### Description
Yesterday we noticed that Kamailio crashed suddenly. There was no major call load on the
node, but we did found out that
multiple calls were tried to initiate though the node ending with "486 busy
here" when the crash happened. User/users tried over and over to make the call happen
even though busy was signaled. Our Kamailio is configured to keep count of the dialogs
using dialog profiles.
### Troubleshooting
Searched logs, what kind of calls were tried to place on the network though the node at
the time of the crash and collected the backtrace.
#### Debugging Data
```
Kamailio version:
kamailio 5.5.6 (x86_64/linux) 72dbb0
flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST,
DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY,
USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR,
USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535,
DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: 72dbb0
compiled on 00:00:00 Sep 13 2022 with gcc 11.3.1
OS:
Red Hat Enterprise Linux release 9.3 (Plow)
Kamailio log when the crash happened:
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417559]: CRITICAL: <core>
[core/pass_fd.c:277]: receive_fd(): EOF on 13
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417541]: ALERT: <core> [main.c:788]:
handle_sigs(): child process 3417545 exited by a signal 11
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417541]: ALERT: <core> [main.c:791]:
handle_sigs(): core was generated
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417541]: INFO: <core> [main.c:813]:
handle_sigs(): terminating due to SIGCHLD
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417543]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417551]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417553]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417557]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417544]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417559]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417547]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417548]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417542]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417552]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417554]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417555]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417558]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417556]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417546]: INFO: <core> [main.c:868]:
sig_usr(): signal 15 received
Core dump bt full trace:
GNU gdb (GDB) Red Hat Enterprise Linux 10.2-11.1.el9_3
Copyright (C) 2021 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<https://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...
Reading symbols from /usr/lib/debug/usr/sbin/kamailio-5.5.6-0.el9.centos.x86_64.debug...
warning: Can't open file /dev/zero (deleted) during file-backed mapping note
processing
[New LWP 3417545]
Missing separate debuginfo for /usr/lib64/kamailio/modules/tls.so
Try: dnf --enablerepo='*debug*' install
/usr/lib/debug/.build-id/08/23cd55ae0236655930f83c342c2b76bc3215c5.debug
Missing separate debuginfo for /usr/lib64/kamailio/modules/snmpstats.so
Try: dnf --enablerepo='*debug*' install
/usr/lib/debug/.build-id/bd/ff4c3b08c64459c940abc2fc0f55abd5518619.debug
Missing separate debuginfo for /usr/lib64/kamailio/modules/db_mysql.so
Try: dnf --enablerepo='*debug*' install
/usr/lib/debug/.build-id/d1/e37f2e0a33abb8554b3f082e8e0a9aefc0bd76.debug
Missing separate debuginfo for /usr/lib64/kamailio/modules/dialplan.so
Try: dnf --enablerepo='*debug*' install
/usr/lib/debug/.build-id/31/e195cc97b19103a6d71de3feff763dc9b21d6d.debug
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio --atexit=no -DD -P /run/kamailio/kamailio.pid -f
/etc/kamail'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 link_profile (linker=0x7f73efb2d3d8, vkey=0x7f73ef18ecb8) at dlg_profile.c:486
486 p_entry->first->prev->next =
&linker->hash_linker;
Missing separate debuginfos, use: dnf debuginfo-install audit-libs-3.0.7-104.el9.x86_64
