[asterisk-bugs] [Asterisk 0012476]: AMI Agents command tries to access null pointer to cid.cid_num for agent user channel
noreply at bugs.digium.com
noreply at bugs.digium.com
Fri Apr 18 10:15:56 CDT 2008
The following issue has been SUBMITTED.
======================================================================
http://bugs.digium.com/view.php?id=12476
======================================================================
Reported By: davidw
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 12476
Category: Channels/chan_agent
Reproducibility: sometimes
Severity: crash
Priority: normal
Status: new
Asterisk Version: SVN
SVN Branch (only for SVN checkouts, not tarball releases): 1.4
SVN Revision (number only!): 114060
Disclaimer on File?: N/A
Request Review:
======================================================================
Date Submitted: 04-18-2008 10:15 CDT
Last Modified: 04-18-2008 10:15 CDT
======================================================================
Summary: AMI Agents command tries to access null pointer to
cid.cid_num for agent user channel
Description:
Our AMI client issued an AMI Agents query, which it does after getting a
Dial event. action_agents suffered a segmentation violation on:
1503 talkingtoChan =
ast_strdupa(ast_bridged_channel(p->owner)->cid
.cid_num);
Analysis of the dump indicates that it is almost certainly cid.cid_num on
the served channel that is the problem:
(gdb) print p->owner->_bridge.cid
$4 = {cid_dnid = 0x0, cid_num = 0x0, cid_name = 0x0, cid_ani = 0x0,
cid_rdnis = 0x0, cid_pres = 0, cid_ani2 = 0, cid_ton = 0, cid_tns = 0}
======================================================================
Issue History
Date Modified Username Field Change
======================================================================
04-18-08 10:15 davidw Asterisk Version => SVN
04-18-08 10:15 davidw SVN Branch (only for SVN checkou => 1.4
04-18-08 10:15 davidw SVN Revision (number only!) => 114060
======================================================================
More information about the asterisk-bugs
mailing list