Description

I used a MCU with kamailio proxy which enabled the websocket module,
and made 13 WebRTC clients (same domain as the MCU) was connected to the MCU orderly,
then let MCU disconnected them all orderly and quickly.
After that, WSS port can't be accessd anymore - but it not always happens!

However , whether it's blocked or not,
It can be found that the receiving queue of kamailio had value left and this shouldn't happen:

Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 10.100.92.222:10443 0.0.0.0:* LISTEN 6851/kamailio
tcp 1 0 10.100.92.222:10443 10.100.92.35:50283 CLOSE_WAIT 6812/kamailio
tcp 1359 0 10.100.92.222:10443 10.100.92.35:50249 CLOSE_WAIT 6817/kamailio

Btw, I tried to find the cause by myself ever with lots of log added,
it seems that the process stuck in the function tls_read() in tcp_read.c,
(so the following TCP/TLS packets can be handled)
following is my tracing procedure , perhaps this can help you to clarify the issue. :)

tcp_read.c:
---> tcp_read_req()

		if (likely(req->error==TCP_REQ_OK)){
#ifdef READ_WS
			if (unlikely(con->type == PROTO_WS || con->type == PROTO_WSS))
				bytes=tcp_read_ws(con, read_flags);
			else
#endif
				bytes=tcp_read_headers(con, read_flags);

--->tcp_read_ws()

#ifdef USE_TLS
	if (unlikely(c->type == PROTO_WSS))
		bytes = tls_read(c, read_flags); //<--- stuck here!!
	else
#endif

