### Description
Latest K master crashes on Debian 11 when handling SUBSCRIBE message.
#### Reproduction
Happens every time in my test and I can thus provide more information if needed.
#### Debugging Data
```
GNU gdb (Debian 10.1-1.7) 10.1.90.20210103-git
Copyright (C) 2021 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<https://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
<http://www.gnu.org/software/gdb/documentation/>.
For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/bin/pres-serv...
[New LWP 342614]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/bin/pres-serv -f /etc/pres-serv/pres-serv.cfg -P
/run/pres-serv/pres-serv.'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0 0x00007f58c362cad0 in trim_leading (_s=0x7f58bceeb558) at ../../core/trim.h:59
[?2004h(gdb) bt full
[?2004l
#0 0x00007f58c362cad0 in trim_leading (_s=0x7f58bceeb558) at ../../core/trim.h:59
No locals.
#1 0x00007f58c362cbc0 in trim (_s=0x7f58bceeb558) at ../../core/trim.h:90
No locals.
#2 0x00007f58c363f51c in print_callid (w=0x7f58bceed731 "",
dialog=0x7f58c378c350, t=0x7f58bceeb4f0) at t_msgbuilder.c:1531
No locals.
#3 0x00007f58c3640d78 in build_uac_req (method=0x7ffc2c640ae0, headers=0x7ffc2c640af0,
body=0x0, dialog=0x7f58c378c350,
branch=0, t=0x7f58bceeb4f0, len=0x7ffc2c64023c, dst=0x7ffc2c640380) at
t_msgbuilder.c:1649
buf = 0x7f58bceed5d0 "NOTIFY
sip:test@test.tutpro.com;gr=urn:uuid:9b21c1a8-dc58-a3d6-83d5-7be67cbe70ce SIP/2.0\r\nVia:
SIP/2.0/TCP 127.0.0.1:5080;branch=z9hG4bK64ba.0bec0511", '0' <repeats 24
times>, ".0\r\nTo: <sip:test@test.tutp"...
w = 0x7f58bceed714 "\r\nCall-ID: ab92759f23a9d95b\r\n"
p = 0x0
content_length = {s = 0x7f58c36f77c8 <content_length> "0", len =
1}
cseq = {s = 0x7f58c36f77e0 <cseq> "2", len = 1}
via = {
s = 0x7f58c378c590 "Via: SIP/2.0/TCP
127.0.0.1:5080;branch=z9hG4bK64ba.0bec0511", '0' <repeats 24 times>,
".0\r\n",
len = 87}
maxfwd_len = 0
tbracket = 1
fbracket = 1
fromtag = {s = 0x0, len = 0}
loc_tag = {s = 0x0, len = 0}
__func__ = "build_uac_req"
#4 0x00007f58c36b9e34 in t_uac_prepare (uac_r=0x7ffc2c640b40, dst_req=0x7ffc2c640498,
dst_cell=0x7ffc2c6404a0) at uac.c:541
dst = {send_sock = 0x7f58c3795bb0, to = {s = {sa_family = 2,
sa_data = "\023\316\177\000\000\001\000\000\000\000\000\000\000"},
sin = {sin_family = 2, sin_port = 52755,
sin_addr = {s_addr = 16777343}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2,
sin6_port = 52755, sin6_flowinfo = 16777343, sin6_addr = {__in6_u =
{__u6_addr8 = '\000' <repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}, sas = {
ss_family = 2, __ss_padding = "\023\316\177\000\000\001",
'\000' <repeats 111 times>, __ss_align = 0}}, id = 0,
send_flags = {f = 4, blst_imask = 0}, proto = 2 '\002', proto_pad0 = 0
'\000', proto_pad1 = 0}
new_cell = 0x7f58bceeb4f0
request = 0x7f58bceeb7c0
buf = 0x0
buf_len = 665
ret = -1
hi = 43846
is_ack = 0
lifetime = 512
nhtype = 256
snd_flags = {f = 4, blst_imask = 0}
backup_xd = {uri_avps_from = 0x7f58bcee78a0, uri_avps_to = 0x7f58bcee78a8,
user_avps_from = 0x7f58bcee78b0,
user_avps_to = 0x7f58bcee78b8, domain_avps_from = 0x557db2f646c0
<def_list+32>,
domain_avps_to = 0x557db2f646c8 <def_list+40>, xavps_list =
0x7f58bcee78d0, xavus_list = 0x7f58bcee78d8,
xavis_list = 0x7f58bcee78e0}
local_xd = {uri_avps_from = 0x0, uri_avps_to = 0x0, user_avps_from = 0x0,
user_avps_to = 0x0, domain_avps_from = 0x0,
domain_avps_to = 0x0, xavps_list = 0x0, xavus_list = 0x0, xavis_list = 0x0}
refresh_shortcuts = 0
sip_msg_len = 0
lreq = {id = 0, pid = 0, tval = {tv_sec = 0, tv_usec = 0}, fwd_send_flags = {f =
0, blst_imask = 0},
rpl_send_flags = {f = 0, blst_imask = 0}, first_line = {type = 0, flags = 0, len
= 0, u = {request = {method = {
s = 0x0, len = 0}, uri = {s = 0x0, len = 0}, version = {s = 0x0, len =
0}, method_value = 0}, reply = {
version = {s = 0x0, len = 0}, status = {s = 0x0, len = 0}, reason = {s =
0x0, len = 0}, statuscode = 0}}},
via1 = 0x0, via2 = 0x0, headers = 0x0, last_header = 0x0, parsed_flag = 0,
h_via1 = 0x0, h_via2 = 0x0,
callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0, contact = 0x0, maxforwards =
0x0, route = 0x0, record_route = 0x0,
content_type = 0x0, content_length = 0x0, authorization = 0x0, expires = 0x0,
proxy_auth = 0x0, supported = 0x0,
require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, event = 0x0,
accept = 0x0,
accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 0x0,
user_agent = 0x0, server = 0x0,
content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 0x0,
session_expires = 0x0, min_se = 0x0,
sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 0x0,
identity_info = 0x0, pai = 0x0, ppi = 0x0,
path = 0x0, privacy = 0x0, min_expires = 0x0, body = 0x0, eoh = 0x0, unparsed =
0x0, rcv = {src_ip = {af = 0,
len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0,
0, 0, 0, 0},
addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len =
0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0},
addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15
times>}}, src_port = 0, dst_port = 0,
proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family = 0,
sa_data = '\000' <repeats 13 times>},
sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"\000\000\000\000\000\000\000"},
sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr =
{__in6_u = {
__u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 =
{0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0,
0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, __ss_padding =
'\000' <repeats 117 times>,
__ss_align = 0}}, bind_address = 0x0, rflags = 0, proto = 0
'\000', proto_pad0 = 0 '\000', proto_pad1 = 0},
buf = 0x0, len = 0, new_uri = {s = 0x0, len = 0}, dst_uri = {s = 0x0, len = 0},
parsed_uri_ok = 0, parsed_uri = {
