!@!@!@! thread1.txt !@!@!@! $1 = {si_signo = 11, si_errno = 0, si_code = 1, _sifields = {_pad = {0, 0, 0, 0, 941817256, -29697, -1593225303, -1, 0 }, _kill = {si_pid = 0, si_uid = 0}, _timer = {si_tid = 0, si_overrun = 0, si_sigval = {sival_int = 0, sival_ptr = 0x0}}, _rt = {si_pid = 0, si_uid = 0, si_sigval = {sival_int = 0, sival_ptr = 0x0}}, _sigchld = {si_pid = 0, si_uid = 0, si_status = 0, si_utime = 4045074313328459776, si_stime = -6842850567249753089}, _sigfault = {si_addr = 0x0}, _sigpoll = {si_band = 0, si_fd = 0}}} Signal Stop Print Pass to program Description SIGSEGV Yes Yes Yes Segmentation fault Thread 1 (Thread 0x7f8ea3a97700 (LWP 13554)): #0 0x00007f8eee659d70 in __memcmp_sse4_1 () from /lib64/libc.so.6 No symbol table info available. #1 0x00007f8ef11c6ca5 in pj_memcmp (buf1=0x7f8ea3a96709, buf2=0x0, size=62) at ../include/pj/string.h:814 No locals. #2 0x00007f8ef11c72ef in pj_strcmp (str1=0x7f8ea3a96780, str2=0x7f8ed80134e8) at ../include/pj/string_i.h:154 min = 62 res = 32654 #3 0x00007f8e9d6d3599 in header_identify_match_check (obj=0x7f8ee002ede0, arg=, flags=) at res_pjsip_endpoint_identifier_ip.c:169 identify = 0x7f8ee002ede0 rdata = header = 0x7f8ed80134a8 pj_header_name = {ptr = 0x7f8ea3a96700 "Contact", slen = 7} pj_header_value = {ptr = 0x7f8ea3a96709 "", slen = 62} c_header = 0x7f8ea3a96700 "Contact" c_value = __PRETTY_FUNCTION__ = "header_identify_match_check" #4 0x0000000000463c80 in internal_ao2_traverse (self=0x7f8ee0015430, flags=OBJ_SEARCH_NONE, cb_fn=0x7f8e9d6d3490 , arg=0x7f8ed800ad48, data=0x0, type=AO2_CALLBACK_DEFAULT, tag=0x7f8e9d6d4dbe "", file=0x7f8e9d6d4f90 "res_pjsip_endpoint_identifier_ip.c", line=223, func=0x7f8e9d6d5a0c <__PRETTY_FUNCTION__.23983> "ip_identify") at astobj2_container.c:328 match = 3 ret = 0x0 cb_default = 0x7f8e9d6d3490 cb_withdata = 0x0 node = 0x7f8ee00268b0 traversal_state = 0x7f8ea3a967e0 orig_lock = AO2_LOCK_REQ_MUTEX multi_container = 0x0 multi_iterator = 0x0 __PRETTY_FUNCTION__ = "internal_ao2_traverse" #5 0x0000000000463f3f in __ao2_callback (c=0x7f8ee0015430, flags=OBJ_SEARCH_NONE, cb_fn=0x7f8e9d6d3490 , arg=0x7f8ed800ad48, tag=0x7f8e9d6d4dbe "", file=0x7f8e9d6d4f90 "res_pjsip_endpoint_identifier_ip.c", line=line@entry=223, func=func@entry=0x7f8e9d6d5a0c <__PRETTY_FUNCTION__.23983> "ip_identify") at astobj2_container.c:414 No locals. #6 0x00007f8e9d6d39b5 in ip_identify (rdata=0x7f8ed800ad48) at res_pjsip_endpoint_identifier_ip.c:223 addr = {ss = {ss_family = 2, __ss_padding = "005024316|001306", '000' , __ss_align = 0}, len = 16} candidates = 0x7f8ee0015430 match = 0x0 endpoint = __PRETTY_FUNCTION__ = "ip_identify" #7 