### Description
I set some configuration parameters in the global section of kamailio.cfg and wanted to
read them later in request_route and reply_route. But when accessing them, Kamailio
segfaults.
However, I can read them via kamcmd after startup.
### Troubleshooting
#### Reproduction
Set the following config parameter in your kamailio.cfg in the global section:
```
config.foo = "hello Daniel"
```
later, put your request and reply route in the configuration file:
```
request_route {
xlog("L_INFO", "Reading config.foo into variable");
$var(configfoo) = $sel(cfg_get.config.foo);
}
onreply_route {
xlog("L_INFO", "Reading config.foo into variable");
$var(configfoo) = $sel(cfg_get.config.foo);
}
```
#### Debugging Data
gdb output is the following:
```
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from
/usr/lib/debug/.build-id/94/dfffd4a243602bbd4d977202f533c3e9e613f7.debug...done.
done.
[New LWP 7999]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio_li_sniffer.pid -f
/etc/kamaili'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x00007f19e418e20d in ?? () from /lib/x86_64-linux-gnu/libc.so.6
#0 0x00007f19e418e20d in ?? () from /lib/x86_64-linux-gnu/libc.so.6
No symbol table info available.
#1 0x00000000006f4813 in select_cfg_var (res=0x7ffc998181d0, s=0x7f19e3965f60,
msg=0x7f19e3985dd0)
at core/cfg/cfg_select.c:227
group = 0x7f19e394e600
var = 0x7f19e3985958
p = 0x40
i = 32537
buf = '\000' <repeats 21 times>
__FUNCTION__ = "select_cfg_var"
#2 0x000000000050a6f0 in run_select (res=0x7ffc998181d0, s=0x7f19e3965f60,
msg=0x7f19e3985dd0)
at core/select.c:425
ret = 0
orig_level = 0
__FUNCTION__ = "run_select"
#3 0x00007f19e133f089 in pv_get_select (msg=0x7f19e3985dd0, param=0x7f19e39667b8,
res=0x7ffc998182d0)
at pv_select.c:61
s = {s = 0x0, len = 0}
sel = 0x7f19e3965f60
#4 0x00000000005b38a3 in pv_get_spec_value (msg=0x7f19e3985dd0, sp=0x7f19e39667a0,
value=0x7ffc998182d0) at core/pvapi.c:1307
ret = 0
__FUNCTION__ = "pv_get_spec_value"
#5 0x000000000057b007 in lval_pvar_assign (h=0x7ffc99818a80, msg=0x7f19e3985dd0,
lv=0x7f19e3966690,
rv=0x7f19e3966798) at core/lvalue.c:335
pvar = 0x7f19e39658d8
pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}
r_avp = 0x417590 <syslog@plt>
avp_val = {n = 7876360, s = {s = 0x782f08 "DEBUG", len = 7}, re =
0x782f08}
ret = 0
v = 18987664
destroy_pval = 0
__FUNCTION__ = "lval_pvar_assign"
#6 0x000000000057bd36 in lval_assign (h=0x7ffc99818a80, msg=0x7f19e3985dd0,
lv=0x7f19e3966690,
rve=0x7f19e3966790) at core/lvalue.c:400
rv = 0x7f19e3966798
ret = 0
__FUNCTION__ = "lval_assign"
#7 0x0000000000467f60 in do_action (h=0x7ffc99818a80, a=0x7f19e3966ec0,
msg=0x7f19e3985dd0)
at core/action.c:1430
ret = -5
v = 6
dst = {send_sock = 0x7f19e449f300, to = {s = {sa_family = 34783,
sa_data = "\201\231\374\177\000\000\220\025\031\001\000\000\000"},
sin = {
sin_family = 34783, sin_port = 39297, sin_addr = {s_addr = 32764},
sin_zero = "\220\025\031\001\000\000\000"}, sin6 = {sin6_family =
34783,
sin6_port = 39297, sin6_flowinfo = 32764, sin6_addr = {__in6_u = {
__u6_addr8 =
"\220\025\031\001\000\000\000\000@\206\201\231\374\177\000",
__u6_addr16 = {5520, 281, 0, 0, 34368, 39297, 32764, 0}, __u6_addr32 =
{18421136, 0,
2575402560, 32764}}}, sin6_scope_id = 8172960}}, id = 0, proto = -32
'\340',