Troubleshooting

Reproduction

Debugging Data


#0  0x0000ffff91d7067c in __lll_lock_wait () from /lib64/libpthread.so.0
No symbol table info available.
#1  0x0000ffff91d6988c in pthread_mutex_lock () from /lib64/libpthread.so.0
No symbol table info available.
#2  0x00000000006544e4 in tcpconn_send_put (c=0xffff8178a348,
    buf=0xffff89e7e920 "\201~\001\372BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;receive"..., len=510, send_flags=...) at tcp_main.c:2376
        tmp = 0xffff8178a348
        fd = 10
        response = {281472853910344, 0}
        n = 8
        do_close_fd = 1
        rest_buf = 0x648d7c <tcpconn_get+256> "\247+@\371\347<@\271\377"
        t_buf = 0xffff89e7e920 "\201~\001\372BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;receive"...
        rest_len = 0
        t_len = 510
        resp = 281473925092352
        t_send_flags = {f = 56 '8', blst_imask = 223 '\337'}
        fd_cache_e = 0x0
        use_fd_cache = 1
        __func__ = "tcpconn_send_put"
#3  0x0000000000650d24 in tcp_send (dst=0xffffc1519650, from=0x0,
    buf=0xffff89e7e920 "\201~\001\372BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;receive"..., len=510) at tcp_main.c:2155
        c = 0xffff8178a348
        ip = {af = 2, len = 4, u = {addrl = {593257482, 135}, addr32 = {593257482, 0, 135, 0}, addr16 = {25610, 9052, 0, 0, 135, 0, 0, 0},
            addr = "\nd\\#\000\000\000\000\207\000\000\000\000\000\000"}}
        port = 50249
        fd = 512
        response = {281473925092736, 6589744}
        n = 65535
        con_lifetime = 57680
        rest_buf = 0x7fdf38 "DEBUG"
        t_buf = 0x87 <error: Cannot access memory at address 0x87>
        rest_len = 0
        t_len = 6505260
        resp = 281473925092704
        t_send_flags = {f = 9 '\t', blst_imask = 64 '@'}
        __func__ = "tcp_send"
#4  0x0000ffff80b01b08 in encode_and_send_ws_frame (frame=0xffffc1519758, conn_close=CONN_CLOSE_DONT) at ws_frame.c:302
        pos = 4
        extended_length = 2
        frame_length = 510
        send_buf = 0xffff89e7e920 "\201~\001\372BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;receive"...
        con = 0xffff8178a348
        dst = {send_sock = 0xffff89c43748, to = {s = {sa_family = 2, sa_data = "\304I\nd\\#\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
              sin_port = 18884, sin_addr = {s_addr = 593257482}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 18884,
              sin6_flowinfo = 593257482, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0,
                    0, 0, 0}}}, sin6_scope_id = 0}}, id = 4, proto = 6 '\006', send_flags = {f = 1 '\001', blst_imask = 0 '\000'}}
        from = 0x0
        local_addr = {s = {sa_family = 38592, sa_data = "Q\301\377\377\000\000\320\377\377\377\200\377\377\377"}, sin = {sin_family = 38592, sin_port = 49489,
            sin_addr = {s_addr = 65535}, sin_zero = "\320\377\377\377\200\377\377\377"}, sin6 = {sin6_family = 38592, sin6_port = 49489, sin6_flowinfo = 65535,
            sin6_addr = {__in6_u = {__u6_addr8 = "\320\377\377\377\200\377\377\377%%%%%%%%", __u6_addr16 = {65488, 65535, 65408, 65535, 9509, 9509, 9509, 9509},
                __u6_addr32 = {4294967248, 4294967168, 623191333, 623191333}}}, sin6_scope_id = 623191333}}
        sub_proto = 1
        __func__ = "encode_and_send_ws_frame"
#5  0x0000ffff80b09fc0 in ws_frame_transmit (data=0xffffc1519880) at ws_frame.c:757
        wsev = 0xffffc1519880
        frame = {fin = 1, rsv1 = 0, rsv2 = 0, rsv3 = 0, opcode = 1, mask = 0, payload_len = 506, masking_key = "\000\000\000",
          payload_data = 0xffff817ea9d8 "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;received=10"..., wsc = 0xffff8178cc28}
        __func__ = "ws_frame_transmit"
#6  0x000000000049e758 in sr_event_exec (type=11, data=0xffffc1519880) at events.c:274
        ret = 0
        i = -1981058840
        p = 0xffff8178a348
        __func__ = "sr_event_exec"
#7  0x0000ffff897e6268 in msg_send (dst=0xffff8188ef60,
    buf=0xffff817ea9d8 "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;received=10"..., len=506) at ../../forward.h:189
        new_dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                  __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0,
          proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        outb = {
          s = 0xffff817ea9d8 "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;received=10"..., len = 506}
        port = 50249
        ip = {af = 2, len = 4, u = {addrl = {281471275000842, 12}, addr32 = {593257482, 65535, 12, 0}, addr16 = {25610, 9052, 65535, 0, 12, 0, 0, 0},
            addr = "\nd\\#\377\377\000\000\f\000\000\000\000\000\000"}}
        from = 0xffffc1519898
        local_addr = {s = {sa_family = 2, sa_data = "\000\000\nd\\\336\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 0, sin_addr = {
              s_addr = 3730596874}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 0, sin6_flowinfo = 3730596874, sin6_addr = {
              __in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}
        con = 0xffff8178a348
        wsev = {type = 11,
          buf = 0xffff817ea9d8 "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;received=10"..., len = 506, id = 4}
        ret = 0
        __func__ = "msg_send"
#8  0x0000ffff897e9d70 in send_pr_buffer (rb=0xffff8188ef10, buf=0xffff817ea9d8, len=506, file=0xffff898b08a0 "t_fwd.c",
    function=0xffff898b1ad0 <__FUNCTION__.12678> "t_send_branch", line=1581) at t_funcs.c:103
        __func__ = "send_pr_buffer"
#9  0x0000ffff89802e70 in t_send_branch (t=0xffff8188ed98, branch=0, p_msg=0xffff89edb0e0, proxy=0x0, lock_replies=1) at t_fwd.c:1581
        ip = {af = 3243350936, len = 65535, u = {addrl = {281473925094280, 281473925094256}, addr32 = {3243350920, 65535, 3243350896, 65535}, addr16 = {39816,
              49489, 65535, 0, 39792, 49489, 65535, 0}, addr = "\210\233Q\301\377\377\000\000p\233Q\301\377\377\000"}}
        ret = 0
        uac = 0xffff8188ef00
        __func__ = "t_send_branch"
        __FUNCTION__ = "t_send_branch"
#10 0x0000ffff8980562c in t_forward_nonack (t=0xffff8188ed98, p_msg=0xffff89edb0e0, proxy=0x0, proto=0) at t_fwd.c:1796
        branch_ret = 0
        lowest_ret = -1
        current_uri = {s = 0x0, len = 0}
        added_branches = 1
        first_branch = 0
        i = 0
        q = -1
        t_invite = 0xffffc151a1d0
        success_branch = 0
        try_new = 1
        lock_replies = 1
        dst_uri = {s = 0x0, len = 0}
        path = {s = 0x0, len = 0}
        instance = {s = 0x0, len = 0}
        ruid = {s = 0x0, len = 0}
        location_ua = {s = 0x0, len = 0}
        si = 0x0
        backup_bflags = 0
        bflags = 0
        __func__ = "t_forward_nonack"
#11 0x0000ffff897ed29c in t_relay_to (p_msg=0xffff89edb0e0, proxy=0x0, proto=0, replicate=0) at t_funcs.c:355
        ret = 0
        new_tran = 1
        t = 0xffff8188ed98
        dst = {send_sock = 0x833520 <__func__.8441>, to = {s = {sa_family = 47392, sa_data = "\202\000\000\000\000\000\220\226\351\211\377\377\000"}, sin = {
              sin_family = 47392, sin_port = 130, sin_addr = {s_addr = 0}, sin_zero = "\220\226\351\211\377\377\000"}, sin6 = {sin6_family = 47392,
