 <+41>:    jb     0x7f2f5b296af7 <aesni_ecb_encrypt+279>
   0x00007f2f5b296a0f <+47>:    movdqu (%rdi),%xmm2
   0x00007f2f5b296a13 <+51>:    movdqu 0x10(%rdi),%xmm3
   0x00007f2f5b296a18 <+56>:    movdqu 0x20(%rdi),%xmm4
   0x00007f2f5b296a1d <+61>:    movdqu 0x30(%rdi),%xmm5
   0x00007f2f5b296a22 <+66>:    movdqu 0x40(%rdi),%xmm6
   0x00007f2f5b296a27 <+71>:    movdqu 0x50(%rdi),%xmm7
   0x00007f2f5b296a2c <+76>:    movdqu 0x60(%rdi),%xmm8
   0x00007f2f5b296a32 <+82>:    movdqu 0x70(%rdi),%xmm9
   0x00007f2f5b296a38 <+88>:    lea    0x80(%rdi),%rdi
   0x00007f2f5b296a3f <+95>:    sub    $0x80,%rdx
   0x00007f2f5b296a46 <+102>:   jmp    0x7f2f5b296aae <aesni_ecb_encrypt+206>
   0x00007f2f5b296a48 <+104>:   nopl   0x0(%rax,%rax,1)
   0x00007f2f5b296a50 <+112>:   movups %xmm2,(%rsi)
   0x00007f2f5b296a53 <+115>:   mov    %r11,%rcx
   0x00007f2f5b296a56 <+118>:   movdqu (%rdi),%xmm2
   0x00007f2f5b296a5a <+122>:   mov    %r10d,%eax
   0x00007f2f5b296a5d <+125>:   movups %xmm3,0x10(%rsi)
   0x00007f2f5b296a61 <+129>:   movdqu 0x10(%rdi),%xmm3
   0x00007f2f5b296a66 <+134>:   movups %xmm4,0x20(%rsi)
   0x00007f2f5b296a6a <+138>:   movdqu 0x20(%rdi),%xmm4
   0x00007f2f5b296a6f <+143>:   movups %xmm5,0x30(%rsi)
   0x00007f2f5b296a73 <+147>:   movdqu 0x30(%rdi),%xmm5
   0x00007f2f5b296a78 <+152>:   movups %xmm6,0x40(%rsi)
   0x00007f2f5b296a7c <+156>:   movdqu 0x40(%rdi),%xmm6
   0x00007f2f5b296a81 <+161>:   movups %xmm7,0x50(%rsi)
   0x00007f2f5b296a85 <+165>:   movdqu 0x50(%rdi),%xmm7
   0x00007f2f5b296a8a <+170>:   movups %xmm8,0x60(%rsi)
   0x00007f2f5b296a8f <+175>:   movdqu 0x60(%rdi),%xmm8
   0x00007f2f5b296a95 <+181>:   movups %xmm9,0x70(%rsi)
   0x00007f2f5b296a9a <+186>:   lea    0x80(%rsi),%rsi
   0x00007f2f5b296aa1 <+193>:   movdqu 0x70(%rdi),%xmm9
   0x00007f2f5b296aa7 <+199>:   lea    0x80(%rdi),%rdi
   0x00007f2f5b296aae <+206>:   callq  0x7f2f5b2967c0 <_aesni_encrypt8>
   0x00007f2f5b296ab3 <+211>:   sub    $0x80,%rdx
   0x00007f2f5b296aba <+218>:   jae    0x7f2f5b296a50 <aesni_ecb_encrypt+112>
   0x00007f2f5b296abc <+220>:   movups %xmm2,(%rsi)
   0x00007f2f5b296abf <+223>:   mov    %r11,%rcx
   0x00007f2f5b296ac2 <+226>:   movups %xmm3,0x10(%rsi)
   0x00007f2f5b296ac6 <+230>:   mov    %r10d,%eax
   0x00007f2f5b296ac9 <+233>:   movups %xmm4,0x20(%rsi)
   0x00007f2f5b296acd <+237>:   movups %xmm5,0x30(%rsi)
   0x00007f2f5b296ad1 <+241>:   movups %xmm6,0x40(%rsi)
   0x00007f2f5b296ad5 <+245>:   movups %xmm7,0x50(%rsi)
   0x00007f2f5b296ad9 <+249>:   movups %xmm8,0x60(%rsi)
   0x00007f2f5b296ade <+254>:   movups %xmm9,0x70(%rsi)
   0x00007f2f5b296ae3 <+259>:   lea    0x80(%rsi),%rsi
   0x00007f2f5b296aea <+266>:   add    $0x80,%rdx
   0x00007f2f5b296af1 <+273>:   je     0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296af7 <+279>:   movups (%rdi),%xmm2
   0x00007f2f5b296afa <+282>:   cmp    $0x20,%rdx
   0x00007f2f5b296afe <+286>:   jb     0x7f2f5b296b70 <aesni_ecb_encrypt+400>
   0x00007f2f5b296b00 <+288>:   movups 0x10(%rdi),%xmm3
   0x00007f2f5b296b04 <+292>:   je     0x7f2f5b296ba0 <aesni_ecb_encrypt+448>
   0x00007f2f5b296b0a <+298>:   movups 0x20(%rdi),%xmm4
   0x00007f2f5b296b0e <+302>:   cmp    $0x40,%rdx
   0x00007f2f5b296b12 <+306>:   jb     0x7f2f5b296bc0 <aesni_ecb_encrypt+480>
   0x00007f2f5b296b18 <+312>:   movups 0x30(%rdi),%xmm5
   0x00007f2f5b296b1c <+316>:   je     0x7f2f5b296be0 <aesni_ecb_encrypt+512>
   0x00007f2f5b296b22 <+322>:   movups 0x40(%rdi),%xmm6
   0x00007f2f5b296b26 <+326>:   cmp    $0x60,%rdx
   0x00007f2f5b296b2a <+330>:   jb     0x7f2f5b296c00 <aesni_ecb_encrypt+544>
   0x00007f2f5b296b30 <+336>:   movups 0x50(%rdi),%xmm7
   0x00007f2f5b296b34 <+340>:   je     0x7f2f5b296c20 <aesni_ecb_encrypt+576>
   0x00007f2f5b296b3a <+346>:   movdqu 0x60(%rdi),%xmm8
   0x00007f2f5b296b40 <+352>:   xorps  %xmm9,%xmm9
   0x00007f2f5b296b44 <+356>:   callq  0x7f2f5b2967c0 <_aesni_encrypt8>
   0x00007f2f5b296b49 <+361>:   movups %xmm2,(%rsi)
   0x00007f2f5b296b4c <+364>:   movups %xmm3,0x10(%rsi)
   0x00007f2f5b296b50 <+368>:   movups %xmm4,0x20(%rsi)
   0x00007f2f5b296b54 <+372>:   movups %xmm5,0x30(%rsi)
   0x00007f2f5b296b58 <+376>:   movups %xmm6,0x40(%rsi)
   0x00007f2f5b296b5c <+380>:   movups %xmm7,0x50(%rsi)
   0x00007f2f5b296b60 <+384>:   movups %xmm8,0x60(%rsi)
   0x00007f2f5b296b65 <+389>:   jmpq   0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296b6a <+394>:   nopw   0x0(%rax,%rax,1)
   0x00007f2f5b296b70 <+400>:   movups (%rcx),%xmm0
   0x00007f2f5b296b73 <+403>:   movups 0x10(%rcx),%xmm1
   0x00007f2f5b296b77 <+407>:   lea    0x20(%rcx),%rcx
   0x00007f2f5b296b7b <+411>:   xorps  %xmm0,%xmm2
   0x00007f2f5b296b7e <+414>:   aesenc %xmm1,%xmm2
   0x00007f2f5b296b83 <+419>:   dec    %eax
=> 0x00007f2f5b296b85 <+421>:   movups (%rcx),%xmm1
   0x00007f2f5b296b88 <+424>:   lea    0x10(%rcx),%rcx
   0x00007f2f5b296b8c <+428>:   jne    0x7f2f5b296b7e <aesni_ecb_encrypt+414>
   0x00007f2f5b296b8e <+430>:   aesenclast %xmm1,%xmm2
   0x00007f2f5b296b93 <+435>:   movups %xmm2,(%rsi)
   0x00007f2f5b296b96 <+438>:   jmpq   0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296b9b <+443>:   nopl   0x0(%rax,%rax,1)
   0x00007f2f5b296ba0 <+448>:   callq  0x7f2f5b296340 <_aesni_encrypt2>
   0x00007f2f5b296ba5 <+453>:   movups %xmm2,(%rsi)
   0x00007f2f5b296ba8 <+456>:   movups %xmm3,0x10(%rsi)
   0x00007f2f5b296bac <+460>:   jmpq   0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296bb1 <+465>:   nopl   0x0(%rax,%rax,1)
   0x00007f2f5b296bb6 <+470>:   nopw   %cs:0x0(%rax,%rax,1)
   0x00007f2f5b296bc0 <+480>:   callq  0x7f2f5b296400 <_aesni_encrypt3>
   0x00007f2f5b296bc5 <+485>:   movups %xmm2,(%rsi)
   0x00007f2f5b296bc8 <+488>:   movups %xmm3,0x10(%rsi)
   0x00007f2f5b296bcc <+492>:   movups %xmm4,0x20(%rsi)
   0x00007f2f5b296bd0 <+496>:   jmpq   0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296bd5 <+501>:   nop
   0x00007f2f5b296bd6 <+502>:   nopw   %cs:0x0(%rax,%rax,1)
   0x00007f2f5b296be0 <+512>:   callq  0x7f2f5b2964e0 <_aesni_encrypt4>
   0x00007f2f5b296be5 <+517>:   movups %xmm2,(%rsi)
   0x00007f2f5b296be8 <+520>:   movups %xmm3,0x10(%rsi)
   0x00007f2f5b296bec <+524>:   movups %xmm4,0x20(%rsi)
   0x00007f2f5b296bf0 <+528>:   movups %xmm5,0x30(%rsi)
   0x00007f2f5b296bf4 <+532>:   jmpq   0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296bf9 <+537>:   nopl   0x0(%rax)
   0x00007f2f5b296c00 <+544>:   xorps  %xmm7,%xmm7
   0x00007f2f5b296c03 <+547>:   callq  0x7f2f5b296600 <_aesni_encrypt6>
   0x00007f2f5b296c08 <+552>:   movups %xmm2,(%rsi)
   0x00007f2f5b296c0b <+555>:   movups %xmm3,0x10(%rsi)
   0x00007f2f5b296c0f <+559>:   movups %xmm4,0x20(%rsi)
   0x00007f2f5b296c13 <+563>:   movups %xmm5,0x30(%rsi)
   0x00007f2f5b296c17 <+567>:   movups %xmm6,0x40(%rsi)
   0x00007f2f5b296c1b <+571>:   jmpq   0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296c20 <+576>:   callq  0x7f2f5b296600 <_aesni_encrypt6>
   0x00007f2f5b296c25 <+581>:   movups %xmm2,(%rsi)
   0x00007f2f5b296c28 <+584>:   movups %xmm3,0x10(%rsi)
   0x00007f2f5b296c2c <+588>:   movups %xmm4,0x20(%rsi)
   0x00007f2f5b296c30 <+592>:   movups %xmm5,0x30(%rsi)
   0x00007f2f5b296c34 <+596>:   movups %xmm6,0x40(%rsi)
   0x00007f2f5b296c38 <+600>:   movups %xmm7,0x50(%rsi)
   0x00007f2f5b296c3c <+604>:   jmpq   0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296c41 <+609>:   nopl   0x0(%rax,%rax,1)
   0x00007f2f5b296c46 <+614>:   nopw   %cs:0x0(%rax,%rax,1)
   0x00007f2f5b296c50 <+624>:   cmp    $0x80,%rdx
   0x00007f2f5b296c57 <+631>:   jb     0x7f2f5b296d6d <aesni_ecb_encrypt+909>
   0x00007f2f5b296c5d <+637>:   movdqu (%rdi),%xmm2
   0x00007f2f5b296c61 <+641>:   movdqu 0x10(%rdi),%xmm3
   0x00007f2f5b296c66 <+646>:   movdqu 0x20(%rdi),%xmm4
   0x00007f2f5b296c6b <+651>:   movdqu 0x30(%rdi),%xmm5
   0x00007f2f5b296c70 <+656>:   movdqu 0x40(%rdi),%xmm6
   0x00007f2f5b296c75 <+661>:   movdqu 0x50(%rdi),%xmm7
   0x00007f2f5b296c7a <+666>:   movdqu 0x60(%rdi),%xmm8
   0x00007f2f5b296c80 <+672>:   movdqu 0x70(%rdi),%xmm9
   0x00007f2f5b296c86 <+678>:   lea    0x80(%rdi),%rdi
   0x00007f2f5b296c8d <+685>:   sub    $0x80,%rdx
   0x00007f2f5b296c94 <+692>:   jmp    0x7f2f5b296cfe <aesni_ecb_encrypt+798>
   0x00007f2f5b296c96 <+694>:   nopw   %cs:0x0(%rax,%rax,1)
   0x00007f2f5b296ca0 <+704>:   movups %xmm2,(%rsi)
   0x00007f2f5b296ca3 <+707>:   mov    %r11,%rcx
   0x00007f2f5b296ca6 <+710>:   movdqu (%rdi),%xmm2
   0x00007f2f5b296caa <+714>:   mov    %r10d,%eax
   0x00007f2f5b296cad <+717>:   movups %xmm3,0x10(%rsi)
   0x00007f2f5b296cb1 <+721>:   movdqu 0x10(%rdi),%xmm3
   0x00007f2f5b296cb6 <+726>:   movups %xmm4,0x20(%rsi)
   0x00007f2f5b296cba <+730>:   movdqu 0x20(%rdi),%xmm4
   0x00007f2f5b296cbf <+735>:   movups %xmm5,0x30(%rsi)
   0x00007f2f5b296cc3 <+739>:   movdqu 0x30(%rdi),%xmm5
   0x00007f2f5b296cc8 <+744>:   movups %xmm6,0x40(%rsi)
   0x00007f2f5b296ccc <+748>:   movdqu 0x40(%rdi),%xmm6
   0x00007f2f5b296cd1 <+753>:   movups %xmm7,0x50(%rsi)
   0x00007f2f5b296cd5 <+757>:   movdqu 0x50(%rdi),%xmm7
   0x00007f2f5b296cda <+762>:   movups %xmm8,0x60(%rsi)
   0x00007f2f5b296cdf <+767>:   movdqu 0x60(%rdi),%xmm8
   0x00007f2f5b296ce5 <+773>:   movups %xmm9,0x70(%rsi)
   0x00007f2f5b296cea <+778>:   lea    0x80(%rsi),%rsi
   0x00007f2f5b296cf1 <+785>:   movdqu 0x70(%rdi),%xmm9
   0x00007f2f5b296cf7 <+791>:   lea    0x80(%rdi),%rdi
   0x00007f2f5b296cfe <+798>:   callq  0x7f2f5b2968d0 <_aesni_decrypt8>
   0x00007f2f5b296d03 <+803>:   movups (%r11),%xmm0
   0x00007f2f5b296d07 <+807>:   sub    $0x80,%rdx
   0x00007f2f5b296d0e <+814>:   jae    0x7f2f5b296ca0 <aesni_ecb_encrypt+704>
   0x00007f2f5b296d10 <+816>:   movups %xmm2,(%rsi)
   0x00007f2f5b296d13 <+819>:   pxor   %xmm2,%xmm2
   0x00007f2f5b296d17 <+823>:   mov    %r11,%rcx
   0x00007f2f5b296d1a <+826>:   movups %xmm3,0x10(%rsi)
   0x00007f2f5b296d1e <+830>:   pxor   %xmm3,%xmm3
   0x00007f2f5b296d22 <+834>:   mov    %r10d,%eax
   0x00007f2f5b296d25 <+837>:   movups %xmm4,0x20(%rsi)
   0x00007f2f5b296d29 <+841>:   pxor   %xmm4,%xmm4
   0x00007f2f5b296d2d <+845>:   movups %xmm5,0x30(%rsi)
   0x00007f2f5b296d31 <+849>:   pxor   %xmm5,%xmm5
   0x00007f2f5b296d35 <+853>:   movups %xmm6,0x40(%rsi)
   0x00007f2f5b296d39 <+857>:   pxor   %xmm6,%xmm6
   0x00007f2f5b296d3d <+861>:   movups %xmm7,0x50(%rsi)
   0x00007f2f5b296d41 <+865>:   pxor   %xmm7,%xmm7
   0x00007f2f5b296d45 <+869>:   movups %xmm8,0x60(%rsi)
   0x00007f2f5b296d4a <+874>:   pxor   %xmm8,%xmm8
   0x00007f2f5b296d4f <+879>:   movups %xmm9,0x70(%rsi)
   0x00007f2f5b296d54 <+884>:   pxor   %xmm9,%xmm9
   0x00007f2f5b296d59 <+889>:   lea    0x80(%rsi),%rsi
   0x00007f2f5b296d60 <+896>:   add    $0x80,%rdx
   0x00007f2f5b296d67 <+903>:   je     0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296d6d <+909>:   movups (%rdi),%xmm2
   0x00007f2f5b296d70 <+912>:   cmp    $0x20,%rdx
   0x00007f2f5b296d74 <+916>:   jb     0x7f2f5b296e10 <aesni_ecb_encrypt+1072>
   0x00007f2f5b296d7a <+922>:   movups 0x10(%rdi),%xmm3
   0x00007f2f5b296d7e <+926>:   je     0x7f2f5b296e40 <aesni_ecb_encrypt+1120>
   0x00007f2f5b296d84 <+932>:   movups 0x20(%rdi),%xmm4
   0x00007f2f5b296d88 <+936>:   cmp    $0x40,%rdx
   0x00007f2f5b296d8c <+940>:   jb     0x7f2f5b296e60 <aesni_ecb_encrypt+1152>
   0x00007f2f5b296d92 <+946>:   movups 0x30(%rdi),%xmm5
   0x00007f2f5b296d96 <+950>:   je     0x7f2f5b296e90 <aesni_ecb_encrypt+1200>
   0x00007f2f5b296d9c <+956>:   movups 0x40(%rdi),%xmm6
   0x00007f2f5b296da0 <+960>:   cmp    $0x60,%rdx
   0x00007f2f5b296da4 <+964>:   jb     0x7f2f5b296ec0 <aesni_ecb_encrypt+1248>
   0x00007f2f5b296daa <+970>:   movups 0x50(%rdi),%xmm7
   0x00007f2f5b296dae <+974>:   je     0x7f2f5b296f00 <aesni_ecb_encrypt+1312>
   0x00007f2f5b296db4 <+980>:   movups 0x60(%rdi),%xmm8
   0x00007f2f5b296db9 <+985>:   movups (%rcx),%xmm0
   0x00007f2f5b296dbc <+988>:   xorps  %xmm9,%xmm9
   0x00007f2f5b296dc0 <+992>:   callq  0x7f2f5b2968d0 <_aesni_decrypt8>
   0x00007f2f5b296dc5 <+997>:   movups %xmm2,(%rsi)
   0x00007f2f5b296dc8 <+1000>:  pxor   %xmm2,%xmm2
   0x00007f2f5b296dcc <+1004>:  movups %xmm3,0x10(%rsi)
   0x00007f2f5b296dd0 <+1008>:  pxor   %xmm3,%xmm3
   0x00007f2f5b296dd4 <+1012>:  movups %xmm4,0x20(%rsi)
   0x00007f2f5b296dd8 <+1016>:  pxor   %xmm4,%xmm4
   0x00007f2f5b296ddc <+1020>:  movups %xmm5,0x30(%rsi)
   0x00007f2f5b296de0 <+1024>:  pxor   %xmm5,%xmm5
   0x00007f2f5b296de4 <+1028>:  movups %xmm6,0x40(%rsi)
   0x00007f2f5b296de8 <+1032>:  pxor   %xmm6,%xmm6
   0x00007f2f5b296dec <+1036>:  movups %xmm7,0x50(%rsi)
   0x00007f2f5b296df0 <+1040>:  pxor   %xmm7,%xmm7
   0x00007f2f5b296df4 <+1044>:  movups %xmm8,0x60(%rsi)
   0x00007f2f5b296df9 <+1049>:  pxor   %xmm8,%xmm8
   0x00007f2f5b296dfe <+1054>:  pxor   %xmm9,%xmm9
   0x00007f2f5b296e03 <+1059>:  jmpq   0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296e08 <+1064>:  nopl   0x0(%rax,%rax,1)
   0x00007f2f5b296e10 <+1072>:  movups (%rcx),%xmm0
   0x00007f2f5b296e13 <+1075>:  movups 0x10(%rcx),%xmm1
   0x00007f2f5b296e17 <+1079>:  lea    0x20(%rcx),%rcx
   0x00007f2f5b296e1b <+1083>:  xorps  %xmm0,%xmm2
   0x00007f2f5b296e1e <+1086>:  aesdec %xmm1,%xmm2
   0x00007f2f5b296e23 <+1091>:  dec    %eax
   0x00007f2f5b296e25 <+1093>:  movups (%rcx),%xmm1
   0x00007f2f5b296e28 <+1096>:  lea    0x10(%rcx),%rcx
   0x00007f2f5b296e2c <+1100>:  jne    0x7f2f5b296e1e <aesni_ecb_encrypt+1086>
   0x00007f2f5b296e2e <+1102>:  aesdeclast %xmm1,%xmm2
   0x00007f2f5b296e33 <+1107>:  movups %xmm2,(%rsi)
   0x00007f2f5b296e36 <+1110>:  pxor   %xmm2,%xmm2
   0x00007f2f5b296e3a <+1114>:  jmpq   0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296e3f <+1119>:  nop
   0x00007f2f5b296e40 <+1120>:  callq  0x7f2f5b2963a0 <_aesni_decrypt2>
   0x00007f2f5b296e45 <+1125>:  movups %xmm2,(%rsi)
   0x00007f2f5b296e48 <+1128>:  pxor   %xmm2,%xmm2
   0x00007f2f5b296e4c <+1132>:  movups %xmm3,0x10(%rsi)
   0x00007f2f5b296e50 <+1136>:  pxor   %xmm3,%xmm3
   0x00007f2f5b296e54 <+1140>:  jmpq   0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296e59 <+1145>:  nopl   0x0(%rax)
   0x00007f2f5b296e60 <+1152>:  callq  0x7f2f5b296470 <_aesni_decrypt3>
   0x00007f2f5b296e65 <+1157>:  movups %xmm2,(%rsi)
   0x00007f2f5b296e68 <+1160>:  pxor   %xmm2,%xmm2
   0x00007f2f5b296e6c <+1164>:  movups %xmm3,0x10(%rsi)
   0x00007f2f5b296e70 <+1168>:  pxor   %xmm3,%xmm3
   0x00007f2f5b296e74 <+1172>:  movups %xmm4,0x20(%rsi)
   0x00007f2f5b296e78 <+1176>:  pxor   %xmm4,%xmm4
   0x00007f2f5b296e7c <+1180>:  jmpq   0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296e81 <+1185>:  nopl   0x0(%rax,%rax,1)
   0x00007f2f5b296e86 <+1190>:  nopw   %cs:0x0(%rax,%rax,1)
   0x00007f2f5b296e90 <+1200>:  callq  0x7f2f5b296570 <_aesni_decrypt4>
   0x00007f2f5b296e95 <+1205>:  movups %xmm2,(%rsi)
   0x00007f2f5b296e98 <+1208>:  pxor   %xmm2,%xmm2
   0x00007f2f5b296e9c <+1212>:  movups %xmm3,0x10(%rsi)
   0x00007f2f5b296ea0 <+1216>:  pxor   %xmm3,%xmm3
   0x00007f2f5b296ea4 <+1220>:  movups %xmm4,0x20(%rsi)
   0x00007f2f5b296ea8 <+1224>:  pxor   %xmm4,%xmm4
   0x00007f2f5b296eac <+1228>:  movups %xmm5,0x30(%rsi)
   0x00007f2f5b296eb0 <+1232>:  pxor   %xmm5,%xmm5
   0x00007f2f5b296eb4 <+1236>:  jmp    0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296eb6 <+1238>:  nopw   %cs:0x0(%rax,%rax,1)
   0x00007f2f5b296ec0 <+1248>:  xorps  %xmm7,%xmm7
   0x00007f2f5b296ec3 <+1251>:  callq  0x7f2f5b2966e0 <_aesni_decrypt6>
   0x00007f2f5b296ec8 <+1256>:  movups %xmm2,(%rsi)
   0x00007f2f5b296ecb <+1259>:  pxor   %xmm2,%xmm2
   0x00007f2f5b296ecf <+1263>:  movups %xmm3,0x10(%rsi)
   0x00007f2f5b296ed3 <+1267>:  pxor   %xmm3,%xmm3
   0x00007f2f5b296ed7 <+1271>:  movups %xmm4,0x20(%rsi)
   0x00007f2f5b296edb <+1275>:  pxor   %xmm4,%xmm4
   0x00007f2f5b296edf <+1279>:  movups %xmm5,0x30(%rsi)
   0x00007f2f5b296ee3 <+1283>:  pxor   %xmm5,%xmm5
   0x00007f2f5b296ee7 <+1287>:  movups %xmm6,0x40(%rsi)
   0x00007f2f5b296eeb <+1291>:  pxor   %xmm6,%xmm6
   0x00007f2f5b296eef <+1295>:  pxor   %xmm7,%xmm7
   0x00007f2f5b296ef3 <+1299>:  jmp    0x7f2f5b296f34 <aesni_ecb_encrypt+1364>
   0x00007f2f5b296ef5 <+1301>:  nop
   0x00007f2f5b296ef6 <+1302>:  nopw   %cs:0x0(%rax,%rax,1)
   0x00007f2f5b296f00 <+1312>:  callq  0x7f2f5b2966e0 <_aesni_decrypt6>
   0x00007f2f5b296f05 <+1317>:  movups %xmm2,(%rsi)
   0x00007f2f5b296f08 <+1320>:  pxor   %xmm2,%xmm2
   0x00007f2f5b296f0c <+1324>:  movups %xmm3,0x10(%rsi)
   0x00007f2f5b296f10 <+1328>:  pxor   %xmm3,%xmm3
   0x00007f2f5b296f14 <+1332>:  movups %xmm4,0x20(%rsi)
   0x00007f2f5b296f18 <+1336>:  pxor   %xmm4,%xmm4
   0x00007f2f5b296f1c <+1340>:  movups %xmm5,0x30(%rsi)
   0x00007f2f5b296f20 <+1344>:  pxor   %xmm5,%xmm5
   0x00007f2f5b296f24 <+1348>:  movups %xmm6,0x40(%rsi)
   0x00007f2f5b296f28 <+1352>:  pxor   %xmm6,%xmm6
   0x00007f2f5b296f2c <+1356>:  movups %xmm7,0x50(%rsi)
   0x00007f2f5b296f30 <+1360>:  pxor   %xmm7,%xmm7
   0x00007f2f5b296f34 <+1364>:  xorps  %xmm0,%xmm0
   0x00007f2f5b296f37 <+1367>:  pxor   %xmm1,%xmm1
   0x00007f2f5b296f3b <+1371>:  repz retq
End of assembler dump.
(gdb) i r
rax            0xfc0307d2       4228057042
rbx            0x1      1
rcx            0x7f2f4f715000   139841173016576
rdx            0x10     16
rsi            0x7f2f0fa1cf68   139840102453096
rdi            0x7f2f0fa1cf68   139840102453096
rbp            0x7ffd614afc60   0x7ffd614afc60
rsp            0x7ffd614afc18   0x7ffd614afc18
r8             0x1      1
r9             0x0      0
r10            0x0      0
r11            0x7f2f0fa1cd10   139840102452496
r12            0x0      0
r13            0x1      1
r14            0x7f2f5be6c98c   139841382041996
r15            0x7ffd614b0a88   140726235761288
rip            0x7f2f5b296b85   0x7f2f5b296b85 <aesni_ecb_encrypt+421>
eflags         0x10287  [ CF PF SF IF RF ]
cs             0x33     51
ss             0x2b     43
ds             0x0      0
es             0x0      0
fs             0x0      0
gs             0x0      0

