[sr-dev] [kamailio] Siptrace in 4.3.1 crash (#263)

Odorik.cz notifications at github.com
Fri Jul 24 08:43:44 CEST 2015


After upgrading Kamailio to version 4.3.1, kamailo start crashing.

gdb bt full
```
[New LWP 22525]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/local/sbin/kamailio -P /var/run/kamailio.pid -f /usr/local/etc/kamailio/ka'.
Program terminated with signal 11, Segmentation fault.
#0  0x00007f5d83b4ac3b in trace_onreply_in (t=0x7f5d767d1be8, type=2, ps=0x7fffcb5f06b0) at siptrace.c:1300
1300		sto.totag = get_to(msg)->tag_value;
#0  0x00007f5d83b4ac3b in trace_onreply_in (t=0x7f5d767d1be8, type=2, ps=0x7fffcb5f06b0) at siptrace.c:1300
        sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}, body = {s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bK09fb.3ac02e28675e5d31fbc014abf06011e7.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1"..., len = 444}, callid = {s = 0xa72487 "1a5b69c92d9de97d1584ac1a24dbf4c5 at 81.31.45.56:5060\r\nCSeq: 103 BYE\r\nFrom: \"730414510>998\" <sip:730414510 at 81.31.45.56>;tag=as00df7761\r\nTo: <sip:415198 at 81.31.45.51>;tag=N5u0EFh8NyN1EHYA\r\nContact: <sip:415"..., len = 49}, method = {s = 0xa724c4 "BYE\r\nFrom: \"730414510>998\" <sip:730414510 at 81.31.45.56>;tag=as00df7761\r\nTo: <sip:415198 at 81.31.45.51>;tag=N5u0EFh8NyN1EHYA\r\nContact: <sip:415198 at 172.26.2.102:5060>\r\nContent-Length: 0\r\n\r\n", len = 3}, status = {s = 0x7fffcb5f0440 "200", len = 3}, dir = 0x7f5d83b55d86 "in", fromtag = {s = 0xa724ff "as00df7761\r\nTo: <sip:415198 at 81.31.45.51>;tag=N5u0EFh8NyN1EHYA\r\nContact: <sip:415198 at 172.26.2.102:5060>\r\nContent-Length: 0\r\n\r\n", len = 10}, fromip = {s = 0x7fffcb5f0544 "udp:80.92.242.202:5060", len = 22}, totag = {s = 0x0, len = 0}, toip = {s = 0x7fffcb5f0510 "udp:81.31.45.51:5060", len = 20}, toip_buff = "udp:81.31.45.51:5060", '\000' <repeats 31 times>, fromip_buff = "udp:80.92.242.202:5060", '\000' <repeats 29 times>, tv = {tv_sec = 0, tv_usec = 0}, stat = 0x0}
        msg = 0x7f5d8a85eae8
        req = 0x7f5d7703e4a0
        statusbuf = "200\000\004\000\000"
        __FUNCTION__ = "trace_onreply_in"
#1  0x00007f5d878d1b5e in run_trans_callbacks_internal (cb_lst=0x7f5d767d1c58, type=2, trans=0x7f5d767d1be8, params=0x7fffcb5f06b0) at t_hooks.c:268
        cbp = 0x7f5d76b57238
        backup_from = 0xa823f0
        backup_to = 0xa823f8
        backup_dom_from = 0xa82400
        backup_dom_to = 0xa82408
        backup_uri_from = 0xa823e0
        backup_uri_to = 0xa823e8
        backup_xavps = 0xa82520
        __FUNCTION__ = "run_trans_callbacks_internal"
#2  0x00007f5d878d1c6f in run_trans_callbacks (type=2, trans=0x7f5d767d1be8, req=0x7f5d7703e4a0, rpl=0x7f5d8a85eae8, code=200) at t_hooks.c:295
        params = {req = 0x7f5d7703e4a0, rpl = 0x7f5d8a85eae8, param = 0x7f5d76b57248, code = 200, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}}
#3  0x00007f5d878dfb34 in t_reply_matching (p_msg=0x7f5d8a85eae8, p_branch=0x7fffcb5f0af0) at t_lookup.c:966
        p_cell = 0x7f5d767d1be8
        hash_index = 49040
        entry_label = 0
        branch_id = 0
        hashi = 0xa723fb "09fb.3ac02e28675e5d31fbc014abf06011e7.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1a5b69c92d9de97d1584ac1a24dbf4c5 at 81.31.45.56:5060\r\nCSeq: 103"...