send_flags = {f = 188 '\274', blst_imask = 33 '!'}}
tmp = 0x7ffc99818a90 "\220uA"
new_uri = 0x2010 <error: Cannot access memory at address 0x2010>
end = 0x7f19e44a1620 ""
crt = 0x3939393700000015 <error: Cannot access memory at address
0x3939393700000015>
cmd = 0x7f19e395d060
len = -467267128
user = 32537
uri = {user = {s = 0x7f19e44a1620 "", len = 18988272}, passwd = {s =
0x121bce0 "`\002",
len = -467267135}, host = {
s = 0x121bcfc "10:34:39 /usr/sbin/kamailio[7999]: DEBUG: <core>
[core/select.c:412]: run_select(): Calling SELECT 0x7f19e3965f60\n", len =
-464913696}, port = {
s = 0x8 <error: Cannot access memory at address 0x8>, len = -467275366},
params = {
s = 0x1 <error: Cannot access memory at address 0x1>, len = -468002654},
sip_params = {
s = 0x3939393700000008 <error: Cannot access memory at address
0x3939393700000008>,
len = 8187}, headers = {s = 0x0, len = 18987664}, port_no = 5336, proto =
125,
type = ERROR_URI_T, flags = (unknown: 18988256), transport = {
s = 0x2010 <error: Cannot access memory at address 0x2010>, len =
-464906720}, ttl = {
s = 0x121dcf0 "", len = -460542388}, user_param = {
s = 0x2010 <error: Cannot access memory at address 0x2010>, len =
-1472036457}, maddr = {
s = 0x3 <error: Cannot access memory at address 0x3>, len = 5}, method =
{
s = 0x7f19e4ad7578 "\260A\256\344\031\177", len = -460539970}, lr =
{s = 0x121bce0 "`\002",
len = -1719564448}, r2 = {s = 0x7f19e40ffd28 "", len = -468690656},
gr = {
s = 0x7ffc99818870 " Y\020\344\031\177", len = 44108294},
transport_val = {
s = 0x7ffc99818860 "\377\377\377\377", len = 8180}, ttl_val = {s =
0x0, len = -458394160},
user_param_val = {s = 0x7f19e4ad7000 "", len = 4253282}, maddr_val =
{s = 0x7f19e410cd78 "",
len = 4209664}, method_val = {
s = 0x500000000 <error: Cannot access memory at address 0x500000000>,
len = 981}, lr_val = {
s = 0x7f19e449f300 "\033\t&\344\031\177", len = -458394160},
r2_val = {
s = 0x7ffc99818900 "@\212\201\231\374\177", len = -458341112},
gr_val = {
s = 0x7ffc99818928 " Y\020\344\031\177", len = -458341968}}
next_hop = {user = {s = 0x1 <error: Cannot access memory at address 0x1>,
len = -460539539},
passwd = {s = 0x0, len = -458394160}, host = {
s = 0x393300000005 <error: Cannot access memory at address
0x393300000005>, len = 0},
port = {s = 0x1 <error: Cannot access memory at address 0x1>, len =
-458341968}, params = {
s = 0x121bcf0 "<191>Jun 21 10:34:39 /usr/sbin/kamailio[7999]:
DEBUG: <core> [core/select.c:412]: run_select(): Calling SELECT
0x7f19e3965f60\n", len = 0}, sip_params = {
s = 0x121bcf0 "<191>Jun 21 10:34:39 /usr/sbin/kamailio[7999]:
DEBUG: <core> [core/select.c:412]: run_select(): Calling SELECT
0x7f19e3965f60\n", len = -467267135}, headers = {s = 0x0,
len = -458341112}, port_no = 34928, proto = 39297, type = 32764,
flags = (unknown: 2575403104), transport = {
s = 0xa8428197 <error: Cannot access memory at address 0xa8428197>, len
= 4253282}, ttl = {
s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len
= -467275366},
user_param = {s = 0x7f19e4105920 "\203I", len = -458395648}, maddr =
{
s = 0x3939393700781a68 <error: Cannot access memory at address
0x3939393700781a68>,
len = 8187}, method = {s = 0x0, len = 18987664}, lr = {
s = 0x781d20 "%s: %s%s(): preparing to run routing scripts...\n",
len = 18988256}, r2 = {
