### Description Yesterday we noticed that Kamailio crashed suddenly. There was no major call load on the node, but we did found out that multiple calls were tried to initiate though the node ending with "486 busy here" when the crash happened. User/users tried over and over to make the call happen even though busy was signaled. Our Kamailio is configured to keep count of the dialogs using dialog profiles.
### Troubleshooting Searched logs, what kind of calls were tried to place on the network though the node at the time of the crash and collected the backtrace.
#### Debugging Data
``` Kamailio version: kamailio 5.5.6 (x86_64/linux) 72dbb0 flags: USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, USE_RAW_SOCKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLOCKLIST, HAVE_RESOLV_RES, TLS_PTHREAD_MUTEX_SHARED ADAPTIVE_WAIT_LOOPS 1024, MAX_RECV_BUFFER_SIZE 262144, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB poll method support: poll, epoll_lt, epoll_et, sigio_rt, select. id: 72dbb0 compiled on 00:00:00 Sep 13 2022 with gcc 11.3.1
OS: Red Hat Enterprise Linux release 9.3 (Plow)
Kamailio log when the crash happened: Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417559]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 13 Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417541]: ALERT: <core> [main.c:788]: handle_sigs(): child process 3417545 exited by a signal 11 Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417541]: ALERT: <core> [main.c:791]: handle_sigs(): core was generated Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417541]: INFO: <core> [main.c:813]: handle_sigs(): terminating due to SIGCHLD Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417543]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417551]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417553]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417557]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417544]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417559]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417547]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417548]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417542]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417552]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417554]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417555]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417558]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417556]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received Jun 16 19:33:36 voip-proxy3 /usr/sbin/kamailio[3417546]: INFO: <core> [main.c:868]: sig_usr(): signal 15 received
Core dump bt full trace: GNU gdb (GDB) Red Hat Enterprise Linux 10.2-11.1.el9_3 Copyright (C) 2021 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-redhat-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: https://www.gnu.org/software/gdb/bugs/. Find the GDB manual and other documentation resources online at: http://www.gnu.org/software/gdb/documentation/.
For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/sbin/kamailio... Reading symbols from /usr/lib/debug/usr/sbin/kamailio-5.5.6-0.el9.centos.x86_64.debug...
warning: Can't open file /dev/zero (deleted) during file-backed mapping note processing [New LWP 3417545] Missing separate debuginfo for /usr/lib64/kamailio/modules/tls.so Try: dnf --enablerepo='*debug*' install /usr/lib/debug/.build-id/08/23cd55ae0236655930f83c342c2b76bc3215c5.debug Missing separate debuginfo for /usr/lib64/kamailio/modules/snmpstats.so Try: dnf --enablerepo='*debug*' install /usr/lib/debug/.build-id/bd/ff4c3b08c64459c940abc2fc0f55abd5518619.debug Missing separate debuginfo for /usr/lib64/kamailio/modules/db_mysql.so Try: dnf --enablerepo='*debug*' install /usr/lib/debug/.build-id/d1/e37f2e0a33abb8554b3f082e8e0a9aefc0bd76.debug Missing separate debuginfo for /usr/lib64/kamailio/modules/dialplan.so Try: dnf --enablerepo='*debug*' install /usr/lib/debug/.build-id/31/e195cc97b19103a6d71de3feff763dc9b21d6d.debug [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib64/libthread_db.so.1". Core was generated by `/usr/sbin/kamailio --atexit=no -DD -P /run/kamailio/kamailio.pid -f /etc/kamail'. Program terminated with signal SIGSEGV, Segmentation fault. #0 link_profile (linker=0x7f73efb2d3d8, vkey=0x7f73ef18ecb8) at dlg_profile.c:486 486 p_entry->first->prev->next = &linker->hash_linker; Missing separate debuginfos, use: dnf debuginfo-install audit-libs-3.0.7-104.el9.x86_64 bzip2-libs-1.0.8-8.el9.x86_64 glibc-2.34-83.el9_3.12.x86_64 libacl-2.3.1-3.el9.x86_64 libattr-2.5.1-3.el9.x86_64 libcap-2.48-9.el9_2.x86_64 libcap-ng-0.8.2-7.el9.x86_64 libxcrypt-4.4.18-3.el9.x86_64 libzstd-1.5.1-2.el9.x86_64 lm_sensors-libs-3.6.0-10.el9.x86_64 lua-libs-5.4.4-4.el9.x86_64 mariadb-connector-c-3.2.6-1.el9_0.x86_64 net-snmp-agent-libs-5.9.1-11.el9_3.1.x86_64 net-snmp-libs-5.9.1-11.el9_3.1.x86_64 openssl-libs-3.0.7-25.el9_3.x86_64 pcre-8.44-3.el9.3.x86_64 perl-libs-5.32.1-480.el9.x86_64 popt-1.18-8.el9.x86_64 rpm-libs-4.16.1.3-27.el9_3.x86_64 sqlite-libs-3.34.1-7.el9_3.x86_64 xz-libs-5.2.5-8.el9_0.x86_64 zlib-1.2.11-40.el9.x86_64 (gdb) bt full #0 link_profile (linker=0x7f73efb2d3d8, vkey=0x7f73ef18ecb8) at dlg_profile.c:486 hash = 14 p_entry = 0x7f73eee13730 #1 0x00007f73ed45e4f7 in link_dlg_profile (linker=0x7f73efb2d3d8, dlg=0x7f73ef18ec40) at dlg_profile.c:522 d_entry = 0x7f73eee18ea8 #2 0x00007f73ed45f5d6 in set_dlg_profile (msg=0x7f73f30c3230, value=0x7ffcbf7094f0, profile=0x7f73eee13620) at dlg_profile.c:609 dlg = 0x7f73ef18ec40 linker = 0x7f73efb2d3d8 __func__ = "set_dlg_profile" #3 0x00007f73ed3e089a in w_set_dlg_profile_helper (msg=0x7f73f30c3230, profile=0x7f73eee13620, value=0x7ffcbf7094f0) at dialog.c:825 __func__ = "w_set_dlg_profile_helper" #4 0x00007f73ed3e138b in w_set_dlg_profile (msg=0x7f73f30c3230, profile=0x7f73eee13620 "P7\341\356s\177", value=0x7f73f2f6aa88 "`\327\371\362s\177") at dialog.c:852 pve = 0x7f73f2f6aa88 val_s = {s = 0x7f73f2e6dc30 "xxx", len = 31} __func__ = "w_set_dlg_profile" #5 0x00000000004416f6 in do_action (h=0x7ffcbf70ae60, a=0x7f73f2f9edb0, msg=0x7f73f30c3230) at core/action.c:1091 ret = -5 v = 1 dst = {send_sock = 0x817213, to = {s = {sa_family = 18, sa_data = "\000\000\000\000\000\000\320zt\363s\177\000"}, sin = {sin_family = 18, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\320zt\363s\177\000"}, sin6 = {sin6_family = 18, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\320zt\363s\177\000\000\000\000\000\000\000\000\000", __u6_addr16 = {31440, 62324, 32627, 0, 0, 0, 0, 0}, __u6_addr32 = {4084497104, 32627, 0, 0}}}, sin6_scope_id = 4075568768}, sas = {ss_family = 18, __ss_padding = "\000\000\000\000\000\000\320zt\363s\177\000\000\000\000\000\000\000\000\000\000\200>\354\362s\177\000\000@\235p\277\374\177\000\000\060\062\f\363s\177\000\000`\256p\277\374\177\000\000P7\354\362s\177\000\000D\235p\277\374\177\000\000\060\062\f\363s\177\000\000`\256p\277\374\177\000\000\320zt\363s\177\000\000\000\000\000\004\000\000\000\000\260\232p\277\374\177\000\000\200\263\240\355s\177\000", __ss_align = 0}}, id = -1083139152, send_flags = {f = 32764, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x1f2dff010 <error: Cannot access memory at address 0x1f2dff010> new_uri = 0x5d23df <rval_expr_eval_int+131> "\211E̋E\314\301\350\037\017\266\300H\205\300\017\204p\036" end = 0x7ffcbf709c20 "\220\235p\277\374\177" crt = 0x7ffcbf709c00 "\220\235p\277\374\177" cmd = 0x7f73f2eb0db0 len = 32627 user = -219400368 uri = {user = {s = 0x7f73f2ec3770 "\002", len = -217304528}, passwd = {s = 0x1f3747ad0 <error: Cannot access memory at address 0x1f3747ad0>, len = 10194964}, host = {s = 0x7ffcbf709900 "\260\231p\277\374\177", len = -311958360}, port = {s = 0x7f73f2ef7a88 "\004", len = -1083138808}, params = {s = 0x7f73f2ec3770 "\002", len = -217304528}, sip_params = { --Type <RET> for more, q to quit, c to continue without paging-- s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, headers = { s = 0x7ffcbf709980 "02\f\363s\177", len = 4519307}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0xf30c3230), transport = { s = 0x7f73f2ef6ee0 <incomplete sequence \344>, len = -1083134368}, ttl = { s = 0x7f73f2e63a28 "SDj4oqe01-38b51cd5c133af2f2994e7b7149891fe-v300g00030::re_analyse_customer", len = 74}, user_param = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 139952309}, maddr = {s = 0x7f73f2ec0ff0 "e\017\354\362s\177", len = -217679816}, method = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 0}, lr = { s = 0x817213 "INFO", len = 18}, r2 = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, gr = {s = 0x7ffcbf7099b0 "\200>\354\362s\177", len = 5686778}, transport_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1083138808}, ttl_val = {s = 0x7f73f2ec3758 "\026", len = -217304528}, user_param_val = { s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, maddr_val = { s = 0x7ffcbf709ab0 " \234p\277\374\177", len = 6104031}, method_val = {s = 0x7ffcbf709a00 "\260\232p\277\374\177", len = -308238037}, lr_val = {s = 0x7ffcbf709bb0 "\005", len = -219195016}, r2_val = {s = 0x7f73f2ef7a80 "\001", len = -1083139116}, gr_val = { s = 0x7f73f30c3230 "\236\235\177", len = 0}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x817213 "INFO", len = 18}, port = { s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, params = { s = 0x7ffcbf7097d0 "\360\227p\277\374\177", len = 5688750}, sip_params = {s = 0x7ffcbf7097bc "\001", len = -287473952}, headers = { s = 0x9b9000 <ut_buf_int2str> "", len = 0}, port_no = 38720, proto = 49008, type = 32764, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0xed64fae8), transport = { s = 0x10091dc88 <error: Cannot access memory at address 0x10091dc88>, len = -287473952}, ttl = {s = 0x7ffcbf709750 "p\227p\277\374\177", len = -312148998}, user_param = {s = 0x7f73f2ebe4d8 "(", len = -287473952}, maddr = {s = 0x7ffcbf709770 "\320zt\363s\177", len = -312143558}, method = {s = 0x7ffcbf709770 "\320zt\363s\177", len = 0}, lr = {s = 0x817213 "INFO", len = 18}, r2 = { s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, gr = { s = 0x7ffcbf7097d0 "\360\227p\277\374\177", len = 5628632}, transport_val = {s = 0x7ffcbf709824 "\001", len = -293364992}, ttl_val = { s = 0x9b9000 <ut_buf_int2str> "", len = 1}, user_param_val = {s = 0x817213 "INFO", len = 18}, maddr_val = { s = 0x9b9014 <ut_buf_int2str+20> "1", len = 67108864}, method_val = {s = 0x7ffcbf7097f0 "0\230p\277\374\177", len = 5628752}, lr_val = { s = 0x7ffcbf709824 "\001", len = 1}, r2_val = {s = 0x7ffcbf709830 "", len = 5651808}, gr_val = { s = 0x1bf709830 <error: Cannot access memory at address 0x1bf709830>, len = -1083138808}} u = 0x5 port = 0 dst_host = 0x4000000 i = 4 flags = 0 avp = 0x41c9b8 <dlsym@plt+8> st = {flags = 4077761328, id = 32627, name = {n = 0, s = {s = 0x0, len = -219425232}, re = 0x0}, avp = 0x7f73f30c3230} sct = 0x7f73f2ec3e78 sjt = 0x5d603b <rval_expr_eval_rvint+7593> rve = 0x7f73f2f84a70 --Type <RET> for more, q to quit, c to continue without paging-- mct = 0x7ffcbf709d40 rv = 0x7f73ed5d3474 <w_ds_is_from_list1+946> rv1 = 0x7ffcbf70a284 c1 = {cache_type = 3211826896, val_type = 32764, c = {avp_val = {n = 5686778, s = { s = 0x56c5fa <pv_get_spec_value+879> "\211Ẽ", <incomplete sequence \314>, len = -1083140528}, re = 0x56c5fa <pv_get_spec_value+879>}, pval = {rs = {s = 0x56c5fa <pv_get_spec_value+879> "\211Ẽ", <incomplete sequence \314>, len = -1083140528}, ri = -1083140272, flags = 32764}}, i2s = "\030\021\354\362s\177\000\000\060\062\f\363s\177\000\000\000\227p\277\374\177"} s = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864} srevp = {0x817213, 0x12} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = { s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {type = RVE_FREE_FIXUP_ST, u = { number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = { number = 140135975607040, string = 0x7f73f30bdb00 "\220\332\v\363s\177", str = {s = 0x7f73f30bdb00 "\220\332\v\363s\177", len = 2}, data = 0x7f73f30bdb00, attr = 0x7f73f30bdb00, select = 0x7f73f30bdb00}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #6 0x000000000044eee9 in run_actions (h=0x7ffcbf70ae60, a=0x7f73f2f27bf8, msg=0x7f73f30c3230) at core/action.c:1584 t = 0x7f73f2f9edb0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 5628752 __func__ = "run_actions" #7 0x000000000043daae in do_action (h=0x7ffcbf70ae60, a=0x7f73f2ec7fc0, msg=0x7f73f30c3230) at core/action.c:703 ret = -5 v = 1 dst = {send_sock = 0x7ffcbf70a290, to = {s = {sa_family = 50682, sa_data = "V\000\v\000\000\000\a\000\000\000\000\000\000"}, sin = { sin_family = 50682, sin_port = 86, sin_addr = {s_addr = 