@shaunjstokes
Copy link
Author

I've gone back to our old Vanilla configuration which we used for initial testing with Kamailio and have stripped a lot of it back for the purpose of this test. Unfortunately the problem is still present (using the same systemd script as above).

I've included the configuration and back trace below in-case there's anything which helps us. Thus far I've been using multiple Jitsi softphones on Windows XP VMs with large contact lists loaded via custom XML file, I will try to reproduce this on SIPp if I can reproduce then I'll look at creating a docker image.

/usr/local/kamailio/etc/kamailio/kamailio.cfg

#!KAMAILIO

####### Defined Values #########

#!define WITH_POSTGRES
#!define WITH_AUTH
#!define WITH_USRLOCDB
#!define WITH_PRESENCE
#!define WITH_MULTIDOMAIN
#!define WITH_NAT
#!define WITH_NATSIPPING
#!define WITH_TLS

# *** Value defines - IDs used later in config
#!ifdef WITH_POSTGRES
	# - database URL - used to connect to database server by modules such
	#       as: auth_db, acc, usrloc, a.s.o.
	#!ifndef DBURL
		#!define DBURL "postgres://username:password@localhost/dbname"
	#!endif
#!endif
#!ifdef WITH_MULTIDOMAIN
	# - the value for 'use_domain' parameters
	#!define MULTIDOMAIN 1
#!else
	#!define MULTIDOMAIN 0
#!endif

# - flags
#   FLT_ - per transaction (message) flags
#	FLB_ - per branch flags
#!define FLT_NATS 5
#!define FLT_DLG 9
#!define FLT_DLGINFO 10
#!define FLB_NATB 6
#!define FLB_NATSIPPING 7

####### Global Parameters #########

### LOG Levels: 3=DBG, 2=INFO, 1=NOTICE, 0=WARN, -1=ERR
#!ifdef WITH_DEBUG
	debug=4
	log_stderror=no
#!else
	debug=2
	log_stderror=no
#!endif

memdbg=5
memlog=5

log_facility=LOG_LOCAL0
log_prefix="{$mt $hdr(CSeq) $ci} "

children=8

listen=udp:77.77.77.77:5060 advertise 77.77.77.77:5060
listen=tcp:77.77.77.77:5060 advertise 77.77.77.77:5060
listen=tls:77.77.77.77:5061 advertise 77.77.77.77:5061

#!ifdef WITH_TLS
	enable_tls=yes
#!endif

/* life time of TCP connection when there is no traffic
 * - a bit higher than registration expires to cope with UA behind NAT */
tcp_connection_lifetime=3605

tcp_accept_no_cl=yes
tcp_rd_buf_size=16384

####### Modules Section ########

/* set paths to location of modules */
mpath="/usr/local/kamailio/lib64/kamailio/modules/"

#!ifdef WITH_POSTGRES
	loadmodule "db_postgres.so"
#!endif

loadmodule "kex.so"
loadmodule "corex.so"
loadmodule "tm.so"
loadmodule "tmx.so"
loadmodule "sl.so"
loadmodule "rr.so"
loadmodule "pv.so"
loadmodule "maxfwd.so"
loadmodule "usrloc.so"
loadmodule "registrar.so"
loadmodule "textops.so"
loadmodule "siputils.so"
loadmodule "xlog.so"
loadmodule "sanity.so"
loadmodule "ctl.so"
loadmodule "cfg_rpc.so"
loadmodule "acc.so"
loadmodule "counters.so"
loadmodule "regex.so"

#!ifdef WITH_AUTH
	loadmodule "auth.so"
	loadmodule "auth_db.so"
#!endif

#!ifdef WITH_MULTIDOMAIN
	loadmodule "domain.so"
#!endif

#!ifdef WITH_PRESENCE
	loadmodule "presence.so"
	loadmodule "presence_xml.so"
	loadmodule "presence_dialoginfo.so"
	loadmodule "presence_mwi.so"
	loadmodule "pua.so"
	loadmodule "pua_dialoginfo.so"
	loadmodule "dialog.so"
#!endif

#!ifdef WITH_NAT
	loadmodule "nathelper.so"
#!endif

#!ifdef WITH_TLS
loadmodule "tls.so"
#!endif

#!ifdef WITH_DEBUG
	loadmodule "debugger.so"
#!endif

# ----------------- setting module-specific parameters ---------------

# ----- ctl params -----
# modparam("ctl", "binrpc", "unix:/var/run/kamailio/kamailio_ctl")

# ----- tm params -----
modparam("tm", "failure_reply_mode", 3)
modparam("tm", "fr_timer", 30000)
modparam("tm", "fr_inv_timer", 120000)

# ----- rr params -----
# set next param to 1 to add value to ;lr param (helps with some UAs)
modparam("rr", "enable_full_lr", 0)
# do not append from tag to the RR (no need for this script)
modparam("rr", "append_fromtag", 0)

# ----- registrar params -----
modparam("registrar", "method_filtering", 1)
modparam("registrar", "append_branches", 1)
modparam("registrar", "max_contacts", 30)
modparam("registrar", "default_expires", 900)
modparam("registrar", "default_expires_range", 40)
modparam("registrar", "expires_range", 40) 
modparam("registrar", "min_expires", 500)
modparam("registrar", "max_expires", 1300)
modparam("registrar", "gruu_enabled", 0)

# ----- usrloc params -----
/* enable DB persistency for location entries */
#!ifdef WITH_USRLOCDB
	modparam("usrloc", "db_url", DBURL)
	modparam("usrloc", "db_mode", 2)
	modparam("usrloc", "use_domain", MULTIDOMAIN)
#!endif

# ----- auth_db params -----
#!ifdef WITH_AUTH
modparam("auth_db", "db_url", DBURL)
modparam("auth_db", "calculate_ha1", 0)
modparam("auth_db", "password_column", "ha1")
modparam("auth_db", "load_credentials", "")
modparam("auth_db", "use_domain", MULTIDOMAIN)
modparam("auth", "nonce_count", 1) # enable nonce_count support
modparam("auth", "qop", "auth")    # enable qop=auth
modparam("auth", "algorithm", "MD5")
modparam("auth", "nonce_expire", 60)
modparam("auth", "nonce_auth_max_drift", 2)
#!endif

# ----- domain params -----
#!ifdef WITH_MULTIDOMAIN
	modparam("domain", "db_url", DBURL)
	modparam("domain", "register_myself", 1)
#!endif

#!ifdef WITH_PRESENCE
	# ----- presence params -----
	modparam("presence", "db_url", DBURL)
	modparam("presence", "server_address", "sip:77.77.77.77:5060" )
	modparam("presence", "send_fast_notify", 0)
	modparam("presence", "db_update_period", 20)
	modparam("presence", "clean_period", 40)
	modparam("presence", "subs_db_mode", 2)
	modparam("presence", "fetch_rows", 1000)

	# ----- presence_xml params -----
	modparam("presence_xml", "db_url", DBURL)
	modparam("presence_xml", "force_active", 1)

	# ----- presence_dialoginfo params -----
	modparam("presence_dialoginfo", "force_single_dialog", 0)
	modparam("presence_dialoginfo", "force_dummy_dialog", 1)

	# ----- pua params -----
	modparam("pua", "db_url", DBURL)
	modparam("pua", "db_mode", 2)
	modparam("pua", "update_period", 60)
	modparam("pua", "dlginfo_increase_version", 0)
	modparam("pua", "reginfo_increase_version", 0)
	modparam("pua", "check_remote_contact", 1)
	modparam("pua", "fetch_rows", 1000)

	# ----- pua_dialoginfo params -----
	modparam("pua_dialoginfo", "include_callid", 1)
	modparam("pua_dialoginfo", "send_publish_flag", FLT_DLGINFO)
	modparam("pua_dialoginfo", "caller_confirmed", 0)
	modparam("pua_dialoginfo", "include_tags", 1)
	modparam("pua_dialoginfo", "override_lifetime", 124)

	# ----- dialog params -----
	modparam("dialog", "db_url", DBURL)
	modparam("dialog", "enable_stats", 1)
	modparam("dialog", "db_mode", 1)
	modparam("dialog", "dlg_flag", FLT_DLG)	
#!endif

#!ifdef WITH_NAT
	# ----- nathelper params -----
	modparam("nathelper", "natping_interval", 30)
	modparam("nathelper", "ping_nated_only", 1)
	modparam("nathelper", "sipping_bflag", FLB_NATSIPPING)
	modparam("nathelper", "sipping_from", "sip:pinger@kamailio.org")

