[sr-dev] [kamailio/kamailio] [4.2] Websockets was blocked when multiple WebRTC clients were disconnected from a MCU (#1419)

BroWater notifications at github.com
Tue Jan 30 04:35:38 CET 2018


<!--
Kamailio Project uses GitHub Issues only for bugs in the code or feature requests.

If you have questions about using Kamailio or related to its configuration file,
ask on sr-users mailing list:

  * http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users

If you have questions about developing extensions to Kamailio or its existing
C code, ask on sr-dev mailing list

  * http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev

Please try to fill this template as much as possible for any issue. It helps the
developers to troubleshoot the issue.

If you submit a feature request (or enhancement), you can delete the text of
the template and only add the description of what you would like to be added.

If there is no content to be filled in a section, the entire section can be removed.

You can delete the comments from the template sections when filling.

You can delete next line and everything above before submitting (it is a comment).
-->

### Description

I used a MCU with kamailio proxy which enabled the websocket module,
and made 13 WebRTC clients (same domain as the MCU) was connected to the MCU orderly,
then let MCU disconnected them all orderly and quickly.
After that, WSS port can't be accessd anymore - but it not always happens!

However , whether it's blocked or not,
It can be found that the receiving queue of kamailio had value left and this shouldn't happen:

> Proto  Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name
tcp        0      0 10.100.92.222:10443     0.0.0.0:*               LISTEN      6851/kamailio
tcp        1      0 10.100.92.222:10443     10.100.92.35:50283      CLOSE_WAIT  6812/kamailio
tcp     1359      0 10.100.92.222:10443     10.100.92.35:50249      CLOSE_WAIT  6817/kamailio


Btw, I tried to find the cause by myself ever with lots of log added,
it seems that the process stuck in the function tls_read() in tcp_read.c, 
(so the following TCP/TLS packets can be handled)
following is my tracing procedure , perhaps this can help you to clarify the issue. :)

tcp_read.c:  
---> tcp_read_req()
```
		if (likely(req->error==TCP_REQ_OK)){
#ifdef READ_WS
			if (unlikely(con->type == PROTO_WS || con->type == PROTO_WSS))
				bytes=tcp_read_ws(con, read_flags);
			else
#endif
				bytes=tcp_read_headers(con, read_flags);
```
--->tcp_read_ws()

```
#ifdef USE_TLS
	if (unlikely(c->type == PROTO_WSS))
		bytes = tls_read(c, read_flags); //<--- stuck here!!
	else
#endif
```

<!--
Explain what you did, what you expected to happen, and what actually happened.
-->

### Troubleshooting

#### Reproduction

<!--
If the issue can be reproduced, describe how it can be done.
-->

#### Debugging Data

<!--
If you got a core dump, use gdb to extract troubleshooting data - full backtrace,
local variables and the list of the code at the issue location.