11}, sin_zero = "\a\000\000\000\000\000\000"}, sin6 = {sin6_family = 50682, sin6_port = 86, sin6_flowinfo = 11, sin6_addr = {__in6_u = {__u6_addr8 = "\a\000\000\000\000\000\000\000\337\023of\000\000\000", __u6_addr16 = {7, 0, 0, 0, 5087, 26223, 0, 0}, __u6_addr32 = {7, 0, 1718555615, 0}}}, sin6_scope_id = 33089760}, sas = { ss_family = 50682, --Type <RET> for more, q to quit, c to continue without paging-- __ss_padding = "V\000\v\000\000\000\a\000\000\000\000\000\000\000\337\023of\000\000\000\000\340\350\370\001\000\000\000\000X\000\000\000\000\000\000\000\337\023of\000\000\000\000\261\071\344-\000\000\000\000#\000\000\000!", '\000' <repeats 11 times>, "\005\000\000\000|\000\000\000\000\000\000\000\247\000\000\000\001\000\000\000\374\177\000\000\060*\000\000\000\000\000\000p\033\306\001\000\000\000\000Ȗ\203\356\000\000\000", __ss_align = 140135982463696}}, id = 0, send_flags = {f = 1, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x7f73f2ebc8f0 "\002" new_uri = 0x5d29a4 <rval_expr_eval_int+1608> "\211E̋E\314\301\350\037\017\266\300H\205\300\017\205\272\030" end = 0x7ffcbf70a470 "\340\245p\277\374\177" crt = 0x7f73f2ebc988 "\001" cmd = 0x7f73f315ca68 len = 0 user = 5268014 uri = {user = {s = 0x7f73f30c3230 "\236\235\177", len = -1083134368}, passwd = {s = 0x7ffcbf70a270 "", len = -219409808}, host = { s = 0x7ffcbf70a2b4 "\001", len = -1083137496}, port = {s = 0x7f73f30c3230 "\236\235\177", len = -1083134368}, params = { s = 0x7f73f30c3230 "\236\235\177", len = -1083134368}, sip_params = { s = 0x35343537313433fb <error: Cannot access memory at address 0x35343537313433fb>, len = -994177024}, headers = { s = 0x7f73f37f7dc0 <_nl_C_LC_TIME> "\235\234{\363s\177", len = -994177024}, port_no = 42480, proto = 500, type = ERROR_URI_T, flags = (unknown: 0x2010), transport = {s = 0x71 <error: Cannot access memory at address 0x71>, len = 33089744}, ttl = { s = 0x7f73f37fac80 <main_arena> "", len = 33097952}, user_param = {s = 0x1900000001 <error: Cannot access memory at address 0x1900000001>, len = -1083136992}, maddr = {s = 0x7ffcbf70a120 "\340\350\370\001", len = -1083137536}, method = { s = 0x1f8e8e0 "<134>Jun 16 19:33:35 /usr/sbin/kamailio[3417545]: INFO: <script>: [j4oqe] A_PROFILE = S=hel-sbc;FMTIN=SUBABR;SOTEAC=104;DLGLIMIT=1000", len = -219409800}, lr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 33089744}, r2 = {s = 0x7f73f37fac80 <main_arena> "", len = -994177024}, gr = {s = 0x0, len = 5697090}, transport_val = {s = 0xb <error: Cannot access memory at address 0xb>, len = 0}, ttl_val = {s = 0x817213 "INFO", len = 18}, user_param_val = { s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, maddr_val = { s = 0x7ffcbf70a300 "p\244p\277\374\177", len = 6106005}, method_val = {s = 0x7ffcbf70a300 "p\244p\277\374\177", len = -211093163}, lr_val = {s = 0x1f4a5f0 ":j\346\001", len = -211240841}, r2_val = {s = 0x7f73f2ec20d0 "\031", len = -1083136992}, gr_val = { s = 0x7f73f30c3230 "\236\235\177", len = -1083134368}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x817213 "INFO", len = 18}, port = { s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 0}, params = {s = 0x7f73f2ec19a8 "\001", len = -1083137360}, sip_params = {s = 0x7f73f30c3230 "\236\235\177", len = -1083134368}, headers = {s = 0x7f73f2ec1278 "\a", len = -1083137356}, port_no = 12848, proto = 62220, type = 32627, flags = (unknown: 0xbf70ae60), transport = { s = 0x7ffcbf70a010 "\320zt\363s\177", len = -217304528}, ttl = {s = 0x7f73f2ebe4d8 "(", len = -1083134368}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x100817213 <error: Cannot access memory at address 0x100817213>, len = 0}, method = { s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, lr = { s = 0x7ffcbf70a060 "02\f\363s\177", len = 5968374}, r2 = { s = 0xecb1845e031780b5 <error: Cannot access memory at address 0xecb1845e031780b5>, len = -217304528}, gr = {s = 0x7f73f2ec0638 "\002", len = -1083134368}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x817213 "INFO", len = 0}, user_param_val = {s = 0x817213 "INFO", --Type <RET> for more, q to quit, c to continue without paging-- len = 18}, maddr_val = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864}, method_val = { s = 0x7ffcbf70a190 "", len = 6104031}, lr_val = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 0}, r2_val = {s = 0x7ffcbf70a190 "", len = 6119483}, gr_val = {s = 0x7f73f2ec19a0 "\001", len = -1083137360}} u = 0x7ffcbf70a500 port = 0 dst_host = 0x56cdae <pv_printf_mode+1759> i = 5 flags = -1 avp = 0x7f73f3747ad0 <syslog> st = {flags = 3211829568, id = 32764, name = {n = -1083137792, s = {s = 0x7ffcbf70a100 "\001", len = -209736576}, re = 0x7ffcbf70a100}, avp = 0xc06abc75c4be1000} sct = 0x7f73f2ec2800 sjt = 0x4000000 rve = 0x7f73f2ec45a8 mct = 0x7ffcbf70a590 rv = 0x6cbf77 <search_next_avp+1782> rv1 = 0x12 c1 = {cache_type = 3211829024, val_type = 32764, c = {avp_val = {n = 5686778, s = { s = 0x56c5fa <pv_get_spec_value+879> "\211Ẽ", <incomplete sequence \314>, len = 0}, re = 0x56c5fa <pv_get_spec_value+879>}, pval = { rs = {s = 0x56c5fa <pv_get_spec_value+879> "\211Ẽ", <incomplete sequence \314>, len = 0}, ri = -1083137416, flags = 32764}}, i2s = "\200\022\354\362s\177\000\000\060\062\f\363s\177\000\000`\237p\277\374\177"} s = {s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = 67108864} srevp = {0x817213, 0x12} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = { s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {type = RVE_FREE_FIXUP_ST, u = { number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = { number = 140135975607040, string = 0x7f73f30bdb00 "\220\332\v\363s\177", str = {s = 0x7f73f30bdb00 "\220\332\v\363s\177", len = 2}, data = 0x7f73f30bdb00, attr = 0x7f73f30bdb00, select = 0x7f73f30bdb00}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #8 0x000000000044eee9 in run_actions (h=0x7ffcbf70ae60, a=0x7f73f2ec7180, msg=0x7f73f30c3230) at core/action.c:1584 t = 0x7f73f2ec7fc0 --Type <RET> for more, q to quit, c to continue without paging-- ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 0, tz_dsttime = 0} tdiff = 18 __func__ = "run_actions" #9 0x0000000000441544 in do_action (h=0x7ffcbf70ae60, a=0x7f73f2edb190, msg=0x7f73f30c3230) at core/action.c:1070 ret = 1 v = 1 dst = {send_sock = 0x7ffcbf70ab30, to = {s = {sa_family = 12309, sa_data = "o\000\000\000\000\000\030q\006\363s\177\000"}, sin = { sin_family = 12309, sin_port = 111, sin_addr = {s_addr = 0}, sin_zero = "\030q\006\363s\177\000"}, sin6 = {sin6_family = 12309, sin6_port = 111, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\030q\006\363s\177\000\000ȴ\r\363s\177\000", __u6_addr16 = { 28952, 62214, 32627, 0, 46280, 62221, 32627, 0}, __u6_addr32 = {4077285656, 32627, 4077761736, 32627}}}, sin6_scope_id = 3211832254}, sas = {ss_family = 12309, __ss_padding = "o\000\000\000\000\000\030q\006\363s\177\000\000ȴ\r\363s\177\000\000\276\253p\277\374\177\000\000\277\253p\277\374\177\000\000ג\232\000\000\000\000\000\207\217\232\000\000\000\000\000\070\204\210\000\000\000\000\000X\222\210\000\000\000\000\000@\000\000\000\000\000\000\000\020\360\337\362s\177\000\000\317v\331\362s\177", '\000' <repeats 12 times>, "\200\000\000\000\000\000`\333H\000\000\000\000", __ss_align = 2564280}}, id = 3613856, send_flags = {f = 0, blst_imask = 1285}, proto = -72 '\270', proto_pad0 = -55 '\311', proto_pad1 = 65} tmp = 0x6f347e <qm_malloc+2449> "H\213E\270H\203\300\070\351Q\003" new_uri = 0x6fc5e1 <qm_info+46> "H\213E\370H\213P\bH\213E\340H\211\020H\213E\340H\307@(\b" end = 0xe8 <error: Cannot access memory at address 0xe8> crt = 0x7ffcbf70ad50 "P\256p\277\374\177" cmd = 0x7f73f2ea8a48 len = 0 user = 10129593 uri = {user = {s = 0x7ffcbf70a910 "@\251p\277\374\177", len = -306704723}, passwd = { s = 0xcf3747ad0 <error: Cannot access memory at address 0xcf3747ad0>, len = 0}, host = {s = 0x800000 <_IO_stdin_used> "\001", len = 4774584}, port = {s = 0x4002720f8 <error: Cannot access memory at address 0x4002720f8>, len = 8943776}, params = { s = 0x41c9b8 <dlsym@plt+8> "", len = 8}, sip_params = {s = 0x7ffcbf70aa30 "0\253p\277\374\177", len = 7759464}, headers = { s = 0x7ffcbf70a940 "\220\256\r\363s\177", len = 4964313}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0x86f0d4), transport = {s = 0x7ffcbf70aa30 "0\253p\277\374\177", len = 7286805}, ttl = {s = 0x7f73f30dae90 "\001", len = -217682128}, user_param = { s = 0x7ffcbf70aabe "\005\005\270\311A", len = -1083135297}, maddr = {s = 0x9a92d7 <buf+1079> "", len = 