[sr-dev] [kamailio/kamailio] Kamailio 5.5.0 -[core/mem/q_malloc.c:501]: qm_free(): BUG: bad pointer crash after upgrading system to Debian 10 (Buster) (#2746)

melekoktay notifications at github.com
Wed May 26 13:12:15 CEST 2021


Kamailio 5.5.0 -[core/mem/q_malloc.c:501]: qm_free(): BUG: bad pointer crash after upgrading system to Debian 10 (Buster)

### Description

Upgrading Kamailio service Debian 10 and crash occurs.
Crash occurs where Json event is sent over the CURL library which works on OpenSSL.
If  upgrade curl library 7.76.1 and configure --disable-openssl-auto-load-config , 
and downgrading openssl OpenSSL 1.1.1d  --> OpenSSL 1.0.2r no crash occurs !

It was tested on Kamailio 5.5.0 and Kamailio 5.4.2 , result is same

### Troubleshooting

Looks like incompatibilities between CURL , OpenSSL and Kamailio 

#### Reproduction

It is test for Kamailio 5.5.0 and Kamilio 5.4.2, unfortunatelly same crash occurs on both sides.

#### Debugging Data

```
GNU gdb (Debian 8.2.1-2+b3) 8.2.1
Copyright (C) 2018 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
    <http://www.gnu.org/software/gdb/documentation/>.

For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/local/sbin/kamailio...done.
[New LWP 4958]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/local/sbin/kamailio -P /var/run/kamailio/kamailio.pid -f /usr/local/etc/ka'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
(gdb) 

================================================================================
# GDB session generated by FS backtrace-from-core
================================================================================


================================================================================
# info threads
================================================================================
  Id   Target Id                        Frame 
* 1    Thread 0x7f10c41f5100 (LWP 4958) 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
================================================================================
# bt
================================================================================
#0  0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#1  0x00007f10c36877ed in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#2  0x00007f10c3686dc5 in CONF_modules_load () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#3  0x00007f10c368738b in CONF_modules_load_file () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#4  0x00007f10bfd9331e in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
#5  0x00007f10bfd592cf in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
#6  0x00007f10bfd59598 in curl_easy_init () from /lib/x86_64-linux-gnu/libcurl.so.4
#7  0x00007f10bfdfa9f4 in vg_call_event_api (pjson=0x7ffc6386abf0 "{\"version\":\"1.0\",\"eventcode\":\"300\",\"data\":{\"ip_address\":\"56.100.82.107\",\"username\":\"1007\",\"apiuserkey\":\"7f813a24-83e1-bc34-d4d1-293a4f84c5f6\"}}", event_url=...) at event.c:52
#8  0x00007f10bfdfae0d in vg_send_notallowed_user_from_ip_event (eventCode=300, szIpAddress=0x55fedfe1b4c0 <buff> "56.100.82.107", szUserName=0x7ffc6386ba60 "1007", szApiUserKey=0x7ffc6386b970 "7f813a24-83e1-bc34-d4d1-293a4f84c5f6") at event.c:139
#9  0x00007f10bfde867a in vg_digest_authenticate_hdr (msg=0x7f10c3f80908, realm=0x7ffc6386bd20, hftype=HDR_AUTHORIZATION_T, method=0x7f10c3f80930, ahdr=0x7ffc6386bd18) at vg_auth.c:431
#10 0x00007f10bfde8d60 in w_vg_auth (pmsg=0x7f10c3f80908) at vg_auth.c:530
#11 0x000055fedf920f8f in do_action (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1076
#12 0x000055fedf92f857 in run_actions (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1581
#13 0x000055fedf92ff45 in run_actions_safe (h=0x7ffc6386e3a0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1645
#14 0x000055fedf8e209c in rval_get_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, i=0x7ffc6386ca64, rv=0x7f10c3c30c28, cache=0x0) at core/rvalue.c:949
#15 0x000055fedf8e7293 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386ca64, rve=0x7f10c3c30c20) at core/rvalue.c:1947
#16 0x000055fedf8e7719 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386cf9c, rve=0x7f10c3c31350) at core/rvalue.c:1955
#17 0x000055fedf920a0a in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c31ef0, msg=0x7f10c3f80908) at core/action.c:1052
#18 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3c225b8, msg=0x7f10c3f80908) at core/action.c:1581
#19 0x000055fedf920efb in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c37010, msg=0x7f10c3f80908) at core/action.c:1067
#20 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3bf94d8, msg=0x7f10c3f80908) at core/action.c:1581
#21 0x000055fedf91d0ee in do_action (h=0x7ffc6386e3a0, a=0x7f10c3ac9fd0, msg=0x7f10c3f80908) at core/action.c:700
#22 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3ac9b60, msg=0x7f10c3f80908) at core/action.c:1581
#23 0x000055fedf93000d in run_top_route (a=0x7f10c3ac9b60, msg=0x7f10c3f80908, c=0x0) at core/action.c:1666
#24 0x000055fedfaa8603 in receive_msg (buf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007 at 88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908) at core/receive.c:501
#25 0x000055fedfb6c007 in receive_tcp_msg (tcpbuf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007 at 88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908, con=0x7f10a11dc8f0) at core/tcp_read.c:1383
#26 0x000055fedfb6e8d3 in tcp_read_req (con=0x7f10a11dc8f0, bytes_read=0x7ffc6386ea84, read_flags=0x7ffc6386ea7c) at core/tcp_read.c:1607
#27 0x000055fedfb730ec in handle_io (fm=0x7f10c3f93428, events=1, idx=-1) at core/tcp_read.c:1857
#28 0x000055fedfb5dd3a in io_wait_loop_epoll (h=0x55fedfe32220 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
#29 0x000055fedfb74c0e in tcp_receive_loop (unix_sock=89) at core/tcp_read.c:1978
#30 0x000055fedf9f8f73 in tcp_init_children (woneinit=0x7ffc6386ee3c) at core/tcp_main.c:5139
#31 0x000055fedf8b8d96 in main_loop () at main.c:1857
#32 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
================================================================================
# bt full
================================================================================
#0  0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#1  0x00007f10c36877ed in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#2  0x00007f10c3686dc5 in CONF_modules_load () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#3  0x00007f10c368738b in CONF_modules_load_file () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#4  0x00007f10bfd9331e in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
No symbol table info available.
#5  0x00007f10bfd592cf in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
No symbol table info available.
#6  0x00007f10bfd59598 in curl_easy_init () from /lib/x86_64-linux-gnu/libcurl.so.4
No symbol table info available.
#7  0x00007f10bfdfa9f4 in vg_call_event_api (pjson=0x7ffc6386abf0 "{\"version\":\"1.0\",\"eventcode\":\"300\",\"data\":{\"ip_address\":\"56.100.82.107\",\"username\":\"1007\",\"apiuserkey\":\"7f813a24-83e1-bc34-d4d1-293a4f84c5f6\"}}", event_url=...) at event.c:52
        __func__ = "vg_call_event_api"
        curl = 0x7ffc6386ac90
#8  0x00007f10bfdfae0d in vg_send_notallowed_user_from_ip_event (eventCode=300, szIpAddress=0x55fedfe1b4c0 <buff> "56.100.82.107", szUserName=0x7ffc6386ba60 "1007", szApiUserKey=0x7ffc6386b970 "7f813a24-83e1-bc34-d4d1-293a4f84c5f6") at event.c:139
        szDataBuffer = "{\"version\":\"1.0\",\"eventcode\":\"300\",\"data\":{\"ip_address\":\"56.100.82.107\",\"username\":\"1007\",\"apiuserkey\":\"7f813a24-83e1-bc34-d4d1-293a4f84c5f6\"}}", '\000' <repeats 350 times>
#9  0x00007f10bfde867a in vg_digest_authenticate_hdr (msg=0x7f10c3f80908, realm=0x7ffc6386bd20, hftype=HDR_AUTHORIZATION_T, method=0x7f10c3f80930, ahdr=0x7ffc6386bd18) at vg_auth.c:431
        iExtType = 100
        chRegister = 0 '\000'
        IsRegistered = 0 '\000'
        chGlobalAllowedIp = 0 '\000'
        chSiptrunk = 0 '\000'
        IsAllowed = 0 '\000'
        chAllow = 1 '\001'
        chRegisterEventEnabled = 1 '\001'
        res = 0x7f10c3dc9a38
        rest = 0x0
        pCon = 0x7f10c3e227a8
        resp = "\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\300\274\206c\374\177\000\000x#\336\277\020\177\000\000"
        hent = "\000\000\000\000\000\000\000\000\207\204\343\277\000\000\000\000\223\260\321\337\376U\000\000\210\246\202\237\020\177\000\000"
        password = {s = 0x0, len = -1012242104}
        ha1 = "\000\000\000\000\000\000\000\000\220\274\206c\374\177\000\000H\274\206c\374\177\000\000\b\t\370\303\020\177", '\000' <repeats 18 times>, "\060\274\206c\374\177\000\000\260\274\206c\374\177", '\000' <repeats 58 times>, "\210\246\202\237\020\177\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\000\274\206c\374\177\000\000\343J\257\337\376U\000\000\000\000\000\000\000\000\000\000\220\274\206c\374\177\000\000\060\274\206c\374\177\000\000"...
        szUserName = "1007", '\000' <repeats 70 times>
        szPassword = '\000' <repeats 79 times>
        szDomain = "mahmut.voip.com", '\000' <repeats 63 times>
        szApiUserKey = "7f813a24-83e1-bc34-d4d1-293a4f84c5f6", '\000' <repeats 43 times>
        szQuery = "SELECT  1::integer as tt , ex.username::text , ex.password::text , ex.exttype::integer , ep.param_value::text as tt2 , ep2.param_value::text , lc.id::integer , ( SELECT COUNT( type ) FROM vg_ipaccepts"...
        h = 0x7f10c3e20ad0
        cred = 0x7f10c3e21020
        cd = 0x7f10c2af3cf7 <pv_get_ruri_attr>
        ret = -3
        iTenantNo = 1293
        iExt = 7
        iSub = 0
        iRealmLen = 17
        iUserLen = 10
        pIP = 0x55fedfe1b4c0 <buff> "56.100.82.107"
        __func__ = "vg_digest_authenticate_hdr"
        chIsTrunk = 0 '\000'
#10 0x00007f10bfde8d60 in w_vg_auth (pmsg=0x7f10c3f80908) at vg_auth.c:530
        srealm = {s = 0x7ffc6386bce0 "mahmut.voip.com", len = 16}
        ret = -1
        hdr = 0x7f10c3e20ad0
        uri = 0x0
        turi = 0x0
        furi = 0x0
        szDomain = "mahmut.voip.com\000\276\206c\374\177\000\000\234 \216\337\376U", '\000' <repeats 19 times>
#11 0x000055fedf920f8f in do_action (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1076
        ret = -5
        v = 0
        dst = {send_sock = 0x55fedfd1b093, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000\214\302\206c\374\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\214\302\206c\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\214\302\206c\374\177\000\000\034\256Nd\026\000\000", __u6_addr16 = {49804, 25478, 32764, 0, 44572, 25678, 22, 0}, __u6_addr32 = {1669776012, 32764, 1682877980, 22}}}, sin6_scope_id = 3756532656}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000\214\302\206c\374\177\000\000\034\256Nd\026\000\000\000\260#\350\337\376U\000\000\000\000\000\000\000\000\000\000\f\000\000\000\000\000\000\000s\374d\303\000\000\000\000\346\000\000\000\000\000\000\000\005", '\000' <repeats 15 times>, "+\302\206c\374\177\000\000\005\000\000\000\000\000\000\000\005\000\000\000\000\000\000\000\005", '\000' <repeats 11 times>, "\017\000\000", __ss_align = 4294967296}}, id = -1618827640, send_flags = {f = 32528, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x55fedf8e237e <rval_get_int+1054> "\351\250\003"
        new_uri = 0x0
        end = 0x0
        crt = 0x7ffc6386c4f0 "`Ɔc\374\177"
        cmd = 0x7f10c3ab6470
        len = 32764
        user = 1669776480
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 230, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 3279052244), transport = {s = 0x7f10a16c86c0 "(", len = -1586934880}, ttl = {s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = -1586934560}, user_param = {s = 0x7f10a1694d00 "\036\033\373\005\\^\247\312\066_J\241ٰ\020\006\275N\341ZX\230\034\344\317䉲\222\376\223\273(D\261\244\205\356\267\314r\252h\350\312f\217_\016\034K\226L\212\026\232 }\217\344罋kr\216[\212裑ؖ\334f\204\253`\265e.a\304r\253\067\235\361\344R=\016C\303$\275", len = -1015910656}, maddr = {s = 0x0, len = -1618827640}, method = {s = 0x0, len = -1003578192}, lr = {s = 0x55fedfd1b093 "INFO", len = 536870912}, r2 = {s = 0x7ffc6386c270 " Ɇc\374\177", len = -544311144}, gr = {s = 0x7f10a1009978 "\340\346\204\303\020\177", len = -1618827640}, transport_val = {s = 0x0, len = -1003578192}, ttl_val = {s = 0x7f10c3c2ace0 "\017", len = 1669777244}, user_param_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, maddr_val = {s = 0x7f10a1296790 "T", len = -1007154936}, method_val = {s = 0x7f10c3c16930 "\305\004", len = 1669784480}, lr_val = {s = 0x0, len = -1}, r2_val = {s = 0x7f109f82a688 "", len = 20229660}, gr_val = {s = 0x0, len = -1003578192}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 1669775904}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = -539810039}, user_param = {s = 0x12500000187 <error: Cannot access memory at address 0x12500000187>, len = -539810039}, maddr = {s = 0x143000001ff <error: Cannot access memory at address 0x143000001ff>, len = -1081640172}, method = {s = 0x7f10a16c8630 "(", len = -1618827640}, lr = {s = 0x0, len = -1003578192}, r2 = {s = 0x55fedfd1b093 "INFO", len = 536870912}, gr = {s = 0x7ffc6386c100 "p\302\206c\374\177", len = -544311477}, transport_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, ttl_val = {s = 0x7ffc6386c140 "\b\t\370\303\020\177", len = -544016297}, user_param_val = {s = 0x7f10c3c2a5b0 "\004", len = 1669775904}, maddr_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1007154936}, lr_val = {s = 0x7f10c3c16930 "\305\004", len = 1669775728}, r2_val = {s = 0x7ffc6386c110 "x\231", len = -1016937788}, gr_val = {s = 0x0, len = 0}}
