### Description

Having clients connected via TCP doing only passive connections in the kamailio 
server it seems the tcp_send_timeout is not used on messages going out to the 
clients. While tcp_keepalive is doing well as long as there was not sent any 
packet to the client tcp_send_timout does nothing. The underlying Linux tries 
to send the SIP message for ages (15 minutes in my case).

Do I have a wrong understanding of tcp_send_timeout?

I tried with tcp_async yes and no with same results.

### Troubleshooting

These are my tcp settings:

```
# def = 10 Time in seconds after a TCP connection will be closed if it is not 
available for writing in this interval (and Kamailio wants to send something on 
it).
# Lower this value for faster detection of broken TCP connections.
tcp_send_timeout=3

tcp_connect_timeout=10  # def = 10
tcp_connection_lifetime=3605
tcp_rd_buf_size=32768
tcp_max_connections=2048
tcp_connection_match=1  # match also local port

tcp_keepalive=yes       # Enables keepalive for tcp (sets SO_KEEPALIVE socket 
option)
tcp_keepcnt=3           # Number of keepalives sent before dropping the 
connection (TCP_KEEPCNT socket option). Linux only.
tcp_keepidle=30         # Time before starting to send keepalives, if the 
connection is idle (TCP_KEEPIDLE socket option). Linux only.
tcp_keepintvl=10        # Time interval between keepalive probes, when the 
previous probe failed (TCP_KEEPINTVL socket option). Linux only.

tcp_async=yes           # alias tcp_buf_write, default=yes
tcp_crlf_ping=no
```

I also tried to set the tcp_send_timeout to much too high value 333666 to 
trigger this line of code in tcp_options.c:

```
WARN("%s: timeout too big (%u), the maximum value is %u\n",
                                name, *to, max_val);
```

But even in -d -d -d debugging that line never hits.

I do **not** make any connections outbound (senseless on NAT). Instead I'd like 
to reject this:

```
                if ($dP =~ "tcp") {
                        set_forward_no_connect();
                        xlog("L_INFO", ">> checking tcp connection to $dd:$dp");
                        if(tcp_get_conid("$dd:$dp", "$var(conid)")) {
                                xlog("L_INFO", ">> connection id to $dd:$dp is: 
$var(conid)");
                        } else {
                                xlog("L_ERR", ">> connection to $dd:$dp is no 
longer connected. Client must reregister!");
                                sl_send_reply("480", "TCP not connected");
                                exit;
                        }
                }
```

But the connection ID is still there for a long time. And there are no 
keepalives done since the outgoing packets are in the queue.

#### Reproduction

1. Register a client with TCP.
2. Pull the plug.
3. Make a call to it.
4. Run a `'watch 'netstat -tapen | grep <client_ip>'`: The connected client 
never vanishes.
5. Run a `tcpdump -i ethX tcp port <kamailio_server_port>`: the system tries to 
send the packet for a long time

#### Log Messages

There is not much to see in the log, even in debug level.

`/usr/sbin/kamailio -P /var/run/kamailio/kamailio.sbc.pid -f 
/etc/kamailio.sbc/kamailio.cfg -m 48 -M 24 -u kamailio -g kamailio -d -d -d`

