Kamailio 5.5.0 -[core/mem/q_malloc.c:501]: qm_free(): BUG: bad pointer crash after upgrading system to Debian 10 (Buster)
Upgrading Kamailio service Debian 10 and crash occurs.
Crash occurs where Json event is sent over the CURL library which works on OpenSSL.
If upgrade curl library 7.76.1 and configure --disable-openssl-auto-load-config ,
and downgrading openssl OpenSSL 1.1.1d --> OpenSSL 1.0.2r no crash occurs !
It was tested on Kamailio 5.5.0 and Kamailio 5.4.2 , result is same
Looks like incompatibilities between CURL , OpenSSL and Kamailio
It is test for Kamailio 5.5.0 and Kamilio 5.4.2, unfortunatelly same crash occurs on both sides.
GNU gdb (Debian 8.2.1-2+b3) 8.2.1
Copyright (C) 2018 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/local/sbin/kamailio...done.
[New LWP 4958]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/local/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /usr/local/etc/ka'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
(gdb)
================================================================================
# GDB session generated by FS backtrace-from-core
================================================================================
================================================================================
# info threads
================================================================================
Id Target Id Frame
* 1 Thread 0x7f10c41f5100 (LWP 4958) 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
================================================================================
# bt
================================================================================
#0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#1 0x00007f10c36877ed in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#2 0x00007f10c3686dc5 in CONF_modules_load () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#3 0x00007f10c368738b in CONF_modules_load_file () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#4 0x00007f10bfd9331e in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
#5 0x00007f10bfd592cf in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
#6 0x00007f10bfd59598 in curl_easy_init () from /lib/x86_64-linux-gnu/libcurl.so.4
#7 0x00007f10bfdfa9f4 in vg_call_event_api (pjson=0x7ffc6386abf0 "{\"version\":\"1.0\",\"eventcode\":\"300\",\"data\":{\"ip_address\":\"56.100.82.107\",\"username\":\"1007\",\"apiuserkey\":\"7f813a24-83e1-bc34-d4d1-293a4f84c5f6\"}}", event_url=...) at event.c:52
#8 0x00007f10bfdfae0d in vg_send_notallowed_user_from_ip_event (eventCode=300, szIpAddress=0x55fedfe1b4c0 <buff> "56.100.82.107", szUserName=0x7ffc6386ba60 "1007", szApiUserKey=0x7ffc6386b970 "7f813a24-83e1-bc34-d4d1-293a4f84c5f6") at event.c:139
#9 0x00007f10bfde867a in vg_digest_authenticate_hdr (msg=0x7f10c3f80908, realm=0x7ffc6386bd20, hftype=HDR_AUTHORIZATION_T, method=0x7f10c3f80930, ahdr=0x7ffc6386bd18) at vg_auth.c:431
#10 0x00007f10bfde8d60 in w_vg_auth (pmsg=0x7f10c3f80908) at vg_auth.c:530
#11 0x000055fedf920f8f in do_action (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1076
#12 0x000055fedf92f857 in run_actions (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1581
#13 0x000055fedf92ff45 in run_actions_safe (h=0x7ffc6386e3a0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1645
#14 0x000055fedf8e209c in rval_get_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, i=0x7ffc6386ca64, rv=0x7f10c3c30c28, cache=0x0) at core/rvalue.c:949
#15 0x000055fedf8e7293 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386ca64, rve=0x7f10c3c30c20) at core/rvalue.c:1947
#16 0x000055fedf8e7719 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386cf9c, rve=0x7f10c3c31350) at core/rvalue.c:1955
#17 0x000055fedf920a0a in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c31ef0, msg=0x7f10c3f80908) at core/action.c:1052
#18 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3c225b8, msg=0x7f10c3f80908) at core/action.c:1581
#19 0x000055fedf920efb in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c37010, msg=0x7f10c3f80908) at core/action.c:1067
#20 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3bf94d8, msg=0x7f10c3f80908) at core/action.c:1581
#21 0x000055fedf91d0ee in do_action (h=0x7ffc6386e3a0, a=0x7f10c3ac9fd0, msg=0x7f10c3f80908) at core/action.c:700
#22 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3ac9b60, msg=0x7f10c3f80908) at core/action.c:1581
#23 0x000055fedf93000d in run_top_route (a=0x7f10c3ac9b60, msg=0x7f10c3f80908, c=0x0) at core/action.c:1666
#24 0x000055fedfaa8603 in receive_msg (buf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908) at core/receive.c:501
#25 0x000055fedfb6c007 in receive_tcp_msg (tcpbuf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908, con=0x7f10a11dc8f0) at core/tcp_read.c:1383
#26 0x000055fedfb6e8d3 in tcp_read_req (con=0x7f10a11dc8f0, bytes_read=0x7ffc6386ea84, read_flags=0x7ffc6386ea7c) at core/tcp_read.c:1607
#27 0x000055fedfb730ec in handle_io (fm=0x7f10c3f93428, events=1, idx=-1) at core/tcp_read.c:1857
#28 0x000055fedfb5dd3a in io_wait_loop_epoll (h=0x55fedfe32220 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
#29 0x000055fedfb74c0e in tcp_receive_loop (unix_sock=89) at core/tcp_read.c:1978
#30 0x000055fedf9f8f73 in tcp_init_children (woneinit=0x7ffc6386ee3c) at core/tcp_main.c:5139
#31 0x000055fedf8b8d96 in main_loop () at main.c:1857
#32 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
================================================================================
# bt full
================================================================================
#0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#1 0x00007f10c36877ed in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#2 0x00007f10c3686dc5 in CONF_modules_load () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#3 0x00007f10c368738b in CONF_modules_load_file () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#4 0x00007f10bfd9331e in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
No symbol table info available.
#5 0x00007f10bfd592cf in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
No symbol table info available.
#6 0x00007f10bfd59598 in curl_easy_init () from /lib/x86_64-linux-gnu/libcurl.so.4
No symbol table info available.
#7 0x00007f10bfdfa9f4 in vg_call_event_api (pjson=0x7ffc6386abf0 "{\"version\":\"1.0\",\"eventcode\":\"300\",\"data\":{\"ip_address\":\"56.100.82.107\",\"username\":\"1007\",\"apiuserkey\":\"7f813a24-83e1-bc34-d4d1-293a4f84c5f6\"}}", event_url=...) at event.c:52
__func__ = "vg_call_event_api"
curl = 0x7ffc6386ac90
#8 0x00007f10bfdfae0d in vg_send_notallowed_user_from_ip_event (eventCode=300, szIpAddress=0x55fedfe1b4c0 <buff> "56.100.82.107", szUserName=0x7ffc6386ba60 "1007", szApiUserKey=0x7ffc6386b970 "7f813a24-83e1-bc34-d4d1-293a4f84c5f6") at event.c:139
szDataBuffer = "{\"version\":\"1.0\",\"eventcode\":\"300\",\"data\":{\"ip_address\":\"56.100.82.107\",\"username\":\"1007\",\"apiuserkey\":\"7f813a24-83e1-bc34-d4d1-293a4f84c5f6\"}}", '\000' <repeats 350 times>
#9 0x00007f10bfde867a in vg_digest_authenticate_hdr (msg=0x7f10c3f80908, realm=0x7ffc6386bd20, hftype=HDR_AUTHORIZATION_T, method=0x7f10c3f80930, ahdr=0x7ffc6386bd18) at vg_auth.c:431
iExtType = 100
chRegister = 0 '\000'
IsRegistered = 0 '\000'
chGlobalAllowedIp = 0 '\000'
chSiptrunk = 0 '\000'
IsAllowed = 0 '\000'
chAllow = 1 '\001'
chRegisterEventEnabled = 1 '\001'
res = 0x7f10c3dc9a38
rest = 0x0
pCon = 0x7f10c3e227a8
resp = "\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\300\274\206c\374\177\000\000x#\336\277\020\177\000\000"
hent = "\000\000\000\000\000\000\000\000\207\204\343\277\000\000\000\000\223\260\321\337\376U\000\000\210\246\202\237\020\177\000\000"
password = {s = 0x0, len = -1012242104}
ha1 = "\000\000\000\000\000\000\000\000\220\274\206c\374\177\000\000H\274\206c\374\177\000\000\b\t\370\303\020\177", '\000' <repeats 18 times>, "\060\274\206c\374\177\000\000\260\274\206c\374\177", '\000' <repeats 58 times>, "\210\246\202\237\020\177\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\000\274\206c\374\177\000\000\343J\257\337\376U\000\000\000\000\000\000\000\000\000\000\220\274\206c\374\177\000\000\060\274\206c\374\177\000\000"...
szUserName = "1007", '\000' <repeats 70 times>
szPassword = '\000' <repeats 79 times>
szDomain = "mahmut.voip.com", '\000' <repeats 63 times>
szApiUserKey = "7f813a24-83e1-bc34-d4d1-293a4f84c5f6", '\000' <repeats 43 times>
szQuery = "SELECT 1::integer as tt , ex.username::text , ex.password::text , ex.exttype::integer , ep.param_value::text as tt2 , ep2.param_value::text , lc.id::integer , ( SELECT COUNT( type ) FROM vg_ipaccepts"...