user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 0x0, len =
0}, port = {s = 0x0, len = 0},
params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s =
0x0, len = 0}, port_no = 0,
proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len = 0}, ttl
= {s = 0x0, len = 0}, user_param = {
s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, len = 0},
lr = {s = 0x0, len = 0}, r2 = {
s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len =
0}, ttl_val = {s = 0x0, len = 0},
user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0},
method_val = {s = 0x0, len = 0}, lr_val = {
s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len =
0}}, parsed_orig_ruri_ok = 0,
parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host
= {s = 0x0, len = 0}, port = {
s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len =
0}, headers = {s = 0x0, len = 0},
port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0,
len = 0}, ttl = {s = 0x0, len = 0},
user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s =
0x0, len = 0}, lr = {s = 0x0,
len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val =
{s = 0x0, len = 0}, ttl_val = {
s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val = {s =
0x0, len = 0}, method_val = {s = 0x0,
len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val =
{s = 0x0, len = 0}}, add_rm = 0x0,
body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = '\000' <repeats
57 times>, add_to_branch_len = 0,
hash_index = 0, msg_flags = 0, flags = 0, xflags = {0, 0}, set_global_address =
{s = 0x0, len = 0},
set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, path_vec = {s =
0x0, len = 0}, instance = {s = 0x0,
len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 0x0, len =
0}, otcpid = 0, ldv = {flow = {
decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 0}, addr32 =
{0, 0, 0, 0}, addr16 = {0, 0, 0,
0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}},
dst_ip = {af = 0, len = 0, u = {addrl = {0, 0},
addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr =
'\000' <repeats 15 times>}},
src_port = 0, dst_port = 0, proto_reserved1 = 0, proto_reserved2 = 0,
src_su = {s = {sa_family = 0,
sa_data = '\000' <repeats 13 times>}, sin = {sin_family
= 0, sin_port = 0, sin_addr = {s_addr = 0},
sin_zero = "\000\000\000\000\000\000\000"}, sin6 =
{sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0,
sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15
times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0},
__u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = {ss_family
= 0,
__ss_padding = '\000' <repeats 117 times>, __ss_align =
0}}, bind_address = 0x0, rflags = 0,
proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}},
vdata = 0x0}}
__func__ = "t_uac_prepare"
#5 0x00007f58c36bd786 in t_uac_with_ids (uac_r=0x7ffc2c640b40, ret_index=0x0,
ret_label=0x0) at uac.c:757
request = 0x7ffc2c6404e0
cell = 0x557db2c892af <split_frag+201>
ret = 1026
is_ack = 0
branch_ret = 980445555
i = 0
added_branches = 1
#6 0x00007f58c36bd743 in t_uac (uac_r=0x7ffc2c640b40) at uac.c:739
No locals.
#7 0x00007f58c36c00b9 in req_within (uac_r=0x7ffc2c640b40) at uac.c:986
ret = -1015496328
nbuf = "\200\365\352\262}U\000\000`\252x\303X\177", '\000'
<repeats 26 times>,
"\300\017d,\374\177\000\000\000\000\000\000\000\000\000\000\360\223\336\274X\177\000\000`\301x\303X\177\000\000\030",
'\000' <repeats 19 times>, "\377\377\377\377", '\000'
<repeats 12 times>,
"\361\001\000\000\002\004\000\000\017\000\000\000\b\ad,\374\177\000\000\000\000\000\000\000\000\020\201\020\220s\303X\177\000\000\002\004\000\000\017\000\000\000\230\006d,\374\177\000\000vxȲ}U\000\000\200\305x\303X\177\000\000\020\220s\303X\177\000\000p\305x\303X\177\000\000\020\220s\303\002\004\000\000\240\060"...
dbuf = '\000' <repeats 12 times>,
"\002\000\000\000\000\000\000\000\b\000\000\000k\245\361\302X\177\000\000\n\000\000\000\000\000\000\000\000.k_\225C\036\237\300\td,\374\177\000\000\304\351\344\302X\177\000\000\231BѲ}U\000\000\370\006d,-\000\000"
ouri = {s = 0x0, len = 0}
nuri = {s = 0x0, len = 0}
duri = {s = 0x0, len = 0}
__func__ = "req_within"
#8 0x00007f58c2e633c7 in send_notify_request (subs=0x7ffc2c640ef0, watcher_subs=0x0,
n_body=0x0, force_null_body=0)
at notify.c:1727
td = 0x7f58c378c350
met = {s = 0x7f58c2f1d934 "NOTIFY", len = 6}
str_hdr = {
s = 0x7f58c378c290 "Max-Forwards: 70\r\nEvent: message-summary\r\nContact:
<sip:127.0.0.1:5080;transport=tcp>\r\nSubscription-State:
active;expires=600\r\n", len = 127}
notify_body = 0x0
result = 0
cb_param = 0x7f58bceeb1e0
final_body = 0x0
uac_r = {method = 0x7ffc2c640ae0, headers = 0x7ffc2c640af0, body = 0x0, ssock =
0x0, ssockname = 0x0,
dialog = 0x7f58c378c350, cb_flags = 1024, cb = 0x7f58c2e66091
<p_tm_callback>, cbp = 0x7f58bceeb1e0, callid = 0x0}
aux_body = 0x0
backup_subs = 0x0
__func__ = "send_notify_request"
#9 0x00007f58c2e64c61 in notify (subs=0x7ffc2c640ef0, watcher_subs=0x0, n_body=0x0,
force_null_body=0,
aux_body_processing=0x0) at notify.c:1818
aux_body = 0x0
__func__ = "notify"
#10 0x00007f58c2ef234c in update_subscription (msg=0x7f58c378a860, subs=0x7ffc2c640ef0,
to_tag_gen=1,
sent_reply=0x7ffc2c640e1c) at subscribe.c:685
hash_code = 233
reply_code = 200
__func__ = "update_subscription"
#11 0x00007f58c2efa30b in handle_subscribe (msg=0x7f58c378a860, watcher_user=...,
watcher_domain=...) at subscribe.c:1222
to_tag_gen = 1
subs = {pres_uri = {s = 0x7f58c378c160 "sip:test@test.tutpro.com", len =
24}, to_user = {
s = 0x7f58bcded823 "test(a)test.tutpro.com>\r\nFrom\r\nFrom:
<sip:test@test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID:
ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0
(x86_64/Linux)\r\nEvent: message-summary\r\nExpir"...,
len = 4}, to_domain = {
s = 0x7f58bcded828 "test.tutpro.com>\r\nFrom:
