No symbol "fulll" in current context. #0 0x00000037c9edb61d in write () at ../sysdeps/unix/syscall-template.S:82 No locals. #1 0x0000000000588415 in tcptls_stream_write (cookie=0xa49a140, buf=0xa49a233 "", size=1) at tcptls.c:335 stream = 0xa49a140 start = {tv_sec = 1418953385, tv_usec = 589697} ms = 0 res = 0 written = 0 remaining = 1 __PRETTY_FUNCTION__ = "tcptls_stream_write" #2 0x00000037c9e66fd9 in _IO_cookie_write (fp=, buf=, size=1) at iofopncook.c:72 cfile = 0xa49a1b0 n = #3 0x00000037c9e73085 in new_do_write (fp=0xa49a1b0, data=0xa49a233 "", to_do=1) at fileops.c:522 count = #4 _IO_new_do_write (fp=0xa49a1b0, data=0xa49a233 "", to_do=1) at fileops.c:495 No locals. #5 0x00000037c9e723df in _IO_new_file_overflow (f=0xa49a1b0, ch=0) at fileops.c:881 No locals. #6 0x00000037c9e74639 in _IO_default_xsputn (f=0xa49a1b0, data=, n=5) at genops.c:485 s = 0x2424b4e5 "" more = 5 #7 0x00000037c9e71792 in _IO_new_file_xsputn (f=0xa49a1b0, data=, n=4) at fileops.c:1372 block_size = do_write = 4 s = to_do = 5 must_flush = count = #8 0x00000037c9e67a4d in _IO_fwrite (buf=, size=1, count=4, fp=0xa49a1b0) at iofwrite.c:45 _IO_acquire_lock_file = 0xa49a1b0 request = 4 written = 0 #9 0x0000000000599928 in ast_careful_fwrite (f=0xa49a1b0, fd=14, src=0x2424b4e0 "\201~\001", , len=4, timeoutms=0) at utils.c:1434 start = {tv_sec = 1418951746, tv_usec = 26703} n = 0 elapsed = 0 __PRETTY_FUNCTION__ = "ast_careful_fwrite" #10 0x0000000009f9f16a in __ast_websocket_write (session=0x5de4d48, opcode=AST_WEBSOCKET_OPCODE_TEXT, payload=0x62220f8 "ACK sip:ssje818u@qemlteg6ic02.invalid;transport=ws SIP/2.0\r\nVia: SIP/2.0/WS 91.194.226.240:0;branch=z9hG4bK5c6ea73f;rport\r\nMax-Forwards: 70\r\nFrom: ;tag=as35a3665f\r\nTo"..., actual_length=455) at res_http_websocket.c:256 header_size = 4 frame = 0x2424b4e0 "\201~\001", length = 126 __PRETTY_FUNCTION__ = "__ast_websocket_write" #11 0x0000000010dc0fb6 in __sip_xmit (p=0x5a38cd8, data=0x62220e0) at chan_sip.c:3731 res = 0 dst = 0x5a3d680 __PRETTY_FUNCTION__ = "__sip_xmit" #12 0x0000000010dc4f8d in send_request (p=0x5a38cd8, req=0x2424c0d0, reliable=XMIT_UNRELIABLE, seqno=102) at chan_sip.c:4650 res = 0 __PRETTY_FUNCTION__ = "send_request" #13 0x0000000010df9d12 in transmit_request (p=0x5a38cd8, sipmethod=6, seqno=102, reliable=XMIT_UNRELIABLE, newbranch=1) at chan_sip.c:15551 resp = {rlpart1 = 0, rlpart2 = 0, headers = 10, method = 6, lines = 0, sdp_start = 0, sdp_count = 0, debug = 0 '\000', has_to_tag = 0 '\000', ignore = 0 '\000', authenticated = 0 '\000', header = {0, 123, 141, 198, 267, 325, 385, 400, 434, 453, 0 }, line = {0 }, data = 0x62220e0, content = 0x6223140, socket = {type = 0, fd = 0, port = 0, tcptls_session = 0x0, ws_session = 0x0}, next = {next = 0x0}, reqsipoptions = 0} #14 0x0000000010e22fc0 in handle_response_invite (p=0x5a38cd8, resp=200, rest=0x61fb414 "OK", req=0x2424dc60, seqno=102) at chan_sip.c:23005 outgoing = 1 res = 0 xmitres = 0 reinvite = 8388608 p_hdrval = 0x10e6d628 "" rtn = 6 connected = {id = {name = {str = 0x2424d1e0 "`\323$$", char_set = -907718150, presentation = 55, valid = 0 '\000'}, number = {str = 0x100
