[sr-dev] [kamailio/kamailio] Kamailio 5.2.2 - Segmentation fault in libcrypto.so.1.1 (#1860)

shaunjstokes notifications at github.com
Wed Apr 17 18:50:41 CEST 2019


Using systemd, 'service kamailio start'.

This is our Kamailio systemd config:

/lib/systemd/system/kamailio.service
```
[Unit]
Description=Kamailio (OpenSER) - the Open Source SIP Server
After=syslog.target network.target local-fs.target postgresql.service haveged.service freeswitch.service

[Service]
Type=forking
Environment='CFGFILE=/usr/local/kamailio/etc/kamailio/kamailio.cfg'
Environment='SHM_MEMORY=1024'
Environment='PKG_MEMORY=256'
Environment='USER=kamailio'
Environment='GROUP=kamailio'
Environment='RUN_KAMAILIO=yes'
Environment='LD_PRELOAD=/usr/local/kamailio/lib64/kamailio/openssl_mutex_shared/openssl_mutex_shared.so'
# PIDFile requires a full absolute path
PIDFile=/var/run/kamailio/kamailio.pid
# ExecStart requires a full absolute path
ExecStart=/usr/local/kamailio/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f $CFGFILE -m $SHM_MEMORY -M $PKG_MEMORY -u $USER -g $GROUP
TimeoutSec=120s
Restart=always
# /var/run/kamailio in tmpfs
RuntimeDirectory=kamailio
RuntimeDirectoryMode=0750
; exec
WorkingDirectory=/usr/local/kamailio/sbin
User=root
Group=daemon
LimitCORE=infinity
LimitNOFILE=100000
LimitNPROC=60000
LimitSTACK=250000
LimitRTPRIO=infinity
LimitRTTIME=7000000
IOSchedulingClass=realtime
IOSchedulingPriority=2
Nice=-10
CPUSchedulingPolicy=rr
CPUSchedulingPriority=1
UMask=0007

[Install]
WantedBy=multi-user.target
```

Here is the output of ```bt full``` in gdb for our most recent core dump file.
```
(gdb) bt full
#0  0x00007f46a414cd83 in EVP_CIPHER_flags (cipher=0x0) at crypto/evp/evp_lib.c:210
No locals.
#1  0x00007f46a4136028 in aesni_init_key (ctx=0x7f46587b4980, key=0x7f46587b4878 "\004\373z\264\326\301a\305\337߈M2\361\376aO\226\033\r7\203\071\020\313\060\203r\314\066\005=>\311\372\215\325,z\004y[\202\306\327\021'\337P\231\b\252", iv=0x0, enc=1) at crypto/evp/e_aes.c:273
        ret = 0
        mode = 128
        dat = 0x0
#2  0x00007f46a414b0d8 in EVP_CipherInit_ex (ctx=0x7f46587b4980, cipher=0x7f46a44b6460 <aesni_256_ecb>, impl=0x0,
    key=0x7f46587b4878 "\004\373z\264\326\301a\305\337߈M2\361\376aO\226\033\r7\203\071\020\313\060\203r\314\066\005=>\311\372\215\325,z\004y[\202\306\327\021'\337P\231\b\252", iv=0x0, enc=1) at crypto/evp/evp_enc.c:200
No locals.
#3  0x00007f46a418ddd3 in ctr_update (drbg=0x7f46587b47b0, in1=0x0, in1len=0, in2=0x0, in2len=0, nonce=0x0, noncelen=0) at crypto/rand/drbg_ctr.c:274
        ctr = 0x7f46587b4858
        outlen = 16
#4  0x00007f46a418e0d2 in drbg_ctr_generate (drbg=0x7f46587b47b0,
    out=0x7f465afaeb98 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>;tag=0b62483f5"..., outlen=0, adin=0x0, adinlen=0)
    at crypto/rand/drbg_ctr.c:349
        ctr = 0x7f46587b4858
#5  0x00007f46a418f591 in RAND_DRBG_generate (drbg=0x7f46587b47b0,
    out=0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.c"..., outlen=16,
    prediction_resistance=0, adin=0x0, adinlen=32) at crypto/rand/drbg_lib.c:638
        reseed_required = 0
#6  0x00007f46a418f6bf in RAND_DRBG_bytes (drbg=0x7f46587b47b0,
    out=0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.c"..., outlen=16)
    at crypto/rand/drbg_lib.c:679
        additional = 0x0
        additional_len = 32
        chunk = 16
        ret = 0
#7  0x00007f46a418fc38 in drbg_bytes (
    out=0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.c"..., count=16)
    at crypto/rand/drbg_lib.c:968
        ret = 0
        drbg = 0x7f46587b47b0
#8  0x00007f46a41911ab in RAND_bytes (
    buf=0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.c"..., num=16)
    at crypto/rand/rand_lib.c:836
        meth = 0x7f46a44d8920 <rand_meth>
#9  0x00007f46a450ebb5 in tls1_enc (s=0x7f465afa3b58, recs=0x7fff01bdf050, n_recs=1, sending=1) at ssl/record/ssl3_record.c:985
        ivlen = 16
        ds = 0x7f465a29d8c8
        reclen = {268435456, 139940143921712, 4324191904, 139940105930440, 140733222612640, 94261356491263, 94261357814483, 139940105930440, 268435456, 4294967302, 140733222612720, 94261356548576, 139941188525952, 1260989218478, 139941188533296, 139941188525956, 40, 139940105695232,
          140733222612768, 139940143921768, 140733222612768, 139941188239022, 139941381576288, 139941381576288, 139941381576304, 140733222615632, 140733222612832, 139941381162415, 140733222612848, 140733222612936, 490, 140733222615632}
        buf = {"\000\000\000\000\000\000\000z\027\003\003", <incomplete sequence \352>, "\177\000\000-\263#\376\070\335\303y4J", "H\263\252\036q6\266be\232\336", <incomplete sequence \364>, "\217\305F\022\322\375#\242\255\313jbZ", "\231\335J\243=\236\244\236\333A\321-\036",
          "\034$\222\250\301GB,Σ\270\255\003", "\021\303\000\000\000\000\000\000\000\000\000\000", "\000\001\000\000\000\060z\221ZF\177\000", "\000\060JXF\177\000\000\230H{XF", "\177\000\000\240\253JXF\177\000\000\000", "\000\020\032\001\000\000\240\253JXF\177",
          "\000\240\355\275\001\377\177\000\000d\227\253", <incomplete sequence \356>, "\272U\000\000\300z\221ZF\177\000\000", "0JXF\177\000\000\204\337ԘF\177", "\000\000\300\243JXF\177\000\000\240y\221", "Z\b\001\000\000\300\243JXF\177\000",
          "\340\355\275\001\377\177\000\000d\227\253", <incomplete sequence \356\272>, "U\000\000\200\001\000\000%\001\000\000[D", "\303\356\272U\000\000\204\337ԘF\177", "\000(\000\000\000\000\000\000\000\060z\221Z", "F\177\000\000\000\060JXF\177\000", <incomplete sequence \360>,
          "\355\217ZF\177\000\000\300z\221ZF\177", "\000\000\220z\221Z\004\000\000\000\360", <incomplete sequence \303>, "\356\272U\000\000\240\356\275\001\377\177\000", ")\234\253\356\272U\000\000\240\356\275\001\377", "\177\000\000ٜ\253\356\272U\000\000\001",
          "\000\000\000\000\000\000\001\000\000\000,\001", "\000\200\337ԘF\177\000\000\240y\221Z", "%\001\000\000\060\374ԘF\177\000\000\204", "\337ԘF\177\000\000(\000\000\000\000", "\000\000\000\060JXF\177\000\000\001\000", "\000\000\000\000\000\001\000\000\000\032\001\000"}
        i = 32767
        pad = 0
        ret = 32582
        tmpr = 1
        bs = 139941381576304
        mac_size = 0
        ctr = 0
        padnum = 139941381576288
        loop = 139941381576552
        padval = 0 '\000'
        imac_size = 43
        enc = 0x7f46a44d85c0 <aesni_128_cbc_hmac_sha1_cipher>
#10 0x00007f46a450a28f in do_ssl3_write (s=0x7f465afa3b58, type=23,
    buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>;tag=0b62483f5"..., pipelens=0x7fff01be0160, numpipes=1,
    create_empty_fragment=0, written=0x7fff01be0270) at ssl/record/rec_layer_s3.c:1003
        pkt = {{buf = 0x0, staticbuf = 0x7f465afaeb80 "", curr = 514, written = 514, maxsize = 16472, subs = 0x7f465a917a68}, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0, maxsize = 0, subs = 0x0} <repeats 19 times>, {buf = 0x0, staticbuf = 0x0, curr = 0, written = 0,
            maxsize = 0, subs = 0x7f465afaeb80}, {buf = 0x3d8, staticbuf = 0x3d8 <error: Cannot access memory at address 0x3d8>, curr = 16472, written = 0, maxsize = 812151909, subs = 0x7f46b52abbb8}, {buf = 0x7fff01be0230,
            staticbuf = 0x7f46b5c791da <_dl_runtime_resolve_xsave+138> "I\211", <incomplete sequence \356>, curr = 60359, written = 586, maxsize = 139941396355704, subs = 0x7f46a52129a0}, {buf = 0xebc7, staticbuf = 0x7fff01be0e40 "\371!", curr = 140733222620672, written = 828929125,
            maxsize = 549756338184, subs = 0x2}, {buf = 0x55baeebfa2d3, staticbuf = 0x40000000 <error: Cannot access memory at address 0x40000000>, curr = 268435456, written = 6, maxsize = 140733222616912, subs = 0x55baeeae5ddf <parse_from_uri+58>}, {buf = 0x0,
            staticbuf = 0x7f46a52129a0 "{", curr = 586, written = 139941396346608, maxsize = 586, subs = 0x2}, {buf = 0x7f46a537f758, staticbuf = 0x7fff01be0110 "\360\002\276\001\377\177", curr = 139941394269184, written = 139941394852256, maxsize = 140733222617072,
            subs = 0x7f469fe775bc <pv_get_xto_attr+5183>}, {buf = 0x12000, staticbuf = 0x1a52129a0 <error: Cannot access memory at address 0x1a52129a0>, curr = 139941396346608, written = 140733222617360, maxsize = 139941394269184, subs = 0x7f46a52129a0}, {buf = 0x7fff01bdffc0,
            staticbuf = 0x7f46a52129a0 "{", curr = 43, written = 140733222617520, maxsize = 139941396355704, subs = 0x7f46a51c84c2}, {buf = 0x7fff01be06c8, staticbuf = 0x7fff01be0700 "\353", <incomplete sequence \307>, curr = 0, written = 94261388500537, maxsize = 0,
            subs = 0x7f469e128bde}, {buf = 0x0, staticbuf = 0x7fff01be06c8 "", curr = 2001752693, written = 0, maxsize = 94261388500542, subs = 0x0}, {buf = 0xfffffffe, staticbuf = 0x7f4600000000 <error: Cannot access memory at address 0x7f4600000000>, curr = 48, written = 0,
            maxsize = 4294967295, subs = 0x55baf093de3e}}
        wr = {{rec_version = 771, type = 23, length = 506, orig_len = 0, off = 0,
            data = 0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.c"...,
            input = 0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.c"...,
            comp = 0x0, read = 0, epoch = 0, seq_num = "\000\000\000\000\000\000\000"}, {rec_version = 0, type = 0, length = 0, orig_len = 0, off = 0, data = 0x0, input = 0x0, comp = 0x0, read = 0, epoch = 0, seq_num = "\000\000\000\000\000\000\000"} <repeats 31 times>}
        thispkt = 0x7fff01bdfa50
        thiswr = 0x7fff01bdf050
        recordstart = 0x7f465afaeb88 "\200\273\211E\376\215P\257\020$\341\306\"\301\026dSIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.c"...
