We have a Kamailio running with a sipcapture module, then handling everything in app_lua and writing some information to a redis server. This Kamailio crashed after running for about a day.
This is the gdb output of bt full:
GNU gdb (Debian 7.7.1+dfsg-5) 7.7.1
Copyright (C) 2014 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/sbin/kamailio...Reading symbols from /usr/lib/debug/.build-id/98/6903c27311ebc3717be5ca53d70d130c092eea.debug...done.
done.
[New LWP 120921]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/sbin/kamailio -P /var/run/kamailio/kamailio_li_sniffer.pid -f /etc/kamaili'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x00007ff05e2d5c3a in strlen () from /lib/x86_64-linux-gnu/libc.so.6
#0 0x00007ff05e2d5c3a in strlen () from /lib/x86_64-linux-gnu/libc.so.6
No symbol table info available.
#1 0x00007ff05783f2aa in redisvFormatCommand () from /usr/lib/x86_64-linux-gnu/libhiredis.so.0.10
No symbol table info available.
#2 0x00007ff0578400a2 in redisvAppendCommand () from /usr/lib/x86_64-linux-gnu/libhiredis.so.0.10
No symbol table info available.
#3 0x00007ff057840289 in redisvCommand () from /usr/lib/x86_64-linux-gnu/libhiredis.so.0.10
No symbol table info available.
#4 0x00007ff057a4d6ac in redisc_exec (srv=0x7ffd7df680d0, res=0x7ffd7df680f0, cmd=0x7ffd7df680e0) at redis_client.c:402
rsrv = 0x7ff05d2bdba0
rpl = 0x7ff05d2eb020
c = 0 '\000'
ap = {{gp_offset = 40, fp_offset = 48, overflow_arg_area = 0x7ffd7df680a0, reg_save_area = 0x7ffd7df67fb0}}
ap2 = {{gp_offset = 24, fp_offset = 48, overflow_arg_area = 0x7ffd7df680a0, reg_save_area = 0x7ffd7df67fb0}}
__FUNCTION__ = "redisc_exec"
#5 0x00007ff057a51156 in w_redis_cmd3 (msg=0x7ff05d30ca28, ssrv=0x7ff05d2d6088 "p\270-]\360\177", scmd=0x7ff05d2d61b0 "\360\237-]\360\177", sres=0x7ff05d2d62d8 "\030z-]\360\177") at ndb_redis_mod.c:160
s = {{s = 0x7ff05d2db870 "liRedis", len = 7}, {
s = 0x7ff05d2a00a0 "SETEX ACTIVECHANNELS_swp3pvm7jqpnu6ixphj1jc7c24@sipgate.de 21600 \n%swp3pvm7jqpnu6ixphj1jc7c24@sipgate.de\022\n2457742e16\032\n4923256980\"%swp3pvm7jqpnu6ixphj1jc7c24@sipgate.de", len = 167}, {
s = 0x7ff05d2d7a18 "r", len = 1}}
__FUNCTION__ = "w_redis_cmd3"
#6 0x000000000045ceac in do_action (h=0x7ffd7df68800, a=0x7ff05d2d6f78, msg=0x7ff05d30ca28) at core/action.c:1072
ret = -5
v = 1583322656
dst = {send_sock = 0x770000006e, to = {s = {sa_family = 38432, sa_data = "_^\360\177\000\000\060\217\000\000\000\000\000"}, sin = {sin_family = 38432, sin_port = 24159, sin_addr = {s_addr = 32752},
sin_zero = "0\217\000\000\000\000\000"}, sin6 = {sin6_family = 38432, sin6_port = 24159, sin6_flowinfo = 32752, sin6_addr = {__in6_u = {__u6_addr8 = "0\217\000\000\000\000\000\000 \226_^\360\177\000", __u6_addr16 = {36656, 0,
0, 0, 38432, 24159, 32752, 0}, __u6_addr32 = {36656, 0, 1583322656, 32752}}}, sin6_scope_id = 3}}, id = 0, proto = -104 '\230', send_flags = {f = 191 '\277', blst_imask = 241 '\361'}}
tmp = 0x1ef559c ""
new_uri = 0x0
end = 0x0
crt = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>
cmd = 0x7ff05d2b9940
len = 131296
user = 0
uri = {user = {s = 0x7ffd7df68530 "\220\207\366}\375\177", len = 0}, passwd = {s = 0x7ffd7df68430 " ", len = 32620272}, host = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 2113307744}, port = {
s = 0x7ffd7df684b0 "\330\204\366}\375\177", len = 32620440}, params = {s = 0x7c <error: Cannot access memory at address 0x7c>, len = 0}, sip_params = {s = 0x770000006e <error: Cannot access memory at address 0x770000006e>,
len = 31080512}, headers = {s = 0x20 <error: Cannot access memory at address 0x20>, len = 1583322656}, port_no = 16480, proto = 474, type = ERROR_URI_T, flags = (unknown: 32462272), transport = {
s = 0x20 <error: Cannot access memory at address 0x20>, len = 1580005056}, ttl = {s = 0x4 <error: Cannot access memory at address 0x4>, len = 240}, user_param = {s = 0x7ff05e5f9620 "", len = 1583322656}, maddr = {
s = 0x9 <error: Cannot access memory at address 0x9>, len = 0}, method = {s = 0x7ff057842acf "", len = 0}, lr = {s = 0x0, len = 1580007456}, r2 = {s = 0x7ffd7df684d8 "0\205\366}\375\177", len = -24651520}, gr = {s = 0x0,
len = 33205536}, transport_val = {s = 0x7ffd7df68570 "\377\377\377\177", len = 2113307952}, ttl_val = {s = 0x7ffd7df68618 "", len = 1579810305}, user_param_val = {s = 0x32 <error: Cannot access memory at address 0x32>,
len = 2113310080}, maddr_val = {s = 0x7ffd7df68790 "", len = 1579814957}, method_val = {s = 0x7ffd7df68628 "", len = 1579810305}, lr_val = {s = 0x7ffd7df68731 "\206\366}\375\177", len = 2113310080}, r2_val = {
s = 0x7ffd7df68790 "", len = -24651520}, gr_val = {s = 0x3000000030 <error: Cannot access memory at address 0x3000000030>, len = 32418038}}
next_hop = {user = {s = 0x1eea8f6 "", len = 32418028}, passwd = {s = 0x0, len = 10}, host = {s = 0x7fffffff <error: Cannot access memory at address 0x7fffffff>, len = 1375378619}, port = {
s = 0x3 <error: Cannot access memory at address 0x3>, len = 48}, params = {s = 0x30 <error: Cannot access memory at address 0x30>, len = 2113309744}, sip_params = {s = 0x1d8ff12 "x", len = 32418038}, headers = {
s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 2113308496}, port_no = 43240, proto = 494, type = ERROR_URI_T, flags = (unknown: 0), transport = {s = 0x7ffd7df68730 " \206\366}\375\177",
len = 0}, ttl = {s = 0x7ffd7df68630 "", len = 12}, user_param = {s = 0x7ff000000009 <error: Cannot access memory at address 0x7ff000000009>, len = 2113308256}, maddr = {s = 0x7ffd7df686b0 "", len = 0}, method = {
s = 0x7ffd7df68c5c "", len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x3ff0000000000000 <error: Cannot access memory at address 0x3ff0000000000000>, len = 1579812146}, gr = {
s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 2113308528}, transport_val = {s = 0x0, len = 2}, ttl_val = {s = 0xe00000067 <error: Cannot access memory at address 0xe00000067>, len = 1},
user_param_val = {s = 0x13 <error: Cannot access memory at address 0x13>, len = 2113307984}, maddr_val = {s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 2113310080}, method_val = {