bzip2-libs-1.0.8-8.el9.x86_64 glibc-2.34-83.el9_3.12.x86_64 libacl-2.3.1-3.el9.x86_64
libattr-2.5.1-3.el9.x86_64 libcap-2.48-9.el9_2.x86_64 libcap-ng-0.8.2-7.el9.x86_64
libxcrypt-4.4.18-3.el9.x86_64 libzstd-1.5.1-2.el9.x86_64
lm_sensors-libs-3.6.0-10.el9.x86_64 lua-libs-5.4.4-4.el9.x86_64
mariadb-connector-c-3.2.6-1.el9_0.x86_64 net-snmp-agent-libs-5.9.1-11.el9_3.1.x86_64
net-snmp-libs-5.9.1-11.el9_3.1.x86_64 openssl-libs-3.0.7-25.el9_3.x86_64
pcre-8.44-3.el9.3.x86_64 perl-libs-5.32.1-480.el9.x86_64 popt-1.18-8.el9.x86_64
rpm-libs-4.16.1.3-27.el9_3.x86_64 sqlite-libs-3.34.1-7.el9_3.x86_64
xz-libs-5.2.5-8.el9_0.x86_64 zlib-1.2.11-40.el9.x86_64
(gdb) bt full
#0 link_profile (linker=0x7f73efb2d3d8, vkey=0x7f73ef18ecb8) at dlg_profile.c:486
hash = 14
p_entry = 0x7f73eee13730
#1 0x00007f73ed45e4f7 in link_dlg_profile (linker=0x7f73efb2d3d8, dlg=0x7f73ef18ec40) at
dlg_profile.c:522
d_entry = 0x7f73eee18ea8
#2 0x00007f73ed45f5d6 in set_dlg_profile (msg=0x7f73f30c3230, value=0x7ffcbf7094f0,
profile=0x7f73eee13620) at dlg_profile.c:609
dlg = 0x7f73ef18ec40
linker = 0x7f73efb2d3d8
__func__ = "set_dlg_profile"
#3 0x00007f73ed3e089a in w_set_dlg_profile_helper (msg=0x7f73f30c3230,
profile=0x7f73eee13620, value=0x7ffcbf7094f0) at dialog.c:825
__func__ = "w_set_dlg_profile_helper"
#4 0x00007f73ed3e138b in w_set_dlg_profile (msg=0x7f73f30c3230, profile=0x7f73eee13620
"P7\341\356s\177", value=0x7f73f2f6aa88 "`\327\371\362s\177")
at dialog.c:852
pve = 0x7f73f2f6aa88
val_s = {s = 0x7f73f2e6dc30 "xxx", len = 31}
__func__ = "w_set_dlg_profile"
#5 0x00000000004416f6 in do_action (h=0x7ffcbf70ae60, a=0x7f73f2f9edb0,
msg=0x7f73f30c3230) at core/action.c:1091
ret = -5
v = 1
dst = {send_sock = 0x817213, to = {s = {sa_family = 18, sa_data =
"\000\000\000\000\000\000\320zt\363s\177\000"}, sin = {sin_family = 18,
sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"\320zt\363s\177\000"}, sin6 = {sin6_family = 18, sin6_port = 0, sin6_flowinfo =
0,
sin6_addr = {__in6_u = {__u6_addr8 =
"\320zt\363s\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {31440,
62324, 32627, 0, 0, 0,
0, 0}, __u6_addr32 = {4084497104, 32627, 0, 0}}}, sin6_scope_id =
4075568768}, sas = {ss_family = 18,
__ss_padding =
"\000\000\000\000\000\000\320zt\363s\177\000\000\000\000\000\000\000\000\000\000\200>\354\362s\177\000\000@\235p\277\374\177\000\000\060\062\f\363s\177\000\000`\256p\277\374\177\000\000P7\354\362s\177\000\000D\235p\277\374\177\000\000\060\062\f\363s\177\000\000`\256p\277\374\177\000\000\320zt\363s\177\000\000\000\000\000\004\000\000\000\000\260\232p\277\374\177\000\000\200\263\240\355s\177\000",
__ss_align = 0}},
id = -1083139152, send_flags = {f = 32764, blst_imask = 0}, proto = 0
'\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
tmp = 0x1f2dff010 <error: Cannot access memory at address 0x1f2dff010>
new_uri = 0x5d23df <rval_expr_eval_int+131>
"\211E̋E\314\301\350\037\017\266\300H\205\300\017\204p\036"
end = 0x7ffcbf709c20 "\220\235p\277\374\177"
crt = 0x7ffcbf709c00 "\220\235p\277\374\177"
cmd = 0x7f73f2eb0db0
len = 32627
user = -219400368
uri = {user = {s = 0x7f73f2ec3770 "\002", len = -217304528}, passwd = {s
= 0x1f3747ad0 <error: Cannot access memory at address 0x1f3747ad0>,
len = 10194964}, host = {s = 0x7ffcbf709900 "\260\231p\277\374\177",
len = -311958360}, port = {s = 0x7f73f2ef7a88 "\004",
len = -1083138808}, params = {s = 0x7f73f2ec3770 "\002", len =
-217304528}, sip_params = {
--Type <RET> for more, q to quit, c to continue without paging--
s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354",
<incomplete sequence \330>, len = 67108864}, headers = {
s = 0x7ffcbf709980 "02\f\363s\177", len = 4519307}, port_no = 0,
proto = 0, type = ERROR_URI_T, flags = (unknown: 0xf30c3230), transport = {
s = 0x7f73f2ef6ee0 <incomplete sequence \344>, len = -1083134368}, ttl =
{
s = 0x7f73f2e63a28
"SDj4oqe01-38b51cd5c133af2f2994e7b7149891fe-v300g00030::re_analyse_customer",
len = 74}, user_param = {
s = 0x100000000 <error: Cannot access memory at address 0x100000000>,
len = 139952309}, maddr = {s = 0x7f73f2ec0ff0 "e\017\354\362s\177",
len = -217679816}, method = {s = 0x7f73f3747ad0 <syslog>