At that moment the switchport was already shutdown:

```
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: INFO: sbc:<script>: Network 
sending:
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
INVITE sip:2...@ws2.domain.tld;user=phone SIP/2.0
Record-Route: <sip:192.168.48.131:5065;r2=on;lr;ftag=97p54nlxgb;x-rtpp=1>
Record-Route: <sip:10.101.65.131:5082;r2=on;lr;ftag=97p54nlxgb;x-rtpp=1>
Via: SIP/2.0/UDP 
192.168.48.131:5065;branch=z9hG4bKe01f.07e0d03fb0af18dcdb76154be67bea1d.0
Via: SIP/2.0/UDP 
192.168.41.57:48310;received=10.101.65.130;branch=z9hG4bK-nzdt1be9c4xn;rport=48310
From: "01/301102-21" <sip:15553010...@ws2.domain.tld>;tag=97p54nlxgb
To: <sip:2...@ws2.domain.tld;user=phone>
Call-ID: 3136383336323230393839333336-jg7spjsktbm2
CSeq: 2 INVITE
Max-Forwards: 69
User-Agent: snomD765/10.1.49.11
Contact: 
<sip:15553010221@192.168.48.131:5065;ntv3=2;alias=10.101.65.130~48310~1;fs=udp:10.101.65.131:5082;uri=sip:15553010221%40192.168.41.57:48310%3bline%3dbq029ivo;line=bq029ivo>;reg-id=1
Accept: application/sdp
Allow: INVITE, ACK, CANCEL, BYE, REFER, OPTIONS, NOTIFY, SUBSCRIBE, PRACK, 
MESSAGE, INFO, UPDATE
Allow-Events: talk, hold, refer, call-info
Supported: timer, 100rel, replaces, from-change
Session-Expires: 3600
Min-SE: 90
Proxy-Authorization: Digest 
username="45487cfdffef4777",realm="ws2.domain.tld",nonce="d84c8d657ba6e3081547bbb6e0c1817c",uri="sip:2...@ws2.domain.tld;user=phone",qop=auth,nc=00000001,cnonce="6be15ae9",response="9455eafa4f6b2b78e971a87cb2716132",opaque="485307819b9fa9a1f7e2ca58ae77f795",algorithm=MD5
Content-Type: application/sdp
Content-Length: 258
P-Charging-Vector: icid-value=31363833363232;icid-generated-at=c5sbcp01t
X-User: <sip:45487cfdffef4...@ws2.domain.tld>
X-Location: dev.DefaultGroup;reg=192.168.48.68:5060;sig=192.168.48.74:5060;bt=0
X-Realm: p01t

v=0
o=root 711904586 711904586 IN IP4 10.101.65.133
s=call
c=IN IP4 10.101.65.133
t=0 0
m=audio 10490 RTP/AVP 9 8 101
a=rtpmap:9 G722/8000
a=rtpmap:8 PCMA/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-15
a=sendrecv
a=rtcp:10491
a=ptime:20

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:tm [t_funcs.c:373]: 
t_relay_to(): new transaction forwarded
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/receive.c:528]: receive_msg(): request-route executed in: 45584 usec
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/usr_avp.c:637]: destroy_avp_list(): destroying list (nil)
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/usr_avp.c:637]: destroy_avp_list(): destroying list (nil)
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/usr_avp.c:637]: destroy_avp_list(): destroying list (nil)
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/usr_avp.c:637]: destroy_avp_list(): destroying list (nil)
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/usr_avp.c:637]: destroy_avp_list(): destroying list (nil)
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/usr_avp.c:637]: destroy_avp_list(): destroying list (nil)
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/xavp.c:541]: xavp_destroy_list(): destroying xavp list (nil)
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/xavp.c:541]: xavp_destroy_list(): destroying xavp list (nil)
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/xavp.c:541]: xavp_destroy_list(): destroying xavp list (nil)
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/receive.c:628]: receive_msg(): cleaning up
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/parser/sdp/sdp.c:863]: free_sdp(): _sdp = 0x7fa8d478c728
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/parser/sdp/sdp.c:865]: free_sdp(): sdp = 0x7fa8d44ef100
May  9 10:48:19 p01t-1 kamailio.sbc[150273]: DEBUG: sbc:<core> 
[core/parser/sdp/sdp.c:867]: free_sdp(): session = 0x7fa8d44ee018

... 

May  9 10:48:19 p01t-1 kamailio.sbc[150271]: DEBUG: sbc:<core> 
[core/tcp_main.c:1664]: _tcpconn_find(): found connection by peer address (id: 
1)
May  9 10:48:19 p01t-1 kamailio.sbc[150271]: DEBUG: sbc:<core> 
[core/tcp_main.c:2541]: tcpconn_send_put(): found fd in cache (11, 
0x7fa8d0965140, 1)
May  9 10:48:19 p01t-1 kamailio.sbc[150271]: DEBUG: sbc:<core> 
[core/tcp_main.c:2763]: tcpconn_do_send(): sending...
May  9 10:48:19 p01t-1 kamailio.sbc[150271]: DEBUG: sbc:<core> 
[core/tcp_main.c:2796]: tcpconn_do_send(): after real write: c= 0x7fa8d0965140 
n=1261 fd=11
May  9 10:48:19 p01t-1 kamailio.sbc[150271]: DEBUG: sbc:<core> 
[core/tcp_main.c:2797]: tcpconn_do_send(): buf=
INVITE sip:22@192.168.41.157:39342;line=5z2d2k8i;ob SIP/2.0

...