, plan = 4, presentation = 0, valid = 42 '*'}, subaddress = { str = 0x0, type = -1, odd_even_indicator = 0 '\000', valid = 0 '\000'}, tag = 0x0}, ani = {name = {str = 0x0, char_set = 0, presentation = 0, valid = 0 '\000'}, number = {str = 0x2424d03b "\005", plan = 77645882, presentation = 0, valid = 0 '\000'}, subaddress = {str = 0xc8
, type = 606395456, odd_even_indicator = 0 '\000', valid = 0 '\000'}, tag = 0x4a0c743 "A9\306\177\033I\203\305\001M9\357v&I\203\304\001B\200<+"}, priv = {name = {str = 0x2424cef0 "P\317$$", char_set = 200, presentation = 0, valid = 64 '@'}, number = {str = 0x242519c0 "\300Y\035$", plan = 0, presentation = 0, valid = 89 'Y'}, subaddress = {str = 0x2424cf50 "\200\317$$", type = 282940958, odd_even_indicator = 0 '\000', valid = 0 '\000'}, tag = 0x0}, ani2 = 606392188, source = 0} update_connected = {id = {name = 0 '\000', number = 0 '\000', subaddress = 0 '\000'}, ani = {name = 0 '\000', number = 0 '\000', subaddress = 0 '\000'}, priv = {name = 0 '\000', number = 0 '\000', subaddress = 0 '\000'}} __PRETTY_FUNCTION__ = "handle_response_invite" #15 0x0000000010e28436 in handle_response (p=0x5a38cd8, resp=200, rest=0x61fb414 "OK", req=0x2424dc60, seqno=102) at chan_sip.c:23882 owner = 0x5f01e48 sipmethod = 5 c = 0x61fb512 "102 INVITE" c_copy = 0x2424cfe0 "102 INVITE" msg = 0x2424cfe4 "INVITE" __PRETTY_FUNCTION__ = "handle_response" #16 0x0000000010e3b8f8 in handle_incoming (p=0x5a38cd8, req=0x2424dc60, addr=0x5de4d58, recount=0x2424d63c, nounlock=0x2424d638) at chan_sip.c:28238 cmd = 0x61fb408 "SIP/2.0" cseq = 0x61fb512 "102 INVITE" useragent = 0x10e6d628 "" via = 0x61fb41c "SIP/2.0/WS 91.194.226.240:0;branch=z9hG4bK39ff3445;rport" callid = 0x61fb4da "654a6ad173bab4fc1cc645f62dd884c3@91.194.226.240:0" via_pos = 2 seqno = 102 len = 4 respid = 200 res = 0 e = 0x61fb410 "200 OK" error = 0 oldmethod = 5 acked = 0 __PRETTY_FUNCTION__ = "handle_incoming" #17 0x0000000010e3ceca in handle_request_do (req=0x2424dc60, addr=0x5de4d58) at chan_sip.c:28548 p = 0x5a38cd8 owner_chan_ref = 0x5f01e48 recount = 0 nounlock = 0 __PRETTY_FUNCTION__ = "handle_request_do" #18 0x0000000010dbd4ce in sip_websocket_callback (session=0x5de4d48, parameters=0x5de4c20, headers=0x249ffc60) at chan_sip.c:2617 req = {rlpart1 = 0, rlpart2 = 8, headers = 9, method = 1, lines = 24, sdp_start = 0, sdp_count = 24, debug = 0 '\000', has_to_tag = 1 '\001', ignore = 0 '\000', authenticated = 1 '\001', header = {0, 15, 77, 145, 201, 260, 277, 335, 365, 386, 0 }, line = {387, 391, 434, 438, 444, 502, 534, 557, 591, 673, 755, 833, 911, 940, 975, 987, 998, 1081, 1102, 1123, 1157, 1198, 1295, 1358, 0 }, data = 0x61fb3f0, content = 0x0, socket = {type = SIP_TRANSPORT_WS, fd = -1, port = 0, tcptls_session = 0x0, ws_session = 0x5de4d48}, next = {next = 0x0}, reqsipoptions = 0} data = 0x2424d680 "SIP/2.0 200 OK\r\nVia: SIP/2.0/WS 91.194.226.240:0;branch=z9hG4bK39ff3445;rport\r\nTo: ;tag=oo45hqolui\r\nFrom: ;tag=as35a36"... payload = 0x5c162c0 "SIP/2.0 200 OK\r\nVia: SIP/2.0/WS 91.194.226.240:0;branch=z9hG4bK39ff3445;rport\r\nTo: ;tag=oo45hqolui\r\nFrom: ;tag=as35a36"... payload_len = 1453 opcode = AST_WEBSOCKET_OPCODE_TEXT fragmented = 0 res = 1 #19 0x0000000009fa0aaa in websocket_callback (ser=0xa483308, urih=0xa1a23e0, uri=0x2424faf7 "", method=AST_HTTP_GET, get_vars=0x5de4c20, headers=0x249ffc60) at