Description

I set some configuration parameters in the global section of kamailio.cfg and wanted to read them later in request_route and reply_route. But when accessing them, Kamailio segfaults.

However, I can read them via kamcmd after startup.

Troubleshooting

Reproduction

Set the following config parameter in your kamailio.cfg in the global section:

config.foo = "hello Daniel"

later, put your request and reply route in the configuration file:

request_route {
        xlog("L_INFO", "Reading config.foo into variable");
        $var(configfoo) = $sel(cfg_get.config.foo);
}

onreply_route {
        xlog("L_INFO", "Reading config.foo into variable");
        $var(configfoo) = $sel(cfg_get.config.foo);
}

Debugging Data

gdb output is the following:

GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/94/dfffd4a243602bbd4d977202f533c3e9e613f7.debug...done.
done.
[New LWP 7999]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio_li_sniffer.pid -f /etc/kamaili'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007f19e418e20d in ?? () from /lib/x86_64-linux-gnu/libc.so.6
#0  0x00007f19e418e20d in ?? () from /lib/x86_64-linux-gnu/libc.so.6
No symbol table info available.
#1  0x00000000006f4813 in select_cfg_var (res=0x7ffc998181d0, s=0x7f19e3965f60, msg=0x7f19e3985dd0)
    at core/cfg/cfg_select.c:227
        group = 0x7f19e394e600
        var = 0x7f19e3985958
        p = 0x40
        i = 32537
        buf = '\000' <repeats 21 times>
        __FUNCTION__ = "select_cfg_var"
#2  0x000000000050a6f0 in run_select (res=0x7ffc998181d0, s=0x7f19e3965f60, msg=0x7f19e3985dd0)
    at core/select.c:425
        ret = 0
        orig_level = 0
        __FUNCTION__ = "run_select"
#3  0x00007f19e133f089 in pv_get_select (msg=0x7f19e3985dd0, param=0x7f19e39667b8, res=0x7ffc998182d0)
    at pv_select.c:61
        s = {s = 0x0, len = 0}
        sel = 0x7f19e3965f60
#4  0x00000000005b38a3 in pv_get_spec_value (msg=0x7f19e3985dd0, sp=0x7f19e39667a0,
    value=0x7ffc998182d0) at core/pvapi.c:1307
        ret = 0
        __FUNCTION__ = "pv_get_spec_value"
#5  0x000000000057b007 in lval_pvar_assign (h=0x7ffc99818a80, msg=0x7f19e3985dd0, lv=0x7f19e3966690,
    rv=0x7f19e3966798) at core/lvalue.c:335
        pvar = 0x7f19e39658d8
        pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}
        r_avp = 0x417590 <syslog@plt>
        avp_val = {n = 7876360, s = {s = 0x782f08 "DEBUG", len = 7}, re = 0x782f08}
        ret = 0
        v = 18987664
        destroy_pval = 0
        __FUNCTION__ = "lval_pvar_assign"
#6  0x000000000057bd36 in lval_assign (h=0x7ffc99818a80, msg=0x7f19e3985dd0, lv=0x7f19e3966690,
    rve=0x7f19e3966790) at core/lvalue.c:400
        rv = 0x7f19e3966798
        ret = 0
        __FUNCTION__ = "lval_assign"
#7  0x0000000000467f60 in do_action (h=0x7ffc99818a80, a=0x7f19e3966ec0, msg=0x7f19e3985dd0)
    at core/action.c:1430
        ret = -5
        v = 6
        dst = {send_sock = 0x7f19e449f300, to = {s = {sa_family = 34783,
              sa_data = "\201\231\374\177\000\000\220\025\031\001\000\000\000"}, sin = {
              sin_family = 34783, sin_port = 39297, sin_addr = {s_addr = 32764},
              sin_zero = "\220\025\031\001\000\000\000"}, sin6 = {sin6_family = 34783,
              sin6_port = 39297, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {
                  __u6_addr8 = "\220\025\031\001\000\000\000\000@\206\201\231\374\177\000",
                  __u6_addr16 = {5520, 281, 0, 0, 34368, 39297, 32764, 0}, __u6_addr32 = {18421136, 0,
                    2575402560, 32764}}}, sin6_scope_id = 8172960}}, id = 0, proto = -32 '\340',
          send_flags = {f = 188 '\274', blst_imask = 33 '!'}}
        tmp = 0x7ffc99818a90 "\220uA"
        new_uri = 0x2010 <error: Cannot access memory at address 0x2010>
        end = 0x7f19e44a1620 ""
