Kamailio 5.5.0 -[core/mem/q_malloc.c:501]: qm_free(): BUG: bad pointer crash after upgrading system to Debian 10 (Buster)
### Description
Upgrading Kamailio service Debian 10 and crash occurs. Crash occurs where Json event is sent over the CURL library which works on OpenSSL. If upgrade curl library 7.76.1 and configure --disable-openssl-auto-load-config , and downgrading openssl OpenSSL 1.1.1d --> OpenSSL 1.0.2r no crash occurs !
It was tested on Kamailio 5.5.0 and Kamailio 5.4.2 , result is same
### Troubleshooting
Looks like incompatibilities between CURL , OpenSSL and Kamailio
#### Reproduction
It is test for Kamailio 5.5.0 and Kamilio 5.4.2, unfortunatelly same crash occurs on both sides.
#### Debugging Data
``` GNU gdb (Debian 8.2.1-2+b3) 8.2.1 Copyright (C) 2018 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: http://www.gnu.org/software/gdb/bugs/. Find the GDB manual and other documentation resources online at: http://www.gnu.org/software/gdb/documentation/.
For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/local/sbin/kamailio...done. [New LWP 4958] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/local/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /usr/local/etc/ka'. Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 (gdb)
================================================================================ # GDB session generated by FS backtrace-from-core ================================================================================
================================================================================ # info threads ================================================================================ Id Target Id Frame * 1 Thread 0x7f10c41f5100 (LWP 4958) 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 ================================================================================ # bt ================================================================================ #0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #1 0x00007f10c36877ed in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #2 0x00007f10c3686dc5 in CONF_modules_load () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #3 0x00007f10c368738b in CONF_modules_load_file () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #4 0x00007f10bfd9331e in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4 #5 0x00007f10bfd592cf in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4 #6 0x00007f10bfd59598 in curl_easy_init () from /lib/x86_64-linux-gnu/libcurl.so.4 #7 0x00007f10bfdfa9f4 in vg_call_event_api (pjson=0x7ffc6386abf0 "{"version":"1.0","eventcode":"300","data":{"ip_address":"56.100.82.107","username":"1007","apiuserkey":"7f813a24-83e1-bc34-d4d1-293a4f84c5f6"}}", event_url=...) at event.c:52 #8 0x00007f10bfdfae0d in vg_send_notallowed_user_from_ip_event (eventCode=300, szIpAddress=0x55fedfe1b4c0 <buff> "56.100.82.107", szUserName=0x7ffc6386ba60 "1007", szApiUserKey=0x7ffc6386b970 "7f813a24-83e1-bc34-d4d1-293a4f84c5f6") at event.c:139 #9 0x00007f10bfde867a in vg_digest_authenticate_hdr (msg=0x7f10c3f80908, realm=0x7ffc6386bd20, hftype=HDR_AUTHORIZATION_T, method=0x7f10c3f80930, ahdr=0x7ffc6386bd18) at vg_auth.c:431 #10 0x00007f10bfde8d60 in w_vg_auth (pmsg=0x7f10c3f80908) at vg_auth.c:530 #11 0x000055fedf920f8f in do_action (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1076 #12 0x000055fedf92f857 in run_actions (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1581 #13 0x000055fedf92ff45 in run_actions_safe (h=0x7ffc6386e3a0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1645 #14 0x000055fedf8e209c in rval_get_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, i=0x7ffc6386ca64, rv=0x7f10c3c30c28, cache=0x0) at core/rvalue.c:949 #15 0x000055fedf8e7293 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386ca64, rve=0x7f10c3c30c20) at core/rvalue.c:1947 #16 0x000055fedf8e7719 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386cf9c, rve=0x7f10c3c31350) at core/rvalue.c:1955 #17 0x000055fedf920a0a in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c31ef0, msg=0x7f10c3f80908) at core/action.c:1052 #18 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3c225b8, msg=0x7f10c3f80908) at core/action.c:1581 #19 0x000055fedf920efb in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c37010, msg=0x7f10c3f80908) at core/action.c:1067 #20 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3bf94d8, msg=0x7f10c3f80908) at core/action.c:1581 #21 0x000055fedf91d0ee in do_action (h=0x7ffc6386e3a0, a=0x7f10c3ac9fd0, msg=0x7f10c3f80908) at core/action.c:700 #22 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3ac9b60, msg=0x7f10c3f80908) at core/action.c:1581 #23 0x000055fedf93000d in run_top_route (a=0x7f10c3ac9b60, msg=0x7f10c3f80908, c=0x0) at core/action.c:1666 #24 0x000055fedfaa8603 in receive_msg (buf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908) at core/receive.c:501 #25 0x000055fedfb6c007 in receive_tcp_msg (tcpbuf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908, con=0x7f10a11dc8f0) at core/tcp_read.c:1383 #26 0x000055fedfb6e8d3 in tcp_read_req (con=0x7f10a11dc8f0, bytes_read=0x7ffc6386ea84, read_flags=0x7ffc6386ea7c) at core/tcp_read.c:1607 #27 0x000055fedfb730ec in handle_io (fm=0x7f10c3f93428, events=1, idx=-1) at core/tcp_read.c:1857 #28 0x000055fedfb5dd3a in io_wait_loop_epoll (h=0x55fedfe32220 <io_w>, t=2, repeat=0) at core/io_wait.h:1070 #29 0x000055fedfb74c0e in tcp_receive_loop (unix_sock=89) at core/tcp_read.c:1978 #30 0x000055fedf9f8f73 in tcp_init_children (woneinit=0x7ffc6386ee3c) at core/tcp_main.c:5139 #31 0x000055fedf8b8d96 in main_loop () at main.c:1857 #32 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053 ================================================================================ # bt full ================================================================================ #0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #1 0x00007f10c36877ed in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #2 0x00007f10c3686dc5 in CONF_modules_load () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #3 0x00007f10c368738b in CONF_modules_load_file () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #4 0x00007f10bfd9331e in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4 No symbol table info available. #5 0x00007f10bfd592cf in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4 No symbol table info available. #6 0x00007f10bfd59598 in curl_easy_init () from /lib/x86_64-linux-gnu/libcurl.so.4 No symbol table info available. #7 0x00007f10bfdfa9f4 in vg_call_event_api (pjson=0x7ffc6386abf0 "{"version":"1.0","eventcode":"300","data":{"ip_address":"56.100.82.107","username":"1007","apiuserkey":"7f813a24-83e1-bc34-d4d1-293a4f84c5f6"}}", event_url=...) at event.c:52 __func__ = "vg_call_event_api" curl = 0x7ffc6386ac90 #8 0x00007f10bfdfae0d in vg_send_notallowed_user_from_ip_event (eventCode=300, szIpAddress=0x55fedfe1b4c0 <buff> "56.100.82.107", szUserName=0x7ffc6386ba60 "1007", szApiUserKey=0x7ffc6386b970 "7f813a24-83e1-bc34-d4d1-293a4f84c5f6") at event.c:139 szDataBuffer = "{"version":"1.0","eventcode":"300","data":{"ip_address":"56.100.82.107","username":"1007","apiuserkey":"7f813a24-83e1-bc34-d4d1-293a4f84c5f6"}}", '\000' <repeats 350 times> #9 0x00007f10bfde867a in vg_digest_authenticate_hdr (msg=0x7f10c3f80908, realm=0x7ffc6386bd20, hftype=HDR_AUTHORIZATION_T, method=0x7f10c3f80930, ahdr=0x7ffc6386bd18) at vg_auth.c:431 iExtType = 100 chRegister = 0 '\000' IsRegistered = 0 '\000' chGlobalAllowedIp = 0 '\000' chSiptrunk = 0 '\000' IsAllowed = 0 '\000' chAllow = 1 '\001' chRegisterEventEnabled = 1 '\001' res = 0x7f10c3dc9a38 rest = 0x0 pCon = 0x7f10c3e227a8 resp = "\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\300\274\206c\374\177\000\000x#\336\277\020\177\000\000" hent = "\000\000\000\000\000\000\000\000\207\204\343\277\000\000\000\000\223\260\321\337\376U\000\000\210\246\202\237\020\177\000\000" password = {s = 0x0, len = -1012242104} ha1 = "\000\000\000\000\000\000\000\000\220\274\206c\374\177\000\000H\274\206c\374\177\000\000\b\t\370\303\020\177", '\000' <repeats 18 times>, "\060\274\206c\374\177\000\000\260\274\206c\374\177", '\000' <repeats 58 times>, "\210\246\202\237\020\177\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\000\274\206c\374\177\000\000\343J\257\337\376U\000\000\000\000\000\000\000\000\000\000\220\274\206c\374\177\000\000\060\274\206c\374\177\000\000"... szUserName = "1007", '\000' <repeats 70 times> szPassword = '\000' <repeats 79 times> szDomain = "mahmut.voip.com", '\000' <repeats 63 times> szApiUserKey = "7f813a24-83e1-bc34-d4d1-293a4f84c5f6", '\000' <repeats 43 times> szQuery = "SELECT 1::integer as tt , ex.username::text , ex.password::text , ex.exttype::integer , ep.param_value::text as tt2 , ep2.param_value::text , lc.id::integer , ( SELECT COUNT( type ) FROM vg_ipaccepts"... h = 0x7f10c3e20ad0 cred = 0x7f10c3e21020 cd = 0x7f10c2af3cf7 <pv_get_ruri_attr> ret = -3 iTenantNo = 1293 iExt = 7 iSub = 0 iRealmLen = 17 iUserLen = 10 pIP = 0x55fedfe1b4c0 <buff> "56.100.82.107" __func__ = "vg_digest_authenticate_hdr" chIsTrunk = 0 '\000' #10 0x00007f10bfde8d60 in w_vg_auth (pmsg=0x7f10c3f80908) at vg_auth.c:530 srealm = {s = 0x7ffc6386bce0 "mahmut.voip.com", len = 16} ret = -1 hdr = 0x7f10c3e20ad0 uri = 0x0 turi = 0x0 furi = 0x0 szDomain = "mahmut.voip.com\000\276\206c\374\177\000\000\234 \216\337\376U", '\000' <repeats 19 times> #11 0x000055fedf920f8f in do_action (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1076 ret = -5 v = 0 dst = {send_sock = 0x55fedfd1b093, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000\214\302\206c\374\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\214\302\206c\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\214\302\206c\374\177\000\000\034\256Nd\026\000\000", __u6_addr16 = {49804, 25478, 32764, 0, 44572, 25678, 22, 0}, __u6_addr32 = {1669776012, 32764, 1682877980, 22}}}, sin6_scope_id = 3756532656}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000\214\302\206c\374\177\000\000\034\256Nd\026\000\000\000\260#\350\337\376U\000\000\000\000\000\000\000\000\000\000\f\000\000\000\000\000\000\000s\374d\303\000\000\000\000\346\000\000\000\000\000\000\000\005", '\000' <repeats 15 times>, "+\302\206c\374\177\000\000\005\000\000\000\000\000\000\000\005\000\000\000\000\000\000\000\005", '\000' <repeats 11 times>, "\017\000\000", __ss_align = 4294967296}}, id = -1618827640, send_flags = {f = 32528, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x55fedf8e237e <rval_get_int+1054> "\351\250\003" new_uri = 0x0 end = 0x0 crt = 0x7ffc6386c4f0 "`Ɔc\374\177" cmd = 0x7f10c3ab6470 len = 32764 user = 1669776480 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 230, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 3279052244), transport = {s = 0x7f10a16c86c0 "(", len = -1586934880}, ttl = {s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = -1586934560}, user_param = {s = 0x7f10a1694d00 "\036\033\373\005\^\247\312\066_J\241ٰ\020\006\275N\341ZX\230\034\344\317䉲\222\376\223\273(D\261\244\205\356\267\314r\252h\350\312f\217_\016\034K\226L\212\026\232 }\217\344罋kr\216[\212裑ؖ\334f\204\253`\265e.a\304r\253\067\235\361\344R=\016C\303$\275", len = -1015910656}, maddr = {s = 0x0, len = -1618827640}, method = {s = 0x0, len = -1003578192}, lr = {s = 0x55fedfd1b093 "INFO", len = 536870912}, r2 = {s = 0x7ffc6386c270 " Ɇc\374\177", len = -544311144}, gr = {s = 0x7f10a1009978 "\340\346\204\303\020\177", len = -1618827640}, transport_val = {s = 0x0, len = -1003578192}, ttl_val = {s = 0x7f10c3c2ace0 "\017", len = 1669777244}, user_param_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, maddr_val = {s = 0x7f10a1296790 "T", len = -1007154936}, method_val = {s = 0x7f10c3c16930 "\305\004", len = 1669784480}, lr_val = {s = 0x0, len = -1}, r2_val = {s = 0x7f109f82a688 "", len = 20229660}, gr_val = {s = 0x0, len = -1003578192}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 1669775904}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = -539810039}, user_param = {s = 0x12500000187 <error: Cannot access memory at address 0x12500000187>, len = -539810039}, maddr = {s = 0x143000001ff <error: Cannot access memory at address 0x143000001ff>, len = -1081640172}, method = {s = 0x7f10a16c8630 "(", len = -1618827640}, lr = {s = 0x0, len = -1003578192}, r2 = {s = 0x55fedfd1b093 "INFO", len = 536870912}, gr = {s = 0x7ffc6386c100 "p\302\206c\374\177", len = -544311477}, transport_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, ttl_val = {s = 0x7ffc6386c140 "\b\t\370\303\020\177", len = -544016297}, user_param_val = {s = 0x7f10c3c2a5b0 "\004", len = 1669775904}, maddr_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1007154936}, lr_val = {s = 0x7f10c3c16930 "\305\004", len = 1669775728}, r2_val = {s = 0x7ffc6386c110 "x\231", len = -1016937788}, gr_val = {s = 0x0, len = 0}} u = 0x55fedfd1b093 port = 0 dst_host = 0x55fedfd1b093 i = -542149130 flags = 0 avp = 0x0 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x7f10c3c1ad08 sjt = 0x55fedf920a0a <do_action+36269> rve = 0x7f10c3e1ab18 mct = 0x7ffc6386c920 rv = 0x7ffc6386e3a0 rv1 = 0x7f109f82a688 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = "\200\236\302\303\020\177\000\000\264\300\206c\374\177\000\000\b\t\370\303\020\177"} s = {s = 0x7ffc6386bf90 "", len = -544312685} srevp = {0x55fedfd1b093, 0x20000000} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #12 0x000055fedf92f857 in run_actions (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1581 t = 0x7f10c3c309b0 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = -1013718290, tz_dsttime = 32528} tdiff = 2489880 __func__ = "run_actions" #13 0x000055fedf92ff45 in run_actions_safe (h=0x7ffc6386e3a0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1645 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {139709372343944, -3845379250411229668, 0, 139709987593392, 94553165115539, 536870912, -3845379250360898020, -7014620463946093028}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 0, 139709372343944, 0, 139709987593392, 94553165115539, 536870912, 140721978263504, 94553160710168, 139709982158504, 139709978193936, 140721978263264, 139709965129784, 139709980502408}}}}} ret = 1669777648 ign_on_break = 0 #14 0x000055fedf8e209c in rval_get_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, i=0x7ffc6386ca64, rv=0x7f10c3c30c28, cache=0x0) at core/rvalue.c:949 r_avp = 0x800600000020 avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 2490832}, re = 0x1} pval = {rs = {s = 0x7ffc6386c7a0 "\377\377\377\377\374\177", len = -1026041800}, ri = -1009012800, flags = 32528} tmp = {s = 0x7f10c3dc9a00 "H\a", len = -1012977648} s = 0x0 r = 0 ret = 0 destroy_pval = 0 __func__ = "rval_get_int" #15 0x000055fedf8e7293 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386ca64, rve=0x7f10c3c30c20) at core/rvalue.c:1947 i1 = 0 i2 = 0 ret = -1 c1 = {cache_type = 3284315360, val_type = 32528, c = {avp_val = {n = 1669779356, s = {s = 0x7ffc6386cf9c "\001", len = 0}, re = 0x7ffc6386cf9c}, pval = {rs = {s = 0x7ffc6386cf9c "\001", len = 0}, ri = -1003578192, flags = 32528}}, i2s = "\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\200Ɇc\374\177"} c2 = {cache_type = 1669777792, val_type = 32764, c = {avp_val = {n = -541436525, s = {s = 0x55fedfba5593 <qm_free+7942> "\353\a\220\353\004\220\353\001\220H\215e\330[A\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>, len = -1008952776}, re = 0x55fedfba5593 <qm_free+7942>}, pval = {rs = {s = 0x55fedfba5593 <qm_free+7942> "\353\a\220\353\004\220\353\001\220H\215e\330[A\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>, len = -1008952776}, ri = -1012977648, flags = 32528}}, i2s = "]\346\223\303\020\177\000\000\020\060\237Ë\000\000\000(\354\223\303\020\177"} rv1 = 0xc39f4240 rv2 = 0x29c39f3980 __func__ = "rval_expr_eval_int" #16 0x000055fedf8e7719 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386cf9c, rve=0x7f10c3c31350) at core/rvalue.c:1955 i1 = 0 i2 = -539905901 ret = -1 c1 = {cache_type = 1669778112, val_type = 32764, c = {avp_val = {n = -1013256867, s = {s = 0x7f10c39aed5d <db_postgres_free_result+1788> "\270", len = -1008594912}, re = 0x7f10c39aed5d <db_postgres_free_result+1788>}, pval = {rs = {s = 0x7f10c39aed5d <db_postgres_free_result+1788> "\270", len = -1008594912}, ri = -1008588888, flags = 32528}}, i2s = '\000' <repeats 21 times>} c2 = {cache_type = 1669778128, val_type = 32764, c = {avp_val = {n = -1008588888, s = {s = 0x7f10c3e227a8 "", len = 1669777920}, re = 0x7f10c3e227a8}, pval = {rs = {s = 0x7f10c3e227a8 "", len = 1669777920}, ri = -1618827640, flags = 32528}}, i2s = "\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U"} rv1 = 0x7ffc6386d2c8 rv2 = 0x7f10c39a83df <db_postgres_submit_query> __func__ = "rval_expr_eval_int" #17 0x000055fedf920a0a in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c31ef0, msg=0x7f10c3f80908) at core/action.c:1052 ret = -5 v = 1 dst = {send_sock = 0x203d3e3e2070695f, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\060\320\300\303\020\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "0\320\300\303\020\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "0\320\300\303\020\177\000\000\244҆c\374\177\000", __u6_addr16 = {53296, 50112, 32528, 0, 53924, 25478, 32764, 0}, __u6_addr32 = {3284193328, 32528, 1669780132, 32764}}}, sin6_scope_id = 3287812360}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\060\320\300\303\020\177\000\000\244҆c\374\177\000\000\b\t\370\303\020\177\000\000\240\343\206c\374\177\000\000UNT(callid)::integer , '' , \017\000\000\000ROM vg_p\210\246\202\237\020\177\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \020\000\000", __ss_align = 17179869185}}, id = 1669780132, send_flags = {f = 32764, blst_imask = 0}, proto = 36 '$', proto_pad0 = -48 '\320', proto_pad1 = 25478} tmp = 0x7f10c3bf99c8 "\002" new_uri = 0x7f10c3bf9890 "\001" end = 0x7ffc6386d190 "" crt = 0x7f10c3bf9a60 "\a" cmd = 0x7f10c3c18828 len = 22014 user = -543945635 uri = {user = {s = 0x2064696b6e757274 <error: Cannot access memory at address 0x2064696b6e757274>, len = 807419169}, passwd = {s = 0xffffffff70692064 <error: Cannot access memory at address 0xffffffff70692064>, len = 0}, host = {s = 0x7f10c3c16b70 "\004", len = 1669779764}, port = {s = 0x7f10c3f80908 "\b", len = 1669784480}, params = {s = 0x55fedfd1b093 "INFO", len = 536870912}, sip_params = {s = 0x7ffc6386cee0 "\b\t\370\303\020\177", len = -544014523}, headers = {s = 0x46202727202c2027 <error: Cannot access memory at address 0x46202727202c2027>, len = -1007154936}, port_no = 52720, proto = 50112, type = 32528, flags = (unknown: 1669784480), transport = {s = 0x0, len = -1}, ttl = {s = 0x7f109f82a688 "", len = 404008476}, user_param = {s = 0x0, len = -1003578192}, maddr = {s = 0x55fedfd1b093 "INFO", len = 536870912}, method = {s = 0xcaa277f21b14ae1c <error: Cannot access memory at address 0xcaa277f21b14ae1c>, len = 1682877980}, lr = {s = 0x204d4f5200000000 <error: Cannot access memory at address 0x204d4f5200000000>, len = 1633642358}, r2 = {s = 0x0, len = 0}, gr = {s = 0x3d206e69616d6f64 <error: Cannot access memory at address 0x3d206e69616d6f64>, len = -1618827640}, transport_val = {s = 0x0, len = -1003578192}, ttl_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, user_param_val = {s = 0x7ffc6386d010 "\200цc\374\177", len = -544312685}, maddr_val = {s = 0x2072656765746e69 <error: Cannot access memory at address 0x2072656765746e69>, len = 656875564}, method_val = {s = 0x76204d4f52462027 <error: Cannot access memory at address 0x76204d4f52462027>, len = 1885953895}, lr_val = {s = 0x7f10c3c16b68 "\001", len = 1669779764}, r2_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, gr_val = {s = 0x55fedfe823b0 <ut_buf_int2str> "", len = 0}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffc6386ccac "\362w\242", <incomplete sequence \312>, len = -1618827640}, host = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, port = {s = 0x55fedfd1b093 "INFO", len = -1618827640}, params = {s = 0x0, len = -1003578192}, sip_params = {s = 0x55fedfd1b093 "INFO", len = 536870912}, headers = {s = 0x7ffc6386cd70 "\240Άc\374\177", len = -544014523}, port_no = 52416, proto = 25478, type = 32764, flags = (unknown: 3287812360), transport = {s = 0x7f10c3c16350 "\302\004", len = 1669784480}, ttl = {s = 0x0, len = 1}, user_param = {s = 0x7f109f82a688 "", len = 460631580}, maddr = {s = 0x0, len = -1003578192}, method = {s = 0x55fedfd1b093 "INFO", len = 536870912}, lr = {s = 0xcaa277f21674ae1c <error: Cannot access memory at address 0xcaa277f21674ae1c>, len = 1682877980}, r2 = {s = 0x7f1000000000 <error: Cannot access memory at address 0x7f1000000000>, len = -1007154936}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x6776204e494f4a20 <error: Cannot access memory at address 0x6776204e494f4a20>, len = -1618827640}, ttl_val = {s = 0x0, len = -1003578192}, user_param_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, maddr_val = {s = 0x7ffc6386cea0 "\020Іc\374\177", len = -544312685}, method_val = {s = 0x20657079742e736c <error: Cannot access memory at address 0x20657079742e736c>, len = -1618827640}, lr_val = {s = 0x0, len = -542149130}, r2_val = {s = 0x0, len = 1}, gr_val = {s = 0x7ffc6386cea0 "\020Іc\374\177", len = -544333668}} u = 0x7ffc6386d210 port = 0 dst_host = 0x2e6665727065203d i = 1669779856 flags = 0 avp = 0x55fedfd1b093 st = {flags = 0, id = 0, name = {n = -1618827640, s = {s = 0x7f109f82a688 "", len = 0}, re = 0x7f109f82a688}, avp = 0x7f10c42e9cb0 <__syslog>} sct = 0x7ffc6386d024 sjt = 0x0 rve = 0x7f10c3c31350 mct = 0x0 rv = 0xf00000000 rv1 = 0x55fedfaf75f6 <pv_value_destroy+175> c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 1669726208}, re = 0x0}, pval = {rs = {s = 0x0, len = 1669726208}, ri = -541825017, flags = 22014}}, i2s = "mahmut.voip.com\000\000\000\000\000"} s = {s = 0x0, len = 0} srevp = {0x55fe00000000, 0x0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #18 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3c225b8, msg=0x7f10c3f80908) at core/action.c:1581 t = 0x7f10c3c31ef0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 0 __func__ = "run_actions" #19 0x000055fedf920efb in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c37010, msg=0x7f10c3f80908) at core/action.c:1067 ret = 1 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x0 new_uri = 0x0 end = 0x0 crt = 0x7ffc6386e3b0 "\210\246\202\237\020\177" cmd = 0x7f10c3ab64a8 len = 0 user = 1 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x1700000303 <error: Cannot access memory at address 0x1700000303>, len = 87}, host = {s = 0x0, len = 0}, port = {s = 0x7f10a129a940 "\212\330[\031#\375\370\245\067j\337\071\250\337\025-\342\267\333\334\340\023\301\210\356Z\354\320\306\022\352G31i\224\312\025=/\237]E\353\035\367Y\224\224\316\022\345?b,\344\352\361_:s\260\214\306څ\216(?\337C\200\002i:%\276_\030)\234ֿ\212&NUY\346\200"V\313\365\365WN\364\260\004G\264\375\374#\371\353\363\341\353ϼ\377=\335Ps\023\343\316ߚ?