Description

Yesterday we noticed that Kamailio crashed suddenly. There was no major call load on the node, but we did found out that
multiple calls were tried to initiate though the node ending with "486 busy here" when the crash happened. User/users tried over and over to make the call happen even though busy was signaled. Our Kamailio is configured to keep count of the dialogs using dialog profiles.

Troubleshooting

Searched logs, what kind of calls were tried to place on the network though the node at the time of the crash and collected the backtrace.

Debugging Data

Kamailio version:
kamailio 5.5.6 (x86_64/linux) 72dbb0
flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED
ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: 72dbb0 
compiled on 00:00:00 Sep 13 2022 with gcc 11.3.1

OS:
Red Hat Enterprise Linux release 9.3 (Plow)

Kamailio log when the crash happened:
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417559]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 13
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417541]: ALERT: <core> [main.c:788]: handle_sigs(): child process 3417545 exited by a signal 11
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417541]: ALERT: <core> [main.c:791]: handle_sigs(): core was generated
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417541]: INFO: <core> [main.c:813]: handle_sigs(): terminating due to SIGCHLD
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417543]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417551]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417553]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417557]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417544]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417559]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417547]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417548]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417542]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417552]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417554]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417555]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417558]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417556]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417546]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received


Core dump bt full trace:
GNU gdb (GDB) Red Hat Enterprise Linux 10.2-11.1.el9_3
Copyright (C) 2021 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<https://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
    <http://www.gnu.org/software/gdb/documentation/>.

For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...
Reading symbols from /usr/lib/debug/usr/sbin/kamailio-5.5.6-0.el9.centos.x86_64.debug...

warning: Can't open file /dev/zero (deleted) during file-backed mapping note processing
[New LWP 3417545]
Missing separate debuginfo for /usr/lib64/kamailio/modules/tls.so
Try: dnf --enablerepo='*debug*' install /usr/lib/debug/.build-id/08/23cd55ae0236655930f83c342c2b76bc3215c5.debug
Missing separate debuginfo for /usr/lib64/kamailio/modules/snmpstats.so
Try: dnf --enablerepo='*debug*' install /usr/lib/debug/.build-id/bd/ff4c3b08c64459c940abc2fc0f55abd5518619.debug
Missing separate debuginfo for /usr/lib64/kamailio/modules/db_mysql.so
Try: dnf --enablerepo='*debug*' install /usr/lib/debug/.build-id/d1/e37f2e0a33abb8554b3f082e8e0a9aefc0bd76.debug
Missing separate debuginfo for /usr/lib64/kamailio/modules/dialplan.so
Try: dnf --enablerepo='*debug*' install /usr/lib/debug/.build-id/31/e195cc97b19103a6d71de3feff763dc9b21d6d.debug
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib64/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio --atexit=no -DD -P /run/kamailio/kamailio.pid -f /etc/kamail'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  link_profile (linker=0x7f73efb2d3d8, vkey=0x7f73ef18ecb8) at dlg_profile.c:486
486                     p_entry->first->prev->next = &linker->hash_linker;