"\363\017\036\372H\201\354", <incomplete sequence \330>, len = 0}, lr = {
s = 0x817213 "INFO", len = 18}, r2 = {s = 0x7f73f3747ad0
<syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>,
len = 67108864},
gr = {s = 0x7ffcbf7099b0 "\200>\354\362s\177", len = 5686778},
transport_val = {s = 0x1 <error: Cannot access memory at address 0x1>,
len = -1083138808}, ttl_val = {s = 0x7f73f2ec3758 "\026", len =
-217304528}, user_param_val = {
s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354",
<incomplete sequence \330>, len = 67108864}, maddr_val = {
s = 0x7ffcbf709ab0 " \234p\277\374\177", len = 6104031}, method_val
= {s = 0x7ffcbf709a00 "\260\232p\277\374\177", len = -308238037},
lr_val = {s = 0x7ffcbf709bb0 "\005", len = -219195016}, r2_val = {s =
0x7f73f2ef7a80 "\001", len = -1083139116}, gr_val = {
s = 0x7f73f30c3230 "\236\235\177", len = 0}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s =
0x817213 "INFO", len = 18}, port = {
s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354",
<incomplete sequence \330>, len = 67108864}, params = {
s = 0x7ffcbf7097d0 "\360\227p\277\374\177", len = 5688750},
sip_params = {s = 0x7ffcbf7097bc "\001", len = -287473952}, headers = {
s = 0x9b9000 <ut_buf_int2str> "", len = 0}, port_no = 38720,
proto = 49008, type = 32764,
flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0xed64fae8),
transport = {
s = 0x10091dc88 <error: Cannot access memory at address 0x10091dc88>,
len = -287473952}, ttl = {s = 0x7ffcbf709750 "p\227p\277\374\177",
len = -312148998}, user_param = {s = 0x7f73f2ebe4d8 "(", len =
-287473952}, maddr = {s = 0x7ffcbf709770 "\320zt\363s\177",
len = -312143558}, method = {s = 0x7ffcbf709770 "\320zt\363s\177",
len = 0}, lr = {s = 0x817213 "INFO", len = 18}, r2 = {
s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354",
<incomplete sequence \330>, len = 67108864}, gr = {
s = 0x7ffcbf7097d0 "\360\227p\277\374\177", len = 5628632},
transport_val = {s = 0x7ffcbf709824 "\001", len = -293364992}, ttl_val = {
s = 0x9b9000 <ut_buf_int2str> "", len = 1}, user_param_val =
{s = 0x817213 "INFO", len = 18}, maddr_val = {
s = 0x9b9014 <ut_buf_int2str+20> "1", len = 67108864},
method_val = {s = 0x7ffcbf7097f0 "0\230p\277\374\177", len = 5628752}, lr_val =
{
s = 0x7ffcbf709824 "\001", len = 1}, r2_val = {s = 0x7ffcbf709830
"", len = 5651808}, gr_val = {
s = 0x1bf709830 <error: Cannot access memory at address 0x1bf709830>,
len = -1083138808}}
u = 0x5
port = 0
dst_host = 0x4000000
i = 4
flags = 0
avp = 0x41c9b8 <dlsym@plt+8>
st = {flags = 4077761328, id = 32627, name = {n = 0, s = {s = 0x0, len =
-219425232}, re = 0x0}, avp = 0x7f73f30c3230}
sct = 0x7f73f2ec3e78
sjt = 0x5d603b <rval_expr_eval_rvint+7593>
rve = 0x7f73f2f84a70
--Type <RET> for more, q to quit, c to continue without paging--
mct = 0x7ffcbf709d40
rv = 0x7f73ed5d3474 <w_ds_is_from_list1+946>
rv1 = 0x7ffcbf70a284
c1 = {cache_type = 3211826896, val_type = 32764, c = {avp_val = {n = 5686778, s =
{
s = 0x56c5fa <pv_get_spec_value+879> "\211Ẽ",
<incomplete sequence \314>, len = -1083140528}, re = 0x56c5fa
<pv_get_spec_value+879>},
pval = {rs = {s = 0x56c5fa <pv_get_spec_value+879> "\211Ẽ",
<incomplete sequence \314>, len = -1083140528}, ri = -1083140272,
flags = 32764}}, i2s =
"\030\021\354\362s\177\000\000\060\062\f\363s\177\000\000\000\227p\277\374\177"}
s = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354",
<incomplete sequence \330>, len = 67108864}
srevp = {0x817213, 0x12}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access
memory at address 0x2>, str = {
s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data
= 0x2, attr = 0x2, select = 0x2}}, {type = RVE_FREE_FIXUP_ST, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = MODFIXUP_ST, u = {
number = 140135975607040, string = 0x7f73f30bdb00
"\220\332\v\363s\177", str = {s = 0x7f73f30bdb00
"\220\332\v\363s\177", len = 2},
data = 0x7f73f30bdb00, attr = 0x7f73f30bdb00, select = 0x7f73f30bdb00}},
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#6 0x000000000044eee9 in run_actions (h=0x7ffcbf70ae60, a=0x7f73f2f27bf8,
msg=0x7f73f30c3230) at core/action.c:1584