h = 0x7f10c3e20ad0
cred = 0x7f10c3e21020
cd = 0x7f10c2af3cf7 <pv_get_ruri_attr>
ret = -3
iTenantNo = 1293
iExt = 7
iSub = 0
iRealmLen = 17
iUserLen = 10
pIP = 0x55fedfe1b4c0 <buff> "56.100.82.107"
__func__ = "vg_digest_authenticate_hdr"
chIsTrunk = 0 '\000'
#10 0x00007f10bfde8d60 in w_vg_auth (pmsg=0x7f10c3f80908) at vg_auth.c:530
srealm = {s = 0x7ffc6386bce0 "mahmut.voip.com", len = 16}
ret = -1
hdr = 0x7f10c3e20ad0
uri = 0x0
turi = 0x0
furi = 0x0
szDomain = "mahmut.voip.com\000\276\206c\374\177\000\000\234 \216\337\376U", '\000' <repeats 19 times>
#11 0x000055fedf920f8f in do_action (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1076
ret = -5
v = 0
dst = {send_sock = 0x55fedfd1b093, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000\214\302\206c\374\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\214\302\206c\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\214\302\206c\374\177\000\000\034\256Nd\026\000\000", __u6_addr16 = {49804, 25478, 32764, 0, 44572, 25678, 22, 0}, __u6_addr32 = {1669776012, 32764, 1682877980, 22}}}, sin6_scope_id = 3756532656}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000\214\302\206c\374\177\000\000\034\256Nd\026\000\000\000\260#\350\337\376U\000\000\000\000\000\000\000\000\000\000\f\000\000\000\000\000\000\000s\374d\303\000\000\000\000\346\000\000\000\000\000\000\000\005", '\000' <repeats 15 times>, "+\302\206c\374\177\000\000\005\000\000\000\000\000\000\000\005\000\000\000\000\000\000\000\005", '\000' <repeats 11 times>, "\017\000\000", __ss_align = 4294967296}}, id = -1618827640, send_flags = {f = 32528, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
tmp = 0x55fedf8e237e <rval_get_int+1054> "\351\250\003"
new_uri = 0x0
end = 0x0
crt = 0x7ffc6386c4f0 "`Ɔc\374\177"
cmd = 0x7f10c3ab6470
len = 32764
user = 1669776480
uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 230, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 3279052244), transport = {s = 0x7f10a16c86c0 "(", len = -1586934880}, ttl = {s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = -1586934560}, user_param = {s = 0x7f10a1694d00 "\036\033\373\005\\^\247\312\066_J\241ٰ\020\006\275N\341ZX\230\034\344\317䉲\222\376\223\273(D\261\244\205\356\267\314r\252h\350\312f\217_\016\034K\226L\212\026\232 }\217\344罋kr\216[\212裑ؖ\334f\204\253`\265e.a\304r\253\067\235\361\344R=\016C\303$\275", len = -1015910656}, maddr = {s = 0x0, len = -1618827640}, method = {s = 0x0, len = -1003578192}, lr = {s = 0x55fedfd1b093 "INFO", len = 536870912}, r2 = {s = 0x7ffc6386c270 " Ɇc\374\177", len = -544311144}, gr = {s = 0x7f10a1009978 "\340\346\204\303\020\177", len = -1618827640}, transport_val = {s = 0x0, len = -1003578192}, ttl_val = {s = 0x7f10c3c2ace0 "\017", len = 1669777244}, user_param_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, maddr_val = {s = 0x7f10a1296790 "T", len = -1007154936}, method_val = {s = 0x7f10c3c16930 "\305\004", len = 1669784480}, lr_val = {s = 0x0, len = -1}, r2_val = {s = 0x7f109f82a688 "", len = 20229660}, gr_val = {s = 0x0, len = -1003578192}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 1669775904}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = -539810039}, user_param = {s = 0x12500000187 <error: Cannot access memory at address 0x12500000187>, len = -539810039}, maddr = {s = 0x143000001ff <error: Cannot access memory at address 0x143000001ff>, len = -1081640172}, method = {s = 0x7f10a16c8630 "(", len = -1618827640}, lr = {s = 0x0, len = -1003578192}, r2 = {s = 0x55fedfd1b093 "INFO", len = 536870912}, gr = {s = 0x7ffc6386c100 "p\302\206c\374\177", len = -544311477}, transport_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, ttl_val = {s = 0x7ffc6386c140 "\b\t\370\303\020\177", len = -544016297}, user_param_val = {s = 0x7f10c3c2a5b0 "\004", len = 1669775904}, maddr_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1007154936}, lr_val = {s = 0x7f10c3c16930 "\305\004", len = 1669775728}, r2_val = {s = 0x7ffc6386c110 "x\231", len = -1016937788}, gr_val = {s = 0x0, len = 0}}
u = 0x55fedfd1b093
port = 0
dst_host = 0x55fedfd1b093
i = -542149130
flags = 0
avp = 0x0
st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
sct = 0x7f10c3c1ad08
sjt = 0x55fedf920a0a <do_action+36269>
rve = 0x7f10c3e1ab18
mct = 0x7ffc6386c920
rv = 0x7ffc6386e3a0
rv1 = 0x7f109f82a688
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = "\200\236\302\303\020\177\000\000\264\300\206c\374\177\000\000\b\t\370\303\020\177"}
s = {s = 0x7ffc6386bf90 "", len = -544312685}
srevp = {0x55fedfd1b093, 0x20000000}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#12 0x000055fedf92f857 in run_actions (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1581
t = 0x7f10c3c309b0
ret = -1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = -1013718290, tz_dsttime = 32528}
tdiff = 2489880
__func__ = "run_actions"
#13 0x000055fedf92ff45 in run_actions_safe (h=0x7ffc6386e3a0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1645
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {139709372343944, -3845379250411229668, 0, 139709987593392, 94553165115539, 536870912, -3845379250360898020, -7014620463946093028}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 0, 139709372343944, 0, 139709987593392, 94553165115539, 536870912, 140721978263504, 94553160710168, 139709982158504, 139709978193936, 140721978263264, 139709965129784, 139709980502408}}}}}
ret = 1669777648
ign_on_break = 0
#14 0x000055fedf8e209c in rval_get_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, i=0x7ffc6386ca64, rv=0x7f10c3c30c28, cache=0x0) at core/rvalue.c:949
r_avp = 0x800600000020
avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 2490832}, re = 0x1}
pval = {rs = {s = 0x7ffc6386c7a0 "\377\377\377\377\374\177", len = -1026041800}, ri = -1009012800, flags = 32528}
tmp = {s = 0x7f10c3dc9a00 "H\a", len = -1012977648}
s = 0x0
r = 0
ret = 0
destroy_pval = 0
__func__ = "rval_get_int"
#15 0x000055fedf8e7293 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386ca64, rve=0x7f10c3c30c20) at core/rvalue.c:1947
i1 = 0
i2 = 0
ret = -1
c1 = {cache_type = 3284315360, val_type = 32528, c = {avp_val = {n = 1669779356, s = {s = 0x7ffc6386cf9c "\001", len = 0}, re = 0x7ffc6386cf9c}, pval = {rs = {s = 0x7ffc6386cf9c "\001", len = 0}, ri = -1003578192, flags = 32528}}, i2s = "\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\200Ɇc\374\177"}
c2 = {cache_type = 1669777792, val_type = 32764, c = {avp_val = {n = -541436525, s = {s = 0x55fedfba5593 <qm_free+7942> "\353\a\220\353\004\220\353\001\220H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>, len = -1008952776}, re = 0x55fedfba5593 <qm_free+7942>}, pval = {rs = {s = 0x55fedfba5593 <qm_free+7942> "\353\a\220\353\004\220\353\001\220H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>, len = -1008952776}, ri = -1012977648, flags = 32528}}, i2s = "]\346\223\303\020\177\000\000\020\060\237Ë\000\000\000(\354\223\303\020\177"}
rv1 = 0xc39f4240
rv2 = 0x29c39f3980
__func__ = "rval_expr_eval_int"
#16 0x000055fedf8e7719 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386cf9c, rve=0x7f10c3c31350) at core/rvalue.c:1955
i1 = 0
i2 = -539905901
ret = -1
c1 = {cache_type = 1669778112, val_type = 32764, c = {avp_val = {n = -1013256867, s = {s = 0x7f10c39aed5d <db_postgres_free_result+1788> "\270", len = -1008594912}, re = 0x7f10c39aed5d <db_postgres_free_result+1788>}, pval = {rs = {s = 0x7f10c39aed5d <db_postgres_free_result+1788> "\270", len = -1008594912}, ri = -1008588888, flags = 32528}}, i2s = '\000' <repeats 21 times>}
c2 = {cache_type = 1669778128, val_type = 32764, c = {avp_val = {n = -1008588888, s = {s = 0x7f10c3e227a8 "", len = 1669777920}, re = 0x7f10c3e227a8}, pval = {rs = {s = 0x7f10c3e227a8 "", len = 1669777920}, ri = -1618827640, flags = 32528}}, i2s = "\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U"}
rv1 = 0x7ffc6386d2c8
rv2 = 0x7f10c39a83df <db_postgres_submit_query>
__func__ = "rval_expr_eval_int"
#17 0x000055fedf920a0a in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c31ef0, msg=0x7f10c3f80908) at core/action.c:1052
ret = -5
v = 1
dst = {send_sock = 0x203d3e3e2070695f, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\060\320\300\303\020\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "0\320\300\303\020\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "0\320\300\303\020\177\000\000\244҆c\374\177\000", __u6_addr16 = {53296, 50112, 32528, 0, 53924, 25478, 32764, 0}, __u6_addr32 = {3284193328, 32528, 1669780132, 32764}}}, sin6_scope_id = 3287812360}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\060\320\300\303\020\177\000\000\244҆c\374\177\000\000\b\t\370\303\020\177\000\000\240\343\206c\374\177\000\000UNT(callid)::integer , '' , \017\000\000\000ROM vg_p\210\246\202\237\020\177\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \020\000\000", __ss_align = 17179869185}}, id = 1669780132, send_flags = {f = 32764, blst_imask = 0}, proto = 36 '$', proto_pad0 = -48 '\320', proto_pad1 = 25478}
tmp = 0x7f10c3bf99c8 "\002"
new_uri = 0x7f10c3bf9890 "\001"
end = 0x7ffc6386d190 ""
crt = 0x7f10c3bf9a60 "\a"
cmd = 0x7f10c3c18828
len = 22014
user = -543945635
uri = {user = {s = 0x2064696b6e757274 <error: Cannot access memory at address 0x2064696b6e757274>, len = 807419169}, passwd = {s = 0xffffffff70692064 <error: Cannot access memory at address 0xffffffff70692064>, len = 0}, host = {s = 0x7f10c3c16b70 "\004", len = 1669779764}, port = {s = 0x7f10c3f80908 "\b", len = 1669784480}, params = {s = 0x55fedfd1b093 "INFO", len = 536870912}, sip_params = {s = 0x7ffc6386cee0 "\b\t\370\303\020\177", len = -544014523}, headers = {s = 0x46202727202c2027 <error: Cannot access memory at address 0x46202727202c2027>, len = -1007154936}, port_no = 52720, proto = 50112, type = 32528, flags = (unknown: 1669784480), transport = {s = 0x0, len = -1}, ttl = {s = 0x7f109f82a688 "", len = 404008476}, user_param = {s = 0x0, len = -1003578192}, maddr = {s = 0x55fedfd1b093 "INFO", len = 536870912}, method = {s = 0xcaa277f21b14ae1c <error: Cannot access memory at address 0xcaa277f21b14ae1c>, len = 1682877980}, lr = {s = 0x204d4f5200000000 <error: Cannot access memory at address 0x204d4f5200000000>, len = 1633642358}, r2 = {s = 0x0, len = 0}, gr = {s = 0x3d206e69616d6f64 <error: Cannot access memory at address 0x3d206e69616d6f64>, len = -1618827640}, transport_val = {s = 0x0, len = -1003578192}, ttl_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, user_param_val = {s = 0x7ffc6386d010 "\200цc\374\177", len = -544312685}, maddr_val = {s = 0x2072656765746e69 <error: Cannot access memory at address 0x2072656765746e69>, len = 656875564}, method_val = {s = 0x76204d4f52462027 <error: Cannot access memory at address 0x76204d4f52462027>, len = 1885953895}, lr_val = {s = 0x7f10c3c16b68 "\001", len = 1669779764}, r2_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, gr_val = {s = 0x55fedfe823b0 <ut_buf_int2str> "", len = 0}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffc6386ccac "\362w\242", <incomplete sequence \312>, len = -1618827640}, host = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, port = {s = 0x55fedfd1b093 "INFO", len = -1618827640}, params = {s = 0x0, len = -1003578192}, sip_params = {s = 0x55fedfd1b093 "INFO", len = 536870912}, headers = {s = 0x7ffc6386cd70 "\240Άc\374\177", len = -544014523}, port_no = 52416, proto = 25478, type = 32764, flags = (unknown: 3287812360), transport = {s = 0x7f10c3c16350 "\302\004", len = 1669784480}, ttl = {s = 0x0, len = 1}, user_param = {s = 0x7f109f82a688 "", len = 460631580}, maddr = {s = 0x0, len = -1003578192}, method = {s = 0x55fedfd1b093 "INFO", len = 536870912}, lr = {s = 0xcaa277f21674ae1c <error: Cannot access memory at address 0xcaa277f21674ae1c>, len = 1682877980}, r2 = {s = 0x7f1000000000 <error: Cannot access memory at address 0x7f1000000000>, len = -1007154936}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x6776204e494f4a20 <error: Cannot access memory at address 0x6776204e494f4a20>, len = -1618827640}, ttl_val = {s = 0x0, len = -1003578192}, user_param_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, maddr_val = {s = 0x7ffc6386cea0 "\020Іc\374\177", len = -544312685}, method_val = {s = 0x20657079742e736c <error: Cannot access memory at address 0x20657079742e736c>, len = -1618827640}, lr_val = {s = 0x0, len = -542149130}, r2_val = {s = 0x0, len = 1}, gr_val = {s = 0x7ffc6386cea0 "\020Іc\374\177", len = -544333668}}
u = 0x7ffc6386d210
port = 0
dst_host = 0x2e6665727065203d
i = 1669779856
flags = 0
avp = 0x55fedfd1b093
st = {flags = 0, id = 0, name = {n = -1618827640, s = {s = 0x7f109f82a688 "", len = 0}, re = 0x7f109f82a688}, avp = 0x7f10c42e9cb0 <__syslog>}
sct = 0x7ffc6386d024
sjt = 0x0
rve = 0x7f10c3c31350
mct = 0x0
rv = 0xf00000000
rv1 = 0x55fedfaf75f6 <pv_value_destroy+175>
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 1669726208}, re = 0x0}, pval = {rs = {s = 0x0, len = 1669726208}, ri = -541825017, flags = 22014}}, i2s = "mahmut.voip.com\000\000\000\000\000"}
s = {s = 0x0, len = 0}
srevp = {0x55fe00000000, 0x0}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#18 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3c225b8, msg=0x7f10c3f80908) at core/action.c:1581
t = 0x7f10c3c31ef0
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 0, tz_dsttime = 0}
tdiff = 0
__func__ = "run_actions"
#19 0x000055fedf920efb in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c37010, msg=0x7f10c3f80908) at core/action.c:1067
ret = 1
v = 1
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
tmp = 0x0
new_uri = 0x0
end = 0x0
crt = 0x7ffc6386e3b0 "\210\246\202\237\020\177"
cmd = 0x7f10c3ab64a8
len = 0
user = 1
uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x1700000303 <error: Cannot access memory at address 0x1700000303>, len = 87}, host = {s = 0x0, len = 0}, port = {s = 0x7f10a129a940 "\212\330[\031#\375\370\245\067j\337\071\250\337\025-\342\267\333\334\340\023\301\210\356Z\354\320\306\022\352G31i\224\312\025=/\237]E\353\035\367Y\224\224\316\022\345?b,\344\352\361_:s\260\214\306څ\216(?\337C\200\002i:%\276_\030)\234ֿ\212&NUY\346\200\"V\313\365\365WN\364\260\004G\264\375\374#\371\353\363\341\353ϼ\377=\335Ps\023\343\316ߚ?\312P6\035\207cc\267=Q\377\346\a\235\327e\247l\020\352C+=Ow\356\004\201\003(\255؉D\355>\325Kw\351$\306\377\301\024\360:\212^\201\314\357\352\317E\301\374\346hC\212\370\216\327%V\032ou\330\062\325\030ܧs\275"..., len = -1591105216}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
