[asterisk-bugs] [Asterisk 0011698]: Segmentation fault / Memory corruption with intensive AMI
noreply at bugs.digium.com
noreply at bugs.digium.com
Wed Jan 16 12:00:53 CST 2008
A NOTE has been added to this issue.
======================================================================
http://bugs.digium.com/view.php?id=11698
======================================================================
Reported By: Callmewind
Assigned To: russell
======================================================================
Project: Asterisk
Issue ID: 11698
Category: Core-General
Reproducibility: always
Severity: minor
Priority: normal
Status: assigned
Asterisk Version: 1.4.16.2
SVN Branch (only for SVN checkouts, not tarball releases): 1.4
SVN Revision (number only!):
Disclaimer on File?: N/A
Request Review:
======================================================================
Date Submitted: 01-07-2008 04:19 CST
Last Modified: 01-16-2008 12:00 CST
======================================================================
Summary: Segmentation fault / Memory corruption with
intensive AMI
Description:
We've developed an application which uses intensively AMI, specially
Redirect actions and UserEvents. We are using only SIP channels.
Asterisk crashes randomly, one time at day, with 10-15 calls.
So we build some kind of test system with 2 Asterisk, one making calls to
the other, and it crashes at 30 minutes or so.
======================================================================
----------------------------------------------------------------------
mvanbaak - 01-16-08 12:00
----------------------------------------------------------------------
Right now the svn server is undergoing maintenance. It's syncing with the
masters so give it some time to get up-to-date. Hopefully today or tomorrow
things will be back to normal again.
Issue History
Date Modified Username Field Change
======================================================================
01-16-08 12:00 mvanbaak Note Added: 0080772
======================================================================
More information about the asterisk-bugs
mailing list