[sr-dev] [kamailio/kamailio] Kamailio 5.2.0 - Segmentation fault in libcrypto.so.1.1 (#1860)

shaunjstokes notifications at github.com
Wed Feb 20 16:07:39 CET 2019


### Description

This occurs more frequently when we have lots of presence subscriptions which we are able to reproduce in a test environment. Thus far it appears this only occurs when using TLS as opposed to UDP\TCP.

### Troubleshooting

Appears to be an issue in libcrypto.so.1.1 but not sure where to start.

#### Reproduction

8000+ presence subscriptions via TLS.

#### Debugging Data

```
  gdb /path/to/kamailio /path/to/corefile
GNU gdb (Debian 7.12-6) 7.12.0.20161007-git
Copyright (C) 2016 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/local/kamailio/sbin/kamailio...done.
[New LWP 35028]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/local/kamailio/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /usr/loc'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007ff9faf54645 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1

  bt full
#0  0x00007ff9faf54645 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#1  0x00007ff9fb030677 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#2  0x00007ff9fb03cc0b in EVP_EncryptUpdate () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#3  0x00007ff9fb06f811 in ?? () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#4  0x00007ff9fb070737 in RAND_DRBG_generate () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#5  0x00007ff9fb07097d in RAND_DRBG_bytes () from /usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#6  0x00007ff9fb3ca628 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#7  0x00007ff9fb3c7691 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#8  0x00007ff9fb3c81ce in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#9  0x00007ff9fb3da9e3 in ?? () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#10 0x00007ff9fb3dab23 in SSL_write () from /usr/lib/x86_64-linux-gnu/libssl.so.1.1
No symbol table info available.
#11 0x00007ff9efb3b79c in tls_encode_f (c=0x7ff9b08aff78, pbuf=0x7ffe163fb3d0, plen=0x7ffe163fb3c8, rest_buf=0x7ffe163fb3d8, rest_len=0x7ffe163fb3cc, send_flags=0x7ffe163fb3bc) at tls_server.c:828
        n = 0
        offs = 0
        ssl = 0x7ff9b13160f8
        tls_c = 0x7ff9b064ae68
        wr_buf = "\027\003\003\002 n\017\031\247%%T\r8O\334\350\005r\277Kk\326\334\377\t\b\r\266\267\242\374\354:\265#\"\224\333t\265\226\226\005~\361\230\237\020w\211}z\212,R\323_\367>\211\220\237\tC\244\303Ы\252\303B\020\a\240\216\366\024\206\212\201'\253G\304#\301M\333\3                                           20Ӂ\254\332!\341&Im\336GX\264\003\313Փp\353\226vV\034m\030\005\r\235+~\376,\236\\\\\316A\341f*fj\t\206\315\365Z\320͉\367xCj\344\235G#x\361T\005\216\234\363\227r\026\a\361_o\r_\274\v\340F\333%\262\336\273\023\060~\321?N\302\312L\004!\260i\340\300\324\361\371Җ\273\323X\f\332멵                                           \224\226\321E\343y)"...
        rd = {buf = 0x0, pos = 0, used = 0, size = 0}
        wr = {
          buf = 0x7ff9efd75e20 <wr_buf> "\027\003\003\002 n\017\031\247%%T\r8O\334\350\005r\277Kk\326\334\377\t\b\r\266\267\242\374\354:\265#\"\224\333t\265\226\226\005~\361\230\237\020w\211}z\212,R\323_\367>\211\220\237\tC\244\303Ы\252\303B\020\a\240\216\366\024\206\212\20                                           1'\253G\304#\301M\333\320Ӂ\254\332!\341&Im\336GX\264\003\313Փp\353\226vV\034m\030\005\r\235+~\376,\236\\\\\316A\341f*fj\t\206\315\365Z\320͉\367xCj\344\235G#x\361T\005\216\234\363\227r\026\a\361_o\r_\274\v\340F\333%\262\336\273\023\060~\321?N\302\312L\004!\260i\340\300\324\36                                           1\371Җ\273\323X\f\332", <incomplete sequence \353\251>..., pos = 0, used = 0, size = 65536}
        ssl_error = 0
        err_src = 0x7ff9efb65a87 "TLS write:"
        buf = 0x7ff9b0bdcd48 "NOTIFY sip:500 at 82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"...
        len = 1255
        x = 373273376
        __func__ = "tls_encode_f"
#12 0x00005642297e1ca4 in tcpconn_send_put (c=0x7ff9b08aff78,
    buf=0x7ff9b0bdcd48 "NOTIFY sip:500 at 82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len=1255, send_flags=...)
    at core/tcp_main.c:2297
        tmp = 0x7ff9af343808
        fd = 10
        response = {140729271694352, 0}
        n = 0
        do_close_fd = 0
        rest_buf = 0x0
        t_buf = 0x7ff9b0bdcd48 "NOTIFY sip:500 at 82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"...
        rest_len = 0
        t_len = 1255
        resp = 140729271694352
        t_send_flags = {f = 4, blst_imask = 0}
        fd_cache_e = 0x0
        use_fd_cache = 0
        __func__ = "tcpconn_send_put"
#13 0x00005642297df397 in tcp_send (dst=0x7ff9b1693278, from=0x7ffe163fb610,
    buf=0x7ff9b0bdcd48 "NOTIFY sip:500 at 82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len=1255) at core/tcp_main.c:2077
        c = 0x7ff9b08aff78
        ip = {af = 2, len = 4, u = {addrl = {94844456114514, 140711573739219}, addr32 = {2988284242, 22082, 4150154963, 32761}, addr16 = {39250, 45597, 22082, 0, 22227, 63326, 32761, 0}, addr = "R\231\035\262BV\000\000\323V^\367\371\177\000"}}
        port = 39502
        fd = 373274128
        response = {140729271694776, 94842167197447}
        n = 22082
        con_lifetime = 57680
        rest_buf = 0x5642298efffc <sr_event_exec+482> "\211E\374\213E\374\351A\002"
        t_buf = 0x7ffe163fb510 "\323V^\367\371\177"
        rest_len = 22082
        t_len = 697859842
        resp = 836
        t_send_flags = {f = 0, blst_imask = 0}
        __func__ = "tcp_send"
#14 0x00007ff9f758d961 in msg_send_buffer (dst=0x7ff9b1693278,
    buf=0x7ff9b0bdcd48 "NOTIFY sip:500 at 82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len=1255, flags=0)
    at ../../core/forward.h:282
        new_dst = {send_sock = 0x1, to = {s = {sa_family = 53808, sa_data = "\275\260\371\177\000\000(\254ΰ\371\177\000"}, sin = {sin_family = 53808, sin_port = 45245, sin_addr = {s_addr = 32761}, sin_zero = "(\254ΰ\371\177\000"}, sin6 = {sin6_family = 53808,
              sin6_port = 45245, sin6_flowinfo = 32761, sin6_addr = {__in6_u = {__u6_addr8 = "(\254ΰ\371\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {44072, 45262, 32761, 0, 0, 0, 0, 0}, __u6_addr32 = {2966334504, 32761, 0, 0}}}, sin6_scope_id = 699223731}},
          id = 22082, proto = 2 '\002', send_flags = {f = 0, blst_imask = 0}}