        u = 0x55fedfd1b093
        port = 0
        dst_host = 0x55fedfd1b093
        i = -542149130
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
        sct = 0x7f10c3c1ad08
        sjt = 0x55fedf920a0a <do_action+36269>
        rve = 0x7f10c3e1ab18
        mct = 0x7ffc6386c920
        rv = 0x7ffc6386e3a0
        rv1 = 0x7f109f82a688
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = "\200\236\302\303\020\177\000\000\264\300\206c\374\177\000\000\b\t\370\303\020\177"}
        s = {s = 0x7ffc6386bf90 "", len = -544312685}
        srevp = {0x55fedfd1b093, 0x20000000}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x000055fedf92f857 in run_actions (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1581
        t = 0x7f10c3c309b0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1013718290, tz_dsttime = 32528}
        tdiff = 2489880
        __func__ = "run_actions"
#13 0x000055fedf92ff45 in run_actions_safe (h=0x7ffc6386e3a0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {139709372343944, -3845379250411229668, 0, 139709987593392, 94553165115539, 536870912, -3845379250360898020, -7014620463946093028}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 0, 139709372343944, 0, 139709987593392, 94553165115539, 536870912, 140721978263504, 94553160710168, 139709982158504, 139709978193936, 140721978263264, 139709965129784, 139709980502408}}}}}
        ret = 1669777648
        ign_on_break = 0
#14 0x000055fedf8e209c in rval_get_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, i=0x7ffc6386ca64, rv=0x7f10c3c30c28, cache=0x0) at core/rvalue.c:949
        r_avp = 0x800600000020
        avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 2490832}, re = 0x1}
        pval = {rs = {s = 0x7ffc6386c7a0 "\377\377\377\377\374\177", len = -1026041800}, ri = -1009012800, flags = 32528}
        tmp = {s = 0x7f10c3dc9a00 "H\a", len = -1012977648}
        s = 0x0
        r = 0
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#15 0x000055fedf8e7293 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386ca64, rve=0x7f10c3c30c20) at core/rvalue.c:1947
        i1 = 0
        i2 = 0
        ret = -1
        c1 = {cache_type = 3284315360, val_type = 32528, c = {avp_val = {n = 1669779356, s = {s = 0x7ffc6386cf9c "\001", len = 0}, re = 0x7ffc6386cf9c}, pval = {rs = {s = 0x7ffc6386cf9c "\001", len = 0}, ri = -1003578192, flags = 32528}}, i2s = "\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\200Ɇc\374\177"}
        c2 = {cache_type = 1669777792, val_type = 32764, c = {avp_val = {n = -541436525, s = {s = 0x55fedfba5593 <qm_free+7942> "\353\a\220\353\004\220\353\001\220H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>, len = -1008952776}, re = 0x55fedfba5593 <qm_free+7942>}, pval = {rs = {s = 0x55fedfba5593 <qm_free+7942> "\353\a\220\353\004\220\353\001\220H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>, len = -1008952776}, ri = -1012977648, flags = 32528}}, i2s = "]\346\223\303\020\177\000\000\020\060\237Ë\000\000\000(\354\223\303\020\177"}
        rv1 = 0xc39f4240
        rv2 = 0x29c39f3980
        __func__ = "rval_expr_eval_int"
#16 0x000055fedf8e7719 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386cf9c, rve=0x7f10c3c31350) at core/rvalue.c:1955
        i1 = 0
        i2 = -539905901
        ret = -1
        c1 = {cache_type = 1669778112, val_type = 32764, c = {avp_val = {n = -1013256867, s = {s = 0x7f10c39aed5d <db_postgres_free_result+1788> "\270", len = -1008594912}, re = 0x7f10c39aed5d <db_postgres_free_result+1788>}, pval = {rs = {s = 0x7f10c39aed5d <db_postgres_free_result+1788> "\270", len = -1008594912}, ri = -1008588888, flags = 32528}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 1669778128, val_type = 32764, c = {avp_val = {n = -1008588888, s = {s = 0x7f10c3e227a8 "", len = 1669777920}, re = 0x7f10c3e227a8}, pval = {rs = {s = 0x7f10c3e227a8 "", len = 1669777920}, ri = -1618827640, flags = 32528}}, i2s = "\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U"}
        rv1 = 0x7ffc6386d2c8
        rv2 = 0x7f10c39a83df <db_postgres_submit_query>
        __func__ = "rval_expr_eval_int"
#17 0x000055fedf920a0a in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c31ef0, msg=0x7f10c3f80908) at core/action.c:1052
        ret = -5
        v = 1
        dst = {send_sock = 0x203d3e3e2070695f, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\060\320\300\303\020\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "0\320\300\303\020\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "0\320\300\303\020\177\000\000\244҆c\374\177\000", __u6_addr16 = {53296, 50112, 32528, 0, 53924, 25478, 32764, 0}, __u6_addr32 = {3284193328, 32528, 1669780132, 32764}}}, sin6_scope_id = 3287812360}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\060\320\300\303\020\177\000\000\244҆c\374\177\000\000\b\t\370\303\020\177\000\000\240\343\206c\374\177\000\000UNT(callid)::integer , '' , \017\000\000\000ROM vg_p\210\246\202\237\020\177\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \020\000\000", __ss_align = 17179869185}}, id = 1669780132, send_flags = {f = 32764, blst_imask = 0}, proto = 36 '$', proto_pad0 = -48 '\320', proto_pad1 = 25478}
        tmp = 0x7f10c3bf99c8 "\002"
        new_uri = 0x7f10c3bf9890 "\001"
        end = 0x7ffc6386d190 ""
        crt = 0x7f10c3bf9a60 "\a"
        cmd = 0x7f10c3c18828
        len = 22014
        user = -543945635
        uri = {user = {s = 0x2064696b6e757274 <error: Cannot access memory at address 0x2064696b6e757274>, len = 807419169}, passwd = {s = 0xffffffff70692064 <error: Cannot access memory at address 0xffffffff70692064>, len = 0}, host = {s = 0x7f10c3c16b70 "\004", len = 1669779764}, port = {s = 0x7f10c3f80908 "\b", len = 1669784480}, params = {s = 0x55fedfd1b093 "INFO", len = 536870912}, sip_params = {s = 0x7ffc6386cee0 "\b\t\370\303\020\177", len = -544014523}, headers = {s = 0x46202727202c2027 <error: Cannot access memory at address 0x46202727202c2027>, len = -1007154936}, port_no = 52720, proto = 50112, type = 32528, flags = (unknown: 1669784480), transport = {s = 0x0, len = -1}, ttl = {s = 0x7f109f82a688 "", len = 404008476}, user_param = {s = 0x0, len = -1003578192}, maddr = {s = 0x55fedfd1b093 "INFO", len = 536870912}, method = {s = 0xcaa277f21b14ae1c <error: Cannot access memory at address 0xcaa277f21b14ae1c>, len = 1682877980}, lr = {s = 0x204d4f5200000000 <error: Cannot access memory at address 0x204d4f5200000000>, len = 1633642358}, r2 = {s = 0x0, len = 0}, gr = {s = 0x3d206e69616d6f64 <error: Cannot access memory at address 0x3d206e69616d6f64>, len = -1618827640}, transport_val = {s = 0x0, len = -1003578192}, ttl_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, user_param_val = {s = 0x7ffc6386d010 "\200цc\374\177", len = -544312685}, maddr_val = {s = 0x2072656765746e69 <error: Cannot access memory at address 0x2072656765746e69>, len = 656875564}, method_val = {s = 0x76204d4f52462027 <error: Cannot access memory at address 0x76204d4f52462027>, len = 1885953895}, lr_val = {s = 0x7f10c3c16b68 "\001", len = 1669779764}, r2_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, gr_val = {s = 0x55fedfe823b0 <ut_buf_int2str> "", len = 0}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffc6386ccac "\362w\242", <incomplete sequence \312>, len = -1618827640}, host = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, port = {s = 0x55fedfd1b093 "INFO", len = -1618827640}, params = {s = 0x0, len = -1003578192}, sip_params = {s = 0x55fedfd1b093 "INFO", len = 536870912}, headers = {s = 0x7ffc6386cd70 "\240Άc\374\177", len = -544014523}, port_no = 52416, proto = 25478, type = 32764, flags = (unknown: 3287812360), transport = {s = 0x7f10c3c16350 "\302\004", len = 1669784480}, ttl = {s = 0x0, len = 1}, user_param = {s = 0x7f109f82a688 "", len = 460631580}, maddr = {s = 0x0, len = -1003578192}, method = {s = 0x55fedfd1b093 "INFO", len = 536870912}, lr = {s = 0xcaa277f21674ae1c <error: Cannot access memory at address 0xcaa277f21674ae1c>, len = 1682877980}, r2 = {s = 0x7f1000000000 <error: Cannot access memory at address 0x7f1000000000>, len = -1007154936}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x6776204e494f4a20 <error: Cannot access memory at address 0x6776204e494f4a20>, len = -1618827640}, ttl_val = {s = 0x0, len = -1003578192}, user_param_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, maddr_val = {s = 0x7ffc6386cea0 "\020Іc\374\177", len = -544312685}, method_val = {s = 0x20657079742e736c <error: Cannot access memory at address 0x20657079742e736c>, len = -1618827640}, lr_val = {s = 0x0, len = -542149130}, r2_val = {s = 0x0, len = 1}, gr_val = {s = 0x7ffc6386cea0 "\020Іc\374\177", len = -544333668}}
        u = 0x7ffc6386d210
        port = 0
        dst_host = 0x2e6665727065203d
        i = 1669779856
        flags = 0
        avp = 0x55fedfd1b093
        st = {flags = 0, id = 0, name = {n = -1618827640, s = {s = 0x7f109f82a688 "", len = 0}, re = 0x7f109f82a688}, avp = 0x7f10c42e9cb0 <__syslog>}
        sct = 0x7ffc6386d024
        sjt = 0x0
        rve = 0x7f10c3c31350
        mct = 0x0
        rv = 0xf00000000
        rv1 = 0x55fedfaf75f6 <pv_value_destroy+175>
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 1669726208}, re = 0x0}, pval = {rs = {s = 0x0, len = 1669726208}, ri = -541825017, flags = 22014}}, i2s = "mahmut.voip.com\000\000\000\000\000"}
        s = {s = 0x0, len = 0}
        srevp = {0x55fe00000000, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#18 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3c225b8, msg=0x7f10c3f80908) at core/action.c:1581
        t = 0x7f10c3c31ef0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 0
        __func__ = "run_actions"
#19 0x000055fedf920efb in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c37010, msg=0x7f10c3f80908) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x7ffc6386e3b0 "\210\246\202\237\020\177"
        cmd = 0x7f10c3ab64a8
        len = 0
        user = 1
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x1700000303 <error: Cannot access memory at address 0x1700000303>, len = 87}, host = {s = 0x0, len = 0}, port = {s = 0x7f10a129a940 "\212\330[\031#\375\370\245\067j\337\071\250\337\025-\342\267\333\334\340\023\301\210\356Z\354\320\306\022\352G31i\224\312\025=/\237]E\353\035\367Y\224\224\316\022\345?b,\344\352\361_:s\260\214\306څ\216(?\337C\200\002i:%\276_\030)\234ֿ\212&NUY\346\200\"V\313\365\365WN\364\260\004G\264\375\374#\371\353\363\341\353ϼ\377=\335Ps\023\343\316ߚ?\312P6\035\207cc\267=Q\377\346\a\235\327e\247l\020\352C+=Ow\356\004\201\003(\255؉D\355>\325Kw\351$\306\377\301\024\360:\212^\201\314\357\352\317E\301\374\346hC\212\370\216\327%V\032ou\330\062\325\030ܧs\275"..., len = -1591105216}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7ffc6386d4c0 "\020", len = 0}, passwd = {s = 0x7ffc6386d4c4 "", len = 0}, host = {s = 0x7f10a16f23d0 "\340\346\204\303\020\177", len = 1669780672}, port = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -1015996900}, params = {s = 0x7f10a16f23d0 "\340\346\204\303\020\177", len = -1590211304}, sip_params = {s = 0x7f10a1375aa0 "\003\003", len = -1014345500}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1669780747}, port_no = 12, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3278175344), transport = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 5}, ttl = {s = 0x0, len = 1669780747}, user_param = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 5}, maddr = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, method = {s = 0x0, len = 394917407}, lr = {s = 0x5aad993cdf85fc4f <error: Cannot access memory at address 0x5aad993cdf85fc4f>, len = -421945278}, r2 = {s = 0x7ffc6386d5b8 " ", len = -462440448}, gr = {s = 0x0, len = -1590211304}, transport_val = {s = 0x7f10a1375aa0 "\003\003", len = -1590207840}, ttl_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1669780920}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1014350068}, maddr_val = {s = 0x7f10a1375aa0 "\003\003", len = 32}, method_val = {s = 0x7f10a1375aa0 "\003\003", len = -1587508776}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 32}}
        u = 0x0
        port = 0
        dst_host = 0x0
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 2705394080, id = 32528, name = {n = 1669780672, s = {s = 0x7ffc6386d4c0 "\020", len = -1586551856}, re = 0x7ffc6386d4c0}, avp = 0x7f10c370387b}
        sct = 0x0
        sjt = 0x0
        rve = 0x7f10c3c1a4e8
        mct = 0x0
        rv = 0x0
        rv1 = 0x0
        c1 = {cache_type = 16, val_type = RV_NONE, c = {avp_val = {n = -1589573232, s = {s = 0x7f10a1410990 "C", len = -1589573232}, re = 0x7f10a1410990}, pval = {rs = {s = 0x7f10a1410990 "C", len = -1589573232}, ri = -1586281488, flags = 32528}}, i2s = "\320#o\241\020\177\000\000\360Bs\241\020\177\000\000\000\000\000\000\000"}
        s = {s = 0x7ffc6386d3f0 "\320#o\241\020\177", len = -1015914428}
        srevp = {0x1, 0x10}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#20 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3bf94d8, msg=0x7f10c3f80908) at core/action.c:1581
        t = 0x7f10c3c37010