```

Finally the Application Server in front cancels the call.

But look at this:

```
root@p01t-1:~# tcpdump -nn -i eth1 tcp port 5082
tcpdump: verbose output suppressed, use -v[v]... for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), snapshot length 262144 bytes
10:47:31.915062 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [.], ack 
3024626659, win 501, options [nop,nop,TS val 924881395 ecr 4525523], length 0
10:47:31.916129 IP 10.101.65.130.39342 > 10.101.65.131.5082: Flags [.], ack 1, 
win 4836, options [nop,nop,TS val 4528662 ecr 924819977], length 0

10:48:02.635024 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [.], ack 1, 
win 501, options [nop,nop,TS val 924912115 ecr 4528662], length 0
10:48:02.636100 IP 10.101.65.130.39342 > 10.101.65.131.5082: Flags [.], ack 1, 
win 4836, options [nop,nop,TS val 4531734 ecr 924819977], length 0

----- switch port port shutdown ------

----- make the call:

10:48:19.690401 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924929170 ecr 4531734], length 
1261
10:48:19.899036 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924929379 ecr 4531734], length 
1261
10:48:20.331011 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924929811 ecr 4531734], length 
1261
10:48:21.194994 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924930675 ecr 4531734], length 
1261
10:48:22.891001 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924932371 ecr 4531734], length 
1261
10:48:26.446978 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924935927 ecr 4531734], length 
1261
10:48:33.355070 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924942835 ecr 4531734], length 
1261
10:48:40.011057 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924949491 ecr 4531734], length 
1261
10:48:46.667041 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924956147 ecr 4531734], length 
1261
10:48:53.323039 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924962803 ecr 4531734], length 
1261
10:48:59.979042 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924969459 ecr 4531734], length 
1261
10:49:06.635029 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924976115 ecr 4531734], length 
1261
10:49:13.291079 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924982771 ecr 4531734], length 
1261
10:49:19.947045 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924989427 ecr 4531734], length 
1261
10:49:26.603048 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 924996083 ecr 4531734], length 
1261
10:49:33.259016 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925002739 ecr 4531734], length 
1261
10:49:39.915052 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925009395 ecr 4531734], length 
1261
10:49:46.571046 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925016051 ecr 4531734], length 
1261
10:49:53.227015 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925022707 ecr 4531734], length 
1261
10:49:59.883017 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925029363 ecr 4531734], length 
1261
10:50:06.539037 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925036019 ecr 4531734], length 
1261
10:50:13.195051 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925042675 ecr 4531734], length 
1261
10:50:19.850986 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925049331 ecr 4531734], length 
1261
10:50:26.507018 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925055987 ecr 4531734], length 
1261
10:50:33.163011 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925062643 ecr 4531734], length 
1261
10:50:39.819015 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925069299 ecr 4531734], length 
1261
10:50:46.475056 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925075955 ecr 4531734], length 
1261
10:50:53.135023 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925082615 ecr 4531734], length 
1261
10:51:00.043094 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925089523 ecr 4531734], length 
1261
10:51:06.699024 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925096179 ecr 4531734], length 
1261
10:51:13.355049 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925102835 ecr 4531734], length 
1261
10:51:20.011080 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925109491 ecr 4531734], length 
1261
10:51:26.667023 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925116147 ecr 4531734], length 
1261
10:51:33.323042 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925122803 ecr 4531734], length 
1261
10:51:39.979029 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925129459 ecr 4531734], length 
1261
10:51:46.635040 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925136115 ecr 4531734], length 
1261
10:51:53.291007 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925142771 ecr 4531734], length 
1261
10:51:59.947009 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925149427 ecr 4531734], length 
1261
10:52:06.603019 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925156083 ecr 4531734], length 
1261
10:52:13.259033 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925162739 ecr 4531734], length 
1261
10:52:19.915011 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925169395 ecr 4531734], length 
1261
10:52:26.571014 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925176051 ecr 4531734], length 
1261
10:52:33.227032 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925182707 ecr 4531734], length 
1261
10:52:39.883041 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925189363 ecr 4531734], length 
1261
10:52:46.539013 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925196019 ecr 4531734], length 
1261
10:52:53.199018 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925202679 ecr 4531734], length 