Missing separate debuginfos, use: dnf debuginfo-install audit-libs-3.0.7-104.el9.x86_64 bzip2-libs-1.0.8-8.el9.x86_64 glibc-2.34-83.el9_3.12.x86_64 libacl-2.3.1-3.el9.x86_64 libattr-2.5.1-3.el9.x86_64 libcap-2.48-9.el9_2.x86_64 libcap-ng-0.8.2-7.el9.x86_64 libxcrypt-4.4.18-3.el9.x86_64 libzstd-1.5.1-2.el9.x86_64 lm_sensors-libs-3.6.0-10.el9.x86_64 lua-libs-5.4.4-4.el9.x86_64 mariadb-connector-c-3.2.6-1.el9_0.x86_64 net-snmp-agent-libs-5.9.1-11.el9_3.1.x86_64 net-snmp-libs-5.9.1-11.el9_3.1.x86_64 openssl-libs-3.0.7-25.el9_3.x86_64 pcre-8.44-3.el9.3.x86_64 perl-libs-5.32.1-480.el9.x86_64 popt-1.18-8.el9.x86_64 rpm-libs-4.16.1.3-27.el9_3.x86_64 sqlite-libs-3.34.1-7.el9_3.x86_64 xz-libs-5.2.5-8.el9_0.x86_64 zlib-1.2.11-40.el9.x86_64
(gdb) bt full
#0  link_profile (linker=0x7f73efb2d3d8, vkey=0x7f73ef18ecb8) at dlg_profile.c:486
        hash = 14
        p_entry = 0x7f73eee13730
#1  0x00007f73ed45e4f7 in link_dlg_profile (linker=0x7f73efb2d3d8, dlg=0x7f73ef18ec40) at dlg_profile.c:522
        d_entry = 0x7f73eee18ea8
#2  0x00007f73ed45f5d6 in set_dlg_profile (msg=0x7f73f30c3230, value=0x7ffcbf7094f0, profile=0x7f73eee13620) at dlg_profile.c:609
        dlg = 0x7f73ef18ec40
        linker = 0x7f73efb2d3d8
        __func__ = "set_dlg_profile"
#3  0x00007f73ed3e089a in w_set_dlg_profile_helper (msg=0x7f73f30c3230, profile=0x7f73eee13620, value=0x7ffcbf7094f0) at dialog.c:825
        __func__ = "w_set_dlg_profile_helper"
#4  0x00007f73ed3e138b in w_set_dlg_profile (msg=0x7f73f30c3230, profile=0x7f73eee13620 "P7\341\356s\177", value=0x7f73f2f6aa88 "`\327\371\362s\177")
    at dialog.c:852
        pve = 0x7f73f2f6aa88
        val_s = {s = 0x7f73f2e6dc30 "xxx", len = 31}
        __func__ = "w_set_dlg_profile"
#5  0x00000000004416f6 in do_action (h=0x7ffcbf70ae60, a=0x7f73f2f9edb0, msg=0x7f73f30c3230) at core/action.c:1091
        ret = -5
        v = 1
        dst = {send_sock = 0x817213, to = {s = {sa_family = 18, sa_data = "\000\000\000\000\000\000\320zt\363s\177\000"}, sin = {sin_family = 18, 
              sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\320zt\363s\177\000"}, sin6 = {sin6_family = 18, sin6_port = 0, sin6_flowinfo = 0, 
              sin6_addr = {__in6_u = {__u6_addr8 = "\320zt\363s\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {31440, 62324, 32627, 0, 0, 0, 
                    0, 0}, __u6_addr32 = {4084497104, 32627, 0, 0}}}, sin6_scope_id = 4075568768}, sas = {ss_family = 18, 
              __ss_padding = "\000\000\000\000\000\000\320zt\363s\177\000\000\000\000\000\000\000\000\000\000\200>\354\362s\177\000\000@\235p\277\374\177\000\000\060\062\f\363s\177\000\000`\256p\277\374\177\000\000P7\354\362s\177\000\000D\235p\277\374\177\000\000\060\062\f\363s\177\000\000`\256p\277\374\177\000\000\320zt\363s\177\000\000\000\000\000\004\000\000\000\000\260\232p\277\374\177\000\000\200\263\240\355s\177\000", __ss_align = 0}}, 
          id = -1083139152, send_flags = {f = 32764, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x1f2dff010 <error: Cannot access memory at address 0x1f2dff010>
        new_uri = 0x5d23df <rval_expr_eval_int+131> "\211E̋E\314\301\350\037\017\266\300H\205\300\017\204p\036"
        end = 0x7ffcbf709c20 "\220\235p\277\374\177"
        crt = 0x7ffcbf709c00 "\220\235p\277\374\177"
        cmd = 0x7f73f2eb0db0
        len = 32627
        user = -219400368
        uri = {user = {s = 0x7f73f2ec3770 "\002", len = -217304528}, passwd = {s = 0x1f3747ad0 <error: Cannot access memory at address 0x1f3747ad0>, 
            len = 10194964}, host = {s = 0x7ffcbf709900 "\260\231p\277\374\177", len = -311958360}, port = {s = 0x7f73f2ef7a88 "\004", 
            len = -1083138808}, params = {s = 0x7f73f2ec3770 "\002", len = -217304528}, sip_params = {
--Type <RET> for more, q to quit, c to continue without paging--
            s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, headers = {
            s = 0x7ffcbf709980 "02\f\363s\177", len = 4519307}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0xf30c3230), transport = {
            s = 0x7f73f2ef6ee0 <incomplete sequence \344>, len = -1083134368}, ttl = {
            s = 0x7f73f2e63a28 "SDj4oqe01-38b51cd5c133af2f2994e7b7149891fe-v300g00030::re_analyse_customer", len = 74}, user_param = {
            s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 139952309}, maddr = {s = 0x7f73f2ec0ff0 "e\017\354\362s\177", 
            len = -217679816}, method = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 0}, lr = {
            s = 0x817213 "INFO", len = 18}, r2 = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, 
