[asterisk-bugs] [JIRA] (ASTERISK-22857) Deadlock: Locked Here: chan_iax2.c line 9756 (socket_read)
David Brillert (JIRA)
noreply at issues.asterisk.org
Thu Jan 2 12:45:03 CST 2014
[ https://issues.asterisk.org/jira/browse/ASTERISK-22857?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
David Brillert updated ASTERISK-22857:
--------------------------------------
Status: Waiting for Feedback (was: Waiting for Feedback)
Before I test, how far is this patch from being committed?
It seems to have some open issues...
https://reviewboard.asterisk.org/r/2826/
rmudgett 1 month, 1 week ago (Nov. 25, 2013, 1:12 p.m.)
Instead of using the pointer as a flag variable which cannot be changed atomically, use a volatile int as the flag variable. If you still have concernes then you can use ast_atomic_fetchadd_int() to examine and change the int flag.
> Deadlock: Locked Here: chan_iax2.c line 9756 (socket_read)
> ----------------------------------------------------------
>
> Key: ASTERISK-22857
> URL: https://issues.asterisk.org/jira/browse/ASTERISK-22857
> Project: Asterisk
> Issue Type: Bug
> Security Level: None
> Components: Channels/chan_iax2
> Affects Versions: SVN, 11.6.0
> Environment: 64 bit CentOS, 4GB RAM
> Reporter: David Brillert
> Assignee: David Brillert
> Severity: Critical
> Attachments: backtrace.txt, core show locks_gdb thread apply all bt full.txt, core show locks svn manual.txt, gdbcorebtbtfull.txt, iax2 debug.txt, valgrind.txt
>
>
> Full deadlock no call processing, no SIP traffic.
> GDB output DONT_OPTIMIZE DEBUG_THREADS BETTER_BACKTRACES thread apply all bt full.txt attached. The deadlock occurred overnight while the system was idle.
> It is happening on multiple production servers.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.asterisk.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
More information about the asterisk-bugs
mailing list