<sip:test@test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID:
ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0
(x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 6"...,
len = 15}, from_user = {
s = 0x7f58bcded845
"test(a)test.tutpro.com>;tag=a0d5083649726799\r\nCall-IDnCall-ID: ab92759f23a9d95b\r\nCSeq:
56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent:
message-summary\r\nExpires: 600\r\nAccept: application/simpl"...,
len = 4}, from_domain = {
s = 0x7f58bcded84a "test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID:
ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0
(x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept:
application/simple-mes"...,
len = 15}, watcher_user = {
s = 0x7f58bcded845
"test(a)test.tutpro.com>;tag=a0d5083649726799\r\nCall-IDnCall-ID: ab92759f23a9d95b\r\nCSeq:
56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent:
message-summary\r\nExpires: 600\r\nAccept: application/simpl"...,
len = 4}, watcher_domain = {
s = 0x7f58bcded84a "test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID:
ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0
(x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept:
application/simple-mes"...,
len = 15}, event = 0x7f58bcde93f0, event_id = {s = 0x0, len = 0}, to_tag = {
s = 0x7f58c36f7840 <tm_tags>
"48b5b8952e8d0bca6256941910840e90-96b46351", len = 41}, from_tag = {
s = 0x7f58bcded85f "a0d5083649726799\r\nCall-ID:
ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0
(x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept:
application/simple-message-summary\r\nContent"...,
len = 16}, callid = {
s = 0x7f58bcded87a "ab92759f23a9d95b\r\nCSeq: 56572
SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent:
message-summary\r\nExpires: 600\r\nAccept:
application/simple-message-summary\r\nContent-Length: 0\r\n\r\n", len = 16},
sockinfo_str = {s = 0x7f58c376f580 "tcp:127.0.0.1:5080", len = 18},
remote_cseq = 56572, local_cseq = 1, contact = {
s = 0x7f58bcded7bc
"sip:test@test.tutpro.com;gr=urn:uuid:9b21c1a8-dc58-a3d6-83d5-7be67cbe70ce>\r\nMax-Forwards:
69\r\nTo: <sip:test@test.tutpro.com>\r\nFrom:
<sip:test@test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID: ab92759f23"...,
len = 73}, local_contact = {s = 0x7f58c37a8db0
"sip:127.0.0.1:5080;transport=tcp", len = 32}, record_route = {
s = 0x7f58c378c0e0
"<sip:127.0.0.1:5070;transport=tcp;r2=on;lr>,<sip:192.168.188.215;transport=tcp;r2=on;lr>",
len = 88}, expires = 600, status = 1, reason = {s = 0x0, len = 0}, version =
1, send_on_cback = 0, db_flag = 4,
auth_rules_doc = 0x0, recv_event = 1, internal_update_flag = 0, updated = -1,
updated_winfo = -1, flags = 0,
user_agent = {
s = 0x7f58bcded8af "baresip v3.0.0 (x86_64/Linux)\r\nEvent:
message-summary\r\nExpires: 600\r\nAccept:
application/simple-message-summary\r\nContent-Length: 0\r\n\r\n", len = 29}, next =
0x0}
event = 0x7f58bcde93f0
parsed_event = 0x7f58c378bea0
ev_param = 0x0
found = 0
reason = {s = 0x0, len = 0}
uri = {user = {s = 0x3a70697300000000 <error: Cannot access memory at address
0x3a70697300000000>,
len = -1295176907}, passwd = {s = 0x7ffc2c641120 "", len =
744755408}, host = {
s = 0x7ffc2c6411e0 "\220\022d,\374\177", len = -1296286244}, port =
{s = 0x7ffc2c641140 "", len = -1126246326},
params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers = {s =
0x0, len = -1126246311},
port_no = 55526, proto = 48350, type = 32600, flags = (URI_USER_NORMALIZE |
URI_SIP_USER_PHONE | unknown: 0x4),
transport = {s = 0x0, len = 0}, ttl = {s = 0xe <error: Cannot access memory
at address 0xe>, len = -1126246170},
user_param = {s = 0xffffffff00000007 <error: Cannot access memory at address
0xffffffff00000007>,
len = -1015502752}, maddr = {s = 0x0, len = 1600859648}, method = {s = 0x0,
len = 0}, lr = {s = 0x0,
len = 1600859648}, r2 = {s = 0x7 <error: Cannot access memory at address
0x7>, len = 0}, gr = {s = 0x0,
len = -1294177597}, transport_val = {s = 0xa <error: Cannot access memory
at address 0xa>, len = -1004249232},
ttl_val = {s = 0x7ffc2c641210 "\300\022d,\374\177", len =
-1295182985}, user_param_val = {
s = 0x7f58c37af8a0 ":\001", len = -1015502752}, maddr_val = {s =
0x0, len = -1015497648}, method_val = {
s = 0x100000000 <error: Cannot access memory at address 0x100000000>,
len = 0}, lr_val = {s = 0x0,
len = 1600859648}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len =
-1294177597}}
reply_code = 500
reply_str = {s = 0x7f58c2f2dd5f "Server Internal Error", len = 21}
sent_reply = 1
__func__ = "handle_subscribe"
#12 0x00007f58c2ef596a in handle_subscribe0 (msg=0x7f58c378a860) at subscribe.c:999
pfrom = 0x7f58c378bc50
__func__ = "handle_subscribe0"
#13 0x0000557db29781e3 in do_action (h=0x7ffc2c641b40, a=0x7f58c37b2c50,
msg=0x7f58c378a860) at core/action.c:1081
ret = -5
li = 0
v = 0
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000'
<repeats 13 times>}, sin = {sin_family = 0,
sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0,
sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
'\000' <repeats 15 times>,
__u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 0}}},
sin6_scope_id = 0}, sas = {
ss_family = 0, __ss_padding = '\000' <repeats 117 times>,
__ss_align = 0}}, id = 0, send_flags = {f = 0,
blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000',
proto_pad1 = 0}
tmp = 0x0
new_uri = 0x0
end = 0x0
crt = 0x0
cmd = 0x7f58c379c6a0
len = 0
user = 0
uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 128}, host = {s = 0x0,
len = 0}, port = {s = 0x0,
len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0},
headers = {s = 0x0, len = 0},
port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len
= 0}, ttl = {s = 0x0, len = 0},
user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0,
len = 0}, lr = {s = 0x0, len = 0},
r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 0x0, len
