!@!@!@! thread1.txt !@!@!@! Thread 1 (Thread 0x7f3a129c2700 (LWP 7475)): #0 0x00007f3a154481f7 in raise () from /lib64/libc.so.6 No symbol table info available. #1 0x00007f3a154498e8 in abort () from /lib64/libc.so.6 No symbol table info available. #2 0x00007f3a15487f47 in __libc_message () from /lib64/libc.so.6 No symbol table info available. #3 0x00007f3a15490d7d in _int_malloc () from /lib64/libc.so.6 No symbol table info available. #4 0x00007f3a1549310c in malloc () from /lib64/libc.so.6 No symbol table info available. #5 0x000000000052bb4e in _ast_malloc (func=0x632e20 <__PRETTY_FUNCTION__.14393> "ast_json_malloc", lineno=140, file=0x632a9c "json.c", len=) at /usr/src/git/asterisk/include/asterisk/utils.h:547 p = #6 ast_json_malloc (size=) at json.c:140 __PRETTY_FUNCTION__ = "ast_json_malloc" #7 0x00007f3a16a8c19b in json_object () from /lib64/libjansson.so.4 No symbol table info available. #8 0x00007f3a16a8b115 in pack () from /lib64/libjansson.so.4 No symbol table info available. #9 0x00007f3a16a8b46f in json_vpack_ex () from /lib64/libjansson.so.4 No symbol table info available. #10 0x000000000052d2e3 in ast_json_vpack (format=0x7f39b4b3072d "{s: s, s: s, s: f}", ap=ap@entry=0x7f3a129bf218) at json.c:823 error = {line = -1, column = -1, position = 0, source = "000000000000061071062.168.6.26", '000' , "_266E000000000000000n001000000v001000000P", '000' , "064366233022:177000000 000", , text = "000177000000000000000000000000000000_266E000000000000000 000000000000000000000220b000374071177000000000000000000000000000000d;I025:177000000000000000000001", '000' , "320317[000000000000000061>]000000000000000340006365001000000000000"T]000000000000000321rd355ŀ377377t000000000000000000000002", '000' , "062000000000[000000000060362233022:177", '000' } r = 0x0 __PRETTY_FUNCTION__ = "ast_json_vpack" #11 0x000000000052d3ec in ast_json_pack (format=format@entry=0x7f39b4b3072d "{s: s, s: s, s: f}") at json.c:814 ret = 0x0 args = {{gp_offset = 8, fp_offset = 48, overflow_arg_area = 0x7f3a129bf2f0, reg_save_area = 0x7f3a129bf230}} #12 0x00007f39b4b276ee in ast_rtcp_interpret (instance=instance@entry=0x7f39ec003ef0, rtcpdata=rtcpdata@entry=0x7f3a129bf550 "201", , size=size@entry=100, addr=addr@entry=0x7f3a129bf3f0) at res_rtp_asterisk.c:4965 i = pt = ssrc_valid = length = 8 rc = ssrc = min_length = message_blob = rtcp_report = 0x7f39fc002390 rtp = 0x7f39ec004610 rtcpheader = 0x7f3a129bf550 packetwords = 25 position = 13 first_word = ssrc_seen = report_counter = 2 report_block = 0x7f3a08000a20 f = 0x8ad360 __PRETTY_FUNCTION__ = "ast_rtcp_interpret" #13 0x00007f39b4b2c664 in ast_rtcp_read (instance=instance@entry=0x7f39ec003ef0) at res_rtp_asterisk.c:5059 rtp = 0x7f39ec004610 addr = {ss = {ss_family = 2, __ss_padding = "'323300250006n000000000000000000000000060365233022:177000000p364233022:177000000?364233022:177000000 000000374071177000000060004F000000000000000200315001000000000000000H000000000000000000000004000000000000000000000!000000000000000000000hv000374071177", '000' , __ss_align = 5337478}, len = 16} rtcpdata = '000' , "lj366266071177000000300000234022:177000000354j020L000000000000244267375266071177000000270021000374071177000000201310000fj033&327Y367n320315005374n000000N030000000000y000000K240031177KD000000000000000000w346000000000000020!zX000002xQ201311000aj033&327031177KD000000000000000000w346000000000000020!zX000002xQ201312000003j033&327001002nr000000000000071177000000211266H025:177000000340373233022:177000000320373233022:177000000023320375266071177000000"... read_area = 