  gdb /path/to/kamailio /path/to/corefile
  bt full
  info locals
  list

If you are familiar with gdb, feel free to attach more of what you consider to
be relevant.
-->

```

#0  0x0000ffff91d7067c in __lll_lock_wait () from /lib64/libpthread.so.0
No symbol table info available.
#1  0x0000ffff91d6988c in pthread_mutex_lock () from /lib64/libpthread.so.0
No symbol table info available.
#2  0x00000000006544e4 in tcpconn_send_put (c=0xffff8178a348,
    buf=0xffff89e7e920 "\201~\001\372BYE sip:8mon17p1 at 10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;receive"..., len=510, send_flags=...) at tcp_main.c:2376
        tmp = 0xffff8178a348
        fd = 10
        response = {281472853910344, 0}
        n = 8
        do_close_fd = 1
        rest_buf = 0x648d7c <tcpconn_get+256> "\247+@\371\347<@\271\377"
        t_buf = 0xffff89e7e920 "\201~\001\372BYE sip:8mon17p1 at 10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;receive"...
        rest_len = 0
        t_len = 510
        resp = 281473925092352
        t_send_flags = {f = 56 '8', blst_imask = 223 '\337'}
        fd_cache_e = 0x0
        use_fd_cache = 1
        __func__ = "tcpconn_send_put"
#3  0x0000000000650d24 in tcp_send (dst=0xffffc1519650, from=0x0,
    buf=0xffff89e7e920 "\201~\001\372BYE sip:8mon17p1 at 10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;receive"..., len=510) at tcp_main.c:2155
        c = 0xffff8178a348
        ip = {af = 2, len = 4, u = {addrl = {593257482, 135}, addr32 = {593257482, 0, 135, 0}, addr16 = {25610, 9052, 0, 0, 135, 0, 0, 0},
            addr = "\nd\\#\000\000\000\000\207\000\000\000\000\000\000"}}
        port = 50249
        fd = 512
        response = {281473925092736, 6589744}
        n = 65535
        con_lifetime = 57680
        rest_buf = 0x7fdf38 "DEBUG"
        t_buf = 0x87 <error: Cannot access memory at address 0x87>
        rest_len = 0
        t_len = 6505260
        resp = 281473925092704
        t_send_flags = {f = 9 '\t', blst_imask = 64 '@'}
        __func__ = "tcp_send"
#4  0x0000ffff80b01b08 in encode_and_send_ws_frame (frame=0xffffc1519758, conn_close=CONN_CLOSE_DONT) at ws_frame.c:302
        pos = 4
        extended_length = 2
        frame_length = 510
        send_buf = 0xffff89e7e920 "\201~\001\372BYE sip:8mon17p1 at 10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;receive"...
        con = 0xffff8178a348
        dst = {send_sock = 0xffff89c43748, to = {s = {sa_family = 2, sa_data = "\304I\nd\\#\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
              sin_port = 18884, sin_addr = {s_addr = 593257482}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 18884,
              sin6_flowinfo = 593257482, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0,
                    0, 0, 0}}}, sin6_scope_id = 0}}, id = 4, proto = 6 '\006', send_flags = {f = 1 '\001', blst_imask = 0 '\000'}}
        from = 0x0
        local_addr = {s = {sa_family = 38592, sa_data = "Q\301\377\377\000\000\320\377\377\377\200\377\377\377"}, sin = {sin_family = 38592, sin_port = 49489,
            sin_addr = {s_addr = 65535}, sin_zero = "\320\377\377\377\200\377\377\377"}, sin6 = {sin6_family = 38592, sin6_port = 49489, sin6_flowinfo = 65535,
            sin6_addr = {__in6_u = {__u6_addr8 = "\320\377\377\377\200\377\377\377%%%%%%%%", __u6_addr16 = {65488, 65535, 65408, 65535, 9509, 9509, 9509, 9509},
                __u6_addr32 = {4294967248, 4294967168, 623191333, 623191333}}}, sin6_scope_id = 623191333}}
        sub_proto = 1
        __func__ = "encode_and_send_ws_frame"
#5  0x0000ffff80b09fc0 in ws_frame_transmit (data=0xffffc1519880) at ws_frame.c:757
        wsev = 0xffffc1519880
        frame = {fin = 1, rsv1 = 0, rsv2 = 0, rsv3 = 0, opcode = 1, mask = 0, payload_len = 506, masking_key = "\000\000\000",
          payload_data = 0xffff817ea9d8 "BYE sip:8mon17p1 at 10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;received=10"..., wsc = 0xffff8178cc28}
        __func__ = "ws_frame_transmit"
#6  0x000000000049e758 in sr_event_exec (type=11, data=0xffffc1519880) at events.c:274
        ret = 0
        i = -1981058840
        p = 0xffff8178a348
        __func__ = "sr_event_exec"
#7  0x0000ffff897e6268 in msg_send (dst=0xffff8188ef60,
    buf=0xffff817ea9d8 "BYE sip:8mon17p1 at 10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;received=10"..., len=506) at ../../forward.h:189
        new_dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                  __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0,
          proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        outb = {
          s = 0xffff817ea9d8 "BYE sip:8mon17p1 at 10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;received=10"..., len = 506}
        port = 50249
        ip = {af = 2, len = 4, u = {addrl = {281471275000842, 12}, addr32 = {593257482, 65535, 12, 0}, addr16 = {25610, 9052, 65535, 0, 12, 0, 0, 0},
            addr = "\nd\\#\377\377\000\000\f\000\000\000\000\000\000"}}
        from = 0xffffc1519898
        local_addr = {s = {sa_family = 2, sa_data = "\000\000\nd\\\336\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 0, sin_addr = {
              s_addr = 3730596874}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 0, sin6_flowinfo = 3730596874, sin6_addr = {
              __in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}
        con = 0xffff8178a348
        wsev = {type = 11,
          buf = 0xffff817ea9d8 "BYE sip:8mon17p1 at 10.100.92.35:50249;transport=ws;ob SIP/2.0\r\nVia: SIP/2.0/WSS 10.100.92.222:10443;branch=z9hG4bKe713.8cb6e1690b94e1ab398db59e660f06d4.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;received=10"..., len = 506, id = 4}
        ret = 0
        __func__ = "msg_send"
#8  0x0000ffff897e9d70 in send_pr_buffer (rb=0xffff8188ef10, buf=0xffff817ea9d8, len=506, file=0xffff898b08a0 "t_fwd.c",
    function=0xffff898b1ad0 <__FUNCTION__.12678> "t_send_branch", line=1581) at t_funcs.c:103
        __func__ = "send_pr_buffer"
#9  0x0000ffff89802e70 in t_send_branch (t=0xffff8188ed98, branch=0, p_msg=0xffff89edb0e0, proxy=0x0, lock_replies=1) at t_fwd.c:1581
        ip = {af = 3243350936, len = 65535, u = {addrl = {281473925094280, 281473925094256}, addr32 = {3243350920, 65535, 3243350896, 65535}, addr16 = {39816,
              49489, 65535, 0, 39792, 49489, 65535, 0}, addr = "\210\233Q\301\377\377\000\000p\233Q\301\377\377\000"}}
        ret = 0
        uac = 0xffff8188ef00
        __func__ = "t_send_branch"
        __FUNCTION__ = "t_send_branch"
#10 0x0000ffff8980562c in t_forward_nonack (t=0xffff8188ed98, p_msg=0xffff89edb0e0, proxy=0x0, proto=0) at t_fwd.c:1796
        branch_ret = 0
        lowest_ret = -1
        current_uri = {s = 0x0, len = 0}
        added_branches = 1
        first_branch = 0
        i = 0
        q = -1
        t_invite = 0xffffc151a1d0
        success_branch = 0
        try_new = 1
        lock_replies = 1
        dst_uri = {s = 0x0, len = 0}
        path = {s = 0x0, len = 0}
        instance = {s = 0x0, len = 0}
        ruid = {s = 0x0, len = 0}
        location_ua = {s = 0x0, len = 0}
        si = 0x0
        backup_bflags = 0
        bflags = 0
        __func__ = "t_forward_nonack"
#11 0x0000ffff897ed29c in t_relay_to (p_msg=0xffff89edb0e0, proxy=0x0, proto=0, replicate=0) at t_funcs.c:355
        ret = 0
        new_tran = 1
        t = 0xffff8188ed98
        dst = {send_sock = 0x833520 <__func__.8441>, to = {s = {sa_family = 47392, sa_data = "\202\000\000\000\000\000\220\226\351\211\377\377\000"}, sin = {