0x00007f8eacea5a72 in ast_sip_identify_endpoint (rdata=0x7f8ed800ad48) at res_pjsip.c:2724 iter = 0x2409570 endpoint = 0x0 lock = 0x7f8ead0e2140 __PRETTY_FUNCTION__ = "ast_sip_identify_endpoint" #8 0x00007f8eacebf08d in endpoint_lookup (rdata=0x7f8ed800ad48) at res_pjsip/pjsip_distributor.c:700 endpoint = unid = is_ack = 0 __PRETTY_FUNCTION__ = "endpoint_lookup" #9 0x00007f8ef111c697 in pjsip_endpt_process_rx_data (endpt=0x1c02808, rdata=0x7f8ed800ad48, p=0x7f8ead0e3220 , p_handled=0x7f8ea3a96b7c) at ../src/pjsip/sip_endpoint.c:893 msg = 0x7f8ed8012da0 def_prm = {start_prio = 2745789328, start_mod = 0x736b6d, idx_after_start = 7564141, silent = 958} mod = 0x7f8ead0e32e0 handled = 0 i = 1 status = 0 #10 0x00007f8eacebd931 in distribute (data=0x7f8ed800ad48) at res_pjsip/pjsip_distributor.c:907 param = {start_prio = 0, start_mod = 0x7f8ead0e3360 , idx_after_start = 1, silent = 0} handled = 0 rdata = 0x7f8ed800ad48 is_request = 1 is_ack = 0 endpoint = __PRETTY_FUNCTION__ = "distribute" #11 0x0000000000607bb2 in ast_taskprocessor_execute (tps=0x23c3478) at taskprocessor.c:963 local = {local_data = 0x7d000, data = 0x61ad82 } t = 0x7f8ed800ac90 size = 37500024 __PRETTY_FUNCTION__ = "ast_taskprocessor_execute" #12 0x00000000006106a0 in execute_tasks (data=0x23c3478) at threadpool.c:1322 tps = 0x23c3478 #13 0x0000000000607bb2 in ast_taskprocessor_execute (tps=0x1bfdad8) at taskprocessor.c:963 local = {local_data = 0x1bfd9c0, data = 0x1bfd9f8} t = 0x7f8ed800acc0 size = 2745789584 __PRETTY_FUNCTION__ = "ast_taskprocessor_execute" #14 0x000000000060e5a0 in threadpool_execute (pool=0x1bfda18) at threadpool.c:351 __PRETTY_FUNCTION__ = "threadpool_execute" #15 0x000000000060ff8e in worker_active (worker=0x7f8ed80009e8) at threadpool.c:1105 alive = 0 #16 0x000000000060fd2e in worker_start (arg=0x7f8ed80009e8) at threadpool.c:1024 worker = 0x7f8ed80009e8 saved_state = ALIVE __PRETTY_FUNCTION__ = "worker_start" #17 0x000000000061c712 in dummy_start (data=0x7f8ed8000b00) at utils.c:1257 __cancel_buf = {__cancel_jmp_buf = {{__cancel_jmp_buf = {0, 8760416934852039063, 0, 512000, 0, 140250607875840, 8760416934826873239, -8751048948030500457}, __mask_was_saved = 0}}, __pad = {0x7f8ea3a96db0, 0x0, 0x0, 0x0}} __cancel_routine = 0x455ebb __cancel_arg = 0x7f8ea3a97700 __not_first_call = 0 ret = 0x0 a = {start_routine = 0x60fca7 , data = 0x7f8ed80009e8, name = 0x7f8ed80008f0 "worker_start started at [ 1079] threadpool.c worker_thread_start()"} #18 0x00007f8eef30fe25 in start_thread () from /lib64/libpthread.so.0 No symbol table info available. #19 0x00007f8eee5edbad in clone () from /lib64/libc.so.6 No symbol table info available.