s = 0x2010 <error: Cannot access memory at address 0x2010>, len =
-464906720}, gr = {
s = 0x121dcf0 "", len = 135}, transport_val = {
s = 0x2010 <error: Cannot access memory at address 0x2010>, len =
10658448}, ttl_val = {
s = 0x0, len = 7}, user_param_val = {
s = 0xa3557a <buf+506> "13296 REGISTER\r\nMax-Forwards:
69\r\nUser-Agent: snom820/8.7.5.17\r\nContact:
<sip:1016908e0@82.116.119.72:53401;line=hqwwdi0u>;reg-id=1;q=1.0;audio;mobility=\"fixed\";duplex=\"full\";description=\"snomD765\";ac"...,
len = 4289936}, maddr_val = {
s = 0x7ffc99818a40 "`\213\201\231\374\177", len = -460521481},
method_val = {
s = 0x5 <error: Cannot access memory at address 0x5>, len = 0}, lr_val =
{
s = 0x100000000 <error: Cannot access memory at address 0x100000000>,
len = -468690656},
r2_val = {s = 0x417590 <syslog@plt> "\377%\022.a", len =
-1719563712}, gr_val = {
s = 0x782f08 "DEBUG", len = -460495595}}
u = 0x3000000010
port = 39297
dst_host = 0x121bce0
i = 13
flags = 2
avp = 0x7ffc99818b70
st = {flags = 3830051584, id = 32537, name = {n = -1719564353, s = {s =
0x7ffc998187bf "",
len = 18421136}, re = 0x7ffc998187bf}, avp = 0x7ffc99818620}
sct = 0x7f19e41aeb51
sjt = 0x2010
rve = 0x7ce8d0
mct = 0x1ff4
rv = 0x7ffc99818b50
rv1 = 0x7ffc99818ab0
c1 = {cache_type = 8208, val_type = 14643, c = {avp_val = {n = -464906720, s = {
s = 0x7f19e44a1620 "", len = 18996464}, re = 0x7f19e44a1620},
pval = {rs = {
s = 0x7f19e44a1620 "", len = 18996464}, ri = 150, flags = 0}},
i2s = "\020
\000\000\063\071\000\000\254u\027\344\031\177\000\000\020\207\201\231\374\177"}
s = {s = 0x6 <error: Cannot access memory at address 0x6>, len =
-467997871}
srevp = {0x7ffc99818830, 0x7ffc99818600}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s =
0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {
type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__FUNCTION__ = "do_action"
#8 0x00000000004699fa in run_actions (h=0x7ffc99818a80, a=0x7f19e3965510,
msg=0x7f19e3985dd0)
at core/action.c:1552
t = 0x7f19e3966ec0
ret = 1
mod = 0xab00000003
ms = 0
__FUNCTION__ = "run_actions"
#9 0x000000000046a1bd in run_top_route (a=0x7f19e3965510, msg=0x7f19e3985dd0, c=0x0)
at core/action.c:1641
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf =
{4289936,
-8039283903424375778, 7876360, 7, 10704250, 4289936,
-8039283903554399202,
8041047856258208798}, __mask_was_saved = 0, __saved_mask = {__val =
{139749141390273,
4294967416, 20, 20, 18446744073709551615, 140722883889968,
139749141390764, 7876360,
0, 4611686022733059450, 139749169323472, 140722883890016, 5295428,
4302843656,
139749169323472, 4611686022733059450}}}}}
p = 0x7ffc99818a80
ret = 0
sfbk = 0
#10 0x000000000057f2fc in receive_msg (
buf=0xa353f7 <buf+119> "REGISTER sip:sipgate.de SIP/2.0\r\nVia: SIP/2.0/UDP
217.116.120.247;branch=z9hG4bK0333.dae22993f9315bf8290cb153c6c2a81a.0\r\nVia: SIP/2.0/UDP
82.116.119.72:53401;received=82.116.119.72;branch=z9hG4bK-5hxr"..., len=1051,
rcv_info=0x7ffc99818e80) at core/receive.c:264
msg = 0x7f19e3985dd0
ctx = {rec_lev = 248976, run_flags = 0, last_retcode = 568056, jmp_env =
{{__jmpbuf = {568056,
8, 25, -8487096721362804224, 170079128784, 139749117125472,
139749169323120,
21482915456}, __mask_was_saved = 11, __saved_mask = {__val =
{139749169100840, 7876360,
7, 140722883890512, 139749114876551, 139749114945152, 171331424705,