        outb = {s = 0x7ff9b0bdcd48 "NOTIFY sip:500 at 82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk SIP/2.0\r\nVia: SIP/2.0/TLS 62.231.137.101:5071;branch=z9hG4bK7f6f.ba1da0f1", '0' <repeats 24 times>, ".0\r\nTo: <"..., len = 1255}
        netinfo = {data = {s = 0x100000002 <error: Cannot access memory at address 0x100000002>, len = 0}, rcv = 0x7ff9b0bdc4a0, dst = 0x7ff9f3f607ad <p_tm_callback>}
        evp = {data = 0x7ffe163fb690, rcv = 0x0, dst = 0x7ff9b1693278}
        port = 373274592
        ip = {af = 4150157560, len = 32761, u = {addrl = {140710389918760, 0}, addr32 = {2966334504, 32761, 0, 0}, addr16 = {44072, 45262, 32761, 0, 0, 0, 0, 0}, addr = "(\254ΰ\371\177\000\000\000\000\000\000\000\000\000"}}
        from = 0x7ffe163fb610
        local_addr = {s = {sa_family = 2, sa_data = "\000\000>\347\211e\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 0, sin_addr = {s_addr = 1703536446}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 0,
            sin6_flowinfo = 1703536446, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}
        con = 0x0
        wsev = {type = 699223731, buf = 0x7ff9af2f26c8 "", len = 268435456, id = 0}
        ret = 32766
        __func__ = "msg_send_buffer"
#15 0x00007ff9f758fd1f in send_pr_buffer (rb=0x7ff9b1693228, buf=0x7ff9b0bdcd48, len=1255) at t_funcs.c:70
        __func__ = "send_pr_buffer"
#16 0x00007ff9f7566edd in send_prepared_request_impl (request=0x7ff9b1693228, retransmit=1, branch=0) at uac.c:643
        t = 0x7ff9b1693008
        p_msg = 0x0
        uac = 0x7ff9b1693218
        ip = {af = 4037853376, len = 32761, u = {addrl = {516093936486, 140711461450400}, addr32 = {697860966, 120, 4037866144, 32761}, addr16 = {33638, 10648, 120, 0, 62112, 61612, 32761, 0}, addr = "f\203\230)x\000\000\000\240\362\254\360\371\177\000"}}
        ret = -1318506488
        __func__ = "send_prepared_request_impl"
#17 0x00007ff9f7568365 in t_uac_with_ids (uac_r=0x7ffe163fbe70, ret_index=0x0, ret_label=0x0) at uac.c:720
        request = 0x7ff9b1693228
        cell = 0x7ff9b1693008
        ret = 1
        is_ack = 0
        branch_ret = 32761
        i = 0
        added_branches = 1
#18 0x00007ff9f75682a7 in t_uac (uac_r=0x7ffe163fbe70) at uac.c:695
No locals.
#19 0x00007ff9f756a62b in req_within (uac_r=0x7ffe163fbe70) at uac.c:929
        ret = 744
        nbuf = "\260\272?\026\376\177\000\000\220\272?\026\376\177\000\000 \313\n\374\371\177\000\000\060\304\n\374\371\177", '\000' <repeats 18 times>, "\360\274?\026\376\177\000\000\300\275?\026\376\177\000\000\263N\255)BV\000\000\000\000\000@\000\000\000\000\000\000\000\                                           020\000\000\000\000\006\000\000\000\000\000\000\000\360\275?\026\376\177\000\000:\023\365\363\371\177\000\000\000\273?\026\376\177\000\000\\ e\373\371\177\000\000C\003\000\000\000\000\000\000\020\200\360\373\371\177\000\000p\272?\026\001\000\000\000\332\336\327*BV\000\000`\                                           356\n\374\371\177\000\000\300\303?\026\376\177\000\000\000\000\000\000\000\000\000\000`$֯\371\177\000\000\b\224\f\374\371\177\000\000$"...
        dbuf = "\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000\020\272?\026\376\177\000\000\377*\253\360\371\177\000\000\360\271?\026\376\177\000\000\300\275?\026\376\177\000\000\263N\255)BV\000\000\000\000\000@\000\000\000\000\377\377\377\377", '\000' <re                                           peats 11 times>
        ouri = {s = 0x7ff9fc0b1250 "sip:500 at 82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk", len = 0}
        nuri = {s = 0x7ffe163fb9b0 "\260\272?\026\376\177", len = 0}
        duri = {s = 0x7ffe163fb960 "", len = 0}
        __func__ = "req_within"
#20 0x00007ff9f3f5deb7 in send_notify_request (subs=0x7ffe163fc2f0, watcher_subs=0x0, n_body=0x0, force_null_body=0) at notify.c:1604
        td = 0x7ff9fc0af9e8
        met = {s = 0x7ff9f3fd3334 "NOTIFY", len = 6}
        str_hdr = {s = 0x7ff9fc0ad778 "Max-Forwards: 70\r\nEvent: presence\r\nContact: <sip:62.231.137.101:5071;transport=tls>\r\nSubscription-State: active;expires=3600\r\nContent-Type: application/pidf+xml\r\n", len = 162}
        notify_body = 0x7ff9fc0c2548
        result = 0
        cb_param = 0x7ff9b0bdc4a0
        final_body = 0x0
        uac_r = {method = 0x7ffe163fbee0, headers = 0x7ffe163fbed0, body = 0x7ff9fc0c2548, ssock = 0x0, dialog = 0x7ff9fc0af9e8, cb_flags = 1024, cb = 0x7ff9f3f607ad <p_tm_callback>, cbp = 0x7ff9b0bdc4a0, callid = 0x0}
        aux_body = 0x0
        backup_subs = 0x7ff9fbfe0a70
        __func__ = "send_notify_request"
#21 0x00007ff9f3f5f5b3 in notify (subs=0x7ffe163fc2f0, watcher_subs=0x0, n_body=0x0, force_null_body=0, aux_body_processing=0x0) at notify.c:1703
        aux_body = 0x0
        __func__ = "notify"
#22 0x00007ff9f3fa2b4b in update_subscription (msg=0x7ff9fc09c150, subs=0x7ffe163fc2f0, to_tag_gen=1, sent_reply=0x7ffe163fc12c) at subscribe.c:724
        hash_code = 6046
        __func__ = "update_subscription"
#23 0x00007ff9f3fa9857 in handle_subscribe (msg=0x7ff9fc09c150, watcher_user=..., watcher_domain=...) at subscribe.c:1284
        to_tag_gen = 1
        subs = {pres_uri = {s = 0x7ff9fc0c9408 "sip:229 at itec-support.sysconfig.co.uk", len = 36}, to_user = {
            s = 0x7ff9b08b0340 "229 at itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: \"500\" <sip:500 at 192.168.128.27:60700;transpor"..., len = 3}, to_domain = {
            s = 0x7ff9b08b0344 "itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: \"500\" <sip:500 at 192.168.128.27:60700;transport=tl"..., len = 28}, from_user = {
            s = 0x7ff9b08b0307 "500 at itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: <sip:229 at itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: "..., len = 3}, from_domain = {
            s = 0x7ff9b08b030b "itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: <sip:229 at itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\n"..., len = 28}, watcher_user = {
            s = 0x7ff9b08b0307 "500 at itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: <sip:229 at itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: "..., len = 3}, watcher_domain = {
            s = 0x7ff9b08b030b "itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: <sip:229 at itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\n"..., len = 28},
          event = 0x7ff9afd62460, event_id = {s = 0x0, len = 0}, to_tag = {s = 0x7ff9f780a460 <tm_tags> "4984a63b2f097c424789ea70bd115f49-e427", len = 37}, from_tag = {
