[asterisk-bugs] [Asterisk 0018403]: [patch] Deadlock on SIP blind transfer (REFER)
Asterisk Bug Tracker
noreply at bugs.digium.com
Tue Dec 21 18:24:29 UTC 2010
A NOTE has been added to this issue.
======================================================================
https://issues.asterisk.org/view.php?id=18403
======================================================================
Reported By: jthurman
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 18403
Category: Channels/chan_sip/Transfers
Reproducibility: always
Severity: major
Priority: normal
Status: acknowledged
Asterisk Version: SVN
JIRA: SWP-2667
Regression: No
Reviewboard Link:
SVN Branch (only for SVN checkouts, not tarball releases): 1.8
SVN Revision (number only!): 296824
Request Review:
======================================================================
Date Submitted: 2010-11-30 18:25 CST
Last Modified: 2010-12-21 12:24 CST
======================================================================
Summary: [patch] Deadlock on SIP blind transfer (REFER)
Description:
All SIP:
- A calls B
- B blind-transfers A to C (Using REFER)
- Asterisk stops responding to SIP requests (Deadlocked)
======================================================================
----------------------------------------------------------------------
(0129845) jthurman (reporter) - 2010-12-21 12:24
https://issues.asterisk.org/view.php?id=18403#c129845
----------------------------------------------------------------------
Moderator please delete 20101221-sip_deadlock.diff (wrong patch uploaded)
After taking a longer look, I think it should be safe to unlock
'current.chan1' before the call to ast_parking_ext_valid instead of where
it was unlocked below that section of code. Nothing that I see is done to
chan1 that doesn't handle it's own locking.
Issue History
Date Modified Username Field Change
======================================================================
2010-12-21 12:24 jthurman Note Added: 0129845
======================================================================
More information about the asterisk-bugs
mailing list