<!-- Kamailio Project uses GitHub Issues only for bugs in the code or feature requests.
If you have questions about using Kamailio or related to its configuration file, ask on sr-users mailing list:
* http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users
If you have questions about developing extensions to Kamailio or its existing C code, ask on sr-dev mailing list
* http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev
Please try to fill this template as much as possible for any issue. It helps the developers to troubleshoot the issue.
If you submit a feature request (or enhancement), you can delete the text of the template and only add the description of what you would like to be added.
If there is no content to be filled in a section, the entire section can be removed.
You can delete the comments from the template sections when filling.
You can delete next line and everything above before submitting (it is a comment). -->
### Description
I used a MCU with kamailio proxy which enabled the websocket module, and made 13 WebRTC clients (same domain as the MCU) was connected to the MCU orderly, then let MCU disconnected them all orderly and quickly. After that, WSS port can't be accessd anymore - but it not always happens!
However , whether it's blocked or not, It can be found that the receiving queue of kamailio had value left and this shouldn't happen:
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 10.100.92.222:10443 0.0.0.0:* LISTEN 6851/kamailio tcp 1 0 10.100.92.222:10443 10.100.92.35:50283 CLOSE_WAIT 6812/kamailio tcp 1359 0 10.100.92.222:10443 10.100.92.35:50249 CLOSE_WAIT 6817/kamailio
Btw, I tried to find the cause by myself ever with lots of log added, it seems that the process stuck in the function tls_read() in tcp_read.c, (so the following TCP/TLS packets can be handled) following is my tracing procedure , perhaps this can help you to clarify the issue. :)
tcp_read.c: ---> tcp_read_req() ``` if (likely(req->error==TCP_REQ_OK)){ #ifdef READ_WS if (unlikely(con->type == PROTO_WS || con->type == PROTO_WSS)) bytes=tcp_read_ws(con, read_flags); else #endif bytes=tcp_read_headers(con, read_flags); ``` --->tcp_read_ws()
``` #ifdef USE_TLS if (unlikely(c->type == PROTO_WSS)) bytes = tls_read(c, read_flags); //<--- stuck here!! else #endif ```
<!-- Explain what you did, what you expected to happen, and what actually happened. -->
### Troubleshooting
#### Reproduction
<!-- If the issue can be reproduced, describe how it can be done. -->
#### Debugging Data
<!-- If you got a core dump, use gdb to extract troubleshooting data - full backtrace, local variables and the list of the code at the issue location.
gdb /path/to/kamailio /path/to/corefile bt full info locals list
If you are familiar with gdb, feel free to attach more of what you consider to be relevant. -->
```
#0 0x0000ffff91d7067c in __lll_lock_wait () from /lib64/libpthread.so.0 No symbol table info available. #1 0x0000ffff91d6988c in pthread_mutex_lock () from /lib64/libpthread.so.0 No symbol table info available. #2 0x00000000006544e4 in tcpconn_send_put (c=0xffff8178a348, buf=0xffff89e7e920 "\201~\001\372BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;receive"..., len=510, send_flags=...) at tcp_main.c:2376 tmp = 0xffff8178a348 fd = 10 response = {281472853910344, 0} n = 8 do_close_fd = 1 rest_buf = 0x648d7c <tcpconn_get+256> "\247+@\371\347<@\271\377" t_buf = 0xffff89e7e920 "\201~\001\372BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;receive"... rest_len = 0 t_len = 510 resp = 281473925092352 t_send_flags = {f = 56 '8', blst_imask = 223 '\337'} fd_cache_e = 0x0 use_fd_cache = 1 __func__ = "tcpconn_send_put" #3 0x0000000000650d24 in tcp_send (dst=0xffffc1519650, from=0x0, buf=0xffff89e7e920 "\201~\001\372BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;receive"..., len=510) at tcp_main.c:2155 c = 0xffff8178a348 ip = {af = 2, len = 4, u = {addrl = {593257482, 135}, addr32 = {593257482, 0, 135, 0}, addr16 = {25610, 9052, 0, 0, 135, 0, 0, 0}, addr = "\nd\#\000\000\000\000\207\000\000\000\000\000\000"}} port = 50249 fd = 512 response = {281473925092736, 6589744} n = 65535 con_lifetime = 57680 rest_buf = 0x7fdf38 "DEBUG" t_buf = 0x87 <error: Cannot access memory at address 0x87> rest_len = 0 t_len = 6505260 resp = 281473925092704 t_send_flags = {f = 9 '\t', blst_imask = 64 '@'} __func__ = "tcp_send" #4 0x0000ffff80b01b08 in encode_and_send_ws_frame (frame=0xffffc1519758, conn_close=CONN_CLOSE_DONT) at ws_frame.c:302 pos = 4 extended_length = 2 frame_length = 510 send_buf = 0xffff89e7e920 "\201~\001\372BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;receive"... con = 0xffff8178a348 dst = {send_sock = 0xffff89c43748, to = {s = {sa_family = 2, sa_data = "\304I\nd\#\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 18884, sin_addr = {s_addr = 593257482}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 18884, sin6_flowinfo = 593257482, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 4, proto = 6 '\006', send_flags = {f = 1 '\001', blst_imask = 0 '\000'}} from = 0x0 local_addr = {s = {sa_family = 38592, sa_data = "Q\301\377\377\000\000\320\377\377\377\200\377\377\377"}, sin = {sin_family = 38592, sin_port = 49489, sin_addr = {s_addr = 65535}, sin_zero = "\320\377\377\377\200\377\377\377"}, sin6 = {sin6_family = 38592, sin6_port = 49489, sin6_flowinfo = 65535, sin6_addr = {__in6_u = {__u6_addr8 = "\320\377\377\377\200\377\377\377%%%%%%%%", __u6_addr16 = {65488, 65535, 65408, 65535, 9509, 9509, 9509, 9509}, __u6_addr32 = {4294967248, 4294967168, 623191333, 623191333}}}, sin6_scope_id = 623191333}} sub_proto = 1 __func__ = "encode_and_send_ws_frame" #5 0x0000ffff80b09fc0 in