t = 0x7f73f2f9edb0
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 0, tz_dsttime = 0}
tdiff = 5628752
__func__ = "run_actions"
#7 0x000000000043daae in do_action (h=0x7ffcbf70ae60, a=0x7f73f2ec7fc0,
msg=0x7f73f30c3230) at core/action.c:703
ret = -5
v = 1
dst = {send_sock = 0x7ffcbf70a290, to = {s = {sa_family = 50682, sa_data =
"V\000\v\000\000\000\a\000\000\000\000\000\000"}, sin = {
sin_family = 50682, sin_port = 86, sin_addr = {s_addr = 11}, sin_zero =
"\a\000\000\000\000\000\000"}, sin6 = {sin6_family = 50682,
sin6_port = 86, sin6_flowinfo = 11, sin6_addr = {__in6_u = {__u6_addr8 =
"\a\000\000\000\000\000\000\000\337\023of\000\000\000",
__u6_addr16 = {7, 0, 0, 0, 5087, 26223, 0, 0}, __u6_addr32 = {7, 0,
1718555615, 0}}}, sin6_scope_id = 33089760}, sas = {
ss_family = 50682,
--Type <RET> for more, q to quit, c to continue without paging--
__ss_padding =
"V\000\v\000\000\000\a\000\000\000\000\000\000\000\337\023of\000\000\000\000\340\350\370\001\000\000\000\000X\000\000\000\000\000\000\000\337\023of\000\000\000\000\261\071\344-\000\000\000\000#\000\000\000!",
'\000' <repeats 11 times>,
"\005\000\000\000|\000\000\000\000\000\000\000\247\000\000\000\001\000\000\000\374\177\000\000\060*\000\000\000\000\000\000p\033\306\001\000\000\000\000Ȗ\203\356\000\000\000",
__ss_align = 140135982463696}}, id = 0, send_flags = {f = 1, blst_imask =
0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
tmp = 0x7f73f2ebc8f0 "\002"
new_uri = 0x5d29a4 <rval_expr_eval_int+1608>
"\211E̋E\314\301\350\037\017\266\300H\205\300\017\205\272\030"
end = 0x7ffcbf70a470 "\340\245p\277\374\177"
crt = 0x7f73f2ebc988 "\001"
cmd = 0x7f73f315ca68
len = 0
user = 5268014
uri = {user = {s = 0x7f73f30c3230 "\236\235\177", len = -1083134368},
passwd = {s = 0x7ffcbf70a270 "", len = -219409808}, host = {
s = 0x7ffcbf70a2b4 "\001", len = -1083137496}, port = {s =
0x7f73f30c3230 "\236\235\177", len = -1083134368}, params = {
s = 0x7f73f30c3230 "\236\235\177", len = -1083134368}, sip_params =
{
s = 0x35343537313433fb <error: Cannot access memory at address
0x35343537313433fb>, len = -994177024}, headers = {
s = 0x7f73f37f7dc0 <_nl_C_LC_TIME> "\235\234{\363s\177", len =
-994177024}, port_no = 42480, proto = 500, type = ERROR_URI_T,
flags = (unknown: 0x2010), transport = {s = 0x71 <error: Cannot access memory
at address 0x71>, len = 33089744}, ttl = {
s = 0x7f73f37fac80 <main_arena> "", len = 33097952},
user_param = {s = 0x1900000001 <error: Cannot access memory at address
0x1900000001>,
len = -1083136992}, maddr = {s = 0x7ffcbf70a120 "\340\350\370\001",
len = -1083137536}, method = {
s = 0x1f8e8e0 "<134>Jun 16 19:33:35 /usr/sbin/kamailio[3417545]:
INFO: <script>: [j4oqe] A_PROFILE =
S=hel-sbc;FMTIN=SUBABR;SOTEAC=104;DLGLIMIT=1000", len = -219409800}, lr = {s = 0x1
<error: Cannot access memory at address 0x1>, len = 33089744}, r2 = {s =
0x7f73f37fac80 <main_arena> "",
len = -994177024}, gr = {s = 0x0, len = 5697090}, transport_val = {s = 0xb
<error: Cannot access memory at address 0xb>, len = 0},
ttl_val = {s = 0x817213 "INFO", len = 18}, user_param_val = {
s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354",
<incomplete sequence \330>, len = 67108864}, maddr_val = {
s = 0x7ffcbf70a300 "p\244p\277\374\177", len = 6106005}, method_val
= {s = 0x7ffcbf70a300 "p\244p\277\374\177", len = -211093163},
lr_val = {s = 0x1f4a5f0 ":j\346\001", len = -211240841}, r2_val = {s =
0x7f73f2ec20d0 "\031", len = -1083136992}, gr_val = {
s = 0x7f73f30c3230 "\236\235\177", len = -1083134368}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s =
0x817213 "INFO", len = 18}, port = {
s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354",
<incomplete sequence \330>, len = 0}, params = {s = 0x7f73f2ec19a8 "\001",
len = -1083137360}, sip_params = {s = 0x7f73f30c3230 "\236\235\177",
len = -1083134368}, headers = {s = 0x7f73f2ec1278 "\a",
len = -1083137356}, port_no = 12848, proto = 62220, type = 32627, flags =
(unknown: 0xbf70ae60), transport = {
s = 0x7ffcbf70a010 "\320zt\363s\177", len = -217304528}, ttl = {s =
0x7f73f2ebe4d8 "(", len = -1083134368}, user_param = {s = 0x0,