        i = 0
        mac_size = 0
        clear = 0
        prefix_len = 0
        eivlen = 16
        align = 3
        wb = 0x7f465afa43b0
        sess = 0x7f465afb4620
        totlen = 490
        len = 506
        wpinited = 1
        j = 1
#11 0x00007f46a45090ac in ssl3_write_bytes (s=0x7f465afa3b58, type=23, buf_=0x7f46a5382650, len=490, written=0x7fff01be03b0) at ssl/record/rec_layer_s3.c:613
        pipelens = {490, 140733222618944, 140733193388032, 94261356061472, 140733193388037, 139941664324654, 140733222617664, 140, 34359741800, 94257352278016, 140733193388075, 139941292790494, 140733222619208, 139941394547910, 139941394547906, 139941664138425, 0, 139938624438273,
          140733222618352, 94261388500539, 140733222617768, 206158430224, 140733222617808, 29230736, 0, 1158064281267208192, 5679437561345343536, 18446744073709551615, 12166682089369894912, 5736522341043666960, 139941394865048, 4239145472499881216}
        tmppipelen = 490
        remain = 0
        numpipes = 1
        j = 1
        buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>;tag=0b62483f5"...
        tot = 0
        n = 490
        max_send_fragment = 16384
        split_send_fragment = 16384
        maxpipes = 1
        nw = 139940105930440
        wb = 0x7f465afa43b0
        i = 0
        tmpwrit = 0
#12 0x00007f46a45178c0 in ssl3_write (s=0x7f465afa3b58, buf=0x7f46a5382650, len=490, written=0x7fff01be03b0) at ssl/s3_lib.c:4460
No locals.
#13 0x00007f46a45264db in ssl_write_internal (s=0x7f465afa3b58, buf=0x7f46a5382650, num=490, written=0x7fff01be03b0) at ssl/ssl_lib.c:1943
No locals.
#14 0x00007f46a4526538 in SSL_write (s=0x7f465afa3b58, buf=0x7f46a5382650, num=490) at ssl/ssl_lib.c:1957
        ret = 0
        written = 268435456
#15 0x00007f4698d2ea3d in tls_encode_f (c=0x7f465a9a30c8, pbuf=0x7fff01be0560, plen=0x7fff01be0558, rest_buf=0x7fff01be0568, rest_len=0x7fff01be055c, send_flags=0x7fff01be054c) at tls_server.c:828
        n = 0
        offs = 0
        ssl = 0x7f465afa3b58
        tls_c = 0x7f4659c6de40
        wr_buf = "\027\003\003\002\020SL\364\362e>3<*\234i\255n\025\320E95Q1\316\357M+a:\265<\371\304\357\366\244\251\201\016ɏ\236\064+\r\341\065\207\067\331d߃\235.\226\252\224\024\r\214^\022\317q!\374\242\216\\\364Y\345\232<\003fI^7\324\327A\237\263\r\300\352lGj\203\204\341\352\f\020x\267\366\216\250\221\241\213\270\026\217\255\352\331R\334%\211\267_\302%\310\352\226\363\337˴\345\263{\203\351cr\263ڧ\224J\200\355F@\216\220\322\\\253&\346{KP\263\266\025{n2\262U\342h\202\237[_\326W\364y\216\272\060\"\232\025\315;\311\356/Ur$\200\031\256)[J\024\025\257\222$\353\230\001\061|\256\236"...
        rd = {buf = 0x0, pos = 0, used = 0, size = 0}
        wr = {
          buf = 0x7f4698f6af60 <wr_buf> "\027\003\003\002\020SL\364\362e>3<*\234i\255n\025\320E95Q1\316\357M+a:\265<\371\304\357\366\244\251\201\016ɏ\236\064+\r\341\065\207\067\331d߃\235.\226\252\224\024\r\214^\022\317q!\374\242\216\\\364Y\345\232<\003fI^7\324\327A\237\263\r\300\352lGj\203\204\341\352\f\020x\267\366\216\250\221\241\213\270\026\217\255\352\331R\334%\211\267_\302%\310\352\226\363\337˴\345\263{\203\351cr\263ڧ\224J\200\355F@\216\220\322\\\253&\346{KP\263\266\025{n2\262U\342h\202\237[_\326W\364y\216\272\060\"\232\025\315;\311\356/Ur$\200\031\256)[J\024\025\257\222$\353\230\001"..., pos = 0, used = 0, size = 65536}
        ssl_error = 0
        err_src = 0x7f4698d59ca7 "TLS write:"
        buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>;tag=0b62483f5"...
        len = 490
        x = 1520054472
        __func__ = "tls_encode_f"
#16 0x000055baee8da1e4 in tcpconn_send_put (c=0x7f465a9a30c8,
    buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>;tag=0b62483f5"..., len=490, send_flags=...)
    at core/tcp_main.c:2530
        tmp = 0x7f465852d808
        fd = 10
        response = {140733222618528, 0}
        n = 4
        do_close_fd = 0
        rest_buf = 0x0
        t_buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>;tag=0b62483f5"...