              sin_family = 47392, sin_port = 130, sin_addr = {s_addr = 0}, sin_zero = "\220\226\351\211\377\377\000"}, sin6 = {sin6_family = 47392,
              sin6_port = 130, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\226\351\211\377\377\000\000\020\000\277\211\377\377\000",
                  __u6_addr16 = {38544, 35305, 65535, 0, 16, 35263, 65535, 0}, __u6_addr32 = {2313787024, 65535, 2310995984, 65535}}}, sin6_scope_id = 135}},
          id = 0, proto = 56 '8', send_flags = {f = 223 '\337', blst_imask = 127 '\177'}}
        port = 0
        host = {s = 0x6a464009 <error: Cannot access memory at address 0x6a464009>, len = 0}
        comp = 0
        __func__ = "t_relay_to"
#12 0x0000ffff89839650 in _w_t_relay_to (p_msg=0xffff89edb0e0, proxy=0x0, force_proto=0) at tm.c:1517
        t = 0xffffc1519de0
        res = 65535
        __func__ = "_w_t_relay_to"
#13 0x0000ffff8983aa64 in w_t_relay (p_msg=0xffff89edb0e0, _foo=0x0, _bar=0x0) at tm.c:1718
No locals.
#14 0x000000000041f1bc in do_action (h=0xffffc151a460, a=0xffff89cbede8, msg=0xffff89edb0e0) at action.c:1088
        ret = -5
        v = 821157850
        dst = {send_sock = 0xffff80d78618 <__func__.14174>, to = {s = {sa_family = 59927, sa_data = "l\211\377\377\000\000\200\242Q\301\377\377\000"}, sin = {
              sin_family = 59927, sin_port = 35180, sin_addr = {s_addr = 65535}, sin_zero = "\200\242Q\301\377\377\000"}, sin6 = {sin6_family = 59927,
              sin6_port = 35180, sin6_flowinfo = 65535, sin6_addr = {__in6_u = {__u6_addr8 = "\200\242Q\301\377\377\000\000H\361A\000\000\000\000", __u6_addr16 = {
                    41600, 49489, 65535, 0, 61768, 65, 0, 0}, __u6_addr32 = {3243352704, 65535, 4321608, 0}}}, sin6_scope_id = 135}}, id = 0, proto = 56 '8',
          send_flags = {f = 223 '\337', blst_imask = 127 '\177'}}
        tmp = 0xffff89edb0e0 "\006"
        new_uri = 0xffff89cb94b0 "\217\003"
        end = 0xffff89edb0e0 "\006"
        crt = 0x87 <error: Cannot access memory at address 0x87>
        cmd = 0xffff89c45e68
        len = 0
        user = 4382880
        uri = {user = {s = 0xffffc151a160 "\200\242Q\301\377\377", len = 5959220}, passwd = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 8380216}, host = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, port = {s = 0xffff89cb9880 "\001",
            len = -1051614664}, params = {s = 0xffff89edb0e0 "\006", len = -1051606264}, sip_params = {s = 0xffff89dec1a8 "\002", len = -1981892192}, headers = {
            s = 0xffff91c00b00 " \022\300\221\377\377", len = -1051613344}, port_no = 25120, proto = 35268, type = 65535, flags = (unknown: 0), transport = {
            s = 0xffff896ce9f8 "%s: %s%s(): no destination URI\n", len = 21}, ttl = {s = 0x7080 <error: Cannot access memory at address 0x7080>,
            len = 1076896416}, user_param = {s = 0xffffc151a160 "\200\242Q\301\377\377", len = 5959276}, maddr = {
            s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, method = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>,
            len = 1782988809}, lr = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1051613552}, r2 = {
            s = 0xd <error: Cannot access memory at address 0xd>, len = -1051614776}, gr = {
            s = 0x252525250000000d <error: Cannot access memory at address 0x252525250000000d>, len = 623191333}, transport_val = {
            s = 0x6920676f <error: Cannot access memory at address 0x6920676f>, len = 0}, ttl_val = {s = 0xffff91d344c0 <step4_jumps> "", len = -1},
          user_param_val = {s = 0xffffc151a280 "P\250Q\301\377\377", len = 4320364}, maddr_val = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 8380216}, method_val = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr_val = {
            s = 0xffff89cb9fa8 "\004", len = -1051613552}, r2_val = {s = 0xffff89edb0e0 "\006", len = -1051606264}, gr_val = {s = 0x7fdf38 "DEBUG",
            len = -2133364224}}
        next_hop = {user = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = -1982052448}, passwd = {s = 0x403d49b0 "0H=@", len = 144},
          host = {s = 0x833520 <__func__.8441> "rval_destroy", len = 8567072}, port = {s = 0xffff89e99690 "`\230\351\211\377\377", len = -1983971312}, params = {
            s = 0xffffc151a4d0 "P\245Q\301\377\377", len = 4383988}, sip_params = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216},
          headers = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, port_no = 135, proto = 0, type = ERROR_URI_T,
          flags = (unknown: 2314055904), transport = {s = 0xffff89cbcac8 "\223\003", len = -1051613824}, ttl = {s = 0xffffc151a040 "`\241Q\301\377\377",
            len = 5958084}, user_param = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, maddr = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, method = {s = 0xffff91d56000 <initial_quick+456> "", len = 0},
          lr = {s = 0xffff89cb9888 "\004", len = -1051614664}, r2 = {s = 0xffff89edb0e0 "\006", len = -1051606264}, gr = {s = 0x0, len = -1981890136},
          transport_val = {s = 0xffffc151a040 "`\241Q\301\377\377", len = 5963424}, ttl_val = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 8380216}, user_param_val = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, maddr_val = {
            s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {
            s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -1848308336}, r2_val = {s = 0xffff91c00b00 " \022\300\221\377\377",
            len = 32}, gr_val = {s = 0xffff896ce9f8 "%s: %s%s(): no destination URI\n", len = 0}}
        u = 0xffffc151a3b0
        port = 0
        dst_host = 0x20
        i = 8380216
        flags = 65535
        avp = 0x87
        st = {flags = 1782988809, id = 0, name = {n = 0, s = {s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>, len = 0},
            re = 0xffff00000000}, avp = 0xffff89dc47a0}
        sct = 0x30f1dfda
        sjt = 0x7fdf38
        rve = 0xffffc151a910
        mct = 0xffffff80ffffffd0
        rv = 0x30f1dfda
        rv1 = 0x42e4f4 <run_actions+2240>
        c1 = {cache_type = 3575410840, val_type = 2758032445, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0},
              ri = -1051615488, flags = 65535}}, i2s = "8\362A\000\000\000\000\000\207\000\000\000\000\000\000\000\070\337\177\000\000"}
        s = {s = 0xa464c3c2140f0d38 <error: Cannot access memory at address 0xa464c3c2140f0d38>, len = -1983177984}
        srevp = {0x0, 0xffffc1519d30}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST,
            u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
              data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#15 0x000000000042e4f4 in run_actions (h=0xffffc151a460, a=0xffff89cbede8, msg=0xffff89edb0e0) at action.c:1583
        t = 0xffff89cbede8
        ret = -1
        mod = 0x0
        ms = 0
        __func__ = "run_actions"
#16 0x000000000042ed40 in run_actions_safe (h=0xffffc151c308, a=0xffff89cbede8, msg=0xffff89edb0e0) at action.c:1648
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {135, 8380216, 821157850, 1782988809, 0, 0, 0, 0, 0, 0, 281473925096368,
                11845808158218849592, 281473925096784, 11845659156157320728, 0, 0, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 0, __saved_mask = {__val = {0,
                  2312869768, 281472995799264, 18446744070492342704, 0, 281473925097200, 5936264, 281473925096944, 281472995799264, 281472993577672,