= 0}, ttl_val = {s = 0x0, len = 0},
user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, method_val
= {s = 0x0, len = 0}, lr_val = {
s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len = 0}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s =
0x0, len = 0}, port = {s = 0x0,
len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0},
headers = {s = 0x0, len = 0},
port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len
= 0}, ttl = {s = 0x0, len = 0},
user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0,
len = 0}, lr = {s = 0x0, len = 0},
r2 = {s = 0x0, len = 1600859648}, gr = {s = 0x0, len = 0}, transport_val = {s =
0x0, len = -1294177597}, ttl_val = {
s = 0xa <error: Cannot access memory at address 0xa>, len =
-1004249232}, user_param_val = {
s = 0x7ffc2c641980 "\240\032d,\374\177", len = -1298632837},
maddr_val = {s = 0x0, len = 0}, method_val = {
s = 0x0, len = 0}, lr_val = {s = 0x0, len = -1015502752}, r2_val = {s =
0x7f58c37af8a0 ":\001", len = 744757696},
gr_val = {s = 0x0, len = 0}}
u = 0x0
port = 0
dst_host = 0x0
i = 0
flags = 0
avp = 0x0
st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp =
0x0}
sct = 0x0
sjt = 0x0
rve = 0x0
mct = 0x0
rv = 0x0
rv1 = 0x0
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s =
{s = 0x0, len = 0}, re = 0x0},
pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000'
<repeats 21 times>}
s = {s = 0x0, len = 0}
srevp = {0x0, 0x0}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s =
0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#14 0x0000557db2986f7b in run_actions (h=0x7ffc2c641b40, a=0x7f58c37b2c50,
msg=0x7f58c378a860) at core/action.c:1587
t = 0x7f58c37b2c50
ret = -1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = -1749943006, tz_dsttime = -1995335592}
tdiff = 1
__func__ = "run_actions"
#15 0x0000557db29876e9 in run_actions_safe (h=0x7ffc2c6437e0, a=0x7f58c37b2c50,
msg=0x7f58c378a860) at core/action.c:1651
ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = {{__jmpbuf =
{8589934592, -8569901109723661022, 0,
93998360062659, 10, 140019224567664, -8569901109662843614,
-2588824727271113438}, __mask_was_saved = 0,
__saved_mask = {__val = {0, 0, 11465676010161909248, 0, 8589934592, 0,
93998360062659, 10, 140019224567664,
140721053244768, 93998357479355, 0, 0, 0, 0, 140019213466032}}}}}
ret = -1
ign_on_break = 0
#16 0x0000557db2b4a950 in rval_get_long (h=0x7ffc2c6437e0, msg=0x7f58c378a860,
i=0x7ffc2c642058, rv=0x7f58c37b2f78, cache=0x0)
at core/rvalue.c:955
r_avp = 0x0
avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}
pval = {rs = {s = 0x400000000 <error: Cannot access memory at address
0x400000000>, len = 744759384}, ri = 0,
flags = 0}
tmp = {s = 0x7f58c37a5a98 "'\265\254\300X\177", len = 1}
s = 0x0
r = 0
ret = 0
destroy_pval = 0
__func__ = "rval_get_long"
#17 0x0000557db2b4ffbb in rval_expr_eval_long (h=0x7ffc2c6437e0, msg=0x7f58c378a860,
res=0x7ffc2c642058, rve=0x7f58c37b2f70)
at core/rvalue.c:1855
i1 = 1
i2 = 0
ret = -1
c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s =
{s = 0x0, len = 0}, re = 0x0},
pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000'
<repeats 21 times>}
c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = {n = 0, s =
{s = 0x0, len = 0}, re = 0x0},
pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000'
<repeats 21 times>}
rv1 = 0x0
rv2 = 0x0
__func__ = "rval_expr_eval_long"
#18 0x0000557db2977c13 in do_action (h=0x7ffc2c6437e0, a=0x7f58c37b3be0,
msg=0x7f58c378a860) at core/action.c:1057
ret = -5
li = 0
v = 0
dst = {send_sock = 0x7f58c36c1260, to = {s = {sa_family = 0,
sa_data = "\000\000\000\000\000\000\377\377\377\377\000\000\000"},
sin = {sin_family = 0, sin_port = 0,
sin_addr = {s_addr = 0}, sin_zero =
"\377\377\377\377\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0,
sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 =
"\377\377\377\377\000\000\000\000`\250x\303X\177\000",
__u6_addr16 = {65535, 65535, 0, 0, 43104, 50040, 32600, 0}, __u6_addr32
= {4294967295, 0, 3279464544,
32600}}}, sin6_scope_id = 0}, sas = {ss_family = 0,
__ss_padding =
"\000\000\000\000\000\000\377\377\377\377\000\000\000\000`\250x\303X\177",
'\000' <repeats 14 times>,
"\060\000\000\000\000\000\000\000\374\177\000\000\220*d,\374\177\000\000\300Ez\303X\177",
'\000' <repeats 18 times>,
"\063\331\336\274X\177\000\000\000\000\000\000\000\000\000\000\220\262x\303X\177\000\000P\274x\303X\177\000\000\063\331\336\274X\177\000",
__ss_align = 140721053247080}}, id = 24, send_flags = {f = 48, blst_imask = 0}, proto = 0
'\000',
proto_pad0 = 0 '\000', proto_pad1 = 0}
tmp = 0x0
new_uri = 0x0
end = 0x0
crt = 0x0
cmd = 0x0
len = 0
user = 0
uri = {user = {s = 0x0, len = 1600859648}, passwd = {s = 0x0, len = 0}, host = {s
= 0x0, len = -1294177597}, port = {
s = 0xa <error: Cannot access memory at address 0xa>, len =
-1004249232}, params = {
s = 0x7ffc2c642340 "`$d,\374\177", len = -1298632837}, sip_params =
{s = 0x0, len = 0}, headers = {s = 0x0,
len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = (unknown:
0xc378a860), transport = {
s = 0x7f58c37aee00 "9\001", len = 744760192}, ttl = {s = 0x0, len =
0}, user_param = {
s = 0x400000000 <error: Cannot access memory at address 0x400000000>,
len = -1293767226}, maddr = {s = 0x0,
len = 1600859648}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 =
{s = 0x0, len = 1600859648}, gr = {
s = 0x1 <error: Cannot access memory at address 0x1>, len =
-1015497744}, transport_val = {s = 0x7f58bcded935 "",
len = -1126246112}, ttl_val = {s = 0x1100000000 <error: Cannot access
memory at address 0x1100000000>, len = 0},
user_param_val = {s = 0x0, len = 744760220}, maddr_val = {s = 0x7f58bcded935
"", len = -1126246096}, method_val = {
s = 0x100000000 <error: Cannot access memory at address 0x100000000>,