	# params needed for NAT traversal in other modules
	modparam("nathelper|registrar", "received_avp", "$avp(RECEIVED)")
	modparam("usrloc", "nat_bflag", FLB_NATB)
#!endif

#!ifdef WITH_TLS
	# ----- tls params -----
	modparam("tls", "config", "/usr/local/kamailio/etc/kamailio/tls.cfg")
#!endif

#!ifdef WITH_DEBUG
	# ----- debugger params -----
	modparam("debugger", "cfgtrace", 1)
	modparam("debugger", "log_level_name", "exec")
#!endif

####### Routing Logic ########

request_route {

	# NAT detection
	route(NATDETECT);

	# CANCEL processing
	if (is_method("CANCEL")) {
		if (t_check_trans()) {
			route(RELAY);
		}
		exit;
	}

	# handle requests within SIP dialogs
	route(WITHINDLG);

	### only initial requests (no To tag)
	# handle retransmissions
	if (!is_method("ACK")) {
		if(t_precheck_trans()) {
			t_check_trans();
			exit;
		}
		t_check_trans();
	}
	
	# authentication
	route(AUTH);

	# record routing for dialog forming requests (in case they are routed)
	# - remove preloaded route headers
	remove_hf("Route");
	if (is_method("INVITE|SUBSCRIBE")) {
		record_route();
	}
	
	# handle presence related requests
	route(PRESENCE);

	# handle registrations
	route(REGISTRAR);

	if ($rU==$null) {
		# request with no Username in RURI
		sl_send_reply("484","Address Incomplete");
		exit;
	}
	
	# user location service
	route(LOCATION);
	route(RELAY);
	
}

# Wrapper for relaying requests
route[RELAY] {

	# enable additional event routes for forwarded requests
	# - serial forking, RTP relaying handling, a.s.o.
	if (is_method("INVITE|BYE|SUBSCRIBE|UPDATE")) {
		if(!t_is_set("branch_route")) t_on_branch("MANAGE_BRANCH");
	}
	if (is_method("INVITE|SUBSCRIBE|UPDATE")) {
		if(!t_is_set("onreply_route")) t_on_reply("MANAGE_REPLY");
	}
	if (is_method("INVITE")) {
		if(!t_is_set("failure_route")) t_on_failure("MANAGE_FAILURE");
	}
	
	if(is_method("INVITE|BYE|UPDATE|CANCEL|ACK")) {
		setflag(FLT_DLGINFO);
		dlg_manage();
	}

	if (!t_relay()) {
		sl_reply_error();
	}
	exit;
}

# Handle requests within SIP dialogs
route[WITHINDLG] {
	if (!has_totag()) return;

	# sequential request withing a dialog should
	# take the path determined by record-routing
	if (loose_route()) {
		route(DLGURI);
		if ( is_method("ACK") ) {
			# ACK is forwarded statelessly
			route(NATMANAGE);
		} else if ( is_method("NOTIFY") ) {
			# Add Record-Route for in-dialog NOTIFY as per RFC 6665.
			record_route();
		}
		route(RELAY);
		exit;
	} else {
		if (is_method("SUBSCRIBE") && uri == myself) {
			# in-dialog subscribe requests
			route(PRESENCE);
			exit;
		}
		if ( is_method("ACK") ) {
			if ( t_check_trans() ) {
				# no loose-route, but stateful ACK;
				# must be an ACK after a 487
				# or e.g. 404 from upstream server
				route(RELAY);
				exit;
			} else {
				# ACK without matching transaction ... ignore and discard
				exit;
			}
			sl_send_reply("404","Not here");
		}
		exit;
	}
}

# Handle SIP registrations
route[REGISTRAR] {
	if (is_method("REGISTER")) {
		if(isflagset(FLT_NATS)) {
			setbflag(FLB_NATB);
			#!ifdef WITH_NATSIPPING
			# do SIP NAT pinging
				setbflag(FLB_NATSIPPING);
			#!endif
		}
		if (!save("location")) {
			sl_reply_error();
		}
		exit;
	}
}

# User location service
route[LOCATION] {
	if (is_method("MESSAGE|SUBSCRIBE|NOTIFY|PUBLISH")) {
		$avp(oexten) = $rU;
		if (!lookup("location")) {
			$var(rc) = $rc;
			t_newtran();
			switch ($var(rc)) {
				case -1:
					send_reply("410", "USER_NOT_REGISTERED");
					exit;
				case -3:
					send_reply("404", "User Not Found");
					exit;
				case -2:
					send_reply("405", "Method Not Allowed");
					exit;
			}
		}
		route(RELAY);
	}
	exit;
}

# Presence server processing
route[PRESENCE] {
	if(!is_method("PUBLISH|SUBSCRIBE")) return;

	if(is_method("SUBSCRIBE") && $hdr(Event)=="message-summary") {
		# returns here if no voicemail server is configured
		sl_send_reply("404", "No voicemail service");
		exit;
	}

	#!ifdef WITH_PRESENCE
		if (!t_newtran()) {
			sl_reply_error();
			exit;
		}

		if(is_method("PUBLISH")) {
			handle_publish();
			t_release();
		} else if(is_method("SUBSCRIBE")) {
			handle_subscribe();
			t_release();
		}
		exit;
	#!endif

	# if presence enabled, this part will not be executed
	if (is_method("PUBLISH") || $rU==$null) {
		sl_send_reply("404", "Not here");
		exit;
	}
	return;
}

# IP authorization and user authentication
route[AUTH] {
	#!ifdef WITH_AUTH
		if (is_method("REGISTER")) {
			# authenticate requests		
			if ($adu==$null || $au==$null || $fd==$null) {
				if (is_method("REGISTER")) {
					xlog("L_INFO", "$ci|user [$Au] from ip $si issued authentication challenge");
				}
				auth_challenge("$fd", "0");
				exit;
			}
			if (!auth_check("$fd", "subscriber", "1")) {
				xlog("L_INFO", "$ci|auth_check|user [$au@$fd] from ip $si authentication failed - issued authentication challenge");
				auth_challenge("$fd", "0");
				exit;
			}
			consume_credentials();
		}

	#!endif
	return;
}

# Caller NAT detection
route[NATDETECT] {
	#!ifdef WITH_NAT
		force_rport();
		if (nat_uac_test("19")) {
			if (is_method("REGISTER")) {
				fix_nated_register();
			}
			setflag(FLT_NATS);
		}
	#!endif
	return;
}

# NAT traversal
route[NATMANAGE] {
	#!ifdef WITH_NAT
		if (is_request()) {
			if (has_totag()) {
				if (check_route_param("nat=yes")) {
					setbflag(FLB_NATB);
				}
			}
		}
		if (!(isflagset(FLT_NATS) || isbflagset(FLB_NATB))) return;

		if (is_request()) {
			if (!has_totag()) {
				if (t_is_branch_route()) {
					add_rr_param(";nat=yes");
				}
			}
		}
		if (is_reply()) {
			if (isbflagset(FLB_NATB)) {
				if(is_first_hop())
					set_contact_alias();
			}
		}
	#!endif
	return;
}

# URI update for dialog requests
route[DLGURI] {
	#!ifdef WITH_NAT
		if(!isdsturiset()) {
			handle_ruri_alias();
		}
	#!endif
	return;
}

# Manage outgoing branches
branch_route[MANAGE_BRANCH] {
	xdbg("new branch [$T_branch_idx] to $ru\n");
	route(NATMANAGE);
}

# Manage incoming replies
onreply_route[MANAGE_REPLY] {
	xdbg("incoming reply\n");
	if(status=~"[12][0-9][0-9]") {
		route(NATMANAGE);
	}
}

# Manage failure routing cases
failure_route[MANAGE_FAILURE] {
	route(NATMANAGE);

	if (t_is_canceled()) {
		exit;
	}
}

/usr/local/kamailio/etc/kamailio/kamctlrc

# The Kamailio configuration file for the control tools.
#
# Here you can set variables used in the kamctl and kamdbctl setup
# scripts. Per default all variables here are commented out, the control tools
# will use their internal default values.

## your SIP domain
# SIP_DOMAIN=kamailio.org

## chrooted directory
# $CHROOT_DIR="/path/to/chrooted/directory"

## database type: MYSQL, PGSQL, ORACLE, DB_BERKELEY, DBTEXT, or SQLITE
# by default none is loaded
#
# If you want to setup a database with kamdbctl, you must at least specify
# this parameter.
DBENGINE=PGSQL

## database host
DBHOST=localhost

## database host
DBPORT=5432

## database name (for ORACLE this is TNS name)
DBNAME=dbname

# database path used by dbtext, db_berkeley or sqlite
# DB_PATH="/usr/local/etc/kamailio/dbtext"

## database read/write user
DBRWUSER="username"

## password for database read/write user
DBRWPW="password"

## database read only user
DBROUSER="rousername"

## password for database read only user
DBROPW="ropassword"

## database access host (from where is kamctl used)
# DBACCESSHOST=192.168.0.1

## database super user (for ORACLE this is 'scheme-creator' user)
DBROOTUSER="rootuser"

## password for database super user
## - important: this is insecure, targeting the use only for automatic testing
## - known to work for: mysql
# DBROOTPW=""

## database character set (used by MySQL when creating database)
#CHARSET="latin1"

## user name column
# USERCOL="username"


# SQL definitions
# If you change this definitions here, then you must change them
# in db/schema/entities.xml too.
# FIXME

# FOREVER="2030-05-28 21:32:15"
# DEFAULT_Q="1.0"


# Program to calculate a message-digest fingerprint
# MD5="md5sum"

# awk tool
# AWK="awk"

# gdb tool
# GDB="gdb"

# If you use a system with a grep and egrep that is not 100% gnu grep compatible,
# e.g. solaris, install the gnu grep (ggrep) and specify this below.
#
# grep tool
# GREP="grep"

# egrep tool
# EGREP="egrep"

# sed tool
# SED="sed"

# tail tool
# LAST_LINE="tail -n 1"

# expr tool
# EXPR="expr"


# Describe what additional tables to install. Valid values for the variables
# below are yes/no/ask. With ask (default) it will interactively ask the user
# for an answer, while yes/no allow for automated, unassisted installs.
#

# If to install tables for the modules in the EXTRA_MODULES variable.
INSTALL_EXTRA_TABLES=yes

# If to install presence related tables.
INSTALL_PRESENCE_TABLES=yes

# If to install uid modules related tables.
INSTALL_DBUID_TABLES=yes

# Define what module tables should be installed.
# If you use the postgres database and want to change the installed tables, then you
# must also adjust the STANDARD_TABLES or EXTRA_TABLES variable accordingly in the
# kamdbctl.base script.

# Kamailio standard modules
# STANDARD_MODULES="standard acc lcr domain group permissions registrar usrloc msilo
#                   alias_db uri_db speeddial avpops auth_db pdt dialog dispatcher
#                   dialplan"

# Kamailio extra modules
# EXTRA_MODULES="imc cpl siptrace domainpolicy carrierroute userblacklist htable purple sca"


## type of aliases used: DB - database aliases; UL - usrloc aliases
## - default: none
# ALIASES_TYPE="DB"

## control engine: RPCFIFO
## - default RPCFIFO
# CTLENGINE="RPCFIFO"

## path to FIFO file for engine RPCFIFO
# RPCFIFOPATH="/var/run/kamailio/kamailio_rpc_fifo"

## check ACL names; default on (1); off (0)
# VERIFY_ACL=1

## ACL names - if VERIFY_ACL is set, only the ACL names from below list
## are accepted
# ACL_GROUPS="local ld int voicemail free-pstn"

## check if user exists (used by some commands such as acl);
## - default on (1); off (0)
# VERIFY_USER=1

## verbose - debug purposes - default '0'
# VERBOSE=1

## do (1) or don't (0) store plaintext passwords
## in the subscriber table - default '1'
# STORE_PLAINTEXT_PW=0

## Kamailio START Options
## PID file path - default is: /var/run/kamailio/kamailio.pid
# PID_FILE=/var/run/kamailio/kamailio.pid

## Extra start options - default is: not set
# example: start Kamailio with 64MB share memory: STARTOPTIONS="-m 64"
# STARTOPTIONS=

/usr/local/kamailio/etc/kamailio/tls.cfg

[server:default]
method = TLSv1.2
verify_certificate = no
require_certificate = no
private_key = /usr/local/kamailio/etc/kamailio/tls/key.pem
certificate = /usr/local/kamailio/etc/kamailio/tls/cert.pem
#ca_list = /usr/ssl/certs/tls/cacert.pem
#crl = /usr/ssl/certs/tls/crl.pem

[server:77.77.77.77:5061]
method = TLSv1.2
verify_certificate = no
require_certificate = no
private_key = /usr/local/kamailio/etc/kamailio/tls/key.pem
certificate = /usr/local/kamailio/etc/kamailio/tls/cert.pem
#ca_list = /usr/ssl/certs/tls/cacert.pem
#crl = /usr/ssl/certs/tls/crl.pem

[client:default]
verify_certificate = no
require_certificate = no

gdb backtrace

#0  aesni_ecb_encrypt () at crypto/aes/aesni-x86_64.s:624
624             movups  (%rcx),%xmm1

