### Description
Latest K master crashes on Debian 11 when handling SUBSCRIBE message.
#### Reproduction
Happens every time in my test and I can thus provide more information if needed.
#### Debugging Data ``` GNU gdb (Debian 10.1-1.7) 10.1.90.20210103-git Copyright (C) 2021 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later http://gnu.org/licenses/gpl.html This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Type "show copying" and "show warranty" for details. This GDB was configured as "x86_64-linux-gnu". Type "show configuration" for configuration details. For bug reporting instructions, please see: https://www.gnu.org/software/gdb/bugs/. Find the GDB manual and other documentation resources online at: http://www.gnu.org/software/gdb/documentation/.
For help, type "help". Type "apropos word" to search for commands related to "word"... Reading symbols from /usr/bin/pres-serv... [New LWP 342614] [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Core was generated by `/usr/bin/pres-serv -f /etc/pres-serv/pres-serv.cfg -P /run/pres-serv/pres-serv.'. Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007f58c362cad0 in trim_leading (_s=0x7f58bceeb558) at ../../core/trim.h:59 [?2004h(gdb) bt full [?2004l #0 0x00007f58c362cad0 in trim_leading (_s=0x7f58bceeb558) at ../../core/trim.h:59 No locals. #1 0x00007f58c362cbc0 in trim (_s=0x7f58bceeb558) at ../../core/trim.h:90 No locals. #2 0x00007f58c363f51c in print_callid (w=0x7f58bceed731 "", dialog=0x7f58c378c350, t=0x7f58bceeb4f0) at t_msgbuilder.c:1531 No locals. #3 0x00007f58c3640d78 in build_uac_req (method=0x7ffc2c640ae0, headers=0x7ffc2c640af0, body=0x0, dialog=0x7f58c378c350, branch=0, t=0x7f58bceeb4f0, len=0x7ffc2c64023c, dst=0x7ffc2c640380) at t_msgbuilder.c:1649 buf = 0x7f58bceed5d0 "NOTIFY sip:test@test.tutpro.com;gr=urn:uuid:9b21c1a8-dc58-a3d6-83d5-7be67cbe70ce SIP/2.0\r\nVia: SIP/2.0/TCP 127.0.0.1:5080;branch=z9hG4bK64ba.0bec0511", '0' <repeats 24 times>, ".0\r\nTo: <sip:test@test.tutp"... w = 0x7f58bceed714 "\r\nCall-ID: ab92759f23a9d95b\r\n" p = 0x0 content_length = {s = 0x7f58c36f77c8 <content_length> "0", len = 1} cseq = {s = 0x7f58c36f77e0 <cseq> "2", len = 1} via = { s = 0x7f58c378c590 "Via: SIP/2.0/TCP 127.0.0.1:5080;branch=z9hG4bK64ba.0bec0511", '0' <repeats 24 times>, ".0\r\n", len = 87} maxfwd_len = 0 tbracket = 1 fbracket = 1 fromtag = {s = 0x0, len = 0} loc_tag = {s = 0x0, len = 0} __func__ = "build_uac_req" #4 0x00007f58c36b9e34 in t_uac_prepare (uac_r=0x7ffc2c640b40, dst_req=0x7ffc2c640498, dst_cell=0x7ffc2c6404a0) at uac.c:541 dst = {send_sock = 0x7f58c3795bb0, to = {s = {sa_family = 2, sa_data = "\023\316\177\000\000\001\000\000\000\000\000\000\000"}, sin = {sin_family = 2, sin_port = 52755, sin_addr = {s_addr = 16777343}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, sin6_port = 52755, sin6_flowinfo = 16777343, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = { ss_family = 2, __ss_padding = "\023\316\177\000\000\001", '\000' <repeats 111 times>, __ss_align = 0}}, id = 0, send_flags = {f = 4, blst_imask = 0}, proto = 2 '\002', proto_pad0 = 0 '\000', proto_pad1 = 0} new_cell = 0x7f58bceeb4f0 request = 0x7f58bceeb7c0 buf = 0x0 buf_len = 665 ret = -1 hi = 43846 is_ack = 0 lifetime = 512 nhtype = 256 snd_flags = {f = 4, blst_imask = 0} backup_xd = {uri_avps_from = 0x7f58bcee78a0, uri_avps_to = 0x7f58bcee78a8, user_avps_from = 0x7f58bcee78b0, user_avps_to = 0x7f58bcee78b8, domain_avps_from = 0x557db2f646c0 <def_list+32>, domain_avps_to = 0x557db2f646c8 <def_list+40>, xavps_list = 0x7f58bcee78d0, xavus_list = 0x7f58bcee78d8, xavis_list = 0x7f58bcee78e0} local_xd = {uri_avps_from = 0x0, uri_avps_to = 0x0, user_avps_from = 0x0, user_avps_to = 0x0, domain_avps_from = 0x0, domain_avps_to = 0x0, xavps_list = 0x0, xavus_list = 0x0, xavis_list = 0x0} refresh_shortcuts = 0 sip_msg_len = 0 lreq = {id = 0, pid = 0, tval = {tv_sec = 0, tv_usec = 0}, fwd_send_flags = {f = 0, blst_imask = 0}, rpl_send_flags = {f = 0, blst_imask = 0}, first_line = {type = 0, flags = 0, len = 0, u = {request = {method = { s = 0x0, len = 0}, uri = {s = 0x0, len = 0}, version = {s = 0x0, len = 0}, method_value = 0}, reply = { version = {s = 0x0, len = 0}, status = {s = 0x0, len = 0}, reason = {s = 0x0, len = 0}, statuscode = 0}}}, via1 = 0x0, via2 = 0x0, headers = 0x0, last_header = 0x0, parsed_flag = 0, h_via1 = 0x0, h_via2 = 0x0, callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0, contact = 0x0, maxforwards = 0x0, route = 0x0, record_route = 0x0, content_type = 0x0, content_length = 0x0, authorization = 0x0, expires = 0x0, proxy_auth = 0x0, supported = 0x0, require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0x0, accept = 0x0, accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x0, user_agent = 0x0, server = 0x0, content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0, session_expires = 0x0, min_se = 0x0, sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, path = 0x0, privacy = 0x0, min_expires = 0x0, body = 0x0, eoh = 0x0, unparsed = 0x0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, bind_address = 0x0, rflags = 0, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}, buf = 0x0, len = 0, new_uri = {s = 0x0, len = 0}, dst_uri = {s = 0x0, len = 0}, parsed_uri_ok = 0, parsed_uri = { user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = { s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = { s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = { s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, parsed_orig_ruri_ok = 0, parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = { s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = { s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x0, body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = '\000' <repeats 57 times>, add_to_branch_len = 0, hash_index = 0, msg_flags = 0, flags = 0, xflags = {0, 0}, set_global_address = {s = 0x0, len = 0}, set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len = 0}, otcpid = 0, ldv = {flow = { decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, bind_address = 0x0, rflags = 0, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}}, vdata = 0x0}} __func__ = "t_uac_prepare" #5 0x00007f58c36bd786 in t_uac_with_ids (uac_r=0x7ffc2c640b40, ret_index=0x0, ret_label=0x0) at uac.c:757 request = 0x7ffc2c6404e0 cell = 0x557db2c892af <split_frag+201> ret = 1026 is_ack = 0 branch_ret = 980445555 i = 0 added_branches = 1 #6 0x00007f58c36bd743 in t_uac (uac_r=0x7ffc2c640b40) at uac.c:739 No locals. #7 0x00007f58c36c00b9 in req_within (uac_r=0x7ffc2c640b40) at uac.c:986 ret = -1015496328 nbuf = "\200\365\352\262}U\000\000`\252x\303X\177", '\000' <repeats 26 times>, "\300\017d,\374\177\000\000\000\000\000\000\000\000\000\000\360\223\336\274X\177\000\000`\301x\303X\177\000\000\030", '\000' <repeats 19 times>, "\377\377\377\377", '\000' <repeats 12 times>, "\361\001\000\000\002\004\000\000\017\000\000\000\b\ad,\374\177\000\000\000\000\000\000\000\000\020\201\020\220s\303X\177\000\000\002\004\000\000\017\000\000\000\230\006d,\374\177\000\000vxȲ}U\000\000\200\305x\303X\177\000\000\020\220s\303X\177\000\000p\305x\303X\177\000\000\020\220s\303\002\004\000\000\240\060"... dbuf = '\000' <repeats 12 times>, "\002\000\000\000\000\000\000\000\b\000\000\000k\245\361\302X\177\000\000\n\000\000\000\000\000\000\000\000.k_\225C\036\237\300\td,\374\177\000\000\304\351\344\302X\177\000\000\231BѲ}U\000\000\370\006d,-\000\000" ouri = {s = 0x0, len = 0} nuri = {s = 0x0, len = 0} duri = {s = 0x0, len = 0} __func__ = "req_within" #8 0x00007f58c2e633c7 in send_notify_request (subs=0x7ffc2c640ef0, watcher_subs=0x0, n_body=0x0, force_null_body=0) at notify.c:1727 td = 0x7f58c378c350 met = {s = 0x7f58c2f1d934 "NOTIFY", len = 6} str_hdr = { s = 0x7f58c378c290 "Max-Forwards: 70\r\nEvent: message-summary\r\nContact: sip:127.0.0.1:5080;transport=tcp\r\nSubscription-State: active;expires=600\r\n", len = 127} notify_body = 0x0 result = 0 cb_param = 0x7f58bceeb1e0 final_body = 0x0 uac_r = {method = 0x7ffc2c640ae0, headers = 0x7ffc2c640af0, body = 0x0, ssock = 0x0, ssockname = 0x0, dialog = 0x7f58c378c350, cb_flags = 1024, cb = 0x7f58c2e66091 <p_tm_callback>, cbp = 0x7f58bceeb1e0, callid = 0x0} aux_body = 0x0 backup_subs = 0x0 __func__ = "send_notify_request" #9 0x00007f58c2e64c61 in notify (subs=0x7ffc2c640ef0, watcher_subs=0x0, n_body=0x0, force_null_body=0, aux_body_processing=0x0) at notify.c:1818 aux_body = 0x0 __func__ = "notify" #10 0x00007f58c2ef234c in update_subscription (msg=0x7f58c378a860, subs=0x7ffc2c640ef0, to_tag_gen=1, sent_reply=0x7ffc2c640e1c) at subscribe.c:685 hash_code = 233 reply_code = 200 __func__ = "update_subscription" #11 0x00007f58c2efa30b in handle_subscribe (msg=0x7f58c378a860, watcher_user=..., watcher_domain=...) at subscribe.c:1222 to_tag_gen = 1 subs = {pres_uri = {s = 0x7f58c378c160 "sip:test@test.tutpro.com", len = 24}, to_user = { s = 0x7f58bcded823 "test@test.tutpro.com>\r\nFrom: sip:test@test.tutpro.com;tag=a0d5083649726799\r\nCall-ID: ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent: message-summary\r\nExpir"..., len = 4}, to_domain = { s = 0x7f58bcded828 "test.tutpro.com>\r\nFrom: sip:test@test.tutpro.com;tag=a0d5083649726799\r\nCall-ID: ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 6"..., len = 15}, from_user = { s = 0x7f58bcded845 "test@test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID: ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept: application/simpl"..., len = 4}, from_domain = { s = 0x7f58bcded84a "test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID: ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept: application/simple-mes"..., len = 15}, watcher_user = { s = 0x7f58bcded845 "test@test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID: ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept: application/simpl"..., len = 4}, watcher_domain = { s = 0x7f58bcded84a "test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID: ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept: application/simple-mes"..., len = 15}, event = 0x7f58bcde93f0, event_id = {s = 0x0, len = 0}, to_tag = { s = 0x7f58c36f7840 <tm_tags> "48b5b8952e8d0bca6256941910840e90-96b46351", len = 41}, from_tag = { s = 0x7f58bcded85f "a0d5083649726799\r\nCall-ID: ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept: application/simple-message-summary\r\nContent"..., len = 16}, callid = { s = 0x7f58bcded87a "ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept: application/simple-message-summary\r\nContent-Length: 0\r\n\r\n", len = 16}, sockinfo_str = {s = 0x7f58c376f580 "tcp:127.0.0.1:5080", len = 18}, remote_cseq = 56572, local_cseq = 1, contact = { s = 0x7f58bcded7bc "sip:test@test.tutpro.com;gr=urn:uuid:9b21c1a8-dc58-a3d6-83d5-7be67cbe70ce>\r\nMax-Forwards: 69\r\nTo: sip:test@test.tutpro.com\r\nFrom: sip:test@test.tutpro.com;tag=a0d5083649726799\r\nCall-ID: ab92759f23"..., len = 73}, local_contact = {s = 0x7f58c37a8db0 "sip:127.0.0.1:5080;transport=tcp", len = 32}, record_route = { s = 0x7f58c378c0e0 "sip:127.0.0.1:5070;transport=tcp;r2=on;lr,sip:192.168.188.215;transport=tcp;r2=on;lr", len = 88}, expires = 600, status = 1, reason = {s = 0x0, len = 0}, version = 1, send_on_cback = 0, db_flag = 4, auth_rules_doc = 0x0, recv_event = 1, internal_update_flag = 0, updated = -1, updated_winfo = -1, flags = 0, user_agent = { s = 0x7f58bcded8af "baresip v3.0.0 (x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept: application/simple-message-summary\r\nContent-Length: 0\r\n\r\n", len = 29}, next = 0x0} event = 0x7f58bcde93f0 parsed_event = 0x7f58c378bea0 ev_param = 0x0 found = 0 reason = {s = 0x0, len = 0} uri = {user = {s = 0x3a70697300000000 <error: Cannot access memory at address 0x3a70697300000000>, len = -1295176907}, passwd = {s = 0x7ffc2c641120 "", len = 744755408}, host = { s = 0x7ffc2c6411e0 "\220\022d,\374\177", len = -1296286244}, port = {s = 0x7ffc2c641140 "", len = -1126246326}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = -1126246311}, port_no = 55526, proto = 48350, type = 32600, flags = (URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0x4), transport = {s = 0x0, len = 0}, ttl = {s = 0xe <error: Cannot access memory at address 0xe>, len = -1126246170}, user_param = {s = 0xffffffff00000007 <error: Cannot access memory at address 0xffffffff00000007>, len = -1015502752}, maddr = {s = 0x0, len = 1600859648}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 1600859648}, r2 = {s = 0x7 <error: Cannot access memory at address 0x7>, len = 0}, gr = {s = 0x0, len = -1294177597}, transport_val = {s = 0xa <error: Cannot access memory at address 0xa>, len = -1004249232}, ttl_val = {s = 0x7ffc2c641210 "\300\022d,\374\177", len = -1295182985}, user_param_val = { s = 0x7f58c37af8a0 ":\001", len = -1015502752}, maddr_val = {s = 0x0, len = -1015497648}, method_val = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, lr_val = {s = 0x0, len = 1600859648}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = -1294177597}} reply_code = 500 reply_str = {s = 0x7f58c2f2dd5f "Server Internal Error", len = 21} sent_reply = 1 __func__ = "handle_subscribe" #12 0x00007f58c2ef596a in handle_subscribe0 (msg=0x7f58c378a860) at subscribe.c:999 pfrom = 0x7f58c378bc50 __func__ = "handle_subscribe0" #13 0x0000557db29781e3 in do_action (h=0x7ffc2c641b40, a=0x7f58c37b2c50, msg=0x7f58c378a860) at core/action.c:1081 ret = -5 li = 0 v = 0 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = { ss_family = 0, __ss_padding = '\000' <repeats 117 times>, __ss_align = 0}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x0 new_uri = 0x0 end = 0x0 crt = 0x0 cmd = 0x7f58c379c6a0 len = 0 user = 0 uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 128}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val = {s = 0x0, len = 0}, lr_val = { s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 1600859648}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len = -1294177597}, ttl_val = { s = 0xa <error: Cannot access memory at address 0xa>, len = -1004249232}, user_param_val = { s = 0x7ffc2c641980 "\240\032d,\374\177", len = -1298632837}, maddr_val = {s = 0x0, len = 0}, method_val = { s = 0x0, len = 0}, lr_val = {s = 0x0, len = -1015502752}, r2_val = {s = 0x7f58c37af8a0 ":\001", len = 744757696}, gr_val = {s = 0x0, len = 0}} u = 0x0 port = 0 dst_host = 0x0 i = 0 flags = 0 avp = 0x0 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x0 sjt = 0x0 rve = 0x0 mct = 0x0 rv = 0x0 rv1 = 0x0 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} s = {s = 0x0, len = 0} srevp = {0x0, 0x0} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #14 0x0000557db2986f7b in run_actions (h=0x7ffc2c641b40, a=0x7f58c37b2c50, msg=0x7f58c378a860) at core/action.c:1587 t = 0x7f58c37b2c50 ret = -1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = -1749943006, tz_dsttime = -1995335592} tdiff = 1 __func__ = "run_actions" #15 0x0000557db29876e9 in run_actions_safe (h=0x7ffc2c6437e0, a=0x7f58c37b2c50, msg=0x7f58c378a860) at core/action.c:1651 ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf = {8589934592, -8569901109723661022, 0, 93998360062659, 10, 140019224567664, -8569901109662843614, -2588824727271113438}, __mask_was_saved = 0, __saved_mask = {__val = {0, 0, 11465676010161909248, 0, 8589934592, 0, 93998360062659, 10, 140019224567664, 140721053244768, 