Hi there
After modifying my kamailiocfg script, I started getting crashes on the first message I tried to process I've traced the crash to the following line in the script:
``` if($expires(max)==$null) { ```
This is the log I get: (I've tried setting the debug level to 4, but there's no extra information)
``` Feb 3 15:09:35 machine /usr/sbin/kamailio[15802]: CRITICAL: <core> [pass_fdc:275]: receive_fd(): EOF on 19 Feb 3 15:09:35 machine /usr/sbin/kamailio[15788]: ALERT: <core> [mainc:728]: handle_sigs(): child process 15798 exited by a signal 11 Feb 3 15:09:35 machine /usr/sbin/kamailio[15788]: ALERT: <core> [mainc:731]: handle_sigs(): core was generated Feb 3 15:09:35 machine /usr/sbin/kamailio[15788]: INFO: <core> [mainc:743]: handle_sigs(): terminating due to SIGCHLD ```
The message I'm trying to process is (sensitive info removed):
``` REGISTER sip:(domain) SIP/20 Via: SIP/20/WSS oab5g67k4sn5invalid;branch=z9hG4bK2022891 Max-Forwards: 70 To: sip:(snip)@(domain) From: sip:(snip)@(domain);tag=6ulmjasul1 Call-ID: 9pe8esd7mgf5ahnot6jlmg CSeq: 81 REGISTER Authorization: Digest username="(snip)@(domain)",realm="(domain)",uri="(domain)",nonce="",response="" Contact: sip:7mu46fp0@oab5g67k4sn5invalid;transport=ws;reg-id=1;+sipinstance="urn:uuid:b00a91e0-418e-415f-bbc3-220891bdf671";expires=600 Allow: ACK,CANCEL,INVITE,MESSAGE,BYE,OPTIONS,INFO,NOTIFY Supported: path, gruu, outbound User-Agent: SIPjs/073 Content-Length: 0 ```
This is the output of ```kamailio -v``` (Kamailio was installed from official Debian Jessie packages):
``` version: kamailio 434 (x86_64/linux) flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, DBG_QM_MALLOC, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select id: unknown compiled with gcc 492 ```
And finally the output of ```bt full``` from the core dump (sensitive info removed):
``` (gdb) bt full #0 pv_get_expires (msg=0x0, param=0x7efc413ba8b0, res=0x7efc413b2398) at pv_corec:3060 hdr = 0x0 c = 0x0 __FUNCTION__ = "pv_get_expires" #1 0x0000000000575396 in pv_get_spec_value (msg=0x7efc414131f0, sp=0x7efc413a38e0, value=0x7ffdc841e2d0) at pvapic:1304 ret = 0 __FUNCTION__ = "pv_get_spec_value" #2 0x00000000004295af in rv_defined (cache=<optimized out>, h=<optimized out>, rv=<optimized out>, res=<optimized out>, msg=<optimized out>) at rvaluec:1851 r_avp = 0x0 avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0} pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0} tmp = {s = 0x0, len = 0} #3 int_rve_defined (h=<optimized out>, rve=<optimized out>, res=<optimized out>, msg=<optimized out>) at rvaluec:1887 No locals #4 rval_expr_eval_int (h=0x7ffdc841f5e0, msg=0x7efc414131f0, res=0x7ffdc841e390, rve=0x7efc413a4788) at rvaluec:2112 i1 = 32508 i2 = 0 ret = -1 c1 = {cache_type = 51, val_type = RV_NONE, c = {avp_val = {n = -1095355904, s = { s = 0x834e75f6beb63200 <error: Cannot access memory at address 0x834e75f6beb63200>, len = 1094799240}, re = 0x834e75f6beb63200}, pval = { rs = {s = 0x834e75f6beb63200 <error: Cannot access memory at address 0x834e75f6beb63200>, len = 1094799240}, ri = 6208836, flags = 0}}, i2s = "\231_i\000\000\000\000\000v", '\000' <repeats 12 times>} c2 = {cache_type = 25, val_type = RV_NONE, c = {avp_val = {n = 1094791664, s = {s = 0x7efc414131f0 "\002", len = -935201312}, re = 0x7efc414131f0}, pval = {rs = {s = 0x7efc414131f0 "\002", len = -935201312}, ri = -1095355904, flags = -2092009994}}, i2s = "\230\345\252>\374~\000\000\360\061AA\374~\000\000\b\310\070A\003"} rv1 = 0x1b rv2 = 0x106b48 __FUNCTION__ = "rval_expr_eval_int" #5 0x0000000000535da7 in do_action (h=0x7ffdc841f5e0, a=0x7efc413a97f8, msg=0x7efc414131f0) at actionc:1029 ret = -5 v = 1 dst = {send_sock = 0x7efc00000000, to = {s = {sa_family = 58358, sa_data = "A\310\375\177\000\000\003\000\000\000\000\000\000"}, sin = { sin_family = 58358, sin_port = 51265, sin_addr = {s_addr = 32765}, sin_zero = "\003\000\000\000\000\000\000"}, sin6 = {sin6_family = 58358, sin6_port = 51265, sin6_flowinfo = 32765, sin6_addr = {__in6_u = {__u6_addr8 = "\003\000\000\000\000\000\000\000\360\061AA\374~\000", __u6_addr16 = {3, 0, 0, 0, 12784, 16705, 32508, 0}, __u6_addr32 = {3, 0, 1094791664, 32508}}}, sin6_scope_id = 3359765984}}, id = 32765, proto = 116 't', send_flags = {f = 235 '\353', blst_imask = 65 'A'}} end = 0x7efc413a4788 """ user = 7 uri = {user = {s = 0x7ffdc841f5e0 "\004", len = -5}, passwd = {s = 0x7ffdc841f5e0 "\004", len = 1103579353}, host = { s = 0x12e8a0c "15:09:34 /usr/sbin/kamailio[15798]: INFO: <script>: ", '#' <repeats 25 times>, " 2", len = 1105930976}, port = { s = 0x8 <error: Cannot access memory at address 0x8>, len = 1103571122}, params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1095355904}, sip_params = {s = 0x3839373531002010 <error: Cannot access memory at address 0x3839373531002010>, len = 1094328520}, headers = {s = 0x7ffdc841f5e0 "\004", len = -5}, port_no = 62944, proto = 51265, type = 32765, flags = (unknown: 3359762480), transport = { s = 0x7 <error: Cannot access memory at address 0x7>, len = 5457144}, ttl = {s = 0x7ffdc841e540 "", len = 1094791664}, user_param = {s = 0x0, len = 1094328520}, maddr = {s = 0x7ffd00000001 <error: Cannot access memory at address 0x7ffd00000001>, len = -935205648}, method = { s = 0x7efc41eb4620 <main_arena> "", len = 19827200}, lr = {s = 0x12e89f0 "`\002", len = 0}, r2 = {s = 0x7ffdc841f5e0 "\004", len = 1094791664}, gr = {s = 0x7ffdc841f5e0 "\004", len = -935204816}, transport_val = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 5505783}, ttl_val = {s = 0x0, len = 1}, user_param_val = {s = 0x7ffdc841e540 "", len = 1226318819}, maddr_val = {s = 0x7efc414131f0 "\002", len = -935201312}, method_val = {s = 0x7ffdc841e830 "\001", len = 7}, lr_val = { s = 0xa980ecb86b5823e3 <error: Cannot access memory at address 0xa980ecb86b5823e3>, len = 862069731}, r2_val = { s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 0}, gr_val = { s = 0x15 <error: Cannot access memory at address 0x15>, len = 1103049695}} next_hop = {user = {s = 0x0, len = 1454512174}, passwd = {s = 0x12e8a00 "", len = 91}, host = {s = 0x7ffdc841f5e0 "\004", len = 4343256}, port = { s = 0x300695fd1 <error: Cannot access memory at address 0x300695fd1>, len = 0}, params = {s = 0x12e8a00 "", len = 0}, sip_params = { s = 0x7ffdc841f5e0 "\004", len = -935204620}, headers = {s = 0x900000022 <error: Cannot access memory at address 0x900000022>, len = -1095355904}, port_no = 1, proto = 0, type = 116, flags = (unknown: 3359762480), transport = {s = 0x7ffdc841f5e0 "\004", len = 4343256}, ttl = {s = 0x12d9750 "UTC", len = -1095355904}, user_param = {s = 0x7efc392f9000 "", len = 10431048}, maddr = { ---Type <return> to