(gdb) bt full
#0  aesni_ecb_encrypt () at crypto/aes/aesni-x86_64.s:624
No locals.
#1  0x00007f7415e3e240 in aesni_ecb_cipher (ctx=0x7f73cb204720, out=0x7f73cb204618 "Ж\020?\223L\263\237\020\230\223\307\"\026\271\224u\222\347bX\355\371yx+\240 \fbCD\313Mh\005\264\\\356\304B\222\"|\204\226S\243RBO\271", in=0x7f73cb204638 "\313Mh\005\264\\\35
    at crypto/evp/e_aes.c:319
        bl = 16
#2  0x00007f7415e53526 in evp_EncryptDecryptUpdate (ctx=0x7f73cb204720, out=0x7f73cb204618 "Ж\020?\223L\263\237\020\230\223\307\"\026\271\224u\222\347bX\355\371yx+\240 \fbCD\313Mh\005\264\\\356\304B\222\"|\204\226S\243RBO\271", outl=0x7ffd3f1e72e4,
    in=0x7f73cb204638 "\313Mh\005\264\\\356\304B\222\"|\204\226S\243RBO\271", inl=16) at crypto/evp/evp_enc.c:333
        i = 32627
        j = -887077320
        bl = 16
        cmpl = 16
#3  0x00007f7415e53771 in EVP_EncryptUpdate (ctx=0x7f73cb204720, out=0x7f73cb204618 "Ж\020?\223L\263\237\020\230\223\307\"\026\271\224u\222\347bX\355\371yx+\240 \fbCD\313Mh\005\264\\\356\304B\222\"|\204\226S\243RBO\271", outl=0x7ffd3f1e72e4,
    in=0x7f73cb204638 "\313Mh\005\264\\\356\304B\222\"|\204\226S\243RBO\271", inl=16) at crypto/evp/evp_enc.c:385
No locals.
#4  0x00007f7415e5315f in EVP_CipherUpdate (ctx=0x7f73cb204720, out=0x7f73cb204618 "Ж\020?\223L\263\237\020\230\223\307\"\026\271\224u\222\347bX\355\371yx+\240 \fbCD\313Mh\005\264\\\356\304B\222\"|\204\226S\243RBO\271", outl=0x7ffd3f1e72e4, in=0x7f73cb204638
    inl=16) at crypto/evp/evp_enc.c:213
No locals.
#5  0x00007f7415e95be4 in ctr_update (drbg=0x7f73cb204550, in1=0x0, in1len=0, in2=0x0, in2len=0, nonce=0x0, noncelen=0) at crypto/rand/drbg_ctr.c:238
        ctr = 0x7f73cb2045f8
        outlen = 16
#6  0x00007f7415e960d2 in drbg_ctr_generate (drbg=0x7f73cb204550, out=0x7f73cb437118 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@d
    adin=0x0, adinlen=0) at crypto/rand/drbg_ctr.c:349
        ctr = 0x7f73cb2045f8
#7  0x00007f7415e97591 in RAND_DRBG_generate (drbg=0x7f73cb204550,
    out=0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co"...,
    at crypto/rand/drbg_lib.c:638
        reseed_required = 0
#8  0x00007f7415e976bf in RAND_DRBG_bytes (drbg=0x7f73cb204550,
    out=0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co"...,
        additional = 0x0
        additional_len = 0
        chunk = 16
        ret = 0
#9  0x00007f7415e97c38 in drbg_bytes (out=0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip
    at crypto/rand/drbg_lib.c:968
        ret = 0
        drbg = 0x7f73cb204550
#10 0x00007f7415e991ab in RAND_bytes (buf=0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip
    at crypto/rand/rand_lib.c:836
        meth = 0x7f74161e0920 <rand_meth>
#11 0x00007f7416216bb5 in tls1_enc (s=0x7f73cb42c0d8, recs=0x7ffd3f1e7950, n_recs=1, sending=1) at ssl/record/ssl3_record.c:985
        ivlen = 16
        ds = 0x7f73cb421e90
        reclen = {268435456, 140135310032568, 5353928608, 140135301826248, 140725662414752, 94300525191679, 94300526514899, 140135301826248, 268435456, 4294967302, 140725662414832, 94300525248992, 140136384421760, 1258616618670, 140136384429104, 140136384421
          140135310032624, 140725662414880, 140136384134830, 140136564594272, 140136564594272, 140136564594288, 140725662417744, 140725662414944, 140136564180399, 140725662414960, 140725662415048, 490, 140725662417744}
        buf = {"\000\000\000\000\000\000\001\316\027\003\003", <incomplete sequence \352>, "U\000\000\204\337i\vt\177\000\000(", "\000\000\000\000\000\000xXB\313s\177", "\000\000\060\337\312s\177\000\000\250v\036?", "\375\177\000\000\000\000\000\000@Gx\372",
          "\001\000\000C\001\000\000\204\337i\v\035", "\000\000@v\036?\375\177\000\000\023pN", "\r\304U\000\000\270\376_\313s\177\000", "\000\060\337\312s\177\000\000xXB\313s", "\177\000\000\340\062\337\312s\177\000\000Ӓ", "b\r\006\000\000\000\340\062\337\31
          "\304U\000\000\200\001\000\000%\001\000\000[", "4f\r\304U\000\000\204\337i\vt\177", "\000\000(\000\000\000\000\000\000\000(\376_", "\313s\177\000\000\000\060\337\312s\177\000", "Hw\036?\375\177\000\000G4f", <incomplete sequence \304>, "U\000\000\20
          "f\r\304U\000\000\204\337i\vt\177", "\000(\000\000\000\000\000\000\000\270\376", <incomplete sequence \313>, "s\177\000\000\000\060\337\312s\177\000\000\300", "\221\220\313s\177\000\000\313)\000\000\000", "\000\000\270\376_\313\004\000\000\000\360#
          ")\214N\r\304U\000\000\240w\036", <incomplete sequence \375>, "\177\000\000ٌN\r\304U\000\000\001", "\000\000\000\000\000\000\001\000\000\000\030\000", "\000\200\337i\vt\177\000\000(\376", <incomplete sequence \313>, "%\001\000\000\060\374i\vt\177\00
          "\000\000\000\060\337\312s\177\000\000\001\000", "\000\000\000\000\000\001\000\000\000\006\000\000"}
        i = 32765
        pad = 0
        ret = 32628
        tmpr = 1
        bs = 140136564594288
        mac_size = 0
        ctr = 0
        padnum = 140136564594272
        loop = 140136564594536
        padval = 0 '\000'
        imac_size = 43
        enc = 0x7f74161e05c0 <aesni_128_cbc_hmac_sha1_cipher>
#12 0x00007f741621228f in do_ssl3_write (s=0x7f73cb42c0d8, type=23, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427
    pipelens=0x7ffd3f1e8a60, numpipes=1, create_empty_fragment=0, written=0x7ffd3f1e8b70) at ssl/record/rec_layer_s3.c:1003
        pkt = {{buf = 0x0, staticbuf = 0x7f73cb437100 "", curr = 514, written = 514, maxsize = 16472, subs = 0x7f73cb5ffef0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0} <repeats 12 times>, {buf = 0x0, staticbuf = 0x0, curr =
            buf = 0x6b, staticbuf = 0x6b <error: Cannot access memory at address 0x6b>, curr = 16472, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0,
            staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf =
            buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x1}, {buf = 0x0, s
            curr = 140725662420336, written = 140136848320405, maxsize = 140725662420360, subs = 0xc}, {buf = 0x7f7427106798, staticbuf = 0x7ffd3f1e8db0 "\247\234j\vt\177", curr = 140725662420384, written = 140136384414731, maxsize = 140725662420760, subs =
            staticbuf = 0x7f7426fea4b9 <_IO_vfprintf_internal+1929> "H\213\225h\373\377\377H\211\321L)\371H9\310\017\205p\371\377\377D\213\215H\373\377\377\271\377\377\377\177D)\311Hc\311H9\310\017\217\307\025", curr = 140725662420275, written = 34359738468,
            buf = 0x7ffd3f1e8908, staticbuf = 0xffffffff00000010 <error: Cannot access memory at address 0xffffffff00000010>, curr = 140725662420316, written = 120, maxsize = 0, subs = 0x0}, {buf = 0x0, staticbuf = 0xffffffffffffffff <error: Cannot access me
            curr = 140724603453441, written = 0, maxsize = 0, subs = 0x55c40efdef20}, {buf = 0x7ffd0000000c, staticbuf = 0x7f740000000a "", curr = 140725662419328, written = 0, maxsize = 3432, subs = 0x16}, {buf = 0x7f740b69c413, staticbuf = 0x7300000001 <er
            curr = 140725662420504, written = 140136384414741, maxsize = 140725662419384, subs = 0x300000000a}, {buf = 0x7ffd3f1e8e13, staticbuf = 0x3f1e8d64 <error: Cannot access memory at address 0x3f1e8d64>, curr = 0, written = 0, maxsize = 3311419785216,
        wr = {{rec_version = 771, type = 23, length = 506, orig_len = 0, off = 0,
            data = 0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co
            input = 0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co
            seq_num = "\000\000\000\000\000\000\000"}, {rec_version = 0, type = 0, length = 0, orig_len = 0, off = 0, data = 0x0, input = 0x0, comp = 0x0, read = 0, epoch = 0, seq_num = "\000\000\000\000\000\000\000"} <repeats 31 times>}
        thispkt = 0x7ffd3f1e8350
        thiswr = 0x7ffd3f1e7950
        recordstart = 0x7f73cb437108 ";\177V\257pL\341\217C:N\037\037Gh.SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co
        i = 32628
        mac_size = 0
        clear = 0
        prefix_len = 0
        eivlen = 16
        align = 3
        wb = 0x7f73cb42c930
        sess = 0x7f73cb4233e8
        totlen = 490
        len = 506
        wpinited = 1
        j = 1
#13 0x00007f74162110ac in ssl3_write_bytes (s=0x7f73cb42c0d8, type=23, buf_=0x7f7416ec4578, len=490, written=0x7ffd3f1e8cb0) at ssl/record/rec_layer_s3.c:613
        pipelens = {490, 140136384324723, 140725662419768, 21699638343, 140135318380515, 140135312190408, 140136384421764, 72, 140135312195280, 3403624448, 140135309483320, 2, 94300526514899, 1073741824, 268435456, 6, 140725662419744, 140136559316112, 140725
          140136384421764, 18446744072840031672, 140725662419808, 140136559311077, 140725662419856, 5, 140135318380515, 140135312190408, 1258425418112, 18446744069639386183}
        tmppipelen = 490
        remain = 0
        numpipes = 1
        j = 1
        buf = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co>;tag=0b62483f"...
        tot = 0
        n = 490
        max_send_fragment = 16384
        split_send_fragment = 16384
        maxpipes = 1
        nw = 140135301826248
        wb = 0x7f73cb42c930
        i = 1
        tmpwrit = 490
#14 0x00007f741621f8c0 in ssl3_write (s=0x7f73cb42c0d8, buf=0x7f7416ec4578, len=490, written=0x7ffd3f1e8cb0) at ssl/s3_lib.c:4460
No locals.
#15 0x00007f741622e4db in ssl_write_internal (s=0x7f73cb42c0d8, buf=0x7f7416ec4578, num=490, written=0x7ffd3f1e8cb0) at ssl/ssl_lib.c:1943
No locals.
#16 0x00007f741622e538 in SSL_write (s=0x7f73cb42c0d8, buf=0x7f7416ec4578, num=490) at ssl/ssl_lib.c:1957
        ret = 0
        written = 268435456
#17 0x00007f740b67ea3d in tls_encode_f (c=0x7f73cb427d78, pbuf=0x7ffd3f1e8e60, plen=0x7ffd3f1e8e58, rest_buf=0x7ffd3f1e8e68, rest_len=0x7ffd3f1e8e5c, send_flags=0x7ffd3f1e8e4c) at tls_server.c:828
        n = 0
        offs = 0
        ssl = 0x7f73cb42c0d8
        tls_c = 0x7f73cb4189f0
        wr_buf = "\027\003\003\002\020\060\n\021\334\364\020\230'W\227\265\214=\323\372\254FV\205\253\364\343g[_V.\340\vb\236ϛ\025\f\345\242\303^f9\366z\234\070\062\326&>g\"\214\\\275\221\244\065*-h\236\277\022\067\021\241\017\253\vO\377\234\204%L\236\202\07\225r\020b\342\257\232\274\066'\201l\210\365bD\213\205\347p\231\v\205p\206H\337C\375]3u&j\024\212\244\230{\265k\202\004\022>\t\355>\020wH\367\321v\n\027\331sP\244 \232o0\322P\026\375\206\035\366\233\301d\016\250\034\253w\376b\224\264\266\005\207j\320\n?&\035
        rd = {buf = 0x0, pos = 0, used = 0, size = 0}
        wr = {
          buf = 0x7f740b8baf60 <wr_buf> "\027\003\003\002\020\060\n\021\334\364\020\230'W\227\265\214=\323\372\254FV\205\253\364\343g[_V.\340\vb\236ϛ\025\f\345\242\303^f9\366z\234\070\062\326&>g\"\214\\\275\221\244\065*-h\236\277\022\067\021\241\017\253\vO\30<!\214O;\316*^\346]\"u\225r\020b\342\257\232\274\066'\201l\210\365bD\213\205\347p\231\v\205p\206H\337C\375]3u&j\024\212\244\230{\265k\202\004\022>\t\355>\020wH\367\321v\n\027\331sP\244 \232o0\322P\026\375\206\035\366\233\301d\016\250\034\253w\376b\224\264\2
          size = 65536}
        ssl_error = 0
        err_src = 0x7f740b6a9ca7 "TLS write:"
        buf = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co>;tag=0b62483f"...
        len = 490
        x = -884834952
        __func__ = "tls_encode_f"
#18 0x000055c40d3091e4 in tcpconn_send_put (c=0x7f73cb427d78, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co
    send_flags=...) at core/tcp_main.c:2530
        tmp = 0x7f73cae7d328
        fd = 10
        response = {140725662420640, 0}
        n = 1
        do_close_fd = 0
        rest_buf = 0x0
        t_buf = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co>;tag=0b62483f"...
        rest_len = 0
        t_len = 490
        resp = 0
        t_send_flags = {f = 0, blst_imask = 0}
        fd_cache_e = 0x0
        use_fd_cache = 0
        __func__ = "tcpconn_send_put"
#19 0x000055c40d3068d7 in tcp_send (dst=0x7f73cb656648, from=0x0, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@d
    at core/tcp_main.c:2310
        c = 0x7f73cb427d78
        ip = {af = 2, len = 4, u = {addrl = {140134886250834, 140725662420944}, addr32 = {2988284242, 32627, 1058967504, 32765}, addr16 = {39250, 45597, 32627, 0, 36816, 16158, 32765, 0}, addr = "R\231\035\262s\177\000\000Џ\036?\375\177\000"}}
        port = 1795
        fd = -879728160
        response = {140725662421040, 4096}
        n = 32765
        con_lifetime = 57680
        rest_buf = 0x7f740b688bc5 <sbufq_add+503> "H\213E؋P\034\213E\360\001\302H\213E؉P\034\213E\360)E̋E\360H\001E\320H\213E؋P\024\213E\360\001\302H\213E؉P\024\203", <incomplete sequence \314>
        t_buf = 0x7ffd3f1e8fa0 "Џ\036?\375\177"
        rest_len = 32627
        t_len = 3403859656
        resp = 5353934752
        t_send_flags = {f = 0, blst_imask = 0}
        __func__ = "tcp_send"
#20 0x00007f741272e586 in msg_send_buffer (dst=0x7f73cb656648, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co
    at ../../core/forward.h:282
        new_dst = {send_sock = 0x4cb450920, to = {s = {sa_family = 9200, sa_data = "f\r\304U\000\000\000\222\036?\375\177\000"}, sin = {sin_family = 9200, sin_port = 3430, sin_addr = {s_addr = 21956}, sin_zero = "\000\222\036?\375\177\000"}, sin6 = {sin6_fam
              sin6_addr = {__in6_u = {__u6_addr8 = "\000\222\036?\375\177\000\000)\214N\r\304U\000", __u6_addr16 = {37376, 16158, 32765, 0, 35881, 3406, 21956, 0}, __u6_addr32 = {1058968064, 32765, 223251497, 21956}}}, sin6_scope_id = 1058968064}}, id = 3276
            blst_imask = 21956}}
        outb = {s = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co>;tag=0b62483f"..., len =
        netinfo = {data = {s = 0x7f741278607b "tm: t_reply.c", len = 656}, rcv = 0x7f73cb450920, dst = 0x7f73cadf3000}
        evp = {data = 0x7ffd3f1e9120, rcv = 0x0, dst = 0x7f73cb656648}
        port = 1
        ip = {af = 0, len = 0, u = {addrl = {0, 94300301950976}, addr32 = {0, 0, 0, 21956}, addr16 = {0, 0, 0, 0, 0, 0, 21956, 0}, addr = '\000' <repeats 12 times>, "\304U\000"}}
        from = 0x0
        local_addr = {s = {sa_family = 44896, sa_data = "\213\vt\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 44896, sin_port = 2955, sin_addr = {s_addr = 32628}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 44896, sin6
              __in6_u = {__u6_addr8 = "\000\000\000\000\000\000\000\000\000\000\001\000s\177\000", __u6_addr16 = {0, 0, 0, 0, 0, 1, 32627, 0}, __u6_addr32 = {0, 0, 65536, 32627}}}, sin6_scope_id = 223289055}}
        con = 0x0
        wsev = {type = 1058968032, buf = 0x7f73cba68e00 "0", len = 0, id = 0}
        ret = 136
        __func__ = "msg_send_buffer"
#21 0x00007f7412730944 in send_pr_buffer (rb=0x7f73cb6565f8, buf=0x7f7416ec4578, len=490) at t_funcs.c:70
        __func__ = "send_pr_buffer"
#22 0x00007f74126e1fa2 in _reply_light (trans=0x7f73cb656528, buf=0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co
    code=202, to_tag=0x7f74129c5580 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-e0e2", to_tag_len=37, lock=1, bm=0x7ffd3f1e9bc0) at t_reply.c:555
        rb = 0x7f73cb6565f8
        buf_len = 650
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}}
        onsend_params = {req = 0x3f1e9b20, rpl = 0xb00000000, param = 0x17, code = 223289055, flags = 3, branch = 0, t_rbuf = 0x7ffd3f1e9b40, dst = 0x7f73cb428150, send_buf = {s = 0x0, len = 0}}
        rt = 0
        backup_rt = 0
        ctx = {rec_lev = 384580232, run_flags = 32628, last_retcode = 383262736, jmp_env = {{__jmpbuf = {94300526491344, 94300526471530, 496, 140136576196624, 140725662423740, 502511173633, 94300301950980, 140136576196624}, __mask_was_saved = 16, __saved_mas
                  94300526514899, 1073741824, 268435456, 6, 140725662423936, 94300524000758, 140725662424000, 140725662424028, 140136577395672, 140136505081744, 140725662424288, 868642364120, 0}}}}}
        pmsg = {id = 1320704, pid = 0, tval = {tv_sec = 8, tv_usec = 10}, fwd_send_flags = {f = 35881, blst_imask = 3406}, rpl_send_flags = {f = 21956, blst_imask = 0}, first_line = {type = -27872, flags = 16158, len = 32765, u = {request = {method = {
                  s = 0x55c40d342e90 <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 1058968520}, uri = {s = 0x55c40d663447 "core/mem/q_malloc.c", len = 2}, version = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 309961539}, method_va
                  s = 0x55c40d342e90 <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 1058968520}, status = {s = 0x55c40d663447 "core/mem/q_malloc.c", len = 2}, reason = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 309961539}, statusc
          via2 = 0x7f74164c831b, headers = 0x7ffd3f1e9a38, last_header = 0x0, parsed_flag = 140136567046947, h_via1 = 0x7f7426fea4b9 <_IO_vfprintf_internal+1929>, h_via2 = 0x5, callid = 0x7f7426fe9e36 <_IO_vfprintf_internal+262>, to = 0x7ffd3f1e9900, cseq =
          maxforwards = 0x7ffd3f1e9450, route = 0x26fea4b9, record_route = 0x0, content_type = 0x0, content_length = 0x7ffd00000000, authorization = 0xffffffffffffffff, expires = 0x7ffd00000005, proxy_auth = 0x7f747fffffff, supported = 0x7f74164c8200, requir
          allow = 0x7ffd3f1e94a0, event = 0x0, accept = 0xd68, accept_language = 0x7f7400000005, organization = 0x7f74164c831b, priority = 0x3, subject = 0x7f74164c8341, user_agent = 0x7f74164c8324, server = 0x7ffd3f1e94e0, content_disposition = 0x7f74164c83
          refer_to = 0x7f74164c8320, session_expires = 0x3, min_se = 0x0, sipifmatch = 0x3000000018, subscription_state = 0x7ffd3f1e9b10, date = 0x7ffd3f1e9a50, identity = 0x7ffd3f1e9b20, identity_info = 0x7ffd3f1e9a60, pai = 0x7f74164c8900, ppi = 0x30000000
          min_expires = 0x7ffd3f1e9560, body = 0x0, eoh = 0xd68 <error: Cannot access memory at address 0xd68>, unparsed = 0xffffffff0000000d <error: Cannot access memory at address 0xffffffff0000000d>, rcv = {src_ip = {af = 3432, len = 0, u = {addrl = {0, 1
                addr16 = {0, 0, 0, 0, 35179, 5708, 32628, 0}, addr = "\000\000\000\000\000\000\000\000k\211L\026t\177\000"}}, dst_ip = {af = 374114660, len = 0, u = {addrl = {0, 140136567048555}, addr32 = {0, 0, 374114667, 32628}, addr16 = {0, 0, 0, 0, 35179
                addr = "\000\000\000\000\000\000\000\000k\211L\026t\177\000"}}, src_port = 38320, dst_port = 16158, proto_reserved1 = 32765, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = "\000\000`\211L\026t\177\000\000]\001\000"}, sin = {sin_
                  s_addr = 374114656}, sin_zero = "t\177\000\000]\001\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 374114656, sin6_addr = {__in6_u = {__u6_addr8 = "t\177\000\000]\001\000\000\375\177\000\000\200d|\017", __u6_addr16 = {32628,
                      349, 32765, 259810432}}}, sin6_scope_id = 32628}}, bind_address = 0x3000000018, proto = -48 '\320'}, buf = 0x3000000018 <error: Cannot access memory at address 0x3000000018>, len = 1058970592, new_uri = {s = 0x7ffd3f1e9b20 "\200\233\036
