(gdb) bt #0 0x081309a0 in ast_rtp_new_with_bindaddr (sched=0x9131830, io=0x91326d8, rtcpenable=1, callbackmode=0, addr={s_addr = 0}) at rtp.c:2460 #1 0xb7937553 in sip_alloc (callid=0x91546a5 "M2Q3OGQ5OTBkNTE4OTRlYjBmNTE3ZTEyZDI2YzA0Yzg.", sin=0xb78f3048, useglobal_nat=1, intended_method=5) at chan_sip.c:6292 #2 0xb7938e35 in find_call (req=0xb78f3058, sin=0xb78f3048, intended_method=5) at chan_sip.c:6520 #3 0xb797a559 in handle_request_do (req=0xb78f3058, sin=0xb78f3048) at chan_sip.c:20026 #4 0xb797a2d5 in sipsock_read (id=0x9137440, fd=12, events=1, ignore=0x0) at chan_sip.c:19976 #5 0x080f2699 in ast_io_wait (ioc=0x91326d8, howlong=1000) at io.c:287 #6 0xb797bcf5 in do_monitor (data=0x0) at chan_sip.c:20461 #7 0x08172b92 in dummy_start (data=0x91367c8) at utils.c:1024 #8 0xb7d35315 in start_thread () from /lib/i686/libpthread.so.0 #9 0xb7e23dde in clone () from /lib/i686/libc.so.6 (gdb) bt full #0 0x081309a0 in ast_rtp_new_with_bindaddr (sched=0x9131830, io=0x91326d8, rtcpenable=1, callbackmode=0, addr={s_addr = 0}) at rtp.c:2460 rtp = (struct ast_rtp *) 0x9156890 x = 135465189 startplace = 0 __PRETTY_FUNCTION__ = "ast_rtp_new_with_bindaddr" #1 0xb7937553 in sip_alloc (callid=0x91546a5 "M2Q3OGQ5OTBkNTE4OTRlYjBmNTE3ZTEyZDI2YzA0Yzg.", sin=0xb78f3048, useglobal_nat=1, intended_method=5) at chan_sip.c:6292 p = (struct sip_pvt *) 0x9155f88 __PRETTY_FUNCTION__ = "sip_alloc" #2 0xb7938e35 in find_call (req=0xb78f3058, sin=0xb78f3048, intended_method=5) at chan_sip.c:6520 p = (struct sip_pvt *) 0x0 tag = 0xb798e290 "" totag = "E\232ӡ\\{ӡ\000\000\000\000\b/\217�E\232ӡ\\{ӡ\001q\000\000\030/\217�\000\000\000\000\001\000\000\000`\033\027\b\b/\217��O�\000\000\000\000\001\000\000\000\030/\217�&\024��r\023\t�6\232�8/\217��\036\027\b�r\023\t(\t\000\0008/\217��h\222�\024C\232��i\023\t\210/\217�kg\222� =\232���\230�7N\000" fromtag = '\0' , "\034/\217�\000\000\000\000(/\217� /\217�$/\217�,/\217�", '\0' , "~gӡ~�\017\b\000\000\000\000\000\000\000\000~gӡ�s�" arg = {method = SIP_INVITE, callid = 0x91546a5 "M2Q3OGQ5OTBkNTE4OTRlYjBmNTE3ZTEyZDI2YzA0Yzg.", fromtag = 0xb78f2e4c "", totag = 0xb78f2ecc "E\232ӡ\\{ӡ", tag = 0xb798e290 ""} callid = 0x91546a5 "M2Q3OGQ5OTBkNTE4OTRlYjBmNTE3ZTEyZDI2YzA0Yzg." from = 0x9154677 "\"xx\";tag=ca6d5a2f" to = 0x9154658 "\"959\"" cseq = 0x91546d9 "1 INVITE" sip_pvt_ptr = (struct sip_pvt *) 0x0 __PRETTY_FUNCTION__ = "find_call" #3 0xb797a559 in handle_request_do (req=0xb78f3058, sin=0xb78f3048) at chan_sip.c:20026 p = (struct sip_pvt *) 0xb78f301c recount = 0 nounlock = 0 lockretry = 100 __PRETTY_FUNCTION__ = "handle_request_do" #4 0xb797a2d5 in sipsock_read (id=0x9137440, fd=12, events=1, ignore=0x0) at