next_hop = {user = {s = 0x7ffc6386d4c0 "\020", len = 0}, passwd = {s = 0x7ffc6386d4c4 "", len = 0}, host = {s = 0x7f10a16f23d0 "\340\346\204\303\020\177", len = 1669780672}, port = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -1015996900}, params = {s = 0x7f10a16f23d0 "\340\346\204\303\020\177", len = -1590211304}, sip_params = {s = 0x7f10a1375aa0 "\003\003", len = -1014345500}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1669780747}, port_no = 12, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3278175344), transport = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 5}, ttl = {s = 0x0, len = 1669780747}, user_param = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 5}, maddr = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, method = {s = 0x0, len = 394917407}, lr = {s = 0x5aad993cdf85fc4f <error: Cannot access memory at address 0x5aad993cdf85fc4f>, len = -421945278}, r2 = {s = 0x7ffc6386d5b8 " ", len = -462440448}, gr = {s = 0x0, len = -1590211304}, transport_val = {s = 0x7f10a1375aa0 "\003\003", len = -1590207840}, ttl_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1669780920}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1014350068}, maddr_val = {s = 0x7f10a1375aa0 "\003\003", len = 32}, method_val = {s = 0x7f10a1375aa0 "\003\003", len = -1587508776}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 32}}
u = 0x0
port = 0
dst_host = 0x0
i = 0
flags = 0
avp = 0x0
st = {flags = 2705394080, id = 32528, name = {n = 1669780672, s = {s = 0x7ffc6386d4c0 "\020", len = -1586551856}, re = 0x7ffc6386d4c0}, avp = 0x7f10c370387b}
sct = 0x0
sjt = 0x0
rve = 0x7f10c3c1a4e8
mct = 0x0
rv = 0x0
rv1 = 0x0
c1 = {cache_type = 16, val_type = RV_NONE, c = {avp_val = {n = -1589573232, s = {s = 0x7f10a1410990 "C", len = -1589573232}, re = 0x7f10a1410990}, pval = {rs = {s = 0x7f10a1410990 "C", len = -1589573232}, ri = -1586281488, flags = 32528}}, i2s = "\320#o\241\020\177\000\000\360Bs\241\020\177\000\000\000\000\000\000\000"}
s = {s = 0x7ffc6386d3f0 "\320#o\241\020\177", len = -1015914428}
srevp = {0x1, 0x10}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#20 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3bf94d8, msg=0x7f10c3f80908) at core/action.c:1581
t = 0x7f10c3c37010
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 0, tz_dsttime = 0}
tdiff = 0
__func__ = "run_actions"
#21 0x000055fedf91d0ee in do_action (h=0x7ffc6386e3a0, a=0x7f10c3ac9fd0, msg=0x7f10c3f80908) at core/action.c:700
ret = -5
v = 22014
dst = {send_sock = 0x2020202020202020, to = {s = {sa_family = 10456, sa_data = "\342\303\020\177\000\000m\317\035\241\020\177\000"}, sin = {sin_family = 10456, sin_port = 50146, sin_addr = {s_addr = 32528}, sin_zero = "m\317\035\241\020\177\000"}, sin6 = {sin6_family = 10456, sin6_port = 50146, sin6_flowinfo = 32528, sin6_addr = {__in6_u = {__u6_addr8 = "m\317\035\241\020\177\000\000\312\314\035\241\020\177\000", __u6_addr16 = {53101, 41245, 32528, 0, 52426, 41245, 32528, 0}, __u6_addr32 = {2703085421, 32528, 2703084746, 32528}}}, sin6_scope_id = 3286378992}, sas = {ss_family = 10456, __ss_padding = "\342\303\020\177\000\000m\317\035\241\020\177\000\000\312\314\035\241\020\177\000\000\360)\342\303\020\177\000\000\020\060\237\303\020\177\000\000\020\340\206c\374\177\000\000\070\330\327\302\020\177\000\000\000\000\000\000c", '\000' <repeats 13 times>, "\200\000\000\000\000\000\b\021&\000\000\000\000\000\b\324G\000\000\000\000\000\370\356Y\000\000\000\000\000\320\017\005\005\000\000\000\000\b\000\000\000\000\000\000", __ss_align = 40}}, id = -1012977648, send_flags = {f = 32528, blst_imask = 0}, proto = 64 '@', proto_pad0 = -32 '\340', proto_pad1 = 25478}
tmp = 0x55fedfba326e <qm_malloc+2595> "H\213E\270H\203\300\070\351\230\003"
new_uri = 0x5a0fd0 <error: Cannot access memory at address 0x5a0fd0>
end = 0x47d848 <error: Cannot access memory at address 0x47d848>
crt = 0x7ffc6386e290 "\220\343\206c\374\177"
cmd = 0x1700000000
len = 0
user = -541446721
uri = {user = {s = 0x3920000000 <error: Cannot access memory at address 0x3920000000>, len = 0}, passwd = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 2494392}, host = {s = 0x40047d488 <error: Cannot access memory at address 0x40047d488>, len = -539752464}, port = {s = 0x5a0fd0 <error: Cannot access memory at address 0x5a0fd0>, len = 8}, params = {s = 0x7ffc6386df70 "0\341\206c\374\177", len = -541165936}, sip_params = {s = 0x7ffc6386de80 "\330(\342\303\020\177", len = -542094578}, headers = {s = 0x0, len = -539810044}, port_no = 57200, proto = 25478, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3753520572), transport = {s = 0x7f10c3e228d8 "\001", len = -1008588080}, ttl = {s = 0x7ffc6386dff2 "\005\005", len = 1669783539}, user_param = {s = 0x7f10a11dcf6d "", len = -1591882475}, maddr = {s = 0x55fedfd41048 <__func__.6942> "parse_via", len = -539746712}, method = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -1012977648}, lr = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 5}, r2 = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, gr = {s = 0x0, len = 394917407}, transport_val = {s = 0x429e703d42893948 <error: Cannot access memory at address 0x429e703d42893948>, len = -601816037}, ttl_val = {s = 0x7ffc6386dfa8 "\020\060\237\303\020\177", len = 1}, user_param_val = {s = 0x0, len = -1008588136}, maddr_val = {s = 0x500ff0000000000 <error: Cannot access memory at address 0x500ff0000000000>, len = 1669783532}, method_val = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1591882524}, lr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1591882519}, r2_val = {s = 0x7f10a11dcce9 ";branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:34323;rinstance=1fcf5028180487b9;transport=TCP>\r\nTo: <sip:1007@mahmut.voip.com;transpor"..., len = 5}, gr_val = {s = 0x7ffc6386e130 "0\342\206c\374\177", len = -541110556}}
next_hop = {user = {s = 0xa8428197 <error: Cannot access memory at address 0xa8428197>, len = -544731560}, passwd = {s = 0x2a10a06 <error: Cannot access memory at address 0x2a10a06>, len = 1669782928}, host = {s = 0x7ffc6386dd80 "\377\377\377\377", len = 1669782728}, port = {s = 0x7f10c457ba40 "\220\301Z\304\020\177", len = 7}, params = {s = 0x6386dec0 <error: Cannot access memory at address 0x6386dec0>, len = 0}, sip_params = {s = 0x7ffc6386dde0 "@+\342\303\020\177", len = -1472036457}, headers = {s = 0x7f10c45ac4f0 "P\304Z\304\020\177", len = 1669783080}, port_no = 49552, proto = 50266, type = 32528, flags = (unknown: 0), transport = {s = 0x7f10c457bab0 "\037e\211\337\376U", len = -1000811633}, ttl = {s = 0x5 <error: Cannot access memory at address 0x5>, len = -1000883536}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1000685168}, method = {s = 0x55fedf88e3fa "_setjmp", len = 0}, lr = {s = 0x7ffc6386dd80 "\377\377\377\377", len = 1669782928}, r2 = {s = 0x7f10c45ac4f0 "P\304Z\304\020\177", len = 0}, gr = {s = 0x7f10a16dc9d8 "\220", len = -1586934880}, transport_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1586934560}, ttl_val = {s = 0x7f10c4200158 "\373O", len = -1000885232}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 16}, maddr_val = {s = 0x7ffc6386dde0 "@+\342\303\020\177", len = -1015914428}, method_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -541405588}, lr_val = {s = 0x7ffc6386de10 "", len = -1012977648}, r2_val = {s = 0x7f10c3e22b40 "@", len = -1012977648}, gr_val = {s = 0x7ffc6386de50 "\200ކc\374\177", len = -1026041800}}
u = 0x7ffc6386e290
port = 0
dst_host = 0x7f10a11dcf6d
i = 11
flags = 22014
avp = 0x7f10a11dcf6d
st = {flags = 1669782724, id = 32764, name = {n = -1000814498, s = {s = 0x7f10c458c85e <do_lookup_x+270> "\205\300\017\205\302\006", len = 0}, re = 0x7f10c458c85e <do_lookup_x+270>}, avp = 0x7f10c4207ca0}
sct = 0x55fedfd49dcb
sjt = 0x7f10c3e22830
rve = 0x55fedfd49e58 <__func__.6790>
mct = 0xa128dfc0
rv = 0x7ffc6386dcc8
rv1 = 0x7f10c3e1bdc0
c1 = {cache_type = 3294082064, val_type = 32528, c = {avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1004565732}, re = 0x1}, pval = {rs = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1004565732}, ri = -1000813836, flags = 32528}}, i2s = "\022\004\000\000\000\000\000\000\240| \304\020\177\000\000\020\264W\304\020\177"}
s = {s = 0x0, len = 1042}
srevp = {0x0, 0x7f10c458c6ec <check_match+316>}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#22 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3ac9b60, msg=0x7f10c3f80908) at core/action.c:1581
t = 0x7f10c3ac9fd0
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = -1007154936, tz_dsttime = 32528}
tdiff = 2703084732
__func__ = "run_actions"
#23 0x000055fedf93000d in run_top_route (a=0x7f10c3ac9b60, msg=0x7f10c3f80908, c=0x0) at core/action.c:1666
ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {139709372343944, -3845379249392013796, 0, 139709987593392, 94553165115539, 536870912, -3845379249475899876, -7014620463946093028}, __mask_was_saved = 0, __saved_mask = {__val = {94553161952285, 6998053444, 139709984016648, 140721978271040, 94553163805580, 139709984018744, 139709984016312, 139709399289393, 139709399289029, 139709982555416, 0, 1073741825, 0, 139709987593392, 139709372343944, 0}}}}}
p = 0x7ffc6386e3a0
ret = -539905901
sfbk = 0
#24 0x000055fedfaa8603 in receive_msg (buf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908) at core/receive.c:501
msg = 0x7f10c3f80908
ctx = {rec_lev = -1591882608, run_flags = 32528, last_retcode = 1460, jmp_env = {{__jmpbuf = {227633332225, 139709399288976, 8, 139709399288985, 34, 139709399289020, 7, 32}, __mask_was_saved = -539905901, __saved_mask = {__val = {536870912, 140721978271456, 94553163314141, 1025766200822493485, 0, 0, 17689295201705805418, 140721978272380, 139709399288048, 2079749502788070076, 2777162825698555585, 4722371164336740133, 92033367151166208, 14537356584683332797, 1950363756610510412, 11731023210721953098}}}}}
bctx = 0x0
ret = 0
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
diff = 0
inb = {s = 0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len = 733}
netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
keng = 0x0
evp = {data = 0x7ffc6386e580, obuf = {s = 0x0, len = 0}, rcv = 0x7f10a11dc908, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
cidlockidx = 0
cidlockset = 0
errsipmsg = 0
exectime = 0
__func__ = "receive_msg"
#25 0x000055fedfb6c007 in receive_tcp_msg (tcpbuf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908, con=0x7f10a11dc8f0) at core/tcp_read.c:1383
buf = 0x0
bsize = 0
blen = 1460
__func__ = "receive_tcp_msg"
#26 0x000055fedfb6e8d3 in tcp_read_req (con=0x7f10a11dc8f0, bytes_read=0x7ffc6386ea84, read_flags=0x7ffc6386ea7c) at core/tcp_read.c:1607
bytes = 1460
total_bytes = 1460
resp = 1
size = 0
req = 0x7f10a11dca18
dst = {send_sock = 0x0, to = {s = {sa_family = 40112, sa_data = ".\304\020\177\000\000\360\310\035\241\020\177\000"}, sin = {sin_family = 40112, sin_port = 50222, sin_addr = {s_addr = 32528}, sin_zero = "\360\310\035\241\020\177\000"}, sin6 = {sin6_family = 40112, sin6_port = 50222, sin6_flowinfo = 32528, sin6_addr = {__in6_u = {__u6_addr8 = "\360\310\035\241\020\177\000\000\000\000\000 \002\000\000", __u6_addr16 = {51440, 41245, 32528, 0, 0, 8192, 2, 0}, __u6_addr32 = {2703083760, 32528, 536870912, 2}}}, sin6_scope_id = 1669726209}, sas = {ss_family = 40112, __ss_padding = ".\304\020\177\000\000\360\310\035\241\020\177\000\000\000\000\000 \002\000\000\000\001\000\206c\017\000\000\000 \"\343\337\376U\000\000\275N\341ZX\230\034\344\210\312\035\241\020\177\000\000(D\261\244m\345YC\340#\343\337\376U\000\000\024\000\000\000\000\000\000\000\001\000\000\000P\000\000\000\260\351\206c\374\177\000\000\276\006\252\337\376U\000\000p\352\206c\374\177\000\000\b\000\000\000\000\000\000", __ss_align = 35188667056128}}, id = -1007078360, send_flags = {f = 32528, blst_imask = 0}, proto = -120 '\210', proto_pad0 = -54 '\312', proto_pad1 = -24291}
c = 82 'R'
ret = -1
__func__ = "tcp_read_req"
#27 0x000055fedfb730ec in handle_io (fm=0x7f10c3f93428, events=1, idx=-1) at core/tcp_read.c:1857
ret = 8
n = 1052
read_flags = RD_CONN_SHORT_READ
con = 0x7f10a11dc8f0
s = 15
resp = 1
t = 1129964909
ee = 0x0
__func__ = "handle_io"
#28 0x000055fedfb5dd3a in io_wait_loop_epoll (h=0x55fedfe32220 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
n = 1
r = 0
fm = 0x7f10c3f93428
revents = 1
__func__ = "io_wait_loop_epoll"
#29 0x000055fedfb74c0e in tcp_receive_loop (unix_sock=89) at core/tcp_read.c:1978
__func__ = "tcp_receive_loop"
#30 0x000055fedf9f8f73 in tcp_init_children (woneinit=0x7ffc6386ee3c) at core/tcp_main.c:5139
r = 12
i = 15
reader_fd_1 = 89
pid = 0
si_desc = "tcp receiver (generic)\000\000\210\200\314\337\376U\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\320\355\206c\374\177\000\000D>\244\337\376U\000\000\320\355\206c\374\177\000\000\065\243\260\337\000\000\000\000\200\355\206c\374\177\000\000\305,\306\337\376U\000\000\000\000\000\000\000\000\000\000\210\246\202\237\062\000\000"
si = 0x0
__func__ = "tcp_init_children"
#31 0x000055fedf8b8d96 in main_loop () at main.c:1857
i = 16
pid = 4933
si = 0x0
si_desc = "udp receiver child=15 sock=56.100.82.100:5090\000\000\360\363\206c\374\177\000\000\350Ϊ\303\020\177\000\000\260\234.\304\020\177\000\000\350Ȼ\303\020\177\000\000\000\000\000 \000\000\000\000L\235.\304\020\177\000\000\060\000\000\000\060\000\000\000\250\357\206c\374\177\000\000\300\356\206c\374\177\000\000\000\270o\344\335t\323", <incomplete sequence \365>
nrprocs = 16
woneinit = 1
__func__ = "main_loop"
#32 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
cfg_stream = 0x55fee0304290
c = -1
r = 0
tmp = 0x7ffc6386fd8a ""
tmp_len = 0
port = 0
proto = 0
ahost = 0x0
aport = 0
options = 0x55fedfccb0b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 1758625625
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x7ffc639b9268
p = 0x7f10c4298af5 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244"
st = {st_dev = 20, st_ino = 17804, st_nlink = 2, st_mode = 16832, st_uid = 1113, st_gid = 1113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1622014594, tv_nsec = 669820306}, st_mtim = {tv_sec = 1622023822, tv_nsec = 713813032}, st_ctim = {tv_sec = 1622023822, tv_nsec = 713813032}, __glibc_reserved = {0, 0, 0}}
tbuf = "H\365\206c\374\177\000\000\330+=\304\020\177", '\000' <repeats 11 times>, "\033Y\304\020\177\000\000\001", '\000' <repeats 15 times>, ",\363 \304\020\177\000\000(6X\304\020\177\000\000 \364\206c\374\177\000\000\272\204Y\304\020\177\000\000\000\000\000\000\000\000\000\000@e;\304\020\177\000\000г<\304\020\177\000\000D\364\206c\374\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>...
