[asterisk-bugs] [Asterisk 0019169]: Deadlock in handle_request_bye() and mutex error in handle_incoming()
Asterisk Bug Tracker
noreply at bugs.digium.com
Tue Apr 26 15:25:37 CDT 2011
The following issue requires your FEEDBACK.
======================================================================
https://issues.asterisk.org/view.php?id=19169
======================================================================
Reported By: kkm
Assigned To:
======================================================================
Project: Asterisk
Issue ID: 19169
Category: Channels/chan_sip/General
Reproducibility: random
Severity: crash
Priority: normal
Status: feedback
Asterisk Version: 1.8.4-rc2
JIRA: SWP-3380
Regression: No
Reviewboard Link:
SVN Branch (only for SVN checkouts, not tarball releases): N/A
SVN Revision (number only!):
Request Review:
======================================================================
Date Submitted: 2011-04-22 01:55 CDT
Last Modified: 2011-04-26 15:25 CDT
======================================================================
Summary: Deadlock in handle_request_bye() and mutex error in
handle_incoming()
Description:
1. Asterisk locks up under heavy load. Getting a freeze every other day.
2. An error message was reported once
ERROR[17987]: lock.c:384 in __ast_pthread_mutex_unlock: chan_sip.c line
23627 (handle_incoming): mutex 'owner' freed more times than we've locked!
======================================================================
----------------------------------------------------------------------
(0134152) russell (administrator) - 2011-04-26 15:25
https://issues.asterisk.org/view.php?id=19169#c134152
----------------------------------------------------------------------
dvossel's patch from that reviewboard link has been merged. Is still a
problem?
Issue History
Date Modified Username Field Change
======================================================================
2011-04-26 15:25 russell Note Added: 0134152
2011-04-26 15:25 russell Status acknowledged =>
feedback
======================================================================
More information about the asterisk-bugs
mailing list