### Description

Latest K master crashes on Debian 11 when handling SUBSCRIBE message.

#### Reproduction

Happens every time in my test and I can thus provide more information if needed.

#### Debugging Data
```
GNU gdb (Debian 10.1-1.7) 10.1.90.20210103-git
Copyright (C) 2021 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Type "show copying" and "show warranty" for details.
This GDB was configured as "x86_64-linux-gnu".
Type "show configuration" for configuration details.
For bug reporting instructions, please see:
<https://www.gnu.org/software/gdb/bugs/>.
Find the GDB manual and other documentation resources online at:
    <http://www.gnu.org/software/gdb/documentation/>.

For help, type "help".
Type "apropos word" to search for commands related to "word"...
Reading symbols from /usr/bin/pres-serv...
[New LWP 342614]
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Core was generated by `/usr/bin/pres-serv -f /etc/pres-serv/pres-serv.cfg -P 
/run/pres-serv/pres-serv.'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007f58c362cad0 in trim_leading (_s=0x7f58bceeb558) at 
../../core/trim.h:59
[?2004h(gdb) bt full
[?2004l
#0  0x00007f58c362cad0 in trim_leading (_s=0x7f58bceeb558) at 
../../core/trim.h:59
No locals.
#1  0x00007f58c362cbc0 in trim (_s=0x7f58bceeb558) at ../../core/trim.h:90
No locals.
#2  0x00007f58c363f51c in print_callid (w=0x7f58bceed731 "", 
dialog=0x7f58c378c350, t=0x7f58bceeb4f0) at t_msgbuilder.c:1531
No locals.
#3  0x00007f58c3640d78 in build_uac_req (method=0x7ffc2c640ae0, 
headers=0x7ffc2c640af0, body=0x0, dialog=0x7f58c378c350, 
    branch=0, t=0x7f58bceeb4f0, len=0x7ffc2c64023c, dst=0x7ffc2c640380) at 
t_msgbuilder.c:1649
        buf = 0x7f58bceed5d0 "NOTIFY 
sip:t...@test.tutpro.com;gr=urn:uuid:9b21c1a8-dc58-a3d6-83d5-7be67cbe70ce 
SIP/2.0\r\nVia: SIP/2.0/TCP 127.0.0.1:5080;branch=z9hG4bK64ba.0bec0511", '0' 
<repeats 24 times>, ".0\r\nTo: <sip:t...@test.tutp"...
        w = 0x7f58bceed714 "\r\nCall-ID: ab92759f23a9d95b\r\n"
        p = 0x0
        content_length = {s = 0x7f58c36f77c8 <content_length> "0", len = 1}
        cseq = {s = 0x7f58c36f77e0 <cseq> "2", len = 1}
        via = {
          s = 0x7f58c378c590 "Via: SIP/2.0/TCP 
127.0.0.1:5080;branch=z9hG4bK64ba.0bec0511", '0' <repeats 24 times>, ".0\r\n", 
          len = 87}
        maxfwd_len = 0
        tbracket = 1
        fbracket = 1
        fromtag = {s = 0x0, len = 0}
        loc_tag = {s = 0x0, len = 0}
        __func__ = "build_uac_req"
#4  0x00007f58c36b9e34 in t_uac_prepare (uac_r=0x7ffc2c640b40, 
dst_req=0x7ffc2c640498, dst_cell=0x7ffc2c6404a0) at uac.c:541
        dst = {send_sock = 0x7f58c3795bb0, to = {s = {sa_family = 2, 
              sa_data = 
"\023\316\177\000\000\001\000\000\000\000\000\000\000"}, sin = {sin_family = 2, 
sin_port = 52755, 
              sin_addr = {s_addr = 16777343}, sin_zero = 
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 2, 
              sin6_port = 52755, sin6_flowinfo = 16777343, sin6_addr = {__in6_u 
= {__u6_addr8 = '\000' <repeats 15 times>, 
                  __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 
0, 0}}}, sin6_scope_id = 0}, sas = {
              ss_family = 2, __ss_padding = "\023\316\177\000\000\001", '\000' 
<repeats 111 times>, __ss_align = 0}}, id = 0, 
          send_flags = {f = 4, blst_imask = 0}, proto = 2 '\002', proto_pad0 = 
0 '\000', proto_pad1 = 0}
        new_cell = 0x7f58bceeb4f0
        request = 0x7f58bceeb7c0
        buf = 0x0
        buf_len = 665
        ret = -1
        hi = 43846
        is_ack = 0
        lifetime = 512
        nhtype = 256
        snd_flags = {f = 4, blst_imask = 0}
        backup_xd = {uri_avps_from = 0x7f58bcee78a0, uri_avps_to = 
0x7f58bcee78a8, user_avps_from = 0x7f58bcee78b0, 
          user_avps_to = 0x7f58bcee78b8, domain_avps_from = 0x557db2f646c0 
<def_list+32>, 
          domain_avps_to = 0x557db2f646c8 <def_list+40>, xavps_list = 
0x7f58bcee78d0, xavus_list = 0x7f58bcee78d8, 
          xavis_list = 0x7f58bcee78e0}
        local_xd = {uri_avps_from = 0x0, uri_avps_to = 0x0, user_avps_from = 
0x0, user_avps_to = 0x0, domain_avps_from = 0x0, 
          domain_avps_to = 0x0, xavps_list = 0x0, xavus_list = 0x0, xavis_list 
= 0x0}
        refresh_shortcuts = 0
        sip_msg_len = 0
        lreq = {id = 0, pid = 0, tval = {tv_sec = 0, tv_usec = 0}, 
fwd_send_flags = {f = 0, blst_imask = 0}, 
          rpl_send_flags = {f = 0, blst_imask = 0}, first_line = {type = 0, 
flags = 0, len = 0, u = {request = {method = {
                  s = 0x0, len = 0}, uri = {s = 0x0, len = 0}, version = {s = 
0x0, len = 0}, method_value = 0}, reply = {
                version = {s = 0x0, len = 0}, status = {s = 0x0, len = 0}, 
reason = {s = 0x0, len = 0}, statuscode = 0}}}, 
          via1 = 0x0, via2 = 0x0, headers = 0x0, last_header = 0x0, parsed_flag 
= 0, h_via1 = 0x0, h_via2 = 0x0, 
          callid = 0x0, to = 0x0, cseq = 0x0, from = 0x0, contact = 0x0, 
maxforwards = 0x0, route = 0x0, record_route = 0x0, 
          content_type = 0x0, content_length = 0x0, authorization = 0x0, 
expires = 0x0, proxy_auth = 0x0, supported = 0x0, 
          require = 0x0, proxy_require = 0x0, unsupported = 0x0, allow = 0x0, 
event = 0x0, accept = 0x0, 
          accept_language = 0x0, organization = 0x0, priority = 0x0, subject = 
0x0, user_agent = 0x0, server = 0x0, 
          content_disposition = 0x0, diversion = 0x0, rpid = 0x0, refer_to = 
0x0, session_expires = 0x0, min_se = 0x0, 
          sipifmatch = 0x0, subscription_state = 0x0, date = 0x0, identity = 
0x0, identity_info = 0x0, pai = 0x0, ppi = 0x0, 
          path = 0x0, privacy = 0x0, min_expires = 0x0, body = 0x0, eoh = 0x0, 
unparsed = 0x0, rcv = {src_ip = {af = 0, 
              len = 0, u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 
0, 0, 0, 0, 0, 0, 0}, 
                addr = '\000' <repeats 15 times>}}, dst_ip = {af = 0, len = 0, 
u = {addrl = {0, 0}, addr32 = {0, 0, 0, 0}, 
                addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, addr = '\000' <repeats 15 
times>}}, src_port = 0, dst_port = 0, 
            proto_reserved1 = 0, proto_reserved2 = 0, src_su = {s = {sa_family 
= 0, sa_data = '\000' <repeats 13 times>}, 
              sin = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, 
sin_zero = "\000\000\000\000\000\000\000"}, 
              sin6 = {sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, 
sin6_addr = {__in6_u = {
                    __u6_addr8 = '\000' <repeats 15 times>, __u6_addr16 = {0, 
0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 0, 
                      0}}}, sin6_scope_id = 0}, sas = {ss_family = 0, 
__ss_padding = '\000' <repeats 117 times>, 
                __ss_align = 0}}, bind_address = 0x0, rflags = 0, proto = 0 
'\000', proto_pad0 = 0 '\000', proto_pad1 = 0}, 