              sin6_port = 130, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\226\351\211\377\377\000\000\020\000\277\211\377\377\000",
                  __u6_addr16 = {38544, 35305, 65535, 0, 16, 35263, 65535, 0}, __u6_addr32 = {2313787024, 65535, 2310995984, 65535}}}, sin6_scope_id = 135}},
          id = 0, proto = 56 '8', send_flags = {f = 223 '\337', blst_imask = 127 '\177'}}
        port = 0
        host = {s = 0x6a464009 <error: Cannot access memory at address 0x6a464009>, len = 0}
        comp = 0
        __func__ = "t_relay_to"
#12 0x0000ffff89839650 in _w_t_relay_to (p_msg=0xffff89edb0e0, proxy=0x0, force_proto=0) at tm.c:1517
        t = 0xffffc1519de0
        res = 65535
        __func__ = "_w_t_relay_to"
#13 0x0000ffff8983aa64 in w_t_relay (p_msg=0xffff89edb0e0, _foo=0x0, _bar=0x0) at tm.c:1718
No locals.
#14 0x000000000041f1bc in do_action (h=0xffffc151a460, a=0xffff89cbede8, msg=0xffff89edb0e0) at action.c:1088
        ret = -5
        v = 821157850
        dst = {send_sock = 0xffff80d78618 <__func__.14174>, to = {s = {sa_family = 59927, sa_data = "l\211\377\377\000\000\200\242Q\301\377\377\000"}, sin = {
              sin_family = 59927, sin_port = 35180, sin_addr = {s_addr = 65535}, sin_zero = "\200\242Q\301\377\377\000"}, sin6 = {sin6_family = 59927,
              sin6_port = 35180, sin6_flowinfo = 65535, sin6_addr = {__in6_u = {__u6_addr8 = "\200\242Q\301\377\377\000\000H\361A\000\000\000\000", __u6_addr16 = {
                    41600, 49489, 65535, 0, 61768, 65, 0, 0}, __u6_addr32 = {3243352704, 65535, 4321608, 0}}}, sin6_scope_id = 135}}, id = 0, proto = 56 '8',
          send_flags = {f = 223 '\337', blst_imask = 127 '\177'}}
        tmp = 0xffff89edb0e0 "\006"
        new_uri = 0xffff89cb94b0 "\217\003"
        end = 0xffff89edb0e0 "\006"
        crt = 0x87 <error: Cannot access memory at address 0x87>
        cmd = 0xffff89c45e68
        len = 0
        user = 4382880
        uri = {user = {s = 0xffffc151a160 "\200\242Q\301\377\377", len = 5959220}, passwd = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 8380216}, host = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, port = {s = 0xffff89cb9880 "\001",
            len = -1051614664}, params = {s = 0xffff89edb0e0 "\006", len = -1051606264}, sip_params = {s = 0xffff89dec1a8 "\002", len = -1981892192}, headers = {
            s = 0xffff91c00b00 " \022\300\221\377\377", len = -1051613344}, port_no = 25120, proto = 35268, type = 65535, flags = (unknown: 0), transport = {
            s = 0xffff896ce9f8 "%s: %s%s(): no destination URI\n", len = 21}, ttl = {s = 0x7080 <error: Cannot access memory at address 0x7080>,
            len = 1076896416}, user_param = {s = 0xffffc151a160 "\200\242Q\301\377\377", len = 5959276}, maddr = {
            s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, method = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>,
            len = 1782988809}, lr = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1051613552}, r2 = {
            s = 0xd <error: Cannot access memory at address 0xd>, len = -1051614776}, gr = {
            s = 0x252525250000000d <error: Cannot access memory at address 0x252525250000000d>, len = 623191333}, transport_val = {
            s = 0x6920676f <error: Cannot access memory at address 0x6920676f>, len = 0}, ttl_val = {s = 0xffff91d344c0 <step4_jumps> "", len = -1},
          user_param_val = {s = 0xffffc151a280 "P\250Q\301\377\377", len = 4320364}, maddr_val = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 8380216}, method_val = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr_val = {
            s = 0xffff89cb9fa8 "\004", len = -1051613552}, r2_val = {s = 0xffff89edb0e0 "\006", len = -1051606264}, gr_val = {s = 0x7fdf38 "DEBUG",
            len = -2133364224}}
        next_hop = {user = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = -1982052448}, passwd = {s = 0x403d49b0 "0H=@", len = 144},
          host = {s = 0x833520 <__func__.8441> "rval_destroy", len = 8567072}, port = {s = 0xffff89e99690 "`\230\351\211\377\377", len = -1983971312}, params = {
            s = 0xffffc151a4d0 "P\245Q\301\377\377", len = 4383988}, sip_params = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216},
          headers = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, port_no = 135, proto = 0, type = ERROR_URI_T,
          flags = (unknown: 2314055904), transport = {s = 0xffff89cbcac8 "\223\003", len = -1051613824}, ttl = {s = 0xffffc151a040 "`\241Q\301\377\377",
            len = 5958084}, user_param = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, maddr = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, method = {s = 0xffff91d56000 <initial_quick+456> "", len = 0},
          lr = {s = 0xffff89cb9888 "\004", len = -1051614664}, r2 = {s = 0xffff89edb0e0 "\006", len = -1051606264}, gr = {s = 0x0, len = -1981890136},
          transport_val = {s = 0xffffc151a040 "`\241Q\301\377\377", len = 5963424}, ttl_val = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 8380216}, user_param_val = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, maddr_val = {
            s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {
            s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1848308336}, r2_val = {s = 0xffff91c00b00 " \022\300\221\377\377",
            len = 32}, gr_val = {s = 0xffff896ce9f8 "%s: %s%s(): no destination URI\n", len = 0}}
        u = 0xffffc151a3b0
        port = 0
        dst_host = 0x20
        i = 8380216
        flags = 65535
        avp = 0x87
        st = {flags = 1782988809, id = 0, name = {n = 0, s = {s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>, len = 0},
            re = 0xffff00000000}, avp = 0xffff89dc47a0}
        sct = 0x30f1dfda
        sjt = 0x7fdf38
        rve = 0xffffc151a910
        mct = 0xffffff80ffffffd0
        rv = 0x30f1dfda
        rv1 = 0x42e4f4 <run_actions+2240>
        c1 = {cache_type = 3575410840, val_type = 2758032445, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0},
              ri = -1051615488, flags = 65535}}, i2s = "8\362A\000\000\000\000\000\207\000\000\000\000\000\000\000\070\337\177\000\000"}
        s = {s = 0xa464c3c2140f0d38 <error: Cannot access memory at address 0xa464c3c2140f0d38>, len = -1983177984}
        srevp = {0x0, 0xffffc1519d30}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST,
            u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
              data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#15 0x000000000042e4f4 in run_actions (h=0xffffc151a460, a=0xffff89cbede8, msg=0xffff89edb0e0) at action.c:1583
        t = 0xffff89cbede8
        ret = -1
        mod = 0x0
        ms = 0
        __func__ = "run_actions"
#16 0x000000000042ed40 in run_actions_safe (h=0xffffc151c308, a=0xffff89cbede8, msg=0xffff89edb0e0) at action.c:1648
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {135, 8380216, 821157850, 1782988809, 0, 0, 0, 0, 0, 0, 281473925096368,
                11845808158218849592, 281473925096784, 11845659156157320728, 0, 0, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 0, __saved_mask = {__val = {0,
                  2312869768, 281472995799264, 18446744070492342704, 0, 281473925097200, 5936264, 281473925096944, 281472995799264, 281472993577672,
                  281473925104392, 0, 4294967295, 135, 8380216, 821157850}}}}}