\312P6\035\207cc\267=Q\377\346\a\235\327e\247l\020\352C+=Ow\356\004\201\003(\255؉D\355>\325Kw\351$\306\377\301\024\360:\212^\201\314\357\352\317E\301\374\346hC\212\370\216\327%V\032ou\330\062\325\030ܧs\275"..., len = -1591105216}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} next_hop = {user = {s = 0x7ffc6386d4c0 "\020", len = 0}, passwd = {s = 0x7ffc6386d4c4 "", len = 0}, host = {s = 0x7f10a16f23d0 "\340\346\204\303\020\177", len = 1669780672}, port = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -1015996900}, params = {s = 0x7f10a16f23d0 "\340\346\204\303\020\177", len = -1590211304}, sip_params = {s = 0x7f10a1375aa0 "\003\003", len = -1014345500}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1669780747}, port_no = 12, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3278175344), transport = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 5}, ttl = {s = 0x0, len = 1669780747}, user_param = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 5}, maddr = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, method = {s = 0x0, len = 394917407}, lr = {s = 0x5aad993cdf85fc4f <error: Cannot access memory at address 0x5aad993cdf85fc4f>, len = -421945278}, r2 = {s = 0x7ffc6386d5b8 " ", len = -462440448}, gr = {s = 0x0, len = -1590211304}, transport_val = {s = 0x7f10a1375aa0 "\003\003", len = -1590207840}, ttl_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1669780920}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1014350068}, maddr_val = {s = 0x7f10a1375aa0 "\003\003", len = 32}, method_val = {s = 0x7f10a1375aa0 "\003\003", len = -1587508776}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 32}} u = 0x0 port = 0 dst_host = 0x0 i = 0 flags = 0 avp = 0x0 st = {flags = 2705394080, id = 32528, name = {n = 1669780672, s = {s = 0x7ffc6386d4c0 "\020", len = -1586551856}, re = 0x7ffc6386d4c0}, avp = 0x7f10c370387b} sct = 0x0 sjt = 0x0 rve = 0x7f10c3c1a4e8 mct = 0x0 rv = 0x0 rv1 = 0x0 c1 = {cache_type = 16, val_type = RV_NONE, c = {avp_val = {n = -1589573232, s = {s = 0x7f10a1410990 "C", len = -1589573232}, re = 0x7f10a1410990}, pval = {rs = {s = 0x7f10a1410990 "C", len = -1589573232}, ri = -1586281488, flags = 32528}}, i2s = "\320#o\241\020\177\000\000\360Bs\241\020\177\000\000\000\000\000\000\000"} s = {s = 0x7ffc6386d3f0 "\320#o\241\020\177", len = -1015914428} srevp = {0x1, 0x10} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #20 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3bf94d8, msg=0x7f10c3f80908) at core/action.c:1581 t = 0x7f10c3c37010 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 0 __func__ = "run_actions" #21 0x000055fedf91d0ee in do_action (h=0x7ffc6386e3a0, a=0x7f10c3ac9fd0, msg=0x7f10c3f80908) at core/action.c:700 ret = -5 v = 22014 dst = {send_sock = 0x2020202020202020, to = {s = {sa_family = 10456, sa_data = "\342\303\020\177\000\000m\317\035\241\020\177\000"}, sin = {sin_family = 10456, sin_port = 50146, sin_addr = {s_addr = 32528}, sin_zero = "m\317\035\241\020\177\000"}, sin6 = {sin6_family = 10456, sin6_port = 50146, sin6_flowinfo = 32528, sin6_addr = {__in6_u = {__u6_addr8 = "m\317\035\241\020\177\000\000\312\314\035\241\020\177\000", __u6_addr16 = {53101, 41245, 32528, 0, 52426, 41245, 32528, 0}, __u6_addr32 = {2703085421, 32528, 2703084746, 32528}}}, sin6_scope_id = 3286378992}, sas = {ss_family = 10456, __ss_padding = "\342\303\020\177\000\000m\317\035\241\020\177\000\000\312\314\035\241\020\177\000\000\360)\342\303\020\177\000\000\020\060\237\303\020\177\000\000\020\340\206c\374\177\000\000\070\330\327\302\020\177\000\000\000\000\000\000c", '\000' <repeats 13 times>, "\200\000\000\000\000\000\b\021&\000\000\000\000\000\b\324G\000\000\000\000\000\370\356Y\000\000\000\000\000\320\017\005\005\000\000\000\000\b\000\000\000\000\000\000", __ss_align = 40}}, id = -1012977648, send_flags = {f = 32528, blst_imask = 0}, proto = 64 '@', proto_pad0 = -32 '\340', proto_pad1 = 25478} tmp = 0x55fedfba326e <qm_malloc+2595> "H\213E\270H\203\300\070\351\230\003" new_uri = 0x5a0fd0 <error: Cannot access memory at address 0x5a0fd0> end = 0x47d848 <error: Cannot access memory at address 0x47d848> crt = 0x7ffc6386e290 "\220\343\206c\374\177" cmd = 0x1700000000 len = 0 user = -541446721 uri = {user = {s = 0x3920000000 <error: Cannot access memory at address 0x3920000000>, len = 0}, passwd = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 2494392}, host = {s = 0x40047d488 <error: Cannot access memory at address 0x40047d488>, len = -539752464}, port = {s = 0x5a0fd0 <error: Cannot access memory at address 0x5a0fd0>, len = 8}, params = {s = 0x7ffc6386df70 "0\341\206c\374\177", len = -541165936}, sip_params = {s = 0x7ffc6386de80 "\330(\342\303\020\177", len = -542094578}, headers = {s = 0x0, len = -539810044}, port_no = 57200, proto = 25478, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3753520572), transport = {s = 0x7f10c3e228d8 "\001", len = -1008588080}, ttl = {s = 0x7ffc6386dff2 "\005\005", len = 1669783539}, user_param = {s = 0x7f10a11dcf6d "", len = -1591882475}, maddr = {s = 0x55fedfd41048 <__func__.6942> "parse_via", len = -539746712}, method = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -1012977648}, lr = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 5}, r2 = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, gr = {s = 0x0, len = 394917407}, transport_val = {s = 0x429e703d42893948 <error: Cannot access memory at address 0x429e703d42893948>, len = -601816037}, ttl_val = {s = 0x7ffc6386dfa8 "\020\060\237\303\020\177", len = 1}, user_param_val = {s = 0x0, len = -1008588136}, maddr_val = {s = 0x500ff0000000000 <error: Cannot access memory at address 0x500ff0000000000>, len = 1669783532}, method_val = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1591882524}, lr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1591882519}, r2_val = {s = 0x7f10a11dcce9 ";branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: sip:1007@88.244.251.18:34323;rinstance=1fcf5028180487b9;transport=TCP\r\nTo: <sip:1007@mahmut.voip.com;transpor"..., len = 5}, gr_val = {s = 0x7ffc6386e130 "0\342\206c\374\177", len = -541110556}} next_hop = {user = {s = 0xa8428197 <error: Cannot access memory at address 0xa8428197>, len = -544731560}, passwd = {s = 0x2a10a06 <error: Cannot access memory at address 0x2a10a06>, len = 1669782928}, host = {s = 0x7ffc6386dd80 "\377\377\377\377", len = 1669782728}, port = {s = 0x7f10c457ba40 "\220\301Z\304\020\177", len = 7}, params = {s = 0x6386dec0 <error: Cannot access memory at address 0x6386dec0>, len = 0}, sip_params = {s = 0x7ffc6386dde0 "@+\342\303\020\177", len = -1472036457}, headers = {s = 0x7f10c45ac4f0 "P\304Z\304\020\177", len = 1669783080}, port_no = 49552, proto = 50266, type = 32528, flags = (unknown: 0), transport = {s = 0x7f10c457bab0 "\037e\211\337\376U", len = -1000811633}, ttl = {s = 0x5 <error: Cannot access memory at address 0x5>, len = -1000883536}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1000685168}, method = {s = 0x55fedf88e3fa "_setjmp", len = 0}, lr = {s = 0x7ffc6386dd80 "\377\377\377\377", len = 1669782928}, r2 = {s = 0x7f10c45ac4f0 "P\304Z\304\020\177", len = 0}, gr = {s = 0x7f10a16dc9d8 "\220", len = -1586934880}, transport_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1586934560}, ttl_val = {s = 0x7f10c4200158 "\373O", len = -1000885232}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 16}, maddr_val = {s = 0x7ffc6386dde0 "@+\342\303\020\177", len = -1015914428}, method_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -541405588}, lr_val = {s = 0x7ffc6386de10 "", len = -1012977648}, r2_val = {s = 0x7f10c3e22b40 "@", len = -1012977648}, gr_val = {s = 0x7ffc6386de50 "\200ކc\374\177", len = -1026041800}} u = 0x7ffc6386e290 port = 0 dst_host = 0x7f10a11dcf6d i = 11 flags = 22014 avp = 0x7f10a11dcf6d st = {flags = 1669782724, id = 32764, name = {n = -1000814498, s = {s = 0x7f10c458c85e <do_lookup_x+270> "\205\300\017\205\302\006", len = 0}, re = 0x7f10c458c85e <do_lookup_x+270>}, avp = 0x7f10c4207ca0} sct = 0x55fedfd49dcb sjt = 0x7f10c3e22830 rve = 0x55fedfd49e58 <__func__.6790> mct = 0xa128dfc0 rv = 0x7ffc6386dcc8 rv1 = 0x7f10c3e1bdc0 c1 = {cache_type = 3294082064, val_type = 32528, c = {avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1004565732}, re = 0x1}, pval = {rs = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1004565732}, ri = -1000813836, flags = 32528}}, i2s = "\022\004\000\000\000\000\000\000\240| \304\020\177\000\000\020\264W\304\020\177"} s = {s = 0x0, len = 1042} srevp = {0x0, 0x7f10c458c6ec <check_match+316>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #22 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3ac9b60, msg=0x7f10c3f80908) at core/action.c:1581 t = 0x7f10c3ac9fd0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = -1007154936, tz_dsttime = 32528} tdiff = 2703084732 __func__ = "run_actions" #23 0x000055fedf93000d in run_top_route (a=0x7f10c3ac9b60, msg=0x7f10c3f80908, c=0x0) at core/action.c:1666 ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {139709372343944, -3845379249392013796, 0, 139709987593392, 94553165115539, 536870912, -3845379249475899876, -7014620463946093028}, __mask_was_saved = 0, __saved_mask = {__val = {94553161952285, 6998053444, 139709984016648, 140721978271040, 94553163805580, 139709984018744, 139709984016312, 139709399289393, 139709399289029, 139709982555416, 0, 1073741825, 0, 139709987593392, 139709372343944, 0}}}}} p = 0x7ffc6386e3a0 ret = -539905901 sfbk = 0 #24 0x000055fedfaa8603 in receive_msg (buf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908) at core/receive.c:501 msg = 0x7f10c3f80908 ctx = {rec_lev = -1591882608, run_flags = 32528, last_retcode = 1460, jmp_env = {{__jmpbuf = {227633332225, 139709399288976, 8, 139709399288985, 34, 139709399289020, 7, 32}, __mask_was_saved = -539905901, __saved_mask = {__val = {536870912, 140721978271456, 94553163314141, 1025766200822493485, 0, 0, 17689295201705805418, 140721978272380, 139709399288048, 2079749502788070076, 2777162825698555585, 4722371164336740133, 92033367151166208, 14537356584683332797, 1950363756610510412, 11731023210721953098}}}}} bctx = 0x0 ret = 0 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} diff = 0 inb = {s = 0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len = 733} netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0} keng = 0x0 evp = {data = 0x7ffc6386e580, obuf = {s = 0x0, len = 0}, rcv = 0x7f10a11dc908, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 exectime = 0 __func__ = "receive_msg" #25 0x000055fedfb6c007 in receive_tcp_msg (tcpbuf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908, con=0x7f10a11dc8f0) at core/tcp_read.c:1383 buf = 0x0 bsize = 0 blen = 1460 __func__ = "receive_tcp_msg" #26 0x000055fedfb6e8d3 in tcp_read_req (con=0x7f10a11dc8f0, bytes_read=0x7ffc6386ea84, read_flags=0x7ffc6386ea7c) at core/tcp_read.c:1607 bytes = 1460 total_bytes = 1460 resp = 1 size = 0 req = 0x7f10a11dca18 dst = {send_sock = 0x0, to = {s = {sa_family = 40112, sa_data = ".\304\020\177\000\000\360\310\035\241\020\177\000"}, sin = {sin_family = 40112, sin_port = 50222, sin_addr = {s_addr = 32528}, sin_zero = "\360\310\035\241\020\177\000"}, sin6 = {sin6_family = 40112, sin6_port = 50222, sin6_flowinfo = 32528, sin6_addr = {__in6_u = {__u6_addr8 = "\360\310\035\241\020\177\000\000\000\000\000 \002\000\000", __u6_addr16 = {51440, 41245, 32528, 0, 0, 8192, 2, 0}, __u6_addr32 = {2703083760, 32528, 536870912, 2}}}, sin6_scope_id = 1669726209}, sas = {ss_family = 40112, __ss_padding = ".\304\020\177\000\000\360\310\035\241\020\177\000\000\000\000\000 \002\000\000\000\001\000\206c\017\000\000\000 "\343\337\376U\000\000\275N\341ZX\230\034\344\210\312\035\241\020\177\000\000(D\261\244m\345YC\340#\343\337\376U\000\000\024\000\000\000\000\000\000\000\001\000\000\000P\000\000\000\260\351\206c\374\177\000\000\276\006\252\337\376U\000\000p\352\206c\374\177\000\000\b\000\000\000\000\000\000", __ss_align = 35188667056128}}, id = -1007078360, send_flags = {f = 32528, blst_imask = 0}, proto = -120 '\210', proto_pad0 = -54 '\312', proto_pad1 = -24291} c = 82 'R' ret = -1 __func__ = "tcp_read_req" #27 0x000055fedfb730ec in handle_io (fm=0x7f10c3f93428, events=1, idx=-1) at core/tcp_read.c:1857 ret = 8 n = 1052 read_flags = RD_CONN_SHORT_READ con = 0x7f10a11dc8f0 s = 15 resp = 1 t = 1129964909 ee = 0x0 __func__ = "handle_io" #28 0x000055fedfb5dd3a in io_wait_loop_epoll (h=0x55fedfe32220 <io_w>, t=2, repeat=0) at core/io_wait.h:1070 n = 1 r = 0 fm = 0x7f10c3f93428 revents = 1 __func__ = "io_wait_loop_epoll" #29 0x000055fedfb74c0e in tcp_receive_loop (unix_sock=89) at core/tcp_read.c:1978 __func__ = "tcp_receive_loop" #30 0x000055fedf9f8f73 in tcp_init_children (woneinit=0x7ffc6386ee3c) at core/tcp_main.c:5139 r = 12 i = 15 reader_fd_1 = 89 pid = 0 si_desc = "tcp receiver (generic)\000\000\210\200\314\337\376U\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\320\355\206c\374\177\000\000D>\244\337\376U\000\000\320\355\206c\374\177\000\000\065\243\260\337\000\000\000\000\200\355\206c\374\177\000\000\305,\306\337\376U\000\000\000\000\000\000\000\000\000\000\210\246\202\237\062\000\000" si = 0x0 __func__ = "tcp_init_children" #31 0x000055fedf8b8d96 in main_loop () at main.c:1857 i = 16 pid = 4933 si = 0x0 si_desc = "udp receiver child=15 sock=56.100.82.100:5090\000\000\360\363\206c\374\177\000\000\350Ϊ\303\020\177\000\000\260\234.\304\020\177\000\000\350Ȼ\303\020\177\000\000\000\000\000 \000\000\000\000L\235.