        crt = 0x3939393700000015 <error: Cannot access memory at address 0x3939393700000015>
        cmd = 0x7f19e395d060
        len = -467267128
        user = 32537
        uri = {user = {s = 0x7f19e44a1620 "", len = 18988272}, passwd = {s = 0x121bce0 "`\002",
            len = -467267135}, host = {
            s = 0x121bcfc "10:34:39 /usr/sbin/kamailio[7999]: DEBUG: <core> [core/select.c:412]: run_select(): Calling SELECT 0x7f19e3965f60\n", len = -464913696}, port = {
            s = 0x8 <error: Cannot access memory at address 0x8>, len = -467275366}, params = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = -468002654}, sip_params = {
            s = 0x3939393700000008 <error: Cannot access memory at address 0x3939393700000008>,
            len = 8187}, headers = {s = 0x0, len = 18987664}, port_no = 5336, proto = 125,
          type = ERROR_URI_T, flags = (unknown: 18988256), transport = {
            s = 0x2010 <error: Cannot access memory at address 0x2010>, len = -464906720}, ttl = {
            s = 0x121dcf0 "", len = -460542388}, user_param = {
            s = 0x2010 <error: Cannot access memory at address 0x2010>, len = -1472036457}, maddr = {
            s = 0x3 <error: Cannot access memory at address 0x3>, len = 5}, method = {
            s = 0x7f19e4ad7578 "\260A\256\344\031\177", len = -460539970}, lr = {s = 0x121bce0 "`\002",
            len = -1719564448}, r2 = {s = 0x7f19e40ffd28 "", len = -468690656}, gr = {
            s = 0x7ffc99818870 " Y\020\344\031\177", len = 44108294}, transport_val = {
            s = 0x7ffc99818860 "\377\377\377\377", len = 8180}, ttl_val = {s = 0x0, len = -458394160},
          user_param_val = {s = 0x7f19e4ad7000 "", len = 4253282}, maddr_val = {s = 0x7f19e410cd78 "",
            len = 4209664}, method_val = {
            s = 0x500000000 <error: Cannot access memory at address 0x500000000>, len = 981}, lr_val = {
            s = 0x7f19e449f300 "\033\t&\344\031\177", len = -458394160}, r2_val = {
            s = 0x7ffc99818900 "@\212\201\231\374\177", len = -458341112}, gr_val = {
            s = 0x7ffc99818928 " Y\020\344\031\177", len = -458341968}}
        next_hop = {user = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -460539539},
          passwd = {s = 0x0, len = -458394160}, host = {
            s = 0x393300000005 <error: Cannot access memory at address 0x393300000005>, len = 0},
          port = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -458341968}, params = {
            s = 0x121bcf0 "<191>Jun 21 10:34:39 /usr/sbin/kamailio[7999]: DEBUG: <core> [core/select.c:412]: run_select(): Calling SELECT 0x7f19e3965f60\n", len = 0}, sip_params = {
            s = 0x121bcf0 "<191>Jun 21 10:34:39 /usr/sbin/kamailio[7999]: DEBUG: <core> [core/select.c:412]: run_select(): Calling SELECT 0x7f19e3965f60\n", len = -467267135}, headers = {s = 0x0,
            len = -458341112}, port_no = 34928, proto = 39297, type = 32764,
          flags = (unknown: 2575403104), transport = {
            s = 0xa8428197 <error: Cannot access memory at address 0xa8428197>, len = 4253282}, ttl = {
            s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -467275366},
          user_param = {s = 0x7f19e4105920 "\203I", len = -458395648}, maddr = {
            s = 0x3939393700781a68 <error: Cannot access memory at address 0x3939393700781a68>,
            len = 8187}, method = {s = 0x0, len = 18987664}, lr = {
            s = 0x781d20 "%s: %s%s(): preparing to run routing scripts...\n", len = 18988256}, r2 = {
            s = 0x2010 <error: Cannot access memory at address 0x2010>, len = -464906720}, gr = {
            s = 0x121dcf0 "", len = 135}, transport_val = {
            s = 0x2010 <error: Cannot access memory at address 0x2010>, len = 10658448}, ttl_val = {
            s = 0x0, len = 7}, user_param_val = {
