Okay, I can’t trigger this thing at will, but can reasonably expect it to happen every 2 or 3 days.
Backtrace looks like this, its always the same:
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
--Type <RET> for more, q to quit, c to continue without paging--c
Core was generated by `/usr/sbin/asterisk -mqfg -C /etc/asterisk/asterisk.conf'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x000055dae5937ab7 in ast_str_case_hash (str=0x15c <error: Cannot access memory at address 0x15c>) at /home/ahand/asterisk-18.13.0/include/asterisk/strings.h:1285
1285 while (*str) {
[Current thread is 1 (Thread 0x7fd4c187b700 (LWP 91490))]
(gdb) bt
#0 0x000055dae5937ab7 in ast_str_case_hash (str=0x15c <error: Cannot access memory at address 0x15c>) at /home/ahand/asterisk-18.13.0/include/asterisk/strings.h:1285
#1 0x000055dae5937d00 in channel_snapshot_uniqueid_hash_cb (obj=0x15c, flags=64) at stasis_channels.c:211
#2 0x000055dae57d0d6a in hash_ao2_find_first (self=0x55dae6539af8, flags=OBJ_SEARCH_KEY, arg=0x15c, state=0x7fd4c18793e0) at astobj2_hash.c:363
#3 0x000055dae57ceacb in internal_ao2_traverse
(self=0x55dae6539af8, flags=OBJ_SEARCH_KEY, cb_fn=0x55dae5937d02 <channel_snapshot_uniqueid_cmp_cb>, arg=0x15c, data=0x0, type=AO2_CALLBACK_DEFAULT, tag=0x0, file=0x55dae5a35f61 "stasis_channels.c", line=911, func=0x55dae5a36a80 <__PRETTY_FUNCTION__.16790> "ast_channel_snapshot_get_latest") at astobj2_container.c:318
#4 0x000055dae57cee16 in __ao2_callback
(c=0x55dae6539af8, flags=OBJ_SEARCH_KEY, cb_fn=0x55dae5937d02 <channel_snapshot_uniqueid_cmp_cb>, arg=0x15c, tag=0x0, file=0x55dae5a35f61 "stasis_channels.c", line=911, func=0x55dae5a36a80 <__PRETTY_FUNCTION__.16790> "ast_channel_snapshot_get_latest") at astobj2_container.c:414
#5 0x000055dae57ceed6 in __ao2_find
(c=0x55dae6539af8, arg=0x15c, flags=OBJ_SEARCH_KEY, tag=0x0, file=0x55dae5a35f61 "stasis_channels.c", line=911, func=0x55dae5a36a80 <__PRETTY_FUNCTION__.16790> "ast_channel_snapshot_get_latest")
at astobj2_container.c:437
#6 0x000055dae593c005 in ast_channel_snapshot_get_latest (uniqueid=0x15c <error: Cannot access memory at address 0x15c>) at stasis_channels.c:911
#7 0x00007fd51b982ddd in publish_chanspy_message (snoop=0x7fd4e126b838, start=0) at res_stasis_snoop.c:138
#8 0x00007fd51b9833e7 in snoop_hangup (chan=0x7fd4e126e400) at res_stasis_snoop.c:228
#9 0x000055dae58136e1 in ast_hangup (chan=0x7fd4e126e400) at channel.c:2612
#10 0x00007fd51b983ccb in stasis_app_control_snoop
(chan=0x7fd4e108deb0, spy=STASIS_SNOOP_DIRECTION_IN, whisper=STASIS_SNOOP_DIRECTION_NONE, app=0x7fd4e1258104 "lebedev", app_args=0x0, snoop_id=0x7fd4e12532f8 "83865b86a5684328bcb6e76e60d26f2e")
at res_stasis_snoop.c:386
#11 0x00007fd4d73e545b in ari_channels_handle_snoop_channel
(args_channel_id=0x7fd4e125391a "31d8ab91d5534c3da0a626d738364fcd", args_spy=0x7fd4e123a714 "in", args_whisper=0x0, args_app=0x7fd4e1258104 "lebedev", args_app_args=0x0, args_snoop_id=0x7fd4e12532f8 "83865b86a5684328bcb6e76e60d26f2e", response=0x7fd4c1879b10) at ari/resource_channels.c:1638
#12 0x00007fd4d73e561c in ast_ari_channels_snoop_channel (headers=0x7fd4e0e378b0, args=0x7fd4c18798d0, response=0x7fd4c1879b10) at ari/resource_channels.c:1655
#13 0x00007fd4d73df22b in ast_ari_channels_snoop_channel_cb (ser=0x7fd4f8229910, get_params=0x7fd4e1258090, path_vars=0x7fd4e12538a0, headers=0x7fd4e0e378b0, body=0x0, response=0x7fd4c1879b10)
at res_ari_channels.c:2581
#14 0x00007fd4d75e6bb6 in ast_ari_invoke
(ser=0x7fd4f8229910, uri=0x7fd4c1879c6a "channels/31d8ab91d5534c3da0a626d738364fcd/snoop", method=AST_HTTP_POST, get_params=0x7fd4e1258090, headers=0x7fd4e0e378b0, body=0x0, response=0x7fd4c1879b10) at res_ari.c:587
#15 0x00007fd4d75e8347 in ast_ari_callback
(ser=0x7fd4f8229910, urih=0x7fd4d75f43e0 <http_uri>, uri=0x7fd4c1879c6a "channels/31d8ab91d5534c3da0a626d738364fcd/snoop", method=AST_HTTP_POST, get_params=0x7fd4e1258090, headers=0x7fd4e0e378b0)
at res_ari.c:1058
#16 0x000055dae59bc9e8 in handle_uri (ser=0x7fd4f8229910, uri=0x7fd4c1879c6a "channels/31d8ab91d5534c3da0a626d738364fcd/snoop", method=AST_HTTP_POST, headers=0x7fd4e0e378b0) at http.c:1490
#17 0x000055dae59bdc35 in httpd_process_request (ser=0x7fd4f8229910) at http.c:1931
#18 0x000055dae59bdf7f in httpd_helper_thread (data=0x7fd4f8229910) at http.c:1994
#19 0x000055dae5959698 in handle_tcptls_connection (data=0x7fd4f8229910) at tcptls.c:274
#20 0x000055dae596d876 in dummy_start (data=0x7fd4f804ba30) at utils.c:1574
#21 0x00007fd51aed1609 in start_thread (arg=<optimized out>) at pthread_create.c:477
#22 0x00007fd51ac51133 in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:95
Is there anything revelatory about the above? ast_str_case_hash looks fairly innocuous as functions go. Thank you again everyone.