s = 0x7ffd7df68520 "1\207\366}\375\177", len = 0}, lr_val = {s = 0x7ff05e3b8fea ".", len = 2113307992}, r2_val = {s = 0x0, len = 2113307958}, gr_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 4}}
u = 0x1ef5597
port = 24159
dst_host = 0x0
i = 1583322656
flags = 32752
avp = 0xffffffffffffffff
st = {flags = 0, id = 0, name = {n = 91, s = {s = 0x5b <error: Cannot access memory at address 0x5b>, len = -1}, re = 0x5b}, avp = 0x0}
sct = 0x60
sjt = 0x0
rve = 0x0
mct = 0x0
rv = 0x1ef5597
rv1 = 0x0
c1 = {cache_type = 5, val_type = RV_NONE, c = {avp_val = {n = 2113309744, s = {s = 0x7ffd7df68c30 "", len = 30998297}, re = 0x7ffd7df68c30}, pval = {rs = {s = 0x7ffd7df68c30 "", len = 30998297}, ri = 32418038, flags = 0}},
i2s = "\000\000\000\000\000\000\000\000\000\177\360\001\006\000\000\000\350\250\356\001\000"}
s = {s = 0x5 <error: Cannot access memory at address 0x5>, len = 112}
srevp = {0xffffffffffffffff, 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#7 0x0000000000469afa in run_actions (h=0x7ffd7df68800, a=0x7ff05d2d6f78, msg=0x7ff05d30ca28) at core/action.c:1552
t = 0x7ff05d2d6f78
ret = -1
mod = 0x7ff057c7d3cd
ms = 0
__FUNCTION__ = "run_actions"
#8 0x000000000046a1b1 in run_actions_safe (h=0x7ffd7df6aee0, a=0x7ff05d2d6f78, msg=0x7ff05d30ca28) at core/action.c:1620
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {140670332234288, 1667728728683687988, 4291248, 140726716774352, 0, 0, 1667728728687882292, -1666880443433635788}, __mask_was_saved = 0, __saved_mask = {
__val = {140724603453440, 0, 140668768878606, 0, 0, 0, 0, 18446744073709551615, 140670348687719, 30759624, 140670348687770, 6, 140670241592264, 47260797760, 140724603453441, 140670241592269}}}}}
ret = 32765
ign_on_break = 0
#9 0x000000000042dc6f in rval_get_int (h=0x7ffd7df6aee0, msg=0x7ff05d30ca28, i=0x7ffd7df68b54, rv=0x7ff05d2db0d8, cache=0x0) at core/rvalue.c:912
r_avp = 0x7ffd7df689c0
avp_val = {n = 2113309200, s = {s = 0x7ffd7df68a10 "(\312\060]\360\177", len = 133}, re = 0x7ffd7df68a10}
pval = {rs = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 16005432}, ri = 384480, flags = 4}
tmp = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 1375346761}
s = 0x0
r = 2113309072
ret = 0
destroy_pval = 0
__FUNCTION__ = "rval_get_int"
#10 0x0000000000432374 in rval_expr_eval_int (h=0x7ffd7df6aee0, msg=0x7ff05d30ca28, res=0x7ffd7df68b54, rve=0x7ff05d2db0d0) at core/rvalue.c:1906
i1 = 0
i2 = 1
ret = -1
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 1562718224, s = {s = 0x7ff05d253010 "\001", len = 2113309376}, re = 0x7ff05d253010}, pval = {rs = {s = 0x7ff05d253010 "\001", len = 2113309376},
ri = 1533206860, flags = 32752}}, i2s = "n\000\000\000w", '\000' <repeats 14 times>, "\001\000"}
c2 = {cache_type = 386872, val_type = RV_NONE, c = {avp_val = {n = 774176, s = {s = 0xbd020 <error: Cannot access memory at address 0xbd020>, len = 777848}, re = 0xbd020}, pval = {rs = {
s = 0xbd020 <error: Cannot access memory at address 0xbd020>, len = 777848}, ri = 8, flags = 0}}, i2s = "6\000\000\000\000\000\000\000\000\331\207\376s\325T\271\360\212\366}\375\177"}
rv1 = 0x7ffd7df68a80
rv2 = 0x7ff05d253010
__FUNCTION__ = "rval_expr_eval_int"
#11 0x00000000004327b9 in rval_expr_eval_int (h=0x7ffd7df6aee0, msg=0x7ff05d30ca28, res=0x7ffd7df68c88, rve=0x7ff05d2da808) at core/rvalue.c:1914
i1 = 0
i2 = 1562718224
ret = -1
c1 = {cache_type = 4291248, val_type = RV_NONE, c = {avp_val = {n = 2113320912, s = {s = 0x7ffd7df6b7d0 "\r", len = 0}, re = 0x7ffd7df6b7d0}, pval = {rs = {s = 0x7ffd7df6b7d0 "\r", len = 0}, ri = 0, flags = 0}},
i2s = "\320\213\366}\375\177\000\000\027\305B\000\000\000\000\000\364\373\350\001\000"}
c2 = {cache_type = 2113310080, val_type = 936, c = {avp_val = {n = 1563496992, s = {s = 0x7ff05d311220 "\002", len = 2113309696}, re = 0x7ff05d311220}, pval = {rs = {s = 0x7ff05d311220 "\002", len = 2113309696}, ri = 4376047,
flags = 0}}, i2s = "\260zA\000P\000\000\000P\214\366}\375\177\000\000\000\000\000\000\000"}
rv1 = 0x1dbe558
rv2 = 0x7ff05d2eea30
__FUNCTION__ = "rval_expr_eval_int"
#12 0x000000000045c7c5 in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2dc010, msg=0x7ff05d30ca28) at core/action.c:1030
ret = -5
v = 0
dst = {send_sock = 0x1000000, to = {s = {sa_family = 13192, sa_data = "\364\000\000\000\000\000\220\343\005\000\000\000\000"}, sin = {sin_family = 13192, sin_port = 244, sin_addr = {s_addr = 0},
sin_zero = "\220\343\005\000\000\000\000"}, sin6 = {sin6_family = 13192, sin6_port = 244, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\220\343\005\000\000\000\000\000x\314\v\000\000\000\000", __u6_addr16 = {58256,
5, 0, 0, 52344, 11, 0, 0}, __u6_addr32 = {385936, 0, 773240, 0}}}, sin6_scope_id = 777848}}, id = 0, proto = 8 '\b', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
tmp = 0x7ff057c6acae "H\205\300u\034H\205\333t\027\276\004"
new_uri = 0x0
end = 0x0
crt = 0x1e8fbf4 "24"
cmd = 0x7ff05d2c7a70
len = 2113310048
user = 32765
uri = {user = {s = 0x7ffd7df68f80 "", len = 6677782}, passwd = {s = 0x0, len = 0}, host = {s = 0x73e120 "core", len = 2113310720}, port = {s = 0x7ff05d2d89a0 "\001", len = 1563478568}, params = {
s = 0x5d311220 <error: Cannot access memory at address 0x5d311220>, len = 0}, sip_params = {s = 0x7ff05d2c8780 "\030\210,]\360\177", len = -24651520}, headers = {s = 0x7ffd7df68f90 " \220\366}\375\177", len = 5981733},
port_no = 936, proto = 0, type = ERROR_URI_T, flags = (unknown: 2113310720), transport = {s = 0x7ff05d2d8988 "\017", len = 1563478568}, ttl = {s = 0x7ff05d311228 "n\025\061]\360\177", len = 0}, user_param = {
s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 1563355696}, maddr = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 5989420}, method = {s = 0x0,
len = 2113310720}, lr = {s = 0x7ffd7df69020 "P\220\366}\375\177", len = 4399688}, r2 = {s = 0x1ecbd70 "\020\321\334\001", len = 0}, gr = {s = 0x7ff05d2d8980 "\a", len = 2113311192}, transport_val = {