len = 0}, lr_val = {s = 0x0,
len = -1126246093}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, len =
1600859648}}
next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = -1294177597}, host
= {
s = 0xa <error: Cannot access memory at address 0xa>, len = 1600859648},
port = {
s = 0x7ffc2c642340 "`$d,\374\177", len = 0}, params = {s = 0x0, len
= -1294177597}, sip_params = {
s = 0xa <error: Cannot access memory at address 0xa>, len =
-1004249232}, headers = {
s = 0x7ffc2c642460 "\240%d,\374\177", len = -1298630935}, port_no =
1026, proto = 0, type = 15,
flags = (unknown: 0xc378a860), transport = {s = 0x7f58c37aee00
"9\001", len = 744765408}, ttl = {
s = 0x7f58c3739010 "\001", len = 0}, user_param = {s = 0x0, len =
1}, maddr = {
s = 0x200000000 <error: Cannot access memory at address 0x200000000>,
len = -500040414}, method = {s = 0x0,
len = -1294177597}, lr = {s = 0xa <error: Cannot access memory at address
0xa>, len = -1004249232}, r2 = {
s = 0x89119858e7d1fd22 <error: Cannot access memory at address
0x89119858e7d1fd22>, len = 1900150050}, gr = {
s = 0x7ffc00000000 <error: Cannot access memory at address
0x7ffc00000000>, len = 0}, transport_val = {s = 0x0,
len = -1126246091}, ttl_val = {s = 0x1 <error: Cannot access memory at
address 0x1>, len = -1127264656},
user_param_val = {s = 0x0, len = -1015500416}, maddr_val = {s = 0x7f58bccf4e70
"pv\356\274X\177",
len = -1017465335}, method_val = {s = 0x1c431c180 <error: Cannot access
memory at address 0x1c431c180>,
len = -1127264640}, lr_val = {s = 0x7ffc2c642460 "\240%d,\374\177",
len = -1017465064}, r2_val = {s = 0x0,
len = -1127264640}, gr_val = {s = 0x7ffc2c642470 "\240$d,\374\177",
len = 1600859648}}
u = 0x0
port = 0
dst_host = 0x0
i = 0
flags = 0
avp = 0x0
st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}, avp =
0x0}
sct = 0x0
sjt = 0x0
rve = 0x7f58c37b2f70
mct = 0x0
rv = 0x0
rv1 = 0x0
c1 = {cache_type = 744760480, val_type = 32764, c = {avp_val = {n =
140019101552256, s = {s = 0x7f58bccf4e80 "",
len = 744760480}, re = 0x7f58bccf4e80}, pval = {rs = {s = 0x7f58bccf4e80
"", len = 744760480}, ri = 0,
flags = -1015352952}}, i2s =
"\230(d,\374\177\000\000`\250x\303X\177\000\000\340\067d,\374\177"}
s = {s = 0x0, len = 0}
srevp = {0x7ffc2c6425a0, 0x557db2b4a950 <rval_get_long+424>}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s =
0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#19 0x0000557db2986f7b in run_actions (h=0x7ffc2c6437e0, a=0x7f58c37b0f10,
msg=0x7f58c378a860) at core/action.c:1587
t = 0x7f58c37b3be0
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = 744762544, tz_dsttime = 32764}
tdiff = 744765408
__func__ = "run_actions"
#20 0x0000557db297814c in do_action (h=0x7ffc2c6437e0, a=0x7f58c37b40a0,
msg=0x7f58c378a860) at core/action.c:1072
ret = 1
li = 16384
v = 1
dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data =
"\000\000\000\000\000\000p\264Q\303X\177\000"}, sin = {
sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero =
"p\264Q\303X\177\000"}, sin6 = {
sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = {
__u6_addr8 = "p\264Q\303X\177\000\000\200\254Q\303X\177\000",
__u6_addr16 = {46192, 50001, 32600, 0, 44160,
50001, 32600, 0}, __u6_addr32 = {3276911728, 32600, 3276909696,
32600}}}, sin6_scope_id = 0}, sas = {
ss_family = 0,
__ss_padding =
"\000\000\000\000\000\000p\264Q\303X\177\000\000\200\254Q\303X\177\000\000\000\000\000\000\000\000\000\000\360\370{\303X\177\000\000\200\000U\303X\177\000\000\360\363v\303X\177\000\000\000\000\000\000\000\000\000\000\025\000\000\000\000\000\000\000\001\000\000\000\001\000\000\000\000q\035\304X\177\000\000\240\rU\303X\177\000\000\240\rU\303X\177\000\000\360\370{\303X\177\000\000+\305Q\303X\177\000",
__ss_align = 2}}, id = 0, send_flags = {f = 0, blst_imask = 0},
proto = -112 '\220', proto_pad0 = 49 '1', proto_pad1 = 11364}
tmp = 0x7f58c351c38e
"H\203\370\377t\334H\203\304\030[A\\A]A^A_]\303\017\037D"
new_uri = 0x7f58c3528966 <mysql_get_parameters+1606>
"I\211\307H\215\005(\222\002"
end = 0x557db4c94ae0 ""
crt = 0x7ffc2c642910 "\340)d,\374\177"
cmd = 0x7f58c37977d8
len = 909670447
user = 791950943
uri = {user = {s = 0x7ffc2c642aa0
"M\224\236\231q\202\257\bz\300Q\303X\177", len = 1600859648}, passwd = {
s = 0x7ffc2c6429f8 "\365Jɴ}U", len = 0}, host = {s = 0x0, len =
-1294177597}, port = {
s = 0xa <error: Cannot access memory at address 0xa>, len =
-1004249232}, params = {
s = 0x7ffc2c642b80 "\240,d,\374\177", len = -1298632837}, sip_params
= {s = 0x557db4c94af5 "",
len = -1261876491}, headers = {s = 0x557db4c8da80 "P\337ȴ}U", len =
-1261905344}, port_no = 55896,
proto = 46280, type = 21885, flags = (unknown: 0xc378a860), transport = {s =
0x7f58c37aa720 "\031\001",
len = 744762304}, ttl = {s = 0x7ffc2c642aa0
"M\224\236\231q\202\257\bz\300Q\303X\177", len = -1018018493},
user_param = {s = 0x7f58c37c0120 "\200\310ȴ}U", len = 744761960},
maddr = {s = 0x0, len = -1018054899}, method = {
s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {
s = 0xefcdab8998badcfe <error: Cannot access memory at address
0xefcdab8998badcfe>, len = 1732584193}, gr = {
s = 0x1d7439068d9a78b7 <error: Cannot access memory at address
0x1d7439068d9a78b7>, len = 1369412067},
transport_val = {s = 0x8af8271999e944d <error: Cannot access memory at
address 0x8af8271999e944d>,
len = -1018052486}, ttl_val = {
s = 0x1ecd4f10aea434b8 <error: Cannot access memory at address
0x1ecd4f10aea434b8>, len = 6}, user_param_val = {
s = 0x6 <error: Cannot access memory at address 0x6>, len =
-1261860112}, maddr_val = {
s = 0x4000 <error: Cannot access memory at address 0x4000>, len = 2000},
method_val = {
s = 0x7ffc2c642b30 "\220+d,\374\177", len = -1018051698}, lr_val =
{s = 0x7ffc2c642b50 " ,d,\374\177",
len = -1261914352}, r2_val = {s = 0x8 <error: Cannot access memory at