1261
10:53:00.107035 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925209587 ecr 4531734], length 
1261
10:53:06.763039 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925216243 ecr 4531734], length 
1261
10:53:13.419041 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925222899 ecr 4531734], length 
1261
10:53:20.075014 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925229555 ecr 4531734], length 
1261
10:53:26.731046 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925236211 ecr 4531734], length 
1261
10:53:33.387027 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925242867 ecr 4531734], length 
1261
10:53:40.043077 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925249523 ecr 4531734], length 
1261
10:53:46.699076 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925256179 ecr 4531734], length 
1261
10:53:53.355055 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925262835 ecr 4531734], length 
1261
10:54:00.011019 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925269491 ecr 4531734], length 
1261
10:54:06.667071 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925276147 ecr 4531734], length 
1261
10:54:13.323026 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925282803 ecr 4531734], length 
1261
10:54:19.979077 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925289459 ecr 4531734], length 
1261
10:54:26.635284 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925296115 ecr 4531734], length 
1261
10:54:33.291019 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925302771 ecr 4531734], length 
1261
10:54:39.946998 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925309427 ecr 4531734], length 
1261
10:54:46.603049 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925316083 ecr 4531734], length 
1261
10:54:53.259008 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925322739 ecr 4531734], length 
1261
10:54:59.915019 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925329395 ecr 4531734], length 
1261
10:55:06.571100 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925336051 ecr 4531734], length 
1261
10:55:13.227056 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925342707 ecr 4531734], length 
1261
10:55:19.883016 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925349363 ecr 4531734], length 
1261
10:55:26.539021 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925356019 ecr 4531734], length 
1261
10:55:33.195043 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925362675 ecr 4531734], length 
1261
10:55:39.850991 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925369331 ecr 4531734], length 
1261
10:55:46.507013 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925375987 ecr 4531734], length 
1261
10:55:53.163060 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925382643 ecr 4531734], length 
1261
10:55:59.819014 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925389299 ecr 4531734], length 
1261
10:56:06.475045 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925395955 ecr 4531734], length 
1261
10:56:13.131065 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925402611 ecr 4531734], length 
1261
10:56:19.787052 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925409267 ecr 4531734], length 
1261
10:56:26.443048 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925415923 ecr 4531734], length 
1261
10:56:33.099016 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925422579 ecr 4531734], length 
1261
10:56:39.755032 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925429235 ecr 4531734], length 
1261
10:56:46.411005 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925435891 ecr 4531734], length 
1261
10:56:53.067116 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925442547 ecr 4531734], length 
1261
10:56:59.723032 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925449203 ecr 4531734], length 
1261
10:57:06.379062 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925455859 ecr 4531734], length 
1261
10:57:13.035003 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925462515 ecr 4531734], length 
1261
10:57:19.691077 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925469171 ecr 4531734], length 
1261
10:57:26.347050 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925475827 ecr 4531734], length 
1261
10:57:33.003004 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925482483 ecr 4531734], length 
1261
10:57:39.659029 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925489139 ecr 4531734], length 
1261
10:57:46.314989 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925495795 ecr 4531734], length 
1261
10:57:52.971040 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925502451 ecr 4531734], length 
1261
10:57:59.631026 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925509111 ecr 4531734], length 
1261
10:58:06.539039 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925516019 ecr 4531734], length 
1261
10:58:13.195056 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925522675 ecr 4531734], length 
1261
10:58:19.851012 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925529331 ecr 4531734], length 
1261
10:58:26.507049 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925535987 ecr 4531734], length 
1261
10:58:33.163017 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925542643 ecr 4531734], length 
1261
10:58:39.819091 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925549299 ecr 4531734], length 
1261
10:58:46.475017 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925555955 ecr 4531734], length 
1261
10:58:53.131046 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925562611 ecr 4531734], length 
1261
10:58:59.786990 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925569267 ecr 4531734], length 
