After upgrading Kamailio to version 4.3.1, kamailo start crashing.
gdb bt full ``` [New LWP 22525] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/local/sbin/kamailio -P /var/run/kamailio.pid -f /usr/local/etc/kamailio/ka'. Program terminated with signal 11, Segmentation fault. #0 0x00007f5d83b4ac3b in trace_onreply_in (t=0x7f5d767d1be8, type=2, ps=0x7fffcb5f06b0) at siptrace.c:1300 1300 sto.totag = get_to(msg)->tag_value; #0 0x00007f5d83b4ac3b in trace_onreply_in (t=0x7f5d767d1be8, type=2, ps=0x7fffcb5f06b0) at siptrace.c:1300 sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0}, body = {s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bK09fb.3ac02e28675e5d31fbc014abf06011e7.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1"..., len = 444}, callid = {s = 0xa72487 "1a5b69c92d9de97d1584ac1a24dbf4c5@81.31.45.56:5060\r\nCSeq: 103 BYE\r\nFrom: "730414510>998" sip:730414510@81.31.45.56;tag=as00df7761\r\nTo: sip:415198@81.31.45.51;tag=N5u0EFh8NyN1EHYA\r\nContact: <sip:415"..., len = 49}, method = {s = 0xa724c4 "BYE\r\nFrom: "730414510>998" sip:730414510@81.31.45.56;tag=as00df7761\r\nTo: sip:415198@81.31.45.51;tag=N5u0EFh8NyN1EHYA\r\nContact: sip:415198@172.26.2.102:5060\r\nContent-Length: 0\r\n\r\n", len = 3}, status = {s = 0x7fffcb5f0440 "200", len = 3}, dir = 0x7f5d83b55d86 "in", fromtag = {s = 0xa724ff "as00df7761\r\nTo: sip:415198@81.31.45.51;tag=N5u0EFh8NyN1EHYA\r\nContact: sip:415198@172.26.2.102:5060\r\nContent-Length: 0\r\n\r\n", len = 10}, fromip = {s = 0x7fffcb5f0544 "udp:80.92.242.202:5060", len = 22}, totag = {s = 0x0, len = 0}, toip = {s = 0x7fffcb5f0510 "udp:81.31.45.51:5060", len = 20}, toip_buff = "udp:81.31.45.51:5060", '\000' <repeats 31 times>, fromip_buff = "udp:80.92.242.202:5060", '\000' <repeats 29 times>, tv = {tv_sec = 0, tv_usec = 0}, stat = 0x0} msg = 0x7f5d8a85eae8 req = 0x7f5d7703e4a0 statusbuf = "200\000\004\000\000" __FUNCTION__ = "trace_onreply_in" #1 0x00007f5d878d1b5e in run_trans_callbacks_internal (cb_lst=0x7f5d767d1c58, type=2, trans=0x7f5d767d1be8, params=0x7fffcb5f06b0) at t_hooks.c:268 cbp = 0x7f5d76b57238 backup_from = 0xa823f0 backup_to = 0xa823f8 backup_dom_from = 0xa82400 backup_dom_to = 0xa82408 backup_uri_from = 0xa823e0 backup_uri_to = 0xa823e8 backup_xavps = 0xa82520 __FUNCTION__ = "run_trans_callbacks_internal" #2 0x00007f5d878d1c6f in run_trans_callbacks (type=2, trans=0x7f5d767d1be8, req=0x7f5d7703e4a0, rpl=0x7f5d8a85eae8, code=200) at t_hooks.c:295 params = {req = 0x7f5d7703e4a0, rpl = 0x7f5d8a85eae8, param = 0x7f5d76b57248, code = 200, flags = 0, branch = 0, t_rbuf = 0x0, dst = 0x0, send_buf = {s = 0x0, len = 0}} #3 0x00007f5d878dfb34 in t_reply_matching (p_msg=0x7f5d8a85eae8, p_branch=0x7fffcb5f0af0) at t_lookup.c:966 p_cell = 0x7f5d767d1be8 hash_index = 49040 entry_label = 0 branch_id = 0 hashi = 0xa723fb "09fb.3ac02e28675e5d31fbc014abf06011e7.