                  281473925104392, 0, 4294967295, 135, 8380216, 821157850}}}}}
        ret = 1782988809
        ign_on_break = 0
#17 0x00000000005a9488 in rval_get_int (h=0xffffc151c308, msg=0xffff89edb0e0, i=0xffffc151a8b8, rv=0xffff89cbf218, cache=0x0) at rvalue.c:924
        r_avp = 0x0
        avp_val = {n = 1782988809, s = {s = 0x6a464009 <error: Cannot access memory at address 0x6a464009>, len = 0}, re = 0x6a464009}
        pval = {rs = {s = 0x0, len = 8380216}, ri = 821157850, flags = 0}
        tmp = {s = 0x0, len = 0}
        s = 0x0
        r = 0
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#18 0x00000000005ae9c4 in rval_expr_eval_int (h=0xffffc151c308, msg=0xffff89edb0e0, res=0xffffc151a8b8, rve=0xffff89cbf210) at rvalue.c:1918
        i1 = -1051611888
        i2 = 4
        ret = -1
        c1 = {cache_type = 2305161908, val_type = 65535, c = {avp_val = {n = -1051613216, s = {s = 0xffffc151a7e0 "", len = 5959276}, re = 0xffffc151a7e0},
            pval = {rs = {s = 0xffffc151a7e0 "", len = 5959276}, ri = 135, flags = 0}},
          i2s = "8\337\177\000\000\000\000\000\332\337\361\060\000\000\000\000\t at Fj\000"}
        c2 = {cache_type = 10, val_type = 30, c = {avp_val = {n = 0, s = {s = 0x0, len = -1983131912}, re = 0x0}, pval = {rs = {s = 0x0, len = -1983131912},
              ri = -1051611888, flags = 65535}}, i2s = "\340\260\355\211\377\377\000\000\b\303Q\301\377\377\000\000`\250Q\301\377\377"}
        rv1 = 0x6a464009
        rv2 = 0x30f1dfda
        __func__ = "rval_expr_eval_int"
#19 0x00000000005aee34 in rval_expr_eval_int (h=0xffffc151c308, msg=0xffff89edb0e0, res=0xffffc151ad10, rve=0xffff89cbf938) at rvalue.c:1926
        i1 = 1
        i2 = 0
        ret = -1
        c1 = {cache_type = 1782988809, val_type = RV_NONE, c = {avp_val = {n = -1051612928, s = {s = 0xffffc151a900 "\320\256Q\301\377\377", len = -1980911392},
              re = 0xffffc151a900}, pval = {rs = {s = 0xffffc151a900 "\320\256Q\301\377\377", len = -1980911392}, ri = -1983149416, flags = 65535}},
          i2s = "\b\303Q\301\377\377\000\000\332\337\361\060\000\000\000\000\t at Fj\000"}
        c2 = {cache_type = 2311930112, val_type = 65535, c = {avp_val = {n = -1980911392, s = {s = 0xffff89edb0e0 "\006", len = -1051612928},
              re = 0xffff89edb0e0}, pval = {rs = {s = 0xffff89edb0e0 "\006", len = -1051612928}, ri = 4321608, flags = 0}},
          i2s = "\207\000\000\000\000\000\000\000\070\337\177\000\000\000\000\000\332\337\361\060\000"}
        rv1 = 0xffffc151ada0
        rv2 = 0xffff896d2df8 <__func__.9630>
        __func__ = "rval_expr_eval_int"
#20 0x000000000041ec6c in do_action (h=0xffffc151c308, a=0xffff89cc0060, msg=0xffff89edb0e0) at action.c:1064
        ret = -5
        v = 0
        dst = {send_sock = 0xffffc151ad90, to = {s = {sa_family = 27956, sa_data = "Z\000\000\000\000\000\207\000\000\000\000\000\000"}, sin = {
              sin_family = 27956, sin_port = 90, sin_addr = {s_addr = 0}, sin_zero = "\207\000\000\000\000\000\000"}, sin6 = {sin6_family = 27956, sin6_port = 90,
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\207\000\000\000\000\000\000\000\070\337\177\000\000\000\000", __u6_addr16 = {135, 0, 0, 0,
                    57144, 127, 0, 0}, __u6_addr32 = {135, 0, 8380216, 0}}}, sin6_scope_id = 821157850}}, id = 0, proto = 9 '\t', send_flags = {f = 64 '@',
            blst_imask = 70 'F'}}
        tmp = 0xffffc151b390 "\001"
        new_uri = 0xffffc151ae60 "8\371\313\211\377\377"
        end = 0xffff89e99690 "`\230\351\211\377\377"
        crt = 0xffff89cd8250 "\001"
        cmd = 0xffff89cd8258
        len = 0
        user = 1782988809
        uri = {user = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, passwd = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, host = {s = 0xffff89edb0e0 "\006", len = -1980911392}, port = {
            s = 0xffff89cd80c0 "\340\003", len = -1051612160}, params = {s = 0xffffc151abc0 "@\254Q\301\001", len = -1985742896}, sip_params = {
            s = 0xc151abe8 <error: Cannot access memory at address 0xc151abe8>, len = -1983971312}, headers = {
            s = 0x1c151ac40 <error: Cannot access memory at address 0x1c151ac40>, len = 0}, port_no = 44400, proto = 49489, type = 65535,
          flags = (unknown: 5936264), transport = {s = 0x0, len = -1980911392}, ttl = {s = 0xffff89cd80c0 "\340\003", len = -1051606264}, user_param = {s = 0x0,
            len = 1}, maddr = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, method = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {
            s = 0x0, len = 0}, transport_val = {s = 0xffffc151ab50 "\320\253Q\301\377\377", len = 336530744}, ttl_val = {s = 0x0, len = -719567176},
          user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>, len = 5959276}, gr_val = {
            s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}}
        next_hop = {user = {s = 0xffffc151ade0 "`\256Q\301\377\377", len = 5957052}, passwd = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 8380216}, host = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, port = {
            s = 0x87 <error: Cannot access memory at address 0x87>, len = 0}, params = {s = 0xffff89cd40e0 "\a", len = 1782988809}, sip_params = {
            s = 0xffff89c50ac8 "x\236R\211\377\377", len = -1051606264}, headers = {s = 0xffff89edb0e0 "\006", len = -1051606264}, port_no = 0, proto = 0,
          type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {
            s = 0x97fd46 <buf+270> "on;nat=yes;did=a41.10a>\r\nFrom: <sip:1000 at 10.100.92.222>;tag=929365234\r\nTo: <sip:2_5fae4541 at 10.100.92.222>;tag=tsksn14njr\r\nCall-ID: k1l3hd6cq4h2b1vnovhd\r\nCSeq: 2 BYE\r\nContact: <sip:1000 at 10.100.92.222:5"..., len = 2}, method = {
            s = 0x97fd40 <buf+264> "on;lr=on;nat=yes;did=a41.10a>\r\nFrom: <sip:1000 at 10.100.92.222>;tag=929365234\r\nTo: <sip:2_5fae4541 at 10.100.92.222>;tag=tsksn14njr\r\nCall-ID: k1l3hd6cq4h2b1vnovhd\r\nCSeq: 2 BYE\r\nContact: <sip:1000 at 10.100.92"..., len = 2}, lr = {s = 0x0, len = 0}, r2 = {s = 0xffff89e58a58 "\t",
            len = -1989194012}, gr = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, transport_val = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, ttl_val = {
            s = 0xc449000000000003 <error: Cannot access memory at address 0xc449000000000003>, len = -1980910696}, user_param_val = {
            s = 0xffffc151ab50 "\320\253Q\301\377\377", len = 4382880}, maddr_val = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 1},
          method_val = {s = 0x30097fdb4 <error: Cannot access memory at address 0x30097fdb4>, len = 1}, lr_val = {s = 0xffffc151ac20 "\332\337\361\060",
            len = 5958084}, r2_val = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, gr_val = {s = 0xffffc151abd0 "p\255Q\301\377\377",
            len = 4386112}}
        u = 0x30f1dfda
        port = 0
        dst_host = 0x0
        i = 19
        flags = 0
        avp = 0x87
        st = {flags = 5945744, id = 0, name = {n = 0, s = {s = 0x0, len = -1051611752}, re = 0x0}, avp = 0x87}
        sct = 0x30f1dfda
        sjt = 0x1
        rve = 0xffff89cbf938
        mct = 0x87
        rv = 0xffffc151a9e0
        rv1 = 0x41ec6c <do_action+35204>
        c1 = {cache_type = 5929308, val_type = RV_NONE, c = {avp_val = {n = -1051611752, s = {s = 0xffffc151ad98 "\t at Fj", len = 0}, re = 0xffffc151ad98}, pval = {