address 0x8>, len = 0}, gr_val = {
s = 0x557db4c8b6a0 "\020\267ȴ}U", len = -1261860112}}
next_hop = {user = {s = 0x4000 <error: Cannot access memory at address
0x4000>, len = -1}, passwd = {
s = 0x7ffc2c642b90 "\001", len = -1018001050}, host = {s =
0x557db4c9cb00 "", len = 1600859648}, port = {
s = 0x7ffc2c642c20 "\360\370{\303X\177", len = 0}, params = {s =
0x0, len = -1294177597}, sip_params = {
s = 0xa <error: Cannot access memory at address 0xa>, len =
-1004249232}, headers = {
s = 0x7ffc2c642ca0 "\340-d,\374\177", len = -1298630935}, port_no =
1, proto = 0, type = ERROR_URI_T,
flags = (unknown: 0xc378a860), transport = {s = 0x7f58c37aa720
"\031\001", len = 744765408}, ttl = {
s = 0x7ffc2c642c00
"\"\375Q\367X\230\021\211\"\375Aq\240\245", <incomplete sequence
\334>, len = 0},
user_param = {s = 0x0, len = -1}, maddr = {s = 0x200000000 <error: Cannot
access memory at address 0x200000000>,
len = -206439134}, method = {s = 0x0, len = -1294177597}, lr = {
s = 0xa <error: Cannot access memory at address 0xa>, len =
-1004249232}, r2 = {
s = 0x89119858f751fd22 <error: Cannot access memory at address
0x89119858f751fd22>, len = 1900150050}, gr = {
s = 0x7ffc00000000 <error: Cannot access memory at address
0x7ffc00000000>, len = 744762440}, transport_val = {
s = 0x7f58c37bf8f0 "\240\266ȴ}U", len = -1261917472}, ttl_val = {s =
0x557db4c9cb15 "", len = -1261843691},
user_param_val = {s = 0x557db4c8da80 "P\337ȴ}U", len = -1261905760},
maddr_val = {
s = 0x557db4c8d8b8 "\310\330ȴ}U", len = -1261905720}, method_val =
{
s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, len
= -1015285520}, lr_val = {
s = 0x7ffc2c642ce0 "`\250x\303X\177", len = -1018018493}, r2_val =
{s = 0x7f58c37bf8f0 "\240\266ȴ}U",
len = 744762536}, gr_val = {s = 0x7ffc2c642ce0 "`\250x\303X\177",
len = 1600859648}}
u = 0x557db4c8be40
port = 24374
dst_host = 0x557db4c94bae
i = 1819043191
flags = 1935763503
avp = 0x8
st = {flags = 21, id = 0, name = {n = 140015933849608, s = {
s = 0x7f5800000008 <error: Cannot access memory at address
0x7f5800000008>, len = 744761792},
re = 0x7f5800000008}, avp = 0x7ffc2c642980}
sct = 0xffffffffffffffff
sjt = 0x7ffc2c642950
rve = 0x7f58c37af180
mct = 0x4000
rv = 0x7ffc2c6428f0
rv1 = 0x0
c1 = {cache_type = 34404919, val_type = 308471918, c = {avp_val = {n = 21, s = {
s = 0x15 <error: Cannot access memory at address 0x15>, len =
744762624}, re = 0x15}, pval = {rs = {
s = 0x15 <error: Cannot access memory at address 0x15>, len =
744762624}, ri = 0, flags = -1015371720}},
i2s =
"\330\060d,\374\177\000\000`\250x\303X\177\000\000\340\067d,\374\177"}
s = {s = 0x7ffc2c6429e0 "\200+d,\374\177", len = -1018040882}
srevp = {0x7ffc2c642de0, 0x557db2b4a950 <rval_get_long+424>}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s =
0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#21 0x0000557db2986f7b in run_actions (h=0x7ffc2c6437e0, a=0x7f58c37ab6f0,
msg=0x7f58c378a860) at core/action.c:1587
t = 0x7f58c37b40a0
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = -1126259388, tz_dsttime = 32600}
tdiff = 744765408
__func__ = "run_actions"
#22 0x0000557db2974125 in do_action (h=0x7ffc2c6437e0, a=0x7f58c37ab390,
msg=0x7f58c378a860) at core/action.c:705
ret = -5
li = 5
v = 0
dst = {send_sock = 0x4022c643620, to = {s = {sa_family = 11776, sa_data =
"k_\225C\036\237\240\060t\303X\177\000"},
sin = {sin_family = 11776, sin_port = 24427, sin_addr = {s_addr = 2669560725},
sin_zero = "\240\060t\303X\177\000"}, sin6 = {sin6_family = 11776,
sin6_port = 24427,
sin6_flowinfo = 2669560725, sin6_addr = {__in6_u = {
__u6_addr8 =
"\240\060t\303X\177\000\000\000\000\000\000\002\000\000", __u6_addr16 = {12448,
50036, 32600,
0, 0, 0, 2, 0}, __u6_addr32 = {3279171744, 32600, 0, 2}}},
sin6_scope_id = 0}, sas = {ss_family = 11776,
__ss_padding =
"k_\225C\036\237\240\060t\303X\177\000\000\000\000\000\000\002", '\000'
<repeats 11 times>,
"\303jܲ}U\000\000\065\331\336\274X\177\000\000\241\330\336\274X\177\000\000P6d,\374\177\000\000$7̲}U\000\000P\272x\303X\177\000\000
\272x\303X\177\000\000\065\331\336\274X\177\000\000\222\330\336\274X\177\000\000\060\000\000\000\000\000\000\000\020\220s\303X\177\000",
__ss_align = 140019102570418}}, id = -1126246239, send_flags = {f = 32600, blst_imask =
0}, proto = -104 '\230',
proto_pad0 = -40 '\330', proto_pad1 = -17186}
tmp = 0x0
new_uri = 0x9f1e43955f6b2e00 <error: Cannot access memory at address
0x9f1e43955f6b2e00>
end = 0xffffffff <error: Cannot access memory at address 0xffffffff>
crt = 0x1 <error: Cannot access memory at address 0x1>
cmd = 0x7f58c44f8180
len = 1
user = 0
uri = {user = {s = 0xa <error: Cannot access memory at address 0xa>, len =
-1005215176}, passwd = {
s = 0x7ffc2c6435f0 "\n", len = -1001511286}, host = {s =
0x7ffc2c6437f0 "", len = -1015369248}, port = {
s = 0x1 <error: Cannot access memory at address 0x1>, len =
-1015369248}, params = {s = 0x7ffc2c6437f0 "",
len = -1016554012}, sip_params = {s = 0x0, len = -1293737232}, headers = {
s = 0xf00000402 <error: Cannot access memory at address 0xf00000402>,
len = 1600859648}, port_no = 13200,
proto = 11364, type = 32764, flags = (unknown: 0x1fa0), transport = {s =
0x7f58c3739010 "\001", len = 1600859648},
ttl = {s = 0x4020000002d <error: Cannot access memory at address
0x4020000002d>, len = -1015795552}, user_param = {
s = 0x7f58c37430a0 "", len = 744764112}, maddr = {s = 0x7f58c378b180
"\001", len = -1015500048}, method = {
s = 0x7ffc2c6433c3 "", len = 744764354}, lr = {s = 0x7f58bcded935
"", len = -1126246591}, r2 = {
s = 0x7f58c378b330 "@", len = -1015499968}, gr = {s = 0x7ffc2c643390
"", len = -1295477544}, transport_val = {
s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {s = 0x0,
len = 65535}, maddr_val = {
s = 0x657079542d746e <error: Cannot access memory at address
0x657079542d746e>, len = 1902465859}, method_val = {