        rest_len = 0
        t_len = 490
        resp = 0
        t_send_flags = {f = 0, blst_imask = 0}
        fd_cache_e = 0x0
        use_fd_cache = 0
        __func__ = "tcpconn_send_put"
#17 0x000055baee8d78d7 in tcp_send (dst=0x7f465b1b7848, from=0x0,
    buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>;tag=0b62483f5"..., len=490) at core/tcp_main.c:2310
        c = 0x7f465a9a30c8
        ip = {af = 2, len = 4, u = {addrl = {2988284242, 8709}, addr32 = {2988284242, 0, 8709, 0}, addr16 = {39250, 45597, 0, 0, 8709, 0, 0, 0}, addr = "R\231\035\262\000\000\000\000\005\"\000\000\000\000\000"}}
        port = 51179
        fd = 7
        response = {140733222618832, 140733222618840}
        n = 32582
        con_lifetime = 57680
        rest_buf = 0x7fff01be06c8 ""
        t_buf = 0x7fff01be06c4 ""
        rest_len = 32767
        t_len = 29230784
        resp = 140733222618812
        t_send_flags = {f = 0, blst_imask = 0}
        __func__ = "tcp_send"
#18 0x00007f46a080e586 in msg_send_buffer (dst=0x7f465b1b7848,
    buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>;tag=0b62483f5"..., len=490, flags=0) at ../../core/forward.h:282
        new_dst = {send_sock = 0x45a9175e8, to = {s = {sa_family = 13296, sa_data = "\303\356\272U\000\000\000\t\276\001\377\177\000"}, sin = {sin_family = 13296, sin_port = 61123, sin_addr = {s_addr = 21946}, sin_zero = "\000\t\276\001\377\177\000"}, sin6 = {sin6_family = 13296,
              sin6_port = 61123, sin6_flowinfo = 21946, sin6_addr = {__in6_u = {__u6_addr8 = "\000\t\276\001\377\177\000\000)\234\253\356\272U\000", __u6_addr16 = {2304, 446, 32767, 0, 39977, 61099, 21946, 0}, __u6_addr32 = {29231360, 32767, 4004224041, 21946}}},
              sin6_scope_id = 29231360}}, id = 32767, proto = -39 '\331', send_flags = {f = 61099, blst_imask = 21946}}
        outb = {s = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>;tag=0b62483f5"..., len = 490}
        netinfo = {data = {s = 0x7f46a086607b "tm: t_reply.c", len = 656}, rcv = 0x7f465a917320, dst = 0x7f46584a3000}
        evp = {data = 0x7fff01be0820, rcv = 0x0, dst = 0x7f465b1b7848}
        port = 1
        ip = {af = 268435456, len = 0, u = {addrl = {139940105741552, 1773850724352}, addr32 = {1481303280, 32582, 29231104, 413}, addr16 = {58608, 22602, 32582, 0, 2048, 446, 413, 0}, addr = "\360\344JXF\177\000\000\000\b\276\001\235\001\000"}}
        from = 0x0
        local_addr = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
                __u6_addr8 = "\000\000\000\000\000\000\000\000\030v\221ZF\177\000", __u6_addr16 = {0, 0, 0, 0, 30232, 23185, 32582, 0}, __u6_addr32 = {0, 0, 1519482392, 32582}}}, sin6_scope_id = 1481256960}}
        con = 0x0
        wsev = {type = 0, buf = 0x0, len = 0, id = 0}
        ret = 508
        __func__ = "msg_send_buffer"
#19 0x00007f46a0810944 in send_pr_buffer (rb=0x7f465b1b77f8, buf=0x7f46a5382650, len=490) at t_funcs.c:70
        __func__ = "send_pr_buffer"
#20 0x00007f46a07c1fa2 in _reply_light (trans=0x7f465b1b7728,
    buf=0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>;tag=0b62483f5"..., len=490, code=202,
    to_tag=0x7f46a0aa5580 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-455a", to_tag_len=37, lock=1, bm=0x7fff01be12c0) at t_reply.c:555
        rb = 0x7f465b1b77f8
        buf_len = 650
        cancel_data = {cancel_bitmap = 0, reason = {cause = 0, u = {text = {s = 0x0, len = 0}, e2e_cancel = 0x0, packed_hdrs = {s = 0x0, len = 0}}}}
        onsend_params = {req = 0x1be1220, rpl = 0xc00000000, param = 0x17, code = -290705697, flags = 3, branch = 0, t_rbuf = 0x7fff01be1240, dst = 0x7f465a9a349e, send_buf = {s = 0x0, len = 0}}
        rt = 0
        backup_rt = 0
        ctx = {rec_lev = -1523033760, run_flags = 32582, last_retcode = -1526226928, jmp_env = {{__jmpbuf = {94261357790928, 94261357771114, 496, 139941393178640, 140733222621628, 377957122049, 94257352278021, 139941393178640}, __mask_was_saved = 16, __saved_mask = {__val = {
                  139941396371752, 140733222621536, 2, 94261357814483, 1073741824, 268435456, 6, 140733222621824, 94261355300342, 140733222621888, 140733222621916, 139941394852256, 139941319868304, 140733222622176, 867612627416, 0}}}}}
        pmsg = {id = 0, pid = 0, tval = {tv_sec = 139941260598996, tv_usec = 139941396349872}, fwd_send_flags = {f = 30935, blst_imask = 15921}, rpl_send_flags = {f = 21946, blst_imask = 0}, first_line = {type = 2640, flags = 446, len = 32767, u = {request = {method = {
                  s = 0x7f46a53441f0 "sip:813 at 88.88.88.88:51179;transport=tls;registering_acc=mydomain_co_co", len = -1721491552}, uri = {s = 0x7f46a5346578 "\a", len = 268435456}, version = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 29233280},
                method_value = 29233104}, reply = {version = {s = 0x7f46a53441f0 "sip:813 at 88.88.88.88:51179;transport=tls;registering_acc=mydomain_co_co", len = -1721491552}, status = {s = 0x7f46a5346578 "\a", len = 268435456}, reason = {
                  s = 0x1 <error: Cannot access memory at address 0x1>, len = 29233280}, statuscode = 29233104}}}, via1 = 0x7fff01be0fc0, via2 = 0x7f46a47c031b, headers = 0x7fff01be1138, last_header = 0x0, parsed_flag = 139941384028963,
          h_via1 = 0x7f46b52e24b9 <_IO_vfprintf_internal+1929>, h_via2 = 0x5, callid = 0x7f46b52e1e36 <_IO_vfprintf_internal+262>, to = 0x7fff01be1000, cseq = 0x7f46a47c017f, from = 0x7fff01be0b28, contact = 0x0, maxforwards = 0x7fff01be0b50, route = 0xb52e24b9, record_route = 0x0,
          content_type = 0x0, content_length = 0x7fff00000000, authorization = 0xffffffffffffffff, expires = 0x7fff00000005, proxy_auth = 0x7f467fffffff, supported = 0x7f46a47c0200, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x7fff01be0ba0, event = 0x0,
          accept = 0xd68, accept_language = 0x7f4600000005, organization = 0x7f46a47c031b, priority = 0x3, subject = 0x7f46a47c0341, user_agent = 0x7f46a47c0324, server = 0x7fff01be0be0, content_disposition = 0x7f46a47c0341, diversion = 0x7fff01be0be8, rpid = 0x55ba00000006,
          refer_to = 0x7f46a47c0320, session_expires = 0x3, min_se = 0x0, sipifmatch = 0x3000000018, subscription_state = 0x7fff01be1210, date = 0x7fff01be1150, identity = 0x7fff01be1220, identity_info = 0x7fff01be1160, pai = 0x7f46a47c0900, ppi = 0x0, path = 0x0,
          privacy = 0x3000000000, min_expires = 0x7fff01be0c60, body = 0x0, eoh = 0xd68 <error: Cannot access memory at address 0xd68>, unparsed = 0xd <error: Cannot access memory at address 0xd>, rcv = {src_ip = {af = 3432, len = 0, u = {addrl = {0, 139941384030571}, addr32 = {0, 0,
                  2759592299, 32582}, addr16 = {0, 0, 0, 0, 2411, 42108, 32582, 0}, addr = "\000\000\000\000\000\000\000\000k\t|\244F\177\000"}}, dst_ip = {af = 2759592292, len = 0, u = {addrl = {932276338688, 139941384030571}, addr32 = {268435456, 217, 2759592299, 32582}, addr16 = {
                  0, 4096, 217, 0, 2411, 42108, 32582, 0}, addr = "\000\000\000\020\331\000\000\000k\t|\244F\177\000"}}, src_port = 3280, dst_port = 446, proto_reserved1 = 32767, proto_reserved2 = -290733184, src_su = {s = {sa_family = 21946,
                sa_data = "\000\000`\t|\244F\177\000\000\260\021\276\001"}, sin = {sin_family = 21946, sin_port = 0, sin_addr = {s_addr = 2759592288}, sin_zero = "F\177\000\000\260\021\276\001"}, sin6 = {sin6_family = 21946, sin6_port = 0, sin6_flowinfo = 2759592288, sin6_addr = {
                  __in6_u = {__u6_addr8 = "F\177\000\000\260\021\276\001\003\000\000\000\300\001\062\240", __u6_addr16 = {32582, 0, 4528, 446, 3, 0, 448, 41010}, __u6_addr32 = {32582, 29233584, 3, 2687631808}}}, sin6_scope_id = 32582}}, bind_address = 0x3000000018,
            proto = -48 '\320'}, buf = 0x3000000018 <error: Cannot access memory at address 0x3000000018>, len = 29233888, new_uri = {s = 0x7fff01be1220 "\200\022\276\001\377\377\377\377", len = 0}, dst_uri = {s = 0x0, len = -1523036784}, parsed_uri_ok = -1523314032, parsed_uri = {
            user = {s = 0xffffffff01be0cd0 <error: Cannot access memory at address 0xffffffff01be0cd0>, len = 0}, passwd = {s = 0x0, len = -1526226928}, host = {s = 0x6c8 <error: Cannot access memory at address 0x6c8>, len = -1524738624}, port = {
              s = 0x7f465a9a357a "Agent: Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 1482316848}, params = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, sip_params = {
              s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 1495842912}, headers = {s = 0x7fff01be1610 "K4\232ZF\177", len = -1607376670}, port_no = 25459, proto = 28271, type = 778529126, flags = (unknown: 2770413984), transport = {s = 0x0,
              len = -1523103368}, ttl = {s = 0xc800000000 <error: Cannot access memory at address 0xc800000000>, len = 2}, user_param = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, maddr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, method = {