          gr = {s = 0x7ffcbf7099b0 "\200>\354\362s\177", len = 5686778}, transport_val = {s = 0x1 <error: Cannot access memory at address 0x1>, 
            len = -1083138808}, ttl_val = {s = 0x7f73f2ec3758 "\026", len = -217304528}, user_param_val = {
            s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, maddr_val = {
            s = 0x7ffcbf709ab0 " \234p\277\374\177", len = 6104031}, method_val = {s = 0x7ffcbf709a00 "\260\232p\277\374\177", len = -308238037}, 
          lr_val = {s = 0x7ffcbf709bb0 "\005", len = -219195016}, r2_val = {s = 0x7f73f2ef7a80 "\001", len = -1083139116}, gr_val = {
            s = 0x7f73f30c3230 "\236\235\177", len = 0}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x817213 "INFO", len = 18}, port = {
            s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, params = {
            s = 0x7ffcbf7097d0 "\360\227p\277\374\177", len = 5688750}, sip_params = {s = 0x7ffcbf7097bc "\001", len = -287473952}, headers = {
            s = 0x9b9000 <ut_buf_int2str> "", len = 0}, port_no = 38720, proto = 49008, type = 32764, 
          flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0xed64fae8), transport = {
            s = 0x10091dc88 <error: Cannot access memory at address 0x10091dc88>, len = -287473952}, ttl = {s = 0x7ffcbf709750 "p\227p\277\374\177", 
            len = -312148998}, user_param = {s = 0x7f73f2ebe4d8 "(", len = -287473952}, maddr = {s = 0x7ffcbf709770 "\320zt\363s\177", 
            len = -312143558}, method = {s = 0x7ffcbf709770 "\320zt\363s\177", len = 0}, lr = {s = 0x817213 "INFO", len = 18}, r2 = {
            s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, gr = {
            s = 0x7ffcbf7097d0 "\360\227p\277\374\177", len = 5628632}, transport_val = {s = 0x7ffcbf709824 "\001", len = -293364992}, ttl_val = {
            s = 0x9b9000 <ut_buf_int2str> "", len = 1}, user_param_val = {s = 0x817213 "INFO", len = 18}, maddr_val = {
            s = 0x9b9014 <ut_buf_int2str+20> "1", len = 67108864}, method_val = {s = 0x7ffcbf7097f0 "0\230p\277\374\177", len = 5628752}, lr_val = {
            s = 0x7ffcbf709824 "\001", len = 1}, r2_val = {s = 0x7ffcbf709830 "", len = 5651808}, gr_val = {
            s = 0x1bf709830 <error: Cannot access memory at address 0x1bf709830>, len = -1083138808}}
        u = 0x5
        port = 0
        dst_host = 0x4000000
        i = 4
        flags = 0
        avp = 0x41c9b8 <dlsym@plt+8>
        st = {flags = 4077761328, id = 32627, name = {n = 0, s = {s = 0x0, len = -219425232}, re = 0x0}, avp = 0x7f73f30c3230}
        sct = 0x7f73f2ec3e78
        sjt = 0x5d603b <rval_expr_eval_rvint+7593>
        rve = 0x7f73f2f84a70
--Type <RET> for more, q to quit, c to continue without paging--
        mct = 0x7ffcbf709d40
        rv = 0x7f73ed5d3474 <w_ds_is_from_list1+946>
        rv1 = 0x7ffcbf70a284
        c1 = {cache_type = 3211826896, val_type = 32764, c = {avp_val = {n = 5686778, s = {
                s = 0x56c5fa <pv_get_spec_value+879> "\211Ẽ", <incomplete sequence \314>, len = -1083140528}, re = 0x56c5fa <pv_get_spec_value+879>}, 
            pval = {rs = {s = 0x56c5fa <pv_get_spec_value+879> "\211Ẽ", <incomplete sequence \314>, len = -1083140528}, ri = -1083140272, 
              flags = 32764}}, i2s = "\030\021\354\362s\177\000\000\060\062\f\363s\177\000\000\000\227p\277\374\177"}
        s = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}
        srevp = {0x817213, 0x12}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {
                s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {type = RVE_FREE_FIXUP_ST, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {
              number = 140135975607040, string = 0x7f73f30bdb00 "\220\332\v\363s\177", str = {s = 0x7f73f30bdb00 "\220\332\v\363s\177", len = 2}, 
              data = 0x7f73f30bdb00, attr = 0x7f73f30bdb00, select = 0x7f73f30bdb00}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}}
        __func__ = "do_action"
#6  0x000000000044eee9 in run_actions (h=0x7ffcbf70ae60, a=0x7f73f2f27bf8, msg=0x7f73f30c3230) at core/action.c:1584
        t = 0x7f73f2f9edb0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 5628752
        __func__ = "run_actions"
#7  0x000000000043daae in do_action (h=0x7ffcbf70ae60, a=0x7f73f2ec7fc0, msg=0x7f73f30c3230) at core/action.c:703
        ret = -5
        v = 1