            s = 0xa3557a <buf+506> "13296 REGISTER\r\nMax-Forwards: 69\r\nUser-Agent: snom820/8.7.5.17\r\nContact: <sip:1016908e0@82.116.119.72:53401;line=hqwwdi0u>;reg-id=1;q=1.0;audio;mobility=\"fixed\";duplex=\"full\";description=\"snomD765\";ac"..., len = 4289936}, maddr_val = {
            s = 0x7ffc99818a40 "`\213\201\231\374\177", len = -460521481}, method_val = {
            s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, lr_val = {
            s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -468690656},
          r2_val = {s = 0x417590 <syslog@plt> "\377%\022.a", len = -1719563712}, gr_val = {
            s = 0x782f08 "DEBUG", len = -460495595}}
        u = 0x3000000010
        port = 39297
        dst_host = 0x121bce0
        i = 13
        flags = 2
        avp = 0x7ffc99818b70
        st = {flags = 3830051584, id = 32537, name = {n = -1719564353, s = {s = 0x7ffc998187bf "",
              len = 18421136}, re = 0x7ffc998187bf}, avp = 0x7ffc99818620}
        sct = 0x7f19e41aeb51
        sjt = 0x2010
        rve = 0x7ce8d0
        mct = 0x1ff4
        rv = 0x7ffc99818b50
        rv1 = 0x7ffc99818ab0
        c1 = {cache_type = 8208, val_type = 14643, c = {avp_val = {n = -464906720, s = {
                s = 0x7f19e44a1620 "", len = 18996464}, re = 0x7f19e44a1620}, pval = {rs = {
                s = 0x7f19e44a1620 "", len = 18996464}, ri = 150, flags = 0}},
          i2s = "\020 \000\000\063\071\000\000\254u\027\344\031\177\000\000\020\207\201\231\374\177"}
        s = {s = 0x6 <error: Cannot access memory at address 0x6>, len = -467997871}
        srevp = {0x7ffc99818830, 0x7ffc99818600}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0,
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
              select = 0x0}}}
        __FUNCTION__ = "do_action"
#8  0x00000000004699fa in run_actions (h=0x7ffc99818a80, a=0x7f19e3965510, msg=0x7f19e3985dd0)
    at core/action.c:1552
        t = 0x7f19e3966ec0
        ret = 1
        mod = 0xab00000003
        ms = 0
        __FUNCTION__ = "run_actions"
#9  0x000000000046a1bd in run_top_route (a=0x7f19e3965510, msg=0x7f19e3985dd0, c=0x0)
    at core/action.c:1641
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4289936,
                -8039283903424375778, 7876360, 7, 10704250, 4289936, -8039283903554399202,
                8041047856258208798}, __mask_was_saved = 0, __saved_mask = {__val = {139749141390273,
                  4294967416, 20, 20, 18446744073709551615, 140722883889968, 139749141390764, 7876360,
                  0, 4611686022733059450, 139749169323472, 140722883890016, 5295428, 4302843656,
                  139749169323472, 4611686022733059450}}}}}
        p = 0x7ffc99818a80
        ret = 0
        sfbk = 0
#10 0x000000000057f2fc in receive_msg (
    buf=0xa353f7 <buf+119> "REGISTER sip:sipgate.de SIP/2.0\r\nVia: SIP/2.0/UDP 217.116.120.247;branch=z9hG4bK0333.dae22993f9315bf8290cb153c6c2a81a.0\r\nVia: SIP/2.0/UDP 82.116.119.72:53401;received=82.116.119.72;branch=z9hG4bK-5hxr"..., len=1051, rcv_info=0x7ffc99818e80) at core/receive.c:264
        msg = 0x7f19e3985dd0
        ctx = {rec_lev = 248976, run_flags = 0, last_retcode = 568056, jmp_env = {{__jmpbuf = {568056,
                8, 25, -8487096721362804224, 170079128784, 139749117125472, 139749169323120,
                21482915456}, __mask_was_saved = 11, __saved_mask = {__val = {139749169100840, 7876360,
                  7, 140722883890512, 139749114876551, 139749114945152, 171331424705, 140722883890600,
                  98307693672, 11401280, 0, 8834747727873, 139745350909968, 7876360, 139749169100840,
                  7876360}}}}}
        bctx = 0x661d2b <qm_info+46>
        ret = 103
        stats_on = 0
        tvb = {tv_sec = 1498034079, tv_usec = 444700}