              s = 0x7fff01be0e10 "", len = -293270045}, lr = {s = 0x286f5d4134421c88 <error: Cannot access memory at address 0x286f5d4134421c88>, len = 945953928}, r2 = {s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = -1526226928}, gr = {
              s = 0x7fff01be0dc0 "\200\225!\245F\177", len = -1589576708}, transport_val = {s = 0x7f46a5380f88 "\240\001", len = -1524553312}, ttl_val = {s = 0x7f46a5153018 "Q", len = 29232704}, user_param_val = {s = 0x7f46b5e8ef30 "", len = -1255543408}, maddr_val = {
              s = 0x7f46b52ac038 "", len = -1245263117}, method_val = {s = 0x754 <error: Cannot access memory at address 0x754>, len = 0}, lr_val = {s = 0x7f46a5219580 "", len = -290705697}, r2_val = {s = 0x7fff01be0e10 "", len = -1526226928}, gr_val = {s = 0x55baee80c461 "syscall",
              len = -1526226928}}, parsed_orig_ruri_ok = 29232720, parsed_orig_ruri = {user = {s = 0x7f46a140fbfc <pkg_proc_update_stats+115> "H\213\rEW ", len = 268435456}, passwd = {s = 0x0, len = 268435456}, host = {s = 0xfc59220 <error: Cannot access memory at address 0xfc59220>,
              len = 2377992}, port = {s = 0x3a6de0 <error: Cannot access memory at address 0x3a6de0>, len = 3830720}, params = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 8697}, sip_params = {s = 0x7f46a507a010 "\001", len = 29232768}, headers = {
              s = 0x55baee913e90 <sr_event_exec+482> "\211E\374\213E\374\351A\002", len = 0}, port_no = 13296, proto = 61123, type = URN_URI_T, flags = (unknown: 29232944), transport = {s = 0xeeab9c29 <error: Cannot access memory at address 0xeeab9c29>, len = 29232944}, ttl = {
              s = 0x55baeeaba08d <qm_malloc+2331> "H\213E\270H\203\300\070\351*\003", len = 29232944}, user_param = {s = 0x55baeebfa2d3 "INFO", len = -1535365032}, maddr = {s = 0x9110000000 <error: Cannot access memory at address 0x9110000000>, len = -1535356792}, method = {
              s = 0x7f46a47c3f6c "core: db_val.c", len = 8}, lr = {s = 0x7f46a507a010 "\001", len = -1523317048}, r2 = {s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = -258744391}, gr = {s = 0x7f46a53749b0 "\b", len = 29232976}, transport_val = {
              s = 0x7f46a507a010 "\001", len = 4}, ttl_val = {s = 0x7fff01be15b0 "", len = -289430829}, user_param_val = {s = 0x7f46a47c3058 "core", len = 268435456}, maddr_val = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 29233168}, method_val = {
              s = 0x7f46a47b94ce <db_str2val+14063> "H\213\205P\377\377\377H\213P\020\213\205X\377\377\377H\230H\001\320", <incomplete sequence \306>, len = 8698}, lr_val = {s = 0x7f46a507a010 "\001", len = 29233024}, r2_val = {s = 0x55baf093dfba "", len = -1523317032}, gr_val = {
              s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 29233200}}, add_rm = 0x55baeeac2edf <qm_info+46>, body_lumps = 0x7fff01be0fc0, reply_lump = 0x55baeeac2edf <qm_info+46>,
          add_to_branch_s = "\320\017\276\001\377\177\000\000\020\240\a\245F\177\000\000\000\020\276\001\377\177\000\000\020\240\a\245F\177\000\000\020\020\276\001\377\177\000\000\374\373@\241F\177\000\000\000\000\000\020\000\000\000\000\000", add_to_branch_len = 0,
          hash_index = 268435456, msg_flags = 0, flags = 4004261599, xflags = {21946, 29233184}, set_global_address = {s = 0x7f46a507a010 "\001", len = 3830720}, set_global_port = {s = 0x7f46a507a010 "\001", len = 29233248},
          force_send_socket = 0x7f46a140fbfc <pkg_proc_update_stats+115>, path_vec = {s = 0x7fff01be1040 "\300s:", len = 0}, instance = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 264604840}, reg_id = 2379392, ruid = {
            s = 0x3a7358 <error: Cannot access memory at address 0x3a7358>, len = 3830720}, location_ua = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 8701}, ldv = {flow = {decoded = 3830720, rcv = {src_ip = {af = 29233296, len = 32767, u = {addrl = {94261354774160,
                      0}, addr32 = {4002496144, 21946, 0, 0}, addr16 = {16016, 61073, 21946, 0, 0, 0, 0, 0}, addr = "\220>\221\356\272U\000\000\000\000\000\000\000\000\000"}}, dst_ip = {af = 2768740656, len = 5, u = {addrl = {8858370048, 2771939544}, addr32 = {268435456, 2,
                      2771939544, 0}, addr16 = {0, 4096, 2, 0, 28888, 42296, 0, 0}, addr = "\000\000\000\020\002\000\000\000\330p8\245\000\000\000"}}, src_port = 4448, dst_port = 446, proto_reserved1 = 32767, proto_reserved2 = -290733184, src_su = {s = {sa_family = 21946,
                    sa_data = "\000\000`\021\276\001\377\177\000\000)\234\253", <incomplete sequence \356>}, sin = {sin_family = 21946, sin_port = 0, sin_addr = {s_addr = 29233504}, sin_zero = "\377\177\000\000)\234\253", <incomplete sequence \356>}, sin6 = {sin6_family = 21946,
                    sin6_port = 0, sin6_flowinfo = 29233504, sin6_addr = {__in6_u = {__u6_addr8 = "\377\177\000\000)\234\253\356\000\000\000\000\200\361\276", <incomplete sequence \356>, __u6_addr16 = {32767, 0, 39977, 61099, 0, 0, 61824, 61118}, __u6_addr32 = {32767, 4004224041, 0,
                          4005491072}}}, sin6_scope_id = 21946}}, bind_address = 0xa35eeaba08d, proto = -48 '\320'}}}}
        __func__ = "_reply_light"
#21 0x00007f46a07c2c18 in _reply (trans=0x7f465b1b7728, p_msg=0x7f46a52129a0, code=202, reason=0x7fff01be13e0, lock=1) at t_reply.c:657
        len = 490
        buf = 0x7f46a5382650 "SIP/2.0 202 OK\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>;tag=0b62483f5"...
        dset = 0x6 <error: Cannot access memory at address 0x6>
        bm = {to_tag_val = {s = 0x7f46a538270f "0b62483f5ecbb3b7846ec4ead5977a30-455a\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346;rport=51179;received=88.88.88.88\r\nExpires: 3600\r\nContact: <sip:77.7"..., len = 37}}
        dset_len = 1
#22 0x00007f46a07cce31 in t_reply_str (t=0x7f465b1b7728, p_msg=0x7f46a52129a0, code=202, reason=0x7fff01be13e0) at t_reply.c:1634
No locals.
#23 0x00007f46a0832825 in ki_t_reply (msg=0x7f46a52129a0, code=202, reason=0x7fff01be13e0) at tm.c:1354
        t = 0x7f465b1b7728
        ret = -1
        __func__ = "ki_t_reply"
#24 0x00007f46a0833027 in w_t_reply_wrp (msg=0x7f46a52129a0, code=202, txt=0x7f46a53749e8 "OK") at tm.c:1411
        reason = {s = 0x7f46a53749e8 "OK", len = 2}
#25 0x00007f46a031a9f3 in send_reply (msg=0x7f46a52129a0, code=202, reason=0x7f469d416460 <su_200_rpl>) at sl.c:287
        r = 0x7f46a53749e8 "OK"
        t = 0x7f465b1b7728
        ret = 1
        __func__ = "send_reply"
#26 0x00007f469d1c7b30 in send_2XX_reply (msg=0x7f46a52129a0, reply_code=202, lexpire=3600, local_contact=0x7fff01be18e0) at subscribe.c:122
        hdr_append = {s = 0x7f46a5341290 "Expires: 3600\r\nContact: <sip:77.77.77.77:5071;transport=tls>\r\n", len = 65}
        tmp = {s = 0x7f46a53412ce ">\r\n", len = 4}
        t = 0x7f46a53412c0 ";transport=tls>\r\n"
        __func__ = "send_2XX_reply"
#27 0x00007f469d1cf2fb in update_subscription (msg=0x7f46a52129a0, subs=0x7fff01be1800, to_tag_gen=1, sent_reply=0x7fff01be163c) at subscribe.c:659
        hash_code = 2864
        __func__ = "update_subscription"
#28 0x00007f469d1d6d41 in handle_subscribe (msg=0x7f46a52129a0, watcher_user=..., watcher_domain=...) at subscribe.c:1207
        to_tag_gen = 1
        subs = {pres_uri = {s = 0x7f46a51e0aa0 "sip:87 at mydomain.co.co", len = 32}, to_user = {
            s = 0x7f465a9a3481 "87 at mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813 at 192.168.128.58:1195;transport=tls;"..., len = 2}, to_domain = {
            s = 0x7f465a9a3484 "mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813 at 192.168.128.58:1195;transport=tls;reg"..., len = 25}, from_user = {
            s = 0x7f465a9a344b "813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nCont"..., len = 3}, from_domain = {
            s = 0x7f465a9a344f "mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact:"..., len = 25}, watcher_user = {
            s = 0x7f465a9a344b "813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nCont"..., len = 3}, watcher_domain = {
            s = 0x7f465a9a344f "mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact:"..., len = 25}, event = 0x7f46587d2810,
          event_id = {s = 0x0, len = 0}, to_tag = {s = 0x7f46a0aa5580 <tm_tags> "0b62483f5ecbb3b7846ec4ead5977a30-455a", len = 37}, from_tag = {
            s = 0x7f465a9a346e "fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813 at 192.168.128.58:"..., len = 8}, callid = {
            s = 0x7f465a9a33fd "18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;"..., len = 40}, sockinfo_str = {
            s = 0x7f46a52066f0 "tls:77.77.77.77:5071", len = 23}, remote_cseq = 1, local_cseq = 0, contact = {s = 0x7f46a53441f0 "sip:813 at 88.88.88.88:51179;transport=tls;registering_acc=mydomain_co_co", len = 83}, local_contact = {
            s = 0x7f46a51e55f8 "sip:77.77.77.77:5071;transport=tls", len = 37}, record_route = {s = 0x0, len = 0}, expires = 3600, status = 1, reason = {s = 0x0, len = 0}, version = 0, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1, internal_update_flag = 0,