option_index = 0
long_options = {{name = 0x55fedfccd366 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fedfcc8514 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fedfccd36b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55fedfccd371 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fedfccd377 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fedfccd380 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55fedfccd38a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fedfccd394 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fedfccd39f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55fedfccd3a8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fedfccd3b3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fedfccd3b9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55fedfccd3c3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
__func__ = "main"
================================================================================
# thread apply all bt
================================================================================
Thread 1 (Thread 0x7f10c41f5100 (LWP 4958)):
#0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#1 0x00007f10c36877ed in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#2 0x00007f10c3686dc5 in CONF_modules_load () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#3 0x00007f10c368738b in CONF_modules_load_file () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#4 0x00007f10bfd9331e in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
#5 0x00007f10bfd592cf in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
#6 0x00007f10bfd59598 in curl_easy_init () from /lib/x86_64-linux-gnu/libcurl.so.4
#7 0x00007f10bfdfa9f4 in vg_call_event_api (pjson=0x7ffc6386abf0 "{\"version\":\"1.0\",\"eventcode\":\"300\",\"data\":{\"ip_address\":\"56.100.82.107\",\"username\":\"1007\",\"apiuserkey\":\"7f813a24-83e1-bc34-d4d1-293a4f84c5f6\"}}", event_url=...) at event.c:52
#8 0x00007f10bfdfae0d in vg_send_notallowed_user_from_ip_event (eventCode=300, szIpAddress=0x55fedfe1b4c0 <buff> "56.100.82.107", szUserName=0x7ffc6386ba60 "1007", szApiUserKey=0x7ffc6386b970 "7f813a24-83e1-bc34-d4d1-293a4f84c5f6") at event.c:139
#9 0x00007f10bfde867a in vg_digest_authenticate_hdr (msg=0x7f10c3f80908, realm=0x7ffc6386bd20, hftype=HDR_AUTHORIZATION_T, method=0x7f10c3f80930, ahdr=0x7ffc6386bd18) at vg_auth.c:431
#10 0x00007f10bfde8d60 in w_vg_auth (pmsg=0x7f10c3f80908) at vg_auth.c:530
#11 0x000055fedf920f8f in do_action (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1076
#12 0x000055fedf92f857 in run_actions (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1581
#13 0x000055fedf92ff45 in run_actions_safe (h=0x7ffc6386e3a0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1645
#14 0x000055fedf8e209c in rval_get_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, i=0x7ffc6386ca64, rv=0x7f10c3c30c28, cache=0x0) at core/rvalue.c:949
#15 0x000055fedf8e7293 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386ca64, rve=0x7f10c3c30c20) at core/rvalue.c:1947
#16 0x000055fedf8e7719 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386cf9c, rve=0x7f10c3c31350) at core/rvalue.c:1955
#17 0x000055fedf920a0a in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c31ef0, msg=0x7f10c3f80908) at core/action.c:1052
#18 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3c225b8, msg=0x7f10c3f80908) at core/action.c:1581
#19 0x000055fedf920efb in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c37010, msg=0x7f10c3f80908) at core/action.c:1067
#20 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3bf94d8, msg=0x7f10c3f80908) at core/action.c:1581
#21 0x000055fedf91d0ee in do_action (h=0x7ffc6386e3a0, a=0x7f10c3ac9fd0, msg=0x7f10c3f80908) at core/action.c:700
#22 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3ac9b60, msg=0x7f10c3f80908) at core/action.c:1581
#23 0x000055fedf93000d in run_top_route (a=0x7f10c3ac9b60, msg=0x7f10c3f80908, c=0x0) at core/action.c:1666
#24 0x000055fedfaa8603 in receive_msg (buf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908) at core/receive.c:501
#25 0x000055fedfb6c007 in receive_tcp_msg (tcpbuf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908, con=0x7f10a11dc8f0) at core/tcp_read.c:1383
#26 0x000055fedfb6e8d3 in tcp_read_req (con=0x7f10a11dc8f0, bytes_read=0x7ffc6386ea84, read_flags=0x7ffc6386ea7c) at core/tcp_read.c:1607
#27 0x000055fedfb730ec in handle_io (fm=0x7f10c3f93428, events=1, idx=-1) at core/tcp_read.c:1857
#28 0x000055fedfb5dd3a in io_wait_loop_epoll (h=0x55fedfe32220 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
#29 0x000055fedfb74c0e in tcp_receive_loop (unix_sock=89) at core/tcp_read.c:1978
#30 0x000055fedf9f8f73 in tcp_init_children (woneinit=0x7ffc6386ee3c) at core/tcp_main.c:5139
#31 0x000055fedf8b8d96 in main_loop () at main.c:1857
#32 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
================================================================================
# thread apply all bt full
================================================================================
Thread 1 (Thread 0x7f10c41f5100 (LWP 4958)):
#0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#1 0x00007f10c36877ed in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#2 0x00007f10c3686dc5 in CONF_modules_load () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#3 0x00007f10c368738b in CONF_modules_load_file () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#4 0x00007f10bfd9331e in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
No symbol table info available.
#5 0x00007f10bfd592cf in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
No symbol table info available.
#6 0x00007f10bfd59598 in curl_easy_init () from /lib/x86_64-linux-gnu/libcurl.so.4
No symbol table info available.
#7 0x00007f10bfdfa9f4 in vg_call_event_api (pjson=0x7ffc6386abf0 "{\"version\":\"1.0\",\"eventcode\":\"300\",\"data\":{\"ip_address\":\"56.100.82.107\",\"username\":\"1007\",\"apiuserkey\":\"7f813a24-83e1-bc34-d4d1-293a4f84c5f6\"}}", event_url=...) at event.c:52
__func__ = "vg_call_event_api"
curl = 0x7ffc6386ac90
#8 0x00007f10bfdfae0d in vg_send_notallowed_user_from_ip_event (eventCode=300, szIpAddress=0x55fedfe1b4c0 <buff> "56.100.82.107", szUserName=0x7ffc6386ba60 "1007", szApiUserKey=0x7ffc6386b970 "7f813a24-83e1-bc34-d4d1-293a4f84c5f6") at event.c:139
szDataBuffer = "{\"version\":\"1.0\",\"eventcode\":\"300\",\"data\":{\"ip_address\":\"56.100.82.107\",\"username\":\"1007\",\"apiuserkey\":\"7f813a24-83e1-bc34-d4d1-293a4f84c5f6\"}}", '\000' <repeats 350 times>
#9 0x00007f10bfde867a in vg_digest_authenticate_hdr (msg=0x7f10c3f80908, realm=0x7ffc6386bd20, hftype=HDR_AUTHORIZATION_T, method=0x7f10c3f80930, ahdr=0x7ffc6386bd18) at vg_auth.c:431
iExtType = 100
chRegister = 0 '\000'
IsRegistered = 0 '\000'
chGlobalAllowedIp = 0 '\000'
chSiptrunk = 0 '\000'
IsAllowed = 0 '\000'
chAllow = 1 '\001'
chRegisterEventEnabled = 1 '\001'
res = 0x7f10c3dc9a38
rest = 0x0
pCon = 0x7f10c3e227a8
resp = "\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\300\274\206c\374\177\000\000x#\336\277\020\177\000\000"
hent = "\000\000\000\000\000\000\000\000\207\204\343\277\000\000\000\000\223\260\321\337\376U\000\000\210\246\202\237\020\177\000\000"
password = {s = 0x0, len = -1012242104}
ha1 = "\000\000\000\000\000\000\000\000\220\274\206c\374\177\000\000H\274\206c\374\177\000\000\b\t\370\303\020\177", '\000' <repeats 18 times>, "\060\274\206c\374\177\000\000\260\274\206c\374\177", '\000' <repeats 58 times>, "\210\246\202\237\020\177\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\000\274\206c\374\177\000\000\343J\257\337\376U\000\000\000\000\000\000\000\000\000\000\220\274\206c\374\177\000\000\060\274\206c\374\177\000\000"...
szUserName = "1007", '\000' <repeats 70 times>
szPassword = '\000' <repeats 79 times>
szDomain = "mahmut.voip.com", '\000' <repeats 63 times>
szApiUserKey = "7f813a24-83e1-bc34-d4d1-293a4f84c5f6", '\000' <repeats 43 times>
szQuery = "SELECT 1::integer as tt , ex.username::text , ex.password::text , ex.exttype::integer , ep.param_value::text as tt2 , ep2.param_value::text , lc.id::integer , ( SELECT COUNT( type ) FROM vg_ipaccepts"...