0x7f3a129bf550 "201", __PRETTY_FUNCTION__ = "ast_rtcp_read" #14 0x00007f39b4b2de83 in ast_rtp_read (instance=0x7f39ec003ef0, rtcp=1) at res_rtp_asterisk.c:5235 rtp = 0x7f39ec004610 instance1 = addr = {ss = {ss_family = 2, __ss_padding = "'322300250006n", '000' , "020032234022:177000000pcm000ulaw000ul|mu|ulw000022:177000000030027234022:177000000004000000000000000000000004353P000000000000000alaw000al000alw000:177000000004000000000000000000000004353P000000000000000au000022:177000", __ss_align = 4568671}, len = 16} res = hdrlen = 12 version = payloadtype = padding = mark = ext = cc = prev_seqno = read_area = 0x7f39ec0046e0 "200" rtpheader = 0x7f39ec0046e0 seqno = payload = 0x0 remote_address = {ss = {ss_family = 0, __ss_padding = '000' , __ss_align = 0}, len = 0} frames = __PRETTY_FUNCTION__ = "ast_rtp_read" #15 0x000000000058b796 in ast_rtp_instance_read (instance=0x7f39ec003ef0, rtcp=rtcp@entry=1) at rtp_engine.c:516 frame = __PRETTY_FUNCTION__ = "ast_rtp_instance_read" #16 0x00007f39b6f5a6c9 in sip_rtp_read (faxdetect=, p=0x7f39ec0011f0, ast=0x7f39ec006fd0) at chan_sip.c:8560 f = #17 sip_read (ast=0x7f39ec006fd0) at chan_sip.c:8663 fr = p = 0x7f39ec0011f0 faxdetected = 0 __PRETTY_FUNCTION__ = "sip_read" #18 0x00000000004beb0d in __ast_read (chan=0x7f39ec006fd0, dropaudio=dropaudio@entry=0) at channel.c:3966 f = 0x0 prestate = 6 cause = 0 __PRETTY_FUNCTION__ = "__ast_read" #19 0x00000000004bf787 in ast_read (chan=) at channel.c:4398 No locals. #20 0x0000000000510964 in waitstream_core (c=c@entry=0x7f39ec006fd0, breakon=breakon@entry=0x7f39b0666e0f "", forward=0x6098aa "", forward@entry=0x0, reverse=0x6098aa "", reverse@entry=0x0, skip_ms=, skip_ms@entry=0, audiofd=audiofd@entry=-1, cmdfd=cmdfd@entry=-1, cb=cb@entry=0x0, context=0x0) at file.c:1602 fr = res = ms = 1000 orig_chan_name = 0x0 err = 0 #21 0x0000000000513c06 in ast_waitstream (c=c@entry=0x7f39ec006fd0, breakon=breakon@entry=0x7f39b0666e0f "") at file.c:1754 res = #22 0x00007f39b066698b in playback_exec (chan=0x7f39ec006fd0, data=0x7f39ec000a40 "demo-instruct") at app_playback.c:489 back = 0x0 front = 0x7f3a129c1b10 "demo-instruct" res = mres = 0 tmp = option_skip = option_say = option_noanswer = args = {argc = 1, argv = 0x7f3a129c1b48, filenames = 0x7f3a129c1b10 "demo-instruct", options = 0x0} __PRETTY_FUNCTION__ = "playback_exec" #23 0x000000000057c929 in pbx_exec (c=0x7f39ec006fd0, app=app@entry=0x1eea890, data=data@entry=0x7f39ec000a40 "demo-instruct") at pbx_app.c:491 res = u = 0x7f39fc001610 saved_c_appl = 0x629eea "AppDial2" saved_c_data = 0x629ef3 "(Outgoing Line)" __PRETTY_FUNCTION__ = "pbx_exec" #24 0x0000000000574d45 in pbx_outgoing_exec (data=data@entry=0x7f39ec000cd0) at pbx.c:7513 app = 0x1eea890 outgoing = 0x7f39ec000cd0 res = __PRETTY_FUNCTION__ = "pbx_outgoing_exec" #25 0x00000000005e718a in dummy_start (data=) at utils.c:1238 __cancel_buf = {__cancel_jmp_buf = {{__cancel_jmp_buf = {139886749320624, -9116693445838013633, 0, 139887397054912, 139887397054208, 40, 9155495495688354623, -9116693974695707841}, __mask_was_saved = 0}}, __pad = {0x7f3a129c1d70, 0x0, 0x7f3a1557a662 <__libc_thread_freeres+34>, 0x7f3a129c29c0}} __cancel_arg = 0x7f3a129c2700 __not_first_call = ret = a = {start_routine = 0x574cb0 , data = 0x7f39ec000cd0, name = 0x7f39ec0085b0 "pbx_outgoing_exec started at [ 7732] pbx.c pbx_outgoing_attempt()"} #26 0x00007f3a1622be25 in start_thread () from /lib64/libpthread.so.0 No symbol table info available. #27 0x00007f3a1550b34d in clone () from /lib64/libc.so.6 No symbol table info available.