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1a5b69c92d9de97d1584ac1a24dbf4c5@81.31.45.56:5060\r\nCSeq: 103"... branchi = 0xa72421 "0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1a5b69c92d9de97d1584ac1a24dbf4c5@81.31.45.56:5060\r\nCSeq: 103 BYE\r\nFrom: "730414510>998" <sip:73041"... p = 0xa72421 "0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1a5b69c92d9de97d1584ac1a24dbf4c5@81.31.45.56:5060\r\nCSeq: 103 BYE\r\nFrom: "730414510>998" <sip:73041"... n = 0xa72422 "\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1a5b69c92d9de97d1584ac1a24dbf4c5@81.31.45.56:5060\r\nCSeq: 103 BYE\r\nFrom: "730414510>998" <sip:730414"... hash_bucket = 0x7f5d7279a3a8 hashl = 4 branchl = 1 scan_space = 1 cseq_method = {s = 0xa724c4 "BYE\r\nFrom: "730414510>998" sip:730414510@81.31.45.56;tag=as00df7761\r\nTo: sip:415198@81.31.45.51;tag=N5u0EFh8NyN1EHYA\r\nContact: sip:415198@172.26.2.102:5060\r\nContent-Length: 0\r\n\r\n", len = 3} req_method = {s = 0x7f5d7703ebc0 "BYE sip:415198@172.26.2.102:5060;alias=80.92.242.202:5060~1 SIP/2.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;branch=z9hG4bK264375be;rport\r\nRoute: <sip:415198@81.31.45.51;lr=on;ftag=as00df7761;did=eb0a.6adf;"..., len = 3} loopi = 0xa72400 "3ac02e28675e5d31fbc014abf06011e7.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1a5b69c92d9de97d1584ac1a24dbf4c5@81.31.45.56:5060\r\nCSeq: 103 BYE\r"... loopl = 32 is_cancel = 0 __FUNCTION__ = "t_reply_matching" #4 0x00007f5d878e1b0f in t_check_msg (p_msg=0x7f5d8a85eae8, param_branch=0x7fffcb5f0af0) at t_lookup.c:1069 local_branch = 10954108 canceled = 32605 ret = 0 __FUNCTION__ = "t_check_msg" #5 0x00007f5d878e2489 in t_check (p_msg=0x7f5d8a85eae8, param_branch=0x7fffcb5f0af0) at t_lookup.c:1111 ret = 0 #6 0x00007f5d8792994b in reply_received (p_msg=0x7f5d8a85eae8) at t_reply.c:2118 msg_status = 0 last_uac_status = 5670480 ack = 0x7fffcb5f0c00 "\340\f", <incomplete sequence \313> ack_len = 32605 branch = 0 reply_status = 6440375 onreply_route = 6492249 cancel_data = {cancel_bitmap = 3412003584, reason = {cause = 9596, u = {text = {s = 0x7fffcb5f0b10 "", len = 6682541}, e2e_cancel = 0x7fffcb5f0b10, packed_hdrs = {s = 0x7fffcb5f0b10 "", len = 6682541}}}} uac = 0x7f5d8a85eb08 t = 0xa723c0 lack_dst = {send_sock = 0x5686a0, to = {s = {sa_family = 4592, sa_data = "d\000\000\000\000\000\340'j\000\000\000\000"}, sin = {sin_family = 4592, sin_port = 100, sin_addr = {s_addr = 0}, sin_zero = "\340'j\000\000\000\000"}, sin6 = {sin6_family = 4592, sin6_port = 100, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\340'j\000\000\000\000\000\b\000\000\000\000\000\000", __u6_addr16 = {10208, 106, 0, 0, 8, 0, 0, 0}, __u6_addr32 = {6957024, 0, 8, 0}}}, sin6_scope_id = 430}}, id = 10, proto = -49 '\317', send_flags = {f = 35 '#', blst_imask = 167 '\247'}} backup_user_from = 0x2fa53b46 backup_user_to = 0x7fffcb5f0c00 backup_domain_from = 0xa72424 backup_domain_to = 0x40 backup_uri_from = 0x7f5d8a85eae8 backup_uri_to = 0x4004188b0 backup_xavps = 0x76019c replies_locked = 32767 branch_ret = -882963536 prev_branch = 0 blst_503_timeout = 6440375 hf = 0x27c onsend_params = {req = 0x7fffcb5f0a90, rpl = 0x7f5d8a84a708, param = 0xa7257c, code = 10953680, flags = 0, branch = 0, t_rbuf = 0x7f5d8a19d1d8, dst = 0x0, send_buf = {s = 0x7fffcb5f0b40 "", len = 6422143}} ctx = {rec_lev = 25, run_flags = 4, last_retcode = 7732336, jmp_env = {{__jmpbuf = {7745616, 7733660, 140039732634256, 2316947472, 10953709, 10953764, 140039732634200, 799357766}, __mask_was_saved = 4294832, __saved_mask = {__val = {140736605393696, 140736605391680, 6475430, 140736605391392, 140039725633552, 140736605391456, 140039688019448, 140736605391424, 0, 33554432, 26996288, 5670512, 6558144, 6957024, 8, 636}}}}} __FUNCTION__ = "reply_received" #7 0x00000000004901cc in do_forward_reply (msg=0x7f5d8a85eae8, mode=0) at forward.c:747 