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 0
        __func__ = "run_actions"
#21 0x000055fedf91d0ee in do_action (h=0x7ffc6386e3a0, a=0x7f10c3ac9fd0, msg=0x7f10c3f80908) at core/action.c:700
        ret = -5
        v = 22014
        dst = {send_sock = 0x2020202020202020, to = {s = {sa_family = 10456, sa_data = "\342\303\020\177\000\000m\317\035\241\020\177\000"}, sin = {sin_family = 10456, sin_port = 50146, sin_addr = {s_addr = 32528}, sin_zero = "m\317\035\241\020\177\000"}, sin6 = {sin6_family = 10456, sin6_port = 50146, sin6_flowinfo = 32528, sin6_addr = {__in6_u = {__u6_addr8 = "m\317\035\241\020\177\000\000\312\314\035\241\020\177\000", __u6_addr16 = {53101, 41245, 32528, 0, 52426, 41245, 32528, 0}, __u6_addr32 = {2703085421, 32528, 2703084746, 32528}}}, sin6_scope_id = 3286378992}, sas = {ss_family = 10456, __ss_padding = "\342\303\020\177\000\000m\317\035\241\020\177\000\000\312\314\035\241\020\177\000\000\360)\342\303\020\177\000\000\020\060\237\303\020\177\000\000\020\340\206c\374\177\000\000\070\330\327\302\020\177\000\000\000\000\000\000c", '\000' <repeats 13 times>, "\200\000\000\000\000\000\b\021&\000\000\000\000\000\b\324G\000\000\000\000\000\370\356Y\000\000\000\000\000\320\017\005\005\000\000\000\000\b\000\000\000\000\000\000", __ss_align = 40}}, id = -1012977648, send_flags = {f = 32528, blst_imask = 0}, proto = 64 '@', proto_pad0 = -32 '\340', proto_pad1 = 25478}
        tmp = 0x55fedfba326e <qm_malloc+2595> "H\213E\270H\203\300\070\351\230\003"
        new_uri = 0x5a0fd0 <error: Cannot access memory at address 0x5a0fd0>
        end = 0x47d848 <error: Cannot access memory at address 0x47d848>
        crt = 0x7ffc6386e290 "\220\343\206c\374\177"
        cmd = 0x1700000000
        len = 0
        user = -541446721
        uri = {user = {s = 0x3920000000 <error: Cannot access memory at address 0x3920000000>, len = 0}, passwd = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 2494392}, host = {s = 0x40047d488 <error: Cannot access memory at address 0x40047d488>, len = -539752464}, port = {s = 0x5a0fd0 <error: Cannot access memory at address 0x5a0fd0>, len = 8}, params = {s = 0x7ffc6386df70 "0\341\206c\374\177", len = -541165936}, sip_params = {s = 0x7ffc6386de80 "\330(\342\303\020\177", len = -542094578}, headers = {s = 0x0, len = -539810044}, port_no = 57200, proto = 25478, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3753520572), transport = {s = 0x7f10c3e228d8 "\001", len = -1008588080}, ttl = {s = 0x7ffc6386dff2 "\005\005", len = 1669783539}, user_param = {s = 0x7f10a11dcf6d "", len = -1591882475}, maddr = {s = 0x55fedfd41048 <__func__.6942> "parse_via", len = -539746712}, method = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -1012977648}, lr = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 5}, r2 = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, gr = {s = 0x0, len = 394917407}, transport_val = {s = 0x429e703d42893948 <error: Cannot access memory at address 0x429e703d42893948>, len = -601816037}, ttl_val = {s = 0x7ffc6386dfa8 "\020\060\237\303\020\177", len = 1}, user_param_val = {s = 0x0, len = -1008588136}, maddr_val = {s = 0x500ff0000000000 <error: Cannot access memory at address 0x500ff0000000000>, len = 1669783532}, method_val = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1591882524}, lr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1591882519}, r2_val = {s = 0x7f10a11dcce9 ";branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007 at 88.244.251.18:34323;rinstance=1fcf5028180487b9;transport=TCP>\r\nTo: <sip:1007 at mahmut.voip.com;transpor"..., len = 5}, gr_val = {s = 0x7ffc6386e130 "0\342\206c\374\177", len = -541110556}}
        next_hop = {user = {s = 0xa8428197 <error: Cannot access memory at address 0xa8428197>, len = -544731560}, passwd = {s = 0x2a10a06 <error: Cannot access memory at address 0x2a10a06>, len = 1669782928}, host = {s = 0x7ffc6386dd80 "\377\377\377\377", len = 1669782728}, port = {s = 0x7f10c457ba40 "\220\301Z\304\020\177", len = 7}, params = {s = 0x6386dec0 <error: Cannot access memory at address 0x6386dec0>, len = 0}, sip_params = {s = 0x7ffc6386dde0 "@+\342\303\020\177", len = -1472036457}, headers = {s = 0x7f10c45ac4f0 "P\304Z\304\020\177", len = 1669783080}, port_no = 49552, proto = 50266, type = 32528, flags = (unknown: 0), transport = {s = 0x7f10c457bab0 "\037e\211\337\376U", len = -1000811633}, ttl = {s = 0x5 <error: Cannot access memory at address 0x5>, len = -1000883536}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1000685168}, method = {s = 0x55fedf88e3fa "_setjmp", len = 0}, lr = {s = 0x7ffc6386dd80 "\377\377\377\377", len = 1669782928}, r2 = {s = 0x7f10c45ac4f0 "P\304Z\304\020\177", len = 0}, gr = {s = 0x7f10a16dc9d8 "\220", len = -1586934880}, transport_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1586934560}, ttl_val = {s = 0x7f10c4200158 "\373O", len = -1000885232}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 16}, maddr_val = {s = 0x7ffc6386dde0 "@+\342\303\020\177", len = -1015914428}, method_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -541405588}, lr_val = {s = 0x7ffc6386de10 "", len = -1012977648}, r2_val = {s = 0x7f10c3e22b40 "@", len = -1012977648}, gr_val = {s = 0x7ffc6386de50 "\200ކc\374\177", len = -1026041800}}
        u = 0x7ffc6386e290
        port = 0
        dst_host = 0x7f10a11dcf6d
        i = 11
        flags = 22014
        avp = 0x7f10a11dcf6d
        st = {flags = 1669782724, id = 32764, name = {n = -1000814498, s = {s = 0x7f10c458c85e <do_lookup_x+270> "\205\300\017\205\302\006", len = 0}, re = 0x7f10c458c85e <do_lookup_x+270>}, avp = 0x7f10c4207ca0}
        sct = 0x55fedfd49dcb
        sjt = 0x7f10c3e22830
        rve = 0x55fedfd49e58 <__func__.6790>
        mct = 0xa128dfc0
        rv = 0x7ffc6386dcc8
        rv1 = 0x7f10c3e1bdc0
        c1 = {cache_type = 3294082064, val_type = 32528, c = {avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1004565732}, re = 0x1}, pval = {rs = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1004565732}, ri = -1000813836, flags = 32528}}, i2s = "\022\004\000\000\000\000\000\000\240| \304\020\177\000\000\020\264W\304\020\177"}
        s = {s = 0x0, len = 1042}
        srevp = {0x0, 0x7f10c458c6ec <check_match+316>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#22 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3ac9b60, msg=0x7f10c3f80908) at core/action.c:1581
        t = 0x7f10c3ac9fd0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1007154936, tz_dsttime = 32528}
        tdiff = 2703084732
        __func__ = "run_actions"
#23 0x000055fedf93000d in run_top_route (a=0x7f10c3ac9b60, msg=0x7f10c3f80908, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {139709372343944, -3845379249392013796, 0, 139709987593392, 94553165115539, 536870912, -3845379249475899876, -7014620463946093028}, __mask_was_saved = 0, __saved_mask = {__val = {94553161952285, 6998053444, 139709984016648, 140721978271040, 94553163805580, 139709984018744, 139709984016312, 139709399289393, 139709399289029, 139709982555416, 0, 1073741825, 0, 139709987593392, 139709372343944, 0}}}}}
        p = 0x7ffc6386e3a0
        ret = -539905901
        sfbk = 0
#24 0x000055fedfaa8603 in receive_msg (buf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007 at 88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908) at core/receive.c:501
        msg = 0x7f10c3f80908
        ctx = {rec_lev = -1591882608, run_flags = 32528, last_retcode = 1460, jmp_env = {{__jmpbuf = {227633332225, 139709399288976, 8, 139709399288985, 34, 139709399289020, 7, 32}, __mask_was_saved = -539905901, __saved_mask = {__val = {536870912, 140721978271456, 94553163314141, 1025766200822493485, 0, 0, 17689295201705805418, 140721978272380, 139709399288048, 2079749502788070076, 2777162825698555585, 4722371164336740133, 92033367151166208, 14537356584683332797, 1950363756610510412, 11731023210721953098}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007 at 88.244.251.18:3432"..., len = 733}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffc6386e580, obuf = {s = 0x0, len = 0}, rcv = 0x7f10a11dc908, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#25 0x000055fedfb6c007 in receive_tcp_msg (tcpbuf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007 at 88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908, con=0x7f10a11dc8f0) at core/tcp_read.c:1383
        buf = 0x0
        bsize = 0
        blen = 1460
        __func__ = "receive_tcp_msg"
#26 0x000055fedfb6e8d3 in tcp_read_req (con=0x7f10a11dc8f0, bytes_read=0x7ffc6386ea84, read_flags=0x7ffc6386ea7c) at core/tcp_read.c:1607
        bytes = 1460
        total_bytes = 1460
        resp = 1
        size = 0
        req = 0x7f10a11dca18
        dst = {send_sock = 0x0, to = {s = {sa_family = 40112, sa_data = ".\304\020\177\000\000\360\310\035\241\020\177\000"}, sin = {sin_family = 40112, sin_port = 50222, sin_addr = {s_addr = 32528}, sin_zero = "\360\310\035\241\020\177\000"}, sin6 = {sin6_family = 40112, sin6_port = 50222, sin6_flowinfo = 32528, sin6_addr = {__in6_u = {__u6_addr8 = "\360\310\035\241\020\177\000\000\000\000\000 \002\000\000", __u6_addr16 = {51440, 41245, 32528, 0, 0, 8192, 2, 0}, __u6_addr32 = {2703083760, 32528, 536870912, 2}}}, sin6_scope_id = 1669726209}, sas = {ss_family = 40112, __ss_padding = ".\304\020\177\000\000\360\310\035\241\020\177\000\000\000\000\000 \002\000\000\000\001\000\206c\017\000\000\000 \"\343\337\376U\000\000\275N\341ZX\230\034\344\210\312\035\241\020\177\000\000(D\261\244m\345YC\340#\343\337\376U\000\000\024\000\000\000\000\000\000\000\001\000\000\000P\000\000\000\260\351\206c\374\177\000\000\276\006\252\337\376U\000\000p\352\206c\374\177\000\000\b\000\000\000\000\000\000", __ss_align = 35188667056128}}, id = -1007078360, send_flags = {f = 32528, blst_imask = 0}, proto = -120 '\210', proto_pad0 = -54 '\312', proto_pad1 = -24291}
        c = 82 'R'
        ret = -1
        __func__ = "tcp_read_req"
#27 0x000055fedfb730ec in handle_io (fm=0x7f10c3f93428, events=1, idx=-1) at core/tcp_read.c:1857
        ret = 8
        n = 1052
        read_flags = RD_CONN_SHORT_READ
        con = 0x7f10a11dc8f0
        s = 15
        resp = 1
        t = 1129964909
        ee = 0x0
        __func__ = "handle_io"
#28 0x000055fedfb5dd3a in io_wait_loop_epoll (h=0x55fedfe32220 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
        n = 1
        r = 0
        fm = 0x7f10c3f93428
        revents = 1
        __func__ = "io_wait_loop_epoll"
#29 0x000055fedfb74c0e in tcp_receive_loop (unix_sock=89) at core/tcp_read.c:1978
        __func__ = "tcp_receive_loop"
#30 0x000055fedf9f8f73 in tcp_init_children (woneinit=0x7ffc6386ee3c) at core/tcp_main.c:5139
        r = 12
        i = 15
        reader_fd_1 = 89
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\210\200\314\337\376U\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\320\355\206c\374\177\000\000D>\244\337\376U\000\000\320\355\206c\374\177\000\000\065\243\260\337\000\000\000\000\200\355\206c\374\177\000\000\305,\306\337\376U\000\000\000\000\000\000\000\000\000\000\210\246\202\237\062\000\000"
        si = 0x0
        __func__ = "tcp_init_children"
#31 0x000055fedf8b8d96 in main_loop () at main.c:1857
        i = 16
        pid = 4933
        si = 0x0
        si_desc = "udp receiver child=15 sock=56.100.82.100:5090\000\000\360\363\206c\374\177\000\000\350Ϊ\303\020\177\000\000\260\234.\304\020\177\000\000\350Ȼ\303\020\177\000\000\000\000\000 \000\000\000\000L\235.\304\020\177\000\000\060\000\000\000\060\000\000\000\250\357\206c\374\177\000\000\300\356\206c\374\177\000\000\000\270o\344\335t\323", <incomplete sequence \365>
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#32 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
        cfg_stream = 0x55fee0304290
        c = -1
        r = 0
        tmp = 0x7ffc6386fd8a ""
        tmp_len = 0
        port = 0
        proto = 0
        ahost = 0x0
        aport = 0
        options = 0x55fedfccb0b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1758625625
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7ffc639b9268
        p = 0x7f10c4298af5 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244"
        st = {st_dev = 20, st_ino = 17804, st_nlink = 2, st_mode = 16832, st_uid = 1113, st_gid = 1113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1622014594, tv_nsec = 669820306}, st_mtim = {tv_sec = 1622023822, tv_nsec = 713813032}, st_ctim = {tv_sec = 1622023822, tv_nsec = 713813032}, __glibc_reserved = {0, 0, 0}}
        tbuf = "H\365\206c\374\177\000\000\330+=\304\020\177", '\000' <repeats 11 times>, "\033Y\304\020\177\000\000\001", '\000' <repeats 15 times>, ",\363 \304\020\177\000\000(6X\304\020\177\000\000 \364\206c\374\177\000\000\272\204Y\304\020\177\000\000\000\000\000\000\000\000\000\000 at e;\304\020\177\000\000г<\304\020\177\000\000D\364\206c\374\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>...
        option_index = 0
        long_options = {{name = 0x55fedfccd366 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fedfcc8514 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fedfccd36b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55fedfccd371 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fedfccd377 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fedfccd380 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55fedfccd38a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fedfccd394 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fedfccd39f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55fedfccd3a8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fedfccd3b3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fedfccd3b9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55fedfccd3c3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