s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x7ffd7df69040 "(\312\060]\360\177", len = 4398966}, maddr_val = {s = 0x7ffd7df690d0 "", len = 1563259632}, method_val = {
s = 0x0, len = 0}, lr_val = {s = 0x0, len = -24651520}, r2_val = {s = 0x7ffd7df69050 "\200\221\366}\375\177", len = 4399820}, gr_val = {s = 0x7ff05d2d8978 "\001", len = 2113311192}}
next_hop = {user = {s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, passwd = {s = 0x7ffd7df69180 "\260\222\366}\375\177", len = 4405224}, host = {s = 0x0, len = 30759440}, port = {s = 0x7ffd7df69090 "(\312\060]\360\177",
len = 1472711292}, params = {s = 0x7ff05d2d97d8 "!", len = 2113311192}, sip_params = {s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, headers = {s = 0x1d55a10 "\200\065\357\001", len = -24651520}, port_no = 37104,
proto = 32246, type = 32765, flags = (unknown: 30759440), transport = {s = 0x7ff05d2d72f0 "\a", len = 1563261728}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x1df8de0 " \273\354\001",
len = 1472632365}, method = {s = 0x1d55a10 "\200\065\357\001", len = 30759440}, lr = {s = 0x1df8de0 " \273\354\001", len = 1472620846}, r2 = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 30759440}, gr = {
s = 0x7ff057c62030 "\213V\bH\213\066\351\225U", len = 2113311360}, transport_val = {s = 0x0, len = -24651520}, ttl_val = {s = 0xe8de0e2342a7b034 <error: Cannot access memory at address 0xe8de0e2342a7b034>, len = 1563355696},
user_param_val = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 2113320912}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x7ffd7df692b0 "\200\230\366}\375\177", len = 4401525},
lr_val = {s = 0x1f07f00 "\020]\337\001", len = 4291248}, r2_val = {s = 0x7ffd7df6b7d0 "\r", len = 1563355696}, gr_val = {s = 0x7ff05d2d90a8 "\017", len = 2113311496}}
u = 0x2
port = 0
dst_host = 0x7ff05d30ca28
i = 1472702157
flags = 0
avp = 0x7ffd7df68e30
st = {flags = 2113310352, id = 32765, name = {n = 1533206860, s = {s = 0x7ff05b62e14c <pkg_proc_update_stats+130> "H\213\r\225M ", len = 2113310544}, re = 0x7ff05b62e14c <pkg_proc_update_stats+130>}, avp = 0x0}
sct = 0xb954d573fe87d900
sjt = 0x7ffd7df68e70
rve = 0x7ff05d2da808
mct = 0x664969 <qm_info+46>
rv = 0x1f0ec00
rv1 = 0x7ffd7df690d8
c1 = {cache_type = 55, val_type = RV_NONE, c = {avp_val = {n = -24651520, s = {s = 0xb954d573fe87d900 <error: Cannot access memory at address 0xb954d573fe87d900>, len = 2113310400}, re = 0xb954d573fe87d900}, pval = {rs = {
s = 0xb954d573fe87d900 <error: Cannot access memory at address 0xb954d573fe87d900>, len = 2113310400}, ri = 4842663, flags = 0}}, i2s = "\000\000\000\000\000\000\000\000@z{\000\005\000\000\000\200c%]\360\177"}
s = {s = 0x7ffd7df68e50 "", len = 1562718224}
srevp = {0x7ff05d2d72f8, 0x7ff05d253010}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#13 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2dc010, msg=0x7ff05d30ca28) at core/action.c:1552
t = 0x7ff05d2dc010
ret = -1
mod = 0xb954d573fe87d900
ms = 0
__FUNCTION__ = "run_actions"
#14 0x000000000045cc6c in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2deab8, msg=0x7ff05d30ca28) at core/action.c:1045
ret = 1
v = 1
dst = {send_sock = 0x2020200a2922676e, to = {s = {sa_family = 8224, sa_data = " end\n pos"}, sin = {sin_family = 8224, sin_port = 25888, sin_addr = {s_addr = 537551982}, sin_zero = " pos"}, sin6 = {sin6_family = 8224,
sin6_port = 25888, sin6_flowinfo = 537551982, sin6_addr = {__in6_u = {__u6_addr8 = " posix.close", __u6_addr16 = {8224, 8224, 28704, 29551, 30825, 25390, 28524, 25971}, __u6_addr32 = {538976288, 1936683040, 1663989865,
1702063980}}}, sin6_scope_id = 1701980192}}, id = 1717527649, proto = 40 '(', send_flags = {f = 202 '\312', blst_imask = 48 '0'}}
tmp = 0x206c696e203d3d20 <error: Cannot access memory at address 0x206c696e203d3d20>
new_uri = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s"
end = 0x7ffd7df6b7d0 "\r"
crt = 0x7ff05d2cb210 "handle_packet"
cmd = 0x7ff05d2b3568
len = 538976288
user = 538976288
uri = {user = {s = 0x665f65706970202c <error: Cannot access memory at address 0x665f65706970202c>, len = 539568494}, passwd = {s = 0x7720657372756365 <error: Cannot access memory at address 0x7720657372756365>, len = 543716457},
host = {s = 0x726120676e696e69 <error: Cannot access memory at address 0x726120676e696e69>, len = 1701672295}, port = {s = 0x65736c6520202020 <error: Cannot access memory at address 0x65736c6520202020>, len = 539831584}, params = {
s = 0x65636f727020746e <error: Cannot access memory at address 0x65636f727020746e>, len = 537555827}, sip_params = {s = 0x74735f6576617320 <error: Cannot access memory at address 0x74735f6576617320>, len = 1953853284},
headers = {s = 0x7075642e7869736f <error: Cannot access memory at address 0x7075642e7869736f>, len = 1869621280}, port_no = 21587, proto = 20292, type = 1180652629, flags = (URI_USER_NORMALIZE | unknown: 1313164360), transport = {
s = 0x2066692020202020 <error: Cannot access memory at address 0x2066692020202020>, len = 544501614}, ttl = {s = 0x2074756f6474735f <error: Cannot access memory at address 0x2074756f6474735f>, len = 1852139636}, user_param = {
s = 0x6569642020202020 <error: Cannot access memory at address 0x6569642020202020>, len = 1696737312}, maddr = {s = 0x676e692d70756420 <error: Cannot access memory at address 0x676e692d70756420>, len = 537536802}, method = {
s = 0x2020200a646e6520 <error: Cannot access memory at address 0x2020200a646e6520>, len = 1763713056}, lr = {s = 0x2e7869736f702074 <error: Cannot access memory at address 0x2e7869736f702074>, len = 846230884}, r2 = {
s = 0x202c64665f657469 <error: Cannot access memory at address 0x202c64665f657469>, len = 1769172848}, gr = {s = 0x4c49465f54554f44 <error: Cannot access memory at address 0x4c49465f54554f44>, len = 693063237}, transport_val = {
s = 0x2020202020200a6e <error: Cannot access memory at address 0x2020202020200a6e>, len = 1768169504}, ttl_val = {s = 0x756420726f727265 <error: Cannot access memory at address 0x756420726f727265>, len = 1764569712},