        dst = {send_sock = 0x7ffcbf70a290, to = {s = {sa_family = 50682, sa_data = "V\000\v\000\000\000\a\000\000\000\000\000\000"}, sin = {
              sin_family = 50682, sin_port = 86, sin_addr = {s_addr = 11}, sin_zero = "\a\000\000\000\000\000\000"}, sin6 = {sin6_family = 50682, 
              sin6_port = 86, sin6_flowinfo = 11, sin6_addr = {__in6_u = {__u6_addr8 = "\a\000\000\000\000\000\000\000\337\023of\000\000\000", 
                  __u6_addr16 = {7, 0, 0, 0, 5087, 26223, 0, 0}, __u6_addr32 = {7, 0, 1718555615, 0}}}, sin6_scope_id = 33089760}, sas = {
              ss_family = 50682, 
--Type <RET> for more, q to quit, c to continue without paging--
              __ss_padding = "V\000\v\000\000\000\a\000\000\000\000\000\000\000\337\023of\000\000\000\000\340\350\370\001\000\000\000\000X\000\000\000\000\000\000\000\337\023of\000\000\000\000\261\071\344-\000\000\000\000#\000\000\000!", '\000' <repeats 11 times>, "\005\000\000\000|\000\000\000\000\000\000\000\247\000\000\000\001\000\000\000\374\177\000\000\060*\000\000\000\000\000\000p\033\306\001\000\000\000\000Ȗ\203\356\000\000\000", 
              __ss_align = 140135982463696}}, id = 0, send_flags = {f = 1, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x7f73f2ebc8f0 "\002"
        new_uri = 0x5d29a4 <rval_expr_eval_int+1608> "\211E̋E\314\301\350\037\017\266\300H\205\300\017\205\272\030"
        end = 0x7ffcbf70a470 "\340\245p\277\374\177"
        crt = 0x7f73f2ebc988 "\001"
        cmd = 0x7f73f315ca68
        len = 0
        user = 5268014
        uri = {user = {s = 0x7f73f30c3230 "\236\235\177", len = -1083134368}, passwd = {s = 0x7ffcbf70a270 "", len = -219409808}, host = {
            s = 0x7ffcbf70a2b4 "\001", len = -1083137496}, port = {s = 0x7f73f30c3230 "\236\235\177", len = -1083134368}, params = {
            s = 0x7f73f30c3230 "\236\235\177", len = -1083134368}, sip_params = {
            s = 0x35343537313433fb <error: Cannot access memory at address 0x35343537313433fb>, len = -994177024}, headers = {
            s = 0x7f73f37f7dc0 <_nl_C_LC_TIME> "\235\234{\363s\177", len = -994177024}, port_no = 42480, proto = 500, type = ERROR_URI_T, 
          flags = (unknown: 0x2010), transport = {s = 0x71 <error: Cannot access memory at address 0x71>, len = 33089744}, ttl = {
            s = 0x7f73f37fac80 <main_arena> "", len = 33097952}, user_param = {s = 0x1900000001 <error: Cannot access memory at address 0x1900000001>, 
            len = -1083136992}, maddr = {s = 0x7ffcbf70a120 "\340\350\370\001", len = -1083137536}, method = {
            s = 0x1f8e8e0 "<134>Jun 16 19:33:35 /usr/sbin/kamailio[3417545]: INFO: <script>: [j4oqe] A_PROFILE = S=hel-sbc;FMTIN=SUBABR;SOTEAC=104;DLGLIMIT=1000", len = -219409800}, lr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 33089744}, r2 = {s = 0x7f73f37fac80 <main_arena> "", 
            len = -994177024}, gr = {s = 0x0, len = 5697090}, transport_val = {s = 0xb <error: Cannot access memory at address 0xb>, len = 0}, 
          ttl_val = {s = 0x817213 "INFO", len = 18}, user_param_val = {
            s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, maddr_val = {
            s = 0x7ffcbf70a300 "p\244p\277\374\177", len = 6106005}, method_val = {s = 0x7ffcbf70a300 "p\244p\277\374\177", len = -211093163}, 
          lr_val = {s = 0x1f4a5f0 ":j\346\001", len = -211240841}, r2_val = {s = 0x7f73f2ec20d0 "\031", len = -1083136992}, gr_val = {
            s = 0x7f73f30c3230 "\236\235\177", len = -1083134368}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x817213 "INFO", len = 18}, port = {
            s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 0}, params = {s = 0x7f73f2ec19a8 "\001", 
            len = -1083137360}, sip_params = {s = 0x7f73f30c3230 "\236\235\177", len = -1083134368}, headers = {s = 0x7f73f2ec1278 "\a", 
            len = -1083137356}, port_no = 12848, proto = 62220, type = 32627, flags = (unknown: 0xbf70ae60), transport = {
            s = 0x7ffcbf70a010 "\320zt\363s\177", len = -217304528}, ttl = {s = 0x7f73f2ebe4d8 "(", len = -1083134368}, user_param = {s = 0x0, 
            len = 0}, maddr = {s = 0x100817213 <error: Cannot access memory at address 0x100817213>, len = 0}, method = {
            s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, lr = {
            s = 0x7ffcbf70a060 "02\f\363s\177", len = 5968374}, r2 = {