93998357479355, 0, 0, 0, 0, 140019213466032}}}}} ret = -1 ign_on_break = 0 #16 0x0000557db2b4a950 in rval_get_long (h=0x7ffc2c6437e0, msg=0x7f58c378a860, i=0x7ffc2c642058, rv=0x7f58c37b2f78, cache=0x0) at core/rvalue.c:955 r_avp = 0x0 avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0} pval = {rs = {s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = 744759384}, ri = 0, flags = 0} tmp = {s = 0x7f58c37a5a98 "'\265\254\300X\177", len = 1} s = 0x0 r = 0 ret = 0 destroy_pval = 0 __func__ = "rval_get_long" #17 0x0000557db2b4ffbb in rval_expr_eval_long (h=0x7ffc2c6437e0, msg=0x7f58c378a860, res=0x7ffc2c642058, rve=0x7f58c37b2f70) at core/rvalue.c:1855 i1 = 1 i2 = 0 ret = -1 c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' <repeats 21 times>} rv1 = 0x0 rv2 = 0x0 __func__ = "rval_expr_eval_long" #18 0x0000557db2977c13 in do_action (h=0x7ffc2c6437e0, a=0x7f58c37b3be0, msg=0x7f58c378a860) at core/action.c:1057 ret = -5 li = 0 v = 0 dst = {send_sock = 0x7f58c36c1260, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000\377\377\377\377\000\000\000"}, sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\377\377\377\377\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\377\377\377\377\000\000\000\000`\250x\303X\177\000", __u6_addr16 = {65535, 65535, 0, 0, 43104, 50040, 32600, 0}, __u6_addr32 = {4294967295, 0, 3279464544, 32600}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding = "\000\000\000\000\000\000\377\377\377\377\000\000\000\000`\250x\303X\177", '\000' <repeats 14 times>, "\060\000\000\000\000\000\000\000\374\177\000\000\220*d,\374\177\000\000\300Ez\303X\177", '\000' <repeats 18 times>, "\063\331\336\274X\177\000\000\000\000\000\000\000\000\000\000\220\262x\303X\177\000\000P\274x\303X\177\000\000\063\331\336\274X\177\000", __ss_align = 140721053247080}}, id = 24, send_flags = {f = 48, blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0} tmp = 0x0 new_uri = 0x0 end = 0x0 crt = 0x0 cmd = 0x0 len = 0 user = 0 uri = {user = {s = 0x0, len = 1600859648}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len = -1294177597}, port = { s = 0xa <error: Cannot access memory at address 0xa>, len = -1004249232}, params = { s = 0x7ffc2c642340 "`$d,\374\177", len = -1298632837}, sip_params = {s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown: 0xc378a860), transport = { s = 0x7f58c37aee00 "9\001", len = 744760192}, ttl = {s = 0x0, len = 0}, user_param = { s = 0x400000000 <error: Cannot access memory at address 0x400000000>, len = -1293767226}, maddr = {s = 0x0, len = 1600859648}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {s = 0x0, len = 1600859648}, gr = { s = 0x1 <error: Cannot access memory at address 0x1>, len = -1015497744}, transport_val = {s = 0x7f58bcded935 "", len = -1126246112}, ttl_val = {s = 0x1100000000 <error: Cannot access memory at address 0x1100000000>, len = 0}, user_param_val = {s = 0x0, len = 744760220}, maddr_val = {s = 0x7f58bcded935 "", len = -1126246096}, method_val = { s = 0x100000000 <error: Cannot access memory at address 0x100000000>, len = 0}, lr_val = {s = 0x0, len = -1126246093}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 1600859648}} next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = -1294177597}, host = { s = 0xa <error: Cannot access memory at address 0xa>, len = 1600859648}, port = { s = 0x7ffc2c642340 "`$d,\374\177", len = 0}, params = {s = 0x0, len = -1294177597}, sip_params = { s = 0xa <error: Cannot access memory at address 0xa>, len = -1004249232}, headers = { s = 0x7ffc2c642460 "\240%d,\374\177", len = -1298630935}, port_no = 1026, proto = 0, type = 15, flags = (unknown: 0xc378a860), transport = {s = 0x7f58c37aee00 "9\001", len = 744765408}, ttl = { s = 0x7f58c3739010 "\001", len = 0}, user_param = {s = 0x0, len = 1}, maddr = { s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = -500040414}, method = {s = 0x0, len = -1294177597}, lr = {s = 0xa <error: Cannot access memory at address 0xa>, len = -1004249232}, r2 = { s = 0x89119858e7d1fd22 <error: Cannot access memory at address 0x89119858e7d1fd22>, len = 1900150050}, gr = { s = 0x7ffc00000000 <error: Cannot access memory at address 0x7ffc00000000>, len = 0}, transport_val = {s = 0x0, len = -1126246091}, ttl_val = {s = 0x1 <error: Cannot access memory at address 0x1>, len = -1127264656}, user_param_val = {s = 0x0, len = -1015500416}, maddr_val = {s = 0x7f58bccf4e70 "pv\356\274X\177", len = -1017465335}, method_val = {s = 0x1c431c180 <error: Cannot access memory at address 0x1c431c180>, len = -1127264640}, lr_val = {s = 0x7ffc2c642460 "\240%d,\374\177", len = -1017465064}, r2_val = {s = 0x0, len = -1127264640}, gr_val = {s = 0x7ffc2c642470 "\240$d,\374\177", len = 1600859648}} u = 0x0 port = 0 dst_host = 0x0 i = 0 flags = 0 avp = 0x0 st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp = 0x0} sct = 0x0 sjt = 0x0 rve = 0x7f58c37b2f70 mct = 0x0 rv = 0x0 rv1 = 0x0 c1 = {cache_type = 744760480, val_type = 32764, c = {avp_val = {n = 140019101552256, s = {s = 0x7f58bccf4e80 "", len = 744760480}, re = 0x7f58bccf4e80}, pval = {rs = {s = 0x7f58bccf4e80 "", len = 744760480}, ri = 