h = 0x7f10c3e20ad0
cred = 0x7f10c3e21020
cd = 0x7f10c2af3cf7 <pv_get_ruri_attr>
ret = -3
iTenantNo = 1293
iExt = 7
iSub = 0
iRealmLen = 17
iUserLen = 10
pIP = 0x55fedfe1b4c0 <buff> "56.100.82.107"
__func__ = "vg_digest_authenticate_hdr"
chIsTrunk = 0 '\000'
#10 0x00007f10bfde8d60 in w_vg_auth (pmsg=0x7f10c3f80908) at vg_auth.c:530
srealm = {s = 0x7ffc6386bce0 "mahmut.voip.com", len = 16}
ret = -1
hdr = 0x7f10c3e20ad0
uri = 0x0
turi = 0x0
furi = 0x0
szDomain = "mahmut.voip.com\000\276\206c\374\177\000\000\234 \216\337\376U", '\000' <repeats 19 times>
#11 0x000055fedf920f8f in do_action (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1076
ret = -5
v = 0
dst = {send_sock = 0x55fedfd1b093, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000\214\302\206c\374\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\214\302\206c\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\214\302\206c\374\177\000\000\034\256Nd\026\000\000", __u6_addr16 = {49804, 25478, 32764, 0, 44572, 25678, 22, 0}, __u6_addr32 = {1669776012, 32764, 1682877980, 22}}}, sin6_scope_id = 3756532656}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000\214\302\206c\374\177\000\000\034\256Nd\026\000\000\000\260#\350\337\376U\000\000\000\000\000\000\000\000\000\000\f\000\000\000\000\000\000\000s\374d\303\000\000\000\000\346\000\000\000\000\000\000\000\005", '\000' <repeats 15 times>, "+\302\206c\374\177\000\000\005\000\000\000\000\000\000\000\005\000\000\000\000\000\000\000\005", '\000' <repeats 11 times>, "\017\000\000", __ss_align = 4294967296}}, id = -1618827640, send_flags = {f = 32528, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
tmp = 0x55fedf8e237e <rval_get_int+1054> "\351\250\003"
new_uri = 0x0
end = 0x0
crt = 0x7ffc6386c4f0 "`Ɔc\374\177"
cmd = 0x7f10c3ab6470
len = 32764
user = 1669776480
uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 230, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 3279052244), transport = {s = 0x7f10a16c86c0 "(", len = -1586934880}, ttl = {s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = -1586934560}, user_param = {s = 0x7f10a1694d00 "\036\033\373\005\\^\247\312\066_J\241ٰ\020\006\275N\341ZX\230\034\344\317䉲\222\376\223\273(D\261\244\205\356\267\314r\252h\350\312f\217_\016\034K\226L\212\026\232 }\217\344罋kr\216[\212裑ؖ\334f\204\253`\265e.a\304r\253\067\235\361\344R=\016C\303$\275", len = -1015910656}, maddr = {s = 0x0, len = -1618827640}, method = {s = 0x0, len = -1003578192}, lr = {s = 0x55fedfd1b093 "INFO", len = 536870912}, r2 = {s = 0x7ffc6386c270 " Ɇc\374\177", len = -544311144}, gr = {s = 0x7f10a1009978 "\340\346\204\303\020\177", len = -1618827640}, transport_val = {s = 0x0, len = -1003578192}, ttl_val = {s = 0x7f10c3c2ace0 "\017", len = 1669777244}, user_param_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, maddr_val = {s = 0x7f10a1296790 "T", len = -1007154936}, method_val = {s = 0x7f10c3c16930 "\305\004", len = 1669784480}, lr_val = {s = 0x0, len = -1}, r2_val = {s = 0x7f109f82a688 "", len = 20229660}, gr_val = {s = 0x0, len = -1003578192}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 1669775904}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = -539810039}, user_param = {s = 0x12500000187 <error: Cannot access memory at address 0x12500000187>, len = -539810039}, maddr = {s = 0x143000001ff <error: Cannot access memory at address 0x143000001ff>, len = -1081640172}, method = {s = 0x7f10a16c8630 "(", len = -1618827640}, lr = {s = 0x0, len = -1003578192}, r2 = {s = 0x55fedfd1b093 "INFO", len = 536870912}, gr = {s = 0x7ffc6386c100 "p\302\206c\374\177", len = -544311477}, transport_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, ttl_val = {s = 0x7ffc6386c140 "\b\t\370\303\020\177", len = -544016297}, user_param_val = {s = 0x7f10c3c2a5b0 "\004", len = 1669775904}, maddr_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1007154936}, lr_val = {s = 0x7f10c3c16930 "\305\004", len = 1669775728}, r2_val = {s = 0x7ffc6386c110 "x\231", len = -1016937788}, gr_val = {s = 0x0, len = 0}}
u = 0x55fedfd1b093
port = 0
dst_host = 0x55fedfd1b093
i = -542149130
flags = 0
avp = 0x0
st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
sct = 0x7f10c3c1ad08
sjt = 0x55fedf920a0a <do_action+36269>
rve = 0x7f10c3e1ab18
mct = 0x7ffc6386c920
rv = 0x7ffc6386e3a0
rv1 = 0x7f109f82a688
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = "\200\236\302\303\020\177\000\000\264\300\206c\374\177\000\000\b\t\370\303\020\177"}
s = {s = 0x7ffc6386bf90 "", len = -544312685}
srevp = {0x55fedfd1b093, 0x20000000}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#12 0x000055fedf92f857 in run_actions (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1581
t = 0x7f10c3c309b0
ret = -1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = -1013718290, tz_dsttime = 32528}
tdiff = 2489880
__func__ = "run_actions"
#13 0x000055fedf92ff45 in run_actions_safe (h=0x7ffc6386e3a0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1645
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {139709372343944, -3845379250411229668, 0, 139709987593392, 94553165115539, 536870912, -3845379250360898020, -7014620463946093028}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 0, 139709372343944, 0, 139709987593392, 94553165115539, 536870912, 140721978263504, 94553160710168, 139709982158504, 139709978193936, 140721978263264, 139709965129784, 139709980502408}}}}}
ret = 1669777648
ign_on_break = 0
#14 0x000055fedf8e209c in rval_get_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, i=0x7ffc6386ca64, rv=0x7f10c3c30c28, cache=0x0) at core/rvalue.c:949
r_avp = 0x800600000020
avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 2490832}, re = 0x1}
pval = {rs = {s = 0x7ffc6386c7a0 "\377\377\377\377\374\177", len = -1026041800}, ri = -1009012800, flags = 32528}
tmp = {s = 0x7f10c3dc9a00 "H\a", len = -1012977648}
s = 0x0
r = 0
ret = 0
destroy_pval = 0
__func__ = "rval_get_int"
#15 0x000055fedf8e7293 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386ca64, rve=0x7f10c3c30c20) at core/rvalue.c:1947
i1 = 0
i2 = 0
ret = -1
c1 = {cache_type = 3284315360, val_type = 32528, c = {avp_val = {n = 1669779356, s = {s = 0x7ffc6386cf9c "\001", len = 0}, re = 0x7ffc6386cf9c}, pval = {rs = {s = 0x7ffc6386cf9c "\001", len = 0}, ri = -1003578192, flags = 32528}}, i2s = "\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\200Ɇc\374\177"}
c2 = {cache_type = 1669777792, val_type = 32764, c = {avp_val = {n = -541436525, s = {s = 0x55fedfba5593 <qm_free+7942> "\353\a\220\353\004\220\353\001\220H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>, len = -1008952776}, re = 0x55fedfba5593 <qm_free+7942>}, pval = {rs = {s = 0x55fedfba5593 <qm_free+7942> "\353\a\220\353\004\220\353\001\220H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>, len = -1008952776}, ri = -1012977648, flags = 32528}}, i2s = "]\346\223\303\020\177\000\000\020\060\237Ë\000\000\000(\354\223\303\020\177"}
rv1 = 0xc39f4240
rv2 = 0x29c39f3980
__func__ = "rval_expr_eval_int"
#16 0x000055fedf8e7719 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386cf9c, rve=0x7f10c3c31350) at core/rvalue.c:1955
i1 = 0
i2 = -539905901
ret = -1
c1 = {cache_type = 1669778112, val_type = 32764, c = {avp_val = {n = -1013256867, s = {s = 0x7f10c39aed5d <db_postgres_free_result+1788> "\270", len = -1008594912}, re = 0x7f10c39aed5d <db_postgres_free_result+1788>}, pval = {rs = {s = 0x7f10c39aed5d <db_postgres_free_result+1788> "\270", len = -1008594912}, ri = -1008588888, flags = 32528}}, i2s = '\000' <repeats 21 times>}
c2 = {cache_type = 1669778128, val_type = 32764, c = {avp_val = {n = -1008588888, s = {s = 0x7f10c3e227a8 "", len = 1669777920}, re = 0x7f10c3e227a8}, pval = {rs = {s = 0x7f10c3e227a8 "", len = 1669777920}, ri = -1618827640, flags = 32528}}, i2s = "\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U"}
rv1 = 0x7ffc6386d2c8
rv2 = 0x7f10c39a83df <db_postgres_submit_query>
__func__ = "rval_expr_eval_int"
#17 0x000055fedf920a0a in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c31ef0, msg=0x7f10c3f80908) at core/action.c:1052
ret = -5
v = 1
dst = {send_sock = 0x203d3e3e2070695f, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\060\320\300\303\020\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "0\320\300\303\020\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "0\320\300\303\020\177\000\000\244҆c\374\177\000", __u6_addr16 = {53296, 50112, 32528, 0, 53924, 25478, 32764, 0}, __u6_addr32 = {3284193328, 32528, 1669780132, 32764}}}, sin6_scope_id = 3287812360}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\060\320\300\303\020\177\000\000\244҆c\374\177\000\000\b\t\370\303\020\177\000\000\240\343\206c\374\177\000\000UNT(callid)::integer , '' , \017\000\000\000ROM vg_p\210\246\202\237\020\177\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \020\000\000", __ss_align = 17179869185}}, id = 1669780132, send_flags = {f = 32764, blst_imask = 0}, proto = 36 '$', proto_pad0 = -48 '\320', proto_pad1 = 25478}
tmp = 0x7f10c3bf99c8 "\002"
new_uri = 0x7f10c3bf9890 "\001"
end = 0x7ffc6386d190 ""
crt = 0x7f10c3bf9a60 "\a"
cmd = 0x7f10c3c18828
len = 22014
user = -543945635
uri = {user = {s = 0x2064696b6e757274 <error: Cannot access memory at address 0x2064696b6e757274>, len = 807419169}, passwd = {s = 0xffffffff70692064 <error: Cannot access memory at address 0xffffffff70692064>, len = 0}, host = {s = 0x7f10c3c16b70 "\004", len = 1669779764}, port = {s = 0x7f10c3f80908 "\b", len = 1669784480}, params = {s = 0x55fedfd1b093 "INFO", len = 536870912}, sip_params = {s = 0x7ffc6386cee0 "\b\t\370\303\020\177", len = -544014523}, headers = {s = 0x46202727202c2027 <error: Cannot access memory at address 0x46202727202c2027>, len = -1007154936}, port_no = 52720, proto = 50112, type = 32528, flags = (unknown: 1669784480), transport = {s = 0x0, len = -1}, ttl = {s = 0x7f109f82a688 "", len = 404008476}, user_param = {s = 0x0, len = -1003578192}, maddr = {s = 0x55fedfd1b093 "INFO", len = 536870912}, method = {s = 0xcaa277f21b14ae1c <error: Cannot access memory at address 0xcaa277f21b14ae1c>, len = 1682877980}, lr = {s = 0x204d4f5200000000 <error: Cannot access memory at address 0x204d4f5200000000>, len = 1633642358}, r2 = {s = 0x0, len = 0}, gr = {s = 0x3d206e69616d6f64 <error: Cannot access memory at address 0x3d206e69616d6f64>, len = -1618827640}, transport_val = {s = 0x0, len = -1003578192}, ttl_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, user_param_val = {s = 0x7ffc6386d010 "\200цc\374\177", len = -544312685}, maddr_val = {s = 0x2072656765746e69 <error: Cannot access memory at address 0x2072656765746e69>, len = 656875564}, method_val = {s = 0x76204d4f52462027 <error: Cannot access memory at address 0x76204d4f52462027>, len = 1885953895}, lr_val = {s = 0x7f10c3c16b68 "\001", len = 1669779764}, r2_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, gr_val = {s = 0x55fedfe823b0 <ut_buf_int2str> "", len = 0}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffc6386ccac "\362w\242", <incomplete sequence \312>, len = -1618827640}, host = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, port = {s = 0x55fedfd1b093 "INFO", len = -1618827640}, params = {s = 0x0, len = -1003578192}, sip_params = {s = 0x55fedfd1b093 "INFO", len = 536870912}, headers = {s = 0x7ffc6386cd70 "\240Άc\374\177", len = -544014523}, port_no = 52416, proto = 25478, type = 32764, flags = (unknown: 3287812360), transport = {s = 0x7f10c3c16350 "\302\004", len = 1669784480}, ttl = {s = 0x0, len = 1}, user_param = {s = 0x7f109f82a688 "", len = 460631580}, maddr = {s = 0x0, len = -1003578192}, method = {s = 0x55fedfd1b093 "INFO", len = 536870912}, lr = {s = 0xcaa277f21674ae1c <error: Cannot access memory at address 0xcaa277f21674ae1c>, len = 1682877980}, r2 = {s = 0x7f1000000000 <error: Cannot access memory at address 0x7f1000000000>, len = -1007154936}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x6776204e494f4a20 <error: Cannot access memory at address 0x6776204e494f4a20>, len = -1618827640}, ttl_val = {s = 0x0, len = -1003578192}, user_param_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, maddr_val = {s = 0x7ffc6386cea0 "\020Іc\374\177", len = -544312685}, method_val = {s = 0x20657079742e736c <error: Cannot access memory at address 0x20657079742e736c>, len = -1618827640}, lr_val = {s = 0x0, len = -542149130}, r2_val = {s = 0x0, len = 1}, gr_val = {s = 0x7ffc6386cea0 "\020Іc\374\177", len = -544333668}}
