[asterisk-bugs] [Asterisk 0016678]: [patch] segfault on chanspy due to race in main/channel.c
Asterisk Bug Tracker
noreply at bugs.digium.com
Thu Mar 11 09:33:53 CST 2010
The following issue has been UPDATED.
======================================================================
https://issues.asterisk.org/view.php?id=16678
======================================================================
Reported By: tim_ringenbach
Assigned To: dvossel
======================================================================
Project: Asterisk
Issue ID: 16678
Category: Applications/app_chanspy
Reproducibility: random
Severity: minor
Priority: normal
Status: closed
Target Version: 1.4.30
Asterisk Version: SVN
JIRA: SWP-783
Regression: No
Reviewboard Link:
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Request Review:
Resolution: fixed
Fixed in Version:
======================================================================
Date Submitted: 2010-01-22 17:52 CST
Last Modified: 2010-03-11 09:33 CST
======================================================================
Summary: [patch] segfault on chanspy due to race in
main/channel.c
Description:
When channel.c destroys the datastore on the channel, it doesn't hold the
channel lock while calling the destroy callback. It really ought to,
because otherwise it's accessing the datastore list without locking. I've
gotten a segfault trying to lock the mutex in the ds destroy function in
app_chanspy because of this race.
Holding the channel lock during the destroy should be safe because it is
also held during the fixup callback, and app_chanspy has already been
patched to avoid the possible deadlock from that locking order issue.
======================================================================
Issue History
Date Modified Username Field Change
======================================================================
2010-03-11 09:33 lmadsen Asterisk Version 1.4.29 => SVN
2010-03-11 09:33 lmadsen Target Version 1.4.31 => 1.4.30
======================================================================
More information about the asterisk-bugs
mailing list