[asterisk-bugs] [Asterisk 0013050]: Memory segmentation fault on T.38 pass through
noreply at bugs.digium.com
noreply at bugs.digium.com
Thu Oct 30 11:01:47 CDT 2008
A NOTE has been added to this issue.
======================================================================
http://bugs.digium.com/view.php?id=13050
======================================================================
Reported By: schern
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 13050
Category: Channels/chan_sip/T.38
Reproducibility: always
Severity: crash
Priority: normal
Status: new
Asterisk Version: 1.4.21
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Disclaimer on File?: N/A
Request Review:
======================================================================
Date Submitted: 07-10-2008 08:17 CDT
Last Modified: 07-10-2008 08:38 CDT
======================================================================
Summary: Memory segmentation fault on T.38 pass through
Description:
I tried to use the chan_sip with T.38 pass through. An Fax is coming via
T.38 from
the Carrier an should go to a Linksys SPA2102 (T.38 enabled).
Short after starting UDPL traffic I got a segmentation fault.
The crash is 100% reproducible.
Outbound T.38 is no problem at all.
======================================================================
----------------------------------------------------------------------
blitzrage - 07-10-08 08:38
----------------------------------------------------------------------
schern: Please provide a backtrace after enabling DONT_OPTIMIZE in the
compiler flags menu of menuselect, then perform a 'make install', restart
Asterisk, and reproduce the issue.
Once you have a non-optimized backtrace, please post it here.
Thanks!
Issue History
Date Modified Username Field Change
======================================================================
07-10-08 08:38 blitzrage Note Added: 0090005
======================================================================
More information about the asterisk-bugs
mailing list