\304\020\177\000\000\060\000\000\000\060\000\000\000\250\357\206c\374\177\000\000\300\356\206c\374\177\000\000\000\270o\344\335t\323", <incomplete sequence \365> nrprocs = 16 woneinit = 1 __func__ = "main_loop" #32 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053 cfg_stream = 0x55fee0304290 c = -1 r = 0 tmp = 0x7ffc6386fd8a "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x55fedfccb0b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1758625625 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x7ffc639b9268 p = 0x7f10c4298af5 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 20, st_ino = 17804, st_nlink = 2, st_mode = 16832, st_uid = 1113, st_gid = 1113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1622014594, tv_nsec = 669820306}, st_mtim = {tv_sec = 1622023822, tv_nsec = 713813032}, st_ctim = {tv_sec = 1622023822, tv_nsec = 713813032}, __glibc_reserved = {0, 0, 0}} tbuf = "H\365\206c\374\177\000\000\330+=\304\020\177", '\000' <repeats 11 times>, "\033Y\304\020\177\000\000\001", '\000' <repeats 15 times>, ",\363 \304\020\177\000\000(6X\304\020\177\000\000 \364\206c\374\177\000\000\272\204Y\304\020\177\000\000\000\000\000\000\000\000\000\000@e;\304\020\177\000\000г<\304\020\177\000\000D\364\206c\374\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>... option_index = 0 long_options = {{name = 0x55fedfccd366 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fedfcc8514 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fedfccd36b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55fedfccd371 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fedfccd377 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fedfccd380 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55fedfccd38a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fedfccd394 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fedfccd39f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55fedfccd3a8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fedfccd3b3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fedfccd3b9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55fedfccd3c3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" ================================================================================ # thread apply all bt ================================================================================
Thread 1 (Thread 0x7f10c41f5100 (LWP 4958)): #0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #1 0x00007f10c36877ed in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #2 0x00007f10c3686dc5 in CONF_modules_load () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #3 0x00007f10c368738b in CONF_modules_load_file () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #4 0x00007f10bfd9331e in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4 #5 0x00007f10bfd592cf in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4 #6 0x00007f10bfd59598 in curl_easy_init () from /lib/x86_64-linux-gnu/libcurl.so.4 #7 0x00007f10bfdfa9f4 in vg_call_event_api (pjson=0x7ffc6386abf0 "{"version":"1.0","eventcode":"300","data":{"ip_address":"56.100.82.107","username":"1007","apiuserkey":"7f813a24-83e1-bc34-d4d1-293a4f84c5f6"}}", event_url=...) at event.c:52 #8 0x00007f10bfdfae0d in vg_send_notallowed_user_from_ip_event (eventCode=300, szIpAddress=0x55fedfe1b4c0 <buff> "56.100.82.107", szUserName=0x7ffc6386ba60 "1007", szApiUserKey=0x7ffc6386b970 "7f813a24-83e1-bc34-d4d1-293a4f84c5f6") at event.c:139 #9 0x00007f10bfde867a in vg_digest_authenticate_hdr (msg=0x7f10c3f80908, realm=0x7ffc6386bd20, hftype=HDR_AUTHORIZATION_T, method=0x7f10c3f80930, ahdr=0x7ffc6386bd18) at vg_auth.c:431 #10 0x00007f10bfde8d60 in w_vg_auth (pmsg=0x7f10c3f80908) at vg_auth.c:530 #11 0x000055fedf920f8f in do_action (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1076 #12 0x000055fedf92f857 in run_actions (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1581 #13 0x000055fedf92ff45 in run_actions_safe (h=0x7ffc6386e3a0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1645 #14 0x000055fedf8e209c in rval_get_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, i=0x7ffc6386ca64, rv=0x7f10c3c30c28, cache=0x0) at core/rvalue.c:949 #15 0x000055fedf8e7293 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386ca64, rve=0x7f10c3c30c20) at core/rvalue.c:1947 #16 0x000055fedf8e7719 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386cf9c, rve=0x7f10c3c31350) at core/rvalue.c:1955 #17 0x000055fedf920a0a in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c31ef0, msg=0x7f10c3f80908) at core/action.c:1052 #18 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3c225b8, msg=0x7f10c3f80908) at core/action.c:1581 #19 0x000055fedf920efb in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c37010, msg=0x7f10c3f80908) at core/action.c:1067 #20 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3bf94d8, msg=0x7f10c3f80908) at core/action.c:1581 #21 0x000055fedf91d0ee in do_action (h=0x7ffc6386e3a0, a=0x7f10c3ac9fd0, msg=0x7f10c3f80908) at core/action.c:700 #22 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3ac9b60, msg=0x7f10c3f80908) at core/action.c:1581 #23 0x000055fedf93000d in run_top_route (a=0x7f10c3ac9b60, msg=0x7f10c3f80908, c=0x0) at core/action.c:1666 #24 0x000055fedfaa8603 in receive_msg (buf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908) at core/receive.c:501 #25 0x000055fedfb6c007 in receive_tcp_msg (tcpbuf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908, con=0x7f10a11dc8f0) at core/tcp_read.c:1383 #26 0x000055fedfb6e8d3 in tcp_read_req (con=0x7f10a11dc8f0, bytes_read=0x7ffc6386ea84, read_flags=0x7ffc6386ea7c) at core/tcp_read.c:1607 #27 0x000055fedfb730ec in handle_io (fm=0x7f10c3f93428, events=1, idx=-1) at core/tcp_read.c:1857 #28 0x000055fedfb5dd3a in io_wait_loop_epoll (h=0x55fedfe32220 <io_w>, t=2, repeat=0) at core/io_wait.h:1070 #29 0x000055fedfb74c0e in tcp_receive_loop (unix_sock=89) at core/tcp_read.c:1978 #30 0x000055fedf9f8f73 in tcp_init_children (woneinit=0x7ffc6386ee3c) at core/tcp_main.c:5139 #31 0x000055fedf8b8d96 in main_loop () at main.c:1857 #32 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053 ================================================================================ # thread apply all bt full ================================================================================
Thread 1 (Thread 0x7f10c41f5100 (LWP 4958)): #0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #1 0x00007f10c36877ed in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #2 0x00007f10c3686dc5 in CONF_modules_load () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #3 0x00007f10c368738b in CONF_modules_load_file () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #4 0x00007f10bfd9331e in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4 No symbol table info available. #5 0x00007f10bfd592cf in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4 No symbol table info available. #6 0x00007f10bfd59598 in curl_easy_init () from /lib/x86_64-linux-gnu/libcurl.so.4 No symbol table info available. #7 0x00007f10bfdfa9f4 in vg_call_event_api (pjson=0x7ffc6386abf0 "{"version":"1.0","eventcode":"300","data":{"ip_address":"56.100.82.107","username":"1007","apiuserkey":"7f813a24-83e1-bc34-d4d1-293a4f84c5f6"}}", event_url=...) at event.c:52 __func__ = "vg_call_event_api" curl = 0x7ffc6386ac90 #8 0x00007f10bfdfae0d in vg_send_notallowed_user_from_ip_event (eventCode=300, szIpAddress=0x55fedfe1b4c0 <buff> "56.100.82.107", szUserName=0x7ffc6386ba60 "1007", szApiUserKey=0x7ffc6386b970 "7f813a24-83e1-bc34-d4d1-293a4f84c5f6") at event.c:139 szDataBuffer = "{"version":"1.0","eventcode":"300","data":{"ip_address":"56.100.82.107","username":"1007","apiuserkey":"7f813a24-83e1-bc34-d4d1-293a4f84c5f6"}}", '\000' <repeats 350 times> #9 0x00007f10bfde867a in vg_digest_authenticate_hdr (msg=0x7f10c3f80908, realm=0x7ffc6386bd20, hftype=HDR_AUTHORIZATION_T, method=0x7f10c3f80930, ahdr=0x7ffc6386bd18) at vg_auth.c:431 iExtType = 100 chRegister = 0 '\000' IsRegistered = 0 '\000' chGlobalAllowedIp = 0 '\000' chSiptrunk = 0 '\000' IsAllowed = 0 '\000' chAllow = 1 '\001' chRegisterEventEnabled = 1 '\001' res = 0x7f10c3dc9a38 rest = 0x0 pCon = 0x7f10c3e227a8 resp = "\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\300\274\206c\374\177\000\000x#\336\277\020\177\000\000" hent = "\000\000\000\000\000\000\000\000\207\204\343\277\000\000\000\000\223\260\321\337\376U\000\000\210\246\202\237\020\177\000\000" password = {s = 0x0, len = -1012242104} ha1 = "\000\000\000\000\000\000\000\000\220\274\206c\374\177\000\000H\274\206c\374\177\000\000\b\t\370\303\020\177", '\000' <repeats 18 times>, "\060\274\206c\374\177\000\000\260\274\206c\374\177", '\000' <repeats 58 times>, "\210\246\202\237\020\177\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\000\274\206c\374\177\000\000\343J\257\337\376U\000\000\000\000\000\000\000\000\000\000\220\274\206c\374\177\000\000\060\274\206c\374\177\000\000"... szUserName = "1007", '\000' <repeats 70 times> szPassword = '\000' <repeats 79 times> szDomain = "mahmut.voip.com", '\000' <repeats 63 times> szApiUserKey = "7f813a24-83e1-bc34-d4d1-293a4f84c5f6", '\000' <repeats 43 times> szQuery = "SELECT 1::integer as tt , ex.username::text , ex.password::text , ex.exttype::integer , ep.param_value::text as tt2 , ep2.param_value::text , lc.id::integer , ( SELECT COUNT( type ) FROM vg_ipaccepts"... h = 0x7f10c3e20ad0 cred = 0x7f10c3e21020 cd = 0x7f10c2af3cf7 <pv_get_ruri_attr> ret = -3 iTenantNo = 1293 iExt = 7 iSub = 0 iRealmLen = 17 iUserLen = 10 pIP = 0x55fedfe1b4c0 <buff> "56.100.82.107" __func__ = "vg_digest_authenticate_hdr" chIsTrunk = 0 '\000' #10 0x00007f10bfde8d60 in w_vg_auth (pmsg=0x7f10c3f80908) at vg_auth.c:530 srealm = {s = 0x7ffc6386bce0 "mahmut.voip.com", len = 16} ret = -1 hdr = 0x7f10c3e20ad0 uri = 0x0 turi = 0x0 furi = 0x0 szDomain = "mahmut.voip.com\000\276\206c\374\177\000\000\234 \216\337\376U", '\000' <repeats 19 times> #11 0x000055fedf920f8f in do_action (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1076 ret = -5 v = 0 dst = {send_sock = 0x55fedfd1b093, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000\214\302\206c\374\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\214\302\206c\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\214\302\206c\374\177\000\000\034\256Nd\026\000\000", __u6_addr16 = {49804, 25478, 32764, 0, 44572, 25678, 22, 0}, __u6_addr32 = {1669776012, 32764, 1682877980, 22}}}, sin6_scope_id = 3756532656}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000\214\302\206c\374\177\000\000\034\256Nd\026\000\000\000\260#\350\337\376U\000\000\000\000\000\000\000\000\000\000\f\000\000\000\000\000\000\000s\374d\303\000\000\000\000\346\000\000\000\000\000\000\000\005", '\000' <repeats 15 times>, "+\302\206c\374\177\000\000\005\000\000\000\000\000\000\000\005\000\000\000\000\000\000\000\005", '\000' <repeats 11 times>, "\017\000\000", __ss_align = 4294967296}}, id = -1618827640, send_flags = {f = 32528, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x55fedf8e237e <rval_get_int+1054> "\351\250\003" new_uri = 0x0 end = 0x0 crt = 0x7ffc6386c4f0 "`Ɔc\374\177" cmd = 0x7f10c3ab6470 len = 32764 user = 1669776480 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 230, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 3279052244), transport = {s = 0x7f10a16c86c0 "(", len = -1586934880}, ttl = {s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = -1586934560}, user_param = {s = 0x7f10a1694d00 "\036\033\373\005\^\247\312\066_J\241ٰ\020\006\275N\341ZX\230\034\344\317䉲\222\376\223\273(D\261\244\205\356\267\314r\252h\350\312f\217_\016\034K\226L\212\026\232 }\217\344罋kr\216[\212裑ؖ\334f\204\253`\265e.a\304r\253\067\235\361\344R=\016C\303$\275", len = -1015910656}, maddr = {s = 0x0, len = -1618827640}, method = {s = 0x0, len = -1003578192}, lr = {s = 0x55fedfd1b093 "INFO", len = 536870912}, r2 = {s = 0x7ffc6386c270 " Ɇc\374\177", len = -544311144}, gr = {s = 0x7f10a1009978 "\340\346\204\303\020\177", len = -1618827640}, transport_val = {s = 0x0, len = -1003578192}, ttl_val = {s = 0x7f10c3c2ace0 "\017", len = 1669777244}, user_param_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, maddr_val = {s = 0x7f10a1296790 "T", len = -1007154936}, method_val = {s = 0x7f10c3c16930 "\305\004", len = 1669784480}, lr_val = {s = 0x0, len = -1}, r2_val = {s = 0x7f109f82a688 "", len = 20229660}, gr_val = {s = 0x0, len = -1003578192}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 1669775904}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = -539810039}, user_param = {s = 0x12500000187 <error: Cannot access memory at address 0x12500000187>, len = -539810039}, maddr = {s = 0x143000001ff <error: Cannot access memory at