            s = 0x7ff9b08b032d "219479eb\r\nTo: <sip:229 at itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.168.128.27:60700;branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: \"500\" <sip:500 at 192.168.12"..., len = 8}, callid = {
            s = 0x7ff9b08b02b1 "0bba5e90e0a29ac9ce1c1475cce219a6 at 0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"500\" <sip:500 at itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: <sip:229 at itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.1"..., len = 48},
          sockinfo_str = {s = 0x7ff9fc090118 "tls:62.231.137.101:5071", len = 23}, remote_cseq = 1, local_cseq = 1, contact = {s = 0x7ff9fc0b1250 "sip:500 at 82.153.29.178:39502;transport=tls;registering_acc=itec-support_sysconfig_co_uk", len = 86}, local_contact = {
            s = 0x7ff9fc053930 "sip:62.231.137.101:5071;transport=tls", len = 37}, record_route = {s = 0x0, len = 0}, expires = 3600, status = 1, reason = {s = 0x0, len = 0}, version = 1, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1,
          internal_update_flag = 0, updated = -1, updated_winfo = -1, flags = 0, user_agent = {s = 0x7ff9b08b0449 "serveline1.1.1Windows 10\r\nEvent: presence\r\nAccept: application/pidf+xml\r\nExpires: 3600\r\nContent-Length: 0\r\n\r\n", len = 24}, next = 0x0}
        event = 0x7ff9afd62460
        parsed_event = 0x7ff9fc0a8f90
        ev_param = 0x0
        found = 1
        reason = {s = 0x0, len = 0}
        uri = {user = {s = 0x7ff9b08b03a0 "109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: \"500\" <sip:500 at 192.168.128.27:60700;transport=tls;registering_acc=itec-support_sysconfig_co_uk>\r\nUser-Agent: serveline1.1.1Windows 10\r\nEvent"...,
            len = 373277152}, passwd = {s = 0x4f8 <error: Cannot access memory at address 0x4f8>, len = 2}, host = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, port = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, params = {
            s = 0x7ffe163fc1f0 "@\334\327*BV", len = 697988931}, sip_params = {s = 0x7ffe163fc280 "g\025\366\373\371\177", len = -66469552}, headers = {s = 0x7ffe163fc1e0 "", len = -67096472}, port_no = 49824, proto = 5695, type = 32766, flags = (unknown: 498511872),
          transport = {s = 0x7ff9fc0030b0 "\a\003\213\260\371\177", len = 373277392}, ttl = {s = 0x0, len = -67758744}, user_param = {s = 0x56422ad7dc40 " #\330*BV", len = 0}, maddr = {s = 0x7ff9fbf6156b "", len = -185595711}, method = {s = 0x0, len = 373277616}, lr = {
            s = 0xfffffffffc050db0 <error: Cannot access memory at address 0xfffffffffc050db0>, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7ff9fbf61568 "500", len = 0}, transport_val = {s = 0x0, len = -67758744}, ttl_val = {
            s = 0x300000000 <error: Cannot access memory at address 0x300000000>, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x7ff9fbf61567 "", len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {
            s = 0xf900000000 <error: Cannot access memory at address 0xf900000000>, len = -66469552}, gr_val = {
            s = 0x7ff9b08b02b1 "0bba5e90e0a29ac9ce1c1475cce219a6 at 0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"500\" <sip:500 at itec-support.sysconfig.co.uk>;tag=219479eb\r\nTo: <sip:229 at itec-support.sysconfig.co.uk>\r\nVia: SIP/2.0/TLS 192.1"..., len = 48}}
        reply_code = 500
        reply_str = {s = 0x7ff9f3fdca3d "Server Internal Error", len = 21}
        sent_reply = 1
        __func__ = "handle_subscribe"
#24 0x00007ff9f3fa5964 in handle_subscribe0 (msg=0x7ff9fc09c150) at subscribe.c:1033
        pfrom = 0x7ff9fc003068
        __func__ = "handle_subscribe0"
#25 0x0000564229768e4f in do_action (h=0x7ffe163fcc30, a=0x7ff9fc057968, msg=0x7ff9fc09c150) at core/action.c:1067
        ret = -5
        v = 699223731
        dst = {send_sock = 0x133438, to = {s = {sa_family = 53480, sa_data = "\034\000\000\000\000\000@\033\003\374\371\177\000"}, sin = {sin_family = 53480, sin_port = 28, sin_addr = {s_addr = 0}, sin_zero = "@\033\003\374\371\177\000"}, sin6 = {sin6_family = 53480,
              sin6_port = 28, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "@\033\003\374\371\177\000\000`\t\003\374\371\177\000", __u6_addr16 = {6976, 64515, 32761, 0, 2400, 64515, 32761, 0}, __u6_addr32 = {4228062016, 32761, 4228057440, 32761}}},
              sin6_scope_id = 4228497744}}, id = 32761, proto = -112 '\220', send_flags = {f = 5695, blst_imask = 32766}}
        tmp = 0x40000000 <error: Cannot access memory at address 0x40000000>
        new_uri = 0x7ff9fc0464f8 "\032"
        end = 0x7ff9fc09c150 "!\024"
        crt = 0x564229ad4eb3 "INFO"
        cmd = 0x7ff9fbfc3148
        len = 258327944
        user = 982029481
        uri = {user = {s = 0x7ffe163fc8c0 "", len = 695389545}, passwd = {s = 0x7ff9fc019b00 "\002", len = -66469552}, host = {s = 0x7ffe163fc8a8 "\360\302\345\365\371\177", len = 16}, port = {s = 0x7ffe163fc8d0 "\357\302\345\365\371\177", len = 373279888}, params = {
            s = 0x0, len = 0}, sip_params = {s = 0x0, len = -1}, headers = {s = 0x0, len = 16}, port_no = 62000, proto = 64521, type = SIP_URI_T, flags = (unknown: 0), transport = {s = 0x564200000000 <error: Cannot access memory at address 0x564200000000>, len = 116},
          ttl = {s = 0x7ffe163fc920 "\263N\255)BV", len = 0}, user_param = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 132}, maddr = {s = 0x7ff9f5e5c2e6 "%s: %s%.*s", len = 3}, method = {s = 0x7ff9fc09c150 "!\024", len = -169491728}, lr = {
            s = 0x7ff9fc0a2cb0 "8\213\f\374\371\177", len = -66469552}, r2 = {s = 0x0, len = 0}, gr = {s = 0x7ff9f5e5c2ef "s", len = 697869913}, transport_val = {s = 0x7ff9fc02c790 "!", len = 16}, ttl_val = {s = 0x7ff9fbfbb0a8 "\315\352S\366\371\177", len = 373280352},
          user_param_val = {s = 0x7ff9fc019ae8 "\024", len = 0}, maddr_val = {s = 0x564229ad4eb3 "INFO", len = 2}, method_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, lr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, r2_val = {
            s = 0x7ffe163fc9e0 "\320\317?\026\376\177", len = 696865318}, gr_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 266546968}}
        next_hop = {user = {s = 0x7ffe163fc6a0 "\320\306?\026\376\177", len = 373278720}, passwd = {s = 0x15d6bf724 <error: Cannot access memory at address 0x15d6bf724>, len = -1342808584}, host = {s = 0x7ffe163fc6b0 "\320\306?\026\376\177", len = -270932943}, port = {