              rs = {s = 0xffffc151ad98 "\t at Fj", len = 0}, ri = -1981180272, flags = 1}},
          i2s = "\210\255Q\301\240\003\000\000\340\251Q\301\377\377\000\000\200\271Z\000\000"}
        s = {s = 0x7fdf38 "DEBUG", len = -1051612768}
        srevp = {0x8a, 0xffff89e99660}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST,
            u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
              data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x000000000042e4f4 in run_actions (h=0xffffc151c308, a=0xffff89cb95f8, msg=0xffff89edb0e0) at action.c:1583
        t = 0xffff89cc0060
        ret = 1
        mod = 0x500000000
        ms = 0
        __func__ = "run_actions"
#22 0x000000000041b344 in do_action (h=0xffffc151c308, a=0xffff89cda6d0, msg=0xffff89edb0e0) at action.c:712
        ret = -5
        v = 1
        dst = {send_sock = 0xffffffff, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\350\217H\211\377\377\000"}, sin = {sin_family = 0,
              sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\350\217H\211\377\377\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
              sin6_addr = {__in6_u = {__u6_addr8 = "\350\217H\211\377\377\000\000\025\000\000\000\000\000\000", __u6_addr16 = {36840, 35144, 65535, 0, 21, 0, 0,
                    0}, __u6_addr32 = {2303234024, 65535, 21, 0}}}, sin6_scope_id = 3243357184}}, id = 65535, proto = 228 '\344', send_flags = {f = 150 '\226',
            blst_imask = 102 'f'}}
        tmp = 0xffffc151ba10 "\001"
        new_uri = 0xffffc151b4e0 "P\202\315\211\377\377"
        end = 0xffff89cc51f8 "\002"
        crt = 0xffff89ccfe30 "\001"
        cmd = 0xffff89ccfe38
        len = 0
        user = 1782988809
        uri = {user = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, passwd = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, host = {s = 0x0, len = -1980911392}, port = {
            s = 0xffff89ccfce8 "\314\003", len = -1051610496}, params = {s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>,
            len = -1849245812}, sip_params = {s = 0x91d56000 <error: Cannot access memory at address 0x91d56000>, len = 1077747920}, headers = {
            s = 0x191d54000 <error: Cannot access memory at address 0x191d54000>, len = 0}, port_no = 46064, proto = 49489, type = 65535,
          flags = (unknown: 5936264), transport = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1980911392}, ttl = {
            s = 0xffff89ccfce8 "\314\003", len = -1051606264}, user_param = {s = 0x0, len = 1}, maddr = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 8380216}, method = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr = {s = 0x0, len = 0}, r2 = {
            s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0xffffc151b1d0 "P\262Q\301\377\377", len = 336530744}, ttl_val = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = -719561672}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0,
            len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0xffff00000000 <error: Cannot access memory at address 0xffff00000000>, len = 32}, gr_val = {s = 0xffff91c00b00 " \022\300\221\377\377",
            len = -1051608560}}
        next_hop = {user = {s = 0xffffc151b0b0 "h\207\304\211\377\377", len = 4382880}, passwd = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 0}, host = {s = 0xffffc151b130 "\320\262Q\301\377\377", len = 5805596}, port = {s = 0x87 <error: Cannot access memory at address 0x87>,
            len = 8380216}, params = {s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, sip_params = {
            s = 0xffff89c48768 "\250\320q\211\377\377", len = 4386112}, headers = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216},
          port_no = 57306, proto = 12529, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 1782988808), transport = {
            s = 0xffffc151b150 "8\335\314\211\377\377", len = -1980911392}, ttl = {s = 0xffff89ccdd38 "\307\003", len = -1051610784}, user_param = {
            s = 0xffffc151b560 "\207", len = 5006156}, maddr = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, method = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, lr = {s = 0xffffc151b2d0 "", len = -1983057000}, r2 = {
            s = 0xffff89edb0e0 "\006", len = -1051606264}, gr = {s = 0xffff89ccdd38 "\307\003", len = -1051606264}, transport_val = {s = 0x0, len = 1}, ttl_val = {
            s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, user_param_val = {s = 0xffffc151b1d0 "P\262Q\301\377\377", len = 4382880},
          maddr_val = {s = 0x87 <error: Cannot access memory at address 0x87>, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0xffffc151b0b0 "h\207\304\211\377\377", len = 336530744}, gr_val = {s = 0xffffc151b250 "\360\263Q\301\377\377", len = 4386112}}
        u = 0x30f1dfda
        port = 0
        dst_host = 0xffffc151c308
        i = 3
        flags = 0
        avp = 0x87
        st = {flags = 3243361032, id = 65535, name = {n = 0, s = {s = 0x0, len = -1}, re = 0x0}, avp = 0x87}
        sct = 0x87
        sjt = 0x1
        rve = 0xffff89cd8250
        mct = 0xffffc151b450
        rv = 0xffff89cc8880
        rv1 = 0x41ec6c <do_action+35204>
        c1 = {cache_type = 5928904, val_type = RV_NONE, c = {avp_val = {n = -1051611072, s = {
                s = 0xffffffffc151b040 <error: Cannot access memory at address 0xffffffffc151b040>, len = 0}, re = 0xffffffffc151b040}, pval = {rs = {
                s = 0xffffffffc151b040 <error: Cannot access memory at address 0xffffffffc151b040>, len = 0}, ri = -1051610704, flags = 1}},
          i2s = "\210\224Z", '\000' <repeats 13 times>, "\340\260\355\211\377\377"}
        s = {s = 0x6800000000 <error: Cannot access memory at address 0x6800000000>, len = -1051611120}
        srevp = {0xffffc151b040, 0xffffc151b3f8}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST,
            u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
              data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#23 0x000000000042e4f4 in run_actions (h=0xffffc151c308, a=0xffff89cd3dd0, msg=0xffff89edb0e0) at action.c:1583
        t = 0xffff89cda6d0
        ret = 1
        mod = 0x1
        ms = 0
        __func__ = "run_actions"
#24 0x000000000041f148 in do_action (h=0xffffc151c308, a=0xffff89cda960, msg=0xffff89edb0e0) at action.c:1079
        ret = 1
        v = 1
        dst = {send_sock = 0x1d00000002, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\200p\000\000\000\000\000"}, sin = {sin_family = 0,
              sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\200p\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
              sin6_addr = {__in6_u = {__u6_addr8 = "\200p\000\000\000\000\000\000\240\"0@\000\000\000", __u6_addr16 = {28800, 0, 0, 0, 8864, 16432, 0, 0},
                  __u6_addr32 = {28800, 0, 1076896416, 0}}}, sin6_scope_id = 3243359008}}, id = 65535, proto = 0 '\000', send_flags = {f = 37 '%',
            blst_imask = 72 'H'}}
        tmp = 0xffffc151c090 ""
        new_uri = 0xffffc151fdc6 "/var/Olympus/kamailio.cfg"
        end = 0xffff89c5f350 ""
        crt = 0xffff89ca8b68 "\001"
        cmd = 0x0
        len = 2
        user = 1782988809
        uri = {user = {s = 0xffff91d56000 <initial_quick+456> "", len = 1077747920}, passwd = {s = 0xffff91d54000 <realloc at got.plt> "\250?\311\221\377\377",
            len = 32}, host = {s = 0xffff91c00b00 " \022\300\221\377\377", len = -1051608560}, port = {
