[asterisk-bugs] [Asterisk 0018403]: [patch] Deadlock on SIP blind transfer (REFER)
Asterisk Bug Tracker
noreply at bugs.digium.com
Sat Dec 25 01:10:58 UTC 2010
A NOTE has been added to this issue.
======================================================================
https://issues.asterisk.org/view.php?id=18403
======================================================================
Reported By: jthurman
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 18403
Category: Channels/chan_sip/Transfers
Reproducibility: always
Severity: major
Priority: normal
Status: acknowledged
Asterisk Version: SVN
JIRA: SWP-2667
Regression: No
Reviewboard Link:
SVN Branch (only for SVN checkouts, not tarball releases): 1.8
SVN Revision (number only!): 296824
Request Review:
======================================================================
Date Submitted: 2010-11-30 18:25 CST
Last Modified: 2010-12-24 19:10 CST
======================================================================
Summary: [patch] Deadlock on SIP blind transfer (REFER)
Description:
All SIP:
- A calls B
- B blind-transfers A to C (Using REFER)
- Asterisk stops responding to SIP requests (Deadlocked)
======================================================================
----------------------------------------------------------------------
(0129958) jthurman (reporter) - 2010-12-24 19:10
https://issues.asterisk.org/view.php?id=18403#c129958
----------------------------------------------------------------------
I missed the only call to pbx_builtin_setvar_helper that actually sets
something on current.chan1, and will try grabbing the lock again before
that call to see if that helps. There are other possible SIP deadlock
issues in the tracker though (0018455, 0018468, 0018441) that might also be
in play here.
Issue History
Date Modified Username Field Change
======================================================================
2010-12-24 19:10 jthurman Note Added: 0129958
======================================================================
More information about the asterisk-bugs
mailing list