len = 0}, maddr = {s = 0x100817213 <error: Cannot access memory at address
0x100817213>, len = 0}, method = {
s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354",
<incomplete sequence \330>, len = 67108864}, lr = {
s = 0x7ffcbf70a060 "02\f\363s\177", len = 5968374}, r2 = {
s = 0xecb1845e031780b5 <error: Cannot access memory at address
0xecb1845e031780b5>, len = -217304528}, gr = {s = 0x7f73f2ec0638 "\002",
len = -1083134368}, transport_val = {s = 0x0, len = 0}, ttl_val = {s =
0x817213 "INFO", len = 0}, user_param_val = {s = 0x817213 "INFO",
--Type <RET> for more, q to quit, c to continue without paging--
len = 18}, maddr_val = {s = 0x7f73f3747ad0 <syslog>
"\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864},
method_val = {
s = 0x7ffcbf70a190 "", len = 6104031}, lr_val = {s = 0x7f73f3747ad0
<syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>,
len = 0}, r2_val = {s = 0x7ffcbf70a190 "", len = 6119483}, gr_val =
{s = 0x7f73f2ec19a0 "\001", len = -1083137360}}
u = 0x7ffcbf70a500
port = 0
dst_host = 0x56cdae <pv_printf_mode+1759>
i = 5
flags = -1
avp = 0x7f73f3747ad0 <syslog>
st = {flags = 3211829568, id = 32764, name = {n = -1083137792, s = {s =
0x7ffcbf70a100 "\001", len = -209736576}, re = 0x7ffcbf70a100},
avp = 0xc06abc75c4be1000}
sct = 0x7f73f2ec2800
sjt = 0x4000000
rve = 0x7f73f2ec45a8
mct = 0x7ffcbf70a590
rv = 0x6cbf77 <search_next_avp+1782>
rv1 = 0x12
c1 = {cache_type = 3211829024, val_type = 32764, c = {avp_val = {n = 5686778, s =
{
s = 0x56c5fa <pv_get_spec_value+879> "\211Ẽ",
<incomplete sequence \314>, len = 0}, re = 0x56c5fa <pv_get_spec_value+879>},
pval = {
rs = {s = 0x56c5fa <pv_get_spec_value+879> "\211Ẽ",
<incomplete sequence \314>, len = 0}, ri = -1083137416, flags = 32764}},
i2s =
"\200\022\354\362s\177\000\000\060\062\f\363s\177\000\000`\237p\277\374\177"}
s = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354",
<incomplete sequence \330>, len = 67108864}
srevp = {0x817213, 0x12}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access
memory at address 0x2>, str = {
s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data
= 0x2, attr = 0x2, select = 0x2}}, {type = RVE_FREE_FIXUP_ST, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = MODFIXUP_ST, u = {
number = 140135975607040, string = 0x7f73f30bdb00
"\220\332\v\363s\177", str = {s = 0x7f73f30bdb00
"\220\332\v\363s\177", len = 2},
data = 0x7f73f30bdb00, attr = 0x7f73f30bdb00, select = 0x7f73f30bdb00}},
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#8 0x000000000044eee9 in run_actions (h=0x7ffcbf70ae60, a=0x7f73f2ec7180,
msg=0x7f73f30c3230) at core/action.c:1584
t = 0x7f73f2ec7fc0
--Type <RET> for more, q to quit, c to continue without paging--
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 0, tz_dsttime = 0}
tdiff = 18
__func__ = "run_actions"
#9 0x0000000000441544 in do_action (h=0x7ffcbf70ae60, a=0x7f73f2edb190,
msg=0x7f73f30c3230) at core/action.c:1070
ret = 1
v = 1
dst = {send_sock = 0x7ffcbf70ab30, to = {s = {sa_family = 12309, sa_data =
"o\000\000\000\000\000\030q\006\363s\177\000"}, sin = {
sin_family = 12309, sin_port = 111, sin_addr = {s_addr = 0}, sin_zero =
"\030q\006\363s\177\000"}, sin6 = {sin6_family = 12309,
sin6_port = 111, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"\030q\006\363s\177\000\000ȴ\r\363s\177\000", __u6_addr16 = {
28952, 62214, 32627, 0, 46280, 62221, 32627, 0}, __u6_addr32 =
{4077285656, 32627, 4077761736, 32627}}},
sin6_scope_id = 3211832254}, sas = {ss_family = 12309,
__ss_padding =
"o\000\000\000\000\000\030q\006\363s\177\000\000ȴ\r\363s\177\000\000\276\253p\277\374\177\000\000\277\253p\277\374\177\000\000ג\232\000\000\000\000\000\207\217\232\000\000\000\000\000\070\204\210\000\000\000\000\000X\222\210\000\000\000\000\000@\000\000\000\000\000\000\000\020\360\337\362s\177\000\000\317v\331\362s\177",
'\000' <repeats 12 times>,
"\200\000\000\000\000\000`\333H\000\000\000\000", __ss_align = 2564280}},
id = 3613856, send_flags = {f = 0, blst_imask = 1285}, proto = -72
'\270', proto_pad0 = -55 '\311', proto_pad1 = 65}
tmp = 0x6f347e <qm_malloc+2449>
"H\213E\270H\203\300\070\351Q\003"