continue, or q <return> to quit--- s = 0x80 <error: Cannot access memory at address 0x80>, len = 0}, method = {s = 0x7efc413fa4b8 '#' <repeats 25 times>, " 2", len = 1051386920}, lr = {s = 0x7efc395e17dc "\002", len = -1095355904}, r2 = {s = 0x7efc413a11ad "public_ip)", len = 1094330328}, gr = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = 1094791664}, transport_val = {s = 0x7ffdc841f5e0 "\004", len = 4364164}, ttl_val = {s = 0x701afe <__FUNCTION__7450> "set_dst_uri", len = 7164677}, user_param_val = {s = 0x7efc3e8aaf47 "<script>: ", len = 27}, maddr_val = {s = 0x7efc0000000e <error: Cannot access memory at address 0x7efc0000000e>, len = 1}, method_val = { s = 0x7ffdc841e790 "", len = 5590540}, lr_val = {s = 0x0, len = 1065399085}, r2_val = { s = 0x17ffdc841f5e0 <error: Cannot access memory at address 0x17ffdc841f5e0>, len = 0}, gr_val = {s = 0x7efc413a11ad "public_ip)", len = 9}} u = 0x7efc414131f0 flags = 32765 st = {flags = 0, id = 0, name = {n = 1454512174, s = {s = 0x56b2182e <error: Cannot access memory at address 0x56b2182e>, len = 19827200}, re = 0x56b2182e}, avp = 0x5b} sct = 0x7efc414131f0 sjt = 0x7efc414131f0 mct = 0x7 rv = 0x7ffdc841e3e0 rv1 = 0x7efc413a4788 c1 = {cache_type = 11, val_type = 13363, c = {avp_val = {n = 5463987, s = {s = 0x535fb3 <do_action+4643> "\203e\004\371\211E\b\211\005ȵK", len = -1}, re = 0x535fb3 <do_action+4643>}, pval = {rs = {s = 0x535fb3 <do_action+4643> "\203e\004\371\211E\b\211\005ȵK", len = -1}, ri = 936, flags = 0}}, i2s = "\030C\261A\374~\000\000\000\062\266\276\366uN\203\020\357A\310\375\177"} s = {s = 0x7efc41eb2300 <_nl_C_LC_TIME> "3@\307A\374~", len = -935205473} srevp = {0x12d9750, 0x7ffdc841e400} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = { number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #6 0x00000000005344f8 in run_actions (h=0x0, a=0x7efc413ba8b0, msg=0x7efc413b2398) at actionc:1548 ret = 1 mod = 0x7efc413a97f8 __FUNCTION__ = "run_actions" #7 0x0000000000535df6 in do_action (h=0x7ffdc841f5e0, a=0x7efc413a9a20, msg=0x7efc414131f0) at actionc:1048 ret = 1 v = 1 dst = {send_sock = 0x7efc41ebb0c0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\340\365A\310\375\177\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\340\365A\310\375\177\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\340\365A\310\375\177\000\000\360\061AA\374~\000", __u6_addr16 = {62944, 51265, 32765, 0, 12784, 16705, 32508, 0}, __u6_addr32 = {3359765984, 32765, 1094791664, 32508}}}, sin6_scope_id = 3359765984}}, id = 32765, proto = 116 't', send_flags = {f = 235 '\353', blst_imask = 65 'A'}} end = 0x7efc413a27d8 "\001" user = 7 uri = {user = {s = 0x0, len = 4364390}, passwd = {s = 0xa980ecb8729823e3 <error: Cannot access memory at address 0xa980ecb8729823e3>, len = 862069731}, host = {s = 0x0, len = 0}, port = {s = 0x7ffdc841ea50 "\006\255\212>\374~", len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 1102424698}, headers = { s = 0x7ffdc841ea20 "\a\255\212>\374~", len = 1102424698}, port_no = 62944, proto = 51265, type = 32765, flags = (URI_USER_NORMALIZE | unknown: 1103579356), transport = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 7}, ttl = { s = 0x7efc41c748e0 "", len = 1094791664}, user_param = {s = 0x0, len = -1095355904}, maddr = { s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = -935203980}, method = { s = 0x7ffd00000001 <error: Cannot access memory at address 0x7ffd00000001>, len = 4343256}, lr = { s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 0}, r2 = { s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 1102424698}, gr = { s = 0x7efc41b5aa7a <_IO_vfprintf_internal+22490> "\200\275(\373\377\377", len = 0}, transport_val = {s = 0x0, len = -1095355904}, ttl_val = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = 1094303056}, user_param_val = {s = 0x0, len = 1094791664}, maddr_val = {s = 0x7ffdc841f5e0 "\004", len = -935203824}, method_val = {s = 0x0, len = 4365298}, lr_val = { s = 0x7efc3e8aad07 "", len = 862069731}, r2_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = -935202832}, ---Type <return> to continue, or q <return> to quit--- gr_val = {s = 0x0, len = 1094590120}} next_hop = {user = {s = 0x7efc3e8aad06 "s", len = 5463542}, passwd = {s = 0x7efc41c72380 "LINUX_26", len = 24}, host = {s = 0x7ffdc841f0b0 "\a", len = -935202832}, port = {s = 0x2d3237312d706910 <error: Cannot access memory at address 0x2d3237312d706910>, len = 858599731}, params = { s = 0x7365772d00000001 <error: Cannot access memory at address 0x7365772d00000001>, len = 120728948}, sip_params = { s = 0x65746e6908657475 <error: Cannot access memory at address 0x65746e6908657475>, len = 1818324594}, headers = { s = 0x7ffd00000001 <error: Cannot access memory at address 0x7ffd00000001>, len = -1095355904}, port_no = 35808, proto = 16875, type = 32508, flags = (unknown: 3359763664), transport = {s = 0x7ffd00000001 <error: Cannot access memory at address 0x7ffd00000001>, len = 4343256}, ttl = { s = 0x1 <error: Cannot access memory at address 0x1>, len = -935203680}, user_param = {s = 0x7ffdc841f450 "", len = -1095355904}, maddr = { s = 0x0, len = 101}, method = {s = 0x0, len = -1095355904}, lr = {s = 0x22f33078 <error: Cannot access memory at address 0x22f33078>, len = 1094304888}, r2 = {s = 0x0, len = 1094791664}, gr = {s = 0x7ffdc841f5e0 "\004", len = -935203632}, transport_val = {s = 0x0, len = 4365370}, ttl_val = {s = 0x7ffdc841ed84 "", len = -935203456}, user_param_val = { s = 0xc841ed88 <error: Cannot access memory at address 0xc841ed88>, len = -935203804}, maddr_val = { s = 0x3c6ae380 <error: Cannot access memory at address 0x3c6ae380>, len = -1095355904}, method_val = { s = 0x5 <error: Cannot access memory at address 0x5>, len = 1094493960}, lr_val = {s = 0x7ffdc841ece4 "\374~", len = -935203616}, r2_val = { s = 0x7ffdc841ece8 "\337\356A\310\375\177", len = -935203744}, gr_val = {s = 0x3c6ae380 <error: Cannot access memory at address 0x3c6ae380>, len = 1110301724}} u = 0x7efc414131f0 flags = 0 st = {flags = 1049275654, id = 32508, name = {n = 5463542, s = {s = 0x535df6 <do_action+4198> "\351\235\361\377\377\017\037D", len = 1103569792}, re = 0x535df6 <do_action+4198>}, avp = 0x3000000018} sct = 0x7efc414131f0 sjt = 0x7efc414131f0 mct = 0x7 rv = 0x7efc41395318 rv1 = 0x7efc413a27d8 c1 = {cache_type = 7, val_type = RV_NONE, c = {avp_val = {n = -1095355904, s = { s = 0x834e75f6beb63200 <error: Cannot access memory at address 0x834e75f6beb63200>, len = 0}, re = 0x834e75f6beb63200}, pval = {rs = { s = 0x834e75f6beb63200 <error: Cannot access memory at address 0x834e75f6beb63200>, len = 0}, ri = 1094301224, flags = 32508}}, i2s = "\377\377\377\377\000\000\000\000\360\061AA\374~\000\000\340\365A\310\375\177"} s = {s = 0x7ffd00000001 <error: Cannot access memory at address 0x7ffd00000001>, len = -935204300} srevp = {0x7ffd00000001, 0x4245d8 <rval_get_int+328>} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = { number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #8 0x00000000005344f8 in run_actions (h=0x0, a=0x7efc413ba8b0, msg=0x7efc413b2398) at actionc:1548 ret = 1 mod = 0x7efc413a9a20 __FUNCTION__ = "run_actions" #9 0x0000000000535df6 in do_action (h=0x7ffdc841f5e0, a=0x7efc413abe40, msg=0x7efc414131f0) at actionc:1048 ret = 1 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 60726, sa_data = "A\310\375\177\000\000\003\000\000\000\000\000\000"}, sin = {sin_family = 60726, sin_port = 51265, sin_addr = {s_addr = 32765}, sin_zero = "\003\000\000\000\000\000\000"}, sin6 = {sin6_family = 60726, sin6_port = 51265, sin6_flowinfo = 32765, sin6_addr = {__in6_u = {__u6_addr8 = "\003\000\000\000\000\000\000\000\000uOB\374~\000", __u6_addr16 = {3, 0, 0, 0, 29952, 16975, 32508, 0}, __u6_addr32 = {3, 0, 1112503552, 32508}}}, sin6_scope_id = 3359763792}}, id = 32765, proto = 64 '@', send_flags = {f = 237 '\355', blst_imask = 65 'A'}} end = 0x7efc4139c478 "\020" user = 7 uri = {user = {s = 0x0, len = 1071808}, passwd = {s = 0x105ac0 <error: Cannot access memory at address 0x105ac0>, len = 1103579353}, host = { s = 0x12e8a0c "15:09:34 /usr/sbin/kamailio[15798]: INFO: <script>: ", '#' <repeats 25 times>, " 2", len = 1105930976}, port = { s = 0x8 <error: Cannot access memory at address 0x8>, len = 1103571122}, params = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1102842242}, sip_params = {s = 0x3839373531002010 <error: Cannot access memory at address 0x3839373531002010>, len = 8187}, headers = { ---Type <return> to continue, or q <return> to quit--- s = 0x0, len = 19826592}, port_no = 44285, proto = 16010, type = 32508, flags = (unknown: 19827184), transport = { s = 0x2010 <error: Cannot access memory at address 0x2010>, len = 1105937952}, ttl = {s = 0x12eaa00 "", len = 99}, user_param = { s = 0x2010 <error: Cannot access memory at address 0x2010>, len = 1102620300}, maddr = {s = 0x7ffdc841eef0 "\360\357A\310\375\177", len = -935203280}, method = {s = 0x7efc41eb4620 <main_arena> "", len = 19827200}, lr = {s = 0x12e89f0 "`\002", len = 112}, r2 = { s = 0x63 <error: Cannot access memory at address 0x63>, len = 1102624841}, gr = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, transport_val = {s = 0x12e89f0 "`\002", len = 19826592}, ttl_val = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 1049275645}, user_param_val = { s = 0x7ffdc841efd8 "0", len = 19826592}, maddr_val = {s = 0x0, len = 1049275645}, method_val = {s = 0x7ffdc841efd8 "0", len = 19826592}, lr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1049275645}, r2_val = {s = 0x7ffdc841efd8 "0", len = 0}, gr_val = { s = 0x15 <error: Cannot access memory at address 0x15>, len = 1103049695}} next_hop = {user = {s = 0x7ffdc841eff0 "\340\365A\310\375\177", len = 1454512174}, passwd = {s = 0x12e8a00 "", len = 98}, host = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 1}, port = {s = 0x7ffdc841ef10 "", len = 2100831203}, params = { s = 0x12e8a00 "", len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x900000022 <error: Cannot access memory at address 0x900000022>, len = 