address 0x143000001ff>, len = -1081640172}, method = {s = 0x7f10a16c8630 "(", len = -1618827640}, lr = {s = 0x0, len = -1003578192}, r2 = {s = 0x55fedfd1b093 "INFO", len = 536870912}, gr = {s = 0x7ffc6386c100 "p\302\206c\374\177", len = -544311477}, transport_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, ttl_val = {s = 0x7ffc6386c140 "\b\t\370\303\020\177", len = -544016297}, user_param_val = {s = 0x7f10c3c2a5b0 "\004", len = 1669775904}, maddr_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1007154936}, lr_val = {s = 0x7f10c3c16930 "\305\004", len = 1669775728}, r2_val = {s = 0x7ffc6386c110 "x\231", len = -1016937788}, gr_val = {s = 0x0, len = 0}} u = 0x55fedfd1b093 port = 0 dst_host = 0x55fedfd1b093 i = -542149130 flags = 0 avp = 0x0 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x7f10c3c1ad08 sjt = 0x55fedf920a0a <do_action+36269> rve = 0x7f10c3e1ab18 mct = 0x7ffc6386c920 rv = 0x7ffc6386e3a0 rv1 = 0x7f109f82a688 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = "\200\236\302\303\020\177\000\000\264\300\206c\374\177\000\000\b\t\370\303\020\177"} s = {s = 0x7ffc6386bf90 "", len = -544312685} srevp = {0x55fedfd1b093, 0x20000000} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #12 0x000055fedf92f857 in run_actions (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1581 t = 0x7f10c3c309b0 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = -1013718290, tz_dsttime = 32528} tdiff = 2489880 __func__ = "run_actions" #13 0x000055fedf92ff45 in run_actions_safe (h=0x7ffc6386e3a0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1645 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {139709372343944, -3845379250411229668, 0, 139709987593392, 94553165115539, 536870912, -3845379250360898020, -7014620463946093028}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 0, 139709372343944, 0, 139709987593392, 94553165115539, 536870912, 140721978263504, 94553160710168, 139709982158504, 139709978193936, 140721978263264, 139709965129784, 139709980502408}}}}} ret = 1669777648 ign_on_break = 0 #14 0x000055fedf8e209c in rval_get_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, i=0x7ffc6386ca64, rv=0x7f10c3c30c28, cache=0x0) at core/rvalue.c:949 r_avp = 0x800600000020 avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 2490832}, re = 0x1} pval = {rs = {s = 0x7ffc6386c7a0 "\377\377\377\377\374\177", len = -1026041800}, ri = -1009012800, flags = 32528} tmp = {s = 0x7f10c3dc9a00 "H\a", len = -1012977648} s = 0x0 r = 0 ret = 0 destroy_pval = 0 __func__ = "rval_get_int" #15 0x000055fedf8e7293 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386ca64, rve=0x7f10c3c30c20) at core/rvalue.c:1947 i1 = 0 i2 = 0 ret = -1 c1 = {cache_type = 3284315360, val_type = 32528, c = {avp_val = {n = 1669779356, s = {s = 0x7ffc6386cf9c "\001", len = 0}, re = 0x7ffc6386cf9c}, pval = {rs = {s = 0x7ffc6386cf9c "\001", len = 0}, ri = -1003578192, flags = 32528}}, i2s = "\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\200Ɇc\374\177"} c2 = {cache_type = 1669777792, val_type = 32764, c = {avp_val = {n = -541436525, s = {s = 0x55fedfba5593 <qm_free+7942> "\353\a\220\353\004\220\353\001\220H\215e\330[A\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>, len = -1008952776}, re = 0x55fedfba5593 <qm_free+7942>}, pval = {rs = {s = 0x55fedfba5593 <qm_free+7942> "\353\a\220\353\004\220\353\001\220H\215e\330[A\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>, len = -1008952776}, ri = -1012977648, flags = 32528}}, i2s = "]\346\223\303\020\177\000\000\020\060\237Ë\000\000\000(\354\223\303\020\177"} rv1 = 0xc39f4240 rv2 = 0x29c39f3980 __func__ = "rval_expr_eval_int" #16 0x000055fedf8e7719 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386cf9c, rve=0x7f10c3c31350) at core/rvalue.c:1955 i1 = 0 i2 = -539905901 ret = -1 c1 = {cache_type = 1669778112, val_type = 32764, c = {avp_val = {n = -1013256867, s = {s = 0x7f10c39aed5d <db_postgres_free_result+1788> "\270", len = -1008594912}, re = 0x7f10c39aed5d <db_postgres_free_result+1788>}, pval = {rs = {s = 0x7f10c39aed5d <db_postgres_free_result+1788> "\270", len = -1008594912}, ri = -1008588888, flags = 32528}}, i2s = '\000' <repeats 21 times>} c2 = {cache_type = 1669778128, val_type = 32764, c = {avp_val = {n = -1008588888, s = {s = 0x7f10c3e227a8 "", len = 1669777920}, re = 0x7f10c3e227a8}, pval = {rs = {s = 0x7f10c3e227a8 "", len = 1669777920}, ri = -1618827640, flags = 32528}}, i2s = "\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U"} rv1 = 0x7ffc6386d2c8 rv2 = 0x7f10c39a83df <db_postgres_submit_query> __func__ = "rval_expr_eval_int" #17 0x000055fedf920a0a in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c31ef0, msg=0x7f10c3f80908) at core/action.c:1052 ret = -5 v = 1 dst = {send_sock = 0x203d3e3e2070695f, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\060\320\300\303\020\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "0\320\300\303\020\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "0\320\300\303\020\177\000\000\244҆c\374\177\000", __u6_addr16 = {53296, 50112, 32528, 0, 53924, 25478, 32764, 0}, __u6_addr32 = {3284193328, 32528, 1669780132, 32764}}}, sin6_scope_id = 3287812360}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\060\320\300\303\020\177\000\000\244҆c\374\177\000\000\b\t\370\303\020\177\000\000\240\343\206c\374\177\000\000UNT(callid)::integer , '' , \017\000\000\000ROM vg_p\210\246\202\237\020\177\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \020\000\000", __ss_align = 17179869185}}, id = 1669780132, send_flags = {f = 32764, blst_imask = 0}, proto = 36 '$', proto_pad0 = -48 '\320', proto_pad1 = 25478} tmp = 0x7f10c3bf99c8 "\002" new_uri = 0x7f10c3bf9890 "\001" end = 0x7ffc6386d190 "" crt = 0x7f10c3bf9a60 "\a" cmd = 0x7f10c3c18828 len = 22014 user = -543945635 uri = {user = {s = 0x2064696b6e757274 <error: Cannot access memory at address 0x2064696b6e757274>, len = 807419169}, passwd = {s = 0xffffffff70692064 <error: Cannot access memory at address 0xffffffff70692064>, len = 0}, host = {s = 0x7f10c3c16b70 "\004", len = 1669779764}, port = {s = 0x7f10c3f80908 "\b", len = 1669784480}, params = {s = 0x55fedfd1b093 "INFO", len = 536870912}, sip_params = {s = 0x7ffc6386cee0 "\b\t\370\303\020\177", len = -544014523}, headers = {s = 0x46202727202c2027 <error: Cannot access memory at address 0x46202727202c2027>, len = -1007154936}, port_no = 52720, proto = 50112, type = 32528, flags = (unknown: 1669784480), transport = {s = 0x0, len = -1}, ttl = {s = 0x7f109f82a688 "", len = 404008476}, user_param = {s = 0x0, len = -1003578192}, maddr = {s = 0x55fedfd1b093 "INFO", len = 536870912}, method = {s = 0xcaa277f21b14ae1c <error: Cannot access memory at address 0xcaa277f21b14ae1c>, len = 1682877980}, lr = {s = 0x204d4f5200000000 <error: Cannot access memory at address 0x204d4f5200000000>, len = 1633642358}, r2 = {s = 0x0, len = 0}, gr = {s = 0x3d206e69616d6f64 <error: Cannot access memory at address 0x3d206e69616d6f64>, len = -1618827640}, transport_val = {s = 0x0, len = -1003578192}, ttl_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, user_param_val = {s = 0x7ffc6386d010 "\200цc\374\177", len = -544312685}, maddr_val = {s = 0x2072656765746e69 <error: Cannot access memory at address 0x2072656765746e69>, len = 656875564}, method_val = {s = 0x76204d4f52462027 <error: Cannot access memory at address 0x76204d4f52462027>, len = 1885953895}, lr_val = {s = 0x7f10c3c16b68 "\001", len = 1669779764}, r2_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, gr_val = {s = 0x55fedfe823b0 <ut_buf_int2str> "", len = 0}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffc6386ccac "\362w\242", <incomplete sequence \312>, len = -1618827640}, host = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, port = {s = 0x55fedfd1b093 "INFO", len = -1618827640}, params = {s = 0x0, len = -1003578192}, sip_params = {s = 0x55fedfd1b093 "INFO", len = 536870912}, headers = {s = 0x7ffc6386cd70 "\240Άc\374\177", len = -544014523}, port_no = 52416, proto = 25478, type = 32764, flags = (unknown: 3287812360), transport = {s = 0x7f10c3c16350 "\302\004", len = 1669784480}, ttl = {s = 0x0, len = 1}, user_param = {s = 0x7f109f82a688 "", len = 460631580}, maddr = {s = 0x0, len = -1003578192}, method = {s = 0x55fedfd1b093 "INFO", len = 536870912}, lr = {s = 0xcaa277f21674ae1c <error: Cannot access memory at address 0xcaa277f21674ae1c>, len = 1682877980}, r2 = {s = 0x7f1000000000 <error: Cannot access memory at address 0x7f1000000000>, len = -1007154936}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x6776204e494f4a20 <error: Cannot access memory at address 0x6776204e494f4a20>, len = -1618827640}, ttl_val = {s = 0x0, len = -1003578192}, user_param_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, maddr_val = {s = 0x7ffc6386cea0 "\020Іc\374\177", len = -544312685}, method_val = {s = 0x20657079742e736c <error: Cannot access memory at address 0x20657079742e736c>, len = -1618827640}, lr_val = {s = 0x0, len = -542149130}, r2_val = {s = 0x0, len = 1}, gr_val = {s = 0x7ffc6386cea0 "\020Іc\374\177", len = -544333668}} u = 0x7ffc6386d210 port = 0 dst_host = 0x2e6665727065203d i = 1669779856 flags = 0 avp = 0x55fedfd1b093 st = {flags = 0, id = 0, name = {n = -1618827640, s = {s = 0x7f109f82a688 "", len = 0}, re = 0x7f109f82a688}, avp = 0x7f10c42e9cb0 <__syslog>} sct = 0x7ffc6386d024 sjt = 0x0 rve = 0x7f10c3c31350 mct = 0x0 rv = 0xf00000000 rv1 = 0x55fedfaf75f6 <pv_value_destroy+175> c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 1669726208}, re = 0x0}, pval = {rs = {s = 0x0, len = 1669726208}, ri = -541825017, flags = 22014}}, i2s = "mahmut.voip.com\000\000\000\000\000"} s = {s = 0x0, len = 0} srevp = {0x55fe00000000, 0x0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #18 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3c225b8, msg=0x7f10c3f80908) at core/action.c:1581 t = 0x7f10c3c31ef0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 0 __func__ = "run_actions" #19 0x000055fedf920efb in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c37010, msg=0x7f10c3f80908) at core/action.c:1067 ret = 1 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x0 new_uri = 0x0 end = 0x0 crt = 0x7ffc6386e3b0 "\210\246\202\237\020\177" cmd = 0x7f10c3ab64a8 len = 0 user = 1 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x1700000303 <error: Cannot access memory at address 0x1700000303>, len = 87}, host = {s = 0x0, len = 0}, port = {s = 0x7f10a129a940 "\212\330[\031#\375\370\245\067j\337\071\250\337\025-\342\267\333\334\340\023\301\210\356Z\354\320\306\022\352G31i\224\312\025=/\237]E\353\035\367Y\224\224\316\022\345?b,\344\352\361_:s\260\214\306څ\216(?\337C\200\002i:%\276_\030)\234ֿ\212&NUY\346\200"V\313\365\365WN\364\260\004G\264\375\374#\371\353\363\341\353ϼ\377=\335Ps\023\343\316ߚ?