u = 0x7ffc6386d210
port = 0
dst_host = 0x2e6665727065203d
i = 1669779856
flags = 0
avp = 0x55fedfd1b093
st = {flags = 0, id = 0, name = {n = -1618827640, s = {s = 0x7f109f82a688 "", len = 0}, re = 0x7f109f82a688}, avp = 0x7f10c42e9cb0 <__syslog>}
sct = 0x7ffc6386d024
sjt = 0x0
rve = 0x7f10c3c31350
mct = 0x0
rv = 0xf00000000
rv1 = 0x55fedfaf75f6 <pv_value_destroy+175>
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 1669726208}, re = 0x0}, pval = {rs = {s = 0x0, len = 1669726208}, ri = -541825017, flags = 22014}}, i2s = "mahmut.voip.com\000\000\000\000\000"}
s = {s = 0x0, len = 0}
srevp = {0x55fe00000000, 0x0}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#18 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3c225b8, msg=0x7f10c3f80908) at core/action.c:1581
t = 0x7f10c3c31ef0
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 0, tz_dsttime = 0}
tdiff = 0
__func__ = "run_actions"
#19 0x000055fedf920efb in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c37010, msg=0x7f10c3f80908) at core/action.c:1067
ret = 1
v = 1
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
tmp = 0x0
new_uri = 0x0
end = 0x0
crt = 0x7ffc6386e3b0 "\210\246\202\237\020\177"
cmd = 0x7f10c3ab64a8
len = 0
user = 1
uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x1700000303 <error: Cannot access memory at address 0x1700000303>, len = 87}, host = {s = 0x0, len = 0}, port = {s = 0x7f10a129a940 "\212\330[\031#\375\370\245\067j\337\071\250\337\025-\342\267\333\334\340\023\301\210\356Z\354\320\306\022\352G31i\224\312\025=/\237]E\353\035\367Y\224\224\316\022\345?b,\344\352\361_:s\260\214\306څ\216(?\337C\200\002i:%\276_\030)\234ֿ\212&NUY\346\200\"V\313\365\365WN\364\260\004G\264\375\374#\371\353\363\341\353ϼ\377=\335Ps\023\343\316ߚ?\312P6\035\207cc\267=Q\377\346\a\235\327e\247l\020\352C+=Ow\356\004\201\003(\255؉D\355>\325Kw\351$\306\377\301\024\360:\212^\201\314\357\352\317E\301\374\346hC\212\370\216\327%V\032ou\330\062\325\030ܧs\275"..., len = -1591105216}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
next_hop = {user = {s = 0x7ffc6386d4c0 "\020", len = 0}, passwd = {s = 0x7ffc6386d4c4 "", len = 0}, host = {s = 0x7f10a16f23d0 "\340\346\204\303\020\177", len = 1669780672}, port = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -1015996900}, params = {s = 0x7f10a16f23d0 "\340\346\204\303\020\177", len = -1590211304}, sip_params = {s = 0x7f10a1375aa0 "\003\003", len = -1014345500}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1669780747}, port_no = 12, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3278175344), transport = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 5}, ttl = {s = 0x0, len = 1669780747}, user_param = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 5}, maddr = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, method = {s = 0x0, len = 394917407}, lr = {s = 0x5aad993cdf85fc4f <error: Cannot access memory at address 0x5aad993cdf85fc4f>, len = -421945278}, r2 = {s = 0x7ffc6386d5b8 " ", len = -462440448}, gr = {s = 0x0, len = -1590211304}, transport_val = {s = 0x7f10a1375aa0 "\003\003", len = -1590207840}, ttl_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1669780920}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1014350068}, maddr_val = {s = 0x7f10a1375aa0 "\003\003", len = 32}, method_val = {s = 0x7f10a1375aa0 "\003\003", len = -1587508776}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 32}}
u = 0x0
port = 0
dst_host = 0x0
i = 0
flags = 0
avp = 0x0
st = {flags = 2705394080, id = 32528, name = {n = 1669780672, s = {s = 0x7ffc6386d4c0 "\020", len = -1586551856}, re = 0x7ffc6386d4c0}, avp = 0x7f10c370387b}
sct = 0x0
sjt = 0x0
rve = 0x7f10c3c1a4e8
mct = 0x0
rv = 0x0
rv1 = 0x0
c1 = {cache_type = 16, val_type = RV_NONE, c = {avp_val = {n = -1589573232, s = {s = 0x7f10a1410990 "C", len = -1589573232}, re = 0x7f10a1410990}, pval = {rs = {s = 0x7f10a1410990 "C", len = -1589573232}, ri = -1586281488, flags = 32528}}, i2s = "\320#o\241\020\177\000\000\360Bs\241\020\177\000\000\000\000\000\000\000"}
s = {s = 0x7ffc6386d3f0 "\320#o\241\020\177", len = -1015914428}
srevp = {0x1, 0x10}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#20 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3bf94d8, msg=0x7f10c3f80908) at core/action.c:1581
t = 0x7f10c3c37010
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 0, tz_dsttime = 0}
tdiff = 0
__func__ = "run_actions"
#21 0x000055fedf91d0ee in do_action (h=0x7ffc6386e3a0, a=0x7f10c3ac9fd0, msg=0x7f10c3f80908) at core/action.c:700
ret = -5
v = 22014
dst = {send_sock = 0x2020202020202020, to = {s = {sa_family = 10456, sa_data = "\342\303\020\177\000\000m\317\035\241\020\177\000"}, sin = {sin_family = 10456, sin_port = 50146, sin_addr = {s_addr = 32528}, sin_zero = "m\317\035\241\020\177\000"}, sin6 = {sin6_family = 10456, sin6_port = 50146, sin6_flowinfo = 32528, sin6_addr = {__in6_u = {__u6_addr8 = "m\317\035\241\020\177\000\000\312\314\035\241\020\177\000", __u6_addr16 = {53101, 41245, 32528, 0, 52426, 41245, 32528, 0}, __u6_addr32 = {2703085421, 32528, 2703084746, 32528}}}, sin6_scope_id = 3286378992}, sas = {ss_family = 10456, __ss_padding = "\342\303\020\177\000\000m\317\035\241\020\177\000\000\312\314\035\241\020\177\000\000\360)\342\303\020\177\000\000\020\060\237\303\020\177\000\000\020\340\206c\374\177\000\000\070\330\327\302\020\177\000\000\000\000\000\000c", '\000' <repeats 13 times>, "\200\000\000\000\000\000\b\021&\000\000\000\000\000\b\324G\000\000\000\000\000\370\356Y\000\000\000\000\000\320\017\005\005\000\000\000\000\b\000\000\000\000\000\000", __ss_align = 40}}, id = -1012977648, send_flags = {f = 32528, blst_imask = 0}, proto = 64 '@', proto_pad0 = -32 '\340', proto_pad1 = 25478}
tmp = 0x55fedfba326e <qm_malloc+2595> "H\213E\270H\203\300\070\351\230\003"
new_uri = 0x5a0fd0 <error: Cannot access memory at address 0x5a0fd0>
end = 0x47d848 <error: Cannot access memory at address 0x47d848>
crt = 0x7ffc6386e290 "\220\343\206c\374\177"
cmd = 0x1700000000
len = 0
user = -541446721
uri = {user = {s = 0x3920000000 <error: Cannot access memory at address 0x3920000000>, len = 0}, passwd = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 2494392}, host = {s = 0x40047d488 <error: Cannot access memory at address 0x40047d488>, len = -539752464}, port = {s = 0x5a0fd0 <error: Cannot access memory at address 0x5a0fd0>, len = 8}, params = {s = 0x7ffc6386df70 "0\341\206c\374\177", len = -541165936}, sip_params = {s = 0x7ffc6386de80 "\330(\342\303\020\177", len = -542094578}, headers = {s = 0x0, len = -539810044}, port_no = 57200, proto = 25478, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3753520572), transport = {s = 0x7f10c3e228d8 "\001", len = -1008588080}, ttl = {s = 0x7ffc6386dff2 "\005\005", len = 1669783539}, user_param = {s = 0x7f10a11dcf6d "", len = -1591882475}, maddr = {s = 0x55fedfd41048 <__func__.6942> "parse_via", len = -539746712}, method = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -1012977648}, lr = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 5}, r2 = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, gr = {s = 0x0, len = 394917407}, transport_val = {s = 0x429e703d42893948 <error: Cannot access memory at address 0x429e703d42893948>, len = -601816037}, ttl_val = {s = 0x7ffc6386dfa8 "\020\060\237\303\020\177", len = 1}, user_param_val = {s = 0x0, len = -1008588136}, maddr_val = {s = 0x500ff0000000000 <error: Cannot access memory at address 0x500ff0000000000>, len = 1669783532}, method_val = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1591882524}, lr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1591882519}, r2_val = {s = 0x7f10a11dcce9 ";branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:34323;rinstance=1fcf5028180487b9;transport=TCP>\r\nTo: <sip:1007@mahmut.voip.com;transpor"..., len = 5}, gr_val = {s = 0x7ffc6386e130 "0\342\206c\374\177", len = -541110556}}
next_hop = {user = {s = 0xa8428197 <error: Cannot access memory at address 0xa8428197>, len = -544731560}, passwd = {s = 0x2a10a06 <error: Cannot access memory at address 0x2a10a06>, len = 1669782928}, host = {s = 0x7ffc6386dd80 "\377\377\377\377", len = 1669782728}, port = {s = 0x7f10c457ba40 "\220\301Z\304\020\177", len = 7}, params = {s = 0x6386dec0 <error: Cannot access memory at address 0x6386dec0>, len = 0}, sip_params = {s = 0x7ffc6386dde0 "@+\342\303\020\177", len = -1472036457}, headers = {s = 0x7f10c45ac4f0 "P\304Z\304\020\177", len = 1669783080}, port_no = 49552, proto = 50266, type = 32528, flags = (unknown: 0), transport = {s = 0x7f10c457bab0 "\037e\211\337\376U", len = -1000811633}, ttl = {s = 0x5 <error: Cannot access memory at address 0x5>, len = -1000883536}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1000685168}, method = {s = 0x55fedf88e3fa "_setjmp", len = 0}, lr = {s = 0x7ffc6386dd80 "\377\377\377\377", len = 1669782928}, r2 = {s = 0x7f10c45ac4f0 "P\304Z\304\020\177", len = 0}, gr = {s = 0x7f10a16dc9d8 "\220", len = -1586934880}, transport_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1586934560}, ttl_val = {s = 0x7f10c4200158 "\373O", len = -1000885232}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 16}, maddr_val = {s = 0x7ffc6386dde0 "@+\342\303\020\177", len = -1015914428}, method_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -541405588}, lr_val = {s = 0x7ffc6386de10 "", len = -1012977648}, r2_val = {s = 0x7f10c3e22b40 "@", len = -1012977648}, gr_val = {s = 0x7ffc6386de50 "\200ކc\374\177", len = -1026041800}}
u = 0x7ffc6386e290
port = 0
dst_host = 0x7f10a11dcf6d
i = 11
flags = 22014
avp = 0x7f10a11dcf6d
st = {flags = 1669782724, id = 32764, name = {n = -1000814498, s = {s = 0x7f10c458c85e <do_lookup_x+270> "\205\300\017\205\302\006", len = 0}, re = 0x7f10c458c85e <do_lookup_x+270>}, avp = 0x7f10c4207ca0}
sct = 0x55fedfd49dcb
sjt = 0x7f10c3e22830
rve = 0x55fedfd49e58 <__func__.6790>
mct = 0xa128dfc0
rv = 0x7ffc6386dcc8
rv1 = 0x7f10c3e1bdc0
c1 = {cache_type = 3294082064, val_type = 32528, c = {avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1004565732}, re = 0x1}, pval = {rs = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1004565732}, ri = -1000813836, flags = 32528}}, i2s = "\022\004\000\000\000\000\000\000\240| \304\020\177\000\000\020\264W\304\020\177"}
s = {s = 0x0, len = 1042}
srevp = {0x0, 0x7f10c458c6ec <check_match+316>}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__func__ = "do_action"
#22 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3ac9b60, msg=0x7f10c3f80908) at core/action.c:1581
t = 0x7f10c3ac9fd0
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = -1007154936, tz_dsttime = 32528}
tdiff = 2703084732
__func__ = "run_actions"
#23 0x000055fedf93000d in run_top_route (a=0x7f10c3ac9b60, msg=0x7f10c3f80908, c=0x0) at core/action.c:1666
ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {139709372343944, -3845379249392013796, 0, 139709987593392, 94553165115539, 536870912, -3845379249475899876, -7014620463946093028}, __mask_was_saved = 0, __saved_mask = {__val = {94553161952285, 6998053444, 139709984016648, 140721978271040, 94553163805580, 139709984018744, 139709984016312, 139709399289393, 139709399289029, 139709982555416, 0, 1073741825, 0, 139709987593392, 139709372343944, 0}}}}}
p = 0x7ffc6386e3a0
ret = -539905901
sfbk = 0
#24 0x000055fedfaa8603 in receive_msg (buf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908) at core/receive.c:501
msg = 0x7f10c3f80908
ctx = {rec_lev = -1591882608, run_flags = 32528, last_retcode = 1460, jmp_env = {{__jmpbuf = {227633332225, 139709399288976, 8, 139709399288985, 34, 139709399289020, 7, 32}, __mask_was_saved = -539905901, __saved_mask = {__val = {536870912, 140721978271456, 94553163314141, 1025766200822493485, 0, 0, 17689295201705805418, 140721978272380, 139709399288048, 2079749502788070076, 2777162825698555585, 4722371164336740133, 92033367151166208, 14537356584683332797, 1950363756610510412, 11731023210721953098}}}}}
bctx = 0x0
ret = 0
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
diff = 0
inb = {s = 0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len = 733}
netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