user_param_val = {s = 0x652020202020200a <error: Cannot access memory at address 0x652020202020200a>, len = 537551982}, maddr_val = {s = 0x632e7869736f7020 <error: Cannot access memory at address 0x632e7869736f7020>,
len = 1702063980}, method_val = {s = 0x7ff05d2b94c0 "\267\344\360W\360\177", len = 538976288}, lr_val = {s = 0x65736f6c632e7869 <error: Cannot access memory at address 0x65736f6c632e7869>, len = 1920411680}, r2_val = {
s = 0x202020200a296466 <error: Cannot access memory at address 0x202020200a296466>, len = 174354021}, gr_val = {s = 0x636f6c20200a0a64 <error: Cannot access memory at address 0x636f6c20200a0a64>, len = 1914727521}}
next_hop = {user = {s = 0x6e776170732e4d20 <error: Cannot access memory at address 0x6e776170732e4d20>, len = 1534339104}, passwd = {s = 0x746f6e2066692020 <error: Cannot access memory at address 0x746f6e2066692020>,
len = 1952805408}, host = {s = 0x6964202020200a6e <error: Cannot access memory at address 0x6964202020200a6e>, len = 573055077}, port = {s = 0x726f66206e692072 <error: Cannot access memory at address 0x726f66206e692072>,
len = 1919885419}, params = {s = 0x6e6520200a292274 <error: Cannot access memory at address 0x6e6520200a292274>, len = 538970724}, sip_params = {s = 0x2065736f6c632e78 <error: Cannot access memory at address 0x2065736f6c632e78>,
len = 1936683048}, headers = {s = 0xb554f4454 <error: Cannot access memory at address 0xb554f4454>, len = 1563353520}, port_no = 26912, proto = 8294, type = 1042314275, flags = (unknown: 1563353528), transport = {
s = 0x7ff05d2eea30 "\034d\036Z]\025\r", len = 4291248}, ttl = {s = 0x7ffd7df69790 "\320\227\366}\375\177", len = 4522002}, user_param = {s = 0x6961772e7869736f <error: Cannot access memory at address 0x6961772e7869736f>,
len = 1881677940}, maddr = {s = 0x7ff05d2ee1b0 "172.20.40.5", len = 10717792}, method = {s = 0x297075642e <error: Cannot access memory at address 0x297075642e>, len = 1563476872}, lr = {
s = 0x7ffd7df697d0 "\020\230\366}\375\177", len = 4525774}, r2 = {s = 0x7ffd7df698e0 "", len = 2113312832}, gr = {s = 0x2065696420202020 <error: Cannot access memory at address 0x2065696420202020>, len = 1563476872},
transport_val = {s = 0x7ff05d30c3b0 "", len = 1563478568}, ttl_val = {s = 0x7ffd7df69810 "`\230\366}\375\177", len = 4528003}, user_param_val = {s = 0x7ff05d2c9478 "\310\246+]\360\177", len = 2113312992}, maddr_val = {
s = 0x7ffd7df69840 "", len = 2113312816}, method_val = {s = 0x646e650a74657220 <error: Cannot access memory at address 0x646e650a74657220>, len = 1563476912}, lr_val = {s = 0x7ffd7df69860 "\260zA", len = 1463997149}, r2_val = {
s = 0x66726550202d0056 <error: Cannot access memory at address 0x66726550202d0056>, len = 2113312992}, gr_val = {s = 0x7ffd7df69860 "\260zA", len = 1463997228}}
u = 0xd
port = 0
dst_host = 0x7ff05d2eea30
i = 1646403616
flags = 170664549
avp = 0x6620726f72726522
st = {flags = 1563206568, id = 32752, name = {n = 1563478568, s = {s = 0x7ff05d30ca28 "\243\221d", len = 2113313424}, re = 0x7ff05d30ca28}, avp = 0x45cd85 <do_action+31624>}
sct = 0x0
sjt = 0x7ffd7df694c0
rve = 0x7ff05d2d90a8
mct = 0x7ff057e9815f <w_app_lua_run0+60>
rv = 0x6469702066692020
rv1 = 0xb954d573fe87d900
c1 = {cache_type = 1563209688, val_type = 32752, c = {avp_val = {n = 2113313664, s = {s = 0x7ffd7df69b80 "", len = 1600484457}, re = 0x7ffd7df69b80}, pval = {rs = {s = 0x7ffd7df69b80 "", len = 1600484457}, ri = 538976288,
flags = 1936662560}}, i2s = ".exit (pipeline (list."}
s = {s = 0x6461657228203270 <error: Cannot access memory at address 0x6461657228203270>, len = 0}
srevp = {0x7ff05d30ca28, 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#15 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2d6828, msg=0x7ff05d30ca28) at core/action.c:1552
t = 0x7ff05d2deab8
ret = 1
mod = 0xb954d573fe87d900
ms = 0
__FUNCTION__ = "run_actions"
#16 0x000000000045958d in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2cdb18, msg=0x7ff05d30ca28) at core/action.c:678
ret = -5
v = 1948786802
dst = {send_sock = 0x24, to = {s = {sa_family = 51752, sa_data = "0]\360\177\000\000\330\257,]\360\177\000"}, sin = {sin_family = 51752, sin_port = 23856, sin_addr = {s_addr = 32752}, sin_zero = "\330\257,]\360\177\000"}, sin6 = {
sin6_family = 51752, sin6_port = 23856, sin6_flowinfo = 32752, sin6_addr = {__in6_u = {__u6_addr8 = "\330\257,]\360\177\000\000\340\256\366}\375\177\000", __u6_addr16 = {45016, 23852, 32752, 0, 44768, 32246, 32765, 0},
__u6_addr32 = {1563209688, 32752, 2113318624, 32765}}}, sin6_scope_id = 2}}, id = 0, proto = 0 '\000', send_flags = {f = 0 '\000', blst_imask = 0 '\000'}}
tmp = 0x0
new_uri = 0x7ff05d30ca28 "\243\221d"
end = 0x17df6aee0 <error: Cannot access memory at address 0x17df6aee0>
crt = 0x2030203d00000005 <error: Cannot access memory at address 0x2030203d00000005>
cmd = 0x7ff000000000
len = 1717527920
user = 537536878
uri = {user = {s = 0x1724f6716c27b034 <error: Cannot access memory at address 0x1724f6716c27b034>, len = 1981263924}, passwd = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 1562718224}, host = {
s = 0x7ffd7df69d70 "\200\345,]\360\177", len = 1562718224}, port = {s = 0x7ffd7df69c50 "\200\234\366}\375\177", len = 1533206860}, params = {s = 0x7ffd7df69d70 "\200\345,]\360\177", len = 0}, sip_params = {
s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 16004968}, headers = {s = 0x5dfb0 <error: Cannot access memory at address 0x5dfb0>, len = 772248}, port_no = 56952, proto = 11, type = ERROR_URI_T,
flags = (unknown: 8), transport = {s = 0x41 <error: Cannot access memory at address 0x41>, len = -24651520}, ttl = {s = 0x7ffd7df69c80 "@\235\366}\375\177", len = -24651520}, user_param = {
s = 0x7ffd7df69d50 "\300\235\366}\375\177", len = 4381807}, maddr = {s = 0x7ff05d2ee268 "\020", len = 0}, method = {s = 0x7ffd7df69d40 "pz,]\360\177", len = 0}, lr = {s = 0x7ff05d2cb6f8 "\004", len = 2113314516}, r2 = {
s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, gr = {s = 0x7ffd7df69d20 "\230\345,]\360\177", len = 0}, transport_val = {s = 0x7ff05d2ee1b0 "172.20.40.5", len = 2113314288}, ttl_val = {s = 0x0, len = 1563478568},