        branchi = 0xa72421 "0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1a5b69c92d9de97d1584ac1a24dbf4c5 at 81.31.45.56:5060\r\nCSeq: 103 BYE\r\nFrom: \"730414510>998\" <sip:73041"...
        p = 0xa72421 "0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1a5b69c92d9de97d1584ac1a24dbf4c5 at 81.31.45.56:5060\r\nCSeq: 103 BYE\r\nFrom: \"730414510>998\" <sip:73041"...
        n = 0xa72422 "\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1a5b69c92d9de97d1584ac1a24dbf4c5 at 81.31.45.56:5060\r\nCSeq: 103 BYE\r\nFrom: \"730414510>998\" <sip:730414"...
        hash_bucket = 0x7f5d7279a3a8
        hashl = 4
        branchl = 1
        scan_space = 1
        cseq_method = {s = 0xa724c4 "BYE\r\nFrom: \"730414510>998\" <sip:730414510 at 81.31.45.56>;tag=as00df7761\r\nTo: <sip:415198 at 81.31.45.51>;tag=N5u0EFh8NyN1EHYA\r\nContact: <sip:415198 at 172.26.2.102:5060>\r\nContent-Length: 0\r\n\r\n", len = 3}
        req_method = {s = 0x7f5d7703ebc0 "BYE sip:415198 at 172.26.2.102:5060;alias=80.92.242.202:5060~1 SIP/2.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;branch=z9hG4bK264375be;rport\r\nRoute: <sip:415198 at 81.31.45.51;lr=on;ftag=as00df7761;did=eb0a.6adf;"..., len = 3}
        loopi = 0xa72400 "3ac02e28675e5d31fbc014abf06011e7.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1a5b69c92d9de97d1584ac1a24dbf4c5 at 81.31.45.56:5060\r\nCSeq: 103 BYE\r"...
        loopl = 32
        is_cancel = 0
        __FUNCTION__ = "t_reply_matching"
#4  0x00007f5d878e1b0f in t_check_msg (p_msg=0x7f5d8a85eae8, param_branch=0x7fffcb5f0af0) at t_lookup.c:1069
        local_branch = 10954108
        canceled = 32605
        ret = 0
        __FUNCTION__ = "t_check_msg"
#5  0x00007f5d878e2489 in t_check (p_msg=0x7f5d8a85eae8, param_branch=0x7fffcb5f0af0) at t_lookup.c:1111
        ret = 0
#6  0x00007f5d8792994b in reply_received (p_msg=0x7f5d8a85eae8) at t_reply.c:2118
        msg_status = 0
        last_uac_status = 5670480
        ack = 0x7fffcb5f0c00 "\340\f", <incomplete sequence \313>
        ack_len = 32605
        branch = 0
        reply_status = 6440375
        onreply_route = 6492249
        cancel_data = {cancel_bitmap = 3412003584, reason = {cause = 9596, u = {text = {s = 0x7fffcb5f0b10 "", len = 6682541}, e2e_cancel = 0x7fffcb5f0b10, packed_hdrs = {s = 0x7fffcb5f0b10 "", len = 6682541}}}}
        uac = 0x7f5d8a85eb08
        t = 0xa723c0
        lack_dst = {send_sock = 0x5686a0, to = {s = {sa_family = 4592, sa_data = "d\000\000\000\000\000\340'j\000\000\000\000"}, sin = {sin_family = 4592, sin_port = 100, sin_addr = {s_addr = 0}, sin_zero = "\340'j\000\000\000\000"}, sin6 = {sin6_family = 4592, sin6_port = 100, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\340'j\000\000\000\000\000\b\000\000\000\000\000\000", __u6_addr16 = {10208, 106, 0, 0, 8, 0, 0, 0}, __u6_addr32 = {6957024, 0, 8, 0}}}, sin6_scope_id = 430}}, id = 10, proto = -49 '\317', send_flags = {f = 35 '#', blst_imask = 167 '\247'}}