        tve = {tv_sec = 139749169323416, tv_usec = 139749168754704}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        diff = 0
        inb = {
          s = 0xa353f7 <buf+119> "REGISTER sip:sipgate.de SIP/2.0\r\nVia: SIP/2.0/UDP 217.116.120.247;branch=z9hG4bK0333.dae22993f9315bf8290cb153c6c2a81a.0\r\nVia: SIP/2.0/UDP 82.116.119.72:53401;received=82.116.119.72;branch=z9hG4bK-5hxr"..., len = 1051}
        netinfo = {data = {s = 0x7f19e3933440 "", len = 0}, dst = 0x800000 <yytable+6400>,
          rcv = 0x775508}
        keng = 0x0
        __FUNCTION__ = "receive_msg"
#11 0x00007f19e059ccdf in parsing_hepv3_message (buf=0xa35380 <buf> "HEP3\004\222", len=1170)
    at hep.c:499
        from = {s = {sa_family = 2, sa_data = "\023\304\331tx\367\000\000\000\000\000\000\000"}, sin = {
            sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 4151866585},
            sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195,
            sin6_flowinfo = 4151866585, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
                __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
            sin6_scope_id = 0}}
        to = {s = {sa_family = 2, sa_data = "\023\304\254\024\025\004\000\000\000\000\000\000\000"},
          sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 68490412},
            sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195,
            sin6_flowinfo = 68490412, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
                __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
            sin6_scope_id = 0}}
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {139749502776537, 1}, addr32 = {4151866585,
                32537, 1, 0}, addr16 = {29913, 63352, 32537, 0, 1, 0, 0, 0},
              addr = "\331tx\367\031\177\000\000\001\000\000\000\000\000\000"}}, dst_ip = {af = 2,
            len = 4, u = {addrl = {68490412, 139749187483088}, addr32 = {68490412, 0, 3836573136,
                32537}, addr16 = {5292, 1045, 0, 0, 30160, 58541, 32537, 0},
              addr = "\254\024\025\004\000\000\000\000\320u\255\344\031\177\000"}}, src_port = 5060,
          dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2,
              sa_data = "\023\304\331tx\367\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
              sin_port = 50195, sin_addr = {s_addr = 4151866585},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195,
              sin6_flowinfo = 4151866585, sin6_addr = {__in6_u = {
                  __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
                  __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f19e3985c50,
          proto = 1 '\001'}
        tmp = 0xa353f1 <buf+113> ""
        dst_ip = {af = 2, len = 4, u = {addrl = {68490412, 140722883890976}, addr32 = {68490412, 0,
              2575404832, 32764}, addr16 = {5292, 1045, 0, 0, 36640, 39297, 32764, 0},
            addr = "\254\024\025\004\000\000\000\000 \217\201\231\374\177\000"}}
        src_ip = {af = 2, len = 4, u = {addrl = {139749502776537, 139749187481600}, addr32 = {
              4151866585, 32537, 3836571648, 32537}, addr16 = {29913, 63352, 32537, 0, 28672, 58541,
              32537, 0}, addr = "\331tx\367\031\177\000\000\000p\255\344\031\177\000"}}
        si = 0x7f19e3985c50
        tmp_len = 4
        i = 1170
        payload = 0xa353f7 <buf+119> "REGISTER sip:sipgate.de SIP/2.0\r\nVia: SIP/2.0/UDP 217.116.120.247;branch=z9hG4bK0333.dae22993f9315bf8290cb153c6c2a81a.0\r\nVia: SIP/2.0/UDP 82.116.119.72:53401;received=82.116.119.72;branch=z9hG4bK-5hxr"...
        payload_len = 1051
        chunk = 0xa353f1 <buf+113>
        hg = 0x7f19e3985b60
        totelem = 11
        chunk_vendor = 0
        chunk_type = 15
        chunk_length = 1057
        total_length = 1170
        __FUNCTION__ = "parsing_hepv3_message"