================================================================================
# thread apply all bt
================================================================================

Thread 1 (Thread 0x7f10c41f5100 (LWP 4958)):
#0  0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#1  0x00007f10c36877ed in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#2  0x00007f10c3686dc5 in CONF_modules_load () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#3  0x00007f10c368738b in CONF_modules_load_file () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#4  0x00007f10bfd9331e in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
#5  0x00007f10bfd592cf in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
#6  0x00007f10bfd59598 in curl_easy_init () from /lib/x86_64-linux-gnu/libcurl.so.4
#7  0x00007f10bfdfa9f4 in vg_call_event_api (pjson=0x7ffc6386abf0 "{\"version\":\"1.0\",\"eventcode\":\"300\",\"data\":{\"ip_address\":\"56.100.82.107\",\"username\":\"1007\",\"apiuserkey\":\"7f813a24-83e1-bc34-d4d1-293a4f84c5f6\"}}", event_url=...) at event.c:52
#8  0x00007f10bfdfae0d in vg_send_notallowed_user_from_ip_event (eventCode=300, szIpAddress=0x55fedfe1b4c0 <buff> "56.100.82.107", szUserName=0x7ffc6386ba60 "1007", szApiUserKey=0x7ffc6386b970 "7f813a24-83e1-bc34-d4d1-293a4f84c5f6") at event.c:139
#9  0x00007f10bfde867a in vg_digest_authenticate_hdr (msg=0x7f10c3f80908, realm=0x7ffc6386bd20, hftype=HDR_AUTHORIZATION_T, method=0x7f10c3f80930, ahdr=0x7ffc6386bd18) at vg_auth.c:431
#10 0x00007f10bfde8d60 in w_vg_auth (pmsg=0x7f10c3f80908) at vg_auth.c:530
#11 0x000055fedf920f8f in do_action (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1076
#12 0x000055fedf92f857 in run_actions (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1581
#13 0x000055fedf92ff45 in run_actions_safe (h=0x7ffc6386e3a0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1645
#14 0x000055fedf8e209c in rval_get_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, i=0x7ffc6386ca64, rv=0x7f10c3c30c28, cache=0x0) at core/rvalue.c:949
#15 0x000055fedf8e7293 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386ca64, rve=0x7f10c3c30c20) at core/rvalue.c:1947
#16 0x000055fedf8e7719 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386cf9c, rve=0x7f10c3c31350) at core/rvalue.c:1955
#17 0x000055fedf920a0a in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c31ef0, msg=0x7f10c3f80908) at core/action.c:1052
#18 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3c225b8, msg=0x7f10c3f80908) at core/action.c:1581
#19 0x000055fedf920efb in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c37010, msg=0x7f10c3f80908) at core/action.c:1067
#20 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3bf94d8, msg=0x7f10c3f80908) at core/action.c:1581
#21 0x000055fedf91d0ee in do_action (h=0x7ffc6386e3a0, a=0x7f10c3ac9fd0, msg=0x7f10c3f80908) at core/action.c:700
#22 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3ac9b60, msg=0x7f10c3f80908) at core/action.c:1581
#23 0x000055fedf93000d in run_top_route (a=0x7f10c3ac9b60, msg=0x7f10c3f80908, c=0x0) at core/action.c:1666
#24 0x000055fedfaa8603 in receive_msg (buf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007 at 88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908) at core/receive.c:501
#25 0x000055fedfb6c007 in receive_tcp_msg (tcpbuf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007 at 88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908, con=0x7f10a11dc8f0) at core/tcp_read.c:1383
#26 0x000055fedfb6e8d3 in tcp_read_req (con=0x7f10a11dc8f0, bytes_read=0x7ffc6386ea84, read_flags=0x7ffc6386ea7c) at core/tcp_read.c:1607
#27 0x000055fedfb730ec in handle_io (fm=0x7f10c3f93428, events=1, idx=-1) at core/tcp_read.c:1857
#28 0x000055fedfb5dd3a in io_wait_loop_epoll (h=0x55fedfe32220 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
#29 0x000055fedfb74c0e in tcp_receive_loop (unix_sock=89) at core/tcp_read.c:1978
#30 0x000055fedf9f8f73 in tcp_init_children (woneinit=0x7ffc6386ee3c) at core/tcp_main.c:5139
#31 0x000055fedf8b8d96 in main_loop () at main.c:1857
#32 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
================================================================================
# thread apply all bt full
================================================================================

Thread 1 (Thread 0x7f10c41f5100 (LWP 4958)):
#0  0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#1  0x00007f10c36877ed in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#2  0x00007f10c3686dc5 in CONF_modules_load () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#3  0x00007f10c368738b in CONF_modules_load_file () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#4  0x00007f10bfd9331e in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
No symbol table info available.
#5  0x00007f10bfd592cf in ?? () from /lib/x86_64-linux-gnu/libcurl.so.4
No symbol table info available.
#6  0x00007f10bfd59598 in curl_easy_init () from /lib/x86_64-linux-gnu/libcurl.so.4
No symbol table info available.
#7  0x00007f10bfdfa9f4 in vg_call_event_api (pjson=0x7ffc6386abf0 "{\"version\":\"1.0\",\"eventcode\":\"300\",\"data\":{\"ip_address\":\"56.100.82.107\",\"username\":\"1007\",\"apiuserkey\":\"7f813a24-83e1-bc34-d4d1-293a4f84c5f6\"}}", event_url=...) at event.c:52
        __func__ = "vg_call_event_api"
        curl = 0x7ffc6386ac90
#8  0x00007f10bfdfae0d in vg_send_notallowed_user_from_ip_event (eventCode=300, szIpAddress=0x55fedfe1b4c0 <buff> "56.100.82.107", szUserName=0x7ffc6386ba60 "1007", szApiUserKey=0x7ffc6386b970 "7f813a24-83e1-bc34-d4d1-293a4f84c5f6") at event.c:139
        szDataBuffer = "{\"version\":\"1.0\",\"eventcode\":\"300\",\"data\":{\"ip_address\":\"56.100.82.107\",\"username\":\"1007\",\"apiuserkey\":\"7f813a24-83e1-bc34-d4d1-293a4f84c5f6\"}}", '\000' <repeats 350 times>
#9  0x00007f10bfde867a in vg_digest_authenticate_hdr (msg=0x7f10c3f80908, realm=0x7ffc6386bd20, hftype=HDR_AUTHORIZATION_T, method=0x7f10c3f80930, ahdr=0x7ffc6386bd18) at vg_auth.c:431
        iExtType = 100
        chRegister = 0 '\000'
        IsRegistered = 0 '\000'
        chGlobalAllowedIp = 0 '\000'
        chSiptrunk = 0 '\000'
        IsAllowed = 0 '\000'
        chAllow = 1 '\001'
        chRegisterEventEnabled = 1 '\001'
        res = 0x7f10c3dc9a38
        rest = 0x0
        pCon = 0x7f10c3e227a8
        resp = "\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\300\274\206c\374\177\000\000x#\336\277\020\177\000\000"
        hent = "\000\000\000\000\000\000\000\000\207\204\343\277\000\000\000\000\223\260\321\337\376U\000\000\210\246\202\237\020\177\000\000"
        password = {s = 0x0, len = -1012242104}
        ha1 = "\000\000\000\000\000\000\000\000\220\274\206c\374\177\000\000H\274\206c\374\177\000\000\b\t\370\303\020\177", '\000' <repeats 18 times>, "\060\274\206c\374\177\000\000\260\274\206c\374\177", '\000' <repeats 58 times>, "\210\246\202\237\020\177\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\000\274\206c\374\177\000\000\343J\257\337\376U\000\000\000\000\000\000\000\000\000\000\220\274\206c\374\177\000\000\060\274\206c\374\177\000\000"...
        szUserName = "1007", '\000' <repeats 70 times>
        szPassword = '\000' <repeats 79 times>
        szDomain = "mahmut.voip.com", '\000' <repeats 63 times>
        szApiUserKey = "7f813a24-83e1-bc34-d4d1-293a4f84c5f6", '\000' <repeats 43 times>
        szQuery = "SELECT  1::integer as tt , ex.username::text , ex.password::text , ex.exttype::integer , ep.param_value::text as tt2 , ep2.param_value::text , lc.id::integer , ( SELECT COUNT( type ) FROM vg_ipaccepts"...
        h = 0x7f10c3e20ad0
        cred = 0x7f10c3e21020
        cd = 0x7f10c2af3cf7 <pv_get_ruri_attr>
        ret = -3
        iTenantNo = 1293
        iExt = 7
        iSub = 0
        iRealmLen = 17
        iUserLen = 10
        pIP = 0x55fedfe1b4c0 <buff> "56.100.82.107"
        __func__ = "vg_digest_authenticate_hdr"
        chIsTrunk = 0 '\000'
#10 0x00007f10bfde8d60 in w_vg_auth (pmsg=0x7f10c3f80908) at vg_auth.c:530
        srealm = {s = 0x7ffc6386bce0 "mahmut.voip.com", len = 16}
        ret = -1
        hdr = 0x7f10c3e20ad0
        uri = 0x0
        turi = 0x0
        furi = 0x0
        szDomain = "mahmut.voip.com\000\276\206c\374\177\000\000\234 \216\337\376U", '\000' <repeats 19 times>
#11 0x000055fedf920f8f in do_action (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1076
        ret = -5
        v = 0
        dst = {send_sock = 0x55fedfd1b093, to = {s = {sa_family = 0, sa_data = "\000 \000\000\000\000\214\302\206c\374\177\000"}, sin = {sin_family = 0, sin_port = 8192, sin_addr = {s_addr = 0}, sin_zero = "\214\302\206c\374\177\000"}, sin6 = {sin6_family = 0, sin6_port = 8192, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\214\302\206c\374\177\000\000\034\256Nd\026\000\000", __u6_addr16 = {49804, 25478, 32764, 0, 44572, 25678, 22, 0}, __u6_addr32 = {1669776012, 32764, 1682877980, 22}}}, sin6_scope_id = 3756532656}, sas = {ss_family = 0, __ss_padding = "\000 \000\000\000\000\214\302\206c\374\177\000\000\034\256Nd\026\000\000\000\260#\350\337\376U\000\000\000\000\000\000\000\000\000\000\f\000\000\000\000\000\000\000s\374d\303\000\000\000\000\346\000\000\000\000\000\000\000\005", '\000' <repeats 15 times>, "+\302\206c\374\177\000\000\005\000\000\000\000\000\000\000\005\000\000\000\000\000\000\000\005", '\000' <repeats 11 times>, "\017\000\000", __ss_align = 4294967296}}, id = -1618827640, send_flags = {f = 32528, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x55fedf8e237e <rval_get_int+1054> "\351\250\003"
        new_uri = 0x0
        end = 0x0
        crt = 0x7ffc6386c4f0 "`Ɔc\374\177"
        cmd = 0x7f10c3ab6470
        len = 32764
        user = 1669776480
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 230, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | unknown: 3279052244), transport = {s = 0x7f10a16c86c0 "(", len = -1586934880}, ttl = {s = 0x100000001 <error: Cannot access memory at address 0x100000001>, len = -1586934560}, user_param = {s = 0x7f10a1694d00 "\036\033\373\005\\^\247\312\066_J\241ٰ\020\006\275N\341ZX\230\034\344\317䉲\222\376\223\273(D\261\244\205\356\267\314r\252h\350\312f\217_\016\034K\226L\212\026\232 }\217\344罋kr\216[\212裑ؖ\334f\204\253`\265e.a\304r\253\067\235\361\344R=\016C\303$\275", len = -1015910656}, maddr = {s = 0x0, len = -1618827640}, method = {s = 0x0, len = -1003578192}, lr = {s = 0x55fedfd1b093 "INFO", len = 536870912}, r2 = {s = 0x7ffc6386c270 " Ɇc\374\177", len = -544311144}, gr = {s = 0x7f10a1009978 "\340\346\204\303\020\177", len = -1618827640}, transport_val = {s = 0x0, len = -1003578192}, ttl_val = {s = 0x7f10c3c2ace0 "\017", len = 1669777244}, user_param_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, maddr_val = {s = 0x7f10a1296790 "T", len = -1007154936}, method_val = {s = 0x7f10c3c16930 "\305\004", len = 1669784480}, lr_val = {s = 0x0, len = -1}, r2_val = {s = 0x7f109f82a688 "", len = 20229660}, gr_val = {s = 0x0, len = -1003578192}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x400000001 <error: Cannot access memory at address 0x400000001>, len = 1669775904}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = -539810039}, user_param = {s = 0x12500000187 <error: Cannot access memory at address 0x12500000187>, len = -539810039}, maddr = {s = 0x143000001ff <error: Cannot access memory at address 0x143000001ff>, len = -1081640172}, method = {s = 0x7f10a16c8630 "(", len = -1618827640}, lr = {s = 0x0, len = -1003578192}, r2 = {s = 0x55fedfd1b093 "INFO", len = 536870912}, gr = {s = 0x7ffc6386c100 "p\302\206c\374\177", len = -544311477}, transport_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, ttl_val = {s = 0x7ffc6386c140 "\b\t\370\303\020\177", len = -544016297}, user_param_val = {s = 0x7f10c3c2a5b0 "\004", len = 1669775904}, maddr_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, method_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1007154936}, lr_val = {s = 0x7f10c3c16930 "\305\004", len = 1669775728}, r2_val = {s = 0x7ffc6386c110 "x\231", len = -1016937788}, gr_val = {s = 0x0, len = 0}}
        u = 0x55fedfd1b093
        port = 0
        dst_host = 0x55fedfd1b093
        i = -542149130
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}
        sct = 0x7f10c3c1ad08
        sjt = 0x55fedf920a0a <do_action+36269>
        rve = 0x7f10c3e1ab18
        mct = 0x7ffc6386c920
        rv = 0x7ffc6386e3a0
        rv1 = 0x7f109f82a688
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = "\200\236\302\303\020\177\000\000\264\300\206c\374\177\000\000\b\t\370\303\020\177"}
        s = {s = 0x7ffc6386bf90 "", len = -544312685}
        srevp = {0x55fedfd1b093, 0x20000000}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#12 0x000055fedf92f857 in run_actions (h=0x7ffc6386c5c0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1581
        t = 0x7f10c3c309b0
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1013718290, tz_dsttime = 32528}