          updated = -1, updated_winfo = -1, flags = 0, user_agent = {s = 0x7f465a9a3581 "Jitsi2.10.5550Windows XP\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 24}, next = 0x0}
        event = 0x7f46587d2810
        parsed_event = 0x7f46a53802c8
        ev_param = 0x0
        found = 1
        reason = {s = 0x0, len = 0}
        uri = {user = {s = 0x490 <error: Cannot access memory at address 0x490>, len = 46}, passwd = {s = 0x7fff01be16a0 "", len = 2}, host = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, port = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, params = {
            s = 0x7fff01be1700 "\360ݓ\360\272U", len = -290562593}, sip_params = {s = 0x7fff01be16e0 "8\367\067\245F\177", len = -1524553312}, headers = {s = 0x7fff01be17a0 "", len = -1523058960}, port_no = 11150, proto = 12410, type = 3590688514, flags = (unknown: 3884946688),
          transport = {s = 0x7f46a537f738 "K4\232ZF\177", len = 29235168}, ttl = {s = 0x0, len = -1525753168}, user_param = {s = 0x55baf093ddf0 "\270Kc\265F\177", len = 0}, maddr = {s = 0x7f46a50edab3 "", len = -1642817343}, method = {s = 0x0, len = 29235392}, lr = {
            s = 0xffffffffa51c6828 <error: Cannot access memory at address 0xffffffffa51c6828>, len = 0}, r2 = {
            s = 0x7f465a9a3400 "1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at mydomain.co.co>\r\nVia: SIP/2.0/TLS 192.168.128.58:1195;bra"..., len = 0}, gr = {
            s = 0x7f46a50edab0 "813", len = 0}, transport_val = {s = 0x0, len = -1525753168}, ttl_val = {s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x7f46a50edaaf "", len = 0}, method_val = {
            s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x4600000000 <error: Cannot access memory at address 0x4600000000>, len = -1524553312}, gr_val = {
            s = 0x7f465a9a33ca "sip:87 at mydomain.co.co SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at my.domain"..., len = 32}}
        reply_code = 500
        reply_str = {s = 0x7f469d209fcd "Server Internal Error", len = 21}
        sent_reply = 0
        __func__ = "handle_subscribe"
#29 0x00007f469d1d2e4e in handle_subscribe0 (msg=0x7f46a52129a0) at subscribe.c:988
        pfrom = 0x7f46a537f6f0
        __func__ = "handle_subscribe0"
#30 0x000055baee84384a in do_action (h=0x7fff01be2170, a=0x7f46a51cd3e0, msg=0x7f46a52129a0) at core/action.c:1067
        ret = -5
        v = -289430829
        dst = {send_sock = 0x7fff01be1ed0, to = {s = {sa_family = 64508, sa_data = "@\241F\177\000\000\270u\032\245F\177\000"}, sin = {sin_family = 64508, sin_port = 41280, sin_addr = {s_addr = 32582}, sin_zero = "\270u\032\245F\177\000"}, sin6 = {sin6_family = 64508,
              sin6_port = 41280, sin6_flowinfo = 32582, sin6_addr = {__in6_u = {__u6_addr8 = "\270u\032\245F\177\000\000\330c\032\245F\177\000", __u6_addr16 = {30136, 42266, 32582, 0, 25560, 42266, 32582, 0}, __u6_addr32 = {2769974712, 32582, 2769970136, 32582}}},
              sin6_scope_id = 2770413984}}, id = 32582, proto = 96 '`', send_flags = {f = 446, blst_imask = 32767}}
        tmp = 0x7fff01be3a60 "\003"
        new_uri = 0x7f46a51bbf70 "\032"
        end = 0x7f46a52129a0 "{"
        crt = 0x7f46a51bbf70 "\032"
        cmd = 0x7f46a51357a8
        len = 32582
        user = -1524553312
        uri = {user = {s = 0x7fff01be2280 "\230\310\034\245F\177", len = -1626615074}, passwd = {s = 0x7fff01be2388 "x%\276\001\377\177", len = 0}, host = {s = 0x69 <error: Cannot access memory at address 0x69>, len = -1255267143}, port = {
            s = 0x7f46a50e5910 "18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0813@mydomain.co.co88.88.88.88::bantime", len = 91}, params = {s = 0x7f46a519ab28 "\001", len = -1524553312}, sip_params = {s = 0x7fff01be1de8 "\350\322\v\237F\177", len = 16}, headers = {
            s = 0x7fff01be1e10 "\347\322\v\237F\177", len = 29237712}, port_no = 0, proto = 0, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x55ba00000000 <error: Cannot access memory at address 0x55ba00000000>, len = -1}, ttl = {s = 0x0, len = 16}, user_param = {
            s = 0x7f46a5215b98 "18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0|handling SUBSCRIBE from user [sip:813 at mydomain.co.co]", len = 0}, maddr = {s = 0x7f4600000000 <error: Cannot access memory at address 0x7f4600000000>, len = 105}, method = {
            s = 0x7fff01be1e60 "\300\037\032\245F\177", len = 0}, lr = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 121}, r2 = {s = 0x7f469f0bd2de "%s: %s%.*s", len = 3}, gr = {s = 0x1800000000 <error: Cannot access memory at address 0x1800000000>,
            len = -1626615064}, transport_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, ttl_val = {s = 0x7f46a512d6c0 "\264\356z\237F\177", len = -1524992576}, user_param_val = {s = 0x7f469f0bd2e7 "s", len = 0}, maddr_val = {s = 0x7fff01be1ec0 "\360\036\276\001\377\177",
            len = 16}, method_val = {s = 0x7fff01be2460 "Ӣ\277\356\272U", len = 29238176}, lr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2_val = {s = 0x7fff01be1ef0 "\340$\276\001\377\177", len = -291901200}, gr_val = {
            s = 0x7f46a51a1fc0 "?", len = 29244000}}
        next_hop = {user = {s = 0x7fff01be1bb0 "\340\033\276\001\377\177", len = 29236496}, passwd = {s = 0x14aef82fb <error: Cannot access memory at address 0x14aef82fb>, len = 1494091032}, host = {s = 0x7fff01be1bc0 "\340\033\276\001\377\177", len = -1728474616}, port = {
            s = 0x7f465b1ba0c0 "\373\202\357J\244", len = 1494091032}, params = {s = 0x7fff01be1be0 "\220\034\276\001\377\177", len = 2}, sip_params = {s = 0x7fff01be1be0 "\220\034\276\001\377\177", len = -1728469356}, headers = {
            s = 0x2fb10000000 <error: Cannot access memory at address 0x2fb10000000>, len = 1481492824}, port_no = 7312, proto = 446, type = 32767, flags = (URI_USER_NORMALIZE | unknown: 2566518280), transport = {s = 0x7f46a5341e80 "\375\063\232ZF\177", len = 1}, ttl = {
            s = 0x7fff01be1d10 "i", len = -258744848}, user_param = {s = 0x7fff01be21a0 "", len = -1254103147}, maddr = {s = 0x7fff01be21b8 "\210\034b87\203\344|", len = 0}, method = {s = 0x7f46b53fe798 "]", len = -1255267143}, lr = {
            s = 0x4aef82fb000002fb <error: Cannot access memory at address 0x4aef82fb000002fb>, len = 1555492741}, r2 = {s = 0x7fff01be2168 "`:\276\001\377\177", len = 42728}, gr = {s = 0x7fff01be1d08 "", len = 10}, transport_val = {s = 0x7fff01be2163 "\245F\177", len = 1073741924},
          ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = -1}, maddr_val = {s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = 0}, method_val = {
            s = 0x7fff00000000 <error: Cannot access memory at address 0x7fff00000000>, len = 1481492768}, lr_val = {s = 0x7fff00000005 <error: Cannot access memory at address 0x7fff00000005>, len = -1255080914}, r2_val = {s = 0x7fff01be1d80 "", len = 105}, gr_val = {
            s = 0xd68 <error: Cannot access memory at address 0xd68>, len = -258744848}}
        u = 0x7fff01be2040
        port = 0
        dst_host = 0x2
        i = -293268297
        flags = 32582
        avp = 0x7fff01be2110
        st = {flags = 164, id = 0, name = {n = 1481256960, s = {s = 0x7f46584a3000 "", len = 1}, re = 0x7f46584a3000}, avp = 0x7f465b1ba0c0}
        sct = 0x10000000
        sjt = 0x40000000
        rve = 0x10000000
        mct = 0x55baeebfa2d3
        rv = 0x7f4698fcb4dc
        rv1 = 0x6
        c1 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 6, s = {s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = 29236064}, re = 0x100000006}, pval = {rs = {s = 0x100000006 <error: Cannot access memory at address 0x100000006>,
                len = 29236064}, ri = -290696736, flags = 21946}}, i2s = "0\262\374\230F\177\000\000\031g1\265\272\000\000\000\370\342\374\230F\177"}
        s = {s = 0x55baeebfa2d3 "INFO", len = 1481492168}
        srevp = {0x7fff01be1b10, 0x55baeeab71ff <futex_release+29>}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#31 0x000055baee850de3 in run_actions (h=0x7fff01be2170, a=0x7f46a51cd3e0, msg=0x7f46a52129a0) at core/action.c:1569
        t = 0x7f46a51cd3e0
        ret = -1
        tvb = {tv_sec = 94261361422004, tv_usec = 1481492824}
        tve = {tv_sec = 54086552396016, tv_usec = 6861465236}
        tz = {tz_minuteswest = -290647711, tz_dsttime = 21946}
        tdiff = 2771908408
        __func__ = "run_actions"
#32 0x000055baee8514b7 in run_actions_safe (h=0x7fff01be3a60, a=0x7f46a51cd3e0, msg=0x7f46a52129a0) at core/action.c:1633
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {2, 2913650019544472712, 94261357814483, 1073741824, 268435456, 6, 2913650019508821128, 8999462228585487496}, __mask_was_saved = 0, __saved_mask = {__val = {1073741824, 268435456, 6, 140733222625856,
