[asterisk-bugs] [Asterisk 0019381]: [patch] Segmentation faults

Asterisk Bug Tracker noreply at bugs.digium.com
Tue May 31 07:30:49 CDT 2011


A NOTE has been added to this issue. 
====================================================================== 
https://issues.asterisk.org/view.php?id=19381 
====================================================================== 
Reported By:                kvveltho
Assigned To:                
====================================================================== 
Project:                    Asterisk
Issue ID:                   19381
Category:                   Core/PBX
Reproducibility:            random
Severity:                   crash
Priority:                   normal
Status:                     new
Asterisk Version:           1.8.4.1 
JIRA:                        
Regression:                 No 
Reviewboard Link:            
SVN Branch (only for SVN checkouts, not tarball releases): N/A 
SVN Revision (number only!):  
Request Review:              
====================================================================== 
Date Submitted:             2011-05-28 05:04 CDT
Last Modified:              2011-05-31 07:30 CDT
====================================================================== 
Summary:                    [patch] Segmentation faults
Description: 
Daily random crashed with segmentation fault.
====================================================================== 

---------------------------------------------------------------------- 
 (0135576) kvveltho (reporter) - 2011-05-31 07:30
 https://issues.asterisk.org/view.php?id=19381#c135576 
---------------------------------------------------------------------- 
How do I do this:
You should probably print what *ss7 holds if you still have the dump. 
?

How can we solve it? 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2011-05-31 07:30 kvveltho       Note Added: 0135576                          
======================================================================




More information about the asterisk-bugs mailing list