            s = 0xecb1845e031780b5 <error: Cannot access memory at address 0xecb1845e031780b5>, len = -217304528}, gr = {s = 0x7f73f2ec0638 "\002", 
            len = -1083134368}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x817213 "INFO", len = 0}, user_param_val = {s = 0x817213 "INFO", 
--Type <RET> for more, q to quit, c to continue without paging--
            len = 18}, maddr_val = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, method_val = {
            s = 0x7ffcbf70a190 "", len = 6104031}, lr_val = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, 
            len = 0}, r2_val = {s = 0x7ffcbf70a190 "", len = 6119483}, gr_val = {s = 0x7f73f2ec19a0 "\001", len = -1083137360}}
        u = 0x7ffcbf70a500
        port = 0
        dst_host = 0x56cdae <pv_printf_mode+1759>
        i = 5
        flags = -1
        avp = 0x7f73f3747ad0 <syslog>
        st = {flags = 3211829568, id = 32764, name = {n = -1083137792, s = {s = 0x7ffcbf70a100 "\001", len = -209736576}, re = 0x7ffcbf70a100}, 
          avp = 0xc06abc75c4be1000}
        sct = 0x7f73f2ec2800
        sjt = 0x4000000
        rve = 0x7f73f2ec45a8
        mct = 0x7ffcbf70a590
        rv = 0x6cbf77 <search_next_avp+1782>
        rv1 = 0x12
        c1 = {cache_type = 3211829024, val_type = 32764, c = {avp_val = {n = 5686778, s = {
                s = 0x56c5fa <pv_get_spec_value+879> "\211Ẽ", <incomplete sequence \314>, len = 0}, re = 0x56c5fa <pv_get_spec_value+879>}, pval = {
              rs = {s = 0x56c5fa <pv_get_spec_value+879> "\211Ẽ", <incomplete sequence \314>, len = 0}, ri = -1083137416, flags = 32764}}, 
          i2s = "\200\022\354\362s\177\000\000\060\062\f\363s\177\000\000`\237p\277\374\177"}
        s = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}
        srevp = {0x817213, 0x12}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {
                s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {type = RVE_FREE_FIXUP_ST, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {
              number = 140135975607040, string = 0x7f73f30bdb00 "\220\332\v\363s\177", str = {s = 0x7f73f30bdb00 "\220\332\v\363s\177", len = 2}, 
              data = 0x7f73f30bdb00, attr = 0x7f73f30bdb00, select = 0x7f73f30bdb00}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}}
        __func__ = "do_action"
#8  0x000000000044eee9 in run_actions (h=0x7ffcbf70ae60, a=0x7f73f2ec7180, msg=0x7f73f30c3230) at core/action.c:1584
        t = 0x7f73f2ec7fc0
--Type <RET> for more, q to quit, c to continue without paging--
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 0, tz_dsttime = 0}
        tdiff = 18
        __func__ = "run_actions"
#9  0x0000000000441544 in do_action (h=0x7ffcbf70ae60, a=0x7f73f2edb190, msg=0x7f73f30c3230) at core/action.c:1070
        ret = 1
        v = 1
        dst = {send_sock = 0x7ffcbf70ab30, to = {s = {sa_family = 12309, sa_data = "o\000\000\000\000\000\030q\006\363s\177\000"}, sin = {
              sin_family = 12309, sin_port = 111, sin_addr = {s_addr = 0}, sin_zero = "\030q\006\363s\177\000"}, sin6 = {sin6_family = 12309, 
              sin6_port = 111, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\030q\006\363s\177\000\000ȴ\r\363s\177\000", __u6_addr16 = {
                    28952, 62214, 32627, 0, 46280, 62221, 32627, 0}, __u6_addr32 = {4077285656, 32627, 4077761736, 32627}}}, 
              sin6_scope_id = 3211832254}, sas = {ss_family = 12309, 
              __ss_padding = "o\000\000\000\000\000\030q\006\363s\177\000\000ȴ\r\363s\177\000\000\276\253p\277\374\177\000\000\277\253p\277\374\177\000\000ג\232\000\000\000\000\000\207\217\232\000\000\000\000\000\070\204\210\000\000\000\000\000X\222\210\000\000\000\000\000@\000\000\000\000\000\000\000\020\360\337\362s\177\000\000\317v\331\362s\177", '\000' <repeats 12 times>, "\200\000\000\000\000\000`\333H\000\000\000\000", __ss_align = 2564280}}, 
          id = 3613856, send_flags = {f = 0, blst_imask = 1285}, proto = -72 '\270', proto_pad0 = -55 '\311', proto_pad1 = 65}
        tmp = 0x6f347e <qm_malloc+2449> "H\213E\270H\203\300\070\351Q\003"
        new_uri = 0x6fc5e1 <qm_info+46> "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b"
        end = 0xe8 <error: Cannot access memory at address 0xe8>
        crt = 0x7ffcbf70ad50 "P\256p\277\374\177"