        ret = 1782988809
        ign_on_break = 0
#17 0x00000000005a9488 in rval_get_int (h=0xffffc151c308, msg=0xffff89edb0e0, i=0xffffc151a8b8, rv=0xffff89cbf218, cache=0x0) at rvalue.c:924
        r_avp = 0x0
        avp_val = {n = 1782988809, s = {s = 0x6a464009 <error: Cannot access memory at address 0x6a464009>, len = 0}, re = 0x6a464009}
        pval = {rs = {s = 0x0, len = 8380216}, ri = 821157850, flags = 0}
        tmp = {s = 0x0, len = 0}
        s = 0x0
        r = 0
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#18 0x00000000005ae9c4 in rval_expr_eval_int (h=0xffffc151c308, msg=0xffff89edb0e0, res=0xffffc151a8b8, rve=0xffff89cbf210) at rvalue.c:1918
        i1 = -1051611888
        i2 = 4
        ret = -1
        c1 = {cache_type = 2305161908, val_type = 65535, c = {avp_val = {n = -1051613216, s = {s = 0xffffc151a7e0 "", len = 5959276}, re = 0xffffc151a7e0},
            pval = {rs = {s = 0xffffc151a7e0 "", len = 5959276}, ri = 135, flags = 0}},
          i2s = "8\337\177\000\000\000\000\000\332\337\361\060\000\000\000\000\t@Fj\000"}
        c2 = {cache_type = 10, val_type = 30, c = {avp_val = {n = 0, s = {s = 0x0, len = -1983131912}, re = 0x0}, pval = {rs = {s = 0x0, len = -1983131912},
              ri = -1051611888, flags = 65535}}, i2s = "\340\260\355\211\377\377\000\000\b\303Q\301\377\377\000\000`\250Q\301\377\377"}
        rv1 = 0x6a464009
        rv2 = 0x30f1dfda
        __func__ = "rval_expr_eval_int"
#19 0x00000000005aee34 in rval_expr_eval_int (h=0xffffc151c308, msg=0xffff89edb0e0, res=0xffffc151ad10, rve=0xffff89cbf938) at rvalue.c:1926
        i1 = 1
        i2 = 0
        ret = -1
        c1 = {cache_type = 1782988809, val_type = RV_NONE, c = {avp_val = {n = -1051612928, s = {s = 0xffffc151a900 "\320\256Q\301\377\377", len = -1980911392},
              re = 0xffffc151a900}, pval = {rs = {s = 0xffffc151a900 "\320\256Q\301\377\377", len = -1980911392}, ri = -1983149416, flags = 65535}},
          i2s = "\b\303Q\301\377\377\000\000\332\337\361\060\000\000\000\000\t@Fj\000"}
        c2 = {cache_type = 2311930112, val_type = 65535, c = {avp_val = {n = -1980911392, s = {s = 0xffff89edb0e0 "\006", len = -1051612928},
              re = 0xffff89edb0e0}, pval = {rs = {s = 0xffff89edb0e0 "\006", len = -1051612928}, ri = 4321608, flags = 0}},
          i2s = "\207\000\000\000\000\000\000\000\070\337\177\000\000\000\000\000\332\337\361\060\000"}
        rv1 = 0xffffc151ada0
        rv2 = 0xffff896d2df8 <__func__.9630>
        __func__ = "rval_expr_eval_int"
#20 0x000000000041ec6c in do_action (h=0xffffc151c308, a=0xffff89cc0060, msg=0xffff89edb0e0) at action.c:1064
        ret = -5
        v = 0
        dst = {send_sock = 0xffffc151ad90, to = {s = {sa_family = 27956, sa_data = "Z\000\000\000\000\000\207\000\000\000\000\000\000"}, sin = {
              sin_family = 27956, sin_port = 90, sin_addr = {s_addr = 0}, sin_zero = "\207\000\000\000\000\000\000"}, sin6 = {sin6_family = 27956, sin6_port = 90,
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\207\000\000\000\000\000\000\000\070\337\177\000\000\000\000", __u6_addr16 = {135, 0, 0, 0,
                    57144, 127, 0, 0}, __u6_addr32 = {135, 0, 8380216, 0}}}, sin6_scope_id = 821157850}}, id = 0, proto = 9 '\t', send_flags = {f = 64 '@',
            blst_imask = 70 'F'}}
        tmp = 0xffffc151b390 "\001"
        new_uri = 0xffffc151ae60 "8\371\313\211\377\377"
        end = 0xffff89e99690 "`\230\351\211\377\377"
        crt = 0xffff89cd8250 "\001"
        cmd = 0xffff89cd8258
        len = 0
        user = 1782988809
        uri = {user = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, passwd = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, host = {s = 0xffff89edb0e0 "\006", len = -1980911392}, port = {
            s = 0xffff89cd80c0 "\340\003", len = -1051612160}, params = {s = 0xffffc151abc0 "@\254Q\301\001", len = -1985742896}, sip_params = {
            s = 0xc151abe8 <error: Cannot access memory at address 0xc151abe8>, len = -1983971312}, headers = {
            s = 0x1c151ac40 <error: Cannot access memory at address 0x1c151ac40>, len = 0}, port_no = 44400, proto = 49489, type = 65535,
          flags = (unknown: 5936264), transport = {s = 0x0, len = -1980911392}, ttl = {s = 0xffff89cd80c0 "\340\003", len = -1051606264}, user_param = {s = 0x0,
            len = 1}, maddr = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, method = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {
            s = 0x0, len = 0}, transport_val = {s = 0xffffc151ab50 "\320\253Q\301\377\377", len = 336530744}, ttl_val = {s = 0x0, len = -719567176},
          user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>, len = 5959276}, gr_val = {
            s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}}
        next_hop = {user = {s = 0xffffc151ade0 "`\256Q\301\377\377", len = 5957052}, passwd = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 8380216}, host = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, port = {
            s = 0x87 <error: Cannot access memory at address 0x87>, len = 0}, params = {s = 0xffff89cd40e0 "\a", len = 1782988809}, sip_params = {
            s = 0xffff89c50ac8 "x\236R\211\377\377", len = -1051606264}, headers = {s = 0xffff89edb0e0 "\006", len = -1051606264}, port_no = 0, proto = 0,
          type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {
            s = 0x97fd46 <buf+270> "on;nat=yes;did=a41.10a>\r\nFrom: <sip:1000@10.100.92.222>;tag=929365234\r\nTo: <sip:2_5fae4541@10.100.92.222>;tag=tsksn14njr\r\nCall-ID: k1l3hd6cq4h2b1vnovhd\r\nCSeq: 2 BYE\r\nContact: <sip:1000@10.100.92.222:5"..., len = 2}, method = {
            s = 0x97fd40 <buf+264> "on;lr=on;nat=yes;did=a41.10a>\r\nFrom: <sip:1000@10.100.92.222>;tag=929365234\r\nTo: <sip:2_5fae4541@10.100.92.222>;tag=tsksn14njr\r\nCall-ID: k1l3hd6cq4h2b1vnovhd\r\nCSeq: 2 BYE\r\nContact: <sip:1000@10.100.92"..., len = 2}, lr = {s = 0x0, len = 0}, r2 = {s = 0xffff89e58a58 "\t",
            len = -1989194012}, gr = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, transport_val = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, ttl_val = {
            s = 0xc449000000000003 <error: Cannot access memory at address 0xc449000000000003>, len = -1980910696}, user_param_val = {
            s = 0xffffc151ab50 "\320\253Q\301\377\377", len = 4382880}, maddr_val = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 1},
          method_val = {s = 0x30097fdb4 <error: Cannot access memory at address 0x30097fdb4>, len = 1}, lr_val = {s = 0xffffc151ac20 "\332\337\361\060",
            len = 5958084}, r2_val = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, gr_val = {s = 0xffffc151abd0 "p\255Q\301\377\377",
            len = 4386112}}
        u = 0x30f1dfda
        port = 0
        dst_host = 0x0
        i = 19
        flags = 0
        avp = 0x87
        st = {flags = 5945744, id = 0, name = {n = 0, s = {s = 0x0, len = -1051611752}, re = 0x0}, avp = 0x87}
        sct = 0x30f1dfda
        sjt = 0x1
        rve = 0xffff89cbf938
        mct = 0x87
        rv = 0xffffc151a9e0
        rv1 = 0x41ec6c <do_action+35204>
        c1 = {cache_type = 5929308, val_type = RV_NONE, c = {avp_val = {n = -1051611752, s = {s = 0xffffc151ad98 "\t@Fj", len = 0}, re = 0xffffc151ad98}, pval = {
