[asterisk-bugs] [Asterisk 0014858]: [patch] Regular segfault with chan_unistim
Asterisk Bug Tracker
noreply at bugs.digium.com
Thu May 7 12:13:38 CDT 2009
The following issue has been RESOLVED.
======================================================================
http://bugs.digium.com/view.php?id=14858
======================================================================
Reported By: barryf
Assigned To: tilghman
======================================================================
Project: Asterisk
Issue ID: 14858
Category: Channels/chan_unistim
Reproducibility: random
Severity: crash
Priority: normal
Status: resolved
Asterisk Version: 1.6.0.7
Regression: No
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Request Review:
Resolution: fixed
Fixed in Version:
======================================================================
Date Submitted: 2009-04-08 07:44 CDT
Last Modified: 2009-05-07 12:13 CDT
======================================================================
Summary: [patch] Regular segfault with chan_unistim
Description:
Running Asterisk 1.6.0.8 on Ubuntu 8.10 Server. This same crash also
happens on 1.2.26 and 1.4.2x with the chan_unistim drivers. We have approx.
40 unistim handsets, in a callcenter environment. At least once a day,
Asterisk segfaults with the same gdb output.
It appears to happen during attended transfers, using the res_features
atxfer.
gdb output below.
======================================================================
Relationships ID Summary
----------------------------------------------------------------------
related to 0014723 ERROR[5003]: channel.c:2043 __ast_read:...
======================================================================
Issue History
Date Modified Username Field Change
======================================================================
2009-05-07 12:13 svnbot Status ready for testing =>
assigned
2009-05-07 12:13 svnbot Status assigned => resolved
2009-05-07 12:13 svnbot Resolution reopened => fixed
======================================================================
More information about the asterisk-bugs
mailing list