            s = 0x7ff9b145d960 "$\367k]\257", len = -1342808584}, params = {s = 0x7ffe163fc6d0 "`\314?\026\376\177", len = 2}, sip_params = {s = 0x7ffe163fc6d0 "`\314?\026\376\177", len = 1}, headers = {
            s = 0x772410000000 <error: Cannot access memory at address 0x772410000000>, len = 718789696}, port_no = 52320, proto = 5695, type = 32766, flags = (URI_SIP_USER_PHONE | unknown: 201770324), transport = {s = 0x7ffe163fcc78 "\251\224\260\020\031\273\035\\",
            len = 0}, ttl = {s = 0x7ffa0c06c559 "n!\"", len = 200606905}, user_param = {s = 0x7ffe163fc810 "\320\310?\026\376\177", len = -1355863720}, maddr = {s = 0x7ffe163fcc28 "\220\344?\026\376\177", len = 35028}, method = {s = 0x7ffe163fc7c8 "", len = 10}, lr = {
            s = 0x7ffe163fcc23 "\374\371\177", len = 1550670948}, r2 = {s = 0x0, len = 0}, gr = {s = 0x564200000000 <error: Cannot access memory at address 0x564200000000>, len = -1}, transport_val = {
            s = 0x564200000000 <error: Cannot access memory at address 0x564200000000>, len = 0}, ttl_val = {s = 0x0, len = 32}, user_param_val = {s = 0x7ffe00000005 <error: Cannot access memory at address 0x7ffe00000005>, len = 200793134}, maddr_val = {
            s = 0x7ffe163fc840 "", len = 116}, method_val = {s = 0xd68 <error: Cannot access memory at address 0xd68>, len = 718789696}, lr_val = {s = 0x7ffe163fcd40 " n\005\374\371\177", len = -169491738}, r2_val = {s = 0x7ffe163fce48 "8\320?\026\376\177", len = 0},
          gr_val = {s = 0x74 <error: Cannot access memory at address 0x74>, len = 200606905}}
        u = 0x2
        port = 0
        dst_host = 0x5642297769ba <run_actions_safe+151>
        i = 1
        flags = 32761
        avp = 0x0
        st = {flags = 175, id = 0, name = {n = -1356099584, s = {s = 0x7ff9af2b9000 "", len = 1}, re = 0x7ff9af2b9000}, avp = 0x7ff9b145d960}
        sct = 0x10000000
        sjt = 0x40000000
        rve = 0x7ff9fc0464f8
        mct = 0x564229ad4eb3
        rv = 0x7ff9efdcf7ac
        rv1 = 0x7ffe163fe490
        c1 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 6, s = {s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = 373278288}, re = 0x100000006}, pval = {rs = {
                s = 0x100000006 <error: Cannot access memory at address 0x100000006>, len = 373278288}, ri = 697906361, flags = 22082}}, i2s = "\000\365\334\357\371\177\000\000`\337\327*\272\000\000\000\310%\335\357\371\177"}
        s = {s = 0x564229ad4eb3 "INFO", len = -1355864376}
        srevp = {0x7ffe163fc600, 0x5642299854d8 <futex_release+29>}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#26 0x000056422977635e in run_actions (h=0x7ffe163fcc30, a=0x7ff9fc057968, msg=0x7ff9fc09c150) at core/action.c:1564
        t = 0x7ff9fc057968
        ret = -1
        ms = 0
        __func__ = "run_actions"
#27 0x00005642297769ba in run_actions_safe (h=0x7ffe163fe490, a=0x7ff9fc057968, msg=0x7ff9fc09c150) at core/action.c:1625
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {2, 1109510072046228649, 94842167054003, 1073741824, 268435456, 6, 1109510072092365993, 6637667142142563497}, __mask_was_saved = 0, __saved_mask = {__val = {1073741824, 268435456, 6,
                  140729271700736, 94842165820044, 268435456, 140711652082000, 140729271700992, 140711651455080, 1, 2, 140711651455152, 140729271701200, 140711651767776, 140711652082000, 140729271700896}}}}}
        ret = -1
        ign_on_break = 0
#28 0x0000564229728515 in rval_get_int (h=0x7ffe163fe490, msg=0x7ff9fc09c150, i=0x7ffe163fd038, rv=0x7ff9fc056e20, cache=0x0) at core/rvalue.c:912
        r_avp = 0x7ffe163fced0
        avp_val = {n = 268435456, s = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, re = 0x10000000}
        pval = {rs = {s = 0x56422ad7de90 "`η\363\371\177", len = 2}, ri = 699223731, flags = 22082}
        tmp = {s = 0xdb18fdfb00007dfb <error: Cannot access memory at address 0xdb18fdfb00007dfb>, len = -67096400}
        s = 0x0
        r = 21
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#29 0x000056422972ce86 in rval_expr_eval_int (h=0x7ffe163fe490, msg=0x7ff9fc09c150, res=0x7ffe163fd038, rve=0x7ff9fc056e18) at core/rvalue.c:1910
        i1 = 373281968
        i2 = 4
        ret = -1
        c1 = {cache_type = 4228497744, val_type = 32761, c = {avp_val = {n = 373286032, s = {s = 0x7ffe163fe490 "\003", len = 699223731}, re = 0x7ffe163fe490}, pval = {rs = {s = 0x7ffe163fe490 "\003", len = 699223731}, ri = 1073741824, flags = 0}},
          i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 268435456, val_type = RV_NONE, c = {avp_val = {n = 373280464, s = {s = 0x7ffe163fced0 "", len = 373280528}, re = 0x7ffe163fced0}, pval = {rs = {s = 0x7ffe163fced0 "", len = 373280528}, ri = 695389545, flags = 22082}},
          i2s = "P\301\t\374\371\177\000\000\000\000\000\000\000\000\000\000\300\365\004\374\371\177"}
        rv1 = 0x5642298e4e63 <pv_value_destroy+175>
        rv2 = 0x564229ad4eb3
        __func__ = "rval_expr_eval_int"
#30 0x000056422972d2f6 in rval_expr_eval_int (h=0x7ffe163fe490, msg=0x7ff9fc09c150, res=0x7ffe163fd4b0, rve=0x7ff9fc057d10) at core/rvalue.c:1918
        i1 = 0
        i2 = 0
        ret = -1
        c1 = {cache_type = 1259528, val_type = RV_NONE, c = {avp_val = {n = 1889464, s = {s = 0x1cd4b8 <error: Cannot access memory at address 0x1cd4b8>, len = 1910816}, re = 0x1cd4b8}, pval = {rs = {s = 0x1cd4b8 <error: Cannot access memory at address 0x1cd4b8>,
                len = 1910816}, ri = 8, flags = 0}}, i2s = "\b\326\v\374\371\177\000\000\002\000\000\000\000\000\000\000(\a\003\374\371\177"}
        c2 = {cache_type = 373280848, val_type = 32766, c = {avp_val = {n = -169518741, s = {s = 0x7ff9f5e5596b <xlog_2_helper+990> "H\215e\330[A\\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271",
                len = 268435456}, re = 0x7ff9f5e5596b <xlog_2_helper+990>}, pval = {rs = {s = 0x7ff9f5e5596b <xlog_2_helper+990> "H\215e\330[A\\A]A^A_]\303UH\211\345H\203\354 H\211}\370H\211u\360H\211U\350H\213U\350H\213u\360H\213E\370A\270\377\377\377\377\271",
                len = 268435456}, ri = 6, flags = 0}}, i2s = "\377\377\377\377\000\000\000\000\220\307\v\374\371\177\000\000\b\326\v\374\371\177"}
        rv1 = 0x6
        rv2 = 0x10000000
        __func__ = "rval_expr_eval_int"
#31 0x00005642297688ec in do_action (h=0x7ffe163fe490, a=0x7ff9fc059138, msg=0x7ff9fc09c150) at core/action.c:1043
        ret = -5
        v = 0