        tdiff = 2489880
        __func__ = "run_actions"
#13 0x000055fedf92ff45 in run_actions_safe (h=0x7ffc6386e3a0, a=0x7f10c3c309b0, msg=0x7f10c3f80908) at core/action.c:1645
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {139709372343944, -3845379250411229668, 0, 139709987593392, 94553165115539, 536870912, -3845379250360898020, -7014620463946093028}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 0, 0, 139709372343944, 0, 139709987593392, 94553165115539, 536870912, 140721978263504, 94553160710168, 139709982158504, 139709978193936, 140721978263264, 139709965129784, 139709980502408}}}}}
        ret = 1669777648
        ign_on_break = 0
#14 0x000055fedf8e209c in rval_get_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, i=0x7ffc6386ca64, rv=0x7f10c3c30c28, cache=0x0) at core/rvalue.c:949
        r_avp = 0x800600000020
        avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 2490832}, re = 0x1}
        pval = {rs = {s = 0x7ffc6386c7a0 "\377\377\377\377\374\177", len = -1026041800}, ri = -1009012800, flags = 32528}
        tmp = {s = 0x7f10c3dc9a00 "H\a", len = -1012977648}
        s = 0x0
        r = 0
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_int"
#15 0x000055fedf8e7293 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386ca64, rve=0x7f10c3c30c20) at core/rvalue.c:1947
        i1 = 0
        i2 = 0
        ret = -1
        c1 = {cache_type = 3284315360, val_type = 32528, c = {avp_val = {n = 1669779356, s = {s = 0x7ffc6386cf9c "\001", len = 0}, re = 0x7ffc6386cf9c}, pval = {rs = {s = 0x7ffc6386cf9c "\001", len = 0}, ri = -1003578192, flags = 32528}}, i2s = "\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\200Ɇc\374\177"}
        c2 = {cache_type = 1669777792, val_type = 32764, c = {avp_val = {n = -541436525, s = {s = 0x55fedfba5593 <qm_free+7942> "\353\a\220\353\004\220\353\001\220H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>, len = -1008952776}, re = 0x55fedfba5593 <qm_free+7942>}, pval = {rs = {s = 0x55fedfba5593 <qm_free+7942> "\353\a\220\353\004\220\353\001\220H\215e\330[A\\A]A^A_]\303UH\211\345AWAVAUATSH\201\354", <incomplete sequence \350>, len = -1008952776}, ri = -1012977648, flags = 32528}}, i2s = "]\346\223\303\020\177\000\000\020\060\237Ë\000\000\000(\354\223\303\020\177"}
        rv1 = 0xc39f4240
        rv2 = 0x29c39f3980
        __func__ = "rval_expr_eval_int"
#16 0x000055fedf8e7719 in rval_expr_eval_int (h=0x7ffc6386e3a0, msg=0x7f10c3f80908, res=0x7ffc6386cf9c, rve=0x7f10c3c31350) at core/rvalue.c:1955
        i1 = 0
        i2 = -539905901
        ret = -1
        c1 = {cache_type = 1669778112, val_type = 32764, c = {avp_val = {n = -1013256867, s = {s = 0x7f10c39aed5d <db_postgres_free_result+1788> "\270", len = -1008594912}, re = 0x7f10c39aed5d <db_postgres_free_result+1788>}, pval = {rs = {s = 0x7f10c39aed5d <db_postgres_free_result+1788> "\270", len = -1008594912}, ri = -1008588888, flags = 32528}}, i2s = '\000' <repeats 21 times>}
        c2 = {cache_type = 1669778128, val_type = 32764, c = {avp_val = {n = -1008588888, s = {s = 0x7f10c3e227a8 "", len = 1669777920}, re = 0x7f10c3e227a8}, pval = {rs = {s = 0x7f10c3e227a8 "", len = 1669777920}, ri = -1618827640, flags = 32528}}, i2s = "\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U"}
        rv1 = 0x7ffc6386d2c8
        rv2 = 0x7f10c39a83df <db_postgres_submit_query>
        __func__ = "rval_expr_eval_int"
#17 0x000055fedf920a0a in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c31ef0, msg=0x7f10c3f80908) at core/action.c:1052
        ret = -5
        v = 1
        dst = {send_sock = 0x203d3e3e2070695f, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\060\320\300\303\020\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "0\320\300\303\020\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "0\320\300\303\020\177\000\000\244҆c\374\177\000", __u6_addr16 = {53296, 50112, 32528, 0, 53924, 25478, 32764, 0}, __u6_addr32 = {3284193328, 32528, 1669780132, 32764}}}, sin6_scope_id = 3287812360}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\060\320\300\303\020\177\000\000\244҆c\374\177\000\000\b\t\370\303\020\177\000\000\240\343\206c\374\177\000\000UNT(callid)::integer , '' , \017\000\000\000ROM vg_p\210\246\202\237\020\177\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \020\000\000", __ss_align = 17179869185}}, id = 1669780132, send_flags = {f = 32764, blst_imask = 0}, proto = 36 '$', proto_pad0 = -48 '\320', proto_pad1 = 25478}
        tmp = 0x7f10c3bf99c8 "\002"
        new_uri = 0x7f10c3bf9890 "\001"
        end = 0x7ffc6386d190 ""
        crt = 0x7f10c3bf9a60 "\a"
        cmd = 0x7f10c3c18828
        len = 22014
        user = -543945635
        uri = {user = {s = 0x2064696b6e757274 <error: Cannot access memory at address 0x2064696b6e757274>, len = 807419169}, passwd = {s = 0xffffffff70692064 <error: Cannot access memory at address 0xffffffff70692064>, len = 0}, host = {s = 0x7f10c3c16b70 "\004", len = 1669779764}, port = {s = 0x7f10c3f80908 "\b", len = 1669784480}, params = {s = 0x55fedfd1b093 "INFO", len = 536870912}, sip_params = {s = 0x7ffc6386cee0 "\b\t\370\303\020\177", len = -544014523}, headers = {s = 0x46202727202c2027 <error: Cannot access memory at address 0x46202727202c2027>, len = -1007154936}, port_no = 52720, proto = 50112, type = 32528, flags = (unknown: 1669784480), transport = {s = 0x0, len = -1}, ttl = {s = 0x7f109f82a688 "", len = 404008476}, user_param = {s = 0x0, len = -1003578192}, maddr = {s = 0x55fedfd1b093 "INFO", len = 536870912}, method = {s = 0xcaa277f21b14ae1c <error: Cannot access memory at address 0xcaa277f21b14ae1c>, len = 1682877980}, lr = {s = 0x204d4f5200000000 <error: Cannot access memory at address 0x204d4f5200000000>, len = 1633642358}, r2 = {s = 0x0, len = 0}, gr = {s = 0x3d206e69616d6f64 <error: Cannot access memory at address 0x3d206e69616d6f64>, len = -1618827640}, transport_val = {s = 0x0, len = -1003578192}, ttl_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, user_param_val = {s = 0x7ffc6386d010 "\200цc\374\177", len = -544312685}, maddr_val = {s = 0x2072656765746e69 <error: Cannot access memory at address 0x2072656765746e69>, len = 656875564}, method_val = {s = 0x76204d4f52462027 <error: Cannot access memory at address 0x76204d4f52462027>, len = 1885953895}, lr_val = {s = 0x7f10c3c16b68 "\001", len = 1669779764}, r2_val = {s = 0x7f10c3f80908 "\b", len = 1669784480}, gr_val = {s = 0x55fedfe823b0 <ut_buf_int2str> "", len = 0}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x7ffc6386ccac "\362w\242", <incomplete sequence \312>, len = -1618827640}, host = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, port = {s = 0x55fedfd1b093 "INFO", len = -1618827640}, params = {s = 0x0, len = -1003578192}, sip_params = {s = 0x55fedfd1b093 "INFO", len = 536870912}, headers = {s = 0x7ffc6386cd70 "\240Άc\374\177", len = -544014523}, port_no = 52416, proto = 25478, type = 32764, flags = (unknown: 3287812360), transport = {s = 0x7f10c3c16350 "\302\004", len = 1669784480}, ttl = {s = 0x0, len = 1}, user_param = {s = 0x7f109f82a688 "", len = 460631580}, maddr = {s = 0x0, len = -1003578192}, method = {s = 0x55fedfd1b093 "INFO", len = 536870912}, lr = {s = 0xcaa277f21674ae1c <error: Cannot access memory at address 0xcaa277f21674ae1c>, len = 1682877980}, r2 = {s = 0x7f1000000000 <error: Cannot access memory at address 0x7f1000000000>, len = -1007154936}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x6776204e494f4a20 <error: Cannot access memory at address 0x6776204e494f4a20>, len = -1618827640}, ttl_val = {s = 0x0, len = -1003578192}, user_param_val = {s = 0x55fedfd1b093 "INFO", len = 536870912}, maddr_val = {s = 0x7ffc6386cea0 "\020Іc\374\177", len = -544312685}, method_val = {s = 0x20657079742e736c <error: Cannot access memory at address 0x20657079742e736c>, len = -1618827640}, lr_val = {s = 0x0, len = -542149130}, r2_val = {s = 0x0, len = 1}, gr_val = {s = 0x7ffc6386cea0 "\020Іc\374\177", len = -544333668}}
        u = 0x7ffc6386d210
        port = 0
        dst_host = 0x2e6665727065203d
        i = 1669779856
        flags = 0
        avp = 0x55fedfd1b093
        st = {flags = 0, id = 0, name = {n = -1618827640, s = {s = 0x7f109f82a688 "", len = 0}, re = 0x7f109f82a688}, avp = 0x7f10c42e9cb0 <__syslog>}
        sct = 0x7ffc6386d024
        sjt = 0x0
        rve = 0x7f10c3c31350
        mct = 0x0
        rv = 0xf00000000
        rv1 = 0x55fedfaf75f6 <pv_value_destroy+175>
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 1669726208}, re = 0x0}, pval = {rs = {s = 0x0, len = 1669726208}, ri = -541825017, flags = 22014}}, i2s = "mahmut.voip.com\000\000\000\000\000"}
        s = {s = 0x0, len = 0}
        srevp = {0x55fe00000000, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#18 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3c225b8, msg=0x7f10c3f80908) at core/action.c:1581
        t = 0x7f10c3c31ef0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 0
        __func__ = "run_actions"
#19 0x000055fedf920efb in do_action (h=0x7ffc6386e3a0, a=0x7f10c3c37010, msg=0x7f10c3f80908) at core/action.c:1067
        ret = 1
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x7ffc6386e3b0 "\210\246\202\237\020\177"
        cmd = 0x7f10c3ab64a8
        len = 0
        user = 1
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x1700000303 <error: Cannot access memory at address 0x1700000303>, len = 87}, host = {s = 0x0, len = 0}, port = {s = 0x7f10a129a940 "\212\330[\031#\375\370\245\067j\337\071\250\337\025-\342\267\333\334\340\023\301\210\356Z\354\320\306\022\352G31i\224\312\025=/\237]E\353\035\367Y\224\224\316\022\345?b,\344\352\361_:s\260\214\306څ\216(?\337C\200\002i:%\276_\030)\234ֿ\212&NUY\346\200\"V\313\365\365WN\364\260\004G\264\375\374#\371\353\363\341\353ϼ\377=\335Ps\023\343\316ߚ?\312P6\035\207cc\267=Q\377\346\a\235\327e\247l\020\352C+=Ow\356\004\201\003(\255؉D\355>\325Kw\351$\306\377\301\024\360:\212^\201\314\357\352\317E\301\374\346hC\212\370\216\327%V\032ou\330\062\325\030ܧs\275"..., len = -1591105216}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
        next_hop = {user = {s = 0x7ffc6386d4c0 "\020", len = 0}, passwd = {s = 0x7ffc6386d4c4 "", len = 0}, host = {s = 0x7f10a16f23d0 "\340\346\204\303\020\177", len = 1669780672}, port = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -1015996900}, params = {s = 0x7f10a16f23d0 "\340\346\204\303\020\177", len = -1590211304}, sip_params = {s = 0x7f10a1375aa0 "\003\003", len = -1014345500}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1669780747}, port_no = 12, proto = 0, type = ERROR_URI_T, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3278175344), transport = {s = 0x10 <error: Cannot access memory at address 0x10>, len = 5}, ttl = {s = 0x0, len = 1669780747}, user_param = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 5}, maddr = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, method = {s = 0x0, len = 394917407}, lr = {s = 0x5aad993cdf85fc4f <error: Cannot access memory at address 0x5aad993cdf85fc4f>, len = -421945278}, r2 = {s = 0x7ffc6386d5b8 " ", len = -462440448}, gr = {s = 0x0, len = -1590211304}, transport_val = {s = 0x7f10a1375aa0 "\003\003", len = -1590207840}, ttl_val = {s = 0x2 <error: Cannot access memory at address 0x2>, len = 1669780920}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1014350068}, maddr_val = {s = 0x7f10a1375aa0 "\003\003", len = 32}, method_val = {s = 0x7f10a1375aa0 "\003\003", len = -1587508776}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 32}}
        u = 0x0
        port = 0
        dst_host = 0x0
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 2705394080, id = 32528, name = {n = 1669780672, s = {s = 0x7ffc6386d4c0 "\020", len = -1586551856}, re = 0x7ffc6386d4c0}, avp = 0x7f10c370387b}
        sct = 0x0
        sjt = 0x0
        rve = 0x7f10c3c1a4e8
        mct = 0x0
        rv = 0x0
        rv1 = 0x0
        c1 = {cache_type = 16, val_type = RV_NONE, c = {avp_val = {n = -1589573232, s = {s = 0x7f10a1410990 "C", len = -1589573232}, re = 0x7f10a1410990}, pval = {rs = {s = 0x7f10a1410990 "C", len = -1589573232}, ri = -1586281488, flags = 32528}}, i2s = "\320#o\241\020\177\000\000\360Bs\241\020\177\000\000\000\000\000\000\000"}
        s = {s = 0x7ffc6386d3f0 "\320#o\241\020\177", len = -1015914428}
        srevp = {0x1, 0x10}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#20 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3bf94d8, msg=0x7f10c3f80908) at core/action.c:1581
        t = 0x7f10c3c37010
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 0
        __func__ = "run_actions"
#21 0x000055fedf91d0ee in do_action (h=0x7ffc6386e3a0, a=0x7f10c3ac9fd0, msg=0x7f10c3f80908) at core/action.c:700
        ret = -5
        v = 22014
        dst = {send_sock = 0x2020202020202020, to = {s = {sa_family = 10456, sa_data = "\342\303\020\177\000\000m\317\035\241\020\177\000"}, sin = {sin_family = 10456, sin_port = 50146, sin_addr = {s_addr = 32528}, sin_zero = "m\317\035\241\020\177\000"}, sin6 = {sin6_family = 10456, sin6_port = 50146, sin6_flowinfo = 32528, sin6_addr = {__in6_u = {__u6_addr8 = "m\317\035\241\020\177\000\000\312\314\035\241\020\177\000", __u6_addr16 = {53101, 41245, 32528, 0, 52426, 41245, 32528, 0}, __u6_addr32 = {2703085421, 32528, 2703084746, 32528}}}, sin6_scope_id = 3286378992}, sas = {ss_family = 10456, __ss_padding = "\342\303\020\177\000\000m\317\035\241\020\177\000\000\312\314\035\241\020\177\000\000\360)\342\303\020\177\000\000\020\060\237\303\020\177\000\000\020\340\206c\374\177\000\000\070\330\327\302\020\177\000\000\000\000\000\000c", '\000' <repeats 13 times>, "\200\000\000\000\000\000\b\021&\000\000\000\000\000\b\324G\000\000\000\000\000\370\356Y\000\000\000\000\000\320\017\005\005\000\000\000\000\b\000\000\000\000\000\000", __ss_align = 40}}, id = -1012977648, send_flags = {f = 32528, blst_imask = 0}, proto = 64 '@', proto_pad0 = -32 '\340', proto_pad1 = 25478}