        backup_user_from = 0x2fa53b46
        backup_user_to = 0x7fffcb5f0c00
        backup_domain_from = 0xa72424
        backup_domain_to = 0x40
        backup_uri_from = 0x7f5d8a85eae8
        backup_uri_to = 0x4004188b0
        backup_xavps = 0x76019c
        replies_locked = 32767
        branch_ret = -882963536
        prev_branch = 0
        blst_503_timeout = 6440375
        hf = 0x27c
        onsend_params = {req = 0x7fffcb5f0a90, rpl = 0x7f5d8a84a708, param = 0xa7257c, code = 10953680, flags = 0, branch = 0, t_rbuf = 0x7f5d8a19d1d8, dst = 0x0, send_buf = {s = 0x7fffcb5f0b40 "", len = 6422143}}
        ctx = {rec_lev = 25, run_flags = 4, last_retcode = 7732336, jmp_env = {{__jmpbuf = {7745616, 7733660, 140039732634256, 2316947472, 10953709, 10953764, 140039732634200, 799357766}, __mask_was_saved = 4294832, __saved_mask = {__val = {140736605393696, 140736605391680, 6475430, 140736605391392, 140039725633552, 140736605391456, 140039688019448, 140736605391424, 0, 33554432, 26996288, 5670512, 6558144, 6957024, 8, 636}}}}}
        __FUNCTION__ = "reply_received"
#7  0x00000000004901cc in do_forward_reply (msg=0x7f5d8a85eae8, mode=0) at forward.c:747
        new_buf = 0x0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
        new_len = 0
        r = 1
        ip = {af = 0, len = 0, u = {addrl = {21482551297, 140039725637416}, addr32 = {7714817, 5, 2316951336, 32605}, addr16 = {47105, 117, 5, 0, 57128, 35353, 32605, 0}, addr = "\001\270u\000\005\000\000\000(\337\031\212]\177\000"}}
        s = 0x7fffcb5f0ca0 "F;\245/"
        len = 32605
        __FUNCTION__ = "do_forward_reply"
#8  0x0000000000491856 in forward_reply (msg=0x7f5d8a85eae8) at forward.c:849
No locals.
#9  0x000000000050e062 in receive_msg (buf=0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bK09fb.3ac02e28675e5d31fbc014abf06011e7.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1"..., len=444, rcv_info=0x7fffcb5f0ee0) at receive.c:255
        msg = 0x7f5d8a85eae8
        ctx = {rec_lev = 1907848928, run_flags = 32605, last_retcode = 5, jmp_env = {{__jmpbuf = {10268600, 0, 0, 0, 0, 140039767263730, 140037408686085, 0}, __mask_was_saved = -882962992, __saved_mask = {__val = {10953600, 140736605392616, 799357766, 47244640259, 799357766, 4294832, 140736605393696, 140736605392464, 6322852, 7706971712, 140039327086552, 140736605392448, 6318455, 140736605392720, 169422125016, 10953600}}}}}
        ret = 4294832
        inb = {s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bK09fb.3ac02e28675e5d31fbc014abf06011e7.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1"..., len = 444}
        __FUNCTION__ = "receive_msg"
#10 0x000000000060db81 in udp_rcv_loop () at udp_server.c:495
        len = 444
        buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bK09fb.3ac02e28675e5d31fbc014abf06011e7.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1"...
