!@!@!@! thread1.txt !@!@!@! $1 = {si_signo = 11, si_errno = 0, si_code = 1, _sifields = {_pad = {8, 0 }, _kill = {si_pid = 8, si_uid = 0}, _timer = {si_tid = 8, si_overrun = 0, si_sigval = {sival_int = 0, sival_ptr = 0x0}}, _rt = {si_pid = 8, si_uid = 0, si_sigval = {sival_int = 0, sival_ptr = 0x0}}, _sigchld = {si_pid = 8, si_uid = 0, si_status = 0, si_utime = 0, si_stime = 0}, _sigfault = {si_addr = 0x8}, _sigpoll = {si_band = 8, si_fd = 0}}} Signal Stop Print Pass to program Description SIGSEGV Yes Yes Yes Segmentation fault Thread 1 (Thread 0x7fcf6491d700 (LWP 32267)): #0 0x00000000005ae112 in __ast_string_field_ptr_grow (mgr=0x34088d8, pool_head=0x34087e0, needed=63, ptr=0x3408850) at stringfields.c:244 grow = 63 space = 140528722222816 #1 0x00007fd04455f2b1 in parse_register_contact (pvt=0x7fcd390b5e80, peer=0x3408790, req=0x7fcf6491b000) at chan_sip.c:16996 __res__ = 0 __d__ = 0x7fcf64919ee0 "sips:8899@df7jal23ls0d.invalid;rtcweb-breaker=no;transport=wss" __dlen__ = 63 __p__ = 0x3408850 target = 0x916d9a <__ast_string_field_empty_buffer+2> "" __res__ = -1 __res__ = -1 contact = "000070070071071"... data = "000000000000001000000000h024<8315177000000200244221d317177000000@275i000000000000000360WP8 b000000@245i000000000000000330004000000000000000000020000000000000000000000300244221d317177000000020000000000000000000000300244221d317177000000211002", '000' , "211002", '000' , "241307F000000000000000v33332200000000000254070260317177000000v33332200000000260356273001000000000000020245221d001000000000@254070260317177000000020245221d317177000000w=P000000000000000001000000000003000000000"... expires = 0x7fcf6491a276 "" expire = 1800 curi = 0x7fcf64919ee0 "sips:8899@df7jal23ls0d.invalid;rtcweb-breaker=no;transport=wss" hostport = 0x0 transport = 0x0 transport_type = 0 useragent = 0x69bc80 <__PRETTY_FUNCTION__.16217> "format_log_message_ap" oldsin = {ss = {ss_family = 25847, __ss_align = 140532476853729, __ss_padding = "001e]D320177000000341275\D320177", '000' , "060"033071315177000000B"033071315177000000232m221000000000000000232m221000000000000000p035033071315177000000070331=8315177000000$004000000000000000000250035033071315177000000060242221d317177000000020000000000000000000"}, len = 958078352} testsa = {ss = {ss_family = 6, __ss_align = 140519403101616, __ss_padding = "000000000000000000000000001000000000000000000000230035033071315177000000000000000000000000000000001000000000000000000000240035033071315177000000v33332200000000026"r000000000000000a000000000#000000000020000000000b000000000004000000000w000000000003000000000177", '000' , "060*000000000000000"}, len = 0} firstcuri = 0x7fcf64919ee0 "sips:8899@df7jal23ls0d.invalid;rtcweb-breaker=no;transport=wss" start = 5 wildcard_found = 0 single_binding_found = 1 __PRETTY_FUNCTION__ = "parse_register_contact" #2 