user_param_val = {s = 0x8968 <error: Cannot access memory at address 0x8968>, len = 2113314352}, maddr_val = {s = 0x7ff05d2ccf70 "\001", len = 1563478568}, method_val = {s = 0x7ffd7df69d50 "\300\235\366}\375\177",
len = 1520823051}, lr_val = {s = 0x0, len = 2113314352}, r2_val = {s = 0x7ff05d2ce598 "\001", len = 1563478568}, gr_val = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 0}}
next_hop = {user = {s = 0x7ff05d2c7a70 "\b{,]\360\177", len = -24651520}, passwd = {s = 0x7ffd7df69dc0 "P\236\366}\375\177", len = 5981733}, host = {s = 0x0, len = 2113314352}, port = {s = 0x7ff05d2ce580 "\017", len = 1563478568},
params = {s = 0x7ff05d2cb6f0 "\001", len = 0}, sip_params = {s = 0x7ff05d30ca28 "\243\221d", len = 1563355696}, headers = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 5989420},
port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 2113314352), transport = {s = 0x7ffd7df69e50 "\200\236\366}\375\177", len = 4399688}, ttl = {s = 0x7ffd00000025 <error: Cannot access memory at address 0x7ffd00000025>,
len = 0}, user_param = {s = 0x7ff05d2ce578 "\a", len = 2113314824}, maddr = {s = 0x7ff05d30ca28 "\243\221d", len = 2113318624}, method = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -24651520},
lr = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1397494312}, r2 = {s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 2113320912}, gr = {s = 0x0, len = 0}, transport_val = {
s = 0x0, len = -24651520}, ttl_val = {s = 0x7ffd7df69e80 "\260\237\366}\375\177", len = 4399820}, user_param_val = {s = 0x7ff05d2ce570 "\001", len = 2113314824}, maddr_val = {s = 0x7ff05d30ca28 "\243\221d", len = 2113318624},
method_val = {s = 0x7ffd7df69fb0 "\200\245\366}\375\177", len = 4405224}, lr_val = {s = 0x6d80 <error: Cannot access memory at address 0x6d80>, len = 2113314608}, r2_val = {s = 0x7ff05d2c9398 "\017", len = 28}, gr_val = {
s = 0x7ff05d2cf3d0 "!", len = 2113314824}}
u = 0x207000
port = 25972
dst_host = 0x7ffd7df69b80
i = 4
flags = 1768955948
avp = 0x209000
st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 2113313888}, re = 0x0}, avp = 0x46a1b1 <run_actions_safe+169>}
sct = 0x2020202000000030
sjt = 0x0
rve = 0x7ff05d2cafd8
mct = 0x5b
rv = 0x78e8
rv1 = 0x7ff05d30ca28
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 1, s = {s = 0x7ff000000001 <error: Cannot access memory at address 0x7ff000000001>, len = 1563355696}, re = 0x7ff000000001}, pval = {rs = {
s = 0x7ff000000001 <error: Cannot access memory at address 0x7ff000000001>, len = 1563355696}, ri = 1877454900, flags = 388298353}}, i2s = "\260zA\000\000\000\000\000\320\267\366}\375\177\000\000\000\000\000\000\000"}
s = {s = 0x0, len = 1563355696}
srevp = {0x417ab0 <_start>, 0x7ffd7df6b7d0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#17 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2cdb18, msg=0x7ff05d30ca28) at core/action.c:1552
t = 0x7ff05d2cdb18
ret = -1
mod = 0xb954d573fe87d900
ms = 0
__FUNCTION__ = "run_actions"
#18 0x000000000045cc6c in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2cdc68, msg=0x7ff05d30ca28) at core/action.c:1045
ret = 1
v = 1
dst = {send_sock = 0x7ff051355f71, to = {s = {sa_family = 45108, sa_data = "\347\033q\366$\027\064\260EL\331\260>\027"}, sin = {sin_family = 45108, sin_port = 7143, sin_addr = {s_addr = 388298353},
sin_zero = "4\260EL\331\260>\027"}, sin6 = {sin6_family = 45108, sin6_port = 7143, sin6_flowinfo = 388298353, sin6_addr = {__in6_u = {__u6_addr8 = "4\260EL\331\260>\027\000\000\000\000\000\000\000", __u6_addr16 = {45108,
19525, 45273, 5950, 0, 0, 0, 0}, __u6_addr32 = {1279635508, 389984473, 0, 0}}}, sin6_scope_id = 0}}, id = 0, proto = 104 'h', send_flags = {f = 170 '\252', blst_imask = 231 '\347'}}
tmp = 0x0
new_uri = 0x7ffd7df6a380 "\360\314\343\001"
end = 0x0
crt = 0x1d08580 ""
cmd = 0x7ff05d2b3568
len = 7
user = 0
uri = {user = {s = 0x7ffd7df6a400 "", len = 1580671501}, passwd = {s = 0x0, len = 0}, host = {s = 0x7ffd7df6a100 "0\242\366}\375\177", len = 2113585744}, port = {
s = 0x2000000000 <error: Cannot access memory at address 0x2000000000>, len = 0}, params = {s = 0x0, len = 30427152}, sip_params = {s = 0x7ffd7df6a250 "", len = 1362444288}, headers = {s = 0x7ff051359358 "HF!", len = 31958800},
port_no = 7, proto = 0, type = ERROR_URI_T, flags = (URI_SIP_USER_PHONE | unknown: 1587695352), transport = {s = 0x1e7a710 "", len = 1587696341}, ttl = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1587686988},
user_param = {s = 0x0, len = -2009157508}, maddr = {s = 0x1e35b60 "", len = 2113317104}, method = {s = 0x7ff05e3b91c4 "[%d]", len = 1580962247}, lr = {s = 0x0, len = 1579802473}, r2 = {s = 0x7ff05e257d28 "", len = 1579538456},
gr = {s = 0x7ffd7df6a480 "\200v\354\001", len = 35715777}, transport_val = {s = 0x7ffd7df6a450 " \221;^\360\177", len = 31959656}, ttl_val = {s = 0x0, len = 1589831120}, user_param_val = {
s = 0x7ff05e29f99a <vfprintf+22490> "\200\275(\373\377\377", len = 4253399}, maddr_val = {s = 0x7ff05e264d78 "", len = 4210936}, method_val = {s = 0x1e3ccf0 "", len = 2113317248}, lr_val = {s = 0x7ff05e3b91c4 "[%d]",
len = 1580962247}, r2_val = {s = 0x0, len = 1579802473}, gr_val = {s = 0x1d859 <error: Cannot access memory at address 0x1d859>, len = 10}}
next_hop = {user = {s = 0x7ffd7df6a510 "", len = 1579983518}, passwd = {s = 0x1e35b60 "", len = 2113317328}, host = {s = 0x7c7a7f "%s: %s%s(): bad cseq\n", len = 8157831}, port = {
s = 0x7ff05e29f99a <vfprintf+22490> "\200\275(\373\377\377", len = 1579802473}, params = {s = 0x0, len = 0}, sip_params = {s = 0x7ffd7df6a560 "\260zA", len = 1579809178}, headers = {s = 0x0, len = 1579809178}, port_no = 0,
proto = 0, type = 32765, flags = (URI_SIP_USER_PHONE | unknown: 4294967288), transport = {s = 0x1d859 <error: Cannot access memory at address 0x1d859>, len = 10}, ttl = {s = 0x7ff05e3b9120 " != ((void *)0)", len = 1579983518},