140722883890600,
98307693672, 11401280, 0, 8834747727873, 139745350909968, 7876360,
139749169100840,
7876360}}}}}
bctx = 0x661d2b <qm_info+46>
ret = 103
stats_on = 0
tvb = {tv_sec = 1498034079, tv_usec = 444700}
tve = {tv_sec = 139749169323416, tv_usec = 139749168754704}
tz = {tz_minuteswest = 0, tz_dsttime = 0}
diff = 0
inb = {
s = 0xa353f7 <buf+119> "REGISTER sip:sipgate.de SIP/2.0\r\nVia:
SIP/2.0/UDP 217.116.120.247;branch=z9hG4bK0333.dae22993f9315bf8290cb153c6c2a81a.0\r\nVia:
SIP/2.0/UDP 82.116.119.72:53401;received=82.116.119.72;branch=z9hG4bK-5hxr"..., len =
1051}
netinfo = {data = {s = 0x7f19e3933440 "", len = 0}, dst = 0x800000
<yytable+6400>,
rcv = 0x775508}
keng = 0x0
__FUNCTION__ = "receive_msg"
#11 0x00007f19e059ccdf in parsing_hepv3_message (buf=0xa35380 <buf>
"HEP3\004\222", len=1170)
at hep.c:499
from = {s = {sa_family = 2, sa_data =
"\023\304\331tx\367\000\000\000\000\000\000\000"}, sin = {
sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 4151866585},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2,
sin6_port = 50195,
sin6_flowinfo = 4151866585, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}}
to = {s = {sa_family = 2, sa_data =
"\023\304\254\024\025\004\000\000\000\000\000\000\000"},
sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 68490412},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2,
sin6_port = 50195,
sin6_flowinfo = 68490412, sin6_addr = {__in6_u = {__u6_addr8 = '\000'
<repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}}
ri = {src_ip = {af = 2, len = 4, u = {addrl = {139749502776537, 1}, addr32 =
{4151866585,
32537, 1, 0}, addr16 = {29913, 63352, 32537, 0, 1, 0, 0, 0},
addr = "\331tx\367\031\177\000\000\001\000\000\000\000\000\000"}},
dst_ip = {af = 2,
len = 4, u = {addrl = {68490412, 139749187483088}, addr32 = {68490412, 0,
3836573136,
32537}, addr16 = {5292, 1045, 0, 0, 30160, 58541, 32537, 0},
addr =
"\254\024\025\004\000\000\000\000\320u\255\344\031\177\000"}}, src_port = 5060,
dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s =
{sa_family = 2,
sa_data = "\023\304\331tx\367\000\000\000\000\000\000\000"}, sin =
{sin_family = 2,
sin_port = 50195, sin_addr = {s_addr = 4151866585},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family =
2, sin6_port = 50195,
sin6_flowinfo = 4151866585, sin6_addr = {__in6_u = {
__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0,
0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address =
0x7f19e3985c50,
proto = 1 '\001'}
tmp = 0xa353f1 <buf+113> ""
dst_ip = {af = 2, len = 4, u = {addrl = {68490412, 140722883890976}, addr32 =
{68490412, 0,
2575404832, 32764}, addr16 = {5292, 1045, 0, 0, 36640, 39297, 32764, 0},
addr = "\254\024\025\004\000\000\000\000
\217\201\231\374\177\000"}}
src_ip = {af = 2, len = 4, u = {addrl = {139749502776537, 139749187481600}, addr32
= {
4151866585, 32537, 3836571648, 32537}, addr16 = {29913, 63352, 32537, 0,
28672, 58541,
32537, 0}, addr =
"\331tx\367\031\177\000\000\000p\255\344\031\177\000"}}
si = 0x7f19e3985c50
tmp_len = 4
i = 1170
payload = 0xa353f7 <buf+119> "REGISTER sip:sipgate.de SIP/2.0\r\nVia:
SIP/2.0/UDP 217.116.120.247;branch=z9hG4bK0333.dae22993f9315bf8290cb153c6c2a81a.0\r\nVia:
SIP/2.0/UDP 82.116.119.72:53401;received=82.116.119.72;branch=z9hG4bK-5hxr"...