            s = 0x40000000 <error: Cannot access memory at address 0x40000000>, len = 259810507}, parsed_uri_ok = 6, parsed_uri = {user = {s = 0x7ffd3f1e95e0 "\240\226\036?\375\177", len = 16}, passwd = {s = 0x7ffd3f1e9bb0 "\340\233\036?\375\177", len = 1058
              s = 0xcc14cb48 <error: Cannot access memory at address 0xcc14cb48>, len = 1058969120}, port = {s = 0x74b8bdd5ffffffff <error: Cannot access memory at address 0x74b8bdd5ffffffff>, len = 1958263765}, params = {s = 0x55c40d94a540 <def_list+32> "",
              len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 38560, proto = 16158, type = 32765, flags = (unknown: 309365440), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 262147
              s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -871052560}, maddr = {s = 0x400000002 <error: Cannot access memory at address 0x400000002>, len = 1082173632}, method = {s = 0x18 <error: Cannot access memory at addres
              s = 0x1 <error: Cannot access memory at address 0x1>, len = -871053112}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7f73cc14cae0 "", len = -871053112}, transport_val = {s = 0x7ffd3f1e96b0 "", len = 2}, ttl_val = {s = 0x55c40d6292d3 "INFO", len = 1073
              s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, maddr_val = {s = 0x7ffd3f1e9700 "", len = 309366527}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 223289055}, lr_val = {s
              s = 0x7ffd3f1e9710 "", len = 383262736}, gr_val = {s = 0x7ffd3f1e9740 "\a", len = 383262736}}, parsed_orig_ruri_ok = 1058969424, parsed_orig_ruri = {user = {s = 0x7f7413117bfc <pkg_proc_update_stats+115> "H\213\rEW ", len = 268435456}, passwd =
              s = 0xfebdf70 <error: Cannot access memory at address 0xfebdf70>, len = 897120}, port = {s = 0x142090 <error: Cannot access memory at address 0x142090>, len = 1320704}, params = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 7}, s
              len = 1058969472}, headers = {s = 0x55c40d342e90 <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 0}, port_no = 9200, proto = 3430, type = URN_URI_T, flags = (unknown: 1058969648), transport = {s = 0xd4e8c29 <error: Cannot access memory
              s = 0x55c40d4e908d <qm_malloc+2331> "H\213E\270H\203\300\070\351*\003", len = 1058969648}, user_param = {s = 0x55c40d6292d3 "INFO", len = 374124632}, maddr = {s = 0x9110000000 <error: Cannot access memory at address 0x9110000000>, len = 3741328
              len = 8}, lr = {s = 0x7f7416d82010 "\001", len = 384580024}, r2 = {s = 0x500000001 <error: Cannot access memory at address 0x500000001>, len = 251523161}, gr = {s = 0x7f7416ec2858 "(", len = 1058969680}, transport_val = {s = 0x7f7416d82010 "\00
              s = 0x7ffd3f1e9eb0 "\360/\344\026t\177", len = 224563923}, user_param_val = {s = 0x7f74164cb058 "core", len = 268435456}, maddr_val = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 1058969872}, method_val = {
              s = 0x7f74164c14ce <db_str2val+14063> "H\213\205P\377\377\377H\213P\020\213\205X\377\377\377H\230H\001\320", <incomplete sequence \306>, len = 8}, lr_val = {s = 0x7f7416d82010 "\001", len = 1058969728}, r2_val = {s = 0x55c40efdf05a "", len = 38
              s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 1058969904}}, add_rm = 0x55c40d4f1edf <qm_info+46>, body_lumps = 0x7ffd3f1e98c0, reply_lump = 0x55c40d4f1edf <qm_info+46>,
          add_to_branch_s = "И\036?\375\177\000\000\020 \330\026t\177\000\000\000\231\036?\375\177\000\000\020 \330\026t\177\000\000\020\231\036?\375\177\000\000\374{\021\023t\177\000\000\000\000\000\020\000\000\000\000\000", add_to_branch_len = 0, hash_inde
          xflags = {21956, 1058969888}, set_global_address = {s = 0x7f7416d82010 "\001", len = 1320704}, set_global_port = {s = 0x7f7416d82010 "\001", len = 1058969952}, force_send_socket = 0x7f7413117bfc <pkg_proc_update_stats+115>, path_vec = {s = 0x7ffd3f
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 267114896}, reg_id = 898624, ruid = {s = 0x142670 <error: Cannot access memory at address 0x142670>, len = 1320704}, location_ua = {s = 0x8 <error: Cannot access memory at
              decoded = 1320704, rcv = {src_ip = {af = 1058970000, len = 32765, u = {addrl = {94300523474576, 0}, addr32 = {221523600, 21956, 0, 0}, addr16 = {11920, 3380, 21956, 0, 0, 0, 0, 0}, addr = "\220.4\r\304U\000\000\000\000\000\000\000\000\000"}}, d
                      8858370048, 384580592}, addr32 = {268435456, 2, 384580592, 0}, addr16 = {0, 4096, 2, 0, 15344, 5868, 0, 0}, addr = "\000\000\000\020\002\000\000\000\360;\354\026\000\000\000"}}, src_port = 39520, dst_port = 16158, proto_reserved1 = 3276
                    sa_family = 21956, sa_data = "\000\000`\232\036?\375\177\000\000)\214N\r"}, sin = {sin_family = 21956, sin_port = 0, sin_addr = {s_addr = 1058970208}, sin_zero = "\375\177\000\000)\214N\r"}, sin6 = {sin6_family = 21956, sin6_port = 0, sin
                        __u6_addr8 = "\375\177\000\000)\214N\r\000\000\000\000\200\341a\r", __u6_addr16 = {32765, 0, 35881, 3406, 0, 0, 57728, 3425}, __u6_addr32 = {32765, 223251497, 0, 224518528}}}, sin6_scope_id = 21956}}, bind_address = 0xa350d4e908d, pro
        __func__ = "_reply_light"
#23 0x00007f74126e2c18 in _reply (trans=0x7f73cb656528, p_msg=0x7f7416ea6bd8, code=202, reason=0x7ffd3f1e9ce0, lock=1) at t_reply.c:657
        len = 490
        buf = 0x7f7416ec4578 "SIP/2.0 202 OK\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co>;tag=0b62483f"...
        dset = 0x6 <error: Cannot access memory at address 0x6>
        bm = {to_tag_val = {s = 0x7f7416ec4638 "0b62483f5ecbb3b7846ec4ead5977a30-e0e2\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985;rport=1795;received=88.88.88.88\r\nExpires: 3600\r\nContact: <sip:89.20"...
        dset_len = 1
#24 0x00007f74126ece31 in t_reply_str (t=0x7f73cb656528, p_msg=0x7f7416ea6bd8, code=202, reason=0x7ffd3f1e9ce0) at t_reply.c:1634
No locals.
#25 0x00007f7412752825 in ki_t_reply (msg=0x7f7416ea6bd8, code=202, reason=0x7ffd3f1e9ce0) at tm.c:1354
        t = 0x7f73cb656528
        ret = -1
        __func__ = "ki_t_reply"
#26 0x00007f7412753027 in w_t_reply_wrp (msg=0x7f7416ea6bd8, code=202, txt=0x7f7416ec3d18 "OK") at tm.c:1411
        reason = {s = 0x7f7416ec3d18 "OK", len = 2}
#27 0x00007f741223a9f3 in send_reply (msg=0x7f7416ea6bd8, code=202, reason=0x7f740f9de460 <su_200_rpl>) at sl.c:287
        r = 0x7f7416ec3d18 "OK"
        t = 0x7f73cb656528
        ret = 1
        __func__ = "send_reply"
#28 0x00007f740f78fb30 in send_2XX_reply (msg=0x7f7416ea6bd8, reply_code=202, lexpire=3600, local_contact=0x7ffd3f1ea1e0) at subscribe.c:122
        hdr_append = {s = 0x7f7416ec3840 "Expires: 3600\r\nContact: <sip:77.77.77.77:5060;transport=tls>\r\n", len = 65}
        tmp = {s = 0x7f7416ec387e ">\r\n", len = 4}
        t = 0x0
        __func__ = "send_2XX_reply"
#29 0x00007f740f7972fb in update_subscription (msg=0x7f7416ea6bd8, subs=0x7ffd3f1ea100, to_tag_gen=1, sent_reply=0x7ffd3f1e9f3c) at subscribe.c:659
        hash_code = 260
        __func__ = "update_subscription"
#30 0x00007f740f79ed41 in handle_subscribe (msg=0x7f7416ea6bd8, watcher_user=..., watcher_domain=...) at subscribe.c:1207
        to_tag_gen = 1
        subs = {pres_uri = {s = 0x7f7416e850b8 "sip:427@mydomain.co.co", len = 33}, to_user = {
            s = 0x7f73cb428132 "427@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact: \"813\" <sip:813@192.168.128.64:1968;transport=tls"..., len = 3}, to
            s = 0x7f73cb428136 "mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact: \"813\" <sip:813@192.168.128.64:1968;transport=tls;reg"..., len = 25}, f
            s = 0x7f73cb4280fc "813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nCon"..., len = 3}, fr
            s = 0x7f73cb428100 "mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact"..., len = 25}, w
            s = 0x7f73cb4280fc "813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nCon"..., len = 3}, wa
            s = 0x7f73cb428100 "mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact"..., len = 25}, e
          to_tag = {s = 0x7f74129c5580 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-e0e2", len = 37}, from_tag = {
            s = 0x7f73cb42811f "e56f79f4\r\nTo: <sip:427@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact: \"813\" <sip:813@192.168.128.64"..., len = 8},
            s = 0x7f73cb4280ae "5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968"..., len = 40},
            s = 0x7f7416e9b650 "tls:77.77.77.77:5061", len = 23}, remote_cseq = 1, local_cseq = 0, contact = {
            s = 0x7f73cb4281d1 "sip:813@192.168.128.64:1968;transport=tls;registering_acc=mydomain_co_co>\r\nUser-Agent: Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length"..., len = 83},
            s = 0x7f7416e42ff0 "sip:77.77.77.77:5060", len = 23}, record_route = {s = 0x0, len = 0}, expires = 3600, status = 1, reason = {s = 0x0, len = 0}, version = 0, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1, internal_updat
          user_agent = {s = 0x7f73cb428233 "Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 24}, next = 0x0}
        event = 0x7f73cb203820
        parsed_event = 0x7f7416ec3678
        ev_param = 0x0
        found = 1
        reason = {s = 0x0, len = 0}
        uri = {user = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, passwd = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, host = {s = 0x7ffd3f1ea390 "Ӓb\r\304U", len = 664247188}, port = {s = 0x1 <error: Cannot access memor
            s = 0x7ffd3f1e9fe0 "X\310\352\026t\177", len = 653991280}, sip_params = {s = 0x7ffd3f1ea340 "c\201B\313s\177", len = 664277466}, headers = {s = 0x0, len = 1}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x7f
            len = 384485464}, user_param = {s = 0xaf00000180 <error: Cannot access memory at address 0xaf00000180>, len = 2}, maddr = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, method = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>,
          r2 = {s = 0x4cb425dc0 <error: Cannot access memory at address 0x4cb425dc0>, len = 224797680}, gr = {s = 0x7ffd3f1ea110 "2\201B\313s\177", len = 223251497}, transport_val = {s = 0x7ffd3f1ea110 "2\201B\313s\177", len = 384461784}, ttl_val = {s = 0x7f
          user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 224585237}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0xffffffffffffff <error: Cannot access memory at address 0xffffffffffffff>, len = 0}, r2_val = {s = 0x302e322f706973 <error:
            len = 0}, gr_val = {s = 0x4542495243534255 <error: Cannot access memory at address 0x4542495243534255>, len = 1917192717}}
        reply_code = 500
        reply_str = {s = 0x7f740f7d1fcd "Server Internal Error", len = 21}
        sent_reply = 0
        __func__ = "handle_subscribe"
#31 0x00007f740f79ae4e in handle_subscribe0 (msg=0x7f7416ea6bd8) at subscribe.c:988
        pfrom = 0x7f7416ec2920
        __func__ = "handle_subscribe0"
#32 0x000055c40d27284a in do_action (h=0x7ffd3f1ebee0, a=0x7f7416e73828, msg=0x7f7416ea6bd8) at core/action.c:1067
        ret = -5
        v = 224563923
        dst = {send_sock = 0xfd8f150ba8ddb26f, to = {s = {sa_family = 45679, sa_data = "\235\020yq\375\251\000\000\000\000\000\000\000"}, sin = {sin_family = 45679, sin_port = 4253, sin_addr = {s_addr = 2851959161}, sin_zero = "\000\000\000\000\000\000\000"}
              sin6_flowinfo = 2851959161, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 1058973632}}, id = 32765, proto = 2 '\002', send_flags = {f = 0, b
        tmp = 0x7f7416ec4540 "\250\003"
        new_uri = 0x142700 <error: Cannot access memory at address 0x142700>
        end = 0x142448 <error: Cannot access memory at address 0x142448>
        crt = 0x1f7000000d7 <error: Cannot access memory at address 0x1f7000000d7>
        cmd = 0x7f7416e392b8
        len = 117
        user = 1
        uri = {user = {s = 0x7f73cb4280e0 "SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d1"..., l
            len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffd3f1ea700 "\020\250\036?\375\177", len = 220724707}, params = {s = 0xfd8f150bad5db26f <error: Cannot access memory at addres
            s = 0x7f7416e84ec8 <incomplete sequence \350>, len = 384461784}, headers = {s = 0x7ffd3f1ea680 "Ӓb\r\304U", len = 223082760}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 384461784), transport = {s = 0x7f7416e72ce8 "\261\001", le
            len = 1073741824}, user_param = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, maddr = {s = 0x7ffd3f1ea6d0 "", len = 0}, method = {s = 0x7f7416eac768 "", len = 384461784}, lr = {s = 0x116e79fd8 <error: Cannot acces
            s = 0x7ffd3f1ea700 "\020\250\036?\375\177", len = 2}, gr = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, transport_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7ffd3f1ea810 "", len = 22072
            len = 384461784}, maddr_val = {s = 0x7f7416e72ce8 "\261\001", len = 1058979552}, method_val = {s = 0x0, len = 1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = -1430408593}, r2_val = {s = 0x55c40d6292d3 "INFO", len = 10737
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}}
        next_hop = {user = {s = 0x7f7416e805c8 "\001", len = 308869268}, passwd = {s = 0x55c40d66f540 "core", len = 2}, host = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, port = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}
            len = 308954832}, sip_params = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 42256, proto = 16158, type = 32765, flags = (unknown: 384461784), tra
            s = 0xd6292d3 <error: Cannot access memory at address 0xd6292d3>, len = 384575776}, ttl = {s = 0x7f7416e32998 "\030\213G\021t\177", len = -884834063}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -887073664}, maddr =
          method = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2 = {s = 0x7ffd3f1ea5c0 "\260\253\036?\375\177", len = 309673662}, gr = {s = 0x7ffd3f1ea590 "\240\246\036?\
            len = 384461784}, ttl_val = {s = 0x7f7412457a23 <trim+36> "\220\311\303UH\211\345AWAVAUATSH\203\354\030\350\244g\377\377\211Eȃ", <incomplete sequence \310>, len = 384485104}, user_param_val = {s = 0x7ffd3f1ea6a0 "Ц\036?\375\177", len = 2}, maddr_
          method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {s = 0x7ffd3f1eabb0 "\220\254\036?\375\177", len = 220670026}, r2_val = {
            s = 0x7f73cb42811f "e56f79f4\r\nTo: <sip:427@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008d184985\r\nMax-Forwards: 70\r\nContact: \"813\" <sip:813@192.168.128.64"..., len = 8},
            s = 0x7f73cb4280de "1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.64:1968;branch=z9hG4bK-373436-8c034084ccb4909fca4cae008"..., len = 1}}
        u = 0x0
        port = 0
        dst_host = 0x2
        i = 223082933
        flags = 1
        avp = 0x7ffd3f1eaa40
        st = {flags = 1058972784, id = 32765, name = {n = 308866726, s = {s = 0x7f741268eea6 <futex_release+29> "\211E\374\203}\374\002\017\224\300\017\266\300H\205\300t6H\213E\350H\203\354\bj", len = 384461784}, re = 0x7f741268eea6 <futex_release+29>}, avp
        sct = 0x10000000
        sjt = 0x0
        rve = 0x10000000
        mct = 0x7f73cb273a83
        rv = 0x7f74126a135c <init_rb+186>
        rv1 = 0x6
        c1 = {cache_type = 3410330408, val_type = 32627, c = {avp_val = {n = 2, s = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 224563923}, re = 0x2}, pval = {rs = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 224563923}, ri =
          i2s = "\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\260\244\036?\375\177"}
        s = {s = 0x7ffd3f1ea4b0 "P\245\036?\375\177", len = 384461784}
        srevp = {0x7f7416ea6dd8, 0x7f73cb656650}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {t
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, l
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTY
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#33 0x000055c40d27fde3 in run_actions (h=0x7ffd3f1ebee0, a=0x7f7416e73828, msg=0x7f7416ea6bd8) at core/action.c:1569
        t = 0x7f7416e73828
        ret = -1
        tvb = {tv_sec = 140725662427664, tv_usec = 94300525009117}
        tve = {tv_sec = 268435456, tv_usec = 6}
        tz = {tz_minuteswest = 1073741824, tz_dsttime = 0}
        tdiff = 1058975120
        __func__ = "run_actions"
#34 0x000055c40d2727b6 in do_action (h=0x7ffd3f1ebee0, a=0x7f7416e73bb0, msg=0x7f7416ea6bd8) at core/action.c:1058
        ret = 1
        v = 1
        dst = {send_sock = 0xfd8f150bbebdb26f, to = {s = {sa_family = 45679, sa_data = "\235\020yq\375\251\000\000\000\000\000\000\000"}, sin = {sin_family = 45679, sin_port = 4253, sin_addr = {s_addr = 2851959161}, sin_zero = "\000\000\000\000\000\000\000"}
              sin6_flowinfo = 2851959161, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 384322832}}, id = 32628, proto = 2 '\002', send_flags = {f = 0, bl
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7f7416e72068
        len = 0
        user = 6
        uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffd3f1eadd0 "\340\256\036?\375\177", len = 220724707}, para
            s = 0xfd8f150bb33db26f <error: Cannot access memory at address 0xfd8f150bb33db26f>, len = 278770287}, sip_params = {s = 0x55c400000000 <error: Cannot access memory at address 0x55c400000000>, len = 0}, headers = {s = 0x55c40d65eb78 <__func__.7457
          proto = 5868, type = 32628, flags = (unknown: 384461784), transport = {s = 0x7f7416e71e28 "\256\001", len = 1058975232}, ttl = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, user_param = {s = 0x10000000 <error: Cannot access memory at address 0x100
            len = 383262736}, method = {s = 0x3a8 <error: Cannot access memory at address 0x3a8>, len = 384582976}, lr = {s = 0xffffffffcb428254 <error: Cannot access memory at address 0xffffffffcb428254>, len = 0}, r2 = {s = 0x7ffd3f1eae90 "Я\036?\375\177",
            len = 1073741824}, transport_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7ffd3f1eaee0 "Я\036?\375\177", len = 220726455}, user_param_val = {s = 0x7f7416ea6bd8 "\317\001", len = 384461784},
            len = 1058979552}, method_val = {s = 0x0, len = -1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = -1088572817}, r2_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, gr_val = {s = 0x10000000 <error: Cannot access memory
        next_hop = {user = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, passwd = {s = 0x7ffd3f1eac20 "\220\254\036?\375\177", len = 299523129}, host = {s = 0x7ffd3f1eb360 "p\264\036?\375\177", len = 1058975560}, port = {s =
            s = 0x1500000000 <error: Cannot access memory at address 0x1500000000>, len = 2}, sip_params = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 44176
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 220724704), transport = {s = 0x13 <error: Cannot access memory at address 0x13>, len = 0}, ttl = {s = 0x7f7416e32998 "\030\213G\021t\177", len = 24}, user_param = {s = 0x0, len = 384305424
