mirror of
				https://github.com/asterisk/asterisk.git
				synced 2025-10-31 02:37:10 +00:00 
			
		
		
		
	prevent double masqurading channels when one is been hung up and deadlock avoidance is used.
There is a race condition in ast_do_masquerade / ast_hangup (at least) Reported by me signed off by schmidts with input from David Vossel Review: https://reviewboard.asterisk.org/r/1323/ git-svn-id: https://origsvn.digium.com/svn/asterisk/branches/1.8@330311 65c4cc65-6c06-0410-ace0-fbb531ad65f3
This commit is contained in:
		| @@ -6320,10 +6320,18 @@ int ast_do_masquerade(struct ast_channel *original) | ||||
| 	 * for deadlock avoidance will not result in any sort of masquerade race condition. | ||||
| 	 * If masq is called by a different thread while this happens, it will be stuck waiting | ||||
| 	 * until we unlock the container. */ | ||||
| 	while (ast_channel_trylock(clonechan)) { | ||||
| 	while ((clonechan = original->masq) && ast_channel_trylock(clonechan)) { | ||||
| 		CHANNEL_DEADLOCK_AVOIDANCE(original); | ||||
| 	} | ||||
|  | ||||
| 	/* recheck if masq has been done the deadlock avoidance above could cause a double masq | ||||
| 	 * this is posible with at least ast_hangup*/ | ||||
| 	if (!original->masq) { | ||||
| 		ast_channel_unlock(original); | ||||
| 		ao2_unlock(channels); | ||||
| 		return 0; /* masq already completed by another thread, or never needed to be done to begin with */ | ||||
| 	} | ||||
|  | ||||
| 	/* Get any transfer masquerade connected line exchange data. */ | ||||
| 	xfer_ds = ast_channel_datastore_find(original, &xfer_ds_info, NULL); | ||||
| 	if (xfer_ds) { | ||||
|   | ||||
		Reference in New Issue
	
	Block a user