          buf = 0x0, len = 0, new_uri = {s = 0x0, len = 0}, dst_uri = {s = 0x0, 
len = 0}, parsed_uri_ok = 0, parsed_uri = {
            user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, host = {s = 
0x0, len = 0}, port = {s = 0x0, len = 0}, 
            params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, 
headers = {s = 0x0, len = 0}, port_no = 0, 
            proto = 0, type = ERROR_URI_T, flags = 0, transport = {s = 0x0, len 
= 0}, ttl = {s = 0x0, len = 0}, user_param = {
              s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = {s = 0x0, 
len = 0}, lr = {s = 0x0, len = 0}, r2 = {
              s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s = 
0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, 
            user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 
0}, method_val = {s = 0x0, len = 0}, lr_val = {
              s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 
0x0, len = 0}}, parsed_orig_ruri_ok = 0, 
          parsed_orig_ruri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len 
= 0}, host = {s = 0x0, len = 0}, port = {
              s = 0x0, len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 
0x0, len = 0}, headers = {s = 0x0, len = 0}, 
            port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = 
{s = 0x0, len = 0}, ttl = {s = 0x0, len = 0}, 
            user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method 
= {s = 0x0, len = 0}, lr = {s = 0x0, 
              len = 0}, r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, 
transport_val = {s = 0x0, len = 0}, ttl_val = {
              s = 0x0, len = 0}, user_param_val = {s = 0x0, len = 0}, maddr_val 
= {s = 0x0, len = 0}, method_val = {s = 0x0, 
              len = 0}, lr_val = {s = 0x0, len = 0}, r2_val = {s = 0x0, len = 
0}, gr_val = {s = 0x0, len = 0}}, add_rm = 0x0, 
          body_lumps = 0x0, reply_lump = 0x0, add_to_branch_s = '\000' <repeats 
57 times>, add_to_branch_len = 0, 
          hash_index = 0, msg_flags = 0, flags = 0, xflags = {0, 0}, 
set_global_address = {s = 0x0, len = 0}, 
          set_global_port = {s = 0x0, len = 0}, force_send_socket = 0x0, 
path_vec = {s = 0x0, len = 0}, instance = {s = 0x0, 
            len = 0}, reg_id = 0, ruid = {s = 0x0, len = 0}, location_ua = {s = 
0x0, len = 0}, otcpid = 0, ldv = {flow = {
              decoded = 0, rcv = {src_ip = {af = 0, len = 0, u = {addrl = {0, 
0}, addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 
                      0, 0, 0, 0, 0}, addr = '\000' <repeats 15 times>}}, 
dst_ip = {af = 0, len = 0, u = {addrl = {0, 0}, 
                    addr32 = {0, 0, 0, 0}, addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, 
addr = '\000' <repeats 15 times>}}, 
                src_port = 0, dst_port = 0, proto_reserved1 = 0, 
proto_reserved2 = 0, src_su = {s = {sa_family = 0, 
                    sa_data = '\000' <repeats 13 times>}, sin = {sin_family = 
0, sin_port = 0, sin_addr = {s_addr = 0}, 
                    sin_zero = "\000\000\000\000\000\000\000"}, sin6 = 
{sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, 
                    sin6_addr = {__in6_u = {__u6_addr8 = '\000' <repeats 15 
times>, __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, 
                        __u6_addr32 = {0, 0, 0, 0}}}, sin6_scope_id = 0}, sas = 
{ss_family = 0, 
                    __ss_padding = '\000' <repeats 117 times>, __ss_align = 
0}}, bind_address = 0x0, rflags = 0, 
                proto = 0 '\000', proto_pad0 = 0 '\000', proto_pad1 = 0}}, 
vdata = 0x0}}
        __func__ = "t_uac_prepare"
#5  0x00007f58c36bd786 in t_uac_with_ids (uac_r=0x7ffc2c640b40, ret_index=0x0, 
ret_label=0x0) at uac.c:757
        request = 0x7ffc2c6404e0
        cell = 0x557db2c892af <split_frag+201>
        ret = 1026
        is_ack = 0
        branch_ret = 980445555
        i = 0
        added_branches = 1
#6  0x00007f58c36bd743 in t_uac (uac_r=0x7ffc2c640b40) at uac.c:739
No locals.
#7  0x00007f58c36c00b9 in req_within (uac_r=0x7ffc2c640b40) at uac.c:986
        ret = -1015496328
        nbuf = "\200\365\352\262}U\000\000`\252x\303X\177", '\000' <repeats 26 
times>, 
"\300\017d,\374\177\000\000\000\000\000\000\000\000\000\000\360\223\336\274X\177\000\000`\301x\303X\177\000\000\030",
 '\000' <repeats 19 times>, "\377\377\377\377", '\000' <repeats 12 times>, 
"\361\001\000\000\002\004\000\000\017\000\000\000\b\ad,\374\177\000\000\000\000\000\000\000\000\020\201\020\220s\303X\177\000\000\002\004\000\000\017\000\000\000\230\006d,\374\177\000\000vxȲ}U\000\000\200\305x\303X\177\000\000\020\220s\303X\177\000\000p\305x\303X\177\000\000\020\220s\303\002\004\000\000\240\060"...
        dbuf = '\000' <repeats 12 times>, 
"\002\000\000\000\000\000\000\000\b\000\000\000k\245\361\302X\177\000\000\n\000\000\000\000\000\000\000\000.k_\225C\036\237\300\td,\374\177\000\000\304\351\344\302X\177\000\000\231BѲ}U\000\000\370\006d,-\000\000"
        ouri = {s = 0x0, len = 0}
        nuri = {s = 0x0, len = 0}
        duri = {s = 0x0, len = 0}
        __func__ = "req_within"
#8  0x00007f58c2e633c7 in send_notify_request (subs=0x7ffc2c640ef0, 
watcher_subs=0x0, n_body=0x0, force_null_body=0)
    at notify.c:1727
        td = 0x7f58c378c350
        met = {s = 0x7f58c2f1d934 "NOTIFY", len = 6}
        str_hdr = {
          s = 0x7f58c378c290 "Max-Forwards: 70\r\nEvent: 
message-summary\r\nContact: 
<sip:127.0.0.1:5080;transport=tcp>\r\nSubscription-State: 
active;expires=600\r\n", len = 127}
        notify_body = 0x0
        result = 0
        cb_param = 0x7f58bceeb1e0
        final_body = 0x0
        uac_r = {method = 0x7ffc2c640ae0, headers = 0x7ffc2c640af0, body = 0x0, 
ssock = 0x0, ssockname = 0x0, 
          dialog = 0x7f58c378c350, cb_flags = 1024, cb = 0x7f58c2e66091 
<p_tm_callback>, cbp = 0x7f58bceeb1e0, callid = 0x0}
        aux_body = 0x0
        backup_subs = 0x0
        __func__ = "send_notify_request"
#9  0x00007f58c2e64c61 in notify (subs=0x7ffc2c640ef0, watcher_subs=0x0, 
n_body=0x0, force_null_body=0, 
    aux_body_processing=0x0) at notify.c:1818
        aux_body = 0x0
        __func__ = "notify"
#10 0x00007f58c2ef234c in update_subscription (msg=0x7f58c378a860, 
subs=0x7ffc2c640ef0, to_tag_gen=1, 
    sent_reply=0x7ffc2c640e1c) at subscribe.c:685
        hash_code = 233
        reply_code = 200
        __func__ = "update_subscription"
#11 0x00007f58c2efa30b in handle_subscribe (msg=0x7f58c378a860, 
watcher_user=..., watcher_domain=...) at subscribe.c:1222
        to_tag_gen = 1
        subs = {pres_uri = {s = 0x7f58c378c160 "sip:t...@test.tutpro.com", len 
= 24}, to_user = {
            s = 0x7f58bcded823 "t...@test.tutpro.com>\r\nFrom: 
<sip:t...@test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID: 
ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 