        tmp = 0x55fedfba326e <qm_malloc+2595> "H\213E\270H\203\300\070\351\230\003"
        new_uri = 0x5a0fd0 <error: Cannot access memory at address 0x5a0fd0>
        end = 0x47d848 <error: Cannot access memory at address 0x47d848>
        crt = 0x7ffc6386e290 "\220\343\206c\374\177"
        cmd = 0x1700000000
        len = 0
        user = -541446721
        uri = {user = {s = 0x3920000000 <error: Cannot access memory at address 0x3920000000>, len = 0}, passwd = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 2494392}, host = {s = 0x40047d488 <error: Cannot access memory at address 0x40047d488>, len = -539752464}, port = {s = 0x5a0fd0 <error: Cannot access memory at address 0x5a0fd0>, len = 8}, params = {s = 0x7ffc6386df70 "0\341\206c\374\177", len = -541165936}, sip_params = {s = 0x7ffc6386de80 "\330(\342\303\020\177", len = -542094578}, headers = {s = 0x0, len = -539810044}, port_no = 57200, proto = 25478, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 3753520572), transport = {s = 0x7f10c3e228d8 "\001", len = -1008588080}, ttl = {s = 0x7ffc6386dff2 "\005\005", len = 1669783539}, user_param = {s = 0x7f10a11dcf6d "", len = -1591882475}, maddr = {s = 0x55fedfd41048 <__func__.6942> "parse_via", len = -539746712}, method = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -1012977648}, lr = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 5}, r2 = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, gr = {s = 0x0, len = 394917407}, transport_val = {s = 0x429e703d42893948 <error: Cannot access memory at address 0x429e703d42893948>, len = -601816037}, ttl_val = {s = 0x7ffc6386dfa8 "\020\060\237\303\020\177", len = 1}, user_param_val = {s = 0x0, len = -1008588136}, maddr_val = {s = 0x500ff0000000000 <error: Cannot access memory at address 0x500ff0000000000>, len = 1669783532}, method_val = {s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = -1591882524}, lr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1591882519}, r2_val = {s = 0x7f10a11dcce9 ";branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007 at 88.244.251.18:34323;rinstance=1fcf5028180487b9;transport=TCP>\r\nTo: <sip:1007 at mahmut.voip.com;transpor"..., len = 5}, gr_val = {s = 0x7ffc6386e130 "0\342\206c\374\177", len = -541110556}}
        next_hop = {user = {s = 0xa8428197 <error: Cannot access memory at address 0xa8428197>, len = -544731560}, passwd = {s = 0x2a10a06 <error: Cannot access memory at address 0x2a10a06>, len = 1669782928}, host = {s = 0x7ffc6386dd80 "\377\377\377\377", len = 1669782728}, port = {s = 0x7f10c457ba40 "\220\301Z\304\020\177", len = 7}, params = {s = 0x6386dec0 <error: Cannot access memory at address 0x6386dec0>, len = 0}, sip_params = {s = 0x7ffc6386dde0 "@+\342\303\020\177", len = -1472036457}, headers = {s = 0x7f10c45ac4f0 "P\304Z\304\020\177", len = 1669783080}, port_no = 49552, proto = 50266, type = 32528, flags = (unknown: 0), transport = {s = 0x7f10c457bab0 "\037e\211\337\376U", len = -1000811633}, ttl = {s = 0x5 <error: Cannot access memory at address 0x5>, len = -1000883536}, user_param = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, maddr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1000685168}, method = {s = 0x55fedf88e3fa "_setjmp", len = 0}, lr = {s = 0x7ffc6386dd80 "\377\377\377\377", len = 1669782928}, r2 = {s = 0x7f10c45ac4f0 "P\304Z\304\020\177", len = 0}, gr = {s = 0x7f10a16dc9d8 "\220", len = -1586934880}, transport_val = {s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1586934560}, ttl_val = {s = 0x7f10c4200158 "\373O", len = -1000885232}, user_param_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 16}, maddr_val = {s = 0x7ffc6386dde0 "@+\342\303\020\177", len = -1015914428}, method_val = {s = 0x10 <error: Cannot access memory at address 0x10>, len = -541405588}, lr_val = {s = 0x7ffc6386de10 "", len = -1012977648}, r2_val = {s = 0x7f10c3e22b40 "@", len = -1012977648}, gr_val = {s = 0x7ffc6386de50 "\200ކc\374\177", len = -1026041800}}
        u = 0x7ffc6386e290
        port = 0
        dst_host = 0x7f10a11dcf6d
        i = 11
        flags = 22014
        avp = 0x7f10a11dcf6d
        st = {flags = 1669782724, id = 32764, name = {n = -1000814498, s = {s = 0x7f10c458c85e <do_lookup_x+270> "\205\300\017\205\302\006", len = 0}, re = 0x7f10c458c85e <do_lookup_x+270>}, avp = 0x7f10c4207ca0}
        sct = 0x55fedfd49dcb
        sjt = 0x7f10c3e22830
        rve = 0x55fedfd49e58 <__func__.6790>
        mct = 0xa128dfc0
        rv = 0x7ffc6386dcc8
        rv1 = 0x7f10c3e1bdc0
        c1 = {cache_type = 3294082064, val_type = 32528, c = {avp_val = {n = 1, s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1004565732}, re = 0x1}, pval = {rs = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1004565732}, ri = -1000813836, flags = 32528}}, i2s = "\022\004\000\000\000\000\000\000\240| \304\020\177\000\000\020\264W\304\020\177"}
        s = {s = 0x0, len = 1042}
        srevp = {0x0, 0x7f10c458c6ec <check_match+316>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#22 0x000055fedf92f857 in run_actions (h=0x7ffc6386e3a0, a=0x7f10c3ac9b60, msg=0x7f10c3f80908) at core/action.c:1581
        t = 0x7f10c3ac9fd0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1007154936, tz_dsttime = 32528}
        tdiff = 2703084732
        __func__ = "run_actions"
#23 0x000055fedf93000d in run_top_route (a=0x7f10c3ac9b60, msg=0x7f10c3f80908, c=0x0) at core/action.c:1666
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {139709372343944, -3845379249392013796, 0, 139709987593392, 94553165115539, 536870912, -3845379249475899876, -7014620463946093028}, __mask_was_saved = 0, __saved_mask = {__val = {94553161952285, 6998053444, 139709984016648, 140721978271040, 94553163805580, 139709984018744, 139709984016312, 139709399289393, 139709399289029, 139709982555416, 0, 1073741825, 0, 139709987593392, 139709372343944, 0}}}}}
        p = 0x7ffc6386e3a0
        ret = -539905901
        sfbk = 0
#24 0x000055fedfaa8603 in receive_msg (buf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007 at 88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908) at core/receive.c:501
        msg = 0x7f10c3f80908
        ctx = {rec_lev = -1591882608, run_flags = 32528, last_retcode = 1460, jmp_env = {{__jmpbuf = {227633332225, 139709399288976, 8, 139709399288985, 34, 139709399289020, 7, 32}, __mask_was_saved = -539905901, __saved_mask = {__val = {536870912, 140721978271456, 94553163314141, 1025766200822493485, 0, 0, 17689295201705805418, 140721978272380, 139709399288048, 2079749502788070076, 2777162825698555585, 4722371164336740133, 92033367151166208, 14537356584683332797, 1950363756610510412, 11731023210721953098}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {s = 0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007 at 88.244.251.18:3432"..., len = 733}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffc6386e580, obuf = {s = 0x0, len = 0}, rcv = 0x7f10a11dc908, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#25 0x000055fedfb6c007 in receive_tcp_msg (tcpbuf=0x7f10a11dcc90 "REGISTER sip:mahmut.voip.com;transport=TCP SIP/2.0\r\nVia: SIP/2.0/TCP 88.244.251.18:34323;branch=z9hG4bK-524287-2---4a0bd93a14652cc8;rport\r\nMax-Forwards: 69\r\nContact: <sip:1007 at 88.244.251.18:3432"..., len=733, rcv_info=0x7f10a11dc908, con=0x7f10a11dc8f0) at core/tcp_read.c:1383
        buf = 0x0
        bsize = 0
        blen = 1460
        __func__ = "receive_tcp_msg"
#26 0x000055fedfb6e8d3 in tcp_read_req (con=0x7f10a11dc8f0, bytes_read=0x7ffc6386ea84, read_flags=0x7ffc6386ea7c) at core/tcp_read.c:1607
        bytes = 1460
        total_bytes = 1460
        resp = 1
        size = 0
        req = 0x7f10a11dca18
        dst = {send_sock = 0x0, to = {s = {sa_family = 40112, sa_data = ".\304\020\177\000\000\360\310\035\241\020\177\000"}, sin = {sin_family = 40112, sin_port = 50222, sin_addr = {s_addr = 32528}, sin_zero = "\360\310\035\241\020\177\000"}, sin6 = {sin6_family = 40112, sin6_port = 50222, sin6_flowinfo = 32528, sin6_addr = {__in6_u = {__u6_addr8 = "\360\310\035\241\020\177\000\000\000\000\000 \002\000\000", __u6_addr16 = {51440, 41245, 32528, 0, 0, 8192, 2, 0}, __u6_addr32 = {2703083760, 32528, 536870912, 2}}}, sin6_scope_id = 1669726209}, sas = {ss_family = 40112, __ss_padding = ".\304\020\177\000\000\360\310\035\241\020\177\000\000\000\000\000 \002\000\000\000\001\000\206c\017\000\000\000 \"\343\337\376U\000\000\275N\341ZX\230\034\344\210\312\035\241\020\177\000\000(D\261\244m\345YC\340#\343\337\376U\000\000\024\000\000\000\000\000\000\000\001\000\000\000P\000\000\000\260\351\206c\374\177\000\000\276\006\252\337\376U\000\000p\352\206c\374\177\000\000\b\000\000\000\000\000\000", __ss_align = 35188667056128}}, id = -1007078360, send_flags = {f = 32528, blst_imask = 0}, proto = -120 '\210', proto_pad0 = -54 '\312', proto_pad1 = -24291}
        c = 82 'R'
        ret = -1
        __func__ = "tcp_read_req"
#27 0x000055fedfb730ec in handle_io (fm=0x7f10c3f93428, events=1, idx=-1) at core/tcp_read.c:1857
        ret = 8
        n = 1052
        read_flags = RD_CONN_SHORT_READ
        con = 0x7f10a11dc8f0
        s = 15
        resp = 1
        t = 1129964909
        ee = 0x0
        __func__ = "handle_io"
#28 0x000055fedfb5dd3a in io_wait_loop_epoll (h=0x55fedfe32220 <io_w>, t=2, repeat=0) at core/io_wait.h:1070
        n = 1
        r = 0
        fm = 0x7f10c3f93428
        revents = 1
        __func__ = "io_wait_loop_epoll"
#29 0x000055fedfb74c0e in tcp_receive_loop (unix_sock=89) at core/tcp_read.c:1978
        __func__ = "tcp_receive_loop"
#30 0x000055fedf9f8f73 in tcp_init_children (woneinit=0x7ffc6386ee3c) at core/tcp_main.c:5139
        r = 12
        i = 15
        reader_fd_1 = 89
        pid = 0
        si_desc = "tcp receiver (generic)\000\000\210\200\314\337\376U\000\000\000\000\000\000\000\000\000\000\260\234.\304\020\177\000\000\223\260\321\337\376U\000\000\000\000\000 \000\000\000\000\320\355\206c\374\177\000\000D>\244\337\376U\000\000\320\355\206c\374\177\000\000\065\243\260\337\000\000\000\000\200\355\206c\374\177\000\000\305,\306\337\376U\000\000\000\000\000\000\000\000\000\000\210\246\202\237\062\000\000"
        si = 0x0
        __func__ = "tcp_init_children"
#31 0x000055fedf8b8d96 in main_loop () at main.c:1857
        i = 16
        pid = 4933
        si = 0x0
        si_desc = "udp receiver child=15 sock=56.100.82.100:5090\000\000\360\363\206c\374\177\000\000\350Ϊ\303\020\177\000\000\260\234.\304\020\177\000\000\350Ȼ\303\020\177\000\000\000\000\000 \000\000\000\000L\235.\304\020\177\000\000\060\000\000\000\060\000\000\000\250\357\206c\374\177\000\000\300\356\206c\374\177\000\000\000\270o\344\335t\323", <incomplete sequence \365>
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#32 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
        cfg_stream = 0x55fee0304290
        c = -1
        r = 0
        tmp = 0x7ffc6386fd8a ""
        tmp_len = 0
        port = 0
        proto = 0
        ahost = 0x0
        aport = 0
        options = 0x55fedfccb0b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1758625625
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7ffc639b9268
        p = 0x7f10c4298af5 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244"
        st = {st_dev = 20, st_ino = 17804, st_nlink = 2, st_mode = 16832, st_uid = 1113, st_gid = 1113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1622014594, tv_nsec = 669820306}, st_mtim = {tv_sec = 1622023822, tv_nsec = 713813032}, st_ctim = {tv_sec = 1622023822, tv_nsec = 713813032}, __glibc_reserved = {0, 0, 0}}
        tbuf = "H\365\206c\374\177\000\000\330+=\304\020\177", '\000' <repeats 11 times>, "\033Y\304\020\177\000\000\001", '\000' <repeats 15 times>, ",\363 \304\020\177\000\000(6X\304\020\177\000\000 \364\206c\374\177\000\000\272\204Y\304\020\177\000\000\000\000\000\000\000\000\000\000 at e;\304\020\177\000\000г<\304\020\177\000\000D\364\206c\374\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>...
        option_index = 0
        long_options = {{name = 0x55fedfccd366 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fedfcc8514 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fedfccd36b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55fedfccd371 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fedfccd377 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fedfccd380 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55fedfccd38a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fedfccd394 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fedfccd39f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55fedfccd3a8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fedfccd3b3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fedfccd3b9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55fedfccd3c3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"

