[asterisk-bugs] [Asterisk 0016678]: [patch] segfault on chanspy due to race in main/channel.c
Asterisk Bug Tracker
noreply at bugs.digium.com
Fri Feb 12 17:30:20 CST 2010
The following issue has been RESOLVED.
======================================================================
https://issues.asterisk.org/view.php?id=16678
======================================================================
Reported By: tim_ringenbach
Assigned To: dvossel
======================================================================
Project: Asterisk
Issue ID: 16678
Category: Applications/app_chanspy
Reproducibility: random
Severity: minor
Priority: normal
Status: resolved
Target Version: 1.4.31
Asterisk Version: 1.4.29
JIRA: SWP-783
Regression: No
Reviewboard Link:
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Request Review:
Resolution: fixed
Fixed in Version:
======================================================================
Date Submitted: 2010-01-22 17:52 CST
Last Modified: 2010-02-12 17:30 CST
======================================================================
Summary: [patch] segfault on chanspy due to race in
main/channel.c
Description:
When channel.c destroys the datastore on the channel, it doesn't hold the
channel lock while calling the destroy callback. It really ought to,
because otherwise it's accessing the datastore list without locking. I've
gotten a segfault trying to lock the mutex in the ds destroy function in
app_chanspy because of this race.
Holding the channel lock during the destroy should be safe because it is
also held during the fixup callback, and app_chanspy has already been
patched to avoid the possible deadlock from that locking order issue.
======================================================================
Issue History
Date Modified Username Field Change
======================================================================
2010-02-12 17:30 svnbot Status assigned => resolved
2010-02-12 17:30 svnbot Resolution open => fixed
======================================================================
More information about the asterisk-bugs
mailing list