          method = {s = 0x7f7416e706d8 "\251\001", len = 1058974912}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2 = {s = 0x7ffd3f1eac90 "\240\255\036?\375\177", len = 222477392}, gr = {s = 0x0, len = 223289055}, tra
          ttl_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, user_param_val = {s = 0x7ffd3f1eacc0 "", len = 2}, maddr_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot acc
            s = 0x7ffd3f1eada0 "\220\256\036?\375\177", len = 220726455}, r2_val = {s = 0x142700 <error: Cannot access memory at address 0x142700>, len = 384461784}, gr_val = {s = 0x7f7416e706d8 "\251\001", len = 1058979552}}
        u = 0x10000000
        port = 0
        dst_host = 0x2
        i = 223082933
        flags = 0
        avp = 0x7ffd3f1eb110
        st = {flags = 0, id = 0, name = {n = -884833634, s = {s = 0x7f73cb42829e "\r\n", len = 0}, re = 0x7f73cb42829e}, avp = 0x2}
        sct = 0x7ffd3f1eaf70
        sjt = 0x6
        rve = 0x7f7416e72f20
        mct = 0x10000000
        rv = 0x7f73cb4282a0
        rv1 = 0x6
        c1 = {cache_type = 4294967295, val_type = 4294967295, c = {avp_val = {n = 384461784, s = {s = 0x7f7416ea6bd8 "\317\001", len = 1058974628}, re = 0x7f7416ea6bd8}, pval = {rs = {s = 0x7f7416ea6bd8 "\317\001", len = 1058974628}, ri = 1058974632, flags =
          i2s = "0\342\346\026t\177\000\000\330k\352\026t\177\000\000\330\340&\313s\177"}
        s = {s = 0x7ffd3f1eaaf0 "0\342\346\026t\177", len = 367430969}
        srevp = {0x7ffd3f1eaaf0, 0x7f7415d67c02 <BIO_write+58>}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {t
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, l
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTY
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#35 0x000055c40d27fde3 in run_actions (h=0x7ffd3f1ebee0, a=0x7f7416e73bb0, msg=0x7f7416ea6bd8) at core/action.c:1569
        t = 0x7f7416e73bb0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 140136577395672}
        tve = {tv_sec = 140725662429408, tv_usec = 0}
        tz = {tz_minuteswest = 302033795, tz_dsttime = 32628}
        tdiff = 1
        __func__ = "run_actions"
#36 0x000055c40d27280c in do_action (h=0x7ffd3f1ebee0, a=0x7f7416e73d00, msg=0x7f7416ea6bd8) at core/action.c:1062
        ret = 1
        v = 0
        dst = {send_sock = 0xfd8f150b831db26f, to = {s = {sa_family = 45679, sa_data = "\235\020yq\375\251\000\000\000\000\000\000\000"}, sin = {sin_family = 45679, sin_port = 4253, sin_addr = {s_addr = 2851959161}, sin_zero = "\000\000\000\000\000\000\000"}
              sin6_flowinfo = 2851959161, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 224563923}}, id = 21956, proto = 2 '\002', send_flags = {f = 0, bl
        tmp = 0x1 <error: Cannot access memory at address 0x1>
        new_uri = 0x7f7411b2b2a5 <_ul_sruid+5> "5cb9871b-29cb-"
        end = 0x7f74168f3e84 "H\205\300H\211\303\017\205\070\376\377\377\061\300\351\363\376\377\377\350D\216\377\377\017\037@"
        crt = 0x7ffd3f1eb6f0 ""
        cmd = 0x7f7416e288b8
        len = 21956
        user = 250613444
        uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffd3f1eb4a0 "\260\265\036?\375\177", len = 220724707}, para
            s = 0xfd8f150b819db26f <error: Cannot access memory at address 0xfd8f150b819db26f>, len = 278770287}, sip_params = {s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, headers = {s = 0x7f741331d2e5 <_kex_
          port_no = 65535, proto = 65535, type = 32628, flags = (unknown: 384461784), transport = {s = 0x7f7416e4c3e8 "\035\001", len = 1058976976}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 24}, maddr = {s = 0x7ffd3f1ebae0 "\020\273\036?\375\17
            s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 223289055}, lr = {s = 0x13f1eb4a0 <error: Cannot access memory at address 0x13f1eb4a0>, len = 0}, r2 = {s = 0x7ffd3f1eb560 "\240\266\036?\375\177", len = 2}, gr = {s = 0x
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7ffd3f1eb5b0 "\240\266\036?\375\177", len = 220726455}, user_param_val = {s = 0x7f7416ea6bd8 "\317\001", len = 384461784}, maddr_val = {s = 0x7f7416e4c
            len = 1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = -1912753553}, r2_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, gr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}}
        next_hop = {user = {s = 0x7ffd3f1eb2c0 "л\036?\375\177", len = 0}, passwd = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 14}, host = {s = 0x7f7412f00512 "%x%c%x%c", len = 4}, port = {s = 0x7f741331d2e5 <_kex_sruid+5> "5cb9871b-29c
            s = 0x7f741331d2e5 <_kex_sruid+5> "5cb9871b-29cb-", len = 2}, sip_params = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, headers = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port_no = 45920, proto = 16158, typ
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 220724704), transport = {s = 0x7ffd3f1eb930 "p\271\036?\375\177", len = 1058977904}, ttl = {s = 0x7f7416e32998 "\030\213G\021t\177", len = 654147750}, user_param = {s = 0x11c00000000 <erro
            len = 0}, maddr = {s = 0x7ffd3f1ebbd0 "\205\060T\031\244\064\240", <incomplete sequence \350>, len = 384461784}, method = {s = 0x7f7416e493a8 "\017\001", len = 1058976656}, lr = {s = 0x55c40efc57e0 "\200V\356\016\304U", len = 378486404}, r2 = {
            s = 0x3939363031ffffff <error: Cannot access memory at address 0x3939363031ffffff>, len = 1058977952}, gr = {s = 0x7ffd3f1eb340 "Ӓb\r\304U", len = 1058976576}, transport_val = {s = 0x42 <error: Cannot access memory at address 0x42>, len = 3099581
            s = 0xffffffff3f1eb4a8 <error: Cannot access memory at address 0xffffffff3f1eb4a8>, len = 0}, user_param_val = {s = 0x7f74129c5330 <callid_buf+16> "-10699@77.77.77.77", len = 2}, maddr_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, metho
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {s = 0x7ffd3f1eb470 "`\265\036?\375\177", len = 220726455}, r2_val = {s = 0x7f74129c5372 <callid_buf+82> "", len = 384461784}, gr_val = {s = 0x7f7416e493a8 "\0
        u = 0x8050
        port = 0
        dst_host = 0x2
        i = 223082933
        flags = 32628
        avp = 0x7ffd3f1eb7e0
        st = {flags = 0, id = 14642, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x7ffd3f1eb220}
        sct = 0x7ffd3f1eb5f0
        sjt = 0x7f7412737116 <child_init_callid+932>
        rve = 0x7f7416e72060
        mct = 0x7ffd3f1e0000
        rv = 0xffffffffffffffff
        rv1 = 0x6
        c1 = {cache_type = 1058976328, val_type = 32765, c = {avp_val = {n = 16, s = {s = 0x7ffd00000010 <error: Cannot access memory at address 0x7ffd00000010>, len = 1058976368}, re = 0x7ffd00000010}, pval = {rs = {s = 0x7ffd00000010 <error: Cannot access
              ri = 120, flags = 0}}, i2s = '\000' <repeats 12 times>, "\375\177\000\000\000\000\000\000t\177"}
        s = {s = 0x7ffd3f1eb6a8 "\265\371K\r\304U", len = 10699}
        srevp = {0x7f740b69df84, 0x900000010}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {t
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, l
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTY
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#37 0x000055c40d27fde3 in run_actions (h=0x7ffd3f1ebee0, a=0x7f7416e6d418, msg=0x7f7416ea6bd8) at core/action.c:1569
        t = 0x7f7416e73d00
        ret = 1
        tvb = {tv_sec = 140136850624832, tv_usec = 140136847156409}
        tve = {tv_sec = 140136577427424, tv_usec = 140136577395672}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 384493536
        __func__ = "run_actions"
#38 0x000055c40d26efc5 in do_action (h=0x7ffd3f1ebee0, a=0x7f7416e4d2c0, msg=0x7f7416ea6bd8) at core/action.c:691
        ret = -5
        v = 1
        dst = {send_sock = 0x10000000, to = {s = {sa_family = 59024, sa_data = "\353\017\000\000\000\000@\251\r\000\000\000\000"}, sin = {sin_family = 59024, sin_port = 4075, sin_addr = {s_addr = 0}, sin_zero = "@\251\r\000\000\000\000"}, sin6 = {sin6_family
              sin6_addr = {__in6_u = {__u6_addr8 = "@\251\r\000\000\000\000\000p\031\024\000\000\000\000", __u6_addr16 = {43328, 13, 0, 0, 6512, 20, 0, 0}, __u6_addr32 = {895296, 0, 1317232, 0}}}, sin6_scope_id = 1320704}}, id = 0, proto = 8 '\b', send_flags
        tmp = 0x2 <error: Cannot access memory at address 0x2>
        new_uri = 0x40 <error: Cannot access memory at address 0x40>
        end = 0x7f7416d82010 "\001"
        crt = 0x7ffd3f1ebe44 "t\177"
        cmd = 0x7f7416e32688
        len = 32627
        user = -884833634
        uri = {user = {s = 0x7ffd3f1ebaa0 "", len = 383262736}, passwd = {s = 0x7f74270d0da0 <__memcpy_ssse3+7728> "f\213V\376f\211W\376\303\017\037\200", len = 383262736}, host = {s = 0x7ffd3f1ebae0 "\020\273\036?\375\177", len = 319912956}, port = {
            s = 0x853f1ebb00 <error: Cannot access memory at address 0x853f1ebb00>, len = 0}, params = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 267118672}, sip_params = {s = 0x4000da780 <error: Cannot access memory at addres
            s = 0x142700 <error: Cannot access memory at address 0x142700>, len = 8}, port_no = 48064, proto = 16158, type = 32765, flags = (URI_SIP_USER_PHONE | unknown: 223457136), transport = {s = 0x7ffd3f1ebb10 "\310\005\350\026t\177", len = 221523600},
            s = 0x7ffd3f1ebbc0 " \274\036?\375\177", len = 223251497}, maddr = {s = 0x7f7416e805c8 "\001", len = 384323272}, method = {s = 0x7ffd3f1ebc12 "", len = 1058978835}, lr = {s = 0x7f73cb4282a0 "", len = -884833929}, r2 = {s = 0x55c40d673e50 <__func_
            s = 0x40 <error: Cannot access memory at address 0x40>, len = 383262736}, transport_val = {s = 0x4040404040404040 <error: Cannot access memory at address 0x4040404040404040>, len = 1}, ttl_val = {s = 0x3c5a5a5a5a <error: Cannot access memory at a
          user_param_val = {s = 0x520202020202020 <error: Cannot access memory at address 0x520202020202020>, len = -884833632}, maddr_val = {s = 0x7ffd3f1ebc00 "", len = 223289055}, method_val = {s = 0x7ffd3f1ebbe0 "", len = 383262736}, lr_val = {s = 0x7f73
            s = 0x7ffd3f1ebc20 "P\274\036?\375\177", len = 319912956}, gr_val = {s = 0xe8a034a419543085 <error: Cannot access memory at address 0xe8a034a419543085>, len = 0}}
        next_hop = {user = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 666454672}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, host = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 666435952}, port
            s = 0x43f1ebea0 <error: Cannot access memory at address 0x43f1ebea0>, len = 317719835}, params = {s = 0x0, len = 666436808}, sip_params = {s = 0x7ffd3f1eb970 "`\312\372&t\177", len = 2}, headers = {s = 0x7f7427b90170 "", len = 1058978144}, port_n
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 2822930836), transport = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 96}, ttl = {s = 0x7f7426faca60 "\306J", len = 666451760}, user_param = {s = 0x0, len = 0
            s = 0x6e0000005b <error: Cannot access memory at address 0x6e0000005b>, len = 657705728}, method = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 1058978392}, lr = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 2506191
            s = 0x20030 <error: Cannot access memory at address 0x20030>, len = 227340920}, transport_val = {s = 0x55c40d6292d3 "INFO", len = 1073741824}, ttl_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, user_param_val
            len = 664247188}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, method_val = {s = 0x7f73cb4190e4 "t\177", len = 653970016}, lr_val = {s = 0x7ffd3f1ebdc0 "", len = 664277466}, r2_val = {s = 0x7ffd3f1ebef0 "\002", len
            s = 0x1 <error: Cannot access memory at address 0x1>, len = 223289055}}
        u = 0x0
        port = 0
        dst_host = 0x7f7416ea6bd8
        i = 5
        flags = 32628
        avp = 0x7f7416e85010
        st = {flags = 1058978304, id = 32765, name = {n = 666454672, s = {s = 0x7f7427b94a90 "< $\r\304U", len = 1}, re = 0x7f7427b94a90}, avp = 0x0}
        sct = 0x7ffd3f1ebd20
        sjt = 0x16d823d0
        rve = 0x7f7416e4c620
        mct = 0x810000000
        rv = 0x7f7427b904c8
        rv1 = 0x7f7416ea6bd8
        c1 = {cache_type = 666454568, val_type = 32628, c = {avp_val = {n = 7, s = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1058978312}, re = 0x7}, pval = {rs = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 1058978312}, ri
          i2s = "-", '\000' <repeats 15 times>, "@\277\036?\375\177"}
        s = {s = 0x7ffd3f1eb894 "", len = 1058978144}
        srevp = {0x7ffd3f1eb970, 0x7f7426fa6d90}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {t
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, l
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTY
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#39 0x000055c40d27fde3 in run_actions (h=0x7ffd3f1ebee0, a=0x7f7416e474e8, msg=0x7f7416ea6bd8) at core/action.c:1569
        t = 0x7f7416e4d2c0
        ret = 1
        tvb = {tv_sec = 140725662432912, tv_usec = 140136577263320}
        tve = {tv_sec = 140136577117680, tv_usec = 140136577395672}
        tz = {tz_minuteswest = 1058979648, tz_dsttime = 32765}
        tdiff = 2
        __func__ = "run_actions"
#40 0x000055c40d28057f in run_top_route (a=0x7f7416e474e8, msg=0x7f7416ea6bd8, c=0x0) at core/action.c:1654
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {2, -175898720873893265, 94300526514899, 1073741824, 268435456, 6, -175898720779521425, -6197672747408182673}, __mask_was_saved = 0, __saved_mask = {__val = {6192449487634431
                  4611686022990790656, 140136577395672, 140725662433232, 94300523556965, 4679429112, 140136577395672, 94301375692801, 0, 268435456, 2, 94300526514899}}}}}
        p = 0x7ffd3f1ebee0
        ret = 268435456
        sfbk = 0
#41 0x000055c40d3db2ce in receive_msg (buf=0x7f73cb428070 "SUBSCRIBE sip:427@mydomain.co.co SIP/2.0\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo:
    at core/receive.c:427
        msg = 0x7f7416ea6bd8
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 2, jmp_env = {{__jmpbuf = {94300526514899, 1073741824, 268435456, 6, 140725662433744, 94300524684824, 9, 140136846889408}, __mask_was_saved = 1058981040, __saved_mask = {__val = {140135308098936, 1401
                  9, 140135308099706, 33, 140135308099740, 7, 64, 0, 140135308116184, 2632814952448, 16383, 140135308036592}}}}}
        bctx = 0x230
        ret = 32627
        stats_on = 0
        tvb = {tv_sec = 219043332096, tv_usec = 140135308099747}
        tve = {tv_sec = 0, tv_usec = 140135308100256}
        tz = {tz_minuteswest = -884834182, tz_dsttime = 32627}
        diff = 0
        inb = {s = 0x7f73cb428070 "SUBSCRIBE sip:427@mydomain.co.co SIP/2.0\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\r\nTo: <sip:427@de"..., len = 5
        netinfo = {data = {s = 0x2020202020202020 <error: Cannot access memory at address 0x2020202020202020>, len = 538976288}, rcv = 0xff, dst = 0x7f73cb4280a5}
        keng = 0x0
        evp = {data = 0x7ffd3f1ec060, rcv = 0x7f73cb427d90, dst = 0x0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#42 0x000055c40d4754bc in receive_tcp_msg (tcpbuf=0x7f73cb428070 "SUBSCRIBE sip:427@mydomain.co.co SIP/2.0\r\nCall-ID: 5b4d360ca0649aaac1e4a0caa10adb71@0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813@mydomain.co.co>;tag=e56f79f4\
    con=0x7f73cb427d78) at core/tcp_read.c:1399
        buf = 0x0
        bsize = 0
        blen = 560
        __func__ = "receive_tcp_msg"
#43 0x000055c40d477ac4 in tcp_read_req (con=0x7f73cb427d78, bytes_read=0x7ffd3f1ec450, read_flags=0x7ffd3f1ec448) at core/tcp_read.c:1631
        bytes = 560
        total_bytes = 560
        resp = 1
        size = 0
        req = 0x7f73cb427df8
        dst = {send_sock = 0x7ffd3f1ec440, to = {s = {sa_family = 32360, sa_data = "B\313s\177\000\000\000\000\000\000\001 \000"}, sin = {sin_family = 32360, sin_port = 52034, sin_addr = {s_addr = 32627}, sin_zero = "\000\000\000\000\001 \000"}, sin6 = {sin6
              sin6_flowinfo = 32627, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\001 \000\000x\363\352\026t\177\000", __u6_addr16 = {0, 0, 8193, 0, 62328, 5866, 32628, 0}, __u6_addr32 = {0, 8193, 384496504, 32628}}}, sin6_scope_id = 1058980624}},
            blst_imask = 80}}
        c = 13 '\r'
        ret = 0
        __func__ = "tcp_read_req"
#44 0x000055c40d47b621 in handle_io (fm=0x7f7416eaf378, events=1, idx=-1) at core/tcp_read.c:1862
        ret = 0
        n = 21956
        read_flags = 1
        con = 0x7f73cb427d78
        s = 0
        resp = 1
        t = 80
        __func__ = "handle_io"
#45 0x000055c40d468524 in io_wait_loop_epoll (h=0x55c40d94c440 <io_w>, t=2, repeat=0) at core/io_wait.h:1062
        n = 1
        r = 0
        fm = 0x7f7416eaf378
        revents = 1
        __func__ = "io_wait_loop_epoll"
#46 0x000055c40d47c9ce in tcp_receive_loop (unix_sock=28) at core/tcp_read.c:1974
        __func__ = "tcp_receive_loop"
#47 0x000055c40d329f60 in tcp_init_children () at core/tcp_main.c:5086
        r = 0
        i = 7
        reader_fd_1 = 28
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\006\000\000\000\000\000\000\000\200\306\036?\375\177\000\000DK7\r\304U\000\000\260\306\036?\375\177\000\000m\002\070\r\001", '\000' <repeats 11 times>, "\004HC\r\000\000\000\000ѻc\r\000\000\000\000\310\300\34000\000\000\000\024\000\000\000\025\000\000\000\000r\b't\177\000"
        si = 0x0
        __func__ = "tcp_init_children"
#48 0x000055c40d25e1a9 in main_loop () at main.c:1750
        i = 8
        pid = 10667
        si = 0x0
        si_desc = "udp receiver child=7 sock=77.77.77.77:5060 (77.77.77.77:5060)\000\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\217r\b't\177\000\000@\307\036?\375\177\000\000\060\000\000\000\060\000\000\000 \310\036
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#49 0x000055c40d265430 in main (argc=13, argv=0x7ffd3f1ecac8) at main.c:2737
        cfg_stream = 0x55c40eee0010
        c = -1
        r = 0
        tmp = 0x7ffd3f1ede06 ""
        tmp_len = 32765
        port = 1058982144
        proto = 32628
        options = 0x55c40d5de600 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 42281687
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0xffffffff
        p = 0xd <error: Cannot access memory at address 0xd>
        st = {st_dev = 18, st_ino = 210785, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1555662619, tv_nsec = 581870842}, st_mtim = {tv_sec = 1555662619,
            tv_nsec = 581870842}, __glibc_reserved = {0, 0, 0}}
        option_index = 0
        long_options = {{name = 0x55c40d5e0aea "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55c40d5daf29 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55c40d5e0aef "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x0, has_arg = 0,
        __func__ = "main"