ws_frame_transmit (data=0xffffc1519880) at ws_frame.c:757 wsev = 0xffffc1519880 frame = {fin = 1, rsv1 = 0, rsv2 = 0, rsv3 = 0, opcode = 1, mask = 0, payload_len = 506, masking_key = "\000\000\000", payload_data = 0xffff817ea9d8 "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;received=10"..., wsc = 0xffff8178cc28} __func__ = "ws_frame_transmit" #6 0x000000000049e758 in sr_event_exec (type=11, data=0xffffc1519880) at events.c:274 ret = 0 i = -1981058840 p = 0xffff8178a348 __func__ = "sr_event_exec" #7 0x0000ffff897e6268 in msg_send (dst=0xffff8188ef60, buf=0xffff817ea9d8 "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;received=10"..., len=506) at ../../forward.h:189 new_dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} outb = { s = 0xffff817ea9d8 "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;received=10"..., len = 506} port = 50249 ip = {af = 2, len = 4, u = {addrl = {281471275000842, 12}, addr32 = {593257482, 65535, 12, 0}, addr16 = {25610, 9052, 65535, 0, 12, 0, 0, 0}, addr = "\nd\#\377\377\000\000\f\000\000\000\000\000\000"}} from = 0xffffc1519898 local_addr = {s = {sa_family = 2, sa_data = "\000\000\nd\\336\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 0, sin_addr = { s_addr = 3730596874}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 0, sin6_flowinfo = 3730596874, sin6_addr = { __in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}} con = 0xffff8178a348 wsev = {type = 11, buf = 0xffff817ea9d8 "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;received=10"..., len = 506, id = 4} ret = 0 __func__ = "msg_send" #8 0x0000ffff897e9d70 in send_pr_buffer (rb=0xffff8188ef10, buf=0xffff817ea9d8, len=506, file=0xffff898b08a0 "t_fwd.c", function=0xffff898b1ad0 <__FUNCTION__.12678> "t_send_branch", line=1581) at t_funcs.c:103 __func__ = "send_pr_buffer" #9 0x0000ffff89802e70 in t_send_branch (t=0xffff8188ed98, branch=0, p_msg=0xffff89edb0e0, proxy=0x0, lock_replies=1) at t_fwd.c:1581 ip = {af = 3243350936, len = 65535, u = {addrl = {281473925094280, 281473925094256}, addr32 = {3243350920, 65535, 3243350896, 65535}, addr16 = {39816, 49489, 65535, 0, 39792, 49489, 65535, 0}, addr = "\210\233Q\301\377\377\000\000p\233Q\301\377\377\000"}} ret = 0 uac = 0xffff8188ef00 __func__ = "t_send_branch" __FUNCTION__ = "t_send_branch" #10 0x0000ffff8980562c in t_forward_nonack (t=0xffff8188ed98, p_msg=0xffff89edb0e0, proxy=0x0, proto=0) at t_fwd.c:1796 branch_ret = 0 lowest_ret = -1 current_uri = {s = 0x0, len = 0} added_branches = 1 first_branch = 0 i = 0 q = -1 t_invite = 0xffffc151a1d0 success_branch = 0 try_new = 1 lock_replies = 1 dst_uri = {s = 0x0, len = 0} path = {s = 0x0, len = 0} instance = {s = 0x0, len = 0} ruid = {s = 0x0, len = 0} location_ua = {s = 0x0, len = 0} si = 0x0 backup_bflags = 0 bflags = 0 __func__ = "t_forward_nonack" #11 0x0000ffff897ed29c in t_relay_to (p_msg=0xffff89edb0e0, proxy=0x0, proto=0, replicate=0) at t_funcs.c:355 ret = 0 new_tran = 1 t = 0xffff8188ed98 dst = {send_sock = 0x833520 <__func__.8441>, to = {s = {sa_family = 47392, sa_data = "\202\000\000\000\000\000\220\226\351\211\377\377\000"}, sin = { sin_family = 47392, sin_port = 130, sin_addr = {s_addr = 0}, sin_zero = "\220\226\351\211\377\377\000"}, sin6 = {sin6_family = 47392, sin6_port = 130, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\226\351\211\377\377\000\000\020\000\277\211\377\377\000", __u6_addr16 = {38544, 35305, 65535, 0, 16, 35263, 65535, 0}, __u6_addr32 = {2313787024, 65535, 2310995984, 65535}}}, sin6_scope_id = 135}}, id = 0, proto = 56 '8', send_flags = {f = 223 '\337', blst_imask = 127 '\177'}} port = 0 host = {s = 0x6a464009 <error: Cannot access memory at address 0x6a464009>, len = 0} comp = 0 __func__ = "t_relay_to" #12 0x0000ffff89839650 in _w_t_relay_to (p_msg=0xffff89edb0e0, proxy=0x0, force_proto=0) at tm.c:1517 t = 0xffffc1519de0 res = 65535 __func__ = "_w_t_relay_to" #13 0x0000ffff8983aa64 in w_t_relay (p_msg=0xffff89edb0e0, _foo=0x0, _bar=0x0) at tm.c:1718 No locals. #14 0x000000000041f1bc in do_action (h=0xffffc151a460, a=0xffff89cbede8, msg=0xffff89edb0e0) at action.c:1088 ret = -5 v = 821157850 dst = {send_sock = 0xffff80d78618 <__func__.14174>, to = {s = {sa_family = 59927, sa_data = "l\211\377\377\000\000\200\242Q\301\377\377\000"}, sin = { sin_family = 59927, sin_port = 35180, sin_addr = {s_addr = 65535}, sin_zero = "\200\242Q\301\377\377\000"}, sin6 = {sin6_family = 59927, sin6_port = 35180, sin6_flowinfo = 65535, sin6_addr = {__in6_u = {__u6_addr8 = "\200\242Q\301\377\377\000\000H\361A\000\000\000\000", __u6_addr16 = { 41600, 49489, 65535, 0, 61768, 65, 0, 0}, __u6_addr32 = {3243352704, 65535, 4321608, 0}}}, sin6_scope_id = 135}}, id = 0, proto = 56 '8', send_flags = {f = 223 '\337', blst_imask = 127 '\177'}} tmp = 0xffff89edb0e0 "\006" new_uri = 0xffff89cb94b0 "\217\003" end = 0xffff89edb0e0 "\006" crt = 0x87 <error: Cannot access memory at address 0x87> cmd = 0xffff89c45e68 len = 0 user = 4382880 uri = {user = {s = 0xffffc151a160 "\200\242Q\301\377\377", len = 5959220}, passwd = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, host = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, port = {s = 0xffff89cb9880 "\001", len = -1051614664}, params = {s = 0xffff89edb0e0 "\006", len = -1051606264}, sip_params = {s = 0xffff89dec1a8 "\002", len = -1981892192}, headers = { s = 0xffff91c00b00 " \022\300\221\377\377", len = -1051613344}, port_no = 25120, proto = 35268, type = 65535, flags = (unknown: 0), transport = { s = 0xffff896ce9f8 "%s: %s%s(): no destination URI\n", len = 21}, ttl = {s = 0x7080 <error: Cannot access memory at address 0x7080>, len = 1076896416}, user_param = {s = 0xffffc151a160 "\200\242Q\301\377\377", len = 5959276}, maddr = { s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, method = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1051613552}, r2 = { s = 0xd <error: Cannot access memory at address 0xd>, len = -1051614776}, gr = { s = 0x252525250000000d <error: Cannot access memory at address 0x252525250000000d>, len = 623191333}, transport_val = { s = 0x6920676f <error: Cannot access memory at address 0x6920676f>, len = 0}, ttl_val = {s = 0xffff91d344c0 <step4_jumps> "", len = -1}, user_param_val = {s = 0xffffc151a280 "P\250Q\301\377\377", len = 4320364}, maddr_val = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, method_val = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr_val = { s = 0xffff89cb9fa8 "\004", len = -1051613552}, r2_val = {s = 0xffff89edb0e0 "\006", len = -1051606264}, gr_val = {s = 0x7fdf38 "DEBUG", len = -2133364224}} next_hop = {user = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = -1982052448}, passwd = {s = 0x403d49b0 "0H=@", len = 144}, host = {s = 0x833520 <__func__.8441> "rval_destroy", len = 8567072}, port = {s = 0xffff89e99690 "`\230\351\211\377\377", len = -1983971312}, params = { s = 0xffffc151a4d0 "P\245Q\301\377\377", len = 4383988}, sip_params = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, headers = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, port_no = 135, proto = 0, type = ERROR_URI_T, flags = (unknown: 2314055904), transport = {s = 0xffff89cbcac8 "\223\003", len = -1051613824}, ttl = {s = 0xffffc151a040 "`\241Q\301\377\377", len = 5958084}, user_param = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, maddr = { s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, method = {s = 0xffff91d56000 <initial_quick+456> "", len = 0}, lr = {s = 0xffff89cb9888 "\004", len = -1051614664}, r2 = {s = 0xffff89edb0e0 "\006", len = -1051606264}, gr = {s = 0x0, len = -1981890136}, transport_val = {s = 0xffffc151a040 "`\241Q\301\377\377", len = 5963424}, ttl_val = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, user_param_val = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, maddr_val = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1848308336}, r2_val = {s = 0xffff91c00b00 " \022\300\221\377\377", len = 32}, gr_val = {s = 0xffff896ce9f8 "%s: %s%s(): no destination URI\n", len = 0}} u = 0xffffc151a3b0 port = 0 dst_host = 0x20 i = 8380216 flags = 65535 avp = 0x87 st = {flags = 1782988809, id = 0, name = {n = 0, s = {s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>, len = 0}, re = 0xffff00000000}, avp = 0xffff89dc47a0} sct = 0x30f1dfda sjt = 0x7fdf38 rve = 0xffffc151a910 mct = 0xffffff80ffffffd0 rv = 0x30f1dfda rv1 = 0x42e4f4 <run_actions+2240> c1 = {cache_type = 3575410840, val_type = 2758032445, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = -1051615488, flags = 65535}}, i2s = "8\362A\000\000\000\000\000\207\000\000\000\000\000\000\000\070\337\177\000\000"} s = {s = 0xa464c3c2140f0d38 <error: Cannot access memory at address 0xa464c3c2140f0d38>, len = -1983177984} srevp = {0x0, 0xffffc1519d30} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #15 0x000000000042e4f4 in run_actions (h=0xffffc151a460, a=0xffff89cbede8, msg=0xffff89edb0e0) at action.c:1583 t = 0xffff89cbede8 ret = -1 mod = 0x0 ms = 0 __func__ = "run_actions" #16 0x000000000042ed40 in run_actions_safe (h=0xffffc151c308, a=0xffff89cbede8, msg=0xffff89edb0e0) at action.c:1648 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {135, 8380216, 821157850, 1782988809, 0, 0, 0, 0, 0, 0, 281473925096368, 11845808158218849592, 281473925096784, 11845659156157320728, 0, 0, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 0, __saved_mask = {__val = {0, 2312869768, 281472995799264, 18446744070492342704, 0, 281473925097200, 5936264, 281473925096944, 281472995799264, 281472993577672, 281473925104392, 0, 4294967295, 135, 8380216, 821157850}}}}} ret = 1782988809 ign_on_break = 0 #17 0x00000000005a9488 in rval_get_int (h=0xffffc151c308, msg=0xffff89edb0e0, i=0xffffc151a8b8, rv=0xffff89cbf218, cache=0x0) at rvalue.c:924 r_avp = 0x0 avp_val = {n = 1782988809, s = {s = 0x6a464009 <error: Cannot access memory at address 0x6a464009>, len = 0}, re = 0x6a464009} pval = {rs = {s = 0x0, len = 8380216}, ri = 821157850, flags = 0} tmp = {s = 0x0, len = 0} s = 0x0 r = 0 ret = 0 destroy_pval = 0 __func__ = "rval_get_int" #18 0x00000000005ae9c4 in rval_expr_eval_int (h=0xffffc151c308, msg=0xffff89edb0e0, res=0xffffc151a8b8, rve=0xffff89cbf210) at rvalue.c:1918 i1 = -1051611888 i2 = 4 ret = -1 c1 = {cache_type = 2305161908, val_type = 65535, c = {avp_val = {n = -1051613216, s = {s = 0xffffc151a7e0 "", len = 5959276}, re = 0xffffc151a7e0}, pval = {rs = {s = 0xffffc151a7e0 "", len = 5959276}, ri = 135, flags = 0}}, i2s = "8\337\177\000\000\000\000\000\332\337\361\060\000\000\000\000\t@Fj\000"} c2 = {cache_type = 10, val_type = 30, c = {avp_val = {n = 0, s = {s = 0x0, len = -1983131912}, re = 0x0}, pval = {rs = {s = 0x0, len = -1983131912}, ri = -1051611888, flags = 65535}}, i2s = "\340\260\355\211\377\377\000\000\b\303Q\301\377\377\000\000`\250Q\301\377\377"} rv1 = 0x6a464009 rv2 = 0x30f1dfda __func__ = "rval_expr_eval_int" #19 0x00000000005aee34 in rval_expr_eval_int (h=0xffffc151c308, msg=0xffff89edb0e0, res=0xffffc151ad10, rve=0xffff89cbf938) at rvalue.c:1926 i1 = 1 i2 = 0 ret = -1 c1 = {cache_type = 1782988809, val_type = RV_NONE, c = {avp_val = {n = -1051612928, s = {s = 0xffffc151a900 "\320\256Q\301\377\377", len = -1980911392}, re = 0xffffc151a900}, pval = {rs = {s = 0xffffc151a900 "\320\256Q\301\377\377", len = -1980911392}, ri = -1983149416, flags = 65535}}, i2s = "\b\303Q\301\377\377\000\000\332\337\361\060\000\000\000\000\t@Fj\000"} c2 = {cache_type = 2311930112, val_type = 65535, c = {avp_val = {n = -1980911392, s = {s = 0xffff89edb0e0 "\006", len = -1051612928}, re = 0xffff89edb0e0}, pval = {rs = {s = 0xffff89edb0e0 "\006", len = -1051612928}, ri = 4321608, flags = 0}}, i2s = "\207\000\000\000\000\000\000\000\070\337\177\000\000\000\000\000\332\337\361\060\000"} rv1 = 0xffffc151ada0 rv2 = 0xffff896d2df8 <__func__.9630> __func__ = "rval_expr_eval_int" #20 0x000000000041ec6c in do_action (h=0xffffc151c308, a=0xffff89cc0060, msg=0xffff89edb0e0) at action.c:1064 ret = -5 v = 0 dst = {send_sock = 0xffffc151ad90, to = {s = {sa_family = 27956, sa_data = "Z\000\000\000\000\000\207\000\000\000\000\000\000"}, sin = { sin_family = 27956, sin_port = 90, sin_addr = {s_addr = 0}, sin_zero = "\207\000\000\000\000\000\000"}, sin6 = {sin6_family = 27956, sin6_port = 90, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\207\000\000\000\000\000\000\000\070\337\177\000\000\000\000", __u6_addr16 = {135, 0, 0, 0, 57144, 127, 0, 0}, __u6_addr32 = {135, 0, 8380216, 0}}}, sin6_scope_id = 821157850}}, id = 0, proto = 9 '\t', send_flags = {f = 64 '@', blst_imask = 70 'F'}} tmp = 0xffffc151b390 "\001" new_uri = 0xffffc151ae60 "8\371\313\211\377\377" end = 0xffff89e99690 "`\230\351\211\377\377" crt = 0xffff89cd8250 "\001" cmd = 0xffff89cd8258 len = 0 user = 1782988809 uri = {user = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, passwd = { s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, host = {s = 0xffff89edb0e0 "\006", len = -1980911392}, port = { s = 0xffff89cd80c0 "\340\003", len = -1051612160}, params = {s = 0xffffc151abc0 "@\254Q\301\001", len = -1985742896}, sip_params = { s = 0xc151abe8 <error: Cannot access memory at address 0xc151abe8>, len = -1983971312}, headers = { s = 0x1c151ac40 <error: Cannot access memory at address 0x1c151ac40>, len = 0}, port_no = 44400, proto = 49489, type = 65535, flags = (unknown: 5936264), transport = {s = 0x0, len = -1980911392}, ttl = {s = 0xffff89cd80c0 "\340\003", len = -1051606264}, user_param = {s = 0x0, len = 1}, maddr = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, method = { s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = { s = 0x0, len = 0}, transport_val = {s = 0xffffc151ab50 "\320\253Q\301\377\377", len = 336530744}, ttl_val = {s = 0x0, len = -719567176}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = { s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>, len = 5959276}, gr_val = { s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}} next_hop = {user = {s = 0xffffc151ade0 "`\256Q\301\377\377", len = 5957052}, passwd = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, host = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, port = { s = 0x87 <error: Cannot access memory at address 0x87>, len = 0}, params = {s = 0xffff89cd40e0 "\a", len = 1782988809}, sip_params = { s = 0xffff89c50ac8 "x\236R\211\377\377", len = -1051606264}, headers = {s = 0xffff89edb0e0 "\006", len = -1051606264}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = { s = 0x97fd46 <buf+270> "on;nat=yes;did=a41.10a>\r\nFrom: sip:1000@10.100.92.222;tag=929365234\r\nTo: sip:2_5fae4541@10.100.92.222;tag=tsksn14njr\r\nCall-ID: k1l3hd6cq4h2b1vnovhd\r\nCSeq: 2 BYE\r\nContact: <sip:1000@10.100.92.222:5"..., len = 2}, method = { s = 0x97fd40 <buf+264> "on;lr=on;nat=yes;did=a41.10a>\r\nFrom: sip:1000@10.100.92.222;tag=929365234\r\nTo: sip:2_5fae4541@10.100.92.222;tag=tsksn14njr\r\nCall-ID: k1l3hd6cq4h2b1vnovhd\r\nCSeq: 2 BYE\r\nContact: <sip:1000@10.100.92"..., len = 2}, lr = {s = 0x0, len = 0}, r2 = {s = 0xffff89e58a58 "\t", len = -1989194012}, gr = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, transport_val = { s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, ttl_val = { s = 0xc449000000000003 <error: Cannot access memory at address 0xc449000000000003>, len = -1980910696}, user_param_val = { s = 0xffffc151ab50 "\320\253Q\301\377\377", len = 4382880}, maddr_val = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 1}, method_val = {s = 0x30097fdb4 <error: Cannot access memory at address 0x30097fdb4>, len = 1}, lr_val = {s = 0xffffc151ac20 "\332\337\361\060", len = 5958084}, r2_val = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, gr_val = {s = 0xffffc151abd0 "p\255Q\301\377\377", len = 4386112}} u = 0x30f1dfda port = 0 dst_host = 0x0 i = 19 flags = 0 avp = 0x87 st = {flags = 5945744, id = 0, name = {n = 0, s = {s = 0x0, len = -1051611752}, re = 0x0}, avp = 0x87} sct = 0x30f1dfda sjt = 0x1 rve = 0xffff89cbf938 mct = 0x87 rv = 0xffffc151a9e0 rv1 = 0x41ec6c <do_action+35204> c1 = {cache_type = 5929308, val_type = RV_NONE, c = {avp_val = {n = -1051611752, s = {s = 0xffffc151ad98 "\t@Fj", len = 0}, re = 0xffffc151ad98}, pval = { rs = {s = 0xffffc151ad98 "\t@Fj", len = 0}, ri = -1981180272, flags = 1}}, i2s = "\210\255Q\301\240\003\000\000\340\251Q\301\377\377\000\000\200\271Z\000\000"} s = {s = 0x7fdf38 "DEBUG", len = -1051612768} srevp = {0x8a, 0xffff89e99660} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #21 0x000000000042e4f4 in run_actions (h=0xffffc151c308, a=0xffff89cb95f8, msg=0xffff89edb0e0) at action.c:1583 t = 0xffff89cc0060 ret = 1 mod = 0x500000000 ms = 0 __func__ = "run_actions" #22 0x000000000041b344 in do_action (h=0xffffc151c308, a=0xffff89cda6d0, msg=0xffff89edb0e0) at action.c:712 ret = -5 v = 1 dst = {send_sock = 0xffffffff, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\350\217H\211\377\377\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\350\217H\211\377\377\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\350\217H\211\377\377\000\000\025\000\000\000\000\000\000", __u6_addr16 = {36840, 35144, 65535, 0, 21, 0, 0, 0}, __u6_addr32 = {2303234024, 65535, 21, 