user_param = {s = 0x1e3ccf0 "", len = 2113317472}, maddr = {s = 0x7d4720 "%s: %s%s(): bad cseq\n", len = 8210216}, method = {s = 0x1ec7680 " \206\330\001", len = 2113317504}, lr = {s = 0x7ff05e3b91c4 "[%d]", len = 1580962247},
r2 = {s = 0x0, len = 1579802473}, gr = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 1579809178}, transport_val = {s = 0x7ffd7df6a610 "\260zA", len = 1580962245}, ttl_val = {
s = 0x7ffd7df6a5c0 "p\241,]\360\177", len = 8}, user_param_val = {s = 0x7ff05e3b91c8 "", len = 0}, maddr_val = {s = 0x7ff05e29f99a <vfprintf+22490> "\200\275(\373\377\377", len = 10}, method_val = {
s = 0xa726f7200000005 <error: Cannot access memory at address 0xa726f7200000005>, len = 1579809178}, lr_val = {s = 0x7ffd00000000 <error: Cannot access memory at address 0x7ffd00000000>, len = 0}, r2_val = {
s = 0xb00000000 <error: Cannot access memory at address 0xb00000000>, len = 0}, gr_val = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 1513578687}}
u = 0x7ff051355cb0
port = 4391
dst_host = 0x1000000bd
i = 144
flags = 0
avp = 0x7ff057c5cb90
st = {flags = 1, id = 32765, name = {n = 0, s = {s = 0x0, len = 1}, re = 0x0}, avp = 0x1e7a710}
sct = 0x1e7aa68
sjt = 0x7ffd7df6a380
rve = 0x7ff05d2cf3d0
mct = 0x1e7a710
rv = 0x0
rv1 = 0x7ff051355670
c1 = {cache_type = 31961328, val_type = RV_NONE, c = {avp_val = {n = 2113315360, s = {s = 0x7ffd7df6a220 "\377\377\377\377", len = 1}, re = 0x7ffd7df6a220}, pval = {rs = {s = 0x7ffd7df6a220 "\377\377\377\377", len = 1},
ri = 1362451632, flags = 32752}}, i2s = "\377\377\377\377\000\000\000\000\020\247\347\001\000\000\000\000\210\307\305W\360\177"}
s = {s = 0x1 <error: Cannot access memory at address 0x1>, len = 1587689837}
srevp = {0x0, 0x0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#19 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2ca170, msg=0x7ff05d30ca28) at core/action.c:1552
t = 0x7ff05d2cdc68
ret = 1
mod = 0x0
ms = 0
__FUNCTION__ = "run_actions"
#20 0x000000000045958d in do_action (h=0x7ffd7df6aee0, a=0x7ff05d2c4920, msg=0x7ff05d30ca28) at core/action.c:678
ret = -5
v = 20
dst = {send_sock = 0x1000000, to = {s = {sa_family = 15624, sa_data = "\364\000\000\000\000\000\020\332\005\000\000\000\000"}, sin = {sin_family = 15624, sin_port = 244, sin_addr = {s_addr = 0},
sin_zero = "\020\332\005\000\000\000\000"}, sin6 = {sin6_family = 15624, sin6_port = 244, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\020\332\005\000\000\000\000\000\370\302\v\000\000\000\000", __u6_addr16 = {
55824, 5, 0, 0, 49912, 11, 0, 0}, __u6_addr32 = {383504, 0, 770808, 0}}}, sin6_scope_id = 777848}}, id = 0, proto = 105 'i', send_flags = {f = 73 'I', blst_imask = 102 'f'}}
tmp = 0x1ff4 <error: Cannot access memory at address 0x1ff4>
new_uri = 0x1d0f0b0 "CET"
end = 0x7ffd7df6a830 "\220\250\366}\375\177"
crt = 0x6 <error: Cannot access memory at address 0x6>
cmd = 0x7ff05d2b3568
len = 0
user = 0
uri = {user = {s = 0x7ffd7df6a900 "", len = 1562718224}, passwd = {s = 0x40005d8b0 <error: Cannot access memory at address 0x40005d8b0>, len = 1562718224}, host = {s = 0x7ffd7df6a940 "p\251\366}\375\177", len = 1533206860}, port = {
s = 0x7ffd7df6a9e0 "\300\250.]\360\177", len = 0}, params = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 16005136}, sip_params = {s = 0x5df08 <error: Cannot access memory at address 0x5df08>,
len = 772080}, headers = {s = 0xbde78 <error: Cannot access memory at address 0xbde78>, len = 8}, port_no = 67, proto = 0, type = ERROR_URI_T, flags = (unknown: 4270315776), transport = {s = 0x7ffd7df6a970 " \252\366}\375\177",
len = 4842663}, ttl = {s = 0x0, len = 8092224}, user_param = {s = 0x7ffd7df6aa20 "0\253\366}\375\177", len = 0}, maddr = {s = 0x7ffd7df6aa20 "0\253\366}\375\177", len = 6671236}, method = {
s = 0x40005dc00 <error: Cannot access memory at address 0x40005dc00>, len = 8189744}, lr = {s = 0x7cd200 "core", len = -24651520}, r2 = {s = 0x7cf090 <__FUNCTION__.6198> "parse_to_param", len = 8181208}, gr = {
s = 0x30 <error: Cannot access memory at address 0x30>, len = 1562718224}, transport_val = {s = 0x600000000 <error: Cannot access memory at address 0x600000000>, len = 1}, ttl_val = {s = 0x7ffd7df6aa90 " \254\366}\375\177",
len = 1562718224}, user_param_val = {s = 0x7ff05d2ea8c0 "0", len = -24651520}, maddr_val = {s = 0x7ffd7df6aadb "]\360\177", len = 1563355696}, method_val = {s = 0x400417ab0 <error: Cannot access memory at address 0x400417ab0>,
len = 8180224}, lr_val = {s = 0x0, len = -24651520}, r2_val = {s = 0x7ffd7df6ab30 "@", len = 6919225}, gr_val = {s = 0x800000000 <error: Cannot access memory at address 0x800000000>, len = 1}}
next_hop = {user = {s = 0x0, len = 2113317744}, passwd = {s = 0x5d30f1e8 <error: Cannot access memory at address 0x5d30f1e8>, len = 1563487888}, host = {s = 0xa39866 <buf+1254> "", len = 10720755}, port = {
s = 0x400417ab0 <error: Cannot access memory at address 0x400417ab0>, len = 351336240}, params = {s = 0x1d <error: Cannot access memory at address 0x1d>, len = 10720488}, sip_params = {s = 0x7ffd7df6ac20 "0\255\366}\375\177",
len = 7028980}, headers = {s = 0x0, len = 8092224}, port_no = 43888, proto = 32246, type = 32765, flags = (URI_USER_NORMALIZE | unknown: 6703464), transport = {s = 0x7ffd7df6ab00 "", len = 1562718224}, ttl = {
s = 0xa3964a <buf+714> "low: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, SUBSCRIBE, NOTIFY, INFO, PUBLISH, MESSAGE\r\nSupported: replaces\r\nContact: <sip:4923256980@217.10.77.115:5060>\r\nContent-Type: application/sdp\r\nContent-Leng"..., len = 1562718224}, user_param = {s = 0x7ffd7df6ab40 "\210\025.]\360\177", len = 1533206860}, maddr = {s = 0x0, len = 0}, method = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 16004952}, lr = {
s = 0x5dfc0 <error: Cannot access memory at address 0x5dfc0>, len = 772264}, r2 = {s = 0xbde78 <error: Cannot access memory at address 0xbde78>, len = 8}, gr = {s = 0x40 <error: Cannot access memory at address 0x40>,
len = 7124329}, transport_val = {s = 0x7ff05d2e1588 "\001", len = 1563301240}, ttl_val = {s = 0x0, len = 8092224}, user_param_val = {s = 0x7ffd7df6ac20 "0\255\366}\375\177", len = 1563355696}, maddr_val = {