res_http_websocket.c:681 v = 0x0 upgrade = 0x2424e840 "websocket" key = 0x2424e7a0 "S2PaBhXABph4zXTiELgzwA==" key1 = 0x0 key2 = 0x0 protos = 0x2424e7e0 "sip" requested_protocols = 0x0 protocol = 0x2424e800 "sip" version = 13 flags = 1 protocol_handler = 0x621a008 session = 0x5de4d48 __PRETTY_FUNCTION__ = "websocket_callback" #20 0x00000000004f8b8f in handle_uri (ser=0xa483308, uri=0x2424faf7 "", method=AST_HTTP_GET, headers=0x249ffc60) at http.c:754 c = 0x2424faf7 "" res = -1 params = 0x0 urih = 0xa1a23e0 l = 2 get_vars = 0x5de4c20 v = 0x5de4c20 prev = 0x5de4c20 redirect = 0x0 __PRETTY_FUNCTION__ = "handle_uri" #21 0x00000000004f93dd in httpd_helper_thread (data=0xa483308) at http.c:991 buf = "GET\000/ws\000rndval\000\064\061\064\062\060\071\064\064\066\060\062\060\062\071\063\071\070\060\070\063\067\000HTTP/1.1\r\n", '\000' , "P\n%$\000\000\000\000\036_\240\004\000\000\000\000\003\021\000\000\000\000\000\000@H\000\070\000\000\000\000\001\000\000\000\000\000\000\000H", '\000' "\320, \065\347\311\067\000\000\000p1\347\311\067", '\000' "\260, \n%$\001\000\000\000\260\241I\n\000\000\000\000\377\377\377\377\377\377\377\377j&\347\311\067", '\000' "\260, \241I\n", '\000' "\353, p\346\311\067\000\000\000\030\001\000\000\000\000\000\000@\241I\n", '\000' "\260, \241I\n", '\000' ... header_line = "\000\000\000r-Agent\000 Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.154 Safari/537.36 OPR/20.0.1387.91", '\000' ser = 0xa483308 headers = 0x249ffc60 tail = 0x5de4a60 uri = 0x2424faf4 "/ws" method = 0x2424faf0 "GET" http_method = AST_HTTP_GET remaining_headers = 89 flags = 2050 p = 0x37ca192930 __PRETTY_FUNCTION__ = "httpd_helper_thread" #22 0x0000000000589047 in handle_tcptls_connection (data=0xa483308) at tcptls.c:684 tcptls_session = 0xa483308 ssl_setup = 0x424750 ret = 0 err = '\000' "\220, \f%$\000\000\000\000\036_\240\004\000\000\000\000\003\021\000\000\000\000\000\000@H\000\070\000\000\000\000\001\000\000\000\000\000\000\000 ", '\000' , "p\240I\n", '\000' "\200, ;\222\a\000\000\000\000\300\031%$\000\000\000\000\360\f%$\000\000\000\000\315uY", '\000' "\242, FP", '\000' "\331, v[\000\000\000\000\000\020K\203\000\000\000\000\000\340\277[\000\000\000\000" __PRETTY_FUNCTION__ = "handle_tcptls_connection" #23 0x00000000005990d5 in dummy_start (data=0xa4834f0) at utils.c:1223 __cancel_buf = {__cancel_jmp_buf = {{__cancel_jmp_buf = {0, -4615603848043347746, 127024000, 606411200, 0, 3, -4615603848051736354, -4615525272250007330}, __mask_was_saved = 0}}, __pad = {0x24250e90, 0x0, 0x0, 0x0}} __cancel_routine = 0x4409d4 __cancel_arg = 0x24251700 not_first_call = 0 ret = 0x0 a = {start_routine = 0x5889af , data = 0xa483308, name = 0xa483600 "handle_tcptls_connection started at [ 734] tcptls.c ast_tcptls_server_root()"} #24 0x00000037ca2079d1 in start_thread (arg=0x24251700) at pthread_create.c:301 __res = pd = 0x24251700 now = unwind_buf = {cancel_jmp_buf = {{jmp_buf = {606410496, -4615524915249725218, 127024000, 606411200, 0, 3, -4615603848091582242, -4639331263199362850}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}} not_first_call = pagesize_m1 = sp = freesize = #25 0x00000037c9ee89dd in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:115 No locals.