        cmd = 0x7f73f2ea8a48
        len = 0
        user = 10129593
        uri = {user = {s = 0x7ffcbf70a910 "@\251p\277\374\177", len = -306704723}, passwd = {
            s = 0xcf3747ad0 <error: Cannot access memory at address 0xcf3747ad0>, len = 0}, host = {s = 0x800000 <_IO_stdin_used> "\001", 
            len = 4774584}, port = {s = 0x4002720f8 <error: Cannot access memory at address 0x4002720f8>, len = 8943776}, params = {
            s = 0x41c9b8 <dlsym@plt+8> "", len = 8}, sip_params = {s = 0x7ffcbf70aa30 "0\253p\277\374\177", len = 7759464}, headers = {
            s = 0x7ffcbf70a940 "\220\256\r\363s\177", len = 4964313}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x86f0d4), 
          transport = {s = 0x7ffcbf70aa30 "0\253p\277\374\177", len = 7286805}, ttl = {s = 0x7f73f30dae90 "\001", len = -217682128}, user_param = {
            s = 0x7ffcbf70aabe "\005\005\270\311A", len = -1083135297}, maddr = {s = 0x9a92d7 <buf+1079> "", len = 10129198}, method = {
            s = 0x888438 <__func__.3> "parse_via", len = 8950360}, lr = {s = 0x40 <error: Cannot access memory at address 0x40>, len = 7325153}, r2 = {
            s = 0x7ffcbf70a9d0 "", len = -220205040}, gr = {s = 0x7f73f30db538 "p", len = -220205040}, transport_val = {
            s = 0x7ffcbf70aa10 "@\252p\277\374\177", len = -306704723}, ttl_val = {
            s = 0xe00000030 <error: Cannot access memory at address 0xe00000030>, len = 0}, user_param_val = {s = 0x800000 <_IO_stdin_used> "\001", 
            len = 4774048}, maddr_val = {s = 0x4002722a8 <error: Cannot access memory at address 0x4002722a8>, len = 8943776}, method_val = {
--Type <RET> for more, q to quit, c to continue without paging--
            s = 0x41c9b8 <dlsym@plt+8> "", len = 8}, lr_val = {s = 0x7ffcbf70ab30 "", len = 7759464}, r2_val = {
            s = 0x7ffcbf70aa40 "\030q\006\363s\177", len = 4964313}, gr_val = {s = 0x0, len = 8843476}}
        next_hop = {user = {s = 0x400bf70a760 <error: Cannot access memory at address 0x400bf70a760>, len = -274094048}, passwd = {
            s = 0x7ffcbf70a860 "\030\220\233", len = -291376120}, host = {s = 0x7ffcbf70a770 "\240\247p\277\374\177", len = -221810361}, port = {
            s = 0x7ffcbf70a780 "\240\247p\277\002", len = -221810334}, params = {s = 0x7ffcbf70a7a0 "", len = -291376120}, sip_params = {
            s = 0x2bf70a7a0 <error: Cannot access memory at address 0x2bf70a7a0>, len = -220676760}, headers = {
            s = 0x9a8f04 <buf+100> "=a92.6fd>\r\nVia: SIP/2.0/UDP 172.19.194.20;branch=z9hG4bKa617.ff0b5b66aa6563c47d53617f4dbe74b8.0\r\nVia: SIP/2.0/UDP 172.20.14.4:5060;branch=z9hG4bK87n3qi108gc8rbe9pi50.1\r\nMax-Forwards: 67\r\nFrom: \"HUONE_"..., len = -282320808}, port_no = 43264, proto = 49008, 
          type = 32764, flags = 0, transport = {s = 0x9b8ec0 <def_list> "\210\237\024\357s\177", len = 10194984}, ttl = {
            s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = -274093472}, user_param = {
            s = 0x7ffcbf70a8d0 "", len = -221447870}, maddr = {s = 0x7ffcbf70a900 "0\252p\277\374\177", len = -274094048}, method = {
            s = 0x400bf70ac60 <error: Cannot access memory at address 0x400bf70ac60>, len = -274093928}, lr = {
            s = 0xffffffffbf70a830 <error: Cannot access memory at address 0xffffffffbf70a830>, len = 1}, r2 = {
            s = 0x50bf70a930 <error: Cannot access memory at address 0x50bf70a930>, len = -274093912}, gr = {
            s = 0x7f73efb402f0 "KDMQ sip:dialog@172.19.194.28:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 172.19.194.20;branch=z9hG4bK5d89.f6002b35", '0' <repeats 24 times>, ".0\r\nTo: <sip:dialog@172.19.194.28:5060>\r\nFrom: <sip:dialog@172.19.194.20:5"..., len = -1083134880}, transport_val = {
            s = 0x7ffcbf70a9c8 "", len = -1083135540}, ttl_val = {s = 0xc800000000 <error: Cannot access memory at address 0xc800000000>, 
            len = -274094048}, user_param_val = {s = 0x9b9028 <_xavi_list_head> "", len = 10194976}, maddr_val = {s = 0x9b9018 <_xavp_list_head> "", 
            len = 10194664}, method_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, lr_val = {s = 0x817213 "INFO", 
            len = 7325153}, r2_val = {s = 0x7ffcbf70a8d0 "", len = -220205040}, gr_val = {s = 0x7f73f3066fa0 "`", len = -220205040}}
        u = 0x9a92d7 <buf+1079>