            s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 0}, params = {s = 0xffff89488fe8 "%s: %s%s:%d:%.*s", len = 21},
          sip_params = {s = 0xffffc151b8e0 "", len = -1848750100}, headers = {s = 0xffff91d56000 <initial_quick+456> "", len = 1077747920}, port_no = 47328,
          proto = 49489, type = 65535, flags = (unknown: 0), transport = {s = 0xffffc151ba00 " \273Q\301\377\377", len = -1848749588}, ttl = {
            s = 0x87 <error: Cannot access memory at address 0x87>, len = 8380216}, user_param = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {
            s = 0x0, len = 0}, r2 = {s = 0xffffc151bb00 "\332\337\361\060", len = -1051608320}, gr = {s = 0xffffc151bad0 "0\337\177", len = -48}, transport_val = {
            s = 0xffffc151ba30 "", len = -1051608528}, ttl_val = {s = 0x5a6fd201 <error: Cannot access memory at address 0x5a6fd201>, len = 1077748512},
          user_param_val = {s = 0x82 <error: Cannot access memory at address 0x82>, len = 0}, maddr_val = {
            s = 0x2564253a73257325 <error: Cannot access memory at address 0x2564253a73257325>, len = 115}, method_val = {
            s = 0x65706c656874616e <error: Cannot access memory at address 0x65706c656874616e>, len = 1077748512}, lr_val = {s = 0x0, len = -256}, r2_val = {
            s = 0x0, len = 37}, gr_val = {s = 0x1e0000000a <error: Cannot access memory at address 0x1e0000000a>, len = 0}}
        next_hop = {user = {s = 0xffffc151b7d0 "0\270Q\301\377\377", len = -1848950520}, passwd = {s = 0xffffc151b9c8 "%", len = 15}, host = {s = 0x403d232c "",
            len = 0}, port = {s = 0xffff91d3e51f "T ", len = -1848297408}, params = {s = 0xffff91d39748 "%H:%M:%S", len = 8187}, sip_params = {s = 0x403d232c "",
            len = 1077748532}, headers = {s = 0xffffc151b7d0 "0\270Q\301\377\377", len = -1849087388}, port_no = 8976, proto = 16445, type = ERROR_URI_T,
          flags = (unknown: 2446674336), transport = {s = 0x90 <error: Cannot access memory at address 0x90>, len = 144}, ttl = {
            s = 0x1f81 <error: Cannot access memory at address 0x1f81>, len = 8208}, user_param = {s = 0x403d4320 "", len = 0}, maddr = {
            s = 0xffff89488fe8 "%s: %s%s:%d:%.*s", len = 21}, method = {s = 0xffffc151b860 "", len = -1849080668}, lr = {s = 0xffff91d549a0 <main_arena> "",
            len = 121968}, r2 = {s = 0x2000 <error: Cannot access memory at address 0x2000>, len = -1848295424}, gr = {s = 0xffffc151b830 " \024\325\221\377\377",
            len = -1849081660}, transport_val = {s = 0x403d2320 "", len = 131}, ttl_val = {s = 0x403d2310 "\260#=@", len = 144}, user_param_val = {
            s = 0xffff91d549a0 <main_arena> "", len = 8208}, maddr_val = {s = 0xffffc151b8a0 "\350\217H\211\377\377", len = -1849167692}, method_val = {
            s = 0x403d20d0 "\002", len = 0}, lr_val = {s = 0xffff91d51420 <_IO_mem_jumps> "", len = 32}, r2_val = {s = 0xffff91c00b00 " \022\300\221\377\377",
            len = -1051608560}, gr_val = {s = 0xffffc151b8e0 "", len = -1848750328}}
        u = 0x30f1dfda
        port = 0
        dst_host = 0x6a464009
        i = 55
        flags = 65535
        avp = 0xffff89ed1ad8
        st = {flags = 0, id = 0, name = {n = 8497288, s = {s = 0x81a888 "%s: %s%s(): final buffer length %d\n", len = 21}, re = 0x81a888}, avp = 0xffffc151b790}
        sct = 0x2525252525252525
        sjt = 0xffffff80ffffffd0
        rve = 0xffff89ccfe30
        mct = 0xffffc151bad0
        rv = 0x403d4320
        rv1 = 0xffff89edb0e0
        c1 = {cache_type = 2445879908, val_type = 65535, c = {avp_val = {n = 1077748496, s = {s = 0x403d2310 "\260#=@", len = -1848292960}, re = 0x403d2310},
            pval = {rs = {s = 0x403d2310 "\260#=@", len = -1848292960}, ri = 128, flags = 0}},
          i2s = "\200\000\000\000\000\000\000\000\221\037\000\000\000\000\000\000\020 \000\000\000"}
        s = {s = 0x403d2334 "", len = -1051609344}
        srevp = {0x1ffb, 0x403d232c}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST,
            u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
              data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#25 0x000000000042e4f4 in run_actions (h=0xffffc151c308, a=0xffff89ccf070, msg=0xffff89edb0e0) at action.c:1583
        t = 0xffff89cda960
        ret = 1
        mod = 0xffff89ca7fd0
        ms = 0
        __func__ = "run_actions"
#26 0x000000000041b344 in do_action (h=0xffffc151c308, a=0xffff89caa7f0, msg=0xffff89edb0e0) at action.c:712
        ret = -5
        v = 0
        dst = {send_sock = 0x403d118c, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\037\345\323\221\377\377\000"}, sin = {sin_family = 0,
              sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\037\345\323\221\377\377\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
              sin6_addr = {__in6_u = {__u6_addr8 = "\037\345\323\221\377\377\000\000 at 8\325\221\377\377\000", __u6_addr16 = {58655, 37331, 65535, 0, 14400, 37333,
                    65535, 0}, __u6_addr32 = {2446583071, 65535, 2446669888, 65535}}}, sin6_scope_id = 2446563144}}, id = 65535, proto = 251 '\373', send_flags = {
            f = 31 '\037', blst_imask = 0 '\000'}}
        tmp = 0xffff91ce4fec <__vsyslog_chk+892> "@\367\377\266g\202\066\221\347\200@\271\207\366\377\064\377\376\377\227g\202\066\221\002"
        new_uri = 0xffff91d549a0 <main_arena> ""
        end = 0x90 <error: Cannot access memory at address 0x90>
        crt = 0x87 <error: Cannot access memory at address 0x87>
        cmd = 0xffff89c51ce8
        len = 0
        user = 4382880
        uri = {user = {s = 0x403d3180 "", len = 0}, passwd = {s = 0x872200 "%s: %s%s(): header field type %d, name=<%.*s>, body=<%.*s>\n", len = 21}, host = {
            s = 0xffffc151bfc0 "\250/\207", len = -1849080668}, port = {s = 0xffffc151c000 "`\300Q\301\377\377", len = -1848950520}, params = {
            s = 0xffffc151c1f8 "\005", len = 15}, sip_params = {s = 0x403d118c "", len = 0}, headers = {s = 0xffff91d3e51f "T ", len = -1848297408},
          port_no = 38728, proto = 37331, type = 65535, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 8184), transport = {s = 0x403d118c "",
            len = 1077744020}, ttl = {s = 0xffffc151c000 "`\300Q\301\377\377", len = -1849087388}, user_param = {s = 0x403d1170 "", len = -1848292960}, maddr = {
            s = 0x80 <error: Cannot access memory at address 0x80>, len = 128}, method = {s = 0x1f91 <error: Cannot access memory at address 0x1f91>, len = 8208},
          lr = {s = 0x403d3180 "", len = 0}, r2 = {s = 0x872fa8 "%s: %s%s(): exiting parse_msg\n", len = 21}, gr = {s = 0xffffc151c090 "", len = -1849080668},
          transport_val = {s = 0xffff91d549a0 <main_arena> "", len = 126496}, ttl_val = {s = 0x2000 <error: Cannot access memory at address 0x2000>,
            len = -1848295424}, user_param_val = {s = 0xffffc151c060 "\214\021=@", len = -1849081660}, maddr_val = {s = 0x403d1180 "", len = 112}, method_val = {
            s = 0x403d1170 "", len = 128}, lr_val = {s = 0xffff91d549a0 <main_arena> "", len = 8208}, r2_val = {s = 0xffffc151c130 "\350\034\305\211\377\377",
            len = -1848950520}, gr_val = {s = 0xffffc151c328 "\332\337\361\060", len = 15}}
        next_hop = {user = {s = 0xffff91d344c0 <step4_jumps> "", len = -1}, passwd = {s = 0xffff91c65a28 <vfprintf+4472> "\247\034", len = 0}, host = {
            s = 0xbd0 <error: Cannot access memory at address 0xbd0>, len = -1051605968}, port = {s = 0x3 <error: Cannot access memory at address 0x3>,
