[asterisk-bugs] [Zaptel 0012811]: Kernel crash at eventpoll_release_file after a second call
noreply at bugs.digium.com
noreply at bugs.digium.com
Tue Jul 1 15:11:49 CDT 2008
A NOTE has been added to this issue.
======================================================================
http://bugs.digium.com/view.php?id=12811
======================================================================
Reported By: ezhilyakova
Assigned To: sruffell
======================================================================
Project: Zaptel
Issue ID: 12811
Category: zaptel (the module)
Reproducibility: always
Severity: major
Priority: normal
Status: feedback
Zaptel Version: 1.2.25
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Disclaimer on File?: N/A
Request Review:
======================================================================
Date Submitted: 06-09-2008 00:34 CDT
Last Modified: 07-01-2008 15:11 CDT
======================================================================
Summary: Kernel crash at eventpoll_release_file after a
second call
Description:
Server Dell PE 1950 III
Kernel 2.6.24-gentoo-r7 http://bugs.digium.com/view.php?id=2
Asterisk 1.2.27
Zaptel 1.2.25 (+ ztdummy)
No digium cards installed
After a second incoming call from SIP trunk Asterisk stops responding to
call requests. This problem appeared just after zaptel module was installed
and meetme enabled.
======================================================================
----------------------------------------------------------------------
ezhilyakova - 07-01-08 15:11
----------------------------------------------------------------------
The issue was caused by enabling "Security options --->
[*] Enable different security models
<*> Default Linux Capabilities - CONFIG_SECURITY_CAPABILITIES"
in Linux kernel. You may close this bug report.
Issue History
Date Modified Username Field Change
======================================================================
07-01-08 15:11 ezhilyakova Note Added: 0089554
======================================================================
More information about the asterisk-bugs
mailing list