Core was generated by `/usr/sbin/asterisk -f -vvvg -c'. Program terminated with signal 11, Segmentation fault. #0 0xb761bec8 in handle_request_invite (p=0x36814ca0, req=0xb75ca06c, debug=0, seqno=25527, sin=0xb75ca05c, recount=0xb75ca050, e=0xb75ca28f "sip:asterisk@172.16.110.252", nounlock=0xb75ca054) at chan_sip.c:14075 14075 if (bridgepvt->t38.state == T38_ENABLED) { (gdb) bt #0 0xb761bec8 in handle_request_invite (p=0x36814ca0, req=0xb75ca06c, debug=0, seqno=25527, sin=0xb75ca05c, recount=0xb75ca050, e=0xb75ca28f "sip:asterisk@172.16.110.252", nounlock=0xb75ca054) at chan_sip.c:14075 #1 0xb7621053 in handle_request (p=0x36814ca0, req=0xb75ca06c, sin=0xb75ca05c, recount=0xb75ca050, nounlock=0xb75ca054) at chan_sip.c:15241 #2 0xb7621a7d in sipsock_read (id=0x8188480, fd=12, events=1, ignore=0x0) at chan_sip.c:15388 #3 0x080aa55f in ast_io_wait (ioc=0x81a82f8, howlong=100) at io.c:279 #4 0xb7622415 in do_monitor (data=0x0) at chan_sip.c:15601 #5 0x080fc266 in dummy_start (data=0x81ab7a8) at utils.c:852 #6 0xb7f502d1 in start_thread () from /lib/libpthread.so.0 #7 0xb7e6bc7e in clone () from /lib/libc.so.6 (gdb) bt full #0 0xb761bec8 in handle_request_invite (p=0x36814ca0, req=0xb75ca06c, debug=0, seqno=25527, sin=0xb75ca05c, recount=0xb75ca050, e=0xb75ca28f "sip:asterisk@172.16.110.252", nounlock=0xb75ca054) at chan_sip.c:14075 sendok = 1 bridgepeer = (struct ast_channel *) 0xb3334f0 bridgepvt = (struct sip_pvt *) 0x0 res = 1 gotdest = 0 p_replaces = 0xb762e74a "" replace_id = 0x0 required = 0xb762e74a "" required_profile = 0 c = (struct ast_channel *) 0x3680ded8 reinvite = 1 __PRETTY_FUNCTION__ = "handle_request_invite" #1 0xb7621053 in handle_request (p=0x36814ca0, req=0xb75ca06c, sin=0xb75ca05c, recount=0xb75ca050, nounlock=0xb75ca054) at chan_sip.c:15241 cmd = 0xb75ca288 "INVITE" cseq = 0xb75ca401 "25527 INVITE" useragent = 0xb75ca4a9 "EDPHONE v0.8.0-trunk/win32" seqno = 25527 len = 5 ignore = 0 respid = -1208671314 res = 0 debug = 0 e = 0xb75ca28f "sip:asterisk@172.16.110.252" error = 0 __PRETTY_FUNCTION__ = "handle_request" #2 0xb7621a7d in sipsock_read (id=0x8188480, fd=12, events=1, ignore=0x0) at chan_sip.c:15388 req = {rlPart1 = 0xb75ca288 "INVITE", rlPart2 = 0xb75ca28f "sip:asterisk@172.16.110.252", len = 927, headers = 13, method = 5, lines = 14, flags = 0, header = {0xb75ca288 "INVITE", 0xb75ca2b4 "Via: SIP/2.0/UDP 172.16.110.8:5060;rport;branch=z9hG4bKPj5bd279f9edaf4cdb839852f59973273b", 0xb75ca30f "Max-Forwards: 70", 0xb75ca321 "From: ;tag=d400650f8cad4beaa32d44044912ed5e", 0xb75ca362 "To: \"asterisk\" ;tag=as3ab84ff3", 0xb75ca39f "Contact: ", 0xb75ca3c1 "Call-ID: 658597b066eb155151181c7008549439@172.16.110.252", 0xb75ca3fb "CSeq: 25527 INVITE", 0xb75ca40f "Allow: PRACK, INVITE, ACK, BYE, CANCEL, UPDATE, SUBSCRIBE, NOTIFY, PUBLISH, REFER, MESSAGE, OPTIONS", 0xb75ca474 "Supported: replaces, 100rel, norefersub", 0xb75ca49d "User-Agent: EDPHONE v0.8.0-trunk/win32", 0xb75ca4c5 "Content-Type: application/sdp", 0xb75ca4e4 "Content-Length: 298", 0xb75ca4fb "", 0x0 }, line = {0xb75ca4fd "v=0", 0xb75ca502 "o=- 3413094724 3413094604 IN IP4 172.16.110.8", 0xb75ca531 "s=pjmedia", 0xb75ca53c "c=IN IP4 172.16.110.8", 0xb75ca553 "t=0 0", 0xb75ca55a "a=X-nat:0", 0xb75ca565 "m=audio 4000 RTP/AVP 0 8 3 101", 0xb75ca585 "a=rtcp:4001 IN IP4 172.16.110.8", 0xb75ca5a6 "a=rtpmap:0 PCMU/8000", 0xb75ca5bc "a=rtpmap:8 PCMA/8000", 0xb75ca5d2 "a=rtpmap:3 GSM/8000", 0xb75ca5e7 "a=sendrecv", 0xb75ca5f3 "a=rtpmap:101 telephone-event/8000", 0xb75ca616 "a=fmtp:101 0-15", 0xb75ca627 "", 0x0 }, data = "INVITE\000sip:asterisk@172.16.110.252\000SIP/2.0\000\000Via: SIP/2.0/UDP 172.16.110.8:5060;rport;branch=z9hG4bKPj5bd279f9edaf4cdb839852f59973273b\000\000Max-Forwards: 70\000\000From: ;tag=d400650f8cad4bea"..., sdp_start = 0, sdp_end = 14} sin = {sin_family = 2, sin_port = 50195, sin_addr = {s_addr = 141430956}, sin_zero = "\000\000\000\000\000\000\000"} p = (struct sip_pvt *) 0x36814ca0 res = 927 len = 16 nounlock = 0 ---Type to continue, or q to quit--- recount = 0 lockretry = 100 __PRETTY_FUNCTION__ = "sipsock_read" #3 0x080aa55f in ast_io_wait (ioc=0x81a82f8, howlong=100) at io.c:279 res = 1 x = 0 origcnt = 1 #4 0xb7622415 in do_monitor (data=0x0) at chan_sip.c:15601 res = 100 sip = (struct sip_pvt *) 0x0 peer = (struct sip_peer *) 0x0 t = 1204105926 fastrestart = 0 lastpeernum = -1 curpeernum = 0 reloading = 0 __PRETTY_FUNCTION__ = "do_monitor" #5 0x080fc266 in dummy_start (data=0x81ab7a8) at utils.c:852 __cancel_buf = {__cancel_jmp_buf = {{__cancel_jmp_buf = {-1208623116, 0, -1218659440, -1218661416, -1969637848, 902481774}, __mask_was_saved = 0}}, __pad = {0xb75cb490, 0x0, 0x0, 0x0}} __cancel_routine = (void (*)(void *)) 0x8069253 __cancel_arg = (void *) 0xb75cbb90 not_first_call = 0 ret = (void *) 0x0 a = {start_routine = 0xb7621e6a , data = 0x0, name = 0x81acf40 "do_monitor", ' ' , "started at [15660] chan_sip.c restart_monitor()"} #6 0xb7f502d1 in start_thread () from /lib/libpthread.so.0 No symbol table info available. #7 0xb7e6bc7e in clone () from /lib/libc.so.6 No symbol table info available. (gdb)