payload_len = 1051
chunk = 0xa353f1 <buf+113>
hg = 0x7f19e3985b60
totelem = 11
chunk_vendor = 0
chunk_type = 15
chunk_length = 1057
total_length = 1170
__FUNCTION__ = "parsing_hepv3_message"
#12 0x00007f19e059b264 in hepv3_received (buf=0xa35380 <buf>
"HEP3\004\222", len=1170,
ri=0x7ffc998190c0) at hep.c:231
__FUNCTION__ = "hepv3_received"
#13 0x00007f19e05999cb in hep_msg_received (data=0x7ffc998190a0) at hep.c:85
srevp = 0x7ffc998190a0
buf = 0xa35380 <buf> "HEP3\004\222"
len = 0x7ffc99819074
ri = 0x7ffc998190c0
__FUNCTION__ = "hep_msg_received"
heph = 0xa35380 <buf>
#14 0x000000000049e3e1 in sr_event_exec (type=7, data=0x7ffc998190a0) at
core/events.c:263
ret = 0
i = 7
#15 0x000000000048721a in udp_rcv_loop () at core/udp_server.c:466
sredp = {0xa35380 <buf>, 0x7ffc99819074, 0x7ffc998190c0}
len = 1170
buf =
"HEP3\004\222\000\000\000\001\000\a\002\000\000\000\002\000\a\021\000\000\000\a\000\b\023\304\000\000\000\b\000\b\023\304\000\000\000\t\000\n\237/JY\000\000\000\n\000\n}\354\005\000\000\000\000\v\000\a\001\000\000\000\f\000\n\000\000\000\000\000\000\000\003\000\n\331tx\367\000\000\000\004\000\n\254\024\025\004\000\000\000\016\000\024buschMyHep2001\000\000\000\017\004!REGISTER
sip:sipgate.de SIP/2.0\r\nVia: SIP/2.0/UDP 217.116.120.247;branch=z9hG4bK0"...
tmp = 0x52f3ea <init_child+52>
"\311\303UH\211\345AWAVAUATSH\203\354\070H\211}\270H\203}\270"
from = 0x7f19e3968030
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {16777343, 139749169093632}, addr32
= {16777343,
0, 3818183680, 32537}, addr16 = {127, 256, 0, 0, 56320, 58260, 32537, 0},
addr =
"\177\000\000\001\000\000\000\000\000\334\224\343\031\177\000"}}, dst_ip = {
af = 2, len = 4, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0,
0, 0, 0, 0, 0,
0}, addr = '\000' <repeats 15 times>}}, src_port = 42940,
dst_port = 9060,
proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2,
sa_data = "\247\274\177\000\000\001\000\000\000\000\000\000\000"},
sin = {sin_family = 2,
sin_port = 48295, sin_addr = {s_addr = 16777343},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family =
2, sin6_port = 48295,
sin6_flowinfo = 16777343, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}}, bind_address = 0x7f19e394da80, proto = 1
'\001'}
__FUNCTION__ = "udp_rcv_loop"
#16 0x0000000000422c08 in main_loop () at main.c:1625
i = 1
pid = 0
si = 0x7f19e394da80
si_desc = "udp receiver child=1
sock=0.0.0.0:9060\000\000\276\250s\000\000\000\000\000Z\261s\000\000\000\000\000\000\242\311\234\177\306\067\212\004\000\000\000\000\000\000\000\220uA\000\000\000\000\000\b/x\000\000\000\000\000\a\000\000\000\000\000\000\000\017",
'\000' <repeats 15 times>,
"\220\222\201\231\374\177\000\000i$_\000\000\000\000"
nrprocs = 4
woneinit = 1
__FUNCTION__ = "main_loop"
#17 0x000000000042a308 in main (argc=13, argv=0x7ffc99819568) at main.c:2646
cfg_stream = 0x118b010
c = -1
r = 0
tmp = 0x7ffc99819f00 ""
tmp_len = -468663896
port = 32537
proto = -1719561184
options = 0x738938
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 2544599327
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x0
p = 0x1 <error: Cannot access memory at address 0x1>
st = {st_dev = 15, st_ino = 11439, st_nlink = 2, st_mode = 16832, st_uid = 118,
st_gid = 301,
__pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim
= {
tv_sec = 1495618022, tv_nsec = 508564058}, st_mtim = {tv_sec = 1498034038,
tv_nsec = 560355778}, st_ctim = {tv_sec = 1498034038, tv_nsec = 560355778},
__glibc_reserved = {0, 0, 0}}
__FUNCTION__ = "main"
No symbol table info available.
1829 main.c: No such file or directory.
```
#### Log Messages
This is what debug log says (trimmed down to the essential lines):
```
root@busch:/var/cores# systemctl restart kamailio_li_sniffer.service && kamcmd
cfg.get config foo && tail -f /var/log/kamailio/proxy.log
hello Daniel
[..]