            len = -1051605920}, params = {s = 0xffffffe8ffffff80 <error: Cannot access memory at address 0xffffffe8ffffff80>, len = -1051605920}, sip_params = {
            s = 0x30f1dfda <error: Cannot access memory at address 0x30f1dfda>, len = 1782988809}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0,
          type = ERROR_URI_T, flags = (unknown: 8513280), transport = {s = 0x0, len = 0}, ttl = {s = 0xffffc151bfb0 "\200\061=@", len = -1051607120},
          user_param = {s = 0xffffc151bf80 "p\021=@", len = -48}, maddr = {s = 0x3e732a2e253c203d <error: Cannot access memory at address 0x3e732a2e253c203d>,
            len = -1051605920}, method = {s = 0xffffc151c460 "", len = -1051605968}, lr = {
            s = 0xffffff80ffffffd0 <error: Cannot access memory at address 0xffffff80ffffffd0>, len = 0}, r2 = {s = 0xffffc151bf30 "\214\021=@",
            len = -1848950520}, gr = {s = 0xffffc151c128 "", len = 15}, transport_val = {s = 0x403d118c "", len = 0}, ttl_val = {s = 0xffff91d3e51f "T ",
            len = -1848297408}, user_param_val = {s = 0xffff91d39748 "%H:%M:%S", len = 8187}, maddr_val = {s = 0x403d118c "", len = 1077744020}, method_val = {
            s = 0xffffc151bf30 "\214\021=@", len = -1849087388}, lr_val = {s = 0x403d1170 "", len = -1848292960}, r2_val = {
            s = 0xd0 <error: Cannot access memory at address 0xd0>, len = 208}, gr_val = {s = 0x1f41 <error: Cannot access memory at address 0x1f41>, len = 8208}}
        u = 0xffffc151c250
        port = 0
        dst_host = 0x403d0f30
        i = 5
        flags = 0
        avp = 0xffffffff
        st = {flags = 3243359704, id = 65535, name = {n = 11, s = {s = 0xb <error: Cannot access memory at address 0xb>, len = 0}, re = 0xb}, avp = 0x8889e8}
        sct = 0x1f81
        sjt = 0x90
        rve = 0xffff89ca8b68
        mct = 0x90
        rv = 0xb
        rv1 = 0xffffc151c370
        c1 = {cache_type = 3243361024, val_type = 65535, c = {avp_val = {n = -48, s = {
                s = 0xffffff80ffffffd0 <error: Cannot access memory at address 0xffffff80ffffffd0>, len = -1848750328}, re = 0xffffff80ffffffd0}, pval = {rs = {
                s = 0xffffff80ffffffd0 <error: Cannot access memory at address 0xffffff80ffffffd0>, len = -1848750328}, ri = -1848287232, flags = 65535}},
          i2s = "@\302Q\301\377\377\000\000\000\000\000\000\377\377\000\000h\353\201\000\000"}
        s = {s = 0xffffc151c330 "\t at Fj", len = -1051606224}
        srevp = {0x15, 0xffff91d51420 <_IO_mem_jumps>}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NUMBER_ST,
            u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0},
              data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = RVE_FREE_FIXUP_ST, u = {number = 0, string = 0x0, str = {s = 0x0, len = 4}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#27 0x000000000042e4f4 in run_actions (h=0xffffc151c308, a=0xffff89c69c10, msg=0xffff89edb0e0) at action.c:1583
        t = 0xffff89caa7f0
        ret = 1
        mod = 0x42edbc <run_top_route+68>
        ms = 0
        __func__ = "run_actions"
#28 0x000000000042edf4 in run_top_route (a=0xffff89c69c10, msg=0xffff89edb0e0, c=0x0) at action.c:1669
        ctx = {rec_lev = 4, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {135, 8380216, 821157850, 1782988809, 0, 0, 0, 0, 0, 0, 281473925104208,
                11845808158218849592, 281473925104736, 11845659156157312952, 0, 0, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 0, __saved_mask = {__val = {
                  281473925104656, 6074936, 4611686022722355200, 0, 4611686022722355200, 281472995799264, 0, 4611686018427387904, 281473925104768, 5623960, 135,
                  8380216, 821157850, 1782988809, 4303481704, 281472995799264}}}}}
        p = 0xffffc151c308
        ret = 8380216
        sfbk = 0
#29 0x000000000055d0e4 in receive_msg (
    buf=0x97fc38 <buf> "BYE sip:8mon17p1 at 10.100.92.35:50249;transport=ws;ob;alias=10.100.92.35:50249~6 SIP/2.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;rport;branch=z-
9hG4bK1284828286\r\nRoute: <sip:10.100.92.222;r2=on;lr=on;nat=ye"..., len=552, rcv_info=0xffffc151c700) at receive.c:216
        msg = 0xffff89edb0e0
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {135, 8380216, 821157850, 1782988809, 0, 0, 0, 0, 0, 0, 281473925104208,
                11845808158218849592, 135, 11845659156157312952, 0, 0, 135, 8380216, 821157850, 0, 0, 167503724544}, __mask_was_saved = 10026040, __saved_mask = {
                __val = {281473925105416, 65535, 55834574851, 3243362056, 281472993081032, 281473925105216, 7090548, 135, 8380216, 821157850, 1782988809,
                  281473925105200, 167510816244, 10026040, 281473925105408, 135}}}}}
        ret = 1
        inb = {
          s = 0x97fc38 <buf> "BYE sip:8mon17p1 at 10.100.92.35:50249;transport=ws;ob;alias=10.100.92.35:50249~6 SIP/2.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;rport;branch=z9hG4bK1284828286\r\nRoute: <sip:10.100.92.222;r2=on;lr=on;nat=ye"..., len = 552}
        __func__ = "receive_msg"
#30 0x00000000006cbbbc in udp_rcv_loop () at udp_server.c:544
        len = 552
        buf = "BYE sip:8mon17p1 at 10.100.92.35:50249;transport=ws;ob;alias=10.100.92.35:50249~6 SIP/2.0\r\nVia: SIP/2.0/UDP 10.100.92.222:5062;rport;branch=z9hG4bK1284828286\r\nRoute: <sip:10.100.92.222;r2=on;lr=on;nat=ye"...
        tmp = 0x98fc38 <buff> "10.100.92.222"
        from = 0xffff89c436c8
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {8030798178131141642, 8297102154720439139}, addr32 = {3730596874, 1869815908, 624782179, 1931819635},
              addr16 = {25610, 56924, 8292, 28531, 27491, 9533, 14963, 29477}, addr = "\nd\\\336d sock=%s:%s"}}, dst_ip = {af = 2, len = 4, u = {addrl = {
                3730596874, 0}, addr32 = {3730596874, 0, 0, 0}, addr16 = {25610, 56924, 0, 0, 0, 0, 0, 0}, addr = "\nd\\\336", '\000' <repeats 11 times>}},
          src_port = 5062, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2,
              sa_data = "\023\306\nd\\\336\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50707, sin_addr = {s_addr = 3730596874},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50707, sin6_flowinfo = 3730596874, sin6_addr = {__in6_u = {
                  __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}},
          bind_address = 0xffff89c42c20, proto = 1 '\001'}
        from_in = {s_addr = 3243362056}
        __func__ = "udp_rcv_loop"
#31 0x00000000004d63b4 in main_loop () at main.c:1629
        i = 7
        pid = 0
        si = 0xffff89c42c20
        si_desc = "udp receiver child=7 sock=10.100.92.222:5060\000]:5060\000\377\377\000\000\020\311Q\301\377\377\000\000\340\310Q\301\377\377\000\000\320\377\377\377\200\377\377\377", '\000' <repeats 16 times>, "ged to %(\004\347\211\377\377\000\000<core> [cfg/cfg_"
        r = 0
        nrprocs = 8
        __func__ = "main_loop"
#32 0x00000000004deea0 in main (argc=12, argv=0xffffc151cba8) at main.c:2581
        cfg_stream = 0x403022b0
        c = -1
        r = 0
        tmp = 0xffffc151fdf2 ""
        tmp_len = 0
        port = 0
        proto = 0
        options = 0x80cac0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
        ret = -1
        seed = 1711791307
        rfd = 291
        debug_save = 4
        debug_flag = 1
        dont_fork_cnt = 0
        n_lst = 0xffff91e0dd98 <_dl_fini>
        p = 0xffff91c3f314 <__libc_start_main+140> "\247\b"
        __func__ = "main"
	