1261
10:59:06.443029 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925575923 ecr 4531734], length 
1261
10:59:13.099009 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925582579 ecr 4531734], length 
1261
10:59:19.754984 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925589235 ecr 4531734], length 
1261
10:59:26.411053 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925595891 ecr 4531734], length 
1261
10:59:33.067041 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925602547 ecr 4531734], length 
1261
10:59:39.723053 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925609203 ecr 4531734], length 
1261
10:59:46.379016 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925615859 ecr 4531734], length 
1261
10:59:53.035054 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925622515 ecr 4531734], length 
1261
10:59:59.691058 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925629171 ecr 4531734], length 
1261
11:00:06.347021 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925635827 ecr 4531734], length 
1261
11:00:13.003052 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925642483 ecr 4531734], length 
1261
11:00:19.659043 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925649139 ecr 4531734], length 
1261
11:00:26.315011 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925655795 ecr 4531734], length 
1261
11:00:32.971015 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925662451 ecr 4531734], length 
1261
11:00:39.627039 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925669107 ecr 4531734], length 
1261
11:00:46.283052 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925675763 ecr 4531734], length 
1261
11:00:52.939024 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925682419 ecr 4531734], length 
1261
11:00:59.595048 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925689075 ecr 4531734], length 
1261
11:01:06.251017 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925695731 ecr 4531734], length 
1261
11:01:12.907013 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925702387 ecr 4531734], length 
1261
11:01:19.563042 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925709043 ecr 4531734], length 
1261
11:01:26.219027 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925715699 ecr 4531734], length 
1261
11:01:32.875010 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925722355 ecr 4531734], length 
1261
11:01:39.531004 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925729011 ecr 4531734], length 
1261
11:01:46.187040 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925735667 ecr 4531734], length 
1261
11:01:52.843002 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925742323 ecr 4531734], length 
1261
11:01:59.499048 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925748979 ecr 4531734], length 
1261
11:02:06.155027 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925755635 ecr 4531734], length 
1261
11:02:12.811044 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925762291 ecr 4531734], length 
1261
11:02:19.467018 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925768947 ecr 4531734], length 
1261
11:02:26.123041 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925775603 ecr 4531734], length 
1261
11:02:32.779046 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925782259 ecr 4531734], length 
1261
11:02:39.435015 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925788915 ecr 4531734], length 
1261
11:02:46.091034 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925795571 ecr 4531734], length 
1261
11:02:52.747128 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925802227 ecr 4531734], length 
1261
11:02:59.403096 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925808883 ecr 4531734], length 
1261
11:03:06.059012 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925815539 ecr 4531734], length 
1261
11:03:12.715029 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925822195 ecr 4531734], length 
1261
11:03:19.370993 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925828851 ecr 4531734], length 
1261
11:03:26.027010 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925835507 ecr 4531734], length 
1261
11:03:32.683029 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925842163 ecr 4531734], length 
1261
11:03:39.339046 IP 10.101.65.131.5082 > 10.101.65.130.39342: Flags [P.], seq 
1:1262, ack 1, win 501, options [nop,nop,TS val 925848819 ecr 4531734], length 
1261

```

### Possible Solutions

I have no idea why tcp_send_timeout is not set on the connected socket during 
spawning the listener for this client.

### Additional Information

```
root@p01t-1:~# kamailio -V
version: kamailio 5.6.4 (x86_64/linux)
flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, 
USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, 
DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, 
USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, 
TLS_PTHREAD_MUTEX_SHARED
ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, 
BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: unknown
compiled with gcc 10.2.1
```

* **Operating System**:

```
root@p01t-1:~# cat /etc/debian_version
11.7

Linux p01t-1.neotel.at 5.10.0-22-amd64 #1 SMP Debian 5.10.178-3 (2023-04-22) 
x86_64 GNU/Linux
```
[debug.log](https://github.com/kamailio/kamailio/files/11429302/debug.log)


-- 
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/3443
You are receiving this because you are subscribed to this thread.

Message ID: <kamailio/kamailio/issues/3...@github.com>
_______________________________________________
Kamailio (SER) - Development Mailing List
To unsubscribe send an email to sr-dev-le...@lists.kamailio.org

Reply via email to