        dst = {send_sock = 0x564229ad4eb3, to = {s = {sa_family = 0, sa_data = "\000@\000\000\000\000\000\000\000\020\000\000\000"}, sin = {sin_family = 0, sin_port = 16384, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\020\000\000\000"}, sin6 = {sin6_family = 0,
              sin6_port = 16384, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000", __u6_addr16 = {0, 4096, 0, 0, 6, 0, 0, 0}, __u6_addr32 = {268435456, 0, 6, 0}}}, sin6_scope_id = 373282272}},
          id = 32766, proto = 34 '"', send_flags = {f = 10610, blst_imask = 22082}}
        tmp = 0x7ffe163fe490 "\003"
        new_uri = 0x7ffe163fd690 ""
        end = 0x56422972ca9d <rval_str_lop2+192> "\213E\354\353!\220\353\001\220H\213E\360H\211\307\350\033\224\377\377H\213E\370H\211\307\350\017\224\377\377\270"
        crt = 0x7ff9fc09c150 "!\024"
        cmd = 0x7ff9fbfbd2e8
        len = 32766
        user = 373283664
        uri = {user = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 2}, passwd = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {
            s = 0x7ffe163fd3e0 "\360\324?\026\376\177", len = 695690078}, params = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, sip_params = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, headers = {
            s = 0x7ffe163fd4a0 "\340\325?\026\376\177", len = 695389830}, port_no = 54240, proto = 5695, type = 32766, flags = (unknown: 4228497744), transport = {s = 0x7ff9fc044e88 "\026", len = 373281808}, ttl = {s = 0x7ff9fc0a0bc0 "", len = -66469552}, user_param = {
            s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, maddr = {s = 0x7ff9fc09c150 "!\024", len = 2}, method = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>,
            len = 6}, r2 = {s = 0x7ffe163fd4f0 "\340\325?\026\376\177", len = 695691706}, gr = {s = 0x7ff9fc09c150 "!\024", len = -66469552}, transport_val = {s = 0x7ff9fc044e88 "\026", len = 373286032}, ttl_val = {s = 0x0, len = 1}, user_param_val = {
            s = 0x2 <error: Cannot access memory at address 0x2>, len = 147362985}, maddr_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {
            s = 0xf65c588098894a9 <error: Cannot access memory at address 0xf65c588098894a9>, len = 280007849}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x564229a81f30 <__func__.7452> "rval_destroy", len = 2}}
        next_hop = {user = {s = 0x7ff9fc07e410 "\004", len = 373286032}, passwd = {s = 0x0, len = -1}, host = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 231249065}, port = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, params = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, sip_params = {s = 0xf65c5880e8894a9 <error: Cannot access memory at address 0xf65c5880e8894a9>, len = 280007849}, headers = {s = 0x0, len = 6}, port_no = 53920, proto = 5695,
          type = 32766, flags = (URI_SIP_USER_PHONE | unknown: 695690076), transport = {s = 0x7ffe163fd350 "", len = 200818532}, ttl = {s = 0x7ff9fbfbbe98 "A\234.\366\371\177", len = 0}, user_param = {s = 0x18 <error: Cannot access memory at address 0x18>,
            len = 718625520}, maddr = {s = 0x0, len = -66469552}, method = {s = 0x7ff9fc01ffc8 ".", len = 373281488}, lr = {s = 0x27163fd350 <error: Cannot access memory at address 0x27163fd350>, len = -152772320}, r2 = {
            s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = -1}, gr = {s = 0x7ffe163fd360 "\240\324?\026\376\177", len = 695371029}, transport_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, ttl_val = {
            s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 0}, user_param_val = {s = 0x7ff9fc07e650 "\004", len = 373282200}, maddr_val = {s = 0x7ff9fc09c150 "!\024", len = 373286032}, method_val = {s = 0x7ff9fc01ffc8 ".", len = 373286032},
          lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 172528809}, gr_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}}
        u = 0x7ff9fc045930
        port = 0
        dst_host = 0x56422972ce86 <rval_expr_eval_int+154>
        i = 11
        flags = 32761
        avp = 0x0
        st = {flags = 268435456, id = 0, name = {n = 6, s = {s = 0x6 <error: Cannot access memory at address 0x6>, len = 373281392}, re = 0x6}, avp = 0x5642297769ba <run_actions_safe+151>}
        sct = 0x7ffe163fd5e0
        sjt = 0x1
        rve = 0x7ff9fc057d10
        mct = 0x7ff9fc0806b0
        rv = 0x40000000
        rv1 = 0x0
        c1 = {cache_type = 31, val_type = RV_NONE, c = {avp_val = {n = -66469552, s = {s = 0x5efc09c150 <error: Cannot access memory at address 0x5efc09c150>, len = 0}, re = 0x5efc09c150}, pval = {rs = {
                s = 0x5efc09c150 <error: Cannot access memory at address 0x5efc09c150>, len = 0}, ri = 0, flags = 0}}, i2s = "`\321?\026\376\177\000\000\002\000\000\000\000\000\000\000\263N\255)BV"}
        s = {s = 0x7ff9fc07e410 "\004", len = 373281168}
        srevp = {0x10000000, 0x7ff9fc09c150}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#32 0x000056422977635e in run_actions (h=0x7ffe163fe490, a=0x7ff9fc046148, msg=0x7ff9fc09c150) at core/action.c:1564
        t = 0x7ff9fc059138
        ret = 1
        ms = 0
        __func__ = "run_actions"
#33 0x0000564229768dbb in do_action (h=0x7ffe163fe490, a=0x7ff9fc05cd78, msg=0x7ff9fc09c150) at core/action.c:1058
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
              sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0, blst_imask = 0}}
        tmp = 0x7ffe163fe490 "\003"
        new_uri = 0x0
        end = 0x0
        crt = 0x7ff9fc09c150 "!\024"
        cmd = 0x0
        len = 32766
        user = 373285360
        uri = {user = {s = 0x0, len = 2}, passwd = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, host = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, port = {s = 0x7ffe163fda80 "\220\333?\026\376\177", len = 695690078}, params = {s = 0x0,
            len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 4228497744), transport = {s = 0x7ff9fbfd66c8 "\021", len = 373283504}, ttl = {s = 0x0, len = 0}, user_param = {
            s = 0xffffffff00000000 <error: Cannot access memory at address 0xffffffff00000000>, len = 0}, maddr = {s = 0x0, len = 2}, method = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, lr = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>,
            len = 6}, r2 = {s = 0x7ffe163fdb90 "\200\334?\026\376\177", len = 695691706}, gr = {s = 0x0, len = -66469552}, transport_val = {s = 0x7ff9fbfd66c8 "\021", len = 373286032}, ttl_val = {s = 0x0, len = 0}, user_param_val = {