```

At the same time, two crashes occurs and second crash data is follows

```
#0  0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
(gdb) 

================================================================================
# GDB session generated by FS backtrace-from-core
================================================================================


================================================================================
# info threads
================================================================================
  Id   Target Id                        Frame 
* 1    Thread 0x7f10c41f5100 (LWP 4899) 0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
================================================================================
# bt
================================================================================
#0  0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#1  0x00007f10c3687075 in CONF_modules_finish () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#2  0x00007f10c36871f9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#3  0x00007f10c371c250 in OPENSSL_cleanup () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#4  0x00007f10bf82a21e in tls_h_mod_destroy_f () at tls_init.c:879
#5  0x000055fedfae5207 in destroy_tls () at core/tls_hooks.c:75
#6  0x000055fedf8a72b4 in cleanup (show_status=1) at main.c:596
#7  0x000055fedf8a8d31 in shutdown_children (sig=15, show_status=1) at main.c:718
#8  0x000055fedf8ac130 in handle_sigs () at main.c:816
#9  0x000055fedf8b9971 in main_loop () at main.c:1903
#10 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
================================================================================
# bt full
================================================================================
#0  0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#1  0x00007f10c3687075 in CONF_modules_finish () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#2  0x00007f10c36871f9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#3  0x00007f10c371c250 in OPENSSL_cleanup () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#4  0x00007f10bf82a21e in tls_h_mod_destroy_f () at tls_init.c:879
        __func__ = "tls_h_mod_destroy_f"
#5  0x000055fedfae5207 in destroy_tls () at core/tls_hooks.c:75
No locals.
#6  0x000055fedf8a72b4 in cleanup (show_status=1) at main.c:596
        memlog = 0
        __func__ = "cleanup"
#7  0x000055fedf8a8d31 in shutdown_children (sig=15, show_status=1) at main.c:718
        __func__ = "shutdown_children"
#8  0x000055fedf8ac130 in handle_sigs () at main.c:816
        chld = 0
        chld_status = 139
        any_chld_stopped = 1
        memlog = -1603236448
        __func__ = "handle_sigs"
#9  0x000055fedf8b9971 in main_loop () at main.c:1903
        i = 16
        pid = 4962
        si = 0x0
        si_desc = "udp receiver child=15 sock=56.100.82.100:5090\000\000\360\363\206c\374\177\000\000\350Ϊ\303\020\177\000\000\260\234.\304\020\177\000\000\350Ȼ\303\020\177\000\000\000\000\000 \000\000\000\000L\235.\304\020\177\000\000\060\000\000\000\060\000\000\000\250\357\206c\374\177\000\000\300\356\206c\374\177\000\000\000\270o\344\335t\323", <incomplete sequence \365>
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#10 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
        cfg_stream = 0x55fee0304290
        c = -1
        r = 0
        tmp = 0x7ffc6386fd8a ""
        tmp_len = 0
        port = 0
        proto = 0
        ahost = 0x0
        aport = 0
        options = 0x55fedfccb0b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1758625625
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7ffc639b9268
        p = 0x7f10c4298af5 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244"
        st = {st_dev = 20, st_ino = 17804, st_nlink = 2, st_mode = 16832, st_uid = 1113, st_gid = 1113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1622014594, tv_nsec = 669820306}, st_mtim = {tv_sec = 1622023822, tv_nsec = 713813032}, st_ctim = {tv_sec = 1622023822, tv_nsec = 713813032}, __glibc_reserved = {0, 0, 0}}
        tbuf = "H\365\206c\374\177\000\000\330+=\304\020\177", '\000' <repeats 11 times>, "\033Y\304\020\177\000\000\001", '\000' <repeats 15 times>, ",\363 \304\020\177\000\000(6X\304\020\177\000\000 \364\206c\374\177\000\000\272\204Y\304\020\177\000\000\000\000\000\000\000\000\000\000 at e;\304\020\177\000\000г<\304\020\177\000\000D\364\206c\374\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>...
        option_index = 0
        long_options = {{name = 0x55fedfccd366 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fedfcc8514 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fedfccd36b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55fedfccd371 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fedfccd377 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fedfccd380 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55fedfccd38a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fedfccd394 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fedfccd39f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55fedfccd3a8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fedfccd3b3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fedfccd3b9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55fedfccd3c3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
================================================================================
# thread apply all bt
================================================================================

Thread 1 (Thread 0x7f10c41f5100 (LWP 4899)):
#0  0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#1  0x00007f10c3687075 in CONF_modules_finish () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#2  0x00007f10c36871f9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#3  0x00007f10c371c250 in OPENSSL_cleanup () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
#4  0x00007f10bf82a21e in tls_h_mod_destroy_f () at tls_init.c:879
#5  0x000055fedfae5207 in destroy_tls () at core/tls_hooks.c:75
#6  0x000055fedf8a72b4 in cleanup (show_status=1) at main.c:596
#7  0x000055fedf8a8d31 in shutdown_children (sig=15, show_status=1) at main.c:718
#8  0x000055fedf8ac130 in handle_sigs () at main.c:816
#9  0x000055fedf8b9971 in main_loop () at main.c:1903
#10 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
================================================================================
# thread apply all bt full
================================================================================

Thread 1 (Thread 0x7f10c41f5100 (LWP 4899)):
#0  0x00007f10c36876df in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#1  0x00007f10c3687075 in CONF_modules_finish () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#2  0x00007f10c36871f9 in ?? () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#3  0x00007f10c371c250 in OPENSSL_cleanup () from /lib/x86_64-linux-gnu/libcrypto.so.1.1
No symbol table info available.
#4  0x00007f10bf82a21e in tls_h_mod_destroy_f () at tls_init.c:879
        __func__ = "tls_h_mod_destroy_f"
#5  0x000055fedfae5207 in destroy_tls () at core/tls_hooks.c:75
No locals.
#6  0x000055fedf8a72b4 in cleanup (show_status=1) at main.c:596
        memlog = 0
        __func__ = "cleanup"
#7  0x000055fedf8a8d31 in shutdown_children (sig=15, show_status=1) at main.c:718
        __func__ = "shutdown_children"
#8  0x000055fedf8ac130 in handle_sigs () at main.c:816
        chld = 0
        chld_status = 139
        any_chld_stopped = 1
        memlog = -1603236448
        __func__ = "handle_sigs"
#9  0x000055fedf8b9971 in main_loop () at main.c:1903
        i = 16
        pid = 4962
        si = 0x0
        si_desc = "udp receiver child=15 sock=56.100.82.100:5090\000\000\360\363\206c\374\177\000\000\350Ϊ\303\020\177\000\000\260\234.\304\020\177\000\000\350Ȼ\303\020\177\000\000\000\000\000 \000\000\000\000L\235.\304\020\177\000\000\060\000\000\000\060\000\000\000\250\357\206c\374\177\000\000\300\356\206c\374\177\000\000\000\270o\344\335t\323", <incomplete sequence \365>
        nrprocs = 16
        woneinit = 1
        __func__ = "main_loop"
#10 0x000055fedf8c3436 in main (argc=13, argv=0x7ffc6386f4d8) at main.c:3053
        cfg_stream = 0x55fee0304290
        c = -1
        r = 0
        tmp = 0x7ffc6386fd8a ""
        tmp_len = 0
        port = 0
        proto = 0
        ahost = 0x0
        aport = 0
        options = 0x55fedfccb0b8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 1758625625
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x7ffc639b9268
        p = 0x7f10c4298af5 <handle_intel+197> "H\205\300uf\213t$\004M\215\216\244"
        st = {st_dev = 20, st_ino = 17804, st_nlink = 2, st_mode = 16832, st_uid = 1113, st_gid = 1113, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1622014594, tv_nsec = 669820306}, st_mtim = {tv_sec = 1622023822, tv_nsec = 713813032}, st_ctim = {tv_sec = 1622023822, tv_nsec = 713813032}, __glibc_reserved = {0, 0, 0}}
        tbuf = "H\365\206c\374\177\000\000\330+=\304\020\177", '\000' <repeats 11 times>, "\033Y\304\020\177\000\000\001", '\000' <repeats 15 times>, ",\363 \304\020\177\000\000(6X\304\020\177\000\000 \364\206c\374\177\000\000\272\204Y\304\020\177\000\000\000\000\000\000\000\000\000\000 at e;\304\020\177\000\000г<\304\020\177\000\000D\364\206c\374\177\000\000\006", '\000' <repeats 15 times>, "/", '\000' <repeats 39 times>, "\200\037\000\000\377\377", '\000' <repeats 202 times>...
        option_index = 0
        long_options = {{name = 0x55fedfccd366 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x55fedfcc8514 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x55fedfccd36b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x55fedfccd371 "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x55fedfccd377 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x55fedfccd380 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {name = 0x55fedfccd38a "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x55fedfccd394 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x55fedfccd39f "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x55fedfccd3a8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x55fedfccd3b3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x55fedfccd3b9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {name = 0x55fedfccd3c3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"