chan_sip.c:19976 req = {rlPart1 = 0x9154584 "INVITE", rlPart2 = 0x915458b "sip:959@10.0.0.4;transport=udp", len = 792, headers = 12, method = 5, lines = 11, sdp_start = 0, sdp_end = 0, debug = 0 '\0', has_to_tag = 0 '\0', ignore = 0 '\0', header = {0x9154584 "INVITE", 0x91545b3 "Via: SIP/2.0/UDP 10.0.0.100:11436;branch=z9hG4bK-d8754z-e9697503a6703053-1---d8754z-;rport", 0x915460f "Max-Forwards: 70", 0x9154621 "Contact: ", 0x9154654 "To: \"959\"", 0x9154671 "From: \"xx\";tag=ca6d5a2f", 0x915469c "Call-ID: M2Q3OGQ5OTBkNTE4OTRlYjBmNTE3ZTEyZDI2YzA0Yzg.", 0x91546d3 "CSeq: 1 INVITE", 0x91546e3 "Allow: INVITE, ACK, CANCEL, OPTIONS, BYE, REFER, NOTIFY, MESSAGE, SUBSCRIBE, INFO", 0x9154736 "Content-Type: application/sdp", 0x9154755 "User-Agent: eyeBeam release 1100z stamp 47739", 0x9154784 "Content-Length: 257", 0x9154799 "", 0x0 }, line = {0x915479b "v=0", 0x91547a0 "o=- 7 2 IN IP4 10.0.0.100", 0x91547bb "s=CounterPath eyeBeam 1.5", 0x91547d6 "c=IN IP4 10.0.0.100", 0x91547eb "t=0 0", 0x91547f2 "m=audio 30750 RTP/AVP 98 101", 0x9154810 "a=fmtp:101 0-15", 0x9154821 "a=rtpmap:98 iLBC/8000", 0x9154838 "a=rtpmap:101 telephone-event/8000", 0x915485b "a=sendrecv", 0x9154867 "a=x-rtp-session-id:AB6E489E349644F0A3E4D7C056B00EDC", 0x915489c "", 0x0 }, data = 0x9154578, socket = { type = SIP_TRANSPORT_UDP, fd = 12, port = 50195, ser = 0x0}} sin = {sin_family = 2, sin_port = 44076, sin_addr = {s_addr = 1677721610}, sin_zero = "\000\000\000\000\000\000\000"} res = 792 len = 16 readbuf = "INVITE sip:959@10.0.0.4;transport=udp SIP/2.0\r\nVia: SIP/2.0/UDP 10.0.0.100:11436;branch=z9hG4bK-d8754z-e9697503a6703053-1---d8754z-;rport\r\nMax-Forwards: 70\r\nContact: to continue, or q to quit--- #6 0xb797bcf5 in do_monitor (data=0x0) at chan_sip.c:20461 res = 1000 t = 1225363320 reloading = 0 __PRETTY_FUNCTION__ = "do_monitor" #7 0x08172b92 in dummy_start (data=0x91367c8) at utils.c:1024 __cancel_buf = {__cancel_jmp_buf = {{__cancel_jmp_buf = {-1210826764, 0, 4001536, -1215351880, -418183692, -685673333}, __mask_was_saved = 0}}, __pad = {0xb78f3480, 0x0, 0x0, 0x0}} __cancel_routine = (void (*)(void *)) 0x80752d3 __cancel_arg = (void *) 0xb78f3b90 not_first_call = 0 ret = (void *) 0x0 a = {start_routine = 0xb797ba6a , data = 0x0, name = 0x9136860 "do_monitor", ' ' , "started at [20492] chan_sip.c restart_monitor()"} lock_info = (struct thr_lock_info *) 0x91369c0 mutex_attr = {__size = "\001\000\000", __align = 1} __PRETTY_FUNCTION__ = "dummy_start" #8 0xb7d35315 in start_thread () from /lib/i686/libpthread.so.0 No symbol table info available. #9 0xb7e23dde in clone () from /lib/i686/libc.so.6 No symbol table info available. (gdb)