              rs = {s = 0xffffc151ad98 "\t@Fj", len = 0}, ri = -1981180272, flags = 1}},
          i2s = "\210\255Q\301\240\003\000\000\340\251Q\301\377\377\000\000\200\271Z\000\000"}
        s = {s = 0x7fdf38 "DEBUG", len = -1051612768}
        srevp = {0x8a, 0xffff89e99660}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST,
            u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
              data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x000000000042e4f4 in run_actions (h=0xffffc151c308, a=0xffff89cb95f8, msg=0xffff89edb0e0) at action.c:1583
        t = 0xffff89cc0060
        ret = 1
        mod = 0x500000000
        ms = 0
        __func__ = "run_actions"
#22 0x000000000041b344 in do_action (h=0xffffc151c308, a=0xffff89cda6d0, msg=0xffff89edb0e0) at action.c:712
        ret = -5
        v = 1
        dst = {send_sock = 0xffffffff, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\350\217H\211\377\377\000"}, sin = {sin_family = 0,
              sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\350\217H\211\377\377\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
              sin6_addr = {__in6_u = {__u6_addr8 = "\350\217H\211\377\377\000\000\025\000\000\000\000\000\000", __u6_addr16 = {36840, 35144, 65535, 0, 21, 0, 0,
                    0}, __u6_addr32 = {2303234024, 65535, 21, 0}}}, sin6_scope_id = 3243357184}}, id = 65535, proto = 228 '\344', send_flags = {f = 150 '\226',
            blst_imask = 102 'f'}}
        tmp = 0xffffc151ba10 "\001"
        new_uri = 0xffffc151b4e0 "P\202\315\211\377\377"
        end = 0xffff89cc51f8 "\002"
        crt = 0xffff89ccfe30 "\001"
        cmd = 0xffff89ccfe38
        len = 0
        user = 1782988809
        uri = {user = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, passwd = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, host = {s = 0x0, len = -1980911392}, port = {
            s = 0xffff89ccfce8 "\314\003", len = -1051610496}, params = {s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>,
            len = -1849245812}, sip_params = {s = 0x91d56000 <error: Cannot access memory at address 0x91d56000>, len = 1077747920}, headers = {
            s = 0x191d54000 <error: Cannot access memory at address 0x191d54000>, len = 0}, port_no = 46064, proto = 49489, type = 65535,
          flags = (unknown: 5936264), transport = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1980911392}, ttl = {
            s = 0xffff89ccfce8 "\314\003", len = -1051606264}, user_param = {s = 0x0, len = 1}, maddr = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 8380216}, method = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr = {s = 0x0, len = 0}, r2 = {
            s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0xffffc151b1d0 "P\262Q\301\377\377", len = 336530744}, ttl_val = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = -719561672}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0,
            len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>, len = 32}, gr_val = {s = 0xffff91c00b00 " \022\300\221\377\377",
            len = -1051608560}}
        next_hop = {user = {s = 0xffffc151b0b0 "h\207\304\211\377\377", len = 4382880}, passwd = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 0}, host = {s = 0xffffc151b130 "\320\262Q\301\377\377", len = 5805596}, port = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 8380216}, params = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, sip_params = {
            s = 0xffff89c48768 "\250\320q\211\377\377", len = 4386112}, headers = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216},
          port_no = 57306, proto = 12529, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 1782988808), transport = {
            s = 0xffffc151b150 "8\335\314\211\377\377", len = -1980911392}, ttl = {s = 0xffff89ccdd38 "\307\003", len = -1051610784}, user_param = {
            s = 0xffffc151b560 "\207", len = 5006156}, maddr = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, method = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr = {s = 0xffffc151b2d0 "", len = -1983057000}, r2 = {
            s = 0xffff89edb0e0 "\006", len = -1051606264}, gr = {s = 0xffff89ccdd38 "\307\003", len = -1051606264}, transport_val = {s = 0x0, len = 1}, ttl_val = {
            s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, user_param_val = {s = 0xffffc151b1d0 "P\262Q\301\377\377", len = 4382880},
          maddr_val = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0xffffc151b0b0 "h\207\304\211\377\377", len = 336530744}, gr_val = {s = 0xffffc151b250 "\360\263Q\301\377\377", len = 4386112}}
        u = 0x30f1dfda
        port = 0
        dst_host = 0xffffc151c308
        i = 3
        flags = 0
        avp = 0x87
        st = {flags = 3243361032, id = 65535, name = {n = 0, s = {s = 0x0, len = -1}, re = 0x0}, avp = 0x87}
        sct = 0x87
        sjt = 0x1
        rve = 0xffff89cd8250
        mct = 0xffffc151b450
        rv = 0xffff89cc8880
        rv1 = 0x41ec6c <do_action+35204>
        c1 = {cache_type = 5928904, val_type = RV_NONE, c = {avp_val = {n = -1051611072, s = {
                s = 0xffffffffc151b040 <error: Cannot access memory at address 0xffffffffc151b040>, len = 0}, re = 0xffffffffc151b040}, pval = {rs = {
                s = 0xffffffffc151b040 <error: Cannot access memory at address 0xffffffffc151b040>, len = 0}, ri = -1051610704, flags = 1}},
          i2s = "\210\224Z", '\000' <repeats 13 times>, "\340\260\355\211\377\377"}
        s = {s = 0x6800000000 <error: Cannot access memory at address 0x6800000000>, len = -1051611120}
        srevp = {0xffffc151b040, 0xffffc151b3f8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST,
            u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
              data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#23 0x000000000042e4f4 in run_actions (h=0xffffc151c308, a=0xffff89cd3dd0, msg=0xffff89edb0e0) at action.c:1583
        t = 0xffff89cda6d0
        ret = 1
        mod = 0x1
        ms = 0
        __func__ = "run_actions"
#24 0x000000000041f148 in do_action (h=0xffffc151c308, a=0xffff89cda960, msg=0xffff89edb0e0) at action.c:1079
        ret = 1
        v = 1
        dst = {send_sock = 0x1d00000002, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\200p\000\000\000\000\000"}, sin = {sin_family = 0,
              sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\200p\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
              sin6_addr = {__in6_u = {__u6_addr8 = "\200p\000\000\000\000\000\000\240\"0@\000\000\000", __u6_addr16 = {28800, 0, 0, 0, 8864, 16432, 0, 0},
                  __u6_addr32 = {28800, 0, 1076896416, 0}}}, sin6_scope_id = 3243359008}}, id = 65535, proto = 0 '\000', send_flags = {f = 37 '%',
            blst_imask = 72 'H'}}
        tmp = 0xffffc151c090 ""
        new_uri = 0xffffc151fdc6 "/var/Olympus/kamailio.cfg"
        end = 0xffff89c5f350 ""
        crt = 0xffff89ca8b68 "\001"
        cmd = 0x0
        len = 2
        user = 1782988809
        uri = {user = {s = 0xffff91d56000 <initial_quick+456> "", len = 1077747920}, passwd = {s = 0xffff91d54000 <realloc@got.plt> "\250?\311\221\377\377",
            len = 32}, host = {s = 0xffff91c00b00 " \022\300\221\377\377", len = -1051608560}, port = {