            s = 0x2 <error: Cannot access memory at address 0x2>, len = 436769961}, maddr_val = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, method_val = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 6}, lr_val = {
            s = 0xf65c5881cc894a9 <error: Cannot access memory at address 0xf65c5881cc894a9>, len = 280007849}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x1700000303 <error: Cannot access memory at address 0x1700000303>, len = 31}, passwd = {s = 0x0, len = 0}, host = {
            s = 0x7ff9b06a6ff8 "w4nP\027C\022\035\310W\002\245ʷ\310ͣZCo\322\365\033U\211\260\355\273U\256\210\006\a\037\234\373;\217\067\rV_WK\376\225\233\002\351", <incomplete sequence \317>, len = -1335201800}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0},
          sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x7ff9fbfbbe98 "A\234.\366\371\177", len = 0}, user_param = {s = 0x0, len = 0}, maddr = {
            s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
          method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        u = 0x7ff9fbfd6818
        port = 0
        dst_host = 0x56422972ce86 <rval_expr_eval_int+154>
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
        sct = 0x7ffe163fdc80
        sjt = 0xffffffff
        rve = 0x7ff9fc045930
        mct = 0x0
        rv = 0x0
        rv1 = 0x0
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x0, len = 0}
        srevp = {0x0, 0x0}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#34 0x000056422977635e in run_actions (h=0x7ffe163fe490, a=0x7ff9fc05cd78, msg=0x7ff9fc09c150) at core/action.c:1564
        t = 0x7ff9fc05cd78
        ret = -1
        ms = 0
        __func__ = "run_actions"
#35 0x00005642297655ca in do_action (h=0x7ffe163fe490, a=0x7ff9fbfd82b8, msg=0x7ff9fc09c150) at core/action.c:691
        ret = -5
        v = 0
        dst = {send_sock = 0x7ffe0505e220, to = {s = {sa_family = 52220, sa_data = "\025\370\371\177\000\000\000\000\000\000\000\000\000"}, sin = {sin_family = 52220, sin_port = 63509, sin_addr = {s_addr = 32761}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {
              sin6_family = 52220, sin6_port = 63509, sin6_flowinfo = 32761, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 268435456}}, id = 0, proto = -128 '\200',
          send_flags = {f = 4067, blst_imask = 0}}
        tmp = 0x564229988366 <qm_malloc+2331> "H\213E\270H\203\300\070\351*\003"
        new_uri = 0x7ff9b08b0389 "branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: \"500\" <sip:500 at 192.168.128.27:60700;transport=tls;registering_acc=itec-support_sysconfig_co_uk>\r\nUser-Agent: servelin"...
        end = 0xfc0af860 <error: Cannot access memory at address 0xfc0af860>
        crt = 0x7ffe163fe420 ""
        cmd = 0xe8
        len = 0
        user = 697859842
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x10000000 <error: Cannot access memory at address 0x10000000>, len = 266547264}, host = {s = 0x400133310 <error: Cannot access memory at address 0x400133310>, len = 699405104}, port = {
            s = 0x1d2820 <error: Cannot access memory at address 0x1d2820>, len = 8}, params = {s = 0x7ffe163fe170 "", len = 698013910}, sip_params = {s = 0x7ffe163fe0c0 "\230\370\n\374\371\177", len = 697237500}, headers = {s = 0x0, len = 699362992}, port_no = 57712,
          proto = 5695, type = 32766, flags = (URI_SIP_USER_PHONE | unknown: 697859840), transport = {s = 0x7ff9fc0af898 "\001", len = -66386880}, ttl = {s = 0x7ffe163fe1c2 "\005\005\376\177", len = 373285315}, user_param = {s = 0x7ff9b08b04b6 "", len = -1333066871},
          maddr = {s = 0x564229b04cc0 <__func__.6670> "parse_via", len = 699412136}, method = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -68124656}, lr = {s = 0x0, len = 1}, r2 = {s = 0x0, len = -66386936}, gr = {
            s = 0x500000000000000 <error: Cannot access memory at address 0x500000000000000>, len = 373285308}, transport_val = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1333066877}, ttl_val = {
            s = 0x429ad4eb3 <error: Cannot access memory at address 0x429ad4eb3>, len = -1333066872}, user_param_val = {
            s = 0x7ff9b08b0388 ";branch=z9hG4bK-333030-3109134f06fadcab096c36c39025626a\r\nMax-Forwards: 69\r\nContact: \"500\" <sip:500 at 192.168.128.27:60700;transport=tls;registering_acc=itec-support_sysconfig_co_uk>\r\nUser-Agent: serveli"..., len = 5}, maddr_val = {
            s = 0x7ffe163fe300 " \344?\026\376\177", len = 698064145}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = -66389864}, r2_val = {s = 0x7ff9b08b04b6 "", len = -1333066904}, gr_val = {s = 0x0, len = -68124656}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T,
          flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {
            s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 697897400}, lr_val = {s = 0x7ffe163fe050 "", len = -68124656}, r2_val = {s = 0x0, len = -68124656}, gr_val = {
            s = 0x7ffe163fe090 "\300\340?\026\376\177", len = -132789252}}
        u = 0x7ffe163fe420
        port = 0
        dst_host = 0x8
        i = 15
        flags = 0
        avp = 0x7ff9b08b04b6
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
        sct = 0x0
        sjt = 0x5642298efffc <sr_event_exec+482>
        rve = 0x7ff9fbfd6818
        mct = 0x7ffe163fe250
        rv = 0x0
        rv1 = 0x7ff9fc0a3610
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>}
        s = {s = 0x0, len = 0}
        srevp = {0x0, 0x0}
        evp = {data = 0x0, rcv = 0x0, dst = 0x0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#36 0x000056422977635e in run_actions (h=0x7ffe163fe490, a=0x7ff9fbfd48f0, msg=0x7ff9fc09c150) at core/action.c:1564
        t = 0x7ff9fbfd82b8
        ret = 1
        ms = 0
        __func__ = "run_actions"
#37 0x0000564229776a82 in run_top_route (a=0x7ff9fbfd48f0, msg=0x7ff9fc09c150, c=0x0) at core/action.c:1646
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {2, 1109510072864117929, 94842167054003, 1073741824, 268435456, 6, 1109510072876700841, 6637667142142563497}, __mask_was_saved = 0, __saved_mask = {__val = {5910974510923775,
                  140729271706912, 140711585744231, 94842167054003, 0, 4611686022990790656, 140711652082000, 140729271707008, 94842164188576, 8523465072, 140711652082000, 1073741825, 0, 94842167054003, 2, 94842167054003}}}}}
        p = 0x7ffe163fe490
        ret = 268435456
        sfbk = 0
#38 0x0000564229899cd7 in receive_msg (