(x86_64/Linux)\r\nEvent: message-summary\r\nExpir"..., 
            len = 4}, to_domain = {
            s = 0x7f58bcded828 "test.tutpro.com>\r\nFrom: 
<sip:t...@test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID: 
ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 
(x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 6"..., 
            len = 15}, from_user = {
            s = 0x7f58bcded845 
"t...@test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID: 
ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 
(x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept: 
application/simpl"..., 
            len = 4}, from_domain = {
            s = 0x7f58bcded84a 
"test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID: ab92759f23a9d95b\r\nCSeq: 
56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent: 
message-summary\r\nExpires: 600\r\nAccept: application/simple-mes"..., 
            len = 15}, watcher_user = {
            s = 0x7f58bcded845 
"t...@test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID: 
ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 
(x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept: 
application/simpl"..., 
            len = 4}, watcher_domain = {
            s = 0x7f58bcded84a 
"test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID: ab92759f23a9d95b\r\nCSeq: 
56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent: 
message-summary\r\nExpires: 600\r\nAccept: application/simple-mes"..., 
            len = 15}, event = 0x7f58bcde93f0, event_id = {s = 0x0, len = 0}, 
to_tag = {
            s = 0x7f58c36f7840 <tm_tags> 
"48b5b8952e8d0bca6256941910840e90-96b46351", len = 41}, from_tag = {
            s = 0x7f58bcded85f "a0d5083649726799\r\nCall-ID: 
ab92759f23a9d95b\r\nCSeq: 56572 SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 
(x86_64/Linux)\r\nEvent: message-summary\r\nExpires: 600\r\nAccept: 
application/simple-message-summary\r\nContent"..., 
            len = 16}, callid = {
            s = 0x7f58bcded87a "ab92759f23a9d95b\r\nCSeq: 56572 
SUBSCRIBE\r\nUser-Agent: baresip v3.0.0 (x86_64/Linux)\r\nEvent: 
message-summary\r\nExpires: 600\r\nAccept: 
application/simple-message-summary\r\nContent-Length: 0\r\n\r\n", len = 16}, 
          sockinfo_str = {s = 0x7f58c376f580 "tcp:127.0.0.1:5080", len = 18}, 
remote_cseq = 56572, local_cseq = 1, contact = {
            s = 0x7f58bcded7bc 
"sip:t...@test.tutpro.com;gr=urn:uuid:9b21c1a8-dc58-a3d6-83d5-7be67cbe70ce>\r\nMax-Forwards:
 69\r\nTo: <sip:t...@test.tutpro.com>\r\nFrom: 
<sip:t...@test.tutpro.com>;tag=a0d5083649726799\r\nCall-ID: ab92759f23"..., 
            len = 73}, local_contact = {s = 0x7f58c37a8db0 
"sip:127.0.0.1:5080;transport=tcp", len = 32}, record_route = {
            s = 0x7f58c378c0e0 
"<sip:127.0.0.1:5070;transport=tcp;r2=on;lr>,<sip:192.168.188.215;transport=tcp;r2=on;lr>",
 
            len = 88}, expires = 600, status = 1, reason = {s = 0x0, len = 0}, 
version = 1, send_on_cback = 0, db_flag = 4, 
          auth_rules_doc = 0x0, recv_event = 1, internal_update_flag = 0, 
updated = -1, updated_winfo = -1, flags = 0, 
          user_agent = {
            s = 0x7f58bcded8af "baresip v3.0.0 (x86_64/Linux)\r\nEvent: 
message-summary\r\nExpires: 600\r\nAccept: 
application/simple-message-summary\r\nContent-Length: 0\r\n\r\n", len = 29}, 
next = 0x0}
        event = 0x7f58bcde93f0
        parsed_event = 0x7f58c378bea0
        ev_param = 0x0
        found = 0
        reason = {s = 0x0, len = 0}
        uri = {user = {s = 0x3a70697300000000 <error: Cannot access memory at 
address 0x3a70697300000000>, 
            len = -1295176907}, passwd = {s = 0x7ffc2c641120 "", len = 
744755408}, host = {
            s = 0x7ffc2c6411e0 "\220\022d,\374\177", len = -1296286244}, port = 
{s = 0x7ffc2c641140 "", len = -1126246326}, 
          params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 0}, headers 
= {s = 0x0, len = -1126246311}, 
          port_no = 55526, proto = 48350, type = 32600, flags = 
(URI_USER_NORMALIZE | URI_SIP_USER_PHONE | unknown: 0x4), 
          transport = {s = 0x0, len = 0}, ttl = {s = 0xe <error: Cannot access 
memory at address 0xe>, len = -1126246170}, 
          user_param = {s = 0xffffffff00000007 <error: Cannot access memory at 
address 0xffffffff00000007>, 
            len = -1015502752}, maddr = {s = 0x0, len = 1600859648}, method = 
{s = 0x0, len = 0}, lr = {s = 0x0, 
            len = 1600859648}, r2 = {s = 0x7 <error: Cannot access memory at 
address 0x7>, len = 0}, gr = {s = 0x0, 
            len = -1294177597}, transport_val = {s = 0xa <error: Cannot access 
memory at address 0xa>, len = -1004249232}, 
          ttl_val = {s = 0x7ffc2c641210 "\300\022d,\374\177", len = 
-1295182985}, user_param_val = {
            s = 0x7f58c37af8a0 ":\001", len = -1015502752}, maddr_val = {s = 
0x0, len = -1015497648}, method_val = {
            s = 0x100000000 <error: Cannot access memory at address 
0x100000000>, len = 0}, lr_val = {s = 0x0, 
            len = 1600859648}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, 
len = -1294177597}}
        reply_code = 500
        reply_str = {s = 0x7f58c2f2dd5f "Server Internal Error", len = 21}
        sent_reply = 1
        __func__ = "handle_subscribe"
#12 0x00007f58c2ef596a in handle_subscribe0 (msg=0x7f58c378a860) at 
subscribe.c:999
        pfrom = 0x7f58c378bc50
        __func__ = "handle_subscribe0"
#13 0x0000557db29781e3 in do_action (h=0x7ffc2c641b40, a=0x7f58c37b2c50, 
msg=0x7f58c378a860) at core/action.c:1081
        ret = -5
        li = 0
        v = 0
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = '\000' 
<repeats 13 times>}, sin = {sin_family = 0, 
              sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = 
"\000\000\000\000\000\000\000"}, sin6 = {sin6_family = 0, 
              sin6_port = 0, sin6_flowinfo = 0, sin6_addr = {__in6_u = 
{__u6_addr8 = '\000' <repeats 15 times>, 
                  __u6_addr16 = {0, 0, 0, 0, 0, 0, 0, 0}, __u6_addr32 = {0, 0, 
0, 0}}}, sin6_scope_id = 0}, sas = {
              ss_family = 0, __ss_padding = '\000' <repeats 117 times>, 
__ss_align = 0}}, id = 0, send_flags = {f = 0, 
            blst_imask = 0}, proto = 0 '\000', proto_pad0 = 0 '\000', 
proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x7f58c379c6a0
        len = 0
        user = 0
        uri = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 128}, host = 
{s = 0x0, len = 0}, port = {s = 0x0, 
            len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 
0}, headers = {s = 0x0, len = 0}, 
          port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s 
= 0x0, len = 0}, ttl = {s = 0x0, len = 0}, 
          user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = 
{s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, 
