[asterisk-bugs] [Asterisk 0014296]: chan_dahdi segfaulting (may be related to Bridge() application).
Asterisk Bug Tracker
noreply at bugs.digium.com
Fri Jan 30 08:33:09 CST 2009
A NOTE has been added to this issue.
======================================================================
http://bugs.digium.com/view.php?id=14296
======================================================================
Reported By: kebl0155
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 14296
Category: Channels/chan_dahdi
Reproducibility: random
Severity: crash
Priority: normal
Status: acknowledged
Asterisk Version: 1.6.0.1
Regression: No
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Request Review:
======================================================================
Date Submitted: 2009-01-21 08:26 CST
Last Modified: 2009-01-30 08:33 CST
======================================================================
Summary: chan_dahdi segfaulting (may be related to Bridge()
application).
Description:
Hi,
We changed one of our apps to use the new Bridge() command today. Since
then we've had two segfault/core dumps in chan_dahdi.
======================================================================
----------------------------------------------------------------------
(0099127) blitzrage (administrator) - 2009-01-30 08:33
http://bugs.digium.com/view.php?id=14296#c99127
----------------------------------------------------------------------
Ya, if it happens infrequently, I might need to load something up with SIPp
and reproduce it that way.
If that doesn't work... then I might have no choice but to ping someone at
Digium to try and reproduce this in a lab since I have no hardware here.
But that might be easier said than done :)
Issue History
Date Modified Username Field Change
======================================================================
2009-01-30 08:33 blitzrage Note Added: 0099127
======================================================================
More information about the asterisk-bugs
mailing list