s = 0x4040404040404040 <error: Cannot access memory at address
0x4040404040404040>, len = 1077952576}, lr_val = {
s = 0x5a5a5a5a5a5a5a5a <error: Cannot access memory at address
0x5a5a5a5a5a5a5a5a>, len = 1515870810}, r2_val = {
s = 0x2020202020202020 <error: Cannot access memory at address
0x2020202020202020>, len = 538976288}, gr_val = {
s = 0xffffffffffffffff <error: Cannot access memory at address
0xffffffffffffffff>, len = -65536}}
next_hop = {user = {s = 0x2020202020202020 <error: Cannot access memory at
address 0x2020202020202020>,
len = 2097152}, passwd = {s = 0xffffffffffffffff <error: Cannot access
memory at address 0xffffffffffffffff>,
len = -256}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, params = {s
= 0x0, len = 0}, sip_params = {
s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto = 0, type
= ERROR_URI_T, flags = 0,
transport = {s = 0x40 <error: Cannot access memory at address 0x40>, len =
-1015836656}, ttl = {
s = 0x9410000000000000 <error: Cannot access memory at address
0x9410000000000000>, len = 1026}, user_param = {
s = 0x7f58c3739010 "\001", len = -1126246480}, maddr = {s =
0x557db2c87876 <qm_insert_free+59> "\005\363\003",
len = -1015500160}, method = {s = 0x7f58c3739010 "\001", len =
1600859648}, lr = {
s = 0x4022c643520 <error: Cannot access memory at address
0x4022c643520>, len = -1015795552}, r2 = {
s = 0x2 <error: Cannot access memory at address 0x2>, len = 14}, gr = {s
= 0x0, len = 0}, transport_val = {
s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {
s = 0x7f58bcded76c
";received=192.168.188.215;branch=z9hG4bKa39a82e98b875f6b;rport=59490\r\nContact:
<sip:test@test.tutpro.com;gr=urn:uuid:9b21c1a8-dc58-a3d6-83d5-7be67cbe70ce>\r\nMax-Forwards:
69\r\nTo: <sip:test@test.tutpro."...,
len = -1126246548}, maddr_val = {s = 0x7ffc2c643650
"\260\067d,\374\177", len = -1294932839}, method_val = {
s = 0xf0 <error: Cannot access memory at address 0xf0>, len =
-1015499856}, lr_val = {s = 0x7f58bcded935 "",
len = -1126246580}, r2_val = {s = 0x505b180 <error: Cannot access memory at
address 0x505b180>,
len = -1295161072}, gr_val = {s = 0x7f58c378ba48 "@", len =
-1015498184}}
u = 0x7f58c44f8180
port = 0
dst_host = 0xa
i = 1
flags = -1472036457
avp = 0x7f58c376f390
st = {flags = 744765344, id = 32764, name = {n = 0, s = {s = 0x0, len =
-1294177597}, re = 0x0}, avp = 0xa}
sct = 0x0
sjt = 0x7f58c431fb80 <main_arena>
rve = 0x7f58c37aa830
mct = 0x7f58c44f84e8
rv = 0x1
rv1 = 0x7f58c44acab0
c1 = {cache_type = RV_CACHE_EMPTY, val_type = 2351955968, c = {avp_val = {n =
140019212980240, s = {
s = 0x7f58c3739010 "\001", len = 1026}, re = 0x7f58c3739010},
pval = {rs = {s = 0x7f58c3739010 "\001",
len = 1026}, ri = 140721053250888, flags = -1295484810}},
i2s =
"`\272x\303X\177\000\000\020\220s\303X\177\000\000\000.k_\225C"}
s = {s = 0x7f58c415a238 "uP", len = -1001733104}
srevp = {0x7f58c3778190, 0x7ffc2c6435b8}
evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req = 0x0, rpl
= 0x0, rplcode = 0, mode = 0}
mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, str = {s =
0x0, len = 0}, data = 0x0,
attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string =
0x0, str = {s = 0x0, len = 0},
data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0,
len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u =
{number = 0, string = 0x0, str = {
s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0, string = 0x0,
str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type =
NOSUBTYPE, u = {number = 0,
string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select =
0x0}}, {type = NOSUBTYPE, u = {
number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0,
select = 0x0}}}
__func__ = "do_action"
#23 0x0000557db2986f7b in run_actions (h=0x7ffc2c6437e0, a=0x7f58c37ab1e0,
msg=0x7f58c378a860) at core/action.c:1587
t = 0x7f58c37ab390
ret = 1
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
tz = {tz_minuteswest = -1015502752, tz_dsttime = 32600}
tdiff = 0
__func__ = "run_actions"
#24 0x0000557db29877f5 in run_top_route (a=0x7f58c37ab1e0, msg=0x7f58c378a860, c=0x0) at
core/action.c:1672
ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = {{__jmpbuf =
{8589934592, -8569901108763165406, 0,
93998360062659, 10, 140019224567664, -8569901108819788510,
-2588824727271113438}, __mask_was_saved = 0,
__saved_mask = {__val = {0, 140019102570805, 11465676010161909248,
140721053251968, 93998359047577,
140019167053808, 11465676010161909248, 140721053251904, 140721053252064,
3216930504704,
11465676010161909248, 8589934592, 8589934592, 0, 93998360062659,
10}}}}}
p = 0x7ffc2c6437e0
ret = 0
sfbk = 0
#25 0x0000557db2afdb6a in receive_msg (
buf=0x7f58bcded648 "SUBSCRIBE sip:test@test.tutpro.com SIP/2.0\r\nRecord-Route:
<sip:127.0.0.1:5070;transport=tcp;r2=on;lr>\r\nRecord-Route:
<sip:192.168.188.215;transport=tcp;r2=on;lr>\r\nVia: SIP/2.0/TCP
127.0.0.1:5070;branc"..., len=749,
rcv_info=0x7f58bcded2b8) at core/receive.c:515
msg = 0x7f58c378a860
ctx = {rec_lev = 0, run_flags = 0, last_retcode = 8, jmp_env = {{__jmpbuf = {749,
140019102569416, 0, 0, 0, 0, 0, 0},
__mask_was_saved = 744767584, __saved_mask = {__val = {0, 93998360062659,
11465676010161909248,
140019224567664, 140019102569120, 0, 93998360062659, 10,
140019224567664, 140721053252704, 93998358424823,
2, 9223372036854775822, 0, 0, 140721053253276}}}}}
bctx = 0x0
ret = 0
tvb = {tv_sec = 0, tv_usec = 0}
tve = {tv_sec = 0, tv_usec = 0}
diff = 0
inb = {
s = 0x7f58bcded648 "SUBSCRIBE sip:test@test.tutpro.com
SIP/2.0\r\nRecord-Route:
<sip:127.0.0.1:5070;transport=tcp;r2=on;lr>\r\nRecord-Route:
<sip:192.168.188.215;transport=tcp;r2=on;lr>\r\nVia: SIP/2.0/TCP
127.0.0.1:5070;branc"..., len = 749}
netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0}
keng = 0x0