s = 0x417ab0 <_start> "1\355I\211\321^H\211\342H\203\344\360PTI\307\300\220\204s", len = 2113320912}, method_val = {s = 0xa39866 <buf+1254> "", len = 10720838}, lr_val = {s = 0x7ffd7df6ac20 "0\255\366}\375\177", len = 6839005},
r2_val = {s = 0x7d6faa <__FUNCTION__.6418> "get_hdr_field", len = 1563301216}, gr_val = {s = 0xa39866 <buf+1254> "", len = 10720826}}
u = 0x157842ad1
port = 65535
dst_host = 0x7ffd7df6a9cf
i = 2
flags = 0
avp = 0x7ffd7df6aa40
st = {flags = 2113317008, id = 32765, name = {n = 1533206860, s = {s = 0x7ff05b62e14c <pkg_proc_update_stats+130> "H\213\r\225M ", len = 6}, re = 0x7ff05b62e14c <pkg_proc_update_stats+130>}, avp = 0x0}
sct = 0x7ff000000001
sjt = 0x7ffd7df6aee2
rve = 0x7ff05e5f7300
mct = 0x664969 <qm_info+46>
rv = 0x7ffd00000000
rv1 = 0x7ffd7df6a810
c1 = {cache_type = 2113317056, val_type = 32765, c = {avp_val = {n = 1562718224, s = {s = 0x7ff05d253010 "\001", len = 2113317056}, re = 0x7ff05d253010}, pval = {rs = {s = 0x7ff05d253010 "\001", len = 2113317056}, ri = 1562718224,
flags = 32752}}, i2s = "\000\251\366}\375\177\000\000L\341b[\360\177\000\000p\251\366}\375\177"}
s = {s = 0x7ffd7df6a850 "", len = 1562718224}
srevp = {0x39327df6ae90, 0x7ff05d253010}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}}
__FUNCTION__ = "do_action"
#21 0x0000000000469afa in run_actions (h=0x7ffd7df6aee0, a=0x7ff05d2c39c0, msg=0x7ff05d30ca28) at core/action.c:1552
t = 0x7ff05d2c4920
ret = 1
mod = 0xb954d57300000000
ms = 0
__FUNCTION__ = "run_actions"
#22 0x000000000046a2bd in run_top_route (a=0x7ff05d2c39c0, msg=0x7ff05d30ca28, c=0x7ffd7df6aee0) at core/action.c:1641
ctx = {rec_lev = 1563492736, run_flags = 32752, last_retcode = -24651520, jmp_env = {{__jmpbuf = {4291248, 140670332234288, 4291248, 140726716774352, 0, 0, 140726716727328, 4302026204}, __mask_was_saved = 2113318256, __saved_mask = {
__val = {140670302069697, 4294967416, 32, 32, 140670331596816, 140726716771744, 140670302070636, 0, 0, 4611686037170749880, 140670332357160, 140726716771792, 5298061, 12889193136, 140670332357160, 4611686035607257088}}}}}
p = 0x7ffd7df6aee0
ret = 32752
sfbk = 0
#23 0x0000000000580a69 in receive_msg (
buf=0xa393f7 <buf+119> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 172.20.40.5;branch=z9hG4bKe877.99be6a0f42b6af42ea04ccf5096212f6.0;received=172.20.40.5\r\nVia: SIP/2.0/UDP 217.10.68.147;branch=z9hG4bKe877.e34c617b86d11387c957efc71c542"...,
len=1135, rcv_info=0x7ffd7df6b0f0) at core/receive.c:327
msg = 0x7ff05d30ca28
ctx = {rec_lev = 5, run_flags = 0, last_retcode = 1, jmp_env = {{__jmpbuf = {140670332234288, 1667728727226167348, 4291248, 140726716774352, 0, 0, 1667728727247138868, -1666880443433635788}, __mask_was_saved = 0, __saved_mask = {
__val = {140670332234288, 4291248, 140726716774352, 140726716772288, 140670275555975, 140670275624576, 169010473594, 140726716772376, 96052620480, 11417664, 0, 152437174176, 140668768878608, 4291248, 140670332234288,
4291248}}}}}
bctx = 0x664969 <qm_info+46>
ret = 1
stats_on = 0
tvb = {tv_sec = 140726716772048, tv_usec = 140670331596816}
tve = {tv_sec = 140726716772096, tv_usec = 140670331596816}
tz = {tz_minuteswest = 9, tz_dsttime = 0}
diff = 0
inb = {
s = 0xa393f7 <buf+119> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 172.20.40.5;branch=z9hG4bKe877.99be6a0f42b6af42ea04ccf5096212f6.0;received=172.20.40.5\r\nVia: SIP/2.0/UDP 217.10.68.147;branch=z9hG4bKe877.e34c617b86d11387c957efc71c542"..., len = 1135}
netinfo = {data = {s = 0x1000000 <error: Cannot access memory at address 0x1000000>, len = 0}, dst = 0x1000000, rcv = 0xf44700}
keng = 0x0
__FUNCTION__ = "receive_msg"
#24 0x00007ff059ce4cdf in parsing_hepv3_message (buf=0xa39380 <buf> "HEP3\004\346", len=1254) at hep.c:499
from = {s = {sa_family = 2, sa_data = "\023\304\331\nMs\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 1934428889}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2,
sin6_port = 50195, sin6_flowinfo = 1934428889, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}
to = {s = {sa_family = 2, sa_data = "\023\304\254\024(\005\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 86512812}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2,
sin6_port = 50195, sin6_flowinfo = 86512812, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}
ri = {src_ip = {af = 2, len = 4, u = {addrl = {140670703307481, 0}, addr32 = {1934428889, 32752, 0, 0}, addr16 = {2777, 29517, 32752, 0, 0, 0, 0, 0}, addr = "\331\nMs\360\177\000\000\000\000\000\000\000\000\000"}}, dst_ip = {af = 2,
len = 4, u = {addrl = {140724689966252, 140726716772656}, addr32 = {86512812, 32765, 2113319216, 32765}, addr16 = {5292, 1320, 32765, 0, 45360, 32246, 32765, 0}, addr = "\254\024(\005\375\177\000\000\060\261\366}\375\177\000"}},
src_port = 5060, dst_port = 5060, proto_reserved1 = 0, proto_reserved2 = 4254168, src_su = {s = {sa_family = 2, sa_data = "\023\304\331\nMs\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 50195, sin_addr = {
s_addr = 1934428889}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 50195, sin6_flowinfo = 1934428889, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0,
0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7ff05d2eaca8, proto = 1 '\001'}
tmp = 0xa393f1 <buf+113> ""
dst_ip = {af = 2, len = 4, u = {addrl = {140668855391404, 140726716772816}, addr32 = {86512812, 32752, 2113319376, 32765}, addr16 = {5292, 1320, 32752, 0, 45520, 32246, 32765, 0},
addr = "\254\024(\005\360\177\000\000\320\261\366}\375\177\000"}}
src_ip = {af = 2, len = 4, u = {addrl = {140670703307481, 1}, addr32 = {1934428889, 32752, 1, 0}, addr16 = {2777, 29517, 32752, 0, 1, 0, 0, 0}, addr = "\331\nMs\360\177\000\000\001\000\000\000\000\000\000"}}
si = 0x7ff05d2eaca8
tmp_len = 4
i = 1254
payload = 0xa393f7 <buf+119> "SIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 172.20.40.5;branch=z9hG4bKe877.99be6a0f42b6af42ea04ccf5096212f6.0;received=172.20.40.5\r\nVia: SIP/2.0/UDP 217.10.68.147;branch=z9hG4bKe877.e34c617b86d11387c957efc71c542"...