            s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 0}, params = {s = 0xffff89488fe8 "%s: %s%s:%d:%.*s", len = 21},
          sip_params = {s = 0xffffc151b8e0 "", len = -1848750100}, headers = {s = 0xffff91d56000 <initial_quick+456> "", len = 1077747920}, port_no = 47328,
          proto = 49489, type = 65535, flags = (unknown: 0), transport = {s = 0xffffc151ba00 " \273Q\301\377\377", len = -1848749588}, ttl = {
            s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, user_param = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {
            s = 0x0, len = 0}, r2 = {s = 0xffffc151bb00 "\332\337\361\060", len = -1051608320}, gr = {s = 0xffffc151bad0 "0\337\177", len = -48}, transport_val = {
            s = 0xffffc151ba30 "", len = -1051608528}, ttl_val = {s = 0x5a6fd201 <error: Cannot access memory at address 0x5a6fd201>, len = 1077748512},
          user_param_val = {s = 0x82 <error: Cannot access memory at address 0x82>, len = 0}, maddr_val = {
            s = 0x2564253a73257325 <error: Cannot access memory at address 0x2564253a73257325>, len = 115}, method_val = {
            s = 0x65706c656874616e <error: Cannot access memory at address 0x65706c656874616e>, len = 1077748512}, lr_val = {s = 0x0, len = -256}, r2_val = {
            s = 0x0, len = 37}, gr_val = {s = 0x1e0000000a <error: Cannot access memory at address 0x1e0000000a>, len = 0}}
        next_hop = {user = {s = 0xffffc151b7d0 "0\270Q\301\377\377", len = -1848950520}, passwd = {s = 0xffffc151b9c8 "%", len = 15}, host = {s = 0x403d232c "",
            len = 0}, port = {s = 0xffff91d3e51f "T ", len = -1848297408}, params = {s = 0xffff91d39748 "%H:%M:%S", len = 8187}, sip_params = {s = 0x403d232c "",
            len = 1077748532}, headers = {s = 0xffffc151b7d0 "0\270Q\301\377\377", len = -1849087388}, port_no = 8976, proto = 16445, type = ERROR_URI_T,
          flags = (unknown: 2446674336), transport = {s = 0x90 <error: Cannot access memory at address 0x90>, len = 144}, ttl = {
            s = 0x1f81 <error: Cannot access memory at address 0x1f81>, len = 8208}, user_param = {s = 0x403d4320 "", len = 0}, maddr = {
            s = 0xffff89488fe8 "%s: %s%s:%d:%.*s", len = 21}, method = {s = 0xffffc151b860 "", len = -1849080668}, lr = {s = 0xffff91d549a0 <main_arena> "",
            len = 121968}, r2 = {s = 0x2000 <error: Cannot access memory at address 0x2000>, len = -1848295424}, gr = {s = 0xffffc151b830 " \024\325\221\377\377",
            len = -1849081660}, transport_val = {s = 0x403d2320 "", len = 131}, ttl_val = {s = 0x403d2310 "\260#=@", len = 144}, user_param_val = {
            s = 0xffff91d549a0 <main_arena> "", len = 8208}, maddr_val = {s = 0xffffc151b8a0 "\350\217H\211\377\377", len = -1849167692}, method_val = {
            s = 0x403d20d0 "\002", len = 0}, lr_val = {s = 0xffff91d51420 <_IO_mem_jumps> "", len = 32}, r2_val = {s = 0xffff91c00b00 " \022\300\221\377\377",
            len = -1051608560}, gr_val = {s = 0xffffc151b8e0 "", len = -1848750328}}
        u = 0x30f1dfda
        port = 0
        dst_host = 0x6a464009
        i = 55
        flags = 65535
        avp = 0xffff89ed1ad8
        st = {flags = 0, id = 0, name = {n = 8497288, s = {s = 0x81a888 "%s: %s%s(): final buffer length %d\n", len = 21}, re = 0x81a888}, avp = 0xffffc151b790}
        sct = 0x2525252525252525
        sjt = 0xffffff80ffffffd0
        rve = 0xffff89ccfe30
        mct = 0xffffc151bad0
        rv = 0x403d4320
        rv1 = 0xffff89edb0e0
        c1 = {cache_type = 2445879908, val_type = 65535, c = {avp_val = {n = 1077748496, s = {s = 0x403d2310 "\260#=@", len = -1848292960}, re = 0x403d2310},
            pval = {rs = {s = 0x403d2310 "\260#=@", len = -1848292960}, ri = 128, flags = 0}},
          i2s = "\200\000\000\000\000\000\000\000\221\037\000\000\000\000\000\000\020 \000\000\000"}
        s = {s = 0x403d2334 "", len = -1051609344}
        srevp = {0x1ffb, 0x403d232c}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST,
            u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
              data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#25 0x000000000042e4f4 in run_actions (h=0xffffc151c308, a=0xffff89ccf070, msg=0xffff89edb0e0) at action.c:1583
        t = 0xffff89cda960
        ret = 1
        mod = 0xffff89ca7fd0
        ms = 0
        __func__ = "run_actions"
#26 0x000000000041b344 in do_action (h=0xffffc151c308, a=0xffff89caa7f0, msg=0xffff89edb0e0) at action.c:712
        ret = -5
        v = 0
        dst = {send_sock = 0x403d118c, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\037\345\323\221\377\377\000"}, sin = {sin_family = 0,
              sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\037\345\323\221\377\377\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
              sin6_addr = {__in6_u = {__u6_addr8 = "\037\345\323\221\377\377\000\000@8\325\221\377\377\000", __u6_addr16 = {58655, 37331, 65535, 0, 14400, 37333,
                    65535, 0}, __u6_addr32 = {2446583071, 65535, 2446669888, 65535}}}, sin6_scope_id = 2446563144}}, id = 65535, proto = 251 '\373', send_flags = {
            f = 31 '\037', blst_imask = 0 '\000'}}
        tmp = 0xffff91ce4fec <__vsyslog_chk+892> "@\367\377\266g\202\066\221\347\200@\271\207\366\377\064\377\376\377\227g\202\066\221\002"
        new_uri = 0xffff91d549a0 <main_arena> ""
        end = 0x90 <error: Cannot access memory at address 0x90>
        crt = 0x87 <error: Cannot access memory at address 0x87>
        cmd = 0xffff89c51ce8
        len = 0
        user = 4382880
        uri = {user = {s = 0x403d3180 "", len = 0}, passwd = {s = 0x872200 "%s: %s%s(): header field type %d, name=<%.*s>, body=<%.*s>\n", len = 21}, host = {
            s = 0xffffc151bfc0 "\250/\207", len = -1849080668}, port = {s = 0xffffc151c000 "`\300Q\301\377\377", len = -1848950520}, params = {
            s = 0xffffc151c1f8 "\005", len = 15}, sip_params = {s = 0x403d118c "", len = 0}, headers = {s = 0xffff91d3e51f "T ", len = -1848297408},
          port_no = 38728, proto = 37331, type = 65535, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 8184), transport = {s = 0x403d118c "",
            len = 1077744020}, ttl = {s = 0xffffc151c000 "`\300Q\301\377\377", len = -1849087388}, user_param = {s = 0x403d1170 "", len = -1848292960}, maddr = {
            s = 0x80 <error: Cannot access memory at address 0x80>, len = 128}, method = {s = 0x1f91 <error: Cannot access memory at address 0x1f91>, len = 8208},
          lr = {s = 0x403d3180 "", len = 0}, r2 = {s = 0x872fa8 "%s: %s%s(): exiting parse_msg\n", len = 21}, gr = {s = 0xffffc151c090 "", len = -1849080668},
          transport_val = {s = 0xffff91d549a0 <main_arena> "", len = 126496}, ttl_val = {s = 0x2000 <error: Cannot access memory at address 0x2000>,
            len = -1848295424}, user_param_val = {s = 0xffffc151c060 "\214\021=@", len = -1849081660}, maddr_val = {s = 0x403d1180 "", len = 112}, method_val = {
            s = 0x403d1170 "", len = 128}, lr_val = {s = 0xffff91d549a0 <main_arena> "", len = 8208}, r2_val = {s = 0xffffc151c130 "\350\034\305\211\377\377",
            len = -1848950520}, gr_val = {s = 0xffffc151c328 "\332\337\361\060", len = 15}}
        next_hop = {user = {s = 0xffff91d344c0 <step4_jumps> "", len = -1}, passwd = {s = 0xffff91c65a28 <vfprintf+4472> "\247\034", len = 0}, host = {
