[asterisk-bugs] [Asterisk 0015788]: Hard crash in send_packet (Asterisk 1.2.33-BRIstuffed-0.3.0-PRE-1y-u)
Asterisk Bug Tracker
noreply at bugs.digium.com
Fri Aug 28 11:00:42 CDT 2009
The following issue has been UPDATED.
======================================================================
https://issues.asterisk.org/view.php?id=15788
======================================================================
Reported By: tomsullivan
Assigned To: qwell
======================================================================
Project: Asterisk
Issue ID: 15788
Category: Channels/chan_iax2
Reproducibility: random
Severity: crash
Priority: normal
Status: closed
Asterisk Version: 1.2.X
Regression: No
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Request Review:
Resolution: won't fix
Fixed in Version:
======================================================================
Date Submitted: 2009-08-27 23:42 CDT
Last Modified: 2009-08-28 11:00 CDT
======================================================================
Summary: Hard crash in send_packet (Asterisk
1.2.33-BRIstuffed-0.3.0-PRE-1y-u)
Description:
Asterisk has hard crashed. The pertinent stack trace line is:
https://issues.asterisk.org/view.php?id=0 0x00007fbe772fb48b in send_packet
(f=0x7fbe6dd7e960) at
chan_iax2.c:1760
poking around in the source from gdb:
(gdb) p f->callno
$1 = 12554
(gdb) p iaxs[f->callno]
$2 = (struct chan_iax2_pvt *) 0x0
Which is the obvious culprit.
This seems odd given that only 9 lines earlier (chan_iax2.c:1751):
if (!iaxs[f->callno])
So the iaxs array seems to have been modified in the intervening time.
As noted in the title, the version we are running is:
Asterisk 1.2.33-BRIstuffed-0.3.0-PRE-1y-u
======================================================================
----------------------------------------------------------------------
(0109790) qwell (administrator) - 2009-08-28 11:00
https://issues.asterisk.org/view.php?id=15788#c109790
----------------------------------------------------------------------
1.2 is in security release maintenance mode. It will only receive security
fixes.
Additionally, BRIstuffed patches are unsupported here.
Issue History
Date Modified Username Field Change
======================================================================
2009-08-28 11:00 qwell Note Added: 0109790
2009-08-28 11:00 qwell Status new => resolved
2009-08-28 11:00 qwell Resolution open => won't fix
2009-08-28 11:00 qwell Assigned To => qwell
2009-08-28 11:00 qwell Status resolved => closed
======================================================================
More information about the asterisk-bugs
mailing list