          r2 = {s = 0x0, len = 0}, gr = {s = 0x0, len = 0}, transport_val = {s 
= 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, 
          user_param_val = {s = 0x0, len = 0}, maddr_val = {s = 0x0, len = 0}, 
method_val = {s = 0x0, len = 0}, lr_val = {
            s = 0x0, len = 0}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, 
len = 0}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 0}, 
host = {s = 0x0, len = 0}, port = {s = 0x0, 
            len = 0}, params = {s = 0x0, len = 0}, sip_params = {s = 0x0, len = 
0}, headers = {s = 0x0, len = 0}, 
          port_no = 0, proto = 0, type = ERROR_URI_T, flags = 0, transport = {s 
= 0x0, len = 0}, ttl = {s = 0x0, len = 0}, 
          user_param = {s = 0x0, len = 0}, maddr = {s = 0x0, len = 0}, method = 
{s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, 
          r2 = {s = 0x0, len = 1600859648}, gr = {s = 0x0, len = 0}, 
transport_val = {s = 0x0, len = -1294177597}, ttl_val = {
            s = 0xa <error: Cannot access memory at address 0xa>, len = 
-1004249232}, user_param_val = {
            s = 0x7ffc2c641980 "\240\032d,\374\177", len = -1298632837}, 
maddr_val = {s = 0x0, len = 0}, method_val = {
            s = 0x0, len = 0}, lr_val = {s = 0x0, len = -1015502752}, r2_val = 
{s = 0x7f58c37af8a0 ":\001", len = 744757696}, 
          gr_val = {s = 0x0, len = 0}}
        u = 0x0
        port = 0
        dst_host = 0x0
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 
0x0}, avp = 0x0}
        sct = 0x0
        sjt = 0x0
        rve = 0x0
        mct = 0x0
        rv = 0x0
        rv1 = 0x0
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 0, s = {s = 0x0, len = 0}, re = 0x0}, 
            pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' 
<repeats 21 times>}
        s = {s = 0x0, len = 0}
        srevp = {0x0, 0x0}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = 
{number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#14 0x0000557db2986f7b in run_actions (h=0x7ffc2c641b40, a=0x7f58c37b2c50, 
msg=0x7f58c378a860) at core/action.c:1587
        t = 0x7f58c37b2c50
        ret = -1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1749943006, tz_dsttime = -1995335592}
        tdiff = 1
        __func__ = "run_actions"
#15 0x0000557db29876e9 in run_actions_safe (h=0x7ffc2c6437e0, a=0x7f58c37b2c50, 
msg=0x7f58c378a860) at core/action.c:1651
        ctx = {rec_lev = 1, run_flags = 0, last_retcode = 0, jmp_env = 
{{__jmpbuf = {8589934592, -8569901109723661022, 0, 
                93998360062659, 10, 140019224567664, -8569901109662843614, 
-2588824727271113438}, __mask_was_saved = 0, 
              __saved_mask = {__val = {0, 0, 11465676010161909248, 0, 
8589934592, 0, 93998360062659, 10, 140019224567664, 
                  140721053244768, 93998357479355, 0, 0, 0, 0, 
140019213466032}}}}}
        ret = -1
        ign_on_break = 0
#16 0x0000557db2b4a950 in rval_get_long (h=0x7ffc2c6437e0, msg=0x7f58c378a860, 
i=0x7ffc2c642058, rv=0x7f58c37b2f78, cache=0x0)
    at core/rvalue.c:955
        r_avp = 0x0
        avp_val = {n = 0, s = {s = 0x0, len = 0}, re = 0x0}
        pval = {rs = {s = 0x400000000 <error: Cannot access memory at address 
0x400000000>, len = 744759384}, ri = 0, 
          flags = 0}
        tmp = {s = 0x7f58c37a5a98 "'\265\254\300X\177", len = 1}
        s = 0x0
        r = 0
        ret = 0
        destroy_pval = 0
        __func__ = "rval_get_long"
#17 0x0000557db2b4ffbb in rval_expr_eval_long (h=0x7ffc2c6437e0, 
msg=0x7f58c378a860, res=0x7ffc2c642058, rve=0x7f58c37b2f70)
    at core/rvalue.c:1855
        i1 = 1
        i2 = 0
        ret = -1
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 0, s = {s = 0x0, len = 0}, re = 0x0}, 
            pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' 
<repeats 21 times>}
        c2 = {cache_type = RV_CACHE_EMPTY, val_type = RV_NONE, c = {avp_val = 
{n = 0, s = {s = 0x0, len = 0}, re = 0x0}, 
            pval = {rs = {s = 0x0, len = 0}, ri = 0, flags = 0}}, i2s = '\000' 
<repeats 21 times>}
        rv1 = 0x0
        rv2 = 0x0
        __func__ = "rval_expr_eval_long"
#18 0x0000557db2977c13 in do_action (h=0x7ffc2c6437e0, a=0x7f58c37b3be0, 
msg=0x7f58c378a860) at core/action.c:1057
        ret = -5
        li = 0
        v = 0
        dst = {send_sock = 0x7f58c36c1260, to = {s = {sa_family = 0, 
              sa_data = 
"\000\000\000\000\000\000\377\377\377\377\000\000\000"}, sin = {sin_family = 0, 
sin_port = 0, 
              sin_addr = {s_addr = 0}, sin_zero = 
"\377\377\377\377\000\000\000"}, sin6 = {sin6_family = 0, sin6_port = 0, 
              sin6_flowinfo = 0, sin6_addr = {__in6_u = {__u6_addr8 = 
"\377\377\377\377\000\000\000\000`\250x\303X\177\000", 
                  __u6_addr16 = {65535, 65535, 0, 0, 43104, 50040, 32600, 0}, 
__u6_addr32 = {4294967295, 0, 3279464544, 
                    32600}}}, sin6_scope_id = 0}, sas = {ss_family = 0, 
              __ss_padding = 
"\000\000\000\000\000\000\377\377\377\377\000\000\000\000`\250x\303X\177", 
'\000' <repeats 14 times>, 
"\060\000\000\000\000\000\000\000\374\177\000\000\220*d,\374\177\000\000\300Ez\303X\177",
 '\000' <repeats 18 times>, 
"\063\331\336\274X\177\000\000\000\000\000\000\000\000\000\000\220\262x\303X\177\000\000P\274x\303X\177\000\000\063\331\336\274X\177\000",
 __ss_align = 140721053247080}}, id = 24, send_flags = {f = 48, blst_imask = 
0}, proto = 0 '\000', 
          proto_pad0 = 0 '\000', proto_pad1 = 0}
        tmp = 0x0
        new_uri = 0x0
        end = 0x0
        crt = 0x0
        cmd = 0x0
        len = 0
        user = 0
        uri = {user = {s = 0x0, len = 1600859648}, passwd = {s = 0x0, len = 0}, 
host = {s = 0x0, len = -1294177597}, port = {
            s = 0xa <error: Cannot access memory at address 0xa>, len = 
-1004249232}, params = {
            s = 0x7ffc2c642340 "`$d,\374\177", len = -1298632837}, sip_params = 
{s = 0x0, len = 0}, headers = {s = 0x0, 
            len = 0}, port_no = 0, proto = 0, type = ERROR_URI_T, flags = 
(unknown: 0xc378a860), transport = {
            s = 0x7f58c37aee00 "9\001", len = 744760192}, ttl = {s = 0x0, len = 
0}, user_param = {
            s = 0x400000000 <error: Cannot access memory at address 
0x400000000>, len = -1293767226}, maddr = {s = 0x0, 
            len = 1600859648}, method = {s = 0x0, len = 0}, lr = {s = 0x0, len 
= 0}, r2 = {s = 0x0, len = 1600859648}, gr = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = 
-1015497744}, transport_val = {s = 0x7f58bcded935 "", 
            len = -1126246112}, ttl_val = {s = 0x1100000000 <error: Cannot 
access memory at address 0x1100000000>, len = 0}, 
          user_param_val = {s = 0x0, len = 744760220}, maddr_val = {s = 
0x7f58bcded935 "", len = -1126246096}, method_val = {
            s = 0x100000000 <error: Cannot access memory at address 