10129198}, method = { s = 0x888438 <__func__.3> "parse_via", len = 8950360}, lr = {s = 0x40 <error: Cannot access memory at address 0x40>, len = 7325153}, r2 = { s = 0x7ffcbf70a9d0 "", len = -220205040}, gr = {s = 0x7f73f30db538 "p", len = -220205040}, transport_val = { s = 0x7ffcbf70aa10 "@\252p\277\374\177", len = -306704723}, ttl_val = { s = 0xe00000030 <error: Cannot access memory at address 0xe00000030>, len = 0}, user_param_val = {s = 0x800000 <_IO_stdin_used> "\001", len = 4774048}, maddr_val = {s = 0x4002722a8 <error: Cannot access memory at address 0x4002722a8>, len = 8943776}, method_val = { --Type <RET> for more, q to quit, c to continue without paging-- s = 0x41c9b8 <dlsym@plt+8> "", len = 8}, lr_val = {s = 0x7ffcbf70ab30 "", len = 7759464}, r2_val = { s = 0x7ffcbf70aa40 "\030q\006\363s\177", len = 4964313}, gr_val = {s = 0x0, len = 8843476}} next_hop = {user = {s = 0x400bf70a760 <error: Cannot access memory at address 0x400bf70a760>, len = -274094048}, passwd = { s = 0x7ffcbf70a860 "\030\220\233", len = -291376120}, host = {s = 0x7ffcbf70a770 "\240\247p\277\374\177", len = -221810361}, port = { s = 0x7ffcbf70a780 "\240\247p\277\002", len = -221810334}, params = {s = 0x7ffcbf70a7a0 "", len = -291376120}, sip_params = { s = 0x2bf70a7a0 <error: Cannot access memory at address 0x2bf70a7a0>, len = -220676760}, headers = { s = 0x9a8f04 <buf+100> "=a92.6fd>\r\nVia: SIP/2.0/UDP 172.19.194.20;branch=z9hG4bKa617.ff0b5b66aa6563c47d53617f4dbe74b8.0\r\nVia: SIP/2.0/UDP 172.20.14.4:5060;branch=z9hG4bK87n3qi108gc8rbe9pi50.1\r\nMax-Forwards: 67\r\nFrom: "HUONE_"..., len = -282320808}, port_no = 43264, proto = 49008, type = 32764, flags = 0, transport = {s = 0x9b8ec0 <def_list> "\210\237\024\357s\177", len = 10194984}, ttl = { s = 0x7f73f3747ad0 <syslog> "\363\017\036\372H\201\354", <incomplete sequence \330>, len = -274093472}, user_param = { s = 0x7ffcbf70a8d0 "", len = -221447870}, maddr = {s = 0x7ffcbf70a900 "0\252p\277\374\177", len = -274094048}, method = { s = 0x400bf70ac60 <error: Cannot access memory at address 0x400bf70ac60>, len = -274093928}, lr = { s = 0xffffffffbf70a830 <error: Cannot access memory at address 0xffffffffbf70a830>, len = 1}, r2 = { s = 0x50bf70a930 <error: Cannot access memory at address 0x50bf70a930>, len = -274093912}, gr = { s = 0x7f73efb402f0 "KDMQ sip:dialog@172.19.194.28:5060 SIP/2.0\r\nVia: SIP/2.0/UDP 172.19.194.20;branch=z9hG4bK5d89.f6002b35", '0' <repeats 24 times>, ".0\r\nTo: sip:dialog@172.19.194.28:5060\r\nFrom: <sip:dialog@172.19.194.20:5"..., len = -1083134880}, transport_val = { s = 0x7ffcbf70a9c8 "", len = -1083135540}, ttl_val = {s = 0xc800000000 <error: Cannot access memory at address 0xc800000000>, len = -274094048}, user_param_val = {s = 0x9b9028 <_xavi_list_head> "", len = 10194976}, maddr_val = {s = 0x9b9018 <_xavp_list_head> "", len = 10194664}, method_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 0}, lr_val = {s = 0x817213 "INFO", len = 7325153}, r2_val = {s = 0x7ffcbf70a8d0 "", len = -220205040}, gr_val = {s = 0x7f73f3066fa0 "`", len = -220205040}} u = 0x9a92d7 <buf+1079> port = 0 dst_host = 0x7f73f30db490 i = 2 flags = 32764 avp = 0x875a18 <__func__.21> st = {flags = 4012646488, id = 32627, name = {n = -293601280, s = {s = 0x7f73ee800000 "", len = -1083136048}, re = 0x7f73ee800000}, avp = 0x7f73ed4b0c06 <dmq_tm_callback+2807>} sct = 0x7ffcbf70abe0 sjt = 0x7f73f2dff010 rve = 0x7f73f2ec2f30 mct = 0x7f73edb80ead <pkg_proc_update_stats+115> rv = 0x7f73ed4d8a9c rv1 = 0x72eeb1 <parse_cseq+2542> c1 = {cache_type = 4084497104, val_type = 32627, c = {avp_val = {n = 67108864, s = { s = 0x104000000 <error: Cannot access memory at address 0x104000000>, len = -1083136240}, re = 0x104000000}, pval = {rs = { s = 0x104000000 <error: Cannot access memory at address 0x104000000>, len = -1083136240}, ri = 7335103, flags = 0}}, --Type <RET> for more, q to quit, c to continue without paging-- i2s = "\242\207M\355s\177\000\000\000\000\200\356G\000\000\000\360\210M\355s\177"} s = {s = 0x817213 "INFO", len = -293366072} srevp = {0x7ffcbf70a6d0, 0x6eff50 <futex_release+29>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, { type = NUMBER_ST, u = {number = 2, string = 0x2 <error: Cannot access memory at address 