keng = 0x0
evp = {data = 0x7ffc6386e580, obuf = {s = 0x0, len = 0}, rcv = 0x7f10a11dc908, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
cidlockidx = 0
cidlockset = 0
errsipmsg = 0
exectime = 0
__func__ = "receive_msg"
#25 0x000055fedfb6c007 in receive_tcp_msg (tcpbuf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908, con=0x7f10a11dc8f0) at core/tcp_read.c:1383
buf = 0x0
bsize = 0
blen = 1460
__func__ = "receive_tcp_msg"
#26 0x000055fedfb6e8d3 in tcp_read_req (con=0x7f10a11dc8f0, bytes_read=0x7ffc6386ea84, read_flags=0x7ffc6386ea7c) at core/tcp_read.c:1607
bytes = 1460
total_bytes = 1460
resp = 1
size = 0
req = 0x7f10a11dca18
dst = {send_sock = 0x0, to = {s = {sa_family = 40112, sa_data = ".\304\020\177\000\000\360\310\035\241\020\177\000"}, sin = {sin_family = 40112, sin_port = 50222, sin_addr = {s_addr = 32528}, sin_zero = "\360\310\035\241\020\177\000"}, sin6 = {sin6_family = 40112, sin6_port = 50222, sin6_flowinfo = 32528, sin6_addr = {__in6_u = {__u6_addr8 = "\360\310\035\241\020\177\000\000\000\000\000 \002\000\000", __u6_addr16 = {51440, 41245, 32528, 0, 0, 8192, 2, 0}, __u6_addr32 = {2703083760, 32528, 536870912, 2}}}, sin6_scope_id = 1669726209}, sas = {ss_family = 40112, __ss_padding = ".\304\020\177\000\000\360\310\035\241\020\177\000\000\000\000\000 \002\000\000\000\001\000\206c\017\000\000\000 \"\343\337\376U\000\000\275N\341ZX\230\034\344\210\312\035\241\020\177\000\000(D\261\244m\345YC\340#\343\337\376U\000\000\024\000\000\000\000\000\000\000\001\000\000\000P\000\000\000\260\351\206c\374\177\000\000\276\006\252\337\376U\000\000p\352\206c\374\177\000\000\b\000\000\000\000\000\000", __ss_align = 35188667056128}}, id = -1007078360, send_flags = {f = 32528, blst_imask = 0}, proto = -120 '\210', proto_pad0 = -54 '\312', proto_pad1 = -24291}
c = 82 'R'
ret = -1
__func__ = "tcp_read_req"
#27 0x000055fedfb730ec in handle_io (fm=0x7f10c3f93428, events=1, idx=-1) at core/tcp_read.c:1857
ret = 8
n = 1052
read_flags = RD_CONN_SHORT_READ
con = 0x7f10a11dc8f0
s = 15
resp = 1
t = 1129964909
ee = 0x0
__func__ = "handle_io"
#28 0x000055fedfb5dd3a in io_wait_loop_epoll (h=0x55fedfe32220 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
n = 1
r = 0
fm = 0x7f10c3f93428
revents = 1
__func__ = "io_wait_loop_epoll"
#29 0x000055fedfb74c0e in tcp_receive_loop (unix_sock=89) at core/tcp_read.c:1978
__func__ = "tcp_receive_loop"
#30 0x000055fedf9f8f73 in tcp_init_children (woneinit=0x7ffc6386ee3c) at core/tcp_main.c:5139
r = 12
i = 15
reader_fd_1 = 89
pid = 0
si_desc = "tcp receiver (generic)\000\000\210\200\314\337\376U\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\320\355\206c\374\177\000\000D>\244\337\376U\000\000\320\355\206c\374\177\000\000\065\243\260\337\000\000\000\000\200\355\206c\374\177\000\000\305,\306\337\376U\000\000\000\000\000\000\000\000\000\000\210\246\202\237\062\000\000"
si = 0x0
__func__ = "tcp_init_children"
#31 0x000055fedf8b8d96 in main_loop () at main.c:1857
i = 16
pid = 4933
si = 0x0
si_desc = "udp receiver child=15 sock=56.100.82.100:5090\000\000\360\363\206c\374\177\000\000\350Ϊ\303\020\177\000\000\260\234.\304\020\177\000\000\350Ȼ\303\020\177\000\000\000\000\000 \000\000\000\000L\235.\304\020\177\000\000\060\000\000\000\060\000\000\000\250\357\206c\374\177\000\000\300\356\206c\374\177\000\000\000\270o\344\335t\323", <incomplete sequence \365>
nrprocs = 16
woneinit = 1
__func__ = "main_loop"
#32 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
cfg_stream = 0x55fee0304290
c = -1
r = 0
tmp = 0x7ffc6386fd8a ""
tmp_len = 0
port = 0
proto = 0
ahost = 0x0
aport = 0
options = 0x55fedfccb0b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 1758625625
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x7ffc639b9268
p = 0x7f10c4298af5 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244"
st = {st_dev = 20, st_ino = 17804, st_nlink = 2, st_mode = 16832, st_uid = 1113, st_gid = 1113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1622014594, tv_nsec = 669820306}, st_mtim = {tv_sec = 1622023822, tv_nsec = 713813032}, st_ctim = {tv_sec = 1622023822, tv_nsec = 713813032}, __glibc_reserved = {0, 0, 0}}
tbuf = "H\365\206c\374\177\000\000\330+=\304\020\177", '\000' <repeats 11 times>, "\033Y\304\020\177\000\000\001", '\000' <repeats 15 times>, ",\363 \304\020\177\000\000(6X\304\020\177\000\000 \364\206c\374\177\000\000\272\204Y\304\020\177\000\000\000\000\000\000\000\000\000\000@e;\304\020\177\000\000г<\304\020\177\000\000D\364\206c\374\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>...
option_index = 0
long_options = {{name = 0x55fedfccd366 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fedfcc8514 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fedfccd36b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55fedfccd371 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fedfccd377 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fedfccd380 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55fedfccd38a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fedfccd394 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fedfccd39f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55fedfccd3a8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fedfccd3b3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fedfccd3b9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55fedfccd3c3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
__func__ = "main"
At the same time, two crashes occurs and second crash data is follows
#0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
(gdb)
================================================================================
# GDB session generated by FS backtrace-from-core
================================================================================
================================================================================
# info threads
================================================================================
Id Target Id Frame
* 1 Thread 0x7f10c41f5100 (LWP 4899) 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
================================================================================
# bt
================================================================================
#0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#1 0x00007f10c3687075 in CONF_modules_finish () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#2 0x00007f10c36871f9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#3 0x00007f10c371c250 in OPENSSL_cleanup () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#4 0x00007f10bf82a21e in tls_h_mod_destroy_f () at tls_init.c:879
#5 0x000055fedfae5207 in destroy_tls () at core/tls_hooks.c:75
#6 0x000055fedf8a72b4 in cleanup (show_status=1) at main.c:596
#7 0x000055fedf8a8d31 in shutdown_children (sig=15, show_status=1) at main.c:718
#8 0x000055fedf8ac130 in handle_sigs () at main.c:816
#9 0x000055fedf8b9971 in main_loop () at main.c:1903
#10 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
================================================================================
# bt full
================================================================================
#0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#1 0x00007f10c3687075 in CONF_modules_finish () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#2 0x00007f10c36871f9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#3 0x00007f10c371c250 in OPENSSL_cleanup () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#4 0x00007f10bf82a21e in tls_h_mod_destroy_f () at tls_init.c:879
__func__ = "tls_h_mod_destroy_f"
#5 0x000055fedfae5207 in destroy_tls () at core/tls_hooks.c:75
No locals.
#6 0x000055fedf8a72b4 in cleanup (show_status=1) at main.c:596
memlog = 0
__func__ = "cleanup"
#7 0x000055fedf8a8d31 in shutdown_children (sig=15, show_status=1) at main.c:718
__func__ = "shutdown_children"
#8 0x000055fedf8ac130 in handle_sigs () at main.c:816
chld = 0
chld_status = 139
any_chld_stopped = 1
memlog = -1603236448
__func__ = "handle_sigs"
#9 0x000055fedf8b9971 in main_loop () at main.c:1903
i = 16
pid = 4962
si = 0x0
si_desc = "udp receiver child=15 sock=56.100.82.100:5090\000\000\360\363\206c\374\177\000\000\350Ϊ\303\020\177\000\000\260\234.\304\020\177\000\000\350Ȼ\303\020\177\000\000\000\000\000 \000\000\000\000L\235.\304\020\177\000\000\060\000\000\000\060\000\000\000\250\357\206c\374\177\000\000\300\356\206c\374\177\000\000\000\270o\344\335t\323", <incomplete sequence \365>
nrprocs = 16
woneinit = 1
__func__ = "main_loop"
#10 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
cfg_stream = 0x55fee0304290
c = -1
r = 0
tmp = 0x7ffc6386fd8a ""
tmp_len = 0
port = 0
proto = 0
ahost = 0x0
aport = 0
options = 0x55fedfccb0b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 1758625625
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x7ffc639b9268
p = 0x7f10c4298af5 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244"
st = {st_dev = 20, st_ino = 17804, st_nlink = 2, st_mode = 16832, st_uid = 1113, st_gid = 1113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1622014594, tv_nsec = 669820306}, st_mtim = {tv_sec = 1622023822, tv_nsec = 713813032}, st_ctim = {tv_sec = 1622023822, tv_nsec = 713813032}, __glibc_reserved = {0, 0, 0}}
tbuf = "H\365\206c\374\177\000\000\330+=\304\020\177", '\000' <repeats 11 times>, "\033Y\304\020\177\000\000\001", '\000' <repeats 15 times>, ",\363 \304\020\177\000\000(6X\304\020\177\000\000 \364\206c\374\177\000\000\272\204Y\304\020\177\000\000\000\000\000\000\000\000\000\000@e;\304\020\177\000\000г<\304\020\177\000\000D\364\206c\374\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>...
option_index = 0
long_options = {{name = 0x55fedfccd366 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fedfcc8514 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fedfccd36b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55fedfccd371 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fedfccd377 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fedfccd380 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55fedfccd38a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fedfccd394 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fedfccd39f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55fedfccd3a8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fedfccd3b3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fedfccd3b9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55fedfccd3c3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
__func__ = "main"
================================================================================
# thread apply all bt
================================================================================
Thread 1 (Thread 0x7f10c41f5100 (LWP 4899)):
#0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#1 0x00007f10c3687075 in CONF_modules_finish () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#2 0x00007f10c36871f9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#3 0x00007f10c371c250 in OPENSSL_cleanup () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#4 0x00007f10bf82a21e in tls_h_mod_destroy_f () at tls_init.c:879
#5 0x000055fedfae5207 in destroy_tls () at core/tls_hooks.c:75
#6 0x000055fedf8a72b4 in cleanup (show_status=1) at main.c:596
#7 0x000055fedf8a8d31 in shutdown_children (sig=15, show_status=1) at main.c:718
#8 0x000055fedf8ac130 in handle_sigs () at main.c:816
#9 0x000055fedf8b9971 in main_loop () at main.c:1903
#10 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
================================================================================
# thread apply all bt full
================================================================================
Thread 1 (Thread 0x7f10c41f5100 (LWP 4899)):
#0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#1 0x00007f10c3687075 in CONF_modules_finish () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#2 0x00007f10c36871f9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#3 0x00007f10c371c250 in OPENSSL_cleanup () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#4 0x00007f10bf82a21e in tls_h_mod_destroy_f () at tls_init.c:879
__func__ = "tls_h_mod_destroy_f"
#5 0x000055fedfae5207 in destroy_tls () at core/tls_hooks.c:75
No locals.