new_uri = 0x6fc5e1 <qm_info+46>
"H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b"
end = 0xe8 <error: Cannot access memory at address 0xe8>
crt = 0x7ffcbf70ad50 "P\256p\277\374\177"
cmd = 0x7f73f2ea8a48
len = 0
user = 10129593
uri = {user = {s = 0x7ffcbf70a910 "@\251p\277\374\177", len =
-306704723}, passwd = {
s = 0xcf3747ad0 <error: Cannot access memory at address 0xcf3747ad0>,
len = 0}, host = {s = 0x800000 <_IO_stdin_used> "\001",
len = 4774584}, port = {s = 0x4002720f8 <error: Cannot access memory at
address 0x4002720f8>, len = 8943776}, params = {
s = 0x41c9b8 <dlsym@plt+8> "", len = 8}, sip_params = {s =
0x7ffcbf70aa30 "0\253p\277\374\177", len = 7759464}, headers = {
s = 0x7ffcbf70a940 "\220\256\r\363s\177", len = 4964313}, port_no =
0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x86f0d4),
transport = {s = 0x7ffcbf70aa30 "0\253p\277\374\177", len = 7286805},
ttl = {s = 0x7f73f30dae90 "\001", len = -217682128}, user_param = {
s = 0x7ffcbf70aabe "\005\005\270\311A", len = -1083135297}, maddr =
{s = 0x9a92d7 <buf+1079> "", len = 10129198}, method = {
s = 0x888438 <__func__.3> "parse_via", len = 8950360}, lr = {s
= 0x40 <error: Cannot access memory at address 0x40>, len = 7325153}, r2 = {
s = 0x7ffcbf70a9d0 "", len = -220205040}, gr = {s = 0x7f73f30db538
"p", len = -220205040}, transport_val = {
s = 0x7ffcbf70aa10 "@\252p\277\374\177", len = -306704723}, ttl_val
= {
s = 0xe00000030 <error: Cannot access memory at address 0xe00000030>,
len = 0}, user_param_val = {s = 0x800000 <_IO_stdin_used> "\001",
len = 4774048}, maddr_val = {s = 0x4002722a8 <error: Cannot access memory
at address 0x4002722a8>, len = 8943776}, method_val = {
--Type <RET> for more, q to quit, c to continue without paging--
s = 0x41c9b8 <dlsym@plt+8> "", len = 8}, lr_val = {s =
0x7ffcbf70ab30 "", len = 7759464}, r2_val = {
s = 0x7ffcbf70aa40 "\030q\006\363s\177", len = 4964313}, gr_val = {s
= 0x0, len = 8843476}}
next_hop = {user = {s = 0x400bf70a760 <error: Cannot access memory at address
0x400bf70a760>, len = -274094048}, passwd = {
s = 0x7ffcbf70a860 "\030\220\233", len = -291376120}, host = {s =
0x7ffcbf70a770 "\240\247p\277\374\177", len = -221810361}, port = {
s = 0x7ffcbf70a780 "\240\247p\277\002", len = -221810334}, params =
{s = 0x7ffcbf70a7a0 "", len = -291376120}, sip_params = {
s = 0x2bf70a7a0 <error: Cannot access memory at address 0x2bf70a7a0>,
len = -220676760}, headers = {
s = 0x9a8f04 <buf+100> "=a92.6fd>\r\nVia: SIP/2.0/UDP
172.19.194.20;branch=z9hG4bKa617.ff0b5b66aa6563c47d53617f4dbe74b8.0\r\nVia: SIP/2.0/UDP
172.20.14.4:5060;branch=z9hG4bK87n3qi108gc8rbe9pi50.1\r\nMax-Forwards: 67\r\nFrom:
\"HUONE_"..., len = -282320808}, port_no = 43264, proto = 49008,
type = 32764, flags = 0, transport = {s = 0x9b8ec0 <def_list>
"\210\237\024\357s\177", len = 10194984}, ttl = {
s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354",
<incomplete sequence \330>, len = -274093472}, user_param = {
s = 0x7ffcbf70a8d0 "", len = -221447870}, maddr = {s =
0x7ffcbf70a900 "0\252p\277\374\177", len = -274094048}, method = {
s = 0x400bf70ac60 <error: Cannot access memory at address
0x400bf70ac60>, len = -274093928}, lr = {
s = 0xffffffffbf70a830 <error: Cannot access memory at address
0xffffffffbf70a830>, len = 1}, r2 = {
s = 0x50bf70a930 <error: Cannot access memory at address 0x50bf70a930>,
len = -274093912}, gr = {
s = 0x7f73efb402f0 "KDMQ sip:dialog@172.19.194.28:5060 SIP/2.0\r\nVia:
SIP/2.0/UDP 172.19.194.20;branch=z9hG4bK5d89.f6002b35", '0' <repeats 24
times>, ".0\r\nTo: <sip:dialog@172.19.194.28:5060>\r\nFrom:
<sip:dialog@172.19.194.20:5"..., len = -1083134880}, transport_val = {
s = 0x7ffcbf70a9c8 "", len = -1083135540}, ttl_val = {s =
0xc800000000 <error: Cannot access memory at address 0xc800000000>,
len = -274094048}, user_param_val = {s = 0x9b9028 <_xavi_list_head>
"", len = 10194976}, maddr_val = {s = 0x9b9018 <_xavp_list_head>
"",
len = 10194664}, method_val = {s = 0x1 <error: Cannot access memory at
address 0x1>, len = 0}, lr_val = {s = 0x817213 "INFO",
len = 7325153}, r2_val = {s = 0x7ffcbf70a8d0 "", len = -220205040},