```

#### Log Messages


```
May 26 12:12:04 dev-proxy05 kamailio[4958]: CRITICAL: <core> [core/mem/q_malloc.c:501]: qm_free(): BUG: bad pointer 0x645f6d6574737973 (out of memory block!) called from tls: tls_init.c: ser_free(323) - ignoring
May 26 12:12:05 dev-proxy05 kamailio[4962]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 85
May 26 12:12:05 dev-proxy05 kamailio[4899]: ALERT: <core> [main.c:788]: handle_sigs(): child process 4958 exited by a signal 11
May 26 12:12:05 dev-proxy05 kamailio[4899]: ALERT: <core> [main.c:791]: handle_sigs(): core was generated
May 26 12:12:05 dev-proxy05 kamailio[4899]: INFO: <core> [main.c:813]: handle_sigs(): terminating due to SIGCHLD
May 26 12:12:05 dev-proxy05 kamailio[4917]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
May 26 12:12:05 dev-proxy05 kamailio[4951]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
May 26 12:12:05 dev-proxy05 kamailio[4951]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg):
May 26 12:12:05 dev-proxy05 kamailio[4951]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments:
May 26 12:12:05 dev-proxy05 kamailio[4917]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg):
May 26 12:12:05 dev-proxy05 kamailio[4917]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments:
May 26 12:12:05 dev-proxy05 kamailio[4910]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
May 26 12:12:05 dev-proxy05 kamailio[4910]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg):
May 26 12:12:05 dev-proxy05 kamailio[4910]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments:
May 26 12:12:05 dev-proxy05 kamailio[4951]: INFO: qm_sums: qm_sums():  count=     1 size=     28488 bytes from core: core/io_wait.c: init_io_wait(516)

May 26 12:12:06 dev-proxy05 kamailio[4906]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
May 26 12:12:06 dev-proxy05 kamailio[4913]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg):
May 26 12:12:06 dev-proxy05 kamailio[4906]: INFO: <core> [main.c:884]: sig_usr(): Memory still-in-use summary (pkg):
May 26 12:12:06 dev-proxy05 kamailio[4906]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments:
May 26 12:12:06 dev-proxy05 kamailio[4913]: INFO: qm_sums: qm_sums(): summarizing all alloc'ed. fragments:

May 26 12:12:06 dev-proxy05 kamailio[4899]: CRITICAL: <core> [core/mem/q_malloc.c:501]: qm_free(): BUG: bad pointer 0x645f6d6574737973 (out of memory block!) called from tls: tls_init.c: ser_free(323) - ignoring
May 26 12:12:08 dev-proxy05 kamailio: WARNING: <core> [core/cfg.y:3660]: warn_at(): warning in config file /usr/local/etc/kamailio/kamailio.cfg, line 1433, column 10-15: constant value in if(...)
May 26 12:12:08 dev-proxy05 kamailio: WARNING: <core> [core/cfg.y:3660]: warn_at(): warning in config file /usr/local/etc/kamailio/kamailio.cfg, line 1443, column 7-12: constant value in if(...)
May 26 12:12:08 dev-proxy05 kamailio: INFO: <core> [core/sctp_core.c:74]: sctp_core_check_support(): SCTP API not enabled - if you want to use it, load sctp module
May 26 12:12:08 dev-proxy05 kamailio: INFO: <core> [core/tcp_main.c:4983]: init_tcp(): using epoll_lt as the io watch method (auto detected)
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: rr [../outbound/api.h:52]: ob_load_api(): unable to import bind_ob - maybe module is not loaded
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: rr [rr_mod.c:188]: mod_init(): outbound module not available
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: auth [auth_mod.c:345]: mod_init(): qop set, but nonce-count (nonce_count) support disabled
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: permissions [parse_config.c:254]: parse_config_file(): file not found: /usr/local/etc/kamailio/permissions.allow
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: permissions [permissions.c:613]: mod_init(): default allow file (/usr/local/etc/kamailio/permissions.allow) not found => empty rule set
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: permissions [parse_config.c:254]: parse_config_file(): file not found: /usr/local/etc/kamailio/permissions.deny
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: permissions [permissions.c:627]: mod_init(): default deny file (/usr/local/etc/kamailio/permissions.deny) not found => empty rule set
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: cfgutils [cfgutils.c:869]: mod_init(): no hash_file given, disable hash functionality
May 26 12:12:08 dev-proxy05 kamailio[5061]: NOTICE: regex [regex_mod.c:168]: mod_init(): 'file' parameter is not set, group matching disabled
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_mod.c:396]: mod_init(): use OpenSSL version: 1010104f
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_mod.c:398]: mod_init(): With ECDH-Support!
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_mod.c:401]: mod_init(): With Diffie Hellman
May 26 12:12:08 dev-proxy05 kamailio[5061]: WARNING: tls [tls_init.c:793]: tls_h_mod_init_f(): openssl bug #1491 (crash/mem leaks on low memory) workaround enabled (on low memory tls operations will fail preemptively) with free memory thresholds 33554432 and 16777216 bytes
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/cfg/cfg_ctx.c:599]: cfg_set_now(): tls.low_mem_threshold1 has been changed to 33554432
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/cfg/cfg_ctx.c:599]: cfg_set_now(): tls.low_mem_threshold2 has been changed to 16777216
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [main.c:3030]: main(): processes (at least): 64 - shm size: 536870912 - pkg size: 8388608
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/udp_server.c:154]: probe_max_receive_buffer(): SO_RCVBUF is initially 212992
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/udp_server.c:206]: probe_max_receive_buffer(): SO_RCVBUF is finally 425984
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/udp_server.c:154]: probe_max_receive_buffer(): SO_RCVBUF is initially 212992
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: <core> [core/udp_server.c:206]: probe_max_receive_buffer(): SO_RCVBUF is finally 425984
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:320]: ksr_tls_fill_missing(): TLSs<default>: tls_method=3
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:332]: ksr_tls_fill_missing(): TLSs<default>: certificate='/etc/pki/CA/wildcard_vpgrw_com.pem'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:339]: ksr_tls_fill_missing(): TLSs<default>: ca_list='/etc/pki/CA/caroot.pem'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:346]: ksr_tls_fill_missing(): TLSs<default>: ca_path='(null)'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:353]: ksr_tls_fill_missing(): TLSs<default>: crl='(null)'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:357]: ksr_tls_fill_missing(): TLSs<default>: require_certificate=0
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:364]: ksr_tls_fill_missing(): TLSs<default>: cipher_list='(null)'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:371]: ksr_tls_fill_missing(): TLSs<default>: private_key='/etc/pki/CA/kamailio_privatekey.pem'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:375]: ksr_tls_fill_missing(): TLSs<default>: verify_certificate=0
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:378]: ksr_tls_fill_missing(): TLSs<default>: verify_depth=9
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:381]: ksr_tls_fill_missing(): TLSs<default>: verify_client=0
May 26 12:12:08 dev-proxy05 kamailio[5061]: NOTICE: tls [tls_domain.c:1136]: ksr_tls_fix_domain(): registered server_name callback handler for socket [:0], server_name='<default>' ...
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:743]: set_verification(): TLSs<default>: No client certificate required and no checks performed
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:320]: ksr_tls_fill_missing(): TLSc<default>: tls_method=3
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:332]: ksr_tls_fill_missing(): TLSc<default>: certificate='/etc/pki/CA/wildcard_vpgrw_com.pem'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:339]: ksr_tls_fill_missing(): TLSc<default>: ca_list='/etc/pki/CA/caroot.pem'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:346]: ksr_tls_fill_missing(): TLSc<default>: ca_path='(null)'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:353]: ksr_tls_fill_missing(): TLSc<default>: crl='(null)'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:357]: ksr_tls_fill_missing(): TLSc<default>: require_certificate=0
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:364]: ksr_tls_fill_missing(): TLSc<default>: cipher_list='(null)'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:371]: ksr_tls_fill_missing(): TLSc<default>: private_key='/etc/pki/CA/kamailio_privatekey.pem'
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:375]: ksr_tls_fill_missing(): TLSc<default>: verify_certificate=0
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:378]: ksr_tls_fill_missing(): TLSc<default>: verify_depth=9
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:381]: ksr_tls_fill_missing(): TLSc<default>: verify_client=0
May 26 12:12:08 dev-proxy05 kamailio[5061]: INFO: tls [tls_domain.c:746]: set_verification(): TLSc<default>: Server MAY present invalid certificate
May 26 12:12:09 dev-proxy05 kamailio[5098]: ERROR: <core> [db.c:466]: db_check_table_version(): invalid version 4 for table uacreg found, expected 5 (check table structure and table "version")
May 26 12:12:09 dev-proxy05 kamailio[5098]: ERROR: uac [uac_reg.c:1382]: uac_reg_load_db(): Error during version check for db table: uacreg, check database structure.
May 26 12:12:09 dev-proxy05 kamailio[5097]: INFO: ctl [io_listener.c:214]: io_listen_loop(): io_listen_loop:  using epoll_lt io watch method (config)
May 26 12:12:09 dev-proxy05 kamailio[5103]: INFO: jsonrpcs [jsonrpcs_sock.c:443]: jsonrpc_dgram_process(): a new child 0/5103
^C

```

### Possible Solutions

Very interesting workaround solution works fine

First of all install curl-7.76.1 with this parameter --disable-openssl-auto-load-config
And then, downgrading openssl from OpenSSL 1.1.1d to openssl-1.0.2r 
And order of compilation is important

### Additional Information

  * **Kamailio Version** - output of `kamailio -v`

```
version: kamailio 5.5.0 (x86_64/linux) d4c1a1
flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: d4c1a1
compiled on 08:33:52 May 26 2021 with gcc 8.3.0
```

* **Operating System**:

```
root at dev-proxy05:/var/tmp# cat /etc/os-release
PRETTY_NAME="Debian GNU/Linux 10 (buster)"
NAME="Debian GNU/Linux"
VERSION_ID="10"
VERSION="10 (buster)"
VERSION_CODENAME=buster
ID=debian
HOME_URL="https://www.debian.org/"
SUPPORT_URL="https://www.debian.org/support"
BUG_REPORT_URL="https://bugs.debian.org/"
root at dev-proxy05:/var/tmp# cat /etc/os-release
PRETTY_NAME="Debian GNU/Linux 10 (buster)"
NAME="Debian GNU/Linux"
VERSION_ID="10"
VERSION="10 (buster)"
VERSION_CODENAME=buster
ID=debian
HOME_URL="https://www.debian.org/"
SUPPORT_URL="https://www.debian.org/support"
BUG_REPORT_URL="https://bugs.debian.org/"

```


-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/2746
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.kamailio.org/pipermail/sr-dev/attachments/20210526/a26e9091/attachment-0001.htm>


More information about the sr-dev mailing list