0, flags = -1015352952}}, i2s = "\230(d,\374\177\000\000`\250x\303X\177\000\000\340\067d,\374\177"} s = {s = 0x0, len = 0} srevp = {0x7ffc2c6425a0, 0x557db2b4a950 <rval_get_long+424>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #19 0x0000557db2986f7b in run_actions (h=0x7ffc2c6437e0, a=0x7f58c37b0f10, msg=0x7f58c378a860) at core/action.c:1587 t = 0x7f58c37b3be0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = 744762544, tz_dsttime = 32764} tdiff = 744765408 __func__ = "run_actions" #20 0x0000557db297814c in do_action (h=0x7ffc2c6437e0, a=0x7f58c37b40a0, msg=0x7f58c378a860) at core/action.c:1072 ret = 1 li = 16384 v = 1 dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = "\000\000\000\000\000\000p\264Q\303X\177\000"}, sin = { sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "p\264Q\303X\177\000"}, sin6 = { sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = { __u6_addr8 = "p\264Q\303X\177\000\000\200\254Q\303X\177\000", __u6_addr16 = {46192, 50001, 32600, 0, 44160, 50001, 32600, 0}, __u6_addr32 = {3276911728, 32600, 3276909696, 32600}}}, sin6_scope_id = 0}, sas = { ss_family = 0, __ss_padding = "\000\000\000\000\000\000p\264Q\303X\177\000\000\200\254Q\303X\177\000\000\000\000\000\000\000\000\000\000\360\370{\303X\177\000\000\200\000U\303X\177\000\000\360\363v\303X\177\000\000\000\000\000\000\000\000\000\000\025\000\000\000\000\000\000\000\001\000\000\000\001\000\000\000\000q\035\304X\177\000\000\240\rU\303X\177\000\000\240\rU\303X\177\000\000\360\370{\303X\177\000\000+\305Q\303X\177\000", __ss_align = 2}}, id = 0, send_flags = {f = 0, blst_imask = 0}, proto = -112 '\220', proto_pad0 = 49 '1', proto_pad1 = 11364} tmp = 0x7f58c351c38e "H\203\370\377t\334H\203\304\030[A\A]A^A_]\303\017\037D" new_uri = 0x7f58c3528966 <mysql_get_parameters+1606> "I\211\307H\215\005(\222\002" end = 0x557db4c94ae0 "" crt = 0x7ffc2c642910 "\340)d,\374\177" cmd = 0x7f58c37977d8 len = 909670447 user = 791950943 uri = {user = {s = 0x7ffc2c642aa0 "M\224\236\231q\202\257\bz\300Q\303X\177", len = 1600859648}, passwd = { s = 0x7ffc2c6429f8 "\365Jɴ}U", len = 0}, host = {s = 0x0, len = -1294177597}, port = { s = 0xa <error: Cannot access memory at address 0xa>, len = -1004249232}, params = { s = 0x7ffc2c642b80 "\240,d,\374\177", len = -1298632837}, sip_params = {s = 0x557db4c94af5 "", len = -1261876491}, headers = {s = 0x557db4c8da80 "P\337ȴ}U", len = -1261905344}, port_no = 55896, proto = 46280, type = 21885, flags = (unknown: 0xc378a860), transport = {s = 0x7f58c37aa720 "\031\001", len = 744762304}, ttl = {s = 0x7ffc2c642aa0 "M\224\236\231q\202\257\bz\300Q\303X\177", len = -1018018493}, user_param = {s = 0x7f58c37c0120 "\200\310ȴ}U", len = 744761960}, maddr = {s = 0x0, len = -1018054899}, method = { s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = { s = 0xefcdab8998badcfe <error: Cannot access memory at address 0xefcdab8998badcfe>, len = 1732584193}, gr = { s = 0x1d7439068d9a78b7 <error: Cannot access memory at address 0x1d7439068d9a78b7>, len = 1369412067}, transport_val = {s = 0x8af8271999e944d <error: Cannot access memory at address 0x8af8271999e944d>, len = -1018052486}, ttl_val = { s = 0x1ecd4f10aea434b8 <error: Cannot access memory at address 0x1ecd4f10aea434b8>, len = 6}, user_param_val = { s = 0x6 <error: Cannot access memory at address 0x6>, len = -1261860112}, maddr_val = { s = 0x4000 <error: Cannot access memory at address 0x4000>, len = 2000}, method_val = { s = 0x7ffc2c642b30 "\220+d,\374\177", len = -1018051698}, lr_val = {s = 0x7ffc2c642b50 " ,d,\374\177", len = -1261914352}, r2_val = {s = 0x8 <error: Cannot access memory at address 0x8>, len = 0}, gr_val = { s = 0x557db4c8b6a0 "\020\267ȴ}U", len = -1261860112}} next_hop = {user = {s = 0x4000 <error: Cannot access memory at address 0x4000>, len = -1}, passwd = { s = 0x7ffc2c642b90 "\001", len = -1018001050}, host = {s = 0x557db4c9cb00 "", len = 1600859648}, port = { s = 0x7ffc2c642c20 "\360\370{\303X\177", len = 0}, params = {s = 0x0, len = -1294177597}, sip_params = { s = 0xa <error: Cannot access memory at address 0xa>, len = -1004249232}, headers = { s = 0x7ffc2c642ca0 "\340-d,\374\177", len = -1298630935}, port_no = 1, proto = 0, type = ERROR_URI_T, flags = (unknown: 0xc378a860), transport = {s = 0x7f58c37aa720 "\031\001", len = 744765408}, ttl = { s = 0x7ffc2c642c00 ""\375Q\367X\230\021\211"\375Aq\240\245", <incomplete sequence \334>, len = 0}, user_param = {s = 0x0, len = -1}, maddr = {s = 0x200000000 <error: Cannot access memory at address 0x200000000>, len = -206439134}, method = {s = 0x0, len = -1294177597}, lr = { s = 0xa <error: Cannot access memory at address 0xa>, len = -1004249232}, r2 = { s = 0x89119858f751fd22 <error: Cannot access memory at address 0x89119858f751fd22>, len = 1900150050}, gr = { s = 0x7ffc00000000 <error: Cannot access memory at address 0x7ffc00000000>, len = 744762440}, transport_val = { s = 0x7f58c37bf8f0 "\240\266ȴ}U", len = -1261917472}, ttl_val = {s = 0x557db4c9cb15 "", len = -1261843691}, user_param_val = {s = 0x557db4c8da80 "P\337ȴ}U", len = -1261905760}, maddr_val = { s = 0x557db4c8d8b8 "\310\330ȴ}U", len = -1261905720}, method_val = { s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len = -1015285520}, lr_val = { s = 0x7ffc2c642ce0 "`\250x\303X\177", len = -1018018493}, r2_val = {s = 0x7f58c37bf8f0 "\240\266ȴ}U", len = 744762536}, gr_val = {s = 0x7ffc2c642ce0 "`\250x\303X\177", len = 1600859648}} u = 0x557db4c8be40 port = 24374 dst_host = 0x557db4c94bae i = 1819043191 flags = 1935763503 avp = 0x8 st = {flags = 21, id = 0, name = {n = 140015933849608, s = { s = 0x7f5800000008 <error: Cannot access memory at address 0x7f5800000008>, len = 744761792}, re = 0x7f5800000008}, avp = 0x7ffc2c642980} sct = 0xffffffffffffffff sjt = 0x7ffc2c642950 rve = 0x7f58c37af180 mct = 0x4000 rv = 0x7ffc2c6428f0 rv1 = 0x0 c1 = {cache_type = 34404919, val_type = 308471918, c = {avp_val = {n = 21, s = { s = 0x15 <error: Cannot access memory at address 0x15>, len = 744762624}, re = 0x15}, pval = {rs = { s = 0x15 <error: Cannot access memory at address 0x15>, len = 744762624}, ri = 0, flags = -1015371720}}, i2s = "\330\060d,\374\177\000\000`\250x\303X\177\000\000\340\067d,\374\177"} s = {s = 0x7ffc2c6429e0 "\200+d,\374\177", len = -1018040882} srevp = {0x7ffc2c642de0, 0x557db2b4a950 <rval_get_long+424>} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #21 0x0000557db2986f7b in run_actions (h=0x7ffc2c6437e0, a=0x7f58c37ab6f0, msg=0x7f58c378a860) at core/action.c:1587 t = 0x7f58c37b40a0 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = -1126259388, tz_dsttime = 32600} tdiff = 744765408 __func__ = "run_actions" #22 0x0000557db2974125 in do_action (h=0x7ffc2c6437e0, a=0x7f58c37ab390, msg=0x7f58c378a860) at core/action.c:705 ret = -5 li = 5 v = 0 dst = {send_sock = 0x4022c643620, to = {s = {sa_family = 11776, sa_data = "k_\225C\036\237\240\060t\303X\177\000"}, sin = {sin_family = 11776, sin_port = 24427, sin_addr = {s_addr = 2669560725}, sin_zero = "\240\060t\303X\177\000"}, sin6 = {sin6_family = 11776, sin6_port = 24427, sin6_flowinfo = 2669560725, sin6_addr = {__in6_u = { __u6_addr8 = "\240\060t\303X\177\000\000\000\000\000\000\002\000\000", __u6_addr16 = {12448, 50036, 32600, 0, 0, 0, 2, 0}, __u6_addr32 = {3279171744, 32600, 0, 2}}}, sin6_scope_id = 0}, sas = {ss_family = 11776, __ss_padding = "k_\225C\036\237\240\060t\303X\177\000\000\000\000\000\000\002", '\000' <repeats 11 times>, "\303jܲ}U\000\000\065\331\336\274X\177\000\000\241\330\336\274X\177\000\000P6d,\374\177\000\000$7̲}U\000\000P\272x\303X\177\000\000 \272x\303X\177\000\000\065\331\336\274X\177\000\000\222\330\336\274X\177\000\000\060\000\000\000\000\000\000\000\020\220s\303X\177\000", __ss_align = 140019102570418}}, id = -1126246239, send_flags = {f = 32600, blst_imask = 0}, proto = -104 '\230', proto_pad0 = -40 '\330', proto_pad1 = -17186} tmp = 0x0 new_uri = 0x9f1e43955f6b2e00 <error: Cannot access memory at address 0x9f1e43955f6b2e00> end = 0xffffffff <error: Cannot access memory at address 0xffffffff> crt = 0x1 <error: Cannot access memory at address 0x1> cmd = 0x7f58c44f8180 len = 1 user = 0 uri = {user = {s = 0xa <error: Cannot access memory at address 0xa>, len = -1005215176}, passwd = { s = 0x7ffc2c6435f0 "\n", len = -1001511286}, host = {s = 0x7ffc2c6437f0 "", len = -1015369248}, port = { s = 0x1 <error: Cannot access memory at address 0x1>, len = -1015369248}, params = {s = 0x7ffc2c6437f0 "", len = -1016554012}, sip_params = {s = 0x0, len = -1293737232}, headers = { s = 0xf00000402 <error: Cannot access memory at address 0xf00000402>, len = 1600859648}, port_no = 13200, proto = 11364, type = 32764, flags = (unknown: 0x1fa0), transport = {s = 0x7f58c3739010 "\001", len = 1600859648}, ttl = {s = 0x4020000002d <error: Cannot access memory at address 0x4020000002d>, len = -1015795552}, user_param = { s = 0x7f58c37430a0 "", len = 744764112}, maddr = {s = 0x7f58c378b180 "\001", len = -1015500048}, method = { s = 0x7ffc2c6433c3 "", len = 744764354}, lr = {s = 0x7f58bcded935 "", len = -1126246591}, r2 = { s = 0x7f58c378b330 "@", len = -1015499968}, gr = {s = 0x7ffc2c643390 "", len = -1295477544}, transport_val = { s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 65535}, maddr_val = { s = 0x657079542d746e <error: Cannot access memory at address 0x657079542d746e>, len = 1902465859}, method_val = { s = 0x4040404040404040 <error: Cannot access memory at address 0x4040404040404040>, len = 1077952576}, lr_val = { s = 0x5a5a5a5a5a5a5a5a <error: Cannot access memory at address 0x5a5a5a5a5a5a5a5a>, len = 1515870810}, r2_val = { s = 0x2020202020202020 <error: Cannot access memory at address 0x2020202020202020>, len = 538976288}, gr_val = { s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = -65536}} next_hop = {user = {s = 0x2020202020202020 <error: Cannot access memory at address 0x2020202020202020>, len = 2097152}, passwd = {s = 0xffffffffffffffff <error: Cannot access memory at address 0xffffffffffffffff>, len = -256}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = { s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x40 <error: Cannot access memory at address 0x40>, len = -1015836656}, ttl = { s = 0x9410000000000000 <error: Cannot access memory at address 0x9410000000000000>, len = 1026}, user_param = { s = 0x7f58c3739010 "\001", len = -1126246480}, maddr = {s = 0x557db2c87876 <qm_insert_free+59> "\005\363\003", len = -1015500160}, method = {s = 0x7f58c3739010 "\001", len = 1600859648}, lr = { s = 0x4022c643520 <error: Cannot access memory at address 0x4022c643520>, len = -1015795552}, r2 = { s = 0x2 <error: Cannot access memory at address 0x2>, len = 14}, gr = {s = 0x0, len = 0}, transport_val = { s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = { s = 0x7f58bcded76c ";received=192.168.188.215;branch=z9hG4bKa39a82e98b875f6b;rport=59490\r\nContact: sip:test@test.tutpro.com;gr=urn:uuid:9b21c1a8-dc58-a3d6-83d5-7be67cbe70ce\r\nMax-Forwards: 69\r\nTo: <sip:test@test.tutpro."