    buf=0x7ff9b08b0270 "SUBSCRIBE sip:229 at itec-support.sysconfig.co.uk SIP/2.0\r\nCall-ID: 0bba5e90e0a29ac9ce1c1475cce219a6 at 0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"500\" <sip:500 at itec-support.sysconfig.co.uk>;tag=219479eb\r\nT"..., len=582, rcv_info=0x7ff9b08aff90)
    at core/receive.c:340
        msg = 0x7ff9fc09c150
        ctx = {rec_lev = 699309230, run_flags = 22082, last_retcode = 2, jmp_env = {{__jmpbuf = {94842167054003, 1073741824, 268435456, 6, 140729271707520, 94842165376397, 140729271707328, 0}, __mask_was_saved = 9, __saved_mask = {__val = {140710385483640,
                  140710385484400, 8589935174, 240518234113, 140710385484400, 9, 140710385484410, 36, 140710385484447, 7, 64, 94842167054003, 140710396387576, 2701802864640, 16383, 140710382972520}}}}}
        bctx = 0x2163fe970
        ret = 32761
        stats_on = 0
        tvb = {tv_sec = 232196669440, tv_usec = 140710385484454}
        tve = {tv_sec = 17879092915, tv_usec = 140710385484982}
        tz = {tz_minuteswest = -1333067142, tz_dsttime = 32761}
        diff = 0
        inb = {s = 0x7ff9b08b0270 "SUBSCRIBE sip:229 at itec-support.sysconfig.co.uk SIP/2.0\r\nCall-ID: 0bba5e90e0a29ac9ce1c1475cce219a6 at 0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"500\" <sip:500 at itec-support.sysconfig.co.uk>;tag=219479eb\r\nT"..., len = 582}
        netinfo = {data = {s = 0x564229ad4eb3 "INFO", len = 1073741824}, rcv = 0x10000000, dst = 0x7ff9b08b02a8}
        keng = 0x0
        evp = {data = 0x7ffe163fe610, rcv = 0x7ff9b08aff90, dst = 0x0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        __func__ = "receive_msg"
#39 0x0000564229946431 in receive_tcp_msg (
    tcpbuf=0x7ff9b08b0270 "SUBSCRIBE sip:229 at itec-support.sysconfig.co.uk SIP/2.0\r\nCall-ID: 0bba5e90e0a29ac9ce1c1475cce219a6 at 0:0:0:0:0:0:0:0\r\nCSeq: 1 SUBSCRIBE\r\nFrom: \"500\" <sip:500 at itec-support.sysconfig.co.uk>;tag=219479eb\r\nT"..., len=582,
    rcv_info=0x7ff9b08aff90, con=0x7ff9b08aff78) at core/tcp_read.c:1399
        buf = 0x0
        bsize = 0
        blen = 582
        __func__ = "receive_tcp_msg"
#40 0x0000564229948a39 in tcp_read_req (con=0x7ff9b08aff78, bytes_read=0x7ffe163fea00, read_flags=0x7ffe163fe9f8) at core/tcp_read.c:1631
        bytes = 582
        total_bytes = 582
        resp = 1
        size = 0
        req = 0x7ff9b08afff8
        dst = {send_sock = 0x7ffe163fe9f0, to = {s = {sa_family = 104, sa_data = "\213\260\371\177\000\000\000\000\000\000\001 \000"}, sin = {sin_family = 104, sin_port = 45195, sin_addr = {s_addr = 32761}, sin_zero = "\000\000\000\000\001 \000"}, sin6 = {
              sin6_family = 104, sin6_port = 45195, sin6_flowinfo = 32761, sin6_addr = {__in6_u = {__u6_addr8 = "\000\000\000\000\001 \000\000\200\300\f\374\371\177\000", __u6_addr16 = {0, 0, 8193, 0, 49280, 64524, 32761, 0}, __u6_addr32 = {0, 8193, 4228694144, 32761}}},
              sin6_scope_id = 373287104}}, id = 32766, proto = 1 '\001', send_flags = {f = 0, blst_imask = 80}}
        c = 67 'C'
        ret = 0
        __func__ = "tcp_read_req"
#41 0x000056422994c596 in handle_io (fm=0x7ff9fc0cc080, events=1, idx=-1) at core/tcp_read.c:1862
        ret = 0
        n = 22082
        read_flags = 1
        con = 0x7ff9b08aff78
        s = 0
        resp = 1
        t = 80
        __func__ = "handle_io"
#42 0x0000564229939499 in io_wait_loop_epoll (h=0x564229ddb000 <io_w>, t=2, repeat=0) at core/io_wait.h:1065
        n = 1
        r = 0
        fm = 0x7ff9fc0cc080
        revents = 1
        __func__ = "io_wait_loop_epoll"
#43 0x000056422994d943 in tcp_receive_loop (unix_sock=69) at core/tcp_read.c:1974
        __func__ = "tcp_receive_loop"
#44 0x00005642298029b9 in tcp_init_children () at core/tcp_main.c:4853
        r = 2
        i = 15
        reader_fd_1 = 69
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\000\000\000@\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000@\354?\026\376\177\000\000\331\350\203)BV\000\000\000\000\000\000\000\000\000\000\033\037\217)BV\000\000q]\255)BV\000\000\001\000\00                                           0\000\000\000\000\000\217\005\247)\000\000\000\000\360\224\374\373\371\177\000\000\061\000\000\000\062\000\000\000\300\317\376\v\372\177\000"
        si = 0x0
        __func__ = "tcp_init_children"
#45 0x00005642296fec7e in main_loop () at main.c:1711
        i = 16
        pid = 34967
        si = 0x0
        si_desc = "udp receiver child=15 sock=127.0.0.20:5088 (62.231.137.101:5070)\000\067\060)\000\000\000\000\000\000\000\020\000\000\000\000\006\000\000\000\000\000\000\000O\320\376\v\372\177\000\000\060\355?\026\376\177\000\000\060\000\000\000\060\000\000\000\320\355?\                                           026\376\177\000\000\360\305\a\374\371\177\000"
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#46 0x0000564229705b9d in main (argc=13, argv=0x7ffe163ff068) at main.c:2645
        cfg_stream = 0x56422abe1010
        c = -1
        r = 0
        tmp = 0x7ffe163ffe5e ""
        tmp_len = 32766
        port = 373288608
        proto = 32762
        options = 0x564229a710a0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 3543135325
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0xf0b2ff <error: Cannot access memory at address 0xf0b2ff>
        st = {st_dev = 19, st_ino = 151468387, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_mtim = {tv_sec = 1550207150,
            tv_nsec = 472559347}, st_ctim = {tv_sec = 1550207150, tv_nsec = 472559347}, __glibc_reserved = {0, 0, 0}}
        __func__ = "main"

  info locals
cfg_stream = 0x56422abe1010
c = -1
r = 0
tmp = 0x7ffe163ffe5e ""
tmp_len = 32766
port = 373288608
proto = 32762
options = 0x564229a710a0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 3543135325
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x0
p = 0xf0b2ff <error: Cannot access memory at address 0xf0b2ff>
st = {st_dev = 19, st_ino = 151468387, st_nlink = 2, st_mode = 16872, st_uid = 0, st_gid = 1, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_mtim = {tv_sec = 1550207150, tv_nsec = 472559347}, st_ctim = {tv_sec = 1550207150,
    tv_nsec = 472559347}, __glibc_reserved = {0, 0, 0}}
__func__ = "main"

  list
1835            FILE* cfg_stream;
1836            int c,r;
1837            char *tmp;
1838            int tmp_len;
1839            int port;
1840            int proto;
1841            char *options;
1842            int ret;
1843            unsigned int seed;
1844            int rfd;