            s = 0xbd0 <error: Cannot access memory at address 0xbd0>, len = -1051605968}, port = {s = 0x3 <error: Cannot access memory at address 0x3>,
            len = -1051605920}, params = {s = 0xffffffe8ffffff80 <error: Cannot access memory at address 0xffffffe8ffffff80>, len = -1051605920}, sip_params = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0,
          type = ERROR_URI_T, flags = (unknown: 8513280), transport = {s = 0x0, len = 0}, ttl = {s = 0xffffc151bfb0 "\200\061=@", len = -1051607120},
          user_param = {s = 0xffffc151bf80 "p\021=@", len = -48}, maddr = {s = 0x3e732a2e253c203d <error: Cannot access memory at address 0x3e732a2e253c203d>,
            len = -1051605920}, method = {s = 0xffffc151c460 "", len = -1051605968}, lr = {
            s = 0xffffff80ffffffd0 <error: Cannot access memory at address 0xffffff80ffffffd0>, len = 0}, r2 = {s = 0xffffc151bf30 "\214\021=@",
            len = -1848950520}, gr = {s = 0xffffc151c128 "", len = 15}, transport_val = {s = 0x403d118c "", len = 0}, ttl_val = {s = 0xffff91d3e51f "T ",
            len = -1848297408}, user_param_val = {s = 0xffff91d39748 "%H:%M:%S", len = 8187}, maddr_val = {s = 0x403d118c "", len = 1077744020}, method_val = {
            s = 0xffffc151bf30 "\214\021=@", len = -1849087388}, lr_val = {s = 0x403d1170 "", len = -1848292960}, r2_val = {
            s = 0xd0 <error: Cannot access memory at address 0xd0>, len = 208}, gr_val = {s = 0x1f41 <error: Cannot access memory at address 0x1f41>, len = 8208}}
        u = 0xffffc151c250
        port = 0
        dst_host = 0x403d0f30
        i = 5
        flags = 0
        avp = 0xffffffff
        st = {flags = 3243359704, id = 65535, name = {n = 11, s = {s = 0xb <error: Cannot access memory at address 0xb>, len = 0}, re = 0xb}, avp = 0x8889e8}
        sct = 0x1f81
        sjt = 0x90
        rve = 0xffff89ca8b68
        mct = 0x90
        rv = 0xb
        rv1 = 0xffffc151c370
        c1 = {cache_type = 3243361024, val_type = 65535, c = {avp_val = {n = -48, s = {
                s = 0xffffff80ffffffd0 <error: Cannot access memory at address 0xffffff80ffffffd0>, len = -1848750328}, re = 0xffffff80ffffffd0}, pval = {rs = {
                s = 0xffffff80ffffffd0 <error: Cannot access memory at address 0xffffff80ffffffd0>, len = -1848750328}, ri = -1848287232, flags = 65535}},
          i2s = "@\302Q\301\377\377\000\000\000\000\000\000\377\377\000\000h\353\201\000\000"}
        s = {s = 0xffffc151c330 "\t@Fj", len = -1051606224}
        srevp = {0x15, 0xffff91d51420 <_IO_mem_jumps>}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST,
            u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
              data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#27 0x000000000042e4f4 in run_actions (h=0xffffc151c308, a=0xffff89c69c10, msg=0xffff89edb0e0) at action.c:1583
        t = 0xffff89caa7f0
        ret = 1
        mod = 0x42edbc <run_top_route+68>
        ms = 0
        __func__ = "run_actions"
#28 0x000000000042edf4 in run_top_route (a=0xffff89c69c10, msg=0xffff89edb0e0, c=0x0) at action.c:1669
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {135, 8380216, 821157850, 1782988809, 0, 0, 0, 0, 0, 0, 281473925104208,
                11845808158218849592, 281473925104736, 11845659156157312952, 0, 0, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 0, __saved_mask = {__val = {
                  281473925104656, 6074936, 4611686022722355200, 0, 4611686022722355200, 281472995799264, 0, 4611686018427387904, 281473925104768, 5623960, 135,
                  8380216, 821157850, 1782988809, 4303481704, 281472995799264}}}}}
        p = 0xffffc151c308
        ret = 8380216
        sfbk = 0
#29 0x000000000055d0e4 in receive_msg (
    buf=0x97fc38 <buf> "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob;alias=10.100.92.35:50249~6 SIP/2.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;rport;branch=z-
9hG4bK1284828286\r\nRoute: <sip:10.100.92.222;r2=on;lr=on;nat=ye"..., len=552, rcv_info=0xffffc151c700) at receive.c:216
        msg = 0xffff89edb0e0
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {135, 8380216, 821157850, 1782988809, 0, 0, 0, 0, 0, 0, 281473925104208,
                11845808158218849592, 135, 11845659156157312952, 0, 0, 135, 8380216, 821157850, 0, 0, 167503724544}, __mask_was_saved = 10026040, __saved_mask = {
                __val = {281473925105416, 65535, 55834574851, 3243362056, 281472993081032, 281473925105216, 7090548, 135, 8380216, 821157850, 1782988809,
                  281473925105200, 167510816244, 10026040, 281473925105408, 135}}}}}
        ret = 1
        inb = {
          s = 0x97fc38 <buf> "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob;alias=10.100.92.35:50249~6 SIP/2.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;rport;branch=z9hG4bK1284828286\r\nRoute: <sip:10.100.92.222;r2=on;lr=on;nat=ye"..., len = 552}
        __func__ = "receive_msg"
#30 0x00000000006cbbbc in udp_rcv_loop () at udp_server.c:544
        len = 552
        buf = "BYE sip:8mon17p1@10.100.92.35:50249;transport=ws;ob;alias=10.100.92.35:50249~6 SIP/2.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;rport;branch=z9hG4bK1284828286\r\nRoute: <sip:10.100.92.222;r2=on;lr=on;nat=ye"...
        tmp = 0x98fc38 <buff> "10.100.92.222"
        from = 0xffff89c436c8
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {8030798178131141642, 8297102154720439139}, addr32 = {3730596874, 1869815908, 624782179, 1931819635},
              addr16 = {25610, 56924, 8292, 28531, 27491, 9533, 14963, 29477}, addr = "\nd\\\336d sock=%s:%s"}}, dst_ip = {af = 2, len = 4, u = {addrl = {
                3730596874, 0}, addr32 = {3730596874, 0, 0, 0}, addr16 = {25610, 56924, 0, 0, 0, 0, 0, 0}, addr = "\nd\\\336", '\000' <repeats 11 times>}},
          src_port = 5062, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2,
              sa_data = "\023\306\nd\\\336\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50707, sin_addr = {s_addr = 3730596874},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50707, sin6_flowinfo = 3730596874, sin6_addr = {__in6_u = {
                  __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}},
          bind_address = 0xffff89c42c20, proto = 1 '\001'}
        from_in = {s_addr = 3243362056}
        __func__ = "udp_rcv_loop"
#31 0x00000000004d63b4 in main_loop () at main.c:1629
        i = 7
        pid = 0
        si = 0xffff89c42c20
        si_desc = "udp receiver child=7 sock=10.100.92.222:5060\000]:5060\000\377\377\000\000\020\311Q\301\377\377\000\000\340\310Q\301\377\377\000\000\320\377\377\377\200\377\377\377", '\000' <repeats 16 times>, "ged to %(\004\347\211\377\377\000\000<core> [cfg/cfg_"
        r = 0
        nrprocs = 8
        __func__ = "main_loop"
#32 0x00000000004deea0 in main (argc=12, argv=0xffffc151cba8) at main.c:2581
        cfg_stream = 0x403022b0
        c = -1
        r = 0
        tmp = 0xffffc151fdf2 ""
        tmp_len = 0
        port = 0
        proto = 0
        options = 0x80cac0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
        ret = -1
        seed = 1711791307
        rfd = 291
        debug_save = 4
        debug_flag = 1
        dont_fork_cnt = 0
        n_lst = 0xffff91e0dd98 <_dl_fini>
        p = 0xffff91c3f314 <__libc_start_main+140> "\247\b"
        __func__ = "main"
	