                  94261356683560, 268435456, 139941394852256, 140733222626112, 139941396346608, 1, 2, 139941396346680, 140733222626320, 139941394534488, 139941394852256, 140733222626016}}}}}
        ret = -1
        ign_on_break = 0
#33 0x000055baeea8c044 in rval_get_int (h=0x7fff01be3a60, msg=0x7f46a52129a0, i=0x7fff01be2578, rv=0x7f46a51cc898, cache=0x0) at core/rvalue.c:915
        r_avp = 0x7fff01be2410
        avp_val = {n = 268435456, s = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, re = 0x10000000}
        pval = {rs = {s = 0x55baf093e040 "<134>Apr 17 10:19:01 /usr/local/kamailio/sbin/kamailio[42728]: INFO: <script>: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0|handling SUBSCRIBE from user [sip:813 at mydomain.co.co]", len = 2}, ri = -289430829, flags = 21946}
        tmp = {s = 0x9e56465f0000465f <error: Cannot access memory at address 0x9e56465f0000465f>, len = -1523058888}
        s = 0x0
        r = 21
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#34 0x000055baeea909b5 in rval_expr_eval_int (h=0x7fff01be3a60, msg=0x7f46a52129a0, res=0x7fff01be2578, rve=0x7f46a51cc890) at core/rvalue.c:1913
        i1 = 29239792
        i2 = 4
        ret = -1
        c1 = {cache_type = 2770413984, val_type = 32582, c = {avp_val = {n = 29244000, s = {s = 0x7fff01be3a60 "\003", len = -289430829}, re = 0x7fff01be3a60}, pval = {rs = {s = 0x7fff01be3a60 "\003", len = -289430829}, ri = 1073741824, flags = 0}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 29238288, s = {s = 0x7fff01be2410 "", len = 29238352}, re = 0x7fff01be2410}, pval = {rs = {s = 0x7fff01be2410 "", len = 29238352}, ri = -290912104, flags = 21946}},
          i2s = "\240)!\245F\177\000\000\000\000\000\000\000\000\000\000\070P\034\245F\177"}
        rv1 = 0x55baee9febed <pv_value_destroy+175>
        rv2 = 0x55baeebfa2d3
        __func__ = "rval_expr_eval_int"
#35 0x000055baeea90e25 in rval_expr_eval_int (h=0x7fff01be3a60, msg=0x7f46a52129a0, res=0x7fff01be29f0, rve=0x7f46a51cd788) at core/rvalue.c:1921
        i1 = 0
        i2 = 0
        ret = -1
        c1 = {cache_type = 2769969568, val_type = 32582, c = {avp_val = {n = 29244000, s = {s = 0x7fff01be3a60 "\003", len = 8715}, re = 0x7fff01be3a60}, pval = {rs = {s = 0x7fff01be3a60 "\003", len = 8715}, ri = -1526226928, flags = 32582}},
          i2s = "\320[\033\245F\177\000\000\002", '\000' <repeats 12 times>}
        c2 = {cache_type = 29238672, val_type = 32767, c = {avp_val = {n = -1626642069, s = {s = 0x7f469f0b696b <xlog_2_helper+990> "H\215e\330[A\\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271", len = -289430829},
              re = 0x7f469f0b696b <xlog_2_helper+990>}, pval = {rs = {s = 0x7f469f0b696b <xlog_2_helper+990> "H\215e\330[A\\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271", len = -289430829}, ri = 0, flags = 0}},
          i2s = "\377\377\377\377\000\000\000\000\070\204\067\245F\177\000\000\320[\033\245F\177"}
        rv1 = 0x6
        rv2 = 0x10000000
        __func__ = "rval_expr_eval_int"
#36 0x000055baee8432e7 in do_action (h=0x7fff01be3a60, a=0x7f46a51cebb0, msg=0x7f46a52129a0) at core/action.c:1043
        ret = -5
        v = 0
        dst = {send_sock = 0x286f5d417d421c88, to = {s = {sa_family = 7304, sa_data = "b87\203\344|\000\000\000\000\000\000\000"}, sin = {sin_family = 7304, sin_port = 14434, sin_addr = {s_addr = 2095350583}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 7304,
              sin6_port = 14434, sin6_flowinfo = 2095350583, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 4005755768}}, id = 21946, proto = 2 '\002', send_flags = {f = 0,
            blst_imask = 0}}
        tmp = 0x1 <error: Cannot access memory at address 0x1>
        new_uri = 0x55baeebfa2d3 "INFO"
        end = 0x2 <error: Cannot access memory at address 0x2>
        crt = 0x7f4600000000 <error: Cannot access memory at address 0x7f4600000000>
        cmd = 0x7f46a512f938
        len = 32582
        user = 0
        uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7fff01be2950 "`*\276\001\377\177", len = -293270045}, params = {
            s = 0x286f5d4162c21c88 <error: Cannot access memory at address 0x286f5d4162c21c88>, len = 945953928}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x7fff01be28e0 "P)\276\001\377\177", len = 2}, port_no = 41683, proto = 61119, type = 21946, flags = (unknown: 2770413984),
          transport = {s = 0x7f46a51ba900 "\026", len = 29239680}, ttl = {s = 0x7fff01be2a10 "P+\276\001\377\177", len = -290911819}, user_param = {s = 0x7fff01be2950 "`*\276\001\377\177", len = -291517360}, maddr = {
            s = 0x1900000004 <error: Cannot access memory at address 0x1900000004>, len = 0}, method = {s = 0x7f46a5217b80 "", len = -1524553312}, lr = {s = 0x1a51f40c0 <error: Cannot access memory at address 0x1a51f40c0>, len = 0}, r2 = {s = 0x7f46a52129a0 "{", len = 2}, gr = {
            s = 0x55baeebfa2d3 "INFO", len = 1073741824}, transport_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7fff01be2a60 "P+\276\001\377\177", len = -293268297}, user_param_val = {s = 0x7f46a52129a0 "{", len = -1524553312},
          maddr_val = {s = 0x7f46a51ba900 "\026", len = 29244000}, method_val = {s = 0x0, len = 1}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 2128747656}, r2_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, gr_val = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}}
        next_hop = {user = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, passwd = {s = 0x7fff01be27e0 "\320(\276\001\377\177", len = -293268297}, host = {s = 0x7fff01bdf678 "", len = -1524553312}, port = {s = 0x7f46a51f3e88 "\004", len = 29244000},
          params = {s = 0x0, len = -1}, sip_params = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1642208392}, headers = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, port_no = 0, proto = 4096, type = ERROR_URI_T, flags = (URI_SIP_USER_PHONE | unknown: 4),
          transport = {s = 0x286f5d4160421c88 <error: Cannot access memory at address 0x286f5d4160421c88>, len = 945953928}, ttl = {s = 0x7f46a512e4b0 "\030\213U\237F\177", len = 25}, user_param = {s = 0x18 <error: Cannot access memory at address 0x18>, len = 0}, maddr = {
            s = 0x7fff01be28c0 "", len = -1524553312}, method = {s = 0x7f46a5194360 ".", len = 29239360}, lr = {s = 0x18 <error: Cannot access memory at address 0x18>, len = -258927888}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7fff01be28c0 "", len = -1254730963}, transport_val = {
            s = 0x2701be28c0 <error: Cannot access memory at address 0x2701be28c0>, len = -1609780480}, ttl_val = {s = 0xffffffffa5212ba8 <error: Cannot access memory at address 0xffffffffa5212ba8>, len = -1}, user_param_val = {s = 0x7fff01be28d0 "\020*\276\001\377\177",
            len = -290930620}, maddr_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 0}, lr_val = {s = 0x7f46a51f40c8 "\004", len = 29240072}, r2_val = {s = 0x7f46a52129a0 "{",
            len = 29244000}, gr_val = {s = 0x7f46a5194360 ".", len = 29244000}}
        u = 0x7f4600000000
        port = 0
        dst_host = 0x2
        i = -290911819
        flags = 0
        avp = 0x7fff01be2c90
        st = {flags = 268435456, id = 65535, name = {n = 0, s = {s = 0x0, len = 29238992}, re = 0x0}, avp = 0x2}
        sct = 0x7f46a5164e58
        sjt = 0x6
        rve = 0x7f46a51cd788
        mct = 0x10000000
        rv = 0x40000000
        rv1 = 0x6
        c1 = {cache_type = 29239904, val_type = 32767, c = {avp_val = {n = 29240320, s = {s = 0x7fff01be2c00 "\300\273\033\245F\177", len = -1524738568}, re = 0x7fff01be2c00}, pval = {rs = {s = 0x7fff01be2c00 "\300\273\033\245F\177", len = -1524738568}, ri = 29239888, flags = 944}},
          i2s = "\240)!\245F\177\000\000\002\000\000\000\000\000\000\000Ӣ\277\356\272U"}
        s = {s = 0x7f46a51f3e88 "\004", len = 29239040}
        srevp = {0x7fff01be26a0, 0x7f46a52129a0}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#37 0x000055baee850de3 in run_actions (h=0x7fff01be3a60, a=0x7f46a51bbbc0, msg=0x7f46a52129a0) at core/action.c:1569
        t = 0x7f46a51cebb0
        ret = 1
        tvb = {tv_sec = 94257352278016, tv_usec = -1}
        tve = {tv_sec = 0, tv_usec = 139938624438272}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 0
        __func__ = "run_actions"
#38 0x000055baee8437b6 in do_action (h=0x7fff01be3a60, a=0x7f46a51d27f0, msg=0x7f46a52129a0) at core/action.c:1058
        ret = 1
        v = 1
        dst = {send_sock = 0x286f5d4172e21c88, to = {s = {sa_family = 7304, sa_data = "b87\203\344|\000\000\000\000F\177\000"}, sin = {sin_family = 7304, sin_port = 14434, sin_addr = {s_addr = 2095350583}, sin_zero = "\000\000\000\000F\177\000"}, sin6 = {sin6_family = 7304,
              sin6_port = 14434, sin6_flowinfo = 2095350583, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000F\177\000\000\205\220\233\237F\177\000", __u6_addr16 = {0, 0, 32582, 0, 36997, 40859, 32582, 0}, __u6_addr32 = {0, 32582, 2677772421, 32582}}},