\312P6\035\207cc\267=Q\377\346\a\235\327e\247l\020\352C+=Ow\356\004\201\003(\255؉D\355>\325Kw\351$\306\377\301\024\360:\212^\201\314\357\352\317E\301\374\346hC\212\370\216\327%V\032ou\330\062\325\030ܧs\275"..., len = -1591105216}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} next_hop = {user = {s = 0x7ffc6386d4c0 "\020", len = 0}, passwd = {s = 0x7ffc6386d4c4 "", len = 0}, host = {s = 0x7f10a16f23d0 "\340\346\204\303\020\177", len = 1669780672}, port = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -1015996900}, params = {s = 0x7f10a16f23d0 "\340\346\204\303\020\177", len = -1590211304}, sip_params = {s = 0x7f10a1375aa0 "\003\003", len = -1014345500}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1669780747}, port_no = 12, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3278175344), transport = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 5}, ttl = {s = 0x0, len = 1669780747}, user_param = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 5}, maddr = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, method = {s = 0x0, len = 394917407}, lr = {s = 0x5aad993cdf85fc4f <error: Cannot access memory at address 0x5aad993cdf85fc4f>, len = -421945278}, r2 = {s = 0x7ffc6386d5b8 " ", len = -462440448}, gr = {s = 0x0, len = -1590211304}, transport_val = {s = 0x7f10a1375aa0 "\003\003", len = -1590207840}, ttl_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1669780920}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1014350068}, maddr_val = {s = 0x7f10a1375aa0 "\003\003", len = 32}, method_val = {s = 0x7f10a1375aa0 "\003\003", len = -1587508776}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 32}} u = 0x0 port = 0 dst_host = 0x0 i = 0 flags = 0 avp = 0x0 st = {flags = 2705394080, id = 32528, name = {n = 1669780672, s = {s = 0x7ffc6386d4c0 "\020", len = -1586551856}, re = 0x7ffc6386d4c0}, avp = 0x7f10c370387b} sct = 0x0 sjt = 0x0 rve = 0x7f10c3c1a4e8 mct = 0x0 rv = 0x0 rv1 = 0x0 c1 = {cache_type = 16, val_type = RV_NONE, c = {avp_val = {n = -1589573232, s = {s = 0x7f10a1410990 "C", len = -1589573232}, re = 0x7f10a1410990}, pval = {rs = {s = 0x7f10a1410990 "C", len = -1589573232}, ri = -1586281488, flags = 32528}}, i2s = "\320#o\241\020\177\000\000\360Bs\241\020\177\000\000\000\000\000\000\000"} s = {s = 0x7ffc6386d3f0 "\320#o\241\020\177", len = -1015914428} srevp = {0x1, 0x10} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #20 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3bf94d8, msg=0x7f10c3f80908) at core/action.c:1581 t = 0x7f10c3c37010 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 0 __func__ = "run_actions" #21 0x000055fedf91d0ee in do_action (h=0x7ffc6386e3a0, a=0x7f10c3ac9fd0, msg=0x7f10c3f80908) at core/action.c:700 ret = -5 v = 22014 dst = {send_sock = 0x2020202020202020, to = {s = {sa_family = 10456, sa_data = "\342\303\020\177\000\000m\317\035\241\020\177\000"}, sin = {sin_family = 10456, sin_port = 50146, sin_addr = {s_addr = 32528}, sin_zero = "m\317\035\241\020\177\000"}, sin6 = {sin6_family = 10456, sin6_port = 50146, sin6_flowinfo = 32528, sin6_addr = {__in6_u = {__u6_addr8 = "m\317\035\241\020\177\000\000\312\314\035\241\020\177\000", __u6_addr16 = {53101, 41245, 32528, 0, 52426, 41245, 32528, 0}, __u6_addr32 = {2703085421, 32528, 2703084746, 32528}}}, sin6_scope_id = 3286378992}, sas = {ss_family = 10456, __ss_padding = "\342\303\020\177\000\000m\317\035\241\020\177\000\000\312\314\035\241\020\177\000\000\360)\342\303\020\177\000\000\020\060\237\303\020\177\000\000\020\340\206c\374\177\000\000\070\330\327\302\020\177\000\000\000\000\000\000c", '\000' <repeats 13 times>, "\200\000\000\000\000\000\b\021&\000\000\000\000\000\b\324G\000\000\000\000\000\370\356Y\000\000\000\000\000\320\017\005\005\000\000\000\000\b\000\000\000\000\000\000", __ss_align = 40}}, id = -1012977648, send_flags = {f = 32528, blst_imask = 0}, proto = 64 '@', proto_pad0 = -32 '\340', proto_pad1 = 25478} tmp = 0x55fedfba326e <qm_malloc+2595> "H\213E\270H\203\300\070\351\230\003" new_uri = 0x5a0fd0 <error: Cannot access memory at address 0x5a0fd0> end = 0x47d848 <error: Cannot access memory at address 0x47d848> crt = 0x7ffc6386e290 "\220\343\206c\374\177" cmd = 0x1700000000 len = 0 user = -541446721 uri = {user = {s = 0x3920000000 <error: Cannot access memory at address 0x3920000000>, len = 0}, passwd = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 2494392}, host = {s = 0x40047d488 <error: Cannot access memory at address 0x40047d488>, len = -539752464}, port = {s = 0x5a0fd0 <error: Cannot access memory at address 0x5a0fd0>, len = 8}, params = {s = 0x7ffc6386df70 "0\341\206c\374\177", len = -541165936}, sip_params = {s = 0x7ffc6386de80 "\330(\342\303\020\177", len = -542094578}, headers = {s = 0x0, len = -539810044}, port_no = 57200, proto = 25478, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3753520572), transport = {s = 0x7f10c3e228d8 "\001", len = -1008588080}, ttl = {s = 0x7ffc6386dff2 "\005\005", len = 1669783539}, user_param = {s = 0x7f10a11dcf6d "", len = -1591882475}, maddr = {s = 0x55fedfd41048 <__func__.6942> "parse_via", len = -539746712}, method = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -1012977648}, lr = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 5}, r2 = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, gr = {s = 0x0, len = 394917407}, transport_val = {s = 0x429e703d42893948 <error: Cannot access memory at address 0x429e703d42893948>, len = -601816037}, ttl_val = {s = 0x7ffc6386dfa8 "\020\060\237\303\020\177", len = 1}, user_param_val = {s = 0x0, len = -1008588136}, maddr_val = {s = 0x500ff0000000000 <error: Cannot access memory at address 0x500ff0000000000>, len = 1669783532}, method_val = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1591882524}, lr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1591882519}, r2_val = {s = 0x7f10a11dcce9 ";branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: sip:1007@88.244.251.18:34323;rinstance=1fcf5028180487b9;transport=TCP\r\nTo: <sip:1007@mahmut.voip.com;transpor"..., len = 5}, gr_val = {s = 0x7ffc6386e130 "0\342\206c\374\177", len = -541110556}} next_hop = {user = {s = 0xa8428197 <error: Cannot access memory at address 0xa8428197>, len = -544731560}, passwd = {s = 0x2a10a06 <error: Cannot access memory at address 0x2a10a06>, len = 1669782928}, host = {s = 0x7ffc6386dd80 "\377\377\377\377", len = 1669782728}, port = {s = 0x7f10c457ba40 "\220\301Z\304\020\177", len = 7}, params = {s = 0x6386dec0 <error: Cannot access memory at address 0x6386dec0>, len = 0}, sip_params = {s = 0x7ffc6386dde0 "@+\342\303\020\177", len = -1472036457}, headers = {s = 0x7f10c45ac4f0 "P\304Z\304\020\177", len = 1669783080}, port_no = 49552, proto = 50266, type = 32528, flags = (unknown: 0), transport = {s = 0x7f10c457bab0 "\037e\211\337\376U", len = -1000811633}, ttl = {s = 0x5 <error: Cannot access memory at address 0x5>, len = -1000883536}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1000685168}, method = {s = 0x55fedf88e3fa "_setjmp", len = 0}, lr = {s = 0x7ffc6386dd80 "\377\377\377\377", len = 1669782928}, r2 = {s = 0x7f10c45ac4f0 "P\304Z\304\020\177", len = 0}, gr = {s = 0x7f10a16dc9d8 "\220", len = -1586934880}, transport_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1586934560}, ttl_val = {s = 0x7f10c4200158 "\373O", len = -1000885232}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 16}, maddr_val = {s = 0x7ffc6386dde0 "@+\342\303\020\177", len = -1015914428}, method_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -541405588}, lr_val = {s = 0x7ffc6386de10 "", len = -1012977648}, r2_val = {s = 0x7f10c3e22b40 "@", len = -1012977648}, gr_val = {s = 0x7ffc6386de50 "\200ކc\374\177", len = -1026041800}} u = 0x7ffc6386e290 port = 0 dst_host = 0x7f10a11dcf6d i = 11 flags = 22014 avp = 0x7f10a11dcf6d st = {flags = 1669782724, id = 32764, name = {n = -1000814498, s = {s = 0x7f10c458c85e <do_lookup_x+270> "\205\300\017\205\302\006", len = 0}, re = 0x7f10c458c85e <do_lookup_x+270>}, avp = 0x7f10c4207ca0} sct = 0x55fedfd49dcb sjt = 0x7f10c3e22830 rve = 0x55fedfd49e58 <__func__.6790> mct = 0xa128dfc0 rv = 0x7ffc6386dcc8 rv1 = 0x7f10c3e1bdc0 c1 = {cache_type = 3294082064, val_type = 32528, c = {avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1004565732}, re = 0x1}, pval = {rs = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1004565732}, ri = -1000813836, flags = 32528}}, i2s = "\022\004\000\000\000\000\000\000\240| \304\020\177\000\000\020\264W\304\020\177"} s = {s = 0x0, len = 1042} srevp = {0x0, 0x7f10c458c6ec <check_match+316>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #22 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3ac9b60, msg=0x7f10c3f80908) at core/action.c:1581 t = 0x7f10c3ac9fd0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = -1007154936, tz_dsttime = 32528} tdiff = 2703084732 __func__ = "run_actions" #23 0x000055fedf93000d in run_top_route (a=0x7f10c3ac9b60, msg=0x7f10c3f80908, c=0x0) at core/action.c:1666 ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {139709372343944, -3845379249392013796, 0, 139709987593392, 94553165115539, 536870912, -3845379249475899876, -7014620463946093028}, __mask_was_saved = 0, __saved_mask = {__val = {94553161952285, 6998053444, 139709984016648, 140721978271040, 94553163805580, 139709984018744, 139709984016312, 139709399289393, 139709399289029, 139709982555416, 0, 1073741825, 0, 139709987593392, 139709372343944, 0}}}}} p = 0x7ffc6386e3a0 ret = -539905901 sfbk = 0 #24 0x000055fedfaa8603 in receive_msg (buf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908) at core/receive.c:501 msg = 0x7f10c3f80908 ctx = {rec_lev = -1591882608, run_flags = 32528, last_retcode = 1460, jmp_env = {{__jmpbuf = {227633332225, 139709399288976, 8, 139709399288985, 34, 139709399289020, 7, 32}, __mask_was_saved = -539905901, __saved_mask = {__val = {536870912, 140721978271456, 94553163314141, 1025766200822493485, 0, 0, 17689295201705805418, 140721978272380, 139709399288048, 2079749502788070076, 2777162825698555585, 4722371164336740133, 92033367151166208, 14537356584683332797, 1950363756610510412, 11731023210721953098}}}}} bctx = 0x0 ret = 0 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} diff = 0 inb = {s = 0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len = 733} netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0} keng = 0x0 evp = {data = 0x7ffc6386e580, obuf = {s = 0x0, len = 0}, rcv = 0x7f10a11dc908, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 exectime = 0 __func__ = "receive_msg" #25 0x000055fedfb6c007 in receive_tcp_msg (tcpbuf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007@88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908, con=0x7f10a11dc8f0) at core/tcp_read.c:1383 buf = 0x0 bsize = 0 blen = 1460 __func__ = "receive_tcp_msg" #26 0x000055fedfb6e8d3 in tcp_read_req (con=0x7f10a11dc8f0, bytes_read=0x7ffc6386ea84, read_flags=0x7ffc6386ea7c) at core/tcp_read.c:1607 bytes = 1460 total_bytes = 1460 resp = 1 size = 0 req = 0x7f10a11dca18 dst = {send_sock = 0x0, to = {s = {sa_family = 40112, sa_data = ".\304\020\177\000\000\360\310\035\241\020\177\000"}, sin = {sin_family = 40112, sin_port = 50222, sin_addr = {s_addr = 32528}, sin_zero = "\360\310\035\241\020\177\000"}, sin6 = {sin6_family = 40112, sin6_port = 50222, sin6_flowinfo = 32528, sin6_addr = {__in6_u = {__u6_addr8 = "\360\310\035\241\020\177\000\000\000\000\000 \002\000\000", __u6_addr16 = {51440, 41245, 32528, 0, 0, 8192, 2, 0}, __u6_addr32 = {2703083760, 32528, 536870912, 2}}}, sin6_scope_id = 1669726209}, sas = {ss_family = 40112, __ss_padding = ".\304\020\177\000\000\360\310\035\241\020\177\000\000\000\000\000 \002\000\000\000\001\000\206c\017\000\000\000 "\343\337\376U\000\000\275N\341ZX\230\034\344\210\312\035\241\020\177\000\000(D\261\244m\345YC\340#\343\337\376U\000\000\024\000\000\000\000\000\000\000\001\000\000\000P\000\000\000\260\351\206c\374\177\000\000\276\006\252\337\376U\000\000p\352\206c\374\177\000\000\b\000\000\000\000\000\000", __ss_align = 35188667056128}}, id = -1007078360, send_flags = {f = 32528, blst_imask = 0}, proto = -120 '\210', proto_pad0 = -54 '\312', proto_pad1 = -24291} c = 82 'R' ret = -1 __func__ = "tcp_read_req" #27 0x000055fedfb730ec in handle_io (fm=0x7f10c3f93428, events=1, idx=-1) at core/tcp_read.c:1857 ret = 8 n = 1052 read_flags = RD_CONN_SHORT_READ con = 0x7f10a11dc8f0 s = 15 resp = 1 t = 1129964909 ee = 0x0 __func__ = "handle_io" #28 0x000055fedfb5dd3a in io_wait_loop_epoll (h=0x55fedfe32220 <io_w>, t=2, repeat=0) at core/io_wait.h:1070 n = 1 r = 0 fm = 0x7f10c3f93428 revents = 1 __func__ = "io_wait_loop_epoll" #29 0x000055fedfb74c0e in tcp_receive_loop (unix_sock=89) at core/tcp_read.c:1978 __func__ = "tcp_receive_loop" #30 0x000055fedf9f8f73 in tcp_init_children (woneinit=0x7ffc6386ee3c) at core/tcp_main.c:5139 r = 12 i = 15 reader_fd_1 = 89 pid = 0 si_desc = "tcp receiver (generic)\000\000\210\200\314\337\376U\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\320\355\206c\374\177\000\000D>\244\337\376U\000\000\320\355\206c\374\177\000\000\065\243\260\337\000\000\000\000\200\355\206c\374\177\000\000\305,\306\337\376U\000\000\000\000\000\000\000\000\000\000\210\246\202\237\062\000\000" si = 0x0 __func__ = "tcp_init_children" #31 0x000055fedf8b8d96 in main_loop () at main.c:1857 i = 16 pid = 4933 si = 0x0 si_desc = "udp receiver child=15 sock=56.100.82.100:5090\000\000\360\363\206c\374\177\000\000\350Ϊ\303\020\177\000\000\260\234.\304\020\177\000\000\350Ȼ\303\020\177\000\000\000\000\000 \000\000\000\000L\235.