payload_len = 1135
chunk = 0xa393f1 <buf+113>
hg = 0x7ff05d2eabb8
totelem = 11
chunk_vendor = 0
chunk_type = 15
chunk_length = 1141
total_length = 1254
__FUNCTION__ = "parsing_hepv3_message"
#25 0x00007ff059ce3264 in hepv3_received (buf=0xa39380 <buf> "HEP3\004\346", len=1254, ri=0x7ffd7df6b330) at hep.c:231
__FUNCTION__ = "hepv3_received"
#26 0x00007ff059ce19cb in hep_msg_received (data=0x7ffd7df6b310) at hep.c:85
srevp = 0x7ffd7df6b310
buf = 0xa39380 <buf> "HEP3\004\346"
len = 0x7ffd7df6b2e4
ri = 0x7ffd7df6b330
__FUNCTION__ = "hep_msg_received"
heph = 0xa39380 <buf>
#27 0x000000000049e4e1 in sr_event_exec (type=7, data=0x7ffd7df6b310) at core/events.c:263
ret = 0
i = 7
#28 0x000000000048731a in udp_rcv_loop () at core/udp_server.c:466
sredp = {0xa39380 <buf>, 0x7ffd7df6b2e4, 0x7ffd7df6b330}
len = 1254
buf = "HEP3\004\346\000\000\000\001\000\a\002\000\000\000\002\000\a\021\000\000\000\a\000\b\023\304\000\000\000\b\000\b\023\304\000\000\000\t\000\n\034d\036Z\000\000\000\n\000\n]\025\r\000\000\000\000\v\000\a\001\000\000\000\f\000\n\000\000\000\000\000\000\000\003\000\n\331\nMs\000\000\000\004\000\n\254\024(\005\000\000\000\016\000\024rodauMyHep2001\000\000\000\017\004uSIP/2.0 200 OK\r\nVia: SIP/2.0/UDP 172.20.40.5;branch=z9hG4bKe877.99be6a0f42b6af42e"...
tmp = 0x52fe33 <init_child+52> "\311\303UH\211\345AWAVAUATSH\203\354\070H\211}\270H\203}\270"
from = 0x7ff05d2edfd8
fromlen = 16
ri = {src_ip = {af = 2, len = 4, u = {addrl = {16777343, 140670331935744}, addr32 = {16777343, 0, 1563057152, 32752}, addr16 = {127, 256, 0, 0, 23552, 23850, 32752, 0},
addr = "\177\000\000\001\000\000\000\000\000\\*]\360\177\000"}}, dst_ip = {af = 2, len = 4, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 36988,
dst_port = 9060, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 2, sa_data = "\220|\177\000\000\001\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 31888, sin_addr = {s_addr = 16777343},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 31888, sin6_flowinfo = 16777343, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}}, bind_address = 0x7ff05d2a5a80, proto = 1 '\001'}
__FUNCTION__ = "udp_rcv_loop"
#29 0x0000000000422d08 in main_loop () at main.c:1623
i = 23
pid = 0
si = 0x7ff05d2a5a80
si_desc = "udp receiver child=23 sock=0.0.0.0:9060\000\000\331\207\376q\000\000\000\261\200u\000\000\000\000\000\000\331\207\376s\325T\271\004\000\000\000\000\000\000\000\246\252\256\066\000\000\000\000\260zA\000\000\000\000\000\320\267\366}\375\177", '\000' <repeats 19 times>, "\265\366}\375\177\000\000!3_\000\000\000\000"
nrprocs = 96
woneinit = 1
__FUNCTION__ = "main_loop"
#30 0x000000000042a408 in main (argc=13, argv=0x7ffd7df6b7d8) at main.c:2643
cfg_stream = 0x1c95010
c = -1
r = 0
tmp = 0x7ffd7df6befe ""
tmp_len = 1579565480
port = 32752
proto = 2113320592
options = 0x73b8f8 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 1271703746
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x0
p = 0x1 <error: Cannot access memory at address 0x1>
st = {st_dev = 15, st_ino = 259871, st_nlink = 2, st_mode = 16877, st_uid = 117, st_gid = 122, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1506502981, tv_nsec = 691416812}, st_mtim = {
tv_sec = 1511857903, tv_nsec = 184120552}, st_ctim = {tv_sec = 1511857903, tv_nsec = 184120552}, __glibc_reserved = {0, 0, 0}}
__FUNCTION__ = "main"
No symbol table info available.
1826 main.c: No such file or directory.
The log didn't say anything except this line:
ov 29 08:39:09 hostname /usr/sbin/kamailio[121099]: CRITICAL: <core> [core/pass_fd.c:277]: receive_fd(): EOF on 34
Nov 29 08:39:09 hostname /usr/sbin/kamailio[120885]: ALERT: <core> [main.c:743]: handle_sigs(): child process 120921 exited by a signal 11
Nov 29 08:39:09 hostname /usr/sbin/kamailio[120885]: ALERT: <core> [main.c:746]: handle_sigs(): core was generated
kamailio -v
version: kamailio 5.0.3 (x86_64/linux)
flags: STATS: Off, USE_TCP, USE_TLS, USE_SCTP, TLS_HOOKS, DISABLE_NAGLE, USE_MCAST, DNS_IP_HACK, SHM_MEM, SHM_MMAP, PKG_MALLOC, Q_MALLOC, F_MALLOC, TLSF_MALLOC, DBG_SR_MEMORY, USE_FUTEX, FAST_LOCK-ADAPTIVE_WAIT, USE_DNS_CACHE, USE_DNS_FAILOVER, USE_NAPTR, USE_DST_BLACKLIST, HAVE_RESOLV_RES
ADAPTIVE_WAIT_LOOPS=1024, MAX_RECV_BUFFER_SIZE 262144, MAX_LISTEN 16, MAX_URI_SIZE 1024, BUF_SIZE 65535, DEFAULT PKG_SIZE 8MB
poll method support: poll, epoll_lt, epoll_et, sigio_rt, select.
id: unknown
compiled with gcc 4.9.2
Kamailio is running on a Debian Jessie system.
Linux hostname 3.16.0-4-amd64 #1 SMP Debian 3.16.43-2+deb8u5 (2017-09-19) x86_64 GNU/Linux
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or mute the thread.