0}}}, sin6_scope_id = 3243357184}}, id = 65535, proto = 228 '\344', send_flags = {f = 150 '\226', blst_imask = 102 'f'}} tmp = 0xffffc151ba10 "\001" new_uri = 0xffffc151b4e0 "P\202\315\211\377\377" end = 0xffff89cc51f8 "\002" crt = 0xffff89ccfe30 "\001" cmd = 0xffff89ccfe38 len = 0 user = 1782988809 uri = {user = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, passwd = { s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, host = {s = 0x0, len = -1980911392}, port = { s = 0xffff89ccfce8 "\314\003", len = -1051610496}, params = {s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>, len = -1849245812}, sip_params = {s = 0x91d56000 <error: Cannot access memory at address 0x91d56000>, len = 1077747920}, headers = { s = 0x191d54000 <error: Cannot access memory at address 0x191d54000>, len = 0}, port_no = 46064, proto = 49489, type = 65535, flags = (unknown: 5936264), transport = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1980911392}, ttl = { s = 0xffff89ccfce8 "\314\003", len = -1051606264}, user_param = {s = 0x0, len = 1}, maddr = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, method = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr = {s = 0x0, len = 0}, r2 = { s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0xffffc151b1d0 "P\262Q\301\377\377", len = 336530744}, ttl_val = { s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = -719561672}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = { s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>, len = 32}, gr_val = {s = 0xffff91c00b00 " \022\300\221\377\377", len = -1051608560}} next_hop = {user = {s = 0xffffc151b0b0 "h\207\304\211\377\377", len = 4382880}, passwd = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 0}, host = {s = 0xffffc151b130 "\320\262Q\301\377\377", len = 5805596}, port = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, params = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, sip_params = { s = 0xffff89c48768 "\250\320q\211\377\377", len = 4386112}, headers = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, port_no = 57306, proto = 12529, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 1782988808), transport = { s = 0xffffc151b150 "8\335\314\211\377\377", len = -1980911392}, ttl = {s = 0xffff89ccdd38 "\307\003", len = -1051610784}, user_param = { s = 0xffffc151b560 "\207", len = 5006156}, maddr = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, method = { s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr = {s = 0xffffc151b2d0 "", len = -1983057000}, r2 = { s = 0xffff89edb0e0 "\006", len = -1051606264}, gr = {s = 0xffff89ccdd38 "\307\003", len = -1051606264}, transport_val = {s = 0x0, len = 1}, ttl_val = { s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, user_param_val = {s = 0xffffc151b1d0 "P\262Q\301\377\377", len = 4382880}, maddr_val = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = { s = 0xffffc151b0b0 "h\207\304\211\377\377", len = 336530744}, gr_val = {s = 0xffffc151b250 "\360\263Q\301\377\377", len = 4386112}} u = 0x30f1dfda port = 0 dst_host = 0xffffc151c308 i = 3 flags = 0 avp = 0x87 st = {flags = 3243361032, id = 65535, name = {n = 0, s = {s = 0x0, len = -1}, re = 0x0}, avp = 0x87} sct = 0x87 sjt = 0x1 rve = 0xffff89cd8250 mct = 0xffffc151b450 rv = 0xffff89cc8880 rv1 = 0x41ec6c <do_action+35204> c1 = {cache_type = 5928904, val_type = RV_NONE, c = {avp_val = {n = -1051611072, s = { s = 0xffffffffc151b040 <error: Cannot access memory at address 0xffffffffc151b040>, len = 0}, re = 0xffffffffc151b040}, pval = {rs = { s = 0xffffffffc151b040 <error: Cannot access memory at address 0xffffffffc151b040>, len = 0}, ri = -1051610704, flags = 1}}, i2s = "\210\224Z", '\000' <repeats 13 times>, "\340\260\355\211\377\377"} s = {s = 0x6800000000 <error: Cannot access memory at address 0x6800000000>, len = -1051611120} srevp = {0xffffc151b040, 0xffffc151b3f8} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #23 0x000000000042e4f4 in run_actions (h=0xffffc151c308, a=0xffff89cd3dd0, msg=0xffff89edb0e0) at action.c:1583 t = 0xffff89cda6d0 ret = 1 mod = 0x1 ms = 0 __func__ = "run_actions" #24 0x000000000041f148 in do_action (h=0xffffc151c308, a=0xffff89cda960, msg=0xffff89edb0e0) at action.c:1079 ret = 1 v = 1 dst = {send_sock = 0x1d00000002, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\200p\000\000\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\200p\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\200p\000\000\000\000\000\000\240"0@\000\000\000", __u6_addr16 = {28800, 0, 0, 0, 8864, 16432, 0, 0}, __u6_addr32 = {28800, 0, 1076896416, 0}}}, sin6_scope_id = 3243359008}}, id = 65535, proto = 0 '\000', send_flags = {f = 37 '%', blst_imask = 72 'H'}} tmp = 0xffffc151c090 "" new_uri = 0xffffc151fdc6 "/var/Olympus/kamailio.cfg" end = 0xffff89c5f350 "" crt = 0xffff89ca8b68 "\001" cmd = 0x0 len = 2 user = 1782988809 uri = {user = {s = 0xffff91d56000 <initial_quick+456> "", len = 1077747920}, passwd = {s = 0xffff91d54000 realloc@got.plt "\250?\311\221\377\377", len = 32}, host = {s = 0xffff91c00b00 " \022\300\221\377\377", len = -1051608560}, port = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 0}, params = {s = 0xffff89488fe8 "%s: %s%s:%d:%.