#12 0x00007f19e059b264 in hepv3_received (buf=0xa35380 <buf> "HEP3\004\222", len=1170,
    ri=0x7ffc998190c0) at hep.c:231
        __FUNCTION__ = "hepv3_received"
#13 0x00007f19e05999cb in hep_msg_received (data=0x7ffc998190a0) at hep.c:85
        srevp = 0x7ffc998190a0
        buf = 0xa35380 <buf> "HEP3\004\222"
        len = 0x7ffc99819074
        ri = 0x7ffc998190c0
        __FUNCTION__ = "hep_msg_received"
        heph = 0xa35380 <buf>
#14 0x000000000049e3e1 in sr_event_exec (type=7, data=0x7ffc998190a0) at core/events.c:263
        ret = 0
        i = 7
#15 0x000000000048721a in udp_rcv_loop () at core/udp_server.c:466
        sredp = {0xa35380 <buf>, 0x7ffc99819074, 0x7ffc998190c0}
        len = 1170
        buf = "HEP3\004\222\000\000\000\001\000\a\002\000\000\000\002\000\a\021\000\000\000\a\000\b\023\304\000\000\000\b\000\b\023\304\000\000\000\t\000\n\237/JY\000\000\000\n\000\n}\354\005\000\000\000\000\v\000\a\001\000\000\000\f\000\n\000\000\000\000\000\000\000\003\000\n\331tx\367\000\000\000\004\000\n\254\024\025\004\000\000\000\016\000\024buschMyHep2001\000\000\000\017\004!REGISTER sip:sipgate.de SIP/2.0\r\nVia: SIP/2.0/UDP 217.116.120.247;branch=z9hG4bK0"...
        tmp = 0x52f3ea <init_child+52> "\311\303UH\211\345AWAVAUATSH\203\354\070H\211}\270H\203}\270"
        from = 0x7f19e3968030
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {16777343, 139749169093632}, addr32 = {16777343,
                0, 3818183680, 32537}, addr16 = {127, 256, 0, 0, 56320, 58260, 32537, 0},
              addr = "\177\000\000\001\000\000\000\000\000\334\224\343\031\177\000"}}, dst_ip = {
            af = 2, len = 4, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0,
                0}, addr = '\000' <repeats 15 times>}}, src_port = 42940, dst_port = 9060,
          proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2,
              sa_data = "\247\274\177\000\000\001\000\000\000\000\000\000\000"}, sin = {sin_family = 2,
              sin_port = 48295, sin_addr = {s_addr = 16777343},
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 48295,
              sin6_flowinfo = 16777343, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
                  __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
              sin6_scope_id = 0}}, bind_address = 0x7f19e394da80, proto = 1 '\001'}
        __FUNCTION__ = "udp_rcv_loop"
#16 0x0000000000422c08 in main_loop () at main.c:1625
        i = 1
        pid = 0
        si = 0x7f19e394da80
        si_desc = "udp receiver child=1 sock=0.0.0.0:9060\000\000\276\250s\000\000\000\000\000Z\261s\000\000\000\000\000\000\242\311\234\177\306\067\212\004\000\000\000\000\000\000\000\220uA\000\000\000\000\000\b/x\000\000\000\000\000\a\000\000\000\000\000\000\000\017", '\000' <repeats 15 times>, "\220\222\201\231\374\177\000\000i$_\000\000\000\000"
        nrprocs = 4
        woneinit = 1
        __FUNCTION__ = "main_loop"
#17 0x000000000042a308 in main (argc=13, argv=0x7ffc99819568) at main.c:2646
        cfg_stream = 0x118b010
        c = -1
        r = 0
        tmp = 0x7ffc99819f00 ""
        tmp_len = -468663896
        port = 32537
        proto = -1719561184
        options = 0x738938 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 2544599327
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0x1 <error: Cannot access memory at address 0x1>
        st = {st_dev = 15, st_ino = 11439, st_nlink = 2, st_mode = 16832, st_uid = 118, st_gid = 301,
          __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {
            tv_sec = 1495618022, tv_nsec = 508564058}, st_mtim = {tv_sec = 1498034038,
            tv_nsec = 560355778}, st_ctim = {tv_sec = 1498034038, tv_nsec = 560355778},
          __glibc_reserved = {0, 0, 0}}
        __FUNCTION__ = "main"
No symbol table info available.
1829    main.c: No such file or directory.