new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} new_len = 0 r = 1 ip = {af = 0, len = 0, u = {addrl = {21482551297, 140039725637416}, addr32 = {7714817, 5, 2316951336, 32605}, addr16 = {47105, 117, 5, 0, 57128, 35353, 32605, 0}, addr = "\001\270u\000\005\000\000\000(\337\031\212]\177\000"}} s = 0x7fffcb5f0ca0 "F;\245/" len = 32605 __FUNCTION__ = "do_forward_reply" #8 0x0000000000491856 in forward_reply (msg=0x7f5d8a85eae8) at forward.c:849 No locals. #9 0x000000000050e062 in receive_msg (buf=0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bK09fb.3ac02e28675e5d31fbc014abf06011e7.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1"..., len=444, rcv_info=0x7fffcb5f0ee0) at receive.c:255 msg = 0x7f5d8a85eae8 ctx = {rec_lev = 1907848928, run_flags = 32605, last_retcode = 5, jmp_env = {{__jmpbuf = {10268600, 0, 0, 0, 0, 140039767263730, 140037408686085, 0}, __mask_was_saved = -882962992, __saved_mask = {__val = {10953600, 140736605392616, 799357766, 47244640259, 799357766, 4294832, 140736605393696, 140736605392464, 6322852, 7706971712, 140039327086552, 140736605392448, 6318455, 140736605392720, 169422125016, 10953600}}}}} ret = 4294832 inb = {s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bK09fb.3ac02e28675e5d31fbc014abf06011e7.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1"..., len = 444} __FUNCTION__ = "receive_msg" #10 0x000000000060db81 in udp_rcv_loop () at udp_server.c:495 len = 444 buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bK09fb.3ac02e28675e5d31fbc014abf06011e7.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK264375be;rport=5060\r\nCall-ID: 1"... tmp = 0xa72380 "185.64.41.5" from = 0x7f5d8a765bb0 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {3404880976, 4294832}, addr32 = {3404880976, 0, 4294832, 0}, addr16 = {23632, 51954, 0, 0, 34992, 65, 0, 0}, addr = "P\\362\312\000\000\000\000\260\210A\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {858595153, 0}, addr32 = {858595153, 0, 0, 0}, addr16 = {8017, 13101, 0, 0, 0, 0, 0, 0}, addr = "Q\037-3", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\304P\\362\312\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 3404880976}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 3404880976, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f5d8a1c2430, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #11 0x00000000004aa664 in main_loop () at main.c:1573 i = 6 pid = 0 si = 0x7f5d8a1c2430 si_desc = "udp receiver child=6 sock=81.31.45.51:5060\000\000n\000\000\000n/q\000\001\000\000\000\260dXr]\177\000\000`\020_\313\377\177\000\000H\361\333u]\177\000\000\240\232Â]\177\000\000`$l\212]\177\000\000\020oÂ]\177\000\000\003\000\000\000]\177\000\000F;\245/\000\000\000\000\260\210A\000\001\000\000" nrprocs = 8 __FUNCTION__ = "main_loop" #12 0x00000000004b0b5b in main (argc=9, argv=0x7fffcb5f1328) at main.c:2533 cfg_stream = 0x1178010 c = -1 r = 0 tmp = 0x7fffcb5f2a4f "" tmp_len = 32605 port = -1934211216 proto = 0 options = 0x707da0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 244285905 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x55 p = 0x7fffcb5f122e "" __FUNCTION__ = "main" ``` kamailio.log
``` Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20031]: INFO: 2445: REPLY FD11290653BD4A9EB9CFF8A5B9244C73,INVITE --100--,Trying -- 0 - 89.185.255.45 - <null>,<null>,712267,<null>,81.31.45.51,<null> Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20034]: INFO: 1576: RELAY bQRL3JzCBLDS9L9g@10.0.0.1,BYE,81.31.45.56,411008,<null> - sip:411008@10.0.0.1:54213 - sip:90.177.51.139:13117 Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20034]: INFO: 2605: CALLS_DELETE bQRL3JzCBLDS9L9g@10.0.0.1,BYE,<null>,RELAY CANCEL,BYE BYE Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20034]: INFO: 1606: RELAY EXIT bQRL3JzCBLDS9L9g@10.0.0.1,BYE, --- <null> ---- Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20057]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 18 Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20027]: ALERT: <core> [main.c:728]: handle_sigs(): child process 20029 exited by a signal 11 Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20027]: ALERT: <core> [main.c:731]: handle_sigs(): core was generated Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20027]: INFO: <core> [main.c:743]: handle_sigs(): terminating due to SIGCHLD Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20053]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20052]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20055]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20056]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20041]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20039]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20047]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20054]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20051]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20037]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20046]: INFO: <core> [main.c:794]: sig_usr(): signal 15 received ```
how offten crash ``` /var/log/kamailio.log.1:Jul 23 10:45:14 serZ /usr/local/sbin/kamailio[11032]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 21 /var/log/kamailio.log.1:Jul 23 12:03:47 serZ /usr/local/sbin/kamailio[5476]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 22 /var/log/kamailio.log.1:Jul 23 12:21:59 serZ /usr/local/sbin/kamailio[11133]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 23 /var/log/kamailio.log.1:Jul 23 14:09:05 serZ /usr/local/sbin/kamailio[12034]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 18 /var/log/kamailio.log.1:Jul 23 14:31:56 serZ /usr/local/sbin/kamailio[18607]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 25 /var/log/kamailio.log.1:Jul 23 15:18:54 serZ /usr/local/sbin/kamailio[20057]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 18 /var/log/kamailio.log.1:Jul 23 15:34:13 serZ /usr/local/sbin/kamailio[22547]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 24 /var/log/kamailio.log.1:Jul 23 15:53:50 serZ /usr/local/sbin/kamailio[23364]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 19 /var/log/kamailio.log.1:Jul 23 15:56:41 serZ /usr/local/sbin/kamailio[24401]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 23 /var/log/kamailio.log.1:Jul 23 16:09:49 serZ /usr/local/sbin/kamailio[24590]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 31 /var/log/kamailio.log.2.gz:Jul 22 08:49:11 serZ /usr/local/sbin/kamailio[24702]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 24 /var/log/kamailio.log.2.gz:Jul 22 09:19:40 serZ /usr/local/sbin/kamailio[789]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 18 /var/log/kamailio.log.2.gz:Jul 