*s", len = 21}, sip_params = {s = 0xffffc151b8e0 "", len = -1848750100}, headers = {s = 0xffff91d56000 <initial_quick+456> "", len = 1077747920}, port_no = 47328, proto = 49489, type = 65535, flags = (unknown: 0), transport = {s = 0xffffc151ba00 " \273Q\301\377\377", len = -1848749588}, ttl = { s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, user_param = { s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = { s = 0x0, len = 0}, r2 = {s = 0xffffc151bb00 "\332\337\361\060", len = -1051608320}, gr = {s = 0xffffc151bad0 "0\337\177", len = -48}, transport_val = { s = 0xffffc151ba30 "", len = -1051608528}, ttl_val = {s = 0x5a6fd201 <error: Cannot access memory at address 0x5a6fd201>, len = 1077748512}, user_param_val = {s = 0x82 <error: Cannot access memory at address 0x82>, len = 0}, maddr_val = { s = 0x2564253a73257325 <error: Cannot access memory at address 0x2564253a73257325>, len = 115}, method_val = { s = 0x65706c656874616e <error: Cannot access memory at address 0x65706c656874616e>, len = 1077748512}, lr_val = {s = 0x0, len = -256}, r2_val = { s = 0x0, len = 37}, gr_val = {s = 0x1e0000000a <error: Cannot access memory at address 0x1e0000000a>, len = 0}} next_hop = {user = {s = 0xffffc151b7d0 "0\270Q\301\377\377", len = -1848950520}, passwd = {s = 0xffffc151b9c8 "%", len = 15}, host = {s = 0x403d232c "", len = 0}, port = {s = 0xffff91d3e51f "T ", len = -1848297408}, params = {s = 0xffff91d39748 "%H:%M:%S", len = 8187}, sip_params = {s = 0x403d232c "", len = 1077748532}, headers = {s = 0xffffc151b7d0 "0\270Q\301\377\377", len = -1849087388}, port_no = 8976, proto = 16445, type = ERROR_URI_T, flags = (unknown: 2446674336), transport = {s = 0x90 <error: Cannot access memory at address 0x90>, len = 144}, ttl = { s = 0x1f81 <error: Cannot access memory at address 0x1f81>, len = 8208}, user_param = {s = 0x403d4320 "", len = 0}, maddr = { s = 0xffff89488fe8 "%s: %s%s:%d:%.*s", len = 21}, method = {s = 0xffffc151b860 "", len = -1849080668}, lr = {s = 0xffff91d549a0 <main_arena> "", len = 121968}, r2 = {s = 0x2000 <error: Cannot access memory at address 0x2000>, len = -1848295424}, gr = {s = 0xffffc151b830 " \024\325\221\377\377", len = -1849081660}, transport_val = {s = 0x403d2320 "", len = 131}, ttl_val = {s = 0x403d2310 "\260#=@", len = 144}, user_param_val = { s = 0xffff91d549a0 <main_arena> "", len = 8208}, maddr_val = {s = 0xffffc151b8a0 "\350\217H\211\377\377", len = -1849167692}, method_val = { s = 0x403d20d0 "\002", len = 0}, lr_val = {s = 0xffff91d51420 <_IO_mem_jumps> "", len = 32}, r2_val = {s = 0xffff91c00b00 " \022\300\221\377\377", len = -1051608560}, gr_val = {s = 0xffffc151b8e0 "", len = -1848750328}} u = 0x30f1dfda port = 0 dst_host = 0x6a464009 i = 55 flags = 65535 avp = 0xffff89ed1ad8 st = {flags = 0, id = 0, name = {n = 8497288, s = {s = 0x81a888 "%s: %s%s(): final buffer length %d\n", len = 21}, re = 0x81a888}, avp = 0xffffc151b790} sct = 0x2525252525252525 sjt = 0xffffff80ffffffd0 rve = 0xffff89ccfe30 mct = 0xffffc151bad0 rv = 0x403d4320 rv1 = 0xffff89edb0e0 c1 = {cache_type = 2445879908, val_type = 65535, c = {avp_val = {n = 1077748496, s = {s = 0x403d2310 "\260#=@", len = -1848292960}, re = 0x403d2310}, pval = {rs = {s = 0x403d2310 "\260#=@", len = -1848292960}, ri = 128, flags = 0}}, i2s = "\200\000\000\000\000\000\000\000\221\037\000\000\000\000\000\000\020 \000\000\000"} s = {s = 0x403d2334 "", len = -1051609344} srevp = {0x1ffb, 0x403d232c} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #25 0x000000000042e4f4 in run_actions (h=0xffffc151c308, a=0xffff89ccf070, msg=0xffff89edb0e0) at action.c:1583 t = 0xffff89cda960 ret = 1 mod = 0xffff89ca7fd0 ms = 0 __func__ = "run_actions" #26 0x000000000041b344 in do_action (h=0xffffc151c308, a=0xffff89caa7f0, msg=0xffff89edb0e0) at action.c:712 ret = -5 v = 0 dst = {send_sock = 0x403d118c, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\037\345\323\221\377\377\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\037\345\323\221\377\377\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\037\345\323\221\377\377\000\000@8\325\221\377\377\000", __u6_addr16 = {58655, 37331, 65535, 0, 14400, 37333, 65535, 0}, __u6_addr32 = {2446583071, 65535, 2446669888, 65535}}}, sin6_scope_id = 2446563144}}, id = 65535, proto = 251 '\373', send_flags = { f = 31 '\037', blst_imask = 0 '\000'}} tmp = 0xffff91ce4fec <__vsyslog_chk+892> "@\367\377\266g\202\066\221\347\200@\271\207\366\377\064\377\376\377\227g\202\066\221\002" new_uri = 0xffff91d549a0 <main_arena> "" end = 0x90 <error: Cannot access memory at address 0x90> crt = 0x87 <error: Cannot access memory at address 0x87> cmd = 0xffff89c51ce8 len = 0 user = 4382880 uri = {user = {s = 0x403d3180 "", len = 0}, passwd = {s = 0x872200 "%s: %s%s(): header field type %d, name=<%.*s>, body=<%.*s>\n", len = 21}, host = { s = 0xffffc151bfc0 "\250/\207", len = -1849080668}, port = {s = 0xffffc151c000 "`\300Q\301\377\377", len = -1848950520}, params = { s = 0xffffc151c1f8 "\005", len = 15}, sip_params = {s = 0x403d118c "", len = 0}, headers = {s = 0xffff91d3e51f "T ", len = -1848297408}, port_no = 38728, proto = 37331, type = 65535, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 8184), transport = {s = 0x403d118c "", len = 1077744020}, ttl = {s = 0xffffc151c000 "`\300Q\301\377\377", len = -1849087388}, user_param = {s = 0x403d1170 "", len = -1848292960}, maddr = { s = 0x80 <error: Cannot access memory at address 0x80>, len = 128}, method = {s = 0x1f91 <error: Cannot access memory at address 0x1f91>, len = 8208}, lr = {s = 0x403d3180 "", len = 0}, r2 = {s = 0x872fa8 "%s: %s%s(): exiting parse_msg\n", len = 21}, gr = {s = 0xffffc151c090 "", len = -1849080668}, transport_val = {s = 0xffff91d549a0 <main_arena> "", len = 126496}, ttl_val = {s = 0x2000 <error: Cannot access memory at address 0x2000>, len = -1848295424}, user_param_val = {s = 0xffffc151c060 "\214\021=@", len = -1849081660}, maddr_val = {s = 0x403d1180 "", len = 112}, method_val = { s = 0x403d1170 "", len = 128}, lr_val = {s = 0xffff91d549a0 <main_arena> "", len = 8208}, r2_val = {s = 0xffffc151c130 "\350\034\305\211\377\377", len = -1848950520}, gr_val = {s = 0xffffc151c328 "\332\337\361\060", len = 15}} next_hop = {user = {s = 0xffff91d344c0 <step4_jumps> "", len = -1}, passwd = {s = 0xffff91c65a28 <vfprintf+4472> "\247\034", len = 0}, host = { s = 0xbd0 <error: Cannot access memory at address 0xbd0>, len = -1051605968}, port = {s = 0x3 <error: Cannot access memory at address 0x3>, len = -1051605920}, params = {s = 0xffffffe8ffffff80 <error: Cannot access memory at address 0xffffffe8ffffff80>, len = -1051605920}, sip_params = { s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 8513280), transport = {s = 0x0, len = 0}, ttl = {s = 0xffffc151bfb0 "\200\061=@", len = -1051607120}, user_param = {s = 0xffffc151bf80 "p\021=@", len = -48}, maddr = {s = 0x3e732a2e253c203d <error: Cannot access memory at address 0x3e732a2e253c203d>, len = -1051605920}, method = {s = 0xffffc151c460 "", len = -1051605968}, lr = { s = 0xffffff80ffffffd0 <error: Cannot access memory at address 0xffffff80ffffffd0>, len = 0}, r2 = {s = 0xffffc151bf30 "\214\021=@", len = -1848950520}, gr = {s = 0xffffc151c128 "", len = 15}, transport_val = {s = 0x403d118c "", len = 0}, ttl_val = {s = 0xffff91d3e51f "T ", len = -1848297408}, user_param_val = {s = 0xffff91d39748 "%H:%M:%S", len = 8187}, maddr_val = {s = 0x403d118c "", len = 1077744020}, method_val = { s = 0xffffc151bf30 "\214\021=@", len = -1849087388}, lr_val = {s = 0x403d1170 "", len = -1848292960}, r2_val = { s = 0xd0 <error: Cannot access memory at address 0xd0>, len = 208}, gr_val = {s = 0x1f41 <error: Cannot access memory at address 0x1f41>, len = 8208}} u = 0xffffc151c250 port = 0 dst_host = 0x403d0f30 i = 5 flags = 0 avp = 0xffffffff st = {flags = 3243359704, id = 65535, name = {n = 11, s = {s = 0xb <error: Cannot access memory at address 0xb>, len = 0}, re = 0xb}, avp = 0x8889e8} sct = 0x1f81 sjt = 0x90 rve = 0xffff89ca8b68 mct = 0x90 rv = 0xb rv1 = 0xffffc151c370 c1 = {cache_type = 3243361024, val_type = 65535, c = {avp_val = {n = -48, s = { s = 0xffffff80ffffffd0 <error: Cannot access memory at address 0xffffff80ffffffd0>, len = -1848750328}, re = 0xffffff80ffffffd0}, pval = {rs = { s = 0xffffff80ffffffd0 <error: Cannot access memory at address 0xffffff80ffffffd0>, len = -1848750328}, ri = -1848287232, flags = 65535}}, i2s = "@\302Q\301\377\377\000\000\000\000\000\000\377\377\000\000h\353\201\000\000"} s = {s = 0xffffc151c330 "\t@Fj", len = -1051606224} srevp = {0x15, 0xffff91d51420 <_IO_mem_jumps>} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #27 0x000000000042e4f4 in run_actions (h=0xffffc151c308, a=0xffff89c69c10, msg=0xffff89edb0e0) at action.c:1583 t = 0xffff89caa7f0 ret = 1 mod = 0x42edbc <run_top_route+68> ms = 0 __func__ = "run_actions" #28 0x000000000042edf4 in run_top_route (a=0xffff89c69c10, msg=0xffff89edb0e0, c=0x0) at action.c:1669 ctx = {rec_lev = 4, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {135, 8380216, 821157850, 1782988809, 0, 0, 0, 0, 0, 0, 281473925104208, 11845808158218849592, 281473925104736, 11845659156157312952, 0, 0, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 0, __saved_mask = {__val = { 281473925104656, 6074936, 4611686022722355200, 0, 4611686022722355200, 281472995799264, 0, 4611686018427387904, 281473925104768, 5623960, 135, 8380216, 821157850, 1782988809, 4303481704, 281472995799264}}}}} p = 0xffffc151c308 ret = 8380216 sfbk = 0 #29 0x000000000055d0e4 in receive_msg ( buf=0x97fc38 <buf> "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob;alias=10.100.92.35:50249~6 SIP/2.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;rport;branch=z- 9hG4bK1284828286\r\nRoute: <sip:10.100.92.222;r2=on;lr=on;nat=ye"..., len=552, rcv_info=0xffffc151c700) at receive.c:216 msg = 0xffff89edb0e0 ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {135, 8380216, 821157850, 1782988809, 0, 0, 0, 0, 0, 0, 281473925104208, 11845808158218849592, 135, 11845659156157312952, 0, 0, 135, 8380216, 821157850, 0, 0, 167503724544}, __mask_was_saved = 10026040, __saved_mask = { __val = {281473925105416, 65535, 55834574851, 3243362056, 281472993081032, 281473925105216, 7090548, 135, 8380216, 821157850, 1782988809, 281473925105200, 167510816244, 10026040, 281473925105408, 135}}}}} ret = 1 inb = { s = 0x97fc38 <buf> "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob;alias=10.100.92.35:50249~6 SIP/2.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;rport;branch=z9hG4bK1284828286\r\nRoute: <sip:10.100.92.222;r2=on;lr=on;nat=ye"..., len = 552} __func__ = "receive_msg" #30 0x00000000006cbbbc in udp_rcv_loop () at udp_server.c:544 len = 552 buf = "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob;alias=10.100.92.35:50249~6 SIP/2.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;rport;branch=z9hG4bK1284828286\r\nRoute: <sip:10.100.92.222;r2=on;lr=on;nat=ye"... tmp = 0x98fc38 <buff> "10.100.92.222" from = 0xffff89c436c8 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {8030798178131141642, 8297102154720439139}, addr32 = {3730596874, 1869815908, 624782179, 1931819635}, addr16 = {25610, 56924, 8292, 28531, 27491, 9533, 14963, 29477}, addr = "\nd\\336d sock=%s:%s"}}, dst_ip = {af = 2, len = 4, u = {addrl = { 3730596874, 0}, addr32 = {3730596874, 0, 0, 0}, addr16 = {25610, 56924, 0, 0, 0, 0, 0, 0}, addr = "\nd\\336", '\000' <repeats 11 times>}}, src_port = 5062, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\306\nd\\336\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50707, sin_addr = {s_addr = 3730596874}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50707, sin6_flowinfo = 3730596874, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0xffff89c42c20, proto = 1 '\001'} from_in = {s_addr = 3243362056} __func__ = "udp_rcv_loop" #31 0x00000000004d63b4 in main_loop () at main.c:1629 i = 7 pid = 0 si = 0xffff89c42c20 si_desc = "udp receiver child=7 sock=10.100.92.222:5060\000]:5060\000\377\377\000\000\020\311Q\301\377\377\000\000\340\310Q\301\377\377\000\000\320\377\377\377\200\377\377\377", '\000' <repeats 16 times>, "ged to %(\004\347\211\377\377\000\000<core> [cfg/cfg_" r = 0 nrprocs = 8 __func__ = "main_loop" #32 0x00000000004deea0 in main (argc=12, argv=0xffffc151cba8) at main.c:2581 cfg_stream = 0x403022b0 c = -1 r = 0 tmp = 0xffffc151fdf2 "" tmp_len = 0 port = 0 proto = 0 options = 0x80cac0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 1711791307 rfd = 291 debug_save = 4 debug_flag = 1 dont_fork_cnt = 0 n_lst = 0xffff91e0dd98 <_dl_fini> p = 0xffff91c3f314 <__libc_start_main+140> "\247\b" __func__ = "main" ```