              sin6_scope_id = 2677772447}}, id = 32582, proto = 0 '\000', send_flags = {f = 0, blst_imask = 0}}
        tmp = 0x4 <error: Cannot access memory at address 0x4>
        new_uri = 0x7fff01be31c0 "\340\066\276\001\377\177"
        end = 0x55baf07d9244 ""
        crt = 0x7f46a11f8512 "%x%c%x%c"
        cmd = 0x7f46a5149000
        len = 0
        user = 14
        uri = {user = {s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 2}, passwd = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {
            s = 0x7fff01be3020 "01\276\001\377\177", len = -293270045}, params = {s = 0x3865366136626335 <error: Cannot access memory at address 0x3865366136626335>, len = 1073741824}, sip_params = {s = 0x7fff01be2fa0 "\001\200\255\373F\177", len = 29241248}, headers = {
            s = 0x1a <error: Cannot access memory at address 0x1a>, len = -1591769838}, port_no = 12552, proto = 446, type = 32767, flags = (unknown: 2770413984), transport = {s = 0x7f46a5148ea8 "\021", len = 29241424}, ttl = {
            s = 0x7f46fbad8001 <error: Cannot access memory at address 0x7f46fbad8001>, len = -1614761307}, user_param = {s = 0x7f469fc0b2a5 <_ul_sruid+5> "5cb6ef3a-a6e8-", len = -1614761307}, maddr = {s = 0x7f469fc0b2a5 <_ul_sruid+5> "5cb6ef3a-a6e8-", len = -1614761293}, method = {
            s = 0x7f469fc0b2bf <_ul_sruid+31> "", len = -1614761307}, lr = {s = 0xffffffff9fc0b2bf <error: Cannot access memory at address 0xffffffff9fc0b2bf>, len = 0}, r2 = {s = 0x0, len = 2}, gr = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, transport_val = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, ttl_val = {s = 0x7fff01be3130 " 2\276\001\377\177", len = -293268297}, user_param_val = {s = 0x7fff01be3070 "Ӣ\277\356\272U", len = -1524553312}, maddr_val = {s = 0x7f46a5148ea8 "\021",
            len = 29244000}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1275206792}, r2_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824}, gr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>,
            len = 6}}
        next_hop = {user = {s = 0x7fff01be36a0 "\222\067\276\001\377\177", len = -258883088}, passwd = {s = 0x55baf091c350 "", len = -258883088}, host = {s = 0x55baf091c350 "", len = -1531003260}, port = {s = 0x313810 <error: Cannot access memory at address 0x313810>, len = 8},
          params = {s = 0x2227 <error: Cannot access memory at address 0x2227>, len = 1073741824}, sip_params = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 1494014424}, headers = {s = 0x7f46a5205028 "77.77.77.77", len = 29241200}, port_no = 14,
          proto = 0, type = ERROR_URI_T, flags = (unknown: 1073741824), transport = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = -1255234878}, ttl = {s = 0x7f46a512e4b0 "\030\213U\237F\177", len = 48}, user_param = {s = 0x7fff01be2f08 "Kt\201\240F\177",
            len = 29240896}, maddr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, method = {s = 0x7fff01be2ed0 "P/\276\001\377\177", len = 45}, lr = {s = 0xa6e8 <error: Cannot access memory at address 0xa6e8>, len = 14}, r2 = {
            s = 0x7f46fbad8001 <error: Cannot access memory at address 0x7f46fbad8001>, len = -1599450320}, gr = {s = 0x14a0aa5330 <error: Cannot access memory at address 0x14a0aa5330>, len = -1525549816}, transport_val = {s = 0x7f46a0aa5330 <callid_buf+16> "-42728 at 77.77.77.77",
            len = -1599450299}, ttl_val = {s = 0x7f46a0aa5372 <callid_buf+82> "", len = 1494014424}, user_param_val = {s = 0x4eebfa2d3 <error: Cannot access memory at address 0x4eebfa2d3>, len = -289515552}, maddr_val = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, method_val = {s = 0x7fff01be2f50 "5cb6a6e8", len = -292267196}, lr_val = {s = 0x210000000 <error: Cannot access memory at address 0x210000000>, len = -1601727776}, r2_val = {
            s = 0x7fff01be0000 "uRPw", len = -1602129642}, gr_val = {s = 0x7fff01be2f70 "\032", len = -1602128821}}
        u = 0xd68
        port = 0
        dst_host = 0x2
        i = -290911819
        flags = 0
        avp = 0x7fff01be3360
        st = {flags = 4294967295, id = 65535, name = {n = 0, s = {s = 0x0, len = 29240816}, re = 0x0}, avp = 0x7f46b52d00a6 <__GI_getenv+22>}
        sct = 0x14f0911420
        sjt = 0x0
        rve = 0x7f46a51bb3a8
        mct = 0x5
        rv = 0x55baeeac2edf <qm_info+46>
        rv1 = 0x6
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = "\000\000\276\001\377\177\000\000\000\000\000\000\000\000\000\000h\r\000\000\004"}
        s = {s = 0x0, len = 0}
        srevp = {0x7f46a0aa5372 <callid_buf+82>, 0x0}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#39 0x000055baee850de3 in run_actions (h=0x7fff01be3a60, a=0x7f46a51d27f0, msg=0x7f46a52129a0) at core/action.c:1569
        t = 0x7f46a51d27f0
        ret = -1
        tvb = {tv_sec = 85899345920, tv_usec = 139940118452696}
        tve = {tv_sec = 94261357814483, tv_usec = 60129542148}
        tz = {tz_minuteswest = -1617194880, tz_dsttime = 32582}
        tdiff = 1073741824
        __func__ = "run_actions"
#40 0x000055baee83ffc5 in do_action (h=0x7fff01be3a60, a=0x7f46a514aa98, msg=0x7f46a52129a0) at core/action.c:691
        ret = -5
        v = 0
        dst = {send_sock = 0x167a16b95e269ceb, to = {s = {sa_family = 1176, sa_data = "8\245F\177\000\000\356\065\232ZF\177\000"}, sin = {sin_family = 1176, sin_port = 42296, sin_addr = {s_addr = 32582}, sin_zero = "\356\065\232ZF\177\000"}, sin6 = {sin6_family = 1176,
              sin6_port = 42296, sin6_flowinfo = 32582, sin6_addr = {__in6_u = {__u6_addr8 = "\356\065\232ZF\177\000\000\245\064\232ZF\177\000", __u6_addr16 = {13806, 23194, 32582, 0, 13477, 23194, 32582, 0}, __u6_addr32 = {1520055790, 32582, 1520055461, 32582}}},
              sin6_scope_id = 2588589196}}, id = -789618140, proto = 16 '\020', send_flags = {f = 42247, blst_imask = 0}}
        tmp = 0x7f46a534b848 "\001"
        new_uri = 0xe8 <error: Cannot access memory at address 0xe8>
        end = 0x55baeec4b538 "core: core/parser/msg_parser.c"
        crt = 0x7fff01be3940 ""
        cmd = 0x7f465a9a35ee
        len = 32582
        user = -1526226928
        uri = {user = {s = 0x7fff01be3620 "", len = -1526226928}, passwd = {s = 0x7f46a537e038 "\001", len = -1526226928}, host = {s = 0x7fff01be3660 "\220\066\276\001\377\177", len = -1589576708}, port = {s = 0x7fff01be3640 "\300s:", len = 0}, params = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 264609488}, sip_params = {s = 0x400243c58 <error: Cannot access memory at address 0x400243c58>, len = -289139488}, headers = {s = 0x3a73c0 <error: Cannot access memory at address 0x3a73c0>, len = 8},
          port_no = 14144, proto = 446, type = 32767, flags = (URI_SIP_USER_PHONE | unknown: 4004429680), transport = {s = 0x7fff01be3690 "\230\004\070\245F\177", len = -292471152}, ttl = {s = 0x0, len = -289197072}, user_param = {s = 0x7fff01be3740 "\320\070\276\001\377\177",
            len = -290743255}, maddr = {s = 0x7f46a5380498 "\001", len = -1523277664}, method = {s = 0x7fff01be3792 "", len = 29243283}, lr = {s = 0x7f465a9a35ee "", len = 1520055493}, r2 = {s = 0x55baeec44e50 <__func__.6674> "parse_via", len = -289132456}, gr = {
            s = 0x40 <error: Cannot access memory at address 0x40>, len = -1526226928}, transport_val = {s = 0x4040404040404040 <error: Cannot access memory at address 0x4040404040404040>, len = 1}, ttl_val = {
            s = 0x5a5a5a5a5a5a5a5a <error: Cannot access memory at address 0x5a5a5a5a5a5a5a5a>, len = -1523277720}, user_param_val = {s = 0x520202020202020 <error: Cannot access memory at address 0x520202020202020>, len = 29243276}, maddr_val = {
            s = 0x400ffffff <error: Cannot access memory at address 0x400ffffff>, len = 1520055488}, method_val = {s = 0x4eebfa2d3 <error: Cannot access memory at address 0x4eebfa2d3>, len = 1520055492}, lr_val = {
            s = 0x7f465a9a34c4 ";branch=z9hG4bK-353430-4e2ab883a6258132d1298423362fd346\r\nMax-Forwards: 69\r\nContact: \"813\" <sip:813 at 192.168.128.58:1195;transport=tls;registering_acc=mydomain_co_co>\r\nUser-Agent: Jitsi2.10.5"..., len = 4}, r2_val = {
            s = 0x7fff01be38d0 "\360\071\276\001\377\177", len = -290487379}, gr_val = {s = 0x53111f5de2582f40 <error: Cannot access memory at address 0x53111f5de2582f40>, len = -1292927372}}
        next_hop = {user = {s = 0x4 <error: Cannot access memory at address 0x4>, len = -1243022704}, passwd = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, host = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1243053712}, port = {
            s = 0x7f2d00000000 <error: Cannot access memory at address 0x7f2d00000000>, len = -1617194880}, params = {s = 0x0, len = -1243052856}, sip_params = {s = 0x7fff01be34f0 "`J*\265F\177", len = 1073741824}, headers = {s = 0x7f46b5e88170 "", len = 29242592}, port_no = 49645,