```

#### Log Messages

<!--
Check the syslog file and if there are relevant log messages printed by Kamailio, add them next, or attach to issue, or provide a link to download them (e.g., to a pastebin site).
-->

```

Feb 20 13:55:55 PBXxxxx kernel: [5243784.004500] kamailio[35028]: segfault at 7ff9ef2c3000 ip 00007ff9faf54645 sp 00007ffe163f98d8 error 4 in libcrypto.so.1.1[7ff9faebe000+2b1000]
Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Main process exited, code=exited, status=1/FAILURE
Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Unit entered failed state.
Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Failed with result 'exit-code'.
Feb 20 13:55:58 PBXxxxx systemd[1]: kamailio.service: Service hold-off time over, scheduling restart.
Feb 20 13:55:58 PBXxxxx systemd[1]: Stopped Kamailio (OpenSER) - the Open Source SIP Server.
Feb 20 13:55:58 PBXxxxx systemd[1]: Starting Kamailio (OpenSER) - the Open Source SIP Server...

Feb 20 13:55:55 PBXxxxx /usr/local/kamailio/sbin/kamailio[35065]: ERROR: tls [tls_util.h:42]: tls_err_ret(): TLS read:error:24067044:random number generator:rand_pool_add:internal error
Feb 20 13:55:55 PBXxxxx /usr/local/kamailio/sbin/kamailio[35065]: ERROR: <core> [core/tcp_read.c:1505]: tcp_read_req(): ERROR: tcp_read_req: error reading - c: 0x7ff9b1f22340 r: 0x7ff9b1f223c0 (-1)
Feb 20 13:55:56 PBXxxxx /usr/local/kamailio/sbin/kamailio[35069]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 65
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: ALERT: <core> [main.c:740]: handle_sigs(): child process 37534 exited by a signal 11
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: ALERT: <core> [main.c:743]: handle_sigs(): core was generated
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37388]: INFO: <core> [main.c:766]: handle_sigs(): terminating due to SIGCHLD
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37575]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37561]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37554]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37544]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37538]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37570]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37541]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37573]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37567]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37559]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37564]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37536]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37557]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37528]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37550]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37517]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37487]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37505]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37483]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37496]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37520]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37401]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37525]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37450]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37509]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37546]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37531]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37480]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37477]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37490]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37522]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37453]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37405]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37474]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37465]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37518]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37499]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37471]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37468]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37502]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37493]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37459]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37456]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37398]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37462]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37436]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37444]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37442]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37439]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37430]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37421]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37433]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37427]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37424]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37415]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37403]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37399]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37411]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37446]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37408]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
Feb 20 13:56:11 PBXxxxx /usr/local/kamailio/sbin/kamailio[37418]: INFO: <core> [main.c:821]: sig_usr(): signal 15 received
```

#### SIP Traffic

Don't currently have, can capture if required.

### Possible Solutions

TBD

### Additional Information

  * **Kamailio Version** - output of `kamailio -v`

```
version: kamailio 5.2.0-rc0 (x86_64/linux) 398698
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144 MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: 398698
compiled on 15:33:07 Nov 16 2018 with gcc 6.3.0
```

* **Operating System**:


```
Linux C1PBX0202 4.9.0-8-amd64 #1 SMP Debian 4.9.130-2 (2018-10-27) x86_64 GNU/Linux
```


-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1860
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-dev/attachments/20190220/be6c05bb/attachment-0001.html>


More information about the sr-dev mailing list