        port = 0
        dst_host = 0x7f73f30db490
        i = 2
        flags = 32764
        avp = 0x875a18 <__func__.21>
        st = {flags = 4012646488, id = 32627, name = {n = -293601280, s = {s = 0x7f73ee800000 "", len = -1083136048}, re = 0x7f73ee800000}, 
          avp = 0x7f73ed4b0c06 <dmq_tm_callback+2807>}
        sct = 0x7ffcbf70abe0
        sjt = 0x7f73f2dff010
        rve = 0x7f73f2ec2f30
        mct = 0x7f73edb80ead <pkg_proc_update_stats+115>
        rv = 0x7f73ed4d8a9c
        rv1 = 0x72eeb1 <parse_cseq+2542>
        c1 = {cache_type = 4084497104, val_type = 32627, c = {avp_val = {n = 67108864, s = {
                s = 0x104000000 <error: Cannot access memory at address 0x104000000>, len = -1083136240}, re = 0x104000000}, pval = {rs = {
                s = 0x104000000 <error: Cannot access memory at address 0x104000000>, len = -1083136240}, ri = 7335103, flags = 0}}, 
--Type <RET> for more, q to quit, c to continue without paging--
          i2s = "\242\207M\355s\177\000\000\000\000\200\356G\000\000\000\360\210M\355s\177"}
        s = {s = 0x817213 "INFO", len = -293366072}
        srevp = {0x7ffcbf70a6d0, 0x6eff50 <futex_release+29>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {
            type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = {
                s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {type = RVE_FREE_FIXUP_ST, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = {
              number = 140135975607040, string = 0x7f73f30bdb00 "\220\332\v\363s\177", str = {s = 0x7f73f30bdb00 "\220\332\v\363s\177", len = 2}, 
              data = 0x7f73f30bdb00, attr = 0x7f73f30bdb00, select = 0x7f73f30bdb00}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}}
        __func__ = "do_action"
#10 0x000000000044eee9 in run_actions (h=0x7ffcbf70ae60, a=0x7f73f2eb81c0, msg=0x7f73f30c3230) at core/action.c:1584
        t = 0x7f73f2edb190
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -217304528, tz_dsttime = 32627}
        tdiff = 4077287896
        __func__ = "run_actions"
#11 0x000000000044f653 in run_top_route (a=0x7f73f2eb81c0, msg=0x7f73f30c3230, c=0x0) at core/action.c:1669
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -1391185268927135563, 8483347, 18, 140135982463696, 
                67108864, -1391185268977467211, 1389635598856192181}, __mask_was_saved = 0, __saved_mask = {__val = {6227793, 4294967752, 
                  140135975629360, 8483347, 18, 140135982463696, 67108864, 140135975632848, 10129605, 140135975252904, 0, 4611686022722355200, 0, 
                  4294967296, 4294967296, 8483347}}}}}
        p = 0x7ffcbf70ae60
        ret = -210470192
        sfbk = 0
#12 0x000000000058652e in receive_msg (
    buf=0x9a8ea0 <buf> "INVITE sip:yyy@hostname:5060 SIP/2.0\r\nRecord-Route: <sip:172.19.194.20;lr;did=a92.6fd>\r\nVia: SIP/2.0/UDP 172.19.194.20;branch=z9hG4bKa617.ff0b5b66aa6563c47d53617f4dbe74b8.0\r\nVia"..., len=1079, rcv_info=0x7ffcbf70b4d0) at core/receive.c:501
        msg = 0x7f73f30c3230
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4702111234474983745, 4702111234474983745, 4702111234474983745, 
                4702111234474983745, 0, 0, 0, 0}, __mask_was_saved = 437918234, __saved_mask = {__val = {1880844493789993498, 1880844493789993498, 
--Type <RET> for more, q to quit, c to continue without paging--
                  1880844493789993498, 0, 0, 0, 0, 2314885530818453536, 2314885530818453536, 2314885530818453536, 2314885530818453536, 0, 0, 0, 0, 
                  4702111234474983745}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {
          s = 0x9a8ea0 <buf> "INVITE sip:yyy@hostname:5060 SIP/2.0\r\nRecord-Route: <sip:172.19.194.20;lr;did=a92.6fd>\r\nVia: SIP/2.0/UDP 172.19.194.20;branch=z9hG4bKa617.ff0b5b66aa6563c47d53617f4dbe74b8.0\r\nVia"..., len = 1079}
        netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffcbf70b040, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcbf70b4d0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#13 0x00000000006c860a in udp_rcv_loop () at core/udp_server.c:543
        len = 1079
        buf = "INVITE sip:yyy@hostname:5060 SIP/2.0\r\nRecord-Route: <sip:172.19.194.20;lr;did=a92.6fd>\r\nVia: SIP/2.0/UDP 172.19.194.20;branch=z9hG4bKa617.ff0b5b66aa6563c47d53617f4dbe74b8.0\r\nVia"...