0x100000000>, len = 0}, lr_val = {s = 0x0, 
            len = -1126246093}, r2_val = {s = 0x0, len = 0}, gr_val = {s = 0x0, 
len = 1600859648}}
        next_hop = {user = {s = 0x0, len = 0}, passwd = {s = 0x0, len = 
-1294177597}, host = {
            s = 0xa <error: Cannot access memory at address 0xa>, len = 
1600859648}, port = {
            s = 0x7ffc2c642340 "`$d,\374\177", len = 0}, params = {s = 0x0, len 
= -1294177597}, sip_params = {
            s = 0xa <error: Cannot access memory at address 0xa>, len = 
-1004249232}, headers = {
            s = 0x7ffc2c642460 "\240%d,\374\177", len = -1298630935}, port_no = 
1026, proto = 0, type = 15, 
          flags = (unknown: 0xc378a860), transport = {s = 0x7f58c37aee00 
"9\001", len = 744765408}, ttl = {
            s = 0x7f58c3739010 "\001", len = 0}, user_param = {s = 0x0, len = 
1}, maddr = {
            s = 0x200000000 <error: Cannot access memory at address 
0x200000000>, len = -500040414}, method = {s = 0x0, 
            len = -1294177597}, lr = {s = 0xa <error: Cannot access memory at 
address 0xa>, len = -1004249232}, r2 = {
            s = 0x89119858e7d1fd22 <error: Cannot access memory at address 
0x89119858e7d1fd22>, len = 1900150050}, gr = {
            s = 0x7ffc00000000 <error: Cannot access memory at address 
0x7ffc00000000>, len = 0}, transport_val = {s = 0x0, 
            len = -1126246091}, ttl_val = {s = 0x1 <error: Cannot access memory 
at address 0x1>, len = -1127264656}, 
          user_param_val = {s = 0x0, len = -1015500416}, maddr_val = {s = 
0x7f58bccf4e70 "pv\356\274X\177", 
            len = -1017465335}, method_val = {s = 0x1c431c180 <error: Cannot 
access memory at address 0x1c431c180>, 
            len = -1127264640}, lr_val = {s = 0x7ffc2c642460 "\240%d,\374\177", 
len = -1017465064}, r2_val = {s = 0x0, 
            len = -1127264640}, gr_val = {s = 0x7ffc2c642470 "\240$d,\374\177", 
len = 1600859648}}
        u = 0x0
        port = 0
        dst_host = 0x0
        i = 0
        flags = 0
        avp = 0x0
        st = {flags = 0, id = 0, name = {n = 0, s = {s = 0x0, len = 0}, re = 
0x0}, avp = 0x0}
        sct = 0x0
        sjt = 0x0
        rve = 0x7f58c37b2f70
        mct = 0x0
        rv = 0x0
        rv1 = 0x0
        c1 = {cache_type = 744760480, val_type = 32764, c = {avp_val = {n = 
140019101552256, s = {s = 0x7f58bccf4e80 "", 
                len = 744760480}, re = 0x7f58bccf4e80}, pval = {rs = {s = 
0x7f58bccf4e80 "", len = 744760480}, ri = 0, 
              flags = -1015352952}}, i2s = 
"\230(d,\374\177\000\000`\250x\303X\177\000\000\340\067d,\374\177"}
        s = {s = 0x0, len = 0}
        srevp = {0x7ffc2c6425a0, 0x557db2b4a950 <rval_get_long+424>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = 
{number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#19 0x0000557db2986f7b in run_actions (h=0x7ffc2c6437e0, a=0x7f58c37b0f10, 
msg=0x7f58c378a860) at core/action.c:1587
        t = 0x7f58c37b3be0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = 744762544, tz_dsttime = 32764}
        tdiff = 744765408
        __func__ = "run_actions"
#20 0x0000557db297814c in do_action (h=0x7ffc2c6437e0, a=0x7f58c37b40a0, 
msg=0x7f58c378a860) at core/action.c:1072
        ret = 1
        li = 16384
        v = 1
        dst = {send_sock = 0x0, to = {s = {sa_family = 0, sa_data = 
"\000\000\000\000\000\000p\264Q\303X\177\000"}, sin = {
              sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = 
"p\264Q\303X\177\000"}, sin6 = {
              sin6_family = 0, sin6_port = 0, sin6_flowinfo = 0, sin6_addr = 
{__in6_u = {
                  __u6_addr8 = "p\264Q\303X\177\000\000\200\254Q\303X\177\000", 
__u6_addr16 = {46192, 50001, 32600, 0, 44160, 
                    50001, 32600, 0}, __u6_addr32 = {3276911728, 32600, 
3276909696, 32600}}}, sin6_scope_id = 0}, sas = {
              ss_family = 0, 
              __ss_padding = 
"\000\000\000\000\000\000p\264Q\303X\177\000\000\200\254Q\303X\177\000\000\000\000\000\000\000\000\000\000\360\370{\303X\177\000\000\200\000U\303X\177\000\000\360\363v\303X\177\000\000\000\000\000\000\000\000\000\000\025\000\000\000\000\000\000\000\001\000\000\000\001\000\000\000\000q\035\304X\177\000\000\240\rU\303X\177\000\000\240\rU\303X\177\000\000\360\370{\303X\177\000\000+\305Q\303X\177\000",
 __ss_align = 2}}, id = 0, send_flags = {f = 0, blst_imask = 0}, 
          proto = -112 '\220', proto_pad0 = 49 '1', proto_pad1 = 11364}
        tmp = 0x7f58c351c38e 
"H\203\370\377t\334H\203\304\030[A\\A]A^A_]\303\017\037D"
        new_uri = 0x7f58c3528966 <mysql_get_parameters+1606> 
"I\211\307H\215\005(\222\002"
        end = 0x557db4c94ae0 ""
        crt = 0x7ffc2c642910 "\340)d,\374\177"
        cmd = 0x7f58c37977d8
        len = 909670447
        user = 791950943
        uri = {user = {s = 0x7ffc2c642aa0 
"M\224\236\231q\202\257\bz\300Q\303X\177", len = 1600859648}, passwd = {
            s = 0x7ffc2c6429f8 "\365Jɴ}U", len = 0}, host = {s = 0x0, len = 
-1294177597}, port = {
            s = 0xa <error: Cannot access memory at address 0xa>, len = 
-1004249232}, params = {
            s = 0x7ffc2c642b80 "\240,d,\374\177", len = -1298632837}, 
sip_params = {s = 0x557db4c94af5 "", 
            len = -1261876491}, headers = {s = 0x557db4c8da80 "P\337ȴ}U", len = 
-1261905344}, port_no = 55896, 
          proto = 46280, type = 21885, flags = (unknown: 0xc378a860), transport 
= {s = 0x7f58c37aa720 "\031\001", 
            len = 744762304}, ttl = {s = 0x7ffc2c642aa0 
"M\224\236\231q\202\257\bz\300Q\303X\177", len = -1018018493}, 
          user_param = {s = 0x7f58c37c0120 "\200\310ȴ}U", len = 744761960}, 
maddr = {s = 0x0, len = -1018054899}, method = {
            s = 0x0, len = 0}, lr = {s = 0x0, len = 0}, r2 = {
            s = 0xefcdab8998badcfe <error: Cannot access memory at address 
0xefcdab8998badcfe>, len = 1732584193}, gr = {
            s = 0x1d7439068d9a78b7 <error: Cannot access memory at address 
0x1d7439068d9a78b7>, len = 1369412067}, 
          transport_val = {s = 0x8af8271999e944d <error: Cannot access memory 
at address 0x8af8271999e944d>, 
            len = -1018052486}, ttl_val = {
            s = 0x1ecd4f10aea434b8 <error: Cannot access memory at address 
0x1ecd4f10aea434b8>, len = 6}, user_param_val = {
            s = 0x6 <error: Cannot access memory at address 0x6>, len = 
-1261860112}, maddr_val = {
            s = 0x4000 <error: Cannot access memory at address 0x4000>, len = 
2000}, method_val = {
            s = 0x7ffc2c642b30 "\220+d,\374\177", len = -1018051698}, lr_val = 
{s = 0x7ffc2c642b50 " ,d,\374\177", 
            len = -1261914352}, r2_val = {s = 0x8 <error: Cannot access memory 
at address 0x8>, len = 0}, gr_val = {
            s = 0x557db4c8b6a0 "\020\267ȴ}U", len = -1261860112}}