22 10:32:28 serZ /usr/local/sbin/kamailio[3020]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 24 /var/log/kamailio.log.2.gz:Jul 22 10:33:21 serZ /usr/local/sbin/kamailio[8719]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 25 /var/log/kamailio.log.2.gz:Jul 22 11:12:59 serZ /usr/local/sbin/kamailio[8812]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 22 /var/log/kamailio.log.2.gz:Jul 22 12:37:28 serZ /usr/local/sbin/kamailio[11626]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 18 /var/log/kamailio.log.2.gz:Jul 22 12:46:27 serZ /usr/local/sbin/kamailio[17389]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 19 /var/log/kamailio.log.2.gz:Jul 22 14:22:08 serZ /usr/local/sbin/kamailio[17962]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 26 /var/log/kamailio.log.2.gz:Jul 22 14:27:55 serZ /usr/local/sbin/kamailio[24530]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 27 /var/log/kamailio.log.2.gz:Jul 22 14:28:07 serZ /usr/local/sbin/kamailio[24981]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 26 /var/log/kamailio.log.2.gz:Jul 22 14:32:08 serZ /usr/local/sbin/kamailio[25017]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 31 /var/log/kamailio.log.2.gz:Jul 22 14:46:50 serZ /usr/local/sbin/kamailio[25289]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 24 /var/log/kamailio.log.2.gz:Jul 22 15:03:29 serZ /usr/local/sbin/kamailio[26297]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 30 /var/log/kamailio.log.2.gz:Jul 22 16:07:57 serZ /usr/local/sbin/kamailio[27283]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 25 /var/log/kamailio.log.2.gz:Jul 22 16:18:53 serZ /usr/local/sbin/kamailio[30559]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 31 /var/log/kamailio.log.2.gz:Jul 22 16:44:00 serZ /usr/local/sbin/kamailio[31137]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 21 /var/log/kamailio.log.2.gz:Jul 22 17:00:40 serZ /usr/local/sbin/kamailio[32488]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 23 /var/log/kamailio.log.2.gz:Jul 22 17:32:10 serZ /usr/local/sbin/kamailio[873]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 32 /var/log/kamailio.log.2.gz:Jul 22 19:02:24 serZ /usr/local/sbin/kamailio[1955]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 20 /var/log/kamailio.log.2.gz:Jul 22 19:11:47 serZ /usr/local/sbin/kamailio[4245]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 18 /var/log/kamailio.log.2.gz:Jul 22 19:21:39 serZ /usr/local/sbin/kamailio[4506]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 21 /var/log/kamailio.log.2.gz:Jul 22 21:19:18 serZ /usr/local/sbin/kamailio[4783]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 30 /var/log/kamailio.log.2.gz:Jul 22 21:27:43 serZ /usr/local/sbin/kamailio[7666]: CRITICAL: <core> [pass_fd.c:275]: receive_fd(): EOF on 24 ``` kamailio -v ``` kamailio -v version: kamailio 4.3.1 (x86_64/linux) f38e67 flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, F_MALLOC, DBG_F_MALLOC, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: f38e67 compiled on 00:54:32 Jul 22 2015 with gcc 4.7.2 ```
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/263
Paste here the output of next commands taken in gdb:
``` frame 0 p *msg ```
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/263#issuecomment-124361420
Sorry Im rollback to 4.2.5, and no more have core file.