15}, port_no = 1, proto = 0, type = 116, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE), transport = { s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 0}, ttl = {s = 0x12d9750 "UTC", len = 1082951260}, user_param = {s = 0x0, len = 10431048}, maddr = {s = 0x80 <error: Cannot access memory at address 0x80>, len = 0}, method = { s = 0x7efc413fa4b8 '#' <repeats 25 times>, " 2", len = 1051386920}, lr = {s = 0x7efc395e17dc "\002", len = 1103050658}, r2 = {s = 0x0, len = 48}, gr = {s = 0x7ffdc841f0b8 "\370DS", len = -935202832}, transport_val = {s = 0x7ffdc841f5e0 "\004", len = 4364164}, ttl_val = { s = 0x0, len = 7164677}, user_param_val = {s = 0x7efc3e8aaf47 "<script>: ", len = 34}, maddr_val = { s = 0x3 <error: Cannot access memory at address 0x3>, len = 1094793532}, method_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1094793534}, lr_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 16384}, r2_val = {s = 0x7efc41413bc8 "\001", len = 0}, gr_val = {s = 0x7efc413ea6d8 "\001", len = 1094796272}} u = 0x7efc414131f0 flags = 32765 st = {flags = 3359764464, id = 32765, name = {n = 1454512174, s = {s = 0x56b2182e <error: Cannot access memory at address 0x56b2182e>, len = 19827200}, re = 0x56b2182e}, avp = 0x62} sct = 0x7efc414131f0 sjt = 0x7efc414131f0 mct = 0x7 rv = 0x7ffdc841ed20 rv1 = 0x7efc4139c478 c1 = {cache_type = 2822930839, val_type = 13363, c = {avp_val = {n = 4249229, s = {s = 0x40d68d "_setjmp", len = -1}, re = 0x40d68d}, pval = {rs = { s = 0x40d68d "_setjmp", len = -1}, ri = -1095355904, flags = -2092009994}}, i2s = " \211\261A\374~\000\000\000pNB\374~\000\000\000\000\200\000\000"} s = {s = 0x7efc41eb2300 <_nl_C_LC_TIME> "3@\307A\374~", len = -935203105} srevp = {0x12d9750, 0x7ffdc841ed40} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = { number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #10 0x00000000005344f8 in run_actions (h=0x0, a=0x7efc413ba8b0, msg=0x7efc413b2398) at actionc:1548 ret = -935201312 mod = 0x7efc413abe40 __FUNCTION__ = "run_actions" #11 0x0000000000535fb3 in do_action (h=0x7ffdc841f5e0, a=0x7efc413b15b8, msg=0x7efc414131f0) at actionc:677 ret = -5 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = { s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} end = 0x7ffdc841f5e0 "\004" user = 7 ---Type <return> to continue, or q <return> to quit--- uri = {user = {s = 0x0, len = 29064505}, passwd = {s = 0x397d000200000000 <error: Cannot access memory at address 0x397d000200000000>, len = 514361265}, host = {s = 0x9500000000 <error: Cannot access memory at address 0x9500000000>, len = 0}, port = { s = 0x7efc4135d988 "\377\377\377\377", len = 3}, params = {s = 0x7efc41413938 "\001", len = 554}, sip_params = {s = 0x0, len = 0}, headers = { s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = { s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 1087259383}, user_param_val = {s = 0x800000 <error: Cannot access memory at address 0x800000>, len = 7316592}, maddr_val = { s = 0xa8498 <error: Cannot access memory at address 0xa8498>, len = 1072016}, method_val = { s = 0x106730 <error: Cannot access memory at address 0x106730>, len = 8}, lr_val = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -1095355904}, r2_val = {s = 0x7efc413ea598 <incomplete sequence \350>, len = 6208836}, gr_val = { s = 0x6ff2b0 <__FUNCTION__7432> "parse_via", len = 8}} u = 0x7efc414131f0 flags = 0 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x7efc414131f0 sjt = 0x7efc414131f0 mct = 0x7 rv = 0x0 rv1 = 0x7ffdc841f5e0 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 1094794080, s = {s = 0x7efc41413b60 "\r\n", len = 1094794080}, re = 0x7efc41413b60}, pval = {rs = {s = 0x7efc41413b60 "\r\n", len = 1094794080}, ri = 2, flags = 4}}, i2s = "\261\207\250\036", '\000' <repeats 12 times>, "\002\000\000\000\004"} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NUMBER_ST, u = {number = 1, string = 0x1 <error: Cannot access memory at address 0x1>, str = { s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, data = 0x1, attr = 0x1, select = 0x1}}, {type = RVE_FREE_FIXUP_ST, u = { number = 0, string = 0x0, str = {s = 0x0, len = 18}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __FUNCTION__ = "do_action" #12 0x00000000005344f8 in run_actions (h=0x0, h@entry=0x7ffdc841f5e0, a=0x7efc413ba8b0, a@entry=0x7efc41377020, msg=0x7efc413b2398, msg@entry=0x7efc414131f0) at actionc:1548 ret = 1 mod = 0x7efc4137b298 __FUNCTION__ = "run_actions" #13 0x0000000000540395 in run_top_route (a=0x7efc41377020, msg=0x7efc414131f0, c=<optimized out>) at actionc:1634 ctx = {rec_lev = 4, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140727963219424, 6231711104974201827, 139621891010592, 139621891650032, 0, 1, -6232721608053087261, 6231711524010992611}, __mask_was_saved = 0, __saved_mask = {__val = {139621891483192, 139621759855240, 139621759855981, 12884901890, 9461629569774006784, 139621891650032, 6468903, 797, 139621759855301, 67, 9461629569774006784, 139621759855240, 139621890800648, 1073741825, 139621884092226, 139621891526464}}}}} p = <optimized out> ret = <optimized out> sfbk = 0 #14 0x00000000005412f6 in receive_msg (buf=0x0, len=1094428848, rcv_info=0x7efc39662770) at receivec:196 msg = 0x7efc414131f0 ctx = {rec_lev = 54, run_flags = 0, last_retcode = -1095355904, jmp_env = {{__jmpbuf = {139621891650032, 139621754151690, 12892248866, -8985114503935544832, 139621890580496, 167509935093, 139621891483352, 139621884117751}, __mask_was_saved = 1094624824, __saved_mask = { __val = {213, 12892180832, 9461629569774006784, 139621890580496, 6210549, 139621890906504, 139621884117751, 139621891650032, 280, 12892020044, 9461629569774006784, 139621890580496, 6210549, 12884901955, 9461629569774006784, 8388608}}}}} inb = { ---Type <return> to continue, or q <return> to quit--- s = 0x7efc39662a50 "REGISTER sip:(domain) SIP/20\r\nVia: SIP/20/WSS oab5g67k4sn5invalid;branch=z9hG4bK2022891\r\nMax-Forwards: 69\r\nTo: sip:(snip)@(domain)\r\nFrom:", len = 797} __FUNCTION__ = "receive_msg" #15 0x00007efc38edd45a in ws_frame_receive (data=0x7ffdc841f8f0) at ws_framec:664 frame = {fin = 128, rsv1 = 0, rsv2 = 0, rsv3 = 0, opcode = 1, mask = 128, payload_len = 797, masking_key = "\024\034\202", <incomplete sequence \350>, payload_data = 0x7efc39662a50 "REGISTER sip:(domain) SIP/20\r\nVia: SIP/20/WSS oab5g67k4sn5invalid;branch=z9hG4bK2022891\r\nMax-Forwards: 69\r\nTo: sip:(snip)@(domain)\r\nFrom:", wsc = 0x7efc3967ba40} __FUNCTION__ = "ws_frame_receive" #16 0x00000000005b37f8 in ws_process_msg ( tcpbuf=0x7efc39662a48 "\201\376\003\035\024\034\202\350REGISTER sip:(domain) SIP/20\r\nVia: SIP/20/WSS oab5g67k4sn5invalid;branch=z9hG4bK2022891\r\nMax-Forwards: 