        tmp = 0xa72380 "185.64.41.5"
        from = 0x7f5d8a765bb0
        fromlen = 16
        ri = {src_ip = {af = 2, len = 4, u = {addrl = {3404880976, 4294832}, addr32 = {3404880976, 0, 4294832, 0}, addr16 = {23632, 51954, 0, 0, 34992, 65, 0, 0}, addr = "P\\\362\312\000\000\000\000\260\210A\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {858595153, 0}, addr32 = {858595153, 0, 0, 0}, addr16 = {8017, 13101, 0, 0, 0, 0, 0, 0}, addr = "Q\037-3", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304P\\\362\312\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 3404880976}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 3404880976, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f5d8a1c2430, proto = 1 '\001'}
        __FUNCTION__ = "udp_rcv_loop"
#11 0x00000000004aa664 in main_loop () at main.c:1573
        i = 6
        pid = 0
        si = 0x7f5d8a1c2430
        si_desc = "udp receiver child=6 sock=81.31.45.51:5060\000\000n\000\000\000n/q\000\001\000\000\000\260dXr]\177\000\000`\020_\313\377\177\000\000H\361\333u]\177\000\000\240\232Â]\177\000\000`$l\212]\177\000\000\020oÂ]\177\000\000\003\000\000\000]\177\000\000F;\245/\000\000\000\000\260\210A\000\001\000\000"
        nrprocs = 8
        __FUNCTION__ = "main_loop"
#12 0x00000000004b0b5b in main (argc=9, argv=0x7fffcb5f1328) at main.c:2533
        cfg_stream = 0x1178010
        c = -1
        r = 0
        tmp = 0x7fffcb5f2a4f ""
        tmp_len = 32605
        port = -1934211216
        proto = 0
        options = 0x707da0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:"
        ret = -1
        seed = 244285905
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x55
        p = 0x7fffcb5f122e ""
        __FUNCTION__ = "main"
```
kamailio.log

```
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20031]: INFO: 2445:      REPLY FD11290653BD4A9EB9CFF8A5B9244C73,INVITE  --100--,Trying -- 0 - 89.185.255.45 - <null>,<null>,712267,<null>,81.31.45.51,<null>
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20034]: INFO: 1576:   RELAY bQRL3JzCBLDS9L9g at 10.0.0.1,BYE,81.31.45.56,411008,<null> - sip:411008 at 10.0.0.1:54213 - sip:90.177.51.139:13117
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20034]: INFO: 2605:        CALLS_DELETE bQRL3JzCBLDS9L9g at 10.0.0.1,BYE,<null>,RELAY CANCEL,BYE BYE
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20034]: INFO: 1606:    RELAY EXIT bQRL3JzCBLDS9L9g at 10.0.0.1,BYE, --- <null> ----
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20057]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 18
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20027]: ALERT: <core> [main.c:728]: handle_sigs(): child process 20029 exited by a signal 11
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20027]: ALERT: <core> [main.c:731]: handle_sigs(): core was generated
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20027]: INFO: <core> [main.c:743]: handle_sigs(): terminating due to SIGCHLD
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20053]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20052]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20055]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20056]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20041]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20039]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20047]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20054]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20051]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20037]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20046]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received
```

how offten crash
```
/var/log/kamailio.log.1:Jul 23 10:45:14 serZ /usr/local/sbin/kamailio[11032]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 21
/var/log/kamailio.log.1:Jul 23 12:03:47 serZ /usr/local/sbin/kamailio[5476]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 22
/var/log/kamailio.log.1:Jul 23 12:21:59 serZ /usr/local/sbin/kamailio[11133]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 23
/var/log/kamailio.log.1:Jul 23 14:09:05 serZ /usr/local/sbin/kamailio[12034]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 18
/var/log/kamailio.log.1:Jul 23 14:31:56 serZ /usr/local/sbin/kamailio[18607]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 25