          proto = 61056, type = 21946, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 2822930836), transport = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1494014424}, ttl = {s = 0x7f46b52a4a60 "\306J", len = -1243025616}, user_param = {
            s = 0x40000000 <error: Cannot access memory at address 0x40000000>, len = 29242784}, maddr = {s = 0x7fff01be3520 "", len = 29}, method = {s = 0x40000000 <error: Cannot access memory at address 0x40000000>, len = 268435456}, lr = {
            s = 0x6 <error: Cannot access memory at address 0x6>, len = -1631247160}, r2 = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 0}, gr = {s = 0x7fff01be35d0 "\001", len = -286653832}, transport_val = {s = 0x55baeebfa2d3 "INFO", len = 1073741824},
          ttl_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, user_param_val = {s = 0x7fff01be3a30 "P;\276\001\377\177", len = -1245242476}, maddr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, method_val = {
            s = 0x6e0000005b <error: Cannot access memory at address 0x6e0000005b>, len = -1255519648}, lr_val = {s = 0x7fff01be3940 "", len = -1245212198}, r2_val = {s = 0x7fff01be3a70 "\002", len = -1525387056}, gr_val = {s = 0x1 <error: Cannot access memory at address 0x1>,
            len = -290705697}}
        u = 0x2215
        port = 0
        dst_host = 0x6
        i = 15
        flags = 32582
        avp = 0x3a73c0
        st = {flags = 29242752, id = 32767, name = {n = -1243022704, s = {s = 0x7f46b5e8fa90 "<0\201\356\272U", len = 1}, re = 0x7f46b5e8fa90}, avp = 0x0}
        sct = 0x3a73c0
        sjt = 0x3a60d8
        rve = 0x7f46a5148ff8
        mct = 0x243c00
        rv = 0x7f46b5e884c8
        rv1 = 0x3a5fe8
        c1 = {cache_type = 3051944488, val_type = 32582, c = {avp_val = {n = 7, s = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 268435456}, re = 0x7}, pval = {rs = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 268435456}, ri = -1525490576,
              flags = 32582}}, i2s = "\200\064\276\001", '\000' <repeats 12 times>, "`X\"\244\200"}
        s = {s = 0x7fff01be3414 "", len = 29242592}
        srevp = {0x7fff01be34f0, 0x7f46b529ed90}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#41 0x000055baee850de3 in run_actions (h=0x7fff01be3a60, a=0x7f46a51470d0, msg=0x7f46a52129a0) at core/action.c:1569
        t = 0x7f46a514aa98
        ret = 1
        tvb = {tv_sec = 21185405651, tv_usec = 94261358145712}
        tve = {tv_sec = 140733222632080, tv_usec = 2}
        tz = {tz_minuteswest = 1520055549, tz_dsttime = 32582}
        tdiff = 6
        __func__ = "run_actions"
#42 0x000055baee85157f in run_top_route (a=0x7f46a51470d0, msg=0x7f46a52129a0, c=0x0) at core/action.c:1654
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {2, 2913650019164888200, 94261357814483, 1073741824, 268435456, 6, 2913650019271842952, 8999462228585487496}, __mask_was_saved = 0, __saved_mask = {__val = {6192449487634431, 140733222632176,
                  139941329810791, 94261357814483, 0, 4611686022990790656, 139941394852256, 140733222632272, 94261354856549, 7065381312, 139941394852256, 1073741825, 0, 94261357814483, 2, 94261357814483}}}}}
        p = 0x7fff01be3a60
        ret = 268435456
        sfbk = 0
#43 0x000055baee9ac2ce in receive_msg (buf=0x7f465a9a33c0 "SUBSCRIBE sip:87 at mydomain.co.co SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at demo"..., len=558,
    rcv_info=0x7f465a9a30e0) at core/receive.c:427
        msg = 0x7f46a52129a0
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 2, jmp_env = {{__jmpbuf = {94261357814483, 1073741824, 268435456, 6, 140733222632784, 94261355984408, 9, 139941663871424}, __mask_was_saved = 29245488, __saved_mask = {__val = {139940144492744, 139940144493504, 8589935150,
                  223338364929, 139940144493504, 9, 139940144493514, 32, 139940144493547, 7, 64, 0, 139940150786904, 2632814952448, 65536, 139940130643520}}}}}
        bctx = 0x22e
        ret = 32582
        stats_on = 0
        tvb = {tv_sec = 214748364800, tv_usec = 139940144493554}
        tve = {tv_sec = 0, tv_usec = 139940144494062}
        tz = {tz_minuteswest = 1520055242, tz_dsttime = 32582}
        diff = 0
        inb = {s = 0x7f465a9a33c0 "SUBSCRIBE sip:87 at mydomain.co.co SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at demo"..., len = 558}
        netinfo = {data = {s = 0x2020202020202020 <error: Cannot access memory at address 0x2020202020202020>, len = 538976288}, rcv = 0xffffffffffffffff, dst = 0x7f465a9a33f4}
        keng = 0x0
        evp = {data = 0x7fff01be3be0, rcv = 0x7f465a9a30e0, dst = 0x0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#44 0x000055baeea464bc in receive_tcp_msg (tcpbuf=0x7f465a9a33c0 "SUBSCRIBE sip:87 at mydomain.co.co SIP/2.0\r\nCall-ID: 18d1c938d6d6d03dc502a4144f504713 at 0.0.0.0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"813\" <sip:813 at mydomain.co.co>;tag=fce8c1c6\r\nTo: <sip:87 at demo"...,
    len=558, rcv_info=0x7f465a9a30e0, con=0x7f465a9a30c8) at core/tcp_read.c:1399
        buf = 0x0
        bsize = 0
        blen = 558
        __func__ = "receive_tcp_msg"
#45 0x000055baeea48ac4 in tcp_read_req (con=0x7f465a9a30c8, bytes_read=0x7fff01be3fd0, read_flags=0x7fff01be3fc8) at core/tcp_read.c:1631
        bytes = 558
        total_bytes = 558
        resp = 1
        size = 0
        req = 0x7f465a9a3148
        dst = {send_sock = 0x7fff01be3fc0, to = {s = {sa_family = 12728, sa_data = "\232ZF\177\000\000\000\000\000\000\001 \000"}, sin = {sin_family = 12728, sin_port = 23194, sin_addr = {s_addr = 32582}, sin_zero = "\000\000\000\000\001 \000"}, sin6 = {sin6_family = 12728,
              sin6_port = 23194, sin6_flowinfo = 32582, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\001 \000\000\340\330\070\245F\177\000", __u6_addr16 = {0, 0, 8193, 0, 55520, 42296, 32582, 0}, __u6_addr32 = {0, 8193, 2771966176, 32582}}}, sin6_scope_id = 29245072}},
          id = 32767, proto = 1 '\001', send_flags = {f = 0, blst_imask = 80}}
        c = 13 '\r'
        ret = 0
        __func__ = "tcp_read_req"
#46 0x000055baeea4c621 in handle_io (fm=0x7f46a538d8e0, events=1, idx=-1) at core/tcp_read.c:1862
        ret = 0
        n = 21946
        read_flags = 1
        con = 0x7f465a9a30c8
        s = 0
        resp = 1
        t = 80
        __func__ = "handle_io"
#47 0x000055baeea39524 in io_wait_loop_epoll (h=0x55baeef1d440 <io_w>, t=2, repeat=0) at core/io_wait.h:1062
        n = 1
        r = 0
        fm = 0x7f46a538d8e0
        revents = 1
        __func__ = "io_wait_loop_epoll"
#48 0x000055baeea4d9ce in tcp_receive_loop (unix_sock=55) at core/tcp_read.c:1974
        __func__ = "tcp_receive_loop"
#49 0x000055baee8faf60 in tcp_init_children () at core/tcp_main.c:5086
        r = 3
        i = 7
        reader_fd_1 = 55
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\006\000\000\000\000\000\000\000\000B\276\001\377\177\000\000\307W\224\356\272U\000\000\060B\276\001\377\177\000\000m\022\225\356\001", '\000' <repeats 11 times>, "\004X\240\356\000\000\000\000\321\313\300\356\000\000\000\000м\023\245F\177\000\000\357\352\272\000\000\000\000\000\000\000\000\000\000!\000\000\000\"\000\000\000\000\362\067\265F\177\000"
        si = 0x0
        __func__ = "tcp_init_children"
#50 0x000055baee82f1a9 in main_loop () at main.c:1750
        i = 8
        pid = 42669
        si = 0x0
        si_desc = "udp receiver child=7 sock=127.0.0.20:5088 (77.77.77.77:5070)\000\067\060)\000\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\217\362\067\265F\177\000\000\300B\276\001\377\177\000\000\060\000\000\000\060\000\000\000\240C\276\001\377\177\000\000h \037\245F\177\000"
        nrprocs = 8
        woneinit = 1
        __func__ = "main_loop"
#51 0x000055baee836430 in main (argc=13, argv=0x7fff01be4648) at main.c:2737
        cfg_stream = 0x55baf07a5010
        c = -1
        r = 0
        tmp = 0x7fff01be4e05 ""
        tmp_len = 32767
        port = 29246592
        proto = 32582
        options = 0x55baeebaf600 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 554244915
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0xffffffff
        p = 0xd <error: Cannot access memory at address 0xd>
        st = {st_dev = 18, st_ino = 2029638, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1555492665, tv_nsec = 845706812}, st_mtim = {tv_sec = 1555492665, tv_nsec = 845706812},
          st_ctim = {tv_sec = 1555492665, tv_nsec = 845706812}, __glibc_reserved = {0, 0, 0}}
        option_index = 0
        long_options = {{name = 0x55baeebb1aea "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55baeebabf29 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55baeebb1aef "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
```


-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1860#issuecomment-484171999
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-dev/attachments/20190417/7398b00b/attachment-0001.html>


More information about the sr-dev mailing list