        tmp = 0x1eee34928 <error: Cannot access memory at address 0x1eee34928>
        fromaddr = 0x7f73f30d68d8
        fromaddrlen = 16
        rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {348263340, 0}, addr32 = {348263340, 0, 0, 0}, addr16 = {5036, 5314, 0, 0, 0, 0, 0, 0}, 
              addr = "\254\023\302\024", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {348263340, 0}, addr32 = {348263340, 0, 
                0, 0}, addr16 = {5036, 5314, 0, 0, 0, 0, 0, 0}, addr = "\254\023\302\024", '\000' <repeats 11 times>}}, src_port = 5060, 
          dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, 
              sa_data = "\023Ĭ\023\302\024\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 348263340}, 
              sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 348263340, sin6_addr = {
                __in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, 
              sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023Ĭ\023\302\024", '\000' <repeats 111 times>, __ss_align = 0}}, 
          bind_address = 0x7f73f2e91490, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        printbuf = '\000' <repeats 88 times>, "\320>\343\356s\177\000\000\023r\201\000\000\000\000\000\022\000\000\000\000\000\000\000\320zt\363s\177\000\000\000\000\000\004\000\000\000\000гp\277\374\177\000\000m\301b", '\000' <repeats 41 times>, "\004\000\000\000\350\006\353\362\004", '\000' <repeats 91--Type <RET> for more, q to quit, c to continue without paging--
 times>...
        i = -1
        j = 43776
        l = 4
        __func__ = "udp_rcv_loop"
#14 0x000000000042c56a in main_loop () at main.c:1730
        i = 3
        pid = 0
        si = 0x7f73f2e91490
        si_desc = "udp receiver child=3 sock=172.19.194.20:5060\000\000\000\000@\274p\277\374\177\000\000\023r\201\000\000\000\000\000\022\000\000\000\000\000\000\000\320zt\363s\177\000\000H\212\352\362s\177\000\000j{t\363s\177\000\000\060\000\000\000\060\000\000\000\370\267p\277\374\177\000\000\020\267p\277\374\177\000\000\000\020\276\304u\274j\300"
        nrprocs = 4
        woneinit = 1
        __func__ = "main_loop"
#15 0x0000000000438191 in main (argc=11, argv=0x7ffcbf70bd58) at main.c:3061
        cfg_stream = 0x1b9a2d0
        c = -1
        r = 0
        tmp = 0x7ffcbf70deb7 ""
        tmp_len = 0
        port = 0
        proto = 0
        ahost = 0x0
        aport = 0
        options = 0x803128 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 2043858912
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 2
        n_lst = 0x40
        p = 0x1600000 <error: Cannot access memory at address 0x1600000>
        st = {st_dev = 25, st_ino = 179668, st_nlink = 2, st_mode = 16832, st_uid = 978, st_gid = 978, __pad0 = 0, st_rdev = 0, st_size = 100, 
          st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1717103055, tv_nsec = 713677547}, st_mtim = {tv_sec = 1717103910, tv_nsec = 470641633}, 
          st_ctim = {tv_sec = 1717103910, tv_nsec = 470641633}, __glibc_reserved = {0, 0, 0}}
--Type <RET> for more, q to quit, c to continue without paging--
        tbuf = "\342\\\256\363s\177\000\000\070\033\253\363s\177\000\000йp\277\374\177\000\000\a\000\000\000\000\000\000\000\330\b\253\363s\177\000\000\a\000\000\000#\000\000\000\060j\256\363s\177\000\000\005\067\254\363s\177\000\000\000\000\000\000\000\000\000\000\320I\254\363s\177\000\000\070\000a\363s\177\000\000\020\353\252\363s\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\240\271p\277\374\177\000\000\330\032\253\363s\177\000\000\330\032\253\363s\177\000\000\000\000\000\000\000\000\000\000\270\371\252\363s\177\000\000\240\271p\277\374\177\000\000\220u\256\363s\177\000\000\000\000\253\363s\177\000\000\022\f\253\363s\177\000\000F\001\254\363s\177\000\000\344#`\363s\177\000\000\232"...
        option_index = 12
        long_options = {{name = 0x805796 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x8004f4 "version", has_arg = 0, flag = 0x0, val = 118}, {
            name = 0x80579b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x8057a1 "subst", has_arg = 1, flag = 0x0, val = 1025}, {
            name = 0x8057a7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x8057b0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
            name = 0x8057ba "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x8057c4 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {
            name = 0x8057cf "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x8057d8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {
            name = 0x8057e3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x8057e9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {
            name = 0x8057f3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}}
        __func__ = "main"
(gdb) 


(gdb) info locals
hash = 14
p_entry = 0x7f73eee13730

(gdb) list
481             p_entry = &linker->profile->entries[hash];
482             lock_get( &linker->profile->lock );
483             if (p_entry->first) {
484                     linker->hash_linker.prev = p_entry->first->prev;
485                     linker->hash_linker.next = p_entry->first;
486                     p_entry->first->prev->next = &linker->hash_linker;
487                     p_entry->first->prev = &linker->hash_linker;
488             } else {
489                     p_entry->first = linker->hash_linker.next
490                             = linker->hash_linker.prev = &linker->hash_linker;


Reply to this email directly, view it on GitHub, or unsubscribe.
You are receiving this because you are subscribed to this thread.Message ID: <kamailio/kamailio/issues/3878@github.com>