```

#### Log Messages

<!--
Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->

```
(paste your log messages here)
```

#### SIP Traffic

<!--
If the issue is exposed by processing specific SIP messages, grab them with ngrep or save in a pcap file, then add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->

```
(paste your sip traffic here)
```

### Possible Solutions

<!--
If you found a solution or workaround for the issue, describe it. Ideally, provide a pull request with a fix.
-->

### Additional Information

  * **Kamailio Version** - output of `kamailio -v`

```
version: Kamailio , TEST   (armv41/linux)
flags: STATS: Off, EXTRA_DEBUG, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, DBG_QM_MALLOC, USE_FUTEX, USE_PTHREAD_MUTEX, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.

```

* **Operating System**:

<!--
Details about the operating system, the type: Linux (e.g.,: Debian 8.4, Ubuntu 16.04, CentOS 7.1, ...), MacOS, xBSD, Solaris, ...;
Kernel details (output of `uname -a`)
-->

```
#uname -a
Linux XXX 4.4.13 #1 SMP PREEMPT Fri Mar 24 10:50:44 CST 2017 aarch64 GNU/Linux
```

* **Kamailio Configuration**

```
sh kamctl ps

Process::  ID=0 PID=6801 Type=attendant
Process::  ID=1 PID=6802 Type=udp receiver child=0 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=2 PID=6803 Type=udp receiver child=1 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=3 PID=6804 Type=udp receiver child=2 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=4 PID=6805 Type=udp receiver child=3 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=5 PID=6806 Type=udp receiver child=4 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=6 PID=6807 Type=udp receiver child=5 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=7 PID=6808 Type=udp receiver child=6 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=8 PID=6809 Type=udp receiver child=7 sock=[FC02:0:0:0:0:0:0:1]:5060
Process::  ID=9 PID=6810 Type=udp receiver child=0 sock=10.100.92.222:5060
Process::  ID=10 PID=6811 Type=udp receiver child=1 sock=10.100.92.222:5060
Process::  ID=11 PID=6812 Type=udp receiver child=2 sock=10.100.92.222:5060
Process::  ID=12 PID=6813 Type=udp receiver child=3 sock=10.100.92.222:5060
Process::  ID=13 PID=6814 Type=udp receiver child=4 sock=10.100.92.222:5060
Process::  ID=14 PID=6815 Type=udp receiver child=5 sock=10.100.92.222:5060
Process::  ID=15 PID=6816 Type=udp receiver child=6 sock=10.100.92.222:5060
Process::  ID=16 PID=6817 Type=udp receiver child=7 sock=10.100.92.222:5060
Process::  ID=17 PID=6818 Type=slow timer
Process::  ID=18 PID=6819 Type=timer
Process::  ID=19 PID=6820 Type=MI FIFO
Process::  ID=20 PID=6821 Type=ctl handler
Process::  ID=21 PID=6822 Type=TIMER NH
Process::  ID=22 PID=6823 Type=Dialog Clean Timer
Process::  ID=23 PID=6824 Type=RTIMER SEC EXEC
Process::  ID=24 PID=6825 Type=RTIMER SEC EXEC
Process::  ID=25 PID=6826 Type=ASYNC MOD TIMER
Process::  ID=26 PID=6827 Type=tcp receiver (generic) child=0
Process::  ID=27 PID=6828 Type=tcp receiver (generic) child=1
Process::  ID=28 PID=6829 Type=tcp receiver (generic) child=2
Process::  ID=29 PID=6830 Type=tcp receiver (generic) child=3
Process::  ID=30 PID=6831 Type=tcp receiver (generic) child=4
Process::  ID=31 PID=6832 Type=tcp receiver (generic) child=5
Process::  ID=32 PID=6833 Type=tcp receiver (generic) child=6
Process::  ID=33 PID=6834 Type=tcp receiver (generic) child=7
Process::  ID=34 PID=6835 Type=tcp receiver (tls:10.100.92.222:10443) child=8
Process::  ID=35 PID=6836 Type=tcp receiver (tls:10.100.92.222:10443) child=9
Process::  ID=36 PID=6837 Type=tcp receiver (tls:10.100.92.222:10443) child=10
Process::  ID=37 PID=6838 Type=tcp receiver (tls:10.100.92.222:10443) child=11
Process::  ID=38 PID=6839 Type=tcp receiver (tls:10.100.92.222:10443) child=12
Process::  ID=39 PID=6840 Type=tcp receiver (tls:10.100.92.222:10443) child=13
Process::  ID=40 PID=6841 Type=tcp receiver (tls:10.100.92.222:10443) child=14
Process::  ID=41 PID=6842 Type=tcp receiver (tls:10.100.92.222:10443) child=15
Process::  ID=42 PID=6843 Type=tcp receiver (tcp:10.100.92.222:10080) child=16
Process::  ID=43 PID=6844 Type=tcp receiver (tcp:10.100.92.222:10080) child=17
Process::  ID=44 PID=6845 Type=tcp receiver (tcp:10.100.92.222:10080) child=18
Process::  ID=45 PID=6846 Type=tcp receiver (tcp:10.100.92.222:10080) child=19
Process::  ID=46 PID=6847 Type=tcp receiver (tcp:10.100.92.222:10080) child=20
Process::  ID=47 PID=6848 Type=tcp receiver (tcp:10.100.92.222:10080) child=21
Process::  ID=48 PID=6849 Type=tcp receiver (tcp:10.100.92.222:10080) child=22
Process::  ID=49 PID=6850 Type=tcp receiver (tcp:10.100.92.222:10080) child=23

some settings in kamaiio.cfg:


- tcp_connection_lifetime=3605
- tcp_rd_buf_size=8192
- modparam("websocket", "keepalive_mechanism", 0)

# xhttp event route
event_route[xhttp:request] {

        set_reply_close();
        set_reply_no_connect();
...


```

* **Others**

```
/etc/sysctl.conf

net.ipv4.tcp_fin_timeout=30
net.ipv4.tcp_tw_reuse=1
net.ipv4.tcp_tw_recycle=0
net.ipv4.tcp_timestamps=0
net.ipv4.tcp_syn_retries=4
net.core.wmem_max=12582912
net.core.rmem_max=12582912
net.ipv4.tcp_rmem= 10240 87380 12582912
net.ipv4.tcp_wmem= 10240 87380 12582912
net.ipv4.tcp_window_scaling = 1
net.ipv4.tcp_timestamps = 1
net.ipv4.tcp_sack = 1
net.ipv4.tcp_no_metrics_save = 1
net.core.netdev_max_backlog = 5000

```


-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1419
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-dev/attachments/20180129/7d369ba0/attachment-0001.html>


More information about the sr-dev mailing list