        next_hop = {user = {s = 0x4000 <error: Cannot access memory at address 
0x4000>, len = -1}, passwd = {
            s = 0x7ffc2c642b90 "\001", len = -1018001050}, host = {s = 
0x557db4c9cb00 "", len = 1600859648}, port = {
            s = 0x7ffc2c642c20 "\360\370{\303X\177", len = 0}, params = {s = 
0x0, len = -1294177597}, sip_params = {
            s = 0xa <error: Cannot access memory at address 0xa>, len = 
-1004249232}, headers = {
            s = 0x7ffc2c642ca0 "\340-d,\374\177", len = -1298630935}, port_no = 
1, proto = 0, type = ERROR_URI_T, 
          flags = (unknown: 0xc378a860), transport = {s = 0x7f58c37aa720 
"\031\001", len = 744765408}, ttl = {
            s = 0x7ffc2c642c00 "\"\375Q\367X\230\021\211\"\375Aq\240\245", 
<incomplete sequence \334>, len = 0}, 
          user_param = {s = 0x0, len = -1}, maddr = {s = 0x200000000 <error: 
Cannot access memory at address 0x200000000>, 
            len = -206439134}, method = {s = 0x0, len = -1294177597}, lr = {
            s = 0xa <error: Cannot access memory at address 0xa>, len = 
-1004249232}, r2 = {
            s = 0x89119858f751fd22 <error: Cannot access memory at address 
0x89119858f751fd22>, len = 1900150050}, gr = {
            s = 0x7ffc00000000 <error: Cannot access memory at address 
0x7ffc00000000>, len = 744762440}, transport_val = {
            s = 0x7f58c37bf8f0 "\240\266ȴ}U", len = -1261917472}, ttl_val = {s 
= 0x557db4c9cb15 "", len = -1261843691}, 
          user_param_val = {s = 0x557db4c8da80 "P\337ȴ}U", len = -1261905760}, 
maddr_val = {
            s = 0x557db4c8d8b8 "\310\330ȴ}U", len = -1261905720}, method_val = {
            s = 0xffffffff <error: Cannot access memory at address 0xffffffff>, 
len = -1015285520}, lr_val = {
            s = 0x7ffc2c642ce0 "`\250x\303X\177", len = -1018018493}, r2_val = 
{s = 0x7f58c37bf8f0 "\240\266ȴ}U", 
            len = 744762536}, gr_val = {s = 0x7ffc2c642ce0 "`\250x\303X\177", 
len = 1600859648}}
        u = 0x557db4c8be40
        port = 24374
        dst_host = 0x557db4c94bae
        i = 1819043191
        flags = 1935763503
        avp = 0x8
        st = {flags = 21, id = 0, name = {n = 140015933849608, s = {
              s = 0x7f5800000008 <error: Cannot access memory at address 
0x7f5800000008>, len = 744761792}, 
            re = 0x7f5800000008}, avp = 0x7ffc2c642980}
        sct = 0xffffffffffffffff
        sjt = 0x7ffc2c642950
        rve = 0x7f58c37af180
        mct = 0x4000
        rv = 0x7ffc2c6428f0
        rv1 = 0x0
        c1 = {cache_type = 34404919, val_type = 308471918, c = {avp_val = {n = 
21, s = {
                s = 0x15 <error: Cannot access memory at address 0x15>, len = 
744762624}, re = 0x15}, pval = {rs = {
                s = 0x15 <error: Cannot access memory at address 0x15>, len = 
744762624}, ri = 0, flags = -1015371720}}, 
          i2s = 
"\330\060d,\374\177\000\000`\250x\303X\177\000\000\340\067d,\374\177"}
        s = {s = 0x7ffc2c6429e0 "\200+d,\374\177", len = -1018040882}
        srevp = {0x7ffc2c642de0, 0x557db2b4a950 <rval_get_long+424>}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = 
{number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#21 0x0000557db2986f7b in run_actions (h=0x7ffc2c6437e0, a=0x7f58c37ab6f0, 
msg=0x7f58c378a860) at core/action.c:1587
        t = 0x7f58c37b40a0
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1126259388, tz_dsttime = 32600}
        tdiff = 744765408
        __func__ = "run_actions"
#22 0x0000557db2974125 in do_action (h=0x7ffc2c6437e0, a=0x7f58c37ab390, 
msg=0x7f58c378a860) at core/action.c:705
        ret = -5
        li = 5
        v = 0
        dst = {send_sock = 0x4022c643620, to = {s = {sa_family = 11776, sa_data 
= "k_\225C\036\237\240\060t\303X\177\000"}, 
            sin = {sin_family = 11776, sin_port = 24427, sin_addr = {s_addr = 
2669560725}, 
              sin_zero = "\240\060t\303X\177\000"}, sin6 = {sin6_family = 
11776, sin6_port = 24427, 
              sin6_flowinfo = 2669560725, sin6_addr = {__in6_u = {
                  __u6_addr8 = 
"\240\060t\303X\177\000\000\000\000\000\000\002\000\000", __u6_addr16 = {12448, 
50036, 32600, 
                    0, 0, 0, 2, 0}, __u6_addr32 = {3279171744, 32600, 0, 2}}}, 
sin6_scope_id = 0}, sas = {ss_family = 11776, 
              __ss_padding = 
"k_\225C\036\237\240\060t\303X\177\000\000\000\000\000\000\002", '\000' 
<repeats 11 times>, 
"\303jܲ}U\000\000\065\331\336\274X\177\000\000\241\330\336\274X\177\000\000P6d,\374\177\000\000$7̲}U\000\000P\272x\303X\177\000\000
 
\272x\303X\177\000\000\065\331\336\274X\177\000\000\222\330\336\274X\177\000\000\060\000\000\000\000\000\000\000\020\220s\303X\177\000",
 __ss_align = 140019102570418}}, id = -1126246239, send_flags = {f = 32600, 
blst_imask = 0}, proto = -104 '\230', 
          proto_pad0 = -40 '\330', proto_pad1 = -17186}
        tmp = 0x0
        new_uri = 0x9f1e43955f6b2e00 <error: Cannot access memory at address 
0x9f1e43955f6b2e00>
        end = 0xffffffff <error: Cannot access memory at address 0xffffffff>
        crt = 0x1 <error: Cannot access memory at address 0x1>
        cmd = 0x7f58c44f8180
        len = 1
        user = 0
        uri = {user = {s = 0xa <error: Cannot access memory at address 0xa>, 
len = -1005215176}, passwd = {
            s = 0x7ffc2c6435f0 "\n", len = -1001511286}, host = {s = 
0x7ffc2c6437f0 "", len = -1015369248}, port = {
            s = 0x1 <error: Cannot access memory at address 0x1>, len = 
-1015369248}, params = {s = 0x7ffc2c6437f0 "", 
            len = -1016554012}, sip_params = {s = 0x0, len = -1293737232}, 
headers = {
            s = 0xf00000402 <error: Cannot access memory at address 
0xf00000402>, len = 1600859648}, port_no = 13200, 
          proto = 11364, type = 32764, flags = (unknown: 0x1fa0), transport = 
{s = 0x7f58c3739010 "\001", len = 1600859648}, 
          ttl = {s = 0x4020000002d <error: Cannot access memory at address 
0x4020000002d>, len = -1015795552}, user_param = {
            s = 0x7f58c37430a0 "", len = 744764112}, maddr = {s = 
0x7f58c378b180 "\001", len = -1015500048}, method = {
            s = 0x7ffc2c6433c3 "", len = 744764354}, lr = {s = 0x7f58bcded935 
"", len = -1126246591}, r2 = {
            s = 0x7f58c378b330 "@", len = -1015499968}, gr = {s = 
0x7ffc2c643390 "", len = -1295477544}, transport_val = {
            s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = 
{s = 0x0, len = 65535}, maddr_val = {
            s = 0x657079542d746e <error: Cannot access memory at address 
0x657079542d746e>, len = 1902465859}, method_val = {
            s = 0x4040404040404040 <error: Cannot access memory at address 
0x4040404040404040>, len = 1077952576}, lr_val = {
            s = 0x5a5a5a5a5a5a5a5a <error: Cannot access memory at address 
0x5a5a5a5a5a5a5a5a>, len = 1515870810}, r2_val = {