#### Log Messages
<!-- Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
``` (paste your log messages here) ```
#### SIP Traffic
<!-- If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site). -->
``` (paste your sip traffic here) ```
### Possible Solutions
<!-- If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix. -->
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
``` version: Kamailio , TEST (armv41/linux) flags: STATS: Off, EXTRA_DEBUG, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, DBG_QM_MALLOC, USE_FUTEX, USE_PTHREAD_MUTEX, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
```
* **Operating System**:
<!-- Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...; Kernel details (output of `uname -a`) -->
``` #uname -a Linux XXX 4.4.13 #1 SMP PREEMPT Fri Mar 24 10:50:44 CST 2017 aarch64 GNU/Linux ```
* **Kamailio Configuration**
``` sh kamctl ps
Process:: ID=0 PID=6801 Type=attendant Process:: ID=1 PID=6802 Type=udp receiver child=0 sock=[FC02:0:0:0:0:0:0:1]:5060 Process:: ID=2 PID=6803 Type=udp receiver child=1 sock=[FC02:0:0:0:0:0:0:1]:5060 Process:: ID=3 PID=6804 Type=udp receiver child=2 sock=[FC02:0:0:0:0:0:0:1]:5060 Process:: ID=4 PID=6805 Type=udp receiver child=3 sock=[FC02:0:0:0:0:0:0:1]:5060 Process:: ID=5 PID=6806 Type=udp receiver child=4 sock=[FC02:0:0:0:0:0:0:1]:5060 Process:: ID=6 PID=6807 Type=udp receiver child=5 sock=[FC02:0:0:0:0:0:0:1]:5060 Process:: ID=7 PID=6808 Type=udp receiver child=6 sock=[FC02:0:0:0:0:0:0:1]:5060 Process:: ID=8 PID=6809 Type=udp receiver child=7 sock=[FC02:0:0:0:0:0:0:1]:5060 Process:: ID=9 PID=6810 Type=udp receiver child=0 sock=10.100.92.222:5060 Process:: ID=10 PID=6811 Type=udp receiver child=1 sock=10.100.92.222:5060 Process:: ID=11 PID=6812 Type=udp receiver child=2 sock=10.100.92.222:5060 Process:: ID=12 PID=6813 Type=udp receiver child=3 sock=10.100.92.222:5060 Process:: ID=13 PID=6814 Type=udp receiver child=4 sock=10.100.92.222:5060 Process:: ID=14 PID=6815 Type=udp receiver child=5 sock=10.100.92.222:5060 Process:: ID=15 PID=6816 Type=udp receiver child=6 sock=10.100.92.222:5060 Process:: ID=16 PID=6817 Type=udp receiver child=7 sock=10.100.92.222:5060 Process:: ID=17 PID=6818 Type=slow timer Process:: ID=18 PID=6819 Type=timer Process:: ID=19 PID=6820 Type=MI FIFO Process:: ID=20 PID=6821 Type=ctl handler Process:: ID=21 PID=6822 Type=TIMER NH Process:: ID=22 PID=6823 Type=Dialog Clean Timer Process:: ID=23 PID=6824 Type=RTIMER SEC EXEC Process:: ID=24 PID=6825 Type=RTIMER SEC EXEC Process:: ID=25 PID=6826 Type=ASYNC MOD TIMER Process:: ID=26 PID=6827 Type=tcp receiver (generic) child=0 Process:: ID=27 PID=6828 Type=tcp receiver (generic) child=1 Process:: ID=28 PID=6829 Type=tcp receiver (generic) child=2 Process:: ID=29 PID=6830 Type=tcp receiver (generic) child=3 Process:: ID=30 PID=6831 Type=tcp receiver (generic) child=4 Process:: ID=31 PID=6832 Type=tcp receiver (generic) child=5 Process:: ID=32 PID=6833 Type=tcp receiver (generic) child=6 Process:: ID=33 PID=6834 Type=tcp receiver (generic) child=7 Process:: ID=34 PID=6835 Type=tcp receiver (tls:10.100.92.222:10443) child=8 Process:: ID=35 PID=6836 Type=tcp receiver (tls:10.100.92.222:10443) child=9 Process:: ID=36 PID=6837 Type=tcp receiver (tls:10.100.92.222:10443) child=10 Process:: ID=37 PID=6838 Type=tcp receiver (tls:10.100.92.222:10443) child=11 Process:: ID=38 PID=6839 Type=tcp receiver (tls:10.100.92.222:10443) child=12 Process:: ID=39 PID=6840 Type=tcp receiver (tls:10.100.92.222:10443) child=13 Process:: ID=40 PID=6841 Type=tcp receiver (tls:10.100.92.222:10443) child=14 Process:: ID=41 PID=6842 Type=tcp receiver (tls:10.100.92.222:10443) child=15 Process:: ID=42 PID=6843 Type=tcp receiver (tcp:10.100.92.222:10080) child=16 Process:: ID=43 PID=6844 Type=tcp receiver (tcp:10.100.92.222:10080) child=17 Process:: ID=44 PID=6845 Type=tcp receiver (tcp:10.100.92.222:10080) child=18 Process:: ID=45 PID=6846 Type=tcp receiver (tcp:10.100.92.222:10080) child=19 Process:: ID=46 PID=6847 Type=tcp receiver (tcp:10.100.92.222:10080) child=20 Process:: ID=47 PID=6848 Type=tcp receiver (tcp:10.100.92.222:10080) child=21 Process:: ID=48 PID=6849 Type=tcp receiver (tcp:10.100.92.222:10080) child=22 Process:: ID=49 PID=6850 Type=tcp receiver (tcp:10.100.92.222:10080) child=23
some settings in kamaiio.cfg:
- tcp_connection_lifetime=3605 - tcp_rd_buf_size=8192 - modparam("websocket", "keepalive_mechanism", 0)
# xhttp event route event_route[xhttp:request] {
set_reply_close(); set_reply_no_connect(); ...
```
* **Others**
``` /etc/sysctl.conf
net.ipv4.tcp_fin_timeout=30 net.ipv4.tcp_tw_reuse=1 net.ipv4.tcp_tw_recycle=0 net.ipv4.tcp_timestamps=0 net.ipv4.tcp_syn_retries=4 net.core.wmem_max=12582912 net.core.rmem_max=12582912 net.ipv4.tcp_rmem= 10240 87380 12582912 net.ipv4.tcp_wmem= 10240 87380 12582912 net.ipv4.tcp_window_scaling = 1 net.ipv4.tcp_timestamps = 1 net.ipv4.tcp_sack = 1 net.ipv4.tcp_no_metrics_save = 1 net.core.netdev_max_backlog = 5000
```