0x2>, str = { s = 0x2 <error: Cannot access memory at address 0x2>, len = 0}, data = 0x2, attr = 0x2, select = 0x2}}, {type = RVE_FREE_FIXUP_ST, u = { number = 0, string = 0x0, str = {s = 0x0, len = 1}, data = 0x0, attr = 0x0, select = 0x0}}, {type = MODFIXUP_ST, u = { number = 140135975607040, string = 0x7f73f30bdb00 "\220\332\v\363s\177", str = {s = 0x7f73f30bdb00 "\220\332\v\363s\177", len = 2}, data = 0x7f73f30bdb00, attr = 0x7f73f30bdb00, select = 0x7f73f30bdb00}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #10 0x000000000044eee9 in run_actions (h=0x7ffcbf70ae60, a=0x7f73f2eb81c0, msg=0x7f73f30c3230) at core/action.c:1584 t = 0x7f73f2edb190 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = -217304528, tz_dsttime = 32627} tdiff = 4077287896 __func__ = "run_actions" #11 0x000000000044f653 in run_top_route (a=0x7f73f2eb81c0, msg=0x7f73f30c3230, c=0x0) at core/action.c:1669 ctx = {rec_lev = 3, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {4294967296, -1391185268927135563, 8483347, 18, 140135982463696, 67108864, -1391185268977467211, 1389635598856192181}, __mask_was_saved = 0, __saved_mask = {__val = {6227793, 4294967752, 140135975629360, 8483347, 18, 140135982463696, 67108864, 140135975632848, 10129605, 140135975252904, 0, 4611686022722355200, 0, 4294967296, 4294967296, 8483347}}}}} p = 0x7ffcbf70ae60 ret = -210470192 sfbk = 0 #12 0x000000000058652e in receive_msg ( buf=0x9a8ea0 <buf> "INVITE sip:yyy@hostname:5060 SIP/2.0\r\nRecord-Route: sip:172.19.194.20;lr;did=a92.6fd\r\nVia: SIP/2.0/UDP 172.19.194.20;branch=z9hG4bKa617.ff0b5b66aa6563c47d53617f4dbe74b8.0\r\nVia"..., len=1079, rcv_info=0x7ffcbf70b4d0) at core/receive.c:501 msg = 0x7f73f30c3230 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {4702111234474983745, 4702111234474983745, 4702111234474983745, 4702111234474983745, 0, 0, 0, 0}, __mask_was_saved = 437918234, __saved_mask = {__val = {1880844493789993498, 1880844493789993498, --Type <RET> for more, q to quit, c to continue without paging-- 1880844493789993498, 0, 0, 0, 0, 2314885530818453536, 2314885530818453536, 2314885530818453536, 2314885530818453536, 0, 0, 0, 0, 4702111234474983745}}}}} bctx = 0x0 ret = 0 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} diff = 0 inb = { s = 0x9a8ea0 <buf> "INVITE sip:yyy@hostname:5060 SIP/2.0\r\nRecord-Route: sip:172.19.194.20;lr;did=a92.6fd\r\nVia: SIP/2.0/UDP 172.19.194.20;branch=z9hG4bKa617.ff0b5b66aa6563c47d53617f4dbe74b8.0\r\nVia"..., len = 1079} netinfo = {data = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0} keng = 0x0 evp = {data = 0x7ffcbf70b040, obuf = {s = 0x0, len = 0}, rcv = 0x7ffcbf70b4d0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 exectime = 0 __func__ = "receive_msg" #13 0x00000000006c860a in udp_rcv_loop () at core/udp_server.c:543 len = 1079 buf = "INVITE sip:yyy@hostname:5060 SIP/2.0\r\nRecord-Route: sip:172.19.194.20;lr;did=a92.6fd\r\nVia: SIP/2.0/UDP 172.19.194.20;branch=z9hG4bKa617.ff0b5b66aa6563c47d53617f4dbe74b8.0\r\nVia"... tmp = 0x1eee34928 <error: Cannot access memory at address 0x1eee34928> fromaddr = 0x7f73f30d68d8 fromaddrlen = 16 rcvi = {src_ip = {af = 2, len = 4, u = {addrl = {348263340, 0}, addr32 = {348263340, 0, 0, 0}, addr16 = {5036, 5314, 0, 0, 0, 0, 0, 0}, addr = "\254\023\302\024", '\000' <repeats 11 times>}}, dst_ip = {af = 2, len = 4, u = {addrl = {348263340, 0}, addr32 = {348263340, 0, 0, 0}, addr16 = {5036, 5314, 0, 0, 0, 0, 0, 0}, addr = "\254\023\302\024", '\000' <repeats 11 times>}}, src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\023Ĭ\023\302\024\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 348263340}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 348263340, sin6_addr = { __in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 2, __ss_padding = "\023Ĭ\023\302\024", '\000' <repeats 111 times>, __ss_align = 0}}, bind_address = 0x7f73f2e91490, rflags = 0, proto = 1 '\001', proto_pad0 = 0 '\000', proto_pad1 = 0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} printbuf = '\000' <repeats 88 times>, "\320>\343\356s\177\000\000\023r\201\000\000\000\000\000\022\000\000\000\000\000\000\000\320zt\363s\177\000\000\000\000\000\004\000\000\000\000гp\277\374\177\000\000m\301b", '\000' <repeats 