Jun 21 10:34:39 busch /usr/sbin/kamailio[7998]: DEBUG: <core>
[core/parser/msg_parser.c:600]: parse_msg(): SIP Request:
Jun 21 10:34:39 busch /usr/sbin/kamailio[7998]: DEBUG: <core>
[core/parser/msg_parser.c:602]: parse_msg(): method: <REGISTER>
Jun 21 10:34:39 busch /usr/sbin/kamailio[7998]: DEBUG: <core>
[core/parser/msg_parser.c:604]: parse_msg(): uri: <sip:sipgate.de>
Jun 21 10:34:39 busch /usr/sbin/kamailio[7998]: DEBUG: <core>
[core/parser/msg_parser.c:606]: parse_msg(): version: <SIP/2.0>
[..]
Jun 21 10:34:39 busch /usr/sbin/kamailio[7999]: DEBUG: <core> [core/receive.c:234]:
receive_msg(): preparing to run routing scripts...
Jun 21 10:34:39 busch /usr/sbin/kamailio[8001]: INFO: <script>: Reading config.foo
into variable
Jun 21 10:34:39 busch /usr/sbin/kamailio[8000]: INFO: <script>: Reading config.foo
into variable
Jun 21 10:34:39 busch /usr/sbin/kamailio[7999]: INFO: <script>: Reading config.foo
into variable
Jun 21 10:34:39 busch /usr/sbin/kamailio[8001]: DEBUG: <core> [core/select.c:412]:
run_select(): Calling SELECT 0x7f19e3965f60
Jun 21 10:34:39 busch /usr/sbin/kamailio[7999]: DEBUG: <core> [core/select.c:412]:
run_select(): Calling SELECT 0x7f19e3965f60
Jun 21 10:34:39 busch /usr/sbin/kamailio[8000]: DEBUG: <core> [core/select.c:412]:
run_select(): Calling SELECT 0x7f19e3965f60
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: CRITICAL: <core>
[core/pass_fd.c:277]: receive_fd(): EOF on 11
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: DEBUG: <core>
[core/tcp_main.c:3456]: handle_ser_child(): dead child 1, pid 7998 (shutting down?)
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: DEBUG: <core> [core/io_wait.h:602]:
io_watch_del(): DBG: io_watch_del (0xa4c100, 11, -1, 0x0) fd_no=18 called
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: CRITICAL: <core>
[core/pass_fd.c:277]: receive_fd(): EOF on 14
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: DEBUG: <core>
[core/tcp_main.c:3456]: handle_ser_child(): dead child 4, pid 8001 (shutting down?)
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: DEBUG: <core> [core/io_wait.h:602]:
io_watch_del(): DBG: io_watch_del (0xa4c100, 14, -1, 0x0) fd_no=17 called
Jun 21 10:34:39 busch /usr/sbin/kamailio[7996]: ALERT: <core> [main.c:743]:
handle_sigs(): child process 7998 exited by a signal 11
Jun 21 10:34:39 busch /usr/sbin/kamailio[7996]: ALERT: <core> [main.c:746]:
handle_sigs(): core was generated
Jun 21 10:34:39 busch /usr/sbin/kamailio[7996]: INFO: <core> [main.c:768]:
handle_sigs(): terminating due to SIGCHLD
Jun 21 10:34:39 busch /usr/sbin/kamailio[7996]: DEBUG: <core> [main.c:770]:
handle_sigs(): terminating due to SIGCHLD
Jun 21 10:34:39 busch /usr/sbin/kamailio[8010]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8009]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8008]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8007]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8006]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8005]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8002]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8003]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
Jun 21 10:34:39 busch /usr/sbin/kamailio[8004]: INFO: <core> [main.c:823]:
sig_usr(): signal 15 received
[..]
```
#### SIP Traffic
The SIP traffic doesn't matter.
### Additional Information
* **Kamailio Version** - output of `kamailio -v`
```
version: kamailio 5.0.2 (x86_64/linux)
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, DISABLE_NAGLE, USE_MCAST,
DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC,
DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER,
USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024,
BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: unknown
compiled with gcc 4.9.2
```
* **Operating System**:
```
Debian Jessie
Linux
busch.dev.sipgate.net 3.16.0-4-amd64 #1 SMP Debian 3.16.39-1+deb8u1 (2017-02-22)
x86_64 GNU/Linux
```
--
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/1159