disas aesni_ecb_encrypt

(gdb) disas aesni_ecb_encrypt
Dump of assembler code for function aesni_ecb_encrypt:
   0x00007f7415d369e0 <+0>:     and    $0xfffffffffffffff0,%rdx
   0x00007f7415d369e4 <+4>:     je     0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d369ea <+10>:    mov    0xf0(%rcx),%eax
   0x00007f7415d369f0 <+16>:    movups (%rcx),%xmm0
   0x00007f7415d369f3 <+19>:    mov    %rcx,%r11
   0x00007f7415d369f6 <+22>:    mov    %eax,%r10d
   0x00007f7415d369f9 <+25>:    test   %r8d,%r8d
   0x00007f7415d369fc <+28>:    je     0x7f7415d36c50 <aesni_ecb_encrypt+624>
   0x00007f7415d36a02 <+34>:    cmp    $0x80,%rdx
   0x00007f7415d36a09 <+41>:    jb     0x7f7415d36af7 <aesni_ecb_encrypt+279>
   0x00007f7415d36a0f <+47>:    movdqu (%rdi),%xmm2
   0x00007f7415d36a13 <+51>:    movdqu 0x10(%rdi),%xmm3
   0x00007f7415d36a18 <+56>:    movdqu 0x20(%rdi),%xmm4
   0x00007f7415d36a1d <+61>:    movdqu 0x30(%rdi),%xmm5
   0x00007f7415d36a22 <+66>:    movdqu 0x40(%rdi),%xmm6
   0x00007f7415d36a27 <+71>:    movdqu 0x50(%rdi),%xmm7
   0x00007f7415d36a2c <+76>:    movdqu 0x60(%rdi),%xmm8
   0x00007f7415d36a32 <+82>:    movdqu 0x70(%rdi),%xmm9
   0x00007f7415d36a38 <+88>:    lea    0x80(%rdi),%rdi
   0x00007f7415d36a3f <+95>:    sub    $0x80,%rdx
   0x00007f7415d36a46 <+102>:   jmp    0x7f7415d36aae <aesni_ecb_encrypt+206>
   0x00007f7415d36a48 <+104>:   nopl   0x0(%rax,%rax,1)
   0x00007f7415d36a50 <+112>:   movups %xmm2,(%rsi)
   0x00007f7415d36a53 <+115>:   mov    %r11,%rcx
   0x00007f7415d36a56 <+118>:   movdqu (%rdi),%xmm2
   0x00007f7415d36a5a <+122>:   mov    %r10d,%eax
   0x00007f7415d36a5d <+125>:   movups %xmm3,0x10(%rsi)
   0x00007f7415d36a61 <+129>:   movdqu 0x10(%rdi),%xmm3
   0x00007f7415d36a66 <+134>:   movups %xmm4,0x20(%rsi)
   0x00007f7415d36a6a <+138>:   movdqu 0x20(%rdi),%xmm4
   0x00007f7415d36a6f <+143>:   movups %xmm5,0x30(%rsi)
   0x00007f7415d36a73 <+147>:   movdqu 0x30(%rdi),%xmm5
   0x00007f7415d36a78 <+152>:   movups %xmm6,0x40(%rsi)
   0x00007f7415d36a7c <+156>:   movdqu 0x40(%rdi),%xmm6
   0x00007f7415d36a81 <+161>:   movups %xmm7,0x50(%rsi)
   0x00007f7415d36a85 <+165>:   movdqu 0x50(%rdi),%xmm7
   0x00007f7415d36a8a <+170>:   movups %xmm8,0x60(%rsi)
   0x00007f7415d36a8f <+175>:   movdqu 0x60(%rdi),%xmm8
   0x00007f7415d36a95 <+181>:   movups %xmm9,0x70(%rsi)
   0x00007f7415d36a9a <+186>:   lea    0x80(%rsi),%rsi
   0x00007f7415d36aa1 <+193>:   movdqu 0x70(%rdi),%xmm9
   0x00007f7415d36aa7 <+199>:   lea    0x80(%rdi),%rdi
   0x00007f7415d36aae <+206>:   callq  0x7f7415d367c0 <_aesni_encrypt8>
   0x00007f7415d36ab3 <+211>:   sub    $0x80,%rdx
   0x00007f7415d36aba <+218>:   jae    0x7f7415d36a50 <aesni_ecb_encrypt+112>
   0x00007f7415d36abc <+220>:   movups %xmm2,(%rsi)
   0x00007f7415d36abf <+223>:   mov    %r11,%rcx
   0x00007f7415d36ac2 <+226>:   movups %xmm3,0x10(%rsi)
   0x00007f7415d36ac6 <+230>:   mov    %r10d,%eax
   0x00007f7415d36ac9 <+233>:   movups %xmm4,0x20(%rsi)
   0x00007f7415d36acd <+237>:   movups %xmm5,0x30(%rsi)
   0x00007f7415d36ad1 <+241>:   movups %xmm6,0x40(%rsi)
   0x00007f7415d36ad5 <+245>:   movups %xmm7,0x50(%rsi)
   0x00007f7415d36ad9 <+249>:   movups %xmm8,0x60(%rsi)
   0x00007f7415d36ade <+254>:   movups %xmm9,0x70(%rsi)
   0x00007f7415d36ae3 <+259>:   lea    0x80(%rsi),%rsi
   0x00007f7415d36aea <+266>:   add    $0x80,%rdx
   0x00007f7415d36af1 <+273>:   je     0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36af7 <+279>:   movups (%rdi),%xmm2
   0x00007f7415d36afa <+282>:   cmp    $0x20,%rdx
   0x00007f7415d36afe <+286>:   jb     0x7f7415d36b70 <aesni_ecb_encrypt+400>
   0x00007f7415d36b00 <+288>:   movups 0x10(%rdi),%xmm3
   0x00007f7415d36b04 <+292>:   je     0x7f7415d36ba0 <aesni_ecb_encrypt+448>
   0x00007f7415d36b0a <+298>:   movups 0x20(%rdi),%xmm4
   0x00007f7415d36b0e <+302>:   cmp    $0x40,%rdx
   0x00007f7415d36b12 <+306>:   jb     0x7f7415d36bc0 <aesni_ecb_encrypt+480>
   0x00007f7415d36b18 <+312>:   movups 0x30(%rdi),%xmm5
   0x00007f7415d36b1c <+316>:   je     0x7f7415d36be0 <aesni_ecb_encrypt+512>
   0x00007f7415d36b22 <+322>:   movups 0x40(%rdi),%xmm6
   0x00007f7415d36b26 <+326>:   cmp    $0x60,%rdx
   0x00007f7415d36b2a <+330>:   jb     0x7f7415d36c00 <aesni_ecb_encrypt+544>
   0x00007f7415d36b30 <+336>:   movups 0x50(%rdi),%xmm7
   0x00007f7415d36b34 <+340>:   je     0x7f7415d36c20 <aesni_ecb_encrypt+576>
   0x00007f7415d36b3a <+346>:   movdqu 0x60(%rdi),%xmm8
   0x00007f7415d36b40 <+352>:   xorps  %xmm9,%xmm9
   0x00007f7415d36b44 <+356>:   callq  0x7f7415d367c0 <_aesni_encrypt8>
   0x00007f7415d36b49 <+361>:   movups %xmm2,(%rsi)
   0x00007f7415d36b4c <+364>:   movups %xmm3,0x10(%rsi)
   0x00007f7415d36b50 <+368>:   movups %xmm4,0x20(%rsi)
   0x00007f7415d36b54 <+372>:   movups %xmm5,0x30(%rsi)
   0x00007f7415d36b58 <+376>:   movups %xmm6,0x40(%rsi)
   0x00007f7415d36b5c <+380>:   movups %xmm7,0x50(%rsi)
   0x00007f7415d36b60 <+384>:   movups %xmm8,0x60(%rsi)
   0x00007f7415d36b65 <+389>:   jmpq   0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36b6a <+394>:   nopw   0x0(%rax,%rax,1)
   0x00007f7415d36b70 <+400>:   movups (%rcx),%xmm0
   0x00007f7415d36b73 <+403>:   movups 0x10(%rcx),%xmm1
   0x00007f7415d36b77 <+407>:   lea    0x20(%rcx),%rcx
   0x00007f7415d36b7b <+411>:   xorps  %xmm0,%xmm2
   0x00007f7415d36b7e <+414>:   aesenc %xmm1,%xmm2
   0x00007f7415d36b83 <+419>:   dec    %eax
   0x00007f7415d36b85 <+421>:   movups (%rcx),%xmm1
   0x00007f7415d36b88 <+424>:   lea    0x10(%rcx),%rcx
   0x00007f7415d36b8c <+428>:   jne    0x7f7415d36b7e <aesni_ecb_encrypt+414>
   0x00007f7415d36b8e <+430>:   aesenclast %xmm1,%xmm2
   0x00007f7415d36b93 <+435>:   movups %xmm2,(%rsi)
   0x00007f7415d36b96 <+438>:   jmpq   0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36b9b <+443>:   nopl   0x0(%rax,%rax,1)
   0x00007f7415d36ba0 <+448>:   callq  0x7f7415d36340 <_aesni_encrypt2>
   0x00007f7415d36ba5 <+453>:   movups %xmm2,(%rsi)
   0x00007f7415d36ba8 <+456>:   movups %xmm3,0x10(%rsi)
   0x00007f7415d36bac <+460>:   jmpq   0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36bb1 <+465>:   nopl   0x0(%rax,%rax,1)
   0x00007f7415d36bb6 <+470>:   nopw   %cs:0x0(%rax,%rax,1)
   0x00007f7415d36bc0 <+480>:   callq  0x7f7415d36400 <_aesni_encrypt3>
   0x00007f7415d36bc5 <+485>:   movups %xmm2,(%rsi)
   0x00007f7415d36bc8 <+488>:   movups %xmm3,0x10(%rsi)
   0x00007f7415d36bcc <+492>:   movups %xmm4,0x20(%rsi)
   0x00007f7415d36bd0 <+496>:   jmpq   0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36bd5 <+501>:   nop
   0x00007f7415d36bd6 <+502>:   nopw   %cs:0x0(%rax,%rax,1)
   0x00007f7415d36be0 <+512>:   callq  0x7f7415d364e0 <_aesni_encrypt4>
   0x00007f7415d36be5 <+517>:   movups %xmm2,(%rsi)
   0x00007f7415d36be8 <+520>:   movups %xmm3,0x10(%rsi)
   0x00007f7415d36bec <+524>:   movups %xmm4,0x20(%rsi)
   0x00007f7415d36bf0 <+528>:   movups %xmm5,0x30(%rsi)
   0x00007f7415d36bf4 <+532>:   jmpq   0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36bf9 <+537>:   nopl   0x0(%rax)
   0x00007f7415d36c00 <+544>:   xorps  %xmm7,%xmm7
   0x00007f7415d36c03 <+547>:   callq  0x7f7415d36600 <_aesni_encrypt6>
   0x00007f7415d36c08 <+552>:   movups %xmm2,(%rsi)
   0x00007f7415d36c0b <+555>:   movups %xmm3,0x10(%rsi)
   0x00007f7415d36c0f <+559>:   movups %xmm4,0x20(%rsi)
   0x00007f7415d36c13 <+563>:   movups %xmm5,0x30(%rsi)
   0x00007f7415d36c17 <+567>:   movups %xmm6,0x40(%rsi)
   0x00007f7415d36c1b <+571>:   jmpq   0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36c20 <+576>:   callq  0x7f7415d36600 <_aesni_encrypt6>
   0x00007f7415d36c25 <+581>:   movups %xmm2,(%rsi)
   0x00007f7415d36c28 <+584>:   movups %xmm3,0x10(%rsi)
   0x00007f7415d36c2c <+588>:   movups %xmm4,0x20(%rsi)
   0x00007f7415d36c30 <+592>:   movups %xmm5,0x30(%rsi)
   0x00007f7415d36c34 <+596>:   movups %xmm6,0x40(%rsi)
   0x00007f7415d36c38 <+600>:   movups %xmm7,0x50(%rsi)
   0x00007f7415d36c3c <+604>:   jmpq   0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36c41 <+609>:   nopl   0x0(%rax,%rax,1)
   0x00007f7415d36c46 <+614>:   nopw   %cs:0x0(%rax,%rax,1)
   0x00007f7415d36c50 <+624>:   cmp    $0x80,%rdx
   0x00007f7415d36c57 <+631>:   jb     0x7f7415d36d6d <aesni_ecb_encrypt+909>
   0x00007f7415d36c5d <+637>:   movdqu (%rdi),%xmm2
   0x00007f7415d36c61 <+641>:   movdqu 0x10(%rdi),%xmm3
   0x00007f7415d36c66 <+646>:   movdqu 0x20(%rdi),%xmm4
   0x00007f7415d36c6b <+651>:   movdqu 0x30(%rdi),%xmm5
   0x00007f7415d36c70 <+656>:   movdqu 0x40(%rdi),%xmm6
   0x00007f7415d36c75 <+661>:   movdqu 0x50(%rdi),%xmm7
   0x00007f7415d36c7a <+666>:   movdqu 0x60(%rdi),%xmm8
   0x00007f7415d36c80 <+672>:   movdqu 0x70(%rdi),%xmm9
   0x00007f7415d36c86 <+678>:   lea    0x80(%rdi),%rdi
   0x00007f7415d36c8d <+685>:   sub    $0x80,%rdx
   0x00007f7415d36c94 <+692>:   jmp    0x7f7415d36cfe <aesni_ecb_encrypt+798>
   0x00007f7415d36c96 <+694>:   nopw   %cs:0x0(%rax,%rax,1)
   0x00007f7415d36ca0 <+704>:   movups %xmm2,(%rsi)
   0x00007f7415d36ca3 <+707>:   mov    %r11,%rcx
   0x00007f7415d36ca6 <+710>:   movdqu (%rdi),%xmm2
   0x00007f7415d36caa <+714>:   mov    %r10d,%eax
   0x00007f7415d36cad <+717>:   movups %xmm3,0x10(%rsi)
   0x00007f7415d36cb1 <+721>:   movdqu 0x10(%rdi),%xmm3
   0x00007f7415d36cb6 <+726>:   movups %xmm4,0x20(%rsi)
   0x00007f7415d36cba <+730>:   movdqu 0x20(%rdi),%xmm4
   0x00007f7415d36cbf <+735>:   movups %xmm5,0x30(%rsi)
   0x00007f7415d36cc3 <+739>:   movdqu 0x30(%rdi),%xmm5
   0x00007f7415d36cc8 <+744>:   movups %xmm6,0x40(%rsi)
   0x00007f7415d36ccc <+748>:   movdqu 0x40(%rdi),%xmm6
   0x00007f7415d36cd1 <+753>:   movups %xmm7,0x50(%rsi)
   0x00007f7415d36cd5 <+757>:   movdqu 0x50(%rdi),%xmm7
   0x00007f7415d36cda <+762>:   movups %xmm8,0x60(%rsi)
   0x00007f7415d36cdf <+767>:   movdqu 0x60(%rdi),%xmm8
   0x00007f7415d36ce5 <+773>:   movups %xmm9,0x70(%rsi)
   0x00007f7415d36cea <+778>:   lea    0x80(%rsi),%rsi
   0x00007f7415d36cf1 <+785>:   movdqu 0x70(%rdi),%xmm9
   0x00007f7415d36cf7 <+791>:   lea    0x80(%rdi),%rdi
   0x00007f7415d36cfe <+798>:   callq  0x7f7415d368d0 <_aesni_decrypt8>
   0x00007f7415d36d03 <+803>:   movups (%r11),%xmm0
   0x00007f7415d36d07 <+807>:   sub    $0x80,%rdx
   0x00007f7415d36d0e <+814>:   jae    0x7f7415d36ca0 <aesni_ecb_encrypt+704>
   0x00007f7415d36d10 <+816>:   movups %xmm2,(%rsi)
   0x00007f7415d36d13 <+819>:   pxor   %xmm2,%xmm2
   0x00007f7415d36d17 <+823>:   mov    %r11,%rcx
   0x00007f7415d36d1a <+826>:   movups %xmm3,0x10(%rsi)
   0x00007f7415d36d1e <+830>:   pxor   %xmm3,%xmm3
   0x00007f7415d36d22 <+834>:   mov    %r10d,%eax
   0x00007f7415d36d25 <+837>:   movups %xmm4,0x20(%rsi)
   0x00007f7415d36d29 <+841>:   pxor   %xmm4,%xmm4
   0x00007f7415d36d2d <+845>:   movups %xmm5,0x30(%rsi)
   0x00007f7415d36d31 <+849>:   pxor   %xmm5,%xmm5
   0x00007f7415d36d35 <+853>:   movups %xmm6,0x40(%rsi)
   0x00007f7415d36d39 <+857>:   pxor   %xmm6,%xmm6
   0x00007f7415d36d3d <+861>:   movups %xmm7,0x50(%rsi)
   0x00007f7415d36d41 <+865>:   pxor   %xmm7,%xmm7
   0x00007f7415d36d45 <+869>:   movups %xmm8,0x60(%rsi)
   0x00007f7415d36d4a <+874>:   pxor   %xmm8,%xmm8
   0x00007f7415d36d4f <+879>:   movups %xmm9,0x70(%rsi)
   0x00007f7415d36d54 <+884>:   pxor   %xmm9,%xmm9
   0x00007f7415d36d59 <+889>:   lea    0x80(%rsi),%rsi
   0x00007f7415d36d60 <+896>:   add    $0x80,%rdx
   0x00007f7415d36d67 <+903>:   je     0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36d6d <+909>:   movups (%rdi),%xmm2
   0x00007f7415d36d70 <+912>:   cmp    $0x20,%rdx
   0x00007f7415d36d74 <+916>:   jb     0x7f7415d36e10 <aesni_ecb_encrypt+1072>
   0x00007f7415d36d7a <+922>:   movups 0x10(%rdi),%xmm3
   0x00007f7415d36d7e <+926>:   je     0x7f7415d36e40 <aesni_ecb_encrypt+1120>
   0x00007f7415d36d84 <+932>:   movups 0x20(%rdi),%xmm4
   0x00007f7415d36d88 <+936>:   cmp    $0x40,%rdx
   0x00007f7415d36d8c <+940>:   jb     0x7f7415d36e60 <aesni_ecb_encrypt+1152>
   0x00007f7415d36d92 <+946>:   movups 0x30(%rdi),%xmm5
   0x00007f7415d36d96 <+950>:   je     0x7f7415d36e90 <aesni_ecb_encrypt+1200>
   0x00007f7415d36d9c <+956>:   movups 0x40(%rdi),%xmm6
   0x00007f7415d36da0 <+960>:   cmp    $0x60,%rdx
   0x00007f7415d36da4 <+964>:   jb     0x7f7415d36ec0 <aesni_ecb_encrypt+1248>
   0x00007f7415d36daa <+970>:   movups 0x50(%rdi),%xmm7
   0x00007f7415d36dae <+974>:   je     0x7f7415d36f00 <aesni_ecb_encrypt+1312>
   0x00007f7415d36db4 <+980>:   movups 0x60(%rdi),%xmm8
   0x00007f7415d36db9 <+985>:   movups (%rcx),%xmm0
   0x00007f7415d36dbc <+988>:   xorps  %xmm9,%xmm9
   0x00007f7415d36dc0 <+992>:   callq  0x7f7415d368d0 <_aesni_decrypt8>
   0x00007f7415d36dc5 <+997>:   movups %xmm2,(%rsi)
   0x00007f7415d36dc8 <+1000>:  pxor   %xmm2,%xmm2
   0x00007f7415d36dcc <+1004>:  movups %xmm3,0x10(%rsi)
   0x00007f7415d36dd0 <+1008>:  pxor   %xmm3,%xmm3
   0x00007f7415d36dd4 <+1012>:  movups %xmm4,0x20(%rsi)
   0x00007f7415d36dd8 <+1016>:  pxor   %xmm4,%xmm4
   0x00007f7415d36ddc <+1020>:  movups %xmm5,0x30(%rsi)
   0x00007f7415d36de0 <+1024>:  pxor   %xmm5,%xmm5
   0x00007f7415d36de4 <+1028>:  movups %xmm6,0x40(%rsi)
   0x00007f7415d36de8 <+1032>:  pxor   %xmm6,%xmm6
   0x00007f7415d36dec <+1036>:  movups %xmm7,0x50(%rsi)
   0x00007f7415d36df0 <+1040>:  pxor   %xmm7,%xmm7
   0x00007f7415d36df4 <+1044>:  movups %xmm8,0x60(%rsi)
   0x00007f7415d36df9 <+1049>:  pxor   %xmm8,%xmm8
   0x00007f7415d36dfe <+1054>:  pxor   %xmm9,%xmm9
   0x00007f7415d36e03 <+1059>:  jmpq   0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36e08 <+1064>:  nopl   0x0(%rax,%rax,1)
   0x00007f7415d36e10 <+1072>:  movups (%rcx),%xmm0
   0x00007f7415d36e13 <+1075>:  movups 0x10(%rcx),%xmm1
   0x00007f7415d36e17 <+1079>:  lea    0x20(%rcx),%rcx
   0x00007f7415d36e1b <+1083>:  xorps  %xmm0,%xmm2
   0x00007f7415d36e1e <+1086>:  aesdec %xmm1,%xmm2
   0x00007f7415d36e23 <+1091>:  dec    %eax
   0x00007f7415d36e25 <+1093>:  movups (%rcx),%xmm1
   0x00007f7415d36e28 <+1096>:  lea    0x10(%rcx),%rcx
   0x00007f7415d36e2c <+1100>:  jne    0x7f7415d36e1e <aesni_ecb_encrypt+1086>
   0x00007f7415d36e2e <+1102>:  aesdeclast %xmm1,%xmm2
   0x00007f7415d36e33 <+1107>:  movups %xmm2,(%rsi)
   0x00007f7415d36e36 <+1110>:  pxor   %xmm2,%xmm2
   0x00007f7415d36e3a <+1114>:  jmpq   0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36e3f <+1119>:  nop
   0x00007f7415d36e40 <+1120>:  callq  0x7f7415d363a0 <_aesni_decrypt2>
   0x00007f7415d36e45 <+1125>:  movups %xmm2,(%rsi)
   0x00007f7415d36e48 <+1128>:  pxor   %xmm2,%xmm2
   0x00007f7415d36e4c <+1132>:  movups %xmm3,0x10(%rsi)
   0x00007f7415d36e50 <+1136>:  pxor   %xmm3,%xmm3
   0x00007f7415d36e54 <+1140>:  jmpq   0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36e59 <+1145>:  nopl   0x0(%rax)
   0x00007f7415d36e60 <+1152>:  callq  0x7f7415d36470 <_aesni_decrypt3>
   0x00007f7415d36e65 <+1157>:  movups %xmm2,(%rsi)
   0x00007f7415d36e68 <+1160>:  pxor   %xmm2,%xmm2
   0x00007f7415d36e6c <+1164>:  movups %xmm3,0x10(%rsi)
   0x00007f7415d36e70 <+1168>:  pxor   %xmm3,%xmm3
   0x00007f7415d36e74 <+1172>:  movups %xmm4,0x20(%rsi)
   0x00007f7415d36e78 <+1176>:  pxor   %xmm4,%xmm4
   0x00007f7415d36e7c <+1180>:  jmpq   0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36e81 <+1185>:  nopl   0x0(%rax,%rax,1)
   0x00007f7415d36e86 <+1190>:  nopw   %cs:0x0(%rax,%rax,1)
   0x00007f7415d36e90 <+1200>:  callq  0x7f7415d36570 <_aesni_decrypt4>
   0x00007f7415d36e95 <+1205>:  movups %xmm2,(%rsi)
   0x00007f7415d36e98 <+1208>:  pxor   %xmm2,%xmm2
   0x00007f7415d36e9c <+1212>:  movups %xmm3,0x10(%rsi)
   0x00007f7415d36ea0 <+1216>:  pxor   %xmm3,%xmm3
   0x00007f7415d36ea4 <+1220>:  movups %xmm4,0x20(%rsi)
   0x00007f7415d36ea8 <+1224>:  pxor   %xmm4,%xmm4
   0x00007f7415d36eac <+1228>:  movups %xmm5,0x30(%rsi)
   0x00007f7415d36eb0 <+1232>:  pxor   %xmm5,%xmm5
   0x00007f7415d36eb4 <+1236>:  jmp    0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36eb6 <+1238>:  nopw   %cs:0x0(%rax,%rax,1)
   0x00007f7415d36ec0 <+1248>:  xorps  %xmm7,%xmm7
   0x00007f7415d36ec3 <+1251>:  callq  0x7f7415d366e0 <_aesni_decrypt6>
   0x00007f7415d36ec8 <+1256>:  movups %xmm2,(%rsi)
   0x00007f7415d36ecb <+1259>:  pxor   %xmm2,%xmm2
   0x00007f7415d36ecf <+1263>:  movups %xmm3,0x10(%rsi)
   0x00007f7415d36ed3 <+1267>:  pxor   %xmm3,%xmm3
   0x00007f7415d36ed7 <+1271>:  movups %xmm4,0x20(%rsi)
   0x00007f7415d36edb <+1275>:  pxor   %xmm4,%xmm4
   0x00007f7415d36edf <+1279>:  movups %xmm5,0x30(%rsi)
   0x00007f7415d36ee3 <+1283>:  pxor   %xmm5,%xmm5
   0x00007f7415d36ee7 <+1287>:  movups %xmm6,0x40(%rsi)
   0x00007f7415d36eeb <+1291>:  pxor   %xmm6,%xmm6
   0x00007f7415d36eef <+1295>:  pxor   %xmm7,%xmm7
   0x00007f7415d36ef3 <+1299>:  jmp    0x7f7415d36f34 <aesni_ecb_encrypt+1364>
   0x00007f7415d36ef5 <+1301>:  nop
   0x00007f7415d36ef6 <+1302>:  nopw   %cs:0x0(%rax,%rax,1)
   0x00007f7415d36f00 <+1312>:  callq  0x7f7415d366e0 <_aesni_decrypt6>
   0x00007f7415d36f05 <+1317>:  movups %xmm2,(%rsi)
   0x00007f7415d36f08 <+1320>:  pxor   %xmm2,%xmm2
   0x00007f7415d36f0c <+1324>:  movups %xmm3,0x10(%rsi)
   0x00007f7415d36f10 <+1328>:  pxor   %xmm3,%xmm3
   0x00007f7415d36f14 <+1332>:  movups %xmm4,0x20(%rsi)
   0x00007f7415d36f18 <+1336>:  pxor   %xmm4,%xmm4
   0x00007f7415d36f1c <+1340>:  movups %xmm5,0x30(%rsi)
   0x00007f7415d36f20 <+1344>:  pxor   %xmm5,%xmm5
   0x00007f7415d36f24 <+1348>:  movups %xmm6,0x40(%rsi)
   0x00007f7415d36f28 <+1352>:  pxor   %xmm6,%xmm6
   0x00007f7415d36f2c <+1356>:  movups %xmm7,0x50(%rsi)
   0x00007f7415d36f30 <+1360>:  pxor   %xmm7,%xmm7
   0x00007f7415d36f34 <+1364>:  xorps  %xmm0,%xmm0
   0x00007f7415d36f37 <+1367>:  pxor   %xmm1,%xmm1
   0x00007f7415d36f3b <+1371>:  repz retq
End of assembler dump.