41 times>, "\004\000\000\000\350\006\353\362\004", '\000' <repeats 91--Type <RET> for more, q to quit, c to continue without paging-- times>... i = -1 j = 43776 l = 4 __func__ = "udp_rcv_loop" #14 0x000000000042c56a in main_loop () at main.c:1730 i = 3 pid = 0 si = 0x7f73f2e91490 si_desc = "udp receiver child=3 sock=172.19.194.20:5060\000\000\000\000@\274p\277\374\177\000\000\023r\201\000\000\000\000\000\022\000\000\000\000\000\000\000\320zt\363s\177\000\000H\212\352\362s\177\000\000j{t\363s\177\000\000\060\000\000\000\060\000\000\000\370\267p\277\374\177\000\000\020\267p\277\374\177\000\000\000\020\276\304u\274j\300" nrprocs = 4 woneinit = 1 __func__ = "main_loop" #15 0x0000000000438191 in main (argc=11, argv=0x7ffcbf70bd58) at main.c:3061 cfg_stream = 0x1b9a2d0 c = -1 r = 0 tmp = 0x7ffcbf70deb7 "" tmp_len = 0 port = 0 proto = 0 ahost = 0x0 aport = 0 options = 0x803128 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 2043858912 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 2 n_lst = 0x40 p = 0x1600000 <error: Cannot access memory at address 0x1600000> st = {st_dev = 25, st_ino = 179668, st_nlink = 2, st_mode = 16832, st_uid = 978, st_gid = 978, __pad0 = 0, st_rdev = 0, st_size = 100, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1717103055, tv_nsec = 713677547}, st_mtim = {tv_sec = 1717103910, tv_nsec = 470641633}, st_ctim = {tv_sec = 1717103910, tv_nsec = 470641633}, __glibc_reserved = {0, 0, 0}} --Type <RET> for more, q to quit, c to continue without paging-- tbuf = "\342\\256\363s\177\000\000\070\033\253\363s\177\000\000йp\277\374\177\000\000\a\000\000\000\000\000\000\000\330\b\253\363s\177\000\000\a\000\000\000#\000\000\000\060j\256\363s\177\000\000\005\067\254\363s\177\000\000\000\000\000\000\000\000\000\000\320I\254\363s\177\000\000\070\000a\363s\177\000\000\020\353\252\363s\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\240\271p\277\374\177\000\000\330\032\253\363s\177\000\000\330\032\253\363s\177\000\000\000\000\000\000\000\000\000\000\270\371\252\363s\177\000\000\240\271p\277\374\177\000\000\220u\256\363s\177\000\000\000\000\253\363s\177\000\000\022\f\253\363s\177\000\000F\001\254\363s\177\000\000\344#`\363s\177\000\000\232"... option_index = 12 long_options = {{name = 0x805796 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x8004f4 "version", has_arg = 0, flag = 0x0, val = 118}, { name = 0x80579b "alias", has_arg = 1, flag = 0x0, val = 1024}, {name = 0x8057a1 "subst", has_arg = 1, flag = 0x0, val = 1025}, { name = 0x8057a7 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x8057b0 "substdefs", has_arg = 1, flag = 0x0, val = 1027}, { name = 0x8057ba "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x8057c4 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, { name = 0x8057cf "modparam", has_arg = 1, flag = 0x0, val = 1030}, {name = 0x8057d8 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, { name = 0x8057e3 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x8057e9 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, { name = 0x8057f3 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" (gdb)
(gdb) info locals hash = 14 p_entry = 0x7f73eee13730
(gdb) list 481 p_entry = &linker->profile->entries[hash]; 482 lock_get( &linker->profile->lock ); 483 if (p_entry->first) { 484 linker->hash_linker.prev = p_entry->first->prev; 485 linker->hash_linker.next = p_entry->first; 486 p_entry->first->prev->next = &linker->hash_linker; 487 p_entry->first->prev = &linker->hash_linker; 488 } else { 489 p_entry->first = linker->hash_linker.next 490 = linker->hash_linker.prev = &linker->hash_linker; ```
Thanks for the report. There was one particular bug fixed some time ago in the dialog module related to some concurrency issues for the dialog data structures. Could you please update to a supported version (e.g. one of the latest 5.7.x or 5.8.x) and see if the problem is fixed there?
Browsed the commit history but did not find any related fixes with the dialog module. I will try to update to 5.7.x or 5.8.x and see if the problem still exists.
This issue is stale because it has been open 6 weeks with no activity. Remove stale label or comment or this will be closed in 2 weeks.
Closed #3878 as not planned.