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/263#issuecomment-124376264
I found one in backup, but is not same. ``` #0 0x00007f8e28d5fc3b in trace_onreply_in (t=0xa72441, type=4, ps=0x7f8e1c2a7ac8) at siptrace.c:1271 sto = {avp = 0x0, avp_value = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, state = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 10953664}, re = 0x0}, avp = 0x198}, body = { s = 0xa72487 "41a86d83kw9tay0nh@10.0.70.3~2o\r\nCSeq: 102 BYE\r\nFrom: sip:380894600053@81.31.45.51;tag=as397e1088\r\nTo: 380965115229 sip:0965115229@195.24.242.106;tag=y4yzzqusnwd66s7y.o\r\nServer: Sippy\r\nContent-Leng"..., len = 30}, callid = { s = 0xa724b1 "BYE\r\nFrom: sip:380894600053@81.31.45.51;tag=as397e1088\r\nTo: 380965115229 sip:0965115229@195.24.242.106;tag=y4yzzqusnwd66s7y.o\r\nServer: Sippy\r\nContent-Length: 0\r\n\r\n", len = 3}, method = {s = 0x7fffcca85710 "200", len = 3}, status = {s = 0x7f8e28d6ad86 "", len = 10953951}, dir = 0xa <Address 0xa out of bounds>, fromtag = {s = 0x7fffcca85814 "udp:195.24.242.106:5061", len = 23}, fromip = {s = 0x0, len = 0}, toip = {s = 0x7fffcca857e0 "udp:81.31.45.51:5060", len = 20}, toip_buff = "udp:81.31.45.51:5060", '\000' <repeats 31 times>, fromip_buff = "udp:195.24.242.106:5061", '\000' <repeats 28 times>, tv = {tv_sec = 0, tv_usec = 0}, stat = 0x0} msg = 0x7f8e2fa50470 req = 0x7f8e1bf23ea8 statusbuf = "\000\000\000\000\000\000\000" __FUNCTION__ = "trace_onreply_in" #1 0x00007f8e2cae6b5e in reparse_on_dns_failover_fixup (handle=0xa823e8, gname=0xa823f0, name=0xa823f8, val=0xa82400) at t_fwd.c:2006 __llevel = 32654 __FUNCTION__ = "reparse_on_dns_failover_fixup" #2 0x00007f8e2cae6c6f in reparse_on_dns_failover_fixup (handle=0xc8, gname=0x7f8e1c38dcf8, name=0x7f8e2fa50470, val=0x7f8e1bf23ea8) at t_fwd.c:2006 __llevel = 0 __FUNCTION__ = "reparse_on_dns_failover_fixup" #3 0x00007f8e2caf4b34 in t_lookupOriginalT (p_msg=0xa72422) at t_lookup.c:854 __llevel = 10953728 p_cell = 0xa72421 hash_index = 3433588208 t_msg = 0xa724b6 branch = 0x364ad611 hash_bucket = 0x7f8e1c2a7ac8 foo = 1 ret = 32654 __FUNCTION__ = "t_lookupOriginalT" #4 0x00007f8e2caf6b0f in t_reply_matching (p_msg=0x7f8e1c2a7ac8, p_branch=0xa724b6) at t_lookup.c:1021 __llevel = 32654 p_cell = 0x7f8e2cfd2df8 hash_index = 0 entry_label = 32767 branch_id = 0 hashi = 0x38e <Address 0x38e out of bounds> branchi = 0x7f8e1c38b8d0 "\340u=/\216\177" p = 0x7f8e2f727940 "\001" n = 0x7f8e2fa50470 "\342"" hash_bucket = 0x680c0e hashl = 32767 branchl = 32654 scan_space = -1 req_method = {s = 0x7f8e2f3d5a00 "\005", len = 910874129} loopi = 0xa723d5 "SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83kw9tay0nh@10.0"... loopl = 0 is_cancel = 7224 __FUNCTION__ = "t_reply_matching" #5 0x00007f8e2caf7489 in t_reply_matching (p_msg=0x0, p_branch=0x0) at t_lookup.c:1046 __llevel = 32654 p_cell = 0x0 hash_index = 473479376 entry_label = 32767 branch_id = 32654 hashi = 0xa723d5 "SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83kw9tay0nh@10.0"... branchi = 0x7f8e2f727940 "\001" p = 0x0 n = 0x7f8e2cfd2df8 "" hash_bucket = 0x7f8e2fa50470 hashl = 32767 branchl = 0 scan_space = 32767 cseq_method = {s = 0x7fffcca85cb0 "\020^\250\314\377\177", len = 6818830} req_method = {s = 0x7fffcca85bb0 "\340[\250\314\377\177", len = 749693711} loopi = 0x4188b0 "1\355I\211\321^H\211\342H\203\344\360PTI\307\300@\202n" loopl = 0 is_cancel = 167 __FUNCTION__ = "t_reply_matching" #6 0x00007f8e2cb3e94b in relay_reply (t=0xa72558, p_msg=0x7fffcca85e00, branch=0, msg_status=10953679, cancel_data=0xa0000018a, do_put_on_wait=32654) at t_reply.c:2051 relay = 33554432 save_clone = 0 buf = 0x364ad611 <Address 0x364ad611 out of bounds> res_len = 6492249 relayed_code = 0 relayed_msg = 0x6245b7 reply_bak = 0x198005668c8 bm = {to_tag_val = {s = 0x0, len = 0}} totag_retr = 32767 reply_status = RPS_ERROR uas_rb = 0xa723c0 to_tag = 0x6245b7 reason = {s = 0x4004188b0 <Address 0x4004188b0 out of bounds>, len = 799343728} onsend_params = {req = 0x7fffcca85de0, rpl = 0x1460065f7ad, param = 0x7f8e00000000, code = 7733660, flags = 0, branch = 0, t_rbuf = 0x40, dst = 0xa72424, send_buf = {s = 0x7fffcca85ed0 "\260_\250", <incomplete sequence \314>, len = 910874129}} __FUNCTION__ = "relay_reply" #7 0x00000000004901cc in do_forward_reply (msg=0x7f8e2fa50470, mode=0) at forward.c:747 new_buf = 0x0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}} new_len = 0 r = 1 ip = {af = 0, len = 0, u = {addrl = {21482551297, 140248654491432}, addr32 = {7714817, 5, 792407848, 32654}, addr16 = {47105, 117, 5, 0, 12072, 12091, 32654, 0}, addr = "\001\270u\000\005\000\000\000(/;/\216\177\000"}} s = 0x7fffcca85f70 "\021\326J6" ---Type <return> to continue, or q <return> to quit--- len = 32654 __FUNCTION__ = "do_forward_reply" #8 0x0000000000491856 in forward_reply (msg=0x7f8e2fa50470) at forward.c:849 Hit http://ftp.cz.debian.org wheezy-updates/main Translation-en/DiffIndex Hit http://security.debian.org wheezy/updates/main Sources Hit http://security.debian.org wheezy/updates/main amd64 Packages Hit http://hwraid.le-vert.net wheezy Release Hit http://security.debian.org wheezy/updates/main Translation-en Hit http://hwraid.le-vert.net wheezy/main amd64 Packages No locals. #9 0x000000000050e062 in receive_msg (buf=0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len=408, rcv_info=0x7fffcca861b0) at receive.c:255 msg = 0x7f8e2fa50470 ctx = {rec_lev = 383305440, run_flags = 32654, last_retcode = 5, jmp_env = {{__jmpbuf = {10268600, 0, 0, 0, 0, 140248696117746, 140247862083589, 0}, __mask_was_saved = -861380448, __saved_mask = {__val = {10953600, 140736626975160, 910874129, 51539607555, 910874129, 4294832, 140736626976240, 140736626975008, 6322852, 7728554256, 140248255940568, 140736626974992, 6318455, 140736626975264, 167897581528, 10953600}}}}} ret = 4294832 inb = {s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len = 408} __FUNCTION__ = "receive_msg" #10 0x000000000060db81 in udp_rcv_loop () at udp_server.c:495 len = 408 buf = "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"... tmp = 0xa72380 "93.99.158.97" from = 0x7f8e2f987188 fromlen = 16 ri = {src_ip = {af = 2, len = 4, u = {addrl = {1794250947, 4294832}, addr32 = {1794250947, 0, 4294832, 0}, addr16 = {6339, 27378, 0, 0, 34992, 65, 0, 0}, addr = "\303\030\362j\000\000\000\000\260\210A\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = { 858595153, 0}, addr32 = {858595153, 0, 0, 0}, addr16 = {8017, 13101, 0, 0, 0, 0, 0, 0}, addr = "Q\037-3", '\000' <repeats 11 times>}}, src_port = 5061, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\305\303\030\362j\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50451, sin_addr = {s_addr = 1794250947}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50451, sin6_flowinfo = 1794250947, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f8e2f3d75e0, proto = 1 '\001'} __FUNCTION__ = "udp_rcv_loop" #11 0x00000000004aa664 in main_loop () at main.c:1573 i = 5 pid = 0 si = 0x7f8e2f3d75e0 si_desc = "udp receiver child=5 sock=81.31.45.51:5060\000\000n\000\000\000n/q\000\001\000\000\000\260\264y\027\216\177\000\000\060c\250\314\377\177\000\000\210Z\006\033\216\177\000\000\240\352\344'\216\177\000\000\020v\215/\216\177\000\000\020\277\344'\216\177\000 \000\003\000\000\000\216\177\000\000\021\326J6\000\000\000\000\260\210A\000\001\000\000" nrprocs = 8 __FUNCTION__ = "main_loop" #12 0x00000000004b0b5b in main (argc=9, argv=0x7fffcca865f8) at main.c:2533 cfg_stream = 0x14b0010 c = -1 r = 