69\r\nTo: <sip:(snip)@(domain)", len=805, rcv_info=0x7efc39662770, con=0x7efc39662758) at tcp_readc:1168 ret = 0 tev = {type = 10, buf = 0x7efc39662a48 "\201\376\003\035\024\034\202\350REGISTER sip:(domain) SIP/20\r\nVia: SIP/20/WSS oab5g67k4sn5invalid;branch=z9hG4bK2022891\r\nMax-Forwards: 69\r\nTo: <sip:(snip)@(domain)", len = 805, rcv = 0x7efc39662770, con = 0x7efc39662758} __FUNCTION__ = "ws_process_msg" #17 0x00000000005bc06a in tcp_read_req (con=0x7efc39662758, bytes_read=0x7ffdc841fa10, read_flags=0x7ffdc841fa18) at tcp_readc:1391 bytes = 0 total_bytes = 805 resp = 0 size = 139621891253144 dst = {send_sock = 0x0, to = {s = {sa_family = 15412, sa_data = "\\000\000\000\000\000@\371A\310\375\177\000"}, sin = {sin_family = 15412, sin_port = 92, sin_addr = {s_addr = 0}, sin_zero = "@\371A\310\375\177\000"}, sin6 = {sin6_family = 15412, sin6_port = 92, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "@\371A\310\375\177\000\000\001\000\000\000\000\000\000", __u6_addr16 = {63808, 51265, 32765, 0, 1, 0, 0, 0}, __u6_addr32 = {3359766848, 32765, 1, 0}}}, sin6_scope_id = 8193}}, id = 1094715080, proto = -4 '\374', send_flags = { f = 126 '~', blst_imask = 0 '\000'}} c = 0 '\000' ret = 0 __FUNCTION__ = "tcp_read_req" #18 0x00000000005c0ec4 in handle_io (fm=0x0, events=-22352, idx=1094394776) at tcp_readc:1642 ret = 7065 n = 0 read_flags = 1 con = 0x7efc39662758 s = 9 t = 0 __FUNCTION__ = "handle_io" #19 0x00000000005c5efa in io_wait_loop_epoll (h=<optimized out>, t=<optimized out>, repeat=<optimized out>) at io_waith:1061 revents = 1094428848 n = 1 fm = 0x0 #20 tcp_receive_loop (unix_sock=0) at tcp_readc:1754 __FUNCTION__ = "tcp_receive_loop" #21 0x00000000004d3c07 in tcp_init_children () at tcp_mainc:4788 reader_fd_1 = 22 pid = 0 si_desc = "tcp receiver (generic)\000\000{\202P\000\000\000\000\000\001\000\000\000\000\000\000\000\360\071\067A\374~\000\000\000\000\000\000\000\000\000\000\004\000\000\000\000\000\000\000\004\000\000\000\000\000\000\000{\202P", '\000' <repeats 13 times>, "xA7A\374~\000\000\000\000\000\000\003\000\000\000\000\062\266\276\366uN\203\004\000\000\000\000\000\000\000{\202P\000\000\000\000" __FUNCTION__ = "tcp_init_children" #22 0x0000000000507073 in main_loop () at mainc:1662 si_desc = "udp receiver child=3 sock=(IP):5060\000\000\000\000\b\000\000\000\003\000\000\000\000\062\266\276\366uN\203\000\220/9\374~\000\000\000\062\266\276\366uN\203\340\016\232=\374~\000\000\000\062\266\276\366uN\203\210\030\244\000\000\000\000\000\002\000\000\000\000\000\000\000H\030\244\000\000\000\000\000@\030\244\000\000\000\000" __FUNCTION__ = "main_loop" ---Type <return> to continue, or q <return> to quit--- #23 0x000000000041cb9d in main (argc=0, argv=0x4) at mainc:2553 cfg_stream = 0x7 r = 0 tmp = 0x1 <error: Cannot access memory at address 0x1> tmp_len = 0 port = 0 proto = 1112438224 ret = 4 seed = 1827671730 debug_save = 7 debug_flag = 0 dont_fork_cnt = 7 st = {st_dev = 15, st_ino = 8722, st_nlink = 2, st_mode = 16832, st_uid = 0, st_gid = 0, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1454512079, tv_nsec = 628000000}, st_mtim = {tv_sec = 1454511908, tv_nsec = 932000000}, st_ctim = { tv_sec = 1454511908, tv_nsec = 932000000}, __glibc_reserved = {0, 0, 0}} __FUNCTION__ = "main" ```
Thanks for the help
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/495