gr_val = {s = 0x7f73f3066fa0 "`", len = -220205040}}
u = 0x9a92d7 <buf+1079>
port = 0
dst_host = 0x7f73f30db490
i = 2
flags = 32764
avp = 0x875a18 <__func__.21>
st = {flags = 4012646488, id = 32627, name = {n = -293601280, s = {s =
0x7f73ee800000 "", len = -1083136048}, re = 0x7f73ee800000},
avp = 0x7f73ed4b0c06 <dmq_tm_callback+2807>}
sct = 0x7ffcbf70abe0
sjt = 0x7f73f2dff010
rve = 0x7f73f2ec2f30
mct = 0x7f73edb80ead <pkg_proc_update_stats+115>
rv = 0x7f73ed4d8a9c
rv1 = 0x72eeb1 <parse_cseq+2542>
c1 = {cache_type = 4084497104, val_type = 32627, c = {avp_val = {n = 67108864, s =
{
s = 0x104000000 <error: Cannot access memory at address
0x104000000>, len = -1083136240}, re = 0x104000000}, pval = {rs = {
s = 0x104000000 <error: Cannot access memory at address
0x104000000>, len = -1083136240}, ri = 7335103, flags = 0}},
--Type <RET> for more, q to quit, c to continue without paging--
i2s =
"\242\207M\355s\177\000\000\000\000\200\356G\000\000\000\360\210M\355s\177"}
s = {s = 0x817213 "INFO", len = -293366072}
srevp = {0x7ffcbf70a6d0, 0x6eff50 <futex_release+29>}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access
memory at address 0x2>, str = {
s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data
= 0x2, attr = 0x2, select = 0x2}}, {type = RVE_FREE_FIXUP_ST, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = MODFIXUP_ST, u = {
number = 140135975607040, string = 0x7f73f30bdb00
"\220\332\v\363s\177", str = {s = 0x7f73f30bdb00
"\220\332\v\363s\177", len = 2},
data = 0x7f73f30bdb00, attr = 0x7f73f30bdb00, select = 0x7f73f30bdb00}},
{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#10 0x000000000044eee9 in run_actions (h=0x7ffcbf70ae60, a=0x7f73f2eb81c0,
msg=0x7f73f30c3230) at core/action.c:1584
t = 0x7f73f2edb190
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = -217304528, tz_dsttime = 32627}
tdiff = 4077287896
__func__ = "run_actions"
#11 0x000000000044f653 in run_top_route (a=0x7f73f2eb81c0, msg=0x7f73f30c3230, c=0x0) at
core/action.c:1669
ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf =
{4294967296, -1391185268927135563, 8483347, 18, 140135982463696,
67108864, -1391185268977467211, 1389635598856192181}, __mask_was_saved =
0, __saved_mask = {__val = {6227793, 4294967752,
140135975629360, 8483347, 18, 140135982463696, 67108864,
140135975632848, 10129605, 140135975252904, 0, 4611686022722355200, 0,
4294967296, 4294967296, 8483347}}}}}
p = 0x7ffcbf70ae60
ret = -210470192
sfbk = 0
#12 0x000000000058652e in receive_msg (
buf=0x9a8ea0 <buf> "INVITE sip:yyy@hostname:5060 SIP/2.0\r\nRecord-Route:
<sip:172.19.194.20;lr;did=a92.6fd>\r\nVia: SIP/2.0/UDP
172.19.194.20;branch=z9hG4bKa617.ff0b5b66aa6563c47d53617f4dbe74b8.0\r\nVia"...,
len=1079, rcv_info=0x7ffcbf70b4d0) at core/receive.c:501
msg = 0x7f73f30c3230
ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf =
{4702111234474983745, 4702111234474983745, 4702111234474983745,
4702111234474983745, 0, 0, 0, 0}, __mask_was_saved = 437918234,
__saved_mask = {__val = {1880844493789993498, 1880844493789993498,
--Type <RET> for more, q to quit, c to continue without paging--
1880844493789993498, 0, 0, 0, 0, 2314885530818453536,
2314885530818453536, 2314885530818453536, 2314885530818453536, 0, 0, 0, 0,
4702111234474983745}}}}}
bctx = 0x0
ret = 0
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
diff = 0
inb = {
s = 0x9a8ea0 <buf> "INVITE sip:yyy@hostname:5060
SIP/2.0\r\nRecord-Route: <sip:172.19.194.20;lr;did=a92.6fd>\r\nVia: SIP/2.0/UDP
172.19.194.20;branch=z9hG4bKa617.ff0b5b66aa6563c47d53617f4dbe74b8.0\r\nVia"..., len =
1079}
netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
keng = 0x0
evp = {data = 0x7ffcbf70b040, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcbf70b4d0, dst
= 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
cidlockidx = 0
cidlockset = 0
errsipmsg = 0
exectime = 0
__func__ = "receive_msg"
#13 0x00000000006c860a in udp_rcv_loop () at core/udp_server.c:543
len = 1079
buf = "INVITE sip:yyy@hostname:5060 SIP/2.0\r\nRecord-Route:
<sip:172.19.194.20;lr;did=a92.6fd>\r\nVia: SIP/2.0/UDP
172.19.194.20;branch=z9hG4bKa617.ff0b5b66aa6563c47d53617f4dbe74b8.0\r\nVia"...