#6 0x000055fedf8a72b4 in cleanup (show_status=1) at main.c:596
memlog = 0
__func__ = "cleanup"
#7 0x000055fedf8a8d31 in shutdown_children (sig=15, show_status=1) at main.c:718
__func__ = "shutdown_children"
#8 0x000055fedf8ac130 in handle_sigs () at main.c:816
chld = 0
chld_status = 139
any_chld_stopped = 1
memlog = -1603236448
__func__ = "handle_sigs"
#9 0x000055fedf8b9971 in main_loop () at main.c:1903
i = 16
pid = 4962
si = 0x0
si_desc = "udp receiver child=15 sock=56.100.82.100:5090\000\000\360\363\206c\374\177\000\000\350Ϊ\303\020\177\000\000\260\234.\304\020\177\000\000\350Ȼ\303\020\177\000\000\000\000\000 \000\000\000\000L\235.\304\020\177\000\000\060\000\000\000\060\000\000\000\250\357\206c\374\177\000\000\300\356\206c\374\177\000\000\000\270o\344\335t\323", <incomplete sequence \365>
nrprocs = 16
woneinit = 1
__func__ = "main_loop"
#10 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
cfg_stream = 0x55fee0304290
c = -1
r = 0
tmp = 0x7ffc6386fd8a ""
tmp_len = 0
port = 0
proto = 0
ahost = 0x0
aport = 0
options = 0x55fedfccb0b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 1758625625
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x7ffc639b9268
p = 0x7f10c4298af5 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244"
st = {st_dev = 20, st_ino = 17804, st_nlink = 2, st_mode = 16832, st_uid = 1113, st_gid = 1113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1622014594, tv_nsec = 669820306}, st_mtim = {tv_sec = 1622023822, tv_nsec = 713813032}, st_ctim = {tv_sec = 1622023822, tv_nsec = 713813032}, __glibc_reserved = {0, 0, 0}}
tbuf = "H\365\206c\374\177\000\000\330+=\304\020\177", '\000' <repeats 11 times>, "\033Y\304\020\177\000\000\001", '\000' <repeats 15 times>, ",\363 \304\020\177\000\000(6X\304\020\177\000\000 \364\206c\374\177\000\000\272\204Y\304\020\177\000\000\000\000\000\000\000\000\000\000@e;\304\020\177\000\000г<\304\020\177\000\000D\364\206c\374\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>...
option_index = 0
long_options = {{name = 0x55fedfccd366 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fedfcc8514 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fedfccd36b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55fedfccd371 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fedfccd377 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fedfccd380 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55fedfccd38a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fedfccd394 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fedfccd39f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55fedfccd3a8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fedfccd3b3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fedfccd3b9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55fedfccd3c3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
__func__ = "main"
May 26 12:12:04 dev-proxy05 kamailio[4958]: CRITICAL: <core> [core/mem/q_malloc.c:501]: qm_free(): BUG: bad pointer 0x645f6d6574737973 (out of memory block!) called from tls: tls_init.c: ser_free(323) - ignoring
May 26 12:12:05 dev-proxy05 kamailio[4962]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 85
May 26 12:12:05 dev-proxy05 kamailio[4899]: ALERT: <core> [main.c:788]: handle_sigs(): child process 4958 exited by a signal 11
May 26 12:12:05 dev-proxy05 kamailio[4899]: ALERT: <core> [main.c:791]: handle_sigs(): core was generated
May 26 12:12:05 dev-proxy05 kamailio[4899]: INFO: <core> [main.c:813]: handle_sigs(): terminating due to SIGCHLD
May 26 12:12:05 dev-proxy05 kamailio[4917]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
May 26 12:12:05 dev-proxy05 kamailio[4951]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
May 26 12:12:05 dev-proxy05 kamailio[4951]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg):
May 26 12:12:05 dev-proxy05 kamailio[4951]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments:
May 26 12:12:05 dev-proxy05 kamailio[4917]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg):
May 26 12:12:05 dev-proxy05 kamailio[4917]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments:
May 26 12:12:05 dev-proxy05 kamailio[4910]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
May 26 12:12:05 dev-proxy05 kamailio[4910]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg):
May 26 12:12:05 dev-proxy05 kamailio[4910]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments:
May 26 12:12:05 dev-proxy05 kamailio[4951]: INFO: qm_sums: qm_sums(): count= 1 size= 28488 bytes from core: core/io_wait.c: init_io_wait(516)
May 26 12:12:06 dev-proxy05 kamailio[4906]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
May 26 12:12:06 dev-proxy05 kamailio[4913]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg):
May 26 12:12:06 dev-proxy05 kamailio[4906]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg):
May 26 12:12:06 dev-proxy05 kamailio[4906]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments:
May 26 12:12:06 dev-proxy05 kamailio[4913]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments:
May 26 12:12:06 dev-proxy05 kamailio[4899]: CRITICAL: <core> [core/mem/q_malloc.c:501]: qm_free(): BUG: bad pointer 0x645f6d6574737973 (out of memory block!) called from tls: tls_init.c: ser_free(323) - ignoring
May 26 12:12:08 dev-proxy05 kamailio: WARNING: <core> [core/cfg.y:3660]: warn_at(): warning in config file /usr/local/etc/kamailio/kamailio.cfg, line 1433, column 10-15: constant value in if(...)
May 26 12:12:08 dev-proxy05 kamailio: WARNING: <core> [core/cfg.y:3660]: warn_at(): warning in config file /usr/local/etc/kamailio/kamailio.cfg, line 1443, column 7-12: constant value in if(...)
May 26 12:12:08 dev-proxy05 kamailio: INFO: <core> [core/sctp_core.c:74]: sctp_core_check_support(): SCTP API not enabled - if you want to use it, load sctp module
May 26 12:12:08 dev-proxy05 kamailio: INFO: <core> [core/tcp_main.c:4983]: init_tcp(): using epoll_lt as the io watch method (auto detected)
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: rr [../outbound/api.h:52]: ob_load_api(): unable to import bind_ob - maybe module is not loaded
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: rr [rr_mod.c:188]: mod_init(): outbound module not available
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: auth [auth_mod.c:345]: mod_init(): qop set, but nonce-count (nonce_count) support disabled
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: permissions [parse_config.c:254]: parse_config_file(): file not found: /usr/local/etc/kamailio/permissions.allow
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: permissions [permissions.c:613]: mod_init(): default allow file (/usr/local/etc/kamailio/permissions.allow) not found => empty rule set
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: permissions [parse_config.c:254]: parse_config_file(): file not found: /usr/local/etc/kamailio/permissions.deny
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: permissions [permissions.c:627]: mod_init(): default deny file (/usr/local/etc/kamailio/permissions.deny) not found => empty rule set
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: cfgutils [cfgutils.c:869]: mod_init(): no hash_file given, disable hash functionality
May 26 12:12:08 dev-proxy05 kamailio[5061]: NOTICE: regex [regex_mod.c:168]: mod_init(): 'file' parameter is not set, group matching disabled
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_mod.c:396]: mod_init(): use OpenSSL version: 1010104f
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_mod.c:398]: mod_init(): With ECDH-Support!
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_mod.c:401]: mod_init(): With Diffie Hellman
May 26 12:12:08 dev-proxy05 kamailio[5061]: WARNING: tls [tls_init.c:793]: tls_h_mod_init_f(): openssl bug #1491 (crash/mem leaks on low memory) workaround enabled (on low memory tls operations will fail preemptively) with free memory thresholds 33554432 and 16777216 bytes
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/cfg/cfg_ctx.c:599]: cfg_set_now(): tls.low_mem_threshold1 has been changed to 33554432
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/cfg/cfg_ctx.c:599]: cfg_set_now(): tls.low_mem_threshold2 has been changed to 16777216
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [main.c:3030]: main(): processes (at least): 64 - shm size: 536870912 - pkg size: 8388608
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/udp_server.c:154]: probe_max_receive_buffer(): SO_RCVBUF is initially 212992
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/udp_server.c:206]: probe_max_receive_buffer(): SO_RCVBUF is finally 425984
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/udp_server.c:154]: probe_max_receive_buffer(): SO_RCVBUF is initially 212992
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/udp_server.c:206]: probe_max_receive_buffer(): SO_RCVBUF is finally 425984
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:320]: ksr_tls_fill_missing(): TLSs<default>: tls_method=3
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:332]: ksr_tls_fill_missing(): TLSs<default>: certificate='/etc/pki/CA/wildcard_vpgrw_com.pem'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:339]: ksr_tls_fill_missing(): TLSs<default>: ca_list='/etc/pki/CA/caroot.pem'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:346]: ksr_tls_fill_missing(): TLSs<default>: ca_path='(null)'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:353]: ksr_tls_fill_missing(): TLSs<default>: crl='(null)'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:357]: ksr_tls_fill_missing(): TLSs<default>: require_certificate=0
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:364]: ksr_tls_fill_missing(): TLSs<default>: cipher_list='(null)'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:371]: ksr_tls_fill_missing(): TLSs<default>: private_key='/etc/pki/CA/kamailio_privatekey.pem'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:375]: ksr_tls_fill_missing(): TLSs<default>: verify_certificate=0
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:378]: ksr_tls_fill_missing(): TLSs<default>: verify_depth=9
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:381]: ksr_tls_fill_missing(): TLSs<default>: verify_client=0
May 26 12:12:08 dev-proxy05 kamailio[5061]: NOTICE: tls [tls_domain.c:1136]: ksr_tls_fix_domain(): registered server_name callback handler for socket [:0], server_name='<default>' ...
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:743]: set_verification(): TLSs<default>: No client certificate required and no checks performed
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:320]: ksr_tls_fill_missing(): TLSc<default>: tls_method=3
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:332]: ksr_tls_fill_missing(): TLSc<default>: certificate='/etc/pki/CA/wildcard_vpgrw_com.pem'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:339]: ksr_tls_fill_missing(): TLSc<default>: ca_list='/etc/pki/CA/caroot.pem'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:346]: ksr_tls_fill_missing(): TLSc<default>: ca_path='(null)'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:353]: ksr_tls_fill_missing(): TLSc<default>: crl='(null)'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:357]: ksr_tls_fill_missing(): TLSc<default>: require_certificate=0
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:364]: ksr_tls_fill_missing(): TLSc<default>: cipher_list='(null)'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:371]: ksr_tls_fill_missing(): TLSc<default>: private_key='/etc/pki/CA/kamailio_privatekey.pem'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:375]: ksr_tls_fill_missing(): TLSc<default>: verify_certificate=0
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:378]: ksr_tls_fill_missing(): TLSc<default>: verify_depth=9
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:381]: ksr_tls_fill_missing(): TLSc<default>: verify_client=0
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:746]: set_verification(): TLSc<default>: Server MAY present invalid certificate
May 26 12:12:09 dev-proxy05 kamailio[5098]: ERROR: <core> [db.c:466]: db_check_table_version(): invalid version 4 for table uacreg found, expected 5 (check table structure and table "version")
May 26 12:12:09 dev-proxy05 kamailio[5098]: ERROR: uac [uac_reg.c:1382]: uac_reg_load_db(): Error during version check for db table: uacreg, check database structure.
May 26 12:12:09 dev-proxy05 kamailio[5097]: INFO: ctl [io_listener.c:214]: io_listen_loop(): io_listen_loop: using epoll_lt io watch method (config)
May 26 12:12:09 dev-proxy05 kamailio[5103]: INFO: jsonrpcs [jsonrpcs_sock.c:443]: jsonrpc_dgram_process(): a new child 0/5103
^C
Very interesting workaround solution works fine
First of all install curl-7.76.1 with this parameter --disable-openssl-auto-load-config
And then, downgrading openssl from OpenSSL 1.1.1d to openssl-1.0.2r
And order of compilation is important
kamailio -v
version: kamailio 5.5.0 (x86_64/linux) d4c1a1
flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: d4c1a1
compiled on 08:33:52 May 26 2021 with gcc 8.3.0
root@dev-proxy05:/var/tmp# cat /etc/os-release
PRETTY_NAME="Debian GNU/Linux 10 (buster)"
NAME="Debian GNU/Linux"
VERSION_ID="10"
VERSION="10 (buster)"
VERSION_CODENAME=buster
ID=debian
HOME_URL="https://www.debian.org/"
SUPPORT_URL="https://www.debian.org/support"
BUG_REPORT_URL="https://bugs.debian.org/"
root@dev-proxy05:/var/tmp# cat /etc/os-release
PRETTY_NAME="Debian GNU/Linux 10 (buster)"
NAME="Debian GNU/Linux"
VERSION_ID="10"
VERSION="10 (buster)"
VERSION_CODENAME=buster
ID=debian
HOME_URL="https://www.debian.org/"
SUPPORT_URL="https://www.debian.org/support"
BUG_REPORT_URL="https://bugs.debian.org/"
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or unsubscribe.