\304\020\177\000\000\060\000\000\000\060\000\000\000\250\357\206c\374\177\000\000\300\356\206c\374\177\000\000\000\270o\344\335t\323", <incomplete sequence \365> nrprocs = 16 woneinit = 1 __func__ = "main_loop" #32 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053 cfg_stream = 0x55fee0304290 c = -1 r = 0 tmp = 0x7ffc6386fd8a "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x55fedfccb0b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1758625625 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x7ffc639b9268 p = 0x7f10c4298af5 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 20, st_ino = 17804, st_nlink = 2, st_mode = 16832, st_uid = 1113, st_gid = 1113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1622014594, tv_nsec = 669820306}, st_mtim = {tv_sec = 1622023822, tv_nsec = 713813032}, st_ctim = {tv_sec = 1622023822, tv_nsec = 713813032}, __glibc_reserved = {0, 0, 0}} tbuf = "H\365\206c\374\177\000\000\330+=\304\020\177", '\000' <repeats 11 times>, "\033Y\304\020\177\000\000\001", '\000' <repeats 15 times>, ",\363 \304\020\177\000\000(6X\304\020\177\000\000 \364\206c\374\177\000\000\272\204Y\304\020\177\000\000\000\000\000\000\000\000\000\000@e;\304\020\177\000\000г<\304\020\177\000\000D\364\206c\374\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>... option_index = 0 long_options = {{name = 0x55fedfccd366 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fedfcc8514 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fedfccd36b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55fedfccd371 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fedfccd377 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fedfccd380 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55fedfccd38a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fedfccd394 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fedfccd39f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55fedfccd3a8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fedfccd3b3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fedfccd3b9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55fedfccd3c3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main"
```
At the same time, two crashes occurs and second crash data is follows
``` #0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 (gdb)
================================================================================ # GDB session generated by FS backtrace-from-core ================================================================================
================================================================================ # info threads ================================================================================ Id Target Id Frame * 1 Thread 0x7f10c41f5100 (LWP 4899) 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 ================================================================================ # bt ================================================================================ #0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #1 0x00007f10c3687075 in CONF_modules_finish () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #2 0x00007f10c36871f9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #3 0x00007f10c371c250 in OPENSSL_cleanup () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #4 0x00007f10bf82a21e in tls_h_mod_destroy_f () at tls_init.c:879 #5 0x000055fedfae5207 in destroy_tls () at core/tls_hooks.c:75 #6 0x000055fedf8a72b4 in cleanup (show_status=1) at main.c:596 #7 0x000055fedf8a8d31 in shutdown_children (sig=15, show_status=1) at main.c:718 #8 0x000055fedf8ac130 in handle_sigs () at main.c:816 #9 0x000055fedf8b9971 in main_loop () at main.c:1903 #10 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053 ================================================================================ # bt full ================================================================================ #0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #1 0x00007f10c3687075 in CONF_modules_finish () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #2 0x00007f10c36871f9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #3 0x00007f10c371c250 in OPENSSL_cleanup () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #4 0x00007f10bf82a21e in tls_h_mod_destroy_f () at tls_init.c:879 __func__ = "tls_h_mod_destroy_f" #5 0x000055fedfae5207 in destroy_tls () at core/tls_hooks.c:75 No locals. #6 0x000055fedf8a72b4 in cleanup (show_status=1) at main.c:596 memlog = 0 __func__ = "cleanup" #7 0x000055fedf8a8d31 in shutdown_children (sig=15, show_status=1) at main.c:718 __func__ = "shutdown_children" #8 0x000055fedf8ac130 in handle_sigs () at main.c:816 chld = 0 chld_status = 139 any_chld_stopped = 1 memlog = -1603236448 __func__ = "handle_sigs" #9 0x000055fedf8b9971 in main_loop () at main.c:1903 i = 16 pid = 4962 si = 0x0 si_desc = "udp receiver child=15 sock=56.100.82.100:5090\000\000\360\363\206c\374\177\000\000\350Ϊ\303\020\177\000\000\260\234.\304\020\177\000\000\350Ȼ\303\020\177\000\000\000\000\000 \000\000\000\000L\235.\304\020\177\000\000\060\000\000\000\060\000\000\000\250\357\206c\374\177\000\000\300\356\206c\374\177\000\000\000\270o\344\335t\323", <incomplete sequence \365> nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053 cfg_stream = 0x55fee0304290 c = -1 r = 0 tmp = 0x7ffc6386fd8a "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x55fedfccb0b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1758625625 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x7ffc639b9268 p = 0x7f10c4298af5 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 20, st_ino = 17804, st_nlink = 2, st_mode = 16832, st_uid = 1113, st_gid = 1113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1622014594, tv_nsec = 669820306}, st_mtim = {tv_sec = 1622023822, tv_nsec = 713813032}, st_ctim = {tv_sec = 1622023822, tv_nsec = 713813032}, __glibc_reserved = {0, 0, 0}} tbuf = "H\365\206c\374\177\000\000\330+=\304\020\177", '\000' <repeats 11 times>, "\033Y\304\020\177\000\000\001", '\000' <repeats 15 times>, ",\363 \304\020\177\000\000(6X\304\020\177\000\000 \364\206c\374\177\000\000\272\204Y\304\020\177\000\000\000\000\000\000\000\000\000\000@e;\304\020\177\000\000г<\304\020\177\000\000D\364\206c\374\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>... option_index = 0 long_options = {{name = 0x55fedfccd366 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fedfcc8514 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fedfccd36b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55fedfccd371 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fedfccd377 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fedfccd380 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55fedfccd38a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fedfccd394 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fedfccd39f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55fedfccd3a8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fedfccd3b3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fedfccd3b9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55fedfccd3c3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" ================================================================================ # thread apply all bt ================================================================================
Thread 1 (Thread 0x7f10c41f5100 (LWP 4899)): #0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #1 0x00007f10c3687075 in CONF_modules_finish () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #2 0x00007f10c36871f9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #3 0x00007f10c371c250 in OPENSSL_cleanup () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 #4 0x00007f10bf82a21e in tls_h_mod_destroy_f () at tls_init.c:879 #5 0x000055fedfae5207 in destroy_tls () at core/tls_hooks.c:75 #6 0x000055fedf8a72b4 in cleanup (show_status=1) at main.c:596 #7 0x000055fedf8a8d31 in shutdown_children (sig=15, show_status=1) at main.c:718 #8 0x000055fedf8ac130 in handle_sigs () at main.c:816 #9 0x000055fedf8b9971 in main_loop () at main.c:1903 #10 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053 ================================================================================ # thread apply all bt full ================================================================================
Thread 1 (Thread 0x7f10c41f5100 (LWP 4899)): #0 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #1 0x00007f10c3687075 in CONF_modules_finish () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #2 0x00007f10c36871f9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #3 0x00007f10c371c250 in OPENSSL_cleanup () from /lib/x86_64-linux-gnu/libcrypto.so.1.1 No symbol table info available. #4 0x00007f10bf82a21e in tls_h_mod_destroy_f () at tls_init.c:879 __func__ = "tls_h_mod_destroy_f" #5 0x000055fedfae5207 in destroy_tls () at core/tls_hooks.c:75 No locals. #6 0x000055fedf8a72b4 in cleanup (show_status=1) at main.c:596 memlog = 0 __func__ = "cleanup" #7 0x000055fedf8a8d31 in shutdown_children (sig=15, show_status=1) at main.c:718 __func__ = "shutdown_children" #8 0x000055fedf8ac130 in handle_sigs () at main.c:816 chld = 0 chld_status = 139 any_chld_stopped = 1 memlog = -1603236448 __func__ = "handle_sigs" #9 0x000055fedf8b9971 in main_loop () at main.c:1903 i = 16 pid = 4962 si = 0x0 si_desc = "udp receiver child=15 sock=56.100.82.100:5090\000\000\360\363\206c\374\177\000\000\350Ϊ\303\020\177\000\000\260\234.\304\020\177\000\000\350Ȼ\303\020\177\000\000\000\000\000 \000\000\000\000L\235.\304\020\177\000\000\060\000\000\000\060\000\000\000\250\357\206c\374\177\000\000\300\356\206c\374\177\000\000\000\270o\344\335t\323", <incomplete sequence \365> nrprocs = 16 woneinit = 1 __func__ = "main_loop" #10 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053 cfg_stream = 0x55fee0304290 c = -1 r = 0 tmp = 0x7ffc6386fd8a "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x55fedfccb0b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 1758625625 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x7ffc639b9268 p = 0x7f10c4298af5 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244" st = {st_dev = 20, st_ino = 17804, st_nlink = 2, st_mode = 16832, st_uid = 1113, st_gid = 1113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1622014594, tv_nsec = 669820306}, st_mtim = {tv_sec = 1622023822, tv_nsec = 713813032}, st_ctim = {tv_sec = 1622023822, tv_nsec = 713813032}, __glibc_reserved = {0, 0, 0}} tbuf = "H\365\206c\374\177\000\000\330+=\304\020\177", '\000' <repeats 11 times>, "\033Y\304\020\177\000\000\001", '\000' <repeats 15 times>, ",\363 \304\020\177\000\000(6X\304\020\177\000\000 \364\206c\374\177\000\000\272\204Y\304\020\177\000\000\000\000\000\000\000\000\000\000@e;\304\020\177\000\000г<\304\020\177\000\000D\364\206c\374\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>... option_index = 0 long_options = {{name = 0x55fedfccd366 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fedfcc8514 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fedfccd36b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55fedfccd371 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fedfccd377 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fedfccd380 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55fedfccd38a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fedfccd394 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fedfccd39f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55fedfccd3a8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fedfccd3b3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fedfccd3b9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55fedfccd3c3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main"
```