            s = 0x2020202020202020 <error: Cannot access memory at address 
0x2020202020202020>, len = 538976288}, gr_val = {
            s = 0xffffffffffffffff <error: Cannot access memory at address 
0xffffffffffffffff>, len = -65536}}
        next_hop = {user = {s = 0x2020202020202020 <error: Cannot access memory 
at address 0x2020202020202020>, 
            len = 2097152}, passwd = {s = 0xffffffffffffffff <error: Cannot 
access memory at address 0xffffffffffffffff>, 
            len = -256}, host = {s = 0x0, len = 0}, port = {s = 0x0, len = 0}, 
params = {s = 0x0, len = 0}, sip_params = {
            s = 0x0, len = 0}, headers = {s = 0x0, len = 0}, port_no = 0, proto 
= 0, type = ERROR_URI_T, flags = 0, 
          transport = {s = 0x40 <error: Cannot access memory at address 0x40>, 
len = -1015836656}, ttl = {
            s = 0x9410000000000000 <error: Cannot access memory at address 
0x9410000000000000>, len = 1026}, user_param = {
            s = 0x7f58c3739010 "\001", len = -1126246480}, maddr = {s = 
0x557db2c87876 <qm_insert_free+59> "\005\363\003", 
            len = -1015500160}, method = {s = 0x7f58c3739010 "\001", len = 
1600859648}, lr = {
            s = 0x4022c643520 <error: Cannot access memory at address 
0x4022c643520>, len = -1015795552}, r2 = {
            s = 0x2 <error: Cannot access memory at address 0x2>, len = 14}, gr 
= {s = 0x0, len = 0}, transport_val = {
            s = 0x0, len = 0}, ttl_val = {s = 0x0, len = 0}, user_param_val = {
            s = 0x7f58bcded76c 
";received=192.168.188.215;branch=z9hG4bKa39a82e98b875f6b;rport=59490\r\nContact:
 
<sip:t...@test.tutpro.com;gr=urn:uuid:9b21c1a8-dc58-a3d6-83d5-7be67cbe70ce>\r\nMax-Forwards:
 69\r\nTo: <sip:test@test.tutpro."..., 
            len = -1126246548}, maddr_val = {s = 0x7ffc2c643650 
"\260\067d,\374\177", len = -1294932839}, method_val = {
            s = 0xf0 <error: Cannot access memory at address 0xf0>, len = 
-1015499856}, lr_val = {s = 0x7f58bcded935 "", 
            len = -1126246580}, r2_val = {s = 0x505b180 <error: Cannot access 
memory at address 0x505b180>, 
            len = -1295161072}, gr_val = {s = 0x7f58c378ba48 "@", len = 
-1015498184}}
        u = 0x7f58c44f8180
        port = 0
        dst_host = 0xa
        i = 1
        flags = -1472036457
        avp = 0x7f58c376f390
        st = {flags = 744765344, id = 32764, name = {n = 0, s = {s = 0x0, len = 
-1294177597}, re = 0x0}, avp = 0xa}
        sct = 0x0
        sjt = 0x7f58c431fb80 <main_arena>
        rve = 0x7f58c37aa830
        mct = 0x7f58c44f84e8
        rv = 0x1
        rv1 = 0x7f58c44acab0
        c1 = {cache_type = RV_CACHE_EMPTY, val_type = 2351955968, c = {avp_val 
= {n = 140019212980240, s = {
                s = 0x7f58c3739010 "\001", len = 1026}, re = 0x7f58c3739010}, 
pval = {rs = {s = 0x7f58c3739010 "\001", 
                len = 1026}, ri = 140721053250888, flags = -1295484810}}, 
          i2s = "`\272x\303X\177\000\000\020\220s\303X\177\000\000\000.k_\225C"}
        s = {s = 0x7f58c415a238 "uP", len = -1001733104}
        srevp = {0x7f58c3778190, 0x7ffc2c6435b8}
        evp = {data = 0x0, obuf = {s = 0x0, len = 0}, rcv = 0x0, dst = 0x0, req 
= 0x0, rpl = 0x0, rplcode = 0, mode = 0}
        mod_f_params = {{type = NOSUBTYPE, u = {number = 0, string = 0x0, str = 
{s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
              select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, string = 0x0, 
str = {s = 0x0, len = 0}, data = 0x0, 
              attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = {number = 0, 
string = 0x0, str = {s = 0x0, len = 0}, 
              data = 0x0, attr = 0x0, select = 0x0}}, {type = NOSUBTYPE, u = 
{number = 0, string = 0x0, str = {s = 0x0, 
                len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, {type = 
NOSUBTYPE, u = {number = 0, string = 0x0, str = {
                s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, string = 0x0, 
              str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, select = 0x0}}, 
{type = NOSUBTYPE, u = {number = 0, 
              string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, attr = 0x0, 
select = 0x0}}, {type = NOSUBTYPE, u = {
              number = 0, string = 0x0, str = {s = 0x0, len = 0}, data = 0x0, 
attr = 0x0, select = 0x0}}}
        __func__ = "do_action"
#23 0x0000557db2986f7b in run_actions (h=0x7ffc2c6437e0, a=0x7f58c37ab1e0, 
msg=0x7f58c378a860) at core/action.c:1587
        t = 0x7f58c37ab390
        ret = 1
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        tz = {tz_minuteswest = -1015502752, tz_dsttime = 32600}
        tdiff = 0
        __func__ = "run_actions"
#24 0x0000557db29877f5 in run_top_route (a=0x7f58c37ab1e0, msg=0x7f58c378a860, 
c=0x0) at core/action.c:1672
        ctx = {rec_lev = 3, run_flags = 0, last_retcode = -1, jmp_env = 
{{__jmpbuf = {8589934592, -8569901108763165406, 0, 
                93998360062659, 10, 140019224567664, -8569901108819788510, 
-2588824727271113438}, __mask_was_saved = 0, 
              __saved_mask = {__val = {0, 140019102570805, 
11465676010161909248, 140721053251968, 93998359047577, 
                  140019167053808, 11465676010161909248, 140721053251904, 
140721053252064, 3216930504704, 
                  11465676010161909248, 8589934592, 8589934592, 0, 
93998360062659, 10}}}}}
        p = 0x7ffc2c6437e0
        ret = 0
        sfbk = 0
#25 0x0000557db2afdb6a in receive_msg (
    buf=0x7f58bcded648 "SUBSCRIBE sip:t...@test.tutpro.com 
SIP/2.0\r\nRecord-Route: 
<sip:127.0.0.1:5070;transport=tcp;r2=on;lr>\r\nRecord-Route: 
<sip:192.168.188.215;transport=tcp;r2=on;lr>\r\nVia: SIP/2.0/TCP 
127.0.0.1:5070;branc"..., len=749, 
    rcv_info=0x7f58bcded2b8) at core/receive.c:515
        msg = 0x7f58c378a860
        ctx = {rec_lev = 0, run_flags = 0, last_retcode = 8, jmp_env = 
{{__jmpbuf = {749, 140019102569416, 0, 0, 0, 0, 0, 0}, 
              __mask_was_saved = 744767584, __saved_mask = {__val = {0, 
93998360062659, 11465676010161909248, 
                  140019224567664, 140019102569120, 0, 93998360062659, 10, 
140019224567664, 140721053252704, 93998358424823, 
                  2, 9223372036854775822, 0, 0, 140721053253276}}}}}
        bctx = 0x0
        ret = 0
        tvb = {tv_sec = 0, tv_usec = 0}
        tve = {tv_sec = 0, tv_usec = 0}
        diff = 0
        inb = {
          s = 0x7f58bcded648 "SUBSCRIBE sip:t...@test.tutpro.com 
SIP/2.0\r\nRecord-Route: 
<sip:127.0.0.1:5070;transport=tcp;r2=on;lr>\r\nRecord-Route: 
<sip:192.168.188.215;transport=tcp;r2=on;lr>\r\nVia: SIP/2.0/TCP 
127.0.0.1:5070;branc"..., len = 749}
        netinfo = {data = {s = 0x0, len = 0}, bufsize = 0, rcv = 0x0, dst = 0x0}
        keng = 0x0
        evp = {data = 0x7ffc2c6439d0, obuf = {s = 0x0, len = 0}, rcv = 
0x7f58bcded2b8, dst = 0x0, req = 0x0, rpl = 0x0, 