0 tmp = 0x7fffcca86a4f "" tmp_len = 32654 port = 836212592 proto = 0 options = 0x707da0 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:" ret = -1 seed = 4234779735 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x55 p = 0x7fffcca864fe "" __FUNCTION__ = "main" (gdb) frame 0 #0 0x00007f8e28d5fc3b in trace_onreply_in (t=0xa72441, type=4, ps=0x7f8e1c2a7ac8) at siptrace.c:1271 1271 if(trace_local_ip.s && trace_local_ip.len > 0) { (gdb) p *msg $1 = {id = 8930, pid = 7643, tval = {tv_sec = 1437593263, tv_usec = 563447}, fwd_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, rpl_send_flags = {f = 0 '\000', blst_imask = 0 '\000'}, first_line = {type = 65538, len = 16, u = {request = {method = { s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len = 7}, uri = { s = 0xa723c8 "200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83k"..., len = 3}, version = { s = 0xa723cc "OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83kw9ta"..., len = 2}, method_value = 200}, reply = {version = {s = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len = 7}, status = {s = 0xa723c8 "200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83k"..., len = 3}, reason = { s = 0xa723cc "OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 41a86d83kw9ta"..., len = 2}, statuscode = 200}}}, via1 = 0x7f8e2f727940, via2 = 0x7f8e2f9aa360, headers = 0x7f8e2f3d55d8, last_header = 0x7f8e2f3d4928, parsed_flag = 118, h_via1 = 0x7f8e2f3d55d8, h_via2 = 0x7f8e2f3d40a0, callid = 0x7f8e2f3d51b0, to = 0x0, cseq = 0x7f8e2f3d5a00, from = 0x7f8e2f3d4928, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0x0, authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x0, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, body = 0x0, eoh = 0x0, unparsed = 0xa724eb "To: 380965115229 sip:0965115229@195.24.242.106;tag=y4yzzqusnwd66s7y.o\r\nServer: Sippy\r\nContent-Length: 0\r\n\r\n", rcv = { src_ip = {af = 2, len = 4, u = {addrl = {1794250947, 4294832}, addr32 = {1794250947, 0, 4294832, 0}, addr16 = {6339, 27378, 0, 0, 34992, 65, 0, 0}, addr = "\303\030\362j\000\000\000\000\260\210A\000\000\000\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {858595153, 0}, addr32 = {858595153, 0, 0, 0}, addr16 = {8017, 13101, 0, 0, 0, 0, 0, 0}, addr = "Q\037-3", '\000' <repeats 11 times>}}, src_port = 5061, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023\305\303\030\362j\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50451, sin_addr = {s_addr = 1794250947}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50451, sin6_flowinfo = 1794250947, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7f8e2f3d75e0, proto = 1 '\001'}, buf = 0xa723c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 81.31.45.51;branch=z9hG4bKc376.58080170055d3a7868f406d8ce19606b.0\r\nVia: SIP/2.0/UDP 81.31.45.56:5060;received=81.31.45.56;branch=z9hG4bK27b1faee;rport=5060\r\nCall-ID: 4"..., len = 408, new_uri = {s = 0x0, len = 0}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = { s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = { s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = '\000' <repeats 57 times>, add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 0, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, ldv = {flow = {decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x0, proto = 0 '\000'}}}} (gdb) q ```
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/263#issuecomment-124382441
I pushed a patch to fix it in master and 4.3 branches. Reopen of the issue is still there.
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/263#issuecomment-124471316
Closed #263.
--- Reply to this email directly or view it on GitHub: https://github.com/kamailio/kamailio/issues/263#event-364366775