Log Messages

This is what debug log says (trimmed down to the essential lines):

root@busch:/var/cores# systemctl restart kamailio_li_sniffer.service && kamcmd cfg.get config foo && tail -f /var/log/kamailio/proxy.log
hello Daniel
[..]
Jun 21 10:34:39 busch /usr/sbin/kamailio[7998]: DEBUG: <core> [core/parser/msg_parser.c:600]: parse_msg(): SIP Request:
Jun 21 10:34:39 busch /usr/sbin/kamailio[7998]: DEBUG: <core> [core/parser/msg_parser.c:602]: parse_msg():  method:  <REGISTER>
Jun 21 10:34:39 busch /usr/sbin/kamailio[7998]: DEBUG: <core> [core/parser/msg_parser.c:604]: parse_msg():  uri:     <sip:sipgate.de>
Jun 21 10:34:39 busch /usr/sbin/kamailio[7998]: DEBUG: <core> [core/parser/msg_parser.c:606]: parse_msg():  version: <SIP/2.0>
[..]
Jun 21 10:34:39 busch /usr/sbin/kamailio[7999]: DEBUG: <core> [core/receive.c:234]: receive_msg(): preparing to run routing scripts...
Jun 21 10:34:39 busch /usr/sbin/kamailio[8001]: INFO: <script>: Reading config.foo into variable
Jun 21 10:34:39 busch /usr/sbin/kamailio[8000]: INFO: <script>: Reading config.foo into variable
Jun 21 10:34:39 busch /usr/sbin/kamailio[7999]: INFO: <script>: Reading config.foo into variable
Jun 21 10:34:39 busch /usr/sbin/kamailio[8001]: DEBUG: <core> [core/select.c:412]: run_select(): Calling SELECT 0x7f19e3965f60
Jun 21 10:34:39 busch /usr/sbin/kamailio[7999]: DEBUG: <core> [core/select.c:412]: run_select(): Calling SELECT 0x7f19e3965f60
Jun 21 10:34:39 busch /usr/sbin/kamailio[8000]: DEBUG: <core> [core/select.c:412]: run_select(): Calling SELECT 0x7f19e3965f60
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 11
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: DEBUG: <core> [core/tcp_main.c:3456]: handle_ser_child(): dead child 1, pid 7998 (shutting down?)
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: DEBUG: <core> [core/io_wait.h:602]: io_watch_del(): DBG: io_watch_del (0xa4c100, 11, -1, 0x0) fd_no=18 called
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 14
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: DEBUG: <core> [core/tcp_main.c:3456]: handle_ser_child(): dead child 4, pid 8001 (shutting down?)
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: DEBUG: <core> [core/io_wait.h:602]: io_watch_del(): DBG: io_watch_del (0xa4c100, 14, -1, 0x0) fd_no=17 called
Jun 21 10:34:39 busch /usr/sbin/kamailio[7996]: ALERT: <core> [main.c:743]: handle_sigs(): child process 7998 exited by a signal 11
Jun 21 10:34:39 busch /usr/sbin/kamailio[7996]: ALERT: <core> [main.c:746]: handle_sigs(): core was generated
Jun 21 10:34:39 busch /usr/sbin/kamailio[7996]: INFO: <core> [main.c:768]: handle_sigs(): terminating due to SIGCHLD
Jun 21 10:34:39 busch /usr/sbin/kamailio[7996]: DEBUG: <core> [main.c:770]: handle_sigs(): terminating due to SIGCHLD
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8009]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8008]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8007]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8006]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8005]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8002]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8003]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8004]: INFO: <core> [main.c:823]: sig_usr(): signal 15 received
[..]

SIP Traffic

The SIP traffic doesn't matter.

Additional Information

version: kamailio 5.0.2 (x86_64/linux)
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: unknown
compiled with gcc 4.9.2
Debian Jessie
Linux busch.dev.sipgate.net 3.16.0-4-amd64 #1 SMP Debian 3.16.39-1+deb8u1 (2017-02-22) x86_64 GNU/Linux


You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.