[asterisk-bugs] [Asterisk 0015523]: [patch] chan_dahdi deadlock heavy incomming traffic

Asterisk Bug Tracker noreply at bugs.digium.com
Mon Aug 17 13:23:44 CDT 2009


The following issue has been ASSIGNED. 
====================================================================== 
https://issues.asterisk.org/view.php?id=15523 
====================================================================== 
Reported By:                adomjan
Assigned To:                rmudgett
====================================================================== 
Project:                    Asterisk
Issue ID:                   15523
Category:                   Channels/chan_dahdi
Reproducibility:            random
Severity:                   major
Priority:                   normal
Status:                     assigned
Asterisk Version:           1.6.0.9 
Regression:                 No 
SVN Branch (only for SVN checkouts, not tarball releases): N/A 
SVN Revision (number only!):  
Request Review:              
====================================================================== 
Date Submitted:             2009-07-17 13:37 CDT
Last Modified:              2009-08-17 13:23 CDT
====================================================================== 
Summary:                    [patch] chan_dahdi deadlock heavy incomming traffic
Description: 
I had deadlocks ~ 2-3 hours on high incomming ss7 calls. The deadlock
happend after the answer.
After I moved ast_setstate(ast, AST_STATE_UP); in area where the pvt is
locked in dahdi_answer() (like in chan_sip), and protected from the double
answer, I have not more deadlocks.

====================================================================== 

Issue History 
Date Modified    Username       Field                    Change               
====================================================================== 
2009-08-17 13:23 lmadsen        Status                   new => assigned     
2009-08-17 13:23 lmadsen        Assigned To               => rmudgett        
======================================================================




More information about the asterisk-bugs mailing list