#### Log Messages
``` May 26 12:12:04 dev-proxy05 kamailio[4958]: CRITICAL: <core> [core/mem/q_malloc.c:501]: qm_free(): BUG: bad pointer 0x645f6d6574737973 (out of memory block!) called from tls: tls_init.c: ser_free(323) - ignoring May 26 12:12:05 dev-proxy05 kamailio[4962]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 85 May 26 12:12:05 dev-proxy05 kamailio[4899]: ALERT: <core> [main.c:788]: handle_sigs(): child process 4958 exited by a signal 11 May 26 12:12:05 dev-proxy05 kamailio[4899]: ALERT: <core> [main.c:791]: handle_sigs(): core was generated May 26 12:12:05 dev-proxy05 kamailio[4899]: INFO: <core> [main.c:813]: handle_sigs(): terminating due to SIGCHLD May 26 12:12:05 dev-proxy05 kamailio[4917]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received May 26 12:12:05 dev-proxy05 kamailio[4951]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received May 26 12:12:05 dev-proxy05 kamailio[4951]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg): May 26 12:12:05 dev-proxy05 kamailio[4951]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments: May 26 12:12:05 dev-proxy05 kamailio[4917]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg): May 26 12:12:05 dev-proxy05 kamailio[4917]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments: May 26 12:12:05 dev-proxy05 kamailio[4910]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received May 26 12:12:05 dev-proxy05 kamailio[4910]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg): May 26 12:12:05 dev-proxy05 kamailio[4910]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments: May 26 12:12:05 dev-proxy05 kamailio[4951]: INFO: qm_sums: qm_sums(): count= 1 size= 28488 bytes from core: core/io_wait.c: init_io_wait(516)
May 26 12:12:06 dev-proxy05 kamailio[4906]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received May 26 12:12:06 dev-proxy05 kamailio[4913]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg): May 26 12:12:06 dev-proxy05 kamailio[4906]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg): May 26 12:12:06 dev-proxy05 kamailio[4906]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments: May 26 12:12:06 dev-proxy05 kamailio[4913]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments:
May 26 12:12:06 dev-proxy05 kamailio[4899]: CRITICAL: <core> [core/mem/q_malloc.c:501]: qm_free(): BUG: bad pointer 0x645f6d6574737973 (out of memory block!) called from tls: tls_init.c: ser_free(323) - ignoring May 26 12:12:08 dev-proxy05 kamailio: WARNING: <core> [core/cfg.y:3660]: warn_at(): warning in config file /usr/local/etc/kamailio/kamailio.cfg, line 1433, column 10-15: constant value in if(...) May 26 12:12:08 dev-proxy05 kamailio: WARNING: <core> [core/cfg.y:3660]: warn_at(): warning in config file /usr/local/etc/kamailio/kamailio.cfg, line 1443, column 7-12: constant value in if(...) May 26 12:12:08 dev-proxy05 kamailio: INFO: <core> [core/sctp_core.c:74]: sctp_core_check_support(): SCTP API not enabled - if you want to use it, load sctp module May 26 12:12:08 dev-proxy05 kamailio: INFO: <core> [core/tcp_main.c:4983]: init_tcp(): using epoll_lt as the io watch method (auto detected) May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: rr [../outbound/api.h:52]: ob_load_api(): unable to import bind_ob - maybe module is not loaded May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: rr [rr_mod.c:188]: mod_init(): outbound module not available May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: auth [auth_mod.c:345]: mod_init(): qop set, but nonce-count (nonce_count) support disabled May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: permissions [parse_config.c:254]: parse_config_file(): file not found: /usr/local/etc/kamailio/permissions.allow May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: permissions [permissions.c:613]: mod_init(): default allow file (/usr/local/etc/kamailio/permissions.allow) not found => empty rule set May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: permissions [parse_config.c:254]: parse_config_file(): file not found: /usr/local/etc/kamailio/permissions.deny May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: permissions [permissions.c:627]: mod_init(): default deny file (/usr/local/etc/kamailio/permissions.deny) not found => empty rule set May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: cfgutils [cfgutils.c:869]: mod_init(): no hash_file given, disable hash functionality May 26 12:12:08 dev-proxy05 kamailio[5061]: NOTICE: regex [regex_mod.c:168]: mod_init(): 'file' parameter is not set, group matching disabled May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_mod.c:396]: mod_init(): use OpenSSL version: 1010104f May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_mod.c:398]: mod_init(): With ECDH-Support! May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_mod.c:401]: mod_init(): With Diffie Hellman May 26 12:12:08 dev-proxy05 kamailio[5061]: WARNING: tls [tls_init.c:793]: tls_h_mod_init_f(): openssl bug #1491 (crash/mem leaks on low memory) workaround enabled (on low memory tls operations will fail preemptively) with free memory thresholds 33554432 and 16777216 bytes May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/cfg/cfg_ctx.c:599]: cfg_set_now(): tls.low_mem_threshold1 has been changed to 33554432 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/cfg/cfg_ctx.c:599]: cfg_set_now(): tls.low_mem_threshold2 has been changed to 16777216 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [main.c:3030]: main(): processes (at least): 64 - shm size: 536870912 - pkg size: 8388608 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/udp_server.c:154]: probe_max_receive_buffer(): SO_RCVBUF is initially 212992 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/udp_server.c:206]: probe_max_receive_buffer(): SO_RCVBUF is finally 425984 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/udp_server.c:154]: probe_max_receive_buffer(): SO_RCVBUF is initially 212992 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/udp_server.c:206]: probe_max_receive_buffer(): SO_RCVBUF is finally 425984 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:320]: ksr_tls_fill_missing(): TLSs<default>: tls_method=3 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:332]: ksr_tls_fill_missing(): TLSs<default>: certificate='/etc/pki/CA/wildcard_vpgrw_com.pem' May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:339]: ksr_tls_fill_missing(): TLSs<default>: ca_list='/etc/pki/CA/caroot.pem' May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:346]: ksr_tls_fill_missing(): TLSs<default>: ca_path='(null)' May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:353]: ksr_tls_fill_missing(): TLSs<default>: crl='(null)' May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:357]: ksr_tls_fill_missing(): TLSs<default>: require_certificate=0 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:364]: ksr_tls_fill_missing(): TLSs<default>: cipher_list='(null)' May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:371]: ksr_tls_fill_missing(): TLSs<default>: private_key='/etc/pki/CA/kamailio_privatekey.pem' May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:375]: ksr_tls_fill_missing(): TLSs<default>: verify_certificate=0 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:378]: ksr_tls_fill_missing(): TLSs<default>: verify_depth=9 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:381]: ksr_tls_fill_missing(): TLSs<default>: verify_client=0 May 26 12:12:08 dev-proxy05 kamailio[5061]: NOTICE: tls [tls_domain.c:1136]: ksr_tls_fix_domain(): registered server_name callback handler for socket [:0], server_name='<default>' ... May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:743]: set_verification(): TLSs<default>: No client certificate required and no checks performed May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:320]: ksr_tls_fill_missing(): TLSc<default>: tls_method=3 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:332]: ksr_tls_fill_missing(): TLSc<default>: certificate='/etc/pki/CA/wildcard_vpgrw_com.pem' May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:339]: ksr_tls_fill_missing(): TLSc<default>: ca_list='/etc/pki/CA/caroot.pem' May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:346]: ksr_tls_fill_missing(): TLSc<default>: ca_path='(null)' May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:353]: ksr_tls_fill_missing(): TLSc<default>: crl='(null)' May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:357]: ksr_tls_fill_missing(): TLSc<default>: require_certificate=0 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:364]: ksr_tls_fill_missing(): TLSc<default>: cipher_list='(null)' May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:371]: ksr_tls_fill_missing(): TLSc<default>: private_key='/etc/pki/CA/kamailio_privatekey.pem' May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:375]: ksr_tls_fill_missing(): TLSc<default>: verify_certificate=0 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:378]: ksr_tls_fill_missing(): TLSc<default>: verify_depth=9 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:381]: ksr_tls_fill_missing(): TLSc<default>: verify_client=0 May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:746]: set_verification(): TLSc<default>: Server MAY present invalid certificate May 26 12:12:09 dev-proxy05 kamailio[5098]: ERROR: <core> [db.c:466]: db_check_table_version(): invalid version 4 for table uacreg found, expected 5 (check table structure and table "version") May 26 12:12:09 dev-proxy05 kamailio[5098]: ERROR: uac [uac_reg.c:1382]: uac_reg_load_db(): Error during version check for db table: uacreg, check database structure. May 26 12:12:09 dev-proxy05 kamailio[5097]: INFO: ctl [io_listener.c:214]: io_listen_loop(): io_listen_loop: using epoll_lt io watch method (config) May 26 12:12:09 dev-proxy05 kamailio[5103]: INFO: jsonrpcs [jsonrpcs_sock.c:443]: jsonrpc_dgram_process(): a new child 0/5103 ^C
```
### Possible Solutions
Very interesting workaround solution works fine
First of all install curl-7.76.1 with this parameter --disable-openssl-auto-load-config And then, downgrading openssl from OpenSSL 1.1.1d to openssl-1.0.2r And order of compilation is important
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
``` version: kamailio 5.5.0 (x86_64/linux) d4c1a1 flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: d4c1a1 compiled on 08:33:52 May 26 2021 with gcc 8.3.0 ```
* **Operating System**:
``` root@dev-proxy05:/var/tmp# cat /etc/os-release PRETTY_NAME="Debian GNU/Linux 10 (buster)" NAME="Debian GNU/Linux" VERSION_ID="10" VERSION="10 (buster)" VERSION_CODENAME=buster ID=debian HOME_URL="https://www.debian.org/" SUPPORT_URL="https://www.debian.org/support" BUG_REPORT_URL="https://bugs.debian.org/" root@dev-proxy05:/var/tmp# cat /etc/os-release PRETTY_NAME="Debian GNU/Linux 10 (buster)" NAME="Debian GNU/Linux" VERSION_ID="10" VERSION="10 (buster)" VERSION_CODENAME=buster ID=debian HOME_URL="https://www.debian.org/" SUPPORT_URL="https://www.debian.org/support" BUG_REPORT_URL="https://bugs.debian.org/"
```
The backtrace indicates crash by calling of a function `w_vg_auth()` which is not part of Kamailio public repository. We cannot help troubleshooting private extensions.
Closed #2746.
Hello,
I am not interesting to solve just my own problem, I believe this issue is existing on curl library that effects Kamailio side. My study just use CURL lib to use HTTP Post function, it is straightforward task.
I wonder, it there anybody who gets same issue ? Curl [bug](https://github.com/curl/curl/commit/1835cb916e0d40eb8bc1165d5627a0b64f911bac...) is could effect Kamailio side which is similar to Kamailio [issue](https://github.com/kamailio/kamailio/issues/2466)
Regards, Melek
Hello,
if you can reproduce a similar problem with stock public kamailio, making a minimal config with http_client module (which uses curl) and you can do a POST from config, then open a new issue with related details. So far there is no similar report.
There are also other issues with your used cfg:
May 26 12:12:09 dev-proxy05 kamailio[5098]: ERROR: <core> [db.c:466]: db_check_table_version(): invalid version 4 for table uacreg found, expected 5 (check table structure and table "version") May 26 12:12:09 dev-proxy05 kamailio[5098]: ERROR: uac [uac_reg.c:1382]: uac_reg_load_db(): Error during version check for db table: uacreg, check database structure.
As recommeded from @miconda - please try to reproduce it with a minimal cfg.
Hi,
I solve the issue, I write it on following lines (it may helps somebody works)
**http_client** and **my function** use **curl** library as a foundation and I did not use following curl initialization function on my module **mod_init**
`if(curl_global_init(CURL_GLOBAL_ALL)) { LM_ERR("curl_global_init failed\n"); return -1; } `
Interestingly same function works very well on both **Debian 8 + Kamailio** and also FreeSwitch. Later on, I see **FreeSwitch core** handles this curl initialization but Kamailio delegates it to module developer.