tmp = 0x1eee34928 <error: Cannot access memory at address 0x1eee34928>
fromaddr = 0x7f73f30d68d8
fromaddrlen = 16
rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {348263340, 0}, addr32 =
{348263340, 0, 0, 0}, addr16 = {5036, 5314, 0, 0, 0, 0, 0, 0},
addr = "\254\023\302\024", '\000' <repeats 11
times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {348263340, 0}, addr32 = {348263340,
0,
0, 0}, addr16 = {5036, 5314, 0, 0, 0, 0, 0, 0}, addr =
"\254\023\302\024", '\000' <repeats 11 times>}}, src_port = 5060,
dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s =
{sa_family = 2,
sa_data = "\023Ĭ\023\302\024\000\000\000\000\000\000\000"}, sin =
{sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 348263340},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family =
2, sin6_port = 50195, sin6_flowinfo = 348263340, sin6_addr = {
__in6_u = {__u6_addr8 = '\000' <repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding =
"\023Ĭ\023\302\024", '\000' <repeats 111 times>, __ss_align = 0}},
bind_address = 0x7f73f2e91490, rflags = 0, proto = 1 '\001', proto_pad0
= 0 '\000', proto_pad1 = 0}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
printbuf = '\000' <repeats 88 times>,
"\320>\343\356s\177\000\000\023r\201\000\000\000\000\000\022\000\000\000\000\000\000\000\320zt\363s\177\000\000\000\000\000\004\000\000\000\000гp\277\374\177\000\000m\301b",
'\000' <repeats 41 times>, "\004\000\000\000\350\006\353\362\004",
'\000' <repeats 91--Type <RET> for more, q to quit, c to continue without
paging--
times>...
i = -1
j = 43776
l = 4
__func__ = "udp_rcv_loop"
#14 0x000000000042c56a in main_loop () at main.c:1730
i = 3
pid = 0
si = 0x7f73f2e91490
si_desc = "udp receiver child=3
sock=172.19.194.20:5060\000\000\000\000@\274p\277\374\177\000\000\023r\201\000\000\000\000\000\022\000\000\000\000\000\000\000\320zt\363s\177\000\000H\212\352\362s\177\000\000j{t\363s\177\000\000\060\000\000\000\060\000\000\000\370\267p\277\374\177\000\000\020\267p\277\374\177\000\000\000\020\276\304u\274j\300"
nrprocs = 4
woneinit = 1
__func__ = "main_loop"
#15 0x0000000000438191 in main (argc=11, argv=0x7ffcbf70bd58) at main.c:3061
cfg_stream = 0x1b9a2d0
c = -1
r = 0
tmp = 0x7ffcbf70deb7 ""
tmp_len = 0
port = 0
proto = 0
ahost = 0x0
aport = 0
options = 0x803128
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 2043858912
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 2
n_lst = 0x40
p = 0x1600000 <error: Cannot access memory at address 0x1600000>
st = {st_dev = 25, st_ino = 179668, st_nlink = 2, st_mode = 16832, st_uid = 978,
st_gid = 978, __pad0 = 0, st_rdev = 0, st_size = 100,
st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1717103055, tv_nsec =
713677547}, st_mtim = {tv_sec = 1717103910, tv_nsec = 470641633},
st_ctim = {tv_sec = 1717103910, tv_nsec = 470641633}, __glibc_reserved = {0, 0,
0}}
--Type <RET> for more, q to quit, c to continue without paging--
tbuf =
"\342\\\256\363s\177\000\000\070\033\253\363s\177\000\000йp\277\374\177\000\000\a\000\000\000\000\000\000\000\330\b\253\363s\177\000\000\a\000\000\000#\000\000\000\060j\256\363s\177\000\000\005\067\254\363s\177\000\000\000\000\000\000\000\000\000\000\320I\254\363s\177\000\000\070\000a\363s\177\000\000\020\353\252\363s\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\240\271p\277\374\177\000\000\330\032\253\363s\177\000\000\330\032\253\363s\177\000\000\000\000\000\000\000\000\000\000\270\371\252\363s\177\000\000\240\271p\277\374\177\000\000\220u\256\363s\177\000\000\000\000\253\363s\177\000\000\022\f\253\363s\177\000\000F\001\254\363s\177\000\000\344#`\363s\177\000\000\232"...
option_index = 12
long_options = {{name = 0x805796 "help", has_arg = 0, flag = 0x0, val =
104}, {name = 0x8004f4 "version", has_arg = 0, flag = 0x0, val = 118}, {
name = 0x80579b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name
= 0x8057a1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {
name = 0x8057a7 "substdef", has_arg = 1, flag = 0x0, val = 1026},
{name = 0x8057b0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
name = 0x8057ba "server-id", has_arg = 1, flag = 0x0, val = 1028},
{name = 0x8057c4 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {
name = 0x8057cf "modparam", has_arg = 1, flag = 0x0, val = 1030},
{name = 0x8057d8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {
name = 0x8057e3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name
= 0x8057e9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {
name = 0x8057f3 "atexit", has_arg = 1, flag = 0x0, val = 1034},
{name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
__func__ = "main"
(gdb)
(gdb) info locals
hash = 14
p_entry = 0x7f73eee13730
(gdb) list
481 p_entry = &linker->profile->entries[hash];
482 lock_get( &linker->profile->lock );
483 if (p_entry->first) {
484 linker->hash_linker.prev = p_entry->first->prev;
485 linker->hash_linker.next = p_entry->first;
486 p_entry->first->prev->next =
&linker->hash_linker;
487 p_entry->first->prev = &linker->hash_linker;
488 } else {
489 p_entry->first = linker->hash_linker.next
490 = linker->hash_linker.prev =
&linker->hash_linker;
```
--
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/3878
You are receiving this because you are subscribed to this thread.
Message ID: <kamailio/kamailio/issues/3878(a)github.com>