          rplcode = 0, mode = 0}
        cidlockidx = 0
        cidlockset = 0
        errsipmsg = 0
        exectime = 0
        __func__ = "receive_msg"
#26 0x0000557db2c3ee6d in receive_tcp_msg (
    tcpbuf=0x7f58bcded648 "SUBSCRIBE sip:t...@test.tutpro.com 
SIP/2.0\r\nRecord-Route: 
<sip:127.0.0.1:5070;transport=tcp;r2=on;lr>\r\nRecord-Route: 
<sip:192.168.188.215;transport=tcp;r2=on;lr>\r\nVia: SIP/2.0/TCP 
127.0.0.1:5070;branc"..., len=749, 
    rcv_info=0x7f58bcded2b8, con=0x7f58bcded2a0) at core/tcp_read.c:1368
        ret = 0
        buf = 0x0
        bsize = 0
        blen = 0
        __func__ = "receive_tcp_msg"
#27 0x0000557db2c419f2 in tcp_read_req (con=0x7f58bcded2a0, 
bytes_read=0x7ffc2c643e98, read_flags=0x7ffc2c643e9c)
    at core/tcp_read.c:1604
        bytes = 749
        total_bytes = 749
        resp = 1
        size = 60129542152
        req = 0x7f58bcded3c8
        dst = {send_sock = 0x7ffc2c643db0, to = {s = {sa_family = 1, 
              sa_data = "\000\000\000\000\000\000\300=d,\374\177\000"}, sin = 
{sin_family = 1, sin_port = 0, sin_addr = {
                s_addr = 0}, sin_zero = "\300=d,\374\177\000"}, sin6 = 
{sin6_family = 1, sin6_port = 0, sin6_flowinfo = 0, 
              sin6_addr = {__in6_u = {__u6_addr8 = 
"\300=d,\374\177\000\000\030\000\000\000\000\000\000", __u6_addr16 = {
                    15808, 11364, 32764, 0, 24, 0, 0, 0}, __u6_addr32 = 
{744766912, 32764, 24, 0}}}, sin6_scope_id = 0}, 
            sas = {ss_family = 1, 
              __ss_padding = 
"\000\000\000\000\000\000\300=d,\374\177\000\000\030", '\000' <repeats 23 
times>, 
"\001\000\000\000\000\000\000\000@꣼X\177\000\000\002\000\000\000\000\000\000\000\016\000\000\000\000\000\000\000\320=d,\001\000\000\000@꣼X\177\000\000\320=d,\374\177\000\000\017x²}U\000\000\340>d,\374\177\000\000\b\000\000\000\000\000\000",
 __ss_align = 20}}, 
          id = 1, send_flags = {f = 1, blst_imask = 0}, proto = 8 '\b', 
proto_pad0 = 0 '\000', proto_pad1 = 0}
        c = 0 '\000'
        ret = -1001422464
        __func__ = "tcp_read_req"
#28 0x0000557db2c44ef3 in handle_io (fm=0x7f58c37781f0, events=1, idx=-1) at 
core/tcp_read.c:1780
        ret = 8
        n = 8
        read_flags = RD_CONN_SHORT_READ
        con = 0x7f58bcded2a0
        s = 8
        resp = 93998361412288
        t = 32600
        ee = 0x0
        __func__ = "handle_io"
#29 0x0000557db2c30835 in io_wait_loop_epoll (h=0x557db2f102c0 <io_w>, t=2, 
repeat=0) at core/io_wait.h:1070
        n = 1
        r = 0
        fm = 0x7f58c37781f0
        revents = 1
        __func__ = "io_wait_loop_epoll"
#30 0x0000557db2c47e98 in tcp_receive_loop (unix_sock=14) at 
core/tcp_read.c:1976
        __func__ = "tcp_receive_loop"
#31 0x0000557db2c24ab5 in tcp_init_children (woneinit=0x7ffc2c644288) at 
core/tcp_main.c:5239
        r = 0
        i = -1
        reader_fd_1 = 14
        pid = 0
        si_desc = "tcp receiver 
(tcp:127.0.0.1:5080)\000d,\374\177\000\000\063)Ų\000\000\000\000\000\024\000\000\000\000\000\000\353\347߲}U\000\000\065\000d,\374\177\000\000\333{ֲ}U\000\000\060Bd,\001\000\000\000@꣼X\177\000\000\060Bd,\374\177\000\000\340\250\336\274\001\000\000\000PBd,\374\177\000\000y}ֲ}U\000"
        si = 0x0
        __func__ = "tcp_init_children"
#32 0x0000557db2963531 in main_loop () at main.c:1851
        i = 0
        pid = 342606
        si = 0x0
        si_desc = 
"\210\000۲}U\000\000dR۲}U\000\000@Dd,\374\177\000\000听\262}U\000\000@Dd,\374\177\000\000MV\273\262\b\000\000\000\001\000\000\000\n\000\000\000\000.k_\225C\036\237\000\000\000\000\000\000\000\000\210\000۲}U\000\000\000\000\000\000\000\000\000\000\303jܲ}U\000\000\n\000\000\000\000\000\000\000p_$\304X\177\000\000
 Dd,\374\177\000\000\240Ӳ\262}U\000"
        nrprocs = 21885
        woneinit = 0
        __func__ = "main_loop"
#33 0x0000557db296e0e7 in main (argc=17, argv=0x7ffc2c644978) at main.c:3086
        cfg_stream = 0x557db4bc02a0
        c = -1
        r = 0
        tmp = 0x7ffc2c644f2e ""
        tmp_len = 744768960
        port = 32764
        proto = 7
        ahost = 0x0
        aport = 0
        options = 0x557db2db3238 
":f:cm:M:dVIhEeb:l:L:n:vKrRDTN:W:w:t:u:g:P:G:SQ:O:a:A:x:X:Y:"
        ret = -1
        seed = 3778932495
        rfd = 4
        debug_save = 0
        debug_flag = 0
        dont_fork_cnt = 0
        n_lst = 0x0
        p = 0x0
        st = {st_dev = 23, st_ino = 2915, st_nlink = 2, st_mode = 16832, st_uid 
= 124, st_gid = 131, __pad0 = 0, st_rdev = 0, 
          st_size = 40, st_blksize = 4096, st_blocks = 0, st_atim = {tv_sec = 
1680936323, tv_nsec = 265103008}, st_mtim = {
            tv_sec = 1680938481, tv_nsec = 693389707}, st_ctim = {tv_sec = 
1680949347, tv_nsec = 257765663}, 
          __glibc_reserved = {0, 0, 0}}
        tbuf = 
"\002\000\000\000\000\000\000\000\016\000\000\000\000\000\000\200", '\000' 
<repeats 112 times>, 
"\060\267\062\304X\177\000\000\004\000\000\024\000\000\000\000@\201\063\304X\177",
 '\000' <repeats 146 times>...
        option_index = 0
        long_options = {{name = 0x557db2db5673 "help", has_arg = 0, flag = 0x0, 
val = 104}, {name = 0x557db2db04f1 "version", 
            has_arg = 0, flag = 0x0, val = 118}, {name = 0x557db2db5678 
"alias", has_arg = 1, flag = 0x0, val = 1024}, {
            name = 0x557db2db567e "subst", has_arg = 1, flag = 0x0, val = 
1025}, {name = 0x557db2db5684 "substdef", 
            has_arg = 1, flag = 0x0, val = 1026}, {name = 0x557db2db568d 
"substdefs", has_arg = 1, flag = 0x0, val = 1027}, {
            name = 0x557db2db5697 "server-id", has_arg = 1, flag = 0x0, val = 
1028}, {name = 0x557db2db56a1 "loadmodule", 
            has_arg = 1, flag = 0x0, val = 1029}, {name = 0x557db2db56ac 
"modparam", has_arg = 1, flag = 0x0, val = 1030}, {
            name = 0x557db2db56b5 "log-engine", has_arg = 1, flag = 0x0, val = 
1031}, {name = 0x557db2db56c0 "debug", 
            has_arg = 1, flag = 0x0, val = 1032}, {name = 0x557db2db56c6 
"cfg-print", has_arg = 0, flag = 0x0, val = 1033}, {
            name = 0x557db2db56d0 "atexit", has_arg = 1, flag = 0x0, val = 
1034}, {name = 0x557db2db56d7 "all-errors", 
            has_arg = 0, flag = 0x0, val = 1035}, {name = 0x0, has_arg = 0, 
flag = 0x0, val = 0}}
        __func__ = "main"
[?2004h(gdb) info locals
[?2004l
No locals.
[?2004h(gdb) list
[?2004l
54      in ../../core/trim.h
[?2004h(gdb)
```
Will produce pcap of the SUBSCRIBE message if needed.


-- 
Reply to this email directly or view it on GitHub:
https://github.com/kamailio/kamailio/issues/3417
You are receiving this because you are subscribed to this thread.

Message ID: <kamailio/kamailio/issues/3...@github.com>
_______________________________________________
Kamailio (SER) - Development Mailing List
To unsubscribe send an email to sr-dev-le...@lists.kamailio.org

Reply via email to