Log Messages

(paste your log messages here)

SIP Traffic

(paste your sip traffic here)

Possible Solutions

Additional Information

version: Kamailio , TEST   (armv41/linux)
flags: STATS: Off, EXTRA_DEBUG, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, DBG_QM_MALLOC, USE_FUTEX, USE_PTHREAD_MUTEX, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.

#uname -a
Linux XXX 4.4.13 #1 SMP PREEMPT Fri Mar 24 10:50:44 CST 2017 aarch64 GNU/Linux
sh kamctl ps

Process::  ID=0 PID=6801 Type=attendant
Process::  ID=1 PID=6802 Type=udp receiver child=0 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=2 PID=6803 Type=udp receiver child=1 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=3 PID=6804 Type=udp receiver child=2 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=4 PID=6805 Type=udp receiver child=3 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=5 PID=6806 Type=udp receiver child=4 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=6 PID=6807 Type=udp receiver child=5 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=7 PID=6808 Type=udp receiver child=6 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=8 PID=6809 Type=udp receiver child=7 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=9 PID=6810 Type=udp receiver child=0 sock=10.100.92.222:5060
Process::  ID=10 PID=6811 Type=udp receiver child=1 sock=10.100.92.222:5060
Process::  ID=11 PID=6812 Type=udp receiver child=2 sock=10.100.92.222:5060
Process::  ID=12 PID=6813 Type=udp receiver child=3 sock=10.100.92.222:5060
Process::  ID=13 PID=6814 Type=udp receiver child=4 sock=10.100.92.222:5060
Process::  ID=14 PID=6815 Type=udp receiver child=5 sock=10.100.92.222:5060
Process::  ID=15 PID=6816 Type=udp receiver child=6 sock=10.100.92.222:5060
Process::  ID=16 PID=6817 Type=udp receiver child=7 sock=10.100.92.222:5060
Process::  ID=17 PID=6818 Type=slow timer
Process::  ID=18 PID=6819 Type=timer
Process::  ID=19 PID=6820 Type=MI FIFO
Process::  ID=20 PID=6821 Type=ctl handler
Process::  ID=21 PID=6822 Type=TIMER NH
Process::  ID=22 PID=6823 Type=Dialog Clean Timer
Process::  ID=23 PID=6824 Type=RTIMER SEC EXEC
Process::  ID=24 PID=6825 Type=RTIMER SEC EXEC
Process::  ID=25 PID=6826 Type=ASYNC MOD TIMER
Process::  ID=26 PID=6827 Type=tcp receiver (generic) child=0
Process::  ID=27 PID=6828 Type=tcp receiver (generic) child=1
Process::  ID=28 PID=6829 Type=tcp receiver (generic) child=2
Process::  ID=29 PID=6830 Type=tcp receiver (generic) child=3
Process::  ID=30 PID=6831 Type=tcp receiver (generic) child=4
Process::  ID=31 PID=6832 Type=tcp receiver (generic) child=5
Process::  ID=32 PID=6833 Type=tcp receiver (generic) child=6
Process::  ID=33 PID=6834 Type=tcp receiver (generic) child=7
Process::  ID=34 PID=6835 Type=tcp receiver (tls:10.100.92.222:10443) child=8
Process::  ID=35 PID=6836 Type=tcp receiver (tls:10.100.92.222:10443) child=9
Process::  ID=36 PID=6837 Type=tcp receiver (tls:10.100.92.222:10443) child=10
Process::  ID=37 PID=6838 Type=tcp receiver (tls:10.100.92.222:10443) child=11
Process::  ID=38 PID=6839 Type=tcp receiver (tls:10.100.92.222:10443) child=12
Process::  ID=39 PID=6840 Type=tcp receiver (tls:10.100.92.222:10443) child=13
Process::  ID=40 PID=6841 Type=tcp receiver (tls:10.100.92.222:10443) child=14
Process::  ID=41 PID=6842 Type=tcp receiver (tls:10.100.92.222:10443) child=15
Process::  ID=42 PID=6843 Type=tcp receiver (tcp:10.100.92.222:10080) child=16
Process::  ID=43 PID=6844 Type=tcp receiver (tcp:10.100.92.222:10080) child=17
Process::  ID=44 PID=6845 Type=tcp receiver (tcp:10.100.92.222:10080) child=18
Process::  ID=45 PID=6846 Type=tcp receiver (tcp:10.100.92.222:10080) child=19
Process::  ID=46 PID=6847 Type=tcp receiver (tcp:10.100.92.222:10080) child=20
Process::  ID=47 PID=6848 Type=tcp receiver (tcp:10.100.92.222:10080) child=21
Process::  ID=48 PID=6849 Type=tcp receiver (tcp:10.100.92.222:10080) child=22
Process::  ID=49 PID=6850 Type=tcp receiver (tcp:10.100.92.222:10080) child=23

some settings in kamaiio.cfg:


- tcp_connection_lifetime=3605
- tcp_rd_buf_size=8192
- modparam("websocket", "keepalive_mechanism", 0)

# xhttp event route
event_route[xhttp:request] {

        set_reply_close();
        set_reply_no_connect();
...


/etc/sysctl.conf

net.ipv4.tcp_fin_timeout=30
net.ipv4.tcp_tw_reuse=1
net.ipv4.tcp_tw_recycle=0
net.ipv4.tcp_timestamps=0
net.ipv4.tcp_syn_retries=4
net.core.wmem_max=12582912
net.core.rmem_max=12582912
net.ipv4.tcp_rmem= 10240 87380 12582912
net.ipv4.tcp_wmem= 10240 87380 12582912
net.ipv4.tcp_window_scaling = 1
net.ipv4.tcp_timestamps = 1
net.ipv4.tcp_sack = 1
net.ipv4.tcp_no_metrics_save = 1
net.core.netdev_max_backlog = 5000


You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.