0x00007fd044563994 in register_verify (p=0x7fcd390b5e80, addr=0x7fcd385b9b98, req=0x7fcf6491b000, uri=0x7fcd387f9d41 "sip:dcccast.pik-comfort.ru") at chan_sip.c:17927 res = AUTH_SUCCESSFUL peer = 0x3408790 tmp = ""8899", "Oh^D320177000000000000000000303066000000032305\D320177000000225002000000000000000000001000000000000000000000211002000000000000000000360262O8315177000000060252221d317177000000wA00000000000Oh^D320177000000"... c = 0x7fcf6491a947 "sip:8899" name = 0x7fcf6491a94b "8899" unused_password = 0x7fd0445e8be4 "" domain = 0x7fcf6491a950 "dcccast.pik-comfort.ru" uri2 = 0x7fcf6491a6a0 "sip:dcccast.pik-comfort.ru" send_mwi = 0 __PRETTY_FUNCTION__ = "register_verify" #3 0x00007fd04459fa94 in handle_request_register (p=0x7fcd390b5e80, req=0x7fcf6491b000, addr=0x7fcd385b9b98, e=0x7fcd387f9d41 "sip:dcccast.pik-comfort.ru") at chan_sip.c:28898 res = AUTH_SUCCESSFUL __PRETTY_FUNCTION__ = "handle_request_register" #4 0x00007fd0445a1338 in handle_incoming (p=0x7fcd390b5e80, req=0x7fcf6491b000, addr=0x7fcd385b9b98, recount=0x7fcf6491ace0, nounlock=0x7fcf6491ace4) at chan_sip.c:29206 cmd = 0x7fcd387f9d38 "REGISTER" cseq = 0x7fcd387f9ed1 "28879 REGISTER" useragent = 0x7fd0445cbde1 "" via = 0x7fcd387f9d69 "SIP/2.0/WSS df7jal23ls0d.invalid;branch=z9hG4bK5eVbEXsA1SoSIscorAVIPnId7ci4S4oz;rport" callid = 0x7fcd387f9ea6 "e06e0095-ab0f-d508-c4a5-92869c28de4c" via_pos = 2 seqno = 28879 len = 5 respid = 0 res = 0 e = 0x7fcd387f9d41 "sip:dcccast.pik-comfort.ru" error = 0 oldmethod = 2 acked = 0 __PRETTY_FUNCTION__ = "handle_incoming" #5 0x00007fd0445a1d27 in handle_request_do (req=0x7fcf6491b000, addr=0x7fcd385b9b98) at chan_sip.c:29374 p = 0x7fcd390b5e80 owner_chan_ref = 0x0 recount = 0 nounlock = 0 __PRETTY_FUNCTION__ = "handle_request_do" #6 0x00007fd0445197d8 in sip_websocket_callback (session=0x7fcd385b9b90, parameters=0x0, headers=0x7fcd38074dc0) at chan_sip.c:2714 req = {rlpart1 = 0, rlpart2 = 9, headers = 10, method = 2, lines = 0, sdp_start = 0, sdp_count = 0, debug = 0 '000', has_to_tag = 0 '000', ignore = 0 '000', authenticated = 0 '000', header = {0, 44, 135, 206, 250, 357, 403, 424, 442, 459, 636, 0 }, line = {636, 0 }, data = 0x7fcd387f9d20, content = 0x0, socket = {type = AST_TRANSPORT_WSS, fd = -1, port = 0, tcptls_session = 0x0, ws_session = 0x7fcd385b9b90}, next = {next = 0x0}, reqsipoptions = 0} data = 0x7fcf6491ad20 "REGISTER sip:dcccast.pik-comfort.ru SIP/2.0rnVia: SIP/2.0/WSS df7jal23ls0d.invalid;branch=z9hG4bK5eVbEXsA1SoSIscorAVIPnId7ci4S4oz;rportrnFrom: "8899";tag=xmrlubekzR4Pi"... payload = 0x7fcd38aa9f40 "REGISTER sip:dcccast.pik-comfort.ru SIP/2.0rnVia: SIP/2.0/WSS df7jal23ls0d.invalid;branch=z9hG4bK5eVbEXsA1SoSIscorAVIPnId7ci4S4oz;rportrnFrom: "8899";tag=xmrlubekzR4Pi"... payload_len = 648 opcode = AST_WEBSOCKET_OPCODE_TEXT fragmented = 0 res = 1 __PRETTY_FUNCTION__ = "sip_websocket_callback" #7 0x00007fd04741b960 in __ast_websocket_uri_cb (ser=0x7fd00c00df50, urih=0x7fd047621420 , uri=0x7fcf6491bd27 "", method=AST_HTTP_GET, get_vars=0x0, headers=0x7fcd38074dc0) at res_http_websocket.c:944 v = 0x0 upgrade = 0x7fcd38050518 "websocket" key = 0x7fcd3854d182 "nN+grvyceuyEuF6KzxZrhw==" key1 = 0x0 key2 = 0x0 protos = 0x7fcd38976747 "sip" requested_protocols = 0x0 protocol = 0x7fcf6491bac0 "sip" version = 13 flags = 1 protocol_handler = 0x1c0ce60 session = 0x7fcd385b9b90 server = 0x1b79230 __self____LINE__ = 0x1e4c620 __PRETTY_FUNCTION__ = "__ast_websocket_uri_cb" #8 0x000000000060af40 in handle_uri (ser=0x7fd00c00df50, uri=0x7fcf6491bd27 "", method=AST_HTTP_GET, headers=0x7fcd38074dc0) at http.c:1482 c = 0x7fcf6491bd27 "" res = 0 params = 0x0 urih = 0x7fd047621420 l = 2 get_vars = 0x0 v = 0x0 prev = 0x0 redirect = 0x0 __PRETTY_FUNCTION__ = "handle_uri" #9 0x000000000060bfd0 in httpd_process_request (ser=0x7fd00c00df50) at http.c:1923 headers = 0x7fcd38074dc0 uri = 0x7fcf6491bd24 "/ws" method = 0x7fcf6491bd20 "GET" transfer_encoding = 0x69881b "identity" request = 0x7fcd381f11a8 http_method = AST_HTTP_GET res = 306152100 len = 18 request_line = "GET000/ws000HTTP/1.1rn", '000' ... #10 0x000000000060c2d5 in httpd_helper_thread (data=0x7fd00c00df50) at http.c:1986 ser = 0x7fd00c00df50 timeout = 15000 arg = 1 __PRETTY_FUNCTION__ = "httpd_helper_thread" #11 0x00000000005b4f33 in handle_tcptls_connection (data=0x7fd00c00df50) at tcptls.c:241 tcptls_session = 0x7fd00c00df50 ssl = 0x7fcd38838480 __PRETTY_FUNCTION__ = "handle_tcptls_connection" #12 0x00000000005c58ef in dummy_start (data=0x7fd00c012dd0) at utils.c:1249 __cancel_buf = {__cancel_jmp_buf = {{__cancel_jmp_buf = {0, -3247813429137049302, 0, 0, 140528722237888, 140528722237184, -3247813429162215126, 3275167512443418922}, __mask_was_saved = 0}}, __pad = {0x7fcf6491cef0, 0x0, 0x7fd0a48ef8e2 <__libc_thread_freeres+34>, 0x0}} __cancel_routine = 0x45531d __cancel_arg = 0x7fcf6491d700 __not_first_call = 0 ret = 0x4 a = {start_routine = 0x5b49b2 , data = 0x7fd00c00df50, name = 0x7fd00c007420 "handle_tcptls_connection started at [ 309] tcptls.c ast_tcptls_server_root()"} __PRETTY_FUNCTION__ = "dummy_start" #13 0x00007fd0a55cb184 in start_thread (arg=0x7fcf6491d700) at pthread_create.c:312 __res = pd = 0x7fcf6491d700 now = unwind_buf = {cancel_jmp_buf = {{jmp_buf = {140528722237184, 3275167818712807722, 0, 0, 140528722237888, 140528722237184, -3247813429130757846, -3255274056417478358}, mask_was_saved = 0}}, priv = {pad = {0x0, 0x0, 0x0, 0x0}, data = {prev = 0x0, cleanup = 0x0, canceltype = 0}}} not_first_call = pagesize_m1 = sp = freesize = __PRETTY_FUNCTION__ = "start_thread" #14 0x00007fd0a488403d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:111 No locals.