..., len = -1126246548}, maddr_val = {s = 0x7ffc2c643650 "\260\067d,\374\177", len = -1294932839}, method_val = { s = 0xf0 <error: Cannot access memory at address 0xf0>, len = -1015499856}, lr_val = {s = 0x7f58bcded935 "", len = -1126246580}, r2_val = {s = 0x505b180 <error: Cannot access memory at address 0x505b180>, len = -1295161072}, gr_val = {s = 0x7f58c378ba48 "@", len = -1015498184}} u = 0x7f58c44f8180 port = 0 dst_host = 0xa i = 1 flags = -1472036457 avp = 0x7f58c376f390 st = {flags = 744765344, id = 32764, name = {n = 0, s = {s = 0x0, len = -1294177597}, re = 0x0}, avp = 0xa} sct = 0x0 sjt = 0x7f58c431fb80 <main_arena> rve = 0x7f58c37aa830 mct = 0x7f58c44f84e8 rv = 0x1 rv1 = 0x7f58c44acab0 c1 = {cache_type = RV_CACHE_EMPTY, val_type = 2351955968, c = {avp_val = {n = 140019212980240, s = { s = 0x7f58c3739010 "\001", len = 1026}, re = 0x7f58c3739010}, pval = {rs = {s = 0x7f58c3739010 "\001", len = 1026}, ri = 140721053250888, flags = -1295484810}}, i2s = "`\272x\303X\177\000\000\020\220s\303X\177\000\000\000.k_\225C"} s = {s = 0x7f58c415a238 "uP", len = -1001733104} srevp = {0x7f58c3778190, 0x7ffc2c6435b8} evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = { s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = { number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}} __func__ = "do_action" #23 0x0000557db2986f7b in run_actions (h=0x7ffc2c6437e0, a=0x7f58c37ab1e0, msg=0x7f58c378a860) at core/action.c:1587 t = 0x7f58c37ab390 ret = 1 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} tz = {tz_minuteswest = -1015502752, tz_dsttime = 32600} tdiff = 0 __func__ = "run_actions" #24 0x0000557db29877f5 in run_top_route (a=0x7f58c37ab1e0, msg=0x7f58c378a860, c=0x0) at core/action.c:1672 ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf = {8589934592, -8569901108763165406, 0, 93998360062659, 10, 140019224567664, -8569901108819788510, -2588824727271113438}, __mask_was_saved = 0, __saved_mask = {__val = {0, 140019102570805, 11465676010161909248, 140721053251968, 93998359047577, 140019167053808, 11465676010161909248, 140721053251904, 140721053252064, 3216930504704, 11465676010161909248, 8589934592, 8589934592, 0, 93998360062659, 10}}}}} p = 0x7ffc2c6437e0 ret = 0 sfbk = 0 #25 0x0000557db2afdb6a in receive_msg ( buf=0x7f58bcded648 "SUBSCRIBE sip:test@test.tutpro.com SIP/2.0\r\nRecord-Route: sip:127.0.0.1:5070;transport=tcp;r2=on;lr\r\nRecord-Route: sip:192.168.188.215;transport=tcp;r2=on;lr\r\nVia: SIP/2.0/TCP 127.0.0.1:5070;branc"..., len=749, rcv_info=0x7f58bcded2b8) at core/receive.c:515 msg = 0x7f58c378a860 ctx = {rec_lev = 0, run_flags = 0, last_retcode = 8, jmp_env = {{__jmpbuf = {749, 140019102569416, 0, 0, 0, 0, 0, 0}, __mask_was_saved = 744767584, __saved_mask = {__val = {0, 93998360062659, 11465676010161909248, 140019224567664, 140019102569120, 0, 93998360062659, 10, 140019224567664, 140721053252704, 93998358424823, 2, 9223372036854775822, 0, 0, 140721053253276}}}}} bctx = 0x0 ret = 0 tvb = {tv_sec = 0, tv_usec = 0} tve = {tv_sec = 0, tv_usec = 0} diff = 0 inb = { s = 0x7f58bcded648 "SUBSCRIBE sip:test@test.tutpro.com SIP/2.0\r\nRecord-Route: sip:127.0.0.1:5070;transport=tcp;r2=on;lr\r\nRecord-Route: sip:192.168.188.215;transport=tcp;r2=on;lr\r\nVia: SIP/2.0/TCP 127.0.0.1:5070;branc"..., len = 749} netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0} keng = 0x0 evp = {data = 0x7ffc2c6439d0, obuf = {s = 0x0, len = 0}, rcv = 0x7f58bcded2b8, dst = 0x0, req = 0x0, rpl = 0x0, rplcode = 0, mode = 0} cidlockidx = 0 cidlockset = 0 errsipmsg = 0 exectime = 0 __func__ = "receive_msg" #26 0x0000557db2c3ee6d in receive_tcp_msg ( tcpbuf=0x7f58bcded648 "SUBSCRIBE sip:test@test.tutpro.com SIP/2.0\r\nRecord-Route: sip:127.0.0.1:5070;transport=tcp;r2=on;lr\r\nRecord-Route: sip:192.168.188.215;transport=tcp;r2=on;lr\r\nVia: SIP/2.0/TCP 127.0.0.1:5070;branc"..., len=749, rcv_info=0x7f58bcded2b8, con=0x7f58bcded2a0) at core/tcp_read.c:1368 ret = 0 buf = 0x0 bsize = 0 blen = 0 __func__ = "receive_tcp_msg" #27 0x0000557db2c419f2 in tcp_read_req (con=0x7f58bcded2a0, bytes_read=0x7ffc2c643e98, read_flags=0x7ffc2c643e9c) at core/tcp_read.c:1604 bytes = 749 total_bytes = 749 resp = 1 size = 60129542152 req = 0x7f58bcded3c8 dst = {send_sock = 0x7ffc2c643db0, to = {s = {sa_family = 1, sa_data = "\000\000\000\000\000\000\300=d,\374\177\000"}, sin = {sin_family = 1, sin_port = 0, sin_addr = { s_addr = 0}, sin_zero = "\300=d,\374\177\000"}, sin6 = {sin6_family = 1, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = "\300=d,\374\177\000\000\030\000\000\000\000\000\000", __u6_addr16 = { 15808, 11364, 32764, 0, 24, 0, 0, 0}, __u6_addr32 = {744766912, 32764, 24, 0}}}, sin6_scope_id = 0}, sas = {ss_family = 1, __ss_padding = "\000\000\000\000\000\000\300=d,\374\177\000\000\030", '\000' <repeats 23 times>, "\001\000\000\000\000\000\000\000@꣼X\177\000\000\002\000\000\000\000\000\000\000\016\000\000\000\000\000\000\000\320=d,\001\000\000\000@꣼X\177\000\000\320=d,\374\177\000\000\017x²}U\000\000\340>d,\374\177\000\000\b\000\000\000\000\000\000", __ss_align = 20}}, id = 1, send_flags = {f = 1, blst_imask = 0}, proto = 8 '\b', proto_pad0 = 0 '\000', proto_pad1 = 0} c = 0 '\000' ret = -1001422464 __func__ = "tcp_read_req" #28 0x0000557db2c44ef3 in handle_io (fm=0x7f58c37781f0, events=1, idx=-1) at core/tcp_read.c:1780 ret = 8 n = 8 read_flags = RD_CONN_SHORT_READ con = 0x7f58bcded2a0 s = 8 resp = 93998361412288 t = 32600 ee = 0x0 __func__ = "handle_io" #29 0x0000557db2c30835 in io_wait_loop_epoll (h=0x557db2f102c0 <io_w>, t=2, repeat=0) at core/io_wait.h:1070 n = 1 r = 0 fm = 0x7f58c37781f0 revents = 1 __func__ = "io_wait_loop_epoll" #30 0x0000557db2c47e98 in tcp_receive_loop (unix_sock=14) at core/tcp_read.c:1976 __func__ = "tcp_receive_loop" #31 0x0000557db2c24ab5 in tcp_init_children (woneinit=0x7ffc2c644288) at core/tcp_main.c:5239 r = 0 i = -1 reader_fd_1 = 14 pid = 0 si_desc = "tcp receiver (tcp:127.0.0.1:5080)\000d,\374\177\000\000\063)Ų\000\000\000\000\000\024\000\000\000\000\000\000\353\347߲}U\000\000\065\000d,\374\177\000\000\333{ֲ}U\000\000\060Bd,\001\000\000\000@꣼X\177\000\000\060Bd,\374\177\000\000\340\250\336\274\001\000\000\000PBd,\374\177\000\000y}ֲ}U\000" si = 0x0 __func__ = "tcp_init_children" #32 0x0000557db2963531 in main_loop () at main.c:1851 i = 0 pid = 342606 si = 0x0 si_desc = "\210\000۲}U\000\000dR۲}U\000\000@Dd,\374\177\000\000听\262}U\000\000@Dd,\374\177\000\000MV\273\262\b\000\000\000\001\000\000\000\n\000\000\000\000.k_\225C\036\237\000\000\000\000\000\000\000\000\210\000۲}U\000\000\000\000\000\000\000\000\000\000\303jܲ}U\000\000\n\000\000\000\000\000\000\000p_$\304X\177\000\000 Dd,\374\177\000\000\240Ӳ\262}U\000" nrprocs = 21885 woneinit = 0 __func__ = "main_loop" #33 0x0000557db296e0e7 in main (argc=17, argv=0x7ffc2c644978) at main.c:3086 cfg_stream = 0x557db4bc02a0 c = -1 r = 0 tmp = 0x7ffc2c644f2e "" tmp_len = 744768960 port = 32764 proto = 7 ahost = 0x0 aport = 0 options = 0x557db2db3238 ":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:" ret = -1 seed = 3778932495 rfd = 4 debug_save = 0 debug_flag = 0 dont_fork_cnt = 0 n_lst = 0x0 p = 0x0 st = {st_dev = 23, st_ino = 2915, st_nlink = 2, st_mode = 16832, st_uid = 124, st_gid = 131, __pad0 = 0, st_rdev = 0, st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1680936323, tv_nsec = 265103008}, st_mtim = { tv_sec = 1680938481, tv_nsec = 693389707}, st_ctim = {tv_sec = 1680949347, tv_nsec = 257765663}, __glibc_reserved = {0, 0, 0}} tbuf = "\002\000\000\000\000\000\000\000\016\000\000\000\000\000\000\200", '\000' <repeats 112 times>, "\060\267\062\304X\177\000\000\004\000\000\024\000\000\000\000@\201\063\304X\177", '\000' <repeats 146 times>... option_index = 0 long_options = {{name = 0x557db2db5673 "help", has_arg = 0, flag = 0x0, val = 104}, {name = 0x557db2db04f1 "version", has_arg = 0, flag = 0x0, val = 118}, {name = 0x557db2db5678 "alias", has_arg = 1, flag = 0x0, val = 1024}, { name = 0x557db2db567e "subst", has_arg = 1, flag = 0x0, val = 1025}, {name = 0x557db2db5684 "substdef", has_arg = 1, flag = 0x0, val = 1026}, {name = 0x557db2db568d "substdefs", has_arg = 1, flag = 0x0, val = 1027}, { name = 0x557db2db5697 "server-id", has_arg = 1, flag = 0x0, val = 1028}, {name = 0x557db2db56a1 "loadmodule", has_arg = 1, flag = 0x0, val = 1029}, {name = 0x557db2db56ac "modparam", has_arg = 1, flag = 0x0, val = 1030}, { name = 0x557db2db56b5 "log-engine", has_arg = 1, flag = 0x0, val = 1031}, {name = 0x557db2db56c0 "debug", has_arg = 1, flag = 0x0, val = 1032}, {name = 0x557db2db56c6 "cfg-print", has_arg = 0, flag = 0x0, val = 1033}, { name = 0x557db2db56d0 "atexit", has_arg = 1, flag = 0x0, val = 1034}, {name = 0x557db2db56d7 "all-errors", has_arg = 0, flag = 0x0, val = 1035}, {name = 0x0, has_arg = 0, flag = 0x0, val = 0}} __func__ = "main" [?2004h(gdb) info locals [?2004l No locals. [?2004h(gdb) list [?2004l 54 in ../../core/trim.h [?2004h(gdb) ``` Will produce pcap of the SUBSCRIBE message if needed.
K at this commit works OK: https://github.com/kamailio/kamailio/commit/ea30efdbae2b33988e6157ba5e17aba1... and crashes at this commit: https://github.com/kamailio/kamailio/commit/c7e228eae76a432ea93fac7e95f50fe5....
Thanks for analysing further, I will look into it, seems indeed related to those changes I thought about.
Can you try with latest devel version? I pushed a commit to fix this.
Daniel-Constantin Mierla writes:
Can you try with latest devel version? I pushed a commit to fix this.
Thanks, the crash does not happen anymore.
-- Juha
Closed #3417 as completed.