/var/log/kamailio.log.1:Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20057]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 18
/var/log/kamailio.log.1:Jul 23 15:34:13 serZ /usr/local/sbin/kamailio[22547]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 24
/var/log/kamailio.log.1:Jul 23 15:53:50 serZ /usr/local/sbin/kamailio[23364]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 19
/var/log/kamailio.log.1:Jul 23 15:56:41 serZ /usr/local/sbin/kamailio[24401]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 23
/var/log/kamailio.log.1:Jul 23 16:09:49 serZ /usr/local/sbin/kamailio[24590]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 31
/var/log/kamailio.log.2.gz:Jul 22 08:49:11 serZ /usr/local/sbin/kamailio[24702]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 24
/var/log/kamailio.log.2.gz:Jul 22 09:19:40 serZ /usr/local/sbin/kamailio[789]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 18
/var/log/kamailio.log.2.gz:Jul 22 10:32:28 serZ /usr/local/sbin/kamailio[3020]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 24
/var/log/kamailio.log.2.gz:Jul 22 10:33:21 serZ /usr/local/sbin/kamailio[8719]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 25
/var/log/kamailio.log.2.gz:Jul 22 11:12:59 serZ /usr/local/sbin/kamailio[8812]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 22
/var/log/kamailio.log.2.gz:Jul 22 12:37:28 serZ /usr/local/sbin/kamailio[11626]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 18
/var/log/kamailio.log.2.gz:Jul 22 12:46:27 serZ /usr/local/sbin/kamailio[17389]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 19
/var/log/kamailio.log.2.gz:Jul 22 14:22:08 serZ /usr/local/sbin/kamailio[17962]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 26
/var/log/kamailio.log.2.gz:Jul 22 14:27:55 serZ /usr/local/sbin/kamailio[24530]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 27
/var/log/kamailio.log.2.gz:Jul 22 14:28:07 serZ /usr/local/sbin/kamailio[24981]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 26
/var/log/kamailio.log.2.gz:Jul 22 14:32:08 serZ /usr/local/sbin/kamailio[25017]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 31
/var/log/kamailio.log.2.gz:Jul 22 14:46:50 serZ /usr/local/sbin/kamailio[25289]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 24
/var/log/kamailio.log.2.gz:Jul 22 15:03:29 serZ /usr/local/sbin/kamailio[26297]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 30
/var/log/kamailio.log.2.gz:Jul 22 16:07:57 serZ /usr/local/sbin/kamailio[27283]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 25
/var/log/kamailio.log.2.gz:Jul 22 16:18:53 serZ /usr/local/sbin/kamailio[30559]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 31
/var/log/kamailio.log.2.gz:Jul 22 16:44:00 serZ /usr/local/sbin/kamailio[31137]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 21
/var/log/kamailio.log.2.gz:Jul 22 17:00:40 serZ /usr/local/sbin/kamailio[32488]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 23
/var/log/kamailio.log.2.gz:Jul 22 17:32:10 serZ /usr/local/sbin/kamailio[873]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 32
/var/log/kamailio.log.2.gz:Jul 22 19:02:24 serZ /usr/local/sbin/kamailio[1955]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 20
/var/log/kamailio.log.2.gz:Jul 22 19:11:47 serZ /usr/local/sbin/kamailio[4245]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 18
/var/log/kamailio.log.2.gz:Jul 22 19:21:39 serZ /usr/local/sbin/kamailio[4506]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 21
/var/log/kamailio.log.2.gz:Jul 22 21:19:18 serZ /usr/local/sbin/kamailio[4783]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 30
/var/log/kamailio.log.2.gz:Jul 22 21:27:43 serZ /usr/local/sbin/kamailio[7666]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 24
```
kamailio -v
```
kamailio -v
version: kamailio 4.3.1 (x86_64/linux) f38e67
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, F_MALLOC, DBG_F_MALLOC, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: f38e67
compiled on 00:54:32 Jul 22 2015 with gcc 4.7.2
```


---
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/263
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.sip-router.org/pipermail/sr-dev/attachments/20150723/260d39c7/attachment-0001.html>


More information about the sr-dev mailing list