i r

(gdb) i r
rax            0xfc0e5f44       4228800324
rbx            0x7f7427087200   140136847798784
rcx            0x7f740adfd000   140136375373824
rdx            0x10     16
rsi            0x7f73cb204618   140135305856536
rdi            0x7f73cb204638   140135305856568
rbp            0x7ffd3f1ec9e0   0x7ffd3f1ec9e0
rsp            0x7ffd3f1ec820   0x7ffd3f1ec820
r8             0x1      1
r9             0x0      0
r10            0x0      0
r11            0x7f73cbc5c430   140135316702256
r12            0x55c40d6292d3   94300526514899
r13            0x40000000       1073741824
r14            0x10000000       268435456
r15            0x6      6
rip            0x55c40d265430   0x55c40d265430 <main+26065>
eflags         0x10287  [ CF PF SF IF RF ]
cs             0x33     51
ss             0x2b     43
ds             0x0      0
es             0x0      0
fs             0x0      0
gs             0x0      0

@miconda
Copy link
Member

miconda commented Apr 20, 2019

Not sure when I get time to look deeper, it's Easter holidays in most of Europe, so likely others are busy as well. What I can suggest for the moment is to compile using libssl 1.0.x and see if works ok with it. That will confirm or rule out if it is an issue with libssl/libcrypti 1.1.x. On some systems, you can get libssl1.0.x along with libssl1.1, so if you have both you may need to tune the Makefile inside src/modules/tls to compile with 1.0.x. If you use Debian 8 for example, iirc, it has only libssl 1.0.x (or at least this is the default installed version).

@nwhitehorn
Copy link

I'm also having trouble with kamailio and OpenSSL 1.1, with segfaults in TLS. It's not quite the same issue as described here, but I suspect might be related:

  • thread API for ruby #1, name = 'kamailio', stop reason = signal SIGSEGV
    • frame #0: 0x00000008009c954d libc.so.7__free + 749 frame #1: 0x00000008026c262b libthr.so.3pthread_rwlock_destroy + 59
      frame Fix some typos and capitalisation in INSTALL #2: 0x0000000802b8abf6 libcrypto.so.111CRYPTO_THREAD_lock_free + 22 frame #3: 0x0000000802b784c6 libcrypto.so.111BIO_free + 182
      frame Update pcscf.cfg #4: 0x00000008028fb1a1 libssl.so.111SSL_free + 193 frame #5: 0x0000000802810d48 tls.sotls_h_tcpconn_clean + 1240

I haven't tried with OpenSSL 1.0 yet.

@CrazyTux-zz
Copy link

CrazyTux-zz commented Apr 20, 2019 via email

@kamailio-sync
Copy link

kamailio-sync commented Apr 20, 2019 via email

@shaunjstokes
Copy link
Author

Changing the Makefile for the TLS module to use OpenSSL 1.0 fixes the problem, that at least provides us with a workaround.

Just to be sure, I've repeated the process of making the TLS module using OpenSSL 1.1.1b and the problem returns, if I then clean and make the TLS module using OpenSSL 1.0.2r the problem is fixed.

Thank you to all for your assistance.

@cake2
Copy link

cake2 commented May 6, 2019

Changing the Makefile for the TLS module to use OpenSSL 1.0 fixes the problem, that at least provides us with a workaround.

Just to be sure, I've repeated the process of making the TLS module using OpenSSL 1.1.1b and the problem returns, if I then clean and make the TLS module using OpenSSL 1.0.2r the problem is fixed.

Thank you to all for your assistance.

My skills are poor, but I can build from source. Could you explain in detail what file to edit before making. I would like to try using OpenSSL 1.0
I get segmentation fault when I specify listen=tls:1.2.3.4:5061 in kamailio.cfg
My config worked in Ubuntu 14, after I upgraded to 18 and installed 5.2.2 its broken.

@shaunjstokes
Copy link
Author

shaunjstokes commented May 10, 2019

These are roughly the steps that I've followed to switch to OpenSSL 1.0.2r and rebuild Kamailio TLS module. Hope this helps!

First of all you need to make and install OpenSSL 1.0.2r from source.

sudo apt install build-essential checkinstall zlib1g-dev -y

cd /usr/src

wget https://www.openssl.org/source/openssl-1.0.2r.tar.gz

tar -xvzf openssl-1.0.2r.tar.gz

cd openssl-1.0.2r

./config -d --prefix=/usr/local/ssl --openssldir=/usr/local/ssl shared zlib

make
make test

make install

nano /etc/ld.so.conf.d/openssl-1.0.2r.conf

Add this line and save:

/usr/local/ssl/lib
sudo ldconfig -v

mv /usr/bin/c_rehash /usr/bin/c_rehash.BEKUP
mv /usr/bin/openssl /usr/bin/openssl.BEKUP

export PATH=$PATH:/usr/local/ssl/bin

Link binaries to path:

sudo ln -s /usr/local/ssl/bin/c_rehash /usr/bin/c_rehash
sudo ln -s /usr/local/ssl/bin/openssl /usr/bin/openssl

Restart.

sudo shutdown -r now

Check OpenSSL path, should return '/usr/bin/openssl'.

which openssl

Check OpenSSL version, should return 'OpenSSL 1.0.2r 26 Feb 2019'.

openssl version

Modify '/usr/src/kamailio/src/modules/tls/makefile'.

Changed this:

ifneq ($(SSL_BUILDER),)
	DEFS += $(shell $(SSL_BUILDER) --cflags)
	LIBS += $(shell $(SSL_BUILDER) --libs)
else
	DEFS += -I$(LOCALBASE)/ssl/include
	LIBS += -L$(LOCALBASE)/lib -L$(LOCALBASE)/ssl/lib \
			-L$(LOCALBASE)/lib64 -L$(LOCALBASE)/ssl/lib64 \
			-lssl -lcrypto
	# NOTE: depending on the way in which libssl was compiled you might
	#       have to add -lz -lkrb5   (zlib and kerberos5).
	#       E.g.: make TLS_HOOKS=1 TLS_EXTRA_LIBS="-lz -lkrb5"
endif

To this:

DEFS+=	-I/usr/local/ssl/include
LIBS+=	-L/usr/local/ssl/lib \
		-lssl -lcrypto

Make clean, make and make install:

cd /usr/src/kamailio/src/modules/tls
make clean
make
make install

@henningw
Copy link
Contributor

@shaunjstokes - great description, do you would mind to add this to our wiki page as well? This would be great!
It would be a good fit in the tutorials sections on www.kamailio.org/wiki (you need to quickly create a free account to create a new page here).

@shaunjstokes
Copy link
Author

@henningw Wiki added https://www.kamailio.org/wiki/tutorials/tls/howto-openssl-1-0

@henningw
Copy link
Contributor

For OpenSSL >= 1.1x there will be also a a workaround in the upcoming 5.3 release (efdc141 and following commits). Close this one, as the reporter also found another workaround.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

7 participants