evp = {data = 0x7ffc2c6439d0, obuf = {s = 0x0, len = 0}, rcv = 0x7f58bcded2b8, dst
= 0x0, req = 0x0, rpl = 0x0,
rplcode = 0, mode = 0}
cidlockidx = 0
cidlockset = 0
errsipmsg = 0
exectime = 0
__func__ = "receive_msg"
#26 0x0000557db2c3ee6d in receive_tcp_msg (
tcpbuf=0x7f58bcded648 "SUBSCRIBE sip:test@test.tutpro.com
SIP/2.0\r\nRecord-Route:
<sip:127.0.0.1:5070;transport=tcp;r2=on;lr>\r\nRecord-Route:
<sip:192.168.188.215;transport=tcp;r2=on;lr>\r\nVia: SIP/2.0/TCP
127.0.0.1:5070;branc"..., len=749,
rcv_info=0x7f58bcded2b8, con=0x7f58bcded2a0) at core/tcp_read.c:1368
ret = 0
buf = 0x0
bsize = 0
blen = 0
__func__ = "receive_tcp_msg"
#27 0x0000557db2c419f2 in tcp_read_req (con=0x7f58bcded2a0, bytes_read=0x7ffc2c643e98,
read_flags=0x7ffc2c643e9c)
at core/tcp_read.c:1604
bytes = 749
total_bytes = 749
resp = 1
size = 60129542152
req = 0x7f58bcded3c8
dst = {send_sock = 0x7ffc2c643db0, to = {s = {sa_family = 1,
sa_data = "\000\000\000\000\000\000\300=d,\374\177\000"}, sin =
{sin_family = 1, sin_port = 0, sin_addr = {
s_addr = 0}, sin_zero = "\300=d,\374\177\000"}, sin6 =
{sin6_family = 1, sin6_port = 0, sin6_flowinfo = 0,
sin6_addr = {__in6_u = {__u6_addr8 =
"\300=d,\374\177\000\000\030\000\000\000\000\000\000", __u6_addr16 = {
15808, 11364, 32764, 0, 24, 0, 0, 0}, __u6_addr32 = {744766912, 32764,
24, 0}}}, sin6_scope_id = 0},
sas = {ss_family = 1,
__ss_padding =
"\000\000\000\000\000\000\300=d,\374\177\000\000\030", '\000'
<repeats 23 times>,
"\001\000\000\000\000\000\000\000@꣼X\177\000\000\002\000\000\000\000\000\000\000\016\000\000\000\000\000\000\000\320=d,\001\000\000\000@꣼X\177\000\000\320=d,\374\177\000\000\017x²}U\000\000\340>d,\374\177\000\000\b\000\000\000\000\000\000",
__ss_align = 20}},
id = 1, send_flags = {f = 1, blst_imask = 0}, proto = 8 '\b', proto_pad0
= 0 '\000', proto_pad1 = 0}
c = 0 '\000'
ret = -1001422464
__func__ = "tcp_read_req"
#28 0x0000557db2c44ef3 in handle_io (fm=0x7f58c37781f0, events=1, idx=-1) at
core/tcp_read.c:1780
ret = 8
n = 8
read_flags = RD_CONN_SHORT_READ
con = 0x7f58bcded2a0
s = 8
resp = 93998361412288
t = 32600
ee = 0x0
__func__ = "handle_io"
#29 0x0000557db2c30835 in io_wait_loop_epoll (h=0x557db2f102c0 <io_w>, t=2,
repeat=0) at core/io_wait.h:1070
n = 1
r = 0
fm = 0x7f58c37781f0
revents = 1
__func__ = "io_wait_loop_epoll"
#30 0x0000557db2c47e98 in tcp_receive_loop (unix_sock=14) at core/tcp_read.c:1976
__func__ = "tcp_receive_loop"
#31 0x0000557db2c24ab5 in tcp_init_children (woneinit=0x7ffc2c644288) at
core/tcp_main.c:5239
r = 0
i = -1
reader_fd_1 = 14
pid = 0
si_desc = "tcp receiver
(tcp:127.0.0.1:5080)\000d,\374\177\000\000\063)Ų\000\000\000\000\000\024\000\000\000\000\000\000\353\347߲}U\000\000\065\000d,\374\177\000\000\333{ֲ}U\000\000\060Bd,\001\000\000\000@꣼X\177\000\000\060Bd,\374\177\000\000\340\250\336\274\001\000\000\000PBd,\374\177\000\000y}ֲ}U\000"
si = 0x0
__func__ = "tcp_init_children"
#32 0x0000557db2963531 in main_loop () at main.c:1851
i = 0
pid = 342606
si = 0x0
si_desc =
"\210\000۲}U\000\000dR۲}U\000\000@Dd,\374\177\000\000听\262}U\000\000@Dd,\374\177\000\000MV\273\262\b\000\000\000\001\000\000\000\n\000\000\000\000.k_\225C\036\237\000\000\000\000\000\000\000\000\210\000۲}U\000\000\000\000\000\000\000\000\000\000\303jܲ}U\000\000\n\000\000\000\000\000\000\000p_$\304X\177\000\000
Dd,\374\177\000\000\240Ӳ\262}U\000"
nrprocs = 21885
woneinit = 0
__func__ = "main_loop"
#33 0x0000557db296e0e7 in main (argc=17, argv=0x7ffc2c644978) at main.c:3086
cfg_stream = 0x557db4bc02a0
c = -1
r = 0
tmp = 0x7ffc2c644f2e ""
tmp_len = 744768960
port = 32764
proto = 7
ahost = 0x0
aport = 0
options = 0x557db2db3238
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
ret = -1
seed = 3778932495
rfd = 4
debug_save = 0
debug_flag = 0
dont_fork_cnt = 0
n_lst = 0x0
p = 0x0
st = {st_dev = 23, st_ino = 2915, st_nlink = 2, st_mode = 16832, st_uid = 124,
st_gid = 131, __pad0 = 0, st_rdev = 0,
st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 1680936323,
tv_nsec = 265103008}, st_mtim = {
tv_sec = 1680938481, tv_nsec = 693389707}, st_ctim = {tv_sec = 1680949347,
tv_nsec = 257765663},
__glibc_reserved = {0, 0, 0}}
tbuf =
"\002\000\000\000\000\000\000\000\016\000\000\000\000\000\000\200",
'\000' <repeats 112 times>,
"\060\267\062\304X\177\000\000\004\000\000\024\000\000\000\000@\201\063\304X\177",
'\000' <repeats 146 times>...
option_index = 0
long_options = {{name = 0x557db2db5673 "help", has_arg = 0, flag = 0x0,
val = 104}, {name = 0x557db2db04f1 "version",
has_arg = 0, flag = 0x0, val = 118}, {name = 0x557db2db5678 "alias",
has_arg = 1, flag = 0x0, val = 1024}, {
name = 0x557db2db567e "subst", has_arg = 1, flag = 0x0, val = 1025},
{name = 0x557db2db5684 "substdef",
has_arg = 1, flag = 0x0, val = 1026}, {name = 0x557db2db568d
"substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
name = 0x557db2db5697 "server-id", has_arg = 1, flag = 0x0, val =
1028}, {name = 0x557db2db56a1 "loadmodule",
has_arg = 1, flag = 0x0, val = 1029}, {name = 0x557db2db56ac
"modparam", has_arg = 1, flag = 0x0, val = 1030}, {
name = 0x557db2db56b5 "log-engine", has_arg = 1, flag = 0x0, val =
1031}, {name = 0x557db2db56c0 "debug",
has_arg = 1, flag = 0x0, val = 1032}, {name = 0x557db2db56c6
"cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {
name = 0x557db2db56d0 "atexit", has_arg = 1, flag = 0x0, val =
1034}, {name = 0x557db2db56d7 "all-errors",
has_arg = 0, flag = 0x0, val = 1035}, {name = 0x0, has_arg = 0, flag = 0x0,
val = 0}}
__func__ = "main"
[?2004h(gdb) info locals
[?2004l
No locals.
[?2004h(gdb) list
[?2004l
54 in ../../core/trim.h
[?2004h(gdb)
```
Will produce pcap of the SUBSCRIBE message if needed.
--
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/3417
You are receiving this because you are subscribed to this thread.
Message ID: <kamailio/kamailio/issues/3417(a)github.com>